Real-time monitoring of all vehicles via license plate spy chips advances in Connecticut

Real-time monitoring of all vehicles via license plate spy chips advances in Connecticut

A new bill in Connecticut has advanced the idea of embedded RFID chips in license plates. (PDF)

The admitted revenue-generating scheme, which would enable real-time tracking from points throughout the state, was first proposed to lawmakers by former astronaut, Paul Scully-Power.

Perhaps even more disturbing than Scully-Power’s connection to the companies that would profit from the implementation of the technology, is when he openly states that, “An RFID program would be phased in gradually and then expanded to accomplish other policing tasks without having to change equipment … the second phase would be to implement speeding violations.” (Source)

As we steamroll headlong toward being tracked, traced and databased both on real highways, as well as the information highway of the Internet, this license plate tracking scheme is merely an echo of the much larger framework of surveillance and control already under development, which ultimately includes a cashless society and microchipped population. The following 2-hour video offers a synopsis of where we currently stand, and where we are heading:

http://www.youtube.com/watch?v=8AoW4NgwqvU

Source: http://www.activistpost.com/2012/03/real-time-monitoring-of-all-vehicles.html

65-year-old California ‘milk man’ subjected to extreme torture, hypothermia, raw sewage in LA County jail

65-year-old California ‘milk man’ subjected to extreme torture, hypothermia, raw sewage in LA County jail

(NaturalNews) NaturalNews exclusive report, please credit with link. NaturalNews can now report that 65-year-old senior citizen James Stewart, a raw milk farmer with no criminal history, was nearly tortured to death in the LA County jail this past week. He survived a “week of torturous Hell” at the hands of LA County jail keepers who subjected him to starvation, sleep deprivation, hypothermia, loss of blood circulation to extremities, verbal intimidation, involuntary medical testing and even subjected him to over 30 hours of raw biological sewage filth containing dangerous pathogens.

This is from a county that has targeted and terrorized James Stewart for the supposed crime of selling fresh milk containing “dangerous pathogens.” That’s right – the only “crime” James has ever committed is being the milk man and distributing milk that is openly and honestly kept fresh and raw instead of pasteurized. So as part of his punishment of advocating raw cow’s milk, he was tortured with raw human sewage at the LA County jail.

This true story of jaw-dropping dehumanization and torture — conducted in total violation of state law as well as the Geneva Convention for prisoners of war — is told in an exclusive audio interview recorded today between Mike Adams and James Stewart.

That audio recording, which has been released by Adams into the public domain for the purpose of widespread copying and sharing, is available for download at the following links:

128kbps MP3 file (47MB, Hi-Fi, suitable for posting online):

MP3 only: www.naturalnews.com/files/Torture_128.mp3

ZIP file container: www.naturalnews.com/files/Torture_128.zip

32kbps MP3 file (12MB, Lo-Fi, suitable for emailing or sharing on mobile devices):

MP3 only: www.naturalnews.com/files/Torture_32.mp3

ZIP file container: www.naturalnews.com/files/Torture_32.zip

Video files:

Watch the full interview on YouTube at:

www.youtube.com/watch?v=mkDrrKhPB7M

or if YouTube censors it (as they now do almost any video critical of government), see it on the uncensored video site TV.NaturalNews.com at:

http://tv.naturalnews.com/v.asp?v=B0E3220D2A290E5966F3683E6377778B

Adams openly encourages members of the public to post these files on YouTube, Vimeo, bittorrent sites and anywhere else where they may reach the public.

“I thought I was gonna die in there…”

In this exclusive interview, you can hear James Stewart describe, in his own words, the shocking details of prisoner abuse right here in America. Among the highlights from his interview with Mike Adams:

• How James was subjected to severe food deprivation.

• How he was interrogated by deputies and accused of being a “sovereign,” then branded with a red arm band (Nazi-style) to falsely indicate that he was a danger to the general population.

• How James was shackled in long chains wrapped around his waist multiple times, then had his hands cuffed behind his back which was bound to the heavy waist chain to restrict his movement. His handcuffs were so tight he thought his wrists would break.

• James was then handcuffed to a cold bench, restricting his movement to just six inches, then left on the bench for 4-5 hours.

• James was then forcibly subjected to various medical tests, including forced chest X-rays even while he was handcuffed.

• He was placed in a cold cell wearing only a T-shirt and pants, where he soon began to suffer from hypothermia and found himself violently shivering just to stay alive.

• How he was made to suffer through total sleep deprivation all night long as other prisoners were screaming and banging on the walls.

• His cell was then flooded with raw human sewage, which flowed into his jail cell 2-3 inches deep, covering his shoes and shirt. LA County jail guards then ordered James to clean up all the raw sewage in his cell by handing him a small hand-held squeegee and demanding that he squeegee out all the raw sewage himself (which he reluctantly did).

• He was then forced to stay in the putrid raw sewage cell for over 30 hours, fighting off nausea and living in bacteriological filth that threatened his health.

• All along, the LA County prison guards gloated over their treatment of prisoners while laughing and joking about their power to subject prisoners to such abuse. This behavior openly mimics that of Gitmo guards who took pictures gloating over their torture and murder of prisoners of war.

• During this entire process, James was not allowed a single phone call nor any visit from an attorney. His right to speak to an attorney was repeatedly denied.

• At no point was James notified of what he was being charged with. He was never presented with an arrest warrant nor were any charges explained to him.

• James was mysteriously “lost” in the system and LA County officials claimed they did not know where he was. This was apparently a deliberate attempt to subject an individual to drawn-out torture without legal representation and make sure no one could locate them to check on their health or arrest status.

“Worse than torture… They’re actually torturing you mentally and physically to break you down…”

These are the actual words of James Stewart that you will hear in this interview:

• “I thought I was gonna die in there.”

• “It was worse than torture. They’re actually torturing you mentally and physically to break you down.”

• “I wrote the ‘torture’ on a piece of toilet paper to try to tell everybody what I had gone through, because I was worried they were going to mentally break me and put me in a psych ward.”

• “What I experienced in downtown LA was brutality.”

• “It’s trauma. And they create this thing where you’re not even sure what’s coming next. What has this country come to? I don’t sleep well at night right now, and I don’t think anyone would if they had been what I’ve been through.”

• “I’m shocked that this is America. Because it seems like you’re in some third world country, in a gulag, like in the movie Midnight Express, where you’re absolutely just tortured. That was the experience I had. Your mind goes, how can this be? This is America?”

NaturalNews calls on Amnesty International, ACLU to intervene

What we are witnessing here is a gross violation of civil rights and human rights, not to mention fundamental due process. The treatment unleashed upon James was not merely against the law in California, it was also a violation of federal law and a violation of the Geneva Convention and its ban on torturing prisoners of war.

“What happened to Stewart is horrendous,” health freedom attorney Jonathan Emord told NaturalNews. He’s the author of the new book “Restore the Republic” which lays out a plan to overthrow tyranny and restore a government that works on behalf of the people instead of declaring the People to be the enemy.

The bail amount set for James ($1 million) and the torture to which he was subjected clearly indicate that James Stewart is a political prisoner of the State of California, which has decided to spend millions of dollars in taxpayer money to target and incarcerate a senior citizen farmer. (By comparison, bail for alleged child rapist and sex pimp Jerry Sandusky, former Penn State sports coach, was only set at $100,000 and was unsecured!)

NaturalNews calls upon Amnesty International and the American Civil Liberties Union to intervene in this extraordinary violation of basic human rights. For the record, James Stewart has no criminal record and is a permaculture farmer and fresh food advocate. His “crime” consists entirely of arranging for the distribution of raw milk to customers who actually line up to access this nourishing food (people love it!).

NaturalNews has no financial ties to James Stewart nor Rawesome Foods and has been the leading source of free press information covering this story. The mainstream media so far refuses to cover this story, most likely out of financial loyalty to the conventional (processed) dairy industry which stands to lose tens of millions of dollars if raw milk is allowed to be openly and legally sold.

Assistance efforts for James Stewart and Sharon Palmer, the other person arrested in this case, can be emailed to:

[email protected]

More details to be revealed on national radio Sunday

Mike Adams will be discussing this issue on live national radio, Sunday at 1pm Eastern time, 10am Pacific, on the Robert Scott Bell Show.

Listen in at: www.GCNlive.com

In addition, NaturalNews has forwarded details to producers of the Alex Jones Show with the hope that Alex Jones will want to cover this for his own audience (www.InfoWars.com).

Information is also being forwarded to the Ron Paul campaign, as Ron Paul has openly spoken out against the absurdity of laws targeting raw milk producers. As Paul is extremely busy running for President, however, he is unlikely to be able to comment on this particular issue.

Tips have been forwarded to Matt Drudge for his consideration of the issue.

NaturalNews.com continues to be the breaking news source on this story with a voice of liberty and food freedom. Check NaturalNews.com for more details this weekend and all next week.

Action items:

• SHARE this story on Twitter, Facebook, LinkedIn and other social networks. You also have permission to download and share the audio files and video files of the interview. Post it on every bittorrent in the known universe…

• Contact your local newspaper editors with letters and opinion pieces to express your outrage at this vindictive arrest and torture of a California farmer.

• Write the officer of Governor Jerry Brown, who has done absolutely nothing to stop this outrageous abuse of California’s by rogue DA operatives in both LA and Ventura counties:

http://gov.ca.gov/m_contact.php

• Contact the Los Angeles County DA’s office at:

http://da.co.la.ca.us/feedback.htm

• Contact the Ventura County DA’s office (which arrested James at his court hearing) at:

http://da.countyofventura.org/contact_information.htm

• Stay up to date on our Facebook page where we post breaking news:

www.Facebook.com/HealthRanger

• Follow our Twitter feed at:

http://twitter.com/#!/healthranger

• Subscribe to our email newsletter to receive breaking news email alerts:

http://www.naturalnews.com/readerregistration.html

• Share our infographic about raw milk:

www.naturalnews.com/Infographic-Raw-Milk.html

• Learn more about raw milk at:

www.RealMilk.com

www.WestonAPrice.org

 

Learn more: http://www.naturalnews.com/035208_James_Stewart_torture_county_jail.html#ixzz1qa79nHZP

Source: http://www.naturalnews.com/035208_James_Stewart_torture_county_jail.html

Executive Director: “Why I Am Leaving Goldman Sachs”

Executive Director: “Why I Am Leaving Goldman Sachs”

TODAY is my last day at Goldman Sachs. After almost 12 years at the firm — first as a summer intern while at Stanford, then in New York for 10 years, and now in London — I believe I have worked here long enough to understand the trajectory of its culture, its people and its identity. And I can honestly say that the environment now is as toxic and destructive as I have ever seen it. 

To put the problem in the simplest terms, the interests of the client continue to be sidelined in the way the firm operates and thinks about making money. Goldman Sachs is one of the world’s largest and most important investment banks and it is too integral to global finance to continue to act this way. The firm has veered so far from the place I joined right out of college that I can no longer in good conscience say that I identify with what it stands for.

It might sound surprising to a skeptical public, but culture was always a vital part of Goldman Sachs’s success. It revolved around teamwork, integrity, a spirit of humility, and always doing right by our clients. The culture was the secret sauce that made this place great and allowed us to earn our clients’ trust for 143 years. It wasn’t just about making money; this alone will not sustain a firm for so long. It had something to do with pride and belief in the organization. I am sad to say that I look around today and see virtually no trace of the culture that made me love working for this firm for many years. I no longer have the pride, or the belief.

But this was not always the case. For more than a decade I recruited and mentored candidates through our grueling interview process. I was selected as one of 10 people (out of a firm of more than 30,000) to appear on our recruiting video, which is played on every college campus we visit around the world. In 2006 I managed the summer intern program in sales and trading in New York for the 80 college students who made the cut, out of the thousands who applied.

I knew it was time to leave when I realized I could no longer look students in the eye and tell them what a great place this was to work.

When the history books are written about Goldman Sachs, they may reflect that the current chief executive officer, Lloyd C. Blankfein, and the president, Gary D. Cohn, lost hold of the firm’s culture on their watch. I truly believe that this decline in the firm’s moral fiber represents the single most serious threat to its long-run survival.

Over the course of my career I have had the privilege of advising two of the largest hedge funds on the planet, five of the largest asset managers in the United States, and three of the most prominent sovereign wealth funds in the Middle East and Asia. My clients have a total asset base of more than a trillion dollars. I have always taken a lot of pride in advising my clients to do what I believe is right for them, even if it means less money for the firm. This view is becoming increasingly unpopular at Goldman Sachs. Another sign that it was time to leave.

How did we get here? The firm changed the way it thought about leadership. Leadership used to be about ideas, setting an example and doing the right thing. Today, if you make enough money for the firm (and are not currently an ax murderer) you will be promoted into a position of influence.

What are three quick ways to become a leader? a) Execute on the firm’s “axes,” which is Goldman-speak for persuading your clients to invest in the stocks or other products that we are trying to get rid of because they are not seen as having a lot of potential profit. b) “Hunt Elephants.” In English: get your clients — some of whom are sophisticated, and some of whom aren’t — to trade whatever will bring the biggest profit to Goldman. Call me old-fashioned, but I don’t like selling my clients a product that is wrong for them. c) Find yourself sitting in a seat where your job is to trade any illiquid, opaque product with a three-letter acronym.

Today, many of these leaders display a Goldman Sachs culture quotient of exactly zero percent. I attend derivatives sales meetings where not one single minute is spent asking questions about how we can help clients. It’s purely about how we can make the most possible money off of them. If you were an alien from Mars and sat in on one of these meetings, you would believe that a client’s success or progress was not part of the thought process at all.

It makes me ill how callously people talk about ripping their clients off. Over the last 12 months I have seen five different managing directors refer to their own clients as “muppets,” sometimes over internal e-mail. Even after the S.E.C., Fabulous Fab, Abacus, God’s work, Carl Levin, Vampire Squids? No humility? I mean, come on. Integrity? It is eroding. I don’t know of any illegal behavior, but will people push the envelope and pitch lucrative and complicated products to clients even if they are not the simplest investments or the ones most directly aligned with the client’s goals? Absolutely. Every day, in fact.

It astounds me how little senior management gets a basic truth: If clients don’t trust you they will eventually stop doing business with you. It doesn’t matter how smart you are.

These days, the most common question I get from junior analysts about derivatives is, “How much money did we make off the client?” It bothers me every time I hear it, because it is a clear reflection of what they are observing from their leaders about the way they should behave. Now project 10 years into the future: You don’t have to be a rocket scientist to figure out that the junior analyst sitting quietly in the corner of the room hearing about “muppets,” “ripping eyeballs out” and “getting paid” doesn’t exactly turn into a model citizen.

When I was a first-year analyst I didn’t know where the bathroom was, or how to tie my shoelaces. I was taught to be concerned with learning the ropes, finding out what a derivative was, understanding finance, getting to know our clients and what motivated them, learning how they defined success and what we could do to help them get there.

My proudest moments in life — getting a full scholarship to go from South Africa to Stanford University, being selected as a Rhodes Scholar national finalist, winning a bronze medal for table tennis at the Maccabiah Games in Israel, known as the Jewish Olympics — have all come through hard work, with no shortcuts. Goldman Sachs today has become too much about shortcuts and not enough about achievement. It just doesn’t feel right to me anymore.

I hope this can be a wake-up call to the board of directors. Make the client the focal point of your business again. Without clients you will not make money. In fact, you will not exist. Weed out the morally bankrupt people, no matter how much money they make for the firm. And get the culture right again, so people want to work here for the right reasons. People who care only about making money will not sustain this firm — or the trust of its clients — for very much longer.

Greg Smith is resigning today as a Goldman Sachs executive director and head of the firm’s United States equity derivatives business in Europe, the Middle East and Africa.

SOURCE: http://www.nytimes.com/2012/03/14/opinion/why-i-am-leaving-goldman-sachs.htm

Matrix Breakthrough: Self Correcting ‘Computer’ Code Discovered in Depths of String Theory

Matrix Breakthrough: Self Correcting ‘Computer’ Code Discovered in Depths of String Theory

 

“Doubly-even self-dual linear binary error-correcting block code,” first invented by Claude Shannon in the 1940’s, has been discovered embedded WITHIN the equations of superstring theory!

Why does nature have this? What errors does it need to correct? What is an ‘error’ for nature? More importantly what is the explanation for this freakish discovery? Your guess is as good as mine.

References
1.) Recent NPR interview with Professor Gates: http://being.publicradio.org/programs/2012/codes-for-reality/gates-symbolsofp…
2.) Gates original paper: http://arxiv.org/abs/0806.0051
3.) A potential explanation, Bostrom’s Simulation Hypothesis (below): http://www.simulation-argument.com/simulation.html

ARE YOU LIVING IN A COMPUTER SIMULATION?

BY NICK BOSTROM

Faculty of Philosophy, Oxford University

Published in Philosophical Quarterly (2003) Vol. 53, No. 211, pp. 243-255.

[www.simulation-argument.com]

         pdf-version: [PDF]

 

ABSTRACT

 

This paper argues that at least one of the following propositions is true: (1) the human species is very likely to go extinct before reaching a “posthuman” stage; (2) any posthuman civilization is extremely unlikely to run a significant number of simulations of their evolutionary history (or variations thereof); (3) we are almost certainly living in a computer simulation. It follows that the belief that there is a significant chance that we will one day become posthumans who run ancestor-simulations is false, unless we are currently living in a simulation. A number of other consequences of this result are also discussed.

 

 

I. INTRODUCTION

 

Many works of science fiction as well as some forecasts by serious technologists and futurologists predict that enormous amounts of computing power will be available in the future. Let us suppose for a moment that these predictions are correct. One thing that later generations might do with their super-powerful computers is run detailed simulations of their forebears or of people like their forebears. Because their computers would be so powerful, they could run a great many such simulations. Suppose that these simulated people are conscious (as they would be if the simulations were sufficiently fine-grained and if a certain quite widely accepted position in the philosophy of mind is correct). Then it could be the case that the vast majority of minds like ours do not belong to the original race but rather to people simulated by the advanced descendants of an original race. It is then possible to argue that, if this were the case, we would be rational to think that we are likely among the simulated minds rather than among the original biological ones. Therefore, if we don’t think that we are currently living in a computer simulation, we are not entitled to believe that we will have descendants who will run lots of such simulations of their forebears. That is the basic idea. The rest of this paper will spell it out more carefully.

Apart form the interest this thesis may hold for those who are engaged in futuristic speculation, there are also more purely theoretical rewards. The argument provides a stimulus for formulating some methodological and metaphysical questions, and it suggests naturalistic analogies to certain traditional religious conceptions, which some may find amusing or thought-provoking.

The structure of the paper is as follows. First, we formulate an assumption that we need to import from the philosophy of mind in order to get the argument started. Second, we consider some empirical reasons for thinking that running vastly many simulations of human minds would be within the capability of a future civilization that has developed many of those technologies that can already be shown to be compatible with known physical laws and engineering constraints. This part is not philosophically necessary but it provides an incentive for paying attention to the rest. Then follows the core of the argument, which makes use of some simple probability theory, and a section providing support for a weak indifference principle that the argument employs. Lastly, we discuss some interpretations of the disjunction, mentioned in the abstract, that forms the conclusion of the simulation argument.

 

II. THE ASSUMPTION OF SUBSTRATE-INDEPENDENCE

 

A common assumption in the philosophy of mind is that of substrate-independence. The idea is that mental states can supervene on any of a broad class of physical substrates. Provided a system implements the right sort of computational structures and processes, it can be associated with conscious experiences. It is not an essential property of consciousness that it is implemented on carbon-based biological neural networks inside a cranium: silicon-based processors inside a computer could in principle do the trick as well.

Arguments for this thesis have been given in the literature, and although it is not entirely uncontroversial, we shall here take it as a given.

The argument we shall present does not, however, depend on any very strong version of functionalism or computationalism. For example, we need not assume that the thesis of substrate-independence is necessarily true (either analytically or metaphysically) – just that, in fact, a computer running a suitable program would be conscious. Moreover, we need not assume that in order to create a mind on a computer it would be sufficient to program it in such a way that it behaves like a human in all situations, including passing the Turing test etc. We need only the weaker assumption that it would suffice for the generation of subjective experiences that the computational processes of a human brain are structurally replicated in suitably fine-grained detail, such as on the level of individual synapses. This attenuated version of substrate-independence is quite widely accepted.

Neurotransmitters, nerve growth factors, and other chemicals that are smaller than a synapse clearly play a role in human cognition and learning. The substrate-independence thesis is not that the effects of these chemicals are small or irrelevant, but rather that they affect subjective experience only via their direct or indirect influence on computational activities. For example, if there can be no difference in subjective experience without there also being a difference in synaptic discharges, then the requisite detail of simulation is at the synaptic level (or higher).

 

III. THE TECHNOLOGICAL LIMITS OF COMPUTATION

 

At our current stage of technological development, we have neither sufficiently powerful hardware nor the requisite software to create conscious minds in computers. But persuasive arguments have been given to the effect that if technological progress continues unabated then these shortcomings will eventually be overcome. Some authors argue that this stage may be only a few decades away.[1] Yet present purposes require no assumptions about the time-scale. The simulation argument works equally well for those who think that it will take hundreds of thousands of years to reach a “posthuman” stage of civilization, where humankind has acquired most of the technological capabilities that one can currently show to be consistent with physical laws and with material and energy constraints.

Such a mature stage of technological development will make it possible to convert planets and other astronomical resources into enormously powerful computers. It is currently hard to be confident in any upper bound on the computing power that may be available to posthuman civilizations. As we are still lacking a “theory of everything”, we cannot rule out the possibility that novel physical phenomena, not allowed for in current physical theories, may be utilized to transcend those constraints[2] that in our current understanding impose theoretical limits on the information processing attainable in a given lump of matter. We can with much greater confidence establish lower bounds on posthuman computation, by assuming only mechanisms that are already understood. For example, Eric Drexler has outlined a design for a system the size of a sugar cube (excluding cooling and power supply) that would perform 1021 instructions per second.[3] Another author gives a rough estimate of 1042 operations per second for a computer with a mass on order of a large planet.[4] (If we could create quantum computers, or learn to build computers out of nuclear matter or plasma, we could push closer to the theoretical limits. Seth Lloyd calculates an upper bound for a 1 kg computer of 5*1050 logical operations per second carried out on ~1031 bits.[5] However, it suffices for our purposes to use the more conservative estimate that presupposes only currently known design-principles.)

The amount of computing power needed to emulate a human mind can likewise be roughly estimated. One estimate, based on how computationally expensive it is to replicate the functionality of a piece of nervous tissue that we have already understood and whose functionality has been replicated in silico, contrast enhancement in the retina, yields a figure of ~1014 operations per second for the entire human brain.[6] An alternative estimate, based the number of synapses in the brain and their firing frequency, gives a figure of ~1016-1017 operations per second.[7] Conceivably, even more could be required if we want to simulate in detail the internal workings of synapses and dendritic trees. However, it is likely that the human central nervous system has a high degree of redundancy on the mircoscale to compensate for the unreliability and noisiness of its neuronal components. One would therefore expect a substantial efficiency gain when using more reliable and versatile non-biological processors.

Memory seems to be a no more stringent constraint than processing power.[8] Moreover, since the maximum human sensory bandwidth is ~108 bits per second, simulating all sensory events incurs a negligible cost compared to simulating the cortical activity. We can therefore use the processing power required to simulate the central nervous system as an estimate of the total computational cost of simulating a human mind.

If the environment is included in the simulation, this will require additional computing power – how much depends on the scope and granularity of the simulation. Simulating the entire universe down to the quantum level is obviously infeasible, unless radically new physics is discovered. But in order to get a realistic simulation of human experience, much less is needed – only whatever is required to ensure that the simulated humans, interacting in normal human ways with their simulated environment, don’t notice any irregularities. The microscopic structure of the inside of the Earth can be safely omitted. Distant astronomical objects can have highly compressed representations: verisimilitude need extend to the narrow band of properties that we can observe from our planet or solar system spacecraft. On the surface of Earth, macroscopic objects in inhabited areas may need to be continuously simulated, but microscopic phenomena could likely be filled in ad hoc. What you see through an electron microscope needs to look unsuspicious, but you usually have no way of confirming its coherence with unobserved parts of the microscopic world. Exceptions arise when we deliberately design systems to harness unobserved microscopic phenomena that operate in accordance with known principles to get results that we are able to independently verify. The paradigmatic case of this is a computer. The simulation may therefore need to include a continuous representation of computers down to the level of individual logic elements. This presents no problem, since our current computing power is negligible by posthuman standards.

Moreover, a posthuman simulator would have enough computing power to keep track of the detailed belief-states in all human brains at all times. Therefore, when it saw that a human was about to make an observation of the microscopic world, it could fill in sufficient detail in the simulation in the appropriate domain on an as-needed basis. Should any error occur, the director could easily edit the states of any brains that have become aware of an anomaly before it spoils the simulation. Alternatively, the director could skip back a few seconds and rerun the simulation in a way that avoids the problem.

It thus seems plausible that the main computational cost in creating simulations that are indistinguishable from physical reality for human minds in the simulation resides in simulating organic brains down to the neuronal or sub-neuronal level.[9] While it is not possible to get a very exact estimate of the cost of a realistic simulation of human history, we can use ~1033 – 1036 operations as a rough estimate[10]. As we gain more experience with virtual reality, we will get a better grasp of the computational requirements for making such worlds appear realistic to their visitors. But in any case, even if our estimate is off by several orders of magnitude, this does not matter much for our argument. We noted that a rough approximation of the computational power of a planetary-mass computer is 1042 operations per second, and that assumes only already known nanotechnological designs, which are probably far from optimal. A single such a computer could simulate the entire mental history of humankind (call this an ancestor-simulation) by using less than one millionth of its processing power for one second. A posthuman civilization may eventually build an astronomical number of such computers. We can conclude that the computing power available to a posthuman civilization is sufficient to run a huge number of ancestor-simulations even it allocates only a minute fraction of its resources to that purpose. We can draw this conclusion even while leaving a substantial margin of error in all our estimates.

 

  • Posthuman civilizations would have enough computing power to run hugely many ancestor-simulations even while using only a tiny fraction of their resources for that purpose.

 

IV. THE CORE OF THE SIMULATION ARGUMENT

The basic idea of this paper can be expressed roughly as follows: If there were a substantial chance that our civilization will ever get to the posthuman stage and run many ancestor-simulations, then how come you are not living in such a simulation?

We shall develop this idea into a rigorous argument. Let us introduce the following notation:

 

: Fraction of all human-level technological civilizations that survive to reach a posthuman stage

 

: Average number of ancestor-simulations run by a posthuman civilization

 

: Average number of individuals that have lived in a civilization before it reaches a posthuman stage

 

The actual fraction of all observers with human-type experiences that live in simulations is then

 

 

 

Writing for the fraction of posthuman civilizations that are interested in running ancestor-simulations (or that contain at least some individuals who are interested in that and have sufficient resources to run a significant number of such simulations), and for the average number of ancestor-simulations run by such interested civilizations, we have

 

 

 

and thus:

 

(*)

 

Because of the immense computing power of posthuman civilizations,  is extremely large, as we saw in the previous section. By inspecting (*) we can then see that at least one of the following three propositions must be true:

 

(1)

(2)

(3)

 

V. A BLAND INDIFFERENCE PRINCIPLE

 

We can take a further step and conclude that conditional on the truth of (3), one’s credence in the hypothesis that one is in a simulation should be close to unity. More generally, if we knew that a fraction x of all observers with human-type experiences live in simulations, and we don’t have any information that indicate that our own particular experiences are any more or less likely than other human-type experiences to have been implemented in vivo rather than in machina, then our credence that we are in a simulation should equal x:

 

(#)

 

This step is sanctioned by a very weak indifference principle. Let us distinguish two cases. The first case, which is the easiest, is where all the minds in question are like your own in the sense that they are exactly qualitatively identical to yours: they have exactly the same information and the same experiences that you have. The second case is where the minds are “like” each other only in the loose sense of being the sort of minds that are typical of human creatures, but they are qualitatively distinct from one another and each has a distinct set of experiences. I maintain that even in the latter case, where the minds are qualitatively different, the simulation argument still works, provided that you have no information that bears on the question of which of the various minds are simulated and which are implemented biologically.

A detailed defense of a stronger principle, which implies the above stance for both cases as trivial special instances, has been given in the literature.[11] Space does not permit a recapitulation of that defense here, but we can bring out one of the underlying intuitions by bringing to our attention to an analogous situation of a more familiar kind. Suppose that x% of the population has a certain genetic sequence S within the part of their DNA commonly designated as “junk DNA”. Suppose, further, that there are no manifestations of S (short of what would turn up in a gene assay) and that there are no known correlations between having S and any observable characteristic. Then, quite clearly, unless you have had your DNA sequenced, it is rational to assign a credence of x% to the hypothesis that you have S. And this is so quite irrespective of the fact that the people who have S have qualitatively different minds and experiences from the people who don’t have S. (They are different simply because all humans have different experiences from one another, not because of any known link between S and what kind of experiences one has.)

The same reasoning holds if S is not the property of having a certain genetic sequence but instead the property of being in a simulation, assuming only that we have no information that enables us to predict any differences between the experiences of simulated minds and those of the original biological minds.

It should be stressed that the bland indifference principle expressed by (#) prescribes indifference only between hypotheses about which observer you are, when you have no information about which of these observers you are. It does not in general prescribe indifference between hypotheses when you lack specific information about which of the hypotheses is true. In contrast to Laplacean and other more ambitious principles of indifference, it is therefore immune to Bertrand’s paradox and similar predicaments that tend to plague indifference principles of unrestricted scope.

Readers familiar with the Doomsday argument[12] may worry that the bland principle of indifference invoked here is the same assumption that is responsible for getting the Doomsday argument off the ground, and that the counterintuitiveness of some of the implications of the latter incriminates or casts doubt on the validity of the former. This is not so. The Doomsday argument rests on a much stronger and more controversial premiss, namely that one should reason as if one were a random sample from the set of all people who will ever have lived (past, present, and future) even though we know that we are living in the early twenty-first century rather than at some point in the distant past or the future. The bland indifference principle, by contrast, applies only to cases where we have no information about which group of people we belong to.

If betting odds provide some guidance to rational belief, it may also be worth to ponder that if everybody were to place a bet on whether they are in a simulation or not, then if people use the bland principle of indifference, and consequently place their money on being in a simulation if they know that that’s where almost all people are, then almost everyone will win their bets. If they bet on not being in a simulation, then almost everyone will lose. It seems better that the bland indifference principle be heeded.

Further, one can consider a sequence of possible situations in which an increasing fraction of all people live in simulations: 98%, 99%, 99.9%, 99.9999%, and so on. As one approaches the limiting case in which everybody is in a simulation (from which one can deductively infer that one is in a simulation oneself), it is plausible to require that the credence one assigns to being in a simulation gradually approach the limiting case of complete certainty in a matching manner.

 

VI. INTERPRETATION

The possibility represented by proposition (1) is fairly straightforward. If (1) is true, then humankind will almost certainly fail to reach a posthuman level; for virtually no species at our level of development become posthuman, and it is hard to see any justification for thinking that our own species will be especially privileged or protected from future disasters. Conditional on (1), therefore, we must give a high credence to DOOM, the hypothesis that humankind will go extinct before reaching a posthuman level:

 

 

 

One can imagine hypothetical situations were we have such evidence as would trump knowledge of . For example, if we discovered that we were about to be hit by a giant meteor, this might suggest that we had been exceptionally unlucky. We could then assign a credence to DOOM larger than our expectation of the fraction of human-level civilizations that fail to reach posthumanity. In the actual case, however, we seem to lack evidence for thinking that we are special in this regard, for better or worse.

Proposition (1) doesn’t by itself imply that we are likely to go extinct soon, only that we are unlikely to reach a posthuman stage. This possibility is compatible with us remaining at, or somewhat above, our current level of technological development for a long time before going extinct. Another way for (1) to be true is if it is likely that technological civilization will collapse. Primitive human societies might then remain on Earth indefinitely.

There are many ways in which humanity could become extinct before reaching posthumanity. Perhaps the most natural interpretation of (1) is that we are likely to go extinct as a result of the development of some powerful but dangerous technology.[13] One candidate is molecular nanotechnology, which in its mature stage would enable the construction of self-replicating nanobots capable of feeding on dirt and organic matter – a kind of mechanical bacteria. Such nanobots, designed for malicious ends, could cause the extinction of all life on our planet.[14]

The second alternative in the simulation argument’s conclusion is that the fraction of posthuman civilizations that are interested in running ancestor-simulation is negligibly small. In order for (2) to be true, there must be a strong convergence among the courses of advanced civilizations. If the number of ancestor-simulations created by the interested civilizations is extremely large, the rarity of such civilizations must be correspondingly extreme. Virtually no posthuman civilizations decide to use their resources to run large numbers of ancestor-simulations. Furthermore, virtually all posthuman civilizations lack individuals who have sufficient resources and interest to run ancestor-simulations; or else they have reliably enforced laws that prevent such individuals from acting on their desires.

What force could bring about such convergence? One can speculate that advanced civilizations all develop along a trajectory that leads to the recognition of an ethical prohibition against running ancestor-simulations because of the suffering that is inflicted on the inhabitants of the simulation. However, from our present point of view, it is not clear that creating a human race is immoral. On the contrary, we tend to view the existence of our race as constituting a great ethical value. Moreover, convergence on an ethical view of the immorality of running ancestor-simulations is not enough: it must be combined with convergence on a civilization-wide social structure that enables activities considered immoral to be effectively banned.

Another possible convergence point is that almost all individual posthumans in virtually all posthuman civilizations develop in a direction where they lose their desires to run ancestor-simulations. This would require significant changes to the motivations driving their human predecessors, for there are certainly many humans who would like to run ancestor-simulations if they could afford to do so. But perhaps many of our human desires will be regarded as silly by anyone who becomes a posthuman. Maybe the scientific value of ancestor-simulations to a posthuman civilization is negligible (which is not too implausible given its unfathomable intellectual superiority), and maybe posthumans regard recreational activities as merely a very inefficient way of getting pleasure – which can be obtained much more cheaply by direct stimulation of the brain’s reward centers. One conclusion that follows from (2) is that posthuman societies will be very different from human societies: they will not contain relatively wealthy independent agents who have the full gamut of human-like desires and are free to act on them.

The possibility expressed by alternative (3) is the conceptually most intriguing one. If we are living in a simulation, then the cosmos that we are observing is just a tiny piece of the totality of physical existence. The physics in the universe where the computer is situated that is running the simulation may or may not resemble the physics of the world that we observe. While the world we see is in some sense “real”, it is not located at the fundamental level of reality.

It may be possible for simulated civilizations to become posthuman. They may then run their own ancestor-simulations on powerful computers they build in their simulated universe. Such computers would be “virtual machines”, a familiar concept in computer science. (Java script web-applets, for instance, run on a virtual machine – a simulated computer – inside your desktop.) Virtual machines can be stacked: it’s possible to simulate a machine simulating another machine, and so on, in arbitrarily many steps of iteration. If we do go on to create our own ancestor-simulations, this would be strong evidence against (1) and (2), and we would therefore have to conclude that we live in a simulation. Moreover, we would have to suspect that the posthumans running our simulation are themselves simulated beings; and their creators, in turn, may also be simulated beings.

Reality may thus contain many levels. Even if it is necessary for the hierarchy to bottom out at some stage – the metaphysical status of this claim is somewhat obscure – there may be room for a large number of levels of reality, and the number could be increasing over time. (One consideration that counts against the multi-level hypothesis is that the computational cost for the basement-level simulators would be very great. Simulating even a single posthuman civilization might be prohibitively expensive. If so, then we should expect our simulation to be terminated when we are about to become posthuman.)

Although all the elements of such a system can be naturalistic, even physical, it is possible to draw some loose analogies with religious conceptions of the world. In some ways, the posthumans running a simulation are like gods in relation to the people inhabiting the simulation: the posthumans created the world we see; they are of superior intelligence; they are “omnipotent” in the sense that they can interfere in the workings of our world even in ways that violate its physical laws; and they are “omniscient” in the sense that they can monitor everything that happens. However, all the demigods except those at the fundamental level of reality are subject to sanctions by the more powerful gods living at lower levels.

Further rumination on these themes could climax in a naturalistic theogony that would study the structure of this hierarchy, and the constraints imposed on its inhabitants by the possibility that their actions on their own level may affect the treatment they receive from dwellers of deeper levels. For example, if nobody can be sure that they are at the basement-level, then everybody would have to consider the possibility that their actions will be rewarded or punished, based perhaps on moral criteria, by their simulators. An afterlife would be a real possibility. Because of this fundamental uncertainty, even the basement civilization may have a reason to behave ethically. The fact that it has such a reason for moral behavior would of course add to everybody else’s reason for behaving morally, and so on, in truly virtuous circle. One might get a kind of universal ethical imperative, which it would be in everybody’s self-interest to obey, as it were “from nowhere”.

In addition to ancestor-simulations, one may also consider the possibility of more selective simulations that include only a small group of humans or a single individual. The rest of humanity would then be zombies or “shadow-people” – humans simulated only at a level sufficient for the fully simulated people not to notice anything suspicious. It is not clear how much cheaper shadow-people would be to simulate than real people. It is not even obvious that it is possible for an entity to behave indistinguishably from a real human and yet lack conscious experience. Even if there are such selective simulations, you should not think that you are in one of them unless you think they are much more numerous than complete simulations. There would have to be about 100 billion times as many “me-simulations” (simulations of the life of only a single mind) as there are ancestor-simulations in order for most simulated persons to be in me-simulations.

There is also the possibility of simulators abridging certain parts of the mental lives of simulated beings and giving them false memories of the sort of experiences that they would typically have had during the omitted interval. If so, one can consider the following (farfetched) solution to the problem of evil: that there is no suffering in the world and all memories of suffering are illusions. Of course, this hypothesis can be seriously entertained only at those times when you are not currently suffering.

Supposing we live in a simulation, what are the implications for us humans? The foregoing remarks notwithstanding, the implications are not all that radical. Our best guide to how our posthuman creators have chosen to set up our world is the standard empirical study of the universe we see. The revisions to most parts of our belief networks would be rather slight and subtle – in proportion to our lack of confidence in our ability to understand the ways of posthumans. Properly understood, therefore, the truth of (3) should have no tendency to make us “go crazy” or to prevent us from going about our business and making plans and predictions for tomorrow. The chief empirical importance of (3) at the current time seems to lie in its role in the tripartite conclusion established above.[15] We may hope that (3) is true since that would decrease the probability of (1), although if computational constraints make it likely that simulators would terminate a simulation before it reaches a posthuman level, then out best hope would be that (2) is true.

If we learn more about posthuman motivations and resource constraints, maybe as a result of developing towards becoming posthumans ourselves, then the hypothesis that we are simulated will come to have a much richer set of empirical implications.

 

VII. CONCLUSION

A technologically mature “posthuman” civilization would have enormous computing power. Based on this empirical fact, the simulation argument shows that at least one of the following propositions is true: (1) The fraction of human-level civilizations that reach a posthuman stage is very close to zero; (2) The fraction of posthuman civilizations that are interested in running ancestor-simulations is very close to zero; (3) The fraction of all people with our kind of experiences that are living in a simulation is very close to one.

If (1) is true, then we will almost certainly go extinct before reaching posthumanity. If (2) is true, then there must be a strong convergence among the courses of advanced civilizations so that virtually none contains any relatively wealthy individuals who desire to run ancestor-simulations and are free to do so. If (3) is true, then we almost certainly live in a simulation. In the dark forest of our current ignorance, it seems sensible to apportion one’s credence roughly evenly between (1), (2), and (3).

Unless we are now living in a simulation, our descendants will almost certainly never run an ancestor-simulation.

 

 

Acknowledgements

I’m grateful to many people for comments, and especially to Amara Angelica, Robert Bradbury, Milan Cirkovic, Robin Hanson, Hal Finney, Robert A. Freitas Jr., John Leslie, Mitch Porter, Keith DeRose, Mike Treder, Mark Walker, Eliezer Yudkowsky, and several anonymous referees.

 

[Nick Bostrom’s academic homepage: www.nickbostrom.com]
[More on the simulation argument: www.simulation-argument.com]


[1] See e.g. K. E. Drexler, Engines of Creation: The Coming Era of Nanotechnology, London, Forth Estate, 1985; N. Bostrom, “How Long Before Superintelligence?” International Journal of Futures Studies, vol. 2, (1998); R. Kurzweil, The Age of Spiritual Machines: When computers exceed human intelligence, New York, Viking Press, 1999; H. Moravec, Robot: Mere Machine to Transcendent Mind, Oxford University Press, 1999.

[2] Such as the Bremermann-Bekenstein bound and the black hole limit (H. J. Bremermann, “Minimum energy requirements of information transfer and computing.” International Journal of Theoretical Physics 21: 203-217 (1982); J. D. Bekenstein, “Entropy content and information flow in systems with limited energy.” Physical Review D 30: 1669-1679 (1984); A. Sandberg, “The Physics of Information Processing Superobjects: The Daily Life among the Jupiter Brains.” Journal of Evolution and Technology, vol. 5 (1999)).

[3] K. E. Drexler, Nanosystems: Molecular Machinery, Manufacturing, and Computation, New York, John Wiley & Sons, Inc., 1992.

[4] R. J. Bradbury, “Matrioshka Brains.” Working manuscript (2002), http://www.aeiveos.com/~bradbury/MatrioshkaBrains/MatrioshkaBrains.html.

[5] S. Lloyd, “Ultimate physical limits to computation.” Nature 406 (31 August): 1047-1054 (2000).

[6] H. Moravec, Mind Children, Harvard University Press (1989).

[7] Bostrom (1998), op. cit.

[8] See references in foregoing footnotes.

[9] As we build more and faster computers, the cost of simulating our machines might eventually come to dominate the cost of simulating nervous systems.

[10] 100 billion humans50 years/human30 million secs/year[1014, 1017] operations in each human brain per second  [1033, 1036] operations.

[11] In e.g. N. Bostrom, “The Doomsday argument, Adam & Eve, UN++, and Quantum Joe.” Synthese 127(3): 359-387 (2001); and most fully in my book Anthropic Bias: Observation Selection Effects in Science and Philosophy, Routledge, New York, 2002.

[12] See e.g. J. Leslie, “Is the End of the World Nigh? ” Philosophical Quarterly 40, 158: 65-72 (1990).

[13] See my paper “Existential Risks: Analyzing Human Extinction Scenarios and Related Hazards.” Journal of Evolution and Technology, vol. 9 (2001) for a survey and analysis of the present and anticipated future threats to human survival.

[14] See e.g. Drexler (1985) op cit., and R. A. Freitas Jr., “Some Limits to Global Ecophagy by Biovorous Nanoreplicators, with Public Policy Recommendations.” Zyvex preprint April (2000), http://www.foresight.org/NanoRev/Ecophagy.html.

[15] For some reflections by another author on the consequences of (3), which were sparked by a privately circulated earlier version of this paper, see R. Hanson, “How to Live in a Simulation.” Journal of Evolution and Technology, vol. 7 (2001).

FlashBack: Belgian SuperCop Exposes Elite Sex Orgies

FlashBack: Belgian SuperCop Exposes Elite Sex Orgies

Punch-drunk Belgium is reeling from a new shock after a senior police officer confirmed last week what has long been rumoured: that some of the country’s leaders indulge in sex parties, known ironically as “ballets roses”.

Amusing and appalling in turn, the testimony of Georges Marnette, a senior Brussels policemen, might appear to make a welcome change from the horrors of recent months. But this is not mere entertainment: the stories may provide an important insight into the mores of a ruling class that has outraged ordinary people.

At times, Belgium has been in the throes of a near-revolution, with hundreds of thousands on the streets demanding an end to the political patronage that, they believed, had helped – by omission if not commission – a paedophile ring to murder children and escape arrest. It has not been a time of many laughs for anyone.

All the same, it was with a mixture of knowing winks and barely suppressed laughter that a parliamentary commission investigating another of the country’s most mysterious scandals heard the evidence of M Marnette. Belgian newspapers usually refer to the portly M Marnette as “un superflic”, and mean it. In fact, his evidence was more reminiscent of Inspector Clouseau.

“Yes, we used to go the bars, the gay and lesbian clubs and the sex parties,” he said, his bushy moustaches bristling at the memory of his past achievements. Infiltrating such establishments was no easy matter; it was not a job to be done wearing “jeans and a leather jacket”.

As for M Marnette, he was clearly a master of disguise. “I wasn’t going to hang round wearing my holster while everyone else was either naked or in dressing-gowns. But if I was in a dressing gown, that didn’t mean that I was doing any sexual acrobatics myself.”

The vision of leading politicians, judges and policemen indulging in orgies may tickle the Belgian taste for the absurd. But the light relief provided by tales of lax morals in high places is wearing off. For the “ballet rose” is also the perfect metaphor for the corruption, freemasonry and the vulnerability to blackmail of the country’s political élite.

The public will be learning more about the “ballets roses”, and the identities of dignitaries who attended them, from the evidence of other policemen who “infiltrated” this exotic demi-monde. It is a world of outwardly respectable private clubs in discreet suburbs of Brussels, Antwerp and Liège, but where, on arrival, members remove not just their coats, but their tops, bottoms and underwear as well.

For the moment, it looks increasingly unlikely that the two inquiries obsessing Belgians will yield new insights into how those in power exploit their positions, let alone name the guilty men or bring improvements. But M Marnette’s testimony, and his naming in camera of two senior establishment figures who performed at the “ballets roses”, caused a minor sensation.

Georges Marnette

Many had dismissed the “ballets roses” as Belgium’s Loch Ness monster – much talked about, rarely seen and its existence never proved. But now it emerges that they were not the only exotic entertainment enjoyed by the ruling classes.

The “ballet rose” itself implies the presence of young, but not necessarily under-age, girls. To cater for other tastes, there are also “ballets bleus” (young men), “partouzes” (run-of-the-mill orgies) and even “ballets de confiture” (apparently extreme Right-wingers like to strip and smear themselves with jam).

The parliamentary inquiry truly gripping the nation is the one examining the case of Marc Dutroux, who has confessed to murdering four young girls, and the way it was handled by the authorities.

The second inquiry has caused less of a furore, but the crimes it is reviewing, dating back 10 years, were even bloodier and more traumatic than the paedophile murders. These were the spectacular series of hold-ups, known as the Brabant killings, that terrorised Belgium in the early 1980s and claimed the lives of 28 people. They remain unsolved.

The usual explanation is that the killings were an attempt by the far Right, in league with the security services, to destabilise the country. But the suspicion has long persisted that some of the victims were not gunned down at random, but targeted because of their links to “ballets roses”.

Hugo Coveliers, a Belgian senator, argues that the “ballets roses” are not independent of one another, but part of a system “which operates to this day and is used to blackmail the highly placed people who take part”.

To many who hoped that rage at last year’s paedophile scandal could be channelled into political reform, the “ballets roses” are at best a digression, at worst an attempt by the authorities to throw the two inquiries off the scent of the real villains. The very existence of the two commissions of inquiry has signalled a desire for change. The public may take further encouragement from the fact that, for the first time since the armed robberies began in 1982, police last month released identikit photos of possible suspects.

 

New Scientific Data Forces Government to Reverse Its Stance on Fluoride in the Water Supply

© Alliance for Natural Health
Why are some states simply ignoring the latest studies, and passing new laws that will hurt your teeth and harm your health?

Water fluoridation was introduced to the United States in the 1940s as a way to use waste product from the manufacture of aluminum, a waste product that was expensive to dispose of and which was harming cattle and farmland. Since then, the federal government has taken the stance that the fluoridation of drinking water, which conveniently disposed of the waste, is vitally important to help prevent tooth decay; the CDC called it one of the ten great public health achievements of the 20th century. But the the latest scientific studies have finally made the US Department of Health and Human Services (HHS) and the US Environmental Protection Agency (EPA) change their tune on how much fluoride is safe.

The data indicates that dental fluorosi – damage to the teeth from fluoride, ranging from lacy white markings or spots on the enamel to staining and pitting of the tooth surface – happens when fluoride levels are too high. Water is only one of several sources of fluoride. Other common sources include dental products such as toothpaste and mouth rinses, prescription fluoride supplements, fluoride applied by dental professionals, and exposure through our food, which is often sprayed with fluoride-based pesticides.

Today the fluoride in your water mostly comes from the phosphate fertilizer industry – but it’s still toxic waste, containing other byproducts such as arsenic, lead, cadmium, and mercury. And two studies show that fluoride increases the accumulation of lead in bone, teeth, and other calcium-rich tissues, transporting heavy metals into areas of your body they normally would not be able to go – like your brain.

Another study revealed that prolonged, high intake of fluoride can increase the risk of brittle bones, fractures, and crippling bone abnormalities. Longtime readers may recall our 2008 article on the effects of fluoride on teeth and bones (harming kidney patients worst of all); we also noted that fluoride is a known neurotoxin, and can have detrimental effects on the thyroid, which could affect intelligence.

Moreover, fluoride can combine with other chemicals in the water to make them even more harmful. For example, when chloramines combine with the fluoride in water, they work together to extract lead from old plumbing systems, which leads to the accumulation of lead in the water supply.

EPA and HHS now recommend the level of fluoride in drinking water to be set “at the lowest end of the current optimal range” – that is, no more than 0.7 milligrams of fluoride per liter of water instead of the current recommended range which goes as high as 1.2 milligrams.

Despite studies so compelling that the federal government has started back-pedaling, the states of New Jersey and Vermont are attempting to mandate the fluoridation of water supply. Unfortunately, the New Jersey bill is very close to being passed. By contrast, Illinois and New Hampshire have introduced bills to prohibit fluoride in drinking water.

In New Jersey, both S959 in the Senate and A1811 in the Assembly are on red alert – they have been reported out of committee and are already on the floor, so they can be voted upon at any time. These bills mandate the fluoridation of water. At minimum, this is a freedom of choice issue – citizens should be able to choose whether they want to ingest fluoride or not. Write your legislators and ask them to oppose these bills – take action now!

In Vermont, H615 (currently in the Health Care Committee) contains many provisions to do with oral care – so we are specifically opposing section 108a, which mandates fluoridation of water. It requires that any municipality, government agency, or other entity that owns or controls a water system shall maintain fluoride in the water supply. Write your representative and request an amendment to strike out that part of the bill – take action now!

In New Hampshire: HB1529 would amend current law to say, “No fluoride, nor any chemical containing fluoride, shall be introduced into the public water supply,” as well as other specific provisions against the the use of herbicides within ten miles upgradient (that is, uphill) from a water intake of a domestic water supply. Write your representative and express your strong support for this bill – take action now!

In Illinois: HB5383 would do one thing: repeal the current fluoridation mandate. The bill is now in the Environmental Health Committee. Write your representative and express your strong support for this bill – take action now!

The Dark Side of Facebook

The Dark Side of Facebook

For most of us, our experience on Facebook is a benign – even banal – one. A status update about a colleague’s commute. A “friend” request from someone we haven’t seen for years (and hoped to avoid for several more). A picture of another friend’s baby, barely distinguishable from the dozen posted the day before.

Some four billion pieces of content are shared every day by 845 million users. And while most are harmless, it has recently come to light that the site is brimming with paedophilia, pornography, racism and violence – all moderated by outsourced, poorly vetted workers in third world countries paid just $1 an hour.

In addition to the questionable morality of a company that is about to create 1,000 millionaires when it floats paying such paltry sums, there are significant privacy concerns for the rest of us. Although this invisible army of moderators receive basic training, they work from home, do not appear to undergo criminal checks, and have worrying access to users’ personal details. In a week in which there has been an outcry over Google’s privacy policies, can we expect a wider backlash over the extent to which we trust companies with our intimate information?

Last month, 21-year-old Amine Derkaoui gave an interview to Gawker, an American media outlet. Derkaoui had spent three weeks working in Morocco for oDesk, one of the outsourcing companies used by Facebook. His job, for which he claimed he was paid around $1 an hour, involved moderating photos and posts flagged as unsuitable by other users.

“It must be the worst salary paid by Facebook,” he told The Daily Telegraph this week. “And the job itself was very upsetting – no one likes to see a human cut into pieces every day.”

Derkaoui is not exaggerating. An articulate man, he described images of animal abuse, butchered bodies and videos of fights. Other moderators, mainly young, well-educated people working in Asia, Africa and Central America, have similar stories. “Paedophilia, necrophilia, beheadings, suicides, etc,” said one. “I left [because] I value my sanity.” Another compared it to working in a sewer. “All the —- of the world flows towards you and you have to clean it up,” he said.

Who, one wonders, apart from the desperate, the unstable and the unsavoury, would be attracted to doing such an awful job in the first place?

Of course, not all of the unsuitable material on the site is so graphic. Facebook operates a fascinatingly strict set of guidelines determining what should be deleted. Pictures of naked private parts, drugs (apart from marijuana) and sexual activity (apart from foreplay) are all banned. Male nipples are OK, but naked breastfeeding is not. Photographs of bodily fluids (except semen) are allowed, but not if a human being is also shown. Photoshopped images are fine, but not if they show someone in a negative light.

Once something is reported by a user, the moderator sitting at his computer in Morocco or Mexico has three options: delete it; ignore it; or escalate it, which refers it back to a Facebook employee in California (who will, if necessary, report it to the authorities). Moderators are told always to escalate specific threats – “I’m going to stab Lisa H at the frat party” is given as the charming example – but not generic, unlikely ones, such as “I’m going to blow up the planet on New Year’s Eve.”

It is, of course, to Facebook’s credit that they are attempting to balance their mission “to make the world more open and connected” with a willingness to remove traces of the darker side of human nature. The company founded by Mark Zuckerberg in his Harvard bedroom is richer and more populated than many countries. These moderators are their police.

Neither is Facebook alone in outsourcing unpleasant work. Adam Levin, the US-based chief executive of Criterion Capital Partners and the owner of British social network Bebo, says that the process is “rampant” across Silicon Valley.

“We do it at Bebo,” he says. “Facebook has so much content flowing into its system every day that it needs hundreds of people moderating all the images and posts which are flagged. That type of workforce is best outsourced for speed, scale and cost.”

A spokesman for Twitter said that they have an internal moderation team, but refused to answer a question about outsourcing. Similarly, a Google spokesperson would not say how Google+, the search giant’s new social network, will be moderated. Neither Facebook nor oDesk were willing to comment on anything to do with outsourcing or moderation.

Levin, however, estimates that Facebook indirectly employs between 800 to 1,000 moderators via oDesk and others – nearly a third of its more handsomely remunerated full-time staff. Graham Cluley, of the internet security firm Sophos, calls Silicon Valley’s outsourcing culture its “poorly kept dirty secret”.

The biggest worry for the rest of us, however, is that the moderation process isn’t nearly secretive enough. According to Derkaoui, there are no security measures on a moderator’s computer to stop them uploading obscene material themselves. Despite coming into daily contact with such material, he was never subjected to a criminal record check. Where, then, is the oversight body for these underpaid global police? Quis custodiet ipsos custodes?

Facebook itself is guarding them, according to a previous statement to which the Telegraph was referred. “These contractors are subject to rigorous quality controls and we have implemented several layers of safeguards to protect the data of those using our service,” it read. “No user information beyond the content in question and the source of the report is shared. All decisions made by contractors are subject to extensive audits.”

And yet in the images due for moderation seen by the Telegraph, the name of anyone “tagged” in an offending post – as well as the user who uploaded it – could be clearly discerned. A Facebook spokesman said that these names are shared with the moderators to put the content in context – a context sufficient for Derkaoui to claim that he had as much information as “looking at a friend’s Facebook page”. He admits to having subsequently looked up more information online about the people he had been moderating. Cluley is worried that Facebook users could be blackmailed by disgruntled moderators – or even see pictures originally intended for a small circle of friends pasted all over the web.

Shamoon Siddiqui, chief executive of Develop.io, an American app-building firm that employs people in the developing world for a more generous $7 to $10 an hour, agrees that better security measures are needed. “It isn’t wrong for Facebook to have an Indian office,” he says. “But it is wrong for it to use an arbitrary marketplace with random people it doesn’t know in that country. This will have to change.”

In Britain, for example, all web moderators have to undergo an enhanced CRB check. eModeration, whose clients range from HSBC to The X-Factor, pays £10 an hour and never lets its staff spend too long on the gritty stuff. They wouldn’t go near the Facebook account. The job, says Tamara Littleton, its chief executive, is too big, the moderating too reactive, and they couldn’t compete on cost with the likes of oDesk.

So, if no one can undercut the likes of oDesk, could they not be undermined instead? If Mr Zuckerberg will not dig deeper into his $17.5 billion pockets to pay the street-sweepers of Facebook properly, maybe he could be persuaded by a little moral outrage?

Levin disagrees. “Perhaps a minute percentage of users will stop using Facebook when they hear about this,” he says. “But the more digital our society becomes, the less people value their privacy.”

Perhaps. But maybe disgruntled commuters, old schoolfriends and new mothers will think twice before sharing intimate information with their “friends” – only to find that two minutes later it’s being viewed by an under-vetted, unfulfilled person on a dollar an hour in an internet café in Marrakech.

By , and Emma Barnett

8:54PM GMT 02 Mar 2012

SOURCE: http://www.telegraph.co.uk/technology/facebook/9118778/The-dark-side-of-Facebook.html

FLASHBACK: Testimony on CIA Heart Attack Gun

FLASHBACK: Testimony on CIA Heart Attack Gun

A CIA secret weapon used for assassination shoots a small poison dart to cause a heart attack, as explained in Congressional testimony in the short video below. By educating ourselves and others on vitally important matters like this, we can build a brighter future for us all.
The dart from this secret CIA weapon can penetrate clothing and leave nothing but a tiny red dot on the skin. On penetration of the deadly dart, the individual targeted for assassination may feel as if bitten by a mosquito, or they may not feel anything at all. The poisonous dart completely disintegrates upon entering the target.
The lethal poison then rapidly enters the bloodstream causing a heart attack. Once the damage is done, the poison denatures quickly, so that an autopsy is very unlikely to detect that the heart attack resulted from anything other than natural causes. Sounds like the perfect James Bond weapon, doesn’t it? Yet this is all verifiable in Congressional testimony.
The astonishing information about this secret weapon of the CIA comes from U.S. Senate testimony in 1975 on rogue activities of the CIA. This weapon is only one of many James Bond-like discoveries of the Church Committee hearings, officially known as the United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities.
Could this or a similar secret weapon have been used, for instance, in the recent death of 52-year-old Mark Pittman, a reporter who predicted the financial crisis and exposed Federal Reserve misdoings? Pittman, whose fight to open the Federal Reserve to more scrutiny led Bloomberg News to sue the central bank and win, died of a heart attack on Nov. 25th

 

Ithiel de Sola Pool Perfectly Predicted the Future of Copyright in 1984

Ithiel de Sola Pool Perfectly Predicted the Future of Copyright in 1984

 

On numerous occasions here at the TLF over the past eight years, I’ve noted the profound influence that the late Ithiel de Sola Pool had on my thinking about the interaction of technology, information, and public policy. In fact, when I needed to pick a thematic title for my weekly Forbes column, it only took me a second to think of the perfect one: “Technologies of Freedom.” I borrowed that from the title of Pool’s 1983 masterpiece, Technologies of Freedom: On Free Speech in an Electronic Age. As I noted in my short Amazon.com review, Pool’s technological tour de force is simply breathtaking in its polemical power and predictive capabilities. Reading this book three decades after it was published, one comes to believe that Pool must have possessed a crystal ball or had a Nostradamus-like ability to foresee the future.

I felt that same was this week when I was re-reading some chapters from his posthumous book, Technologies without Boundaries: On Telecommunications in a Global Age–a collection of his remaining essays nicely edited and tied together by Eli Noam after Pool’s death in 1984. Re-reading it again reminded me of Pool’s remarkable predictive powers. In particular, the closing chapter on “Technology and Culture” includes some of Pool’s thoughts on the future of copyright. As you read through that passage below, please try to remember he wrote these words back in the early 1980s, long before most people had even heard of the Internet and when home personal computing was only just beginning to take off. Yet, from what he already knew about networked computers and digital methods of transmitting information, Pool was able to paint a prescient portrait of the future copyright wars that we now find ourselves in the midst of. Here’s what he had to say almost 30 years ago about how things would play out:

Can a computer infringe copyright? The printed output of recorded copyright material is likely to be a statutory violation of the Copyright Act which vests the exclusive right “to print, reporting, publish, copy and vend the…work.”

In short, the process of computer communication entails processing of texts that are partly controlled by people and partly automatic. They are happening all through the system. Some of the text is never visible but is only stored electronically; some is flashed briefly on a terminal display; some is printed out in hard copy. What started as one text varies and changes by degrees to other things. The receivers may be individuals and clearly identified, or they may be passers­by with access but whose access is never recorded; the passer­by may only look, as a reader browsing through a book, or he may make an automatic copy; sometimes the program will record that, sometimes it will not.

To try to apply the concept of copyright to all these stages and actors would require a most elaborate set of regulations. It has none of the simplicity of checking what copies rolled off a printing press. Good intentions about what one would like can be defined. One would like to compensate an author if a computer terminal is used as a printing press to run off numerous copies of a valuable text. One would like not to impose any control as someone works at a terminal in the role of a reader and checks back and forth through various files. The boundary, however, is impossible to draw. In the new technology of interactive computing, the reader, the writer, the bookseller, and the printer have become one. In the old technology of printing one could have a right to free press for the reader and the writer but try to enforce copyright on the printer and the bookseller. That distinction will no longer work, any more than it would ever have worked in the past on conversation.

Those whose livelihood is at stake in copyright do not like that kind of comment. They contend that creative work must be compensated. Indeed it must. Publishers may point the finger in accusation and charge that one is taking bread out of the mouths of struggling writers. But the system must be practical to work. On highly charged subjects there is an impulse to insist that those who make a negative comment must have a panacea to offer instead. If one says prisons do not cure criminals, the rejoinder is apt to be, “Do you want to let them out to kill people?” One does not necessarily want that at all, but it may still be true the prisons do not cure criminals. Likewise, one can say that in an era of infinitely varied, automated text manipulation there is no reasonable way to count copies and charge royalties on them.

That is the situation now emerging. It may be very unfair to authors. It may have a profoundly negative effect on some aspects of culture, and in any case, whether positive or negative, it may change things considerably. If it becomes more difficult for authors and artists to be paid by a royalty scheme, more of them will seek salaried bases from which to work. Some may try to get paid by personal appearances or other auxiliaries to fame. Or the highly illustrated, well-bound book may acquire a special marketing significance if the mere words of the text are hard to protect. Or one may try to sell subscriptions to a continuing service, with the customer knowing that he will be a first recipient.

These are the kinds of considerations one must think about in speculating about the consequences for culture of a world where the royalty-carrying unit copy is no longer easy to protect in many of the domains where it has been dominant. While Congress tries to hold the fort, it is clear that with photocopiers and computers, copyright is an anachronism. Like many other unenforceable laws that we keep on the statute books from the past, this one may be with us for some time to come, but with less and less effect. (pp. 257-59)

Indeed, as I wrote in one of my recent Forbes column’s (The Twilight of Copyright?”), it appears that–whether some of us like it or not–”copyright is dying… [as it] is being undermined by the unrelenting realities of the information age: digitization, instantaneous copying, borderless transactions, user-generated content, and so on.” Of course, I’m basing that assertion on the facts on the ground around me circa 2012. By contrast, Ithiel de Sola Pool already had it figured out 30 years ago. Absolutely remarkable.

by on February 12, 2012

SOURCE: http://techliberation.com/2012/02/12/ithiel-de-sola-pool-perfectly-predicted-the-future-of-copyright-in-1984/

Space Station Passes Over Stormy Africa

Space Station Passes Over Stormy Africa

This video was taken by the crew of Expedition 30 on board the International Space Station. The sequence of shots was taken December 29, 2011 from 20:55:05 to 21:14:09 GMT, on a pass from over central Africa, near southeast Niger, to the South Indian Ocean, southeast of Madagascar. The complete pass is over southern Africa to the ocean, focusing on the lightning flashes from local storms and the Milky Way rising over the horizon.

The Milky Way can be spotted as a hazy band of white light at the beginning of the video. The pass continues southeast toward the Mozambique Channel and Madagascar. The Lovejoy Comet can be seen very faintly near the Milky Way. The pass ends as the sun is rising over the dark ocean.

Video courtesy of the Image Science & Analysis Laboratory, NASA Johnson Space Center

SECRECY: The Hidden Agenda

SECRECY: The Hidden Agenda

Secrets are More Often Conspiracies and Shame and Seldom are National Security

Let’s start this out with an attention grabber.  Out there, somewhere is a photograph of Osama bin Laden and George H. W. Bush, shaking hands in the White House.  It exists.  There is this and more, so much more, that would make America’s heads spin.

The actual trained journalists around me beat this into my head. OK, here it is.

Those who follow rumors, which means every single one of us, know that former President George H. W. Bush worked with the bin Ladens, a wealthy and respected Saudi family that invests in a group of military companies called The Carlyle Group, headed by many former world leaders.

When Osama bin Laden, the short haired young Saudi millionaire CIA agent visited Bush in the White House, he came there, not just as an important part of our intelligence infrastructure at the end of the Cold War, but as a good friend of George H. W. Bush, a man who was  practically an uncle to him.

“Hey Osama, I mean Tim”…”Get Over Here and Get in the Picture!”

Wait a minute, wouldn’t that make George “W” Bush Osama bin Laden’s brother?  Well, not a real brother, not like Jeb anyway. Bin Laden was taller and better looking and, as the CIA transcript below indicates, certainly better educated and more honest.  Be sure to read the only certified statement ever made by Osama bin Laden about 9/11 and compare it to what you are told he had said.

Then rememer the last 10 years how many times you have been told bin Laden claimed credit for 9/11.  Each of those video and audio recordings were presented to news agencies by proven agents of the Israeli government and have, after examination, all been shown to be counterfeit.

The news has refused to report either of these facts.

We might also add, Osama bin Laden, were he of “that” Bush generation, was a veteran, having risked his life defending the United States against Russia many times.

The Bush boys shunned wartime service as we well know, perhaps they saw brother “Tim” as doing their part for them. (Tim “bin Laden” Osman)

No wonder Bush thought the 9/11 attacks were “pilot error” and not “Brother Tim” gone bad.  The video below actually has President Bush citing 9/11 as “pilot error.”

The president’s immediate responses to the 9/11 attacks are among the most amazing pieces of inappropriate humor since Caligula nominated his horse to the Roman senate:
YouTube – Veterans Today –

Does this put the fact that the bin Laden family was evacuated from the United States, the safest place on Earth for them, on 9/12/2001 rather than have any of them interviewed by the FBI in perspective?

A plane load of Israelis left also, had to escape the United States, which had suddenly become terrifyingly dangerous to an entire planeload of trained Mossad agents, supposedly the among the most dangerous people on earth.

Was Bush their uncle too?  We wonder.

The cover story is that their son, Osama, went a bit off and began blowing things up.  We have secrets that disprove this as a wild conspiracy, or worse, “cover and deception.”

To the CIA and top US officials, Osama bin Laden was Tim Osman, his cover name. 

He held an equivalent US military rank, had broad security clearances through the American government and received a salary for decades. Someone has access to his history, to his files.  It gets worse, worse than I had known, worse than I had suspected.

Tim Osman in Military Uniform with Brzezinski

I had discussed bin Laden with General Hamid Gul, with Susan Lindauer and with his CIA handlers.

I had been asked, after the announcement of the bin Laden killing to reaffirm what General Gul, the foremost expert told me, what I heard from official sources that also briefed General Petraeus and Secretary Clinton (same briefing) to tell the truth.

Osama bin Laden, known by his friends as Tim Osman, spoke English, was always loyal to the US and was deeply trusted by the CIA despite their “bin Laden unit” and the endless hunts for him and a supposedly connected group, the 9/11 hijackers.

Let’s take a second look at the hijackers.  Those who knew that a group of Arabs were being trained in the US, some paid by FBI funds, entertained by GOP lobbyist Jack Abramoff  and said to be planning a new attack on the World Trade Center have suffered for that knowledge.

Well over a year ago, Fox News “outed” this operation, partially at least, with proof that the US government knew about 9/11 in advance.  Here is one of the broadcasts but is only part of the story:

YouTube – Veterans Today –

What we have since learned is that the evidence brought forward about the attacks was a deception plan for the real attack, which was staged by the US government along with help from Israel.  Passenger lists show no hijackers, phone bills show no calls from planes, no box cutters and many of those said to have died as suicide hijackers have tried to file suit against the US governent for defamation.

They are alive and more than willing to prove it.  The “hijackers” were clones.  My personal belief is that they were  on the plane to Tel Aviv on September 12, 2001.   Many FBI agents believed the same.  All have been silenced.

If Jews had to be taken out of America, why leave 14 million behind?  Who was on the plane, why?  There was only one purpose for the flight, to avoid the FBI.  There was only one purpose for that.  The “hijackers” were on the plane along with demolition teams, this is what FBI officials said they beleive.  There are no films, no tickets, there were no passport checks and the flight left on the personal authority of President Bush.  Where they not terrorists, there was no other possible reason for the flight.

If you can think of one, any reason, let me know.  If you have access to a single airport employee who saw one person board the plane, a video, a passenger list anything, ten years later, please come forward.  Secrecy has one purpose, to cover crimes committed by governments.  If you wanted a real secret, call Tel Aviv or China, they have had those from day one, as anyone knows.

Here is General Hamid Gul, America’s top intelligence resource in Central Asia at the time, talking about this:
YouTube – Veterans Today –

I have met other CIA and FBI employees including one former member of congress who knew also.  Two of the CIA employees were locked in psychiatric facilities to keep them from reporting “officially” to the president, both charged with crimes and one jailed.

Sibel Edmonds

The FBI employee I have spoken with is Sibel Edmonds.  She was officially silenced by the US government for 6 years, court order under threat of imprisonment.

It goes further.  One of the companies paying the hijackers, a company known to be CIA related, part of a major insurance conglomerate on the “bail out” list was run by one of my friends.

If you are thinking AIG/Kroll, you are getting warm.

He had been the head of a famous foreign police intelligence service.  Sherlock Holmes fans will get the idea.

His brother was CFO of this company at the center of “black ops,” much more secret and high level than Blackwater ever was.  His brother was murdered.

Then there was FBI agent John O’Neill:
YouTube – Veterans Today –

He died on 9/11.  He knew, and he was silenced.  How many were silenced?

Osama bin Laden reported that 9/11 was an inside job before his death, confirmed through the highest sources, December 13, 2001.  This is the official CIA transcript of that report:

CENTRAL INTELLIGENCE AGENCY FOREIGN BROADCASTING INTERNATIONAL SERVICE:

FOR OFFICIAL USE ONLY

Website of Doha Al-Jazirah Satellite Channel Television in Arabic  [FBIS Report] Website of Doha Al-Jazirah Satellite Channel Television in Arabic,independent television station financed by the Qatari Government, which can be accessedat URL: http://www.aljazeera.net, carries at 2011 GMT on 24 September the text of the following letter by Usama Bin Ladin “to the Pakistani people.”

  • “We hope that these brothers would be the first martyrs in Islam’s battle in this age against the new Jewish crusade that is being led by the biggest crusader, Bush, under the banner of the cross. This battle is one of Islam’s immortal battles.”
  • “We beseech God to grant him victory against the forces of infidelity and arrogance, and to crush the new crusader-Jewish campaign on the land of Pakistan and Afghanistan.”
  • “I have already said that I am not involved in the 11 September attacks in the United States.”
  • “Neither I had any knowledge of these attacks nor I consider the killing of innocent women, children, and other humans as an appreciable act. . Islam strictly forbids causing harm to innocent women, children, and other people. Such a practice is forbidden ever in the course of a battle.”
  • “All that is going on in Palestine for the last 11 months is sufficient to call the wrath of God upon the United States and Israel.”
  • “Whoever committed the act of 11 September are not the friends of the American people. I have already said that we are against the American system, not against its people, whereas in these attacks, the common American people have been killed. According to my information, the death toll is much higher than what the US Government has stated.
  • “The United States should try to trace the perpetrators of these attacks within itself; the people who are a part of the US system, but are dissenting against it. Or those who are working for some other system; persons who want to make the present century as a century of conflict between Islam and Christianity so that their own civilization, nation, country, or ideology could survive.”
  • “They can be any one, from Russia to Israel and from India to Serbia.”
  • “Then you cannot forget the American Jews, who are annoyed with President Bush ever since the elections in Florida and want to avenge him.”
  • “Then there are intelligence agencies in the US, which require billions of dollars worth of funds from the Congress and the government every year. This [funding issue] was not a big problem till the existence of the former Soviet Union but after that the budget of these (FOR OFFICIAL USE ONLY 180)  agencies has been in danger. They needed an enemy. So, they first started propaganda against Usama and Taliban and then this incident happened.”
  • “Drug smugglers from all over the world are in contact with the US secret agencies. These agencies do not want to eradicate narcotics cultivation and trafficking because their importance will be diminished. The people in the US Drug Enforcement Department are encouraging drug trade so that they could show performance and get millions of dollars worth of budget. General Noriega was made a drug baron by the CIA and, in need, he was made a scapegoat.”
  • “President Bush or any other US President, they cannot bring Israel to justice for its human rights abuses or to hold it accountable for such crimes. What is this? Is it not that there exists a government within the government in the United Sates? That secret government must be asked as to who made the attacks.”
  • “Supporting the US act is the need of some Muslim countries and the compulsion of others. However, they should think as to what will remain of their religious and moral position if they support the attack of the Christians and the Jews on a Muslim country like Afghanistan.”
  • “I have already said that we are not hostile to the United States. We are against the system, which makes other nations slaves of the United States, or forces them to mortgage their political and economic freedom.”
  • “This system is totally in control of the American Jews, whose first priority is Israel, not the United States. It is simply that the American people are themselves the slaves of the Jews and are forced to live according to the principles and laws laid by them. So, the punishment should reach Israel.”
  • ”The Western media is unleashing such a baseless propaganda, which make us surprise but it reflects on what is in their hearts and gradually they themselves become captive of this propaganda. They become afraid of it and begin to cause harm to themselves.”
  • “Terror is the most dreaded weapon in modern age and the Western media is mercilessly using it against its own people. It can add fear and helplessness in the psyche of the people of Europe and the United States. It means that what the enemies of the United States cannot do, its media is doing that. You can understand as to what will be the performance of the nation in a war, which suffers from fear and helplessness.”

FOR OFFICIAL USE ONLY     END OF OFFICIAL TRANSCRIPT

This transcript makes every word said about bin Laden a lie, every news report, every statement by our presidents and congress, if they lie about this, what else do they lie about?  It gets worse, much worse.

BIN LADEN USA

CIA files that dozens of members of congress have access to and dozens of journalists have seen introduce these facts:

  • Osama bin Laden had a cover name, Tim Osmon
  • Osama bin Laden was brought to the US through the airport in Ontario, California and settled in the San Diego area for a number of years.
  • He was paid by FBI funds and maintained contact with a number of high ranking individuals that I can name, but the last person doing something similar, is in jail.   The names include CIA, US Army, FBI and Department of the Treasury.
  • Tim Osmon, AKA Osama bin Laden visited the White House on at least one occasion.  Staffers there report the visit and witnessed Tim Osmon, yes, we are talking about Osama bin Laden meeting with George Herbert Walker Bush in the White House.
  • This is a fully confirmed report.

While bin Laden is accused of 9/11, others working in the White House tell us that Richard Clarke, managed secret projects for the Bush administration and Pentagon prior to 9/11 that puts his picture on the “wanted list” where bin Laden never belonged.

OTHER THINGS

The president mentioned during his State of the Union address that congress should pass laws outlawing “insider trading.”  If any other American were to do it, they would go to jail.  Hundreds having committed crimes that members of congress commit every day are in federal prison.

On national television, the President of the United States announced that many members of congress are criminals and asked that they rescind the laws they passed that allow them to commit criminal acts and avoid prosecution.

Insider trading would cause members of congress to act against the interests of the American people and for corporations.  It would also turn members of congress into, not just millionaires, but full-fledged members of criminal organizations.
YouTube – Veterans Today –

If you just watched the video, you saw the president tell congress to stop being criminals.  They applauded as though they wanted to stop stealing.  I nearly fell off my chair.

First of all, I thank any person in Washington who tells the truth, which Obama did. But at the end of the broadcast, using laws on the books, 80% of the people sitting behind the desks, in the good seats, including members of the US Supreme Court, should have been arrested and jailed.

Congress does not have the right to pass laws that legalize criminal acts on their own part.

They did it !!

You heard about it.  This isn’t even close to the beginning and there are still people who believe that airplanes knocked down the World Trade Center or who don’t know the movie, “Flight 93″ was, every single word of it, a total fiction.

Top US officials have actually come to me asking where I think the plane went and what happened to the passengers.  I told them.  It was a guess.  They wanted my guess.  You don’t get that guess today.

Here is another way of looking at it.  Only the President of the United States has authority to pardon or commute sentences for those convicted of or seeking immunity from federal prosecution.

In passing legislation that abrogates that right, legalizing violations of federal law by members of the legislative branch, the number of unconstitutional acts involved is almost countless.

Not only does this overrule separation of powers as outlined in the constitution, it is, in itself,  a usurpation, it essentially turns any authority empowered with the protection of the constitution, with or without writ of mandamus, that fails to act, into a party to criminal activity.

Congress has, in protecting itself from both civil and criminal remedies other than its of “witch hunts” against carefully chosen scapegoats, put itself above the law.  There is one purpose for that.  Members of congress continually commit serious felonies.  This means we are voting for criminals.

Does this make sense now?

DRUGS, A CONGRESSIONAL FRANCHISE

Actually, it goes further than congress.  One presidential candidate, a very wealthy one, uses his “offshore accounts” to launder drug money.  The only reason for the offshore accounts is to take drug profits, by truck, into Mexico, paying off
customs officials on both sides of the border and moving the money into secret corporate accounts in the Cayman Islands.

“Ah…I think we need a faster process.”

Not one scrap of information has been submitted on these accounts, where the money came from or how much is there.  It could be $75 billion or more.

There isn’t one scrap of evidence it was “earned,” in fact, were it earned, it couldn’t be in Cayman accounts. There would be a trail of taxes and clear evidence of investments or business enterprises which simply don’t exist.

Several years ago, Colonel Eugene Khrushchev, former First Secretary representing both the Soviet Union and Russian Republic in Kabul came to me with a story.

He said that Richard Hollbrooke, the top US official in Afghanistan was, in fact, managing the world’s largest drug empire.  Hollbrooke is dead now but the drugs continue to flow, $80 billion per year.

Others worked to find how Afghanistan went from a few hundred pounds of opium paste per year to tons of heroin flown around the world by private airlines contracted to the CIA.

Then we found irrigation projects, paid for at Hollbrooke’s request, costing millions, that watered opium poppies.

Then we found agricultural programs under USAID that moved opium production to areas more suited for that plant, upping production.  We even found the US aiding Afghanistan in buying shiploads of fertilizer to increase opium production.

Afghan Drugs Has Been a Huge Source of Corruption – A Rare Seizure Here Because it was Taliban Dope

Then, an investigative reporter came to me with evidence that current and former members of congress, some involved in organizations supposedly supporting a peaceful settlement in Afghanistan were, in actuality, importing chemicals used to convert opium to much more valuable heroin.

These efforts received full US government subsidies and protection and, in addition, paid taxes to the Taliban.

This is going on today and you are paying for it. The heroin, part of it, is being sold to your children.

It is being sold to everyone’s children as America now supplies 97% of the world’s heroin and smaller percentages, in some cases not much smaller of other drugs, cocaine, ecstasy, “meth” and is involved now in cultivating new strains of marijuana.

That, in itself makes me suspicious as it may actually be useful.

JOHN KIRIAKOU, CIA AGENT UNDER ARREST

The US isn’t allowed to torture.  The CIA isn’t allowed to invent lies to push the US government into wars because members of that organization are spies for a foreign government or are receiving financial gain.

Many members of the CIA and other intelligence agencies are actually foreign nationals and active member of foreign intelligence agencies whose goals are inconsistent with the welfare of the United States.  Reporting this can and will get an honest CIA agent imprisoned.  Yes, dozens of CIA agents are also agents of foreign intelligence agencies, some of whom are known to have been directly involved in terrorists acts including but not limited to planting car bombs, killing American soldiers with IEDs and helping orchestrate financial crimes inside the US.

Many more foreign nationals inside the US carry falsified identification and pretend to be FBI or CIA or TSA or Homeland Security or even your local police.  They harass journalists or operate as assassination teams.  John Wheeler III was killed by one such team.  The American governent knows who they are but refuses to arrest them.
YouTube – Veterans Today –

When people talk about disbanding the CIA and starting all over again, they aren’t talking through their hats.  We wish the current director, former General Petraeus, an oddly able person, luck with dealing with this problem.

He will do nothing.  He can’t afford being accused of anti-Semitism, which is the direct threat he is currently under.  He is very aware of this.

Congress demands that he never “clean house,” no matter how many in the CIA are disloyal to the United States.

What am I saying?  Simply put, there are serious inconsistencies between many Israeli policies and the broader welfare of the United States, yet Israeli citizens are, to a large extent, in official policy making positions as paid employees of US intelligence and security organizations.

These are the individuals responsible for much of what you read above, very real proof of foreknowledge of 9/11 and to many, a trail of suspicion, backed by increasing hard evidence, now a deluge, that “foreknowledge” was actually “full complicity.”

How can Kiriakou be arrested for reporting criminal acts, unless you consider the withdrawal from the ICC (International Criminal Court) by the US as protection from crimes committed by Americans on the sovereign territory of signatory nations.

From a legal standpoint, the arrest of Kiriakou is complicity after the fact in war crimes and warrants can be issued by any signatory nation against any authority involved, which, in this case, is the Central Intelligence Agency and the United States Department of Justice, their directors, legal staff and participating enforcement officers. This includes judges.  They will be unable to travel outside the US.

THE UNFOLLOWED TRAIL

Yesterday, Dr. Jim Fetzer and I talked for hours.  We talked much about the Kennedy killings and how TV shows try to depict the impossible act of shooting President Kennedy with a broken rifle through the middle of a tree in full bloom was beyond any imagination.

Real life demonstrations all failed, the last by Jesse Ventura.

TV stars do it all the time, on NCIS, on Bones, shots those of us who could shoot skeet with a pistol could never make.

What does this prove?  It tells me that the hopeless coverup of the murder of John and Robert Kennedy, tied to Vietnam, tied to Israeli nuclear weapons and tied to the infamous Federal Reserve System, is still an industry with backers who some would believe were “Hollywood liberals.”

We know them as traitors who still need to cover up a 50 year old crime, media powers that fictionalize history as they fictionalize our news.

LIGHT AT THE END OF THE TUNNEL

Many of the things covered by President Obama, not enough things I admit, but many, would restore confidence and some legality to federal authority that is, in all probability, totally absent now.

Current monies held by the Federal Reserve Bank of Richmond, ordered released recently, are sufficient to impact the US economy, cut unemployment by 40%  and reduce our national debt.

These monies, according to documents filed in federal court this week, have, with the tacit approval of the Chairman of the Federal Reserve and Treasury Department, been illegally used as collateral by major banks.

In 2007, a federal suit was filed to recover $4.3 trillion USD stolen by Goldmann Sachs, Morgan Stanley and others..  A settlement was reached and the monies are to be returned, we are told, but no agency is enforcing the orders of the court or even the orders signed by the president of the United States.

Billions of this money now officially belongs to non-profit corporations earmarked for aid to homeless veterans and other projects.

Some of the language of that lawsuit will be included in the exhibits below.

Please note:  Goldman Sachs went to the Bush administration, straight to Paulson who had secretly lent them, tax free and interest free, $4.5 trillion dollars, and asked for a federal “bail out.”

He authorized it, just as he had authorized the illegal loan of money that was never his to lend in the first place.

Goldman Sachs never carried this on their books nor any of the profits, estimated at over $15 trillion dollars.  It was all laundered overseas while American taxpayers covered imaginary losses engineered by our own Secretary of Treasury.

You have heard stories that the Federal Reserve has lend out, illegally, trillions to their friends.  What they don’t say is that this money wasn’t theirs but stolen from accounts under their trust.  They is why they could do it, depending on court and enforcement agencies to look the other way under Ashcroft, Gonzoles and now even the Obama administration though our curren president has personally intervened.

His signed orders are now being ignored as though he were some bum off the streets.   What does this tell you?

Here is another even more interesting part:

So, we have, nearly 6 years ago, proof that China transferred $4.5 trillion dollars to the US, part of a fund to be used to finance public projects and reduce national debt and build a nationwide high speed rail system which would employ 400,000 Americans.

In the interim, who has been using this money?

Current court estimates indicate the value with interest at $7.2 trillion dollars, half the entire national debt.

The real question, of course, is how many trillions of dollars of profit was made by the banks who were allowed to borrow this money at no interest, enough to finance hundreds, perhaps thousands of trillions of dollars in transactions and untold profit.

These same banks claimed they were broke and had to be bailed out by the US government, begging trillions while hiding the fact they had been given the free use of trillions in illegal wealth from China, funding now proven to belong to Ameritrust and designated for rebuilding America.

THE STORY

As President Obama mentioned in the video above, the American people are increasingly separating themselves from their government.  Washington is looked on as a den of inequity, the center of all that is wrong in the world, a heart even darker than Wall Street.

” What Do You Mean How Much is Enough!!! ”

As for “insider trading,” few know what it means.  Members of congress, not only profit from the companies they award government contracts to but are regularly awarded “stock options” which profit them billions, by authorizing the traditional “$600 toilet seat” times a million.

They wasted the future of America for their own enrichment, sucking the lifeblood of America and hiding behind illegal laws, crooked judges and a Justice Department that is required, we are told, to look the other way because congress is above any law.

As for Ameritrust and China, we find that members of the Bush regime personally authorized the lending an no interest of trillions of dollars of money that wasn’t theirs.

How were they repaid?  What we find, of course, is that the famous names of that period are investors and board members everywhere we look.

It has been a decade of thievery hidden behind the War on Terror, all done while American soldiers not only died, but were sent on missions to kidnap, torture and murder.

When those same soldiers returned, unprepared for anything but suicide, homelessness or murdering their own families, something that has happened more times than anyone could imagine,  the trillions in profits made off their destruction are too busy filling foreign bank accounts, those “Mitt Romney” accounts, to do any good.

When $2 billion is given to American veterans, they find it illegally lent to Goldman Sachs by former Treasury Secretary Paulson.  How do we get it back?  I have some ideas.

Editing:  Jim W. DeanDear Readers, A personal note.

If you have not caught on yet, a war is about to start. This huge grand larceny is just a beginning string to pull. In countries all over the world similar financial scams have been going on that have stolen more money and caused more suffering than a huge war.

Those that did this gave some of it away to charity and are feted as great citizens. And buying protection from prosecution, so far, has been pocket change for them.

To carry this through we are going to be calling on you to help. The bad guys know that if this gets started it could be all down hill for them. Ditto for many in Congress who have earned themselves life sentences.

These funds could have had a tremendous impact on blunting the worst part of the recession, but some very well known American figures and families put their own greed before the unneeded suffering of the American people. They have had little to no fear and they have bet that money rules. So we are going to find out if they are right, and so will you.

It’s time to choose sides folks. American has been betrayed by supposedly her best and her finest. It’s time for us to show them what we think of their efforts, and set an example. Let us know if you would like to help, because it is fix bayonets time.

If they get away with this, there is nothing that they will not do to us.

 

SOURCE: http://www.veteranstoday.com/2012/01/26/tidbits-what-is-being-held-back-from-you/

 

Ancient City Older Than Egypt’s Pyramids Unearthed Off Georgia Coast

Ancient City Older Than Egypt’s Pyramids Unearthed Off Georgia Coast

Six hours southeast of Atlanta off the Georgia coast on Sapelo Island, archaeologists have unearthed the remains of an ancient walled city which predates the construction of Egypt’s pyramids. Known as the Sapelo Shell Ring Complex, this ancient city was constructed around 2300 B.C. and featured three neighborhoods each surrounded by circular walls twenty feet in height constructed from tons of seashells. Some of the earliest pottery in North America was also found buried in the remains of this lost city.

The site is quite an enigma because at the time of its construction the Native Americans living in the area were simple hunters and gatherers who had yet to invent agriculture. Many scholars believe agriculture is a prerequisite for civilization. Did these simple tribal people somehow make the leap from hunting-and-gathering to civilization in a single bound producing not only a walled city but also the new technology of pottery without the benefit of agriculture? Or did an already civilized people arrive on the coast of Georgia from elsewhere and, if so, where did they come from and why?

Just thirty years before the construction of the Sapelo Shell Rings researchers have noted that Bronze Age civilizations around the world show a pattern of collapse. According to the article “Sapelo Shell Rings (2170 BC)“:

In the Middle East, Akkadian Sumer collapsed at this time and the Dead Sea water levels reached their lowest point. In China, the Hongsan culture collapsed. Sediments from Greenland and Iceland show a cold peak around 2200 BC. The population of Finland decreased by a third between 2400 and 2000 BC. In Turkey’s Anatolia region, including the site of ancient Troy, over 350 sites show evidence of being burnt and deserted. Entire regions reverted to a nomadic way of life after thousands of years of settled agricultural life. In fact, most sites throughout the Old World which collapsed around 2200 BC showed unambiguous signs of natural calamities and/or rapid abandonment.

What happened around 2200 B.C. that could have caused such widespread devastation?

Meteor Storms & Cosmic Catastrophe?

Evidence is mounting that this devastation came from the sky. Astronomers have theorized that at this time Earth passed through a dense concentration of cosmic debris. Just picture the asteroid scene in Star Wars and you’ll get the idea. Yet researchers don’t think much of this debris actually impacted the ground. Instead they believe these meteors exploded in air bursts high above the ground, creating an ancient version of an atomic bomb blast.

Tunguska
The Tunguska meteor flattened 80 million trees over 2000 square miles as seen in this photo taken in 1927.

These air bursts would have first incinerated everything within tens if not hundreds of miles. Next they would have created hurricane force winds which would have obliterated any above-ground structures as well as forests.

Astronomers believe this catastrophe was similar to the Tunguska Event which flattened 80 million trees over a 2,000 square mile area of Russian Siberia in 1908. Russian scientists believe this event was caused by the explosion of a large meteor tens of meters across at an altitude of 3-6 miles. A similar event is thought to have caused the climate downturn in 3200 BC which flash froze the so-called Ice Man in the Swiss Alps.

Who Built the Sapelo Shell Rings?

At the time of European contact, two Native American tribes were known for constructing round, walled villages: the Timucua and Yuchi. Archaeologists believe some time in the past the Timucua migrated to Georgia and Florida from South America since their language was similar to that spoken by Indians in Venezuela. Did they flee their homeland after it was devastated by a meteor swarm that destroyed huge swaths of jungle? The Rio Cuarto impact craters in Argentina are thought by some geologists to date to this time period which supports the idea that South America was affected by the same event that struck the Old World.

The Yuchi also have a legend that they arrived in Georgia after “the old moon broke” and devastated their island homeland in the Bahamas. Could they have thought these meteors were pieces of the moon falling to Earth? Could impact tsunamis have devastated their island home in the Bahamas forcing them to flee to the mainland? Only further research will answer the questions.

Learn More

Learn more about the lastest research regarding the Sapelo Shell Ring Complex. Or visit the Sapelo Island Visitor’s Center at 1766 Landing Road, S.E., Darien, GA 31305. You can also find me on Facebooksubscribe to my newsletter, watch my DVD “Lost Worlds: Georgia” or purchase posters, mugs, t-shirts, mousepads and other gifts featuring the Sapelo Shell Rings artwork at my Sapelo Gift Shop.

SOURCE: http://lostworlds.org/ancient-walled-city-older-egypts-pyramids-unearthed-georgia-coast/

 

New Speech-Jamming Gun Hints at Dystopian Big Brother Future

New Speech-Jamming Gun Hints at Dystopian Big Brother Future

Japanese researchers have created a hand-held gun (pictured above) that can jam the words of speakers who are more than 30 meters (100ft) away. The gun has two purposes, according to the researchers: At its most basic, this gun could be used in libraries and other quiet spaces to stop people from speaking — but its second application is a lot more chilling.

The researchers were looking for a way to stop “louder, stronger” voices from saying more than their fair share in conversation. The paper reads: “We have to establish and obey rules for proper turn-taking when speaking. However, some people tend to lengthen their turns or deliberately interrupt other people when it is their turn in order to establish their presence rather than achieve more fruitful discussions. Furthermore, some people tend to jeer at speakers to invalidate their speech.” In other words, this speech-jamming gun was built to enforce “proper” conversations.

The gun works by listening in with a directional microphone, and then, after a short delay of around 0.2 seconds, playing it back with a directional speaker. This triggers an effect that psychologists call Delayed Auditory Feedback (DAF), which has long been known to interrupt your speech (you might’ve experienced the same effect if you’ve ever heard your own voice echoing through Skype or another voice comms program). According to the researchers, DAF doesn’t cause physical discomfort, but the fact that you’re unable to talk is obviously quite stressful.

Speech jammer, in a librarySuffice it to say, if you’re a firm believer in free speech, you should now be experiencing a deafening cacophony of alarm bells. Let me illustrate a few examples of how this speech-jamming gun could be used.

At a political rally, an audience member could completely lock down Santorum, Romney, Paul, or Obama from speaking. On the flip side, a totalitarian state could point the speech jammers at the audience to shut them up. Likewise, when a celebrity or public figure appears on a live TV show, his contract could read “the audience must be silenced with speech jammers.”

Then there’s Harrison Bergeron, one of my favorite short stories by Kurt Vonnegut. In the story’s dystopian universe, everyone wears “handicaps” to ensure perfect social equality. Strong people must lug around heavy weights, beautiful people must wear masks, and intelligent people must wear headphones that play a huge blast of sound every few seconds, interrupting your thoughts. The more intelligent you are, the more regular the blasts.

Back here in our universe, it’s not hard to imagine a future where we are outfitted with a variety of implanted electronics or full-blown bionic organs. Just last week we wrote about Google’s upcoming augmented-reality glasses, which will obviously have built-in earbuds. Late last year we covered bionic eyes that can communicate directly with the brain, and bionic ears and noses can’t be far off.

In short, imagine if a runaway mega-corporation or government gains control of these earbuds. Not only could the intelligence-destroying blasts from Harrison Bergeron come to pass, but with Delayed Auditory Feedback it would be possible to render the entire population mute. Well, actually, that’s a lie: Apparently DAF doesn’t work with utterances like “ahhh!” or “boooo!” or other non-wordy constructs. So, basically, we’d all be reduced to communicating with grunts and gestures.

SOURCE: http://www.extremetech.com/computing/120583-new-speech-jamming-gun-hints-at-dystopian-big-brother-future

 

US to Start ‘Trade Wars’ with Nations Opposed to Monsanto, GMO Crops

US to Start ‘Trade Wars’ with Nations Opposed to Monsanto, GMO Crops

The United States is threatening nations who oppose Monsanto’s genetically modified (GM) crops with military-style trade wars, according to information obtained and released by the organization WikiLeaks. Nations like France, which have moved to ban one of Monsanto’s GM corn varieties, were requested to be ‘penalized’ by the United States for opposing Monsanto and genetically modified foods. The information reveals just how deep Monsanto’s roots have penetrated key positions within the United States government, with the cables reporting that many U.S. diplomats work directly for Monsanto.

The WikiLeaks cable reveals that in late 2007, the United States ambassador to France and business partner to George W. Bush, Craig Stapleton, requested that the European Union along with particular nations that did not support GMO crops be penalized. Stapleton, who co-owned the Dallas/Fort Worth-based Texas Rangers baseball team with Bush in the 1990s, stated:

“Country team Paris recommends that we calibrate a target retaliation list that causes some pain across the EU since this is a collective responsibility, but that also focuses in part on the worst culprits. The list should be measured rather than vicious and must be sustainable over the long term, since we should not expect an early victory. Moving to retaliation will make clear that the current path has real costs to EU interests and could help strengthen European pro-biotech voices.”

The Leaked Political Agenda Behind Monsanto’s GMO Crops

The ambassador plainly calls for ‘target retaliation’ against nations who are against using Monsanto’s genetically modified corn, admittedly linked to organ damage and environmental devastation. Amazingly, this is not an isolated case. In similar newly released cables, United States diplomats are found to have pushed GMO crops as a strategic government and commercial imperative. Furthermore, the U.S. specifically targeted advisers to the pope, due to the fact that many Catholic bishops and figureheads have openly denounced GMO crops. In fact, the Vatican has openly declared Monsanto’s GMO crops as a ‘new form of slavery’.

“A Martino deputy told us recently that the cardinal had co-operated with embassy Vatican on biotech over the past two years in part to compensate for his vocal disapproval of the Iraq war and its aftermath – to keep relations with the USG [US government] smooth. According to our source, Martino no longer feels the need to take this approach,” says the cable.

Perhaps the most shocking piece of information exposed by the cables is the fact that these U.S. diplomats are actually working directly for biotech corporations like Monsanto. The cables also highlight the relationship between the U.S. and Spain in their conquest to persuade other nations to allow for the expansion of GMO crops. Not only did the Spanish government secretly correspond with the U.S. government on the subject, but the U.S. government actually knew beforehand how Spain would vote before the Spanish biotech commission reported their decision regarding GMO crops. The cable states:

“In response to recent urgent requests by [Spanish rural affairs ministry] state secretary Josep Puxeu and Monsanto, post requests renewed US government support of Spain’s science-based agricultural biotechnology position through high-level US government intervention.”

Monsanto has undoubtedly infiltrated the United States government in order to push their health-endangering agenda, and this has been known long before the release of these WikiLeaks cables. The U.S. is the only place where Monsanto’s synthetic hormone Posilac is still used in roughly 1/3 of all cows, with 27 nations banning the substance over legitimate health concerns. Despite Monsanto’s best attempts at incognito political corruption, nothing can stop the grassroots anti-Monsanto movement that is taking over cities and nations alike.

By Anthony Gucciardi

Contributing Writer for Wake Up World

About the author:

Anthony Gucciardi is an accomplished investigative journalist with a passion for natural health. Anthony’s articles have been featured on top alternative news websites such as Infowars, NaturalNews, Rense, and many others. Anthony is the co-founder of Natural Society, a website dedicated to sharing life-saving natural health techniques. Stay in touch with Natural Society via the following sites FacebookTwitterWeb

SOURCE: http://wakeup-world.com/2012/01/10/leaked-cable-us-to-start-%E2%80%98trade-wars%E2%80%99-with-nations-opposed-to-monsanto-gmo-crops/

Inside Job: Anonymous Leader Flipped Into FBI Informant?

Inside Job: Anonymous Leader Flipped Into FBI Informant?

As reported by Fox News yesterday, LulzSec “mastermind” and Anonymous hacker Sabu (real name: Hector Xavier Monsegur) was flipped by the FBI. Big surprise. Give the FBI a cookie.

There has been a widespread belief that Sabu was a rat for quite some time within the hacking community—an August 2011 chat between Sabu and Virus, for instance. Virus quite prophetically wrote in that infamous chat: “I’m absolutely positive, you already got raided, and are setting your friends up and when they’re done draining you for information and arrests they’ll sentence you and it’ll make nose.”

Beyond that, in a community wherein anyone can have a voice, it stands to reason that subversive government influences are present, whether passively watching or actively suggesting. Disinformation, false flag operations, and immunity: these are the human intelligence gathering techniques that spy agencies use to infiltrate movements.

With that in mind, one of two possibilities exist: The FBI has transformed Anonymous into one monolithic false-flag operation, or agents take down hackers the way they take down other targets—with one or multiple informants. Judging the FBI’s efforts purely on the frequency of Anonymous’ activities throughout the last year, it’s probably safe to say that the FBI hasn’t accomplished the former.

If this conclusion is wildly off-base, and the former is true, then one has to entertain the following possibilities: the Stratfor hack was socially engineered by the FBI; Stratfor allowed it; and the FBI manipulated Anonymous into a partnership with WikiLeaks in the publication of the Global Intelligence Files. Then, of course, one must wonder if WikiLeaks itself is not a false-flag operation. This scenario seems rather unlikely, especially in a world where those who attempt to regulate the Internet are always one step behind.

Where then does this leave Anonymous and its supporters?

Again, judging from Anonymous’ efforts in the last year, which included a hybridization with Occupy Wall Street, the Stratfor hack,  a partnership with WikiLeaks, an infiltration of the FBI and Scotland Yard’s conference call on Anonymous, Operation ANTI-ACTA (which struck the Polish government), and the CIAPC hack (following Elisa’s blockade of The Pirate Bay), amongst other projects; it would seem seem that Anonymous, as a global collective, has grown far beyond LulzSec and Sabu’s influence—that it has indeed shed Sabu’s influence.

Anonymous’ efforts are truly global now and ever-shifting. Unless people believe that stool pigeon Sabu’s opera singing is evidence of some international, multi-state false flag conspiracy to nab radical hackers, Anonymous likely won’t be slowing down anytime soon.

Here’s a suggestion to the FBI: Maybe you should spend a little less time pursuing Anonymous and put more effort into bringing to justice the white-collar criminals who crashed the economy in 2008, thereby pocketing billions and evaporating middle class savings, delaying retirement, and sending families into the grip of poverty; driving individuals to suicide, or illegal and prescription drug use to numb the pain; to theft, alcoholism, and welfare that the GOP hates so much; and saddling college graduates with hundreds of thousands of dollars in debt from which they won’t soon liberate themselves.

Yes, one can see how a DDoS attack launched against Sony Pictures would be a priority. The FBI does work for politicians after all, who are kept in office by the campaign donations of corporations.

Indeed, the FBI, like Sabu himself, knows the following maxim all too well: you’re always somebody’s bitch.

SOURCE: http://www.deathandtaxesmag.com/179764/anonymous-has-grown-beyond-lulzsec-and-sabu/

CRIMINAL COMPLAINT:

Monsegur-Hector-Xavier-Information

U.S. Special Ops ‘Spy’ Plane Crashes in Africa Killing Four

U.S. Special Ops ‘Spy’ Plane Crashes in Africa Killing Four

  • NAIROBI, Kenya (The Blaze/AP) — An American reconnaissance plane crashed 6 miles (10 kilometers) from the only U.S. base in Africa, killing four service members on board, after returning from a mission in support of the war in Afghanistan, the military said Monday.The statement said that the crash occurred at about 8 p.m. Saturday in Djibouti. U.S. personnel from Camp Lemonnier in the tiny Horn of Africa nation responded to the scene. Reports don’t specify what exactly took the plane down, but Specialist Ryan Whitney of the 1st Special Operations Wing said that initial indications are that the plane did not crash because of hostile fire.

    The plane was conducting an intelligence, surveillance and reconnaissance mission, he said. A statement from U.S. Africa Command called it a “routine” flight.

    Amy Oliver, public affairs director of the Air Force 1st Special Operations Wing, said the single-engine, fixed-wing U-28A was returning from a mission in support of the Afghanistan war, specifically Operation Enduring Freedom.

    The cause of the crash is still under investigation. Camp Lemonnier lies only miles from the border with Somalia. Wired, which called the aircraft a “spy” plane, reports that military activity in this area has increased recently:

    […] special operations forces have increased their activity in east Africa significantly in recent years, particularly in Somalia, where on January 24, they pulled off a dramatic hostage rescue deep inside the country. There is another American still held hostage in Somalia, the author Michael Scott Moore, but it was unclear whether the intelligence mission the four elite airmen completed had anything to do with Moore.

    The four killed in the crash included: Capt. Ryan P. Hall, 30, of Colorado Springs, Colorado, with the 319th Special Operations Squadron; Capt. Nicholas S. Whitlock, 29, of Newnan, Georgia, with the 34th Special Operations Squadron; 1st Lt. Justin J. Wilkens, 26, of Bend, Oregon, with the 34th Special Operations Squadron; and Senior Airman Julian S. Scholten, 26, of Upper Marlboro, Maryland, with the 25th Intelligence Squadron.

    Hall was a U-28 pilot with more than 1,300 combat flight hours. He was assigned to the 319th Special Operations Squadron at Hurlburt Field, Fla.

SOURCE: http://www.theblaze.com/stories/u-s-special-ops-spy-plane-crashes-in-africa-killing-four/

Judge Naomi Buchwald: Corrupted By Monsatno

Judge Naomi Buchwald: Corrupted By Monsatno

On February 24, Judge Naomi Buchwald handed down her ruling on a motion to dismiss in the case of Organic Seed Growers and Trade Assn et al v. Monsanto after hearing oral argument on January 31st in Federal District Court in Manhattan. Her ruling to dismiss the case brought against Monsanto on behalf of organic farmers, seed growers and agricultural organizations representing farmers and citizens was met with great disappointment by the plaintiffs.

Plaintiff lead attorney Daniel Ravicher said, “While I have great respect for Judge Buchwald, her decision to deny farmers the right to seek legal protection from one of the world’s foremost patent bullies is gravely disappointing. Her belief that farmers are acting unreasonable when they stop growing certain crops to avoid being sued by Monsanto for patent infringement should their crops become contaminated maligns the intelligence and integrity of those farmers. Her failure to address the purpose of the Declaratory Judgment Act and her characterization of binding Supreme Court precedent that supports the farmers’ standing as ‘wholly inapposite’ constitute legal error.  In sum, her opinion is flawed on both the facts and the law. Thankfully, the plaintiffs have the right to appeal to the Court of Appeals, which will review the matter without deference to her findings.”

Monsanto’s history of aggressive investigations and lawsuits brought against farmers in America have been a source of concern for organic and non-GMO farmers since Monsanto’s first lawsuit brought against a farmer in the mid-90′s. Since then, 144 farmers have had lawsuits brought against them by Monsanto for alleged violations of  their patented seed technology.  Monsanto has brought charges against more than 700 additional farmers who have settled out-of-court rather than face Monsanto’s belligerent litigious actions. Many of these farmers claim to not have had the intention to grow or save seeds that contain Monsanto’s patented genes. Seed drift and pollen drift from genetically engineered crops often contaminate neighboring fields. If Monsanto’s seed technology is found on a farmer’s land without contract they can be found liable for patent infringement.

“Family farmers need the protection of the court,” said Maine organic seed farmer Jim Gerritsen, President of lead plaintiff OSGATA.  ”We reject as naïve and undefendable the judge’s assertion that Monsanto’s vague public relations ‘commitment’ should be ‘a source of comfort’ to plaintiffs. The truth is we are under threat and we do not believe Monsanto. The truth is that American farmers and the American people do not believe Monsanto. Family farmers deserve our day in court and this flawed ruling will not deter us from continuing to seek justice.”

The plaintiffs brought this suit against Monsanto to seek judicial protection from such lawsuits and challenge the validity of Monsanto’s patents on seeds.

“As a citizen and property owner, I find the Order by the Federal Court to be obsequious to Monsanto,” said plaintiff organic farmer Bryce Stephens of Kansas.  ”The careless, inattentive, thoughtless and negligent advertisement Monsanto has published on their website to not exercise its patent rights for inadvertent trace contamination belies the fact that their policy is in reality a presumptuous admission of contamination by their vaunted product on my property, plants, seeds and animals.”

“Seeds are the memory of life,” said Isaura Anduluz of plaintiff Cuatro Puertas and the Arid Crop Seed Cache in New Mexico.  ”If planted and saved annually, cross pollination ensures the seeds continue to adapt. In the Southwest, selection over many, many generations has resulted in native drought tolerant corn.  Now that a patented drought tolerant corn has been released how do we protect our seeds from contamination and our right to farm?”

A copy of Judge Buchwalds ruling is located here.

REPORTS: CIA & DEA Training ZETAs and Fueling Cartel War

REPORTS: CIA & DEA Training ZETAs and Fueling Cartel War

The Central Intelligence Agency was intimately involved with the federal government’s infamous “Operation Fast and Furious” scheme to send American weapons to Mexican drug cartels while simultaneously working with other agencies allowing narcotics to be shipped over the border, according to a series of explosive reports.

Citing an unnamed CIA source, a Washington Times article theorizes that U.S. officials were actively aiding organizations such as the Sinaloa cartel with guns and immunity in an effort to stymie Los Zetas. That’s because, according to the piece, the powerful and brutal criminal Zetas syndicate has the potential to overthrow the government of Mexico — and might be planning to do so.

Apparently the secretive U.S. intelligence agency also played a key role in creating and using the American government’s gun-running program to arm certain criminal organizations. The scheme, which has already been implicated in countless deaths including the murders of several U.S. and Mexican law enforcement officers, saw thousands of high-powered American guns delivered to multiple cartels.

“The CIA’s motive is clear enough: The U.S. government is afraid the Los Zetas drug cartel will mount a successful coup d’etat against the government of [Mexican President] Felipe Calderón,” wrote Robert Farago and Ralph Dixon in the Times’ report, entitled “Was CIA behind Operation Fast and Furious?”

According to the article, which also cites former CIA officials and even ex-Drug Enforcement Administration boss Phil Jordan, Los Zetas has already prepared to disrupt and possibly even subvert Mexico’s 2012 national election. Ironically, many leaders of the criminal empire supposedly threatening the existence of the Mexican government were actually trained in the U.S. at the infamous military training center known as School of the Americas.

“Founded by ex-Mexican special forces, the Zetas already control huge swaths of Mexican territory,” Farago and Dixon noted. “They have the organization, arms and money needed to take over the entire country … There’s a very real chance the Zetas cartel could subvert the political process completely, as it has throughout the regions it controls.”

As The New American reported last week, federal court filings by a top Sinaloa Cartel operative shed even more insight on what may have been going on. And the documents would appear to lend some credence to the Times’ article.

The accused “logistical coordinator” for the Sinaloa organization, Jesus Vicente “El Vicentillo” Zambada-Niebla, claimed that he had an agreement with top American officials. In exchange for information on rival cartels, the deal supposedly gave him and his associates immunity to import multi-ton quantities of drugs across the border.

“Indeed, United States government agents aided the leaders of the Sinaloa Cartel,” the court filing states. Countless guns — via Operation Fast and Furious — also flowed to the cartel under the arrangement, according to Zambada-Niebla and U.S. officials.

But there might be even more to the story than this. Other former U.S. agents have claimed that Los Zetas is controlled and abetted by the American government, too. “There’s warehouses down here [in Texas] where they’re training more Zetas individuals that work for the cartels,” former DEA operative and whistleblower Celerino Castillo said during a radio interview with Alex Jones.

And a separate report late last month based on allegations by CIA and DEA insider Phil Jordan is even more explosive. He is claiming that the Obama administration was selling Los Zetas military-grade weaponry through a front company set up in Mexico.

“They’ve found anti-aircraft weapons and hand grenades from the Vietnam War era,” former CIA pilot Robert “Tosh” Plumlee, who supported Jordan’s claims, told the El Paso Times.

Even members of the Zetas have confirmed the allegations, as The New American reported last month. One of the cartel’s founders, Jesús “El Mamito” Aguilar, told Mexican police in a taped interrogation released to the public that his organization was getting weapons directly from the U.S. government.

New revelations also indicate that American taxpayers were even financing the cartels’ arms acquisitions through multiple federal agencies. And available evidence shows that approval for the programs reached into the highest levels of the Justice Department and other parts of the Obama administration.

The Bureau of Alcohol, Tobacco, Firearms and Explosives (still known as ATF) officially claimed that “Fast and Furious” was an effort to track guns and arrest higher-ups involved in Mexico’s criminal underworld. But after the scheme was publicly exposed, countless analysts and whistleblowers questioned that excuse.

Many speculated that it may have been a plot to demonize the Second Amendment and impose further restrictions on the rights of law-abiding Americans. Indeed, the process is already well underway — and gun violence in Mexico has been used for years as a primary justification.

But this new twist in the story adds another, even more troubling dimension to the whole plot. The Washington Times claimed that, in an effort to stop a Zetas takeover of Mexico, “Uncle Sam has gotten into bed with the rival Sinaloa cartel, which has close ties to the Mexican military.” According to the article, the Obama administration was essentially taking sides to help keep the Calderón regime in power at any cost.

But if the U.S. government is also coddling and helping the Zetas, that theory cannot be entirely accurate. As more information continues to surface, the questions are growing in number and importance.

In the past, the CIA has been implicated in numerous scandals involving drug and weapons trafficking. From Vietnam and Iran to Latin America, the agency has repeatedly been caught importing narcotics and exporting arms for shadowy and subversive purposes.

Whether segments of the CIA were definitively involved in Mexico’s mayhem remains to be seen. A former DEA agent cited by Narco News raised that possibility last month, but said if the agency was indeed behind the plot, evidence would almost certainly be sealed under the guise of “national security.”

For now, the New York Times reported on August 6 that the Obama administration was sending more CIA operatives to the troubled nation of Mexico. Congress is also currently investigating some elements of the administration’s ever-expanding gun-running scandal.

But as the Washington Times’ piece and various analysts have suggested, it might be time to appoint a special prosecutor and hold officials linked to the chaos and criminality responsible in a court of law. Otherwise, the whole truth may never be known.

 

SOURCE: http://www.thenewamerican.com/world-mainmenu-26/north-america-mainmenu-36/8599-reports-cia-working-with-mexican-drug-cartels

EXPERTS: “Feds Purposely Keeping U.S. Borders Wide Open”

EXPERTS: “Feds Purposely Keeping U.S. Borders Wide Open”

Under the guise of environmentalism, various federal agencies and departments are blocking Border Patrol agents’ access to critical areas while contributing to widespread lawlessness along the U.S. border, according to experts. Criminals, meanwhile, are taking full advantage of the rapidly deteriorating situation.

Despite claims by the Obama administration that the American border is “safer” or “more secure” than ever, sources with knowledge of the reality on the ground say that is simply not true. In fact, as Mexico spirals deeper into chaos, conditions along the border are only getting worse — rapidly.

“Far from contained and secure, the Arizona Border remains a terribly dangerous sieve from which not only illegals enter America, but drug cartels operating as organized crime syndicates and even as terrorist cells are coming to and from across America’s supposed secure border,” noted private-sector intelligence analyst and border expert Lyle Rapacki with Sentinel Intelligence Services in an e-mailed briefing obtained by The New American.

And according to experts, the federal government itself is a major contributor to the problem. Its public-lands policies, for example, have essentially created vast “no-go” zones where the Border Patrol is barred from meaningful operations while criminals and traffickers run wild.

“Federal agencies are using environmental laws to keep agents from having unfettered access to the border and to pursue criminals on federal public land once the criminals have crossed,” Vice Chairman Zack Taylor of the National Association of Former Border Patrol Officers (NAFBPO — symbolic badge shown above) told The New American. “The criminals have destroyed the federal public land and it makes no sense to keep Border Patrol off because it simply causes more damage.”

According to Taylor and other experts, the Department of Interior and the Department of Agriculture are the main culprits responsible for creating the dangerous situation. “It is a ploy of the open borders advocates to keep Border Patrol out and let the illegal aliens and drugs in,” he explained. “They are using the environmental protection laws to do that. That simple.”

And by restricting Border Patrol access to huge areas of public land — from Arizona and New Mexico to Montana and Idaho — the federal government is giving criminals the advantage. And they are using it to wreak havoc within America.

“If the agents cannot access the border area, they cannot patrol it,” Taylor noted. “The criminals then have an advantage and make good use of the advantage by smuggling drugs and aliens into the United States.”

Taylor said criminals occupy and monitor the vast off-limits areas to increase the chances of success in their smuggling operations. In some cases, traffickers’ networks of surveillance and communication can keep a constant view of corridors stretching from the Mexican border to Phoenix, he explained. And that makes bringing in drugs, illegal immigrants, and terrorists much simpler.

Of course, it is not just border states that are threatened. Hundreds of American cities now have active foreign-based criminal networks that operate with impunity. And very little is being done to stop it, experts say.

The press, meanwhile, has largely remained silent. “It is as if the administration has placed a gag order on them,” Taylor said. “They just won’t talk about it, much less report it.”

The state of Arizona has attempted to adopt some measures aimed at protecting citizens, but the Obama administration has responded with lawsuits and harassment. Lawmakers in the state, however, know that something must be done.

“Arizona is losing control of her sovereign land,” noted State Senator Sylvia Allen, chairman of the Arizona Senate Committee on Border Security. “Arizona is in a State of Emergency. If we want to protect our national and state sovereignty, we must secure our border and enforce our laws.”

Sen. Allen’s committee has heard testimony from citizens along the border area who reported home invasions, vandalism, theft, and a host of other criminal activities. Clearly, the state is facing a monumental crisis that needs to be addressed, she said. Yet, instead of helping, the federal government is making matters worse, according to a statement issued by Sen. Allen late last year. And the problems created by the executive branch are hardly isolated incidents.

“Why is the apparent official policy of the United States to ridicule and silence those who are trying to protect our state of Arizona? Why are the cartels protected?” she wondered. “Why do official U.S. government departments, sworn to protect American citizens, extend protection to gangs working with the drug cartels, and even to terrorists entering our nation from various border entry points?”

Sen. Allen and numerous other experts believe they know the answer — or at least part of it. The disastrous federal border policies, according to Allen, are connected to the emerging “North American Union” — a plan to essentially “merge” the United States with Mexico and Canada that is regularly and openly discussed by top officials including former Mexican President Vicente Fox, who told CNN that the merger is “inevitable.”

“There is a concerted, deliberate, and sophisticated program under way to erase our national boundaries and create a North American Union,” Sen. Allen explained. “The gift of sovereignty handed to us by our Forefathers would be extinguished, and we would become subjects, no longer free.”

Other critics of U.S. policies have noted the futility — insanity, perhaps — of fighting a multi-trillion-dollar terror war around the world and using the armed forces to secure land borders in Asia even as America’s own borders remain wide open for potential terrorists. Homeland Security, meanwhile, has been too busy hyping the threat of “right-wing extremism” to properly control the border. And the apparent lunacy does not end there.

The federal government is also shoveling billions of American tax dollars into the coffers of corrupt Latin American governments — purportedly to fight the “drug war” — even as narcotics flow virtually unhindered across wide swaths of the U.S. border. And if recent reports and statements by experts are to be believed, the problem goes even deeper than that.

The Obama administration is currently being investigated by Congress for trafficking thousands of high-powered weapons to Mexican drug cartels under Operation Fast and Furious. Some of those guns were later tied to the murder of Border Patrol agent Brian Terry.

Meanwhile, lawmakers are also probing the administration’s money laundering activities through the DEA after a front page story in the New York Times exposed the scheme. According to sources and reports, the federal government may even be directly involved in fomenting the chaos south of the border: More than a few drug kingpins and some American officials have even said the U.S. government was purposefully providing weapons and protection to the criminal empires.

Another controversial policy that experts say is related to the overall plan is the President’s effort to provide covert “amnesty” for millions of illegal immigrants without even obtaining approval from Congress. “We have been betrayed by our leaders in a way that I just did not think was possible,” NAFBPO [National Association of Former Border Patrol Officers] Chairman and former Assistant Chief Patrol Agent Kent Lundgren explained in an exclusive interview with the Liberty News Network.

Critics of the policies — including lawmakers nationwide, NAFBPO, and countless other concerned groups — believe it is past time to rein in the administration and put an end to the lawlessness. But as Mexico descends into a bloody civil war that is seeping across the border, the time for action may be running out.

Related articles:

Border Group: Obama Amnesty “Contempt for Law”

WikiLeaks Exposes North American Integration Plot

Escalating Chaos on Our Border

Obama Scales Back Border Patrol Enforcement

Govt Proposes Unmanned Border Crossing from Mexico

War on the Border Patrol

Feds Prosecuted U.S. Border Agent for Mexico

ATF Linked to Border Agent’s Murder

Holder Admits Lies in Fast and Furious, Refuses to Resign

Internationalists Renew Call for a North American Union

Trafficker: U.S. Feds Aided Mexican Drug Cartel

Mexican Drug Trafficker Says He Worked With Feds

Reports: CIA Working with Mexican Drug Cartels

War on Drugs Grows FAST Abroad

Congress Probes DEA Drug Money Laundering Scheme

 

SOURCE: http://www.thenewamerican.com/usnews/immigration/10924-feds-purposely-keeping-us-borders-wide-open-experts-say

FALSE FLAG: The FBI Yet Again, Thwarts its Own Terror Plot

FALSE FLAG: The FBI Yet Again, Thwarts its Own Terror Plot

The FBI has received substantial criticism over the past decade — much of it valid — but nobody can deny its record of excellence in thwarting its own Terrorist plots.  Time and again, the FBI concocts a Terrorist attack, infiltrates Muslim communities in order to find recruits, persuades them to perpetrate the attack, supplies them with the money, weapons and know-how they need to carry it out — only to heroically jump in at the last moment, arrest the would-be perpetrators whom the FBI converted, and save a grateful nation from the plot manufactured by the FBI.

Last year, the FBI subjected 19-year-old Somali-American Mohamed Osman Mohamud to months of encouragement, support and money and convinced him to detonate a bomb at a crowded Christmas event in Portland, Oregon, only to arrest him at the last moment and then issue a Press Release boasting of its success.  In late 2009, the FBI persuaded and enabled Hosam Maher Husein Smadi, a 19-year old Jordanian citizen, to place a fake bomb at a Dallas skyscraper and separately convinced Farooque Ahmed, a 34-year-old naturalized American citizen born in Pakistan, to bomb the Washington Metro.  And now, the FBI has yet again saved us all from its own Terrorist plot by arresting 26-year-old American citizen Rezwan Ferdaus after having spent months providing him with the plans and materials to attack the Pentagon, American troops in Iraq, and possibly the Capitol Building using “remote-controlled” model airplanes carrying explosives.

None of these cases entail the FBI’s learning of an actual plot and then infiltrating it to stop it.  They all involve the FBI’s purposely seeking out Muslims (typically young and impressionable ones) whom they think harbor animosity toward the U.S. and who therefore can be induced to launch an attack despite having never taken even a single step toward doing so before the FBI targeted them.  Each time the FBI announces it has disrupted its own plot, press coverage is predictably hysterical (new Homegrown Terrorist caught!), fear levels predictably rise, and new security measures are often implemented in response (the FBI’s Terror plot aimed at the D.C. Metro, for instance, led to the Metro Police announcing a new policy of random searches of passengers’ bags).   I have several observations and questions about these matters:

(1) The bulk of this latest FBI plot entailed attacks on military targets: the Pentagon, U.S. troops in Iraq, and possibly military bases.  The U.S. is — as it has continuously announced to the world — a Nation at War.  The Pentagon is the military headquarters for this war, and its troops abroad are the soldiers fighting it.  In what conceivable sense can attacks on those purely military and war targets be labeled “Terrorism” or even illegitimate?  The U.S. has continuously attacked exactly those kinds of targets in multiple nations around the world; it expressly tried to kill Saddam and Gadaffi in the wars against their countries (it even knowingly blew up an entire suburban apartment building to get Saddam, who wasn’t actually there).   What possible definition of “Terrorism” excludes those attacks by the U.S. while including this proposed one on the Pentagon and other military targets (or, for that matter, Nidal Hasan’s attack on Fort Hood where soldiers deploy to war zones)?

(2) With regard to the targeted building that is not purely a military target — the Capitol Building — is that a legitimate war target under the radically broad standards the U.S. and its allies have promulgated for itself?  The American “shock and awe” assault on Baghdad destroyed “several government buildings and palaces built by Saddam Hussein”; on just the third day of that war, “U.S. bombs turn[ed] key government buildings in Baghdad into rubble.”  In Libya, NATO repeatedly bombed non-military government buildings.  In Gaza, Israeli war planes targeted a police station filled with police recruits on the stated theory that a valid target “ranges from the strictly military institutions and includes the political institutions that provide the logistical funding and human resources” to Hamas.

Obviously, there is a wide range of views regarding the justifiability of each war, but isn’t the U.S. Congress — which funds, oversees, and regulates America’s wars — a legitimate war target under the (inadvisedly) broad definitions the U.S. and its allies have imposed when attacking others?  If the political leaders and even functionaries of other countries with which the U.S. is at war are legitimate targets, then doesn’t that necessarily mean that Pentagon officials and, arguably, those in the Congress are as well?

(3) The irony that this plot featured “remote-controlled aircraft filled with plastic explosives” is too glaring to merit comment; the only question worth asking is whether the U.S. Government can sue Ferdaus for infringing its drone patents.  Glaring though that irony is, there is no shortage of expressions of disgust today, pondering what kind of Terrorist monster does it take to want to attack buildings with remote-controlled mini-aircraft.

(4) Wouldn’t the FBI’s resources be better spent on detecting and breaking up actual Terrorist plots — if there are any — rather than manufacturing ones so that they can stop those?  Harboring hatred for the U.S. and wanting to harm it (or any country) is not actually a crime; at most, it’s a Thought Crime.  It doesn’t become a crime until steps are taken to attempt to transform that desire into reality.  There are millions and millions of people who at some point harbor a desire to impose violent harm on others who never do so: perhaps that’s true of a majority of human beings.  Many of them will never act in the absence of the type of highly sophisticated, expert push of which the FBI is uniquely capable.  Is manufacturing criminals — as opposed to finding and stopping actual criminals — really a prudent law enforcement activity?

(5) Does the FBI devote any comparable resources to infiltrating non-Muslim communities in order to persuade and induce those extremists to become Terrorists so that they can arrest them?  Are they out in the anti-abortion world, or the world of radical Christianity, or right-wing anti-government radicals, trying to recruit them into manufactured Terrorist plots?

(6) As usual, most media coverage of the FBI’s plots is as uncritical as it is sensationalistic.  The first paragraph of The New York Times article on this story described the plot as one “to blow up the Pentagon and the United States Capitol.”  But the FBI’s charging Affidavit (reproduced below) makes clear that Ferdaus’ plan was to send a single model airplane (at most 1/10 the size of an actual U.S. jet) to the Capitol and two of them to the Pentagon, each packed with “5 pounds” of explosives (para. 70); the Capitol was to be attacked at its dome for “psychological effect” (para 34).  The U.S. routinely drops 500-pound or 1,000-pound bombs from actual fighter jets; this plot — even if it were carried out by someone other than a hapless loner with no experience and it worked perfectly — could not remotely “blow up” the Pentagon or the Capitol.

(7) As is now found in almost every case of would-be Terrorist plots against the U.S. — especially “homegrown Terrorists” — the motive is unbridled fury over (and a desire to avenge) contintuous U.S violence against Muslim civilians.  Infused throughout the charging Affidavit here are such references to Ferdaus’ motives, including his happiness over the prospect of killing U.S. troops in Iraq; his proclamation that he’s “interested in traveling to Afghanistan” to aid insurgents; his statement that “he wanted to ‘decapitate’ the U.S. government’s ‘military center’ and to severely disrupt . . . the head and heart of the snake” (para 12) and to “essentially decapitate the entire empire” (para 34) (compare that language to how the U.S. described what it tried to do in Baghdad).  At least according to the FBI, this is how Feradus replied when expressly asked why he wanted to attack the U.S.:

Cause that would be a huge scare . . . the point is you want to scare them so they know not to mess with you . . . They have . . . . have killed from us, our innocents, our men, women and children, they are all enemies (para 19).

If the FBI’s allegations are accurate, then it’s clear Ferdaus has become hardened in his hatred; he talks about a willingness to kill American civilians because they have become part of the enemy, and claims that he fantasized about such attacks before the FBI informant spoke to him.

But whatever else is true,  it’s simply unrealistic in the extreme to expect to run around for a full decade screaming WE ARE AT WAR!! — and dropping bombs and attacking with drones and shooting up families in multiple Muslim countries (and occupying, interfering in and killing large numbers before that) – and not produce many Rezwan Ferdauses.  In fact, the only surprising thing is that these seem to be so few of them actually willing and able to attack back that — in order to justify this Endless War on civil liberties (and Terror)  — the FBI has to search for ones they can recruit, convince, and direct to carry out plots.

Complaint Affidavit

Close

Glenn Greenwald
Follow Glenn Greenwald on Twitter: @ggreenwaldMore Glenn Greenwald

SOURCE: http://www.salon.com/2011/09/29/fbi_terror/

Appeals Court: No Forced Decryption

Appeals Court: No Forced Decryption

Privilege Against Self-Incrimination Applies to Act of Decrypting Data

San Francisco – A federal appeals court has found a Florida man’s constitutional rights were violated when he was imprisoned for refusing to decrypt data on several devices. This is the first time an appellate court has ruled the 5th Amendment protects against forced decryption – a major victory for constitutional rights in the digital age.

In this case, titled United States v. Doe, FBI agents seized two laptops and five external hard drives from a man they were investigating but were unable to access encrypted data they believed was stored on the devices via an encryption program called TrueCrypt. When a grand jury ordered the man to produce the unencrypted contents of the drives, he invoked his Fifth Amendment privilege against self-incrimination and refused to do so. The court held him in contempt and sent him to jail.

The Electronic Frontier Foundation (EFF) filed an amicus brief under seal, arguing that the man had a valid Fifth Amendment privilege against self-incrimination, and that the government’s attempt to force him to decrypt the data was unconstitutional. The 11th U.S. Circuit Court of Appeals agreed, ruling that the act of decrypting data is testimonial and therefore protected by the Fifth Amendment. Furthermore, the government’s limited offer of immunity in this case was insufficient to protect his constitutional right, because it did not extend to the government’s use of the decrypted data as evidence against him in a prosecution.

“The government’s attempt to force this man to decrypt his data put him in the Catch-22 the 5th Amendment was designed to prevent – having to choose between self-incrimination or risking contempt of court,” said EFF Senior Staff Attorney Marcia Hofmann. “We’re pleased the appeals court recognized the important constitutional issues at stake here, and we hope this ruling will discourage the government from using abusive grand jury subpoenas to try to expose data people choose to protect with encryption. ”

A similar court battle is ongoing in Colorado, where a woman named Ramona Fricosu has been ordered by the court to decrypt the contents of a laptop seized in an investigation into fraudulent real estate transactions. EFF also filed a friend of the court brief in that case, arguing that Fricosu was being forced to become a witness against herself. An appeals court recently rejected her appeal, and she has been ordered to decrypt the information this month.

“As we move into an increasingly digital world, we’re seeing more and more questions about how our constitutional rights play out with regards to the technology we use every day,” said EFF Staff Attorney Hanni Fakhoury. “This is a case where the appeals court got it right – protecting the 5th Amendment privilege against self-incrimination.”

John Doe was represented by Chet Kaufman of the Federal Public Defender’s Office in Tallahassee.

For the full court ruling:
https://www.eff.org/document/opinion

Contacts:

Marcia Hofmann
Senior Staff Attorney
Electronic Frontier Foundation
[email protected]

Hanni Fakhoury
Staff Attorney
Electronic Frontier Foundation
[email protected]

USDA Gives Monsanto ‘Speed Approval’

USDA Gives Monsanto ‘Speed Approval’

If you thought Monsanto’s lack of testing on their current GMO crops was bad before, prepare to now be blown away by the latest statement by the USDA. Despite links to organ damage and mutated insects, the USDA says that it is changing the rules so that genetically modified seed companies like Monsanto will get ‘speedier regulatory reviews’. With the faster reviews, there will be even less time spent on evaluating the potential dangers. Why? Because Monsanto is losing sales with longer approval terms.

The changes are expected to take full effect in March when they’re published in the Federal Register. The USDA’s goal is to cut the approval time for GMO crops in half in order to speedily implement them into the global food supply. The current USDA process takes longer than they would like due to ‘public interest, legal challenges, and the challenges associated with the advent of national organic food standards‘ says USDA deputy administrator Michael Gregoire.

According to the United States Department of Agriculture, problems like public interest (activist groups attempting to bring the dangers of GMO crops to light), legal challenges (farmers suing Monsanto over genetic contamination), and national food standards are all getting in the way of their prime goal — to helpMonsanto unleash their latest untested GMO creation. In fact, the concern is that Monsanto may be losing cash flow as nations like Brazil speed genetically modified seeds through laughable approval processes.

Steve Censky, chief executive officer of the American Soybean Association, states it quite plainly. This is a move to help Monsanto and other biotechnology giants squash competition and make profits. After all, who cares about public health?

It is a concern from a competition standpoint,” Censky said in a telephone interview.

The same statements are re-iterated by analyst Jeff Windau in an interview with Bloomberg:

“If you can reduce the approval time, you get sales that much faster,” said Windau

If you can reduce the approval time, as in the time it takes to determine if these food products are safe, then you can get sales much faster. Is the USDA working for the United States consumer, or is it working for Monsanto?

SOURCE: http://www.nationofchange.org/usda-give-monsanto-s-new-gmo-crops-special-speed-approval-1330267848