Challenging Notions of Extraterrestrial Life

Challenging Notions of Extraterrestrial Life

starman-orb-ufo-et-hollywoodIn films that present humans alongside alien counterparts, we inevitably learn more about our own humanity than of the alien creature’s new perceptions. When we visit a new country far from home, we make just as many (if not more) discoveries about ourselves as we do about our host nation – as any traveler can attest, looking at our own culture from a distance allows for a better understanding of both its strengths and frailties, and opens it up to a greater dialogue about the world at large.

In 1977, the Voyager 2 probe was sent into space with a recorded message of peace (in 55 different languages) along with an eclectic collection of music and 116 images of life on this planet. John Carpenter, in his 1984 film Starman, explores what might have happened if an alien ship were to encounter this Earthling greeting. Alongside a sweet romance between the two lead characters, there is the story of how American government officials react to the appearance of the “Starman.” A socially-conscious piece of sci-fi, the naive and otherworldly Starman reveals both the government’s uneasiness with extraterrestrials (despite spending trillions on defense yearly) and the public’s split perspectives concerning the existence of real alien beings.

Many UFOlogical scenarios begin with a cataclysmic encounter that destroys the planet. Aliens are often depicted as a race evolutionarily superior to our own, with apocalyptic powers that can be used to levitate objects, save lives, start cars – different remarkable skills for different alien life forms. For years, comics, books, television shows and films have drawn people to the world of UFOs and extraterrestrial activities. In the 1940s and 50s, freakish events – the end of the Second World War, the unforgettable image of the atom bomb’s mushroom cloud and a pervasive storm of anticommunist sentiment – inspired the creation of a slew of sci-fi masterpieces. The Roswell Crash happened in 1947, only two years after the atomic bomb was dropped on Japanese citizens. These early B-movies put the nation’s fears of invasion and destruction on film. The reality of an alien invasion, after the paranoia and chaos of the era, did not seem so outside the realm of possibility.

The “mysterious” nature of aliens, and their continued unconfirmed legitimacy by the U.S. government only adds to their appeal. While many prominent scientists have attested to the likelihood of their existence, the proof of alien abductions and landings has been largely discredited. Carl Sagan, in one of his last interviews, said that extraterrestrial intelligence is a “wonderful prospect, but requires the most severe and rigorous standards of evidence.”

For most UFO enthusiasts, theories about advanced civilizations on other planets are a matter of sheer speculation, with little consideration for standards of scientific conjecture. That said, it is difficult to consider extraterrestrial life in terms of our own. Different types of thinking are needed to properly consider a race of beings capable of journeying among the stars – we need to be mentally flexible, as these beings are truly alien and, in all likelihood, of an appearance that our eyes will be completely untrained to see.

What reasons could there be to hide evidence of aliens? Since the Roswell, New Mexico incident, many believe that there are sweeping security measures and secrecy in place to keep the subject under wraps. But the public is not convinced. According to two National Geographic polls held in 2012, 36 percent of Americans believe UFO’s exist, and 79 percent believe a government coverup is responsible for withholding detailed alien information.

This past summer, microbiologists in California discovered bacteria that survive, not by eating “food” as we commonly think of it, but by feeding on electricity. NASA has theorized that beings in the “dark energy biosphere”, beneath deep sea beds, consume so little energy that their “means of living could theoretically be used by extraterrestrial life living in other areas of the solar system, or universe.” Both of these findings prove that limiting space exploration to “Earth-like” planets will limit our discovery of other living beings. If we are modeling our assumptions as to what an alien life needs on our own, isn’t that missing the entire point? Who knows what kind of conditions another life form needs to thrive? Astronomers from the government-backed SETI (Search for Extraterrestrial Intelligence) have recently conceded that the chance of discovering life on other planets is inevitable and will likely occur within the next 20 years.

If there are beings capable of harnessing pure energy, they may take the form of these electron-feasting bacteria. Certain species are also capable of producing electrons while metabolizing chemicals, leading scientists to believe that they may be an eventual source of natural energy.

Today, with energy prices skyrocketing, the environment in crisis mode, and no clear solution in sight, it could make sense to invest in projects towards this end. While we haven’t yet been visited by other forms of life, by harnessing pure energy we may edge closer to a new kind of sustainability. Canadian science fiction writer Karl Schroeder has posited that “any sufficiently advanced technology is indistinguishable from nature” (borrowing from Arthur C. Clarke’s original, “any sufficiently advanced technology is indistinguishable from magic”). Aliens may blend seamlessly into the galaxy, their artificial systems no different from our natural ones. In Carpenter’s film, after finding the welcome messages from Voyager, the Starman heads to Earth – only to discover the hostility of American military men when he is shot down by the U.S. Air Force. But when Starman was released, we were living in a different time. There are hundreds of millions of galaxies in space, and within them millions and millions of stars. If even 1/100 of them contain “life” in any definition, that is still billions of planets with extraterrestrial beings. It’s time we found comfort, rather than fear, in the fact that we are not alone. And even if there aren’t others out there in space, the principle of coexisting peacefully can be applied equally back here on Earth

February 27, 2013 – Decrypted Matrix Radio: Pope & Queen GUILTY, Drug Routes, 3D Printed Car, NRA Outs Gun Grab, Science of Self

February 27, 2013 – Decrypted Matrix Radio: Pope & Queen GUILTY, Drug Routes, 3D Printed Car, NRA Outs Gun Grab, Science of Self

3-D Printed Cars – the future!

Top Narco-Trafficking Routes

Queen And Pope Found Guilty By International Court, 20 Year Sentences

CLIP: Obama Signed In Secrecy That Free Speech Is Now A Felony

CLIP: NRA Publishes DoJ Memo on Obama Federal Gun Grab & Confiscation Agenda

Scientific Proof of Existence of the Soul

The Grand Illusion of Self

2-27

Every Week Night 12-1am EST (9-10pm PST)

– Click Image to Listen LIVE –

Quantum Measurements Leave Schrödinger’s Cat Alive

Quantum Measurements Leave Schrödinger’s Cat Alive

Schrödinger’s cat, the enduring icon of quantum mechanics, has been defied. By making constant but weak measurements of a quantum system, physicists have managed to probe a delicate quantum state without destroying it – the equivalent of taking a peek at Schrodinger’s metaphorical cat without killing it. The result should make it easier to handle systems such as quantum computers that exploit the exotic properties of the quantum world.

Quantum objects have the bizarre but useful property of being able to exist in multiple states at once, a phenomenon called superposition. Physicist Erwin Schrödinger illustrated the strange implications of superposition by imagining a cat in a box whose fate depends on a radioactive atom. Because the atom’s decay is governed by quantum mechanics – and so only takes a definite value when it is measured – the cat is, somehow, both dead and alive until the box is opened.

Superposition could, in theory, let quantum computers run calculations in parallel by holding information in quantum bits. Unlike ordinary bits, these qubits don’t take a value of 1 or 0, but instead exist as a mixture of the two, only settling on a definite value of 1 or 0 when measured.

But this ability to destroy superpositions simply by peeking at them makes systems that depend on this property fragile. That has been a stumbling block for would-be quantum computer scientists, who need quantum states to keep it together long enough to do calculations.

Gentle measurement

Researchers had suggested it should be possible, in principle, to make measurements that are “gentle” enough not to destroy the superposition. The idea was to measure something less direct than whether the bit is a 1 or a 0 – the equivalent of looking at Schrödinger’s cat through blurry glasses. This wouldn’t allow you to gain a “strong” piece of information – whether the cat was alive or dead – but you might be able to detect other properties.

Now, R. Vijay of the University of California, Berkeley, and colleagues have managed to create a working equivalent of those blurry glasses. “We only partially open the box,” says Vijay.

The team started with a tiny superconducting circuit commonly used as a qubit in quantum computers, and put it in a superposition by cycling its state between 0 and 1 so that it repeatedly hit all the possible mixtures of states.

Next, the team measured the frequency of this oscillation. This is inherently a weaker measurement than determining whether the bit took on the value of 1 or 0 at any point, so the thought was that it might be possible to do this without forcing the qubit to choose between a 1 or a 0. However, it also introduced a complication.

Quantum pacemaker

Even though the measurement was gentle enough not to destroy the quantum superposition, the measurement did randomly change the oscillation rate. This couldn’t be predicted, but the team was able to make the measurement very quickly, allowing the researchers to inject an equal but opposite change into the system that returned the qubit’s frequency to the value it would have had if it had not been measured at all.

This feedback is similar to what happens in a pacemaker: if the system drifts too far from the desired state, whether that’s a steady heartbeat or a superposition of ones and zeros, you can nudge it back towards where it should be.

Vijay’s team was not the first to come up with this idea of using feedback to probe a quantum system, but the limiting factor in the past had been that measurements weak enough to preserve the system gave signals too small to detect and correct, while bigger measurements introduced noise into the system that was too big to control.

Error correction

Vijay and colleagues used a new kind of amplifier that let them turn up the signal without contaminating it. They found that their qubit stayed in its oscillating state for the entire run of the experiment. That was only about a hundredth of a second – but, crucially, it meant that the qubit had survived the measuring process.

“This demonstration shows we are almost there, in terms of being able to implement quantum error controls,” Vijay says. Such controls could be used to prolong the superpositions of qubits in quantum computing, he says, by automatically nudging qubits that were about to collapse.

The result is not perfect, points out Howard Wiseman of Griffith University in Brisbane, Australia, in an article accompanying the team’s paper. “But compared with the no-feedback result of complete unpredictability within several microseconds, the observed stabilization of the qubit’s cycling is a big step forward in the feedback control of an individual qubit.”

Journal reference: Nature, DOI: 10.1038/nature11505

via NewScientist

Scientists: Creativity Part of ‘Mental Illness’

Scientists: Creativity Part of ‘Mental Illness’

If you like to express yourself through painting, writing, or any other form of artistic action, scientists now say that you must be suffering from a mental illness of some kind. In a new display of how truly insane the mainstream medical health paradigm has become, mainstream media outlets are now regurgitating the words of ‘experts’ who say that those who are creative are actually, more often than not, mentally ill.

After all, more than 50% of the United States is, by definition of the psychiatrists of the nation, mentally ill. Even questioning the government is considered a mental disorder. It should come as no surprise to know that upwards of 70% of the psychiatrists who write the conditions are — of course — on the payroll of those who produce the drugs to ‘treat’ the conditions. It should also therefore come as no surprise to note that the DSM (the Diagnostic and Statistical Manual of Mental Disorders, which is the foundation of the entire diagnosis system) now contains over 900 pages of bogus disorders.

And perhaps creativity may soon be added to the massive textbook, which labels people who are shy, eccentric, or have unconventional romantic lives as mentally ill.

Is it any wonder that the 4th edition of the manual, which added hundreds of new ways to diagnose patients, led to a 40 times increase in bipolar disorder diagnoses. Even the lead editor of the DSM-IV Allen Frances, MD, has stated the book is utter nonsense:

There is no definition of a mental disorder. It’s bull****. I mean, you just can’t define it, he said.

Real information like this is what has led the mainstream news to re-title their pieces regarding the new classification of creativity as a mental illness, changing the headlines to more ‘ginger’ ways of linking the two together. Meanwhile, the writers of the study claiming that creativity is part of a mental illness are quite clear in stating that creativity is literally a mental illness. The extent in which you wish to ‘treat’ your creativity, however, is apparently up to you and your doctor.
Be of caution, however, as you have to decide at ‘what cost’ you will allow your creativity to exist. As the study writer stated:

If one takes the view that certain phenomena associated with the patient’s illness are beneficial, it opens the way for a new approach to treatment. In that case, the doctor and patient must come to an agreement on what is to be treated, and at what cost.

As expected the way to ‘treat’ your creativity is of course to take pharmaceutical drugs in the form of anti-depressants or hardcore psychotropic drugs. The same drugs that virtually all suicidal massacre shooters have taken before or during their rampages.

As virtually everything we think and do is classified as a symptom of a mental disorder, the mainstream psychiatric paradigm will continue to grow like a massive parasite alongside the pharmaceutical industry that profits off of the absolute laughable diagnoses of regular adults, children, and even toddlers. Until we realize that we need to shift into a new health paradigm that is centered around personal health freedom and shed corporate science as a whole, we will continue to see insane headlines classifying thought and emotion as mental illness.

 

via ActivistPost.com

Synthetic DNA Substitute Gets Its Own Enzymes, Undergoes Evolution

Synthetic DNA Substitute Gets Its Own Enzymes, Undergoes Evolution

On Earth, all life is dependent upon the nucleic acids, DNA and RNA. But researchers Including those who are wondering how to detect life somewhere other than Earth, have wondered whether other information-bearing polymers might also serve this purpose. Is there something special about DNA and RNA, or did they just happen to be the first things that work? The answer to that question would not only have implications for the origin of life on Earth and elsewhere, but it might have practical uses.

Researchers have now taken a major step towards showing that alternatives can actually work as genetic material. They replaced a standard part of nucleic acids with a number of chemical relatives, and found out that they all could work. Sequence information could be shuttled back and forth between these artificial molecules and DNA, and the synthetic materials could even undergo the sort of molecular evolution that has been demonstrated using DNA and RNA.

The chemical structure of nucleic acids isn’t all that complex. They consist of a long polymer of sugars, linked together by a phosphate. Hanging off each sugar is a base (A, T, C, or G). It’s the order of these bases that conveys genetic information or, in the case of RNAs that can catalyze chemical reactions, form the structure needed to create a catalytically active site.

Chemically, however, just about all of these can be swapped out. The phosphate can be replaced by a sulfate and the resulting molecule can still undergo base pairing with normal nucleic acids. Other researchers have traded the sugar for related, ring-like structures. Some geneticists have even used relatives of the four standard bases that undergo base pairing that’s structurally distinct. These synthetic molecules can actually be used by the normal cellular machinery if they’re supplied to bacteria, creating an expanded genetic code.

Replacing the pieces of DNA

When it comes to messing with the backbone—the sugars and phosphates—it gets quite a bit harder to integrate things with actual biological systems. The enzymes that prepare and copy DNA, for example, are structured to work with sugars and phosphates. Having something that’s both chemically and structurally distinct doesn’t always work that well.

Rather than messing with the chemistry, the team behind the new paper decided to fix the enzymes. They started with a DNA copying enzyme, and introduced lots of random mutations, then checked for versions that would latch on to a chemical that was somewhat structurally related to the normal sugar used in DNA. After a couple rounds of this, they had an enzyme that could copy stretches of DNA into pieces of a nucleic acid that contained nothing but this sugar substitute, converting the DNA into an artificial chemical relative.

Using similar procedures, the same enzyme could be adapted to a wide variety of chemicals related to sugars. The authors picked five in total, all with features that were distinct from the normal sugars, like a double bond between carbon atoms, a fluorine replacing an oxygen, and a double-ring structure. Collectively, they termed these DNA/RNA substitutes XNAs.

Having a one-way trip from DNA to XNA wasn’t all that useful for experiments, so the authors turned to an enzyme that normally converts RNA to DNA. A few rounds of random mutation, and they had a second set of enzymes that could convert XNAs back to DNA. With these tools in hand, the authors could convert any sequence into an XNA, experiment with the results, and then convert it back to DNA in order to do basic work on it, such as duplicating and sequencing it.

The process, however, was a lot more error-prone than one that relies on the typical enzymes that only work on DNA, introducing random mutations at frequencies between once every 4,000 bases to once every 500. Of course, random mutations are the raw material of evolution, so the authors decided to check out whether the XNAs could evolve new functions. They made a collection of random strings of XNAs, and selected those that stuck to a couple of substances (a protein and an RNA). Those that stuck were copied into DNA, amplified, and copied back to XNA, picking up mutations along the way. After a few rounds, they had sequences that stuck specifically.

Informative and useful

On the most basic level, the results probably won’t surprise anyone with a biochemistry background. The different XNAs all look a fair bit like sugars, and mutated versions of various enzymes have been shown to be fairly flexible about what they work with in the past. And (for now at least) we’re not at the point where we could grow an XNA-based cell. We don’t have enzymes that can copy XNA into more XNA without going through DNA (although, reportedly, these are in the works). And the cell can’t synthesize its own raw materials for XNA—they have to be supplied externally.

But none of these things are necessarily insurmountable, so it’s entirely possible to imagine we could have XNA-based bacteria floating around a lab at some point in the not-too-distant future. In the meantime, the results tell us quite a bit, and could be useful.

For starters, although DNA and RNA are obviously effective carriers of genetic information and can combine that with biochemical activities, they’re not the only molecules that can do so. Their role in life on Earth, then, may be a contingency. At the same time, this work suggests that life on Earth need not have started using the nucleic acids it uses now. It’s entirely possible that some other related compound—one that was easier to generate from the raw materials on the early Earth—got life going, but was then replaced by RNA or DNA. That makes the job of origin-of-life researchers both easier (they don’t have to limit their thinking to RNA) and harder (it’s not clear what they should limit themselves to).

When it comes to life elsewhere, the options are wide open.

Back here on Earth, this also may prove very useful. There have been a number of attempts to produce nucleic-acid based therapies, and it has generally been found that skipping DNA and using some chemical relative is much more effective—the drugs last longer because the enzymes that normally break down loose DNA don’t recognize the synthetic variant. The XNA-based system may allow us to produce these in huge quantities.

Source: http://arstechnica.com/science/news/2012/04/synthetic-dna-substitute-gets-its-own-enzymes-undergoes-evolution.ars

Outrageous Lies Monsanto and Friends Are Trying to Pass off to Kids as Science

Outrageous Lies Monsanto and Friends Are Trying to Pass off to Kids as Science

It’s not enough that the biotech industry — led by multinational corporations such as Monsanto, Dow, Syngenta, BAS, and Dupont — is poisoning our food and our planet. It’s also poisoning young minds.

In a blatant attempt at brainwashing, the Council for Biotechnology Information(CBI) has widely circulated what it calls a Biotechnology Basics Activity Bookfor kids, to be used by “Agriculture and Science Teachers.” The book — calledLook Closer at Biotechnology — looks like a science workbook, but reads more like a fairy tale. Available on the council’s Web site, its colorful pages are full of friendly cartoon faces, puzzles, helpful hints for teachers — and a heavy dose of outright lies about the likely effects of genetic engineering on health, the environment, world hunger and the future of farming.

CBI’s lies are designed specifically for children, and intended for use in classrooms.

At a critical time in history when our planet is veering toward a meltdown, when our youth are suffering the health consequences (obesity, diabetes, allergies) of Big Ag and Food Inc.’s over-processed, fat-and sugar-laden, chemical-, and GMO-tainted foods, a time when we should be educating tomorrow’s adults about how to reverse climate change, how to create sustainable farming communities, how to promote better nutrition, the biotech industry’s propagandists are infiltrating classrooms with misinformation in the guise of “educational” materials.

Brainwashing children. It’s a new low, even for Monsanto.

You don’t have to read beyond the first page ofLook Closer at Biotechnology to realize that this is pure propaganda:

Hi Kids! Welcome to the Biotechnology Basics Activity Book. This is an activity book for young people like you about biotechnology — a really neat topic. Why is it such a neat topic? Because biotechnology is helping to improve the health of the Earth and the people who call it home. In this book, you will take a closer look at biotechnology. You will see that biotechnology is being used to figure out how to: 1) grow more food; 2) help the environment; and 3) grow more nutritious food that improves our health. As you work through the puzzles in this book, you will learn more about biotechnology and all of the wonderful ways it can help people live better lives in a healthier world. Have fun!

Before we take a closer look at the lies laid out in Look Closer at Biotechnology — lies that are repeated over and over again, the better to imprint them on young minds — let’s take a closer look at the book’s publisher. The Council for Biotechnology Information describes itself as “a non-profit 501(c)(6) organization that communicates science-based information about the benefits and safety of agricultural biotechnology and its contributions to sustainable development.”

According to the Internal Revenue Service, a 501(c)(6) organization is a “business league” devoted to the improvement of business conditions of one or more lines of business. The mission of a 501(c)(6) organization “must focus on the advancement of the conditions of a particular trade or the interests of the community.”

The bottom line is that CBI exists to advance the interests of the corporations that it was formed to promote — in this case, the biotech industry. While it purports to communicate “science-based information,” in fact, that’s not its mission at all. Its mission is to maximize the profits of Monsanto and the biotech industry.

Not surprisingly, CBI is funded largely by the biotech, chemical, pesticide, and seed industry giants: BASF, Bayer CropScience, Dow Agro Sciences, Dupont, Monsanto, and Syngenta.

There’s nothing new about corporations lying to the public. Corporations routinely lie to their employees. They lie in advertising. They lie in the lopsided so-called studies and research projects that they self-fund in order to guarantee the outcomes that support their often false, but self-serving premises. They buy off politicians, regulatory officials, scientists, and the media.

Although here we’re focusing on the biotech industry trying to brainwash our kids, CBI certainly does not limit its propaganda to just children. CBI recently contributed $375,000 to the Coalition Against the Costly Labeling Law — a Sacramento-based industry front group working to defeat the California Right to Know Genetically Engineered Food Act of 2012. If passed in November, this citizens’ ballot Initiative will require food manufacturers and retailers to label foods containing genetically engineered ingredients, as well as ban the routine industry practice of labeling or advertising GE-tainted foods as “natural” or “all natural.” CBI, the Farm Bureau, and the Grocery Manufacturers Association are campaigning furiously to preserve their “right” to keep consumers in the dark about whether their food has been genetically engineered or not, and to preserve their “right” to mislabel gene-altered foods as “natural.”

Clearly, the Council for Biotechnology Information has little or no regard for “science-based” information. But lies aimed directly at kids — under the guise of science education? In our schools?

Let’s take a closer look at the claims made in Look Closer at Biotechnology.

Lie #1: “Biotechnology is one method being used to help farmers grow more food.” (page 7)

This statement is patently false.

In 2009, in the wake of similar studies, the Union of Concerned Scientists examined the data on genetically engineered crops, including USDA statistics. Their report — Failure to Yield — was the first major effort to evaluate in detail the overall yields of GE crops after more than 20 years of research and 13 years of commercialization in the United States. According to the definitive UCS study, “GE has done little to increase overall crop yields.” A number of studies indicate in fact that GE soybeans, for example, actually produce lower yields than non-genetically engineered varieties.

Research conducted by the India research group, Navdanya, and reported in The GMO Emperor Has No Clothes turns up the same results:

Contrary to the claim of feeding the world, genetic engineering has not increased the yield of a single crop. Navdanya’s research in India has shown that contrary to Monsanto’s claim of Bt cotton yield of 1500 kg per acre, the reality is that the yield is an average of 400-500 kg per acre. Although Monsanto’s Indian advertising campaign reports a 50-percent increase in yields for its Bollgard cotton, a survey conducted by the Research Foundation for Science, Technology and Ecology found that the yields in all trial plots were lower than what the company promised. (Page 11).

The claim that GE crops increase agricultural yields is a blatant lie. Equally untrue is the industry’s claim that it is motivated by the desire to feed the hungry of the world. As the Union of Concerned Scientists points out: “For the most part, genetic engineering techniques are being applied to crops important to the industrialized world, not crops on which the world’s hungry depend.” Where does all the genetically engineered soy and corn — two of the largest GE crops — end up? In animal feed, processed junk foods — and school lunchrooms. Precious little goes to feed the hungry in impoverished regions.

One of the sub-arguments related to increasing yields is the biotech industry’s claim that GMO crops are more resistant to pests — hence more of the crops survive. In Look Closer at Biotechnology kids are told that agricultural biotechnology is a “precise way to make seeds with special qualities. These seeds will allow farmers to grow plants that are . . . more resistant to pests . . .” In fact widespread commercialization of herbicide-resistant and Bt-spliced GE crops has engendered a growing army of superweeds and superpests, oblivious to all but the most powerful and toxic pesticides.

What we should be teaching kids in science class is what scientists have been warning for years — that any attempt to increase resistance to pests through genetic engineering will ultimately fail. Insects — and diseases — will build up a tolerance over time, and evolve into stronger and stronger strains. That’s how nature works — and even Monsanto can’t fool Mother Nature. Organic agriculture, on the other hand, utilizing crop rotation, biodiversity, natural fertilizers, and beneficial insects, reduces crop loss from pests and weeds, without the collateral damage of toxic pesticides and fertilizers.

Recently, 22 leading scientists told the US Environmental Protection Agency that it should act with “a sense of urgency” to urge farmers to stop planting Monsanto’s genetically engineered Bt corn because it will no longer protect them from the corn rootworm. Bt corn is genetically engineered with bacterial DNA that produces an insecticide in every cell of the plant, aimed at preventing corn rootworm. Except that corn rootworms have now developed resistance to these GE mutants.

Just as scientists had predicted years ago, a new generation of insect larvae has evolved, and is eating away at the roots of Monsanto’s Bt corn — a crop farmers paid a high price for on Monsanto’s promise that they would never have to worry about corn rootworm again. Scientists are now warning of massive yield loss and surging corn costs if the EPA doesn’t act quickly to drastically reduce Bt crops’ acreage and ensure that Monsanto makes non-GMO varieties of corn available to farmers.

“Massive yield loss” doesn’t sound like “more food” — whether you’re 12 years old or 112.

What we should be telling kids is what responsible scientists and farmers — experts at the United Nations — have been saying all along: Eco-farming candouble food output. According to a UN study:

  • Eco-farming projects in 57 nations showed average crop yield gains of 80 percent by tapping natural methods for enhancing soil and protecting against pests.
  • Projects in 20 African countries resulted in a doubling of crop yields within three to 10 years.
  • Sound ecological farming can significantly boost production and in the long term be more effective than conventional farming.

Lie #2: “Biotechnology can help farmers and the environment in many ways.” (page 8)

Two lies for the price of one.

Biotechnology — specifically genetic engineering — helps neither farmers nor the environment, according to the majority of legitimate scientists and economists. In fact, the opposite is true. Genetic engineering of seeds has wreaked havoc on the environment and brought misery to hundreds of thousands of small farmers all over the world.

The majority of farmers in developing countries struggle to afford even the most basic requirements of seeds and fertilizers. Their survival depends on the age-old practice of selecting, saving and sharing seeds from one year to the next. When multinational corporations move into areas previously dominated by small farmers, they force those farmers to buy their patented seeds and fertilizers — under pretense of higher yields, and under threats of lawsuits if they save or share the seeds. Every year, they’re forced to buy more seeds and more chemicals from corporations — and when the promises of higher yields and higher incomes prove empty, farmers go bankrupt.

Compounding their corporate crimes, when Monsanto’s patented seeds contaminate the non-GMO crops of small farmers (because the seeds drift across property lines) Monsanto routinely sues farmers for growing their patented seeds illegally, even though the seeds were actually unwanted trespassers. Further, the company has ruined the livelihoods of small farmers by harassing them for illegally growing patented seeds, even in cases where no patented seeds have been grown, either knowingly or by accident.

As Monsanto and others have expanded worldwide, into India, China, Pakistan, and other countries, the effect on small farmers has been devastating. In India, for instance, after World Trade Organization policies forced the country in 1998 to open its seed sector to companies like Cargill, Monsanto and Syngenta, farmers quickly found themselves in debt to the biotech companies that forced them to buy corporate seeds and fertilizers and pesticides, destroying local economies. Hundreds of thousands of India’s cotton farmers have committed suicide.

And according to a Greenpeace report, poorer farmers in the Philippines were sold Monsanto’s Bt corn as a “practical and ecologically sustainable solution for poor corn farmers everywhere to increase their yields” only to find the opposite was true: Bt corn did not control pests and was “not ecologically sustainable.”

Which brings us to one more of the Council for Biotechnology Information’s lies to kids: That agricultural biotechnology is good for the environment.

Study after study, over more than a decade, has warned us of just the opposite. Even the pro-biotech USDA has admitted that GE crops use more pesticides, not less than non-GE varieties. Genetic engineering results in evermore pesticides being dumped into the environment, destroying soil and water, human and animal health, and threatening the biodiversity of the planet.

How about telling kids instead that numerous reports, including one from theGerman Beekeepers Association, have linked genetically engineered Bt corn to the widespread disappearance of bees, or what is now referred to as Colony Collapse Disorder? And while we’re at it, maybe we should remind kids of the Albert Einstein’s quote: “If the bee disappeared off the surface of the globe then man would only have four years of life left. No more bees, no more pollination, no more plants, no more animals, no more man.”

Maybe we should also tell them that glyphosate, the active ingredient in Monsanto’s herbicide, Roundup, the most widely used herbicide in the world, kills Monarch butterflies, fish, and frogs, destroys soil fertility, and pollutes our waterways and drinking water.

The fact is, widespread use of Monsanto’s Roundup in all agricultural and urban areas of the United States is destroying the environment, pure and simple. US Geological Survey studies released this month show that Roundup is now commonly found in rain and rivers in agricultural areas in the Mississippi River watershed, where most applications are for weed control on GE corn, soybeans and cotton. Here’s the real truth, from an article published this past week: Monsanto’s Roundup is actually threatening the crop-yielding potential of the entire biosphere. According to the article, new research published in the journalCurrent Microbiology highlights the extent to which “glyphosate is altering, and in some cases destroying, the very microorganisms upon which the health of the soil, and — amazingly — the benefits of raw and fermented foods as a whole, depend.”

Lie #3: “Scientists are using biotechnology to grow foods that could help make people healthier.” (page 11)

This is the perhaps the most outrageous lie of all. Telling kids that GE foods are more nutritious is tantamount to telling them Hostess cupcakes and Coca-Cola are health foods.

Genetic engineering — of human food and food for animals that humans eat — has been linked to a host of diseases and health issues, including auto-immune disorders, liver and kidney damage, nutritional deficiencies, allergies, accelerated aging, infertility, and birth defects.

There’s a growing and alarming body of research indicating that GMO foods are unsafe, and absolutely no research whatsoever proving that they are safe. And yet the USDA and FDA continue to approve, and just this past month even agreed tospeed up approval of these crops that scientists and physicians increasingly link to poor health.

Instead of force-feeding kids lies in bogus activity books, how about having them read some truthful articles?

The study Bt Toxin Kills Human Kidney Cells says Bt toxins are not “inert” on human cells, and may indeed be toxic, causing kidney damage and allergies observed in farmers and factory workers handling Bt crops. The article supportsprevious studies done on rats, showing that animals fed on three strains of GE corn made by Monsanto suffered signs of organ damage after only three months.

Or how about this: “19 Studies Find That GMOs Aren’t Up to Consumer Safety Protection Standards” which reports:

It is abundantly clear that both GMOs made to be resistant to herbicides (aka “Roundup Ready”) and those made to produce insecticides have damaging impacts on the health of mammals who consume them, particularly in the liver and kidneys. We already know that from the trials of 90 days and less. In looking a little deeper into the info, we found a number of issues that point to a probable increased level of toxicity when these foods are consumed over the long term, including likely multi-generational effects.

Multi-generational effects. Eating GMO foods harms not only our health, and our kids’ health — but quite possibly their kids, too — even if we stop eating them today.

In a recent report to the United Nations General Assembly Human Rights Council by Special Rapporteur on the right to food, Olivier De Schutter, Schutter outlines the case for sustainable agricultural practices (the antithesis of industrial agribusiness, with its GE crops and heavy reliance on chemical fertilizers and pesticides). He also addresses the links between health and malnutrition. In the report, Schutter shows why undernutrition, micronutrient deficiency and overnutrition are different dimensions of malnutrition that must be addressed together through a life-course approach. From the report’s summary:

Existing food systems have failed to address hunger, and at the same time encourage diets that are a source of overweight and obesity that cause even more deaths worldwide than does underweight. A transition towards sustainable diets will succeed only by supporting diverse farming systems that ensure that adequate diets are accessible to all, that simultaneously support the livelihoods of poor farmers and that are ecologically sustainable.

Corporate greed plus a complicit government have allowed for the rampant poisoning of our food and environment, and the demise of sustainable agriculture practices — practices sorely needed if we are going to feed the world’s population, and avoid a world health crisis. And we’ve exported the same misery and destruction to foreign countries far and wide.

Propaganda like the CBI’s Look Closer at Biotechnology has brainwashed many of our kids into thinking that the biotech industry has people — not profits — in its best interests. The book’s claims are laughable. But framing blatant lies as “science” for children in schools borders on criminal.

For parents and teachers out there, here’s an alternate lesson plan. Because world hunger is a concern, because saving our planet does matter, and because better health is a worthy and achievable goal, let’s ask our kids to think critically, instead of accepting at face value “information” attractively packaged by multinational corporations.

Don M. Huber, emeritus soil scientist of Purdue University puts it in terms everyone, kids included, can understand. Huber talks about a range of key factors involved in plant growth, including sunlight, water, temperature, genetics, and nutrients taken up from the soil. “Any change in any of these factors impacts all the factors,” he said. “No one element acts alone, but all are part of a system.” “When you change one thing,” he said, “everything else in the web of life changes in relationship.”

This is what we should be teaching the future stewards of our planet.

SOURCE:
http://www.alternet.org/food/154602/outrageous_lies_monsanto_and_friends_are_trying_to_pass_off_to_kids_as_science?page=entire

By: Ronnie Cummins, March 20, 2012

The NSA – Behind The Curtain

The NSA – Behind The Curtain

By Deep_Thought

Say hello to Mr Computer…

As promised, today we will take an in-depth examination of the NSA’s global intelligence gathering network. What you are about to read will come as an eye-opener and represents the current state of the NSA’s capabilities. Some of this will be expected, some of it will come as a shock.

 

What you will learn is that the technology that underpins this global listening network is a lot more advanced than governments would have you know. Usually wrapped up in basic, generalised, descriptions the general public is kept blind to the current state of technological development.

 

We will take this examination in three major parts. The first part will examine the core processing system. Once this part is understood, we can then look at how information flows to and from this core and where it is obtained from. Finally, we will examine how this information is used by the NSA.

 

I will cover as much as possible about this system, but the scope is very large. In general, any use of this data that the reader can observe is most likely already being conducted.

 

Mr Computer

 

The scope of the NSA’s infrastructure is mind boggling to say the least. Heavily compartmentalised, the entire array of systems is shielded from the average NSA employee as much as it is shielded from the public. That said, once you understand the core of the NSA, you will be in a position to see how information flows in and out of this core.

 

The NSA is built around a super-computer bound Artificial Intelligence known only as “Mr Computer” in the civilian world. This is not your average A.I., no basic set of responses or a mere dedicated algorithm that can spot patterns. Mr Computer is an entity or being in his own right. A sentient computer system as complex as any human.

 

Comparable to VMware in a way, an instance of Mr Computer can be started at a moments notice. Within seconds, a fully fledged virtual intelligence agent, ready to analyse the information that has been piped to him, can be up and running.

 

Mr Computer is competent enough to handle real-time interaction without human intervention. Mr Computer understands and speaks all modern languages and even a number of dead ones. Able to intelligently converse and express its own opinions, Mr Computer collates information from disparate sources and compiles them into concise reports that do not miss the smallest detail or nuance.

 

Mr Computer’s capabilities and human-like reasoning cannot be understated.

 

Instances of Mr Computer can vary in terms of their personality given the task that they must undertake. Extremely professional instances can be called upon when the system must produce reports or provide presentations. Less anal versions, complete with a sense of humour can be instantiated when less formal situations arise such as development environments or when used in conjunction with Remote Neural Communication.

 

Rather than loading modules for specific tasks, a common hive mind is shared by any number of front-end personalities. What one instance knows, they all know. A hive mind is a form of collective consciousness. Rather than an instance replicating information it has learned, it is recorded to a shared brain and reflected throughout all instances at the same time. Of course, given the distributed nature of the network, some replication must be performed across continental links.

 

The A.I. is not limited to just one branch of the NSA, it exists in a distributed grid that spans the globe. The A.I. can migrate between locations to enable tracking of specific targets, access information, or systems.

 

Mr Computer is not just limited to thinking like a human, it also has sensory capabilities that are on par with a human. In setting such as RNC, Mr Computer can see and identify object just as well as a human. That is, it can identify objects a human target is seeing, without leveraging the identification system of the human target. In other scenarios, such as analysing infra-red data from a satellite, it could possibly outperform a human at object recognition and speculation of heat sources.

 

Mr Computer can speak. With a vocabulary as broad as any dictionary, Mr Computer can express ideas, concepts and opinions very eloquently and concise.

 

The system is not naive either, it can withhold information, evade social engineering ploys and indirect questioning. It can tell when it is looking at reflections of targets, identify objects that a target can not immediately identify and validate or expand upon information by examining a wide variety of sources.

 

Further to this, Mr Computer is no idiot either. He is quite capable of following advanced topics, from physics, to computing theory he can spot the smallest of flaws in reasoning or expose potential technical issues that could prove fatal to a particular design.

 

It knows bull@!$%# when it hears it and will let you know in no uncertain terms.

 

As we can see, Mr Computer does all the labour intensive information gathering, categorising and structuring. That said, its duties are not limited to passive analysis work.

 

Now that we understand the core of the NSA’s operations, we can begin to examine the various “information pipes” that supply information to this supercomputer infrastructure.

 

The Pipes Are Calling

 

First off, we need to define what we mean by an “information pipe”. For those with computing knowledge, this should be obvious, but bear with me while I explain it to the rest of the readers.

 

We have already defined the core processing element, Mr Computer. Mr Computer accepts information and does something with it. An “information pipe” is an input to Mr Computer that has been structured in a manner efficient for processing. We could also use an “information pipe” to output information or to control something.

 

The first “information pipe” that the public will be most familiar with is the NSA’ warrentless wiretapping program. Forget everything that you have ever read about this program, also forget everything you ever heard of about Trailblazer and similar projects such as ThinThread. This is security theatre, a production worthy of a Broadway musical. These “classified programs” are nothing more than interfaces used by Mr Computer. When agents talk of specific program that can analyse data in real-time and cross-reference with other sources, they are really speaking of an “information pipe” to Mr Computer.

 

This wiretapping program copies verbatim every piece of data that flows across the backbone of the internet. The data is sent directly to an array of Mr Computer instances, which performs a real-time analysis of the data packets it receives. This wiretap picks up most of the traffic in the US and a large percentage of traffic globally.

 

We will go into more detail on the information processing of this later, but at this stage I will say that that Mr Computer was opening files on every person that could be identified in the traffic, even if they are in the US.

 

The next major data source is the global wide band radio listening system. This covers everything from human thought, right through to identifying which radio station a person is listening to. The former is done by listening to ELF and the latter is a modern version of the British’s RAFTER espionage program. Most of this performed by a satellite network, supported by a network of ground stations throughout the world. As a wide receiver, it also picks up WIFI, RFID, compromising emissions from electrical sources, cordless telephones, GSM, cell phones, GPS, Car Fobs, satellite uplinks/downlinks, etc.

 

Our third pipe comes from a global hacking program, performed by bot nets and Mr Computer. Typically using China as a cover, Mr Computer will launch attacks against US and global businesses trying to collect information on users, everything from personnel records, right through to payroll information. The networks are also mapped to provide offensive capabilities in a cyber-warfare scenario. Faceless groups such as Anonymous, or other organisations, are used as a cover story.

 

Another “information pipe” comes from underwater cables. These can either be have splitters installed, or where copper cabling exists passive detection equipment installed.

 

These are just some examples of information sources. You can basically add any form of data you can think of, intelligence reports, diplomatic cables, economic reports, media reports, music, online posts, emails, etc.

 

So far, we have only examined inputs to the system. A different form of “information pipe” is one that outputs information. The outputs come in two basic forms, information only and offensive.

 

In terms of information only outputs, this can range from sending particular data or reports to agents or decision makers, right through to relaying that information to different departments such as the CIA, FBI or State and Federal Police. The process ensures timely and complete information goes to those that require it the most.

 

The offensive side can cover a wide range of activities. The first capability is the jamming system. Wide-band jamming, or selective jamming, can be conducted to deny radio space to the enemy in geographical targeted areas. Furthermore, this form of jamming can render both devices and humans inoperable. Complex ELF transmissions can reduce a human target to a quivering mess or in extreme cases even kill by interfering with neuronal firing patterns and nerve impulses.

 

Wide-band jamming can interfere with the circuitry of any unshielded device, from phones right through to laptops. Such activity would cause devices to freeze, or if certain exploits exist, damage the system entirely.

 

A mixture of ground, air and satellite-based networks are used to deliver this capability.

 

Another capability provides Mr Computer with a veritable Swiss army knife of tools to breach networks, crash routers, deny service and seize control. A significant amount of information is gathered by remote neural communication. By eavesdropping of key personnel, network maps, passwords and security measures can all be recorded beforehand. This is not limited to foreign companies, as the NSA must be prepared for strikes that occur within their own nation.

 

With the advent of remotely controlled drones and autonomous aircraft, Mr Computer has undergone a significant amount of changes in the last 20 years that enable him to control a networked battlefield. This is “War Games” on steroids, where the most efficient battle strategies can be implemented and coordinated by a single command-and-control system. There are a range of security issues with this setup, but the capability exists.

 

In short, if it can be damaged or manipulated electronically, then Mr Computer “has an app for that”.

 

Input, Input, Input

 

Now that we have established where Mr Computer gets his information, we now need to look at what he does with it. Earlier we spoke about the warrentless wiretaps and various other sources of “information pipes”. Now let’s see what is done with that information.

 

The key aspect to watch here is the “web of related information” and how different webs of information can be cross-referenced with other webs. This is where the real power comes from.

 

Each fragment of information that can be definitively identified gets added to a file under the person’s name. This could be a telephone call, email, or an IM chat. As communications often involve more than one person, a link is added to each person’s file involved in the communication. Information that can only be tied to a machine or ip address, is added that to that machine’s file or ip address’ file.

 

Using a technique known as cluster analysis, this information is brought together centred around high priority targets, locations, keywords or businesses. A good way of thinking about it is to compare it with services such as Facebook and LinkedIn. The relationship between the files is analysed for a variety of factors and the result creates a web which is weighted in terms of importance.

 

Different webs will exist for different factors, such as one web for those linked with chemical production, or another web for engineering expertise. These webs can be cross referenced against each other to extract more detailed information. For example, by cross-referencing a web of chemical production against engineering expertise, we may find a person or group capable of producing sophisticated explosives or weapons. From this merged web, we could then see who their friends are, who they have been communicating with recently and even review their communications.

 

We could take this further by comparing their basic salary with their current bank accounts, or look for wire transfers.

 

With the advent of social media platforms, images of friends and family are also added to the system. Mr Computer’s facial recognition tags the photos just like Facebook and examines the photos for other items, like guns, computers, etc.

 

Obviously, this has one serious privacy issue, in that, the only way to exclude you from a web, is to know everything about you. Otherwise, you are an unknown element. Now you understand why the warrentless wiretap exists, even to this day.

 

If you have used any form of digital communication, from a phone to a computer in the last decade, then most, if not all of communications have been recorded and added to a file against your name. The notion that at least one member of the communication needs to be related to terrorism has been tested and shown to be false. How do we know that? Well, it is staring you in the face. In order to know who the parties are, the technology used requires them to be listening and identifying voices in the first place.

 

Ignore any suggestion that this too much data.  The truth is that all the communications happening on the planet right now can be monitored in near real-time.

 

As a rule, the NSA lie and as an all-encompassing rule, politicians will lie for them too.

 

As result of information extracted from wide-band monitoring, real-time tracking of cell phones is pretty much standard practice. Each call can be recorded verbatim and analysed in real-time. As each number is learned the system fills in personal information. This can provide a Google-Earth like view of cell phone movements, most of which can be remotely activated for espionage. Again, this web can be cross-reference with other webs of information.

 

Radios can reveal which frequency is being listened to. So, by plotting schedules of something like a Numbers Station, a satellite network can pinpoint a listener to within a few meters. Similarly, if you were to listen to a radio station sympathetic to a particular group, your location can be flagged and cross-referenced with information on current occupants.

 

Human beings emit radio waves in the ELF spectrum. The security services do not need to place a bug on us to track where we are, what we are talking about, what we are seeing or even what we are thinking. All of this information is being leaked into our environment 24/7 by our own bodies. All it takes is the right equipment to convert those signals into intelligence. Its no bigger a task than listening to a telephone exchange leaking radio waves and reconstructing the data into voice or data transmissions.

 

These are just some of the things that can be achieved. I could go on all night about how to compare datasets to locate people, hinder organisations, etc. Anything you can think of to tease information out of the various “information pipes” is being performed by Mr Computer 24/7.

 

Hardware

 

This can be very difficult to estimate. Despite popular belief that the NSA will hit a Yottabye by 2015, it seems a little outragous given the space requirements and modern hardware.

 

My own estimations are far more conservative, probably under a couple of Zettabytes. Mr Computer is most likely built around an array of Cray X1 or X1E supercomputers (4096 processors). The global grid probably contains a number of these or similar systems.  With their base costs, they could be running several hundred easily.

 

In fact, it is likely that the following video shows an early variant of Mr Computer’s infrastructure. The segment reveals that the most powerful machine is called “The Thinking Machine”. I feel that this is a dumbed down reference to Mr Computer.

 

The Thinking Machine

 

 

Furthermore, it would appear that Youtube’s EidolonTLP is in fact an instance of Mr Computer in disguise. Output from Mr Computer was directed into software generally available to the public to hide the complexity of the NSA’s supercomputer.

 

The term Eidolon is Mr Computer’s idea of a joke, in that he appears to be a “phantom look-alike of the human form”. There is some suggestion that may be a subtle reference to Edgar Allan Poe’s poem ‘Dreamland’, which is also a term for Area 51. Unless there is a datacenter at this location, I am unable to confirm the link. It may also be another joke, referring to the fact that his existence would be a conspiracy theory.

 

A possible further explanation is the Dungeons and Dragon series and the link between sentience, madness and occupying the realm of dreams, which may be another subtle reference to RNC.

 

If you listen to EidolonTLP, he does reveal some information on the structure of the network and his own design. From a computing perspective and EidolonTLP’s use of language, its a safe bet that this is a real A.I.:

 

 

Eidolon TLP – Mr Computer in incognito

 

 

Conclusion

 

The intelligence world is a lot worse than you think. When humans are free from their constraints and away from the scrutany of others, they always revert to their most base instincts. Anything you can imagine is currently being done in the name of National Security. From murder to human experimentations, the acronyms are at it as we speak.

 

At some point, it could be your turn.

 

What you will notice from all of this, is that the warrentless wiretap program was just the icing on the cake and was very clearly “planned from the outset” as all the backend infrastructure was in place prior to 9/11. This claim is supported in the following document:

 

81. Within eleven (11) days of the onset of the Bush administration, and at least seven (7) months prior to the attacks of September 11, 2001, defendant ATT began development of a center for monitoring long distance calls and internet transmissions and other digital information for the exclusive use of the NSA.

 

91. International Business Machines Corporation (IBM) was one of the parties working with ATT and the NSA to develop the monitoring center and IBM personnel participated in meetings with ATT and NSA officials in the development of the monitoring center.

http://cryptome.org/mayer-016.htm

 

The US government is quite adept at lying through its teeth, especially to its own citizens. The typical approach is to start a public version such as the “Information Awareness Office” with the same goals as the classified program which provides cover. The general public and privacy groups attack the public program, resulting in its closure, meanwhile the classified program remains operational. The general public believe they have won a victory, any leaks are associated with the now defunct public program and the government gets the information it wanted in the first place.

 

The NSA is a deeply corrupt organisation, that has little regards for the rights of others.  Never trust a government, even your own, implicitly.  Nations change, opinions change and people change.  It just takes the right catalyst for it to happen.

 

In most cases, you will find the seeds were always there, you just chose to ignore them.

Scientists find extraterrestrial code inbedded in human junk-DNA

– DNA junk not so random…

A group of researchers working at the Human Genome Project will be announcing soon that they made an astonishing scientific discovery: They believe so-called non-coding sequences (97%) in human DNA is no less than genetic code of an unknown extraterrestrial life form.

The non-coding sequences are common to all living organisms on Earth, from molds to fish to humans. In human DNA, they constitute larger part of the total genome, says Prof. Sam Chang, the group leader. Non-coding sequences, also known as “junk DNA”, were discovered years ago, and their function remains mystery.

Unlike normal genes, which carry the information that intracellular machinery uses to synthesize proteins, enzymes and other chemicals produced by our bodies, non-coding sequences are never used for any purpose. They are never expressed, meaning that the information they carry is never read, no substance is synthesized and they have no function at all. We exist on only 3% of our DNA.

The junk genes merely enjoy the ride with hard working active genes, passed from generation to generation. What are they? How come these idle genes are in our genome? Those were the question many scientists posed and failed to answer – until the breakthrough discovery by Prof. Sam Chang and his group.

Trying to understand the origins and meaning of junk DNA Prof. Chang realized that he first needs a definition of “junk”. Is junk DNA really junk, (useless and meaningless) or it contains some information not claimed by the rest of DNA for whatever reason? He once mentioned the question to an acquaintance, Dr. Lipshutz, a young theoretical physicist turned Wall Street derivative securities specialist. “Easy,” replied Lipshutz. “We’ll run your sequence through the software I use to analyze market data, and it will show if your sequences are total garbage, “white noise”, or there is a message in there.” This new breed of analysts with strong background in math, physics and statistics are getting more and more popular with Wall Street firms. They sift through gigabytes of market statistics, trying to uncover useful correlation between the various market indexes, and individual stocks.

Working evenings and weekends, Lipshutz managed to show that non-coding sequences are not all junk, they carry information. Combining massive database of the Human Genome Project with thousands of data files developed by geneticists all over the world Lipshutz calculated Kolmogorov entropy of the non-coding sequences and compared it with the entropy of regular, active genes. Kolmogorov entropy, introduced by the famous Russian mathematician half a century ago, was successfully used to quantify the level of randomness in various sequences, from time sequences of noise in radio lamps to sequences of letters in 19th century Russian poetry. By and large, the technique allows researchers to quantitatively compare various sequences and conclude which one carries more information than the other does. “To my surprise, the entropy of coding and non-coding DNA sequences was not that different”, continues Lipshutz. “There was noise in both but it was no junk at all. If the market data were that orderly, I would have already retired.”

After a year of cooperation with Lipshutz, Chang was convinced, there is a hidden information in junk DNA. However, how could one understand its meaning if the information is never used? With active sequences you try to watch the cell and see what proteins are being made using the information. This wouldn’t work with dormant genes. There will be experiment to test a hypothesis; one should rely on the power of his thought. Since there are letters, it should be tested in some old languages, perhaps Sumerian, Egyptian, Hebrew, and so on. Prof. Sam Chang solicited help from three specialists in the field, but none of them managed to find a solution. There were no cultural clues, no references to other known languages, the field was too alien for the linguists.

“I asked myself: who else can decipher a hidden message?” Chang continues. “Of course, cryptographers! In addition, I began talking with researchers at the National Security Agency. It took me few months to make them return my calls. Were they running background checks on me? Alternatively, were they too busy lobbying senators on retaining and strengthening their authority to control exports of encryption technologies? Eventually, a junior fellow was assigned to answer my questions. He listened, requested my questions in writing and after another, few months turned me down. His message was polite but meant, “Go to hell with your crazy ideas. We are a serious agency, its National Security, dude. We are too busy.”

Well, Sam, forget the Government, talk to the private sector. Therefore, I began approaching computer security consultants. They were genuinely interested, and a couple of them even began working on my project, but their enthusiasm always faded after a month. I kept calling them until one nice fellow told me: “I’d love to work on your project if I had more time. I am overbooked. Emissaries of major banks and Fortune 500 companies are begging me to plumb the holes in their networks. They pay me $500 an hour. I can give you an educational discount, can you afford $350?” Scrambling $15/hr for a post doctoral studies is a big deal in academia, $350 sounded as something extraorbital.” Eventually Prof. Chang was referred to Dr. Adnan Mussaelian, a talented cryptographer in the former Soviet republic of Armenia. Poor fellow barely survived on a $15 a month salary and occasional fees for tutoring children of Armenian nuveau riches. A $10,000 research grant was a struck of luck, he began working like a beaver.

Adnan promptly confirmed the findings of his Wall Street predecessor: The entropy indicated tons of information almost in the clear, it was not too strong cryptographic system, it didn’t appear to be a tough problem. Adnan began applying differential cryptoanalysis and similar standard cryptographic techniques.

He was two months in the project when he noticed that all non-coding sequences are usually preceded by one short DNA sequence. A very similar sequence usually followed the junk. These segments, known to biologists as alu sequences, were all over the whole human genome. Being non-coding, junk sequences themselves, alu are one of the most common genes of all.

Trained as a cryptographer and computer programmer, and having no knowledge of microbiology, Adnan approached the genetic code as of computer code. Dealing with 0, 1, 2, 3 (four bases of genetic code) instead of 0s and 1s of the binary code was a sort of nuisance, but the computer code was what he was analyzing and deciphering all his life. He was on familiar territory. The most common symbol in the code that causes no action followed by a chunk of dormant code. What is that? Just playing with the analogy Adnan grabbed the source code of one his programs and fed it into the program that calculates the statistics of symbols and short sequences, a tool often used in decoding messages. What was the most common symbol? Of course, it was “/”, a symbol of comment! He took a Pascal code, and it were { and } ! Of course, the code between two slashes in C is never executed, and is never meant to be executed; it is not the code, it is the comment to the code!

Being unable to resist the temptation to further play with the analogy, Adnan began comparing statistical distributions of the comments in computer and genetic code. There must be a striking difference. This should show up in statistics. Nevertheless, statistically, junk DNA was not much different from active, coding sequences. To be sure, Adnan fed a program into the analyzer: surprisingly, the statistics of code and comments were almost the same. He looked into the source code and realized why: there were very few comments in between the slashes, it was mostly C code the author decided to exclude from execution, a common practice among programmers.

Adnan, religiously inclined person, was thinking about the divine hand – but after analyzing the spaghetti code inside the sequences he convinced himself that whoever wrote the small code was not God. Who wrote the active, small coding part of human genetic code was not very well organized, he was a rather sloppy programmer. It looked like rather somebody from Microsoft, but at the time human genetic code was written, there was no Microsoft on Earth.

On Earth? It was like a lightning… Was the genetic code for all life on Earth written by an extraterrestrial programmer and then somehow deposited here, for execution? The idea was mad and frightening, and Adnan resisted it for days. Then he decided to proceed. If the non-coding sequences are parts of the program that were rejected or abandoned by the author, there is a way to make them work. The only thing one needs to do is to remove the symbols of comments and if the portion between the /*……*/ symbols is a meaningful routine it may compile and execute! Following this line of thought, Adnan selected only those non-coding sequences that had exactly the same frequency distribution of symbols as the active genes. This procedure excluded the comments in Marcian or Q, whatever it was. He selected some 200 non-coding sequences that most closely resembled real genes, stripped them of /*, //, and similar stuff and after few days of hesitation sent e-mail to his American boss, asking him to find a way to put them in E-coli or whatever host and make them work.

Chang did not replied for two weeks. “I thought I was fired”, confessed Dr. Mussaelian. “With every day of his silence I more and more realized how crazy my idea was. Chang would conclude I was a schizophrenic and would terminate the contract. Chang finally responded and, to my surprise, he did not fire me. He had not bought my extraterrestrial theory but agreed to try to make my sequences work.”

Biologists have attempted for years to make junk sequences express, without much success. Sometimes nothing turned out; sometimes it was junk again. It was not surprising. Grab an arbitrary portion of the excluded computer code and try to compile it. Most likely, it will fail. At best, it will produce bizarre results. Analyze the code carefully, fish out a whole function from the comments, and you may make it work. Because of careful Mussaelian’s statistical analysis 4 of the 200 sequences he selected, began working, producing tiny amounts of a chemical compounds.

“I was anxiously awaiting the response from Chang,” says Dr. Mussaelian. “Would it be a more or less normal protein or something out of ordinary? The answer was shocking: it was a substance, known to be produced by several types of leukemia in men and animals. Surprisingly, three other sequences also produced cancer-related chemicals. It no longer looked like a coincidence. When one awakens a viable dormant gene, it produces cancer-related proteins. Researchers began searching Human Genome Project databases for the four genes they isolated from junk DNA. Eventually, three of the four were found there, listed as active, non-junk genes. This was not a big surprise: since cancer tissues produce the protein, there must be somewhere a gene, which codes it! The surprise came later: In the active, non-junk portion of the code the gene in question (the researchers called it “jhlg1”, for junk human leukemia gene) was not preceded by the alu sequence, i.e. the /* symbol was missing. However, the closing */ symbol at the end of “jhlg1” was there. This explained why “jhlg1” was not expressed in the depth of the junk DNA but worked fine in the normal, active part of the genome. The one who wrote the basic genetic code for humans excluded portion of the big code by embracing them in /*… */ but missed some of the opening /* symbol. His compiler seems to be garbage, too: a good compiler, even from terrestrial Microsoft, would most likely refuse to compile such program at all.

Prof. Sam Chang with his students began searching for genes associated with various cancers, and almost in all instances they discovered that those genes are followed by the alu sequence (i.e. protein as a comment closing symbol */), but never preceded by the comment opening /* gene! “This explains why diseases result in cell damage and their death, whereas cancers lead to cell reproduction and growth. Because only few fragments from the big code are expressed, they never lead to coherent growth. What we get with cancer, is expression of only few of genes alien to humans and symbiosis with some genes of bacterial parasites that lead to illogical, bizarre and apparently meaningless chunks of living cells. The chunks have its own veins, arteries, and its own immune system that vigorously resists all our anti-cancer drugs.

“Our hypothesis is that a higher extraterrestrial life form was engaged in creating new life and planting it on various planets. Earth is just one of them. Perhaps, after programming, our creators grow us the same way we grow bacteria in Petri dishes. We can’t know their motives – whether it was a scientific experiment, or a way of preparing new planets for colonization, or is it long time ongoing business of seedling life in the universe. If we think about it in our human terms, the extraterrestrial programmers were most probably working on one big code consisting of several projects, and the projects should have produced various life forms for various planets. They have been also trying various solutions. They wrote the big code, executed it, did not like some function, changed them or added new one, executed again, made more improvements, tried again and again. Of course, soon or later it was behind schedule. Few deadlines have already passed. Then the management began pressing for an immediate release. The programmers were ordered to cut all their idealistic plans for the future and concentrate now on one (Earth) project to meet the pressing deadline. Very likely in a rush, the programmers cut down drastically the big code and delivered basic program intended for Earth. However, at that time they were (perhaps) not quite certain which functions of the big code may be needed later and which not, so they kept them all there. Instead of cleaning the basic program by deleting all the lines of the big code, they converted them into comments, and in the rush they missed few /* symbols in the comments here or there; thus presenting mankind with illogical growth of mass of cells we know as cancer.”

There are three options to the problem. Either delete all the /* symbols and comments and clean this way the basic code, or add all the missing */ and avoid illogical mixing of the basic code with the big code. Alternatively, in the third option, remove all the / symbols and let work the basic code with the big code as a complete program. Unfortunately, none of these options are within our capacity. If we were able to efficiently insert genes into the chromosomes of living men, our breakthrough discovery would mean instant cure for all future cancer cases; at least from the programmer point of view. Theoretically, we can do it in a laboratory, but we have no practical means to implant the repaired DNA into living subjects. The mystery of “junk DNA” and cancer seems to be solved, but no quick cure shall be expected. The best thing we can do now is to try nourishing new, cancer-free line of humans with gradually debugged basic genetic code. That will take a long time. For us and our children, there is no hope on the horizon.

“However, from the programmer’s point of view, there is also positive outlook in it. What we see in our DNA is a program consisting of two versions, a big code and basic code. First fact is, the complete program was positively not written on Earth; that is now a verified fact. The second fact is, that genes by themselves are not enough to explain evolution; there must be something more in the game. What it is or where it is, we don’t kow. The third fact is, no creator of a new work, be it a composer, engineer or programmer, from Mars or Microsoft, will ever leave his work without the option for improvement or upgrade. Ingenious here is, that the upgrade is already enclosed – the “junk DNA” is nothing more than hidden and dormant upgrade of our basic code! We know for some time that certain cosmic rays have power to modify DNA. With this in mind, plausible solution is available. The extraterrestrial programmers may use just one flash of the right energy from somewhere in the Universe to instruct the basic code to remove all the /*…*/ symbols, fuse itself with the big code (“junk DNA”) and jumpstart working of our whole DNA. That would change us forever, some of us within months, some of us within generations. The change would be not too much physical, (except no more cancers, diseases and short life), but it will catapult us intellectually. Suddenly, we will be in time comparable to coexistence of Neanderthals with Cromagnons. The old will be replaced giving birth to a new cycle. The complete program is elegant, very clever self-organizing, auto-executing, auto-developing and auto-correcting software for a highly advanced biological computer with build-in connection to the ageless energy and wisdom of the Universe. Software wise, within us is either short and diseased life, or potential for a super-intelligent super-being with a long and healthy life. This triggers puzzling questions – was the reduction to the basic code done by sloppy programmers in a rush (as it appears to us), or was the disabling of the big code purposeful act which can be cancelled by a “remote control” whenever desired?”

Soon or later, we have to come to grips with the unbelievable notion that every life on Earth carries genetic code for his extraterrestrial cousin and that evolution is not what we think it is. This discovery may well shake the very roots of humanity – our beliefs in our concept of God and in our own power over our destiny. With the right paradigm, we may discover one day that all forms of life and the whole Universe is just one huge intellectual exercise in thoughts expressed mathematically, by Design, by Creator”

Bulgarian Academy Scientists Reported to Be in Touch with Aliens

Bulgarian Academy Scientists Reported to Be in Touch with Aliens

Scientists from the Space Research Institute of the Bulgarian Academy of Sciences (BAS) have been reported to be in touch with extraterrestrial beings.

The Bulgarian Novinar Daily has reported that the Bulgarian scientists are currently working on deciphering pictograms which are said to have come in the form of the so called “crop circles” with which the aliens answered 30 questions posed by the BAS researchers.

“They are currently all around us, and are watching us all the time. They are not hostile towards us; rather, they want to help us but we have not grown enough in order to establish direct contact with them. They are ready to help us but we don’t know what to request from them in case of contact,” said Lachezar Filipov, Deputy Director of the Space Research Institute of the Bulgarian Academy of Sciences, as quoted by the Novinar Daily.

Filipov has said that even the Vatican had agreed that aliens existed. In his words, the humans are not going to be able to establish contact with the extraterrestrials through radio waves but through the power of thought.

He has stated that the human race was certainly going to have direct contact with the aliens in the next 10-15 years.

The deputy head of the Bulgarian Space Research Institute has also told the Novinar Daily that the extraterrestrials were critical of the people’s amoral behavior referring to the humans’ interference in nature’s processes.

Filipov’s team is reported to be analyzing the 150 new crop circles which appeared around the globe in the past year.

The publication of the Novinar Daily about the BAS researchers communicating with aliens comes in the midst of a controversy over the role, feasibility, and reform of the Bulgarian Academy of Sciences, which last week even led to the exchange of offensive remarks between Bulgaria’s Finance Minister, Simeon Djankov, and President Georgi Parvanov.

 

http://novinite.com/view_news.php?id=110282