Saturday, August 10, 2013

About the recent nuke in Syria

A digital camera will definitely survive filming a nuclear blast. The "EMP destroys everything" line is nothing but a myth

""The movie "the day after" even shows 1970's cars grinding to a halt, and they had no computers or advanced circuits in them. This proves the entire plot was a lie because the cars of the 70's were identical to the cars of the 50's, and in the 1950's people would drive out to Nevada and watch the nuclear tests for entertainment. If EMP was so horrible, none would have been able to drive home afterward." It is my opinion that the fireball from the recent explosion in Syria was far too big and persisted too long to be from any conventional source, no matter how it was set off. Since Israel is a proven nuclear rogue, I have no doubt they have nuked Syria multiple times already. And nukes are not the end of the world.
My guess is small nuke, and any stories about it not being a nuke because the EMP would have destroyed the camera are B.S., I have done all the calculations for nuclear EMP against electronic devices, and when it comes to things the size of the camera, FORGET IT, EMP will not do anything at all. The camera has too small of a cross section to couple even partially with frequencies below 500 mhz.
Nuclear EMP happens between 1 and 20 Mhz depending on the bomb, and to couple effectively with something as small as the circuits in a camera, the frequency of the EMP would have to be up in the 1 Ghz range. EMP is nothing but a radio frequency pulse and if your device does not make a suitable antenna, it won't pick up the EMP, it will just shrug it off. I know I am going to get backlash for saying this, but there is a lot of proof that this is true out there already. When North Korea tested it's nukes, it was completely in the digital age. Same is true with China, India, Pakistan and to some degree even France. None of those nukes destroyed anything digital or transistorized. Though it is true that an ionospheric detonation would wreak havoc with satellites and the power grid, ground bursts do virtually nothing at all to electronics and the proof of this is overwhelming. The nuclear EMP myth is nothing but a psy op.
The terror flick "The Day After" has as a main feature ALL the cars dying due to their electrical systems getting blown out and sitting dead on the highway. A laughable myth with so much proof against it it's a wonder that movie was able to make the EMP myth take hold. Cars will shrug off nuclear EMP entirely. When EMP was an issue it was only a small issue and we were using old antiquated stuff based on large circuits with a large cross section. Miniaturization made the devices too small to couple with such a low frequency and on top of that, ALL digital circuits nowadays have protection diodes across all pins of all the chips, so there is no way to over voltage them absent hooking them up to a large power supply with too high a voltage and letting them fry over time, or subjecting them to extremely intense GHZ frequencies similar to putting them in a microwave oven. Since EMP takes place in a few microseconds, there would not be enough time to fry the protection diodes even if a device did pick up the EMP. These diodes, which are there to protect the chips from static discharge, are manufactured into all static sensitive devices, the same devices that could be damaged by EMP. 20 years ago it might have been possible to blow out unprotected Cmos circuits but nowadays EVERYTHING ships with extremely hardened circuits to prevent static damage, and the protection diodes will stop a voltage spike from EMP the same way they stop static. This leaves unsaid the fact that small devices can't pick up nuclear EMP anyway.

The terror flick "the day after" came out of Hollywood, and is a load of B.S. The math does not support what happened in the movie, and neither does history. Remember, out of all the Nevada nuclear tests in America, not a single car ignition system was blown up, NOT A THING AT ALL except an old mechanical rotary multiplexer at a phone company with long lines the signal could couple with and that type of phone switch had to be rebuilt monthly as a matter of course anyway.

The day after even shows 1970's cars grinding to a halt, and they had no computers or advanced circuits in them. This proves the entire plot was a lie because the cars of the 70's were identical to the cars of the 50's, and in the 1950's people would drive out to Nevada and watch the nuclear tests for entertainment. If EMP was so horrible, none would have been able to drive home afterward. The ignition coils and distributors were IDENTICAL to what "the day after" portrayed. I have friends who drove out the the Nevada tests, and they said the tests were all announced and many many people would drive out into the desert to watch. No one's cars were wrecked absent Bubba drinking too much alcohol. The nuclear EMP scare is being kept in place so that at the right time, on cue, all the computers which have Intel processors can have the CoreVpro technology tell the CPU to self destruct when given the command from the cell phone system, and all the cars which have an always on cell connection right from the control computer can be deactivated and rendered dead via the same cell system. There is such ignorance about EMP nowadays that all they have to do is say a nuke blew everything up, and it's bye bye computers, bye bye cars just with a command sent from the cell phone system. THAT would certainly stop a rebellion, would it not?
I am certain we are going to now be treated to a large number of armageddon style blasts because Israel has no conscience and there are tons of Iphones out there. Don't let anyone fool you and make you believe a nuclear blast can't be captured by a digital camera without wrecking it and when one survives to tell the story, remember that it is possible. Don't believe a nuclear blast cannot be witnessed by people without permanently blinding them, because people drove out to Nevada to watch the detonations for entertainment back in the 50's. If you don't understand or believe why nuclear EMP can't kill a laptop or a camera if you are far enough away to survive the blast yourself, learn a little math and focus your efforts on radio propagation and antenna systems. Don't allow the nuclear fear mongering "experts" to raise your expectations of what a nuke can do to otherworldly levels, yes, they are bad but when reality is the issue a little math can go a long way.           http://jimstonefreelance.com/index.html

EU among priority spy targets for NSA - report

Эдвард Сноуден шпион Цру CIA Призма Призм Prism слежка шпионаж США

The European Union is ranked as a key priority in a list of spying targets for the US National Security Agency, German weekly Der Spiegel said Saturday, citing a document leaked by former intelligence contractor Edward Snowden.

The classified document, dated April 2013, states that the US secret services are especially interested in gathering intelligence concerning the 28-member bloc's foreign policy, international trade, and economic stability, the magazine reported.
Using a ranking system from one to five (from high to low importance), those three areas were given a number three ranking, according to the document seen by Der Spiegel.
Topics related to new technology and energy security were assigned the lowest-level priority.
Among individual countries, Washington reportedly listed China, Russia, Iran, Pakistan and North Korea among its top surveillance targets.
Germany, France and Japan were considered of mid-level interest, the weekly added.
The latest revelations appear to back up earlier NSA documents released by Snowden that claimed that Washington was snooping on EU offices in Brussels and in the States, sparking outrage among European countries, Der Spiegel said.
Snowden's leaks in recent weeks, which have revealed that the US is systematically seizing vast amounts of telephone and online data around the world, have proved a major headache for Washington and even threatened to derail a huge US-EU trade deal.
US President Barack Obama has scrambled to reassure allies and American citizens about the extent of the spying.On Friday he pledged to overhaul US secret surveillance, promising greater oversight and transparency.
Snowden, who is wanted by the US on espionage charges, was granted temporary asylum in Russia earlier this month, a move that so angered Obama that he cancelled an upcoming high-profile meeting with President Vladimir Putin.

Obama pledges more transparency after surveillance uproar - News - World - The Voice of Russia: News, Breaking news, Politics, Economics, Business, Russia, International current events, Expert opinion, podcasts, Video

Obama pledges more transparency after surveillance uproar - News - World - The Voice of Russia: News, Breaking news, Politics, Economics, Business, Russia, International current events, Expert opinion, podcasts, Video

Majority Of Americans Think Obamacare Is A “Joke”

Kristin Tate

A new poll reveals that a majority of Americans think that Obamacare is a “joke.”
Shocking.
Despite an endless stream of tax dollars to support Obamacare propaganda, and years of forcing it down our throats, most Americans still aren’t buying it.
As reported by Fox News:
Majorities of Americans think the new health care law is going to increase their medical costs and their taxes — and add to the federal deficit as well. Those are some of the reasons why voters say — by a two-to-one margin — that Congress should keep working on the law.
A Fox News national poll released Thursday also asks voters about how they think Obamacare is being carried out: 31 percent say “it’s going fine,” yet a 57-percent majority feels “it’s a joke.”
Republicans are more than three times as likely to say it’s a joke (87 percent vs. 25 percent). Still, a quarter of Democrats agree.
Nine times as many Democrats as Republicans say implementation of Obamacare is going fine (63 percent vs. 7 percent).
We’ve been saying Obamacare is a joke for years. Seems like the general public is smartening up to that fact, too.
The sad reality, however, is that Obamacare is not likely to be overturned.

Fukushima. The water has officially topped the barrier and freely flowing into the Pacific



TEPCO had said a few days ago that the radioactive water being held by a barrier could top that barrier within 3 weeks and once it did it would flow fast and freely into the Pacific Ocean.

Well, it didn't take 3 weeks but only 3 days for that to happen.

TEPCO announced that the water has now officially topped the barrier that was holding it back.  They have no idea what to do and there is no containing the toxic flow of radioactivity into the Pacific.
Contaminated groundwater accumulating under the crippled Fukushima nuclear power plant has risen 60cm above the protective barrier, and is now freely leaking into the Pacific Ocean, the plant’s operator TEPCO has admitted.
The Tokyo Electric Power Company (TEPCO), which is responsible for decommissioning the damaged Fukushima Daiichi nuclear plant, on Saturday said the protective barriers that were installed to prevent the flow of toxic water into the ocean are no longer coping with the groundwater levels.
The contaminated groundwater, which mixes with radioactive leaks seeping out of the plant, has already risen to 60cm above the barriers – the fact which TEPCO calls a major cause of the massive daily leak of toxic substances. 

This is so sad and this is not something that can just be cleaned up.  Our oceans are the Earth's life blood and ours too.  The oceans create oxygen for us.

I will say over and over again!  SHUT DOWN EVERY NUCLEAR POWER PLANT IN THE WORLD!  IT IS THE MOST TOXIC AND UNCLEAN FORM OF ENERGY THERE IS!

Now all the ocean's marine life will die from radioactivity at some point.  Will we have 100 foot long whales and sharks?

Why aren't we hearing from governments around the world calling for radioactive testing of seafood from the Pacific?  Why aren't we hearing governments calling for radioactive testing of products from Japan?

Oh, right...... they made agreements not to do that.  Hillary specifically signed an agreement with Japan not to test any food or products coming from there.

I wonder..... if we sent Obama, Clinton, Biden, Holden and the rest of that gang some salmon and Blue fin Tuna from the shores of Japan if they would eat those gifts from us?  Or...would they have their food tested?

We really should all send seafood to those in D.C. and all of our elected officials and make them eat it.

Our Earth is being killed and those at the top are the parasites who have made the Earth toxic through greed.  The truth is there has been real alternative energies known for decades by those at the top, but they have kept them away for money and power.  The oil and energy companies have not wanted people to have "free" energy.  This way they control all.  Now what have they done?  They have and are killing the Earth from Greed, pure and simple?

 I wonder if those who control it all are happy?  Does billions/Trillions make you happy?   Does the money make you happy? Does seeing the Earth die and the animals upon it die due your greed make you happy?  When the Earth dies and you can not eat any of the food from the ocean nor land, where will be your control, money and happiness?

All my life, even when I was a kid I wondered how those at the top were "short sighted" and did not think about the future of the Earth and people when it came to hearing about different news and the "bottom line" at that moment.

A Place where EVERY week is “Shark Week”

A Place where EVERY week is “Shark Week”

America’s Nero

America’s Nero

Sensors Report Gunfire Directly to Police in 70 U.S. Cities, No 911 Call Needed

Source: Singularity Hub
As Americans use digital methods for more of their interpersonal communications, law enforcement agencies have seized the opportunity to scoop up more information for cheaper than they could before, hoping to ferret out criminal activity. But violent crime still takes place in the physical world, with fragile human bodies on the line. A growing number of U.S. police departments are using a system of sound-detecting software to locate and respond to gunfire in hopes of catching more shooters and saving more victims.
ShotSpotter, the dominant gunfire detection technology on the market, gathers data from a network of acoustic sensors placed at 30-foot elevation under a mile apart. To cut costs, most cities use the sensors only in selected areas. The system filters the data through an algorithm that isolates the sound of gunfire. If shots are fired anywhere in the coverage area, the software triangulates their location to within about 10 feet and reports the activity to the police dispatcher. The system is generally more accurate and more reliable than would-be 911 callers, in part because in the worst neighborhoods, residents don’t even bother to report gunshots.
gun-firingRoughly 70 U.S. cities currently use ShotSpotter, which is made by the Newark, Calif., company SST. More police departments began subscribing to ShotSpotter after the company launched in 2011 a cloud-hosting platform that made the system more affordable for small and mid-size cities.
Last month, SST began using the data its systems collect nationally to publish a quarterly index of gun activity in the United States. The index is based on data from a statistically representative set of about 120 square miles in just over 30 cities that use ShotSpotter. SST hopes the information will support the government’s rekindled interest — in the wake of the Newton, Conn., shootings — in research on gun violence. Of course, the index is also a clever marketing effort, emphasizing just how much the old human methods of reporting gun violence don’t tell us about gun use.
Currently, data on gun violence comes primarily from three main sources: 911 calls, mandatory reports hospitals file when they treat gunshot victims, and coroner reports on homicides or suicides involving guns. Such methods don’t document shots fired to scare people or kill animals. They also overlook, for example, gun battles in which bystanders don’t call police and victims seek to evade police attention by doctoring wounds themselves. All told, less than 20 percent of gunshots result in a 911 call, according to SST.
“Gun violence is significantly under reported — and misreported — at the very moment this critical epidemic needs precise and reliable data from a research perspective,” said SST CEO Ralph Clark.
sst-infographicSST’s data at least partially explains why more people don’t report gunfire to authorities. In the most active city in its index, an area covering a single square mile experienced 2,858 bullets fired in a three-month period. That’s 32 rounds fired every day. (The locations of the events included in the index are not identified.)
Another interesting nugget: Celebratory gunfire isn’t unique to foreign countries. In the United States, gunfire on New Year’s Day made up nearly half of all gunshots in January.
Sadly, gunfire increased in the United States in the second quarter of this year. The number of incidents recorded in the second quarter was nearly 50 percent higher than those in the first quarter. The trend included not just the most violent cities but also more moderate ones.
ShotSpotter adds to the nationwide trend toward data-driven policing, epitomized by the CompStat system introduced in New York City in the mid-1990s. Law enforcement officers see data as a way to help them allocate resources effectively.
“Today’s most effective policing strategies combine proven practices and tactics with new data and intelligence. When you consider the tragic consequences of gun violence, it’s critical that law enforcement professionals have all of the information available to more effectively deploy resources in high crime areas,” Boston Police Commissioner Edward F. Davis said in an SST press release.
firecrackersBut critics have pointed to problems with the technology and ShotSpotter has met with some resistance in many of the cities that now use it.
Some are frustrated that, given the steep cost of the system, it doesn’t always successfully differentiate the sounds of guns firing from those of cars backfiring or firecrackers exploding. A San Francisco Police Department spokesman told Singularity Hub the system has trouble with fireworks, and a recent audit in Suffolk County, New York found similar problems.
Some also fear the police will use the technology selectively, spurring more arrests in some neighborhoods than in others.
“Part of the problem with law enforcement technology is that you want to put it in the place where there’s hot crime. So you’re listening in on some neighborhoods more than others, but you want to deploy resources where there’s the most crime. This is a question for police departments more generally that goes beyond just this technology,” Sarah Lawrence, the director of policy analysis at the Warren Institute at Berkeley law school, told Singularity Hub.
But because ShotSpotter’s sensors only pick up gunfire and the occasional firecracker, not conversation, the technology doesn’t seem to raise hackles as much as license plate scanners and video cameras do. Still, city residents will likely form more informed opinions of the technology as their local police departments get used to it, using it not just to dispatch officers more quickly to potential crime scenes, but also to identify and prosecute the perpetrators.
ShotSpotter has already been used as evidence in hundreds of criminal cases and has helped secure at least one murder conviction, according to SST.

EMF exposures destroy health and well-being, claims panel of top international scientists

EMF exposures destroy health and well-being, claims panel of top international scientists

NY County officials use body parts of dead citizen for police dog training

NY County officials use body parts of dead citizen for police dog training

New Obama Disclosure Block

4224165851_b9f005dbc8
Washington’s hunger to know everything about its citizens seems to be matched only by its reticence in revealing its own activities to its citizens.
This was true of George W. Bush, and it is no less true of his successor, Barack Obama. At first, Obama promised reform. As a candidate, he criticized the Bush administration’s “none of your business” approach toward public inquiries into government decisions. And as a new president, Obama proposed to dramatically open up the process and to let transparency be the norm.
Yet, as his “information czar,” Obama chose his friend Cass Sunstein—a Harvard professor who seemed less interested in fostering debate than in suppressing it. In fact, while in academia, Sunstein had  written a controversial paper calling for government agents to “cognitively infiltrate” Internet chat rooms to discourage speculation about “conspiracies.”
One consequence of this desire to discourage dark thoughts about power is seen in the Obama Administration’s foot-dragging on the release of JFK assassination records in the months and years approaching  the 50th anniversary of that event. The Obama administration even put a CIA person with ties to that agency’s disastrous 9/11 intelligence in charge of the overall document declassification process.
At WhoWhatWhy, we wrote on several occasions about Sunstein and the Orwellian double sword of a disclosure mandate that worked against disclosure. Sunstein attracted his share of criticism, and in the summer of 2012, as Obama was trying to rally his base for the re-election campaign, the “czar” quietly left the administration. But even with Sunstein gone, the Administration continues to delay declassifying key JFK assassination documents.
But there is more.
The latest move to prevent us from knowing what is going on relates to so-called transparency policies whose fine print instead does the opposite—by effectively blunting the stated intent of the regulations.
Meet “The Mosaic Effect”
The new policy is presented as an entirely forward-looking one. Government agencies are ordered to make life easier for those seeking federal data, by releasing it in a form that makes it easier to analyze it. And that, of course, sounds great.
But buried in the middle of a section on “definitions” is something that most might miss—and that might turn out to be the real purpose of the new policy. It reminds us of how vigilant you need to be in reading notices from all manner of institutions—whether your bank or your power company—on changed terms and conditions.
The suspect phrase refers to something called “the mosaic effect.” Government officials are told that they must consider this “effect” when deciding what to release and what to withhold.
The mosaic effect occurs when the information in an individual dataset, in isolation, may not pose a risk of identifying an individual (or threatening some other important interest such as security), but when combined with other available information, could pose such risk.
Before disclosing potential personally identifiable information (PII) or other potentially sensitive information, agencies must consider other publicly available data – in any medium and from any source – to determine whether some combination of existing data and the data intended to be publicly released could allow for the identification of an individual or pose another security concern.”
Get Those Black Markers Out
Is this an ominous development? You bet your black marker.
Have you ever seen documents released in redacted form, i.e., with certain names blocked out? Well, under the new rules, someone inside the government could argue that certain documents ought not to be released because someone outside the government, using other information sources, could put two and two together and figure out the information that was blocked out.
The result? Documents that were previously released, either in full or in redacted form, might now never see the light of day.
Let’s imagine that, say, the government’s failure to release documents related to the JFK assassination rouses public anger to such a pitch that media pressure (this really takes imagination) finally forces the government to consider opening up the fifty-year-old files to public scrutiny, with names and other identifying info blacked out, purportedly to protect “sources and methods” from half a century ago.
But wait — under the newly articulated Mosaic Doctrine, if there is even the remotest chance that some enterprising citizen or sleuth could use the unredacted material, along with other information already available, to figure out some of those names, a bureaucrat could simply withhold all the information.
Indeed, government officials could pretty much withhold anything they wanted to.
Is this progress? Are we glad that the forces of “change” are now in charge?
Not so much.
The Homeland Security Mosaic
This latest development came to our attention via the IRE Journal, the magazine of the national organization Investigative Reporters and Editors, of which WhoWhatWhy is a member. (That article is not linkable.)
But what the fine article in the IRE Journal did not point out is who exactly is behind this little clause—and what it might actually be about. The people nominally in charge of transparency are the folks at the Office of Information and Regulatory Affairs, which is part of the White House’s Office of Management and Budget. But was this clause their idea?
The answer can be teased out of the following paper, which we found at Data.Gov, an official government site whose motto is “empowering people”.
The title of the paper is “National/Homeland Security and Privacy/Confidentiality Checklist and Guidance,” and the key paragraphs are:
The Open Government Initiative Privacy and Security Working Group (“Working Group”) is an interagency group led by the National Security Staff. The Working Group is composed of Executive Branch agencies with specialization in the security and privacy realms. It developed the screening procedures outlined in this document to help reduce the risk associated with the mosaic effect, in which datasets that pose no disclosure threat by themselves can create a national/homeland security concern or produce identifiable information when combined with other datasets. This is of particular concern for datasets available in formats that are conducive to mash-ups, as are the datasets at sites such as Data.gov.
The Working Group will continue to evaluate, and where appropriate, enhance Federal data dissemination guidelines to guard against intentional and unintentional unmasking of sensitive or personally identifiable information and/or national/homeland security-sensitive information. As additional opportunities to enhance policies and procedures for evaluating datasets for mosaic effect concerns are developed, agency training will be provided.
What is the possibility that the same agencies which are increasingly conducting surveillance of American citizens are sympathetic to our privacy concerns? That these agencies want to urge caution in the release of documents so that the public is protected?
Isn’t it more likely that they would act instead in a way consistent with defending their own interests, as demonstrated over not just years but decades? That is, collect as much information as possible, and tell the public as little as possible.
We’ve been asked for an awfully long time to accept on faith that these people are looking out for our safety. But when the end of the Cold War brought no more transparency to Washington’s behavior, thoughtful folks began to wonder. Two decades later, the question remains: whose interests, really, are being protected under the current system?
***
To get some answers, I did what every concerned citizen in an open democracy is free to do: I called Washington. I spoke to a fellow named Jamal at the Office of Management and Budget, who suggested I send an email. So I did:
To: FN-OMB-Communications Office
Subject: Media Inquiry
Jamal,
I wonder if someone can speak to me—phone or email—about information policy? I’m particularly interested in administration guidelines mandating that governmental agencies release data in a form that is easily usable by the public and media. Am also interested in learning more about the Open Government Initiative Privacy and Security Working Group.
Best,
Russ Baker
Editor-in-Chief, WhoWhatWhy
To this, I got the following super fast reply from another staffer, named Ari:
Hi Russ,
Warm regards,
Ari
This pretty much blew my mind, because Ari was using the journalistic term “on background”—which typically refers to confidential material being provided to journalists in return for their not identifying the source. But here Ari was invoking it for links to publicly available material. I wrote Ari back, asking him if this was some kind of joke.
He wrote me right back, not to address my question, but to ask me how he might help.
Hi Russ – if you have specific questions that aren’t addressed by the policies on those pages, feel free to send them over. Thanks !
I replied to ask whose idea it was to frame the “mosaic effect.”
That was July 25. And I have not heard back.

Connections Between Michael Hastings, Edward Snowden and Barrett Brown—The War With the Security State

Connections Between Michael Hastings, Edward Snowden and Barrett Brown—The War With the Security State
Posted By Christian Stork On August 7, 2013 @ 7:00 am In Civil Liberty,Quick Takes |
hacker
At the time of his death in a mysterious one-car crash and explosion, journalist Michael Hastings was researching a story that threatened to expose powerful entities and government-connected figures. That story intersected with the work of two controversial government critics—the hacker Barrett Brown and the on-the-run surveillance whistleblower Edward Snowden.
Any probe into Hastings’s untimely death needs to take into account this complex but essential background.
But First, the Raw Facts
A little over 12 hours before his car was incinerated on an LA straightaway on June 18, 2013, Hastings sent out a short email headed, “FBI Investigation, re: NSA.” In it, he said that the FBI had been interviewing his “close friends and associates,” and advised the recipients — including colleagues at the website Buzzfeed — “[It] may be wise to immediately request legal counsel before any conversations or interviews about our news-gathering practices or related journalism issues.” He added, “I’m onto a big story, and need to go off the radat [sic] for a bit.”
From: Michael Hastings
Date: Mon, Jun 17, 2013 at 12:56 PM
Subject: FBI Investigation, re: NSA
To: [REDACTED] [REDACTED] [REDACTED]
Hey [5 REDACTED WORDS] the Feds are interviewing my “close friends and associates.” Perhaps if the authorities arrive “Buzzfeed GQ”, er HQ, may be wise to immediately request legal counsel before any conversations or interviews about our news-gathering practices or related journalism issues.
Also: I’m onto a big story, and need to go off the radat for a bit.
All the best, and hope to see you all soon.
Michael
The next day, Hastings went “off the radar” permanently.
Here is a video that shows a lateral view of Hastings’s speeding [1] car just before it crashed.  (It shows at about 0.07.)
Following publication [2] of the email by KTLA, the FBI quickly denied [3] that the Bureau was ever investigating Hastings.
The Freedom of the Press Foundation and ProjectPM — the research wiki that Brown was involved with — are in the process of filing Freedom of Information Act (FOIA) requests to learn if indeed Hastings was the subject of an FBI probe.
The FBI denial notwithstanding, a number of clues indicate that the proximity of Hastings to Brown and the work of ProjectPM may have been what spawned the purported investigation in the first place.
Deep Background
When the FBI raided the Dallas home of journalist Barrett Brown in March 2012, the travails of the Vanity Fair and Guardian contributor didn’t get much ink — that is, until Michael Hastings published an exclusive [4] on the Brown raid on Buzzfeed.
The story included a copy of the search warrant that revealed why the government was so interested in Brown: Along with colleagues at the research wiki he started, ProjectPM (PPM), Brown was looking into a legion of shadowy cybersecurity firms whose work for the government raised all sorts of questions about privacy and the rule of law.
Since Hastings was familiar with the government contractors listed in the search warrant, he was also potentially culpable in whatever “crimes” the feds believed Brown and PPM were guilty of. Is this why he was being investigated in the days before his fatal crash on June 18, 2013?  By then, Hastings had established a reputation as a fearless muckraker, whose stories often stripped the haloes from the powerful and well-connected:
-       The besmirched “runaway” Special Forces general Stanley McChrystal, whose career Hastings had dispatched in a 2010 article [5] for Rolling Stone
-       The saintly General “King” David Petraeus [6]—former commander of Central Command (CENTCOM), International Security Assistance Forces (ISAF) in Afghanistan, and head of the Central Intelligence Agency (CIA)
-       Daniel Saunders [7]—a former assistant US attorney for the Central District of California
-       Former Secretary of State and presidential hopeful Hillary Clinton, with whose staff Michael had many pointed exchanges [8] regarding State’s Benghazi spin.
“To Maintain and Cultivate an Enemies List”
In his profile [9] on the blogging consortium True/Slant, Hastings confided that his “secret ambition” was “to maintain and cultivate an enemies list.” Such ironic distancing was Hastings’s way of making palatable an inherently cynical view of the world.  He knew that power corrupted, and to effect change it was necessary to point out the Emperor’s glaringly naked flesh.
In this manner, he was much like his blogging colleague at True/Slant, Barrett Brown. So much so, in fact, that the latter approached Hastings to work on a project that would change the way the public viewed the murky world of intelligence contracting in the post-9/11 era.
Michael Hastings interviews General Odierno in Baghdad, Iraq, October 2009 [10]
Michael Hastings interviews General Odierno in Baghdad, Iraq, October 2009
For those unfamiliar with Brown’s tale, WhoWhatWhy has been chronicling [11] his trials [12] since February 2013.  He is currently in federal custody in Ft. Worth, Texas, facing over a hundred years behind bars for researching 70,000 hacked emails obtained from the cybersecurity firm HBGary Federal and its parent company HBGary. At no point is the government alleging he was involved in the hack itself. His putative “crime” is doing what investigative reporters are supposed to do: digging for the truth about breaches of the public trust.
To do this, Brown pioneered a collaborative wiki where researchers and journalists could sift through these emails and create an encyclopedia from the information contained within. This was known as ProjectPM (PPM).
In 2009, Brown invited Hastings to join forces on PPM, but Hastings’s interest was tempered by other commitments. When the two spoke next, Hastings told Brown he was working on something big.
“Not One of Us”
Hastings was referring to his impending 2010 article, “The Runaway General,” for Rolling Stone, in which he quoted several high-ranking military officials from within Gen. McChrystal’s inner circle disparaging their civilian command. The article caused a stir in official Washington, and eventually led to McChrystal being relieved of duty by President Obama.
Amid the fallout from this journalistic coup, an interesting narrative began forming in certain sectors of the press: “Michael Hastings is not one of us.” Hastings had broken one of the rules governing Washington’s hermetic circle of “access journalism” by quoting his subjects without their express permission.  Elsewhere, most working reporters would call this, well, journalism.
Brown was quick to defend Hastings, penning an article [13] for Vanity Fair titled, “Why The Hacks Hate Michael Hastings.” Later, the two blurbed each other’s books, further cementing their professional relationship.
One thing they shared was a deep discontent with the mainstream media. Indeed, Brown says, they were “obsessed with coming up with ways to change the dynamic.”
The busy Hastings never fully immersed himself in the work of PPM. “[Hastings] was an outlet for us to pass things to,” says Alan Ross, better known on PPM’s Internet relay chat (IRC) as Morpeth. “His relationship was one of talking to Barrett in my experience, rather than direct involvement in PPM.”  He was “more of an associate than a member.”
“Get ready for your mind to be blown.”
For Hastings, Brown was clearly a confidential source—the type that flourishes best when kept in the dark and away from other reporters. Yet on January 24, 2013, Hastings tweeted [14] that he was finally beginning to work on the Brown story, telling his interlocutors to “get ready for your mind to be blown.”
Kevin Gallagher, the administrator of Brown’s legal defense fund at FreeBarrettBrown.org [15], said Brown and Hastings hadn’t been able to talk securely in eight or nine months, but that after a few months of back and forth with Brown’s lawyers Hastings finally planned on interviewing him in custody in June.
After whistleblower Snowden’s bombshell revelations of dragnet surveillance by the National Security Agency (NSA), Hastings wrote an article [16] on June 7 that referenced Brown for the first time since April 2012. Titled “Why Democrats Love To Spy On Americans,” it lambasted supposedly liberal Democrats for their Bush-like surveillance fixation and their unrelenting war on those who seek to expose the operations of the surveillance state:
“Transparency supporters, whistleblowers, and investigative reporters, especially those writers who have aggressively pursued the connections between the corporate defense industry and federal and local authorities involved in domestic surveillance, have been viciously attacked by the Obama administration and its allies in the FBI and DOJ.
[snip]
Barrett Brown, another investigative journalist who has written for Vanity Fair, among others [sic] publications, exposed the connections between the private contracting firm HB Gary (a government contracting firm that, incidentally, proposed a plan to spy on and ruin the reputation of the Guardian’s [Glenn] Greenwald) and who is currently sitting in a Texas prison on trumped up FBI charges regarding his legitimate reportorial inquiry into the political collective known sometimes as Anonymous.”
The article ended with “Perhaps more information will soon be forthcoming.”
The fact that he planned to interview Brown was corroborated by documentarian Vivien Weisman, who told WhoWhatWhy that she spoke to Hastings about it at a Los Angeles book signing for “Dirty Wars” in May 2013. And the editor of Buzzfeed reportedly [17] confirmed that Hastings was in the midst of working on the Brown expose at the time of his death.
Knowing this prompts the question: what angle of the PPM research was Hastings about to tackle?
The evidence seems to point to another shadowy project revealed in the cache of hacked emails that PPM was sifting through: Romas/COIN.
Your Data Is Mine
Gallagher, who was briefed on the last discussion Hastings had with Brown before the planned interview, says, “Hastings had specifically asked about Romas/COIN.”
Romas/COIN was the name given to a program through which the U.S had been conducting “a secretive and immensely sophisticated campaign of mass surveillance and data mining against the Arab world,” according to emails [18]hacked from the cybersecurity firm HBGary Federal. Evidently, this program allows the intelligence community to “monitor the habits, conversations, and activity of millions of individuals at once.”
ProjectPM logo [19]
ProjectPM logo
Over the course of a year, Aaron Barr, CEO of HBGary Federal, sought out various companies to form a consortium that could wrest control of Romas/COIN from the current contract holder, Northrop Grumman. Eventually the consortium included no less than 12 different firms — ranging from niche software companies to behemoths like Google, Apple, and even Disney.
From the emails, it’s clear that “mobile phone software and applications constitute a major component of the program,” concludes the entry in ProjectPM. Periodic references to “semantic analysis,” “Latent Semantic Indexing,” and “specialized linguistics” indicate that the government agency overseeing the contract was clearly interested in automated dissection of spoken or written communication. This is the hallmark of NSA surveillance.
Is it possible that this consortium planned on developing mobile phone software and applications with bugs that would allow the US government to hack into targets’ phones and give it access to all of the communications within?
As detailed [20] by New York Times national security reporter Mark Mazzetti, mobile phone intrusion has been par for the course in the military’s signals intelligence work abroad.
Checkmate
Claims of government surveillance capabilities embedded in private-company software are bolstered by recent reporting [21] on the sale of “zero-day exploits” to government agencies.
“Zero-day exploits” refer to security vulnerabilities that are taken advantage of on the same day that the vulnerability becomes known to the victim. As the jargon implies, there are zero days between the time the hole is discovered and the initial attack.
Endgame Systems, one such company cashing in on this new market, was of particular interest [22] to Brown and ProjectPM. Deep in the cache of Aaron Barr’s emails are indications of just how secret the work of Endgame is.
In an email to employee John Farrell, then-Endgame CEO Chris Rouland states: “Please let HBgary know we don’t ever want to see our name in a press release.”
Farrell forwarded that note to Barr with the following explanation:
“Chris wanted me to pass this along. We’ve been very careful NOT to have public face on our company. Please ensure Palantir and your other partners understand we’re purposefully trying to maintain a very low profile. Chris [Rouland] is very cautious based on feedback we’ve received from our government clients. If you want to reconsider working with us based on this, we fully understand.”
One look at Endgame’s product line explains a lot about their wariness. Their premier software, “Bonesaw,” shows what a powerful asset the corporation has become to America’s intelligence agencies.
Bonesaw is a targeting application that tracks servers and routers around the world. It maps out all the hardware attached to the Internet. Through these access points, NSA and Cyber Command can hack into or launch attacks against adversaries. The Bonesaw program functions [23] essentially as a user-friendly map.
That map has at its disposal the geolocation and Internet address of every device connected to the Internet around the globe. By designating a country and city — like Beijing, China for example — and the name or address of a target — say, a People’s Liberation Army research facility — a user can find out what software is running on all of the computers inside the facility, what entry points to those computers exist, and a menu of custom exploits that can be used to sneak in.
Sock Puppets and Other Tricks
Other clues as to what ProjectPM-related material may have led the FBI to investigate Michael Hastings can be found in his published work.
Endgame Systems CEO Nathaniel Fick. Formerly of the Center for a New American Security, Fick took over for Endgame in November 2012. [24]
Endgame Systems CEO Nathaniel Fick. Formerly of the Center for a New American Security, Fick took over for Endgame in November 2012.
In a May 18, 2012, article [25] on propaganda efforts by the State Department, Hastings referred to a “program being developed by the Pentagon [that] would design software to create “sock puppets” on social media outlets.” The HBGary emails are littered with references to this type of “persona management” technology.
Principal among these was a June 2010 United States Air Force (USAF) contract [26] from the 6th Contracting Squadron at MacDill Air Force Base in Florida. It sought providers of “persona management software” that would allow 50 users to control up to 500 fictional personae.
These sock puppets were required to be “replete with background, history, supporting details, and cyber presences that are technically, culturally, and geographically consistent.” In other words, avatars so convincing they could fool the people with whom they were interacting into believing they were real.
MacDill Air Force Base is home to the United States Special Operations Command (USSOCOM), the section of the military that oversees and coordinates all special-forces activity globally. USSOCOM lists [27] under its “core activities” the employment of psychological operations (PSYOPS) and information operations (IO)—exactly the type of activity this “sockpuppeting” technology would be employed in.
To put it another way: a clone army for future psywars.
Gone With The Mercedes
Given the information currently available it is impossible to know with certainty what angle in the Brown case Michael Hastings was pursuing at the time of his death.
But Hastings’s credibility and national security contacts would have served him well in digging deeper into ProjectPM’s cache of hacked emails, perhaps exposing to the light of public scrutiny other secretive government contractors in the manner that Brown had begun. (See the “Team Themis” affair [28].)
With that potential suddenly snuffed out, it’s not surprising the Internet is abuzz with speculation over Hastings’s death. We’ve contributed to the investigation [29] surrounding it but, with so few hard facts at hand, now is not the time to speculate about whether foul play was involved. What’s clear is that an important voice in the grand tradition of investigative journalism has been silenced.
Hopefully, more information will come to light, and we will know with a fair degree of certainty what Michael Hastings was working on that attracted the government’s watchful eye. That is, unless all of his information was incinerated with him in the early hours of that June morning.



WhoWhatWhy plans to continue doing this kind of groundbreaking original reporting. You can count on it. But can we count on you? We cannot do our work without your support. Please click here [30] to donate; it’s tax deductible. And it packs a punch.



GRAPHIC: https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFDp7PmDyoV6DDnQDlVZxO0cc082w2YvxQG_ZK8gY0an9e6PZgW9bux9v131-KqWuerCE97o7zciCCdfl3OkAKAWZIkKrVmAUjSeLH1bbvxMWJPlVvdW9BxzSoWS_yyh1efScSmLB-g6g/s400/hacker.PNG
https://fbcdn-sphotos-a-a.akamaihd.net/hphotos-ak-frc1/s320x320/388275_248680775201375_268649908_n.jpg
http://trueslant.com/barrettbrown/files/2010/03/PM.png
http://cmsimg.defensenews.com/apps/pbcsi.dll/bilde?Site=M5&Date=20130115&Category=C4ISR01&ArtNo=301150007&Ref=AR&MaxW=300&Border=0&Nathaniel-Fick-Former-CNAS-Chief-Heads-Cyber-Targeting-Firm



Article printed from WhoWhatWhy: http://whowhatwhy.com
URL to article: http://whowhatwhy.com/2013/08/07/connections-between-michael-hastings-edward-snowden-and-barrett-brown-the-war-with-the-security-state/
URLs in this post:
[1] speeding: http://www.youtube.com/watch?v=gNhqKRugk8Q
[2] publication: http://ktla.com/2013/06/21/exclusive-hastings-sent-colleagues-email-hours-before-crash/
[3] quickly denied: http://www.huffingtonpost.com/2013/06/21/fbi-michael-hastings-investigation_n_3476212.html
[4] an exclusive: http://www.buzzfeed.com/mhastings/exclusive-fbi-escalates-war-on-anonymous
[5] 2010 article: http://www.rollingstone.com/politics/news/the-runaway-general-20100622
[6] General “King” David Petraeus: http://www.buzzfeed.com/mhastings/the-sins-of-general-david-petraeus
[7] Daniel Saunders: http://www.buzzfeed.com/mhastings/exclusive-the-tragic-imprisonment-of-john-mctiernan-hollywoo
[8] pointed exchanges: http://www.buzzfeed.com/buzzfeedpolitics/hillary-clinton-aide-tells-reporter-to-fuck-off
[9] his profile: http://trueslant.com/people/michaelhastings/
[10] Image: http://whowhatwhy.com/wp-content/uploads/2013/08/388275_248680775201375_268649908_n.jpg
[11] chronicling: http://whowhatwhy.com/2013/02/21/the-saga-of-barrett-brown/
[12] trials: http://whowhatwhy.com/2013/05/02/barrett-brown-update-new-defense-team-feds-fish-for-activists/
[13] an article: http://www.vanityfair.com/online/daily/2010/06/why-the-hacks-hate-michael-hastings
[14] tweeted: https://twitter.com/mmhastings/status/294534049094053888
[15] FreeBarrettBrown.org: http://freebarrettbrown.org/
[16] wrote an article: http://www.buzzfeed.com/mhastings/why-democrats-love-to-spy-on-americans
[17] reportedly: https://twitter.com/FreeBarrett_/status/347550299185111040
[18] emails : http://wiki.echelon2.org/wiki/Romas/COIN
[19] Image: http://whowhatwhy.com/wp-content/uploads/2013/08/PM.png
[20] detailed: http://www.amazon.com/The-Way-Knife-Secret-Earth/dp/1594204802
[21] recent reporting: http://www.nytimes.com/2013/07/14/world/europe/nations-buying-as-hackers-sell-computer-flaws.html?pagewanted=1&_r=0
[22] of particular interest: http://wiki.project-pm.org/w/index.php?title=Endgame_Systems&oldid=6075
[23] functions: http://www.wired.com/threatlevel/2013/06/general-keith-alexander-cyberwar/all/
[24] Image: http://whowhatwhy.com/wp-content/uploads/2013/08/bilde.jpg
[25] article: http://www.buzzfeed.com/mhastings/congressmen-seek-to-lift-propaganda-ban
[26] contract: http://www.rawstory.com/rs/wp-content/uploads/2011/03/personamanagementcontract.pdf
[27] lists: http://www.socom.mil/Pages/AboutUSSOCOM.aspx
[28] “Team Themis” affair: http://wiki.echelon2.org/wiki/Team_Themis
[29] contributed to the investigation: http://whowhatwhy.com/2013/07/14/the-michael-hastings-wreck-video-evidence-offers-a-few-clues/
[30] click here: http://www.whowhatwhy.com/donate
[31] RadioWHY: Lew Rockwell with Russ Baker on the Boston Bombing and the Security State: http://whowhatwhy.com/2013/06/13/radiowhy-lew-rockwell-with-russ-baker-on-the-boston-bombing-and-the-security-state/
[32] MONDAY MORNING SKEPTIC: Is Snowden the Criminal—or is it the System?: http://whowhatwhy.com/2013/07/22/monday-morning-skeptic-is-snowden-the-criminal-or-is-it-the-system/
Copyright © 2009-2011 WhoWhatWhy. All rights reserved.

Evidence For 'New Physics' Means Universe Is Not As We Know It

hehehe wait to 'see' the 'critters'  ...just 'wait~in on the t'other side :o      

Evidence For 'New Physics' Means Universe Is Not As We Know It

PA  |  Posted:   |  Updated: 02/08/2013   PA
First evidence that the universe is not as we know it has emerged from the Large Hadron Collider (LHC), the giant atom-smashing machine built to recreate conditions at the dawn of time.
Confirmation of the results, showing minute deviations in the behaviour of a sub-atomic particle, would indicate the existence of a 'new physics' model of the universe.
milky way

Our view and place in the universe may have to be revised
Until now scientists have relied on the 'Standard Model', a description of the nuts and bolts mechanics of the universe - its particles and forces - that has worked well but contains serious gaps.
For instance, the Standard Model cannot explain phenomena such as dark matter, invisible material that shrouds galaxies and holds them together, or gravity.
The term 'new physics' was coined to describe more fundamental theories that go beyond the Standard Model, some of which involve strange concepts such as tiny vibrating "strings" and extra dimensions.
A Spanish and French team has now announced results that could be the first indication of a New Physics reality.
They involve data from the LHCb, one of the giant detectors that form part of the LHC on the French-Swiss border.
Scientists were measuring the decay of a fundamental particle called the B meson. They revealed deviations from what was predicted by the Standard Model that show a coherent pattern, and are consistent with New Physics.
The findings amount to a significant 'proof' level of 4.5 sigmas - just under the level of five sigmas which is regarded as a bona fide discovery.
If confirmed by other teams, it amounts to a 'major event' pointing to a realm beyond the Standard Model, say the physicists.
Professor Joaquim Matias, from the Universitat Autonoma de Barcelona in Spain, who led the research, said: "We must be prudent, because more studies and more experimental measurements will be needed for confirmation. But if they are confirmed this is the first direct proof of New Physics, a more general theory than the current Standard Model."
Scientists are still excited about last year's discovery at the LHC of a type of Higgs boson, the particle thought to be responsible for mass that had been missing for five decades.
"If the Higgs completed the Standard Model puzzle, these findings could be the first piece in an even bigger puzzle," Prof Matias added.
One of the New Physics models that could explain the results proposes the existence of a new particle named Zprima, according to the scientists. But Prof Matias says this could be one of "lots of compatible models".
large hadron collider
Large Hadron Collider
A second LHC team in charge of the CMS detector now wants to repeat the measurements to see if it can corroborate the results. New data is also being added by the LHCb team to improve the statistics.
Two of the LHC's central goals were finding the Higgs boson and uncovering evidence for New Physics.
The LHCb detector is designed to study rare decays involving quarks, the most basic building blocks of matter.
A B meson is formed by a b quark and a d antiquark. On July 19 at the European Physics Society's annual meeting in Stockholm, Prof Matias presented his team's theoretical predictions of how a B meson should decay into other elementary particles.
The researchers forecast how the decay should alter in a New Physics scenario. The experimental results from the LHC appear to support their predictions.

Vaccination Agenda: An Implicit Transhumanism / Dehumanism

Vaccination Agenda: An Implicit Transhumanism / Dehumanism

New high-tech laser method allows DNA to be inserted 'gently' into living cells

August 7th, 2013 in Physics / Optics & Photonics
New high-tech laser method allows DNA to be inserted 'gently' into living cells
a) A laser scanning microscope image of a cancer cell used in the experiment is shown. The green circles show plasmid-coated particles that have been optically tweezed and inserted into the cell. b) The same cell viewed with a fluorescence microscope is shown. The DNA material inserted into the cell through the transfection process carries a gene that codes for a green fluorescent protein. Here, the cell's green glow means the transfection process was successful. c) Image (b) is superimposed on image (a). Credit: Biomedical Optics Express.

a) A laser scanning microscope image of a cancer cell used in the experiment is shown. The green circles show plasmid-coated particles that have been optically tweezed and inserted into the cell. b) The same cell viewed with a fluorescence microscope is shown. The DNA material inserted into the cell through the transfection process carries a gene that codes for a green fluorescent protein. Here, the cell's green glow means the transfection process was successful. c) Image (b) is superimposed on image (a). Credit: Biomedical Optics Express.
(Phys.org) —The applications of gene therapy and genetic engineering are broad: everything from pet fish that glow red to increased crop yields worldwide to cures for many of the diseases that plague humankind. But realizing them always starts with solving the same basic scientific question—how to "transfect" a cell by inserting foreign DNA into it. Many methods already exist for doing this, but they tend to be clumsy and destructive, not allowing researchers to precisely control how and when they insert the DNA or requiring them to burn through large numbers of cells before they can get it into one.
A team of scientists in South Korea have now developed the most precise method ever used to insert DNA into cells. The method combines two high-tech laboratory techniques and allows the researchers to precisely poke holes on the surface of a single cell with a high-powered "femtosecond" laser and then gently tug a piece of DNA through it using "optical tweezers," which draw on the of another laser. The team's approach, which is a breakthrough in precision and control at the single-cell level, was published today in the Optical Society's (OSA) open-access journal Biomedical Optics Express.
"What is magical is that all this happens for one cell," said Yong-Gu Lee, an associate professor in the School of Mechatronics at the Gwangju Institute of Science and Technology in South Korea and one of the researchers who carried out the study. "Until today, gene transfection has been performed on a large quantity of agglomerate cells and the outcome has been observed as a statistical average and no observations have been made on individual cells."
Common techniques to force DNA into cells can be clumsy or even violent, Lee said. For instance, researchers often use so-called "gene guns" to fire particles coated with strands of DNA known as plasmids at large populations of cells. Alternatively, scientists may puncture the membranes of individual cells with lasers, place the cells in a plasmid soup, and let the genes diffuse into the perforated cells on their own. While either method can transfect some fraction of a population, researchers cannot control whether any individual cell will incorporate the desired genes, and large numbers of cells may be damaged or destroyed in the process.
In the new study, the researchers sought to safely transfect an individual cell. To manipulate the foreign DNA, the scientists used , which essentially tweaks a laser beam whose electromagnetic field can grab hold of and transport a plasmid-coated particle. The researchers first moved the particle to the surface of the cell membrane. Guided by the trapped particle, they then created a tiny pore in the cell membrane using an ultra-short laser pulse from a . While another laser beam detected the exact location of the cell membrane, they pushed the particle through the pore with the tweezers. Using this technique, the scientists were able to ease a microparticle right up to the pore in the membrane and drop it into the cell, like a golfer sinking an easy putt.
New high-tech laser method allows DNA to be inserted 'gently' into living cells
Image 2: Optical manipulation of plasmid-coated particles and insertion into the cell through a small pore punctured by a short-pulsed laser is shown. Plasmids produce a green fluorescent protein once inside the cell. Drawing is not to scale. Credit: Gwangju Institute of Science and Technology
To determine whether their method had succeeded, the researchers inserted carrying a gene that codes for a green fluorescent protein. Once inside the cell, the gene became active and the cell's machinery began producing the protein. The researchers could then detect the green glow using a fluorescence microscope. They found that approximately one in six of the cells they studied became transfected. This rate is lower than that recorded for some other methods, but those are less precise and involve many cells at a time.
Lee hopes the work will allow other researchers to investigate the effects of transfection on individual cells, not just large populations. With the new technique, "you can put one gene into one cell, another gene into another cell, and none into a third," he said. "So you can study exactly how it works."
More information: "Single-cell optoporation and transfection using femtosecond laser and optical tweezers," M. Waleed et al., Biomedical Optics Express, Vol. 4, Issue 9, pp. 1533-1547 (2013). www.opticsinfobase.org/boe/abstract.cfm?uri=boe-4-9-1533
Provided by Optical Society of America
"New high-tech laser method allows DNA to be inserted 'gently' into living cells." August 7th, 2013. http://phys.org/news/2013-08-high-tech-laser-method-dna-inserted.html

Abortion Clinic Sends Coupons to Low-Income Women, Save $50 on Sundays

I can’t believe how far we have fallen as a society.  This just about does it.  This is so pitiful.  And this is what will go down in the history books for the 21st century in America.  It will describe the degradation of our country.  ‘Thou shall not kill.’  I can’t believe that they refuse to open free health clinics for women and children but they will spend billions on abortion.
Life news
An abortion center that’s open seven days a week in Florida is giving away coupons to poor women in a crisis pregnancy so they can save money on their abortions!

Florida Right to Life investigated this “open on Sundays” abortion center and learned that one of the doctors at this location is the notorious Dr. James Scott Pendergraft.
You’ve no doubt heard about him before. We call him Florida’s Dr. Gosnell who lost his medical license five times in Florida!
In 2011, he was hit with a judgment of $36,737,660.16 in damages after he botched a 20-week abortion that resulted in a baby who survived his abortion procedure but was severely damaged.
Hat tip to JD

Shocking New Japan Tsunami Video Found & Released On YouTube

Thursday, August 8, 2013 12:46

A shocking new Japan tsunami video has turned up and was recently published by  LEAKEDCHANNEL on YouTube. This video shows the size and enormity of this tragedy in a way that hasn’t yet been seen on Beforeitsnews and elsewhere before. For your info, the water really begins flowing in at the 3 minute mark and from there prepare to be in awe by the tsunamis amazing scope and power as it destroys everything in its path.

Published on Jun 3, 2013

Tsunami in Japan 2011 – Shocking video

Obama’s Press Conference: The Smiling Face of a Police State

Obama’s Press Conference: The Smiling Face of a Police State

9/11 Commission Chairs: NSA Spying Is “Out of Control”

9/11 Commission Chairs: NSA Spying Is “Out of Control”

A Quadrillion Yen And Counting – The Japanese Debt Bomb Could Set Off Global Panic At Any Moment

A Quadrillion Yen And Counting – The Japanese Debt Bomb Could Set Off Global Panic At Any Moment

19 Very Disturbing Facts About Illegal Immigration That Every American Should Know

19 Very Disturbing Facts About Illegal Immigration That Every American Should Know

Don’t worry, NSA says—we only “touch” 1.6% of daily global Internet traffic

New seven-page document from Ft. Meade defends agency's activities and policies.

The National Security Agency is believed to have accessed user data from many tech companies.
mjb
On the same day that President Barack Obama spoke to the press about possible surveillance reforms—and released a related white paper on the subject—the National Security Agency came out with its own rare, publicly-released, seven-page document (PDF), essentially justifying its own practices.
The entire document is dated August 9, 2013, and has no attributable names or contact details on it. Its most striking portion? A separate block of text on page six, which states:
According to figures published by a major tech provider, the Internet carries 1,826 Petabytes of information per day. In its foreign intelligence mission, NSA touches about 1.6% of that. However, of the 1.6% of the data, only 0.025% is actually selected for review. The net effect is that NSA analysts look at 0.00004% of the world’s traffic in conducting their mission—that’s less than one part in a million. Put another way, if a standard basketball court represented the global collection would be represented by an area smaller than a dime on that basketball court.
And, nearly directly below that section, the NSA presents its strongest categorical denial of using foreign partners to circumvent American law:
NSA partners with well over 30 different nations in order to conduct its foreign intelligence mission. In every case, NSA does not and will not use a relationship with a foreign intelligence service to ask that service to do what NSA is itself prohibited by law from doing. These partnerships are an important part of the US and allied defense against terrorists, cyber threat actors, and others who threaten our individual and collective security. Both parties to these relationships benefit.
The document begins by referencing the September 11, 2001 attacks on New York and Washington, DC, and notes that the NSA “did not have the tools or the database to search to identify [terorrist] connections and share them with the FBI.” The NSA then argues: “We do not need to sacrifice civil liberties for the sake of national security; both are integral to who we are as Americans. NSA can and will continue to conduct its operations in a manner that respects both.”
And how, pray tell, might an American’s e-mail be accidentally swept up in a dragnet that is ostensibly targeting a foreign suspect?
For example, a US person might be courtesy copied on an e-mail to or from a legitimate foreign target, or a person in the US might be in contact with a known terrorist target. In those cases, minimization procedures adopted by the Attorney General in consultation with the Director of National Intelligence and approved by the Foreign Intelligence Surveillance Court are used to protect the privacy of the US person. These minimization procedures control the acquisition, retention, and dissemination of any U.S. person information incidentally acquired during operations conducted pursuant to Section 702.
Of course, also on Friday, The Guardian published an excerpt from a document leaked by Edward Snowden showing that the NSA has the ability to search Americans’ e-mails—but apparently restrains itself from doing so. The document also notes Section 215 of the Foreign Intelligence Surveillance Act—the business records provision—is what gives the the government the authority to capture telephony metadata.
At the end of the document, the NSA also argues that it has adequate oversight from a number of government agencies—Bruce Schneier probably would disagree with that—and also is able to police itself.
As the NSA concludes: