Latest Entries »


U.S. Government Owns Patent on Cannabis

lou!
Planet Infowars
January 23, 2014

Please read this:

U.S. Government owns the patent on cannabis
http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.htm&r=1&f=G&l=50&s1=6630507.PN.&OS=PN%2F6630507&RS=PN%2F6630507

Cannabis kills Tumor cells
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1576089
http://www.ncbi.nlm.nih.gov/pubmed/20090845
http://www.ncbi.nlm.nih.gov/pubmed/616322
http://www.ncbi.nlm.nih.gov/pubmed/14640910
http://www.ncbi.nlm.nih.gov/pubmed/19480992
http://www.ncbi.nlm.nih.gov/pubmed/15275820
http://www.ncbi.nlm.nih.gov/pubmed/15638794
http://www.ncbi.nlm.nih.gov/pubmed/16818650
http://www.ncbi.nlm.nih.gov/pubmed/17952650
http://www.ncbi.nlm.nih.gov/pubmed/20307616
http://www.ncbi.nlm.nih.gov/pubmed/16616335
http://www.ncbi.nlm.nih.gov/pubmed/16624285
http://www.ncbi.nlm.nih.gov/pubmed/10700234
http://www.ncbi.nlm.nih.gov/pubmed/17675107
http://www.ncbi.nlm.nih.gov/pubmed/14617682
http://www.ncbi.nlm.nih.gov/pubmed/17342320
http://www.ncbi.nlm.nih.gov/pubmed/16893424
http://www.ncbi.nlm.nih.gov/pubmed/15026328

Cannabis Cures Colorectal Cancer
http://www.ncbi.nlm.nih.gov/pubmed/22231745
http://www.ncbi.nlm.nih.gov/pubmed/17583570

Cannabis Cures Uterine, Testicular, and Pancreatic Cancers
http://www.cancer.gov/cancertopics/pdq/cam/cannabis/healthprofessional/page4

Cannabis-derived substances in cancer therapy and anti-tumour properties.
http://www.ncbi.nlm.nih.gov/pubmed/20925645

Cannabis Cures Brain Cancer
http://www.ncbi.nlm.nih.gov/pubmed/11479216

Cannabis Cures Mouth and Throat Cancer
http://www.ncbi.nlm.nih.gov/pubmed/20516734

Cannabis Cures Breast Cancer
http://www.ncbi.nlm.nih.gov/pubmed/20859676
http://www.ncbi.nlm.nih.gov/pubmed/18025276
http://www.ncbi.nlm.nih.gov/pubmed/21915267
http://www.ncbi.nlm.nih.gov/pubmed/22776349
http://www.ncbi.nlm.nih.gov/pubmed/18454173
http://www.ncbi.nlm.nih.gov/pubmed/16728591
http://www.ncbi.nlm.nih.gov/pubmed/9653194

Cannabis Cures Lung Cancer
http://www.ncbi.nlm.nih.gov/pubmed/22198381?dopt=Abstract
http://www.ncbi.nlm.nih.gov/pubmed/21097714?dopt=Abstract

Cannabis Cures Prostate Cancer
http://www.ncbi.nlm.nih.gov/pubmed/12746841?dopt=Abstract
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3339795/?tool=pubmed
http://www.ncbi.nlm.nih.gov/pubmed/22594963
http://www.ncbi.nlm.nih.gov/pubmed/15753356
http://www.ncbi.nlm.nih.gov/pubmed/10570948
http://www.ncbi.nlm.nih.gov/pubmed/19690545

Cannabis Cures Blood Cancer
http://www.ncbi.nlm.nih.gov/pubmed/12091357
http://www.ncbi.nlm.nih.gov/pubmed/16908594

Cannabis Cures Skin Cancer
http://www.ncbi.nlm.nih.gov/pubmed/12511587
http://www.ncbi.nlm.nih.gov/pubmed/19608284

Cannabis Cures Liver Cancer
http://www.ncbi.nlm.nih.gov/pubmed/21475304

Cannabis Cures Cancer in General
http://www.ncbi.nlm.nih.gov/pubmed/12514108
http://www.ncbi.nlm.nih.gov/pubmed/15313899
http://www.ncbi.nlm.nih.gov/pubmed/20053780
http://www.ncbi.nlm.nih.gov/pubmed/18199524
http://www.ncbi.nlm.nih.gov/pubmed/19589225
http://www.ncbi.nlm.nih.gov/pubmed/12182964
http://www.ncbi.nlm.nih.gov/pubmed/19442435
http://www.ncbi.nlm.nih.gov/pubmed/12723496
http://www.ncbi.nlm.nih.gov/pubmed/16250836
http://www.ncbi.nlm.nih.gov/pubmed/17237277

Cannabinoids in intestinal inflammation and cancer:www.ncbi.nlm.nih.gov/pubmed/19442536?itool=EntrezSystem2.PEntrez.Pubmed.Pubmed_ResultsPanel.Pubmed_RVDocSum&ordinalpos=22

Cannabis use and cancer of the head and neck: Case-control study:www.ncbi.nlm.nih.gov/pmc/articles/PMC2277494

Cannabis THC at high doses in area, inhibits cholangiocarcinoma cancer:www.ncbi.nlm.nih.gov/pubmed/19916793?itool=Email.EmailReport.Pubmed_ReportSelector.Pubmed_RVDocSum&ordinalpos=6

Targeting CB2 cannabinoid receptors as a novel therapy to treat malignant lymphoblastic disease
http://www.ncbi.nlm.nih.gov/pubmed/21115947

marijuana kills cancer cells
http://www.ncbi.nlm.nih.gov/pubmed/17952650
http://www.ncbi.nlm.nih.gov/pubmed/16835997

http://cancer.gov/cancertopics/pdq/cam/cannabis/healthprofessional/page4

Cannabis Treatment in Leukemia
http://www.ncbi.nlm.nih.gov/pubmed/15978942
http://www.ncbi.nlm.nih.gov/pubmed/16754784
http://www.ncbi.nlm.nih.gov/pubmed/15454482
http://www.ncbi.nlm.nih.gov/pubmed/16139274
http://www.ncbi.nlm.nih.gov/pubmed/14692532

Cannabinoids and the immune system.
http://www.ncbi.nlm.nih.gov/pubmed/11854771
http://www.ncbi.nlm.nih.gov/pubmed/12052046

Cannibas partially/fully induced cell death in Cancer
http://www.ncbi.nlm.nih.gov/pubmed/12130702
http://www.ncbi.nlm.nih.gov/pubmed/19457575
http://www.ncbi.nlm.nih.gov/pubmed/18615640
http://www.ncbi.nlm.nih.gov/pubmed/17931597
http://www.ncbi.nlm.nih.gov/pubmed/18438336
http://www.ncbi.nlm.nih.gov/pubmed/19916793
http://www.ncbi.nlm.nih.gov/pubmed/18387516
http://www.ncbi.nlm.nih.gov/pubmed/15453094
http://www.ncbi.nlm.nih.gov/pubmed/19229996
http://www.ncbi.nlm.nih.gov/pubmed/9771884
http://www.ncbi.nlm.nih.gov/pubmed/18339876
http://www.ncbi.nlm.nih.gov/pubmed/12133838
http://www.ncbi.nlm.nih.gov/pubmed/16596790
http://www.ncbi.nlm.nih.gov/pubmed/11269508
http://www.ncbi.nlm.nih.gov/pubmed/15958274
http://www.ncbi.nlm.nih.gov/pubmed/19425170
http://www.ncbi.nlm.nih.gov/pubmed/17202146
http://www.ncbi.nlm.nih.gov/pubmed/11903061
http://www.ncbi.nlm.nih.gov/pubmed/15451022
http://www.ncbi.nlm.nih.gov/pubmed/20336665
http://www.ncbi.nlm.nih.gov/pubmed/19394652
http://www.ncbi.nlm.nih.gov/pubmed/11106791
http://www.ncbi.nlm.nih.gov/pubmed/19189659
http://www.ncbi.nlm.nih.gov/pubmed/16500647
http://www.ncbi.nlm.nih.gov/pubmed/19539619
http://www.ncbi.nlm.nih.gov/pubmed/19059457
http://www.ncbi.nlm.nih.gov/pubmed/16909207
http://www.ncbi.nlm.nih.gov/pubmed/18088200
http://www.ncbi.nlm.nih.gov/pubmed/10913156
http://www.ncbi.nlm.nih.gov/pubmed/18354058
http://www.ncbi.nlm.nih.gov/pubmed/19189054
http://www.ncbi.nlm.nih.gov/pubmed/17934890
http://www.ncbi.nlm.nih.gov/pubmed/16571653
http://www.ncbi.nlm.nih.gov/pubmed/19889794
http://www.ncbi.nlm.nih.gov/pubmed/15361550

Cannabis treatment of translocation-positive rhabdomyosarcoma
http://www.ncbi.nlm.nih.gov/pubmed/19509271

Cannabis Induces apoptosis of uterine cervix cancer cells
http://www.ncbi.nlm.nih.gov/pubmed/15047233

Cannabis treatment in lymphoma
http://www.ncbi.nlm.nih.gov/pubmed/18546271
http://www.ncbi.nlm.nih.gov/pubmed/16936228
http://www.ncbi.nlm.nih.gov/pubmed/16337199
http://www.ncbi.nlm.nih.gov/pubmed/19609004

Cannabis kills cancer cells
http://www.ncbi.nlm.nih.gov/pubmed/16818634
http://www.ncbi.nlm.nih.gov/pubmed/12648025

Cannabis regulator of Neural Cell Development
http://www.ncbi.nlm.nih.gov/pubmed/16787257

Cannabis treatment of Melanoma
http://www.ncbi.nlm.nih.gov/pubmed/17065222

Cannabis treatment for Thyroid Carcinoma
http://www.ncbi.nlm.nih.gov/pubmed/18197164

Cannabis treatment in Colon Cancer
http://www.ncbi.nlm.nih.gov/pubmed/18938775
http://www.ncbi.nlm.nih.gov/pubmed/19047095

Cannabinoids in intestinal inflammation and cancer.
http://www.ncbi.nlm.nih.gov/pubmed/19442536

Cannabinoids in health and disease
http://www.ncbi.nlm.nih.gov/pubmed/18286801

Cannabis a neuroprotective after brain injury
http://www.ncbi.nlm.nih.gov/pubmed/11586361

Cannabis inhibits Cancer Cell Invasion
http://www.ncbi.nlm.nih.gov/pubmed/19914218

Biochemist Dr. Hornby tells us in The Union: The Business Behind Getting High that for marijuana to kill, someone would have to smoke about 15,000 joints in 20 minutes.


How Many Times A Day Do You Violate Copyright Laws Without Even Realizing It

Mike Masnick
techdirt.com
May 7, 2014

copyright

Nearly seven years ago, we wrote about a paper from law professor John Tehranian, in which he detailed just how much he likely accidentally infringed on copyright law each and every day, just doing normal things. He later turned it into an entire book, called Infringement Nation: Copyright 2.0 and You (which, insanely, is priced at $39.99 for the ebook — who thought that was a good idea?). Here was a snippet from his paper:

“By the end of the day, John has infringed the copyrights of twenty emails, three legal articles, an architectural rendering, a poem, five photographs, an animated character, a musical composition, a painting, and fifty notes and drawings. All told, he has committed at least eighty-three acts of infringement and faces liability in the amount of $12.45 million (to say nothing of potential criminal charges). There is nothing particularly extraordinary about John’s activities. Yet if copyright holders were inclined to enforce their rights to the maximum extent allowed by law, he would be indisputably liable for a mind-boggling $4.544 billion in potential damages each year. And, surprisingly, he has not even committed a single act of infringement through P2P file sharing. Such an outcome flies in the face of our basic sense of justice. Indeed, one must either irrationally conclude that John is a criminal infringer — a veritable grand larcenist — or blithely surmise that copyright law must not mean what it appears to say. Something is clearly amiss. Moreover, the troublesome gap between copyright law and norms has grown only wider in recent years.”

Just about the same time that Tehranian’s paper came out back in 2007, we also pointed to a different research paper, by professor Tom Bell, in which he argued that the term “intellectual property” was misleading, and that it should really be called “intellectual privilege” as that was much more accurate. Years later, Bell has now published his own book on Intellectual Privilege, arguing why copyright law needs to be massively scaled back.

To help promote the book, Bell has recorded an amusing video not all that different from Tehranian’s premise, highlighting just how much accidental infringement you do on a daily basis — and, yes, it includes the singing of Happy Birthday, so I’m surprised Warner hasn’t killed the video yet.

Now, some will argue that this is silly because no one is actually going after these kinds of “incidental” infringements, but Bell’s point is pretty clear: “the fact that no one thinks copyright law should be fully enforced, demonstrates the need for reform.” In fact, he notes that pretty much everyone agrees that full enforcement is “undesirable and counterproductive.” And, really that should be a clear sign of just how flawed the law itself is.


Denninger: “If You Take Out Black-on-Black Homicide… 75% of All Gun Murders Disappear”

Karl Denninger
The Market Ticker
May 8, 2014

Editor’s Note: If you’ve ever spent some time reading Karl Denninger’s Market Ticker you’ve come to realize that he is a straight-shooter of the highest order. Whether commenting on geo-politics, the economy, corruption or the persistent destruction of our liberties, Denninger doesn’t mince words. His arguments are not only logical in a world plagued by irrationality, but backed up with solid data.

Image: Handgun (Wiki Commons).

In the following article Denninger details the lies, half-truths and coverups surrounding America’s gun debate and the war on drugs. As it relates to gun control, our government and the politicians running it often cite manipulated statistics in order to push forward their agenda. The goal is to disarm America’s tens of millions of law abiding citizens of their right to bear arms. But as is often the case, Denninger blows their entire argument to smithereens with real facts, showing that the violent crime statistics often used to justify the actions of gun control proponents are created by their very own actions and policies.

This is a set up and most Americans, especially those who subscribe to the notion that government is trying to make everything better, haven’t a clue that they’re being indoctrinated by the very people who have caused the problem.


The Real Gun Violence Issue
By Karl Denninger / The Market Ticker

Take away the AstroTurf games like the so-called grassroots organization(s) that sprung up (by magic!) out of Newtown and you wind up with a truly ugly truth when it comes to gun violence in this country: Most of it is gang-related, most of the gangs are in our inner cities, and our President, along with the rest of the so-called “mainstream media”, simply refuses to address any of it.

Take a recent shooting in Chicago.  The media pictures of both shooter and victim are radically inaccurate measured against their own social media postings.

The truth about that particular shooting?  The gun, originally claimed to be stolen, wasn’t.  It instead passed through a number of hands, at least one of them on probation and a second person who allegedly took the weapon to the shooter knowing it was going to be used to commit violence, a 30ish old aunt who allegedly went for the show (seriously!) someone who unjammed the gun after it malfunctioned and gave it back to the girl who had just tried to murder the victim but the weapon failed to fire.

Nor is that all.  We have another case where a “cute little charter-school graduate” (as presented by the family and the media) appears to have a bunch of social-media postings of her bearing weapons of all sorts, including a rather-large revolver that looks right out of a Clint Eastwood movie and a pump-action shotgun.  Oh, and this angel apparently capped at least two people before being killed herself.  She was 17.

Are we ever going to address this instead of playing Astroturf games with kids who are drugged up on various psychotropic meds and then go insane — a rare but obviously far-too-common event?

Probably not.

Why not?

Because our Black President won’t talk about it.  Our liberal media won’t talk about it.  And we won’t talk about it either, nor will we bring to the forefront the fact that we have essentially invented this problem out of whole cloth by generating a welfare and police state that empowers gangs by giving them the fuel (money) on which they rely.

And how did we do that?  We declared various self-destructive behaviors among and between consenting adults unlawful, generating an entire second economic system under the carpet that was then used to justify a “war” that we ourselves created and then declared.

The result has not only been a monstrously-high prison population it has also been an explosion of violence, without which we would be far down the list when it comes to the abuse of guns and property crimes.

Instead of admitting our stupidity in this regard just as is the case with the medical industry and its monopolist scams in the general case we have instead grown an entire industry around arresting, prosecuting and imprisoning huge numbers of people, most of them minorities.

What’s worse is that we are also watching them murder each other with wild abandon, while we sit in our chairs and refuse to talk about the statistical facts.

Indeed, if you take out black-on-black homicide in the major cities from our so-called “blood-red streets” that Bloomberg and others claim as our emblem of “endemic gun violence” you find that something like three quarters of all gun murders disappear.

There is a basic principle when it comes to solving problems in the general sense, and it applies here as with most issues: 80% of any particular problem is easy to solve, and reasonably cheap.  The last 20% is both expensive and hard.

But we won’t talk about the 80% or how it gets generated.  We don’t want to talk about the fact that we create these gangs by giving them an underground economy fueled by what appears to be an innate desire of man to addle his own mind, and which we can actually track back to the animal kingdom generally!

In the early part of the 20th Century we allowed power-brokers who were trying to protect their own industries to play on now-documented racism and false claims when it came to various drugs, with the now-iconic Reefer Madness being one of the poster children for that era.  We banned alcohol sales and created, almost overnight, an entire criminal class that shot up our cities and reaped huge amounts of profit from the desire of people to simply have a drink. The Depression effectively forced the end of Prohibition, but only for booze.

Today we have the worst of both worlds.  On the corner about two miles from my home is a store that has more forms of a popular drug in it than would be necessary to kill platoons of men, yet I can buy and consume as much of it as I desire.  In the gas station and grocery store I can buy still other forms of the same drug, again, limited only by my wallet.

At the same time in the nearest big city (and probably in my “nice” small town) there is a thriving underground economy.  Police officers with whom I’m acquainted tell me of the crack houses they bust with crude labs that threaten to blow up entire buildings — not through terrorist action but rather because the “chemists” inside don’t know what they’re doing or don’t care because they’re too stoned to be concerned with reasonable safety precautions.  The mind-altering substances they produce are addled with God-knows-what, the ingredient list likely driven by whatever is cheapest to get as a diluting agent so as to “stretch” what they’re producing for sale.  Some percentage of those drugs, along with mass-produced quantities in Mexico and elsewhere, stream into our major cities where the trade in them generates huge profits and massive amounts of violence, all aimed at “protecting” the highly-profitable trade in same.

Have we ever asked if the people who get hooked on meth and similar monstrously-destructive drugs would use them absent this pipeline of illegal supply and coercive sales capacity?  If those people could walk into any pharmacy and simply buy whatever you wanted, having only to prove they’re of adult age, being supplied not only their drug of choice but also a pamphlet describing exactly what was in the package were buying and its expected long and short-term effects,would they? Would they rob and mug people if the price of maintaining their addiction was one tenth of what it costs today via illegal routes of supply?

Or would they choose to try something else — perhaps a bottle of liquor or a pack of 20 Class A joints?

I don’t know and neither does anyone else, but what we do know is that plenty of people were addicted to opiates and other drugs before the “War on Drugs” was launched, and a very significant percentage of them were able to hold down jobs and lead reasonably-productive lives.  Oh sure, they eventually got sick and some died, but what we didn’t have was 17 year old kids shooting each other over insults, real or imagined, trumped up by what amounts to a trade war within our own borders.

I understand why Obama, Rahm and Bloomberg don’t want to entertain this debate.  If they were to do so with someone like me they’d be in a very tough spot, because I’d put facts and figures in front of them and the audience might conclude that we’ve created not only a prison industry and siphons off tens of billions of dollars, not only have we destroyed the earnings power of millions, most of them minorities with these same policies, but in addition we have a more than 50-year history that says we cannot win this war nor do we give a good damn about those who die as a consequence of our puerile and outrageous policy pronouncements in this area, most-especially the young people of color who are overwhelmingly both victim and perpetrator.

Indeed, some people might conclude that our President and the rest of the drug-warriors are in fact racists of the highest order in that they’re complicit in the murder of far more black people in a single year than the KKK ever hung from trees through its entire sordid history.

This much I’m absolutely certain of — our black community organizer-cum-President surely doesn’t want to face his rank hypocrisy on this issue.

Nor, for that matter, do the rest of the so-called Progressives.


Canadian Gov’t Responds To Spying Revelations By Saying It’s All A Lie And Calling Glenn Greenwald A ‘Porn Spy’

from the wtf? dept

We’ve seen various government officials act in all sorts of bizarre ways after revelations of illegal spying on their own people (and foreigners), but none may be quite as bizarre as the response from the Canadian government, following the release late last night from the CBC (with help from Glenn Greenwald) that they’re spying on public WiFi connections. That report had plenty of detail, including an internal presentation from the Canadian electronic spying agency, CSEC. In the Canadian Parliament today, Prime Minister Stephen Harper’s parliamentary secretary, Paul Calandra, decided to respond to all of this by by insisting it’s all a lie and then flat out insulting both the CBC and Glenn Greenwald.

If you can’t watch the video, here’s what he says:

Mr. Speaker, last night the CBC aired a misleading report on Canada’s signals intelligence agency, Communications Security Establishment Canada. These documents were stolen by former NSA contractor, Edward Snowden and sold to the CBC by Glenn Greenwald. Canada’s signals intelligence agency has been clear that the CBC story is incorrect, yet the CBC went ahead and published it anyway.
Here are the facts: Before the story aired, CSEC made clear that nothing in the stolen documents showed that Canadians’ communications were targeted, collected, or used, nor that travellers’ movements were tracked.
In addition, CSEC’s activities are regularly reviewed by an independent watchdog who has consistently found it has followed the law.
Why is furthering porn-spy Glenn Greenwald’s agenda and lining his Brazilian bank account more important than maintaining the public broadcaster’s journalistic integrity?

Okay. Where to start? First off, the whole idea that Greenwald "sold" the documents to the CBC is just ridiculous. Every so often we’ve seen others raise this kind if idiotic argument and it’s just silly. Greenwald — like any other freelance journalist — gets paid to do journalism. No one is paying him for the documents. They’re paying him to work as a journalist, which, you know, is what he does. The attempt to portray it as selling the documents is just a completely bogus smear.
Second, for all the CSEC’s denials, note that Calandra makes no effort whatsoever to explain what’s in the actual (fairly damning) document that the CBC published. Instead, he’s playing games with words — games that you should be quite used to if you’ve followed the infamous NSA dictionary. Note that he says that none of Canadians’ "communications were targeted, collected, or used." There are a few problems with that. No one’s talking about their communications here, but rather details of their locations and the kinds of devices they were using, which is exactly what’s shown in the powerpoint presentation.
Next, the fact that the CSEC’s activities are regularly reviewed is somewhat meaningless. Was this program reviewed? By whom? What did they find? As we’ve seen in the US, the claims of independent oversight of the NSA turned out to not mean very much once people looked at the details.
And then… there’s that last paragraph. First of all, what is a "porn spy" anyway, and how is Glenn Greenwald one of them? The word makes no sense at all. When government officials are talking gibberish, it does not bode well for them. Maybe he’s trying to repeat the smear from a former US government official who bizarrely called Snowden an espionage pornographer, which made no sense, but makes at least marginally more sense than a "porn spy." And, yes, Glenn Greenwald lives in Brazil. Saying "Brazilian bank account" makes it seem, again, as if there’s something nefarious going on here, rather than a well-known, accomplished and celebrated freelance reporter who happens to live in Brazil, doing some work for the CBC.
If this is the Harper government’s official "response" to these revelations, they’re just asking for trouble. This is so over-the-top silly and defensive, without even remotely responding to the actual issues, that it suggests that Harper has no legitimate response, knows that more is probably on the way, and has resorted to throwing out nonsensical insults at reporters.

***

Its all Lies and Deceptive Manipulation

Nothing New

From

Stephen “Hannibal Cannibal” Harper

or his

Criminal Governments Cronies


Mirabile Dictu! JP Morgan Finally on Regulatory Hot Seat for Widespread Control Failures and Alleged Lying by Blythe Masters Under Oath

Posted on May 3, 2013 by Yves Smith

It’s been far too long in coming, but Jamie Dimon may finally be getting his comeuppance. A New York Times report reveals the Morgan bank is in the crosshairs of multiple regulators for poor controls and dishonest dealings with the authorities:

Government investigators have found that JPMorgan Chase devised “manipulative schemes” that transformed “money-losing power plants into powerful profit centers,” and that one of its most senior executives gave “false and misleading statements” under oath…

In a meeting last month at the bank’s Park Avenue headquarters, the comptroller’s office delivered an unusually stark message to Jamie Dimon, the chief executive and chairman: the nation’s biggest bank was quickly losing credibility in Washington. The bank’s top lawyers, including Stephen M. Cutler, the general counsel, have also cautioned executives about the bank’s regulatory problems, employees say.

The Times reports that the bank faces actions across eight regulators including: FERC, for a series of “schemes” to dupe state authorities to overpay for power and includes allegations that JP Morgan executive Blythe Masters lied under oath; using false documents when collecting credit card debt; and a failure to report suspicious trading activities by Bernie Madoff.

The fact that JP Morgan is in hot water isn’t news. Josh Rosner revealed in an extensive report released in early March that the bank had paid out over $8.5 billion in fines since 2009, nearly 12% of its net income, for violations across virtually all of its operations. This account showed the carefully cultivated picture of JP Morgan as a well-managed operation was an artful fabrication. As Dave Dayen wrote here in his overview:

….as you read the report, it’s hard to see the bank as anything but a criminal racket just days away from imploding, were it not propped up by implicit bailout guarantees and light-touch regulators. Rosner paints a picture of a corporation saddled with pervasive internal control problems, which end up costing shareholders, and which “could materially impact profitability in the future.” ….It’s hard to summarize all of the documented instances in this report of JPM has been breaking the law, but here’s my best shot….

Bank Secrecy Act violations;
Money laundering for drug cartels;
Violations of sanction orders against Cuba, Iran, Sudan, and former Liberian strongman Charles Taylor;
Violations related to the Vatican Bank scandal (get on this, Pope Francis!);
Violations of the Commodities Exchange Act;
Failure to segregate customer funds (including one CFTC case where the bank failed to segregate $725 million of its own money from a $9.6 billion account) in the US and UK;
Knowingly executing fictitious trades where the customer, with full knowledge of the bank, was on both sides of the deal;
Various SEC enforcement actions for misrepresentations of CDOs and mortgage-backed securities;
The AG settlement on foreclosure fraud;
The OCC settlement on foreclosure fraud;
Violations of the Servicemembers Civil Relief Act;
Illegal flood insurance commissions;
Fraudulent sale of unregistered securities;
Auto-finance ripoffs;
Illegal increases of overdraft penalties;
Violations of federal ERISA laws as well as those of the state of New York;
Municipal bond market manipulations and acts of bid-rigging, including violations of the Sherman Anti-Trust Act;
Filing of unverified affidavits for credit card debt collections (“as a result of internal control failures that sound eerily similar to the industry’s mortgage servicing failures and foreclosure abuses”);
Energy market manipulation that triggered FERC lawsuits;
“Artificial market making” at Japanese affiliates;
Shifting trading losses on a currency trade to a customer account;
Fraudulent sales of derivatives to the city of Milan, Italy;
Obstruction of justice (including refusing the release of documents in the Bernie Madoff case as well as the case of Peregrine Financial).

In other words, the New York Times account is a pale rendition of the rap sheet against the bank.

In reality, there’s been evidence for years that the image of JP Morgan as a well-run bank with its oft-touted “fortress balance sheet” was more hype than reality. The bank got more credit than it deserved for having lower exposure to subprime loans than other “too big to fail” institutions, which made it the rescuer of choice during the financial crisis. That status resulted at least in part from the banks have suffered large losses in a business it had helped pioneer, that of corporate credit default swaps, when Delphi went bankrupt in 2005 and got gun-shy in taking on more CDS related risk (and recall it was also CDS that turned what would otherwise have been a “contained” subprime meltdown into a global financial crisis by creating economic exposures that were considerably greater than the value of the underlying loans). Mortgage securitization industry participants also say another reason JP Morgan was an also-ran in the mortgage business in the runup to the crisis was that the bank blew hot and cold about hiring people with the needed experience and contacts. In other words, the fact that JP Morgan escaped the worst of the crisis looks to be due to luck rather than great foresight.

Recall that banking expert Chris Whalen has been saying for years that JP Morgan’s balance sheet quality was also mythologized. While the traditional bank looks solid, the risks it is taking in its $75 trillion derivatives clearing operation dwarf that. And the bank hasn’t been the most astute player there either. For instance, it was snookered for months by Lehman into taking collateral that employees of the failing investment bank called “goat poo.” And when the bank realized the risk it was taking, it struck the fatal blow by seizing over $7 billion Lehman cash and collateral that it held. The bank also looks to have played fast and loose in the failure of MF Global. Recall that it suspected that the broker was using client funds, asked for written assurances from assistant treasurer Edith O’Brien that it wasn’t, and didn’t press the matter when she ignored the requests.

The London Whale fiasco alone demonstrated beyond doubt that JP Morgan was, as Rosner put it, out of control. Even before the Senate investigation, media reports provided compelling evidence of astonishing risk management failures, such as having risk management reporting to the CIO, rather than being independent. Sarbanes Oxley expert Michael Crimmins saw the risk management and control failures to be so severe as to firing Dimon. As he wrote last July:

The first stunner, that JP Morgan was restating the first quarter financials, should have caused a deafening ringing of alarm bells. For a company of JP Morgan’s stature to be compelled to restate prior period financials is a very clear signal of bigger problems with their overall financial reporting. In isolation we would normally expect to see a massive selloff with an event of that seriousness. Analysts and reporters may have missed the significance since it was dropped into a footnote and overshadowed by the other disclosures. …

But the real cause for alarm is the reason for the restatement. JPM was forced to disclose that it relied on its traders to provide honest and accurate valuations for its financial statement disclosures. That’s like putting the foxes in charge of not just the henhouse, but the entire farm. Much to its chagrin that was a costly choice. Note that was not a mistake, but a conscious choice….

It appears that JPM is attempting to make the case that rogue traders, with criminal intent, mismarked the books. That may be so and relevant criminal charges against those traders should be pursued. But that strategy does not protect management. If there was mismarking, especially to the extent that occurred here, it is the responsibility of management to know or have procedures in place to alert them to the potential for fraud. Step one in that control process: Don’t let your traders mark their own books. If you do you have no excuse. Your controls are worthless and as CEO, you are responsible for ignoring that fundamental control gap. Full stop.

Which leads to the second underreported stunner.

It is a very big deal when a firm is compelled to disclose a material weakness in internal controls. That’s the worst level of internal control failure a going conern can report. In JP Morgan’s case its more damning since Dimon, as recently as May 10, 2012, certified that all was well with internal controls as of the end of 1Q2012.

That assessment means that it is impossible for the firm’s external auditor to sign off on the financial statements until and unless the control breakdowns are remediated sufficiently for the auditor to provide assurance. The description of the control weaknesses at JP Morgan appear to be design flaws, so it’s likely the weaknesses existed in periods earlier than the first quarter of 2012, when it was ‘discovered’. The fact that the unit with the weaknesses by all accounts was under the direct control of the CEO throws doubt on the validity of his prior certifications about the quality of the internal controls. The external auditors will be under extreme pressure to either support or refute the earlier certifications. Falsifying the certification is the worst Sarbanes Oxley violation there is, so Dimon is going to have to come up with an airtight rebuttal.

But the lapdog financial media refused to take these stunning lapses seriously, apparently more taken by the Dimon mythology, as reflected in Warren Buffett recommending Dimon for Treasury chairman last November.

And the Senate hearings revealed Dimon’s and the CIO’s conduct to be markedly worse that the previous press reports had unearthed, including:

Management hid the existence and role of the unit within the JP Morgan Chief Investment office that entered into the “whale” trades, the Synthetic Credit Portfolio, from its inception, even as its exposures ballooned, from the OCC

The bank made repeated, knowing misrepresentations about the size of the losses, the severity of the control failures, and the degree of management knowledge to regulators and investors

The contempt for regulators and for the need for timely and adequate disclosure is symptomatic of an out of control environment. Between the beginning of the year and end of April 2012, the SPG breached risk limits 330 times, sometimes even violating bank-wide limits. Yet staff and management regarded them as an inconvenience rather than treating them as shrieking alarms that warranted swift action

JP Morgan managers and risk control officers were aware of and complicit in the mismarking of positions (this is a very big deal in a financial institution)

And despite this impressive history of bad conduct, JP Morgan was getting special treatment from regulators as recently as January of this year. Marcy Wheeler noted the OCC failed to clean up “previously identified systemic weaknesses” in its anti-money laundering compliance. Eighteen months of intransigence and all the OCC did was scold a bit. It issued no fine.

Even though regulators are finally waking up to the fact that JP Morgan is a dangerous institution that thinks it can act as a law unto itself, the bank does not appear ready to change its ways. The New York Times reports that FERC recommended pursuing Masters and traders over its energy market violations:

For now, according to the document, the enforcement officials plan to recommend that the commission hold the traders and Ms. Masters “individually liable.” While Ms. Masters was “less involved in the day-to-day decisions,” investigators nonetheless noted that she received PowerPoint presentations and e-mails outlining the energy trading strategies.

Masters has apparently lied under oath in offering the usual “I was in charge and I knew nothing” defense. The normal behavior is to cut miscreants loose and at least make a good show of wanting to operate lawfully. But the bank is taking the high-handed route:

“We intend to vigorously defend the firm and the employees in this matter,” said Kristin Lemkau, a spokeswoman for the bank. “We strongly dispute that Blythe Masters or any employee lied or acted inappropriately in this matter.”

Fish rot from the head, and JP Morgan looks to be no exception. Dimon repeatedly made statements to the media and in Congressional testimony about the London Whale trades that were flagrantly false. He wasn’t sworn in and apparently thinks he’s not obligated to be honest with investors, lawmakers, or the public. That sort of arrogance is mirrored in the bank’s pervasive rulebreaking. The upside of JP Morgan’s continued defiance of the law in the interest of its profits is that this latest round of scandals might finally engulf the perp-in-chief.


First life with ‘alien’ DNA

An engineered bacterium is able to copy DNA that contains unnatural genetic letters.

07 May 2014

Synthorx

The addition of new letters to the ‘alphabet of life’ could enable biologists to vastly expand the range of proteins that they could synthesize.

For billions of years, the history of life has been written with just four letters — A, T, C and G, the labels given to the DNA subunits contained in all organisms. That alphabet has just grown longer, researchers announce, with the creation of a living cell that has two ‘foreign’ DNA building blocks in its genome.

Hailed as a breakthrough by other scientists, the work is a step towards the synthesis of cells able to churn out drugs and other useful molecules. It also raises the possibility that cells could one day be engineered without any of the four DNA bases used by all organisms on Earth.

“What we have now is a living cell that literally stores increased genetic information,” says Floyd Romesberg, a chemical biologist at the Scripps Research Institute in La Jolla, California, who led the 15-year effort. Their research appears online today in Nature1.

Each strand of the DNA’s double helix has a backbone of sugar molecules and, attached to it, chemical subunits known as bases. There are four different bases: adenine (A), thymine (T), cytosine (C) and guanine (G). These letters represent the code for the amino-acid building blocks that make up proteins. The bases bind the two DNA strands together, with an A always bonding to a T on the opposite strand (and vice versa), and C and G doing likewise.

Test-tube letters

Scientists first questioned whether life could store information using other chemical groups in the 1960s. But it wasn’t until 1989 that Steven Benner, then at the Swiss Federal Institute of Technology in Zurich, and his team coaxed modified forms of cytosine and guanine into DNA molecules. In test-tube reactions, strands made of these “funny letters”, as Benner calls them, copied themselves and encoded RNA and proteins2.

The bases engineered by Romesberg’s team are more alien, bearing little chemical resemblance to the four natural ones, Benner says. In a 2008 paper, and in follow-up experiments, the group reported efforts to pair chemicals together from a list of 60 candidates and screen the 3,600 resulting combinations. They identified a pair of bases, known as d5SICS and dNaM, that looked promising3. In particular, the molecules had to be compatible with the enzymatic machinery that copies and translates DNA.

3basepair Ali8enDNA

“We didn’t even think back then that we could move into an organism with this base pair,” says Denis Malyshev, a former graduate student in Romesberg’s lab who is first author of the new paper. Working with test-tube reactions, the scientists succeeded in getting their unnatural base pair to copy itself and be transcribed into RNA, which required the bases to be recognized by enzymes that had evolved to use A, T, C and G.

The first challenge to creating this alien life was to get cells to accept the foreign bases needed to maintain the molecule in DNA through repeated rounds of cell division, during which DNA is copied. The team engineered the bacterium Escherichia coli to express a gene from a diatom — a single-celled alga — encoding a protein that allowed the molecules to pass through the bacterium’s membrane.

The scientists then created a short loop of DNA, called a plasmid, containing a single pair of the foreign bases, and inserted the whole thing into E. coli cells. With the diatom protein supplying a diet of foreign nucleotides, the plasmid was copied and passed on to dividing E. coli cells for nearly a week. When the supply of foreign nucleotides ran out, the bacteria replaced the foreign bases with natural ones.

Alien control

Malyshev sees the ability to control the uptake of foreign DNA bases as a safety measure that would prevent the survival of alien cells outside the lab, should they escape. But other researchers, including Benner, are trying to engineer cells that can make foreign bases from scratch, obviating the need for a feedstock.

Romesberg’s group is working on getting foreign DNA to encode proteins that contain amino acids other than the 20 that together make up nearly all natural proteins. Amino acids are encoded by ‘codons’ of three DNA letters apiece, so the addition of just two foreign DNA ‘letters’ would vastly expand a cell’s ability to encode new amino acids. “If you read a book that was written with four letters, you’re not going to be able to tell many interesting stories,” Romesberg says. “If you’re given more letters, you can invent new words, you can find new ways to use those words and you can probably tell more interesting stories.”

Potential uses of the technology include the incorporation of a toxic amino acid into a protein to ensure that it kills only cancer cells, and the development of glowing amino acids that could help scientists to track biological reactions under the microscope. Romesberg’s team has founded a company called Synthorx in San Diego, California, to commercialize the work.

Ross Thyer, a synthetic biologist at the University of Texas at Austin who co-authored a related News and Views article, says that the work is “a big leap forward in what we can do”. It should be possible to get the foreign DNA to encode new amino acids, he says.

“Many in the broader community thought that Floyd’s result would be impossible,” says Benner, because chemical reactions involving DNA, such as replication, need to be exquisitely sensitive to avoid mutation.

The alien E. coli contains just a single pair of foreign DNA bases out of millions. But Benner sees no reason why a fully alien cell isn’t possible. “I don’t think there’s any limit,” he says. “If you go back and rerun evolution for four billion years, you could come up with a different genetic system.”

But creating a wholly synthetic organism would be a huge challenge. “A lot of times people will say you’ll make an organism completely out of your unnatural DNA,” says Romesberg. “That’s just not going to happen, because there are too many things that recognize DNA. It’s too integrated into every facet of a cell’s life.”

 

helix

Chemical biology: DNA’s new alphabet

DNA has been around for billions of years — but that doesn’t mean scientists can’t make it better.

When Steven Benner set out to re-engineer genetic molecules, he didn’t think much of DNA. “The first thing you realize is that it is a stupid design,” says Benner, a biological chemist at the Foundation for Applied Molecular Evolution in Gainesville, Florida.

Take DNA’s backbone, which contains repeating, negatively charged phosphate groups. Because negative charges repel each other, this feature should make it harder for two DNA strands to stick together in a double helix. Then there are the two types of base-pairing: adenine (A) to thymine (T) and cytosine (C) to guanine (G). Both pairs are held together by hydrogen bonds, but those bonds are weak and easily broken up by water, something that the cell is full of. “You’re trusting your valuable genetic inheritance that you’re sending on to your children to hydrogen bonds in water?” says Benner. “If you were a chemist setting out to design this thing, you wouldn’t do it this way at all.”

Life may have had good reasons for settling on this structure, but that hasn’t stopped Benner and others from trying to change it. Over the past few decades, they have tinkered with DNA’s basic building blocks and developed a menagerie of exotic letters beyond A, T, C and G that can partner up and be copied in similar ways. But the work has presented “one goddamn problem after another”, says Benner. So far, only a few of these unnatural base pairs can be inserted into DNA consecutively, and cells are still not able to fully adopt the foreign biochemistry.

The re-engineering of DNA, and its cousin RNA, has practical goals. Artificial base pairs are already used to detect viruses and may find other uses in medicine. But scientists are also driven by the sheer novelty of it all. Eventually, they hope to develop organisms with an expanded genetic alphabet that can store more information, or perhaps ones driven by a genome with no natural letters at all. In creating these life forms, researchers could learn more about the fundamental constraints on the structure of genetic molecules and determine whether the natural bases are necessary for life or simply one solution of many. “Earth has done it a certain way in its biology,” says Gerald Joyce, a nucleic-acid biochemist at the Scripps Research Institute in La Jolla, California. “But in principle there are other ways to achieve those ends.”

Benner first became interested in those other ways as a graduate student in the 1970s. Chemists had synthesized everything from peptides to poisons, and some were trying to build molecules that could accomplish the same functions as natural enzymes or antibodies with different chemical structures. But DNA was largely ignored, he recalls. “Chemists were looking at every other class of molecule from a design perspective except the one at the centre of biology,” says Benner.

In 1986, Benner started a lab at the Swiss Federal Institute of Technology in Zurich and began to rebuild DNA’s backbone. He quickly realized that what seemed like a flaw might be a feature. When he and his team replaced the backbone’s negatively charged phosphates with neutral chemical groups1, they found that any strand longer than about a dozen units folded up on itself — probably because repelling charges were needed to keep the molecule stretched out.

The bases proved more amenable to tinkering. Benner set out to create base pairs that are similar to nature’s, but with rearranged hydrogen bonding units.

His team tested two new pairs: iso-C and iso-G (ref. 2) and κ and xanthosine3. It showed that polymerase enzymes — which copy DNA or transcribe it into RNA — could read DNA containing the unnatural bases and insert the complementary partners into a growing DNA or RNA strand. Ribosomes, the cellular machines that ‘translate’ RNA into protein, could also read an RNA snippet containing iso-C and use it to add an unnatural amino acid to a growing protein4. “The base pairing, which is at the centre of genetics, turned out to be for us the most malleable part of the molecule,” says Benner. The researchers did encounter a problem, however. Because its hydrogen atoms tend to move around, iso-G often morphed into a different form and paired with T instead of iso-C.

Unnatural bonds

Expand

Eric Kool, a chemist now at Stanford University in California, wondered whether his team could develop unnatural bases with fixed hydrogen-bonding arrangements. He and his colleagues made a base similar to the natural base T, but with fluorine in place of the oxygen atoms (see ‘Designer DNA’), among other differences5. The structure of the new base, called difluorotoluene (designated F), mimicked T’s shape almost exactly but discouraged hydrogen from jumping.

The team soon discovered that F was actually terrible at hydrogen bonding5, but polymerases still treated it like a T: during DNA copying, they faithfully inserted A opposite F (ref. 6) and vice versa7. The work suggested that as long as the base had the right shape, a polymerase could slot it in correctly. “If the key fits, it works,” says Kool.

Other scientists were dubious. “I got outraged e-mails from people saying, ‘How can you possibly tell us that hydrogen bonds are not needed for DNA replication?’,” says Kool. “That was the centre of the helix. And people were so fixated on hydrogen bonds that it was hard to even conceive of alternatives.” Instead of forming hydrogen bonds — a property normally associated with hydrophilic, or water-loving, molecules — F and other shape-mimicking bases developed by Kool’s team were hydrophobic. Water repels them, which helps them to stabilize in the double helix. DNA is analogous to a stack of coins, says Kool, and staying in the stack shields an unnatural base from water.

Floyd Romesberg, a chemical biologist at the Scripps Research Institute, has expanded the repertoire of hydrophobic bases. Starting with molecules such as benzene and naphthalene, his team built “every imaginable derivative”, he says. “It drove us very much away from anything that looked like a natural base pair at all.” But while testing steps in the replication process, the researchers found two contradictory requirements. A crucial position in the base had to be hydrophobic for enzymes to insert the base into DNA, yet it also had to accept hydrogen bonds if enzymes were to continue with copying the strand.

Romesberg’s team screened 3,600 combinations of 60 bases for the pair that was copied the most efficiently and accurately8. The two that won, MMO2 and SICS, “walk a thin line” between being hydrophobic and hydrophilic at the key position, Romesberg says.

A major challenge remained, however: researchers had to show that DNA would retain the unnatural base pairs while billions of copies are made. If enzymes pair unnatural with natural bases too often, the new letters could eventually disappear.

Base jumping

Ichiro Hirao, a chemist at the RIKEN Systems and Structural Biology Center in Yokohama, Japan, had been intrigued by the idea of creating unnatural bases ever since reading James Watson’s 1968 book The Double Helix as a teenager. Hirao and his colleagues found that they could reduce mispairing by designing shapes that fit awkwardly with natural bases, and by adding negatively charged or electron-rich chemical groups that repel the natural bases’ corresponding parts. In 2011, Hirao’s team reported that DNA containing an unnatural hydrophobic base pair, called Ds and Diol1-Px, could be copied with 99.77–99.92% fidelity per replication9. The same year, Benner and his colleagues showed that another unnatural base pair — P and Z, which join using hydrogen bonds — achieved fidelity of 99.8% per replication10. And in July, Romesberg’s team reported rates of 99.66–99.99% for optimized versions of his bases, called NaM and 5SICS (ref. 11), overlapping with the sloppiest rate for natural DNA. “Our best case is now approaching nature’s worst case,” says Romesberg.

Unnatural bases still have a lot to prove, however. Researchers haven’t shown that polymerases can copy more than four of the paired bases in a row10. The polymerase is “the hard nut to crack”, says Benner. And the solution may be to re-engineer it, too.

“If you were a chemist setting out to design this thing, you wouldn’t do it this way at all.”

Philipp Holliger, a chemical biologist at the Medical Research Council Laboratory of Molecular Biology in Cambridge, UK, and his colleagues demonstrated this approach earlier this year — using nucleic acids called XNA, in which the sugars normally present in DNA or RNA had been replaced by other ring structures12. The team generated billions of mutants of a natural polymerase and let them evolve by putting selective pressure on them to convert DNA to XNA (see Nature http://doi.org/jrh; 2012). The researchers then compared the most effective mutants to identify the best one. The polymerase is shaped roughly like a hand, and it turns out that the ‘thumb’ was the key region that needed to change, says Holliger. This region makes contact with the DNA as it exits the enzyme and might act as a final checkpoint to ensure correct synthesis. The team also engineered an enzyme that could convert XNA back into DNA.

Much of the tinkering so far has been done in vitro, but researchers hope to show that organisms can read and process the information. Perhaps the closest they have come to incorporating unnatural bases into a living system is an engineered bacterium reported last year13 by Philippe Marlière, co-founder of the microbial fluidics company Heurisko in Newark, Delaware. He and his team replaced most of the organism’s T bases with chlorouracil, a form of the RNA base uracil in which a hydrogen atom is replaced with chlorine. The team developed an automated system to introduce the base gradually to a strain of Escherichia coli that couldn’t make thymine on its own. After about five months, some of the bacteria couldn’t survive without chlorouracil and they had expunged roughly 90% of the thymine from their genomes.

Benner, Romesberg and Hirao are also working to coax cells to accept their base pairs. But even if the cells accept the pairs, they might have trouble carrying out processes such as recombination — a highly orchestrated reshuffling of genetic material. “It’s not just a matter of getting these darn things in,” says Andrew Ellington, a biochemist at the University of Texas at Austin and a former graduate student of Benner. “I think this is going to be a modestly Herculean task from here on out.”

Just how far researchers will get is unclear. Marlière’s team aims to replace all four natural bases with unnatural ones. But Romesberg says that developing an organism with only hydrophobic bases will be close to impossible, because cells contain too many components that have adapted to work with natural bases. As for combining an unnatural backbone and unnatural bases in one organism, “our theory is not good enough for us to go in and do both at the same time”, says Benner.

 

Even if unnatural base pairs don’t yet function in cells, they can still be put to practical use. Siemens Healthcare Diagnostics in Tarrytown, New York, and Luminex in Austin, Texas, already use Benner’s iso-C and iso-G pair to improve detection and monitoring of viral infections. Siemens, for example, uses a series of linked DNA sequences that bind to HIV-1 RNA in a patient’s blood sample. Inserting unnatural bases into some of the sequences discourages the sequences from binding to random DNA sequences in the sample and makes the HIV-1 RNA easier to detect at low levels.

DNA and RNA molecules can also catalyse reactions and be used as drugs. Developers can improve the performance of a sequence by attaching chemical groups to the bases, and unnatural bases make it easier to target a specific site in a sequence rather than saturating every C or G. Romesberg’s team has added ‘linker’ groups to unnatural bases in DNA that allow precise attachment of a variety of molecules. The team is now trying to engineer sequences that will catalyse reactions more efficiently than their natural counterparts.

Hirao says that his team has generated DNA sequences containing the Ds base that bind much better than natural sequences to interferon-γ, an immune-system protein, and to vascular endothelial growth factor (VEGF), a therapeutic target in cancer and eye disease.

Practical applications aside, researchers are still driven by what Kool calls the “science-fiction appeal” of designing or even improving on living systems. Earth’s early life forms may have settled on their genetic alphabet simply because they were constrained by the chemicals available. Adenine, for example, is easy to make from hydrogen cyanide, which was probably present when life first emerged. Once organisms had a working set of bases, perhaps they got locked into that system. “If you start dabbling too much with your fundamental biochemistry, you’re going to get eaten,” says Benner. Although RNA — generally thought to have preceded DNA — might not be the best possible solution for supporting life, it might be the best solution that could have emerged on prebiotic Earth, Benner suggests.

So if nucleic acids arose independently on another planet, would they have the same bases? Benner thinks not, unless the organisms were subjected to the same constraints. Some universal rules might apply, however. For example, Benner says that backbones with repeating charges — which initially seemed to him like a liability — actually discourage folding and ensure that strands with different base sequences behave similarly during processes such as replication. Although some researchers have had success with alternative backbones, many attempts have resulted in molecules that are too stiff or too loose to form a helix. “I think there is a limit to the chemical variation that can be introduced,” says Holliger (see Nature 483, 528–530; 2012).

But that isn’t going to stop researchers from pushing the limits. “Why is the chemistry of living things the way it is? Is it because it’s the only possible answer?” asks Kool. “I believe the answer to that question is no. And the only way to prove it conclusively is to do it.”


U.S. CREATED a Terrorist Safe Haven In Libya

Washington’s Blog
May 8, 2014

The U.S. State Department released its 2013 Country Reports on Terrorism on April 30th, stating:

With a weak government possessing very few tools to exert control throughout its territory, Libya has become a terrorist safe haven and its transit routes are used by various terrorist groups, notably in the southwest and northeast.

Image: Libyan Militants (Wiki Commons).

***

Terrorists continue to utilize ancient trade routes across these borders. All of Libya’s borders are porous and vulnerable to this activity ….

Why has Libya become a safe haven for terrorists?

The State Department’s 2012 Country Reports on Terrorism – the first Country Report to list Libya as a terrorist safe haven – explains:

In 2012, Libyan internal security suffered significant challenges and setbacks as it sought to reassert central authority following the fall of the Qadhafi regime ….

And why did the Qadhafi regime fall?

Oh, yeah … in 2011, the U.S. launched a war in Libya and “regime changed” Qadhafi. As then-Secretary of State Hillary Clinton said:

We came, we saw, he died.

The Washington Post notes:

Moammar Gaddafi was overthrown in 2011 with the help of U.S. and NATO air forces.

***

The Obama administration and its NATO allies bear responsibility for this mess because, having intervened to help rebels overthrow Gaddafi, they then swiftly exited without making a serious effort to help Libyans establish security and build a new political order.

And see this:

It probably doesn’t help that the U.S. backed Al Qaeda terrorists in Libya so  that they would overthrow Gaddaffi.

Sadly, bad U.S. policy has largely been responsible for creating terrorists and terrorist safe havens for many decades. And see this.

 

The U.S. Is Supporting the Most Violent Muslim Terrorists In Order to Wage War for Oil

Posted on May 2, 2013 by WashingtonsBlog

The Government – Which Has Taken Away Our Liberties and Destroyed Our Prosperity to Fight An Endless War On Terror – Has Been Arming, Funding and Otherwise Backing the Very Terrorists Who Are Carrying Out Most of the Attacks

Sunni Muslims commit more terrorist acts worldwide than any other group.  For example, the National Counterterrorism Center’s 2011 Report on Terrorism found that:

Sunni extremists accounted for the greatest number of terrorist attacks and fatalities for the third consecutive year.   More than 5,700 incidents were attributed to Sunni extremists, accounting for nearly 56 percent of all attacks and about 70 percent of all fatalities. Among this perpetrator group, al-Qa‘ida (AQ) and its affiliates were responsible for at least 688 attacks that resulted in almost 2,000 deaths, while the Taliban in Afghanistan and Pakistan conducted over 800 attacks that resulted in nearly 1,900 deaths.  Secular, political, and anarchist groups were the next largest category of perpetrators, conducting 2,283 attacks with 1,926 fatalities, a drop of 5 percent and 9 percent, respectively, from 2010.

(Thankfully, the percentage of Muslim terror attacks in the U.S. is relatively small).

Saudi Arabia is the center of the Sunni branch of Islam.  It is also the center of the most violent and radical sect of Islam … the “Wahhabis” (also called “Salafis”).   But the U.S. has long supported the Madrassa schools within Saudi Arabia which teach radical Wahabi beliefs.

Indeed, the U.S. has directly inserted itself into a sectarian war between the two main Islamic sects, backing the “Sunnis” and attacking the “Shiites” (also called “Shia”). See this, this and this.

For example, American political leaders have been very close to Saudi (i.e. Sunni) leaders for decades:

https://i0.wp.com/i.huffpost.com/gen/7992/thumbs/s-BUSHANDSAUDIS-large.jpg

http://my2bucks.files.wordpress.com/2009/01/bush-saudi-hand-holding-1.jpg

Obama is no different:

https://i0.wp.com/www.usnews.com/dbimages/master/10457/FE_DA_090409publicopinion.jpg

Why?  Because of Saudi oil. (Virtually all geopolitics are based on oil and other hydrocarbons.)

Indeed, (1) the Co-Chair of the Congressional Inquiry into 9/11 and former Head of the Senate Intelligence Committee, and (2) a former 6-year congressman and MSNBC talk show host have both said that – even if the Saudi government was behind 9/11 – we need Saudi oil too much to do anything about it.

Our backing of the most violent branch of Sunni Muslims has had real consequences:

  • Our backing of Sunnis in Afghanistan and Saudi Arabia led to 9/11*
  • Our backing of Sunni extremists in Libya led to attacks on our embassies in Libya and Tunisia

And McClatchy interviewed an Al Qaeda terrorist fighting against the Syrian government – with U.S. backing – as saying:

When we finish with Assad, we will fight the U.S.!

Do you still doubt that the U.S. is supporting Sunni terrorists?

The U.S. National Security Adviser admitted that the U.S. created, organized and armed the Mujahadeen in Afghanistan – including Bin Laden and his lieutenants – to fight the Soviets.  The Mujahadeen are predominately Sunni.    The Mujahadeen eventually morphed into Al Qaeda, which is a Sunni organization.

During various times and places, the U.S. has also backed the Muslim Brotherhood … another Sunni group.

In addition, the American government has supported:

  • Sunni MEK terrorists in Iran
  • The brutal Sunni government in Bahrain as it crushes its majority Shia population whenever it pushes for democratic reform

Pulitzer prize winning journalist Seymour Hersh reported in 2007:

In Lebanon, the [Bush] Administration has cooperated with Saudi Arabia’s government, which is Sunni, in clandestine operations that are intended to weaken Hezbollah, the Shiite organization that is backed by Iran. The U.S. has also taken part in clandestine operations aimed at Iran and its ally Syria. A by-product of these activities has been the bolstering of Sunni extremist groups that espouse a militant vision of Islam and are hostile to America and sympathetic to Al Qaeda.

And the “rebels” in Syria who we’ve been supporting are Al Qaeda and Muslim Brotherhood.

The New York Times reports this week:

In Syria’s largest city, Aleppo, rebels aligned with Al Qaeda control the power plant, run the bakeries and head a court that applies Islamic law. Elsewhere, they have seized government oil fields, put employees back to work and now profit from the crude they produce.

Across Syria, rebel-held areas are dotted with Islamic courts staffed by lawyers and clerics, and by fighting brigades led by extremists. Even the Supreme Military Council, the umbrella rebel organization whose formation the West had hoped would sideline radical groups, is stocked with commanders who want to infuse Islamic law into a future Syrian government.

Nowhere in rebel-controlled Syria is there a secular fighting force to speak of.

Do you get it?

The government has taken away our liberties and destroyed our prosperity in order to fight an endless war on terror.  Americans have become the most spied upon people in history. Never-ending war has destroyed our economy.

And yet the government has been arming, funding and otherwise backing the very terrorists who are carrying out the biggest percentage of terror attacks.

As we noted last year:

In the name of “fighting Al Qaeda or associated forces” or those who “support” those bad guys, the U.S. government has authorized:

In other words, the government has shredded our constitution and destroyed our freedom and liberties in order to fight Al Qaeda and associated forces.

And yet the government is itself supporting – with money, arms, and logistical support – Al Qaeda and associated forces in a number of nations.

People who believe that we’re in a “new post-9/11 reality” should remember that everything happening now started before 9/11, and that current U.S. policy towards the Middle East and North Africa was determined many decades ago.   It’s not just the Neocons who planned this strategy. Jimmy Carter’s National Security Adviser helped to map out the battle plan for Eurasian petroleum resources over a decade ago, and Obama is clearly continuing the same agenda.

Sadly – by any measure – the U.S. causes much more terror than we prevent … all to justify our geopolitical goals.

* The question of false flags is beyond the scope of this post.


Words the NSA FKn Lies to you with


    Surveillance: When we actually access full content of your calls and emails, but not when we access all the data about who you talk to, where you are and what you do.

   Collect: When we run a search on data we collected er… "stored for safe keeping."

   Relevant: Everything. It might become relevant in the future, thus it’s relevant today.

    Targeted: As long as we’re collecting the info for an investigation that involves a "target" then any info is "targeted" even if that info has nothing to do with the "target."

    Incidental: Everything that we collect… er… store that may become "relevant" at some point but isn’t now even though it’s "targeted." In short: everything.

   Inadvertent: Stuff we did on purpose on a massive scale that looks bad when exposed publicly.

    Minimize: A term we use to pretend that we delete information on Americans, but which has many exceptions, including if you encrypted your communications or if we have a sneaking suspicion that you’re 51% foreign based on a hunch.

    No: When said to Congress in response to questions about whether we collect data on millions of Americans, this means "fuck you."

How to Decode the True Meaning of What NSA Officials Say

A lexicon for understanding the words U.S. intelligence officials use to mislead the public.
By Jameel Jaffer and Brett Max Kaufman
US Director of National Intelligence James Clapper testifies before the House Select Intelligence Committee on Capitol Hill in Washington, DC, on April 11, 2013. Director of National Intelligence James Clapper testifies before the House Select Intelligence Committee in Washington, D.C., on April 11, 2013.

Photo by Saul Loeb/AFP/Getty Images

James Clapper, the director of national intelligence, has been harshly criticized for having misled Congress earlier this year about the scope of the National Security Agency’s surveillance activities. The criticism is entirely justified. An equally insidious threat to the integrity of our national debate, however, comes not from officials’ outright lies but from the language they use to tell the truth. When it comes to discussing government surveillance, U.S. intelligence officials have been using a vocabulary of misdirection—a language that allows them to say one thing while meaning quite another. The assignment of unconventional meanings to conventional words allows officials to imply that the NSA’s activities are narrow and closely supervised, though neither of those things is true. What follows is a lexicon for decoding the true meaning of what NSA officials say.

Surveillance. Every time we pick up the phone, the NSA makes a note of whom we spoke to, when we spoke to him, and for how long—and it’s been doing this for seven years. After the call-tracking program was exposed, few people thought twice about attaching the label “surveillance” to it. Government officials, though, have rejected the term, pointing out that this particular program doesn’t involve the NSA actually listening to phone calls—just keeping track of them. Their crabbed definition of “surveillance” allows them to claim that the NSA isn’t engaged in surveillance even when it quite plainly is.

Collect. If an intelligence official says that the NSA isn’t “collecting” a certain kind of information, what has he actually said? Not very much, it turns out. One of the NSA’s foundational documents states that “collection” occurs not when the government acquires information but when the government “selects” or “tasks” that information for “subsequent processing.” Thus it becomes possible for the government to acquire great reams of information while denying that it is “collecting” anything at all.

Relevant. The NSA’s call-tracking program is ostensibly based on the Patriot Act’s Section 215, a provision that allows the government to compel businesses to disclose records that are “relevant” to authorized foreign intelligence investigations. The theory, it seems, is that everybody’s phone records are relevant today because anybody’s phone records might become relevant in the future. This stretches the concept of “relevance” far beyond the breaking point. Even the legislator who wrote Section 215 has rejected the government’s theory. If “relevance” is given such a broad compass, what room is left for “irrelevance”?

Targeted. The call-tracking program is only one of the NSA’s surveillance efforts. Another is what’s been branded PRISM, a program that involves the acquisition of the contents of phone calls, emails, and other electronic communications. Americans need not worry about the program, the government says, because the NSA’s surveillance activities are “targeted” not at Americans but at foreigners outside the United States. No one should be reassured by this. The government’s foreign targets aren’t necessarily criminals or terrorists—they may be journalists, lawyers, academics, or human rights advocates. And even if one is indifferent to the NSA’s invasion of foreigners’ privacy, the surveillance of those foreigners involves the acquisition of Americans’ communications with those foreigners. The spying may be “targeted” at foreigners, but it vacuums up thousands of Americans’ phone calls and emails.

Incidental. Because the government’s surveillance targets are foreigners outside the United States, intelligence officials describe the acquisition of Americans’ communications as “incidental.” But the truth is that the statute behind PRISM—the FISA Amendments Act of 2008—was intended to let the government conduct warrantless surveillance of these very communications. In the debate that preceded passage of the law, intelligence officials told Congress that it was Americans’ communications that were of most interest to them. Indeed, when some legislators introduced bills that would have barred access to these communications without a warrant, President Bush said he would veto them. (One of those bills, incidentally, was introduced by then–Sen. Barack Obama.)

Inadvertent. The PRISM program sweeps up Americans’ purely domestic communications, too. Officials have said that the collection of domestic communications is “inadvertent,” but PRISM’s very design makes the collection of Americans’ domestic communications perfectly predictable. This is in part because the NSA presumes that its surveillance targets are foreigners outside the United States unless it has specific information to the contrary. In 2009, the New York Times reported that the NSA’s collection of purely domestic communications under the 2008 statute had been “significant and systemic.”

Minimize. What does the NSA do with communications that are acquired “incidentally” or “inadvertently”? As intelligence officials have told the courts and Congress, so-called “minimization” procedures limit the NSA’s retention and use of information about American citizens and permanent residents. Here again, though, the terminology is grossly misleading. The 2008 statute gives the NSA broad latitude to retain Americans’ communications, share them with other agencies, and even share them with foreign governments. The NSA’s own documents suggest that the agency retains Americans’ communications indefinitely if they include “foreign intelligence information,” a term defined so broadly that it encompasses any conversation relating to foreign affairs. Even communications that don’t include foreign intelligence information are retained for as long as five years.

No. When James Clapper was asked at a March Senate hearing whether the NSA was collecting information about millions of Americans, he answered, “No,” and then, after a pause, “not wittingly.” As Clapper has now conceded, the correct answer was simply “yes.”

Officials who describe the NSA’s activities using strategically idiosyncratic terminology presumably believe that they are telling the truth. In a certain formal sense, they usually are—though Clapper’s statement is a glaring exception. It shouldn’t need to be said, though, that their duties as public officials go beyond the avoidance of perjury charges. They have an obligation to ensure that the courts, Congress, and the public fully understand the policies that they are being asked to accept. They could start by using the same dictionary the rest of us do.


June 5th, 2014: Reset the Net

TAKE BACK THE INTERNET FROM THE NSA AND OTHER NATION STATE SPY AGENCIES AND GOVERNMENTS

r31

Don’t ask for your privacy. Take it back.

Sign up at ResetTheNet.org

Governments have twisted the Internet into something it was never intended to be: a system for invading our private lives. We’re fighting back and demanding needed reforms, but we don’t have to to wait while politicians promise change. We won’t stop the spying in a single day, but we can take the first steps toward making mass surveillance impossible and restoring human rights to the web. On June 5th, we will reset the Internet, turn off the parts that governments have invaded, put on new armor, and come back stronger than ever before.

We don’t need anyone’s permission.

Now that we know how bulk surveillance programs work, we know they have a weakness: the NSA can hack anybody but their bulk spying operation (the one that violates our human rights!) relies on specific, technological mistakes– mistakes we can fix. Reset the Net is our moment to harness the collective power of the web and meet mass surveillance head on.

Everyone has a role to play.

If you’re a developer, promise to add one new surveillance-resistant feature to your app or website, and announce it on June 5th.

If you’re an Internet user, promise to try out one new privacy tool that directly confronts mass surveillance. We’ll have an epic and definitive list for you to choose from. Then tell your friends to get protected too.

If you have a website or Tumblr, get the Internet Defense League code installed and display the Reset the Net message on June 5th to help educate and rally Internet users worldwide to defend themselves from dragnet surveillance.

 

RESET

ITS ALL UP TO US THE REAL PEOPLE, THE 99%,  THE REAL BOSSES 

WE HAVE TO MAKE A STAND

ITS TIME TO SAY NO MORE   

ITS TIME TO STOP THE DECEPTION 

ITS TIME TO STOP THE FRAUD AND THEFT

ITS TIME TO THROUGH  THE 1% AND ALL THERE ACTOR PUPPET POLITICIANS OUT

ITS TIME TO DISMANTLE THERE TOTAL SURVEILLANCE AND CONTROL SYSTEM

ITS TIME TO STOP FUNDING AND SUPPORTING THERE MILITARY INDUSTRIAL COMPLEX

ITS TIME THAT WE ALL REALIZE THAT OUR 1% THAT RULE US  ARE REALLY A RUTHLESS EVIL SATANIC CRIMINAL CABAL SET UP OVER 200 YEARS AGO TO CREATE A NEW WORLD ORDER UNDER THERE GOD LUCIFER THE LIGHT BEARER THERE ALL SEEING EYE  SATAN

ITS TIME TO ADMIT TO OURSELVES THAT WEVE ALL BEEN DECEIVED

IT ALL STARTS WITH US THE PEOPLE OR AS THEY CALL US “THE USELESS EATERS”

THEY HAVE TOLD US WHAT THEY WANT TO DO

New Ten commandmentGeorgia_Guidestones_ConspiracyCards

SO LETS START WITH THE INTERNET ON JUNE 5TH

PEACEFUL PASSIVE RESISTANCE ONLY WE DO NOT CONDONE VIOLANCE OR CRIMINAL HACHER ACTIVITY IN ANY FORM ON THIS EDUCATIONAL SITE

 

Internet For The Wealthy On The Way Unless We Stop It

Net neutrality meme

PETITIONS AND ONLINE ACTIONS INTERNET, INTERNET FREEDOM
By Kevin Zeese, www.PopularResistance.org
April 24th, 2014

 

Obama’s FCC Chair Seeks End To Net Neutrality

Take Action Today: Immediate mobilization required to save open Internet

*** We need to turn up the heat! Join us to at the FCC (12th St and Maine Ave, SW) in Washington, DC every day from May 7 to May 15 at noon and 5 pm to picket. Spread the word.***

Stop the FCC from Breaking the Internet!

READ THE PETITION

FIRST NAME *

LAST NAME *

EMAIL *

Sign Now

3,715 signatures

Share this with your friends:

In what the New York Times describes as “a net neutrality turnaround” the Obama administration’s new FCC chairman is proposing rules that will create an Internet for the wealthy. The new plan to create a pay to play Internet came to light Wednesday in the Wall Street Journal.

Under the plan wealthy corporations will be able to purchase faster service, while those that cannot do so will have slower service. Rather than an open Internet for all the US will be moving to a class-based Internet. Of course, this will mean that when Netflix and other corporations purchase faster Internet, the consumers who use their service will be paying more to watch movies and download information. As a result, more money will be funneled from working Americans to wealthy telecom giants.

We recently wrote that the United States has lost its democratic legitimacy and now was a plutocratic oligarchy. This is what plutocracy looks like – policies designed for the wealthy, so they can make more money from the rest of us.

According to the Times:

“The new rules, according to the people briefed on them, will allow a company like Comcast or Verizon to negotiate separately with each content company – like Netflix, Amazon, Disney or Google – and charge different companies different amounts for priority service.

“That, of course, could increase costs for content companies, which would then have an incentive to pass on those costs to consumers as part of their subscription prices.”

In the future, if a new start-up – the future Twitter or Facebook – begins it will have a very hard time competing with those who are established Interne companies because the slower service of the start-ups will make them less consumer friendly. As a result we can expect less creativity on the Internet.  As Stacy Higginbotham wrote: “The plans took the hallmark of network neutrality — the notion that ISP shouldn’t discriminate between the traffic flowing over their networks — and turned it on its head.”

The proposal is being shared with other members of the Commission today. There will then be amendments suggested to garner majority support and the plan is to vote on the proposal on May 15,

Take action now.

In a call to action, Save The Internet writes:

What if you had only three weeks before the Internet you know and love was about to disappear?

Would you spend your time binging on listicles or the final season of Breaking Bad? Or would you do something about it?

Would you email all your friends with the news? Blast your social media networks? Demand that Congress and the president keep this amazing invention from going away?

If the Internet had only three weeks left, would you take to the streets and raise hell?

I bet you would.

And here’s your chance to prove it: Because three weeks from today the Internet as we know it may not disappear, but it could be a lot closer to the precipice.

To Contact the Commissioners via E-mail

Chairman Tom Wheeler: Tom.Wheeler@fcc.gov
Commissioner Mignon Clyburn: Mignon.Clyburn@fcc.gov
Commissioner Jessica Rosenworcel: Jessica.Rosenworcel@fcc.gov
Commissioner Ajit Pai: Ajit.Pai@fcc.gov
Commissioner Michael O’Rielly: Mike.O’Rielly@fcc.gov

To call and contact commissioner’s offices, call 1-888-225-5322.

In addition, call your elected representatives.  Tell them if net neutrality is ended, you will hold them accountable by withholding your vote. Both parties hope to control the senate after the mid-term elections, so you have more power than usual to let them know they are losing your vote if they fail to take action to stop the FCC proposal. The number for Congress is 202-224-3121.

Finally, sign the petition at the link  above:

Dear FCC,

I am writing to oppose rules that will allow for discrimination on the Internet – where the wealthy can purchase faster Internet service and everyone else continues to have slower service.

I do not want telecom giants and wealthy Internet companies to determine the future of the Internet. I want new ideas to flourish on the Internet and not be blocked because they do not have sufficient funds to purchase fast service and compete.

I do not want the Internet to be turned into another vehicle that allows money to flow from working Americans to the wealthiest — where web-based services like Netflix purchase faster service and pass the costs on to consumers.

The proposal being considered would kill rather than protect Net Neutrality and allow rampant discrimination online. The Internet should be viewed as a public good and should be operated consistent with our rights to Freedom of Speech and Freedom of the Press. Turning the Internet into a pay to play scheme is unacceptable.

[Signature]

Chairman Wheeler knows this proposal is going to be unpopular and in response to theWall Street Journal and New York Times is denying there has been a “turnaround.” But, his statement is carefully worded and would allow exactly was has been reported.

How Did We Get To Class-Based Internet?

This move to end net neutrality should be placed at the door of President Obama and the US Senate. Obama appointed a former industry head to become chair of the FCC and the Senate unanimously confirmed him.

In April 2008 during his presidential campaign, Barack Obama took the side of the peoplesaying: “The most important thing we can probably do is to preserve the diversity that’s emerging through the Internet…something called net neutrality. I will take a backseat to no one in my commitment to network neutrality.” While he campaigned as a populist he has governed as a plutocrat – on this issue and so many others.

When Tom Wheeler was nominated by President Obama to become the Chairman of the FCC many in the internet freedom community expressed deep concerns.  For decades Wheeler had represented the telecom industry in Washington, DC. From 1979 to 1984, Wheeler headed the National Cable Television Association, now named the National Cable and Telecommunications Association.  He then worked in the telecom industry for 8 years followed by taking over as head of the Cellular Telecommunications & Internet Assn. in 1992, leaving in 2005.  Wheeler went on to become a major Obama fundraiser and adviser.  In fact on his bio page at the FCC this is expressed as “He is the only person to be selected to both the Cable Television Hall of Fame and The Wireless Hall of Fame, a fact President Obama joked made him ‘The Bo Jackson of Telecom.’” Appointing Wheeler was akin to putting the industry in charge of the future of the Internet.

Save The Internet reports this could be the end of the Internet as we know it: “It means we could be headed toward a pay-per-view Internet where Web sites have fees. It means we may have to pay a network tax to run voice-over-the-Internet phones, use an advanced search engine, or chat via Instant Messenger. The next generation of inventions will be shut out of the top-tier service level. Meanwhile, the network owners will rake in even greater profits.”

Now Wheeler is set to propose what the industry has wanted, an end to net neutrality, that will allow them to charge us more for service and created financial barriers that will prevent new services from challenging their domination of the Internet.

If you want an open Internet, take action today. We can stop this – but we must act now.

Please contact the people above and forward this to everyone you know.

More:

Marvin Ammori, The FCC’s New Net Neutrality Proposal Is Even Worse Than You Think, Slatest

Gerry Smith, Everything You Need To Know About The End Of Net Neutrality, Huffington Post

Reset The Net: ‘Don’t Ask for Online Privacy… Take It Back.’

CREATE! INTERNET FREEDOM
By Jon Queally, www.commondreams.org
May 7th, 2014

reset_the_net

Online coalition vows to fight mass online surveillance by empowering web users. Led by online freedom organizations, internet firms, and other advocacy groups, a broadbased coalition is coming together with a singular call to “Reset the Net” as a way to beat back government and corporate surveillance on the web. With a national online day of action scheduled for June 5, supporters of the campaign—including Common Dreams (full disclosure), Free Press, Fight for the Future, Credo Action, RootsAction.org. Demand Progress, Greenpeace, Reddit, CodePink, and dozens of others—say they will use the anniversary of the first reporting about NSA spying based on documents leaked by whistleblower Edward Snowden as an opportunity to reclaim the internet from the spying eyes of the National Security Agency and gross abuse of privacy protections. “A year after Snowden’s shocking revelations, the NSA is still spying on innocent Americans without a warrant,” said CREDO Mobile’s president and co-founder Michael Kieschnick in a statement. “CREDO will continue to demand Congress and the president take action to stop unconstitutional mass warrantless surveillance, and until we win real reform, we will encourage users to adopt encryption tools to protect their personal communications from government abuse of the 1st and 4th amendment.”


Nuclear Fuel Fragment from Fukushima Found In EUROPE

The Nuclear Core Has Finally Been Found … Scattered All Over the World

Washington’s Blog
May 7, 2014

Fukushima did not just suffer meltdowns, or even melt-throughs

Image: Fukushima Plant (Wiki Commons).

It suffered melt-OUTS … where the nuclear core of at least one reactor was spread all over Japan.

In addition, the Environmental Research Department, SRI Center for Physical Sciences and Technology in Vilnius, Lithuaniareported in the Journal of Environmental Radioactivity:

Analyses of (131)I, (137)Cs and (134)Cs in airborne aerosols were carried out in daily samples in Vilnius, Lithuania after the Fukushima accident during the period of March-April, 2011.

***

The activity ratio of (238)Pu/(239,240)Pu in the aerosol sample was 1.2, indicating a presence of the spent fuel of different origin than that of the Chernobyl accident.

(“Pu” is short for plutonium.) Fukushima is 4,988 miles from Vilnius, Lithuania. So the plutonium traveled quite a distance.

Today, EneNews reports that a fuel fragment from Fukushima has been found in Norway:

Atmospheric Chemistry and Physics Discussions, Atmospheric removal times of the aerosol-bound radionuclides 137Cs and 131I during the months after the Fukushima Dai-ichi nuclear power plant accident – a constraint for air quality and climate models, May 2012: Hot particles (particles that carry very high radioactivity, e.g., fragments of the nuclear fuel) were present in the FD-NPP plume.

Elsevier (academic publisher) — Fukushima Accident: Radioactivity Impact on the Environment, Pavel P. Povinec, Katsumi Hirose, Michio Aoyama, 2013: Paatero et al. (2012) estimated that a significant part of the Fukushima-derived radioactivity is in hot particles from autoradiogram of a filter sample from 1 to 4 April 2011 at Mt. Zeppelin, Ny-Alesund, Svalbard.

Poster for Alaska Marine Science Symposium (Arctic Ocean and Bering Sea/Aleutian Islands) — Fukushima fallout: Aerial deposition on the sea ice scenario and wildlife health implications to ice-associated seals, Jan. 20, 2014: Exposure to fallout while on ice in 2011[…] Models suggest pinnipeds may have been exposed while on ice to the following: […] Hot particles, nuclear fuel fragments, were detected in air samples taken in Svalbard, Norway (Paatero et al. 2012).

See also: Gundersen: This video “confirms our worst fears” — Scientist: Reactor core materials found almost 500 km from Fukushima plant — 40,000,000,000,000,000,000 Bq/kg — Can travel very, very significant distances — Hot particles found in 25% of samples from Tokyo and Fukushima (VIDEO)

Fukushima is 10632 kilometers – or 6,606 miles -from Svalbard, Norway.

Moreover, the distance is actually much further … because it took a circuitous route from Fukushima to Norway.

As ENENews reports:

(Paatero et al. 2012) Journal of Environmental Radioactivity, Airborne fission products in the High Arctic after the Fukushima nuclear accident: It is evident that the plume arriving in Svalbard did not come from Europe but directly from North America […] [Hot particles are] either fragments of the nuclear fuel or particles formed by the interactions between condensed radionuclides, nuclear fuel, and structural materials of the reactor […] Based on the total beta, 137Cs and 134Cs activity content […] on the filter it can be estimated that a significant part of the activity related to Fukushima was in hot particles. So far the authors are not aware of any other reports concerning hot particles from the Fukushima accident. […] the radionuclides emitted into the atmosphere were quickly dispersed around practically the whole northern hemisphere within a couple of weeks.

In other words, the hot particles from Fukushima traveled to North American, and then to Europe.

This is only logical.

We noted 2 days after the 2011 Japanese earthquake and tsunami:

The jet stream passes right over Japan. The jet stream was noticed in the 1920′s by a Japanese meteorologist near Mount Fuji, and the Japanese launched balloon bombs into the jetstream to attack America during WWII.

(Indeed, U.S. nuclear authorities were very concerned about the West Coast getting hit by Fukushima radiation … but they covered it up.)

So the Fukushima hot particles traveled from from Japan to the West Coast of North America … and then were carried by wind currents from there.

It’s approximately 5,000 miles from Fukushima to the closest part of North America. It’s another 4,298miles from San Francisco to Svalbard, Norway.

So the hot particle traveled roughly 9,298 miles from Fukushima to Norway.

That’s a long way – and crosses both the Pacific and Atlantic oceans – as shown by this rough mock-up using Google maps:

This is not a total surprise, given that – on April 2, 2011 – the Norwegian Institute for Air Researchmodeled releases from Fukushima hitting Norway and other parts of Europe:

And a March 2011 model from the French Institute for Radiological Protection and Nuclear Safety showedthe same thing (click link for video animation).

Postscript. In response to a reader who doubted that plutonium could travel so far, please note the following:

– The BBC points out that Fukushima reactor 3 was highly unusual in that it burned a plutonium and uranium fuel mixture called “MOX

– The amount of radioactive fuel at Fukushima dwarfs Chernobyl

– A Japanese nuclear reactor designer and various scientists think that the explosion of reactor 3 – the one with plutonium – was a nuclear explosion

– Highly radioactive black “dirt” has been found all over Japan. The Journals Environmental Science & Technology and Journal of Environmental Radioactivity both found that the highly radioactive black substances match fuel from the core of the Fukushima reactors. The U.S. Nuclear Regulatory Commissionagrees

– As discussed above, the jet stream wind current goes straight from Fukushima to the West Coast of North America. So if material from the explosion made it up the jet stream, it could be carried thousands of miles from there