Image via WikipediaFrom Britain comes this latest piece of advice:
An extra helping of brandy butter may well prove to be a life saver. Doctors and scientists want to extract stem cells from our excess fat to keep on hand our own personal body repair kit. We're turning vehicular.
Seriously though, our flabbyhips and thighs could help the future treatment of many illnesses such as heart diseases,arthritis, motor neutron disease and diabetes.
Scientists say the beauty of human body fat it is, unlike embryos, is in plentiful supply and has does not raise any ethical concerns.
Malcolm Alison, professor of stem cell biological research at Barts and the London School of Medicine and Dentistry, said recently. "Storing these cells is wothwhile because scientists are showing these are very versatile cells and it is best to use your own cells(for the treatment)."
He said people should store the cells before they become ill, because it could avoid any delay, for acute liver failure for instance, it could be days to grow and extract cells the old way.
Professor Alisonis carrying out research to convert stem cells from body fat into insulin- producing cells to treat diabetes.
Sunday, December 26, 2010
Monday, December 20, 2010
Information, disinformation and changing the rules...
Information, disinformation and changing the rules
At first glance, ‘Cablegate’ – the mass leaking of US embassy cables to five of the world’s newspapers, including the Guardian here in the UK – might seem a bit of a disappointment to the conspiracy theorist, laying bare the unsurprising duplicity (and bitchiness, one might add) of diplomacy but revealing nothing of grand-scale world-domination plots or evil puppet-masters behind the operations of international diplomacy. The US government's heavy-handed response, however, has provided plenty of grist to the conspiracy mill, while the escalating war between secrecy and transparency must have implications for conspiracy theory’s future.
So far, Julian Assange and WikiLeaks have been broadly supported by conspiracy theorists – support that the arrest of Assange and apparent pressure on WikiLeaks from the US government is likely to encourage. WikiLeaks has been applauded on conspiracy forums as a paragon of disclosure and a shining example to the cowardly US media: as one poster on rense.com put it: “The American media is a whore, whereas the courageous blood of warriors runs through WikiLeaks’ veins.”
But WikiLeaks is not above suspicion. There were stirrings after the release of the Afghan war logs, which, posters suggested, was a disinformation campaign meant to hide the involvement of the US and UK in drug smuggling; or else it was a covert attack on Pakistan to please India and Israel. Now with the release of the embassy cables, it is Israel that is again drawing the attention of suspicious minds. It's a Mossad plot, runs the argument, to make Iran look like the bad guy, so advancing the clash of civilisations scenario. Mahmoud Ahmadinejad himself blames the US for the release of the cables, claiming it’s all a ploy to undermine him. The idea is gaining credence on conspiracy forums. Users point to the cables’ pro-American tone (apparently oblivious to the fact that they were written by American diplomats), and speculate that the 'leak' is in fact a false flag operation à la 9/11, a pretext either for bringing forward an imminent war on Islam or curtailing freedom of speech. In a neat think-twist beloved by conspiracy theorists everywhere, further evidence for this comes from the fact that the leak was allowed to happen: Washington is too clever and powerful to have been outwitted by WikiLeaks; the very fact of disclosure proves that disclosure to be false. [1] Out on the wilder fringes of conspiracydom, more exotic theories speculate that the Russians, George Soros, demons or aliens are really behind the whole affair.
But while many conspiracy theorists might support Assange, he has made clear his contempt for them, saying “Many weirdos email us about UFOs or how they discovered that they were the antichrist while talking with their ex-wife at a garden party over a pot-plant.” And this despite Assange sharing similar character traits (paranoia, self-righteousness, a conviction of his own unique intelligence, individual-against-the-system rhetoric) [2] and having as an ultimate goal the dissolution of all conspiracies.
This one-time hacker isn’t simply a freedom of information activist, though: He wants to reorganise society and speaks of “radically shifting regime behaviour”. And while identifying his primary targets as oppressive regimes such as those in China and Russia, he has also said that exposing secrets could “bring down many administrations that rely on concealing reality – including the US administration”. Many commentators have argued that the material Assange has chosen to leak reveals, in fact, an openly anti-US agenda.
Where Assange differs from many other conspiracy theorists is in seeing the operation of the state – any state – as, by definition, a conspiracy: states, along with big business, constitute conspiratorial institutional hierarchies, or “patronage networks”. Laying out his philosophy in two 2006 tracts, “Conspiracy as Governance” and “State and Terrorist Conspiracies”, Assange wrote: “Authoritarian regimes give rise to forces which oppose them by pushing against the individual and collective will to freedom, truth and self realization. Plans which assist authoritarian rule, once discovered, induce resistance. Hence these plans are concealed by successful authoritarian powers. This is enough to define their behaviour as conspiratorial.” He explains such conspiracies as being predicated on the communication links between members; disrupt these links, he says, and you will induce fear and paranoia, forcing the organisation to turn in on itself, making communication less effective – meaning it is less able to think or conspire and thus hold on to power. “If total conspiratorial power is zero, there is no information flow between the conspirators and hence no conspiracy.” Secretive and unjust organisations are to be made more secretive and unjust in order that they might implode: “When we look at an authoritarian conspiracy as a whole, we see a system of interacting organs, a beast with arteries and veins whose blood may be thickened and slowed until it falls, stupefied; unable to sufficiently comprehend and control the forces in its environment.”
Like many anarchists, Assange has been less forthcoming about exactly what would replace the current system. His idea seems to be of a collection of individuals, each free to experience emotions and enjoy full self-actualisation. [3] Ironically, it would seem that this most tech-savvy and plugged-in of men would like this to happen in a Rousseauesque rural idyll. As he wrote on his personal website, iq.org: “I’d take a deep book, a backpack of food and a tent and go walking for three months along the .au or .nzdecalibrate by disconnecting behaviour and reward and failing to provide the sense data that our biological mental and physical structures have evolved to require.”
The contradictions of Assange’s position have not gone unremarked. His own organisation is highly secretive and depends on encrypted channels of communication between individuals. The lack of transparency of WikiLeaks’ own funding has also raised eyebrows, not least those of John Young, who set up document-leaking site Cryptome in 1996 and helped found WikiLeaks before leaving over concerns about its hubris, size, and the money if was seeking to raise (he is still broadly supportive of the site, despite remarks comparing it to a cult, government or spy organisation which were interpreted by the more conspiracy-minded as clear proof of WikiLeaks being a CIA-front).
WikiLeaks, one might argue, enjoys just the kind of power without accountability of which Assange is so critical. His attempts to cut the communication links of his enemies could themselves be seen as a form of censorship. Assange has argued that the ends justify the means – that he and WikiLeaks members might get “blood on our hands” from publishing, for example, a document about electromagnetic devices used by soldiers to prevent IEDs from being triggered, but that the ultimate goal makes that a price worth paying. To some, this makes him as morally compromised as those he’d like to expose, and his own authoritarian style, control freakery and grandstanding seem out of line with his ideological pronouncements and the ethos of the hacker community from which he emerged.
Still, while not everyone agrees with his personal style and subversive ambitions, he has certainly fired up the freedom of information debate. As we go to press, it seems no one is quite sure whether, legally speaking, the leaking of secrets in this manner is wrong. Assange himself, of course, is in no doubt. In 2008, after lawyers demanded that WikiLeaks take down the Scientology manuals it had posted online, Assange retorted: "WikiLeaks will not comply with legally abusive requests from Scientology any more than WikiLeaks has complied with similar demands from Swiss banks, Russian offshore stem-cell centers, former African kleptocrats, or the Pentagon."
As the Justice Department desperately tries to put together a case against Assange, an infowar is raging in cyberspace. Whether under the direct control of Washington or not (there is, after all, the First Amendement to consider), forces are conspiring to take WikiLeaks down. Amazon, which hosted its servers in the US, withdrew services on the grounds that the site was breaking its terms and conditions, as did domain name firm EveryDNS; Visa, Mastcard and PayPal (who claimed to have acted under US government pressure, then retracted the statement) suspended all payments to the site. All of these companies subsequently suffered revenge attacks by hackers, in a series of DDoS (distributed denial-of-service) attacks orchestrated by the collective Anonymous under the moniker 'Operation: Payback'. Declaring “the major shitstorm has begun”, Anonymous (which describes itself as "an anonymous, decentralised movement that fights against censorship and copywrong") is also attacking the sites of other assorted WikiLeaks ‘enemies’, including Joe Lieberman and Sarah Palin, and it threatened Twitter after suggestions, which Twitter denies, that #wikileaks was being prevented from trending. WikiLeaks has itself been bombarded with DDoS attacks, apparently by hackers favourable to the cause of the US government. WikiLeaks will be incredibly hard, however, to take down permanently, largely because of the complexity of its infrastructure. It has its content on many servers and hundreds of domain names; it is woven through the Internet, and where it has physical locations these are spread between different countries and frequently have to be traced back through third parties. There are also now hundreds of mirror sites, and an encrypted file released by WikiLeaks and containing all the embassy cables is now being furiously copied and shared via peer-to-peer networks like BitTorrent.
Even if Assange were to be silenced or WikiLeaks shut down, the genie is out of the bottle. Other document hosting sites – Cryptome, IndoLeaks, BalkanLeaks – already exist, and more will spring up to take WikiLeaks’s place. More widely, the ranks of those fighting for transparency are swelling: for instance, Peter Sunde (one of the founders of The Pirate Bay), is attempting to create a new root server to compete with ICANN, the system which controls the internet's domain name system and can take down domains considered to be breaking the law; Iceland has passed the Icelandic Modern Media Initiative (IMMI), which seeks to create a legal safe haven for journalists by combining all the source-protection, freedom of information and transparency laws from around the world.
This is a war about secrecy in an Internet age: is secrecy desirable, and if so, is it possible? Who wins the war is of great moment to the conspiracy theorist. If the forces for concealment triumph, increasingly lurid conspiracies will flourish, even if hounded to the edges of the net. But Assange’s focus is not on what is revealed so much as on the process of revealing; and if the movement for transparency comes out on top, the traditional conspiracy theorist may have to choose between joining in the practical fight for disclosure or clinging to pet theories in the face of mounting lack of evidence and becoming an irrelevance.
In that case, the Internet, commonly held to have been a boon to conspiracy theory, could become, in some senses, the agent of its collapse. The other possibility is that a growing avalanche of leaks eventually exposes the existence of some nefarious New World Order scheme to take over the world, proving the conspiracy theorists to have been right all along…
Notes
1 This, for example, from gem_man on abovetopsecret, is typical of posts in this vein: "I'm also starting to think that Wikileaks is a disinfo agent of the US government. Disseminate some truth and sprinkle them with lies. The US government can easily embargo the Wikileaks website but they don't do it. The other purpose of Wikileaks is to give the US government some public support in suppressing the information flowing in the internet. They can always say that they have to regulate the internet because the internet is a threat to national security."
2 "When my eyes see phrases like 'right thing to do', 'appropriate' etc, I wonder what unstated world view I am meant to share. These phrases smell of that unusually putrid whip; social sanction. But every man has experienced social sanction as the direct manifestation of morons baying at the moon, nodding and calling the result consensus.”
3 From iq.org: "Do not be concerned about when one is to do good, who defines good, etc. Act in the way you do because to do otherwise would [to be] at odds with yourself. Being on a path true to your character carries with it a state of flow, where the thoughts about your next step come upon waking, unbidden, but welcome."
Sources
http://www.bbc.co.uk/news/technology-11928899
rense.com
http://www.nytimes.com/2010/12/08/world/08leak.html?partner=rss&emc=rss
http://www.guardian.co.uk/media/2010/dec/08/paypal-us-pressure-wikileaks-mastercard
http://www.newyorker.com/reporting/2010/06/07/100607fa_fact_khatchadourian?current
http://www.guardian.co.uk/world/blog/2010/dec/03/julian-assange-wikileaks
http://iq.org/conspiracies.pdf
http://web.archive.org/web/20070110200827/
http://iq.org/conspiracies.pdf
http://zunguzungu.wordpress.com/2010/11/29/julian-assange-and-the-computer-conspiracy-%E2%80%9Cto-destroy-this-invisible-government%E2%80%9D/ abovetopsecret.com
http://www.wired.com/threatlevel/2010/12/columbia-wikileaks-policy/
http://www.newscientist.com/article/dn19816-info-pirates-seek-an-alternative-internet.html
http://catastrophist.wordpress.com/2010/08/14/john-young-internet-vast-spying-machine/
http://catastrophist.wordpress.com/2010/07/29/wikileaks-internal-dissent/
http://www.techeye.net/internet/wau-holland-foundation-sheds-light-on-wikileaks-donations
http://news.cnet.com/8301-31921_3-20011106-281.html
http://blather.net/zeitgeist/archives/2010/04/cryptome_definitively_supports.html
http://blogs.forbes.com/andygreenberg/2010/11/29/wikileaks-julian-assange-wants-to-spill-your-corporate-secrets/
http://www.abovetopsecret.com/forum/thread634966/pg1
http://web.archive.org/web/20071020051936/
http://iq.org/
http://www.nzherald.co.nz/crime/news/article.cfm?c_id=30&objectid=10692956
http://www.aolnews.com/2010/12/16/weird-offbeat-and-funny-news-pictures-photos/
So far, Julian Assange and WikiLeaks have been broadly supported by conspiracy theorists – support that the arrest of Assange and apparent pressure on WikiLeaks from the US government is likely to encourage. WikiLeaks has been applauded on conspiracy forums as a paragon of disclosure and a shining example to the cowardly US media: as one poster on rense.com put it: “The American media is a whore, whereas the courageous blood of warriors runs through WikiLeaks’ veins.”
But WikiLeaks is not above suspicion. There were stirrings after the release of the Afghan war logs, which, posters suggested, was a disinformation campaign meant to hide the involvement of the US and UK in drug smuggling; or else it was a covert attack on Pakistan to please India and Israel. Now with the release of the embassy cables, it is Israel that is again drawing the attention of suspicious minds. It's a Mossad plot, runs the argument, to make Iran look like the bad guy, so advancing the clash of civilisations scenario. Mahmoud Ahmadinejad himself blames the US for the release of the cables, claiming it’s all a ploy to undermine him. The idea is gaining credence on conspiracy forums. Users point to the cables’ pro-American tone (apparently oblivious to the fact that they were written by American diplomats), and speculate that the 'leak' is in fact a false flag operation à la 9/11, a pretext either for bringing forward an imminent war on Islam or curtailing freedom of speech. In a neat think-twist beloved by conspiracy theorists everywhere, further evidence for this comes from the fact that the leak was allowed to happen: Washington is too clever and powerful to have been outwitted by WikiLeaks; the very fact of disclosure proves that disclosure to be false. [1] Out on the wilder fringes of conspiracydom, more exotic theories speculate that the Russians, George Soros, demons or aliens are really behind the whole affair.
But while many conspiracy theorists might support Assange, he has made clear his contempt for them, saying “Many weirdos email us about UFOs or how they discovered that they were the antichrist while talking with their ex-wife at a garden party over a pot-plant.” And this despite Assange sharing similar character traits (paranoia, self-righteousness, a conviction of his own unique intelligence, individual-against-the-system rhetoric) [2] and having as an ultimate goal the dissolution of all conspiracies.
This one-time hacker isn’t simply a freedom of information activist, though: He wants to reorganise society and speaks of “radically shifting regime behaviour”. And while identifying his primary targets as oppressive regimes such as those in China and Russia, he has also said that exposing secrets could “bring down many administrations that rely on concealing reality – including the US administration”. Many commentators have argued that the material Assange has chosen to leak reveals, in fact, an openly anti-US agenda.
Where Assange differs from many other conspiracy theorists is in seeing the operation of the state – any state – as, by definition, a conspiracy: states, along with big business, constitute conspiratorial institutional hierarchies, or “patronage networks”. Laying out his philosophy in two 2006 tracts, “Conspiracy as Governance” and “State and Terrorist Conspiracies”, Assange wrote: “Authoritarian regimes give rise to forces which oppose them by pushing against the individual and collective will to freedom, truth and self realization. Plans which assist authoritarian rule, once discovered, induce resistance. Hence these plans are concealed by successful authoritarian powers. This is enough to define their behaviour as conspiratorial.” He explains such conspiracies as being predicated on the communication links between members; disrupt these links, he says, and you will induce fear and paranoia, forcing the organisation to turn in on itself, making communication less effective – meaning it is less able to think or conspire and thus hold on to power. “If total conspiratorial power is zero, there is no information flow between the conspirators and hence no conspiracy.” Secretive and unjust organisations are to be made more secretive and unjust in order that they might implode: “When we look at an authoritarian conspiracy as a whole, we see a system of interacting organs, a beast with arteries and veins whose blood may be thickened and slowed until it falls, stupefied; unable to sufficiently comprehend and control the forces in its environment.”
Like many anarchists, Assange has been less forthcoming about exactly what would replace the current system. His idea seems to be of a collection of individuals, each free to experience emotions and enjoy full self-actualisation. [3] Ironically, it would seem that this most tech-savvy and plugged-in of men would like this to happen in a Rousseauesque rural idyll. As he wrote on his personal website, iq.org: “I’d take a deep book, a backpack of food and a tent and go walking for three months along the .au or .nzdecalibrate by disconnecting behaviour and reward and failing to provide the sense data that our biological mental and physical structures have evolved to require.”
The contradictions of Assange’s position have not gone unremarked. His own organisation is highly secretive and depends on encrypted channels of communication between individuals. The lack of transparency of WikiLeaks’ own funding has also raised eyebrows, not least those of John Young, who set up document-leaking site Cryptome in 1996 and helped found WikiLeaks before leaving over concerns about its hubris, size, and the money if was seeking to raise (he is still broadly supportive of the site, despite remarks comparing it to a cult, government or spy organisation which were interpreted by the more conspiracy-minded as clear proof of WikiLeaks being a CIA-front).
WikiLeaks, one might argue, enjoys just the kind of power without accountability of which Assange is so critical. His attempts to cut the communication links of his enemies could themselves be seen as a form of censorship. Assange has argued that the ends justify the means – that he and WikiLeaks members might get “blood on our hands” from publishing, for example, a document about electromagnetic devices used by soldiers to prevent IEDs from being triggered, but that the ultimate goal makes that a price worth paying. To some, this makes him as morally compromised as those he’d like to expose, and his own authoritarian style, control freakery and grandstanding seem out of line with his ideological pronouncements and the ethos of the hacker community from which he emerged.
Still, while not everyone agrees with his personal style and subversive ambitions, he has certainly fired up the freedom of information debate. As we go to press, it seems no one is quite sure whether, legally speaking, the leaking of secrets in this manner is wrong. Assange himself, of course, is in no doubt. In 2008, after lawyers demanded that WikiLeaks take down the Scientology manuals it had posted online, Assange retorted: "WikiLeaks will not comply with legally abusive requests from Scientology any more than WikiLeaks has complied with similar demands from Swiss banks, Russian offshore stem-cell centers, former African kleptocrats, or the Pentagon."
As the Justice Department desperately tries to put together a case against Assange, an infowar is raging in cyberspace. Whether under the direct control of Washington or not (there is, after all, the First Amendement to consider), forces are conspiring to take WikiLeaks down. Amazon, which hosted its servers in the US, withdrew services on the grounds that the site was breaking its terms and conditions, as did domain name firm EveryDNS; Visa, Mastcard and PayPal (who claimed to have acted under US government pressure, then retracted the statement) suspended all payments to the site. All of these companies subsequently suffered revenge attacks by hackers, in a series of DDoS (distributed denial-of-service) attacks orchestrated by the collective Anonymous under the moniker 'Operation: Payback'. Declaring “the major shitstorm has begun”, Anonymous (which describes itself as "an anonymous, decentralised movement that fights against censorship and copywrong") is also attacking the sites of other assorted WikiLeaks ‘enemies’, including Joe Lieberman and Sarah Palin, and it threatened Twitter after suggestions, which Twitter denies, that #wikileaks was being prevented from trending. WikiLeaks has itself been bombarded with DDoS attacks, apparently by hackers favourable to the cause of the US government. WikiLeaks will be incredibly hard, however, to take down permanently, largely because of the complexity of its infrastructure. It has its content on many servers and hundreds of domain names; it is woven through the Internet, and where it has physical locations these are spread between different countries and frequently have to be traced back through third parties. There are also now hundreds of mirror sites, and an encrypted file released by WikiLeaks and containing all the embassy cables is now being furiously copied and shared via peer-to-peer networks like BitTorrent.
Even if Assange were to be silenced or WikiLeaks shut down, the genie is out of the bottle. Other document hosting sites – Cryptome, IndoLeaks, BalkanLeaks – already exist, and more will spring up to take WikiLeaks’s place. More widely, the ranks of those fighting for transparency are swelling: for instance, Peter Sunde (one of the founders of The Pirate Bay), is attempting to create a new root server to compete with ICANN, the system which controls the internet's domain name system and can take down domains considered to be breaking the law; Iceland has passed the Icelandic Modern Media Initiative (IMMI), which seeks to create a legal safe haven for journalists by combining all the source-protection, freedom of information and transparency laws from around the world.
This is a war about secrecy in an Internet age: is secrecy desirable, and if so, is it possible? Who wins the war is of great moment to the conspiracy theorist. If the forces for concealment triumph, increasingly lurid conspiracies will flourish, even if hounded to the edges of the net. But Assange’s focus is not on what is revealed so much as on the process of revealing; and if the movement for transparency comes out on top, the traditional conspiracy theorist may have to choose between joining in the practical fight for disclosure or clinging to pet theories in the face of mounting lack of evidence and becoming an irrelevance.
In that case, the Internet, commonly held to have been a boon to conspiracy theory, could become, in some senses, the agent of its collapse. The other possibility is that a growing avalanche of leaks eventually exposes the existence of some nefarious New World Order scheme to take over the world, proving the conspiracy theorists to have been right all along…
Notes
1 This, for example, from gem_man on abovetopsecret, is typical of posts in this vein: "I'm also starting to think that Wikileaks is a disinfo agent of the US government. Disseminate some truth and sprinkle them with lies. The US government can easily embargo the Wikileaks website but they don't do it. The other purpose of Wikileaks is to give the US government some public support in suppressing the information flowing in the internet. They can always say that they have to regulate the internet because the internet is a threat to national security."
2 "When my eyes see phrases like 'right thing to do', 'appropriate' etc, I wonder what unstated world view I am meant to share. These phrases smell of that unusually putrid whip; social sanction. But every man has experienced social sanction as the direct manifestation of morons baying at the moon, nodding and calling the result consensus.”
3 From iq.org: "Do not be concerned about when one is to do good, who defines good, etc. Act in the way you do because to do otherwise would [to be] at odds with yourself. Being on a path true to your character carries with it a state of flow, where the thoughts about your next step come upon waking, unbidden, but welcome."
Sources
http://www.bbc.co.uk/news/technology-11928899
rense.com
http://www.nytimes.com/2010/12/08/world/08leak.html?partner=rss&emc=rss
http://www.guardian.co.uk/media/2010/dec/08/paypal-us-pressure-wikileaks-mastercard
http://www.newyorker.com/reporting/2010/06/07/100607fa_fact_khatchadourian?current
http://www.guardian.co.uk/world/blog/2010/dec/03/julian-assange-wikileaks
http://iq.org/conspiracies.pdf
http://web.archive.org/web/20070110200827/
http://iq.org/conspiracies.pdf
http://zunguzungu.wordpress.com/2010/11/29/julian-assange-and-the-computer-conspiracy-%E2%80%9Cto-destroy-this-invisible-government%E2%80%9D/ abovetopsecret.com
http://www.wired.com/threatlevel/2010/12/columbia-wikileaks-policy/
http://www.newscientist.com/article/dn19816-info-pirates-seek-an-alternative-internet.html
http://catastrophist.wordpress.com/2010/08/14/john-young-internet-vast-spying-machine/
http://catastrophist.wordpress.com/2010/07/29/wikileaks-internal-dissent/
http://www.techeye.net/internet/wau-holland-foundation-sheds-light-on-wikileaks-donations
http://news.cnet.com/8301-31921_3-20011106-281.html
http://blather.net/zeitgeist/archives/2010/04/cryptome_definitively_supports.html
http://blogs.forbes.com/andygreenberg/2010/11/29/wikileaks-julian-assange-wants-to-spill-your-corporate-secrets/
http://www.abovetopsecret.com/forum/thread634966/pg1
http://web.archive.org/web/20071020051936/
http://iq.org/
http://www.nzherald.co.nz/crime/news/article.cfm?c_id=30&objectid=10692956
http://www.aolnews.com/2010/12/16/weird-offbeat-and-funny-news-pictures-photos/
Related articles
- Just what does Julian Assange want? | Theo Brainin (guardian.co.uk)
- Julian Assange Sweden Police Report Details Alleged Sexual Offenses (huffingtonpost.com)
- WikiLeaks boss Julian Assange's week in Sweden grows ever sleazier (dailymail.co.uk)
- "Conspiracy Theorists: Israel Is Behind WikiLeaks" and related posts (theyeshivaworld.com)
- WikiLeaks' Assange equates government with conspiracy (theglobeandmail.com)
Wednesday, December 8, 2010
Accidental condom inhalation...
Image via Wikipedia
Accidental condom inhalation...
Arya CL, Gupta R, Arora VK.
Jaswant Rai Speciality Hospital, Meerut, India.
Abstract
Abstract
A 27-year-old lady presented with persistent cough, sputum and fever for the preceding six months. Inspite of trials with antibiotics and anti-tuberculosis treatment for the preceeding four months, her symptoms did not improve. A subsequent chest radiograph showed non-homogeneous collapse-consolidation of right upper lobe. Videobronchoscopy revealed an inverted bag like structure in right upper lobe bronchus and rigid bronchoscopic removal with biopsy forceps confirmed the presence of a condom. Detailed retrospective history also confirmed accidental inhalation of the condom during fellatio.
Acknowledgements: Rainyday Superstar/Buzz
Related articles
- NCBI ROFL: Accidental condom inhalation. | Discoblog (blogs.discovermagazine.com)
- Would You Be More Likely to Use 'Fashionable' Condoms? (thegloss.com)
- It's Like Super Mario Bros, But With A Condom [Video] (kotaku.com)
- Cost-Conscious Contraceptive Ads - Sir Richard's Condoms Prevent Parents with Dependents (GALLERY) (trendhunter.com)
- Analysis of retractions in PubMed (r-bloggers.com)
- Poll: Do Fancy Condoms Put You In The Mood For Sex? (crushable.com)
Monday, December 6, 2010
The real Odessa: Blind refugee led Israel to Eichmann...
Image via Wikipedia
Uki Goni, the Guardian's correspondent in Argentina, reveals in a new book the extraordinary truth behind the Nazi fugitive's capture
- The Guardian,
- Article history
For more than 40 years the world has believed that it was the Israeli secret service, Mossad, backed up by the Nazi hunter Simon Wiesenthal, which orchestrated the dramatic capture of Adolf Eichmann in Argentina, which led to his trial and execution. But the truth is far stranger than that. The man who burst the protective bubble around Eichmann, the organiser of the deportation of millions of Jews to Hitler's concentration camps and the most notorious Nazi to gain refuge in Argentina, was not an Israeli super-sleuth but a blind refugee from Nazi persecution who had arrived in Argentina in 1938. Lothar Hermann, who was half Jewish, was imprisoned in Dachau concentration camp in 1935-36 for his socialist activities. After the events of Kristallnacht he decided it was time to leave Germany. Some years after his arrival in Buenos Aires he lost his sight as a delayed result of the severe beatings he had received from the Gestapo in Dachau. Hermann, his wife and their beautiful young daughter Sylvia lived in the Olivos area of Buenos Aires as non-Jewish Germans. Sylvia became friendly with the Eichmann sons, in particular the eldest, Klaus, whom she apparently dated. Klaus Eichmann visited Sylvia's home on various occasions, and made strongly anti-semitic remarks, including his regret that the Nazis could not complete the extermination of the Jews, and added that his father had served in the war. Sylvia was never invited to the young man's home and was unaware that his father lived under the alias Klement, as Eichmann had insisted on his sons continuing to bear the real family name. Lost contact Some time later the Hermanns moved to Coronel Suarez, a town 300 miles from Buenos Aires, and lost contact with the Eichmanns. But in 1957 the name of Adolf Eichmann cropped up in newspaper reports of a Nazi trial in Frankfurt. It did not take long for Hermann to figure out that the man being mentioned was in all probability Klaus Eichmann's father. Hermann dutifully sent a letter to the Frankfurt judicial authorities alerting them to Eichmann's presence in Argentina. His letter fell into the hands of Fritz Bauer a state attorney general who later led the groundbreaking Auschwitz trials in 1963. Bauer sent Hermann a description of Eichmann and asked him to find out more details. The blind man and his daughter did as they were asked, travelling to Buenos Aires to try to discover Eichmann's exact address. Sylvia found the house quite quickly. A knock at the door was answered by Klaus's mother. "Is this the Eichmann home?" Sylvia asked. Suddenly a middle-aged man appeared at the door. Sylvia asked if Klaus was home. The man said he was working late. "Are you Herr Eichmann?" Sylvia asked innocently. The man did not answer but finally conceded that he was Klaus's father. Sylvia explained that she was a friend who was looking for him, and then said goodbye. Hermann and his daughter promptly sent off a new letter to Frankfurt positively identifying, according to Bauer's description, the former chief of "Jewish affairs", and giving his address as 4261 Chacabuco Street in Olivos. Bauer knew enough about the Nazi-riddled judicial system of his own country to realise that Eichmann would at once be alerted to any action against him by Germany. So in September 1957 he secretly informed Israel that he had received confidential information stating that Eichmann was living in Argentina. Mossad took a mild interest in Bauer's lead, sending Yoel Goren to Buenos Aires in January 1958. After a quick inspection of the middle-class Olivos neighbourhood he reported that it was impossible for an important Nazi to be living there. Bauer was not ready to give up so easily, however. By revealing Hermann's identity to Mossad he was able to convince the Israelis to send a second mission. An agent called Efraim Hofstetter visited the Hermanns and their daughter in Coronel Suarez. Hermann complained loudly that the information he had provided was sufficient to proceed with Eichmann's arrest, but Hofstetter said he needed more proof, such as a copy of Eichmann's Argentinian ID picture. He left Hermann $130 to cover expenses and gave him a US address to write to from then on. So it was that a blind man living 10 hours by train from Buenos Aires was left with the task of proving Eichmann's identity. It did not intimidate Hermann. He obtained the information that the house on Chacabuco Street was owned by an Austrian called Francisco Schmidt, and for a time he became convinced that Schmidt was Eichmann's alias, and sent off more letters with this mistaken hypothesis to the new address he was given. In Israel, meanwhile, the Mossad chiefs had lost all interest in the lead and the order was given for communication with Hermann to be gradually discontinued. Reward But Hermann was determined. Excited by a $10,000 reward announced in the newspapers by Tuviah Friedman of the Haifa Documentation Centre in Israel, he started letting more people in on his secret. In a letter to Friedman dated October 17 1959 he claimed to possess the "name and exact details" of Eichmann's Argentinian ID papers. On December 29, growing ever more impatient, he met the leader of Argentina's main Jewish organisation. Suddenly the number of people who knew of Eichmann's whereabouts had expanded way beyond a small group of Israeli agents. Still, nothing seemed to be happening. Fearful that his role in Eichmann's eventual capture was being minimised to cut him out of the reward, in March 1960 Hermann wrote an angry letter to Friedman. "It seems that you attach little value to the speedy conclusion of the matter or that you have no interest at all to arrest Eichmann," Hermann fumed. The rest of the story is well known. A special Mossad team was assembled and sent to Buenos Aires to kidnap Eichmann, who had meanwhile moved from middle class Olivos to a small house he had built for himself and his family in the desolate outskirts of San Fernando. Seeking his extradition was ruled out from the very start, after Germany's failed attempt to extradite Josef Mengele. Eichmann was ignominiously snatched on an earth road on May 11 1960 as he returned from work, and taken to a secret hiding place outside Buenos Aires. For 10 days he was kept blindfolded and handcuffed to a bed while Mossad decided how to get him out of Argentina. Finally, on May 21, Eichmann was disguised in the uniform of an El Al flight attendant and was bundled on to a plane to Tel Aviv. On May 23 the Israeli prime minister, David Ben Gurian, announced his capture to the world: "Eichmann is already in this country under arrest and will shortly be brought to trial." What he did not add was that a blind man who lived on a meagre pension in the middle of the pampas had achieved what seemed impossible. Not only had he single-handedly located a notorious Nazi criminal, he had also managed to galvanise a lethargic Mossad, which had shown decidedly little interest in pursuing the case. Israel was practically shamed into capturing Eichmann. Eichmann was found guilty in Jerusalem and sentenced to death by hanging. The execution was carried out on May 31 1962. His last words were: "Long live Germany, long live Argentina, long live Austria. I shall not forget them." Hermann's part in Eichmann's capture remained a closely guarded secret until 1971 when the Mossad director Isser Harel revealed it to the Israeli press. From Argentina Hermann began to bombard Friedman with furious letters demanding his reward. Finally, in July 1972, the Israeli prime minister Golda Meier settled the debt. Acknowledgements: This is an edited extract from The Real Odessa: How Peron Brought the Nazi War Criminals to Argentina, by Uki Goni, published by Granta Books at £20 http"//en.wikipedia.org/wiki/ODESSA
http://greyfalcon.us/The Real Odessa.htm
Related articles
- Eichmann (variety.com)
- 2 reviews of Adolf Eichmann (rateitall.com)
- Movie Review | 'Eichmann': The Logistician of the Holocaust (movies.nytimes.com)
- Buenos Aires - Buenos Aires, Argentina (travelpod.com)
- Madness in Argentina - Buenos Aires, Argentina (travelpod.com)
Thursday, December 2, 2010
The World Aids Day is celebrated on 1 December each year...
The World Aids day is celebrated on 1st December every year. It is dedicated to elevate the awareness of AIDS pandemic sources by spreading of HIV infectivity. It is ordinary to hold remembrance to respect persons who have expired from HIV/AIDS on this day. Health officials and Govt detect the event, often with forums or speeches on AIDS theme. Since 1995, the President of United States has created an official announcement on the World AIDS Day. Govt of other states have made similar announcement on this day.
This disease has killed above 25 million people between 1981 and 2007. About 33.2 million people universal live with HIV/AIDS as of 2007. It has become the most critical epidemic in the recorded history.
Read more::http://www.altiusdirectory.com/society/world-aids-day.php
This disease has killed above 25 million people between 1981 and 2007. About 33.2 million people universal live with HIV/AIDS as of 2007. It has become the most critical epidemic in the recorded history.
Read more::http://www.altiusdirectory.com/society/world-aids-day.php
Related articles
- World AIDS Day (2010) (biblicalpaths.wordpress.com)
- World Aids Day (phylor.wordpress.com)
- Obama speaks on World AIDS Day - USA Today (news.google.com)
- World AIDS Day: Psychological Science in the Fight Against HIV/AIDS (prweb.com)
- December 1st Is World AIDS Day (zocdoc.com)
Thursday, November 25, 2010
A true Scotsman wears nothing under his kilt...
Image via WikipediaA true Scotsman wears nothing under his kilt. But this is to change if some people can get their own way.
But never more, it seems.Scots are now reportedly being warned that the sartorial habit is both indecent and unhygenic. Bloody Sassenachs!
A representative of the Scottish Tartans Authority recently stated that when you hire a kilt, remember to also to wear underwear because, it is claimed, many are left in a disgusting state. Indeed!
Kilt rental firms are being backed by the organisation charged with maintaining standards in Highland dress. The age-old custom of "going commando" has had its day!
The tradition dates back to clansmen warriors who wore little but long kilts around their shoulders. The Scottish military subsequently took up the fashion and Scots regiments even today still parade sans underwear.
A spokesman of the Authority recalls his own father, a sergeant-major, who used to clip a car mirror on the end of his pace-stick to hold under the kilts of his men to check if they were suitably undressed for parade.
To bare or not bare divides opinion.
Its just tradition to go without - a macho cultural pressure on Scotsmen - it really doesn't prove much today.
But wearing underpants seems a sensible idea if you do hire kilts - otherwise feel free to please one's self.
A highland soldier dressed in his kilt stood on guard, rifle in the at ease position.
A beautiful young woman in her early 20's approached him,and gentled lifted his kilt
"Gruesome!" she commented.
"Och lassie, it grew some while you have been here." he replied.
Acknowledgements: Associated Press
But never more, it seems.Scots are now reportedly being warned that the sartorial habit is both indecent and unhygenic. Bloody Sassenachs!
A representative of the Scottish Tartans Authority recently stated that when you hire a kilt, remember to also to wear underwear because, it is claimed, many are left in a disgusting state. Indeed!
Kilt rental firms are being backed by the organisation charged with maintaining standards in Highland dress. The age-old custom of "going commando" has had its day!
The tradition dates back to clansmen warriors who wore little but long kilts around their shoulders. The Scottish military subsequently took up the fashion and Scots regiments even today still parade sans underwear.
A spokesman of the Authority recalls his own father, a sergeant-major, who used to clip a car mirror on the end of his pace-stick to hold under the kilts of his men to check if they were suitably undressed for parade.
To bare or not bare divides opinion.
Its just tradition to go without - a macho cultural pressure on Scotsmen - it really doesn't prove much today.
But wearing underpants seems a sensible idea if you do hire kilts - otherwise feel free to please one's self.
A highland soldier dressed in his kilt stood on guard, rifle in the at ease position.
A beautiful young woman in her early 20's approached him,and gentled lifted his kilt
"Gruesome!" she commented.
"Och lassie, it grew some while you have been here." he replied.
Acknowledgements: Associated Press
Related articles
- New draft on Scottish tradition warms kilt wearers (ctv.ca)
- New draft on Scottish tradition warms kilt wearers (sfgate.com)
- New draft on Scottish tradition warms kilt wearers (seattletimes.nwsource.com)
- Draught guidance: a kilt need underwear (telegraph.co.uk)
- Scots in kilt cover-up shock (thesun.co.uk)
- Scottish Tartans Authority Says Men Should Wear Underwear Under Kilts (jeffpruett.wordpress.com)
- Scots wha hae!.... (tagg-lines.com)
- Please Wear Underpants Beneath Your Kilt (neatorama.com)
Monday, November 15, 2010
Dying of a broken heart - the widowhood factor...
Image via WikipediaDying of a broken heart- the widowhood factor...
Did you know that you can really die of a broken heart?
Researchers at St Andrews University have studied what is called the 'widowhood effect'. In particular men are likely to have their lives cut short by the death of their wives.
The research examined more than 58,000 married couples. Their findings suggest that 40% of men and 26% of women die within 3 years of their partners death.
The study took into account a wide range of causes of death: including cancers, other diseases, alcohol abuse, smoking, accidents, murders and suicides.
Even taking these other factors into account, many widowers and widows die through the loss of their spouse. The findings will appear in the scientific journal Epidemology early in 2011.
Related articles
- YourNews: Widows rally and leadership training event Nov. 5-6 (knoxnews.com)
- Honey Seltzer: Widowhood: Life After Losing a Loved One (huffingtonpost.com)
- Women will evolve into having children at older age (telegraph.co.uk)
- Marriage patterns drive fertility decline (esciencenews.com)
- Retro Snap: RIP Catherine Walker (thegloss.com)
- Marriage patterns drive fertility decline (eurekalert.org)
- Advice for Widows and Older Couples, Too (money.usnews.com)
- Re: Nigeria @ 50: Ladies raises your glasses! (vanguardngr.com)
- Marriage patterns drive fertility decline (scienceblog.com)
Tuesday, November 9, 2010
Gay father and lesbian mother dispute access through British courts...
Image via Wikipedia
A British gay man and a lesbian woman are in dispute over their children. They are locked into an unprecedented battle in a British court over access of their children who were conceived and born through artificial insemination.
The lesbian mother and her long-term partner have taken their case to the Court of Appeal after the sperm donor father won a shared residency order earlier this year. This allows him to see his children for almost half the time.
The parents met after he had placed an ad in the Gay Times in 1999. The ad said." Gay guy wants to be a Dad. White, handsome, solvent 30's, professional, in happy relationship, non-scene, has everything but kids." The ad also said." I require little involvement. I have a lot to offer."
He then reportedly donated sperm on two occasions to the lesbian couple, who had a boy and girl, now aged nine and seven respectively. The father had parental responsibility for the children from the outset, which gave him the legal right to seek greater access later on.
Now the mother is accusing the father of trying to "marginalise" her lesbian partner. The legal representative of the lesbian couple told a panel of three judges that the children need and have a permanent home with them. She accepted the children had a meaningful relationship with their father and did not dispute his rights of contact with his children. But the mother claimed a residency order because the children had been with her and her partner since their birth and were their primary caregivers
The case will be watched closely by experts because it is unprecedented in establishing the rights of a donor and because of its impact on shared residency. Campaigners and fathers' groups want shared residency to be accepted as the norm on seperation of parents. The case continues!.
Acknowledgements: The Times
A British gay man and a lesbian woman are in dispute over their children. They are locked into an unprecedented battle in a British court over access of their children who were conceived and born through artificial insemination.
The lesbian mother and her long-term partner have taken their case to the Court of Appeal after the sperm donor father won a shared residency order earlier this year. This allows him to see his children for almost half the time.
The parents met after he had placed an ad in the Gay Times in 1999. The ad said." Gay guy wants to be a Dad. White, handsome, solvent 30's, professional, in happy relationship, non-scene, has everything but kids." The ad also said." I require little involvement. I have a lot to offer."
He then reportedly donated sperm on two occasions to the lesbian couple, who had a boy and girl, now aged nine and seven respectively. The father had parental responsibility for the children from the outset, which gave him the legal right to seek greater access later on.
Now the mother is accusing the father of trying to "marginalise" her lesbian partner. The legal representative of the lesbian couple told a panel of three judges that the children need and have a permanent home with them. She accepted the children had a meaningful relationship with their father and did not dispute his rights of contact with his children. But the mother claimed a residency order because the children had been with her and her partner since their birth and were their primary caregivers
The case will be watched closely by experts because it is unprecedented in establishing the rights of a donor and because of its impact on shared residency. Campaigners and fathers' groups want shared residency to be accepted as the norm on seperation of parents. The case continues!.
Acknowledgements: The Times
Related articles
- Gay sperm donor fights lesbian mother over access to children (telegraph.co.uk)
- Gay dad fights two lesbians over kids (thesun.co.uk)
- Gay man and woman in court battle over children (independent.co.uk)
- Lesbian and gay man in child custody battle (pinkbananaworld.com)
- Sperm Donor Stalks Lesbian Mother (abcnews.go.com)
- Reproductive Options for Lesbian Women (prweb.com)
- Moore on role as lesbian mother (news.bbc.co.uk)
Thursday, November 4, 2010
Covert nuclear sites in Burma - true or false?
Image via Wikipedia
January 28, 2010
Download PDF
Various dissident groups and news reports have recently claimed that there are covert nuclear sites in Burma, including reactors and uranium mines and mills.1 The evidence behind these claims is largely based on defectors or analysis of ground photos and overhead imagery of suspected sites.
ISIS decided to test some of these claims, at least the ones where the actual site could be identified. Two sites were assessed and both appeared non-nuclear. This conclusion followed from a rather straightforward analysis of widely available imagery and relevant open source information.
Many of the claims involve suspect sites without enough information to identify their exact location. ISIS could not evaluate these sites.
To the extent that information about sites relies on defectors, it requires confirmation because defectors too often provide unreliable information. If the information is gathered from non-governmental debriefing processes, it can suffer from additional reliability and problems.
Overall, the lack of specifics about many of the sites mentioned in the reports from opposition groups and defectors makes independent analysis using commercial satellite imagery very difficult. Those reporting the existence of secret nuclear sites in Burma should provide more direct and specific evidence, in addition to geographical coordinates, in order for some of the sites to be further investigated.
ISIS does not want to overweigh the importance of debunking a few claims about secret nuclear activities in Burma. There remain valid suspicions about the existence of undeclared nuclear activities in Myanmar, particularly in the context of cooperation between Myanmar and North Korea. But the methods used in the public so far to allege secret nuclear facilities are flawed. Identification of suspect nuclear sites requires a more rigorous basis than is currently evident.
Figure 1: Google Earth image from August 29, 2009 showing the location of the Myit Nge Chaung facility, the associated mine, and the town of Ongyaw, Kyauk Mi. DictatorWatch claims that the Myit Nge Chaung facility is a uranium refinery.
ISIS assesses that the Myit Nge Chaung refinery is a cement plant on the Mandalay to Pyin Oo Lwin road, National Highway 3 (see Figure 2). The plant is very large for any small clandestine uranium operation in Burma. The mill is also typical of a cement plant in several key ways. It has very large rotary kilns, which are used to roast the limestone feed materials to produce cement. This is not done for uranium but is done for many other metals and cement preparation. There is a large pile of coal or coal ash north of the plant, which is probably the fuel used in the rotary kilns. The site also has many vertical bulk silos. Silos are used for handling solid powders in industrial operations.
Figure 2: Close-up of Google Earth image of the Myit Nge Chaung facility from August 29, 2009. It shows distinctive characteristics of a cement plant.
A uranium mill extracting uranium from rock ore would have many more signatures of liquid processing, such as crushers, thickeners, solvent extraction columns and a prominent liquid waste pond. These signatures are absent. Uranium can be extracted from phosphates in fertilizer operations. This is clearly not a phosphate fertilizer plant.
In addition, the mill matches characteristics in a ground photograph of the AAA Cement Plant, also called the Triple A Cement Plant (see figure 3). Piping, structures, scaffolding and stacks appear in the same positions between the two pictures.
Figure 3. On the left, a ground photograph of the AAA Cement Plant in Myanmar.3 On the right, a GoogleEarth satellite image of the Myit Nge Chaung site. The location of stacks, piping and structures appear to correspond between the two images.
Figure 4: Google Earth image from April 3, 2009 showing the large mining operation 1.5 miles northwest of the Myit Nge Chaung site. The mountain where mining is taking place is apparently homogeneous and is being mined from all sides (see Figure 5). This has resulted in the mountain being scraped away piecemeal at all sides rather than by modern open pit mining techniques—which is one type of technique expected at a uranium mine.
Figure 5: Google Earth close-up of the same area from April 3, 2009 showing the simplistic piecemeal mining technique not characteristic of uranium mining.
1See: Desmond Ball and Phil Thorton, “Burma’s Nuclear Secrets,” Sydney Morning Herald, August 1, 2009, http://www.smh.com.au/news/world/burma8217s-nuclear-secrets/2009/07/31/1248977197670.html?page=fullpage#contentSwap2 ; Bertil Lintner, “Tunnels, Guns and Kimchi: North Korea’s Quest for Dollars: Part 1, YaleGlobal Online, June 9, 2009, http://yaleglobal.yale.edu/content/NK-quest-for-dollars-part1; “Images of Suspected Uranium Mine and Refinery in Burma,” DictatorWatch.org, March 2007, http://www.dictatorwatch.org/phshows/burmafacility.html. 2“Images of Suspected Uranium Mine and Refinery”; Ball and Thorton, “Burma’s Nuclear Secrets.”
3http://www.pengfei.com.cn/eng/view.asp?keyno=295
ISIS Reports
Exploring Claims about Secret Nuclear Sites in Myanmar
by Robert Kelley, Andrea Scheel Stricker and Paul BrannanJanuary 28, 2010
Download PDF
Various dissident groups and news reports have recently claimed that there are covert nuclear sites in Burma, including reactors and uranium mines and mills.1 The evidence behind these claims is largely based on defectors or analysis of ground photos and overhead imagery of suspected sites.
ISIS decided to test some of these claims, at least the ones where the actual site could be identified. Two sites were assessed and both appeared non-nuclear. This conclusion followed from a rather straightforward analysis of widely available imagery and relevant open source information.
Many of the claims involve suspect sites without enough information to identify their exact location. ISIS could not evaluate these sites.
To the extent that information about sites relies on defectors, it requires confirmation because defectors too often provide unreliable information. If the information is gathered from non-governmental debriefing processes, it can suffer from additional reliability and problems.
Overall, the lack of specifics about many of the sites mentioned in the reports from opposition groups and defectors makes independent analysis using commercial satellite imagery very difficult. Those reporting the existence of secret nuclear sites in Burma should provide more direct and specific evidence, in addition to geographical coordinates, in order for some of the sites to be further investigated.
ISIS does not want to overweigh the importance of debunking a few claims about secret nuclear activities in Burma. There remain valid suspicions about the existence of undeclared nuclear activities in Myanmar, particularly in the context of cooperation between Myanmar and North Korea. But the methods used in the public so far to allege secret nuclear facilities are flawed. Identification of suspect nuclear sites requires a more rigorous basis than is currently evident.
Uranium Mill Claim
ISIS assessed satellite imagery of two sites claimed to be a uranium mine and a mill in Burma, one of the few claims with enough specificity to allow it to be checked independently, and determined that the sites are not likely to be related to uranium mining and milling. This claim was first made in 2007 by DictatorWatch, a group promoting democracy in Burma and China, and later supported by Desmond Ball and Phil Thorton in an August 2009 Sydney Morning Herald report.2 The refinery, or mill, lies on the Myit Nge River 14.5 miles southeast of Mandalay and 17.7 miles northeast of Kyaukse, hereafter referred to as the Myit Nge Chaung site. The mine is located about 1.5 miles to the northwest of the refinery. The closest village is Ongyaw to the north of the mine (see Figure 1). Examination of the images and comparison to open source information makes it very unlikely that it is a uranium mining and refining operation.ISIS assesses that the Myit Nge Chaung refinery is a cement plant on the Mandalay to Pyin Oo Lwin road, National Highway 3 (see Figure 2). The plant is very large for any small clandestine uranium operation in Burma. The mill is also typical of a cement plant in several key ways. It has very large rotary kilns, which are used to roast the limestone feed materials to produce cement. This is not done for uranium but is done for many other metals and cement preparation. There is a large pile of coal or coal ash north of the plant, which is probably the fuel used in the rotary kilns. The site also has many vertical bulk silos. Silos are used for handling solid powders in industrial operations.
A uranium mill extracting uranium from rock ore would have many more signatures of liquid processing, such as crushers, thickeners, solvent extraction columns and a prominent liquid waste pond. These signatures are absent. Uranium can be extracted from phosphates in fertilizer operations. This is clearly not a phosphate fertilizer plant.
In addition, the mill matches characteristics in a ground photograph of the AAA Cement Plant, also called the Triple A Cement Plant (see figure 3). Piping, structures, scaffolding and stacks appear in the same positions between the two pictures.
Uranium Mine Claim
ISIS also assesses that the mine north of the Myit Nge Chaung site is not likely a uranium mine (see Figure 4). It is not possible to conclusively identify the ores being mined from the overhead photo signatures. Nevertheless, the mine looks more like a quarry where bulk material is identified by its general characteristics and removed by diggers and buckets. The light colored material could easily be limestone.1See: Desmond Ball and Phil Thorton, “Burma’s Nuclear Secrets,” Sydney Morning Herald, August 1, 2009, http://www.smh.com.au/news/world/burma8217s-nuclear-secrets/2009/07/31/1248977197670.html?page=fullpage#contentSwap2 ; Bertil Lintner, “Tunnels, Guns and Kimchi: North Korea’s Quest for Dollars: Part 1, YaleGlobal Online, June 9, 2009, http://yaleglobal.yale.edu/content/NK-quest-for-dollars-part1; “Images of Suspected Uranium Mine and Refinery in Burma,” DictatorWatch.org, March 2007, http://www.dictatorwatch.org/phshows/burmafacility.html. 2“Images of Suspected Uranium Mine and Refinery”; Ball and Thorton, “Burma’s Nuclear Secrets.”
3http://www.pengfei.com.cn/eng/view.asp?keyno=295
Related articles
- Snow cap mountain of Burma - Putao, Myanmar (travelpod.com)
- Canadian uranium miner for joint venture in India (topinews.com)
- Danville Regional Foundation Uranium Study Proposals Now Online (eon.businesswire.com)
- 'Uranium rush' (bbc.co.uk)
- Uranium One, Eyed For Russian Purchase, Divesting From Colorado (huffingtonpost.com)
- Visiting the Rohingya, Burma's Hidden Population (time.com)
- Navajo Community Groups Appeal To Highest Court To Stop Uranium Contamination of Drinking Water (alternet.org)
- BURMA/MYANMAR - YANGON, Myanmar (travelpod.com)
- Iran's uranium holdings (thehill.com)
- Uranium policy urged for Nunavut (cbc.ca)
Wednesday, October 27, 2010
Elderly US man attacked by flesh - eating ants as he lay on his hospital bed...
Image via Wikipedia An elderly man has been attacked by a swarm of flesh-eating ants as he lay in a hospital bed in Florida receiving treatment for a heart condition.
Cornelius Lewis, 76, was recovering from an operation to fit a pacemaker when the ants, which have been spotted in the hospital previously, bit him hundreds of times on the legs and genitals, The Daily Mail reported.
The attack went unnoticed by hospital staff for hours because the pavement ants, a common household pest, were hidden by the bedcovers.
Mr Lewis's son said the hospital was supposed to check his father more regularly.
"He was supposed to be monitored every 10 minutes," Neil Lewis told Newspress.com.
Neil said when the hospital finally did discover the ants and try to move Mr Lewis they found ants in the new room as well.
Lee Memorial Health System, which runs the Gulf Coast Medical Centre, confirmed there was an ant problem and said staff were taking steps to make sure nobody else was attacked.
"There are no reports of other patients being bitten by ants and Gulf Coast is the only hospital with an ant problem," public relations director Karen Krieder said.
All the companies' hospitals are now being treated by pest control experts.
Lewis is still being treated at the Gulf Coast Medical Centre
Cornelius Lewis, 76, was recovering from an operation to fit a pacemaker when the ants, which have been spotted in the hospital previously, bit him hundreds of times on the legs and genitals, The Daily Mail reported.
The attack went unnoticed by hospital staff for hours because the pavement ants, a common household pest, were hidden by the bedcovers.
Mr Lewis's son said the hospital was supposed to check his father more regularly.
"He was supposed to be monitored every 10 minutes," Neil Lewis told Newspress.com.
Neil said when the hospital finally did discover the ants and try to move Mr Lewis they found ants in the new room as well.
Lee Memorial Health System, which runs the Gulf Coast Medical Centre, confirmed there was an ant problem and said staff were taking steps to make sure nobody else was attacked.
"There are no reports of other patients being bitten by ants and Gulf Coast is the only hospital with an ant problem," public relations director Karen Krieder said.
All the companies' hospitals are now being treated by pest control experts.
Lewis is still being treated at the Gulf Coast Medical Centre
Related articles
- Male Patient Attacked By Ants in the ICU Of Gulf Coast Medical Center in Florida (ducknetweb.blogspot.com)
- Man 'Attacked' by Ants in Florida Hospital ICU (aolhealth.com)
- Weather Forecast: Partly Cloudy & Drop in Temperature (israelnationalnews.com)
- Weather Forecast: Partly Cloudy, Temperatures Dropping (israelnationalnews.com)
- Partly cloudy day in Delhi (topinews.com)
- Reverse trick-or-treat helps patients say `thank you' ()
- Today's logo: Partly cloudy with a change of shape. (makethelogobigger.blogspot.com)
- Woman Attacked By Rival In Hospital After Giving Birth (dreamindemon.com)
- New Hampshire Weather Forecast: It's Official, We're Dry (sbnation.com)
- Impulse Monitoring and Children's Hospital of Central California Ink IONM Agreement (eon.businesswire.com)
Sunday, October 24, 2010
Fall gardening tips for gay gardeners born without green thumbs
Fall gardening tips for gay gardeners born without green thumbs.
Looking for a place to stalk the Great Pumpkin? Try pumpkinstation.co
“I believe in God, only I spell it N A T U R E.”
—Frank Lloyd Wright, architect
Ah … fall is in the air. The mad hustle of the holidays is nearly upon us as our non-existent summer fades away. The light is changing and the mornings are darker and sleepier. There’s something exceptionally beautiful about fall. It’s one of the rare times in San Diego when you can actually see the seasons starting to change—green leaves take on warm hues and crunch beneath our feet; evenings are chillier and a misty fog blankets our seaside town.
I love to stroll my neighborhood at dusk, just after the sun has set. Little cottages and their gardens begin to take on a new appearance and everything seems to have a seasonal orange glow. Gourds are perched on shadowy porches and Halloween pirates and skeletons keep guard over picket fences. Plants are moist with dew and occasionally, when we’re lucky, there is the smell of rain. Glancing in windows you can see friends and lovers sharing a meal or huddling over tables preparing crafts and costumes. Fall signals a change and mixes things up for us a bit. Unlike the spring, where it’s all about renewal and growth, the fall is more about introspection. It’s a quieter time for us to enjoy being inside and a chance for us to tend to our homes and gardens.
Walking through our gayberhood I’m often struck by how beautiful some of the yards and gardens are—even in the fall. From exotic succulents to seasonal flowers, there are quite a few of us who have obviously been gifted with the gay green thumb. My partner David and I have not been so fortunate. We attempt to “garden,” but for us the endeavor should really be called “death prevention.” We usually have our standard quibble over whether to hire a gardener or just do it ourselves. I succumb to the theory that it’s meditative, and that by doing the work myself I am reconnecting with nature. But let’s be clear: There is a difference between enjoying a hike in the woods and fishing thousands of palm tree seedlings from your Buddha fountain. I’ve taken to naming certain plants and will often whisper sweet nothings to them, pet them and beg them not to die. We do a fair job pruning and wrestling with unruly vines. Sometimes it works out and other times it looks as if our trees have been struck by lightning. Occasionally I’ll call one of my more Martha-inclined friends for a gardening intervention, in which he or she helps me pull David and his electric chainsaw out of the trees.
Fortunately, for those of us less gifted in the garden there are plenty of local experts in our community who can offer advice on how to keep a garden fresh and tame this fall. Landscape designers Joel Berlin and James Kressley of Anandascapes have some professional tips on how to keep the lightning strikes at bay. “In the fall a clean-up is usually necessary for salvias and ornamental grasses. Many of these plants will get ‘leggy’ or simply turn brown by the end of the summer. When I see leaves sprouting from the bottom blades or stalks, I often cut them down, leaving the new sprouts to begin the cycle again.” Kressley said.
Kressley assured me that planting options are bountiful in the fall. “I always encourage edibles in your garden,” he said. “Broccoli, Brussels sprouts, cabbage, cauliflower, chard, collards, kale, greens, peas, spinach, beets, carrots, turnips, garlic, onions and lettuces are all great vegetables you can grow in the cooler months here in San Diego.”
Kressley also stressed the importance of knowing what plants are in your yard. “If you have Australian plants like the Anigozanthos or Kangaroo Paw they are used to wet summers and dry winters. You can either adjust the water amount for them or plant a complementing specimen along with it—one which likes winter water, like a succulent. The plants will actually “share” the water through the seasons.
In the spirit of the season I asked James where we might be able to source great pumpkins. “If you don’t have the space to grow your own pumpkins this season (and they do take a lot of space), I would suggest going to one of our local Pumpkin Station locations (pumpkinstation.com). There’s even fun activities for children. The Rancho Bernardo location even has a 6-foot tall corn field maze,” Kressley said.
Special thanks to James Kressley for the seasonal tips. He and Berlin can be seen on HGTV’s “Ground Force.” You can reach them via their website at anandascapes.com or at (619) 701-9875 begin_of_the_skype_highlighting (619) 701-9875 end_of_the_skype_highlighting.
— Jimmy Sullivan holds a B.A. in architecture and is the owner of CitiZen Design Studio, a design firm located in Hillcrest. Write to Jimmy at jimmy@citizenarch.com or visit his website at citizenarch.com.
Tool Box:
Acknowledgements: Jimmy Sullivan
Related articles
- Gifts for the Gardener with a Green Thumb (brighthub.com)
- Update From Our Garden (suddenlyfrugal.com)
- Succulent 'Autumn Joy' a colorful perennial (sfgate.com)
- From the Garden to the Record Books, a Supersize Pumpkin (cityroom.blogs.nytimes.com)
- Kinds of Plants Which Grow Well in Winter (brighthub.com)
Image via Wikipedia
Friday, October 22, 2010
Facebook ads may inadvertantly out gay members...
Image via CrunchBase
Facebook users may inadvertently reveal their sexual preference to advertisers in an apparent wrinkle in the social-networking site's advertising system, researchers have found.
The researchers set up six Facebook accounts, analyzing the type of advertisements served to them and way those advertisements differed based on the profile's declared sexual preference.
Two of the profiles purported to be males interested in females, and two females interested in males. Another profile was for a male interested in other males, and the last a female interested in other females. All six profiles claimed to be 25-year-olds living in Washington, D.C.
Unsurprisingly, the researchers found that ads that explicitly mentioned sexual preference, such as ads for gay bars, were served to the gay profiles. But they found that many ads that did not explicitly refer to sexual preference were shown exclusively to the gay profiles.
One example was an advertisement for a nursing program at a medical college in Florida, which was only shown to gay men.
The researchers said that persons seeing the ad would not know that it had been exclusively aimed at them solely based on their sexuality, nor would they realize that clicking on the ad would reveal to the advertiser, by implication, their sexual preference in addition to other information they might expect to be sent, such as their IP (Internet Protocol) address.
"The danger with such ads, unlike the gay bar ad where the target demographic is blatantly obvious, is that the user reading the ad text would have no idea that by clicking it he would reveal to the advertiser both his sexual preference and a unique identifier (cookie, IP address, or e-mail address if he signs up on the advertiser's site)," the researchers wrote in a paper. "Furthermore, such deceptive ads are not uncommon; indeed exactly half of the 66 ads shown exclusively to gay men (more than 50 times) during our experiment did not mention 'gay' anywhere in the ad text."
The scenario would appear to violate Facebook's advertising policy, which says "Any targeting of adverts based on a user attribute such as age, gender, location or interest, must be directly relevant to the offer and cannot be done by a method inconsistent with privacy and data policies."
A Facebook spokeswoman downplayed the study, saying that the site does not pass any personally identifiable information back to an advertiser.
Christopher Soghoian, a doctoral candidate at the School of Informatics and Computing at Indiana University, wrote on his blog that Facebook could deal with the issue in a couple of ways.
The site could simply stop allowing advertisers to target ads based on sensitive information, such as sexual preference or political affiliations, or it could inform users that an ad was targeted based on a specific attribute of their profile, Soghoian wrote.
"Users should also be told, after clicking on the ad, but before being directed to the site, that the advertiser may be able to learn this sensitive information about them, simply by visiting the site," Soghoian wrote. "I suspect that neither option is going to be something that Facebook is going to want to embrace."
The research paper, "Challenges in Measuring Online Advertising Systems," was written by Saikat Guha of Microsoft Research India, and Bin Cheng and Paul Francis, both of the Max Planck Institute for Software Systems in Germany.
Facebook users may inadvertently reveal their sexual preference to advertisers in an apparent wrinkle in the social-networking site's advertising system, researchers have found.
The researchers set up six Facebook accounts, analyzing the type of advertisements served to them and way those advertisements differed based on the profile's declared sexual preference.
Two of the profiles purported to be males interested in females, and two females interested in males. Another profile was for a male interested in other males, and the last a female interested in other females. All six profiles claimed to be 25-year-olds living in Washington, D.C.
Unsurprisingly, the researchers found that ads that explicitly mentioned sexual preference, such as ads for gay bars, were served to the gay profiles. But they found that many ads that did not explicitly refer to sexual preference were shown exclusively to the gay profiles.
One example was an advertisement for a nursing program at a medical college in Florida, which was only shown to gay men.
The researchers said that persons seeing the ad would not know that it had been exclusively aimed at them solely based on their sexuality, nor would they realize that clicking on the ad would reveal to the advertiser, by implication, their sexual preference in addition to other information they might expect to be sent, such as their IP (Internet Protocol) address.
"The danger with such ads, unlike the gay bar ad where the target demographic is blatantly obvious, is that the user reading the ad text would have no idea that by clicking it he would reveal to the advertiser both his sexual preference and a unique identifier (cookie, IP address, or e-mail address if he signs up on the advertiser's site)," the researchers wrote in a paper. "Furthermore, such deceptive ads are not uncommon; indeed exactly half of the 66 ads shown exclusively to gay men (more than 50 times) during our experiment did not mention 'gay' anywhere in the ad text."
The scenario would appear to violate Facebook's advertising policy, which says "Any targeting of adverts based on a user attribute such as age, gender, location or interest, must be directly relevant to the offer and cannot be done by a method inconsistent with privacy and data policies."
A Facebook spokeswoman downplayed the study, saying that the site does not pass any personally identifiable information back to an advertiser.
Christopher Soghoian, a doctoral candidate at the School of Informatics and Computing at Indiana University, wrote on his blog that Facebook could deal with the issue in a couple of ways.
The site could simply stop allowing advertisers to target ads based on sensitive information, such as sexual preference or political affiliations, or it could inform users that an ad was targeted based on a specific attribute of their profile, Soghoian wrote.
"Users should also be told, after clicking on the ad, but before being directed to the site, that the advertiser may be able to learn this sensitive information about them, simply by visiting the site," Soghoian wrote. "I suspect that neither option is going to be something that Facebook is going to want to embrace."
The research paper, "Challenges in Measuring Online Advertising Systems," was written by Saikat Guha of Microsoft Research India, and Bin Cheng and Paul Francis, both of the Max Planck Institute for Software Systems in Germany.
Related articles
- Facebook Ads Could 'out' Gay Users, Researchers Say (pcworld.com)
- Marketers Can Glean Private Data on Facebook (nytimes.com)
- Is Facebook Outing Gay Users to Advertisers? [Privacy] (gawker.com)
- Facebook Ads Could 'Out' Gay Users (yro.slashdot.org)
- Does Targeting Gays With Facebook Ads Push The Limits Of Privacy? (allfacebook.com)
- More privacy headaches for Facebook: gay users outed to advertisers (arstechnica.com)
Subscribe to:
Posts (Atom)