Daily Archives: June 27, 2015

Dangerous Swirling Vortex Opens Up On Lake Texoma

Advertisements
Categories: Uncategorized

Cornish Bear Monster?

dark night

Strangehistory has given previously some space to the Cornish ‘Methodist metaphysician’ Samuel Drew (obit 1833). Last time Samuel Drew had been accused, almost certainly falsely by Wikipedia, of witnessing a ghost army. This time Samuel’s witnessing of the paranormal can be substantiated as it appeared in his biography, the author, his son, having apparently taken the material from his father. The text that follows was written by the son (misleadingly in the first person), with reference to others who had heard the tale, as close to his father’s words as possible. SD was at this time a young man apprenticed to a shoemaker. We are in the 1770s or 1780s.

There were several of us, boys and men, out about twelve o’clock on a bright moonlight night. I think we were poaching. The party were in a field adjoining the road leading from my master’s to St Austell, and I was stationed outside the hedge to watch and give the alarm if any intruder should appear.

St Austell is a town in Cornwall and Beach might note that poaching expeditions often led to paranormal encounters, perhaps simply because they were tense affairs that took place at night.

While thus occupied [as a look out] I heard what appeared to be the sound of a horse approaching from the town, and I gave a signal. My companions paused and came to the hedge where I was, to see the passenger. They looked through the bushes, and I drew myself close to the hedge, that I might not be observed. The sound increased, and the supposed horseman seemed drawing near. The clatter of the hoofs became more and more distinct.

continue http://www.strangehistory.net/2015/06/27/cornish-bear-monster/

Categories: Uncategorized

UK Government Experiments On Animals With EBOLA and PLAGUE Exposed

THOUSANDS of animals have been infected with deadly diseases including Ebola and the plague in “grotesque” experiments funded by the British government, it can be revealed.

A rabbit and monkey being tested at Porton Down laboratoryCRUELTY FREE INTERNATIONAL

Rabbits and monkeys are just some of the thousands of animals being tested at Porton Down laboratory

Ministry of Defence (MoD) researchers have tested on 4,124 monkeys, pigs, rabbits, guinea pigs and rodents in the last year alone.

They all died during the torturous process, which can last months, while others were slaughtered at the end of tests, which have sparked fury from animal rights campaigners.

The greusome testing has seen marmoset monkeys infected with haemorrhagic fever, macaques infected with Tuberculosis, mice given Ebola and pneumonic plague, and rabbits forced to endure infected wounds.

Animals are abused in the Government-owned Porton Down laboratory in Salisbury, Wiltshire, to improve medical treatments within the military.

Previous experiments carried out at the laboratory include pigs being blown up or exposed to lethal chemical warfare agents such as phosgene and sulphur mustard, and marmosets infected with anthrax and guinea pigs poisoned with toxic nerve agents.

Animal rights group Cruelty Free International claim details of these warfare experiments are not included in annual animal-testing statistics published by the Home Office meaning many people will have no idea the suffering is taking place.

continue http://www.express.co.uk/news/uk/587327/Ministry-of-Defence-animal-testing-EBOLA-and-PLAGUE-Porton-Down

Categories: Uncategorized

Engineers Break the Capacity Limit for Fiber Optic Transmissions

Internet Fiber Optic Capacity

As the sheer volume of data transmitted over the web continues to grow by leaps and bounds, there has been a lot of speculation regarding whether or not the fiber optic cables which form the underlying foundation of the internet will eventually max out.

Well not to fear. Researchers at the University of California, San Diego recently published a report in the journal Science detailing how they were able to increase the maximum power under which fiber optic signals can be transmitted and accurately decoded. In turn, optic signals can now travel for longer distances without seeing a degradation in quality.

“This advance,” the UC San Diego News Center writes, “has the potential to increase the data transmission rates for the fiber optic cables that serve as the backbone of the internet, cable, wireless and landline networks.”

continue http://bgr.com/2015/06/27/internet-fiber-optic-capacity-limit-ucsd/

Categories: internet, technology | Tags: ,

Print your own Wikipedia Book

Wikipedia does include a built-in book creator that would let anyone, include anonymous non-logged users, create ebooks from Wikipedia articles. You can download these ebooks as PDF files or send them to a print-on-demand service like Lulu or PediaPress and have a custom printed book made of your favorite Wikipedia pages.

See more Wikipedia tools.

source http://www.labnol.org/internet/wikipedia-printed-book/9136/

Categories: Uncategorized

Protesters Block Effort To Restart Work On Controversial Hawaii Telescope

si-tmtsunsetAn attempt to restart construction on what would be one of the world’s largest telescopes was blocked yesterday, after state authorities escorting construction vehicles clashed with protesters blockading the road to the summit of Hawaii’s Mauna Kea volcano.

Officers from Hawaii’s Department of Land and Natural Resources (DLNR), and construction workers for the Thirty-Meter Telescope (TMT), turned back from the summit shortly after noon Wednesday, citing concerns for public safety after finding the road blocked by boulders.

The withdrawal followed several hours of clashes with Native Hawaiian protesters blockading the road, culminating in the arrests of 11 men and women, including several protest organizers. The protesters have said the $1.4 billion TMT would desecrate sacred land.

“We had a major confrontation today,” says Andre Perez, an organizer with Oahu-based Movement for Aloha No ka Aina, who was among those arrested. He says the protesters had deployed small groups of people to block the road at regular intervals over several kilometers, starting above the Mauna Kea visitor center at about 2700 meters up the 4200 meter high mountain. County police and state DLNR officers arrived on the scene around 7 a.m. “They were intent on escorting construction workers to the top of the island, and we were intent on preventing that,” Perez says.

continue http://news.sciencemag.org/policy/2015/06/protesters-block-effort-restart-work-controversial-hawaii-telescope-11-arrested

Categories: Uncategorized

Gov Web Bots To Scour Internet for Hate Speech: “Could Potentially Criminalize Thoughts and Expressions”

With the capability to intercept every digital communication sent over the internet or telephone it’s no surprise that Big Brother is pushing to further expand its role in the lives of Americans.

Senator Ed Markey (D-MA) is proposing a new bill that would send government web bots across the internet looking for hate speech or material allegedly determined to be advocating or encouraging “violent acts.” Once identified, the Congressman wants reports to be disseminated to Congress so that they can monitor, control and potentially criminalize thoughts and expressions deemed by an unknown panel of government bureaucrats to be hateful.
continue http://www.shtfplan.com/headline-news/gov-web-bots-to-scour-internet-for-hate-speech-could-potentially-criminalize-thoughts-and-expressions_04302014

Categories: Uncategorized | Tags: , , , , ,

A Brief History of False Flag Terror

In naval warfare, a “false flag” refers to an attack where a vessel flies a flag other than their true battle flag before engaging their enemy. It is a trick, designed to deceive the enemy about the true nature and origin of an attack.

In the democratic era, where governments require at least a plausible pretext before sending their nation to war, it has been adapted as a psychological warfare tactic to deceive a government’s own population into believing that an enemy nation has attacked them.

In the 1780s, Swedish King Gustav III was looking for a way to unite an increasingly divided nation and raise his own falling political fortunes. Deciding that a war with Russia would be a sufficient distraction but lacking the political authority to send the nation to war unilaterally, he arranged for the head tailor of the Swedish Opera House to sew some Russian military uniforms. Swedish troops were then dressed in the uniforms and sent to attack Sweden’s own Finnish border post along the Russian border. The citizens in Stockholm, believing it to be a genuine Russian attack, were suitably outraged, and the Swedish-Russian War of 1788-1790 began.

In 1931 the Japan was looking for a pretext to invade Manchuria. On September 18th of that year, a Lieutenant in the Imperial Japanese Army detonated a small amount of TNT along a Japanese-owned railway in the Manchurian city of Mukden. The act was blamed on Chinese dissidents and used to justify the occupation of Manchuria just six months later. When the deception was later exposed, Japan was diplomatically shunned and forced to withdraw from the League of Nations.

In 1939 Heinrich Himmler masterminded a plan to convince the public that Germany was the victim of Polish aggression in order to justify the invasion of Poland. It culminated in an attack on Sender Gleiwitz, a German radio station near the Polish border, by Polish prisoners who were dressed up in Polish military uniforms, shot dead, and left at the station. The Germans then broadcast an anti-German message in Polish from the station, pretended that it had come from a Polish military unit that had attacked Sender Gleiwitz, and presented the dead bodies as evidence of the attack. Hitler invaded Poland immediately thereafter, starting World War II.

In 1954 the Israelis hired a number of Egyptian Jews to plant bombs in American and British cinemas, libraries, and other civilian targets to be blamed on the Muslim Brotherhood or other malcontents. The plan, known as the Lavon Affair, was part of an effort to convince the British to retain their military presence in the occupied Suez Canal zone. Several bombings took place, but the British were ultimately forced out after Nasser nationalized the canal in 1956.

continue http://www.wakingtimes.com/2015/06/23/a-brief-history-of-false-flag-terror/

Categories: Uncategorized

Windows 10: Forget Disks, Microsoft’s Next OS Might Be Sold on USB Drives

Many current Windows 7 and Windows 8 computer owners will be able to upgrade to Windows 10 this summer free of charge after downloading the new operating system, but some users who aren’t eligible for the free update will have to purchase the new OS. According to a few leaked Windows 10 listings, Microsoft might be planning to ditch Windows disks for in-store sales and instead offer USB drives containing the necessary Windows 10 installation files.

DON’T MISS: T-Mobile’s New Uncarrier Move Kills Lump Payments, Offers iPhone 6 for $15/Month

The news comes from Myce, which spotted a couple of such listings on Canadian online stores including CompSource (which sells a “Microsoft Win Home 10 32-Bit/64-Bit English 1 License Usb Flash Drive KW9-00016” for $124.00) and PCCanada (which has a “Microsoft Win Home 10 32-BIT/64-BIT USB [KW9-00016]” for $134.49).
continue http://bgr.com/2015/06/25/windows-10-price-installation-usb-flash-drive-package/

Categories: Uncategorized

Genetically Modified Wheat Crop Fails To Repel Pests

Scientists have found that a controversial trial of genetically modified (GM) wheat has failed to repel pests any more effectively than ordinary crops.  The £3 million trial has been branded ‘a waste’

RT reports: Researchers attempted to engineer a variety of wheat to emit an odor that deters aphids in the hope of reducing the amount of pesticides required by plants.

The crops, nicknamed “whiffy wheat,” were successful in lab tests, but succumbed to aphids when trialed in the field.

The experiment cost £3m, some £2.2m of which was spent on fencing and other security measures to protect the trial from animals and saboteurs.

Campaign group GM Freeze said the experiment was a waste of money and further evidence of the “folly” of investing in GM technology.

Agricultural institution Rothamsted Research ran the trial in Hertfordshire from 2012 to 2013.

continue article http://yournewswire.com/genetically-modified-wheat-crop-fails-to-repel-pests/

Categories: agriculture, biotech | Tags: , ,

How the NSA Started Investigating the New York Times’ Warrantless Wiretapping Story

Featured photo - How the NSA Started Investigating the New York Times’ Warrantless Wiretapping Story

Three days after the New York Times revealed that the U.S. government was secretly monitoring the calls and emails of people inside the United States without court-approved warrants, the National Security Agency issued a top-secret assessment of the damage done to intelligence efforts by the story. The conclusion: the information could lead terrorists to try to evade detection. Yet the agency gave no specific examples of investigations that had been jeopardized.

The December 2005 bombshell story, by James Risen and Eric Lichtblau, set off a debate about the George W. Bush administration’s expansion of spying powers after the 9/11 attacks, and also about the Times editors’ decision to delay its publication for a year. White House officials had warned the Times that revealing the program would have grave consequences for national security.

The NSA’s damage assessment on the article — referred to as a “cryptologic insecurity” — is among the files provided by former NSA contractor Edward Snowden. The memo recounts meetings in 2004 and 2005 in which administration officials disclosed “certain details of the special program to select individuals from the New York Times to dissuade them from publishing a story on the program at that time.”

continue https://firstlook.org/theintercept/2015/06/26/nsa-started-investigating-new-york-times-original-warrantless-wiretapping-story/

Categories: government | Tags:

Stolen logins for US government agencies found all over the web

Stolen logins for 47 US government agencies found all over the webCIA and Google Ventures-backed private company Recorded Future says stolen government login credentials have been spotted all over the web, leading to the possible exposure of logins for 47 US government agencies spread across 89 unique domains.

Focusing its research solely on Pastebin.com and 16 other paste sites, where hacker groups have been known to dump such data, the company says agency exposure across the entire web could conceivably be much larger than its small sample suggests.

In Government Credentials on the Open Web, the company cites a February 2015 report from the Office of Management and Budget (OBM) to Congress that highlighted how 12 of those agencies allowed some level of access to their networks without the additional security afforded by two-factor authentication.

That’s particularly pertinent right now, given how analysis of the recent Office of Personnel Management (OPM) breach suggests that government employee data and social security numbers were left particularly vulnerable by a lack of two-factor authentication combined with a lack of encryption.
continue https://nakedsecurity.sophos.com/2015/06/26/stolen-logins-for-us-government-agencies-found-all-over-the-web/

Categories: Uncategorized

Court Orders Facebook To Identify Revenge Porn Poster

Dutch court orders Facebook to ID revenge porn posterFacebook has been ordered to help a young woman find out who published an intimate video of her on the social network without her permission.

The judgement was made after a 21-year-old Dutch woman sued Facebook when a video of her performing a sex act on her ex-boyfriend was uploaded to the site in January.

The clip, filmed in 2011 when both the woman, identified as ‘Chantal,’ and the boy in question were minors, was removed by Facebook but is still available elsewhere on the internet.

Chantal’s ex-boyfriend admitted that he made the tape, but denied he posted it online, so yesterday a Dutch court ruled that Facebook must now hand over the poster’s name, email address, mobile phone number and IP address, as well as the time the video clip was posted, viewed and subsequently removed.

According to Reuters, Facebook told the Amsterdam District Court that whoever posted the video had done so from a fake account and that it had purged both from its servers in February:

continue https://nakedsecurity.sophos.com/2015/06/26/court-orders-facebook-to-identify-revenge-porn-poster/

Categories: internet | Tags:

Create a free website or blog at WordPress.com.

%d bloggers like this: