Category Archives: Science

OPCW’s block of on-site probe shows Western powers now aiming to oust Assad – Lavrov

OPCW’s block of on-site probe shows Western powers now aiming to oust Assad – Lavrov
The attempt by Western countries to derail Russia’s fact-finding initiative in Syria to examine the site of the chemical incident in Idlib province exposes their aim to topple the Syrian government, Russian Foreign Minister Sergey Lavrov said.

READ MORE: Russia questions Britain’s chemical weapons investigation in Syria

“I believe that it’s a very serious situation, because now it’s obvious that false information about the use of chemical weapons by the Syrian government is being used to move away from implementing Resolution 2254, which stipulates a political settlement with the participation of all the Syrian parties, and aims to switch to the long-cherished idea of regime change,” Lavrov said, speaking at a press conference with Chinese Foreign Minister Wang Yi in Astana.

UNSC Resolution 2254 calls for an inclusive government in Syria and a peace process that would involve a new constitution and free and fair elections.

According to the minister, the decision displayed “complete incompetence” on the part of his Western colleagues, who, in fact, are “prohibiting the OPCW from sending their experts to the site of the incident, as well as to the airfield from where aircraft loaded with chemical weapons allegedly flew out.”

“Yesterday [April 20], our proposal that experts from the Organization for the Prohibition of Chemical Weapons [OPCW] visit the sites of the suspected chemical attack in Syria was blocked by Western delegations without any explanations,” Lavrov said.

In the meantime, the UK and France claim their experts have received samples from the site of the incident, Lavrov added.

READ MORE: UN doesn’t send experts to Idlib ‘chemical incident’ site as West & US are blocking it – Assad

“London, Paris, and the OPCW have given no answers to our questions as to where they took these samples, who took them, or when they were delivered,” Lavrov stated.

“I think we are very close to this organization [OPCW] being discredited,” Lavrov added.

On Thursday, the OPCW’s executive council overwhelmingly rejected a proposal from Russia and Iran for a new investigation into the Idlib chemical incident.

The proposal had been amended to agree to Western demands that the investigation into the alleged attack be carried out by the existing OPCW fact-finding mission, but was defeated nonetheless.

The draft proposal seen by AFP called on the OPCW “to establish whether chemical weapons were used in Khan Sheikhoun and how they were delivered to the site of the reported incident.”

Both OPCW fact-checking missions tasked with looking into the Idlib incident are being headed by UK citizens, which Lavrov called “a very strange coincidence” that “runs contrary to the principles of an international organization.”

Earlier in April, an incident in the Syrian town of Khan Shaykhun reportedly killed as many as 100 people and injured several hundred. The US has squarely laid the blame on Damascus, claiming that it hid chemical weapons stockpiles from the OPCW after pledging to hand them over in 2013.

Moscow, however, said a thorough investigation, including an on-site inspection in rebel-held territory, should be carried out before jumping to any conclusions. Russia has cautioned that the incident may have been a false flag operation meant to provoke a US attack against Syrian government forces.

Former Department of Defense Science Adviser Debunks Claims of Syrian Chemical Attacks

 

By Derrick Broze

As the United States and Western allies march closer to full-scale conflict with Syria, many of their claims are now being scrutinized and dissected by a skeptical public.

On April 4, residents of the town of Khan Shaykhun suffered a chemical gas attack that reportedly killed 74 and injured 557. Despite a lack of evidence or investigation, the United States government, allied governments, and compliant media were quick to point the finger at Syrian President Bashar Al-Assad. The dead stream media ignored the fact that Khan Shaykhun was under the control of Al-Nusra Front, an al-Qaeda linked group which the United States has been funding throughout the Syrian civil war. Instead, the West claimed that Assad launched an air strike which released sarin gas, leading to the deaths and injuries.

Those claims are now being disputed by Theodore Postol, a professor emeritus at the Massachusetts Institute of Technology (MIT) and former scientist with the U.S Department of Defense. In a 14-page report, Postol debunks the White House’s report that concluded Assad was behind the attacks.  Postol’s report found that the U.S. and supporting governments have not provided any “concrete” evidence to black up their claims. Postol also says that it increasingly likely that the attack was carried out by rebel forces.

“The implication of Postol’s analysis is that it was carried out by anti-government insurgents as Khan Sheikhoun is in militant-controlled territory of Syria,” reports the International Business Times. Postol writes that he has reviewed the White House document and came to the conclusion “that the document does not provide any evidence whatsoever that the US government has concrete knowledge that the government of Syria was the source of the chemical attack in Khan Sheikhoun, Syria at roughly 6am to 7am on 4 April, 2017.”

Postol’s claims are based on several arguments. For one, he says the repeated use of chemical attacks by rebel forces over the last few years makes it likely they are the culprits. Also, he examines the main piece of evidence put forth by the White House, namely, photographs which purport to show a crater with an artillery shell that the U.S. says contained the sarin gas.

This conclusion is based on an assumption made by the White House when it cited the source of the sarin release and the photographs of that source. My own assessment is that the source was very likely tampered with or staged, so no serious conclusion could be made from the photographs cited by the White House.

Postol notes that the damage to the shell is not consistent with being dropped from an airplane. However, he believes the damage indicates that an explosive charge was placed on the shell containing the sarin gas and then detonated. “Since the pipe was filled with sarin, which is an incompressible fluid, as the pipe was flattened, the sarin acted on the walls and ends of the pipe causing a crack along the length of the pipe and also the failure of the cap on the back end,” Postol wrote.This is not the first time Postol has spoken against claims of the U.S. government. After the 2013 chemical weapons attack in eastern Ghouta, Postol also stated that the evidence did not point to Syrian President Assad. Postol worked with former UN weapons inspector Richard Lloyd on a report that called into question claims made by the U.S. As Global Research notes,

Just like Ghouta, Idlib (Khan Shaykhun) is dominated by al-Nusra. Earlier this year, even the Washington Post admitted that Idlib’s “moderate” rebels had all but been replaced by al-Nusra and other terrorist factions in Syria.

If Western governments and media outlets repeat the mistakes of 2013 by not verifying the claims made by the White Helmets… they may very well end up offering these extremist groups support if they prematurely choose to retaliate against Assad before the dust can settle.

This Book Could Save Your Life (Ad)

Postol and Lloyd are right to be skeptical of the claims made by the U.S. government. As Brandon Turbeville has noted, a declassified CIA document from 1983 shows that the U.S. has long held removal of Assad as their goal. The U.S. and Turkey would love to overthrow Assad and build an oil pipeline straight through the nation of Syria. To do this they will use every trick up their sleeve to deceive the public and push for more wars in the name of “liberty” and “democracy.” In fact, the U.S. is already trying to blame a recent bus attack on President Assad – once again without much credible evidence.

It’s up to the free hearts and minds to push past the propaganda and do everything in our power to push back against World War 3. Please join us in our efforts to spread this message far and wide. It’s time for the world to unite and send a message to the White House: #StandDownMrTrump

For more details on why all critical thinkers should be skeptical of the U.S. government regarding Syrian attacks, please see this and this.

Derrick Broze is an investigative journalist and liberty activist. He is the Lead Investigative Reporter for ActivistPost.com and the founder of the TheConsciousResistance.com. Follow him on Twitter. Derrick is the author of three books: The Conscious Resistance: Reflections on Anarchy and Spirituality and Finding Freedom in an Age of Confusion, Vol. 1 and Finding Freedom in an Age of Confusion, Vol. 2

Derrick is available for interviews. Please contact Derrick@activistpost.com

This article may be freely reposted in part or in full with author attribution and source link.

Image Credit

Assange is Kill?

NEW INFORMATION BEEN ADDED. MORE SOURCES TO FOLLOW.

 

ALL THAT IS NEEDED TO DISPROVE THIS THEORY IS A SINGLE APPEARANCE FROM ASSANGE IN THE ECUADORIAN EMBASSY!

 

 

http://imgur.com/a/9Jmd5

 

http://archive.is/heCYT

 

IMAGES RELATED

 

 

CURRENTLY NO PROOF HE IS IN THE EMBASSY IN THE UK

 

SWEDISH PROSECUTOR AND HIS OWN LAWYER WEREN’T ALLOWED TO SEE HIM. COMMUNICATION THROUGH AMBASSADOR.

 

 

Posts off 4chan related to this

 

= =

 

Assange and the entire Wikileaks staff has been missing since Oct 15. 3 of his attorneys are dead along with the director of Wikileaks who died on Oct 22. The deadman switch seems to have gone off on Oct 21st (during the DDoS) and again a couple of times after (check dates of big DDoS attacks against the site and when it’s down). It seems like 1. Wikileaks is compromised 2. the keys to unlock some of the insurance files have been released and 3. they are trying very hard to stop people from finding them.

 

 

Anon has been working on this nonstop since Oct 15. All threads get slid or deleted and the people making progress go silent. As soon as they found relevant messages encoded in the blockchain, the mempool was flooded, incredibly high transaction fees started showing up and a high number of transactions with encoded disinformation were made. If you look at the deleted threads and the information posted on onion links, it looks like anon was able to unlock some of the files on Oct 27 and that more files are being secretly encoded into the blockchain and the new file directory on the Wikileaks site (the last change was last night). If you want to see anon’s work, google ’09-Nov-438498967 06:00′ or look for insurance/DMS threads on onion chans then look at the dates below.

 

If you are skeptical, download the latest insurance files posted: https://twitter.com/wikileaks/status/796085225394536448

 

Run ‘scripts file | head -c 18′ and you will see that the files were not salted. All previously published insurance files have been salted.

 

Do ‘gpg –verify’ and you will see that the gpg signature is invalid.

 

= =

 

 

–SUMMARY– (Detailed timeline with sources listed after this summary)

 

Apr 16: John Jones QC, Assange’s U.N. Lawyer dies jumping in front of a train.

 

May 11: Michael Ratner, WikiLeaks’ chief counsel, dies of cancer.

 

Jul 10: Seth Rich, DNC staffer who supposedly leaked DNC documents to Wikileaks, is shot in the back and dies. Nothing is stolen from his body.

 

Aug 5: Edward Snowden (source of leaks on surveillance by the NSA) tweets 64 bit code (potential dead man’s switch)

 

It took 10 days before Snowden left another Tweet

 

Aug 10: Wikileaks offers $20k reward for information on murder of Seth Rich.

 

Oct 7: Podestamails leaks, first batch.

 

Oct 14: John Podesta tweets “I bet the lobster risotto is better than the food at the Ecuadorian Embassy”.

 

Oct 15: Joe Biden threatens Russia and blames them for Wikileaks – (Arrogant and open hostility)

 

Oct 16th/17: John Kerry visits the UK, personally pressures Equador to stop Assange from publishing documents about Clinton.

 

Oct 16/17: Wikileaks tweets SHA-256 prerelease keys.

 

Oct 16/17: Equadorian Embassy cuts off Assange’s internet access.

 

Oct 17: Wikileaks Volunteer tweets that Julian is ok… tweet is now deleted.

 

Oct 17: Embassy tells a caller they can’t comment on Assange being alive:

 

https://youtu.be/536IK7YhsGw

 

https://youtu.be/A_jhLcvoZqc

 

At the exact same time this was taking place, Manning had a group of guys try to break her out prison. Read her statement and see how the dates and times match:

 

https://www.documentcloud.org/documents/3213878-Binder2.html

 

http://archive.is/87WS5

 

Oct 18: Pamela Anderson visits Assange. Feeds him a vegan sandwich apparently???

 

Oct 18: Witnesses photograph and report heavily armed police and vans outside Ecuadorian Embassy, are barred from approaching and have cellphones confiscated. Live feeds are cut off.

 

Oct 18: Fox News reports Assange will be arrested in a matter of hours.

 

Oct 18: https://file.wikileaks.org/file made publicly visible, file dates/timestamps changed to 1984 (Orwell reference).

 

The message ‘The Insurance files may have just been released’ is shown for about an hour: https://i.imgur.com/6IMYfUK.png

 

http://archive.is/UTGVq

 

Oct 20: /r/wikileaks, /r/dncleaks, /r/wikileakstaskforce and /r/nsaleaks add 21 new moderators and remove previous mods, all threads about Assange going missing deleted since.

 

Oct 20/21: Wikileaks tweets 5 tweets with misspelled words. The incorrect letters spell “HELP HIM”. The Wikileaks twitter has never made a spelling error, let alone 5 in two days.

 

Oct 21: Massive DDoS attack on US internet. Wikileaks tweets to imply the attack originates from its supporters, asking them to stop, no evidence supports claim.

 

Oct 21: DDoS attack takes down Twitter.

 

At this point anon notices that the insurance keys were posted on several sites and deleted. People start trying to post the information but it is immediately deleted. Everyone takes refuge in onion threads that also disappear.

 

Oct 21: London Airport evacuated due to “chemical attack”, potentially used as cover to fly Assange out of country. (Conjecture but suspicious timing all the same)

 

Oct 22: Gavin MacFadyen (mentor to Assange and key player in Wikileaks) dies of lung cancer.

 

4TH PERSON RELATED TO WIKILEAKS NOW DEAD IN AS MANY MONTHS!!! MASSIVE RED FLAG!!!

 

Oct 23: Wikileaks Tweets poll asking how best to prove Assange is alive (he still hasn’t appeared on video or at the window since).

 

Oct 24: Wikileaks Tweets video of Assange and Michael Moore recorded in June.

 

Oct 24: Anon is able to find the deleted keys. They are posted and deleted again.

 

Oct 25: Someone comes into a thread and gives anon a hint about messages in the blockchain.

 

Oct 26: 4chan users successfully decode their first message in Wikileak’s blockchain. Threads are instantly flooded by shills saying that it’s not worth looking into. The blockchain is blocked with fees and 43000 unconfirmed transactions appear in the mempool.

 

Oct 27 (AM): Anon moves into an onion thread, posts code and a tutorial on decoding messages in the blockchain. Several files and messages are found.

 

Bitcoin 0.13.1 is released and a ‘soft fork’ begins:

 

https://bitcoin.org/en/release/v0.13.1

 

The blockchain is attacked: https://www.reddit.com/r/Bitcoin/comments/59qiyg/is_there_some_attack_going_whats_with_large/

 

Oct 27(PM): Several anon report losing their connection. Talk of v&s and black bagging begins. Someone posts that they discovered a flaw that allows anyone to retrieve the password from the files. Clues are dumped and the onion threads go silent. On Tox chat someone says someone unlocked some of the files, warns that FBI will announce that new evidence was found in someone’s computer and that a giant human trafficking operation would be exposed.

 

http://sli.mg/3srnQ3 – BASIC BLOCKCHAIN EXPLANATION

 

Oct 28: FBI announces they discovered new evidence on Anthony Weiner’s computer:

 

Oct 30: FBI begins posting their own leaks:

 

https://twitter.com/FBIRecordsVault

 

(Said Twitter been almost completely dead until now)

 

Oct 31 – Nov 2: Anon begins analyzing strange code words like ‘pizza’. Multiple connections are made.

 

Nov 3: Wikileaks confirms the validity of the information found:

 

https://twitter.com/wikileaks/status/794247777756860417

 

Nov 5: Manning’s statement [referenced Oct 17th] is released: https://www.documentcloud.org/documents/3213878-Binder2.html

 

Nov 6: Huge DDoS takes down Wikileaks for first time in years.

 

Nov 7: Various entities notice hundreds of Podesta and DNC emails are missing from recent leaks, accessed with direct entry.

 

Nov 8 (AM): New insurance files are posted: https://twitter.com/wikileaks/status/796085225394536448

 

Nov 8 (PM): Trump wins.

 

Nov 8(AM-PM): Large numbers of cyber attacks target Saudi Arabia and Emirates: https://i.sli.mg/dGc3TG.png

 

Nov 9: A single file is changed on the file.wikileaks.org/torrent

 

Nov 10: Staff publicly states their concern for Assange’s continue silence after the election. Incorrectly states that insurance files are future leaks and refers to the ones posted on Nov 8. These are the first files to have filenames that reference their content: https://www.reddit.com/r/IAmA/comments/5c8u9l/we_are_the_wikileaks_staff_despite_our_editor/

 

Suggested you use ((uTorrent)) to download the files

 

These are the previous insurance files:

 

https://file.wikileaks.org/torrent/2016-06-03_insurance.aes256.torrent

 

https://file.wikileaks.org/torrent/wikileaks-insurance-20120222.tar.bz2.aes.torrent

 

https://file.wikileaks.org/torrent/wlinsurance-20130815-A.aes256.torrent

 

https://file.wikileaks.org/torrent/wlinsurance-20130815-B.aes256.torrent

 

https://file.wikileaks.org/torrent/wlinsurance-20130815-C.aes256.torrent

 

https://web.archive.org/web/20100901162556/https://leakmirror.wikileaks.org/file/straw-glass-and-bottle/insurance.aes256

 

Nov 12: Assange meets with Swedish prosecutor regarding rape allegations, lawyers barred from attending, meeting meeting conducted via an Equadorian ambassador (not face to face)

 

REPEAT, NO FACE TO FACE

 

Nov 14: Wikileaks releases insurance files, SHA-256 hashes do not match those tweeted in October.

 

 

==DETAILED TIMELINE== LINKS PROVIDED – -

 

 

Apr 16: John Jones QC, Assange’s U.N. Lawyer dies jumping in front of a train.

 

https://twitter.com/wikileaks/status/722371220868571136

 

http://archive.is/1ZIWz

 

http://investmentwatchblog.com/wikileaks-lawyers-death-ruled-not-suicide/

 

http://archive.is/gDLFx

 

 

May 11: Michael Ratner, WikiLeaks’ chief counsel, dies of cancer.

 

https://en.wikipedia.org/wiki/Michael_Ratner#Death

 

http://archive.is/Diocv

 

http://www.nytimes.com/2016/05/12/us/michael-ratner-lawyer-who-won-rights-for-guantanamo-prisoners-dies-at-72.html

 

https://www.theguardian.com/law/2016/may/12/michael-ratner-obituary

 

http://archive.is/SEKl1

 

 

Jul 10: Seth Rich, DNC staffer who supposedly leaked DNC documents to Wikileaks, is shot in the back and dies. Nothing is stolen from his body.

 

https://en.wikipedia.org/wiki/Murder_of_Seth_Rich

 

http://archive.is/0EnQE

 

 

Aug 5: Edward Snowden (source of leaks on surveillance by the NSA) tweets 64 bit code (potential dead man’s switch)

 

https://qph.ec.quoracdn.net/main-qimg-1462e935a7aa6589a6b39a28db3fa285?convert_to_webp=true

 

(Since deleted off Twitter)

 

It took 10 days before Snowden left another Tweet

 

 

Aug 10: Wikileaks offers $20k reward for information on murder of Seth Rich.

 

http://www.infowars.com/wikileaks-offers-20k-reward-for-info-on-murdered-dnc-staffer/

 

http://archive.is/jyqiU

 

https://twitter.com/wikileaks/status/763063624579551232

 

http://archive.is/Ac2Nh

 

 

Oct 7: Podestamails leaks, first batch.

 

http://www.breitbart.com/tech/2016/10/07/wikileaks-releases-2050-emails-clinton-campaign-chief-john-podesta/

 

http://archive.is/CwOJq

 

https://twitter.com/wikileaks/status/784498891936915456?ref_src=twsrc%5Etfw

 

http://archive.is/G2TKG

 

 

Oct 14: John Podesta tweets “I bet the lobster risotto is better than the food at the Ecuadorian Embassy”.

 

http://www.breitbart.com/tech/2016/10/14/john-podestas-twitter-diss-of-wikileaks-editor-julian-assange-backfires-goes-viral/

 

http://archive.is/xrMkI

 

 

Oct 15: Joe Biden threatens Russia and blames them for Wikileaks – (Arrogant and open hostility)

 

https://www.youtube.com/watch?v=h9M-fb9VIi0&ab_channel=SkyQuakes2012

 

 

Oct 16th/17: John Kerry visits the UK, personally pressures Equador to stop Assange from publishing documents about Clinton.

 

http://www.bloomberg.com/news/articles/2014-06-03/goldman-sachs-gets-ecuador-gold-as-correa-steps-up-hunt-for-cash

 

 

Oct 16/17: Wikileaks tweets SHA-256 prerelease keys.

 

https://twitter.com/wikileaks/status/787777344740163584

 

http://archive.is/9tPCU

 

https://twitter.com/wikileaks/status/787781046519693316

 

http://archive.is/n4H58

 

https://twitter.com/wikileaks/status/787781519951720449

 

http://archive.is/JeFom

 

 

Oct 16/17: Equadorian Embassy cuts off Assange’s internet access.

 

https://www.theguardian.com/media/2016/oct/17/ecuador-julian-assange-internet-access-wikileaks

 

http://archive.is/59GtU

 

http://bigstory.ap.org/article/6f997f97c5f140a29f385ea05f1b642c/wikileaks-assanges-internet-link-severed-state-actor

 

http://archive.is/IYSQB

 

https://twitter.com/wikileaks/status/787889195507417088

 

http://archive.is/HkISA

 

https://twitter.com/wikileaks/status/788369924175441920

 

 

Oct 17: Wikileaks Volunteer tweets that Julian is ok… tweet is now deleted.

 

[Archive source needed]

 

@kellykolisnik:

 

@JohnDeplo You can’t go in without an appointment. Julian is confirmed to be perfectly fine. Thanks for your support and for checking :)

 

 

Oct 17: Embassy tells a caller they can’t comment on Assange being alive:

 

https://youtu.be/536IK7YhsGw

 

https://youtu.be/A_jhLcvoZqc

 

At the exact same time this was taking place, Manning had a group of guys try to break her out prison. Read her statement and see how the dates and times match:

 

https://www.documentcloud.org/documents/3213878-Binder2.html

 

http://archive.is/87WS5

 

 

Oct 18: Pamela Anderson visits Assange. Feeds him a vegan sandwich apparently???

 

http://thenewdaily.com.au/news/world/2016/11/15/pamela-anderson-assange/

 

http://archive.is/ZNLjB

 

http://time.com/4532939/pamela-anderson-julian-assage-vegan-lunch/

 

 

Oct 18: Witnesses photograph and report heavily armed police and vans outside Ecuadorian Embassy, are barred from approaching and have cellphones confiscated. Live feeds are cut off.

 

http://www.zerohedge.com/news/2016-10-21/wikileaks-reveals-heavily-armed-police-gathering-outside-ecuadorian-embassy-london

 

http://archive.is/oQnSq

 

https://twitter.com/wikileaks/status/789493599121604609

 

http://archive.is/TTutx

 

http://www.trunews.com/article/wikileaks-armed-police-appear-at-ecuador-embassy-in-london

 

http://archive.is/HSwQD

 

(More sources needed to confirm)

 

 

Oct 18: Fox News reports Assange will be arrested in a matter of hours.

 

https://youtu.be/0T_h7pSVIFo (This doesn’t seem to have been reported anywhere else.)

 

 

Oct 18: https://file.wikileaks.org/file made publicly visible, file dates/timestamps changed to 1984 (Orwell reference).

 

The message ‘The Insurance files may have just been released’ is shown for about an hour: https://i.imgur.com/6IMYfUK.png

 

http://archive.is/UTGVq

 

 

Oct 20: /r/wikileaks, /r/dncleaks, /r/wikileakstaskforce and /r/nsaleaks add 21 new moderators and remove previous mods, all threads about Assange going missing deleted since.

 

https://www.reddit.com/r/WhereIsAssange/comments/5d7gif/psa_a_group_of_mods_were_all_added_to_wikileaks/

 

http://archive.is/7Xygg

 

==

 

/r/wikileaks

 

julio08 (2408) 25 days ago full permissions

 

Here4Popcorn (31467) 24 days ago full permissions

 

crawlingfasta (5781) 24 days ago full permissions

 

SATXTAN (4317) 24 days ago full permissions

 

AssuredlyAThrowAway (221301) 24 days ago full permissions

 

kybarnet (71223) 24 days ago full permissions

 

GamingForHonor (23928) 22 days ago wiki

 

==

 

/r/dncleaks

 

AssuredlyAThrowAway (221300) 1 month ago full permissions

 

HollowFangs (62927) 26 days ago access, flair, mail, posts

 

SATXTAN (4317) 25 days ago full permissions

 

==

 

/r/wikileakstaskforce

 

Here4Popcorn (31467) 1 month ago full permissions

 

kybarnet (71223) 1 month ago full permissions

 

GamingForHonor (23928) 1 month ago full permissions

 

pancakees (14098) 1 month ago full permissions

 

bananawhom (8655) 1 month ago full permissions

 

tjade (654) 1 month ago full permissions

 

shadowman3001 (102074) 1 month ago full permissions

 

deathscape10 (4791) 1 month ago full permissions

 

crawlingfasta (5781) 1 month ago full permissions

 

==

 

/r/nsaleaks

 

fantastic_comment (10116) 27 days ago config, flair, mail, posts, wiki

 

cojoco (113673) 24 days ago full permissions

 

==

 

AssuredlyAThrowAway, SATXTAN, Here4Popcorn, crawlingfasta, GamingForHonor, kybarnet ALL added to 2 of these subreddits.

 

 

Oct 20/21: Wikileaks tweets 5 tweets with misspelled words. The incorrect letters spell “HELP HIM”. The Wikileaks twitter has never made a spelling error, let alone 5 in two days.

 

https://twitter.com/wikileaks/status/789078312043761665

 

http://archive.is/0Htlx

 

#imWithHer – im

 

https://twitter.com/wikileaks/status/789170993252081666

 

http://archive.is/OGWL5

 

Navel Intelligence – Naval – EL

 

https://twitter.com/wikileaks/status/789173501458456576

 

http://archive.is/oTPi1

 

wopper – wHopper – H

 

https://twitter.com/wikileaks/status/789456189851627522

 

http://archive.is/mDpQe

 

presumtive – presumptive – P

 

(Can’t seem to find all these tweets however this is more suspicious activity that lines up with the forming narrative of Wikileaks being under attack)

 

 

Oct 21: Massive DDoS attack on US internet. Wikileaks tweets to imply the attack originates from its supporters, asking them to stop, no evidence supports claim.

 

https://twitter.com/wikileaks/status/789574436219449345

 

http://archive.is/XqYuP

 

 

Oct 21: DDoS attack takes down Twitter.

 

At this point anon notices that the insurance keys were posted on several sites and deleted. People start trying to post the information but it is immediately deleted. Everyone takes refuge in onion threads that also disappear.

 

http://www.techtimes.com/articles/183218/20161021/cyber-attack-takes-down-netflix-twitter-spotify-more-east-coast.htm

 

http://archive.is/8bLCm

 

 

Oct 21: London Airport evacuated due to “chemical attack”, potentially used as cover to fly Assange out of country. (Conjecture but suspicious timing all the same)

 

http://time.com/4542496/london-city-airport-chemical-incident/

 

http://archive.is/Lv5KT

 

https://youtu.be/ViMVLplr8YM

 

 

Oct 22: Gavin MacFadyen (mentor to Assange and key player in Wikileaks) dies of lung cancer.

 

4TH PERSON RELATED TO WIKILEAKS NOW DEAD IN AS MANY MONTHS!!! MASSIVE RED FLAG!!!

 

https://www.rt.com/usa/363793-gavin-macfadyen-dies-wikileaks/

 

http://archive.is/JAZ24

 

https://twitter.com/wikileaks/status/790278989596295170

 

http://archive.is/bpq74

 

 

Oct 23: Wikileaks Tweets poll asking how best to prove Assange is alive (he still hasn’t appeared on video or at the window since).

 

https://twitter.com/wikileaks/status/790406530738913285

 

http://archive.is/7EDvG

 

 

Oct 24: Wikileaks Tweets video of Assange and Michael Moore recorded in June.

 

https://twitter.com/wikileaks/status/790394830979465216

 

http://archive.is/w1Hpu

 

Wikileaks also have this posted, AGAIN not proving Assange is alive.

 

https://twitter.com/SHO_TheCircus/status/790672953331425280

 

http://archive.is/OiA5B

 

 

Oct 24: Anon is able to find the deleted keys. They are posted and deleted again.

 

[SOURCE/CITATION NEEDED]

 

 

Oct 25: Someone comes into a thread and gives anon a hint about messages in the blockchain.

 

[SOURCE/CITATION NEEDED]

 

Oct 26: 4chan users successfully decode their first message in Wikileak’s blockchain. Threads are instantly flooded by shills saying that it’s not worth looking into. The blockchain is blocked with fees and 43000 unconfirmed transactions appear in the mempool.

 

[SOURCE/CITATION NEEDED]

 

 

Oct 27 (AM): Anon moves into an onion thread, posts code and a tutorial on decoding messages in the blockchain. Several files and messages are found.

 

Bitcoin 0.13.1 is released and a ‘soft fork’ begins:

 

https://bitcoin.org/en/release/v0.13.1

 

The blockchain is attacked: https://www.reddit.com/r/Bitcoin/comments/59qiyg/is_there_some_attack_going_whats_with_large/

 

Oct 27(PM): Several anon report losing their connection. Talk of v&s and black bagging begins. Someone posts that they discovered a flaw that allows anyone to retrieve the password from the files. Clues are dumped and the onion threads go silent. On Tox chat someone says someone unlocked some of the files, warns that FBI will announce that new evidence was found in someone’s computer and that a giant human trafficking operation would be exposed.

 

http://sli.mg/3srnQ3 – BASIC BLOCKCHAIN EXPLANATION

 

 

Oct 28 (A few hours later): FBI announces they discovered new evidence on Anthony Weiner’s computer:

 

http://www.nytimes.com/2016/10/29/us/politics/fbi-hillary-clinton-email.html?_r=0

 

 

Oct 30: FBI begins posting their own leaks:

 

https://twitter.com/FBIRecordsVault

 

(Said Twitter been almost completely dead until now)

 

 

Oct 31 – Nov 2: Anon begins analyzing strange code words like ‘pizza’. Multiple connections are made.

 

[SOURCE/CITATION NEEDED]

 

 

Nov 3: Wikileaks confirms the validity of the information found: https://twitter.com/wikileaks/status/794247777756860417

 

 

Nov 5: Manning’s statement [referenced Oct 17th] is released: https://www.documentcloud.org/documents/3213878-Binder2.html

 

 

Nov 6: Huge DDoS takes down Wikileaks for first time in years.

 

https://twitter.com/wikileaks/status/795503927378722816

 

 

Nov 7: Various entities notice hundreds of Podesta and DNC emails are missing from recent leaks, accessed with direct entry.

 

 

Nov 8 (AM): New insurance files are posted: https://twitter.com/wikileaks/status/796085225394536448

 

Nov 8 (PM): Trump wins.

 

[Yeah you guys don’t need a source for this]

 

 

Nov 8(AM-PM): Large numbers of cyber attacks target Saudi Arabia and Emirates: https://i.sli.mg/dGc3TG.png

 

 

Nov 9: A single file is changed on the file.wikileaks.org/torrent

 

 

Nov 10: Staff publicly states their concern for Assange’s continue silence after the election. Incorrectly states that insurance files are future leaks and refers to the ones posted on Nov 8. These are the first files to have filenames that reference their content: https://www.reddit.com/r/IAmA/comments/5c8u9l/we_are_the_wikileaks_staff_despite_our_editor/

 

Suggested you use ((uTorrent)) to download the files

 

These are the previous insurance files:

 

https://file.wikileaks.org/torrent/2016-06-03_insurance.aes256.torrent

 

https://file.wikileaks.org/torrent/wikileaks-insurance-20120222.tar.bz2.aes.torrent

 

https://file.wikileaks.org/torrent/wlinsurance-20130815-A.aes256.torrent

 

https://file.wikileaks.org/torrent/wlinsurance-20130815-B.aes256.torrent

 

https://file.wikileaks.org/torrent/wlinsurance-20130815-C.aes256.torrent

 

https://web.archive.org/web/20100901162556/https://leakmirror.wikileaks.org/file/straw-glass-and-bottle/insurance.aes256

 

 

Nov 12: Assange meets with Swedish prosecutor regarding rape allegations, lawyers barred from attending, meeting meeting conducted via an Equadorian ambassador (not face to face)

 

REPEAT, NO FACE TO FACE

 

https://www.theguardian.com/media/2016/nov/14/julian-assange-to-face-swedish-prosecutors-over-accusation

 

http://archive.is/3Rl9Y

 

 

Nov 14: Wikileaks releases insurance files, SHA-256 hashes do not match those tweeted in October.

 

 

If you truly care about Assange and the future of Wikileaks you should consider investigating the possibility of the DMS being activated. It might be the only leverage that can be used to bring him back safely.

 

= = = =

 

CURRENTLY NO PROOF HE IS IN THE EMBASSY IN THE UK

 

SWEDISH PROSECUTOR AND HIS OWN LAWYER WEREN’T ALLOWED TO SEE HIM. COMMUNICATION THROUGH AMBASSADOR.

 

= = = =

 

 

Other important related information#

 

https://wikileaks.ch/IMG/pdf/WikiLeaks_Response_v6.pdf

https://www.reddit.com/r/WhereIsAssange/

 

 

Assange is Kill? – Pastebin.com.

What Could Go Wrong? US Unveils Artificially Intelligent Fighter Pilot

 

ai-fighter-pilots

The two most aggressive military forces in the world have added a new frontier in their immense ability to deal death and destruction. In the same week, an Israeli firm launched the first-ever torpedo from an unmanned sea vessel while a U.S. artificially intelligent fighter pilot easily won combat simulations against human pilots.

These achievements are a testament to the sad reality that military interests are often the first to take advantage of wondrous advancements such as AI, just as nuclear physics and other technologies were hijacked for more efficient methods of killing.

Stephen Hawking pointed this out during an interview on the Larry King show.

Governments seem to be engaged in an AI arms race, designing planes and weapons with intelligent technologies. The funding for projects directly beneficial to the human race, such as improved medical screening seems a somewhat lower priority.

The AI fighter jet pilot, known as Alpha, was developed by researchers from the University of Cincinnati and defense company Psibernetix. It used four virtual jets to defend a coastline from two attacking planes with superior weapons systems—without suffering any losses.

Retired US Air Force colonel Gene Lee was shot out of the air every time after protracted engagements, and could not even manage to score a hit on Alpha.

The groundbreaking feat was accomplished through the use of “fuzzy logic” to efficiently compute the massive amounts of data from a simulated fighter jet. Instead of analyzing every bit of data equally, fuzzy logic assigns a degree of truth or significance to the pieces of data before making a broader decision.

“Here, you’ve got an AI system that seems to be able to deal with the air-to-air environment, which is extraordinarily dynamic, has an extraordinary number of parameters and, in the paper, more than holds its own against a skilled and capable, experienced combat pilot,” said Doug Barrie, a military aerospace analyst at think tank IISS.

“It’s like a chess master losing out to a computer.”

For now, the talk is about using Alpha “as a simulation tool or as a device to help develop better systems for assisting human pilots in the air.” But it’s a safe assumption that using AI to pilot real machines is being explored by a military machine incessantly hungry for the next best means of reaping death and destruction.

If an AI fighter pilot were ever to fly an actual fighter jet, the obvious question is, what happens when it decides to attack a non-military target? Of course, human pilots routinely bomb innocent civilians, but this is “justified” as collateral damage in the pursuit of defeating the bogeyman du jour.

The unmanned torpedo-launching sea vessel system, called Seagull, will soon be put into use by the Israeli Navy for use against submarines and sea mines. It consists of one or two surface vessels, each about 40 feet long, operated remotely from manned ships or the shore.

One vessel carries a sonar system that can search the entire water volume, with another that deploys an underwater robot for further investigation. When a threat is confirmed, a vessel launches a torpedo-like weapon to destroy the target.

This test carried out in the Haifa port marks the first time that a torpedo has been launched from an unmanned boat.

‘The success of the first torpedo launch test is a major milestone, confirming the Unmanned Surface Vessel’s capability to incorporate weapons that counter submarines, in addition to its unique submarine and mine detection capabilities,’ Elbit, the firm behind the trial said.

While it’s great to “take the man out of the minefield,” the Seagull also represents the kind of military advancement we see with unmanned aerial vehicles, or drones.

As we know, drones have been the tool of choice for expanding undeclared war into countries in the name of fighting terrorism, which has resulted in thousands of innocent civilians being killed. When bombing is carried out remotely, from the comfort of a padded seat in a secure building, the operator is that much more detached from the reality of killing people.

Former drone operators have gone public about the blood lust and indifference that characterizes the drone assassination program, and fellow operators getting intoxicated to “bend that reality and try to picture yourself not being there.”

Of course, operating torpedo-equipped sea vessels is a different beast, but the trend toward unmanned killing machines is nonetheless troubling. With AI being brought into military technology, how long before scenes from the Terminator movies are a real thing?

By Justin Gardner

 

Justin Gardner writes for TheFreeThoughtProject.com, where this article first appeared.

 

What Could Go Wrong? US Unveils Artificially Intelligent Fighter Pilot.

Ex-CIA Spy: A Global Open Source Revolution Is About To Begin

When Robert David Steele speaks, people listen. Especially those within the military and intelligence communities around the world.



With his continued rhetoric on the open source everything manifesto as a way to positively transform this world for all, Mr. Steele has additionally begun discussing the world’s largest financial/gold cover-up story which has ties to JFK’s assassination and 9/11: That is, the global collateral accounts.

As a former CIA spy who has trained over 7,500 officers from over 66 countries,  Robert Steele has over 18 years experience across the U.S. Intelligence community  and an additional 20 years experience in commercial intelligence and training. He is  also a former Marine and he is the co-founder of the Marine Corps Intelligence  Activity.

He has also written several books, which include, The Open Source Manifesto and  Intelligence For Earth: Clarity, Diversity, Integrity and Sustainability, among others.

In accord to open source everything, Robert’s motto is: The truth at any cost, lowers all other costs.

Essentially, when information, technology and resources are opened up as the  commons to all, the true cost plummets and the well-being of our planet and all living  beings here begin to thrive, as well as our social, political and financial systems.

In Robert’s own words, the open source revolution will transform our world for the better and for all.

“Sharing, not secrecy, is the means by which we realize such a lofty destiny as well as create infinite wealth. The wealth of networks, the wealth of knowledge, revolutionary wealth- all can create a nonzero, win-win Earth that works for 100% of humanity. This is the ‘utopia’ that Buckminster Fuller foresaw, now within our reach.” 

Similar models to Steele’s open source everything also include The  Venus Project: Beyond Politics, Poverty and War, which calls for a  holistic approach to changing the systems on this planet in a way that  utilizes technology and human ingenuity to provide a high standard of  living for every person by opening the planet’s resources for the use of  all– in a strategically sustainable and efficient manner.

Another model that is similar is Sustainable Human’s gift-based  community in which all who participate are volunteers and everything  created is done to “spread knowledge, ideas and alternative ways of  living that enable humanity to live in harmony with the rest of life on Earth. ”

All of these models are wonderful and appropriate to envision, and what is certain is that most of the social systems we have in place currently, must go. Fundamental change is necessary.

In an interview with The Guardian, Robert David Steele was asked his opinion on the idea that the U.S. is on the verge of revolting against the elitist 1%:

“The preconditions for revolution exist in the UK, and most Western countries [including the U.S].

The number of active pre-conditions is quite stunning, from elite isolation to concentrated wealth to inadequate socialization and education, to concentrated land-holdings to loss of authority to repression of new technologies, especially in relation to energy, to the atrophy of the public sector and spread of corruption, to media dishonesty, to mass unemployment of young men and on and on and on.” 

What then needs to happen for this to begin? Steele says:

“Preconditions are not the same as precipitants. We are waiting for our Tunisian fruit seller. The public will endure great repression, especially when most media outlets and schools are actively aiding the repressive meme of ‘you are helpless, this is the order of things.’

When we have a scandal so powerful that it cannot be ignored by the average Briton or American, we will have a revolution that overturns the corrupt political systems in both countries, and perhaps puts many banks out of business. Vaclav Handel calls this ‘The Power of the Powerless.’ One spark, one massive fire.” 

Interestingly, this interview was conducted almost exactly 2 years ago. Have we not seen the divide  between the 99% and the 1% continue to grow in that time? Humanity will not remain quiet for much longer. We are  indeed close to some big and positive changes.

Perhaps this massive  scandal/event we are waiting for is the conclusion of the FBI’s investigation of Hillary Clinton and the Clinton Foundation or maybe it is Britain’s vote to leave the EU, potentially triggering a cascade of revolts throughout Europe and then the world, or perhaps it will be a large enough group of people becoming aware of the global collateral accounts, the world’s largest  financial/gold cover-up which has relation to JFK’s death and the  events of 9/11; a story which just three weeks ago Robert David Steele started to write about publicly:

It never occurred to me that accidentally becoming the top Amazon reviewer for non-fiction, partially associated with my being the lead for Open Source Intelligence (OSINT) for 25 years across 66+ countries, would be vastly more important than everything I ever learned across multiple graduate degrees, as a former spy, and as co-founder of the Marine Corps Intelligence Activity (MCIA).As I encounter disbelief about Neil Keenan and his role as the main juncture between the Dragon Society and the West as we move toward a global economic re-set, I have to remind myself that 80% of the public still thinks JFK was assassinated by Lee Harvey Oswald; J. Edgar Hoover was a moral man; the Israelis attacked the USS Liberty by accident, and 9/11 was carried out by a bunch of “rag heads” armed with box cutters. 

I must emphasize that it was not the books that underlay my absolute confidence in Neil Keenan and the Dragon Society and the broad outlines of the coming global re-set, but rather the people behind the books that I have taken the trouble to meet, sometimes under quasi-clandestine circumstances. Sterling and Peggy Seagrave – Peggy has passed – stand out.

Their book, Gold Warriors–America’s Secret Recovery of Yamashita’s Gold, came with a CD containing 60,000 additional documents including maps and photographs. That led me to a quasi-clandestine meeting in France to interview them for the 2004 offering of my international conference – the transcript is online – and a deep continuing relationship of trust.”

The public endorsement of Neil Keenan and his team’s efforts to open the global collateral accounts from Robert David Steele is another clear indication that these accounts are indeed real and that those who are working with Neil Keenan (positive factions within The Pentagon and CIA, Russian Intelligence, presidents and prime ministers of  multiple South American countries and several Asian countries, among many other political, financial and intelligence and military groups who are all quietly and sometimes openly working for humanity’s best interest) are legitimate.

The global collateral accounts have such a deep and complex history, which can be read in great detail here. In short, they are off-ledger accounts backed by gold, silver and many other assets which were originally intended for humanitarian projects.

JFK signed what is known as the Green Hilton Memorial Agreement with President Sukarno of Indonesia, which was to use these accounts to issue a new US Treasury Note (backed by gold and silver) and end the Federal Reserve’s control over the global financial system.

Neil Keenan is now getting very close to opening these accounts for the intended purposes of transforming our world for the better through many humanitarian projects as well as the release of free energy technologies and an overhaul in the global financial system. Russia, China, Iran, Indonesia and almost the entire Eastern hemisphere is supporting this plan in one way or another.

Perhaps Robert David Steele’s ideas on an open source world will be part of the coming humanitarian projects.

As almost anyone can see when they look around either at their own lives or the world at large, everything is changing. Everything is in flux. Everything happens in cycles. The time for positive global change is now.

For more information on some of the topics mentioned above, check out these articles: 

The Inevitability of Peaceful Revolution

We Need A New, Beneficial Global Economy

The Connection Between 9/11, JFK and the Global Collateral Accounts

The Most Important Financial Meeting Since JFK’s Death Just Took Place

The Alliance That Is Taking Down The New World Order

 

Ex-CIA Spy: A Global Open Source Revolution Is About To Begin.

The Pentagon is building a ‘self-aware’ killer robot army fueled by social media — INSURGE intelligence — Medium

Imagine one of these giant robot dog things being weaponized and chasing you through the jungle because you turned up on a Pentagon kill list after posting angry stuff on social media

The Pentagon is building a ‘self-aware’ killer robot army fueled by social media

Official US defence and NATO documents confirm that autonomous weapon systems will kill targets, including civilians, based on tweets, blogs and Instagram

by Nafeez Ahmed

This exclusive is published by INSURGE INTELLIGENCE, a crowd-funded investigative journalism project for the global commons

An unclassified 2016 Department of Defense (DoD) document, the Human Systems Roadmap Review, reveals that the US military plans to create artificially intelligent (AI) autonomous weapon systems, which will use predictive social media analytics to make decisions on lethal force with minimal human involvement.

Despite official insistence that humans will retain a “meaningful” degree of control over autonomous weapon systems, this and other Pentagon documents dated from 2015 to 2016 confirm that US military planners are already developing technologies designed to enable swarms of “self-aware” interconnected robots to design and execute kill operations against robot-selected targets.

More alarmingly, the documents show that the DoD believes that within just fifteen years, it will be feasible for mission planning, target selection and the deployment of lethal force to be delegated entirely to autonomous weapon systems in air, land and sea. The Pentagon expects AI threat assessments for these autonomous operations to be derived from massive data sets including blogs, websites, and multimedia posts on social media platforms like Twitter, Facebook and Instagram.

The raft of Pentagon documentation flatly contradicts Deputy Defense Secretary Robert Work’s denial that the DoD is planning to develop killer robots.

In a widely reported March conversation with Washington Post columnist David Ignatius, Work said that this may change as rival powers work to create such technologies:

“We might be going up against a competitor that is more willing to delegate authority to machines than we are, and as that competition unfolds we will have to make decisions on how we best can compete.”

But, he insisted, “We will not delegate lethal authority to a machine to make a decision,” except for “cyber or electronic warfare.”

He lied.

Official US defence and NATO documents dissected by INSURGE intelligence reveal that Western governments are already planning to develop autonomous weapons systems with the capacity to make decisions on lethal force — and that such systems, in the future, are even expected to make decisions on acceptable levels of “collateral damage.”

Behind public talks, a secret arms race

Efforts to create autonomous robot killers have evolved over the last decade, but have come to a head this year.

A National Defense Industry Association (NDIA) conference on Ground Robotics Capabilities in March hosted government officials and industry leaders confirming that the Pentagon was developing robot teams that would be able to use lethal force without direction from human operators.

In April, government representatives and international NGOs convened at the United Nations in Geneva to discuss the legal and ethical issues surrounding lethal autonomous weapon systems (LAWS).

That month, the UK government launched a parliamentary inquiry into robotics and AI. And earlier in May, the White House Office of Science and Technology announced a series of public workshops on the wide-ranging social and economic implications of AI.

Prototype Terminator Bots?

Most media outlets have reported the fact that so far, governments have not ruled out the long-term possibility that intelligent robots could be eventually authorized to make decisions to kill human targets autonomously.

But contrary to Robert Work’s claim, active research and development efforts to explore this possibility are already underway. The plans can be gleaned from several unclassified Pentagon documents in the public record that have gone unnoticed, until now.

Among them is a document released in February 2016 from the Pentagon’s Human Systems Community of Interest (HSCOI).

The document shows not only that the Pentagon is actively creating lethal autonomous weapon systems, but that a crucial component of the decision-making process for such robotic systems will include complex Big Data models, one of whose inputs will be public social media posts.

Robots that kill ‘like people’

The HSCOI is a little-known multi-agency research and development network seeded by the Office of the Secretary of Defense (OSD), which acts as a central hub for a huge plethora of science and technology work across US military and intelligence agencies.

The document is a 53-page presentation prepared by HSCOI chair, Dr. John Tangney, who is Director of the Office of Naval Research’s Human and Bioengineered Systems Division. Titled Human Systems Roadmap Review, the slides were presented at the NDIA’s Human Systems Conference in February.

The document says that one of the five “building blocks” of the Human Systems program is to “Network-enable, autonomous weapons hardened to operate in a future Cyber/EW [electronic warfare] Environment.” This would allow for “cooperative weapon concepts in communications-denied environments.”

But then the document goes further, identifying a “focus areas” for science and technology development as “Autonomous Weapons: Systems that can take action, when needed”, along with “Architectures for Autonomous Agents and Synthetic Teammates.”

The final objective is the establishment of “autonomous control of multiple unmanned systems for military operations.”

Such autonomous systems must be capable of selecting and engaging targets by themselves — with human “control” drastically minimized to affirming that the operation remains within the parameters of the Commander’s “intent.”

The document explicitly asserts that these new autonomous weapon systems should be able to respond to threats without human involvement, but in a way that simulates human behavior and cognition.

The DoD’s HSCOI program must “bridge the gap between high fidelity simulations of human cognition in laboratory tasks and complex, dynamic environments.”

Referring to the “Mechanisms of Cognitive Processing” of autonomous systems, the document highlights the need for:

“More robust, valid, and integrated mechanisms that enable constructive agents that truly think and act like people.”

The Pentagon’s ultimate goal is to develop “Autonomous control of multiple weapon systems with fewer personnel” as a “force multiplier.”

The new systems must display “highly reliable autonomous cooperative behavior” to allow “agile and robust mission effectiveness across a wide range of situations, and with the many ambiguities associated with the ‘fog of war.’”

Resurrecting the human terrain

The HSCOI consists of senior officials from the US Army, Navy, Marine Corps, Air Force, Defense Advanced Research Projects Agency (DARPA); and is overseen by the Assistant Secretary of Defense for Research & Engineering and the Assistant Secretary of Defense for Health Affairs.

HSCOI’s work goes well beyond simply creating autonomous weapons systems. An integral part of this is simultaneously advancing human-machine interfaces and predictive analytics.

The latter includes what a HSCOI brochure for the technology industry, ‘Challenges, Opportunities and Future Efforts’, describes as creating “models for socially-based threat prediction” as part of “human activity ISR.”

This is short-hand for intelligence, surveillance and reconnaissance of a population in an ‘area of interest’, by collecting and analyzing data on the behaviors, culture, social structure, networks, relationships, motivation, intent, vulnerabilities, and capabilities of a human group.

The idea, according to the brochure, is to bring together open source data from a wide spectrum, including social media sources, in a single analytical interface that can “display knowledge of beliefs, attitudes and norms that motivate in uncertain environments; use that knowledge to construct courses of action to achieve Commander’s intent and minimize unintended consequences; [and] construct models to allow accurate forecasts of predicted events.”

The Human Systems Roadmap Review document from February 2016 shows that this area of development is a legacy of the Pentagon’s controversial “human terrain” program.

The Human Terrain System (HTS) was a US Army Training and Doctrine Command (TRADOC) program established in 2006, which embedded social scientists in the field to augment counterinsurgency operations in theaters like Iraq and Afghanistan.

The idea was to use social scientists and cultural anthropologists to provide the US military actionable insight into local populations to facilitate operations — in other words, to weaponize social science.

The $725 million program was shut down in September 2014 in the wake of growing controversy over its sheer incompetence.

The HSCOI program that replaces it includes social sciences but the greater emphasis is now on combining them with predictive computational models based on Big Data. The brochure puts the projected budget for the new human systems project at $450 million.

The Pentagon’s Human Systems Roadmap Review demonstrates that far from being eliminated, the HTS paradigm has been upgraded as part of a wider multi-agency program that involves integrating Big Data analytics with human-machine interfaces, and ultimately autonomous weapon systems.

The new science of social media crystal ball gazing

The 2016 human systems roadmap explains that the Pentagon’s “vision” is to use “effective engagement with the dynamic human terrain to make better courses of action and predict human responses to our actions” based on “predictive analytics for multi-source data.”

Are those ‘soldiers’ in the photo human… or are they really humanoid (killer) robots?

In a slide entitled, ‘Exploiting Social Data, Dominating Human Terrain, Effective Engagement,’ the document provides further detail on the Pentagon’s goals:

“Effectively evaluate/engage social influence groups in the op-environment to understand and exploit support, threats, and vulnerabilities throughout the conflict space. Master the new information environment with capability to exploit new data sources rapidly.”

The Pentagon wants to draw on massive repositories of open source data that can support “predictive, autonomous analytics to forecast and mitigate human threats and events.”

This means not just developing “behavioral models that reveal sociocultural uncertainty and mission risk”, but creating “forecast models for novel threats and critical events with 48–72 hour timeframes”, and even establishing technology that will use such data to “provide real-time situation awareness.”

According to the document, “full spectrum social media analysis” is to play a huge role in this modeling, to support “I/W [irregular warfare], information operations, and strategic communications.”

This is broken down further into three core areas:

“Media predictive analytics; Content-based text and video retrieval; Social media exploitation for intel.”

The document refers to the use of social media data to forecast future threats and, on this basis, automatically develop recommendations for a “course of action” (CoA).

Under the title ‘Weak Signal Analysis & Social Network Analysis for Threat Forecasting’, the Pentagon highlights the need to:

“Develop real-time understanding of uncertain context with low-cost tools that are easy to train, reduce analyst workload, and inform COA [course of action] selection/analysis.”

In other words, the human input into the development of course of action “selection/analysis” must be increasingly reduced, and replaced with automated predictive analytical models that draw extensively on social media data.

This can even be used to inform soldiers of real-time threats using augmented reality during operations. The document refers to “Social Media Fusion to alert tactical edge Soldiers” and “Person of Interest recognition and associated relations.”

The idea is to identify potential targets — ‘persons of interest’ — and their networks, in real-time, using social media data as ‘intelligence.’

Meaningful human control without humans

Both the US and British governments are therefore rapidly attempting to redefine “human control” and “human intent” in the context of autonomous systems.

Among the problems that emerged at the UN meetings in April is the tendency to dilute the parameters that would allow describing an autonomous weapon system as being tied to “meaningful” human control.

A separate Pentagon document dated March 2016 — a set of presentation slides for that month’s IEEE Conference on Cognitive Methods in Situation Awareness & Decision Support — insists that DoD policy is to ensure that autonomous systems ultimately operate under human supervision:

“[The] main benefits of autonomous capabilities are to extend and complement human performance, not necessarily provide a direct replacement of humans.”

Unfortunately, there is a ‘but’.

The March document, Autonomous Horizons: System Autonomy in the Air Force, was authored by Dr. Greg Zacharias, Chief Scientist of the US Air Force. The IEEE conference where it was presented was sponsored by two leading government defense contractors, Lockheed Martin and United Technologies Corporation, among other patrons.

Further passages of the document are revealing:

“Autonomous decisions can lead to high-regret actions, especially in uncertain environments.”

In particular, the document observes:

“Some DoD activity, such as force application, will occur in complex, unpredictable, and contested environments. Risk is high.”

The solution, supposedly, is to design machines that basically think, learn and problem solve like humans. An autonomous AI system should “be congruent with the way humans parse the problem” and driven by “aiding/automation knowledge management processes along lines of the way humans solve problem [sic].”

A section titled ‘AFRL [Air Force Research Laboratory] Roadmap for Autonomy’ thus demonstrates how by 2020, the US Air Force envisages “Machine-Assisted Ops compressing the kill chain.” The bottom of the slide reads:

“Decisions at the Speed of Computing.”

This two-staged “kill chain” is broken down as follows: firstly, “Defensive system mgr [manager] IDs threats & recommends actions”; secondly, “Intelligence analytic system fuses INT [intelligence] data & cues analyst of threats.”

In this structure, a lethal autonomous weapon system draws on intelligence data to identify a threat, which an analyst simply “IDs”, before recommending “action.”

The analyst’s role here is simply to authorize the kill, but in reality the essential importance of human control — assessment of the integrity of the kill decision — has been relegated to the end of an entirely automated analytical process, as a mere perfunctionary obligation.

By 2030, the document sees human involvement in this process as being reduced even further to an absolute minimum. While a human operator may be kept “in the loop” (in the document’s words) the Pentagon looks forward to a fully autonomous system consisting of:

“Optimized platform operations delivering integrated ISR [intelligence, surveillance and reconnaissance] and weapon effects.”

The goal, in other words, is a single integrated lethal autonomous weapon system combining full spectrum analysis of all data sources with “weapon effects” — that is, target selection and execution.

The document goes to pains to layer this vision with a sense of human oversight being ever-present.

AI “system self-awareness”

Yet an even more blunt assertion of the Pentagon’s objective is laid out in a third document, a set of slides titled DoD Autonomy Roadmap presented exactly a year earlier at the NDIA’s Defense Tech Expo.

The document authored by Dr. Jon Bornstein, who leads the DoD’s Autonomy Community of Interest (ACOI), begins by framing its contents with the caveat: “Neither Warfighter nor machine is truly autonomous.”

Yet it goes on to call for machine agents to develop:

“Perception, reasoning, and intelligence allow[ing] for entities to have existence, intent, relationships, and understanding in the battle space relative to a mission.”

This will be the foundation for two types of weapon systems: “Human/ Autonomous System Interaction and Collaboration (HASIC)” and “Scalable Teaming of Autonomous Systems (STAS).”

In the near term, machine agents will be able “to evolve behaviors over time based on a complex and ever-changing knowledge base of the battle space… in the context of mission, background knowledge, intent, and sensor information.”

However, it is the Pentagon’s “far term” vision for machine agents as “self-aware” systems that is particularly disturbing:

“Far Term:

•Ontologies adjusted through common-sense knowledge via intuition.

•Learning approaches based on self-exploration and social interactions.

•Shared cognition

•Behavioral stability through self-modification.

•System self-awareness”

It is in this context of the “self-awareness” of an autonomous weapon system that the document clarifies the need for the system to autonomously develop forward decisions for action, namely:

“Autonomous systems that appropriately use internal model-based/deliberative planning approaches and sensing/perception driven actions/control.”

The Pentagon specifically hopes to create what it calls “trusted autonomous systems”, that is, machine agents whose behavior and reasoning can be fully understood, and therefore “trusted” by humans:

“Collaboration means there must be an understanding of and confidence in behaviors and decision making across a range of conditions. Agent transparency enables the human to understand what the agent is doing and why.”

Once again, this is to facilitate a process by which humans are increasingly removed from the nitty gritty of operations.

In the “Mid Term”, there will be “Improved methods for sharing of authority” between humans and machines. In the “Far Term”, this will have evolved to a machine system functioning autonomously on the basis of “Awareness of ‘commanders intent’” and the “use of indirect feedback mechanisms.”

This will finally create the capacity to deploy “Scalable Teaming of Autonomous Systems (STAS)”, free of overt human direction, in which multiple machine agents display “shared perception, intent and execution.”

Teams of autonomous weapon systems will display “Robust self-organization, adaptation, and collaboration”; “Dynamic adaption, ability to self-organize and dynamically restructure”; and “Agent-to-agent collaboration.”

Notice the lack of human collaboration.

The “far term” vision for such “self-aware” autonomous weapon systems is not, as Robert Work claimed, limited to cyber or electronic warfare, but will include:

“Ground Convoys/Air-ground operations”; “Ballistic rate multi-agent operation”; “Smart munitions.”

These operations might even take place in tight urban environments — “in close proximity to other manned & unmanned systems including crowded military & civilian areas.”

The document admits, though, that the Pentagon’s major challenge is to mitigate against unpredictable environments and emergent behavior.

Autonomous systems are “difficult to assure correct behavior in a countless number of environmental conditions” and are “difficult to sufficiently capture and understand all intended and unintended consequences.”

Terminator teams, led by humans

The Autonomy roadmap document clearly confirms that the Pentagon’s final objective is to delegate the bulk of military operations to autonomous machines, capable of inflicting “Collective Defeat of Hard and Deeply Buried Targets.”

One type of machine agent is the “Autonomous Squad Member (Army)”, which “Integrates machine semantic understanding, reasoning, and perception into a ground robotic system”, and displays:

“Early implementation of a goal reasoning model, Goal-Directed Autonomy (GDA) to provide the robot the ability to self-select new goals when it encounters an unanticipated situation.”

Human team members in the squad must be able “to understand an intelligent agent’s intent, performance, future plans and reasoning processes.”

Another type is described under the header, ‘Autonomy for Air Combat Missions Team (AF).’

Such an autonomous air team, the document envisages, “Develops goal-directed reasoning, machine learning and operator interaction techniques to enable management of multiple, team UAVs.” This will achieve:

“Autonomous decision and team learning enable the TBM [Tactical Battle Manager] to maximize team effectiveness and survivability.”

TBM refers directly to a battle management autonomy software for unmanned aircraft.

The Pentagon still, of course, wants to ensure that there remains a human manual override, which the document describes as enabling a human supervisor “to ‘call a play’ or manually control the system.”

Targeting evil antiwar bloggers

Yet the biggest challenge, nowhere acknowledged in any of the documents, is ensuring that automated AI target selection actually selects real threats, rather than generating or pursuing false positives.

According to the Human Systems roadmap document, the Pentagon has already demonstrated extensive AI analytical capabilities in real-time social media analysis, through a NATO live exercise last year.

During the exercise, Trident Juncture — NATO’s largest exercise in a decade — US military personnel “curated over 2M [million] relevant tweets, including information attacks (trolling) and other conflicts in the information space, including 6 months of baseline analysis.” They also “curated and analyzed over 20K [i.e. 20,000] tweets and 700 Instagrams during the exercise.”

The Pentagon document thus emphasizes that the US Army and Navy can now already “provide real-time situation awareness and automated analytics of social media sources with low manning, at affordable cost”, so that military leaders can “rapidly see whole patterns of data flow and critical pieces of data” and therefore “discern actionable information readily.”

The primary contributor to the Trident Juncture social media analysis for NATO, which occurred over two weeks from late October to early November 2015, was a team led by information scientist Professor Nitin Agarwal of the University of Arkansas, Little Rock.

Agarwal’s project was funded by the US Office of Naval Research, Air Force Research Laboratory and Army Research Office, and conducted in collaboration with NATO’s Allied Joint Force Command and NATO Strategic Communications Center of Excellence.

Slides from a conference presentation about the research show that the NATO-backed project attempted to identify a hostile blog network during the exercise containing “anti-NATO and anti-US propaganda.”

Among the top seven blogs identified as key nodes for anti-NATO internet traffic were websites run by Andreas Speck, an antiwar activist; War Resisters International (WRI); and Egyptian democracy campaigner Maikel Nabil Sanad — along with some Spanish language anti-militarism sites.

Andreas Speck is a former staffer at WRI, which is an international network of pacifist NGOs with offices and members in the UK, Western Europe and the US. One of its funders is the Joseph Rowntree Charitable Trust.

The WRI is fundamentally committed to nonviolence, and campaigns against war and militarism in all forms.

Most of the blogs identified by Agarwal’s NATO project are affiliated to the WRI, including for instance nomilservice.com, WRI’s Egyptian affiliate founded by Maikel Nabil, which campaigns against compulsory military service in Egypt. Nabil was nominated for the Nobel Peace Prize and even supported by the White House for his conscientious objection to Egyptian military atrocities.

The NATO project urges:

“These 7 blogs need to be further monitored.”

The project was touted by Agarwal as a great success: it managed to extract 635 identity markers through metadata from the blog network, including 65 email addresses, 3 “persons”, and 67 phone numbers.

This is the same sort of metadata that is routinely used to help identify human targets for drone strikes — the vast majority of whom are not terrorists, but civilians.

Agarwal’s conference slides list three Pentagon-funded tools that his team created for this sort of social media analysis: Blogtracker, Scraawl, and Focal Structures Analysis.

Flagging up an Egyptian democracy activist like Maikel Nabil as a hostile entity promoting anti-NATO and anti-US propaganda demonstrates that when such automated AI tools are applied to war theatres in complex environments (think Pakistan, Afghanistan and Yemen), the potential to identify individuals or groups critical of US policy as terrorism threats is all too real.

This case demonstrates how deeply flawed the Pentagon’s automation ambitions really are. Even with the final input of independent human expert analysts, entirely peaceful pro-democracy campaigners who oppose war are relegated by NATO to the status of potential national security threats requiring further surveillance.

Compressing the kill chain

It’s often assumed that DoD Directive 3000.09 issued in 2012, ‘Autonomy in Weapon Systems’, limits kill decisions to human operators under the following stipulation in clause 4:

“Autonomous and semi-autonomous weapon systems shall be designed to allow commanders and operators to exercise appropriate levels of human judgment over the use of force.”

After several paragraphs underscoring the necessity of target selection and execution being undertaken under the oversight of a human operator, the Directive goes on to open up the possibility of developing autonomous weapon systems without any human oversight, albeit with the specific approval of senior Pentagon officials:

“Autonomous weapon systems may be used to apply non-lethal, non-kinetic force, such as some forms of electronic attack, against materiel targets… Autonomous or semi-autonomous weapon systems intended to be used in a manner that falls outside the policies in subparagraphs 4.c.(1) through 4.c.(3) must be approved by the Under Secretary of Defense for Policy (USD(P)); the Under Secretary of Defense for Acquisition, Technology, and Logistics (USD(AT&L)); and the CJCS before formal development and again before fielding.”

Rather than prohibiting the development of lethal autonomous weapon systems, the directive simply consolidates all such developments under the explicit authorization of the Pentagon’s top technology chiefs.

Worse, the directive expires on 21st November 2022 — which is around the time such technology is expected to become operational.

Indeed, later that year, Lieutenant Colonel Jeffrey S. Thurnher, a US Army lawyer at the US Naval War College’s International Law Department, published a position paper in the National Defense University publication, Joint Force Quarterly.

If these puppies became self-aware, would they be cuter?

He recommended that there were no substantive legal or ethical obstacles to developing fully autonomous killer robots — as long as such systems are designed in such a way as to maintain a semblance of human oversight through “appropriate control measures.”

In the conclusions to his paper, titled No One At The Controls: Legal Implications of Fully Autonomous Targeting, Thurnher wrote:

“LARs [lethal autonomous robots] have the unique potential to operate at a tempo faster than humans can possibly achieve and to lethally strike even when communications links have been severed. Autonomous targeting technology will likely proliferate to nations and groups around the world. To prevent being surpassed by rivals, the United States should fully commit itself to harnessing the potential of fully autonomous targeting. The feared legal concerns do not appear to be an impediment to the development or deployment of LARs. Thus, operational commanders should take the lead in making this emerging technology a true force multiplier for the joint force.”

Lt. Col. Thurnher went on to become a Legal Advisor for NATO Rapid Deployable Corps in Munster, Germany. In this capacity, he was a contributor to a little-known 2014 official policy guidance document for NATO Allied Command Transformation, Autonomy in Defence Systems.

The NATO document, which aims to provide expert legal advice to government policymakers, sets out a position in which the deployment of autonomous weapon systems for lethal combat — in particular the delegation of targeting and kill decisions to machine agents — is viewed as being perfectly legitimate in principle.

It is the responsibility of specific states, the document concludes, to ensure that autonomous systems operate in compliance with international law in practice — a caveat that also applies for the use of autonomous systems for law-enforcement and self-defence.

In the future, though, the NATO document points to the development of autonomous systems that can “reliably determine when foreseen but unintentional harm to civilians is ethically permissible.”

Acknowledging that currently only humans are able to make a “judgement about the ethical permissibility of foreseen but unintentional harm to civilians (collateral damage)”, the NATO policy document urges states developing autonomous weapon systems to ensure that eventually they “are able to integrate with collateral damage estimation methodologies” so as to delegate targeting and kill decisions accordingly.

The NATO position is particularly extraordinary given that international law — such as the Geneva Conventions — defines foreseen deaths of civilians caused by a military action as intentional, precisely because they were foreseen yet actioned anyway.

The Statute of the International Criminal Court (ICC) identifies such actions as “war crimes”, if a justifiable and direct military advantage cannot be demonstrated:

“… making the civilian population or individual civilians, not taking a direct part in hostilities, the object of attack; launching an attack in the knowledge that such attack will cause incidental loss of civilian life, injury to civilians or damage to civilian objects which would be clearly excessive in relation to the concrete and direct military advantage anticipated;… making civilian objects, that is, objects that are not military objectives, the object of attack.”

And customary international law recognizes the following acts as war crimes:

“… launching an indiscriminate attack resulting in loss of life or injury to civilians or damage to civilian objects; launching an attack against works or installations containing dangerous forces in the knowledge that such attack will cause excessive incidental loss of civilian life, injury to civilians or damage to civilian objects.”

In other words, NATO’s official policy guidance on autonomous weapon systems sanitizes the potential for automated war crimes. The document actually encourages states to eventually develop autonomous weapons capable of inflicting “foreseen but unintentional” harm to civilians in the name of securing a ‘legitimate’ military advantage.

Yet the NATO document does not stop there. It even goes so far as to argue that policymakers considering the development of autonomous weapon systems for lethal combat should reflect on the possibility that delegating target and kill decisions to machine agents would minimize civilian casualties.

Skynet, anyone?

A new report by Paul Scharre, who led the Pentagon working group that drafted DoD Directive 3000.09 and now heads up the future warfare program at the Center for New American Security in Washington DC, does not mince words about the potentially “catastrophic” risks of relying on autonomous weapon systems.

“With an autonomous weapon,” he writes, “the damage potential before a human controller is able to intervene could be far greater…

“In the most extreme case, an autonomous weapon could continue engaging inappropriate targets until it exhausts its magazine, potentially over a wide area. If the failure mode is replicated in other autonomous weapons of the same type, a military could face the disturbing prospect of large numbers of autonomous weapons failing simultaneously, with potentially catastrophic consequences.”

Scharre points out that “autonomous weapons pose a novel risk of mass fratricide, with large numbers of weapons turning on friendly forces,” due to any number of potential reasons, including “hacking, enemy behavioral manipulation, unexpected interactions with the environment, or simple malfunctions or software errors.”

Noting that in the software industry, for every 1,000 lines of code, there are between 15 and 50 errors, Scharre points out that such marginal, routine errors could easily accumulate to create unexpected results that could be missed even by the most stringent testing and validation methods.

The more complex the system, the more difficult it will be to verify and track the system’s behavior under all possible conditions: “… the number of potential interactions within the system and with its environment is simply too large.”

The documents discussed here show that the Pentagon is going to pains to develop ways to mitigate these risks.

But as Scharre concludes, “these risks cannot be eliminated entirely. Complex tightly coupled systems are inherently vulnerable to ‘normal accidents.’ The risk of accidents can be reduced, but never can be entirely eliminated.”

As the trajectory toward AI autonomy and complexity accelerates, so does the risk that autonomous weapon systems will, eventually, wreak havoc.

Dr Nafeez Ahmed is an investigative journalist, bestselling author and international security scholar. A former Guardian writer, he writes the ‘System Shift’ column for VICE’s Motherboard, and is a weekly columnist for Middle East Eye.

He is the winner of a 2015 Project Censored Award for Outstanding Investigative Journalism for his Guardian work, and was twice selected in the Evening Standard’s top 1,000 most globally influential Londoners, in 2014 and 2015.

Nafeez has also written and reported for The Independent, Sydney Morning Herald, The Age, The Scotsman, Foreign Policy, The Atlantic, Quartz, Prospect, New Statesman, Le Monde diplomatique, New Internationalist, The Ecologist, Alternet, Counterpunch, Truthout, among others.

He is a Visiting Research Fellow at the Faculty of Science and Technology at Anglia Ruskin University, where he is researching the link between global systemic crises and civil unrest for Springer Energy Briefs.

Nafeez is the author of A User’s Guide to the Crisis of Civilization: And How to Save It (2010), and the scifi thriller novel ZERO POINT, among other books. His work on the root causes and covert operations linked to international terrorism officially contributed to the 9/11 Commission and the 7/7 Coroner’s Inquest.


This story is being released for free in the public interest, and was enabled by crowdfunding. I’d like to thank my amazing community of patrons for their support, which gave me the opportunity to work on this story. Please support independent, investigative journalism for the global commons via Patreon.com, where you can donate as much or as little as you like.

 

The Pentagon is building a ‘self-aware’ killer robot army fueled by social media — INSURGE intelligence — Medium.

Transforming Our Communities Ourselves With Technology

microfactoryBy Brian Berletic

Many people may mistakenly believe that the future is something that others, like big companies or governments usher in and that they themselves play either a minor active role, or one that is entirely passive. In reality, there are already groups of regular people just like you or me around the world literally building the future of their communities themselves with their own two hands and in collaboration with their friends, family, neighbors, and through the power of the Internet, with like-minded individuals around the world.

Above image: Instead of some planned community built by government or developers, we can add a layer of opensource technology over our existing communities, on our rooftops, in our offices, and at existing public spaces or markets. In addition to this added layer of physical technology, a little change in our mindset will go a long way in transforming our communities.

Because of the exponential progress of technology, the impact of small, organized projects is increasing as well. Think about 3D printing and how for many years it remained firmly in the realm of large businesses for use in prototyping. It was only when small groups of enthusiastic hobbyists around the world began working on cheaper and more accessible versions of these machines that they ended up on the desktops of regular people around the world, changing the way we look at manufacturing.

Similar advances in energy production, biotechnology, agriculture, IT, and manufacturing technology are likewise empowering people on a very distributed and local level.

What we see emerging is a collection of local “institutions” giving people direct access to the means to change their communities for the better, bypassing more abstract and less efficient means of effecting change like voting or protesting.

Political processes, however, will become more relevant and practical when people actually have resources and direct hands-on experience in the matters of running their communities. Demanding more of those that represent you will have more meaning when those demands are coupled with practical solutions and enumerated plans of action.

asset3D printing has come a long way since the first RepRap desktop printers and their derivatives which includes MakerBot’s first designs. 3D printing has gone from an obscure obsession among hobbyists to a mainstream phenomenon that is transforming the way we look at manufacturing. 

Let’s explore these “institutions” and see what is possible, what is already being done, and how you can get involved today in physically shaping your community’s future starting today.

Makerspaces

A makerspace is exactly what it sounds like: a space where you make things. However, it is often associated with computer controlled personal manufacturing technology like 3D printers, CNC mills, and laser and/or waterjet cutters. There is also a significant amount of electronic prototyping equipment on hand including opensource development boards like the Arduino, which allows virtually anyone to control physical objects in the real world.

OMG_SGA well-equipped makerspace in Singapore. 

Makerspaces also generally include a small core team with skills ranging from design and engineering to software development. These teams usually are eager to bring in new people and introduce them to the tools, techniques, and technology they are so passionate about.

Makerspaces already exist around the world and it is very likely that no matter where you live, you have one relatively nearby. Makerspaces hold workshops for both absolute beginners and experienced tech enthusiasts.

11831662_10153498305854054_7334928807928857564_nMakerspaces hold frequent workshops to share their knowledge and enthusiasm with others, often absolute beginners. There is a good chance your local makerspace has workshops available. Some are even free.

You can prototype virtually anything in a makerspace, making it the perfect place to go when you have a problem and want to develop a practical, tangible solution to solve it. Everything from an opensource solar charger to a new kind of 3D printer could be (and has been) made at a makerspace, making it the perfect nexus for our local community and the variety of other local institutions that may crop up there.

Local Agriculture

A combination of rediscovered traditional practices combined with modern technology makes local food production both practical and profitable. Community gardens are not uncommon, and there is a growing interest around the world, particularly in urban areas to utilize the sun-soaked rooftops to grow food with which to consume or distribute to local restaurants and markets.

6512514787_19c44032c3_bUS-based Growing Power proves what communities can accomplish by working together. They have proven that community urban agriculture can be both practical and profitable, with their project becoming not just a local business, but a resource for the community as well. 

The Comcrop project in Singapore provides a particularly impressive example, having been in operation for several years now, serving not only as a source of locally produced food for restaurants and grocery stores, but also as a community resources teaching all who are interested how to raise crops in a dense urban environment like that found in Singapore.

1533928_389833864495338_1822153760_nSingapore’s Comcrop project has proven that even in the densest of urban environments, agriculture can be carried out by communities for profit, fun, and education. Collaboration with local makerspaces could further enhance their operation’s efficiency.  

Another impressive example of local agriculture is US-based Growing Power where greenhouses, vermiculture, and aquaponics are all combined to generate an immense amount of food feeding into a local distribution network the project has diligently developed over the years.

Local food production and distribution is steadily expanding around the world as the concept of farmers’ markets spread and entire communities of both producers and consumers connect in a much more relevant, transparent, and beneficial manner than possible under the existing mass consumerist paradigm of big-ag and big-box stores.

Applying the resources found at a makerspace to local agriculture gives us the ability to take organic agriculture and increase its efficiency through automation. That’s the idea behind ProgressTH’s own automated agriculture project, and others like it. There is no reason why local communities cannot have locally produced organic food, and utilize technology to bring efficiency on par with that claimed by large-scale operations.

Power Production

Modern civilization does not function without electrical power, something we are reminded of every time the power goes out during a storm. Currently, most of the world’s power still comes from centralized national grids and large power plants.

3017799-poster-solarcityDropping prices and increasing capabilities is making solar power an attractive means to help decentralize and localize power production. 

However, the march forward of technology is finally making the means of producing power locally more accessible to more people around the world. An extreme example of a localized, distributed power grid can be found in the remote hills of Thailand’s Phetchaburi province where the national power grid never quite made it. A local team created a tech-center of sorts where villagers were trained in the designing and installation of solar power systems, bringing the village light and power for irrigation house-by-house. The villagers have created a sort of collaborative network where everyone helps out when expanding the network’s capabilities.

12376007_1741837166035713_3364478883118053319_nThe Pedang Project in Phetchaburi, Thailand has literally brought power to a tiny remote village isolated from the national power grid.  Now it is taking its experience and sharing it with others around the country to replicate their success.

This network also trains people from all over the country to replicate their success elsewhere, even in areas where the national grid does reach, but where independence in power production is still sought.

This includes a school halfway across the country that is entirely solar powered which has incorporated alternative energy in the curriculum giving students practical experience and skills to use once they graduate.

3609A5FD89134C30889AEFF923B80445A school in Thailand’s northeast has also become a center for alternative energy and organic agriculture, all of which is combined with more traditional curriculum. Students grow their own food and help maintain the solar power system that powers the school during studying hours. 

Imagine every community, rural or urban, developing their own alternative power solutions themselves, managing both the physical infrastructure and the knowledge required to maintain it. It doesn’t necessarily need to replace current power production, but it could augment it until technology makes it possible for complete, localized and distributed power production.

Healthcare + DIYbio

Makerspaces are already collaborating with hospitals and healthcare professionals around the world to speed up the process of developing solutions to everyday problems, or lower the costs of existing solutions that remain out of reach for many patients.

makerhealth-space-utmbThis healthcare professional is working on a prototype in a makerspace placed literally within the hospital he works at.

MIT’s MakerNurse program is one example of this. Bangkok-based QSNICH (Queen Sirikit National Institute of Child Health) is another example. Decentralizing and opening up the development of biomedical technology is key to lowering its prices. While subsidizing healthcare now is necessary to ensure people who cannot afford treatment can still get it, in the future, healthcare will be so cheap such subsidies will have less impact on the quantity and quality of care.

Biomedical technology, the hardware you see in hospitals is one thing, the actual pharmaceuticals and therapies administered to patients is another. DIYbio (do-it-yourself biology) is a growing community much like the maker movement that seeks to open up biotechnology to a wider audience by lowering the cost of equipment and opening up knowledge by making their work collaborative, transparent and, most importantly, opensource.

CAM046523D-printed prototypes developed for healthcare professionals at a Bangkok-based children’s hospital by ProgressTH’s in-house makerspace. 

And, believe it or not, cutting-edge technology like gene therapy which has actually already cured cancer in terminal leukemia patients and shown promise in clinical trials for everything from heart disease to blindness and deafness is being approached by the DIYbio community. For now, it borders between something like a community lab and a small start-up company, as is the case with Bioviva or Andrew Hessel’s Pink Army Cooperative. In the future, we can see current collaborations between makerspaces and healthcare professionals extending and evolving between biotech researchers and local community labs.

5633564fc361888e528b460eLiz Parrish of Bioviva is blurring the lines between traditional R&D and accelerated and smaller-scale progress in developing therapies for patients. 

Again, the makerspace allows for the prototyping and development of much of the opensource biotech equipment already being produced and making headlines around the world.

Microfactories

Microfactories are localized manufacturing facilities that specialize in small-run production. Say that you create a brilliant prototype at your local makerspace, but need to make only 100-200 of them at a time. Traditional factories because of current economies of scale usually will not help you, at least not for a reasonable price. Microfactories can fill the void between makerspace prototypes and mass production.

08_firstbuild-hackathon-28Microfactories already exist, but require large capital investments for the amount of machinery required to efficiently carry out small-run production. Advances in personal manufacturing will continue to lower these barriers, and many makerspaces around the world are already working to bridge the gap between prototyping and small-run production.

In the future, microfactories may evolve into an entire network of distributed manufacturing making mass production obsolete. This is, again, dependent on the progress of manufacturing technology. When computer-controlled manufacturing processes like CNC mills and 3D printers can handle more materials, faster, and more efficiently, small-run production will become more and more practical.

And already, microfactories are going from concepts to actual physical locations as is the case with the GE-backed FirstBuild microfactory in the US. In Thailand, electronics company Gravitech has created a production facility just north of Bangkok making Arduino-compatible boards for the local market cheaper and of better quality than could be imported.

aCAM04834An Arduino-compatible board made in Thailand for the Thai market beats out Chinese-made boards both in quality and even price. This is part of a trend toward the gradual reduction of manufacturing “hubs” and lead toward a more distributed and local means of manufacturing.

This is just the leading edge of a shifting paradigm toward fully distributed manufacturing. Again, makerspaces will play a crucial role, providing educational and training resources for the local community to learn how to design and develop ideas into prototypes and then pass them on to local microfactories for production and distribution.

microfactory-typeLocal Motors is pioneering the concept of distributed car manufacturing. Microfactories in the future may make everything from handheld devices to something as big as a car, on demand or in small runs that will challenge or entirely shift our current globalized manufacturing paradigm. 

Just how far could this go? Looking at US-based Local Motors, who is attempting to create (which much success) a distributed auto-manufacturing network, it can probably end up encompassing nearly everything we use on a daily basis short of aerospace and architecture. With 3D-printed buildings cropping up around the world, each community might have their own cooperative-owned system for that as well.

Other Possibilities

Maybe now you can see how communities possessing these key institutions could begin to tackle their problems head on, practically, with tangible solutions instead of waiting for others, far away, to address them for them. By doing so, people will become more directly involved in their own destiny, possessing both skills and experience in running and improving their communities, giving them better insight and discretion when engaging in political processes beyond their community.

And because of the talent that is attracted to and produced within makerspaces, the means of creating, for example, parallel mesh communication networks or water production and distribution systems, could exist as well. Virtually everything in one’s community could end up a product of local talent, entrepreneurial vision, and innovation.

But it is important to remind potential critics that this is not a process toward tens of thousands of isolated communities scattered across the planet. Like makerspaces today, while each one possesses its own tools and talent, they are all connected and collaborating together with other spaces around the world taking and adapting great ideas when needed, while sharing their own success with others through an opensource culture.

The distributed nature of these economic, manufacturing, healthcare, agricultural, and infrastructure networks also means more resilience, especially because they are collaborative on a much larger scale. There is no single power plant or agricultural region to “wipe out” to plunge a huge population dependent on either into crisis. Disasters and crises can be absorbed and compensated for by neighboring communities unaffected. The loss of power in one community will not affect another if both are self-sufficient in power production. However, temporary assistance would be possible for one community to lend another.

“Standards,” if you will, would still exist, honed not through legality and policy, but through actual performance data, user feedback, and reputation. And because this process by its very nature is a flexible one, unforeseen opportunities and threats could be capitalized on or met as needed.

How Can You Get Involved Today?

Yes, you can get involved today! All you have to do is find your closest makerspace (or here) and drop by to check it out. You can also begin teaching yourself by taking advantage of the huge amount of fully free resources online covering everything from the basics of 3D printing, to opensource electronics, to local organic agriculture, to DIYbio. Let your favorite Internet search engine be your guide and find the resources you find most useful to your own style of learning. On YouTube alone, by simply typing any area of interest in, you can usually find dozens of tutorials and presentations.

uB8qp72A makerspace in Chiang Mai, Thailand. Just a few years ago, there were no makerspaces at all in Thailand, now there are clubs and spaces from north to south and a growing community connected through collaboration and enthusiasm about the power of hands-on innovations and solutions.

Get your friends involved; and if none are interested, it is easy to make new friends who are interested in this shifting paradigm, since “collaboration” is in fact at the very heart of it. If you are in Bangkok, feel free to contact us for workshops that ProgressTH and its many friends have on offer, some of which are even free.

The most important thing to remember is, no matter how small your progress is day to day, it will all add up in a year’s time to something that will surely surprise you. The only sure way to fail is by doing nothing — after all, zero times all the days in the year still only equals zero. You do not need to be a trained engineer or professional designer, biologist, or experienced farmer to begin building up your local community. Many of the most prominent names contributing to this current paradigm are college dropouts, or entirely self-taught. You will surely run into professionals, however, and you will learn a lot from them.

It is a truly exciting journey, and one that will have direct benefit to both yourself and your community. You can do it part-time in addition to your existing job. And many have ended up making a living full-time by contributing. We have, and will continue covering this unfolding movement, and we would love to cover your contributions… so start contributing!

Brian Berletic writes for Progress Thailand. Follow ProgressTH.org on Facebook here or on Twitter here.

Transforming Our Communities Ourselves With Technology.

German Supermarket Chain Bans Bee-Killing Neonic Pesticides on Produce

pesticides-aldi-sud-image-735-350

The New Year starts with more positive news. Aldi Süd, a German supermarket chain with stores in the U.S., has become the first major European retailer to ban pesticides toxic to bees, including the neonicotinoids imidacloprid, clothianidin, and thiamethoxam, from all produce sold in their stores. [1]

The announcement was made January 1st, with the retailer expecting fruit and vegetable suppliers for their stores to comply with their new policy ASAP. The following pesticides will no longer be tolerated:

  • Thiamethoxam
  • Chlorpyrifos
  • Clothianidin
  • Cypermethrin
  • Deltamethrin
  • Fipronil
  • Imidacloprid
  • Sulfoxaflor

The decision to ban bee-toxic pesticides comes following public pressure, and follows another German retailer’s decision to ban the herbicide chemical glyphosate – another toxic compound that is fueling numerous problems.

According to a press release from Greenpeace, the chemicals are used on various commodities in Europe:

  • Thiamethoxam – applied to lettuce and endive
  • Chlorpyrifos, clothianidin – applied to kohlrabi, herbs, Brussels sprouts, head cabbage, cauliflower, and kale
  • Cypermethrin – applied to leek, head cabbage, and leguminous vegetables
  • Deltamethrin – applied to cauliflower, peppers, eggplant, zucchini, cucumber, pea, head cabbage, tomato, and lettuce
  • Imidacloprid – applied to apples, peaches, apricots, and lettuce
  • Sulfoxaflor was recently granted regulatory approval in Europe, despite calls and legal action to prohibit its registration [2]

The UK’s largest garden retailers, including Homebase, B&Q, and Wickes have already voluntarily stopped selling neonicotinoids.

These pesticides have proven to cause problems for bee reproduction, navigation, and foraging, as well as the suppression of bee immune systems. Just this month, the U.S. Environmental Protection Agency (EPA) released its preliminary pollinator assessment for the neonic imidacloprid which finds various residues of the chemical in crops where the pollinators forage, and confirms bees’ widespread and sustained exposure to the highly toxic and persistent chemical through poisoned pollen and nectar.

Sadly, requests for our government agencies to ban these pesticides have been ignored.

Thanks Aldi, for doing the right thing and protecting the bees!

by Christina Sarich

 

Sources:

[1] BeyondPesticides

[2] BeyondPesticides/resources/pesticide-gateway?

Image used from: Spiegel.de

 

Source : Natural Society.

China Just Launched the Most Frightening Game Ever — and Soon It Will Be Mandatory

(ANTIMEDIA) Oceania, China — As if further proof were needed Orwell’s dystopia is now upon us, China has now gamified obedience to the State. Though that is every bit as creepily terrifying as it sounds, citizens may still choose whether or not they wish to opt-in — that is, until the program becomes compulsory in 2020. “Going under the innocuous name of ‘Sesame Credit,’ China has created a score for how good a citizen you are,” explains Extra Credits’ video about the program. “The owners of China’s largest social networks have partnered with the government to create something akin to the U.S. credit score — but, instead of measuring how regularly you pay your bills, it measures how obediently you follow the party line.

In the works for years, China’s ‘social credit system’ aims to create a docile, compliant citizenry who are fiscally and morally responsible by employing a game-like format to create self-imposed, group social control. In other words, China gamified peer pressure to control its citizenry; and, though the scheme hasn’t been fully implemented yet, it’s already working — insidiously well.

Zheping Huang, a reporter for Quartz, chronicled his own experience with the social control tool in October, saying that “in the past few weeks I began to notice a mysterious new trend. Numbers were popping up on my social media feeds as my friends and strangers on Weibo [the Chinese equivalent to Twitter] and WeChat began to share their ‘Sesame Credit scores.’ The score is created by Ant Financial, an Alibaba-affiliated company that also runs Alipay, China’s popular third-party payment app with over 350 million users. Ant Financial claims that it evaluates one’s purchasing and spending habits in order to derive a figure that shows how creditworthy someone is.”

However, according to a translation of the “Planning Outline for the Construction of a Social Credit System,” posted online by Oxford University’s China expert, Rogier Creemers, it’s nightmarishly clear the program is far more than just a credit-tracking method. As he described it, “The government wants to build a platform that leverages things like big data, mobile internet, and cloud computing to measure and evaluate different levels of people’s lives in order to create a gamified nudging for people to behave better.”

While Sesame Credit’s roll-out in January has been downplayed by many, the American Civil Liberties Union, among others, urges caution, saying:

“The system is run by two companies, Alibaba and Tencent, which run all the social networks in China and therefore have access to a vast amount of data about people’s social ties and activities and what they say. In addition to measuring your ability to pay, as in the United States, the scores serve as a measure of political compliance. Among the things that will hurt a citizen’s score are posting political opinions without prior permission, or posting information that the regime does not like, such as about the Tiananmen Square massacre that the government carried out to hold on to power, or the Shanghai stock market collapse. It will hurt your score not only if you do these things, but if any of your friends do them.” And, in what appears likely the goal of the entire program, added, “Imagine the social pressure against disobedience or dissent that this will create.”

Social pressure, of course, can be highly effective given the right circumstances. China seems to have found exactly that in the intricate linking of people’s scores to their contacts, which can be seen publicly by anyone — and then upping the ante through score-based incentives and rewards. Rick Falkvinge pointed out a startling comparison:

The KGB and the Stasi’s method of preventing dissent from taking hold was to plant so-called agents provocateurs in the general population, people who tried to make people agree with dissent, but who actually were arresting them as soon as they agreed with such dissent. As a result, nobody would dare agree that the government did anything bad, and this was very effective in preventing any large-scale resistance from taking hold. The Chinese way here is much more subtle, but probably more effective still.”

As Creemers described to Dutch news outlet, de Volkskrant, “With the help of the latest internet technologies, the government wants to exercise individual surveillance. The Chinese aim […] is clearly an attempt to create a new citizen.”

Chinese internet specialist at the Swedish Institute of International Affairs, Johan Lagerkvist, said the system is“very ambitious in scope, including scrutinizing individual behavior and what books people read. It’s Amazon’s consumer tracking with an Orwellian political twist.”

James Corbett has been tracking the implementation of Sesame Credit for some time. Introducing the ubiquitous tracking system for a recent episode of the Corbett Report, he mused:

“Coming soon to a New World Order near you: social credit! Earn points by behaving like the government wants you to behave! Get penalized if you don’t act like a doubleplusgood citizen! What could be more fun?”

Indeed, because mandatory enrollment in Sesame Credit is still a few years away, its true effectiveness won’t be measurable for some time. But even a reporter’s usual wariness appears knocked off-kilter, as Zheping Huang summarized his personal experience: “Even if my crappy credit score doesn’t mean much now, it’s in my best interest I suppose to make sure it doesn’t go too low.”

And that, of course, is precisely why gamifying State obedience is so terrifying.

Claire Bernish


 

This article (China Just Launched the Most Frightening Game Ever — and Soon It Will Be Mandatory) is free and open source. You have permission to republish this article under a Creative Commons license with attribution to Claire Bernish and theAntiMedia.org. Anti-Media Radio airs weeknights at 11pm Eastern/8pm Pacific. If you spot a typo, email edits@theantimedia.org.

 

Source : The Anti Media

« Older Entries