Category Archives: Science

Assange is Kill?

NEW INFORMATION BEEN ADDED. MORE SOURCES TO FOLLOW.

 

ALL THAT IS NEEDED TO DISPROVE THIS THEORY IS A SINGLE APPEARANCE FROM ASSANGE IN THE ECUADORIAN EMBASSY!

 

 

http://imgur.com/a/9Jmd5

 

http://archive.is/heCYT

 

IMAGES RELATED

 

 

CURRENTLY NO PROOF HE IS IN THE EMBASSY IN THE UK

 

SWEDISH PROSECUTOR AND HIS OWN LAWYER WEREN’T ALLOWED TO SEE HIM. COMMUNICATION THROUGH AMBASSADOR.

 

 

Posts off 4chan related to this

 

= =

 

Assange and the entire Wikileaks staff has been missing since Oct 15. 3 of his attorneys are dead along with the director of Wikileaks who died on Oct 22. The deadman switch seems to have gone off on Oct 21st (during the DDoS) and again a couple of times after (check dates of big DDoS attacks against the site and when it’s down). It seems like 1. Wikileaks is compromised 2. the keys to unlock some of the insurance files have been released and 3. they are trying very hard to stop people from finding them.

 

 

Anon has been working on this nonstop since Oct 15. All threads get slid or deleted and the people making progress go silent. As soon as they found relevant messages encoded in the blockchain, the mempool was flooded, incredibly high transaction fees started showing up and a high number of transactions with encoded disinformation were made. If you look at the deleted threads and the information posted on onion links, it looks like anon was able to unlock some of the files on Oct 27 and that more files are being secretly encoded into the blockchain and the new file directory on the Wikileaks site (the last change was last night). If you want to see anon’s work, google ’09-Nov-438498967 06:00′ or look for insurance/DMS threads on onion chans then look at the dates below.

 

If you are skeptical, download the latest insurance files posted: https://twitter.com/wikileaks/status/796085225394536448

 

Run ‘scripts file | head -c 18′ and you will see that the files were not salted. All previously published insurance files have been salted.

 

Do ‘gpg –verify’ and you will see that the gpg signature is invalid.

 

= =

 

 

–SUMMARY– (Detailed timeline with sources listed after this summary)

 

Apr 16: John Jones QC, Assange’s U.N. Lawyer dies jumping in front of a train.

 

May 11: Michael Ratner, WikiLeaks’ chief counsel, dies of cancer.

 

Jul 10: Seth Rich, DNC staffer who supposedly leaked DNC documents to Wikileaks, is shot in the back and dies. Nothing is stolen from his body.

 

Aug 5: Edward Snowden (source of leaks on surveillance by the NSA) tweets 64 bit code (potential dead man’s switch)

 

It took 10 days before Snowden left another Tweet

 

Aug 10: Wikileaks offers $20k reward for information on murder of Seth Rich.

 

Oct 7: Podestamails leaks, first batch.

 

Oct 14: John Podesta tweets “I bet the lobster risotto is better than the food at the Ecuadorian Embassy”.

 

Oct 15: Joe Biden threatens Russia and blames them for Wikileaks – (Arrogant and open hostility)

 

Oct 16th/17: John Kerry visits the UK, personally pressures Equador to stop Assange from publishing documents about Clinton.

 

Oct 16/17: Wikileaks tweets SHA-256 prerelease keys.

 

Oct 16/17: Equadorian Embassy cuts off Assange’s internet access.

 

Oct 17: Wikileaks Volunteer tweets that Julian is ok… tweet is now deleted.

 

Oct 17: Embassy tells a caller they can’t comment on Assange being alive:

 

https://youtu.be/536IK7YhsGw

 

https://youtu.be/A_jhLcvoZqc

 

At the exact same time this was taking place, Manning had a group of guys try to break her out prison. Read her statement and see how the dates and times match:

 

https://www.documentcloud.org/documents/3213878-Binder2.html

 

http://archive.is/87WS5

 

Oct 18: Pamela Anderson visits Assange. Feeds him a vegan sandwich apparently???

 

Oct 18: Witnesses photograph and report heavily armed police and vans outside Ecuadorian Embassy, are barred from approaching and have cellphones confiscated. Live feeds are cut off.

 

Oct 18: Fox News reports Assange will be arrested in a matter of hours.

 

Oct 18: https://file.wikileaks.org/file made publicly visible, file dates/timestamps changed to 1984 (Orwell reference).

 

The message ‘The Insurance files may have just been released’ is shown for about an hour: https://i.imgur.com/6IMYfUK.png

 

http://archive.is/UTGVq

 

Oct 20: /r/wikileaks, /r/dncleaks, /r/wikileakstaskforce and /r/nsaleaks add 21 new moderators and remove previous mods, all threads about Assange going missing deleted since.

 

Oct 20/21: Wikileaks tweets 5 tweets with misspelled words. The incorrect letters spell “HELP HIM”. The Wikileaks twitter has never made a spelling error, let alone 5 in two days.

 

Oct 21: Massive DDoS attack on US internet. Wikileaks tweets to imply the attack originates from its supporters, asking them to stop, no evidence supports claim.

 

Oct 21: DDoS attack takes down Twitter.

 

At this point anon notices that the insurance keys were posted on several sites and deleted. People start trying to post the information but it is immediately deleted. Everyone takes refuge in onion threads that also disappear.

 

Oct 21: London Airport evacuated due to “chemical attack”, potentially used as cover to fly Assange out of country. (Conjecture but suspicious timing all the same)

 

Oct 22: Gavin MacFadyen (mentor to Assange and key player in Wikileaks) dies of lung cancer.

 

4TH PERSON RELATED TO WIKILEAKS NOW DEAD IN AS MANY MONTHS!!! MASSIVE RED FLAG!!!

 

Oct 23: Wikileaks Tweets poll asking how best to prove Assange is alive (he still hasn’t appeared on video or at the window since).

 

Oct 24: Wikileaks Tweets video of Assange and Michael Moore recorded in June.

 

Oct 24: Anon is able to find the deleted keys. They are posted and deleted again.

 

Oct 25: Someone comes into a thread and gives anon a hint about messages in the blockchain.

 

Oct 26: 4chan users successfully decode their first message in Wikileak’s blockchain. Threads are instantly flooded by shills saying that it’s not worth looking into. The blockchain is blocked with fees and 43000 unconfirmed transactions appear in the mempool.

 

Oct 27 (AM): Anon moves into an onion thread, posts code and a tutorial on decoding messages in the blockchain. Several files and messages are found.

 

Bitcoin 0.13.1 is released and a ‘soft fork’ begins:

 

https://bitcoin.org/en/release/v0.13.1

 

The blockchain is attacked: https://www.reddit.com/r/Bitcoin/comments/59qiyg/is_there_some_attack_going_whats_with_large/

 

Oct 27(PM): Several anon report losing their connection. Talk of v&s and black bagging begins. Someone posts that they discovered a flaw that allows anyone to retrieve the password from the files. Clues are dumped and the onion threads go silent. On Tox chat someone says someone unlocked some of the files, warns that FBI will announce that new evidence was found in someone’s computer and that a giant human trafficking operation would be exposed.

 

http://sli.mg/3srnQ3 – BASIC BLOCKCHAIN EXPLANATION

 

Oct 28: FBI announces they discovered new evidence on Anthony Weiner’s computer:

 

Oct 30: FBI begins posting their own leaks:

 

https://twitter.com/FBIRecordsVault

 

(Said Twitter been almost completely dead until now)

 

Oct 31 – Nov 2: Anon begins analyzing strange code words like ‘pizza’. Multiple connections are made.

 

Nov 3: Wikileaks confirms the validity of the information found:

 

https://twitter.com/wikileaks/status/794247777756860417

 

Nov 5: Manning’s statement [referenced Oct 17th] is released: https://www.documentcloud.org/documents/3213878-Binder2.html

 

Nov 6: Huge DDoS takes down Wikileaks for first time in years.

 

Nov 7: Various entities notice hundreds of Podesta and DNC emails are missing from recent leaks, accessed with direct entry.

 

Nov 8 (AM): New insurance files are posted: https://twitter.com/wikileaks/status/796085225394536448

 

Nov 8 (PM): Trump wins.

 

Nov 8(AM-PM): Large numbers of cyber attacks target Saudi Arabia and Emirates: https://i.sli.mg/dGc3TG.png

 

Nov 9: A single file is changed on the file.wikileaks.org/torrent

 

Nov 10: Staff publicly states their concern for Assange’s continue silence after the election. Incorrectly states that insurance files are future leaks and refers to the ones posted on Nov 8. These are the first files to have filenames that reference their content: https://www.reddit.com/r/IAmA/comments/5c8u9l/we_are_the_wikileaks_staff_despite_our_editor/

 

Suggested you use ((uTorrent)) to download the files

 

These are the previous insurance files:

 

https://file.wikileaks.org/torrent/2016-06-03_insurance.aes256.torrent

 

https://file.wikileaks.org/torrent/wikileaks-insurance-20120222.tar.bz2.aes.torrent

 

https://file.wikileaks.org/torrent/wlinsurance-20130815-A.aes256.torrent

 

https://file.wikileaks.org/torrent/wlinsurance-20130815-B.aes256.torrent

 

https://file.wikileaks.org/torrent/wlinsurance-20130815-C.aes256.torrent

 

https://web.archive.org/web/20100901162556/https://leakmirror.wikileaks.org/file/straw-glass-and-bottle/insurance.aes256

 

Nov 12: Assange meets with Swedish prosecutor regarding rape allegations, lawyers barred from attending, meeting meeting conducted via an Equadorian ambassador (not face to face)

 

REPEAT, NO FACE TO FACE

 

Nov 14: Wikileaks releases insurance files, SHA-256 hashes do not match those tweeted in October.

 

 

==DETAILED TIMELINE== LINKS PROVIDED – -

 

 

Apr 16: John Jones QC, Assange’s U.N. Lawyer dies jumping in front of a train.

 

https://twitter.com/wikileaks/status/722371220868571136

 

http://archive.is/1ZIWz

 

http://investmentwatchblog.com/wikileaks-lawyers-death-ruled-not-suicide/

 

http://archive.is/gDLFx

 

 

May 11: Michael Ratner, WikiLeaks’ chief counsel, dies of cancer.

 

https://en.wikipedia.org/wiki/Michael_Ratner#Death

 

http://archive.is/Diocv

 

http://www.nytimes.com/2016/05/12/us/michael-ratner-lawyer-who-won-rights-for-guantanamo-prisoners-dies-at-72.html

 

https://www.theguardian.com/law/2016/may/12/michael-ratner-obituary

 

http://archive.is/SEKl1

 

 

Jul 10: Seth Rich, DNC staffer who supposedly leaked DNC documents to Wikileaks, is shot in the back and dies. Nothing is stolen from his body.

 

https://en.wikipedia.org/wiki/Murder_of_Seth_Rich

 

http://archive.is/0EnQE

 

 

Aug 5: Edward Snowden (source of leaks on surveillance by the NSA) tweets 64 bit code (potential dead man’s switch)

 

https://qph.ec.quoracdn.net/main-qimg-1462e935a7aa6589a6b39a28db3fa285?convert_to_webp=true

 

(Since deleted off Twitter)

 

It took 10 days before Snowden left another Tweet

 

 

Aug 10: Wikileaks offers $20k reward for information on murder of Seth Rich.

 

http://www.infowars.com/wikileaks-offers-20k-reward-for-info-on-murdered-dnc-staffer/

 

http://archive.is/jyqiU

 

https://twitter.com/wikileaks/status/763063624579551232

 

http://archive.is/Ac2Nh

 

 

Oct 7: Podestamails leaks, first batch.

 

http://www.breitbart.com/tech/2016/10/07/wikileaks-releases-2050-emails-clinton-campaign-chief-john-podesta/

 

http://archive.is/CwOJq

 

https://twitter.com/wikileaks/status/784498891936915456?ref_src=twsrc%5Etfw

 

http://archive.is/G2TKG

 

 

Oct 14: John Podesta tweets “I bet the lobster risotto is better than the food at the Ecuadorian Embassy”.

 

http://www.breitbart.com/tech/2016/10/14/john-podestas-twitter-diss-of-wikileaks-editor-julian-assange-backfires-goes-viral/

 

http://archive.is/xrMkI

 

 

Oct 15: Joe Biden threatens Russia and blames them for Wikileaks – (Arrogant and open hostility)

 

https://www.youtube.com/watch?v=h9M-fb9VIi0&ab_channel=SkyQuakes2012

 

 

Oct 16th/17: John Kerry visits the UK, personally pressures Equador to stop Assange from publishing documents about Clinton.

 

http://www.bloomberg.com/news/articles/2014-06-03/goldman-sachs-gets-ecuador-gold-as-correa-steps-up-hunt-for-cash

 

 

Oct 16/17: Wikileaks tweets SHA-256 prerelease keys.

 

https://twitter.com/wikileaks/status/787777344740163584

 

http://archive.is/9tPCU

 

https://twitter.com/wikileaks/status/787781046519693316

 

http://archive.is/n4H58

 

https://twitter.com/wikileaks/status/787781519951720449

 

http://archive.is/JeFom

 

 

Oct 16/17: Equadorian Embassy cuts off Assange’s internet access.

 

https://www.theguardian.com/media/2016/oct/17/ecuador-julian-assange-internet-access-wikileaks

 

http://archive.is/59GtU

 

http://bigstory.ap.org/article/6f997f97c5f140a29f385ea05f1b642c/wikileaks-assanges-internet-link-severed-state-actor

 

http://archive.is/IYSQB

 

https://twitter.com/wikileaks/status/787889195507417088

 

http://archive.is/HkISA

 

https://twitter.com/wikileaks/status/788369924175441920

 

 

Oct 17: Wikileaks Volunteer tweets that Julian is ok… tweet is now deleted.

 

[Archive source needed]

 

@kellykolisnik:

 

@JohnDeplo You can’t go in without an appointment. Julian is confirmed to be perfectly fine. Thanks for your support and for checking :)

 

 

Oct 17: Embassy tells a caller they can’t comment on Assange being alive:

 

https://youtu.be/536IK7YhsGw

 

https://youtu.be/A_jhLcvoZqc

 

At the exact same time this was taking place, Manning had a group of guys try to break her out prison. Read her statement and see how the dates and times match:

 

https://www.documentcloud.org/documents/3213878-Binder2.html

 

http://archive.is/87WS5

 

 

Oct 18: Pamela Anderson visits Assange. Feeds him a vegan sandwich apparently???

 

http://thenewdaily.com.au/news/world/2016/11/15/pamela-anderson-assange/

 

http://archive.is/ZNLjB

 

http://time.com/4532939/pamela-anderson-julian-assage-vegan-lunch/

 

 

Oct 18: Witnesses photograph and report heavily armed police and vans outside Ecuadorian Embassy, are barred from approaching and have cellphones confiscated. Live feeds are cut off.

 

http://www.zerohedge.com/news/2016-10-21/wikileaks-reveals-heavily-armed-police-gathering-outside-ecuadorian-embassy-london

 

http://archive.is/oQnSq

 

https://twitter.com/wikileaks/status/789493599121604609

 

http://archive.is/TTutx

 

http://www.trunews.com/article/wikileaks-armed-police-appear-at-ecuador-embassy-in-london

 

http://archive.is/HSwQD

 

(More sources needed to confirm)

 

 

Oct 18: Fox News reports Assange will be arrested in a matter of hours.

 

https://youtu.be/0T_h7pSVIFo (This doesn’t seem to have been reported anywhere else.)

 

 

Oct 18: https://file.wikileaks.org/file made publicly visible, file dates/timestamps changed to 1984 (Orwell reference).

 

The message ‘The Insurance files may have just been released’ is shown for about an hour: https://i.imgur.com/6IMYfUK.png

 

http://archive.is/UTGVq

 

 

Oct 20: /r/wikileaks, /r/dncleaks, /r/wikileakstaskforce and /r/nsaleaks add 21 new moderators and remove previous mods, all threads about Assange going missing deleted since.

 

https://www.reddit.com/r/WhereIsAssange/comments/5d7gif/psa_a_group_of_mods_were_all_added_to_wikileaks/

 

http://archive.is/7Xygg

 

==

 

/r/wikileaks

 

julio08 (2408) 25 days ago full permissions

 

Here4Popcorn (31467) 24 days ago full permissions

 

crawlingfasta (5781) 24 days ago full permissions

 

SATXTAN (4317) 24 days ago full permissions

 

AssuredlyAThrowAway (221301) 24 days ago full permissions

 

kybarnet (71223) 24 days ago full permissions

 

GamingForHonor (23928) 22 days ago wiki

 

==

 

/r/dncleaks

 

AssuredlyAThrowAway (221300) 1 month ago full permissions

 

HollowFangs (62927) 26 days ago access, flair, mail, posts

 

SATXTAN (4317) 25 days ago full permissions

 

==

 

/r/wikileakstaskforce

 

Here4Popcorn (31467) 1 month ago full permissions

 

kybarnet (71223) 1 month ago full permissions

 

GamingForHonor (23928) 1 month ago full permissions

 

pancakees (14098) 1 month ago full permissions

 

bananawhom (8655) 1 month ago full permissions

 

tjade (654) 1 month ago full permissions

 

shadowman3001 (102074) 1 month ago full permissions

 

deathscape10 (4791) 1 month ago full permissions

 

crawlingfasta (5781) 1 month ago full permissions

 

==

 

/r/nsaleaks

 

fantastic_comment (10116) 27 days ago config, flair, mail, posts, wiki

 

cojoco (113673) 24 days ago full permissions

 

==

 

AssuredlyAThrowAway, SATXTAN, Here4Popcorn, crawlingfasta, GamingForHonor, kybarnet ALL added to 2 of these subreddits.

 

 

Oct 20/21: Wikileaks tweets 5 tweets with misspelled words. The incorrect letters spell “HELP HIM”. The Wikileaks twitter has never made a spelling error, let alone 5 in two days.

 

https://twitter.com/wikileaks/status/789078312043761665

 

http://archive.is/0Htlx

 

#imWithHer – im

 

https://twitter.com/wikileaks/status/789170993252081666

 

http://archive.is/OGWL5

 

Navel Intelligence – Naval – EL

 

https://twitter.com/wikileaks/status/789173501458456576

 

http://archive.is/oTPi1

 

wopper – wHopper – H

 

https://twitter.com/wikileaks/status/789456189851627522

 

http://archive.is/mDpQe

 

presumtive – presumptive – P

 

(Can’t seem to find all these tweets however this is more suspicious activity that lines up with the forming narrative of Wikileaks being under attack)

 

 

Oct 21: Massive DDoS attack on US internet. Wikileaks tweets to imply the attack originates from its supporters, asking them to stop, no evidence supports claim.

 

https://twitter.com/wikileaks/status/789574436219449345

 

http://archive.is/XqYuP

 

 

Oct 21: DDoS attack takes down Twitter.

 

At this point anon notices that the insurance keys were posted on several sites and deleted. People start trying to post the information but it is immediately deleted. Everyone takes refuge in onion threads that also disappear.

 

http://www.techtimes.com/articles/183218/20161021/cyber-attack-takes-down-netflix-twitter-spotify-more-east-coast.htm

 

http://archive.is/8bLCm

 

 

Oct 21: London Airport evacuated due to “chemical attack”, potentially used as cover to fly Assange out of country. (Conjecture but suspicious timing all the same)

 

http://time.com/4542496/london-city-airport-chemical-incident/

 

http://archive.is/Lv5KT

 

https://youtu.be/ViMVLplr8YM

 

 

Oct 22: Gavin MacFadyen (mentor to Assange and key player in Wikileaks) dies of lung cancer.

 

4TH PERSON RELATED TO WIKILEAKS NOW DEAD IN AS MANY MONTHS!!! MASSIVE RED FLAG!!!

 

https://www.rt.com/usa/363793-gavin-macfadyen-dies-wikileaks/

 

http://archive.is/JAZ24

 

https://twitter.com/wikileaks/status/790278989596295170

 

http://archive.is/bpq74

 

 

Oct 23: Wikileaks Tweets poll asking how best to prove Assange is alive (he still hasn’t appeared on video or at the window since).

 

https://twitter.com/wikileaks/status/790406530738913285

 

http://archive.is/7EDvG

 

 

Oct 24: Wikileaks Tweets video of Assange and Michael Moore recorded in June.

 

https://twitter.com/wikileaks/status/790394830979465216

 

http://archive.is/w1Hpu

 

Wikileaks also have this posted, AGAIN not proving Assange is alive.

 

https://twitter.com/SHO_TheCircus/status/790672953331425280

 

http://archive.is/OiA5B

 

 

Oct 24: Anon is able to find the deleted keys. They are posted and deleted again.

 

[SOURCE/CITATION NEEDED]

 

 

Oct 25: Someone comes into a thread and gives anon a hint about messages in the blockchain.

 

[SOURCE/CITATION NEEDED]

 

Oct 26: 4chan users successfully decode their first message in Wikileak’s blockchain. Threads are instantly flooded by shills saying that it’s not worth looking into. The blockchain is blocked with fees and 43000 unconfirmed transactions appear in the mempool.

 

[SOURCE/CITATION NEEDED]

 

 

Oct 27 (AM): Anon moves into an onion thread, posts code and a tutorial on decoding messages in the blockchain. Several files and messages are found.

 

Bitcoin 0.13.1 is released and a ‘soft fork’ begins:

 

https://bitcoin.org/en/release/v0.13.1

 

The blockchain is attacked: https://www.reddit.com/r/Bitcoin/comments/59qiyg/is_there_some_attack_going_whats_with_large/

 

Oct 27(PM): Several anon report losing their connection. Talk of v&s and black bagging begins. Someone posts that they discovered a flaw that allows anyone to retrieve the password from the files. Clues are dumped and the onion threads go silent. On Tox chat someone says someone unlocked some of the files, warns that FBI will announce that new evidence was found in someone’s computer and that a giant human trafficking operation would be exposed.

 

http://sli.mg/3srnQ3 – BASIC BLOCKCHAIN EXPLANATION

 

 

Oct 28 (A few hours later): FBI announces they discovered new evidence on Anthony Weiner’s computer:

 

http://www.nytimes.com/2016/10/29/us/politics/fbi-hillary-clinton-email.html?_r=0

 

 

Oct 30: FBI begins posting their own leaks:

 

https://twitter.com/FBIRecordsVault

 

(Said Twitter been almost completely dead until now)

 

 

Oct 31 – Nov 2: Anon begins analyzing strange code words like ‘pizza’. Multiple connections are made.

 

[SOURCE/CITATION NEEDED]

 

 

Nov 3: Wikileaks confirms the validity of the information found: https://twitter.com/wikileaks/status/794247777756860417

 

 

Nov 5: Manning’s statement [referenced Oct 17th] is released: https://www.documentcloud.org/documents/3213878-Binder2.html

 

 

Nov 6: Huge DDoS takes down Wikileaks for first time in years.

 

https://twitter.com/wikileaks/status/795503927378722816

 

 

Nov 7: Various entities notice hundreds of Podesta and DNC emails are missing from recent leaks, accessed with direct entry.

 

 

Nov 8 (AM): New insurance files are posted: https://twitter.com/wikileaks/status/796085225394536448

 

Nov 8 (PM): Trump wins.

 

[Yeah you guys don’t need a source for this]

 

 

Nov 8(AM-PM): Large numbers of cyber attacks target Saudi Arabia and Emirates: https://i.sli.mg/dGc3TG.png

 

 

Nov 9: A single file is changed on the file.wikileaks.org/torrent

 

 

Nov 10: Staff publicly states their concern for Assange’s continue silence after the election. Incorrectly states that insurance files are future leaks and refers to the ones posted on Nov 8. These are the first files to have filenames that reference their content: https://www.reddit.com/r/IAmA/comments/5c8u9l/we_are_the_wikileaks_staff_despite_our_editor/

 

Suggested you use ((uTorrent)) to download the files

 

These are the previous insurance files:

 

https://file.wikileaks.org/torrent/2016-06-03_insurance.aes256.torrent

 

https://file.wikileaks.org/torrent/wikileaks-insurance-20120222.tar.bz2.aes.torrent

 

https://file.wikileaks.org/torrent/wlinsurance-20130815-A.aes256.torrent

 

https://file.wikileaks.org/torrent/wlinsurance-20130815-B.aes256.torrent

 

https://file.wikileaks.org/torrent/wlinsurance-20130815-C.aes256.torrent

 

https://web.archive.org/web/20100901162556/https://leakmirror.wikileaks.org/file/straw-glass-and-bottle/insurance.aes256

 

 

Nov 12: Assange meets with Swedish prosecutor regarding rape allegations, lawyers barred from attending, meeting meeting conducted via an Equadorian ambassador (not face to face)

 

REPEAT, NO FACE TO FACE

 

https://www.theguardian.com/media/2016/nov/14/julian-assange-to-face-swedish-prosecutors-over-accusation

 

http://archive.is/3Rl9Y

 

 

Nov 14: Wikileaks releases insurance files, SHA-256 hashes do not match those tweeted in October.

 

 

If you truly care about Assange and the future of Wikileaks you should consider investigating the possibility of the DMS being activated. It might be the only leverage that can be used to bring him back safely.

 

= = = =

 

CURRENTLY NO PROOF HE IS IN THE EMBASSY IN THE UK

 

SWEDISH PROSECUTOR AND HIS OWN LAWYER WEREN’T ALLOWED TO SEE HIM. COMMUNICATION THROUGH AMBASSADOR.

 

= = = =

 

 

Other important related information#

 

https://wikileaks.ch/IMG/pdf/WikiLeaks_Response_v6.pdf

https://www.reddit.com/r/WhereIsAssange/

 

 

Assange is Kill? – Pastebin.com.

What Could Go Wrong? US Unveils Artificially Intelligent Fighter Pilot

 

ai-fighter-pilots

The two most aggressive military forces in the world have added a new frontier in their immense ability to deal death and destruction. In the same week, an Israeli firm launched the first-ever torpedo from an unmanned sea vessel while a U.S. artificially intelligent fighter pilot easily won combat simulations against human pilots.

These achievements are a testament to the sad reality that military interests are often the first to take advantage of wondrous advancements such as AI, just as nuclear physics and other technologies were hijacked for more efficient methods of killing.

Stephen Hawking pointed this out during an interview on the Larry King show.

Governments seem to be engaged in an AI arms race, designing planes and weapons with intelligent technologies. The funding for projects directly beneficial to the human race, such as improved medical screening seems a somewhat lower priority.

The AI fighter jet pilot, known as Alpha, was developed by researchers from the University of Cincinnati and defense company Psibernetix. It used four virtual jets to defend a coastline from two attacking planes with superior weapons systems—without suffering any losses.

Retired US Air Force colonel Gene Lee was shot out of the air every time after protracted engagements, and could not even manage to score a hit on Alpha.

The groundbreaking feat was accomplished through the use of “fuzzy logic” to efficiently compute the massive amounts of data from a simulated fighter jet. Instead of analyzing every bit of data equally, fuzzy logic assigns a degree of truth or significance to the pieces of data before making a broader decision.

“Here, you’ve got an AI system that seems to be able to deal with the air-to-air environment, which is extraordinarily dynamic, has an extraordinary number of parameters and, in the paper, more than holds its own against a skilled and capable, experienced combat pilot,” said Doug Barrie, a military aerospace analyst at think tank IISS.

“It’s like a chess master losing out to a computer.”

For now, the talk is about using Alpha “as a simulation tool or as a device to help develop better systems for assisting human pilots in the air.” But it’s a safe assumption that using AI to pilot real machines is being explored by a military machine incessantly hungry for the next best means of reaping death and destruction.

If an AI fighter pilot were ever to fly an actual fighter jet, the obvious question is, what happens when it decides to attack a non-military target? Of course, human pilots routinely bomb innocent civilians, but this is “justified” as collateral damage in the pursuit of defeating the bogeyman du jour.

The unmanned torpedo-launching sea vessel system, called Seagull, will soon be put into use by the Israeli Navy for use against submarines and sea mines. It consists of one or two surface vessels, each about 40 feet long, operated remotely from manned ships or the shore.

One vessel carries a sonar system that can search the entire water volume, with another that deploys an underwater robot for further investigation. When a threat is confirmed, a vessel launches a torpedo-like weapon to destroy the target.

This test carried out in the Haifa port marks the first time that a torpedo has been launched from an unmanned boat.

‘The success of the first torpedo launch test is a major milestone, confirming the Unmanned Surface Vessel’s capability to incorporate weapons that counter submarines, in addition to its unique submarine and mine detection capabilities,’ Elbit, the firm behind the trial said.

While it’s great to “take the man out of the minefield,” the Seagull also represents the kind of military advancement we see with unmanned aerial vehicles, or drones.

As we know, drones have been the tool of choice for expanding undeclared war into countries in the name of fighting terrorism, which has resulted in thousands of innocent civilians being killed. When bombing is carried out remotely, from the comfort of a padded seat in a secure building, the operator is that much more detached from the reality of killing people.

Former drone operators have gone public about the blood lust and indifference that characterizes the drone assassination program, and fellow operators getting intoxicated to “bend that reality and try to picture yourself not being there.”

Of course, operating torpedo-equipped sea vessels is a different beast, but the trend toward unmanned killing machines is nonetheless troubling. With AI being brought into military technology, how long before scenes from the Terminator movies are a real thing?

By Justin Gardner

 

Justin Gardner writes for TheFreeThoughtProject.com, where this article first appeared.

 

What Could Go Wrong? US Unveils Artificially Intelligent Fighter Pilot.

Ex-CIA Spy: A Global Open Source Revolution Is About To Begin

When Robert David Steele speaks, people listen. Especially those within the military and intelligence communities around the world.



With his continued rhetoric on the open source everything manifesto as a way to positively transform this world for all, Mr. Steele has additionally begun discussing the world’s largest financial/gold cover-up story which has ties to JFK’s assassination and 9/11: That is, the global collateral accounts.

As a former CIA spy who has trained over 7,500 officers from over 66 countries,  Robert Steele has over 18 years experience across the U.S. Intelligence community  and an additional 20 years experience in commercial intelligence and training. He is  also a former Marine and he is the co-founder of the Marine Corps Intelligence  Activity.

He has also written several books, which include, The Open Source Manifesto and  Intelligence For Earth: Clarity, Diversity, Integrity and Sustainability, among others.

In accord to open source everything, Robert’s motto is: The truth at any cost, lowers all other costs.

Essentially, when information, technology and resources are opened up as the  commons to all, the true cost plummets and the well-being of our planet and all living  beings here begin to thrive, as well as our social, political and financial systems.

In Robert’s own words, the open source revolution will transform our world for the better and for all.

“Sharing, not secrecy, is the means by which we realize such a lofty destiny as well as create infinite wealth. The wealth of networks, the wealth of knowledge, revolutionary wealth- all can create a nonzero, win-win Earth that works for 100% of humanity. This is the ‘utopia’ that Buckminster Fuller foresaw, now within our reach.” 

Similar models to Steele’s open source everything also include The  Venus Project: Beyond Politics, Poverty and War, which calls for a  holistic approach to changing the systems on this planet in a way that  utilizes technology and human ingenuity to provide a high standard of  living for every person by opening the planet’s resources for the use of  all– in a strategically sustainable and efficient manner.

Another model that is similar is Sustainable Human’s gift-based  community in which all who participate are volunteers and everything  created is done to “spread knowledge, ideas and alternative ways of  living that enable humanity to live in harmony with the rest of life on Earth. ”

All of these models are wonderful and appropriate to envision, and what is certain is that most of the social systems we have in place currently, must go. Fundamental change is necessary.

In an interview with The Guardian, Robert David Steele was asked his opinion on the idea that the U.S. is on the verge of revolting against the elitist 1%:

“The preconditions for revolution exist in the UK, and most Western countries [including the U.S].

The number of active pre-conditions is quite stunning, from elite isolation to concentrated wealth to inadequate socialization and education, to concentrated land-holdings to loss of authority to repression of new technologies, especially in relation to energy, to the atrophy of the public sector and spread of corruption, to media dishonesty, to mass unemployment of young men and on and on and on.” 

What then needs to happen for this to begin? Steele says:

“Preconditions are not the same as precipitants. We are waiting for our Tunisian fruit seller. The public will endure great repression, especially when most media outlets and schools are actively aiding the repressive meme of ‘you are helpless, this is the order of things.’

When we have a scandal so powerful that it cannot be ignored by the average Briton or American, we will have a revolution that overturns the corrupt political systems in both countries, and perhaps puts many banks out of business. Vaclav Handel calls this ‘The Power of the Powerless.’ One spark, one massive fire.” 

Interestingly, this interview was conducted almost exactly 2 years ago. Have we not seen the divide  between the 99% and the 1% continue to grow in that time? Humanity will not remain quiet for much longer. We are  indeed close to some big and positive changes.

Perhaps this massive  scandal/event we are waiting for is the conclusion of the FBI’s investigation of Hillary Clinton and the Clinton Foundation or maybe it is Britain’s vote to leave the EU, potentially triggering a cascade of revolts throughout Europe and then the world, or perhaps it will be a large enough group of people becoming aware of the global collateral accounts, the world’s largest  financial/gold cover-up which has relation to JFK’s death and the  events of 9/11; a story which just three weeks ago Robert David Steele started to write about publicly:

It never occurred to me that accidentally becoming the top Amazon reviewer for non-fiction, partially associated with my being the lead for Open Source Intelligence (OSINT) for 25 years across 66+ countries, would be vastly more important than everything I ever learned across multiple graduate degrees, as a former spy, and as co-founder of the Marine Corps Intelligence Activity (MCIA).As I encounter disbelief about Neil Keenan and his role as the main juncture between the Dragon Society and the West as we move toward a global economic re-set, I have to remind myself that 80% of the public still thinks JFK was assassinated by Lee Harvey Oswald; J. Edgar Hoover was a moral man; the Israelis attacked the USS Liberty by accident, and 9/11 was carried out by a bunch of “rag heads” armed with box cutters. 

I must emphasize that it was not the books that underlay my absolute confidence in Neil Keenan and the Dragon Society and the broad outlines of the coming global re-set, but rather the people behind the books that I have taken the trouble to meet, sometimes under quasi-clandestine circumstances. Sterling and Peggy Seagrave – Peggy has passed – stand out.

Their book, Gold Warriors–America’s Secret Recovery of Yamashita’s Gold, came with a CD containing 60,000 additional documents including maps and photographs. That led me to a quasi-clandestine meeting in France to interview them for the 2004 offering of my international conference – the transcript is online – and a deep continuing relationship of trust.”

The public endorsement of Neil Keenan and his team’s efforts to open the global collateral accounts from Robert David Steele is another clear indication that these accounts are indeed real and that those who are working with Neil Keenan (positive factions within The Pentagon and CIA, Russian Intelligence, presidents and prime ministers of  multiple South American countries and several Asian countries, among many other political, financial and intelligence and military groups who are all quietly and sometimes openly working for humanity’s best interest) are legitimate.

The global collateral accounts have such a deep and complex history, which can be read in great detail here. In short, they are off-ledger accounts backed by gold, silver and many other assets which were originally intended for humanitarian projects.

JFK signed what is known as the Green Hilton Memorial Agreement with President Sukarno of Indonesia, which was to use these accounts to issue a new US Treasury Note (backed by gold and silver) and end the Federal Reserve’s control over the global financial system.

Neil Keenan is now getting very close to opening these accounts for the intended purposes of transforming our world for the better through many humanitarian projects as well as the release of free energy technologies and an overhaul in the global financial system. Russia, China, Iran, Indonesia and almost the entire Eastern hemisphere is supporting this plan in one way or another.

Perhaps Robert David Steele’s ideas on an open source world will be part of the coming humanitarian projects.

As almost anyone can see when they look around either at their own lives or the world at large, everything is changing. Everything is in flux. Everything happens in cycles. The time for positive global change is now.

For more information on some of the topics mentioned above, check out these articles: 

The Inevitability of Peaceful Revolution

We Need A New, Beneficial Global Economy

The Connection Between 9/11, JFK and the Global Collateral Accounts

The Most Important Financial Meeting Since JFK’s Death Just Took Place

The Alliance That Is Taking Down The New World Order

 

Ex-CIA Spy: A Global Open Source Revolution Is About To Begin.

The Pentagon is building a ‘self-aware’ killer robot army fueled by social media — INSURGE intelligence — Medium

Imagine one of these giant robot dog things being weaponized and chasing you through the jungle because you turned up on a Pentagon kill list after posting angry stuff on social media

The Pentagon is building a ‘self-aware’ killer robot army fueled by social media

Official US defence and NATO documents confirm that autonomous weapon systems will kill targets, including civilians, based on tweets, blogs and Instagram

by Nafeez Ahmed

This exclusive is published by INSURGE INTELLIGENCE, a crowd-funded investigative journalism project for the global commons

An unclassified 2016 Department of Defense (DoD) document, the Human Systems Roadmap Review, reveals that the US military plans to create artificially intelligent (AI) autonomous weapon systems, which will use predictive social media analytics to make decisions on lethal force with minimal human involvement.

Despite official insistence that humans will retain a “meaningful” degree of control over autonomous weapon systems, this and other Pentagon documents dated from 2015 to 2016 confirm that US military planners are already developing technologies designed to enable swarms of “self-aware” interconnected robots to design and execute kill operations against robot-selected targets.

More alarmingly, the documents show that the DoD believes that within just fifteen years, it will be feasible for mission planning, target selection and the deployment of lethal force to be delegated entirely to autonomous weapon systems in air, land and sea. The Pentagon expects AI threat assessments for these autonomous operations to be derived from massive data sets including blogs, websites, and multimedia posts on social media platforms like Twitter, Facebook and Instagram.

The raft of Pentagon documentation flatly contradicts Deputy Defense Secretary Robert Work’s denial that the DoD is planning to develop killer robots.

In a widely reported March conversation with Washington Post columnist David Ignatius, Work said that this may change as rival powers work to create such technologies:

“We might be going up against a competitor that is more willing to delegate authority to machines than we are, and as that competition unfolds we will have to make decisions on how we best can compete.”

But, he insisted, “We will not delegate lethal authority to a machine to make a decision,” except for “cyber or electronic warfare.”

He lied.

Official US defence and NATO documents dissected by INSURGE intelligence reveal that Western governments are already planning to develop autonomous weapons systems with the capacity to make decisions on lethal force — and that such systems, in the future, are even expected to make decisions on acceptable levels of “collateral damage.”

Behind public talks, a secret arms race

Efforts to create autonomous robot killers have evolved over the last decade, but have come to a head this year.

A National Defense Industry Association (NDIA) conference on Ground Robotics Capabilities in March hosted government officials and industry leaders confirming that the Pentagon was developing robot teams that would be able to use lethal force without direction from human operators.

In April, government representatives and international NGOs convened at the United Nations in Geneva to discuss the legal and ethical issues surrounding lethal autonomous weapon systems (LAWS).

That month, the UK government launched a parliamentary inquiry into robotics and AI. And earlier in May, the White House Office of Science and Technology announced a series of public workshops on the wide-ranging social and economic implications of AI.

Prototype Terminator Bots?

Most media outlets have reported the fact that so far, governments have not ruled out the long-term possibility that intelligent robots could be eventually authorized to make decisions to kill human targets autonomously.

But contrary to Robert Work’s claim, active research and development efforts to explore this possibility are already underway. The plans can be gleaned from several unclassified Pentagon documents in the public record that have gone unnoticed, until now.

Among them is a document released in February 2016 from the Pentagon’s Human Systems Community of Interest (HSCOI).

The document shows not only that the Pentagon is actively creating lethal autonomous weapon systems, but that a crucial component of the decision-making process for such robotic systems will include complex Big Data models, one of whose inputs will be public social media posts.

Robots that kill ‘like people’

The HSCOI is a little-known multi-agency research and development network seeded by the Office of the Secretary of Defense (OSD), which acts as a central hub for a huge plethora of science and technology work across US military and intelligence agencies.

The document is a 53-page presentation prepared by HSCOI chair, Dr. John Tangney, who is Director of the Office of Naval Research’s Human and Bioengineered Systems Division. Titled Human Systems Roadmap Review, the slides were presented at the NDIA’s Human Systems Conference in February.

The document says that one of the five “building blocks” of the Human Systems program is to “Network-enable, autonomous weapons hardened to operate in a future Cyber/EW [electronic warfare] Environment.” This would allow for “cooperative weapon concepts in communications-denied environments.”

But then the document goes further, identifying a “focus areas” for science and technology development as “Autonomous Weapons: Systems that can take action, when needed”, along with “Architectures for Autonomous Agents and Synthetic Teammates.”

The final objective is the establishment of “autonomous control of multiple unmanned systems for military operations.”

Such autonomous systems must be capable of selecting and engaging targets by themselves — with human “control” drastically minimized to affirming that the operation remains within the parameters of the Commander’s “intent.”

The document explicitly asserts that these new autonomous weapon systems should be able to respond to threats without human involvement, but in a way that simulates human behavior and cognition.

The DoD’s HSCOI program must “bridge the gap between high fidelity simulations of human cognition in laboratory tasks and complex, dynamic environments.”

Referring to the “Mechanisms of Cognitive Processing” of autonomous systems, the document highlights the need for:

“More robust, valid, and integrated mechanisms that enable constructive agents that truly think and act like people.”

The Pentagon’s ultimate goal is to develop “Autonomous control of multiple weapon systems with fewer personnel” as a “force multiplier.”

The new systems must display “highly reliable autonomous cooperative behavior” to allow “agile and robust mission effectiveness across a wide range of situations, and with the many ambiguities associated with the ‘fog of war.’”

Resurrecting the human terrain

The HSCOI consists of senior officials from the US Army, Navy, Marine Corps, Air Force, Defense Advanced Research Projects Agency (DARPA); and is overseen by the Assistant Secretary of Defense for Research & Engineering and the Assistant Secretary of Defense for Health Affairs.

HSCOI’s work goes well beyond simply creating autonomous weapons systems. An integral part of this is simultaneously advancing human-machine interfaces and predictive analytics.

The latter includes what a HSCOI brochure for the technology industry, ‘Challenges, Opportunities and Future Efforts’, describes as creating “models for socially-based threat prediction” as part of “human activity ISR.”

This is short-hand for intelligence, surveillance and reconnaissance of a population in an ‘area of interest’, by collecting and analyzing data on the behaviors, culture, social structure, networks, relationships, motivation, intent, vulnerabilities, and capabilities of a human group.

The idea, according to the brochure, is to bring together open source data from a wide spectrum, including social media sources, in a single analytical interface that can “display knowledge of beliefs, attitudes and norms that motivate in uncertain environments; use that knowledge to construct courses of action to achieve Commander’s intent and minimize unintended consequences; [and] construct models to allow accurate forecasts of predicted events.”

The Human Systems Roadmap Review document from February 2016 shows that this area of development is a legacy of the Pentagon’s controversial “human terrain” program.

The Human Terrain System (HTS) was a US Army Training and Doctrine Command (TRADOC) program established in 2006, which embedded social scientists in the field to augment counterinsurgency operations in theaters like Iraq and Afghanistan.

The idea was to use social scientists and cultural anthropologists to provide the US military actionable insight into local populations to facilitate operations — in other words, to weaponize social science.

The $725 million program was shut down in September 2014 in the wake of growing controversy over its sheer incompetence.

The HSCOI program that replaces it includes social sciences but the greater emphasis is now on combining them with predictive computational models based on Big Data. The brochure puts the projected budget for the new human systems project at $450 million.

The Pentagon’s Human Systems Roadmap Review demonstrates that far from being eliminated, the HTS paradigm has been upgraded as part of a wider multi-agency program that involves integrating Big Data analytics with human-machine interfaces, and ultimately autonomous weapon systems.

The new science of social media crystal ball gazing

The 2016 human systems roadmap explains that the Pentagon’s “vision” is to use “effective engagement with the dynamic human terrain to make better courses of action and predict human responses to our actions” based on “predictive analytics for multi-source data.”

Are those ‘soldiers’ in the photo human… or are they really humanoid (killer) robots?

In a slide entitled, ‘Exploiting Social Data, Dominating Human Terrain, Effective Engagement,’ the document provides further detail on the Pentagon’s goals:

“Effectively evaluate/engage social influence groups in the op-environment to understand and exploit support, threats, and vulnerabilities throughout the conflict space. Master the new information environment with capability to exploit new data sources rapidly.”

The Pentagon wants to draw on massive repositories of open source data that can support “predictive, autonomous analytics to forecast and mitigate human threats and events.”

This means not just developing “behavioral models that reveal sociocultural uncertainty and mission risk”, but creating “forecast models for novel threats and critical events with 48–72 hour timeframes”, and even establishing technology that will use such data to “provide real-time situation awareness.”

According to the document, “full spectrum social media analysis” is to play a huge role in this modeling, to support “I/W [irregular warfare], information operations, and strategic communications.”

This is broken down further into three core areas:

“Media predictive analytics; Content-based text and video retrieval; Social media exploitation for intel.”

The document refers to the use of social media data to forecast future threats and, on this basis, automatically develop recommendations for a “course of action” (CoA).

Under the title ‘Weak Signal Analysis & Social Network Analysis for Threat Forecasting’, the Pentagon highlights the need to:

“Develop real-time understanding of uncertain context with low-cost tools that are easy to train, reduce analyst workload, and inform COA [course of action] selection/analysis.”

In other words, the human input into the development of course of action “selection/analysis” must be increasingly reduced, and replaced with automated predictive analytical models that draw extensively on social media data.

This can even be used to inform soldiers of real-time threats using augmented reality during operations. The document refers to “Social Media Fusion to alert tactical edge Soldiers” and “Person of Interest recognition and associated relations.”

The idea is to identify potential targets — ‘persons of interest’ — and their networks, in real-time, using social media data as ‘intelligence.’

Meaningful human control without humans

Both the US and British governments are therefore rapidly attempting to redefine “human control” and “human intent” in the context of autonomous systems.

Among the problems that emerged at the UN meetings in April is the tendency to dilute the parameters that would allow describing an autonomous weapon system as being tied to “meaningful” human control.

A separate Pentagon document dated March 2016 — a set of presentation slides for that month’s IEEE Conference on Cognitive Methods in Situation Awareness & Decision Support — insists that DoD policy is to ensure that autonomous systems ultimately operate under human supervision:

“[The] main benefits of autonomous capabilities are to extend and complement human performance, not necessarily provide a direct replacement of humans.”

Unfortunately, there is a ‘but’.

The March document, Autonomous Horizons: System Autonomy in the Air Force, was authored by Dr. Greg Zacharias, Chief Scientist of the US Air Force. The IEEE conference where it was presented was sponsored by two leading government defense contractors, Lockheed Martin and United Technologies Corporation, among other patrons.

Further passages of the document are revealing:

“Autonomous decisions can lead to high-regret actions, especially in uncertain environments.”

In particular, the document observes:

“Some DoD activity, such as force application, will occur in complex, unpredictable, and contested environments. Risk is high.”

The solution, supposedly, is to design machines that basically think, learn and problem solve like humans. An autonomous AI system should “be congruent with the way humans parse the problem” and driven by “aiding/automation knowledge management processes along lines of the way humans solve problem [sic].”

A section titled ‘AFRL [Air Force Research Laboratory] Roadmap for Autonomy’ thus demonstrates how by 2020, the US Air Force envisages “Machine-Assisted Ops compressing the kill chain.” The bottom of the slide reads:

“Decisions at the Speed of Computing.”

This two-staged “kill chain” is broken down as follows: firstly, “Defensive system mgr [manager] IDs threats & recommends actions”; secondly, “Intelligence analytic system fuses INT [intelligence] data & cues analyst of threats.”

In this structure, a lethal autonomous weapon system draws on intelligence data to identify a threat, which an analyst simply “IDs”, before recommending “action.”

The analyst’s role here is simply to authorize the kill, but in reality the essential importance of human control — assessment of the integrity of the kill decision — has been relegated to the end of an entirely automated analytical process, as a mere perfunctionary obligation.

By 2030, the document sees human involvement in this process as being reduced even further to an absolute minimum. While a human operator may be kept “in the loop” (in the document’s words) the Pentagon looks forward to a fully autonomous system consisting of:

“Optimized platform operations delivering integrated ISR [intelligence, surveillance and reconnaissance] and weapon effects.”

The goal, in other words, is a single integrated lethal autonomous weapon system combining full spectrum analysis of all data sources with “weapon effects” — that is, target selection and execution.

The document goes to pains to layer this vision with a sense of human oversight being ever-present.

AI “system self-awareness”

Yet an even more blunt assertion of the Pentagon’s objective is laid out in a third document, a set of slides titled DoD Autonomy Roadmap presented exactly a year earlier at the NDIA’s Defense Tech Expo.

The document authored by Dr. Jon Bornstein, who leads the DoD’s Autonomy Community of Interest (ACOI), begins by framing its contents with the caveat: “Neither Warfighter nor machine is truly autonomous.”

Yet it goes on to call for machine agents to develop:

“Perception, reasoning, and intelligence allow[ing] for entities to have existence, intent, relationships, and understanding in the battle space relative to a mission.”

This will be the foundation for two types of weapon systems: “Human/ Autonomous System Interaction and Collaboration (HASIC)” and “Scalable Teaming of Autonomous Systems (STAS).”

In the near term, machine agents will be able “to evolve behaviors over time based on a complex and ever-changing knowledge base of the battle space… in the context of mission, background knowledge, intent, and sensor information.”

However, it is the Pentagon’s “far term” vision for machine agents as “self-aware” systems that is particularly disturbing:

“Far Term:

•Ontologies adjusted through common-sense knowledge via intuition.

•Learning approaches based on self-exploration and social interactions.

•Shared cognition

•Behavioral stability through self-modification.

•System self-awareness”

It is in this context of the “self-awareness” of an autonomous weapon system that the document clarifies the need for the system to autonomously develop forward decisions for action, namely:

“Autonomous systems that appropriately use internal model-based/deliberative planning approaches and sensing/perception driven actions/control.”

The Pentagon specifically hopes to create what it calls “trusted autonomous systems”, that is, machine agents whose behavior and reasoning can be fully understood, and therefore “trusted” by humans:

“Collaboration means there must be an understanding of and confidence in behaviors and decision making across a range of conditions. Agent transparency enables the human to understand what the agent is doing and why.”

Once again, this is to facilitate a process by which humans are increasingly removed from the nitty gritty of operations.

In the “Mid Term”, there will be “Improved methods for sharing of authority” between humans and machines. In the “Far Term”, this will have evolved to a machine system functioning autonomously on the basis of “Awareness of ‘commanders intent’” and the “use of indirect feedback mechanisms.”

This will finally create the capacity to deploy “Scalable Teaming of Autonomous Systems (STAS)”, free of overt human direction, in which multiple machine agents display “shared perception, intent and execution.”

Teams of autonomous weapon systems will display “Robust self-organization, adaptation, and collaboration”; “Dynamic adaption, ability to self-organize and dynamically restructure”; and “Agent-to-agent collaboration.”

Notice the lack of human collaboration.

The “far term” vision for such “self-aware” autonomous weapon systems is not, as Robert Work claimed, limited to cyber or electronic warfare, but will include:

“Ground Convoys/Air-ground operations”; “Ballistic rate multi-agent operation”; “Smart munitions.”

These operations might even take place in tight urban environments — “in close proximity to other manned & unmanned systems including crowded military & civilian areas.”

The document admits, though, that the Pentagon’s major challenge is to mitigate against unpredictable environments and emergent behavior.

Autonomous systems are “difficult to assure correct behavior in a countless number of environmental conditions” and are “difficult to sufficiently capture and understand all intended and unintended consequences.”

Terminator teams, led by humans

The Autonomy roadmap document clearly confirms that the Pentagon’s final objective is to delegate the bulk of military operations to autonomous machines, capable of inflicting “Collective Defeat of Hard and Deeply Buried Targets.”

One type of machine agent is the “Autonomous Squad Member (Army)”, which “Integrates machine semantic understanding, reasoning, and perception into a ground robotic system”, and displays:

“Early implementation of a goal reasoning model, Goal-Directed Autonomy (GDA) to provide the robot the ability to self-select new goals when it encounters an unanticipated situation.”

Human team members in the squad must be able “to understand an intelligent agent’s intent, performance, future plans and reasoning processes.”

Another type is described under the header, ‘Autonomy for Air Combat Missions Team (AF).’

Such an autonomous air team, the document envisages, “Develops goal-directed reasoning, machine learning and operator interaction techniques to enable management of multiple, team UAVs.” This will achieve:

“Autonomous decision and team learning enable the TBM [Tactical Battle Manager] to maximize team effectiveness and survivability.”

TBM refers directly to a battle management autonomy software for unmanned aircraft.

The Pentagon still, of course, wants to ensure that there remains a human manual override, which the document describes as enabling a human supervisor “to ‘call a play’ or manually control the system.”

Targeting evil antiwar bloggers

Yet the biggest challenge, nowhere acknowledged in any of the documents, is ensuring that automated AI target selection actually selects real threats, rather than generating or pursuing false positives.

According to the Human Systems roadmap document, the Pentagon has already demonstrated extensive AI analytical capabilities in real-time social media analysis, through a NATO live exercise last year.

During the exercise, Trident Juncture — NATO’s largest exercise in a decade — US military personnel “curated over 2M [million] relevant tweets, including information attacks (trolling) and other conflicts in the information space, including 6 months of baseline analysis.” They also “curated and analyzed over 20K [i.e. 20,000] tweets and 700 Instagrams during the exercise.”

The Pentagon document thus emphasizes that the US Army and Navy can now already “provide real-time situation awareness and automated analytics of social media sources with low manning, at affordable cost”, so that military leaders can “rapidly see whole patterns of data flow and critical pieces of data” and therefore “discern actionable information readily.”

The primary contributor to the Trident Juncture social media analysis for NATO, which occurred over two weeks from late October to early November 2015, was a team led by information scientist Professor Nitin Agarwal of the University of Arkansas, Little Rock.

Agarwal’s project was funded by the US Office of Naval Research, Air Force Research Laboratory and Army Research Office, and conducted in collaboration with NATO’s Allied Joint Force Command and NATO Strategic Communications Center of Excellence.

Slides from a conference presentation about the research show that the NATO-backed project attempted to identify a hostile blog network during the exercise containing “anti-NATO and anti-US propaganda.”

Among the top seven blogs identified as key nodes for anti-NATO internet traffic were websites run by Andreas Speck, an antiwar activist; War Resisters International (WRI); and Egyptian democracy campaigner Maikel Nabil Sanad — along with some Spanish language anti-militarism sites.

Andreas Speck is a former staffer at WRI, which is an international network of pacifist NGOs with offices and members in the UK, Western Europe and the US. One of its funders is the Joseph Rowntree Charitable Trust.

The WRI is fundamentally committed to nonviolence, and campaigns against war and militarism in all forms.

Most of the blogs identified by Agarwal’s NATO project are affiliated to the WRI, including for instance nomilservice.com, WRI’s Egyptian affiliate founded by Maikel Nabil, which campaigns against compulsory military service in Egypt. Nabil was nominated for the Nobel Peace Prize and even supported by the White House for his conscientious objection to Egyptian military atrocities.

The NATO project urges:

“These 7 blogs need to be further monitored.”

The project was touted by Agarwal as a great success: it managed to extract 635 identity markers through metadata from the blog network, including 65 email addresses, 3 “persons”, and 67 phone numbers.

This is the same sort of metadata that is routinely used to help identify human targets for drone strikes — the vast majority of whom are not terrorists, but civilians.

Agarwal’s conference slides list three Pentagon-funded tools that his team created for this sort of social media analysis: Blogtracker, Scraawl, and Focal Structures Analysis.

Flagging up an Egyptian democracy activist like Maikel Nabil as a hostile entity promoting anti-NATO and anti-US propaganda demonstrates that when such automated AI tools are applied to war theatres in complex environments (think Pakistan, Afghanistan and Yemen), the potential to identify individuals or groups critical of US policy as terrorism threats is all too real.

This case demonstrates how deeply flawed the Pentagon’s automation ambitions really are. Even with the final input of independent human expert analysts, entirely peaceful pro-democracy campaigners who oppose war are relegated by NATO to the status of potential national security threats requiring further surveillance.

Compressing the kill chain

It’s often assumed that DoD Directive 3000.09 issued in 2012, ‘Autonomy in Weapon Systems’, limits kill decisions to human operators under the following stipulation in clause 4:

“Autonomous and semi-autonomous weapon systems shall be designed to allow commanders and operators to exercise appropriate levels of human judgment over the use of force.”

After several paragraphs underscoring the necessity of target selection and execution being undertaken under the oversight of a human operator, the Directive goes on to open up the possibility of developing autonomous weapon systems without any human oversight, albeit with the specific approval of senior Pentagon officials:

“Autonomous weapon systems may be used to apply non-lethal, non-kinetic force, such as some forms of electronic attack, against materiel targets… Autonomous or semi-autonomous weapon systems intended to be used in a manner that falls outside the policies in subparagraphs 4.c.(1) through 4.c.(3) must be approved by the Under Secretary of Defense for Policy (USD(P)); the Under Secretary of Defense for Acquisition, Technology, and Logistics (USD(AT&L)); and the CJCS before formal development and again before fielding.”

Rather than prohibiting the development of lethal autonomous weapon systems, the directive simply consolidates all such developments under the explicit authorization of the Pentagon’s top technology chiefs.

Worse, the directive expires on 21st November 2022 — which is around the time such technology is expected to become operational.

Indeed, later that year, Lieutenant Colonel Jeffrey S. Thurnher, a US Army lawyer at the US Naval War College’s International Law Department, published a position paper in the National Defense University publication, Joint Force Quarterly.

If these puppies became self-aware, would they be cuter?

He recommended that there were no substantive legal or ethical obstacles to developing fully autonomous killer robots — as long as such systems are designed in such a way as to maintain a semblance of human oversight through “appropriate control measures.”

In the conclusions to his paper, titled No One At The Controls: Legal Implications of Fully Autonomous Targeting, Thurnher wrote:

“LARs [lethal autonomous robots] have the unique potential to operate at a tempo faster than humans can possibly achieve and to lethally strike even when communications links have been severed. Autonomous targeting technology will likely proliferate to nations and groups around the world. To prevent being surpassed by rivals, the United States should fully commit itself to harnessing the potential of fully autonomous targeting. The feared legal concerns do not appear to be an impediment to the development or deployment of LARs. Thus, operational commanders should take the lead in making this emerging technology a true force multiplier for the joint force.”

Lt. Col. Thurnher went on to become a Legal Advisor for NATO Rapid Deployable Corps in Munster, Germany. In this capacity, he was a contributor to a little-known 2014 official policy guidance document for NATO Allied Command Transformation, Autonomy in Defence Systems.

The NATO document, which aims to provide expert legal advice to government policymakers, sets out a position in which the deployment of autonomous weapon systems for lethal combat — in particular the delegation of targeting and kill decisions to machine agents — is viewed as being perfectly legitimate in principle.

It is the responsibility of specific states, the document concludes, to ensure that autonomous systems operate in compliance with international law in practice — a caveat that also applies for the use of autonomous systems for law-enforcement and self-defence.

In the future, though, the NATO document points to the development of autonomous systems that can “reliably determine when foreseen but unintentional harm to civilians is ethically permissible.”

Acknowledging that currently only humans are able to make a “judgement about the ethical permissibility of foreseen but unintentional harm to civilians (collateral damage)”, the NATO policy document urges states developing autonomous weapon systems to ensure that eventually they “are able to integrate with collateral damage estimation methodologies” so as to delegate targeting and kill decisions accordingly.

The NATO position is particularly extraordinary given that international law — such as the Geneva Conventions — defines foreseen deaths of civilians caused by a military action as intentional, precisely because they were foreseen yet actioned anyway.

The Statute of the International Criminal Court (ICC) identifies such actions as “war crimes”, if a justifiable and direct military advantage cannot be demonstrated:

“… making the civilian population or individual civilians, not taking a direct part in hostilities, the object of attack; launching an attack in the knowledge that such attack will cause incidental loss of civilian life, injury to civilians or damage to civilian objects which would be clearly excessive in relation to the concrete and direct military advantage anticipated;… making civilian objects, that is, objects that are not military objectives, the object of attack.”

And customary international law recognizes the following acts as war crimes:

“… launching an indiscriminate attack resulting in loss of life or injury to civilians or damage to civilian objects; launching an attack against works or installations containing dangerous forces in the knowledge that such attack will cause excessive incidental loss of civilian life, injury to civilians or damage to civilian objects.”

In other words, NATO’s official policy guidance on autonomous weapon systems sanitizes the potential for automated war crimes. The document actually encourages states to eventually develop autonomous weapons capable of inflicting “foreseen but unintentional” harm to civilians in the name of securing a ‘legitimate’ military advantage.

Yet the NATO document does not stop there. It even goes so far as to argue that policymakers considering the development of autonomous weapon systems for lethal combat should reflect on the possibility that delegating target and kill decisions to machine agents would minimize civilian casualties.

Skynet, anyone?

A new report by Paul Scharre, who led the Pentagon working group that drafted DoD Directive 3000.09 and now heads up the future warfare program at the Center for New American Security in Washington DC, does not mince words about the potentially “catastrophic” risks of relying on autonomous weapon systems.

“With an autonomous weapon,” he writes, “the damage potential before a human controller is able to intervene could be far greater…

“In the most extreme case, an autonomous weapon could continue engaging inappropriate targets until it exhausts its magazine, potentially over a wide area. If the failure mode is replicated in other autonomous weapons of the same type, a military could face the disturbing prospect of large numbers of autonomous weapons failing simultaneously, with potentially catastrophic consequences.”

Scharre points out that “autonomous weapons pose a novel risk of mass fratricide, with large numbers of weapons turning on friendly forces,” due to any number of potential reasons, including “hacking, enemy behavioral manipulation, unexpected interactions with the environment, or simple malfunctions or software errors.”

Noting that in the software industry, for every 1,000 lines of code, there are between 15 and 50 errors, Scharre points out that such marginal, routine errors could easily accumulate to create unexpected results that could be missed even by the most stringent testing and validation methods.

The more complex the system, the more difficult it will be to verify and track the system’s behavior under all possible conditions: “… the number of potential interactions within the system and with its environment is simply too large.”

The documents discussed here show that the Pentagon is going to pains to develop ways to mitigate these risks.

But as Scharre concludes, “these risks cannot be eliminated entirely. Complex tightly coupled systems are inherently vulnerable to ‘normal accidents.’ The risk of accidents can be reduced, but never can be entirely eliminated.”

As the trajectory toward AI autonomy and complexity accelerates, so does the risk that autonomous weapon systems will, eventually, wreak havoc.

Dr Nafeez Ahmed is an investigative journalist, bestselling author and international security scholar. A former Guardian writer, he writes the ‘System Shift’ column for VICE’s Motherboard, and is a weekly columnist for Middle East Eye.

He is the winner of a 2015 Project Censored Award for Outstanding Investigative Journalism for his Guardian work, and was twice selected in the Evening Standard’s top 1,000 most globally influential Londoners, in 2014 and 2015.

Nafeez has also written and reported for The Independent, Sydney Morning Herald, The Age, The Scotsman, Foreign Policy, The Atlantic, Quartz, Prospect, New Statesman, Le Monde diplomatique, New Internationalist, The Ecologist, Alternet, Counterpunch, Truthout, among others.

He is a Visiting Research Fellow at the Faculty of Science and Technology at Anglia Ruskin University, where he is researching the link between global systemic crises and civil unrest for Springer Energy Briefs.

Nafeez is the author of A User’s Guide to the Crisis of Civilization: And How to Save It (2010), and the scifi thriller novel ZERO POINT, among other books. His work on the root causes and covert operations linked to international terrorism officially contributed to the 9/11 Commission and the 7/7 Coroner’s Inquest.


This story is being released for free in the public interest, and was enabled by crowdfunding. I’d like to thank my amazing community of patrons for their support, which gave me the opportunity to work on this story. Please support independent, investigative journalism for the global commons via Patreon.com, where you can donate as much or as little as you like.

 

The Pentagon is building a ‘self-aware’ killer robot army fueled by social media — INSURGE intelligence — Medium.

Transforming Our Communities Ourselves With Technology

microfactoryBy Brian Berletic

Many people may mistakenly believe that the future is something that others, like big companies or governments usher in and that they themselves play either a minor active role, or one that is entirely passive. In reality, there are already groups of regular people just like you or me around the world literally building the future of their communities themselves with their own two hands and in collaboration with their friends, family, neighbors, and through the power of the Internet, with like-minded individuals around the world.

Above image: Instead of some planned community built by government or developers, we can add a layer of opensource technology over our existing communities, on our rooftops, in our offices, and at existing public spaces or markets. In addition to this added layer of physical technology, a little change in our mindset will go a long way in transforming our communities.

Because of the exponential progress of technology, the impact of small, organized projects is increasing as well. Think about 3D printing and how for many years it remained firmly in the realm of large businesses for use in prototyping. It was only when small groups of enthusiastic hobbyists around the world began working on cheaper and more accessible versions of these machines that they ended up on the desktops of regular people around the world, changing the way we look at manufacturing.

Similar advances in energy production, biotechnology, agriculture, IT, and manufacturing technology are likewise empowering people on a very distributed and local level.

What we see emerging is a collection of local “institutions” giving people direct access to the means to change their communities for the better, bypassing more abstract and less efficient means of effecting change like voting or protesting.

Political processes, however, will become more relevant and practical when people actually have resources and direct hands-on experience in the matters of running their communities. Demanding more of those that represent you will have more meaning when those demands are coupled with practical solutions and enumerated plans of action.

asset3D printing has come a long way since the first RepRap desktop printers and their derivatives which includes MakerBot’s first designs. 3D printing has gone from an obscure obsession among hobbyists to a mainstream phenomenon that is transforming the way we look at manufacturing. 

Let’s explore these “institutions” and see what is possible, what is already being done, and how you can get involved today in physically shaping your community’s future starting today.

Makerspaces

A makerspace is exactly what it sounds like: a space where you make things. However, it is often associated with computer controlled personal manufacturing technology like 3D printers, CNC mills, and laser and/or waterjet cutters. There is also a significant amount of electronic prototyping equipment on hand including opensource development boards like the Arduino, which allows virtually anyone to control physical objects in the real world.

OMG_SGA well-equipped makerspace in Singapore. 

Makerspaces also generally include a small core team with skills ranging from design and engineering to software development. These teams usually are eager to bring in new people and introduce them to the tools, techniques, and technology they are so passionate about.

Makerspaces already exist around the world and it is very likely that no matter where you live, you have one relatively nearby. Makerspaces hold workshops for both absolute beginners and experienced tech enthusiasts.

11831662_10153498305854054_7334928807928857564_nMakerspaces hold frequent workshops to share their knowledge and enthusiasm with others, often absolute beginners. There is a good chance your local makerspace has workshops available. Some are even free.

You can prototype virtually anything in a makerspace, making it the perfect place to go when you have a problem and want to develop a practical, tangible solution to solve it. Everything from an opensource solar charger to a new kind of 3D printer could be (and has been) made at a makerspace, making it the perfect nexus for our local community and the variety of other local institutions that may crop up there.

Local Agriculture

A combination of rediscovered traditional practices combined with modern technology makes local food production both practical and profitable. Community gardens are not uncommon, and there is a growing interest around the world, particularly in urban areas to utilize the sun-soaked rooftops to grow food with which to consume or distribute to local restaurants and markets.

6512514787_19c44032c3_bUS-based Growing Power proves what communities can accomplish by working together. They have proven that community urban agriculture can be both practical and profitable, with their project becoming not just a local business, but a resource for the community as well. 

The Comcrop project in Singapore provides a particularly impressive example, having been in operation for several years now, serving not only as a source of locally produced food for restaurants and grocery stores, but also as a community resources teaching all who are interested how to raise crops in a dense urban environment like that found in Singapore.

1533928_389833864495338_1822153760_nSingapore’s Comcrop project has proven that even in the densest of urban environments, agriculture can be carried out by communities for profit, fun, and education. Collaboration with local makerspaces could further enhance their operation’s efficiency.  

Another impressive example of local agriculture is US-based Growing Power where greenhouses, vermiculture, and aquaponics are all combined to generate an immense amount of food feeding into a local distribution network the project has diligently developed over the years.

Local food production and distribution is steadily expanding around the world as the concept of farmers’ markets spread and entire communities of both producers and consumers connect in a much more relevant, transparent, and beneficial manner than possible under the existing mass consumerist paradigm of big-ag and big-box stores.

Applying the resources found at a makerspace to local agriculture gives us the ability to take organic agriculture and increase its efficiency through automation. That’s the idea behind ProgressTH’s own automated agriculture project, and others like it. There is no reason why local communities cannot have locally produced organic food, and utilize technology to bring efficiency on par with that claimed by large-scale operations.

Power Production

Modern civilization does not function without electrical power, something we are reminded of every time the power goes out during a storm. Currently, most of the world’s power still comes from centralized national grids and large power plants.

3017799-poster-solarcityDropping prices and increasing capabilities is making solar power an attractive means to help decentralize and localize power production. 

However, the march forward of technology is finally making the means of producing power locally more accessible to more people around the world. An extreme example of a localized, distributed power grid can be found in the remote hills of Thailand’s Phetchaburi province where the national power grid never quite made it. A local team created a tech-center of sorts where villagers were trained in the designing and installation of solar power systems, bringing the village light and power for irrigation house-by-house. The villagers have created a sort of collaborative network where everyone helps out when expanding the network’s capabilities.

12376007_1741837166035713_3364478883118053319_nThe Pedang Project in Phetchaburi, Thailand has literally brought power to a tiny remote village isolated from the national power grid.  Now it is taking its experience and sharing it with others around the country to replicate their success.

This network also trains people from all over the country to replicate their success elsewhere, even in areas where the national grid does reach, but where independence in power production is still sought.

This includes a school halfway across the country that is entirely solar powered which has incorporated alternative energy in the curriculum giving students practical experience and skills to use once they graduate.

3609A5FD89134C30889AEFF923B80445A school in Thailand’s northeast has also become a center for alternative energy and organic agriculture, all of which is combined with more traditional curriculum. Students grow their own food and help maintain the solar power system that powers the school during studying hours. 

Imagine every community, rural or urban, developing their own alternative power solutions themselves, managing both the physical infrastructure and the knowledge required to maintain it. It doesn’t necessarily need to replace current power production, but it could augment it until technology makes it possible for complete, localized and distributed power production.

Healthcare + DIYbio

Makerspaces are already collaborating with hospitals and healthcare professionals around the world to speed up the process of developing solutions to everyday problems, or lower the costs of existing solutions that remain out of reach for many patients.

makerhealth-space-utmbThis healthcare professional is working on a prototype in a makerspace placed literally within the hospital he works at.

MIT’s MakerNurse program is one example of this. Bangkok-based QSNICH (Queen Sirikit National Institute of Child Health) is another example. Decentralizing and opening up the development of biomedical technology is key to lowering its prices. While subsidizing healthcare now is necessary to ensure people who cannot afford treatment can still get it, in the future, healthcare will be so cheap such subsidies will have less impact on the quantity and quality of care.

Biomedical technology, the hardware you see in hospitals is one thing, the actual pharmaceuticals and therapies administered to patients is another. DIYbio (do-it-yourself biology) is a growing community much like the maker movement that seeks to open up biotechnology to a wider audience by lowering the cost of equipment and opening up knowledge by making their work collaborative, transparent and, most importantly, opensource.

CAM046523D-printed prototypes developed for healthcare professionals at a Bangkok-based children’s hospital by ProgressTH’s in-house makerspace. 

And, believe it or not, cutting-edge technology like gene therapy which has actually already cured cancer in terminal leukemia patients and shown promise in clinical trials for everything from heart disease to blindness and deafness is being approached by the DIYbio community. For now, it borders between something like a community lab and a small start-up company, as is the case with Bioviva or Andrew Hessel’s Pink Army Cooperative. In the future, we can see current collaborations between makerspaces and healthcare professionals extending and evolving between biotech researchers and local community labs.

5633564fc361888e528b460eLiz Parrish of Bioviva is blurring the lines between traditional R&D and accelerated and smaller-scale progress in developing therapies for patients. 

Again, the makerspace allows for the prototyping and development of much of the opensource biotech equipment already being produced and making headlines around the world.

Microfactories

Microfactories are localized manufacturing facilities that specialize in small-run production. Say that you create a brilliant prototype at your local makerspace, but need to make only 100-200 of them at a time. Traditional factories because of current economies of scale usually will not help you, at least not for a reasonable price. Microfactories can fill the void between makerspace prototypes and mass production.

08_firstbuild-hackathon-28Microfactories already exist, but require large capital investments for the amount of machinery required to efficiently carry out small-run production. Advances in personal manufacturing will continue to lower these barriers, and many makerspaces around the world are already working to bridge the gap between prototyping and small-run production.

In the future, microfactories may evolve into an entire network of distributed manufacturing making mass production obsolete. This is, again, dependent on the progress of manufacturing technology. When computer-controlled manufacturing processes like CNC mills and 3D printers can handle more materials, faster, and more efficiently, small-run production will become more and more practical.

And already, microfactories are going from concepts to actual physical locations as is the case with the GE-backed FirstBuild microfactory in the US. In Thailand, electronics company Gravitech has created a production facility just north of Bangkok making Arduino-compatible boards for the local market cheaper and of better quality than could be imported.

aCAM04834An Arduino-compatible board made in Thailand for the Thai market beats out Chinese-made boards both in quality and even price. This is part of a trend toward the gradual reduction of manufacturing “hubs” and lead toward a more distributed and local means of manufacturing.

This is just the leading edge of a shifting paradigm toward fully distributed manufacturing. Again, makerspaces will play a crucial role, providing educational and training resources for the local community to learn how to design and develop ideas into prototypes and then pass them on to local microfactories for production and distribution.

microfactory-typeLocal Motors is pioneering the concept of distributed car manufacturing. Microfactories in the future may make everything from handheld devices to something as big as a car, on demand or in small runs that will challenge or entirely shift our current globalized manufacturing paradigm. 

Just how far could this go? Looking at US-based Local Motors, who is attempting to create (which much success) a distributed auto-manufacturing network, it can probably end up encompassing nearly everything we use on a daily basis short of aerospace and architecture. With 3D-printed buildings cropping up around the world, each community might have their own cooperative-owned system for that as well.

Other Possibilities

Maybe now you can see how communities possessing these key institutions could begin to tackle their problems head on, practically, with tangible solutions instead of waiting for others, far away, to address them for them. By doing so, people will become more directly involved in their own destiny, possessing both skills and experience in running and improving their communities, giving them better insight and discretion when engaging in political processes beyond their community.

And because of the talent that is attracted to and produced within makerspaces, the means of creating, for example, parallel mesh communication networks or water production and distribution systems, could exist as well. Virtually everything in one’s community could end up a product of local talent, entrepreneurial vision, and innovation.

But it is important to remind potential critics that this is not a process toward tens of thousands of isolated communities scattered across the planet. Like makerspaces today, while each one possesses its own tools and talent, they are all connected and collaborating together with other spaces around the world taking and adapting great ideas when needed, while sharing their own success with others through an opensource culture.

The distributed nature of these economic, manufacturing, healthcare, agricultural, and infrastructure networks also means more resilience, especially because they are collaborative on a much larger scale. There is no single power plant or agricultural region to “wipe out” to plunge a huge population dependent on either into crisis. Disasters and crises can be absorbed and compensated for by neighboring communities unaffected. The loss of power in one community will not affect another if both are self-sufficient in power production. However, temporary assistance would be possible for one community to lend another.

“Standards,” if you will, would still exist, honed not through legality and policy, but through actual performance data, user feedback, and reputation. And because this process by its very nature is a flexible one, unforeseen opportunities and threats could be capitalized on or met as needed.

How Can You Get Involved Today?

Yes, you can get involved today! All you have to do is find your closest makerspace (or here) and drop by to check it out. You can also begin teaching yourself by taking advantage of the huge amount of fully free resources online covering everything from the basics of 3D printing, to opensource electronics, to local organic agriculture, to DIYbio. Let your favorite Internet search engine be your guide and find the resources you find most useful to your own style of learning. On YouTube alone, by simply typing any area of interest in, you can usually find dozens of tutorials and presentations.

uB8qp72A makerspace in Chiang Mai, Thailand. Just a few years ago, there were no makerspaces at all in Thailand, now there are clubs and spaces from north to south and a growing community connected through collaboration and enthusiasm about the power of hands-on innovations and solutions.

Get your friends involved; and if none are interested, it is easy to make new friends who are interested in this shifting paradigm, since “collaboration” is in fact at the very heart of it. If you are in Bangkok, feel free to contact us for workshops that ProgressTH and its many friends have on offer, some of which are even free.

The most important thing to remember is, no matter how small your progress is day to day, it will all add up in a year’s time to something that will surely surprise you. The only sure way to fail is by doing nothing — after all, zero times all the days in the year still only equals zero. You do not need to be a trained engineer or professional designer, biologist, or experienced farmer to begin building up your local community. Many of the most prominent names contributing to this current paradigm are college dropouts, or entirely self-taught. You will surely run into professionals, however, and you will learn a lot from them.

It is a truly exciting journey, and one that will have direct benefit to both yourself and your community. You can do it part-time in addition to your existing job. And many have ended up making a living full-time by contributing. We have, and will continue covering this unfolding movement, and we would love to cover your contributions… so start contributing!

Brian Berletic writes for Progress Thailand. Follow ProgressTH.org on Facebook here or on Twitter here.

Transforming Our Communities Ourselves With Technology.

German Supermarket Chain Bans Bee-Killing Neonic Pesticides on Produce

pesticides-aldi-sud-image-735-350

The New Year starts with more positive news. Aldi Süd, a German supermarket chain with stores in the U.S., has become the first major European retailer to ban pesticides toxic to bees, including the neonicotinoids imidacloprid, clothianidin, and thiamethoxam, from all produce sold in their stores. [1]

The announcement was made January 1st, with the retailer expecting fruit and vegetable suppliers for their stores to comply with their new policy ASAP. The following pesticides will no longer be tolerated:

  • Thiamethoxam
  • Chlorpyrifos
  • Clothianidin
  • Cypermethrin
  • Deltamethrin
  • Fipronil
  • Imidacloprid
  • Sulfoxaflor

The decision to ban bee-toxic pesticides comes following public pressure, and follows another German retailer’s decision to ban the herbicide chemical glyphosate – another toxic compound that is fueling numerous problems.

According to a press release from Greenpeace, the chemicals are used on various commodities in Europe:

  • Thiamethoxam – applied to lettuce and endive
  • Chlorpyrifos, clothianidin – applied to kohlrabi, herbs, Brussels sprouts, head cabbage, cauliflower, and kale
  • Cypermethrin – applied to leek, head cabbage, and leguminous vegetables
  • Deltamethrin – applied to cauliflower, peppers, eggplant, zucchini, cucumber, pea, head cabbage, tomato, and lettuce
  • Imidacloprid – applied to apples, peaches, apricots, and lettuce
  • Sulfoxaflor was recently granted regulatory approval in Europe, despite calls and legal action to prohibit its registration [2]

The UK’s largest garden retailers, including Homebase, B&Q, and Wickes have already voluntarily stopped selling neonicotinoids.

These pesticides have proven to cause problems for bee reproduction, navigation, and foraging, as well as the suppression of bee immune systems. Just this month, the U.S. Environmental Protection Agency (EPA) released its preliminary pollinator assessment for the neonic imidacloprid which finds various residues of the chemical in crops where the pollinators forage, and confirms bees’ widespread and sustained exposure to the highly toxic and persistent chemical through poisoned pollen and nectar.

Sadly, requests for our government agencies to ban these pesticides have been ignored.

Thanks Aldi, for doing the right thing and protecting the bees!

by Christina Sarich

 

Sources:

[1] BeyondPesticides

[2] BeyondPesticides/resources/pesticide-gateway?

Image used from: Spiegel.de

 

Source : Natural Society.

China Just Launched the Most Frightening Game Ever — and Soon It Will Be Mandatory

(ANTIMEDIA) Oceania, China — As if further proof were needed Orwell’s dystopia is now upon us, China has now gamified obedience to the State. Though that is every bit as creepily terrifying as it sounds, citizens may still choose whether or not they wish to opt-in — that is, until the program becomes compulsory in 2020. “Going under the innocuous name of ‘Sesame Credit,’ China has created a score for how good a citizen you are,” explains Extra Credits’ video about the program. “The owners of China’s largest social networks have partnered with the government to create something akin to the U.S. credit score — but, instead of measuring how regularly you pay your bills, it measures how obediently you follow the party line.

In the works for years, China’s ‘social credit system’ aims to create a docile, compliant citizenry who are fiscally and morally responsible by employing a game-like format to create self-imposed, group social control. In other words, China gamified peer pressure to control its citizenry; and, though the scheme hasn’t been fully implemented yet, it’s already working — insidiously well.

Zheping Huang, a reporter for Quartz, chronicled his own experience with the social control tool in October, saying that “in the past few weeks I began to notice a mysterious new trend. Numbers were popping up on my social media feeds as my friends and strangers on Weibo [the Chinese equivalent to Twitter] and WeChat began to share their ‘Sesame Credit scores.’ The score is created by Ant Financial, an Alibaba-affiliated company that also runs Alipay, China’s popular third-party payment app with over 350 million users. Ant Financial claims that it evaluates one’s purchasing and spending habits in order to derive a figure that shows how creditworthy someone is.”

However, according to a translation of the “Planning Outline for the Construction of a Social Credit System,” posted online by Oxford University’s China expert, Rogier Creemers, it’s nightmarishly clear the program is far more than just a credit-tracking method. As he described it, “The government wants to build a platform that leverages things like big data, mobile internet, and cloud computing to measure and evaluate different levels of people’s lives in order to create a gamified nudging for people to behave better.”

While Sesame Credit’s roll-out in January has been downplayed by many, the American Civil Liberties Union, among others, urges caution, saying:

“The system is run by two companies, Alibaba and Tencent, which run all the social networks in China and therefore have access to a vast amount of data about people’s social ties and activities and what they say. In addition to measuring your ability to pay, as in the United States, the scores serve as a measure of political compliance. Among the things that will hurt a citizen’s score are posting political opinions without prior permission, or posting information that the regime does not like, such as about the Tiananmen Square massacre that the government carried out to hold on to power, or the Shanghai stock market collapse. It will hurt your score not only if you do these things, but if any of your friends do them.” And, in what appears likely the goal of the entire program, added, “Imagine the social pressure against disobedience or dissent that this will create.”

Social pressure, of course, can be highly effective given the right circumstances. China seems to have found exactly that in the intricate linking of people’s scores to their contacts, which can be seen publicly by anyone — and then upping the ante through score-based incentives and rewards. Rick Falkvinge pointed out a startling comparison:

The KGB and the Stasi’s method of preventing dissent from taking hold was to plant so-called agents provocateurs in the general population, people who tried to make people agree with dissent, but who actually were arresting them as soon as they agreed with such dissent. As a result, nobody would dare agree that the government did anything bad, and this was very effective in preventing any large-scale resistance from taking hold. The Chinese way here is much more subtle, but probably more effective still.”

As Creemers described to Dutch news outlet, de Volkskrant, “With the help of the latest internet technologies, the government wants to exercise individual surveillance. The Chinese aim […] is clearly an attempt to create a new citizen.”

Chinese internet specialist at the Swedish Institute of International Affairs, Johan Lagerkvist, said the system is“very ambitious in scope, including scrutinizing individual behavior and what books people read. It’s Amazon’s consumer tracking with an Orwellian political twist.”

James Corbett has been tracking the implementation of Sesame Credit for some time. Introducing the ubiquitous tracking system for a recent episode of the Corbett Report, he mused:

“Coming soon to a New World Order near you: social credit! Earn points by behaving like the government wants you to behave! Get penalized if you don’t act like a doubleplusgood citizen! What could be more fun?”

Indeed, because mandatory enrollment in Sesame Credit is still a few years away, its true effectiveness won’t be measurable for some time. But even a reporter’s usual wariness appears knocked off-kilter, as Zheping Huang summarized his personal experience: “Even if my crappy credit score doesn’t mean much now, it’s in my best interest I suppose to make sure it doesn’t go too low.”

And that, of course, is precisely why gamifying State obedience is so terrifying.

Claire Bernish


 

This article (China Just Launched the Most Frightening Game Ever — and Soon It Will Be Mandatory) is free and open source. You have permission to republish this article under a Creative Commons license with attribution to Claire Bernish and theAntiMedia.org. Anti-Media Radio airs weeknights at 11pm Eastern/8pm Pacific. If you spot a typo, email edits@theantimedia.org.

 

Source : The Anti Media

Something—we’re not sure what—is radically dimming a star’s light

 

NASA’s Kepler spacecraft, designed to discover planets orbiting distant stars, has turned up something that’s decidedly not a planet. And at this point, that’s pretty much all we can say about it—except that it’s a mystery.

Of all the stars in the Kepler field of view, KIC 8462852 seems to be a special snowflake.

A star that Kepler has been observing, KIC 8462852, underwent several periods of dimming. This is exactly what Kepler was built to look for, because a slight dimming in a star’s light can indicate the presence of a planet passing in front of it. But this is no slight dip in the star’s light output—it dims by a full 20 percent. That’s way too much change for any transiting planet to produce. So, as two researchers titled their paper, “Where’s the Flux?”

The paper exhaustively examines various possible identities for the phenomena. They settle on a most likely scenario, but clearly this is one of the many cases in science where future work is needed.

Planet hunters

While Kepler focuses on a relatively small patch of sky—about 100 square degrees, while the whole sky is about 41,253—there are a lot of stars within that patch, and it followed more than 150,000 of them. That’s way too much data for the researchers to search individually. Instead, they use algorithms that look for repeating patterns, like periodic dips in a star’s flux (light output).

But that approach lacks a certain human touch—it won’t spot anything that’s unexpected, since that won’t be incorporated into the algorithm. So to complement it, researchers relied on a citizen science project called Planet Hunters. Astronomy enthusiasts among the public were given the chance to pore over the data by eye. It was the Planet Hunters project that discovered KIC 8462852, marking it as an interesting object.

In just the first quarter of Kepler’s mission, volunteers had identified it as “bizarre,” “interesting,” and a “giant transit.” As new data on the star was released, discussions continued on the “talk” page of the Planet Hunters site, where it became increasingly apparent something was afoot.

Rises and dips

Kepler checked the star using a series of 30-minute observations throughout the duration of its mission. For most of that time, the flux remained constant, but there were a number of significant departures from that.

After two small dips in 2009, which had attracted the notice of the Planet Hunters, there was another major dip of about 15 percent in 2011, and it lasted nearly a week. Finally, there was a whole series of dips in 2013, one of them managing to dim the star’s light by 22 percent.

To figure out if any of these changes are periodic, or at least have a periodic component, the researchers used a mathematical tool called a Fourier transform, which breaks signals down into the frequencies that make them up. It turns out there is indeed a regular period embedded in there, a rather short 0.88 days (or 1.14 cycles per day).

This number is pretty much what researchers would expect for a star like KIC 8462852, as it could represent the rotation of the star itself. They were able to calculate the star’s size as a result—they found that it was consistent with a normal F type star. Could the rotation of disturbances on the surface of the star itself explain the strange reduction?

Not entirely. The Fourier transform graph reveals that something more complex is going on, as there are a few other periodic signals that also contribute to the signal. In other words, it still looks a lot like a type F star, but its rotation leaves a number of signals unaccounted for.

Looking closer

The duo then turned to the ground-based Nordic Optical Telescope in the Roque de los Muchachos (Castle of the Kids) observatory of La Palma, Spain. They used it to obtain some spectroscopic data on the star during the period in question, to complement Kepler’s observations. Most of these results are fairly typical for an F-type star, though they do provide extra details about the star itself.

But the spectra also revealed the presence of some interstellar gas in our line of sight to the star.

The researchers also predicted the presence of a companion star not too far away, which they then detected using the Keck II telescope in Hawaii. They can’t confirm that the companion is physically bound to KIC 8462852, rather than simply a background or foreground star, but they estimate that there’s only a one percent chance that it’s not part of the physical system.

But given its distance, the companion can’t really affect the star directly. Still, it might perturb the orbits of any other objects in the system over the long-term.

Explanations

The researchers then wondered if KIC 8462852 was the only star in the Kepler data behaving in this strange way. To find out, they constructed an algorithm to search for similar extreme dips in the star’s brightness. They found over a thousand of them, but the rest turned out to be either binary systems undergoing eclipses, sunspot activity, or errors in the Kepler instrument itself. When they’d reviewed all the candidates, not a single other star had the same behavior.

That means it’s likely not a common phenomenon. So what is it? The main problem is that, while there is periodicity within the dimming pattern, the full, overall pattern is not periodic. Multiple events that aren’t periodic are hard to create a model for. But the researchers evaluated as many possibilities as they could think of. These are:

  • Instrument or data errors: The first possibility the researchers discuss is that the dimmings are caused by the instrument itself, just like a smudge on your camera lens can produce an image that looks like a UFO. To rule out these glitches, they applied data analysis algorithms, checked to make sure no cosmic ray events were recorded at the same times as the dips (as those can sometimes cause errors in electronic devices), looked at the light from neighboring sources recorded by Kepler to see if those displayed the same patterns (they didn’t), and more. At the end of this analysis, the researchers concluded that the pattern Kepler’s seeing is not a technical problem—it’s a real astrophysical event.
  • Variable stars: Some stars see their brightness vary naturally. But KIC 8462852 doesn’t match the characteristics of most known variables. There is, however, one type that could almost fit the bill and could even explain some of the weirdness in KIC 8462852’s graph. These are Be stars, and they’re spinning so fast they’re essentially breaking up, ejecting material every so often. This is often seen as a bright emission, but sometimes it can cause dimming. But Be stars produce excess infra-red light, which isn’t the case here; the star’s temperature is also wrong, among other issues. Close, but no pez.
  • Dust getting in the way: Another possibility is clumps of dust loosely orbiting the star, periodically obscuring it. While there’s no way to rule this one out, the researchers “disfavor” it, because KIC 8462852 doesn’t seem to be a young star, and older stars don’t tend to maintain these sorts of dusty disks (they tend to condense into planets).
  • Debris getting in the way: It’s possible that the system has an equivalent (but far more dense) version of our asteroid field. If so, maybe some of that material is getting in the way. Alternatively, objects like broken up comets or debris from planetary collisions could cause dimmings. This one is actually something of a promising possibility, so the researchers discuss it in more detail.

Constraints

If something is getting in the way of the star, the first step would be to figure out how big it is and how close it is to the star. In that way, the researchers put constraints on it. For example, to block this much light, it could either be big and close to the star or smaller and far from the star. But if it’s small and far away, it couldn’t be moving fast enough to produce the right duration for the dips in brightness. All of these put constraints on the object(s).

Similarly, you can constrain the minimum possible size of the clumps by looking at the depths of the dips. It turns out that at least some of the clumps have to be a significant fraction of the size of the star. The authors found a number of similar constraints based on other characteristics of the observations.

Putting all this information together, they found that whatever the clumps are, they have to be at a distance roughly equivalent to Jupiter and the other gas giants’ distance from the Sun. And it would have to be large, larger even than the star itself.

It’s possible that a small planetary body known as a planetesimal could have a large collection of dust orbiting it. That way, the planetesimal itself might have escaped our detection because it’s so small, but its gravitationally bound dust might be enough to block all that light.

Cometary conclusions

But that scenario, too, has issues, as do two others they raise: dust blasted into space after a planetesimal/asteroid collision, and debris resulting from a collision with a planet. After considering all these options, they found that the most likely scenario involves a family of broken comet debris.

Since many stellar systems have been found to have hot Jupiters—huge gas giants on extremely close orbits to their stars—it’s plausible that this system has one, too. Its gravity could have broken up a passing comet. It’s even possible that the comet could have come too close to the star and been broken up due to its tidal forces.

This idea, too, has its issues, and it’s not yet clear whether it can fully explain the data. For one thing, the absence of an excess of IR light is puzzling. It doesn’t rule out the comet explanation, but it might require another star to pass through the system, dragging objects from the system’s Oort cloud (a ring at the outer edge of most stellar systems that contains millions of icy objects). That’s kind of far-fetched, especially as the aforementioned companion star is too far to have managed this.

But for now, the researchers conclude that it’s the best explanation. “Of the various considered, we find that the break-up of [an] exocomet provides the most compelling explanation,” the authors write in their paper.

Future work is needed, first and foremost, to continue monitoring the star’s behavior and to learn more about the frequency of the dips. The team will engage in that continuing observation in collaboration with the MEarth project, a robotic survey.

Additionally, if it is indeed a family of comets, it should be releasing gas as well as dust, which can be tracked with future observations.

Whatever the case, KIC 8462852 will certainly be an interesting star to watch. “Our analysis characterizes the object as both remarkable (e.g., the “dipping” events in the Kepler light curve) and unremarkable (ground-based data reveal no deviation from a normal F-type star) at the same time,” the authors write.

But wait, aliens?!

It seems we left out an important possibility:

  • Aliens: A technologically advanced alien civilization might be building something around their star.

Other sources have been reporting that KIC 8462852’s behavior could be evidence of an alien Dyson sphere or an alien megastructure. The researchers didn’t actually discuss this possibility in their paper, where they concluded the comets are currently the best explanation. But as the cometary explanation is not fully satisfying, lead author Tabetha Boyajian of Yale consulted with Jason Wright, an astrophysicist with Penn State University, who had studied ways to detect potential extraterrestrial constructions.

Wright posited that the dips in flux from the star might be due to an alien Dyson sphere. Dyson spheres, of Star Trek fame, are massive, hypothetical constructs built around a star to collect its energy through millions of solar panels.

“Aliens should always be the very last hypothesis you consider,” Wright told The Atlantic. “But this looked like something you would expect an alien civilization to build.”

Well, it does fit the bill. If aliens had built a partial Dyson sphere, it could explain the strange behavior. But that doesn’t mean that’s the correct explanation. As Wright says, it should be the very last hypothesis we consider. And we still have other plausible explanations, such as the comets.

Nonetheless, Wright is writing up a proposal to use the NRAO’s Green Bank Telescope, the world’s largest fully steerable radio telescope, to look for radio transmissions from the system. If accepted, the observation would take place in January. If it turns up something worth further study, it would then be turned over to the Very Large Array in New Mexico, which should be able to confirm if the radio waves come from a technological source.

It’s an interesting idea. While it’s sexier by far than comets, “We should also approach it skeptically,” Wright told Slate. It’s all well and good to investigate the possibility, as Wright is doing, but (despite the impending return of “The X-Files”) it’s not quite time to go “full Mulder” just yet.

If actual evidence exists, we might find out in January. The truth is out there, after all.

 

By Xaq Rzetelny

 

Source : Ars Technica.

Back to School Vaccine Hysteria Culminates in Hunt for Unvaccinated Kids

 

vaccs_dees

By Heather Callaghan

Due to increased mandatory vaccination legislation, parents are being politely threatened by the corporate-sponsored press, the CDC and the school systems that they had better get jabs for their children. In many cases, such as in California, it’s the law. In cases where it’s not completely mandatory, veiled threats and social pressure to submit have reached an ominous fever-pitch.

While the media can offer ostensible friendliness in passive aggressive threats to “get with the vaccine program” as it can rest on the buttress of law, it has not yet dispensed with extraordinary hysteria, authoritarian peer pressure and even targeting children in public shaming rituals.

This is because it’s “Back to School” rush hour, one of the biggest spending seasons. In the rush to spend one’s literal last pennies on supplies, clothes and lunches, the government doesn’t want you to forget to sacrifice and scrape that last bit for required injections.

One headline goes like this: Parents told to check vaccine status ahead of school. It was a “friendly reminder” to Oregon parents that their non-medical exemptions are null, that booster shots are required for older students and that preschool caretakers are to get jabs or close down.

A recent CNN headline “As kids go back to school, states look to encourage vaccinations,” chides parents who might be naughty:

When kids start school this fall, it’s a sure bet that some won’t have had their recommended vaccines because their parents have claimed exemptions from school requirements for medical, religious or philosophical reasons. Following the much publicized outbreak of measles that started in Disneyland in California in December, these exemptions have drawn increased scrutiny.  [emphasis added]

That’s right, all of these convenient moves to corral people into compulsory toxic injections hinge on the original hysteria produced by “Disneyland measles.” What the media never reports is that California had a 97.46% student vaccination rate during that time. Pharma manufacturers cry that they need 95% rate to achieve so-called “herd immunity.” And did you know that Idaho has the highest proportion of kindergartners with exemptions, at only 6.5 percent?

The hysteria also serves as a convenient deflection from other inconvenient truths such as the fact that so many more people have died from the MMR vaccine (and the previous single-vial measles vaccine) than the measles disease in over a decade. Have the pharmaceutical manufacturers ever been held accountable – no, we account for it in tax dollars under a $3 billion dollar bail-out, so far.

Back to Disneyland measles which followed Ebola-gate. I see that it has further victimized children. While these laws pass due to cries of “the children! the children!” – the Senators spearheading the crusade obviously do not show concern for children when they receive funds from Big Pharma. Big Pharma sits on bail-outs, industry-paid “scientists,” control of media (including social media) and mandatory legislation. Emotional trolling has led some parents to succumb to disgraceful social interactions like asking a parent if her kid has “had her shots” before they are allowed to come over and play.

One report provides “tools” for parents to help them “remember” to get all the pharma recommended shots:

Secretary Galvin has a new tool on his website that shows parents the recommended vaccines for their children by age – from birth to eighteen years old.

At first the report conveyed friendly help to new parents, but then…:

As students prepare to head back into the classroom, some parents believe they shouldn’t be required by law to vaccinate their kids. [emphasis added]

Additionally, the pressure is high to “hunt” unvaccinated children in public shaming statistics that compel parents to do the dirty work of peer-pressure. For instance, if states post local vaccination rates at the recent behest of the CDC, and if parents act accordingly by the statistics, it will increase pressure to vaccinate on area doctors and school systems desperate for attendance funds.

Associated Press reports [emphasis added]:

How many kids are vaccinated at your child’s school? Federal health officials think you should be able to easily find out.

CDC’s Dr. Anne Schuchat made the push more public during a press conference Thursday.

“It’s important to recognize when vulnerabilities exist in communities,” said Schuchat, who oversees the agency’s vaccination work.

Parents could use the information to weigh their child’s risk of vaccine-preventable illnesses at specific schools or school districts, Schuchat said. And it could help health officials identify pockets of unvaccinated children, she said.

Can these numbers be trusted? What happens when the rate of vaccination reaches 100% and the only thing left to show for it is more disease and sickness? Who or what will be blamed then? Again, there is no recourse.

One would think stigmas, discrimination, scarlet letters and other forms of public shaming would be counter-intuitive in preventing disease and helping children grow into healthy, confident adults. To see the results of previous experiments, just glance back at history. It’s never been about “the children.” They say that truth is the first casualty of all types of wars – are children the second? If deception is the first weapon of forceful agendas, are shame and hysteria the second? They are the most negative, yet effective forms of marketing ever concocted.

Heather Callaghan is a natural health blogger and food freedom activist. You can see her work at NaturalBlaze.com and ActivistPost.com. Like at Facebook.

Recent posts by Heather Callaghan

 

Source : Activist Post

« Older Entries