Podcast: Play in new window | Download (Duration: 1:59:54 — 35.2MB) | Embed
Of Evolutionary Engagement
The Victory Against You in the Silent War is Your Silence
Reality or Calculated Assumptions
United We Strike
UFO – Unidentified Fixed Object
- NBC 7 UFO Video: Strange Multicolored Lights Over San Diego Captured On Video
NBC 7 San Diego has released footage of a possible UFO sighting over southwest San Diego on Tuesday night. The footage was captured in San Ysidro by an NBC 7 photographer who was covering an unrelated story Tuesday night.
The video shows what looks like a “string of multicolored lights” flashing or pulsing in the night sky.
Top News, UFO Debunked | S0 News – Near the End of the video
Reptilian Queen’s Secret: Freemasons Care
- DETAIL that was missed WORLD MEDIA: This image reveals the secret of Queen!
Every time you mention the British royal family world media documenting every detail about it. Directory When Queen Elizabeth II two years ago left the hospital King Edward VII media raced who will transmit more information. They even commented on her appearance, a pearl necklace, brooch …
But almost everyone missed one small but very important detail – the belt that she wore a nurse. Look carefully at the buckle on the belt. It shows two important symbols – crossed protractor and compass, as well as the pentagram.
Sacrificial Science
How Climate Model Complexity Influences Sea Ice Stability
Record lows in Arctic sea ice extent are making frequent headlines in recent years. The change in albedo when sea ice is replaced by open water introduces a nonlinearity that has sparked an ongoing debate about the stability of the Arctic sea ice cover and the possibility of Arctic “tipping points”. Previous studies identified instabilities for a shrinking ice cover in two types of idealized climate models: (i) annual-mean latitudinally-varying diffusive energy balance models (EBMs) and (ii) seasonally-varying single-column models (SCMs). The instabilities in these low-order models stand in contrast with results from comprehensive global climate models (GCMs), which typically do not simulate any such instability. To help bridge the gap between low-order models and GCMs, we develop an idealized model that includes both latitudinal and seasonal variations. The model reduces to a standard EBM or SCM as limiting cases in the parameter space, thus reconciling the two previous lines of research. We find that the stability of the ice cover vastly increases with the inclusion of spatial communication via meridional heat transport or a seasonal cycle in solar forcing, being most stable when both are included. If the associated parameters are set to values that correspond to the current climate, the ice retreat is reversible and there is no instability when the climate is warmed. The two parameters have to be reduced by at least a factor of 3 for instability to occur. This implies that the sea ice cover may be substantially more stable than has been suggested in previous idealized modeling studies.
Chapter 5 – The Oceanic Heat Budget
Overall, Earth gains heat at the top of the tropical atmosphere, and it loses heat at the top of the polar atmosphere. The atmospheric and oceanic circulation together must transport heat from low to high latitudes to balance the gains and losses. This north-south transport is called the meridional transport.
How much heat is carried by the ocean and how much by the atmosphere? The sum of the meridional heat transport by the ocean and atmosphere together is calculated accurately from the divergence of the zonal average of the heat budget measured at the top of the atmosphere by satellites. To make the calculation, we assume steady state transports over many years so that any long-term net heat gain or loss through the top of the atmosphere must be balanced by a meridional transport and not by heat storage in the ocean or atmosphere. So let’s start at the top of the atmosphere.
Heat Budget at the top of the Atmosphere
Heat flux through the top of the atmosphere is measured by radiometers on satellites.- Insolation is calculated from the solar constant and observations of reflected sunlight made by meteorological satellites and by special satellites such as the Earth Radiation Budget Experiment Satellite.
- Back radiation is measured by infrared radiometers on the satellites.
- The difference between insolation and net infrared radiation is the net heat flux across the top of the atmosphere.
Errors arise from calibration of instruments, and from inaccurate information about the angular distribution of reflected and emitted radiation. Satellite instruments tend to measure radiation propagating vertically upward, not radiation at large angles from vertical, and radiation at these angles is usually calculated not measured.
The sum of the meridional heat transported by the atmosphere and the oceans is calculated from the top of the atmosphere budget. First average the satellite observations in the zonal direction, to obtain a zonal average of the heat flux at the top of the atmosphere. Then calculate the meridional derivative of the zonal mean flux to calculate the north-south flux divergence. The divergence must be balanced by the heat transport by the atmosphere and the ocean across each latitude band.
Oceanic Heat Transport
Oceanic heat transport are calculated three ways:- Surface Flux Method calculates the heat flux through the sea surface from measurements of wind, insolation, air, and sea temperature, and cloudiness using bulk formulas. The fluxes are integrated to obtain the zonal average of the heat flux (Figure 5.7). Finally, the meridional derivative of the net flux gives the flux divergence, which must be balanced by heat transport in the ocean.
- Direct Method calculates the heat transport from values of current velocity and temperature measured from top to bottom along a zonal section spanning an ocean basin. The flux is the product of northward velocity and heat content derived from the temperature measurement.
- Residual Method first calculates the atmospheric heat transport from atmospheric measurements or the output of numerical weather models. This is the direct method applied to the atmosphere. The atmospheric trans-port is subtracted from the total meridional transport calculated from the top-of-the-atmosphere heat flux to obtain the oceanic contribution as a residual (Figure 5.11).
Various calculations of oceanic heat transports, such as those shown in Figure 5.11, tend to be in agreement, and the error bars shown in the figure are realistic.
Study: Use of GM mosquitoes against dengue proves effective
Panama’s Gorgas Memorial Institute for Health, or ICGES, found in a recent study that genetically modified mosquitoes can be used to combat dengue with a high degree of effectiveness, scientists involved in the project said.
The director of the ICGES study, Lorenzo Caceres, told Efe that in a period of six months approximately 4.2 million genetically modified (GM) male mosquitoes were set free in a town near the nation’s capital and obtained a 93-percent reduction in the population of the dengue-carrying Aedes aegypti mosquito.
The female of the Aedes aegypti is the carrier of dengue and the job of the GM male mosquito is to find her, mate with her and die.
The female, vector of the disease, is fertilized but the larvae it produces are incapable of surviving to maturity, which consequently reduces the Aedes aegypti population, according to ICGES scientists.
The technology was applied between May and November 2014 at Nuevo Chorrillo in the Arraijan district, some 12.8 kilometers (8 miles) west of the capital.
Are We Free . . . . If you have to ask . . .
- NSA Whistleblower: “We Are No Longer Afraid Of The Police State Happening. It’s Here”
U.S. Government Officials Say We’ve Got Tyranny In America
First Bill Binney – the high-level NSA executive who created the agency’s mass surveillance program for digital information, the 32-year NSA veteran widely who was the senior technical director within the agency and managed thousands of NSA employees – told Washington’s Blog that America has already become a police state.
Then Thomas Drake – one of the top NSA executives, and Senior Change Leader within the NSA – told us the same thing.
Now Kirk Wiebe – a 32-year NSA veteran who received the Director CIA’s Meritorious Unit Award and the NSA’s Meritorious Civilian Service Award – agrees (tweet via Jesselyn Radack, attorney for many national security whistleblowers, herself a Department of Justice whistleblower):
#Wiebe: we are no longer afraid of the police state happening. It’s here. In small ways and big ways. @xposefacts
— unR̶A̶D̶A̶C̶K̶ted (@JesselynRadack) April 27, 2015
It’s not just NSA officials … Two former U.S. Supreme Court Justices have warned that America is sliding into tyranny. A former U.S. President, and many other high-level American officials agree.
Rules NSA Bulk Data Collection Was Never Authorized By Congress
As Americans wait for Congress to decide next month whether to renew the Patriot Act and the vast NSA metadata surveillance program it’s made possible, a panel of three appellate judges has made the decision on its own: The Patriot Act, they’ve now ruled, was never written to authorize the sort of sweeping surveillance the NSA interpreted it to allow.
The United States Court of Appeals for the Second Circuit ruled on Thursday that the bulk collection of Americans’ phone metadata by the NSA wasn’t in fact authorized by section 215 of the Patriot Act, as the intelligence community has argued since the program was first revealed in the leaks of Edward Snowden two years ago. The ruling doesn’t immediately halt the domestic phone records surveillance program. But if it’s not overturned by a higher court it could signal the program’s end—and it at least forces Congress to choose whether it wishes to explicitly authorize the program when the Patriot Act comes up for renewal on June 1st.
“We hold that the text of § 215 cannot bear the weight the government asks us to assign to it, and that it does not authorize the telephone metadata program,” the ruling reads. “We do so comfortably in the full understanding that if Congress chooses to authorize such a far-reaching and unprecedented program, it has every opportunity to do so, and to do so unambiguously. Until such time as it does so, however, we decline to deviate from widely accepted interpretations of well‐established legal standards.”
Appellate Court Is First to Rule on the Issue In a landmark decision, a federal appeals court unanimously ruled today that the NSA’s phone-records surveillance program is unlawful.
NSA mass collection of phone data is legal
A legal battle over the scope of US government surveillance took a turn in favour of the National Security Agency on Friday with a court opinion declaring that bulk collection of telephone data does not violate the constitution.
The judgement, in a case brought before a district court in New York by the American Civil Liberties Union, directly contradicts the result of a similar challenge in a Washington court last week which ruled the NSA’s bulk collection program was likely to prove unconstitutional and was “almost Orwellian” in scale.
Friday’s ruling makes it more likely that the issue will be settled by the US supreme court, although it may be overtaken by the decision of Barack Obama on whether to accept the recommendations of a White House review panel to ban the NSA from directly collecting such data.
But the ruling from Judge William Pauley, a Clinton appointee to the Southern District of New York, will provide important ammunition for those within the intelligence community urging Obama to maintain the programme.
EFF Case Analysis: Appeals Court Rules NSA Phone Records Dragnet is Illegal
We now have the first decision from a court of appeals on the NSA’s mass surveillance program involving bulk collection of telephone records under Section 215 of the Patriot Act, and it’s a doozy. The U.S. Court of Appeals for the Second Circuit issued an opinion in ACLU v. Clapper holding that the NSA’s telephone records program went far beyond what Congress authorized when it passed Section 215 of the Patriot Act in 2001. The court completely rejected the government’s secret reinterpretation of Section 215 that has served as the basis for the telephone records collection program. EFF filed amicus briefs in this case in both the district and circuit courts, and we congratulate our colleagues at the ACLU on this significant victory.
The Second Circuit’s opinion stands as a clear sign that the courts are ready to step in and rule that mass surveillance is illegal. As we’ll discuss in a future post, it also marks a significant change in the context of the ongoing legislative debate in Congress about these issues. Above all, it is clear that Congress must do more to rein in dragnet surveillance by the NSA.
This post explains some highlights of the opinion.
The CIA Will Keep Killing Civilians With Drone Strikes Because The ‘Rules’ For Drone Strikes Aren’t Actually Rules
from the more-like-a-list-of-‘it-would-be-nice-if…’-requests dept
Extrajudicial killing by pilotless air strikes is just something our government does now. Weaponized drones are sent out to eliminate enemies of the United States, supposedly under the guidance of the Dept. of Justice and some presidential policy directives. But the rules aren’t rules. They appear to be set in stone when the legal authority behind these drone strikes is questioned. But they’re much more fluid when they “need” to be… like, say, after a drone strike takes out more than its intended target. [h/t Chris Soghoian]
Last week, the U.S. officials disclosed that two Western hostages, U.S. and Italian aid workers Warren Weinstein and Giovanni Lo Porto, were killed on Jan. 15 by a U.S. drone strike aimed at al Qaeda militants in Pakistan…
Last week, Mr. Obama apologized for the killings and took personal responsibility for the mistake. He called the operation “fully consistent with the guidelines under which we conduct counterterrorism efforts in the region…”
But what guidelines? Certainly not those that supposedly govern these strikes.
U.S. Government: We Can Classify Anything and Judges Can’t Stop Us
At a hearing today on a lawsuit seeking to make videotapes of force-feedings at Guantánamo public, Justice Department attorneys argued that the courts cannot order evidence used in trial to be unsealed if it has been classified by the government. “We don’t think there is a First Amendment right to classified documents,” stated Justice Department lawyer Catherine Dorsey.
The judges at the D.C. Court of Appeals appeared skeptical. Chief Judge Merrick Garland characterized the government’s position as tantamount to claiming the court “has absolutely no authority” to unseal evidence even if it’s clear the government’s bid to keep it secret is based on “irrationality” or that it’s “hiding something.”
“That is our position,” Dorsey agreed. She added that a more appropriate tool to compel the release of the videos was through a Freedom of Information Act request.
Sixteen media organizations, including First Look Media, are seeking footage of Abu Wa’el Dhiab being repeatedly force-fed at Guantánamo. Dhiab was held by the U.S. for 12 years without charges or trial before being released to Uruguay last December.
US-Led Airstrikes Kill 52 Civilians, Including 7 Children, In Syria
U.S.-led forces conducting airstrikes in Syria have killed 52 people, including seven children, in the northern province of Aleppo, according to the Syrian Observatory for Human Rights. The group added that at least 13 people are missing since Friday’s airstrikes.
Rami Abdel Rahman, head of the U.K.-based SOHR said that the airstrikes were conducted on the village of Birmahle, which had not seen any clashes and did not house any installations belonging to the Islamic State group.
“We in SOHR condemn in the strongest terms this massacre committed by the U.S led coalition under the pretext of targeting the IS in the village, and we call the coalition countries to refer who committed this massacre to the courts, as we renew our calls to neutralize all civilians areas from military operations by all parties,” SOHR said, in a statement on Saturday.
Protecting sage grouse could hurt military, report says
Efforts to protect the greater sage grouse under the federal Endangered Species Act could hurt training operations at numerous U.S. military facilities in the West, according to a new report by the Army.
The report looked at the impact of protecting sage grouse on the Yakima Training Center in Washington; Hawthorne Army Depot in Nevada; the Wyoming National Guard; Tooele Army Depot and Dugway Proving Ground in Utah.
It found that protecting the birds would restrict the availability of training lands; limit the size of training lands and ranges; restrict the use of firing points; and impose restrictions on future development and construction.
- Rising Police Aggression A Telling Indicator Of Our Societal Decline
My first Uber lift was in South Carolina. My driver was from Sudan originally, but had emigrated to the US 20 years ago. Being the curious sort, I asked him about his life in Sudan and why he moved. He said that he left when his country had crumbled too far, past the point where a reasonable person could have a reasonable expectation of personal safety, when all institutions had become corrupted making business increasingly difficult. So he left.
Detecting a hitch in his delivery when he spoke of coming to the US, I asked him how he felt about the US now, 20 years later. “To be honest,” he said, “the same things I saw in Sudan that led me to leave are happening here now. That saddens me greatly, because where else is there to go?”
It’s time to face some uncomfortable ideas about the state of civilization in the United States. This country is no longer the beacon of freedom illuminating a better way for the world. Why not? Because it has ceased to be civilized.
Hot Diggity Doge
The Weekend War Report
Defending
withThe DOGE OF WAR
D8rgRZjcBPLAhvmUazYXxCZasueoEmP7VG
Unleash the Power of the DOGE OF WAR
Please Donate to RLM
In This Doge Eat Doge World
Official Criminals
NC officers arrested in major drug bust
More than a dozen law enforcement officers, including 11 in North Carolina, have been arrested in a government sting that included the FBI, the government announced Thursday.
Thomas Walker, the U.S. attorney for the Eastern District, said multiple people were arrested Thursday morning in a major sting of cocaine and heroin operations. Those arrested include five current members of the Northampton County sheriff’s office. They were charged with trafficking cocaine and heroin up and down the I-95 corridor.Justice Department to launch federal investigation of Baltimore police
Attorney General Loretta E. Lynch has decided to launch a federal investigation into whether the Baltimore Police Department has engaged in a “pattern or practice” of excessive force. — the latest in a string of municipalities that are being investigated by the federal government for civil rights violations — could come as early as Friday, according to two law enforcement officials.
Things Go South When DEA Illegally Uses Owner’s Truck without His Knowledge for Hauling Marijuana
An amazing story is continuing to play out after more than three years of winding its way through American courts. Craig Patty is the owner of a North Texas trucking company who ran afoul of the Zetas Cartel a few years back and never even realized it! It all started with an early morning phone call that just about floored the Texas business owner…
“Your driver was shot in your truck,” said a business colleague. “Your truck was loaded with marijuana. He was shot eight times while sitting in the cab. Do you know anything about your driver hauling marijuana?”
The driver was supposed to have delivered Patty’s truck to a local repair shop for some work, instead the driver loaded the rig full of marijuana and headed towards a planned drug sting where the driver wound up dying after a shootout with a terrifying cartel.
All of this happened without Patty’s knowledge.
Who Pays When The DEA Destroys Your Vehicle And Kills Your Employee During A Botched Sting? Hint: Not The DEA
from the law-enforcement:-still-hazardous-to-innocent-Americans dept
The DEA likes to borrow stuff. It’s just not very good about returning borrowed items in the same shape it got them.
Like From a businessman’s semi truck.
And his employee’s life.
Craig Patty runs a tiny trucking company in Texas. He has only two trucks in his “fleet.” One of them was being taken to Houston for repairs by his employee, Lawrence Chapa. Or so he thought.
In reality, Chapa was working with the DEA, which had paid him to load up Patty’s truck with marijuana and haul it back to Houston so the DEA could bust the prospective buyers. That’s when everything went completely, horribly wrong.
[A]s the truck entered northwest Houston under the watch of approximately two dozen law enforcement officers, several heavily armed Los Zetas cartel-connected soldiers in sport utility vehicles converged on Patty’s truck.
In the ensuing firefight, Patty’s truck was wrecked and riddled with bullet holes, and a plainclothes Houston police officer shot and wounded a plainclothes Harris County Sheriff’s Office deputy who was mistaken for a gangster.
The truck’s driver was killed and four attackers were arrested and charged with capital murder.
Until Patty received a call notifying him that his employee had been killed, he was completely unaware of the DEA’s operations involving both his truck and his driver. Unbelievably, things got even worse for Patty after this discovery.
IN THE UNITED STATES DISTRICT COURT
FOR THE SOUTHERN DISTRICT OF TEXAS
HOUSTON DIVISION
Direction Unaccountable
America’s Main Problem: Corruption
Preface: Sadly, in the month since we last posted on this topic, many new examples of corruption have arisen.
The Cop Is On the Take
Government corruption has become rampant:
- Senior SEC employees spent up to 8 hours a day surfing porn sites instead of cracking down on financial crimes
- Nuclear Regulatory Commission workers watch porn instead of cracking down on unsafe conditions at nuclear plants
- An EPA employee who downloaded 7,000 porn files, then spent 2-6 hours each workday watching porn. He’s been doing it for years … but the EPA never fired him. Another EPA employee harassed 16 women co-workers … and then was promoted to a higher-paying job with more responsibility, where he harassed more women
- NSA spies pass around homemade sexual videos and pictures they’ve collected from spying on the American people
- NSA employees have also been caught . . .
In a Cop Culture, the Bill of Rights Doesn’t Amount to Much
Police officers are more likely to be struck by lightning than be held financially accountable for their actions.—Law professor Joanna C. Schwartz (paraphrased)
“In a democratic society,” observed Oakland police chief Sean Whent, “people have a say in how they are policed.”
Unfortunately, if you can be kicked, punched, tasered, shot, intimidated, harassed, stripped, searched, brutalized, terrorized, wrongfully arrested, and even killed by a police officer, and that officer is never held accountable for violating your rights and his oath of office to serve and protect, never forced to make amends, never told that what he did was wrong, and never made to change his modus operandi, then you don’t live in a constitutional republic.
You live in a police state.
Digital Confessions
- Encrypting Your Laptop Like You Mean It
Time and again, people are told there is one obvious way to mitigate privacy threats of all sorts, from mass government surveillance to pervasive online tracking to cybercriminals: Encryption. As President Obama put it earlier this year, speaking in between his administration’s attacks on encryption, “There’s no scenario in which we don’t want really strong encryption.” Even after helping expose all the ways the government can get its hands on your data, NSA whistleblower Edward Snowden still maintained, “Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on.”
But how can ordinary people get started using encryption? Encryption comes in many forms and is used at many different stages in the handling of digital information (you’re using it right now, perhaps without even realizing it, because your connection to this website is encrypted). When you’re trying to protect your privacy, it’s totally unclear how, exactly, to start using encryption. One obvious place to start, where the privacy benefits are high and the technical learning curve is low, is something called full disk encryption. Full disk encryption not only provides the type of strong encryption Snowden and Obama reference, but it’s built-in to all major operating systems, it’s the only way to protect your data in case your laptop gets lost or stolen, and it takes minimal effort to get started and use.
- Next Thing Co. Releases “World’s First” $9 Computer
Snuggly situated in an industrial section of Oakland, CA is Next Thing Co. a team of nine artists and engineers who are pursuing the dream of a lower cost single board computer. Today they’ve unveiled their progress on Kickstarter, offering a $9 development board called Chip.
The board is Open Hardware, runs a flavor of Debian Linux, and boasts a 1Ghz R8 ARM processor, 512MB of RAM, and 4GB of eMMC storage. It is more powerful than a Raspberry Pi B+ and equal to the BeagleBone Black in clock speed, RAM, and storage. Differentiating Chip from Beagle is its built-in WiFi, Bluetooth, and the ease in which it can be made portable, thanks to circuitry that handles battery operation.
Secure Private Alternative To Skype: Tox
Silent Weapons for Quiet Wars - The people know that they have created this farce and financed it with their own taxes (consent), but they would rather knuckle under than be the hypocrite.
Factor VI – Cattle
Those who will not use their brains are no better off than those who have no brains, and so this mindless school of jelly-fish, father, mother, son, and daughter, become useful beasts of burden or trainers of the same. - Mr. Rothschild’s Energy Discovery
What Mr. Rothschild [2] had discovered was the basic principle of power, influence, and control over people as applied to economics. That principle is “when you assume the appearance of power, people soon give it to you.”
Listen How
The Law of War
General Orders No. 100 : The Lieber Code
INSTRUCTIONS FOR THE GOVERNMENT OF ARMIES OF THE UNITED STATES IN THE FIELD
Where Not Throwing Oppression Off, You Live Either Under an Occupation or by Conquest.
The Choice and Responsibility are Yours
United We Strike
Behind The Woodshed for that practical education & hard but necessary dose of reality.
Spread The Word Behind The Woodshed.
(^_^)
4