Archive for June, 2013


Une zone recouvrant l’équivalent de la moitié de la surface de la Suisse et où ne subsiste aucune vie a été repérée dans le Golfe du Mexique. Elle est due aux engrais de l’agriculture américaine qui se déversent dans la mer.
Par Christine Talos. Mis à jour le 26.06.2013 11 Commentaires
Articles en relation

Les poissons vont franchement rétrécir
Norman, le chat écolo qui milite pour les océans
Une initiative pour protéger les océans est lancée
L’élévation des océans ne pourra être empêchée
Partager & Commenter

C’est un phénomène inquiétant qui frapperait actuellement le Golfe du Mexique. Une énorme zone morte, de la taille de la moitié de la Suisse, est en train de se former dans les profondeurs de cette mer intérieure entre les USA et le Mexique.

Elle serait la conséquence du ruissellement des eaux de pluie et des inondations particulièrement importantes ce printemps dans le Midwest américain. Celles-ci auraient charrié dans la mer des quantités très importantes d’azote et de phosphore issus des engrais de l’industrie agricole. Ces produits auraient ensuite permis à des algues géantes de proliférer, des algues qui ont ensuite étouffé les autres organismes marins, rapporte le site du National Geographic.

Selon les prévisions des universités de Louisiane et du Michigan, qui étudient le phénomène avec le «National Oceanic and Atmospheric Administration» des Etats-Unis, la zone aurait une taille estimée à plus de 20’000 km2. Un pareil phénomène avait déjà été observé en 2002. Mais il serait encore plus important cette année.

Ces zones mortes seraient courantes en été à la sortie des estuaires des grands fleuves américains, que ce soit dans les océans ou même les grands lacs. Mais l’Europe n’est pas épargnée, puisque la plus grande zone sans vie jamais enregistrée avait été repérée en 2010 dans les eaux de la mer Baltique, selon le National Geographic. Une mer qui abrite à elle seule au moins 7 des 10 plus grandes zones mortes de la planète…

Les points noirs correspondent aux zones mortes dans cette carte de 2008…

http://www.lematin.ch/sante/environnement/enorme-zone-morte-forme-golfe-mexique/23586750/print.html

 

 

 

Plus de 2 millions de Tibétains en Chine ont été relogés de force ces dernières années dans le cadre de la campagne “Construire une nouvelle région rurale socialiste” menée depuis 2006 par Pékin dans les zones tibétaines et qui portent atteinte à leur culture traditionnelle et leur mode de vie, selon un rapport de l’ONG Human Rights Watch (HRW). Le nombre de personnes concernées représente “plus des deux tiers de la population totale” de la région autonome du Tibet, selon ce document publié jeudi.

“L’échelle et la rapidité avec laquelle la population rurale du Tibet est réorganisée par des politiques de relogement ou de déplacement de masse sont sans précédent depuis l’époque de Mao, s’est indignée Sophie Richardson, directrice de HRW pour la Chine. Les Tibétains n’ont pas leur mot à dire dans la conception de politiques qui modifient radicalement leur mode de vie, et – dans un contexte déjà extrêmement répressif – aucun moyen de s’y opposer.”

A l’appui de statistiques officielles chinoises, le rapport affirme que 2 millions de personnes “ont été déplacées dans des nouveaux logements ou ont reconstruit leurs propres maisons entre 2006 et 2012”. En outre, des centaines de milliers de bergers nomades dans la partie orientale du plateau tibétain ont été déplacés ou installés dans de “nouveaux villages socialistes”.
LA SÉDENTARISATION BOULEVERSE LA CULTURE TIBÉTAINE

Selon le recensement de 2010, 6,2 millions de Tibétains vivent en Chine, dont 2,7 millions dans la seule région autonome. “Un aspect crucial de la politique affectant les communautés pastorales, et qui bouleverse de nombreux Tibétains parce qu’il touche à la culture tibétaine, est que beaucoup de ceux qui sont relogés ou déplacés ont été sédentarisés”, précise le rapport…

http://www.lemonde.fr/asie-pacifique/article/2013/06/28/plus-de-2-millions-de-tibetains-ont-ete-deplaces_3438298_3216.html

Il n’y a jamais eu, à mes yeux, dans l’histoire américaine, de fuite plus importante que la divulgation par Edward Snowden des programmes secrets de l’Agence de sécurité nationale américaine (NSA). L’alerte qu’il a lancée permet de prendre la mesure d’un pan entier de ce qui se ramène à un “coup d’Etat de l’exécutif” contre la Constitution américaine.
Depuis le 11-Septembre, le Bill of Rights, cette Déclaration des droits pour laquelle cette nation combattit il y a plus de deux cents ans, a été l’objet, dans un premier temps secrètement, ensuite de plus en plus ouvertement, d’une révocation de fait. Les quatrième et cinquième amendements de la Constitution, qui protégeaient les citoyens d’une intrusion injustifiée du gouvernement dans leurs vies privées, ont été pratiquement suspendus.

Le gouvernement affirme qu’il peut se prévaloir d’un mandat de justice en vertu du FISA, du Foreign Intelligence Surveillance Act (loi de 1978 portant sur les procédures de surveillance physique et électronique et l’activité de renseignement à l’étranger). Mais ce mandat est d’une si grande portée qu’il est inconstitutionnel. Il est de plus délivré par une juridiction secrète, à l’abri de toute supervision efficace, et qui fait preuve d’une déférence presque totale face aux demandes de l’exécutif.

Affirmer, comme le fait le président, qu’il y a eu une supervision juridique n’a pas de sens. Le fait que les dirigeants du Congrès aient été informés sur cette question et aient approuvé tout cela, sans aucun débat public ni auditions, montre l’état misérable, dans ce pays, du système des contre-pouvoirs.

A l’évidence, les Etats-Unis ne sont pas aujourd’hui un Etat policier. Mais, au regard de l’ampleur de cette invasion de la sphère privée, nous avons là l’infrastructure électronique et législative d’un tel Etat. Si une guerre devait éclater et conduire à l’apparition d’un mouvement pacifiste de très grande ampleur ou si nous devions être la cible d’une nouvelle attaque d’une gravité similaire à celle du 11-Septembre, je ne donne pas cher de l’avenir de notre démocratie. Ces pouvoirs sont extrêmement dangereux…

http://www.lemonde.fr/idees/article/2013/06/25/aux-etats-unis-une-cybersurveillance-digne-d-un-etat-policier_3436008_3232.html

LA SISA DÉTRUIT LA VIE DES SANS-ABRI ATHÉNIENS
Debout dans les quartiers généraux de la police d’Athènes, au beau milieu d’un entretien avec le directeur des stups, j’ai réalisé que j’avais un paquet d’un produit à base de méthamphétamine dans la poche. J’avais acheté cette dope la veille à un sans-abri grec et j’avais oublié de la jeter. Après l’entretien, je suis sorti fumer une cigarette, et là, plusieurs agents de police ont remarqué l’équipe de tournage qui m’accompagnait.

Quelques instants plus tard, les flics nous traînaient dans une salle de détention. Le petit paquet de drogue était toujours au fond de ma poche. Après avoir passé quelques coups de fil et nous avoir longuement dévisagés, leur regard noir s’est dirigé vers la porte. Ils devaient finalement nous relâcher, à contrecœur – et pour mon plus grand bonheur, sans m’avoir fouillé. En sortant, j’ai balancé le petit paquet dans la première poubelle que j’ai croisée.

Ces derniers mois, plusieurs commissariats de police du pays ont été victimes d’attentats à la bombe, c’est pourquoi les flics ont des raisons d’être nerveux, surtout lorsqu’on les filme. Au cours de notre première soirée dans la capitale grecque, un autre groupe de policiers nous avait approchés ; lorsqu’ils ont aperçu notre équipe de tournage en bas de la rue, ils nous ont demandé nos papiers. Après avoir supprimé les images qu’on avait tournées, ils nous ont enfermés quatre heures, le temps qu’on réussisse à se faire apporter nos passeports au commis­sariat. En ce moment, la Grèce nage en pleine parano. La police, des fascistes, des anarchistes, des revendeurs de toute sorte et des camés se disputent le territoire ; évidemment, personne ne fait confiance à personne…

http://www.vice.com/fr/read/une-drogue-a-la-hauteur-de-l-austerite-v7n6

Dès que nous commençons à surfer sur le web, toutes nos données sont pompées par les sites internet. Le phénomène s’accroît à mesure que nous multiplions les écrans et cette infographie se fait un devoir de vous le démontrer.

Big Brother n’est plus simplement présent, à en croire l’actualité (PRISM, NSA…), il est devenu omniscient. Baynote pointe du doigt le fait qu’envahir la vie privée n’est pas une obligation pour offrir une expérience personnalisée du web.

Qui vous espionne, par quel biais, où, que prennent-ils ? Toutes les réponses sont résumées en une image !

image

http://www.gizmodo.fr/2013/06/27/infographie-big-brother-technologie.html?ModPagespeed=noscript

A convicted paedophile priest has claimed a gay prostitution ring has been operating within the Holy Roman Church, with clergymen hiring underage rent-boys for sex.

Don Patrizio Poggi, who served a five-year prison sentence for abusing teenage boys at his Rome parish, also told Italian authorities a former Carabinieri police officer recruited boys for nine clergymen, IBTimes reports.

Poggi told the police: “I decided to file this complaint and cooperate with the law after long reflection and after a painful history of abuse and misuse of power that I have overcome thanks to the faith that guides me.”

The 46-year-old, who has complained that the Vatican refused to reinstate him after he completed his prison sentence, added: “I feel obliged to protect the Holy Church and the Christian community since I am aware of grave facts that undermine their integrity and break canon and penal law.”

Poggi has reportedly handed the names of 20 alleged child abusers in the Roman clergy – including four serving priests and a Monsignor – to the authorities…

http://www.huffingtonpost.co.uk/2013/06/28/paedophile-priest-exposes-satanic-vatican-rent-boy-sex-ring_n_3517013.html?utm_hp_ref=uk

Michael Jackson paid $35 million in hush money to at least two dozen young boys he sexually abused over 15 years, it has been alleged.

Sunday People has published explosive ‘secret FBI files’ suggesting the King of Pop groomed and molested children from at least 1989, despite his insistence he was just spending time with them.

The damning files claim the deceased popstar was a ‘pedophile’ who watched porn while assaulting a boy, molested a famous child star, fondled a child’s genitals in his private cinema and groped another child whose mother wasn’t ‘bothered’ by it.

We all thought it, we all knew it, just like we all knew OJ killed his wife. MJ still has millions of fans worldwide and they will deny this to the bitter end but the facts are the facts and they say this guy was a serial child predator. One of the spookiest ones i’ve ever seen. We also know that the elite have a taste for the young for whatever reason as seen in the pedo scandel that caught fire in the UK earlier this year amongst the rich and powerful. Considering all the evidence, physical and circumstantial, its not much of a stretch to think that most of the rich and powerful have indulged in this sick pratice.

Below are the actual documents that show that MJ was a pedo. Cringe worthy. -Mort

http://beforeitsnews.com/entertainment/2013/06/fbi-files-michael-jackson-abused-dozens-of-boys-paid-out-35-million-in-hush-money-2452340.html

An Introduction Programming Manual
Operations Research Technical Manual
TW-SW7905.1

The following document is taken from two sources. The first, was acquired on a website (of which I can’t remember the address) listing as its source the book titled Behold A Pale Horse by William Cooper; Light Technology Publishing, 1991. The second source is a crudely copied booklet which does not contain a copyright notice, or a publishers name. With the exception of the Forward, the Preface, the main thing that was missing from the first source was the illustrations. As we began comparing the two, we realized that the illustrations, and the accompanying text (also missing from the first) made up a significant part of the document. This has now been restored by The Lawful Path, and so far as I know, is the only internet copy available complete with the illustrations.

We have no first-hand knowledge that this document is genuine, however many of the concepts contained herein are certainly reasonable, important, and bear strong consideration.

If anyone has additional knowledge about the source of this document; has better copies of the illustrations than the ones posted here; has any missing pieces to this document, or has any comments which can improve upon the quality of this document, we will appreciate your comments.

The Lawful Path http://www.lawfulpath.com

Forward

This manuscript was delivered to our offices by an unknown person. We did not steal the document, nor are we involved with any theft from the United States Government, and we did not get the document by way of any dishonest methods. We feel that we are not endangering the “National Security” by reproducing this document, quite the contrary; it has been authenticated and we feel that we are not only within our rights to publish it, but morally bound to do so.

Regarding the training manual, you may have detected that we had to block out the marginal notes made by the selectee at the C.I.A. Training Center, but I can assure you that the manual is authentic, and was printed for the purpose of introducing the selectee to the conspiracy. It has been authenticated by four different technical writers for Military Intelligence, one just recently retired who wants very much to have this manual distributed throughout the world, and one who is still employed as an Electronics Engineer by the Federal Government, and has access to the entire series of Training Manuals. One was stationed in Hawaii, and held the highest security clearance in the Naval Intelligence, and another who is now teaching at a university, and has been working with the Central Intelligence Agency for a number of years, and wants out before the axe falls on the conspirators.

We believed that the entire world should know about this plan, so we distributed internationally one-hundred of these manuscripts, to ask individuals at top level positions their opinions. The consensus opinion was to distribute this to as many people as who wanted it, to the end that they would not only understand that “War” had been declared against them, but would be able to properly identify the true enemy to Humanity.

Delamer Duverus

Preface

Conspiracy theories are nothing new to history. Plots to “kill Caesar” and overthrow Rome abounded, for instance. however, it is seldom that concrete clues to such plots come to light, and are generally known.

Silent Weapons for Quiet Wars, An Introduction Programming Manual was uncovered quite by accident on July 7, 1986 when an employee of Boeing Aircraft Co. purchased a surplus IBM copier for scrap parts at a sale, and discovered inside details of a plan, hatched in the embryonic days of the “Cold War” which called for control of the masses through manipulation of industry, peoples’ pastimes, education and political leanings. It called for a quiet revolution, putting brother against brother, and diverting the public’s attention from what is really going on.

The document you are about to read is real. It is reprinted in its virgin form, with diagrams, as a touch of reality.

Table of Contents

Forward
Preface
Security
Historical Introduction
Political Introduction
Energy
Descriptive Introduction of the Silent Weapon
Theoretical Introduction
General Energy Concepts
Mr. Rothschild’s Energy Discovery
Apparent Capital as “Paper Inductor
Breakthrough
Application in Economics
The Economic Model
Industrial Diagrams
Three Industrial Classes
Aggregation
The E-model
Economic Inductance
Inductive Factors to Consider
Translation
Time Flow Relationships and Self-destructive Oscillations
Industry Equivalent Circuits
Stages of Schematic Simplification
Generalization
Final Bill of Goods
The Technical Coefficients
The Household Industry
Household Models
Economic Shock Testing
Introduction to the Theory of Shock Testing
Example of Shock Testing
Introduction to Economic Amplifiers
Short List of Inputs
Short List of Outputs
Table of Strategies
Diversion, the Primary Strategy
Diversion Summary
Consent, the Primary Victory
Amplification Energy Sources
Logistics
The Artificial Womb
The Political Structure of a Nation – Dependency
Action/Offense
Responsibility
Summary
System Analysis
The Draft
Enforcement

The following document, dated May 1979, was found on July 7, 1986, in an IBM copier that had been purchased at a surplus sale.
TOP SECRET
Silent Weapons for Quiet Wars

Operations Research Technical Manual TM-SW7905.1

Welcome Aboard
This publication marks the 25th anniversary of the Third World War, called the “Quiet War”, being conducted using subjective biological warfare, fought with “silent weapons.”

This book contains an introductory description of this war, its strategies, and its weaponry.

May 1979 #74-1120

Security

It is patently impossible to discuss social engineering or the automation of a society, i.e., the engineering of social automation systems (silent weapons) on a national or worldwide scale without implying extensive objectives of social control and destruction of human life, i.e., slavery and genocide.
This manual is in itself an analog declaration of intent. Such a writing must be secured from public scrutiny. Otherwise, it might be recognized as a technically formal declaration of domestic war. Furthermore, whenever any person or group of persons in a position of great power and without full knowledge and consent of the public, uses such knowledge and methodologies for economic conquest – it must be understood that a state of domestic warfare exists between said person or group of persons and the public.

The solution of today’s problems requires an approach which is ruthlessly candid, with no agonizing over religious, moral or cultural values.

You have qualified for this project because of your ability to look at human society with cold objectivity, and yet analyze and discuss your observations and conclusions with others of similar intellectual capacity without the loss of discretion or humility. Such virtues are exercised in your own best interest. Do not deviate from them.

Historical Introduction

Silent weapon technology has evolved from Operations Research (O.R.), a strategic and tactical methodology developed under the Military Management in England during World War II. The original purpose of Operations Research was to study the strategic and tactical problems of air and land defense with the objective of effective use of limited military resources against foreign enemies (i.e., logistics).
It was soon recognized by those in positions of power that the same methods might be useful for totally controlling a society. But better tools were necessary.

Social engineering (the analysis and automation of a society) requires the correlation of great amounts of constantly changing economic information (data), so a high-speed computerized data-processing system was necessary which could race ahead of the society and predict when society would arrive for capitulation.

Relay computers were to slow, but the electronic computer, invented in 1946 by J. Presper Eckert and John W. Mauchly, filled the bill.

The next breakthrough was the development of the simplex method of linear programming in 1947 by the mathematician George B. Dantzig.

Then in 1948, the transistor, invented by J. Bardeen, W.H. Brattain, and W. Shockley, promised great expansion of the computer field by reducing space and power requirements.

With these three inventions under their direction, those in positions of power strongly suspected that it was possible for them to control the whole world with the push of a button.

Immediately, the Rockefeller Foundation got in on the ground floor by making a four-year grant to Harvard College, funding the Harvard Economic Research Project for the study of the structure of the American Economy. One year later, in 1949, The United States Air Force joined in.

In 1952 the grant period terminated, and a high-level meeting of the Elite was held to determine the next phase of social operations research. The Harvard project had been very fruitful, as is borne out by the publication of some of its results in 1953 suggesting the feasibility of economic (social) engineering. (Studies in the Structure of the American Economy – copyright 1953 by Wassily Leontief, International Science Press Inc., White Plains, New York).

Engineered in the last half of the decade of the 1940’s, the new Quiet War machine stood, so to speak, in sparkling gold-plated hardware on the showroom floor by 1954.

With the creation of the maser in 1954, the promise of unlocking unlimited sources of fusion atomic energy from the heavy hydrogen in sea water and the consequent availability of unlimited social power was a possibility only decades away.

The combination was irresistible.

The Quiet War was quietly declared by the International Elite at a meeting held in 1954.

Although the silent weapons system was nearly exposed 13 years later, the evolution of the new weapon-system has never suffered any major setbacks.

This volume marks the 25th anniversary of the beginning of the Quiet War. Already this domestic war has had many victories on many fronts throughout the world.

Political Introduction…

http://www.lawfulpath.com/ref/sw4qw/

This week, President Obama is making his first major visit to Africa since taking office. One topic that’s likely high on his agenda: US investment in African agriculture.

With the global population expected to top 9 billion by 2050, the Obama administration is pushing hard to use foreign development funds to expand farming in the developing world, and especially in Africa. Since 2009, when Obama made a pledge at the G8 Summit in L’Aquila, Italy, to devote massive resources to global “food security,” Congress has committed more than $3.5 billion to an agricultural development program called “Feed the Future.” Congress has since renewed the initiative’s funding.

“After decades in which agriculture and nutrition didn’t always get the attention they deserved,” Obama said in an address last year, “we put the fight against global hunger where it should be, which is at the forefront of global development.”

But the US government’s motivation for investing such a large sum in Feed the Future isn’t entirely altruistic. Here’s a look at some of the other reasons behind the sudden enthusiasm for agriculture in the developing world.

I’ve heard that hunger had something to do with the Arab Spring. Is that true?

Possibly. The impetus for Feed the Future goes back to the food price crisis of 2007-08, when prices for basic commodities like corn rose dramatically all over the world. Among middle-class consumers in the United States and Europe, the spike in prices went largely unnoticed. But in developing nations such as Côte d’Ivoire and Haiti, where families typically spend a large portion of their incomes on food, it led to riots. Some observers theorized that the price spike hastened the start of the Arab Spring.

At a May 2008 hearing on the food price crisis, Sen. Richard Lugar (R-Ind.) predicted that shortages of food “are likely to recur frequently if the United States and the global community fail to open up agricultural trade and invest in agricultural productivity in the developing world.” The damage of the food crisis, he added, “likely would have been ameliorated if more of the world’s poor farmers had access to better technology, titled land, small loans, extension support, and accessible markets.”

Do US businesses stand to profit from all this new farming development in Africa?

Absolutely. Broadly speaking, the idea behind Feed the Future is to grow more food than ever before by making it easier for global agribusiness companies to invest in poor countries. As USAID head Rajiv Shah indicated at the official unveiling of Feed the Future in 2010, the agency could advocate on companies’ behalf to make investment easier in partner countries.

“If you’re from the private sector, tell us what countries and donors can do to reduce constraints on business operations,” he said.

The US government appears to already be doing this, as a recent analysis of dumped embassy cables found that the State Department had lobbied governments around the world to adopt policies allowing for the cultivation of genetically modified crops.

“[S]ome may see our work in Africa as philanthropy, but it’s much more than that,” said General Mills CEO Ken Powell at an event hosted by the World Food Prize Foundation. “It’s about creating shared value, and for our African partners, it is about unlocking opportunity—business opportunity—through knowledge-sharing.”

What’s Feed the Future done so far?

At the end of of 2012, USAID had disbursed slightly more than $1 billion of the $3.7 billion obligated by Congress for Feed the Future. The initiative has supported a wide variety of programs: In 2011, for example, PepsiCo partnered with USAID under the Feed the Future rubric to employ farmers in Ethiopia to grow chickpeas for domestic consumption, as well as for export for use in Sabra hummus. (PepsiCo co-owns the Sabra brand with the Israeli company Strauss Group Ltd.) Similarly, Walmart received USAID funding to train farmers in Guatemala to grow tomatoes for stores in Latin America. In the words of USAID’s brochure, USAID and Walmart would steer small farmers to “to more market-oriented production, based on expected consumer demand.” In 2012, Powell announced that an organization co-founded by General Mills, Partners in Food Solutions, would join with USAID to make a combined $15 million investment in training for food processors in Southern and Eastern Africa.

What’s so bad about that?

In theory, nothing. But similar efforts in the past haven’t always turned out as well as hoped. Devlin Kuyek, a researcher for the Barcelona-based nonprofit GRAIN, pointed to one relevant example: In 2007, Swiss agribusiness giant Nestlé joined with the Gates Foundation to make a major investment in the Kenyan dairy industry. According to a statement from Nestlé, the company chose the project’s Rift Valley site because of its potential for production growth. They weren’t the only ones to see an opportunity: The following year, Land O’Lakes followed Nestlé to Kenya and introduced a USAID-backed program to modernize the country’s dairy industry. In the words of Michael Yost, a manager for USDA’s Foreign Agriculture Service, the project was part of an effort to help poor countries “participate in world trade” and “bring their agricultural economies into the 21st century.”…

http://www.motherjones.com/blue-marble/2013/06/explainer-us-governments-push-bring-big-ag-africa

Europe begins to think about the introduction of the “second euro for the chosen.” The EU countries with most robust economies should issue their own single currency. This can be a goal to pursue for Germany and the Netherlands in the first place, experts say. France is not in the group: its economic situation is too unstable to make the country a member of the “financial VIP Club.”

This was said by the former European Commissioner for Internal Market, Frits Bolkestein, on Dutch television. According to him, the new European money should be in use on a par with the joint European currency. The “second euro” will be issued by the Central Bank of Germany. This measure, according to the politician, will allow most creditworthy EU states to protect their financial positions under the conditions of another financial crisis, the main part of which of which is yet to come. “It’s time to bring order in chaos,” said Frits Bolkestein.

France, which is traditionally referred to as one of the leading countries in the European Union, will not be allowed to join the financial VIP club, Bolkestein believes. According to him, the country is “governed poorly” and is “practically bankrupt.”

Despite the fact that the politician was too harsh in his remarks about France, there is a grain of truth in his words. The country has a huge foreign debt, as well as quite sizeable budget deficit. This is a very serious problem against the background of eccentric economic policies of the current French leadership. It is not obvious at all that the state will be able to solve them painlessly, since the decisions taken by the authorities are not always reasonable and adequate. For example, the introduction of the infamous 75-percent tax on luxury to improve the financial situation of the country stirred up quite a controversy. Despite the fact that the Constitutional Court of France banned the tax, President François Hollande continues to attempt to somehow bring it back, at least for businesses that pay their workers higher wages…

http://english.pravda.ru/business/finance/28-06-2013/124983-europe_euro-0/

%d bloggers like this: