Albert Rosales and his very Strange World, # 84

Location. Idaho, (exact location not given)
Date: October 23 2009
Time: 0500a
The night before the witness had been noticing many “shooting stars” in the sky and counted 24 of them. Tonight he was watching on his backyard porch when he saw a red shining object suddenly appear and move over the house. So he ran to the front door and watched it until it stopped and then another shining star-like light began blinking on and off. Then the red object would do the same, and as he watched the star-like object moved over the red object and they both disappeared. Later he awoke around 05:00 to smoke a cigarette and hoping to see more ‘shooting stars’. Suddenly he felt fearful and although it was dark outside he saw something like the shape of a human in the backyard where the tall weeds and a small fence were located. The human shape was rather tall and what frightened him the most was that it was coming in his direction and it looked like a dim light was outlining its shape. As it moved closer it did not disturb the weeds as it moved through them. Frightened the witness quickly ran back into the house and shut the door. He was unable to go back to sleep.

HC addendum
Source: http://mufoncms.com/
Type: D?

111.
Location. Barrio Sintonia de la Cumbre, Capilla del Monte, Argentina
Date: November 2009
Time: night
Several young witnesses hanging out at a local plaza (Plaza Fatima) reported being approached on several occasions by short dwarf-like beings, about 1m in height, wearing black pants, white shirts, with large feet and using quick “aggressive movements”. According to some of the witnesses the “dwarves” approach witnesses and ask for ‘cigarettes’ if refused they would hit the unsuspecting witness. Allegedly one of the witnesses reportedly committed suicide after encountering the strange entities. They have been seen several nights in a row. No other information.

HC addendum
Source: Proyecto Catent, Capilla del Monte Argentina
Type: E?

Aliens and Wright – Patterson

Day reports on stories of wreckage and alien bodies being shipped to the largest base of the Air Force, Wright-Patterson. He interviews numerous Air Force personnel and authors, Kevin Randle and Donald R. Schmitt to determine if there had been a government cover-up.

[tube]uiD9vjq2xpk[/tube]

CURIOUS SPOT ON THE SOUTH WALL OF ARCHULETA MESA, DULCE, NEW MEXICO: via Norio Hayakawa

[tube]pvC32kSuQfY[/tube]

August 6, 2012
by Norio Hayakawa.
Courtesy of Isabel Lopez of Albuquerque, New Mexico, who first noted this interesting “Y” configuration as seen from an aerial photo.
This spot, part of the steep, rocky south wall of the Archuleta Mesa, is located about 1400 feet north of the J-2 dirt road, not far from the bridge over the Navajo River, Dulce, New Mexico and slightly west of the Archuleta Peak where the communication towers are located.
Apparently this spot, the “Y” configuration, is not visible from anywhere except when seen directly from above.
Could it be a 25 foot-long vent?
We just do not know for sure.
It could be anything.
But to actually get to this particular spot may be logistically difficult.
We will just have to wait and see if any other information comes this way.
Norio Hayakawa at:

If You See This Google Warning, Act Fast: Big Brother is Watching

By Dr. Mercola

Big Brother is watching. No kidding. And the warning is coming from none other than Google, which says government spies may be spying on you. Some believe the Google announcement may be related to the recent discovery of the data-mining virus named “Flame.” In a June 3 New York Times article, Andrew Kramer and Nicole Perlroth write1:

“When Eugene Kaspersky, the founder of Europe’s largest antivirus company, discovered the Flame virus that is afflicting computers in Iran and the Middle East, he recognized it as a technologically sophisticated virus that only a government could create.

He also recognized that the virus, which he compares to the Stuxnet virus built by programmers employed by the United States and Israel, adds weight to his warnings of the grave dangers posed by governments that manufacture and release viruses on the internet.

“Cyberweapons are the most dangerous innovation of this century,” he told a gathering of technology company executives… While the United States and Israel are using the weapons to slow the nuclear bomb-making abilities of Iran, they could also be used to disrupt power grids and financial systems or even wreak havoc with military defenses.”

Mr. Kaspersky claims he was called in to investigate the new virus on behalf of the International Telecommunication Union, an agency of the United Nations. The virus was allegedly erasing files on computers belonging to the Iranian oil ministry.

What makes the Flame virus a major potential concern for common citizens of the world is the fact that it’s the first virus found with the ability to spread wirelessly by attaching itself to Bluetooth-enabled devices.

Once there, it can not only trace and steal information stored on those devices; according to Kramer and Perlroth the program also contains a “microbe” command that can activate any microphone within the device, record whatever is going on at the time—presumably whether you’re actually using the device or not—and transmit audio files back to the attacker. This, clearly, has huge privacy implications were it to be deployed against civilian populations.

New Revelations about the Links Between Flame and Stuxnet
While cybersecurity experts initially claimed there were no links between the earlier Stuxnet worm and the Flame virus, a recent article on The Verge now reports that the two are undoubtedly related2. Joshua Kopstein writes:

“[I]n examining an earlier version of Stuxnet, the lab’s researchers now find that they were wrong: a previously overlooked module within the virus is now providing the “missing link” between the two pieces of malware. The module in question… matches very closely with a module used by an early version Flame. “It was actually so similar, that it made our automatic system classify it as Stuxnet,” wrote Alexander Gostev… indicating that the module was likely the seed of both viruses. “We think it’s actually possible to talk about a ‘Flame’ platform, and that this particular module was created based on its source code.”

The new evidence suggests that Stuxnet and Flame are two sides of the same coin, with the former built for sabotage and the latter for surveillance. But researchers also say that the Flame platform pre-dated Stuxnet and its sister, Duqu, and was likely built in the Summer of 2008.”

InformationWeek Security recently offered the following advice3:”… Microsoft has been working quickly to patch the certificate bug exploited by Flame. Notably, Microsoft released an update Friday [June 8] for Windows Server Update Services (WSUS) 3.0 Service Pack 2 (SP2), which according to the release notes “strengthens the WSUS communication channels … [by] trusting only files that are issued by the Microsoft Update certification authority.”

Microsoft is also set to issue an update Tuesday–as part of its monthly Patch Tuesday–that will further update all supported versions of Windows to block Flame. Security experts are recommending that all users install the update as soon as possible, since attackers will likely attempt to use the certificate vulnerability before it becomes widely patched. “Apply the certificate patch released a week ago today if you haven’t done so already,” said SANS Institute chief research officer Johannes B. Ullrich in a blog post. “This way, no patch signed by the bad certificate should be accepted tomorrow. Patch Tuesday is one of the best dates to launch such an attack, as you do expect patches anyway.”

When installing the update, however, do so preferably only if using a trusted environment. “Avoid patches while ‘on the road.’ Apply them in your home [or] work network whenever possible,” said Ullrich. “This doesn’t eliminate the chance of a ‘man in the middle’ (MitM) attack, but it reduces the likelihood.”

For users who must update while on the road, perhaps because they travel frequently, always use a VPN connection back to the corporate network, said Ullrich, since hotel networks can be malware and attack hotbeds. “Hotel networks and public hotspots frequently use badly configured HTTP proxies that can be compromised and many users expect bad SSL certificates–because of ongoing MitM attacks,” he said.”

Spy Central: Utah
In related news, Wired Magazine recently reported that the US government is building a massive spy center, right in the heart of Mormon country, in Bluffdale, Utah4–so massive, in fact, that once finished, the facility will be five times larger than the US Capitol.

According to Wired Magazine:

“Under construction by contractors with top-secret clearances, the blandly named Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks. The heavily fortified $2 billion center should be up and running in September 2013.

Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital “pocket litter.” It is, in some measure, the realization of the “total information awareness” program created during the first term of the Bush administration—an effort that was killed by Congress in 2003 after it caused an outcry over its potential for invading Americans’ privacy.

But “this is more than just a data center,” says one senior intelligence official who until recently was involved with the program. The mammoth Bluffdale center will have another important and far more secret role that until now has gone unrevealed. It is also critical, he says, for breaking codes.

And code-breaking is crucial, because much of the data that the center will handle—financial information, stock transactions, business deals, foreign military and diplomatic secrets, legal documents, confidential personal communications—will be heavily encrypted. According to another top official also involved with the program, the NSA made an enormous breakthrough several years ago in its ability to cryptanalyze, or break, unfathomably complex encryption systems employed by not only governments around the world but also many average computer users in the US.

The upshot, according to this official: “Everybody’s a target; everybody with communication is a target.”[Emphasis mine]

That about says it all. And for those of you still under the mistaken belief that the US government does not have the authority to spy on its citizens, consider the following:

“… [The NSA] has undergone the largest building boom in its history, including installing secret electronic monitoring rooms in major US telecom facilities. Controlled by the NSA, these highly secured spaces are where the agency taps into the US communications networks, a practice that came to light during the Bush years but was never acknowledged by the agency. The broad outlines of the so-called warrantless-wiretapping program have long been exposed…

In the wake of the program’s exposure, Congress passed the FISA Amendments Act of 2008, which largely made the practices legal. Telecoms that had agreed to participate in the illegal activity were granted immunity from prosecution and lawsuits. What wasn’t revealed until now, however, was the enormity of this ongoing domestic spying program.

For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail…

As chief and one of the two cofounders of the agency’s Signals Intelligence Automation Research Center, [William] Binney and his team designed much of the infrastructure that’s still likely used to intercept international and foreign communications. He explains that the agency could have installed its tapping gear at the nation’s cable landing stations—the more than two dozen sites on the periphery of the US where fiber-optic cables come ashore.

If it had taken that route, the NSA would have been able to limit its eavesdropping to just international communications, which at the time was all that was allowed under US law.

Instead it chose to put the wiretapping rooms at key junction points throughout the country… thus gaining access to not just international communications but also to most of the domestic traffic flowing through the US. The network of intercept stations goes far beyond the single room in an AT&T building in San Francisco exposed by a whistle-blower in 2006. “I think there’s 10 to 20 of them,” Binney says… The eavesdropping on Americans doesn’t stop at the telecom switches. To capture satellite communications in and out of the US, the agency also monitors AT&T’s powerful earth stations…

… Binney suggested a system for monitoring people’s communications according to how closely they are connected to an initial target. The further away from the target—say you’re just an acquaintance of a friend of the target—the less the surveillance. But the agency rejected the idea, and, given the massive new storage facility in Utah, Binney suspects that it now simply collects everything…”

To learn more, I highly recommend reading the featured Wired article5 in its entirety. It’s a fascinating read, but it will not likely make you sleep better at night. The full article is available on their website and is free to view.

Google Also in the Privacy News
Beginning the first week of June, Google will warn you every time it picks up activity on your computer account that looks suspiciously like someone trying to monitor your computer activities. Google won’t say how it figured out that state-sponsored attackers may be attempting to compromise your account or computer. But it’s promised to let you know if it thinks Big Brother is tuned in to what you’re doing.

As recently reported on the New York Times’ blog6, the warning will pop up at the top of your Gmail inbox, Google home page, or Chrome browser, stating:

“Warning: We believe state-sponsored attackers may be attempting to compromise your account or computer.”

According to a Google blog post by Eric Grosse, VP of Security Engineering at Google7:

“If you see this warning it does not necessarily mean that your account has been hijacked. It just means that we believe you may be a target, of phishing or malware for example, and that you should take immediate steps to secure your account.

Here are some things you should do immediately: create a unique password that has a good mix of capital and lowercase letters, as well punctuation marks and numbers; enable 2-step verification as additional security; and update your browser, operating system, plugins, and document editors.

Attackers often send links to fake sign-in pages to try to steal your password, so be careful about where you sign in to Google and look for https://accounts.google.com/ in your browser bar. These warnings are not being shown because Google’s internal systems have been compromised or because of a particular attack.”

The Next Big War Zone = the Internet
Unless you’ve been living under a rock this past year, you’ve surely heard about the repeated attempts to restrict your online freedom and grant government near limitless control over the internet and its content.

It began in January with the introduction of two proposed laws in US Congress: the Stop Online Piracy Act (SOPA), and the Protect IP Act (PIPA). While “sold” as laws to address online copyright infringement, most of which allegedly arise from outside the US, both laws contained measures capable of severely restricting online freedom of speech and harm web sites and online communities of all kinds, including this one. After tens of millions of people rose up in various protests, both online and by hitting the pavement, both bills were “indefinitely postponed.”

Many have warned, however, that the bills are not “dead” and are likely to return.

It didn’t take long for the next round. In April, the Cyber Intelligence Sharing and Protection Act (CISPA) was brought forth, and quickly became described by opponents as an even greater threat to internet freedom than SOPA and PIPA. I won’t go into any detailed discussion on these bills here, but simply want to bring your attention to the fact that bills such as these three, while dressed up as laws that will protect you and save you money, are poorly guised attempts to gut privacy laws and open the door for a totalitarian takeover of the internet and its content.

Campaign for Liberty8 is continuing its fight to stop another government intrusion, warning that this coming December, the United Nations will also be meeting to compile even more recommendations for international internet regulations.

While it may seem hopeless at times, I urge you to take an active role anytime the opportunity presents itself to take a stand. I personally believe internet freedom and health freedom go hand in hand these days, as a majority of people get a majority of their health information from freely available web sites such as mine.

Right now, you can sign the Campaign for Liberty Protect Internet Freedom Mandate.

If Squelching In formation Freedom Doesn ‘t Work, What’s Next?
The draconian advancements in surveillance do not end with the erection of a massive spy central and ever-increasing attacks on internet freedom. We also have some 63 drone launch sites within the US9, and the US military has admitted it now has drone technology in the form of tiny mechanical insects, equipped with cameras, microphones, and DNA sampling capabilities10.

Besides that, there’s an ever-expanding arsenal of so-called “active denial weapons”—directed energy weapons that can scatter or incapacitate those in its path, by a variety of means11. Such weapons are already being used domestically by various law enforcement agencies for crowd control. Then there are more sinister signs of readiness for domestic combat. In April, news reports began circulating questioning the Department of Homeland Security’s rationale for purchasing 450 million rounds of hollow point bullets12

A report by RT News reads:

“The department has yet to discuss why they are ordering such a massive bevy of bullets for an agency that has limited need domestically for doing harm, but they say they expect to continue receiving shipments from the manufacturer for the next five years, during which they plan to blow through enough ammunition to execute more people than there are in the entire United States.

… the choice — and quantity — of its hollow point order raises a lot of questions about future plans for the DHS… On their website, the contractor claims that the ammunition is specifically designed so that it can pass through a variety of obstructions and offers “optimum penetration for terminal performance.” Or, in other words, this is the kind of bullet designed to stop any object dead in its tracks and, if emptied into the hands of the DHS a few hundred million times, just might do as much.

… As the DHS gains more and more ground in fighting terrorism domestically, the US at the same time has turned the tables to make its definition of terrorist way less narrow. With any American blogger or free thinking on the fringe of what the government can go after under H.R. 347, or the National Defense Authorization Act that allows for the indefinite detention of US citizens without charge, the DHS could just be blasting through what’s left of its budget to make sure that its roster of agents across the country can get in their target practice over the next few years.”

Without Online Freedom, You Cannot Exercise Health Freedom
Some of you may at this point wonder why I report on an issue such as this, so let me make this point clear. Access to health information could easily be deemed a “threat” to national welfare—especially when web sites such as this one publish information that contradicts the official government stance. Examples such as advising women against national mammography screening standards, or raising concerns about vaccine safety, or questioning conventional cancer treatments could all be considered a threat to an extremely profitable status quo.

In such a scenario, they could simply shut Mercola.com, and others like us, down; leaving you with no truth-telling, corruption-exposing, alternative voices other than the officially sponsored viewpoint. And it should be quite clear by now that the government-sanctioned stance on most issues relating to health and diet are primarily dictated by powerful lobbying groups furthering financially-driven industry agendas that have absolutely nothing to do with optimizing health and longevity.

Don’t Be Fooled—Internet Security Bills are Likely Nothing of the Sort
Interestingly enough, CISPA is promoted primarily as a cyber security bill, which brings us full circle back to where this article started. Recall, the Flame virus has surveillance capabilities that far surpass previous viruses and worms that may collect or destroy data. In fact, its capability to transfer to Bluetooth-enabled gadgets and secretly activate microphones renders it perfect for spying on anyone and everyone, anywhere, at any time… which is exactly the plan, if you believe the information detailed in the featured Wired Magazine article above.

It’s interesting to note the rationale used when trying sell us this bill. According to an April 26 report in the International Business Times13:

“Co-sponsor Rep. Dutch Ruppersberger, D-Md., says CISPA provides essential tools for repelling online security threats: “Without important, immediate changes to American cyber security policy, I believe our country will continue to be at risk for a catastrophic attack on our nation’s vital networks, networks that power our homes, provide our clean water or maintain the other critical services we use every day.”

Sounds like he was talking about an eventuality just like the Flame virus, or the older Stuxnet worm, for that matter—both of which, incidentally, appear to have targeted Iranian oil- and nuclear facilities, and neither of which has been officially traced back to any country or agency, despite our already overwhelming security apparatus—just over a month before Flame was discovered by a Russian antivirus company which, by the way, currently employs the virus hunter who discovered Stuxnet in 2010.

I’ll leave the meaning of such coincidences for you to ponder. But suffice it to say, it does not bode well if a law like CISPA is enacted that allows companies and governments to share information collected online, especially when combined with a massive data-mining virus that can skip around from one wireless piece of technology to another, from computers to cell phones to iPads, gathering data on every single social network contact every single person has, and audio files on every single conversation any one might have at any point in time. Especially now that we will shortly have the facility to store and “process” all that data.

In closing, I will simply urge you to take efforts at curbing online freedom and extending the government’s reach seriously, and whenever such efforts are launched, take action to help preserve your right to health freedom, which is closely tied to the right to online freedom of speech.

For right now, you can take a stand by signing the Campaign for Liberty Protect Internet Freedom Mandate.

878 2.0k Email

Mermaids and Mermen: Part 1–Is it all True Series–#244

I have been a paranormal researcher for over 40 years. For the past five years I have done vortex photography and have captured many interdimensional beings on digital media.  I have pictures of Sasquatch, Ancient Ones, Fairy People, Wee people, ET types, Forest Spirit Beings and other strange beings of unknown categories.

So with that said, why no Mermaids? I have heard stories about them for many years. I recently heard an interesting one through the internet grapevine that reported that sonar from the US Navy beached a pod of whales and within the pod was an alive creature that was very much like a half human, half fish. Now this Hybrid type being was not a beautiful longhaired human looking creature, but rather had more of a monkey face or maybe a little like “The Creature from the Black Lagoon”.

And there are other government groups that are aware of these creatures. These others are not happy with the Navy’s powerful deadly sonar project, since it probably kills thousands of our close relatives such as porpoises and whales, and I guess Mermaids/Mermen.

I have also heard from a couple of reliable sources that sighting by the locals are very common on an island off the coast of Papua New Guinea. They call them “Ri.” The locals’ descriptions of the Mermaids were that they have a more human looking head with lower flipper/fins. There are places on this particular island where the locals can go on a daily basis and see one or two Mermaids fishing or swimming around a reef. These water beings will raise their heads and hold their hands up, to show the humans on shore that they too are some part of the human race.

Wow – the world is strange and wonderful, so much to learn.

Sleep Tight – More to come on Mermaids and Mermen in Part 2 next week.

MWiz.

 

 

Why Does Monsanto Always Win?— From Mercola.com


By Dr. Mercola

If you’ve ever wondered how Monsanto?a company that admits it wants to own the world’s food supply through its patented genetically engineered seeds?gets away with not having to label its products, all you have to do is follow the trail of money leading from their coffers into the pockets and campaign funds of well-placed politicians and regulators.

According to OpenSecrets.org1, Monsanto basically lives at the doorsteps of legislators in Washington, where it spent $5.3 million last year lobbying the nation’s lawmakers, and has already spent $1.4 million in the first three months of this year.

Needless to say, they can afford it. According to OpenSecrets.org, Monsanto had an annual revenue of $11.8 billion last year, so a $5.3 million lobbying investment is far less than one percent of one percent of their revenues.

The influence they’re trying to buy doesn’t stop in Congress, though. Monsanto’s legislative agenda also includes the U.S. Department of Agriculture (USDA), the Food and Drug Administration (FDA), and the Environmental Protection Agency (EPA); all of which have a say in whether or not you get to know whether the food you’re eating has been genetically engineered.

Can You Trust a System Powered by Lobbying?

The power of Monsanto can be seen through its contributions to Rep. Frank D. Lucas, who’s received the most money so far from Monsanto. Lucas just happens to be chairman of the House Agriculture Committee, through which every farm-related piece of legislation must pass. But he’s certainly not the only one wheel getting greased by this biotech giant.

According to OpenSecrets.org:

“‘…So far this election cycle, Monsanto’s PAC has given $77,500 to 17 members of the House agriculture committee, or their leadership PACs.'” …Monsanto’s interests in Washington are diverse.

It lobbied bills ranging from the American Research and Competitiveness Act of 20112, which would extend tax credits for companies doing research, to several bills that would change the way the Department of Homeland Security handles security at chemical facilities — chemicals being a big part of Monsanto’s product portfolio.

… Another upcoming matter of great interest to Monsanto: the new farm bill, an omnibus piece of legislation that sets the nation’s agricultural policy and deals with nearly every aspect of the country’s farming and food industries. The current bill expires in 2013; when it went through Congress, Monsanto filed more lobbying reports on it than any other organization. The process of piecing together a new proposal is already well under way.”

Such lobbying efforts can, and do, have a tremendous impact on the lives and health of every American, not to mention the environment. It directly impacts the food you end up with on your plate, and whether or not you’re allowed to know what’s in the food you eat to begin with. Monsanto and other biotech companies involved with genetic engineering of crop seeds are currently fighting tooth and nail to prevent labeling of genetically engineered foods, knowing full well that such a label has the potential to destroy their burgeoning industry.

Why Monsanto Always Wins

Last year, Monsanto lobbied Congress and the U.S. Department of Agriculture concerning regulations that would affect genetically engineered crops such as the company’s Roundup Ready soybeans and alfalfa. As a result, genetically engineered alfalfa was deregulated, despite strong opposition from the organic industry and massive public outcry.

An interesting article from last year by Mike Ludwig, titled “Why Monsanto Always Wins,” sheds light on the shady approval process of genetically engineered crops3.

According to Ludwig, there’s evidence of “cooperation” between federal regulators and the biotech industry that crosses the line of acceptable involvement during the regulatory review. He also cites Bill Freese, a policy analyst with CFS, who told Truthout that “the approval process for controversial genetically engineered (GE) crops like Roundup Ready alfalfa is basically a ‘sham’ designed to increase consumer confidence in the controversial GE crops,” and that in his years of battling against biotech, “he can’t remember a single case when regulators failed to eventually grant approval of a GE crop.”

To get an idea of just how broad and deep Monsanto’s reach is, take a look at the following chart. Over the years, this biotech giant has successfully infiltrated an ever increasing number of high-level federal regulatory positions in the U.S. government; many of which are positions meant to protect your food safety…

Crazy Patent Laws Prevent Independent Researchers from Studying GE Hazards

To give you another example of how Monsanto has been able to carefully position itself and its wares into a near-invincible position, consider this: The reason why genetically engineered food hazards have never been studied beyond 30 days, nor are currently being studied, is because the corporations controlling the patented seeds, such as Monsanto, are allowed to prevent independent studies per current patent laws.

That’s right, genetically engineered foods are patented inventions protected under copyright and proprietary information laws. And the corporations controlling the seeds only allow them to be studied under very limited conditions, and rarely (if ever) do they permit them to be studied for safety by anyone but the USDA—which conveniently has not yet seen the need to conduct rigorous long-term safety studies on genetically engineered foods.4

How Monsanto is Now Positioned to Potentially Decimate Africa

Monsanto’s political influence clearly reaches far beyond our U.S. borders. Most recently, in an effort to “end hunger in Africa,” the Obama administration drafted some of the world’s largest food and finance companies to invest in projects all over the continent5. Much of the $3 billion effort will go toward developing seeds and fertilizers and building silos for storage. To do this, the President has rounded up the usual suspects, which includes Monsanto.

However, unlike the U.S., some donor countries are insisting that their money be spent on traditional food handouts instead of genetically engineered monoculture, such as that offered by Tanseed, a Tanzanian seed company that will spend $11 million buying certified seed to be sold in little packets to small farmers.

Still, the evidence tells us genetically engineered crops cannot coexist with organic or conventional crops. They usually end up contaminating nearby fields, turning those farmers into patent-infringing criminals in the process—a scenario no farmer on any continent could ever have imagined a couple of decades ago.

Another project seeking to establish genetically engineered crops in Africa is the Alliance for a Green Revolution in Africa (AGRA). Through this alliance, heavy-weights like Monsanto and other biotech companies, along with the Gates Foundation, are foolishly promoting GE crops as the answer to Africa’s hunger problem.

But donating patented seeds, which takes away the farmers’ sovereignty, is not the way to save the third-world poor.

The Gates Foundation has donated hundreds of millions of dollars to AGRA, and in 2006 Robert Horsch was hired for the project. Horsch was a Monsanto executive for 25 years. In a nutshell, the project may be sold under the banner of altruism and ‘sustainability’, but in reality it’s anything but. It’s just a multi-billion dollar enterprise to transform Africa into a GE-crop-friendly continent.

In the end, such “humanitarian” efforts are doomed to fail while allowing Big Biotech to make obscene profits at the poor’s expense. African farmer’s will likely encounter the same problems as those in India, where farmers growing genetically engineered crops have been committing suicide due to financial hardships at a rate of one farmer taking his own life every 30 minutes…

Brazilian Farmers Sue Monsanto for Unfair and Exorbitant Profits

A recent lawsuit against Monsanto by Brazilian farmers also highlights the harsh economic realities for farmers who take up growing genetically engineered crops. According to a recent RT News article6:

“Five million Brazilian farmers are locked in a lawsuit with US-based biotech giant Monsanto, suing for as much as 6.2 billion euros… The farmers claim that Monsanto unfairly collects exorbitant profits every year worldwide on royalties from ‘renewal’ seed harvests. ‘Renewal’ crops are those that have been planted using seed from the previous year’s harvest.

While the practice of renewal farming is an ancient one, Monsanto disagrees, demanding royalties from any crop generation produced from its genetically-engineered seed. Because the engineered seed is patented, Monsanto not only charges an initial royalty on the sale of the crop produced, but a continuing 2 per cent royalty on every subsequent crop, even if the farmer is using a later generation of seed.

‘Monsanto gets paid when it sell the seeds. The law gives producers the right to multiply the seeds they buy and nowhere in the world is there a requirement to pay (again). Producers are in effect paying a private tax on production,’ Jane Berwanger, lawyer for the farmers told the Associated Press reports.

In the latest installment of the legal battle erupting in South America, the Brazilian court has ruled in favor of the Brazilian farmers, saying Monsanto owes them at least US$2 billion paid since 2004. Monsanto, however, has appealed the decision and the case is ongoing. In essence, Monsanto argues that once a farmer buys their seed, they have to pay the global bio-tech giant a yearly fee in perpetuity – with no way out.”

Why We Need Labeling of Genetically Engineered Foods

In the U.S., labeling genetically engineered foods is likely the best shot we have at circumventing Monsanto’s power-grabbing ways and stopping the unchecked proliferation of genetically engineered foods. This is why we strongly support state initiatives, such as California’s 2012 ballot initiative to require genetically engineered foods sold in the state to be labeled. As consumers, we all have a right to know what’s in our food.

This is a powerful strategy that could have the impact of a national law.

Why?

Because large food companies are unlikely to have dual labeling; one for California and another for the rest of the country. It would be very expensive, not to mention a logistical and PR nightmare. To avoid the dual labeling, many would likely opt to ditch genetically engineered ingredients from their products entirely.

This is why supporting this initiative is so important, as victory in California will likely eliminate most genetically engineered foods from the rest of the U.S. as well.

Powerful confirmation of this belief occurred earlier this year, when both Coca-Cola Company and PepsiCo Inc. chose to alter one of their soda ingredients as a result of California’s labeling requirements for carcinogens7. This is a PERFECT example of the national impact a California GE labeling requirement can, and no doubt WILL, have. While California is the only state requiring the label to state that the product contains the offending ingredient, these companies are switching their formula for the entire US market, rather than have two different labels:

“Coca-Cola Co. and PepsiCo Inc. are changing the way they make the caramel coloring used in their sodas as a result of a California law that mandates drinks containing a certain level of carcinogens bear a cancer warning label. The companies said the changes will be expanded nationally to streamline their manufacturing processes. They’ve already been made for drinks sold in California.”

AAEM Recommends GMO Free Diet

As you may recall, two years ago, the American Academy of Environmental Medicine (AAEM) called on all physicians to prescribe diets without genetically engineered foods to all patients8. But you’d be hard-pressed to find a doctor who is aware of and/or actually follows this recommendation… At that time, the AAEM called for a moratorium on genetically engineered foods, long-term independent studies, and labeling, stating:

“Several animal studies indicate serious health risks associated with GM food, including infertility, immune problems, accelerated aging, insulin regulation, and changes in major organs and the gastrointestinal system. …There is more than a casual association between genetically modified foods and adverse health effects. There is causation…”

Learn More about Genetically Engineered Foods

Due to lack of labeling, many Americans are still unfamiliar with what genetically engineered foods are. We have a plan to change that, and I urge you to participate and to continue learning more about genetically engineered foods and helping your friends and family do the same.

Your BEST strategy is to simply buy USDA 100% Organic products whenever possible, (as these do not permit genetically engineered ingredients) or buy whole fresh produce and meat from local farmers. The majority of the genetically engineered organisms (GMOs) you’re exposed to are via processed foods, so by cooking from scratch with whole foods, you can be sure you’re not inadvertently consuming something laced with altered ingredients.

When you do purchase processed food, avoid products containing anything related to corn or soy that are not USDA certified to be 100 percent organic, as any foods containing these two non-organic ingredients are almost guaranteed to contain genetically engineered ingredients, as well as toxic herbicide residues. To learn more about genetically engineered foods, I highly recommend perusing the many videos and lectures available on the IRT site.

Please Continue Supporting California’s Ballot Initiative to Label GMO’s!

The California Right to Know Genetically Engineered Food Act9 has already been submitted to the State Attorney General. The next step is the campaigning. Remember, if California can get the law passed in November, it’s going to have the same impact as national law, for the reasons I mentioned earlier.

It’s going to be an enormous battle, as the biotech industry will outspend us by 100 to 1, if not more, for their propaganda. So needless to say, the campaign needs funds. If you have the ability, I strongly encourage you to make a donation.

I urge you to get involved and help in any way you can. Be assured that what happens in California will affect the remainder of the U.S. states, so please support this important state initiative, even if you do not live there!

If you live in California and want to get involved, please contact LabelGMOs.org. Pamm Larry will go through all volunteer requests to put you into a position that is suitable for you, based on your stated interests and location
No matter where you live, please help spread the word in your personal networks, on Facebook, and Twitter. For help with the messaging, please see LabelGMOs.org’s “Spread the Word!” page
Whether you live in California or not, please donate money to this historic effort via the Organic Consumers Fund
Talk to organic producers and stores and ask them to actively support the California Ballot. It may be the only chance we have to label genetically engineered foods.
For timely updates, please join the Organic Consumers Association on Facebook, or follow them on Twitter.
Look for in-depth coverage of the issue at the Institute for Responsible Technology, subscribe to Spilling the Beans, and check out their Facebook or Twitter.

Albert Rosales and his very Strange World, # 83

Location. La Pampa province, Argentina
Date: October 20 2009
Time: 2000
The 65 year old female witness (involved in a previous encounter) had briefly stepped into her house to say goodbye to her nephew when she saw a strange creature standing in her living room. In a courageous move the woman walked to a nearby table in the intent to obtain a camera that she had there. After she grabbed the camera and turned around to obtain the photo the creature suddenly placed one of his hands on the witness’s forearm and at that same moment the witness seemed to loose all strength and fell to the ground. According to her family she remained in a semi-conscious state from 15 to 20 minutes. She was then able to call her son on her cellphone and when he came over she was found sitting on a chair and the camera lying on the floor. Strange palm prints were found on the witness forearm. A small dog that always accompanied the witness was found hiding under the sofa in a state of shock. Within hours the marks on her forearm changed color and the next day they had blistered, the witness popped the largest blister and a strange yellowish liquid oozed out in great quantity. She described the being as about 2meters in height, with a very thin built ‘but with great energy’. The creature’s eyes seemed sunk in into its face, the nose was flat ‘like an ape’ and the mouth was just a thin line. The creature’s skin was grayish-green in color and wrinkled. She felt that the creature had five fingers on each hand. Strangely, and according to the witness the creature gave out an aura of ‘tenderness’. The witness had the same or similar being back in November 2007 at the same location.

HC addendum
Source: http://ceufo.blogspot.com/2009
Type: E

UFO Files: The Brazilian UFO Crash — via Forbidden Knowledge TV .com

In January, 1996, in the town of Varginha,
Brazil, a number of ‘aliens’ were apparently
sighted, captured or killed by locals and turned
over to US authorities. As many as six aliens
were said to have seen in the area, and were
described as 3 to 4 feet tall with dark brown
hairless skin, big triangular heads with three
short ‘horns’ and huge red eyes.

It sounds like a fairytale, but there were more
than a hundred local witnesses who swear to
what they saw.

Money Talks — But Truth Wins — don't you love it.

This also shows you where the KOCH Brothers are in the world of disinformation.– its a sad place we live in.
The Converted Skeptic From Accuweather.com
Jul 31, 2012; 1:42 AM ET
Dr. Richard A. Muller, a professor of physics at the University of California, Berkeley who used to be strong skeptic of global warming before the objective analysis by the Berkeley Earth Surface Temperature (BEST) project, which he founded with his daughter Elizabeth has now gone a step farther and now states that it appears likely that essentially all of the 1.5 degree F, temperature increase over the past 50 years is from the human emission of greenhouse gases.

Dr. Muller explained his change in thinking in an NY Times op-ed from this past weekend. Check it out then feel free to comment below.

Dr. Muller

What is also interesting is the the fact that the Berkeley Earth Surface Temperature project had received $150,000 from the Charles G. Koch Charitable Foundation, whose namesake also runs the climate skeptic research program The Heartland Institute, according to Business Insider.

The views expressed are those of the author and not necessarily those of AccuWeather, Inc. or AccuWeather.com
blogs Home >