Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged epidemiology

Rss Feed Group items tagged

Gary Edwards

Obama Playing America For a Fool on Second Amendment | Tea Party - 0 views

  •  
    "In pursing this political agenda, Obama will certainly neglect credible and important research demonstrating the psycho-active drugs being prescribed wholesale by psychiatrists in the nation's public schools cause suicidal tendencies and violent behavior by the underage children who are forced to take these drugs. Writing in Ethical Human Sciences and Services, a peer-reviewed scholarly journal, in 2003, Dr. Peter R. Breggin, a Harvard-trained psychiatrist and former full-time consultant at the National Institute of Mental Health, concluded SSRI drugs (Selective Serotonin Re-uptake Inhibitors) could relate in suicide, violence, and other forms of extreme abnormal behavior, as evidenced in case reports, controlled clinical trials, and epidemiological studies in children and adults. Readers are invited to examine a long list of school-related violent incidents that are fully documented to be related to psychoactive medications that psychiatrists and other medical doctors have prescribed for children in schools. The evidence that Dr. Breggin is right is overwhelming, even though the scientific research proving drugs cause violence is completely ignored in the politically motivated gun law debate the White House is pushing on the American people. Obama and the Democrats will never consider that school shooters themselves are the victims of teacher union-imposed social control measures that depend on dispensing these drugs without any appreciation of the risk." ................ Incredible list of psychoactive medications responsible for violent shootings and mass murder:   http://ssristories.com/index.php
Paul Merrell

Government Assessment of the Syrian Government's Use of Chemical Weapons on August 21, ... - 0 views

  • The United States Government assesses with high confidence that the Syrian government carried out a chemical weapons attack in the Damascus suburbs on August 21, 2013. We further assess that the regime used a nerve agent in the attack. These all-source assessments are based on human, signals, and geospatial intelligence as well as a significant body of open source reporting.Our classified assessments have been shared with the U.S. Congress and key international partners. To protect sources and methods, we cannot publicly release all available intelligence – but what follows is an unclassified summary of the U.S. Intelligence Community’s analysis of what took place.
  • We assess with high confidence that the Syrian government carried out the chemical weapons attack against opposition elements in the Damascus suburbs on August 21. We assess that the scenario in which the opposition executed the attack on August 21 is highly unlikely. The body of information used to make this assessment includes intelligence pertaining to the regime’s preparations for this attack and its means of delivery, multiple streams of intelligence about the attack itself and its effect, our post-attack observations, and the differences between the capabilities of the regime and the opposition. Our high confidence assessment is the strongest position that the U.S. Intelligence Community can take short of confirmation. We will continue to seek additional information to close gaps in our understanding of what took place.
  • We assess with high confidence that the Syrian regime has used chemical weapons on a small scale against the opposition multiple times in the last year, including in the Damascus suburbs. This assessment is based on multiple streams of information including reporting of Syrian officials planning and executing chemical weapons attacks and laboratory analysis of physiological samples obtained from a number of individuals, which revealed exposure to sarin. We assess that the opposition has not used chemical weapons.
  • ...6 more annotations...
  • The Syrian regime has initiated an effort to rid the Damascus suburbs of opposition forces using the area as a base to stage attacks against regime targets in the capital. The regime has failed to clear dozens of Damascus neighborhoods of opposition elements, including neighborhoods targeted on August 21, despite employing nearly all of its conventional weapons systems. We assess that the regime’s frustration with its inability to secure large portions of Damascus may have contributed to its decision to use chemical weapons on August 21
  • On August 21, a Syrian regime element prepared for a chemical weapons attack in the Damascus area, including through the utilization of gas masks. Our intelligence sources in the Damascus area did not detect any indications in the days prior to the attack that opposition affiliates were planning to use chemical weapons.
  • Multiple streams of intelligence indicate that the regime executed a rocket and artillery attack against the Damascus suburbs in the early hours of August 21. Satellite detections corroborate that attacks from a regime-controlled area struck neighborhoods where the chemical attacks reportedly occurred – including Kafr Batna, Jawbar, ‘Ayn Tarma, Darayya, and Mu’addamiyah. This includes the detection of rocket launches from regime controlled territory early in the morning, approximately 90 minutes before the first report of a chemical attack appeared in social media. The lack of flight activity or missile launches also leads us to conclude that the regime used rockets in the attack.
  • Three hospitals in the Damascus area received approximately 3,600 patients displaying symptoms consistent with nerve agent exposure in less than three hours on the morning of August 21, according to a highly credible international humanitarian organization. The reported symptoms, and the epidemiological pattern of events – characterized by the massive influx of patients in a short period of time, the origin of the patients, and the contamination of medical and first aid workers – were consistent with mass exposure to a nerve agent. We also received reports from international and Syrian medical personnel on the ground.
  • We have identified one hundred videos attributed to the attack, many of which show large numbers of bodies exhibiting physical signs consistent with, but not unique to, nerve agent exposure. The reported symptoms of victims included unconsciousness, foaming from the nose and mouth, constricted pupils, rapid heartbeat, and difficulty breathing. Several of the videos show what appear to be numerous fatalities with no visible injuries, which is consistent with death from chemical weapons, and inconsistent with death from small-arms, high-explosive munitions or blister agents. At least 12 locations are portrayed in the publicly available videos, and a sampling of those videos confirmed that some were shot at the general times and locations described in the footage. We assess the Syrian opposition does not have the capability to fabricate all of the videos, physical symptoms verified by medical personnel and NGOs, and other information associated with this chemical attack. We have a body of information, including past Syrian practice, that leads us to conclude that regime officials were witting of and directed the attack on August 21. We intercepted communications involving a senior official intimately familiar with the offensive who confirmed that chemical weapons were used by the regime on August 21 and was concerned with the U.N. inspectors obtaining evidence. On the afternoon of August 21, we have intelligence that Syrian chemical weapons personnel were directed to cease operations.
  • To conclude, there is a substantial body of information that implicates the Syrian government’s responsibility in the chemical weapons attack that took place on August 21.As indicated, there is additional intelligence that remains classified because of sources and methods concerns that is being provided to Congress and international partners. Syria: Damascus Areas of Influence and Areas Reportedly Affected by 21 August Chemical Attack
  •  
    Well, here's what the public gets told, from a President and his intelligence community that have been caught in lie after lie in the NSA scandal this summer. And of course, to "protect sources and methods, we cannot publicly release all available intelligence." One thing is certain: The "high confidence" of the summary does not acknowledge the doubt about that confidence expressed by government officials speaking anonymously to the Associated Press before the report was released. http://bigstory.ap.org/article/ap-sources-intelligence-weapons-no-slam-dunk   I'll have more later. 
Paul Merrell

If GCHQ wants to improve national security it must fix our technology | Technology | th... - 0 views

  • In a recent column, security expert Bruce Schneier proposed breaking up the NSA – handing its offensive capabilities work to US Cyber Command and its law enforcement work to the FBI, and terminating its programme of attacking internet security. In place of this, Schneier proposed that “instead of working to deliberately weaken security for everyone, the NSA should work to improve security for everyone.” This is a profoundly good idea for reasons that may not be obvious at first blush.People who worry about security and freedom on the internet have long struggled with the problem of communicating the urgent stakes to the wider public. We speak in jargon that’s a jumble of mixed metaphors – viruses, malware, trojans, zero days, exploits, vulnerabilities, RATs – that are the striated fossil remains of successive efforts to come to grips with the issue. When we do manage to make people alarmed about the stakes, we have very little comfort to offer them, because Internet security isn’t something individuals can solve.
  • I remember well the day this all hit home for me. It was nearly exactly a year ago, and I was out on tour with my novel Homeland, which tells the story of a group of young people who come into possession of a large trove of government leaks that detail a series of illegal programmes through which supposedly democratic governments spy on people by compromising their computers.
  • I explained the book’s premise, and then talked about how this stuff works in the real world. I laid out a parade of awfuls, including a demonstrated attack that hijacked implanted defibrillators from 10 metres’ distance and caused them to compromise other defibrillators that came into range, implanting an instruction to deliver lethal shocks at a certain time in the future. I talked about Cassidy Wolf, the reigning Miss Teen USA, whose computer had been taken over by a “sextortionist” who captured nude photos of her and then threatened to release them if she didn’t perform live sex shows for him. I talked about the future of self-driving cars, smart buildings, implanted hearing aids and robotic limbs, and explained that the world is made out of computers that we put our bodies into, and that we put inside our bodies.These computers are badly secured. What’s more, governments and their intelligence agencies are actively working to undermine the security of our computers and networks. This was before the Snowden revelations, but we already knew that governments were buying “zero-day vulnerabilities” from security researchers. These are critical bugs that can be leveraged to compromise entire systems. Until recently, the normal response to the discovery of one of these “vulns” was to report them to the vendor so they could be repaired.
  • ...6 more annotations...
  • But spy-agencies and law-enforcement have created a bustling marketplace for “zero-days,” which are weaponised for the purpose of attacking the computers and networks of “bad guys”. The incentives have shifted, and now a newly discovered bug had a good chance of remaining unpatched and live in the field because governments wanted to be able to use it to hack their enemies.
  • Last year, when I finished that talk in Seattle, a talk about all the ways that insecure computers put us all at risk, a woman in the audience put up her hand and said, “Well, you’ve scared the hell out of me. Now what do I do? How do I make my computers secure?”And I had to answer: “You can’t. No one of us can. I was a systems administrator 15 years ago. That means that I’m barely qualified to plug in a WiFi router today. I can’t make my devices secure and neither can you. Not when our governments are buying up information about flaws in our computers and weaponising them as part of their crime-fighting and anti-terrorism strategies. Not when it is illegal to tell people if there are flaws in their computers, where such a disclosure might compromise someone’s anti-copying strategy.But: If I had just stood here and spent an hour telling you about water-borne parasites; if I had told you about how inadequate water-treatment would put you and everyone you love at risk of horrifying illness and terrible, painful death; if I had explained that our very civilisation was at risk because the intelligence services were pursuing a strategy of keeping information about pathogens secret so they can weaponise them, knowing that no one is working on a cure; you would not ask me ‘How can I purify the water coming out of my tap?’”
  • Because when it comes to public health, individual action only gets you so far. It doesn’t matter how good your water is, if your neighbour’s water gives him cholera, there’s a good chance you’ll get cholera, too. And even if you stay healthy, you’re not going to have a very good time of it when everyone else in your country is striken and has taken to their beds.If you discovered that your government was hoarding information about water-borne parasites instead of trying to eradicate them; if you discovered that they were more interested in weaponising typhus than they were in curing it, you would demand that your government treat your water-supply with the gravitas and seriousness that it is due.The public health analogy is suprisingly apt here. The public health threat-model is in a state of continuous flux, because our well-being is under continuous, deliberate attack from pathogens for whom we are, at best, host organisms, and at worst, dinner. Evolution drives these organisms to a continuously shifting array of tactics to slide past our defenses.Public health isn’t just about pathogens, either – its thorniest problems are about human behaviour and social policy. HIV is a blood-borne disease, but disrupting its spread requires changes to our attitudes about sex, pharmaceutical patents, drugs policy and harm minimisation. Almost everything interesting about HIV is too big to fit on a microscope slide.
  • And so it is for security: crypto is awesome maths, but it’s just maths. Security requires good password choice, good password management, good laws about compelled crypto disclosure, transparency into corporate security practices, and, of course, an end to the governmental practice of spending $250M/year on anti-security sabotage through the NSA/GCHQ programmes Bullrun and Edgehill.
  • But for me, the most important parallel between public health and internet security is their significance to our societal wellbeing. Everything we do today involves the internet. Everything we do tomorrow will require the internet. If you live near a nuclear power plant, fly in airplanes, ride in cars or trains, have an implanted pacemaker, keep money in the bank, or carry a phone, your safety and well-being depend on a robust, evolving, practice of network security.This is the most alarming part of the Snowden revelations: not just that spies are spying on all of us – that they are actively sabotaging all of our technical infrastructure to ensure that they can continue to spy on us.There is no way to weaken security in a way that makes it possible to spy on “bad guys” without making all of us vulnerable to bad guys, too. The goal of national security is totally incompatible with the tactic of weakening the nation’s information security.
  • “Virus” has been a term of art in the security world for decades, and with good reason. It’s a term that resonates with people, even people with only a cursory grasp of technology. As we strive to make the public and our elected representatives understand what’s at stake, let’s expand that pathogen/epidemiology metaphor. We’d never allow MI5 to suppress information on curing typhus so they could attack terrorists by infecting them with it. We need to stop allowing the NSA and GCHQ to suppress information on fixing bugs in our computers, phones, cars, houses, planes, and bodies.If GCHQ wants to improve the national security of the United Kingdom – if the NSA want to impove the American national security – they should be fixing our technology, not breaking it. The technology of Britons and Americans is under continuous, deadly attack from criminals, from foreign spies, and from creeps. Our security is better served by armouring us against these threats than it is by undermining security so that cops and spies have an easier time attacking “bad guys.”
Paul Merrell

CIDRAP: "We Believe There Is Scientific Evidence Ebola Has The Potential To Be Airborne... - 0 views

  • When CDC Director Tim Frieden first announced, just a week ago and very erroneously, that he was "confident we will stop Ebola in its tracks here in the United States", he hardly anticipated facing the double humiliation of not only having the first person-to-person transmission of Ebola on US soil taking place within a week, but that said transmission would impact a supposedly protected healthcare worker. He certainly did not anticipate the violent public reaction that would result when, instead of taking blame for another epic CDC blunder, one which made many wonder if last night's Walking Dead season premier was in fact non-fiction, he blamed health workers for "not following protocol."
  • And yet, while once again casting scapegoating and blame, the CDC sternly refuses to acknowledge something others, and not just tingoil blog sites, are increasingly contemplating as a distinct possibility: namely that Ebola is, contrary to CDC "protocol", in fact airborne. Or as, an article posted by CIDRAP defines it, "aerosolized." Who is CIDRAP?  "The Center for Infectious Disease Research and Policy (CIDRAP; "SID-wrap") is a global leader in addressing public health preparedness and emerging infectious disease response. Founded in 2001, CIDRAP is part of the Academic Health Center at the University of Minnesota." The full punchline from the CIDRAP report: We believe there is scientific and epidemiologic evidence that Ebola virus has the potential to be transmitted via infectious aerosol particles both near and at a distance from infected patients, which means that healthcare workers should be wearing respirators, not facemasks.
  • In other words, airborne. And now the search for the next LAKE, i.e., a public company maker of powered air-purifying respirator (PAPR), begins. Here is the full note: we hope the CDC will take the time to read it.
Paul Merrell

Birth defects in Gaza: preva... [Int J Environ Res Public Health. 2012] - PubMed - NCBI - 0 views

  • AbstractThis is the first report of registration at birth, and of incidence of major structural birth defects (BD) obtained in Gaza at Al Shifa Hospital, where 28% of total births in Gaza Strip occur. Doctors registered 4,027 deliveries, with a protocol comprehensive of clinical, demographic, kin and environmental questions. Prevalence of BD is 14/1,000, without association with intermarriage or gender of the child. Prevalence of late miscarriages and still births are respectively 23.3/1,000 and 7.4/1,000, and of premature births 19.6/1,000. Couples with a BD child have about 10 times higher frequency of recurrence of a BD in their progeny than those with normal children, but none of their 694 siblings and only 10/1,000 of their 1,423 progeny had BD, similar to the frequency in general population. These data suggest occurrence of novel genetic and epigenetic events in determination of BD. Children with BD were born with higher frequency (p < 0 001) in families where one or both parents were under "white phosphorus" attack, that in the general population. Bombing of the family home and removal of the rubble were also frequently reported by couples with BD occurrence. These data suggests a causative/favoring role of acute exposure of parents to the weapons-associated contaminants, and/or of their chronic exposure from their persistence in the environment on the embryonic development of their children.
  •  
    Shades of Fallujah. And the not-so-mysterious "Gulf War Syndrome" in veterans of war in Iraq. 
Paul Merrell

Specific association of tera... [Int J Environ Res Public Health. 2014] - PubMed - NCBI - 0 views

  • AbstractThis study was undertaken in Gaza, Palestine, in a cohort of babies born in 2011. Hair samples of newborns were analyzed for metal load by DRC-ICP-MS. We report specific level of contamination by teratogen/toxicants metals of newborn babies, environmentally unexposed, according to their phenotypes at birth: normal full term babies, birth defects or developmentally premature. The occurrence of birth defects was previously shown to be correlated in this cohort to documented exposure of parents to weapons containing metal contaminants, during attacks in 2009. We detect, in significantly higher amounts than in normal babies, different specific teratogen or toxicant elements, known weapons' components, characteristic for each of birth defect or premature babies. This is the first attempt to our knowledge to directly link a phenotype at birth with the in utero presence of specific teratogen and/or toxicant metals in a cohort with known episodes of acute exposure of parents to environmental contamination by these same metals, in this case delivered by weaponry The babies were conceived 20-25 months after the major known parental exposure; the specific link of newborn phenotypes to war-remnant metal contaminants, suggests that mothers' contamination persists in time, and that the exposure may have a long term effect.
Paul Merrell

Japan's Fukushima Prefecture Shows Wave of Mutations - nsnbc international | nsnbc inte... - 0 views

  • Japanese researchers are reluctant to comment, but more than 90 percent of fir trees in forests close to the crippled Fukushima Daiichi Nuclear Power Plant (NPP) show signs of mutations and abnormalities while plant lice species sampled in a town more than 30 kilometers from the disaster site either have deformed legs or are missing legs. The mutations are a probable precursor of what is in store for Japanese people who are being resettled in allegedly de-contaminated towns and villages.
  • Japanese scientists are reluctant to comment on the record. Several attempts by nsnbc to reach out resulted in off-protocol confirmations of suspicions and references to Japanese law that makes revealing of unauthorized information about the Fukushima disaster a criminal offense that can be punishable with up to ten years in prison. The official line is that Japanese scientists are trying to figure out whether there is a causal relation between the wave of mutations and the still ongoing release of radiation and radionucleides into the environment. Studies focus primarily on hos radioactive cesium spread in forests and forest soil after the catastrophic triple meltdown at the TEPCO operated Fukushima Daiichi NPP after it was struck by an earthquake and a subsequent tsunami in 2011. Results of a 2013 study already revealed that levels of the radioactive isotope cesium from the crippled Fukushima Daiichi power plant in northern Japanese forests had almost doubled within one year and that it will continue increasing as the forests bioaccumulate the isotope. The 2013 study and ongoing studies have major ramifications even though these studies largely ignore a cohort of other, potentially more dangerous isotopes such as plutonium.
  • The wave of mutations in insects, fir trees and other animals is according to Japanese experts who are relutant to speak on the record a precursor for what populations who live within a 100 km radius of the crippled power-plant can expect to see in human populations. The Japanese government’s push for resettling populations that were evacuated to so-called de-contaminated villages and towns is particularly problematic and controversial. The Japanese government’s definition of a de-contaminated village, for example, means that the village itself and an area of a few hundred meters leading to these villages have been de-contaminated by e.g. top-sol removal. Water and airborne isotopes will, however, move with the waters and winds and easily re-contaminate these so-called safe zones. Evacuees who refuse to be resettled risk losing government support. Another serious issue is that radioactive contaminated waste from the region is incinerated in facilities throughout Japan, thus spreading airborne contamination throughout the entire country. Some critics stress that this program may aim at making it extremely difficult to conduct epidemiological studies.
  • ...1 more annotation...
  • In November 2015 the former Japanese Ambassador to Switzerland, Mitshei Murata, called on the President of the International Olympic Committee to move the 2020 Olympics from Tokyo or to cancel the games. Murata noted that he, as many others feel the Olympic Summer Games under these circumstances should be canceled and the preparations abandoned. Murata wrote: Not only do we have a continued contamination of the groundwater and the Pacific Ocean by the unstable plant, but the brittle structure of the damaged plant represents itself a serious threat, in particular in our earthquake prone region. Given the relative proximity of Tokyo, just some 200km South of Fukushima, represents in my view an ongoing risk for our largest city, for its citizens and all visitors. You might agree that one more alarming development as the recent earthquake of magnitude 8.1 just some weeks ago might indeed increase the pressure to stop the planning process of the 2020 games all together.
1 - 7 of 7
Showing 20 items per page