Extraordinary map reveals Earth's gravity field for the first time

It is one of the most fundamental and mysterious forces in the Universe. But this is the first glimpse of what the gravity field which surrounds the Earth looks like in a unique map created be a sophisticated European satellite. The map is known as a geoid – an imaginary global ocean dictated by gravity in the absence of tides and currents.

It was first described almost 200 years ago but this is the first time it has been mapped in real-time.

Earth's gravity field as captured by the GOCE satellite gives an  unprecedented vieEarth’s gravity field as captured by the GOCE satellite gives an unprecedented view of how the force acts on our planet. The differences in gravitational force are represented using colours that show -100 metres up to 100 metres.

Gravity does not exert an equal force everywhere on Earth. Factors such as the rotation of the planet, the effects of mountains and density variations in Earth’s interior mean that this fundamental force is not quite the same all over. The extraordinary map will be used to measure ocean circulation, sea-level change and ice dynamics. ‘GOCE is delivering where it promised: in the fine spatial scales,’ GOCE Mission Manager Rune Floberghagen said. ‘We have already been able to identify significant improvements in the high-resolution ‘geoid’, and the gravity model will improve as more data become available.’

ESA launched GOCE in March 2009 to map Earth’s gravity with unprecedented accuracy and resolution. The model, based on only two months of data, from November and December 2009, shows the excellent capability of the satellite to map tiny variations in Earth’s gravity. GOCE’s final gravity map and geoid will be used in geophysics and surveying to oceanography and sea-level research.

Dr Floberghagen added.’ Over continents, and in particular in regions poorly mapped with terrestrial or airborne techniques, we can already conclude that GOCE is changing our understanding of the gravity field.’ ‘Over major parts of the oceans, the situation is even clearer, as the marine gravity field at high spatial resolution is for the first time independently determined by an instrument of such quality.’

Chairman of the GOCE Mission Advisory Group, Prof. Reiner Rumme said: ‘With each two-month cycle of data, the gravity model will become more detailed and accurate. I am convinced that the data will be of great interest to various disciplines of Earth sciences.’ The satellite was designed to orbit at a very low altitude because gravitational variations are stronger closer to Earth.Since mid-September 2009, GOCE has been in its gravity-mapping orbit at a mean altitude of just 254.9 km – the lowest orbit sustained over a long period by any Earth observation satellite Air at this low altitude causes the orbit of a standard satellite to decay very rapidly. But GOCE nullifies the drag by firing an ion thruster using xenon gas to boost its orbit. It ensures the gravity sensors are flying as though they are in pure freefall, so they pick up only gravity readings and not the disturbing effects from other forces. To obtain clean gravity readings, there can be no disturbances from moving parts, so the entire satellite is a single extremely sensitive measuring device.

Government's plan for the internet.

Government’s new plan is all about the word identity. How to control everyone on the internet. Site like these will definitely be categorized as ‘not reliable’.  Strength of the internet is freedom we have as a participant. No privacy checks! Thank you government(=controllers).

National Strategy for Trusted Identities in Cyberspace
Creating Options for Enhanced
Online Security and Privacy
June 25, 2010
Draft
DRAFT National Strategy for Trusted Identities in Cyberspace
June 25, 2010

Executive Summary
Cyberspace – the interdependent network of information technology components that underpins many of our communications – is a crucial component of the Nation’s critical infrastructure. We use cyberspace to exchange information, buy and sell products and services, and enable many online transactions across a wide range of sectors, both nationally and internationally. As a result, a secure cyberspace is critical to the health of our economy and to the security of our Nation. In particular, the Federal Government must address the recent and alarming rise in online fraud, identity theft, and misuse of information online.

One key step in reducing online fraud and identity theft is to increase the level of trust associated with identities in cyberspace. While this Strategy recognizes the value of anonymity for many online transactions (e.g., blog postings), for other types of transactions (e.g., online banking or accessing electronic health records) it is important that the parties to that transaction have a high degree of trust that they are interacting with known entities. Spoofed websites, stolen passwords, and compromised login accounts are all symptoms of an untrustworthy computing environment. This Strategy seeks to identify ways to raise the level of trust associated with the identities of individuals, organizations, services, and devices involved in certain types of online transactions. The Strategy’s vision is:

Individuals and organizations utilize secure, efficient, easy-to-use, and interoperable identity solutions to access online services in a manner that promotes confidence, privacy, choice, and innovation.

More specifically, the Strategy defines and promotes an Identity Ecosystem that supports trusted online environments. The Identity Ecosystem is an online environment where individuals, organizations, services, and devices can trust each other because authoritative sources establish and authenticate their digital identities. The Identity Ecosystem enables:

· Security, by making it more difficult for adversaries to compromise online transactions;
· Efficiency based on convenience for individuals who may choose to manage fewer
passwords or accounts than they do today, and for the private sector, which stands to
benefit from a reduction in paper-based and account management processes;
· Ease-of-use by automating identity solutions whenever possible and basing them on
technology that is easy to operate with minimal training;
· Confidence that digital identities are adequately protected, thereby increasing the use of
the Internet for various types of online transactions;
· Increased privacy for individuals, who rely on their data being handled responsibly and
who are routinely informed about those who are collecting their data and the purposes for
which it is being used;
· Greater choice, as identity credentials and devices are offered by providers using
interoperable platforms; and
· Opportunities for innovation, as service providers develop or expand the services offered
online, particularly those services that are inherently higher in risk;

Privacy protection and voluntary participation are pillars of the Identity Ecosystem. The Identity Ecosystem protects anonymous parties by keeping their identity a secret and sharing only the information necessary to complete the transaction. For example, the Identity Ecosystem allows an individual to provide age without releasing birth date, name, address, or other identifying data. At the other end of the spectrum, the Identity Ecosystem supports transactions that require high assurance of a participant’s identity. The Identity Ecosystem reduces the risk of exploitation of information by DRAFT National Strategy for Trusted Identities in Cyberspace

June 25, 2010
unauthorized access through more robust access control techniques. Finally, participation in the Identity Ecosystem is voluntary for both organizations and individuals.
Another pillar of the Identity Ecosystem is interoperability. The Identity Ecosystem leverages strong and interoperable technologies and processes to enable the appropriate level of trust across participants. Interoperability supports identity portability and enables service providers within the Identity Ecosystem to accept a variety of credential and identification media types. The Identity Ecosystem does not rely on the government to be the sole identity provider. Instead, interoperability enables a variety of public and private sector identity providers to participate in the Identity Ecosystem. Interoperability and privacy protection combine to create a user-centric Identity Ecosystem. Usercentricity will allow individuals to select the interoperable credential appropriate for the transaction.
Through the creation and adoption of privacy-enhancing policies and standards, individuals will have the ability to transmit no more than the amount of information necessary for the transaction, unless they choose otherwise. In addition, such standards will inhibit the linking of an individual’s transactions and credential use by service providers. Individuals will have more confidence that they exchange information with the appropriate parties, securely transmit that information, and have the information protected in accordance with privacy best practices.
With the vision of the Identity Ecosystem in mind, the National Strategy for Trusted Identities in Cyberspace (NSTIC) identifies the following goals:
Goal 1: Develop a comprehensive Identity Ecosystem Framework
Goal 2: Build and implement an interoperable identity infrastructure aligned with the
Identity Ecosystem Framework
Goal 3: Enhance confidence and willingness to participate in the Identity Ecosystem
Goal 4: Ensure the long-term success of the Identity Ecosystem
The first two goals focus on designing and building the necessary governance, policy, standards, and
infrastructure to enable secure delivery of online services. The third goal targets the necessary
privacy protections and the education and awareness required to encourage adoption by individuals
and businesses. The fourth establishes the mechanisms to promote continued development and
improvement of the Identity Ecosystem over time.
Nine high-priority actions align to these goals and the vision. These actions provide the foundation for
the Identity Ecosystem implementation. The actions are:
Action 1: Designate a Federal Agency to Lead the Public/Private Sector Efforts Associated
with Achieving the Goals of the Strategy
Action 2: Develop a Shared, Comprehensive Public/Private Sector Implementation Plan
Action 3: Accelerate the Expansion of Federal Services, Pilots, and Policies that Align with
the Identity Ecosystem
Action 4: Work Among the Public/Private Sectors to Implement Enhanced Privacy
Protections
Action 5: Coordinate the Development and Refinement of Risk Models and Interoperability Standards DRAFT National Strategy for Trusted Identities in Cyberspace June 25, 2010
Action 6: Address the Liability Concerns of Service Providers and Individuals
Action 7: Perform Outreach and Awareness Across all Stakeholders
Action 8: Continue Collaborating in International Efforts
Action 9: Identify Other Means to Drive Adoption of the Identity Ecosystem across the
Nation
The execution of the actions above requires the Federal Government to continue to provide leadership, coordination, and collaboration in order to enhance the security of digital identities. To lead the day-to-day coordination of these actions, the Executive Office of the President (EOP) will designate a lead agency within the Federal Government. The Office of the Cybersecurity Coordinator within EOP will continue to lead interagency policy development specified in this action plan. The lead agency will work closely with The Office of the Cybersecurity Coordinator.
This Strategy is a call to action that begins with the Federal Government continuing its role as a primary enabler, first adopter and key supporter of the envisioned Identity Ecosystem. The Federal Government must continually collaborate with the private sector, state, local, tribal, and international governments and provide the leadership and incentives necessary to make the Identity Ecosystem a reality. The private sector in turn is crucial to the execution of this Strategy. Individuals will realize the benefits associated with the Identity Ecosystem through the conduct of their daily online transactions in cyberspace. National success will require a concerted effort from all parties, as well as joint ownership and accountability for the activities identified.

governments plan_internet

How To Uncover CIA Spies

The CIA probably doesn’t want you to know this, but unmasking its covert operatives isn’t as hard as you’d think. Just ask John Sifton. During a six-year stint at Human Rights Watch, the attorney and investigator was hot on the trail of the CIA and some of its most sensitive Bush-era counterterrorism programs, including extraordinary rendition, secret Eastern European detention sites, and the legally dubious and brutal methods used to extract information from detainees. “Even deep-cover CIA officers are real people, with mortgages and credit reports,” Sifton once told CQ Politics. For researchers with a trained eye for the hallmarks of a CIA alias, there are obvious giveaways: “A brand new Social Security number, a single P.O. box in Reston, Virginia. You disregard those and focus on the real persons who lie behind, and you can find them.”

Sifton’s talent for uncovering the CIA’s secrets may have served him well—but now, it also has set off a firestorm in the human rights community, prompted a backlash from congressional Republicans, and helped trigger a federal investigation headed by none other than Patrick Fitzgerald, the special prosecutor in the Valerie Plame affair. The story begins in 2008, when military prosecutors sought the death penalty in military commission trials of six suspected 9/11 conspirators being held at Guantanamo Bay, including Khalid Sheikh Mohammed, the alleged mastermind of the attacks. The defense had few resources and little experience trying capital cases. Into the breach stepped the American Civil Liberties Union and the National Association of Criminal Defense Lawyers, which created the John Adams Project—an effort to supply civilian lawyers to assist in the defense of some of the least sympathetic clients in the world. Fittingly, the group was named after the founding father who had represented British soldiers after the Boston Massacre.

A top priority for the lawyers was establishing whether the detainees had been coerced or tortured into giving the statements the government was now using against them. And to do that, the detainees’ lawyers needed to identify who had been involved with those interrogations.

To get that information, the John Adams Project turned to Sifton, who in 2007 had opened his own investigations firm, One World Research, catering largely to human rights and public interest groups. Its website says the firm’s employees can “deploy quickly to almost anywhere in the world; for instance, to take affidavits in Afghanistan, investigate allegations of abuses by private security forces in Nigeria, examine incidences of questionable police practices in the United States, or conduct studies of social or economic rights issues in Nepal.” For its clients—which have included Amnesty International, Human Rights First, and the ACLU—it offers services from public-records searches to locating victims and witnesses, from serving subpoenas to “collecting video, photographic, and physical evidence.” One World also says it can provide “surveillance,” which is fairly routine for a PI shop—except when your quarry happens to be CIA officers.

The role of Sifton’s firm in gathering information for the John Adams Project has not previously been revealed. But last August, the Washington Post reported that the Justice Department had launched an investigation after Gitmo defense lawyers allegedly showed their clients pictures of CIA personnel. At the time, Anthony Romero, the ACLU’s executive director, insisted no laws or regulations had been broken. “The real scandal,” he said in a statement, “isn’t that we’re investigating the torture of our clients, but that the government isn’t.”

Photos depicting CIA officers also reportedly surfaced in the Guantanamo cell of accused 9/11 financier Mustafa Ahmed al-Hawsawi. Coming at a time when CIA personnel had grown uneasy over the Obama administration’s scrutiny of Bush-era war-on-terror tactics, the discovery of the photos only escalated the tension. John Rizzo, who retired in December as the agency’s acting general counsel, has described the incident as “far more serious than Valerie Plame.” Another former high-ranking intelligence official explains, “This is an agency that has reasons to be concerned as to whether or not somebody’s got their back. It’s always operating out there on the edge, not unlawfully, but generally at the farthest reaches of executive prerogative.”

With the CIA pressing the Justice Department to act, Attorney General Eric Holder added Fitzgerald to the investigation. It was a painful blow: Some human rights activists had hoped the administration would appoint Fitzgerald to run a wide-ranging investigation of the Bush-era torture practices. Instead, he’d been chosen to investigate the torture critics.

At Human Rights Watch, the initial instinct was to publicly defend the John Adams Project against the suggestion that it had done anything improper. But the organization decided against going on the attack, says Stacy Sullivan, the group’s counterterrorism advisor, largely because the ACLU and John Adams lawyers refused to discuss exactly what had transpired.

Those acquainted with the operation have reason to keep quiet. “Anybody who says anything—’Oh yeah, I knew about this before’—they’re going to get a grand jury subpoena,” notes Michael Ratner, president of the Center for Constitutional Rights. (He confirms his organization has employed Sifton’s firm, but “can’t say why.”)

The ACLU, along with lawyers for the John Adams Project, also declined to discuss the photographs or the methods used to obtain them with Mother Jones. Sifton says: “I can’t comment on the work that we do for any of our clients, including the John Adams Project.”

But sources familiar with the operation say the goal of One World Research’s surveillance effort was to allow defense lawyers to provide photo lineups (containing random people as well as CIA personnel) to their clients so they could pick out officers who had interrogated them, enabling lawyers to call the interrogators as witnesses.

“Proving torture is crucial to the defense,” says Joanne Mariner, the director of Human Rights Watch’s terrorism and counterterrorism program. “The way to prove it ideally would be to get the torturers in the courtroom.” Sifton’s firm would figure out the real names of the suspected interrogators, then look for photos of them online. For a few, no pictures could be found, so One World Research set out to track the officers down and take pictures.

The notion of showing photos of CIA officials to suspected terrorists has provoked outrage from congressional Republicans. Last month, Rep. Jeff Miller (R-Fla.) slipped a provision into a military appropriations bill that was clearly aimed at the John Adams Project lawyers. It requires the Pentagon’s Inspector General to launch an investigation into Gitmo defense lawyers who may have “interfered with operations of the Department of Defense.” (The measure survived the mark-up process by the House Armed Services Committee.) Miller, who describes the John Adams Project as a “treacherous enterprise,” has said that he believes defense lawyers’ actions created a “significant security risk to intelligence and military personnel,” “compromised national security,” and violated “US laws and Department of Defense policies.”

It remains unclear whether, by giving detainees what sources describe as photo montages containing pictures (but not names) of CIA officers, the John Adams lawyers breached any disclosure rules. If a violation occurred, say former military lawyers at Guantanamo, it’s likely because in the alternate justice system created by the Bush administration, it was difficult to tell what was and wasn’t allowable. “I had a full time job just…fighting to verify what the rules were,” says Col. Steve David, the first chief defense counsel at Gitmo, who recalls once being informed that every word uttered by a high-value detainee was considered a state secret.

“The only way really for a detainee to bolster his claim of torture,” says Lt. Colonel Darrel Vandeveld, a former top military prosecutor at Guantanamo who resigned because of concerns with the commissions system in late 2008, “is to identify faces, names, pseudonyms, places, and so on, that lend credibility to the claims of mistreatment.” And that, he says, pretty much means using a photo lineup—even though, he admits, “If I were a CIA officer, I would be highly concerned that my image was shown to a detainee.”

David worries that the investigation into the photos will weaken the legal representation afforded to detainees in an already lopsided system. “Can you imagine the chilling effect?” he asks. “We want you to defend them, but not to do that zealously?”

Some in the human rights community have privately questioned the John Adams Project’s tactics, if for no other reason than the PR blowback. But most agree that it was the Kafkaesque military commissions process that drove the group to such desperate measures. Says Karen Greenberg, the executive director of New York University’s Center on Law and Security, “The reason people do things like this is they feel all the legitimate tools were taken out of their hands.”

Nick Baumann covers national politics for Mother Jones’ DC Bureau. For more of his stories, click here. You can also follow him on twitter. Email tips and insights to scoop [at] motherjones [dot] com.

Daniel Schulman is Mother Jones’ Washington-based news editor. For more of his stories, click here. To follow him on Twitter, click here. Email him at dschulman (at) motherjones.com.

Source: http://motherjones.com/politics/2010/07/john-sifton-guantanamo-aclu

Secret Kennedy extraterrestrial briefing strengthens UFO assassination theories

A newly released video interview reveals that Robert Kennedy, while U.S. Attorney General, received a classified briefing on a crashed UFO that was extraterrestrial in origin, and whose technology was secretly being reverse engineered. According to Lt Colonel Philip Corso, who served as head of the U.S. Army’s Foreign Technology Desk from 1961-1963, he personally briefed Kennedy about the Army’s effort to seed extraterrestrial technologies into the private sector. Interviewed shortly before his death in 1998, Corso revealed for the first time that Bobby Kennedy contacted him for his knowledge on highly classified national security information. Corso from 1953-1957 had served in a number of National Security Council committees during the Eisenhower administration as the Army Liaison reporting directly to Lt General Arthur Trudeau who was head of U.S. Army Intelligence. Corso’s revelation is further evidence that President Kennedy was aware of the extraterrestrial origins of UFOs. Kennedy sought to gain information on UFOs from various sources in order to re-establish direct Presidential control. It is very likely that this is the reason Bobby Kennedy sought Corso out. Corso’s revelation adds to evidence that President Kennedy’s efforts to gain oversight over UFOs played a role in his 1963 assassination. Importantly, Corso provides an insight into how the UFO issue may have also been a factor in the death of Marilyn Monroe and the 1968 assassination of Robert Kennedy.

In his interview, Corso said:

I discussed this very thoroughly with Bobby Kennedy, the attorney general, the President’s brother… He knew about the flying saucers, I talked to him about it. I used to meet him when he was attorney general right in his office… What went to Bobby went to the President also.

Corso was aware that Robert Kennedy was a direct conduit to the President who was constantly briefed by his brother. Corso further explained in the interview that the meeting(s) happened in 1962, soon after Corso had testified on a Senate Committee about classified national security issues. At the time Corso was in charge of the Foreign Technology Desk, and reported directly to General Trudeau who then headed the Army’s Research and Development Division. Corso explained that he agreed to testify on the condition that his testimony was to be relayed directly to the Kennedy brothers. According to Corso, he was soon after contacted by Robert Kennedy who wanted to learn more about Corso’s knowledge and activities. Robert Kennedy’s role in learning about UFOs made him a key figure in ensuring that classified information the Kennedy brothers had gained about extraterrestrial life and technology would not be leaked to the public.

Robert Kennedy was allegedly involved in silencing Marilyn Monroe who in 1962 was prepared to blow the whistle on President Kennedy’s secret visit to an Air Force base to see alien bodies. A leaked unconfirmed Top Secret CIA wiretap summary of conversations concerning Monroe and the Kennedy brothers states:

Rothberg indicated in so many words, that she [Monroe] had secrets to tell, no doubt arising from her trists [sic] with the President and the Attorney General. One such “secret” mentions the visit by the President at a secret air base for the purpose of inspecting things from outer space. Kilgallen replied that she knew what might be the source of visit [sic]. In the mid-fifties Kilgallen learned of secret effort by US and UK governments to identify the origins of crashed spacecraft and dead bodies, from a British government official. Kilgallen believed the story may have come from the New Mexico story [Roswell] in the late forties.

If Monroe was indeed aware of President Kenndy’s secret visit to see downed alien life and technology, and was about to blow the whistle, then she was a security threat. She directly jeopardized the Kennedy brothers efforts to restore direct Presidential oversight of extraterrestrial related issues. The stakes couldn’t be higher since President Kennedy had so far been frustrated in his efforts to regain control of UFO information from the CIA. If Monroe blew the whistle, the Kennedys would have zero chance of learning anything from the secretly appointed officials in charge of extraterrestrial affairs. Significantly, Robert Kennedy was sighted in Monroe’s house shortly before her death:

Norman Jeffries who worked with Marilyn’s housekeeper Eunice Murray and helped around the house, said that some men came to Marilyn’s house around 10:00 pm the night of her death. One man recognized by Mr. Jeffries was Robert Kennedy, who was accompanied by two men he didn’t know. Elizabeth Pllard, who lived right next door to Marilyn and held bridge parties every Saturday night states that she saw Bobby Kennedy and two other men walk right past the window, headed for Marilyn’s house, and one of the men was carrying a small black bag of the sort that a doctor would carry. According to Norman Jeffries, Bobby and the two mystery men entered the house and ordered Norman and Eunice to leave. Marilyn Munroe biographer Donald Wolfe quotes Norman as saying, “I mean they made it clear we were to be gone.”

It appears that Robert Kennedy was a factor in the silencing and/or assassination of Monroe, and that this happened because of the security threat she posed to the Kennedy brothers efforts to restore direct Presidential oversight over the extraterrestrial issue.

Significantly, the leaked CIA transcript of the wiretap conversation of Monroe was signed by James [Jesus] Angleton, chief of counterintelligence for the CIA. Angleton’s CIA counterintelligence was closely involved in maintaining security for classified UFO files. Angleton closely watched Monroe and the Kennedy brothers to find out what they had learned about UFOs, and if they posed a security threat to the system created to secretly maintain information about extraterrestrial life and technology.

Even more importantly, another leaked document reveals that Angleton, two days before President Kennedy’s assassination on November 22, 1963, was in possession of a number of secret directives concerning the release of classified UFO information. One of these was a cryptic Assassination Directive that permitted the silencing/termination of public officials that threatened the security and oversight system created for secretly managing extraterrestrial affairs. The Directive states:

Draft – Directive Regarding Project Environment – When conditions become non-conducive for growth in our environment and Washington cannot be influenced any further, the weather is lacking any precipitation … it should be wet.

Dr Robert Wood who is the foremost expert in analyzing MJ-12 documents using forensic methods, has concluded that the burned document is an assassination directive. There is evidence suggesting that the assassination directive was carried out by a secret unit under the control of Angleton’s CIA counterintelligence division against President Kennedy.

Corso’s revelations about briefing Robert Kennedy on UFOs suggests that the Kennedy brothers were sufficiently informed about extraterrestrial life and technology, to pose a direct challenge to those managing extraterrestrial affairs. The ensuing struggle between the Kennedy brothers and the controllers of UFO/extraterrestrial information was a very high stakes affair. While Robert Kennedy may have been involved in the silencing/assassination of Marilyn Monroe over her threats to blow the whistle on the President’s secret visit to see a downed UFO and alien bodies, Robert Kennedy may himself have been ultimately assassinated due to his UFO knowledge. The 1968 assassination of then Senator Robert Kennedy put a final end to the Kennedy brothers efforts to restore direct Presidential control over extraterrestrial life and technology.

Special Notice: The views expressed in this article are solely those of the author and do not reflect the views of any organization with which the author may be affiliated.

U.S. government panel now pushing "vaccinations for all!" No exceptions…

NaturalNews) An advisory panel to the U.S. Centers for Disease Control and Prevention (CDC) has recommended that every person be vaccinated for the seasonal flu yearly, except in a few cases where the vaccine is known to be unsafe.

“Now no one should say ‘Should I or shouldn’t I?'” said CDC flu specialist Anthony Fiore.

The Advisory Committee on Immunization Practices voted 11-0 with one abstention to recommend yearly flu vaccination for everyone except for children under the age of six months, whose immune systems have not yet developed enough for vaccination to be safe, and people with egg allergies or other health conditions that are known to make flu vaccines hazardous. If accepted by the CDC, this recommendation will then be publicized to doctors and other health workers.

The CDC nearly always accepts the advisory committee’s recommendations.

Current CDC recommendations call for the yearly vaccination of all children over the age of six months, all adults over the age of 49, health care workers, people with chronic health problems and anyone who cares for a person in one of these groups. These recommendations cover 85 percent of the US population.

Excluded are adults between the ages of 19 and 49 who do not come into close contact with people in high-risk groups. The new recommendation, if adopted, would close that gap, bringing an end to a 10-year campaign by supporters of universal vaccination. In the past, the advisory committee has been reluctant to recommend universal vaccination for fear that it might produce vaccine shortages that place members of higher risk groups in danger. Yet even with current recommendations, only 33 percent of the public gets vaccinated every year, leaving millions of doses to be disposed of.

The H1N1 swine flu scare of the past year played a major role in the committee’s about face, both because the disease killed many people falling outside the current recommended vaccine demographic and because it raised public awareness of and demand for vaccines.

Sources for this story include: http://www.washingtonpost.com/wp-dy….

Alien Sighting 2010 real video footage

[vsw id=”axeFnzsg3gI” source=”youtube” width=”510″ height=”410″ autoplay=”no”]

This footage was taken at around eleven or twelve at night in rural Alberta on June 7th 2010. A few days prior to this, me and my brother had been hearing noises from the yard at night and thought we had seen something out the window, so we decided to keep a camera handy in case it happened again. As you can see, the footage we captured shows a tall creature with a strange manner of walking. It had quite large hands with three fingers each and appeared to almost go completely invisible at times. One of the strangest features of this being was it’s almost metallic looking skin.
Feel free to comment on this footage

Gulf Oil Spill Media Blackout – Gassed In The Gulf – Possible Evacuations

[vsw id=”9cvQaHPy9e4″ source=”youtube” width=”510″ height=”410″ autoplay=”no”]

Let the truth be told! We have a crisis on our hands and we need to let everybody know what is really going on in the Gulf. It is a slow process, with the sickness starting among us, “Gulf Oil Syndrome”. I was told by a credible source, that the government is buying up motel and hotel rooms in small communities in Tennessee and Arkansas and renting them indefinitely. The time is now to prepare…It’s all up to you…