Science & Technology

Science & Technology

2014 in Review: 7 Police State Technologies Making Our Rights Obsolete

2014 in Review: 7 Police State Technologies Making Our Rights Obsolete

2014 in Review: 7 Police State Technologies Making Our Rights Obsolete

By Mac Slavo |

2014 in Review: 7 Police State Technologies Making Our Rights Obsolete

Things are not looking pretty for the land of the free.

The year 2014 has made it very clear that privacy is under threat, and the situation is not likely to improve. Mass surveillance – which became a national issue via the Edward Snowden leaks – is not subsiding or under reform; instead, is becoming more bold and complex with each passing day.

It would take several books to catalog the myriad ways in which the rights of The People have been casually infringed by various levels of government just in years since 9/11 and the introduction of the PATRIOT Act.

And it’s not only are federal agencies like the NSA, Homeland Security and the FBI that are taking liberties with our… umm… liberties; it is local police, too. The rise of technology is rapidly fueling these agencies with data and “intelligence” with very little oversight and even less pause for reflection to use these powerful abilities wisely and yes, judiciously.

Here are just a few major areas where privacy is losing badly to surveillance technology in 2014. Not that anyone is paying attention, but they are worth reflecting upon soon – hopefully before it is too late to turn thing back around:

• 1. Militarized Police and Weapons of War on American Streets:

True, this technology has been in use for several years now and has been demonstrated at protests such as the those held outside of the G20 in Pittsburgh and, Toronto and other locales.

But the events in Ferguson really allowed this brand of crowd control to come of age. This and other key protests have seemingly justified a massive police response for just about anything now… but… you know, the first amendment is still respected and all.

The Daily Sheeple reported:

Ferguson police have stocked up on less-lethal ammunition in the last few months including “hornets nest” CS sting grenades, which shoot out dozens of rubber bullets and a powdered chemical agent upon detonation, tear gas, riot gear, plastic handcuffs and the like in the lead up to the decision which is expected to come any time now. St Louis County police have spent $172,669 on this stuff just since August.

The Pentagon’s 1033 surplus program, which hands out everything from MRAP armored vehicles, to bullet proof vests, assault rifles, and other military weapons to domestic law enforcement agencies, is one of the major reasons that ordinary police departments, including those in small towns, are gearing up as for battle… and that includes Ferguson:

The Department of Defense Excess Property Program (1033 Program) is authorized under federal law and managed through the Defense Logistics Agency’s Law Enforcement Support Office (LESO) in Ft. Belvoir, Va. The 1033 Program provides surplus DoD military equipment to state and local civilian law enforcement agencies for use in counter-narcotics and counter-terrorism operations, and to enhance officer safety. The Missouri Department of Public Safety is the sponsoring state agency responsible for administration of the 1033 Program in Missouri.

• 2. Biometrics Comes of Age:

Fingerprints and iris scans are becoming normalized as identifiers on mobile phones, including the iPhone 5, computers and other platforms.

Increasingly, technology – including devices used by police – are utilizing other bodily features (in addition to fingerprints and eyes) to identify you, including ears, noses, heart rate (via electrocardiogram), blood vein matching, your scent or smell and even “butt biometrics” – no joke – which will allow smart car seats to identify the sitter based on their unique posture.

While these are surely being integrated into law enforcement devices, they are also becoming the mainstays of “wearables,” the new trendy technology that is collecting data on all of those using it to track health progress and etc.

Surveillance cameras have already been used to identify you by your walk for several years now, but advances have allowed technology to even identify the person wearing a camera, such a police officer with a mounted body cam, by just 4 seconds of footage, revealing a ‘biometric fingerprint’ of the individual.

Of course, roadside blood draws have already entered the picture in law enforcement work, including numerous locales that have implemented mandatory policies during stops. This is sure to pick up. In Seattle, the National Highway Traffic Safety Administration (NHTSA) recently conducted a paid, voluntary survey of drivers, who received up to $60 to give blood and breath samples at a roadside stop in effort to study how many people drive impaired.

• 3. Smart Phone Apps Know Everything About You:

Vocative published a long and unsettling list of apps for smart phones and other similar devices that all collect untold amounts of information about you everyday.

Whether you realize it or not, permissions for apps routinely allow the collection and sharing of such information as your contact and address book, your text message, audio recorded from your device’s microphone, your call log and much more.

Yes, this is really happening, so beware if you are using mobile apps including:

AntiVirus Security, Viber, Facebook, 360 Security (Antivirus), Tango Messenger, WhatsApp Messenger, Skype, GO Launcher EX, WeChat, CM Security, Waze Social GPS Maps & Traffic, BBM, LINE Free Calls & Messages, Clean Master Phone Boost, BU Battery Saver, Google’s Chrome Browser, Twitter, Maps, Instagram, YouTube, Dolphin Browser, Castle Clash and Trivia Crack

…and be sure to actually read over the privacy policy and Terms of Service before accepting or installing anything.

Considering that Angry Birds and Candy Crush were admittedly used to collect surveillance data for the NSA (also revealed in 2014), and law enforcement now regularly investigate persons of interest based upon social media posts and cell phone data, there is no telling how many of these apps may be drawing unwanted suspicion your way… whether you have anything to hide or not.

Need we remind you of all the telecom and internet firms who, according to the Edward Snowden leaks, shared data willingly with the NSA?

• 4. “StingRay” and “Dirtbox” Cell Phone Interceptors:

2014 is the year that much has come to light about the very secret and awfully quiet use of a data sweeping technology that has increasingly been used by agencies including the FBI, local law enforcement, and likely private, public and foreign intelligence agencies and even military units… though, due to extreme secrecy, it is just too difficult to know for sure.

Moreover, it emerged in 2014 that the FBI has been pressuring police departments to keep quiet about the use of StingRay, which it has also not been obtaining warrants before putting to use:

Not only are local police departments across the United States increasingly relying on so-called StingRay devices to conduct surveillance on cell phone users, but cops are being forced to keep quiet about the operations, new documents reveal.

Recent reports have indicated that law enforcement agencies from coast to coast have been turning to IMSI-catcher devices, like the StingRay sold by Florida’s Harris Corporation, to trick ordinary mobile phones into communicating device-specific International Mobile Subscriber Identity information to phony cell towers — a tactic that takes the approximate geolocation data of all the devices within range and records it for investigators. Recently, the Tallahassee Police Department in the state of Florida was found to have used their own “cell site simulator” at least 200 times to collect phone data without once asking for a warrant during a three-year span, and details about the use of StingRays by other law enforcement groups continue to emerge on the regular.

Although the majority of the December 2012 document is redacted, a paragraph from FBI special agent Laura Laughlin to Police of Chief Donald Ramsdell reveals that Tacoma officers were told they couldn’t discuss their use of IMSI-catchers with anyone… police in Tacoma were forced to sign a non-disclosure agreement, or NDA, with the Federal Bureau of Investigation before they could begin conducting surveillance on cell users with a Harris-sold StingRay.

It further emerged in 2014 that the Justice Department was overseeing the use of small Cessna aircraft using “dirtbox” technology to collect cell phone data over major urban centers across the nation to pinpoint suspects while scooping up information from thousands of cell phone users. Here’s what the Wall Street Journal revealed:

The Justice Department is scooping up data from thousands of mobile phones through devices deployed on airplanes that mimic cellphone towers, a high-tech hunt for criminal suspects that is snagging a large number of innocent Americans, according to people familiar with the operations.

The U.S. Marshals Service program, which became fully functional around 2007, operates Cessna aircraft from at least five metropolitan-area airports, with a flying range covering most of the U.S. population, according to people familiar with the program.

• 5. Radar Sweeps of Residential Homes:

The Tenth Circuit Court of Appeals made a decision on the use of doppler radar technology for use in the execution of an arrest warrant. The Washington Post considered:

the “grave” Fourth Amendment issues raised by use of a “Doppler radar device capable of detecting from outside the home the presence of human breathing and movement within”

But it is also fair to ask, who is watching the watchers for the use of this technology, anyway? Is this (and much more) being used frequently by authorities or private agencies to collect data in pursuit of investigations, including before the burden of “reasonable suspicion” has been met?

Is such a radar sweep a violation of the 4th Amendment and other rights if the police don’t already have “reasonable suspicion”? The possibilities are foggy… and a bit unnerving.

We don’t normally encounter this question because we normally understand the uses and limits of investigatory tools. If the officer looked through the window and didn’t see any other people, for example, we could intuitively factor that into the reasonable suspicion inquiry without having to think about burdens of proof. I’m less sure what we’re supposed to do when the government use a suspicion-testing technological device with unknown capabilities. The opinion relies on the language from Buie that “the sweep lasts no longer than is necessary to dispel the reasonable suspicion of danger,” and thus asks whether there was evidence that the Doppler device “dispel[led]” the reasonable suspicion. But it’s not clear to me that this language from Buie applies here, as it was referring to evidence after reasonable suspicion was established and the entry was made rather than before.

But for the average person, the potential for abuse is pretty clear here. One commenter noted:

Use of this technology on a home is a search. The police don’t know what or who is in the house – they use this technology to survey (i.e. search) the house to determine information that they can’t ascertain without the home owners permission.

• 6. Pre-crime “Threat Assessment” Database:

The 9-1-1 emergency infrastructure now carries a real time “threat assessment” database known as “Beware,” that gives police and first responders a color-coded threat level, with green signifying no threat, yellow identifying a valid threat and red urging immediate caution. The catch? The threat assessment is not just based on the obvious stuff like prior arrests and criminal history, but also compiles billions of consumer records and, yes, social media. In fact, the majority of police now use social media in their investigations… the Beware database just makes it instant and universal.

Even worse, the co-founder of the technology said it flags “offensive speech” in its threat assessment… you don’t even have to make an online threat to be considered a threat, you just have be considered “offensive”! And who decides that, anyway?

Not you. You aren’t even allowed to know what has been entered in your privately-held records:

Your local police department is likely using numerous tools and applications that might determine how you get treated during a routine traffic stop, or in response to your neighbor’s call about loud music. One such application, Beware, has been sold to police departments since 2012. It can be accessed on any Internet-enabled device, including tablets, smartphones, laptop and desktop computers, while responders are en route to, or at the location of a call.

This app explores billions of records in social media postings, commercial and public databases for law enforcement needs, churning out “risk profiles” in real time. ‘Beware’ algorithm assigns a score and “threat rating” to a person — green, yellow or red – and sends that rating to a requesting officer. Worst of all, this information is not made available to the very person whose “threat rating” is being appraised. You have no ability to dispute being wrongly designated a high-risk potential offender.

And it stands to reason that this concerning database is going to be used against more than just serious criminals. The potential for abuse and use against gun owners and those exercising political speech, including offensive or less-than-responsible online rhetoric, is perhaps inevitable and unavoidable with this system, which as been in use for now for several years.

What’s worse? So-called “predictive policing” is just in its infancy… there are multiple platforms still finding a market, and their invasive capabilities are sure to grow in magnitude as the years go on. A federally-mandated network called FirstNet is being constructed, “using federal funding, are set to begin building a $7-billion nationwide first-responder wireless network” that will incorporate these emergency powers into every agency and locale across the country.

• 7. License Plate Scanning and Traffic Monitoring:

There are already issues for gun owners in Maryland, where concealed carry permits issued by other states are not recognized. Traffic cops there recently pulled over a licensed gun owner in good legal standing from Florida to search his vehicle for a s specific firearm – his Kel-Tec .38 semi-automatic handgun – while he and his family were traveling through the state. As it turned out, the the gun was locked in a safe at home in Florida, and the incident ended in a traffic warning for speeding. But what prompted the preemptive search, and how did police know know this man was a concealed carry?

Likely the stop-and-search was the result of police work involving routine license scanning, traffic monitoring and database threat assessment using software like Beware, which has already been used in some 38 million emergency calls across the country.

Only a few days ago, the mainstream rehashed the fact that the EZ Pass and other toll road transponders are not just used for collecting toll information, but are used for traffic surveillance and police investigations as well.

Forbes’ privacy advocate Kashmir Hill wrote about an electronics tinkerer who

“did an analysis of the many ways his car could be tracked and stumbled upon something rather interesting: his E-ZPass, which he obtained for the purpose of paying tolls, was being used to track his car in unexpected places, far away from any toll booths.

Police subsequently copped to the use of this device in surveillance and tracking activities:

It’s part of Midtown in Motion, an initiative to feed information from lots of sensors into New York’s traffic management center. A spokesperson for the New York Department of Transportation, Scott Gastel, says the E-Z Pass readers are on highways across the city, and on streets in Manhattan, Brooklyn and Staten Island, and have been in use for years. The city uses the data from the readers to provide real-time traffic information, as for this tool… Notably, the fact that E-ZPasses will be used as a tracking device outside of toll payment, is not disclosed anywhere that I could see in the terms and conditions.

They are also used by toll companies themselves, as USA Today disclosed:

Warning to motorists: Don’t speed in the toll lanes. E-Z Pass is watching.

Several states, including New York, Maryland and Pennsylvania, say they monitor speeds through the fast pass toll lanes and will suspend your E-Z Pass for multiple speeding violations.

Years ago, a hacker explained how the the California DOT and law enforcement were able to use toll transponders as an active homing beacon capable of zeroing in on a suspect or monitoring the total flow of traffic over a given period of time:

Each radio frequency id (RFID) transponder sends a unique identification code to scanners positioned at toll booths. A tolling authority computer matches this ID code with credit card and other payment information to collect the toll… [even] an inexpensive RFID scanner [can be used] to read the ID code of any vehicle remotely, essentially turning the transponder into a homing beacon with a maximum range of about 100 yards.

“You can use it for tracking,” Lawson said. “Once you’ve seen the car, you can pick it out in a crowd.”

That is exactly what California’s 511 system does. Scanners placed throughout the highway network track the movement of motorists with toll transponders as a means of monitoring traffic flow. According to the California Department of Transportation, the system tracks individual ID codes, storing a movement history for each particular car in a database for 24 hours.

Additionally, both Homeland Security and the IRS were in the news this year regarding their use of data collected by both public and private agencies using license-plate tracking systems:

The Department of Homeland Security wants a private company to provide a national license-plate tracking system that would give the agency access to vast amounts of information from commercial and law enforcement tag readers, according to a government proposal that does not specify what privacy safeguards would be put in place.

“It is important to note that this database would be run by a commercial enterprise, and the data would be collected and stored by the commercial enterprise, not the government,” she said.

Fox News carried further details:

In June 2012, the IRS awarded Vigilant a $1,188 contract for “access to nationwide data,” according to federal procurement records compiled by the news agency. The contract ended in May 2013, according to the records.

Especially with the IRS, I don’t know why these agencies are getting access to this kind of information,” Lynch said. “These systems treat every single person in an area as if they’re under investigation for a crime — that is not the way our criminal justice system was set up or the way things work in a democratic society.”

Please Spread The Word And Share This Post

Copyright Information: Copyright SHTFplan and Mac Slavo. This content may be freely reproduced in full or in part in digital form with full attribution to the author and a link to Please contact us for permission to reproduce this content in other media formats.

Posted by Red Pill Reports in Science & Technology
2014 – A Breakthrough Year for Technology Metals

2014 – A Breakthrough Year for Technology Metals

2014 – A Breakthrough Year for Technology Metals

By Bodo Albrecht | Kitco

2014 - A Breakthrough Year for Technology Metals

Tesla Model S charging at a public charging station in Zoutelande, the Netherlands. Image credit: David van der Mark (flickr) [CC BY-SA 2.0]

It is impossible to create a connected, mobile and sustainable society without technology metals (precious metals, specialty metals and rare earth elements) enabling it. Lithium stores energy in our rechargeable batteries; neodymium’s magnetic properties run electric motors of which there are many in our lives; silver helps collect sunlight and turn it into renewable energy.

Tech Metals Insider reported about these and many other applications throughout the year.

2014 has seen many of these technologies emerge from development to prototype, or even mass production.

  • In May, a U.S. startup named Solar Roadways broke crowdfunding records with the idea of using solar panels as road surfaces. In parallel, SolaRoad of the Netherlands even opened the first stretch of public road to the public, using the same basic concept. Immovable solar panels, while not the most effective method of producing energy, will effectively add a secondary use to surfaces that are already exposed to sunlight.
  • Throughout the year, institutes like the Lawrence Livermore National Laboratory as well as development companies of all sizes, like Lattice Energy, Lockheed Martin or investor Bill Gates were exploring new fields of energy generation involving low energy nuclear reactors (LENR), promising an abundance of energy without the risks of conventional nuclear fission. The reactors used rely on gold or palladium to operate.
  • As part of some of these processes, scientists of Lattice Energy and Toshiba Heavy Industries have discovered that a transmutation of metals takes place during operation, turning radioactive waste into rare earth elements and non-ferrous into precious metals. A Tech Metals Insider interview with Martin Burger of Blue Eagle Refinery, a group of modern day alchemists claiming to have created gold from broken glass in a modified microwave oven stirred much controversy over the summer.
  • At the same time, scientists are of course working on alternatives that would not require precious metals at all to operate, making them less expensive and more marketable. In March, a company from Liechtenstein introduced the “QUANT e”, a sports car using a flow cell battery with sea water as the source of energy. While the world was debating the validity of this concept the U.S. Navy published results of trials with their own version of the same process, proving that it actually works.
  • Most visibly, of course, 2014 was the year of the electric car. Tesla and Elon Musk, its charismatic leader, kept making headlines while other manufacturers like Volkswagen Group, Hyundai, Ford, Mitsubishi, BMW, Mercedes Benz and others joined Nissan in offering a portfolio of short range electric vehicles that are slowly gaining traction in their market segment. Supply and environmental impact of lithium are heavily influenced by the success of electric cars.


Video: 2013 Tesla Model S – Review – CAR and DRIVER

Contributing Editor Csaba Csere takes an in-depth and technical look into the 2013 Tesla Model S on the latest episode of Car and Driver: Tested.

Hosted by the editors of Car and Driver magazine, this show puts the audience into the action on new-car reviews, comparison tests, auto-show coverage, and more. Our experts drive and test the latest models, attend automotive events around the world, and check out the latest in-vehicle technology like massaging seats and night-vision systems. Viewers will also have the opportunity to write in and extend the conversation.

Posted by Red Pill Reports in Science & Technology
Engineers Develop Self-charging Turtle Surveillance Robot

Engineers Develop Self-charging Turtle Surveillance Robot

Engineers Develop Self-charging Turtle Surveillance Robot

Chuck Bednar | redOrbit

Engineers Develop Self-charging Turtle Surveillance Robot

A hawksbill turtle at the Black Hills dive site in Útila, Honduras. Image credit: Hoffryan [Public domain], Wiki

As part of an ongoing attempt to develop underwater robots capable of thinking on their own, engineers from the National University of Singapore (NUS) have created a mechanical turtle capable of performing complicated tasks such as surveillance and energy harvesting.In addition, the turtle robot is maneuverable, operates on a self-charge mode and doggedly performs the tasks assigned to it while also being able to adapt to obstacles that arise, they explained. Ultimately, they hope to develop a fleet of autonomous aquatic robots to perform tasks deemed too hazardous for humans, such as detecting underwater nuclear waste.

NUS associate professor S K Panda and colleagues from the university’s Electrical and Computer Engineering Department are working on the research and development of biomimetric machines that draw upon inspiration from nature to overcome technical issues. The team is currently finishing up work on the new robotic sea turtle, which they claim can dive deeper by using its front and hind limb gait movements, just like a real turtle would.

“Our turtle robot does not use a ballast system which is commonly used in underwater robots for diving or sinking functions,” Panda explained. “Without this ballast system, it is much smaller and lighter, enabling it to carry bigger payloads so that it can perform more complicated tasks such as surveillance, water quality monitoring in Singapore reservoir or energy harvesting for long endurance.”

“Being able to do a dynamic dive or sinking vertically means that it can also enter vertical tunnels or pipes in the seabed with very small diameters,” the professor added. “We can have a swarm of tiny turtles which communicate with each other and act collaboratively to perform their duties. With improved maneuverability they can go to tiny and narrow places like crevices where bigger vessels are unable to do so.”

Read more

Posted by Red Pill Reports in Science & Technology
Security Firm Says Sony Hack Might Have Been an Inside Job

Security Firm Says Sony Hack Might Have Been an Inside Job

Security Firm Says Sony Hack Might Have Been an Inside Job


Despite claims by the FBI that North Korea was behind the massive hack against Sony, several cybersecurity experts have come forward to raise questions about the allegation, with some suggesting that insiders at the company could be to blame.

Image credit: Columbia Pictures / Via Twitter: @evandgoldberg

Image credit: Columbia Pictures / Via Twitter: @evandgoldberg

FBI formally accuses North Korea in Sony hack

One such expert, Kurt Stammberger from the Norse cybersecuirty firm, told CBS News that his team believes a woman identified only as “Lena” was heavily involved in the hack – not North Korea.

“We are very confident that this was not an attack master-minded by North Korea and that insiders were key to the implementation of one of the most devastating attacks in history,” he told the news outlet.

“Sony was not just hacked, this is a company that was essentially nuked from the inside,” Stammberger added.

Little is known about Lena, but Norse believes the woman is somehow linked with the hacking group behind the attack, known as the ‘Guardians of Peace.’ The firm also suspects the woman was a former employee of Sony who worked there for 10 years before leaving in May 2014.

According to Stammberger, Lena’s position in the company would have given her the access and knowledge needed to identify the servers that hackers ultimately stole troves of data from.

Stammberger didn’t completely rule out North Korea’s role in the cyber attack, but he told CBS that evidence pointing to the country could actually be a case of misdirection.

“There are certainly North Korean fingerprints on this but when we run all those leads to ground they turn out to be decoys or red herrings,” he said.

Senator urges Obama to host White House screening of ‘The Interview’

Security Firm Says Sony Hack Might Have Been an Inside Job

Sony Pictures Entertainment. Image credit: Coolcaesar at Wiki [GFDL or CC-BY-SA-3.0]

Last week, the FBI officially pinned the hack on North Korea, saying the breach involved lines of code, methods, and encryption algorithms previously developed by the country.

“Technical analysis of the data deletion malware used in this attack revealed links to other malware that the FBI knows North Korea actors previously developed,” the FBI said in its statement. “The FBI also observed significant overlap between the infrastructure used in this attack and other malicious cyber activity the US government has previously linked directly to North Korea.”

“Separately, the tools used in the SPE attack have similarities to a cyberattack in March of last year against South Korean banks and media outlets, which was carried out by North Korea.”

Still, some remain unconvinced. Cybersecurity expert Bruce Schneier wrote that the code used by the hackers seems “to point in all directions at once.” Looking at the evidence cited by the FBI, Schneier said it’s the kind that is “easy to fake, and it’s even easier to interpret it incorrectly.” He also cast doubt on the “insider threat” theory, arguing that such an individual wouldn’t need the hacking tools used to breach Sony’s servers.

Read more

Posted by Red Pill Reports in Science & Technology
How Even the Remotest Parts of the World Are Getting Mobile Coverage

How Even the Remotest Parts of the World Are Getting Mobile Coverage

How Even the Remotest Parts of the World Are Getting Mobile Coverage

By Leo Mirani | NextGov

Getting Mobile Coverage in Remote Parts of the World

Image credit:

For mobile operators, setting up shop in some of the remotest places on earth can bring rich rewards, but also tremendous risk. Sometimes the risk is too much—Digicel founder Denis O’Brien said his company lost nine people in “plane crashes, accidents, car crashes” when it was building its network in Papua New Guinea—and as often, the reward is too little. As a result, 10% of the world’s population lives in places without mobile coverage (pdf).

Endaga, a tiny startup that just raised $1.2 million in funding, may have another way.

As part of his doctoral work at Berkeley, Endage founder Kurtis Heimerl built a box that can be installed pretty much anywhere—the first one was fitted on a tree—and provide cellular coverage over a 10 km (6.2 mile) radius. The box uses regular radio spectrum to connect to mobile phones in its area, converting it to voice over internet protocol (VoIP) in order to connect to the rest of the world.

Read more

Posted by Red Pill Reports in Science & Technology
Estimated 1M mummified bodies found in Egyptian necropolis, some 7ft tall

Estimated 1M mummified bodies found in Egyptian necropolis, some 7ft tall

Estimated 1M mummified bodies found in Egyptian necropolis, some 7ft tall

No explanation of where the bodies came from, scientists say

By Shepard Ambellas | Intellihub

Estimated 1M mummified bodies found in Egyptian necropolis, some 7ft tall

Image credit: Facebook/ByuInEgypt

FAIYUM, EGYPT (INTELLIHUB) — So far over 1,700 mummified bodies, of an estimated 1 million, have been unearthed in a necropolis South of Cairo.

It appears the mummies are approximately 1,500-years-old, buried during the time when Rome control vast swaths of Egypt.

However, the discovery has scientists scratching their heads as the literally have no explanation of where all of the bodies came from.

At least one body was reported to be more than 7ft. tall.

Kerry Muhlestein, the project director, from Brigham Young University, Utah, said for every 5 x 5 sq. meter sand plot excavated at least 40 bodies have found, showing the true significance of the site.

According to a recent report, the site named “Fag el-Gamous”, a necropolis, when translated means “The way of the buffalo”.

Interestingly most of the bodies were buried with no coffin. However key features of the bodies, like the brains, tongues and nails, seem to be well-preserved.

The mummies were also reported to have been separated into different burial sections based on their hair color.

Read more

Read more articles by this author here.

Cemetery with one MILLION mummies unearthed in Egypt: 1,500-year-old desert necropolis is the largest ever found

By Richard Gray | MailOnline

This skeleton was found entombed inside an unusual triangle shaped vault at the bottom of a burial shaft - Image credit: BYU Escavations Egypt

This skeleton was found entombed inside an unusual triangle shaped vault at the bottom of a burial shaft – Image credit: BYU Escavations Egypt

A cemetery containing more than a million mummified human bodies has been unearthed in central Egypt, according to archaeologists.

Scientists have already excavated more than 1,700 mummies, preserved by the hot dry desert in the Faiyum region of Egypt about 60 miles (96km) south of Cairo.

But those leading the work believe their could be up to a million similar bodies buried in shafts cut into the limestone rock that are at times up to 75ft (22.9 metres) deep.

Read more

(Many more photos here)

Video: Cemetery with one MILLION mummies unearthed in Egypt

Cemetery with one MILLION mummies unearthed in Egypt: 1,500-year-old desert necropolis is the largest ever found

A cemetery containing more than a million mummified human bodies has been unearthed in central Egypt, according to archaeologists.

Scientists have already excavated more than 1,700 mummies, preserved by the hot dry desert in the Faiyum region of Egypt about 60 miles (96km) south of Cairo.

But those leading the work believe their could be up to a million similar bodies buried in shafts cut into the limestone rock that are at times up to 75ft (22.9 metres) deep.

It is thought that the mummies were buried around 1,500 years ago, between the 1st and 7th Century AD, when Egypt was controlled by the Roman and Byzantine Empire.

Unlike many famous mummified remains discovered in Egypt, these were found in mass graves and appear to be ordinary citizens rather than royalty or other important figures.

Yet scientists are baffled about where the huge numbers of mummies came from – the remains of a nearby village is too small to warrant such a large cemetery and the nearest town, named Philadelphia after King Ptolemy II Phiadelphus, has its own burial sites.

Archaeologists have also uncovered a bizarre range of mummies, including one man who is more than seven feet (213 cm) tall.

They have also discovered that the mummies appear to be clustered together by hair colour, with those with blond hair in one area and all of those with red hair in another.

Professor Kerry Muhlestein, project director of the excavation at Brigham Young University, in Utah, said: ‘We are fairly certain we have over a million burials within this cemetery. It’s large, and it’s dense.’

Although the Fag el-Gamous necropolis, which is named after a nearby road that translates as ‘Way of the Buffalo’, was first discovered nearly 30 years ago, archaeologists are still trying to piece together what they have found there.

Annual excavations at the site, on the eastern edge of the Faiyum region, near the city of Silah, regularly unearth mummified remains and Professor Muhlestein presented the latest discoveries at the Scholars Colloquim at the Society for the Study of Egyptian Antiquities last month.

Among the recent discoveries made last year were the mummified remains of a little girl aged around 18 months old, still with two bracelets on each arm.

Unlike royal Egyptian mummies, the people buried at Fag el-Gamous had few goods buried with them and were laid in the ground without coffins.

Their internal organs were also rarely removed, an important part of the mummification process, so it is the arid environment of the desert that is largely thought to have preserved the bodies.

However, with the latest discovery of the little girl, Professor Muhlestein said there appears to have also been some attempt by those who buried her to use the full mummification process.

Writing on the team’s Facebook page, which Professor Muhlestein only recently updated in an attempt to keep the discoveries secret, said: ‘This mummy was beautifully wrapped in a tunic and with other nice wrappings.

‘There was some evidence that they tried much of the full mummification process. The toes and toenails and brain and tongue were amazingly preserved.

‘We found a wonderful necklace and two bracelets on each arm. The jewellery makes us think it was a girl, but we cannot tell.

‘She was buried with great care as someone who obviously loved her very much did all they could to take care of this little girl in burial. Very sad.

‘But they succeeded, it was a beautiful burial. She had been buried with several other mummies, so we are interested in examining them.’

Another woman, with long blonde hair, was found buried among a group of other bodies that all had healthy sets of teeth.

Professor Muhlestein said: ‘Quite a few of our mummies had excellent teeth, something that is unusual.

Much of the discoveries have yet to be properly published as the archaeologists have been reluctant to reveal the exact location of the cementery.

Professor Muhlestein described how one mummy was found folded in half in order to fit him into the burial shaft. He believes that the man, who was over 7ft tall (213cm) may have suffered from a medical condition caused by an excess of growth hormone, but said more research needs to be done to prove this.

He also believes that some of the clusters by hair colour may actually be due to people being buried in family groups and so are related.

He hopes that genetic testing may be possible to help show how some of the mummies were related to each other.

Together with the bodies, archaeologists have also discovered glass beads, linen, jewelry and even colourful children’s boots.

‘A lot of their wealth, as little as they had, was poured into these burials,’ said Professor Muhlestein.

Posted by Red Pill Reports in Science & Technology
NASA Rover Finds Active and Ancient Organic Chemistry on Mars

NASA Rover Finds Active and Ancient Organic Chemistry on Mars

NASA Rover Finds Active and Ancient Organic Chemistry on Mars


NASA Rover Finds Active and Ancient Organic Chemistry on Mars

The first definitive detection of Martian organic chemicals in material on the surface of Mars came from analysis by NASA’s Curiosity Mars rover of sample powder from this mudstone target, “Cumberland.” Image credit: NASA/JPL-Caltech/MSSS

NASA’s Mars Curiosity rover has measured a tenfold spike in methane, an organic chemical, in the atmosphere around it and detected other organic molecules in a rock-powder sample collected by the robotic laboratory’s drill.

“This temporary increase in methane — sharply up and then back down — tells us there must be some relatively localized source,” said Sushil Atreya of the University of Michigan, Ann Arbor, a member of the Curiosity rover science team. “There are many possible sources, biological or non-biological, such as interaction of water and rock.”

Researchers used Curiosity’s onboard Sample Analysis at Mars (SAM) laboratory a dozen times in a 20-month period to sniff methane in the atmosphere. During two of those months, in late 2013 and early 2014, four measurements averaged seven parts per billion. Before and after that, readings averaged only one-tenth that level.

Curiosity also detected different Martian organic chemicals in powder drilled from a rock dubbed Cumberland, the first definitive detection of organics in surface materials of Mars. These Martian organics could either have formed on Mars or been delivered to Mars by meteorites.

Organic molecules, which contain carbon and usually hydrogen, are chemical building blocks of life, although they can exist without the presence of life. Curiosity’s findings from analyzing samples of atmosphere and rock powder do not reveal whether Mars has ever harbored living microbes, but the findings do shed light on a chemically active modern Mars and on favorable conditions for life on ancient Mars.

“We will keep working on the puzzles these findings present,” said John Grotzinger, Curiosity project scientist of the California Institute of Technology in Pasadena. “Can we learn more about the active chemistry causing such fluctuations in the amount of methane in the atmosphere? Can we choose rock targets where identifiable organics have been preserved?”

Researchers worked many months to determine whether any of the organic material detected in the Cumberland sample was truly Martian. Curiosity’s SAM lab detected in several samples some organic carbon compounds that were, in fact, transported from Earth inside the rover. However, extensive testing and analysis yielded confidence in the detection of Martian organics.

Identifying which specific Martian organics are in the rock is complicated by the presence of perchlorate minerals in Martian rocks and soils. When heated inside SAM, the perchlorates alter the structures of the organic compounds, so the identities of the Martian organics in the rock remain uncertain.

“This first confirmation of organic carbon in a rock on Mars holds much promise,” said Curiosity Participating Scientist Roger Summons of the Massachusetts Institute of Technology in Cambridge. “Organics are important because they can tell us about the chemical pathways by which they were formed and preserved. In turn, this is informative about Earth-Mars differences and whether or not particular environments represented by Gale Crater sedimentary rocks were more or less favorable for accumulation of organic materials. The challenge now is to find other rocks on Mount Sharp that might have different and more extensive inventories of organic compounds.”

Researchers also reported that Curiosity’s taste of Martian water, bound into lakebed minerals in the Cumberland rock more than three billion years ago, indicates the planet lost much of its water before that lakebed formed and continued to lose large amounts after.

SAM analyzed hydrogen isotopes from water molecules that had been locked inside a rock sample for billions of years and were freed when SAM heated it, yielding information about the history of Martian water. The ratio of a heavier hydrogen isotope, deuterium, to the most common hydrogen isotope can provide a signature for comparison across different stages of a planet’s history.

“It’s really interesting that our measurements from Curiosity of gases extracted from ancient rocks can tell us about loss of water from Mars,” said Paul Mahaffy, SAM principal investigator of NASA’s Goddard Space Flight Center in Greenbelt, Maryland, and lead author of a report published online this week by the journal Science

The ratio of deuterium to hydrogen has changed because the lighter hydrogen escapes from the upper atmosphere of Mars much more readily than heavier deuterium. In order to go back in time and see how the deuterium-to-hydrogen ratio in Martian water changed over time, researchers can look at the ratio in water in the current atmosphere and water trapped in rocks at different times in the planet’s history.

Martian meteorites found on Earth also provide some information, but this record has gaps. No known Martian meteorites are even close to the same age as the rock studied on Mars, which formed about 3.9 billion to 4.6 billion years ago, according to Curiosity’s measurements.

The ratio that Curiosity found in the Cumberland sample is about one-half the ratio in water vapor in today’s Martian atmosphere, suggesting much of the planet’s water loss occurred since that rock formed. However, the measured ratio is about three times higher than the ratio in the original water supply of Mars, based on the assumption that supply had a ratio similar to that measured in Earth’s oceans. This suggests much of Mars’ original water was lost before the rock formed.

Curiosity is one element of NASA’s ongoing Mars research and preparation for a human mission to Mars in the 2030s. Caltech manages the Jet Propulsion Laboratory in Pasadena, California, and JPL manages Curiosity rover science investigations for NASA’s Science Mission Directorate in Washington. The SAM investigation is led by Paul Mahaffy of Goddard. Two SAM instruments key in these discoveries are the Quadrupole Mass Spectrometer, developed at Goddard, and the Tunable Laser Spectrometer, developed at JPL.

The results of the Curiosity rover investigation into methane detection and the Martian organics in an ancient rock were discussed at a news briefing Tuesday at the American Geophysical Union’s convention in San Francisco. The methane results are described in a paper published online this week in the journal Science by NASA scientist Chris Webster of JPL, and co-authors.

A report on organics detection in the Cumberland rock by NASA scientist Caroline Freissenet, of Goddard, and co-authors, is pending publication.


For copies of the new Science papers about Mars methane and water, visit:

For more information about Curiosity, visit:


Learn about NASA’s Journey to Mars at:

Posted by Red Pill Reports in Science & Technology
The Hypnotic Use of Color in Television News

The Hypnotic Use of Color in Television News

The Hypnotic Use of Color in Television News

By Jon Rappoport | Activist Post

Some people would call it simply an effort to please the audience. Well, pleasing the audience during a national news broadcast isn’t the objective, unless ratings and viewer numbers and ad revenues and distraction from facts is actually the plan…and of course it is.

Hypnotic Use of Color in Television

Image credit: Dees Illustration

Just now, I forced myself to watch a rebroadcast of Wednesday night’s NBC News with the golden boy, Brian Williams.

But Brian wasn’t golden, he was blue, which happens to be people’s favorite color in multiple surveys. Restful calming blue.

Here is what I saw in the first five minutes. I couldn’t handle more. (I urge you to go to NBC and look for yourself.)

Brian was wearing a blue suit. All the backgrounds for captions were blue. Small screens behind Brian were blue. Brian’s desk panels were blue. The surface of the desk reflected vague blue tints.

The lead story, the CIA torture report, featured blue in the CIA seal. Andrea Mitchell, who was covering the report’s release, was wearing a dark blue outfit. Behind her, the Capitol dome sat in a blue sky. A psychologist named Mitchell, an architect of the torture program, was interviewed. His shirt was partly blue. He was wearing blue jeans. The NBC reporter interviewing him was wearing a light blue shirt. A map of the world appeared onscreen, sitting in a field of blue. Behind Andrea, the background was filled with objects of different blues. Reporter Dana Priest was interviewed for the story. A piece of the background behind her was blue. Michael Hayden was interviewed. He was wearing a blue suit.

I watched the beginning of the next story: the NFL’s new policy on player discipline. Commissioner Roger Goodell stood in front of a blue background. He was wearing a blue suit.

Again, I emphasize—all this was in the first five minutes of the newscast.

You could say the news itself was merely an occasion for the transmission of blue.

“Let’s have dinner in front of the TV and watch the news. I like the blue.”

“Which channel?”

“NBC. Their blue is better than the CBS blue.”

“You’re right. It makes me feel restful. The CIA torture couldn’t have been that bad. It’s blue. I’m reassured.”


The author of three explosive collections, THE MATRIX REVEALED, EXIT FROM THE MATRIX, and POWER OUTSIDE THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. He maintains a consulting practice for private clients, the purpose of which is the expansion of personal creative power. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free emails at or OutsideTheRealityMachine.

Video: Television – Mass Hypnotic Indoctrination

Posted by Red Pill Reports in Science & Technology
Peacekeeper: Free Smartphone App Creates Community Response Service

Peacekeeper: Free Smartphone App Creates Community Response Service

Peacekeeper: Free Smartphone App Creates Community Response Service

By Activist Post

Peacekeeper: Free Smartphone App Creates Community Response Service

The state of police work in the U.S. continues to be called into question. Due to major budget cutbacks amid a worsening economy, many areas have been left with part-time police and 911 response. And even if available, the wait times can be life threatening.

Moreover, the police who do show up are often of a completely different mindset than the police of yesteryear. An increasingly militarized police force can show up to an emergency response call as though it is territory to be invaded and occupied. The stories are legion of police killing the owner who called, shooting their pets, or basically laying waste to their home. In fact, the growth of the police state is one of the greatest threats that each of us might encounter as we go about our day-to-day lives.

People are beginning to look to technology as a possible solution. We previously reported on an app called Sidekik, which was designed to make it as easy as possible to record the police and upload that recording offsite, also putting you in immediate contact with legal representation to help you navigate the encounter … in real-time.

Now a new app called Peacekeeper goes even a step further, encouraging connectivity with your neighbors, family and friends in order to establish a response network filled with people who already have earned your trust. Please read their press release and see their video below. Tell us what you think – is this a viable decentralized solution that can restore self-reliance and community strength? Please leave your comments.

Press Release – Peacekeeper, a free, community-based emergency response Smartphone app, cuts emergency response times by relying on nearby neighbors. When a user is in an emergency, the app notifies neighbors, friends and family and gives them the chance to be first responders. The system enables individuals to easily send, receive, and respond to emergency alerts. The design of the app gives users the ability to get the help they need when seconds count the most.

In an emergency, response time is critical. By relying on neighbors across the street rather than police across town, Peacekeeper can dramatically reduce the wait time for help to arrive.

The four types of Peacekeeper alerts are Medical, Fire, Intruder and Abduction. Alerts contain detailed information about the emergency so that the recipients know where to find the person and what to expect when they arrive. Responders and victims can communicate in real-time via the built-in chat feature.

“The Peacekeeper app is designed to change how people think and feel about emergency response by building tools, relationships and training that empower individuals to take action within their own communities,” says Cody Drummond, the app’s founder. “This has the potential to dramatically reduce assault, improve security and improve safety in neighborhoods around the world.”

For medical emergencies, responders can provide users with the support they need during a crisis or serve as an intermediary until professional help arrives. For instance, if a child falls unconscious, a family member can quickly send a medical alert to the people in their private emergency response group. Neighbors who know CPR or have medical training arrive within seconds and save a life.

“We hope an emergency never happens, but if it does, Peacekeeper alerts the important people who are motivated and ready to respond with one touch of a button,” explains Drummond. Peacekeeper users have two layers of protection: their Emergency Response Group (ERG) and their Alliance.

ERG’s consist of the neighbors that you choose to be in your network. Alliances are designated family and friends who may be geographically further away, yet, are likely to act quickly in an emergency.

Thanks to a successful beta test period, the app now has users in all 50 United States and over 20 foreign countries.

The Peacekeeper app is built to call responders to your home. As the network grows and users begin to establish trusted reputations, Peacekeeper plans to implement features that allow users to send alerts from any location for emergency response wherever they go.

Cody Drummond is available for interviews – please contact his publicist, Kimberly Hartke, at 703-860-2711.

The app is available in Apple’s App Store and Android’s Google Play for free.

Peacekeeper is dedicated to building and implementing systems and tools that will bring peace and security to neighborhoods around the world. Visit them on the web at


Posted by Red Pill Reports in Science & Technology
Each Time Police Shut Pirate Bay, We’ll Multiply Servers – Chairman of Pirate Party

Each Time Police Shut Pirate Bay, We’ll Multiply Servers – Chairman of Pirate Party

Each Time Police Shut Pirate Bay, We’ll Multiply Servers – Chairman of Pirate Party


Police Shut Pirate Bay

No matter how many times law enforcement cracks down on The Pirate Bay, it will find a way to re-open, the Berlin chairman of the Pirate Party told RT – days after the website was taken offline by a Swedish police raid.

“It was already shut down in 2005, and the result was the creation of a party called Pirate Party coming with all the ideas of sharing of information, of knowledge and culture on the internet. And freedom on the internet,” Kramm said.

“So they came up with this: basically, each time you shut the Pirate Bay down, we will multiply,” he added.

The Pirate Bay offers links to torrents for file sharing, Kramm stressed, and the rights owners state that copying is a copyright infringement – despite the internet being “a huge copying machine.”

Thus, the internet “changed the view on public property,” but instead of re-formulating the copyright legislation, corporations still stand their ground concerning the copyright issues.

Kramm also said that music industry has opened for streaming, adapting to the new circumstances – and the streaming has become one of the strongest developing markets.

Read more

Posted by Red Pill Reports in Science & Technology
New ‘Harmless Herbicide’ to Compete with Monsanto’s RoundUp

New ‘Harmless Herbicide’ to Compete with Monsanto’s RoundUp

New ‘Harmless Herbicide’ to Compete with Monsanto’s RoundUp

By Christina Sarich | Natural Society

A Non-Toxic Herbicide Alternative?

‘Harmless Herbicide’ to Compete with Monsanto’s RoundUp

Why use carcinogenic herbicides to kill weeds when a little hot water will do the trick? Botanists and organic gardeners have known this effective, chemical-free way to treat weeds for hundreds of years. Now a UK based company has developed an innovative herbicide-free way to kill weeds utilizing this age-old wisdom.

Weeding Tech’s new products is said to kill weeds in 24 hours with no pesticides or herbicides. This is great news for the world considering that herbicide-resistant crop technology has led to a 239 million kilogram (527 million pound) increase in herbicide use in the United States between 1996 and 2011.

Saint Louis-based chemical Monsanto says it is in the ‘weed-killing’ business, but it is more likely in the ‘people-killing business’ with all the studies coming out on glyphosate’s toxic ramifications. RoundUp accounts for at least $7 billion in annual sales for Monsanto, so it is likely they won’t want to hear about a weed-killing product that is effective and harmless.

Using just hot-water and foam with a patented thermal technology, FoamStream has the following benefits:

  • It visibly kills annual weeds within minutes
  • It contains no harmful active ingredients and is not classified as a herbicide
  • It is safe for unrestricted use in sensitive environments
  • It can be applied in poor weather, avoiding costly delays for farmers

Related: Human Blood is Not ‘RoundUp Ready’

The product has already been trialed successfully in 12 different areas of the UK, and has won multiple awards. It has been proven to be effective at killing invasive species of weeds, without affecting the DNA of plants, inserting BT toxins into the environment, or posing the hazard of cross-pollinating organic crops, as GMO crops meant to withstand herbicides, do.

The Plant Protection Products (Sustainable Use) Regulations which started in the UK in 2012 inspired the recent market success of the product, but it has been in development since the 1990s.

As more individuals desire to reduce the use of traditional chemical herbicides, products like these can help to pave the way. I hope companies like these can give Monsanto and Big Biotech a run for their money.

(This article is not intended to promote the product mentioned, but rather is reporting on (hopefully) less toxic alternatives to what’s already on the market.)


Posted by Red Pill Reports in Science & Technology
Mountain-sized Asteroid Heading Our Way: Russian Scientist

Mountain-sized Asteroid Heading Our Way: Russian Scientist

Mountain-sized Asteroid Heading Our Way: Russian Scientist

By Fred Weir | Christian Science Monitor

Mountain-sized Asteroid Heading Our Way

A composite image, to scale, of the asteroids which have been imaged at high resolution.

In a video posted online Sunday, astrophysicist Vladimir Lipunov says the newly discovered asteroid could collide with Earth during its three-year orbital cycle. A giant meteor exploded over a Russian city in 2013.

A Russian astrophysicist says his team has located a huge, mountain-sized asteroid whose orbit crosses the Earth’s every three years.

Even though experts say the giant object, known as 2014 UR116, poses no immediate threat of collision, its unexpected discovery underscores how little is still known about asteroids and their unpredictable orbits.

Vladimir Lipunov, a professor at Moscow State University, announced the find in a short documentary, “Asteroid Attack,” posted on the website of the Russian Space Agency on Sunday. Mr. Lipunov says the asteroid, which he calculates is 370 meters in diameter, could hit the Earth with an explosion 1,000 times greater than the surprise 2013 impact of a bus-sized meteor in Russia. That object entered Earth’s atmosphere over the city of Chelyabinsk, resulting in a series of ferocious blasts that blew out windows and damaged buildings for miles around.

In the film, Lipunov says it’s difficult to calculate the orbit of big objects like 2014 UR116 because, as they hurtle through the solar system, their trajectories are constantly being altered by the gravitational pull of nearby planets. “We need to permanently track this asteroid, because even a small mistake in calculations could have serious consequences,” he said.

Read more

Video: Recently, with the help of the Russian robotic telescope network astrophysicist , a professor at Moscow State University Vladimir Lipunov detected a potentially dangerous asteroid 2014 UR116. Today, scientists around the world are working to develop surveillance systems for space objects that threaten Earth.

Posted by Red Pill Reports in Science & Technology
Google Wants to Replace Passwords with Fingerprints and Eyeballs

Google Wants to Replace Passwords with Fingerprints and Eyeballs

Google Wants to Replace Passwords with Fingerprints and Eyeballs

By Mike Murphy | Quartz

Google Glass is due to receive an update in 2015, and if a Google patent submitted last month is any indication, it could include a new feature to let wearers use their fingerprints, or scans of their eyes, instead of passwords on websites.

Google Glass - Replace Passwords with Fingerprints and Eyeballs?

In November’s patent application, Google explored ways to replace website passwords with biometric data from a wearable device. In the filing, Google references “head-mounted displays” (HMD) that could scan a wearer’s fingerprints, eyeballs, veins, or even her voice pattern, then use that data to access a website on a computer or mobile device.

While the application doesn’t mention Google Glass or Android Wear by name, it repeatedly mentions “wearables” and the diagrams look a lot like a certain $1,500 head-mounted Google computer.

As the application says: “The biometric data may be used to authenticate a user in lieu of a password, e.g., so that a user’s HMD can log the user on to a webpage on their laptop. As such, the biometric data can serve as a replacement for passwords entirely.”

Read more

Posted by Red Pill Reports in Science & Technology
The More Sinister Directions Of Carbon Nanotubes (as weapons of war)

The More Sinister Directions Of Carbon Nanotubes (as weapons of war)

The More Sinister Directions Of Carbon Nanotubes (as weapons of war)

By Dr. Richard Alan Miller, © 2014

With the possibilities of fullerenes being able to act as a super anti-oxidant (radiation sickness), and a space elevator, it also opens other door to the possibility of weapon of war. Here is where my latest Internet research has led. I begin with some definitions in the physics involved

The Neutron Bomb – A neutron bomb (Enhanced Radiation Weapon) is a low yield fission-fusion thermonuclear weapon (hydrogen bomb) in which the burst of neutrons generated by a fusion reaction is intentionally allowed to escape the weapon, rather than being absorbed by its other components

The weapon’s radiation case, usually made from relatively thick uranium, lead or steel in a standard bomb, are instead made of as thin a material as possible to facilitate the greatest escape of fusion produced neutrons

Dr. Richard Alan Miller Weapons of WarCompared to a pure fission bomb with an identical explosive yield, a neutron bomb would emit about ten time the amount of neutron radiation. Enhanced radiation weapons also fall into this same yield range and simply enhance the intensity and range of the neutron dose for a given yield

Pure Fusion Weapon – A pure fusion weapon is a hypothetical hydrogen bomb design that does not need a fission “primary” explosive to ignite the fusion of deuterium and tritium, two heavy isotopes of hydrogen

Such a weapon would require no fissile material and would therefore be much easier to build in secret than existing weapons. The necessity of separating high-quality fissile material requires a substantial industrial investment (making plutonium), and blocking the sale and transfer of the needed machinery has been the primary mechanism to control nuclear proliferation to date

For many years, nuclear weapon designers have researched whether it is possible to create high enough temperatures and pressures inside a confined space to fuse together deuterium and tritium for the purposes of developing such a weapon

Dr. Richard Alan MillerPure fusion weapons offer the possibility of generating very small nuclear yields and the advantage of reduced collateral damage stemming from fallout because these weapons would not create the highly radioactive byproducts associated with fission-type weapons

Nano- Fusion Reaction – The most difficult aspect of hydrogen fusion is overcoming the electrostatic forces that cause the hydrogen nuclei to repel each other. So a question is asked: Would it be possible to place one of the nuclei inside some conducting sphere like a Buckminsterfullerene so that the fullerene acts as a Faraday cage?

The fullerene would have an induced negative charge on the inner surface, and an induced positive charge on the outer surface. When the second nucleus is brought nearby, the positive charge on the outer surface will accumulate on the side of the cage further away, and some negative charge would accumulate on the side closer to the outside positive charge

Would this setup effectively weaken the strength of the electric field that either one of the nuclei encounters? You don’t even need to construct a shell. Drop an electron on orbit with a proton, and you get a hydrogen atom. That electron shell already neutralizes the proton’s charge. That is why you can stick two hydrogen atoms together

The problem is the size difference. P rotons are on the order of femtometer. Hydrogen atom is on the order of an angstrom. That’s 10,000 times too big. And the reason for that is electron’s mass. They are just too light. What you need is a particle with similar properties, but significantly heavier. And we now have one

The trouble is, a muon has a very short half-life, and are difficult to produce in high quantities without high energy losses. If we could find a way to produce a muon at near 100% efficiency, we could easily have cold fusion.

Dr. Richard Alan MillerThese weapons would be lethal not only because of their explosive force, which could be large compared to bombs based on chemical explosives, but also because of the neutrons they generate. The neutrons may cause substantially more casualties than the explosive blast, as in a neutron bomb

Muon-catalyzed fusion (?CF) is a process allowing nuclear fusion to take place at temperatures significantly lower than the temperatures required for thermonuclear fusion, even at room temperature or lower. It is one of the few known ways of catalyzing nuclear fusion reactions.

Muons are unstable subatomic particles. They are similar to electrons, but are about 207 times more massive. If a muon replaces one of the electrons in a hydrogen molecule, the nuclei are consequently drawn 20 times closer together than in a normal molecule. When the nuclei are this close together, the probability of nuclear fusion is greatly increased, to the point where a significant number of fusion events can happen at room temperature.

Nuclear FusionCurrent techniques for creating large numbers of muons require large amounts of energy, larger than the amounts produced by the catalyzed nuclear fusion reactions. This prevents it from becoming a practical power source

Moreover, each muon has about a 1% chance of “sticking” to the alpha particle produced by the nuclear fusion of a deuterium with a tritium, removing the “stuck” muon from the catalytic cycle, meaning that each muon can only catalyze at most a few hundred deuterium tritium nuclear fusion reactions

So, these two factors, of muons being too expensive to make and then sticking too easily to alpha particles, limit muon-catalyzed fusion to a laboratory curiosity. To create useful room-temperature muon-catalyzed fusion reactors would need a cheaper, more efficient muon source and/or a way for each individual muon to catalyze many more fusion reactions.

Muon-catalyzed fusion is a well established and understood fusion mechanism. Although it is also a relatively low temperature process, it is distinct from cold fusion.


Abstract: A nano-fusion reactor comprised of nano-particles such as carbon based nanotubes, endohedral fullerenes and other nano materials encapsulating fusible fuels such as the hydrogen isotopes, deuterium, and tritium. The nano-devices encapsulate the fusible materials and ignite fusion reactions which in some of the embodiments consume the nano-fusion reactor device requiring the replenishment of these devices so to continue the fusible reactions. The reactions can be controlled and scaled through modulated presentation of fusion targets to the ignition chamber. The fusion reactions are ignited in the embodiments through one or more of the applied forces in the fusion reactor: electromagnetic compressive, electrostatic, and thermo. These applied forces in conjunction with the extreme structural strength, the ablation forces and purity of the nano-fusion device produces maximum forces necessary for the production of a shock wave on the nano-encapsulated device to ignite one or a plurality of fusion reactions. The lower ignition energy is due to a smaller device with less fuel, more efficient coupling of applied energy by the nano-device, along with purer encapsulated fuels, and improved geometries has provided improvements over conventional ICF reactions. …

Posted by Red Pill Reports in Science & Technology
NASA’s Orion Test Launch – Live Stream

NASA’s Orion Test Launch – Live Stream

NASA’s Orion Test Launch – Live Stream

By Rebecca Jacobson | PBS

Watch the live stream below

Update: Due to wind, technical issues and a civilian boat impeding on the launch site, NASA has delayed the launch to later in today’s window. Orion can launch safely anytime before 9:44 a.m. ET. We are standing by. In the meantime, don’t miss Mile’s O’Brien’s report on Orion from last night’s PBS NewsHour:

NASA’s Orion Test Launch

NASA is preparing to launch the Orion spacecraft on its first test flight Thursday morning at 7:05am EST, with a 2 hour, 39 minute launch window.

Barring any delays, the unmanned Orion will orbit the Earth twice in four and a half hours, rising to a height of 3,600 miles above the Earth. Then it will drop back through the Earth’s atmosphere at 20,000 miles per hour.

At that speed, Orion will heat up to 4,000 degrees Fahrenheit. Orion’s 11 parachutes will open, slowing the spacecraft’s plummet to 20 miles an hour when it lands in the Pacific ocean 600 miles southwest of San Diego.

Orion is NASA’s latest step to taking astronauts beyond the moon. Apart from testing the capsule’s ability to handle launch and reentry, this unmanned flight will test the capsule’s shielding in the Van Allen Belt, a bubble of radiation surrounding the Earth. No manned space mission has crossed the Van Allen Belt since the Apollo missions of the 1960s and 1970s. If astronauts hope to reach asteroids, or even Mars, they will undergo more radiation than ever before.

It’s also an opportunity to test Orion’s state-of-the-art computer, which can handle 480 million instructions per second — 25 times faster than the International Space Station’s computer.

NASA hopes to use Orion to send astronauts to an asteroid to gather samples in 2021. That mission will clear the way for a manned mission to Mars.

Broadcast live streaming video on Ustream


Posted by Red Pill Reports in Science & Technology