How to make the US Post Office prosperous and relevant in the 21 century using the One-Time Pad algorithm!

Every Tuesday I meet with a group of Patriots from the Illumination Society at the Liberty Restaurant in Rochester NY to do a round table radio broadcast discussing topics about Geo politics, religion, Currant events and anything that has to do with Truth Liberty and Justice for all.  We not only talk about problems but as a group we also work on finding solutions to the world problems.  every week we have some of the brightest minds join us at the round table live Broadcast. http://www.blogtalkradio.com/anti-illuminati-party

The Illumination Society  presents a FREE Movie Night every month showing films that we feel are important for the time in which we live. Films that dig deep into subjects like – The World History – UFO – The New World Order – Spirituality – Prophecy – Science – What’s Happening To Our Food – Agenda 21 – Vaccines and many other subjects.

Our Free Movie Night has been well received by people from all walks of life. People concerned with the things happening in our world today. People that want to know what is happening all around us and what we can do to stand against those that wish to rob us of our freedoms and our God-given rights. Come out and learn about subjects you may or may not be aware of. We hope that our Movie Nights, and our following Q&A time will shed some light on these subjects, and help you to see America’s role in past, present and future history.

We will be presenting the following films on the following dates:
– See more at: https://www.eventbrite.com/e/movie-night-tickets-12609803261

You can also join us in our round table discussion and suggest topics you would like us to discus.

Anti New World Order Party ☼ Global Group

https://www.facebook.com/groups/AntiNewWorldOrderPartyGlobal/

Now to the main point of this blog post today,  We will also have a follow-up to this post.

Original posted on FutureBeacon.com

 

Communication Privacy
by
James Adrian

Introduction

      Many individuals, businesses and other organizations have a legitimate and lawful need to keep some of their information confidential or even absolutely secret from competitors, the press and others. Because email has become vital to timely communication and because email is not secure, encryption is often necessary.

      New employees of large companies are often encouraged to live near the company’s offices. In this kind of setting, privacy for technical and marketing information is convenient. Small organizations such as law offices, medical clinics, Internet businesses, and many others may not find the expertise they need in their local area. These small organizations, of which there are many, need secure communication to avoid the cost of face-to-face meetings. Lacking the funds for routine flights between cities, these organizations are very dependent on the electronic communication of data and ideas. Private medical information, schematic drawings, program source code, marketing plans, and innumerable other types of documents are involved. In such circumstances, strong encryption is needed.

      In many countries, the post office has the legal authority and obligation to enforce privacy for the postal mail. If these postal services were to offer secure email for a reasonable price, small companies would not be at such a disadvantage relative to larger companies.

      Established by the U. S. Constitution, Article I, Section 8, Clause 7, the United States Postal Service is authorized “To establish post offices and post roads. It also has a long history of adding services as needed, such as commemorative stamps, rural delivery, airmail, one-day delivery, zip codes, self-adhesive stamps, public Internet site, “Forever” stamps, and an iPhone app. Secure communication would add to its revenue (which would help ameliorate its recent shortfalls) and set a good example.

Technical Matters

      To create a secure message, the encryption algorithm must used secret information that cannot be discovered by unauthorized parties. If the encryption relies only on complexity or computational difficulty without involving secret information, the intended message can be discovered by third parties. To third parties, some aspect of the transmission must be unknowable.

      Within encryption technology, the embodiment of information unknowable to third parties often takes the form of secret random numbers. These random numbers are used to encrypt messages in such a way as to make decryption of a message impossible without access to those same random numbers.

      Many have said that what one person can encrypt, another can decrypt. This is a myth. TheOne-Time Pad algorithm was proved to be absolutely secure in the writings of Claude Shannon. See “Claude Elwood Shannon – Collected Papers” edited by N. J. A. Sloane and Aaron D. Wyner. In addition to being immune from hacking, this algorithm becomes more convenient as memory devices increase their capacity.

      Claude Shannon proved that any absolutely secure encryption algorithm must posses these characteristics:

      1. The encryption keys must be random numbers of uniform distribution.

      2. The keys must be shared in absolute secrecy by the sender and receiver.

      3. Any key encrypting a message must be as at least as long as that message.

      4. Any key used to encrypt a message must not be reused.

      The one-time pad is a famous encryption algorithm having all of these characteristics. By using a random key comprised of random numbers to encrypt a message (the plain text) with the XOR logical operation, the transmitted result (the ciphertext) is rendered as random as the key. The collection of secret keys is called the pad. Keys are of the same length as that of the messages they encrypt. They are erased immediately after their use. The result is that the actual message is as likely as any other message from the point of view of those attempting to decrypt the message without knowing the secret random numbers.

      Optionally, encrypted messages can be made to appear to be ordinary messages of a different type, such as pictures or sound files or text messages that contain information that is very different form that in the plain text. This process is called Steganography.

Services

      The most important service facilitating secure communication is the shipping of media containing random numbers. The production of truly random numbers for algorithms that encrypt messages by means of random keys is the part of the process most challenging and inconvenient for the customer. The principle service of USPS would be to place random numbers on appropriate media and ship copies to addresses designated by the customer. One shipment might serve the customer for only a few messages or for years worth of messages, depending on the number of random numbers shipped.

      Options may include picking up shipments from the local post office, receiving them in the mailbox, or receiving them at the recipient’s door (possibly by special delivery or with a return receipt).

Criminality

      Measures which distinguish legitimate from nefarious use of encryption services need not be publicly discussed.

Contact

      Please feel free to make suggestions by writing to jim@futurebeacon.com.

Karen Hudes Warns the World On the brink of a Currency War and at the edge of World War 3

Karen Hudes

https://www.facebook.com/karen.hudes.9

Biography:

Karen Hudes studied law at Yale Law School and economics at the University of Amsterdam. She worked in the US Export Import Bank of the US from 1980-1985 and in the Legal Department of the World Bank from 1986-2007. She established the Non Governmental Organization Committee of the International Law Section of the American Bar Association and the Committee on Multilateralism and the Accountability of International Organizations of the American Branch of the International Law Association.

In 2007 Karen warned the US Treasury Department and US Congress that the US would lose its right to appoint the President of the World Bank if the current American President of the World Bank did not play by the rules. The 66 year old Gentlemen’s Agreement that Europe would appoint the Managing Director of the IMF and US would appoint the World Bank President ended in 2010.

Bank Corruption

Date: 05-25-13
Host: John B. Wells
Guests: Karen Hudes

Joining John B. Wells, former World Bank attorney and whistleblower Karen Hudestalked about how she uncovered corruption in the World Bank.

Who is Karen Hudes?

Karen Hudes studied law at Yale Law School and economics at the University of Amsterdam. She worked in the US Export Import Bank of the US from 1980-1985 and in the Legal Department of the World Bank from 1986-2007. She established the Non Governmental Organization Committee of the International Law Section of the American Bar Association and the Committee on Multilateralism and the Accountability of International Organizations of the American Branch of the International Law Association.

What did Karen Hudes blow the whistle on?

In 2007 Karen warned the US Treasury Department and US Congress that the US would lose its right to appoint the President of the World Bank if the current American President of the World Bank did not play by the rules. The 66 year old Gentlemen’s Agreement that Europe would appoint the Managing Director of the IMF and US would appoint the World Bank President ended in 2010http://www.imf.org/external/np/cm/2010/042510.htm

In 1999 Karen reported the corrupt take-over of the second largest bank in the Philippines. Lucio Tan, a crony of Joseph Estrada, then President of the Philippines, acquired stock owned by government employees in Philippines National Bank (“PNB”) valued more than 10% of PNB’s outstanding capital without disclosure, as required by Philippines securities laws. Tan owned Philippines Airlines, in default on its loans from PNB. The government of the Philippines loaned $493 million to PNB after PNB’s depositors made heavy withdrawals. $200 million of a loan from the World Bank and a $200 million loan from Japan were cancelled. Estrada was ultimately impeached, and in 2007 an anti-corruption court in the Philippines required Estrada to refund graft he had plundered. The Bank’s Country Director in the Philippines reassigned Karen when she asked him to sign a letter warning the Philippines’ government that the Bank could not disburse its loan without a waiver from the Board of Executive Directors since the loan conditionality was not met. The World Bank’s Internal Audit Department refused to correct the satisfactory evaluation of the Bank’s supervision performance or the flawed report of the Institutional Integrity Department to the Audit Committee of the Board of Executive Directors. When the Audit Committee requested an audit of internal controls over financial reporting, KPMG, the external auditors, circumscribed the scope of their audit in violation of Generally Accepted Accounting Principles and Generally Accepted Auditing Standards.

Two days after informing the Board’s Audit Committee of the cover-up in the Philippines, Karen was reprimanded and placed on probation. The Dutch Ministry of Foreign Affairs requested the World Bank’s Audit Committee to look into the cover- up. Instead, the Chair of the World Bank’s Audit Committee requested an inquiry into the World Bank’s Institutional Integrity Department. The Senate Committee on Foreign Relations followed up with three letters to the World Bank. The World Bank forged documents and fired Karen in contempt of Congress. The World Bank also fired the Staff Association’s lawyer. The Staff Association stated that what had happened to Karen had damaged staff morale and prevented others from reporting misconduct. The World Bank’s Ethics’ Officer left in frustration after her request for an investigation by the World Bank’s Institutional Integrity Department was turned down.

Mr. Paul Volcker headed the 2007 inquiry into the Institutional Integrity Department. The Volcker Panel was discredited after sixteen staff employed in the Institutional Integrity Department received significant damage awards in compensation for abuses of authority to intimidate them during the Volker Panel investigation. A staff-member of the EU’s anti-fraud agency, Office Lutte Anti-Fraude, on the Volcker Panel wrote to Karen:
“My Director General and I met with a number of European Executive Directors of the World Bank a few weeks ago to discuss the Volcker Panel report. At the meeting there was also discussion about governance issues. My impression was that the European Executive Directors are well apprised of all relevant issues at the Bank and no further comment by OLAF is warranted even if it was within our legal competence.”

Karen informed Senator Bayh, “[t]he ongoing cover-up is an indictment of the probity of US oversight at the Bank and I would encourage the Senate to request GAO to look into it.” Senators Richard Lugar, Evan Bayh and Patrick Leahy requested GAO to investigate “internal resistance to increased transparency and accountability at the World Bank.” http://citizenoversight.com/pdf/blwb.pdf In 2008 Karen’s Congressman, Representative Chris Van Hollen, noted “that [Karen’s] claims and concerns have already been provided to the GAO…. and to the relevant congressional committees.” In 2009 GAO stated that it could not commence the inquiry “because of challenges we recently faced in gaining access to World Bank officials.” Senator Lugar asked what was delaying the GAO review during hearings on the World Bank’s capital increase.

Mr. Pieter Stek, then Executive Director for the Netherlands, and Chair of the Board Committee on Development Effectiveness, said:
“In a multilateral institution which should be governed by the rule of law and high standards of probity the charge of concealment from the Board of Executive Directors of information relevant to the exercise of its duty of supervising management and the persecution of the person who brings this to light is extremely serious. If correct, which I believe, this poisonous cocktail undermines good governance and ultimately the effectiveness of the Bank in fulfilling its mandate. I shall continue to assist Ms. Hudes in her efforts to have due process brought to bear, preferably by the Bank itself, on these issues of governance.”

David Brooks wrote:
“Then there are violations, when someone intentionally breaks the rules. Errors can be very hard for outsiders to detect. It was people inside the companies who were most likely to report fraud, because they have local knowledge. And yet 80 percent of these whistleblowers regret having reported the crimes because of the negative consequences they suffered. This is not the way to treat people who detect error.” http://brooks.blogs.nytimes.com/2011/06/13/living-with-mistakes/?comments#permid=34

Appeal

United States Court of Appeals

FOR THE DISTRICT OF COLUMBIA CIRCUIT

  • KAREN HUDES,
  • Appellant,
  • v.
  • AETNA LIFE INSURANCE COMPANY,
  • INTERNATIONAL BANK FOR
  • RECONSTRUCTION AND
  • DEVELOPMENT,
  • KPMG LLP,
  • AND
  • MARK E. SCHREIBER,
  • Appellees
No. 11-7109

GENERAL DOCKET FOR CASE #: 11-7109

11/14/2011 View Details Motion filed by International Bank for Reconstruction and Development for summary affirmance.
12/02/2011 View Details
Exhibits
Response in Opposition filed by Karen Hudes
12/12/2011 View Details Reply filed by International Bank for Reconstruction and
Development to response
3/8/2012 View Details Per Curiam Order filed denying motion for summary affirmance
3/9/2012 View Details Clerk’s Order filed directing party to file briefing format
4/23/2012 View Details Motion filed by Karen Hudes to extend time to file response to court order.
5/2/2012 View Details Motion filed by Karen Hudes to extend time to file response
7/9/2012 View Details Court’s 6/15/2012 offer of mediation turned down by IBRD, KPMG, Aetna and Schreiber.
8/06/2012 View Details
Exhibits
Karen Hudes’ Opening Brief
9/05/2012 View Details Brief filed by International Bank for Reconstruction and Development
9/05/2012 View Details Brief filed by KPMG
9/05/2012 View Details Brief filed by Aetna
9/05/2012 View Details Brief filed by Schreiber
7/9/2012 View Details Court’s Order Scheduling Oral Argument for November 6, 2012
9/19/2012 View Details Karen Hudes’ Reply Brief
11/2/2012 View Details Court Order Cancelling Oral Arguments
11/20/2012 View Details Unpublished Opinion Affirming District Court
1/19/2012 View Details Request to Judicial Conference to correct court records

IN THE US DISTRICT COURT
DISTRICT OF COLUMBIA

  • Karen Hudes
  • 5203 Falmouth Road
  • Bethesda, MD 20816,
  • Plaintiff,
  • vs.
  • Aetna Life Insurance Company
  • 151 Farmington Avenue
  • Hartford, CT 06156,
  • Mark E. Schreiber
  • Edwards Angell Palmer & Dodge
  • 111 Huntington Avenue
  • Boston, MA 02199-7613,
  • International Bank for Recon-
  • struction and Development,
  • 1818 H Street, N.W.
  • Washington, DC 20433,
  • KPMG LLP,
  • c/o The Corporation Trust Company
  • 1209 Orange Street
  • Wilmington, DE 19801,
  • and
  • John and Jane Does 1-99,
  • Defendants.
Civil No.: 10-1444 JEB

CIVIL DOCKET FOR CASE #: 1:10-cv-01444-JEB

04/13/2010 View Details
Exhibits
RESPONSE to Motion re 15 MOTION to Dismiss for Lack of Jurisdiction filed by Karen Hudes. Replies due by 04/30/2010. (elts, Deputy Clerk) [Transferred from Maryland on 8/26/2010.] (Entered: 04/30/2010)
10/15/2010 View Details AMENDED COMPLAINT against AETNA LIFE INSURANCE CO., INTERNATIONAL BANK FOR RECONSTRUCTION AND DEVELOPMENT, MARK E. SCHREIBER, KPMG LLP filed by KAREN HUDES.(rdj) (Entered: 10/19/2010)
01/17/2011 View Details Memorandum in opposition to re 58 MOTION to Dismiss and Sever MOTION to Sever MOTION for Hearing, 57 MOTION to Dismiss Second Amended Complaint, 59 MOTION to DismissPlaintiffs Second Amended Complaint, 54 MOTION to Dismiss Plaintiff’s Second Amended Complaint filed by KAREN HUDES. (Attachments: # 1 Memorandum in Support, # 2 Exhibit)(Hudes, Karen) (Entered: 01/17/2011)
08/30/2011 View Details ORDER granting 54 Aetna Life Ins. Co.’s Motion to Dismiss; granting 57 Mark Schreiber’s Motion to Dismiss; granting 58 KPMG’s Motion to Dismiss; granting 59 IBRD’s Motion to Dismiss. The Court ORDERS that: (1) Defendants’ Motions to Dismiss are GRANTED WITH PREJUDICE as to all federal claims against all Defendants, and as to Plaintiff’s wrongful-termination claim against the World Bank; and (2) Defendants’ Motions to Dismiss are GRANTED WITHOUT PREJUDICE as to all other Maryland and state common-law claims. Signed by Judge James E. Boasberg on 8/30/2011. (lcjeb1) (Entered: 08/30/2011) Hudes v. Aetna Life Ins. Co., et al, 806 F. Supp 2d 180

Cell Phones WiIl Hurt you! (Everywhere) Privacy you no longer have!

English: Mobile phone evolution Русский: Эволю...
English: Mobile phone evolution Русский: Эволюция мобильных телефонов (Photo credit: Wikipedia)

 

After reviewing just the basic programs that you need to operate a smart phone…when you go to applications, for example and look at google mail..it states they have right to go into your mail, look at your documents and alter (even if it is confidential) , change your contacts or even delete contacts, have access to your text message and pictures, they can even use your text and phone to call and send messages. So with that said…they have access to your mail by default because you have to use that program on your phone to be activated for most functions on your phone to work properly.
If you go through all the programs you have on your phone before adding more apps, they all say pretty much the same thing. But look at the big picture…where are these phone made (China, Japan, Korea)! Government employees are using these phones just as much as anyone else..what can be worse then countries that are making these phones have access to sensitive material including personal information that can be of use in sensitive ways including…where they are, their pictures, their contacts and their email documents.
Now your family members are adding app after app with location settings needing to be active on the devices for them to be of service. With that said there is apps and even programs that someone can see all cell phones in that area so a possible predator can single out possible victims. What about some family members who take pictures of their drivers license, SSN and other highly personal information for identity theft to be easy..not alone..logging into bank accounts..in which you are allowing the manufacture to have access to with your passwords and all. Also think about this, these apps also are being allowed to turn on your video camand recorder on your cell at any given time to listen and look at your surroundings. They do not have to inform you when they do, what they alter or delete or whom they give your information to. Also keep in mind that a lot of the apps are created by criminals that are making it legal to commit crimes against you by just getting their free app.So the matter of this news story, if we buy these cell phones from a company ..just say Sprint, shouldn’t they be liability for use licensing with the apps for the purpose of the basic operation of the phone and not carried over to us making ourselves liable for any misuse of our privacy in which will will not know? Should the consumer buying the cell phone have licensing right to know when an invasion by the app provider went into the phone and made changes?

For another quick check of what your allowing your cell phone maker to do to you…go to settings, then look at what system your phone uses..Android system for example, click that and read of the privacy you no longer have!

Let me not to forget to mention the negative heath effects Cell phones can have on your body because of the radiation-emitting  device inside of cell phones that allow it to transmit the communication signals

By Dr. Mercola

If you’re an avid cell phone user who refuses to believe that holding this radiation-emitting device next to your head poses a potential health risk, take note…

Italy‘s supreme court has ruled that a man’s brain tumor is, in fact, linked to his heavy cell phone use.

Heavy Cell Phone Use Caused Business Exec’s Tumor

The court’s assessment included studies by Professor Lennart Hardell of Sweden, stating they had more cases, involved long-term use and were independent (as opposed to Interphone’s industry funding). Hardell has found that those who begin using cell phones heavily as teenagers have 4 to 5 times more brain cancer as young adults!

Just 50 Minutes of Cell Phone Use Alters Your Brain

Even if you don’t use a cell phone for hours each day, research by leading brain imaging researcher Nora D. Volkow, MD of the National Institutes of Health, revealed that after just 50 minutes of cell phone exposure, the emitted radiation increases brain cell activity in the region closest to the cell phone antenna.1 The exact health effects of that increased brain activity are as of yet unknown, but the study effectively debunked the myth in U.S. government research circles that cell phone radiation at non-thermal levels is incapable of causing biological change.

So keep using your cell phone if you don’t give a crap about your health and the Antichrist NWO Global Government spying on you.  And when your sitting in a NDDA Death Camp don’t call me to get you out and fix your brain. I tried to tell you but you didn’t listen you brainwashed boot licking Zombie’s

http://www.foodconsumer.org/newsite/Non-food/Environment/cell_phone_tumor_court_ruling_1107120716.html

Your Next Flu Vaccine could be your last! Disguised bioweapon? All we need is the right major crisis, and the nations will accept the New World Order.”

Joseph Moshe (MOSSAD Microbiologist): “Swine flu vaccine is bioweapon”
Joseph Moshe (MOSSAD Microbiologist): “Swine flu vaccine is bioweapon”

Sponsored by the Derma roller

Today, the MSM are not talking about this case any more. Yesterday, they wanted us to believe that Joseph Moshe was a nutcase and a terrorist, arrested for threatening to bomb the White House. Interesting detail about his arrest (the “Westwood standoff”) was that he seemed to be immune to the 5 cans of tear gas and 5 gallons of law-enforcement grade pepper spray they pumped into his face. He very calmly remained in his car, as the video footage of his arrest shows.

Professor Moshe had called into a live radio show by Dr. A. True Ott, (explanation of Joseph Moshe’s call at 06:00) broadcast on Republic Broadcasting claiming to be a microbiologist who wanted to supply evidence to a States Attorney regarding tainted H1N1 Swine flu vaccines being produced by Baxter BioPharma Solutions. He said that Baxter’s Ukrainian lab was in fact producing a bioweapon disguised as a vaccine. He claimed that the vaccine contained an adjuvant (additive) designed to weaken the immune system, and replicated RNA from the virus responsible for the 1918 pandemic Spanish flu, causing global sickness and mass death.

Sources tell us that Bar-Joseph Moshe made no threat against the President or the White House. He did not mention any bomb or attack. He then proceeded to inform the White House he intended to go public with this information. When he noticed men in suits in front of his house and feared that the FBI was about to detain him, he packed some belongings into his car and, him being a dual Israeli citizen, tried to reach the Israeli consulate located in close proximity to the federal building where the standoff took place. The FBI and the bomb squad prevented him from reaching it. Who is this man? His profile on biomedexperts.com says he is a plant disease expert with many publications on his name involving the genetic manipulation of virii. Photographic evidence that Moshe is who he says he is can be found here.

Joseph Moshe was soon after his arrest sent or let go to Israel. Nothing has been heard from him since. The Secret Service was not the agency involved in the surveillance of Moshe at his home in California. This was done by the FBI, who had orders to detain or arrest him. Mounted on top of a large black vehicle used in his arrest was a microwave weapon that possibly damaged the electronics in Moshe’s car as well as any communication devices he had which might have been used to contact the media or others who could help him.

Moshe did not suffer the same effects of the gas and pepper spray that others would have because he had built up an immunity to such weapons as a by-product of his Mossad training. Moshe was not handcuffed because he was not placed under arrest.

Does this sound like an insane conspiracy theory? Sure it does. Due to the scarcity and anonimity of the sources we would dismiss it as exactly that, if it weren’t for some uncomfortable facts: Baxter Pharmaceutical has been caught, red-handed, in spreading a live, genetically engineered H5N1 Bird flu vaccine as a lethal biological weapon all over the world, destined to be used for human vaccinations. This happened just a few months ago. And only luck prevented a global catastrophe of epic proportions.

Baxter International Inc. had mixed live, genetically engineered avian flue viruses in vaccine material shipped to 18 countries. Only by sheer luck, a Czech laboratory decided to test the vaccine on a dozen ferrets, which all died in days. The World Health Organization was notified and catastrophe was averted. This was clearly a deliberate act on Baxter’s part, because they adhere to BS3, bio-safety level three. Baxter admitted a “mistake”. Such monumental screwups are totally impossible at that level. Many safety systems would have needed to be sabotaged, many key personell would have needed to be bribed. It simply can’t be done without direction from the inside. They did not send out the wrong vial – they produced dozens of gallons of biological-weapon agent (genetically engineered live H5N1 / Bird flu virus), then sent it out as a “vaccine”.

Baxter knew full well that their vaccine was lethal, because the year before they had tested it on a few hundred homeless Polish people – dozens died as a result.

Where’s the meat? Well – Baxter is now being sued for the deliberate, repeated contamination of vaccines with biological weapons designed – by them – to mass-murder people. Here is the complaint (PDF). By some kook nutcase? Not likely – Jane Burgermeister is an experienced, respected journalist. She is not the only one suing Baxter for planning and executing a plan for global genocide: Others are filing complaints as well. Read a well-researched complaint here (PDF).

Qui bono? We think it may be profit-motivated or even sheer incompetence, but for the conspiracy-minded: The latter complaint alludes to intentional “culling of the herd”. Have you heard of the Georgia Guidestones? An enormous monument loaded with Masonic symbolism costing millions of dollars, it has been erected by unknown, powerful elites (multimillionaires with the clout to erect monuments wherever they please, obviously) around 30 years ago. It gives an “alternative ten commandments”, of which the first is the extermination of six and a half billion people from the face of the Earth. Half a billion will remain. This is the number of people the planet can sustain indefinitely, so that the descendents of the Rothschilds and Rockefellers can live in peace and affluence indefinitely. Slaves are needed to produce that luxury, but 500 million will do just fine. But how does one go about killing off most of the world?

“Vaccinating” the planet with a bioweapon with near-100% mortality would do the trick. Baxter would provide both the bioweapon as well as the vaccine against it to “civilized” Western peoples. Result: We can plunder Africa, we have no more competition from SE Asia, the oil is for our taking and only Western and perhaps Chinese sheeple remain.

Rockefeller said this in 1994 at a U.N. dinner: “We are on the verge of a global transformation. All we need is the right major crisis, and the nations will accept the New World Order.” PNAC said something similar right before 9/11.

A Spanish Doctor in Internal Medicine largely agrees with the above article:



We have the cure for nail fungus

The Peaceful Nuclear Explosions Treaty

Peaceful nuclear explosions
From Wikipedia, the free encyclopedia
Peaceful nuclear explosions (PNEs) are nuclear explosions conducted for non-military purposes, such as activities related to economic development including the creation of canals. During the 1960s and 1970s, both the United States and the Soviet Union conducted a number of PNEs.
Six of the explosions by the Soviet Union are considered to have been of an applied nature, not just tests.
Subsequently the United States and the Soviet Union halted their programs. Definitions and limits are covered in the Peaceful Nuclear Explosions Treaty of 1976. The Comprehensive Nuclear-Test-Ban Treaty of 1996 prohibits all nuclear explosions, regardless of whether they are for peaceful purposes or not.
Contents [hide]
1 The Peaceful Nuclear Explosions Treaty
2 United States: Operation Plowshare
3 Soviet Union: Nuclear Explosions for the National Economy
4 Other nations
5 Spaceflight Applications
6 See also
7 References
8 External links
[edit]The Peaceful Nuclear Explosions Treaty

In the PNE Treaty the signatories agreed: not to carry out any individual nuclear explosions having a yield exceeding 150 kilotons; not to carry out any group explosion (consisting of a number of individual explosions) having an aggregate yield exceeding 1,500 kilotons; and not to carry out any group explosion having an aggregate yield exceeding 150 kilotons unless the individual explosions in the group could be identified and measured by agreed verification procedures. The parties also reaffirmed their obligations to comply fully with the Limited Test Ban Treaty of 1963.
The parties reserve the right to carry out nuclear explosions for peaceful purposes in the territory of another country if requested to do so, but only in full compliance with the yield limitations and other provisions of the PNE Treaty and in accord with the Non-Proliferation Treaty.
Articles IV and V of the PNE Treaty set forth the agreed verification arrangements. In addition to the use of national technical means, the Treaty states that information and access to sites of explosions will be provided by each side, and includes a commitment not to interfere with verification means and procedures.
The protocol to the PNE Treaty sets forth the specific agreed arrangements for ensuring that no weapon-related benefits precluded by the Threshold Test Ban Treaty are derived by carrying out a nuclear explosion used for peaceful purposes, including provisions for use of the hydrodynamic yield measurement method, seismic monitoring and on-site inspection.
The agreed statement that accompanies the Treaty specifies that a “peaceful application” of an underground nuclear explosion would not include the developmental testing of any nuclear explosive.
[edit]United States: Operation Plowshare

One of the Chariot schemes involved chaining five thermonuclear devices to create the artificial harbor.
Operation Plowshare was the name of the U.S. program for the development of techniques to use nuclear explosives for peaceful purposes. The name was coined in 1961, taken from Micah 4:3 (“And he shall judge among the nations, and shall rebuke many people: and they shall beat their swords into plowshares, and their spears into pruning hooks: nation shall not lift up sword against nation, neither shall they learn war any more”). Twenty-eight nuclear blasts were detonated between 1961 and 1973.
One of the first U.S. proposals for peaceful nuclear explosions that came close to being carried out was Project Chariot, which would have used several hydrogen bombs to create an artificial harbor at Cape Thompson, Alaska. It was never carried out due to concerns for the native populations and the fact that there was little potential use for the harbor to justify its risk and expense. There was also talk of using nuclear explosions to excavate a second Panama Canal.[1]
The largest excavation experiment took place in 1962 at the Department of Energy’s Nevada Test Site. The Sedan nuclear test carried out as part of Operation Storax displaced 12 million tons of earth, creating the largest man-made crater in the world, generating a large nuclear fallout over Nevada and Utah. Three tests were conducted in order to stimulate natural gas production, but the effort was abandoned as impractical because of cost and radioactive contamination of the gas.[2][3]
There were many negative impacts from Project Plowshare’s 27 nuclear explosions. For example, the Gasbuggy site,[3] located 55 miles east of Farmington, New Mexico, still contains nuclear contamination from a single subsurface blast in 1967.[4] Other consequences included blighted land, relocated communities, tritium-contaminated water, radioactivity, and fallout from debris being hurled high into the atmosphere. These were ignored and downplayed until the program was terminated in 1977, due in large part to public opposition, after $770 million had been spent on the project.[5]
[edit]Soviet Union: Nuclear Explosions for the National Economy

The Soviet Union conducted a much more vigorous program of 239 nuclear tests, some with multiple devices, between 1965 and 1988 under the auspices of Program No. 6 and Program No. 7-Nuclear Explosions for the National Economy. Its aims and results were similar to those of the American effort, with the exception that many of the blasts were considered applications, not tests.[6] The best known of these in the West was the Chagan test in January 1965 as radioactivity from the Chagan test was detected over Japan by both the U.S. and Japan. The United States complained to the Soviets, but the matter was dropped.
In the 1970, the Soviet Union started the “Deep Seismic Sounding” Program, that included the use of peaceful nuclear explosions to create seismic deep profiles. Compared to the usage of conventional explosives or mechanical methods, nuclear explosions allow the collection of longer seismic profiles (up to several thousand kilometers).[7]
There are proponents for continuing the PNE programs in modern Russia. They (e.g. A. Koldobsky) state that the program already paid for itself and saved the USSR billions of rubles and can save even more if continued. They also allege that the PNE is the only feasible way to put out large fountains and fires on natural gas deposits and the safest and most economically viable way to destroy chemical weapons.
Their opponents (include the academician A.V. Yablokov) [8] state that all PNE technologies have non-nuclear alternatives and that many PNEs actually caused nuclear disasters.
Reports on the successful Soviet use of nuclear explosions in extinguishing out-of-control gas well fires were widely cited in United States policy discussions of options for stopping the Deepwater Horizon oil spill.[9][10]
[edit]Other nations

This unreferenced section requires citations to ensure verifiability.
Germany at one time considered manufacturing nuclear explosives for civil engineering purposes. In the early 1970s a feasibility study was conducted for a project to build a canal from the Mediterranean Sea to the Qattara Depression in the Western Desert of Egypt using nuclear demolition. This project proposed to use 213 devices, with yields of 1 to 1.5 megatons detonated at depths of 100 to 500 m, to build this canal for the purpose of producing hydroelectric power.
The Smiling Buddha, India’s first explosive nuclear device was described by the Indian Government as a peaceful nuclear explosion.
In Australia proposed blasting was put forward as a way of mining Iron Ore in the Pilbara [11]
[edit]Spaceflight Applications

Nuclear explosions have been studied as a possible method of spacecraft propulsion. The most well known example was Project Orion, which studied the possibility of a spacecraft propelled by the detonation of nuclear devices which it released behind itself.
Another application would be for deflecting or destroying celestial objects like comets, meteors, or asteroids on a collision course with Earth that have the potential for causing destruction.
[edit]See also

Project Gnome
[edit]References

^ “US Congressional Record pg. 25747, 1968-09-05”. Retrieved 2012-01-22.
^ U.S. Department of Energy, Office of Legacy Management: Rulison, Colorado, Site. Fact Sheet [1].
^ a b Peter Metzger (February 22, 1970). Project Gasbuggy And Catch-85*: *That’s krypton-85, one of the radioactive by-products of nuclear explosions that release natural gas Project Gasbuggy and Catch-85 “It’s 95 per cent safe? We worry about the other 5”. New York Times. p. SM14.
^ “DOE Environmental Management (EM) – Gas Buggy Site”. Em.doe.gov. Retrieved 2010-09-19.
^ Benjamin K. Sovacool (2011). Contesting the Future of Nuclear Power: A Critical Global Assessment of Atomic Energy, World Scientific, pp. 171-172.
^ Nordyke, M. D. (2000-09-01). The Soviet Program for Peaceful Uses of Nuclear Explosions. Lawrence Livermore National Laboratory. pp. 34–35. DOI:10.2172/793554. Report no.: UCRL-ID-124410 Rev 2. U. S. Department of Energy contract no.: W-7405-Eng48.
^ University of Wyoming: http://w3.uwyo.edu/~seismic/dss/
^ “А. В. ЯБЛОКОВ, “ЯДЕРНАЯ МИФОЛОГИЯ КОНЦА XX ВЕКА””. Biometrica.tomsk.ru. Retrieved 2011-08-13.
^ Broad, William J. (2010-06-02). “Nuclear Option on Gulf Oil Spill? No Way, U.S. Says”. New York Times. Retrieved 2010-06-18.
^ Astrasheuskaya, Nastassia; Judah, Ben; Selyukh, Alina (2010-07-02). “Special Report: Should BP nuke its leaking well?”. Reuters. Retrieved 2010-07-08.
^ Nuclear blasting proposed for Pilbara Iron Ore Project in Industrial Reviews and Mining Year Book, 1970 pp.255-259
[edit]External links

Peaceful Nuclear Explosions Comprehensive Nuclear-Test-Ban Treaty Organization Preparatory Commission
Video of the 104Kt Sedan PNE as part of Operation Plowshare.
Video of the Soviet Chagan PNE
Video of the Soviet Taiga PNE
On the Soviet nuclear program
On the Soviet program for peaceful uses of nuclear weapons, American Office of Scientific and Technical Information
United States Nuclear Tests, July 1945 through September 1992 (DOE/NV-209 [Rev.14]).
ARMS CONTROL AGREEMENTS,Federation of American Scientists
World Reaction to the Indian Nuclear Tests, Center for Nonproliferation Studies
Nuclear Files.org Treaty between the USA and USSR on underground nuclear explosions for peaceful purposes
Peter Kuran’s “Atomic Journeys” – documentary film includes tests of Peaceful nuclear Explosions.
[hide] v t e
Nuclear technology
Science
Chemistry Engineering Physics Atomic nucleus Fission Fusion Radiation ionizing
Fuel
Deuterium Fertile material Fissile Helium-3 Isotope separation Plutonium Thorium Tritium Uranium enriched depleted
Neutron
Activation Capture Cross-section Fast Fusion Generator Poison Radiation Reflector Temp Thermal
Reactors
Fission
reactors
by
primary
moderator
Water
Aqueous homogeneous reactor Boiling BWR ABWR Heavy CANDU PHWR SGHWR
Natural (NFR) Pressurized PWR VVER EPR Supercritical (SCWR)
Graphite
by coolant
Water
RBMK
Gas
Advanced gas-cooled (AGR) Magnox Pebble bed (PBMR)
UHTREX UNGG reactor Very high temperature (VHTR)
Molten Salt
FLiBe
Fuji MSR Liquid fluoride thorium reactor (LFTR)
Molten-Salt Reactor Experiment (MSRE)
Hydrocarbon
Organically moderated and cooled reactor
BeO
Aircraft Reactor Experiment (ARE)
None
(Fast)
Breeder (FBR) Integral (IFR) Liquid-metal-cooled (LMFR) SSTAR Traveling Wave (TWR)
Generation IV by coolant Gas (GFR) Lead (LFR) Sodium (SFR)
Fusion
reactors
by
confinement
Magnetic
Field-reversed configuration Levitated dipole Reversed field pinch Spheromak Stellarator Tokamak
Inertial
Bubble fusion (acoustic) Fusor electrostatic Laser-driven Magnetized target Z-pinch
Other
Dense plasma focus Migma Muon-catalyzed Polywell Pyroelectric
List of nuclear reactors
Power
Nuclear power plant By country Economics Fusion Isotope thermoelectric (RTG) Propulsion rocket Safety
Medicine
Imaging
by
radiation
Gamma camera
Scintigraphy Positron emission (PET) Single photon emission (SPECT)
X-ray
Projectional radiography Computed tomography
Therapy
Boron neutron capture (BNCT) Brachytherapy Proton Radiation Tomotherapy
Weapon
Topics
Arms race Delivery Design Explosion effects History Proliferation Testing underground Warfare Yield TNTe
Lists
Popular culture States Tests Treaties Weapon-free zones Weapons
Waste
Products
Actinide: (Reprocessed uranium Reactor-grade plutonium Minor actinide) Activation Fission LLFP
Disposal
Fuel cycle HLW LLW Repository Reprocessing Spent fuel pool cask Transmutation
Debate
Nuclear power debate Nuclear weapons debate Anti-nuclear movement Uranium mining debate Nuclear power phase-out

Create a website or blog at WordPress.com

Up ↑