Breaking news - www.breakingnews.com

0 Geoengineering may lead to whiter sky


One idea for fighting global warming is to increase the amount of aerosols in the atmosphere, scattering incoming solar energy away from the Earth’s surface; scientists, however, theorize that this solar geoengineering could have a side effect of whitening the sky during the day

One idea for fighting global warming is to increase the amount of aerosols in the atmosphere, scattering incoming solar energy away from the Earth’s surface. Scientists, however, theorize that this solar geoengineering could have a side effect of whitening the sky during the day. New research from Carnegie’s Ben Kravitz and Ken Caldeira indicates that blocking 2 percent of the sun’s light would make the sky three-to-five times brighter, as well as whiter. Their work is published 1 June in Geophysical Research Letters, a journal of the American Geophysical Union.
A Carnegie Institution for Science release reports that carbon dioxide emissions from the burning of coal, oil, and gas have been increasing over the past decades, causing the Earth to get hotter and hotter. Large volcanic eruptions cool the planet by creating lots of small particles in the stratosphere, but the particles fall out within a couple of years, and the planet heats back up. The idea behind solar geoengineering is constantly to replenish a layer of small particles in the stratosphere, mimicking this volcanic aftermath and scattering sunlight back to space.
Using advanced models, Kravitz and Caldeira — along with Douglas MacMartin from the California Institute of Technology — examined changes to sky color and brightness from using sulfate-based aerosols in this way. They found that, depending on the size of the particles, the sky would whiten during the day and sunsets would have afterglows.
Their models predict that the sky would still be blue, but it would be a lighter shade than what most people are used to looking at now. The research team’s work shows that skies everywhere could look like those over urban areas in a world with this type of geoengineering taking place. In urban areas, the sky often looks hazy and white.
“These results give people one more thing to consider before deciding whether we really want to go down this road,” Kravitz said. “Although our study did not address the potential psychological impact of these changes to the sky, they are important to consider as well.”
There are several larger environmental implications to the group’s findings, too. Because plants grow more efficiently under diffuse light conditions such as this, global photosynthetic activity could increase, pulling more of the greenhouse gas carbon dioxide out of the atmosphere. On the other hand, the effectiveness of solar power could be diminished, as less sunlight would reach solar-power generators.
“I hope that we never get to the point where people feel the need to spray aerosols in the sky to offset rampant global warming,” Caldeira said. “This is one study where I am not eager to have our predictions proven right by a global stratospheric aerosol layer in the real world.”
— Read more in Ben Kravitz et al., “Geoengineering: Whiter skies?”Geophysical Research Letters 39 (1 June 2012) (doi:10.1029/2012GL051652)

0 US Troops in Iraq talk about Halliburton & KBR

This from a government that supposedly "Loves" their military




0 Lord Jacob Rothschild Confronted by We Are Change




This is one of the 12 videos you will see released on May 31st during our 12 hour Donation Drive broadcast at Bilderberg. Help WeAreChange reach our goal @ http://wearechange.org/donate watch live here http://ustream.tv/wearechange

For decades, a shadowy and secret elite organization called the Bilderberg Group has plotted policy together that subjugates humanity under the cover of darkness. On the first day of the Bilderberg Group meeting in Chantilly, VA on May 31st, from 10am to 10pm, Luke Rudkowski of WeAreChange will shine a much needed light on the group's members and media pundits that have kept details about the group hidden from the American public. Tune intohttp://www.ustream.tv/WeAreChange for a twelve hour donation drive being broadcast outside the Bilderberg conference to watch TWELVE never seen before confrontations released LIVE every hour. If you want to continue to hold these politicians accountable and make sure the elites continue to hear the voice of the people, donate to WeAreChange.org at http://www.WeAreChange.org/donate

WeAreChange's Schedule for the release of the 12 never before seen confrontation videos. We will release these videos while streaming live from Chantilly, VA, outside the Bilderberg meeting. Starts Thursday, May 31st at 10am. http://www.ustream.tv/WeAreChange

1. Tony Blair (10am) 
2. Lawrence O'Donnell (11am)
3. Alan Greenspan (12pm)
4. George Pataki (1pm)
5. Charlie Rose (2pm)
6. Ted Turner (3pm)
7. Henry Kissinger (4pm)
8. Jill Abramson (5pm)
9. Vernon Jordan (6pm)
10. Paul Wolfensohn (7pm)
11. Lou Dobbs and Paula Zahn (8pm)
12. Lord Jacob Rothschild (9pm)

0 E.P.A. Chemist Who Warned of Ground Zero Dust Is Reinstated

A senior Environmental Protection Agency chemist who argued that she was removed from her job in retaliation for accusing the agency of underestimating the toxicity of dust at ground zero has been reinstated with back pay by an administrative board.
Cate Jenkins



The federal Merit Systems Protection Board ruled late last week in Washington that the agency violated the due process rights of the chemist, Cate Jenkins, when she was fired in 2010 because she was not informed of all the charges against her.
The panel also found that an administrative judge who first heard the case did not give her an adequate opportunity to make her case that she was dismissed for acting as a whistle-blower.
Dr. Jenkins sued under the federal Whistle-Blower Protection Act, saying she was being punished for charging that the agency had relied on data that it knew mismeasured the pH levels of the dust released by the World Trade Center collapse in 2001.
The E.P.A. has said that Dr. Jenkins was fired for charges related to threatening a supervisor.
Dr. Jenkins had a history of disagreeing with her superiors on scientific matters at the agency and in 2009 underwent a two-day suspension for “discourteous, unprofessional and bullying” conduct toward colleagues.
The board did not decide if the E.P.A. fired Dr. Jenkins for her accusations. Instead, it said she was not given a full opportunity for a defense because she was not informed of a third charge used to justify her removal.
But Paula Dinerstein, a lawyer for Dr. Jenkins, said Tuesday that the ruling vindicated her client indirectly. “I think it shows to us that the agency was trying to get rid of her and silence her by making this allegation, and to go to the length of even a constitutional violation to get her out of there,” she said.
The E.P.A. is free to bring charges against the scientist again. It did not respond to requests for comment late Tuesday on how it planned to proceed.
Dr. Jenkins’s reinstatement was reported by The Guardian on Friday.
Recent scientific studies have found that the particles released by the towers’ collapse were more harmful to workers’ lungs than experts had believed.

They did not "underestimate" the toxicity, 
THEY LIED!
  

0 The Question?


0 Not Even A Drill: US, S.Korea speс-ops pester Pyongyang




It's a scandal likely to fuel the long-standing tensions between Washington and Pyongyang. A media report accuses US and South Korean special forces of parachuting into North Korea to spy on underground military facilities. The source was an American army general who admitted the missions had happened. It's been vehemently denied by Washington which now accuses the journalist behind the report of making up the quotes. Journalist Nile Bowie talks to RT. He says Washington strategy goes far beyond that. 


 Subscribe to RT! http://www.youtube.com/subscription_center?add_user=RussiaToday

0 Flame: Israel's New Contribution to the Middle East Cyberwar


The country that brought us Iranian nuclear assassinations, explosions at Iran missile bases, and Stuxnet, is at it again.  
flame computer map
Map of known infections from Flame
computer virus called Flame, is spreading among computers in the Middle East. according to an article by an expert at Kapersky Labs:
…We’ve found what might be the most sophisticated cyber weapon yet unleashed. The ‘Flame’ cyber espionage worm came to the attention of our experts at Kaspersky Lab after the UN’s International Telecommunication Union came to us for help in finding an unknown piece of malware which was deleting sensitive information across the Middle East. While searching for that code – nicknamed Wiper – we discovered a new malware codenamed Worm.Win32.Flame.
Flame shares many characteristics with notorious cyber weapons Duqu and Stuxnet: while its features are different, the geography and careful targeting of attacks coupled with the usage of specific software vulnerabilities seems to put it alongside those familiar ‘super-weapons’ currently deployed in the Middle East by unknown perpetrators. Flame can easily be described as one of the most complex threats ever discovered. It’s big and incredibly sophisticated. It pretty much redefines the notion of cyberwar and cyberespionage.…Flame is one of the most complex threats ever discovered.
Classical Zionism decrees that Israel should be a “light unto the nations.”  But Israeli cyberwarriors have taken the saying a bit too literally making Israel a “flame” unto the nations.  Such a contribution Israel is making to the advancement of western civilization.  It would make Herzl and Ahad HaAm proud.
My major scoop is that my senior Israeli source confirms that it is a product of Israeli cyberwarfare experts.  Most such products are produced by the IDF’s Unit 8200, though the Mossad also may take some role in such projects.  So add to all the previous marginally successful efforts this new one.  The goal is apparently to infiltrate the computers of individuals in Iran, Israel, Palestine and elsewhere who are engaged in activities that interest Israel’s secret police including military intelligence.  My source also tells me that this is the first known instance in which Israeli intelligence has used malware to intrude on Israeli citizens.  Within Israel and the Palestinian territories Flame is implemented by the Shin Bet.  The “beauty” of it for the secret police is that unlike “legal” eavesdropping on phones or computers, you don’t need to ask for judicial approval to infect a computer.  No Israeli police officer would ever investigate a case of an Israeli computer infected with Flame since it would lead to exposing Israeli security services.
Flame appears to be the third generation of Israeli malware after Stuxnet and Duqu, which were more specifically targeted at Iranian industrial facilities, specifically its centrifuge network.  It shares some capabilities with them and exploits similar vulnerabilities to gain access to targeted computers and systems (though it is 20 times larger in size).  There is also some indication of similar exploits used by Stuxnet and Flame used to access host computers, which indicate they may share common authorship or have been developed by two separate groups sharing data:
Flame is a sophisticated attack toolkit, which is a lot more complex than Duqu. It is a backdoor, a Trojan, and it has worm-like features, allowing it to replicate in a local network and on removable media if it is commanded so by its master…
Once a system is infected, Flame begins a complex set of operations, including sniffing the network traffic, taking screenshots, recording audio conversations, intercepting the keyboard, and so on. All this data is available to the operators through the link to Flame’s command-and-control servers.
Later, the operators can choose to upload further modules, which expand Flame’s functionality. There are about 20 modules in total and the purpose of most of them is still being investigated.
The “innovation” of Flame is that it not only can record audio, which is a relatively rare feature of worms, it can intrude into the host in multiple ways to steal and monitor information (including recording keystrokes and taking screenshots).  In this fashion it can capture IM conversations that might be otherwise encrypted.  It’s what they call in baseball a “triple threat.”  It also has lots of wifi features especially using Bluetooth which enable it to use the host to scan nearby electronic devices (possibly for vulnerabilities and access to them as well).
Unlike with Stuxnet, the creators of Flame obscured any possibly information that would identify when the original source was created.  This would make it more difficult to track the code to its source in any specific way.  Kapersky though considers the worm a creation that does not predate and says that its authors continue to refine it.
Unlike Stuxnet which was designed to sabotage Iran’s centrifuge network, Flame is not a single-focus malware:
…The creators of Flame are simply looking for any kind of intelligence – e-mails, documents, messages, discussions inside sensitive locations, pretty much everything. We have not seen any specific signs indicating a particular target such as the energy industry – making us believe it’s a complete attack toolkit designed for general cyber-espionage purposes.
However, Flame can do some of the things that Stuxnet did, so it could also be adapted for such specific uses in the event it found a convenient target.  Also, unlike Stuxnet which was designed to sabotage Iran’s nuclear program, the current worm targets individuals and organizations more than state entities:
There doesn’t seem to be any visible pattern re the kind of organizations targeted by Flame. Victims range from individuals to certain state-related organizations or educational institutions.
Flame uses at least 80 different servers and domain names to relay its data back home, so it is extremely difficult to track usage and where the information is transferred.
Kapersky notes that Flame may’ve been a companion project to Stuxnet and Duqu that was different enough from them that if the latter two were discovered, Flame could continue operating undetected:
…We believe Flame to be a parallel project, created as a fallback in case some other project is discovered.
Here is some further data on how Flame retrieves information and gleans what is useful to it from what is not:
Flame appears to be much, much more widespread than Duqu, with probably thousands of victims worldwide.  The targets are also of a much wider scope, including academia, private companies, specific individuals and so on.
According to our observations, the operators of Flame…infect several dozen, then conduct analysis of the data of the victim, uninstall Flame from the systems that aren’t interesting, leaving the most important ones in place. After which they start a new series of infections.
Like Stuxnet, Flame uses USB sticks as a method of infection and has two different ways it can accomplish this.  Once inside, it can take advantage of multiple vulnerabilities to gain access not just to individual computers but entire networks.
When asked why the package is so big, Kapersky responded:
Much of these [the size of Flame] are libraries designed to handle SSL traffic, SSH connections, sniffing, attack, interception of communications and so on.
The cybersecurity experts note it took them months to analyze Stuxnet.  Because of its greater size it will likely take a year to do the same for the current worm.
UPDATE: Senior Israeli minister, Bogie Yaalon, did everything but spill the beans to Galey Tzahal (Hebrew) in answering a question about the origin of Flame:
Anyone who believes that the Iranian threat is meaningful would find it desirable to take effective means, including these, to sabotage it.  Israel is blessed with being a country that has tremendous technological capabilities.  These tools open all sorts of possibilities for us.
Of course, this doesn’t answer the question why computers in Israel, Palestine, Egypt, Russia and the U.S. were infected as well.  Especially since Flame targets specific computers and does not attack in a generalized way as Stuxnet did.