Limitless Nexus
Search site

Navigation

Sponsor
 


Links
Current Page: 1 / 2
Jump to page:

Displaying 1 - 50 of 52


Currently browsing links sorted by popularity
< Use the left panel to change browsing filters and link order


  Google Illuminati/CFR Controlled

Submitter: [anonymous]
Category: News / Articles - Government / Politics
exhibition Date: 2018-08-07 22:53:08
Last Update: 2018-08-08 18:03:14
Views: 77
Score: 5.00 / 5.00 (Based on 3 votes.)
 
After being banned in Europe, the Illuminati went under many names. When they came to the United States, they went under the name of the Council on Foreign Relations. Hillary, McCain, Romney, Obama & others undermining our nation from both major Parties are CFR/Illuminati Members. This Interview reveals Google’s Owners are as well.

WORLD
ASSANGE: GOOGLE IS NOT WHAT IT SEEMS
By Julian Assange On Thursday, October 23, 2014 - 12:47

Executive Chairman of Google Eric Schmidt and Jared Cohen, director of Google Ideas

In June 2011, Julian Assange received an unusual visitor: the chairman of Google, Eric Schmidt, arrived from America at Ellingham Hall, the country house in Norfolk, England where Assange was living under house arrest.

For several hours the besieged leader of the world’s most famous insurgent publishing organization and the billionaire head of the world’s largest information empire locked horns. The two men debated the political problems faced by society, and the technological solutions engendered by the global network—from the Arab Spring to Bitcoin.


They outlined radically opposing perspectives: for Assange, the liberating power of the Internet is based on its freedom and statelessness. For Schmidt, emancipation is at one with U.S. foreign policy objectives and is driven by connecting non-Western countries to Western companies and markets. These differences embodied a tug-of-war over the Internet’s future that has only gathered force subsequently.

In this extract from When Google Met WikiLeaks Assange describes his encounter with Schmidt and how he came to conclude that it was far from an innocent exchange of views.


Eric Schmidt is an influential figure, even among the parade of powerful characters with whom I have had to cross paths since I founded WikiLeaks. In mid-May 2011 I was under house arrest in rural Norfolk, England, about three hours’ drive northeast of London. The crackdown against our work was in full swing and every wasted moment seemed like an eternity. It was hard to get my attention.


But when my colleague Joseph Farrell told me the executive chairman of Google wanted to make an appointment with me, I was listening.

In some ways the higher echelons of Google seemed more distant and obscure to me than the halls of Washington. We had been locking horns with senior U.S. officials for years by that point. The mystique had worn off. But the power centers growing up in Silicon Valley were still opaque and I was suddenly conscious of an opportunity to understand and influence what was becoming the most influential company on earth. Schmidt had taken over as CEO of Google in 2001 and built it into an empire.

Keep Up With This Story And More By Subscribing Now


I was intrigued that the mountain would come to Muhammad. But it was not until well after Schmidt and his companions had been and gone that I came to understand who had really visited me.

The stated reason for the visit was a book. Schmidt was penning a treatise with Jared Cohen, the director of Google Ideas, an outfit that describes itself as Google’s in-house “think/do tank.”

I knew little else about Cohen at the time. In fact, Cohen had moved to Google from the U.S. State Department in 2010. He had been a fast-talking “Generation Y” ideas man at State under two U.S. administrations, a courtier from the world of policy think tanks and institutes, poached in his early twenties.


He became a senior advisor for Secretaries of State Rice and Clinton. At State, on the Policy Planning Staff, Cohen was soon christened “Condi’s party-starter,” channeling buzzwords from Silicon Valley into U.S. policy circles and producing delightful rhetorical concoctions such as “Public Diplomacy 2.0.” On his Council on Foreign Relations adjunct staff page he listed his expertise as “terrorism; radicalization; impact of connection technologies on 21st century statecraft; Iran.”

It was Cohen who, while he was still at the Department of State, was said to have emailed Twitter CEO Jack Dorsey to delay scheduled maintenance in order to assist the aborted 2009 uprising in Iran. His documented love affair with Google began the same year when he befriended Eric Schmidt as they together surveyed the post-occupation wreckage of Baghdad. Just months later, Schmidt re-created Cohen’s natural habitat within Google itself by engineering a “think/do tank” based in New York and appointing Cohen as its head. Google Ideas was born.

Later that year two co-wrote a policy piece for the Council on Foreign Relations’ journal Foreign Affairs, praising the reformative potential of Silicon Valley technologies as an instrument of U.S. foreign policy. Describing what they called “coalitions of the connected,” Schmidt and Cohen claimed that:

Democratic states that have built coalitions of their militaries have the capacity to do the same with their connection technologies.…

They offer a new way to exercise the duty to protect citizens around the world [emphasis added].

Schmidt and Cohen said they wanted to interview me. I agreed. A date was set for June.


Jared Cohen

* * *

By the time June came around there was already a lot to talk about. That summer WikiLeaks was still grinding through the release of U.S. diplomatic cables, publishing thousands of them every week. When, seven months earlier, we had first started releasing the cables, Hillary Clinton had denounced the publication as “an attack on the international community” that would “tear at the fabric” of government.

It was into this ferment that Google projected itself that June, touching down at a London airport and making the long drive up into East Anglia to Norfolk and Beccles.

Schmidt arrived first, accompanied by his then partner, Lisa Shields. When he introduced her as a vice president of the Council on Foreign Relations—a U.S. foreign-policy think tank with close ties to the State Department—I thought little more of it. Shields herself was straight out of Camelot, having been spotted by John Kennedy Jr.’s side back in the early 1990s.

They sat with me and we exchanged pleasantries. They said they had forgotten their Dictaphone, so we used mine. We made an agreement that I would forward them the recording and in exchange they would forward me the transcript, to be corrected for accuracy and clarity. We began. Schmidt plunged in at the deep end, straightaway quizzing me on the organizational and technological underpinnings of WikiLeaks.

* * *

Some time later Jared Cohen arrived. With him was Scott Malcomson, introduced as the book’s editor. Three months after the meeting Malcomson would enter the State Department as the lead speechwriter and principal advisor to Susan Rice (then U.S. ambassador to the United Nations, now national security advisor).

At this point, the delegation was one part Google, three parts U.S. foreign-policy establishment, but I was still none the wiser. Handshakes out of the way, we got down to business.

Schmidt was a good foil. A late-fiftysomething, squint-eyed behind owlish spectacles, managerially dressed—Schmidt’s dour appearance concealed a machinelike analyticity. His questions often skipped to the heart of the matter, betraying a powerful nonverbal structural intelligence.

It was the same intellect that had abstracted software-engineering principles to scale Google into a megacorp, ensuring that the corporate infrastructure always met the rate of growth. This was a person who understood how to build and maintain systems: systems of information and systems of people. My world was new to him, but it was also a world of unfolding human processes, scale and information flows.

For a man of systematic intelligence, Schmidt’s politics—such as I could hear from our discussion—were surprisingly conventional, even banal. He grasped structural relationships quickly, but struggled to verbalize many of them, often shoehorning geopolitical subtleties into Silicon Valley marketese or the ossified State Department micro-language of his companions. He was at his best when he was speaking (perhaps without realizing it) as an engineer, breaking down complexities into their orthogonal components.

I found Cohen a good listener, but a less interesting thinker, possessed of that relentless conviviality that routinely afflicts career generalists and Rhodes Scholars. As you would expect from his foreign-policy background, Cohen had a knowledge of international flash points and conflicts and moved rapidly between them, detailing different scenarios to test my assertions. But it sometimes felt as if he was riffing on orthodoxies in a way that was designed to impress his former colleagues in official Washington.

Malcomson, older, was more pensive, his input thoughtful and generous. Shields was quiet for much of the conversation, taking notes, humoring the bigger egos around the table while she got on with the real work.

As the interviewee, I was expected to do most of the talking. I sought to guide them into my worldview. To their credit, I consider the interview perhaps the best I have given. I was out of my comfort zone and I liked it.

We ate and then took a walk in the grounds, all the while on the record. I asked Eric Schmidt to leak U.S. government information requests to WikiLeaks, and he refused, suddenly nervous, citing the illegality of disclosing Patriot Act requests. And then, as the evening came on, it was done and they were gone, back to the unreal, remote halls of information empire, and I was left to get back to my work.

That was the end of it, or so I thought.

* * *

Two months later, WikiLeaks’ release of State Department cables was coming to an abrupt end. For three-quarters of a year we had painstakingly managed the publication, pulling in over a hundred global media partners, distributing documents in their regions of influence and overseeing a worldwide, systematic publication and redaction system, fighting for maximum impact for our sources.

But The Guardian newspaper—our former partner—had published the confidential decryption password to all 251,000 cables in a chapter heading in its book, rushed out hastily in February 2011.

By mid-August we discovered that a former German employee—whom I had suspended in 2010—was cultivating business relationships with a variety of organizations and individuals by shopping around the location of the encrypted file, paired with the password’s whereabouts in the book. At the rate the information was spreading, we estimated that within two weeks most intelligence agencies, contractors and middlemen would have all the cables, but the public would not.

I decided it was necessary to bring forward our publication schedule by four months and contact the State Department to get it on record that we had given them advance warning. The situation would then be harder to spin into another legal or political assault.

Unable to raise Louis Susman, then U.S. ambassador to the U.K., we tried the front door. WikiLeaks investigations editor Sarah Harrison called the State Department front desk and informed the operator that “Julian Assange” wanted to have a conversation with Hillary Clinton. Predictably, this statement was initially greeted with bureaucratic disbelief.

We soon found ourselves in a reenactment of that scene in Dr. Strangelove, where Peter Sellers cold-calls the White House to warn of an impending nuclear war and is immediately put on hold. As in the film, we climbed the hierarchy, speaking to incrementally more superior officials until we reached Clinton’s senior legal advisor. He told us he would call us back. We hung up, and waited.

When the phone rang half an hour later, it was not the State Department on the other end of the line. Instead, it was Joseph Farrell, the WikiLeaks staffer who had set up the meeting with Google. He had just received an email from Lisa Shields seeking to confirm that it was indeed WikiLeaks calling the State Department.

It was at this point that I realized Eric Schmidt might not have been an emissary of Google alone. Whether officially or not, he had been keeping some company that placed him very close to Washington, D.C., including a well-documented relationship with President Obama. Not only had Hillary Clinton’s people known that Eric Schmidt’s partner had visited me, but they had also elected to use her as a back channel.

While WikiLeaks had been deeply involved in publishing the inner archive of the U.S. State Department, the U.S. State Department had, in effect, snuck into the WikiLeaks command center and hit me up for a free lunch. Two years later, in the wake of his early 2013 visits to China, North Korea and Burma, it would come to be appreciated that the chairman of Google might be conducting, in one way or another, “back-channel diplomacy” for Washington. But at the time it was a novel thought.

I put it aside until February 2012, when WikiLeaks—along with over thirty of our international media partners—began publishing the Global Intelligence Files: the internal email spool from the Texas-based private intelligence firm Stratfor. One of our stronger investigative partners—the Beirut-based newspaper Al Akhbar— scoured the emails for intelligence on Jared Cohen.

The people at Stratfor, who liked to think of themselves as a sort of corporate CIA, were acutely conscious of other ventures that they perceived as making inroads into their sector. Google had turned up on their radar. In a series of colorful emails they discussed a pattern of activity conducted by Cohen under the Google Ideas aegis, suggesting what the “do” in “think/do tank” actually means.

Cohen’s directorate appeared to cross over from public relations and “corporate responsibility” work into active corporate intervention in foreign affairs at a level that is normally reserved for states. Jared Cohen could be wryly named Google’s “director of regime change.”

According to the emails, he was trying to plant his fingerprints on some of the major historical events in the contemporary Middle East. He could be placed in Egypt during the revolution, meeting with Wael Ghonim, the Google employee whose arrest and imprisonment hours later would make him a PR-friendly symbol of the uprising in the Western press. Meetings had been planned in Palestine and Turkey, both of which—claimed Stratfor emails—were killed by the senior Google leadership as too risky.




Only a few months before he met with me, Cohen was planning a trip to the edge of Iran in Azerbaijan to “engage the Iranian communities closer to the border,” as part of a Google Ideas’ project on “repressive societies.” In internal emails Stratfor’s vice president for intelligence, Fred Burton (himself a former State Department security official), wrote:

Google is getting WH [White House] and State Dept support and air cover. In reality they are doing things the CIA cannot do…

[Cohen] is going to get himself kidnapped or killed. Might be the best thing to happen to expose Google’s covert role in foaming up-risings, to be blunt. The US Gov’t can then disavow knowledge and Google is left holding the shit-bag.

In further internal communication, Burton said his sources on Cohen’s activities were Marty Lev—Google’s director of security and safety—and Eric Schmidt himself.

Looking for something more concrete, I began to search in WikiLeaks’ archive for information on Cohen. State Department cables released as part of Cablegate reveal that Cohen had been in Afghanistan in 2009, trying to convince the four major Afghan mobile phone companies to move their antennas onto U.S. military bases. In Lebanon, he quietly worked to establish an intellectual and clerical rival to Hezbollah, the “Higher Shia League.” And in London he offered Bollywood movie executives funds to insert anti-extremist content into their films, and promised to connect them to related networks in Hollywood.

Three days after he visited me at Ellingham Hall, Jared Cohen flew to Ireland to direct the “Save Summit,” an event co-sponsored by Google Ideas and the Council on Foreign Relations. Gathering former inner-city gang members, right-wing militants, violent nationalists and “religious extremists” from all over the world together in one place, the event aimed to workshop technological solutions to the problem of “violent extremism.” What could go wrong?

Cohen’s world seems to be one event like this after another: endless soirees for the cross-fertilization of influence between elites and their vassals, under the pious rubric of “civil society.” The received wisdom in advanced capitalist societies is that there still exists an organic “civil society sector” in which institutions form autonomously and come together to manifest the interests and will of citizens. The fable has it that the boundaries of this sector are respected by actors from government and the “private sector,” leaving a safe space for NGOs and nonprofits to advocate for things like human rights, free speech and accountable government.

This sounds like a great idea. But if it was ever true, it has not been for decades. Since at least the 1970s, authentic actors like unions and churches have folded under a sustained assault by free-market statism, transforming “civil society” into a buyer’s market for political factions and corporate interests looking to exert influence at arm’s length. The last forty years have seen a huge proliferation of think tanks and political NGOs whose purpose, beneath all the verbiage, is to execute political agendas by proxy.

It is not just obvious neocon front groups like Foreign Policy Initiative. It also includes fatuous Western NGOs like Freedom House, where naïve but well-meaning career nonprofit workers are twisted in knots by political funding streams, denouncing non-Western human rights violations while keeping local abuses firmly in their blind spots.

The civil society conference circuit—which flies developing-world activists across the globe hundreds of times a year to bless the unholy union between “government and private stakeholders” at geopoliticized events like the “Stockholm Internet Forum”—simply could not exist if it were not blasted with millions of dollars in political funding annually.

Scan the memberships of the biggest U.S. think tanks and institutes and the same names keep cropping up. Cohen’s Save Summit went on to seed AVE, or AgainstViolentExtremism.org, a long-term project whose principal backer besides Google Ideas is the Gen Next Foundation. This foundation’s website says it is an “exclusive membership organization and platform for successful individuals” that aims to bring about “social change” driven by venture capital funding. Gen Next’s “private sector and non-profit foundation support avoids some of the potential perceived conflicts of interest faced by initiatives funded by governments.” Jared Cohen is an executive member.

Gen Next also backs an NGO, launched by Cohen toward the end of his State Department tenure, for bringing Internet-based global “pro-democracy activists” into the U.S. foreign relations patronage network. The group originated as the “Alliance of Youth Movements” with an inaugural summit in New York City in 2008 funded by the State Department and encrusted with the logos of corporate sponsors. The summit flew in carefully selected social media activists from “problem areas” like Venezuela and Cuba to watch speeches by the Obama campaign’s new-media team and the State Department’s James Glassman, and to network with public relations consultants, “philanthropists,” and U.S. media personalities.

The outfit held two more invite-only summits in London and Mexico City where the delegates were directly addressed via video link by Hillary Clinton:

You are the vanguard of a rising generation of citizen activists.…

And that makes you the kind of leaders we need.

In 2011, the Alliance of Youth Movements rebranded as “Movements.org.” In 2012 Movements.org became a division of “Advancing Human Rights,” a new NGO set up by Robert L. Bernstein after he resigned from Human Rights Watch (which he had originally founded) because he felt it should not cover Israeli and U.S. human rights abuses. Advancing Human Rights aims to right Human Rights Watch’s wrong by focusing exclusively on “dictatorships.”

Cohen stated that the merger of his Movements.org outfit with Advancing Human Rights was “irresistible,” pointing to the latter’s “phenomenal network of cyber-activists in the Middle East and North Africa.” He then joined the Advancing Human Rights board, which also includes Richard Kemp, the former commander of British forces in occupied Afghanistan. In its present guise, Movements.org continues to receive funding from Gen Next, as well as from Google, MSNBC and PR giant Edelman, which represents General Electric, Boeing, and Shell, among others.

Google Ideas is bigger, but it follows the same game plan. Glance down the speaker lists of its annual invite-only get-togethers, such as “Crisis in a Connected World” in October 2013. Social network theorists and activists give the event a veneer of authenticity, but in truth it boasts a toxic piñata of attendees: U.S. officials, telecom magnates, security consultants, finance capitalists and foreign-policy tech vultures like Alec Ross (Cohen’s twin at the State Department).

At the hard core are the arms contractors and career military: active U.S. Cyber Command chieftains, and even the admiral responsible for all U.S. military operations in Latin America from 2006 to 2009. Tying up the package are Jared Cohen and the chairman of Google, Eric Schmidt.

I began to think of Schmidt as a brilliant but politically hapless Californian tech billionaire who had been exploited by the very U.S. foreign-policy types he had collected to act as translators between himself and official Washington—a West Coast–East Coast illustration of the principal-agent dilemma.

I was wrong.

* * *

Eric Schmidt was born in Washington, D.C., where his father had worked as a professor and economist for the Nixon Treasury. He attended high school in Arlington, Virginia, before graduating with a degree in engineering from Princeton.

In 1979, Schmidt headed out West to Berkeley, where he received his Ph.D. before joining Stanford/ Berkeley spin-off Sun Microsystems in 1983. By the time he left Sun, sixteen years later, he had become part of its executive leadership.

Sun had significant contracts with the U.S. government, but it was not until he was in Utah as CEO of Novell that records show Schmidt strategically engaging Washington’s overt political class. Federal campaign finance records show that on January 6, 1999, Schmidt donated two lots of $1,000 to the Republican senator for Utah, Orrin Hatch. On the same day Schmidt’s wife, Wendy, is also listed giving two lots of $1,000 to Senator Hatch.

By the start of 2001, over a dozen other politicians and PACs, including Al Gore, George W. Bush, Dianne Feinstein, and Hillary Clinton, were on the Schmidts’ payroll, in one case for $100,000.

By 2013, Eric Schmidt—who had become publicly over-associated with the Obama White House—was more politic. Eight Republicans and eight Democrats were directly funded, as were two PACs. That April, $32,300 went to the National Republican Senatorial Committee. A month later the same amount, $32,300, headed off to the Democratic Senatorial Campaign Committee. Why Schmidt was donating exactly the same amount of money to both parties is a $64,600 question.

It was also in 1999 that Schmidt joined the board of a Washington, D.C.–based group: the New America Foundation, a merger of well-connected centrist forces (in D.C. terms). The foundation and its 100 staff serve as an influence mill, using its network of approved national security, foreign policy and technology pundits to place hundreds of articles and op-eds per year.

By 2008, Schmidt had become chairman of its board of directors. As of 2013 the New America Foundation’s principal funders (each contributing over $1 million) were listed as Eric and Wendy Schmidt, the U.S. State Department and the Bill & Melinda Gates Foundation. Secondary funders include Google, the United States Agency for International Development (USAID) and Radio Free Asia.

Schmidt’s involvement in the New America Foundation places him firmly in the Washington establishment nexus. The foundation’s other board members, seven of whom also list themselves as members of the Council on Foreign Relations, include Francis Fukuyama, one of the intellectual fathers of the neoconservative movement; Rita Hauser, who served on the President’s Intelligence Advisory Board under both Bush and Obama; Jonathan Soros, the son of George Soros; Walter Russell Mead, a U.S. security strategist and editor of the American Interest; Helene Gayle, who sits on the boards of Coca-Cola, Colgate-Palmolive, the Rockefeller Foundation, the State Department’s Foreign Affairs Policy Unit, the Council on Foreign Relations, the Center for Strategic and International Studies, the White House Fellows program and Bono’s ONE Campaign; and Daniel Yergin, oil geo-strategist, former chair of the U.S. Department of Energy’s Task Force.


The chief executive of the foundation, appointed in 2013, is Jared Cohen’s former boss at the State Department’s Policy Planning Staff, Anne-Marie Slaughter, a Princeton law and international relations wonk with an eye for revolving doors. She is everywhere, issuing calls for Obama to respond to the Ukraine crisis not only by deploying covert U.S. forces into the country but also by dropping bombs on Syria—on the basis that this will send a message to Russia and China. Along with Schmidt, she is a 2013 attendee of the Bilderberg conference and sits on the State Department’s Foreign Affairs Policy Board.

There was nothing politically hapless about Eric Schmidt. I had been too eager to see a politically unambitious Silicon Valley engineer, a relic of the good old days of computer science graduate culture on the West Coast. But that is not the sort of person who attends the Bilderberg conference four years running, who pays regular visits to the White House, or who delivers “fireside chats” at the World Economic Forum in Davos.

Schmidt’s emergence as Google’s “foreign minister”—making pomp and ceremony state visits across geopolitical fault lines—had not come out of nowhere; it had been presaged by years of assimilation within U.S. establishment networks of reputation and influence.

On a personal level, Schmidt and Cohen are perfectly likable people. But Google’s chairman is a classic “head of industry” player, with all of the ideological baggage that comes with that role. Schmidt fits exactly where he is: the point where the centrist, liberal and imperialist tendencies meet in American political life.

By all appearances, Google’s bosses genuinely believe in the civilizing power of enlightened multinational corporations, and they see this mission as continuous with the shaping of the world according to the better judgment of the “benevolent superpower.” They will tell you that open-mindedness is a virtue, but all perspectives that challenge the exceptionalist drive at the heart of American foreign policy will remain invisible to them. This is the impenetrable banality of “don’t be evil.” They believe that they are doing good. And that is a problem.

* * *

Google is different. Google is visionary. Google is the future. Google is more than just a company. Google gives back to the community. Google is a force for good.

Even when Google airs its corporate ambivalence publicly, it does little to dislodge these items of faith. The company’s reputation is seemingly unassailable. Google’s colorful, playful logo is imprinted on human retinas just under 6 billion times each day, 2.1 trillion times a year—an opportunity for respondent conditioning enjoyed by no other company in history.

Caught red-handed last year making petabytes of personal data available to the U.S. intelligence community through the PRISM program, Google nevertheless continues to coast on the goodwill generated by its “don’t be evil” doublespeak. A few symbolic open letters to the White House later and it seems all is forgiven. Even anti-surveillance campaigners cannot help themselves, at once condemning government spying but trying to alter Google’s invasive surveillance practices using appeasement strategies.

Nobody wants to acknowledge that Google has grown big and bad. But it has. Schmidt’s tenure as CEO saw Google integrate with the shadiest of U.S. power structures as it expanded into a geographically invasive megacorporation. But Google has always been comfortable with this proximity. Long before company founders Larry Page and Sergey Brin hired Schmidt in 2001, their initial research upon which Google was based had been partly funded by the Defense Advanced Research Projects Agency (DARPA). And even as Schmidt’s Google developed an image as the overly friendly giant of global tech, it was building a close relationship with the intelligence community.

In 2003, the U.S. National Security Agency (NSA) had already started systematically violating the Foreign Intelligence Surveillance Act (FISA) under its director General Michael Hayden. These were the days of the “Total Information Awareness” program. Before PRISM was ever dreamed of, under orders from the Bush White House the NSA was already aiming to “collect it all, sniff it all, know it all, process it all, exploit it all.”

During the same period, Google—whose publicly declared corporate mission is to collect and “organize the world’s information and make it universally accessible and useful”—was accepting NSA money to the tune of $2 million to provide the agency with search tools for its rapidly accreting hoard of stolen knowledge.

In 2004, after taking over Keyhole, a mapping tech startup co-funded by the National Geospatial-Intelligence Agency (NGA) and the CIA, Google developed the technology into Google Maps, an enterprise version of which it has since shopped to the Pentagon and associated federal and state agencies on multimillion-dollar contracts.

In 2008, Google helped launch an NGA spy satellite, the GeoEye-1, into space. Google shares the photographs from the satellite with the U.S. military and intelligence communities. In 2010, NGA awarded Google a $27 million contract for “geospatial visualization services.”

In 2010, after the Chinese government was accused of hacking Google, the company entered into a “formal information-sharing” relationship with the NSA, which was said to allow NSA analysts to “evaluate vulnerabilities” in Google’s hardware and software. Although the exact contours of the deal have never been disclosed, the NSA brought in other government agencies to help, including the FBI and the Department of Homeland Security.

Around the same time, Google was becoming involved in a program known as the “Enduring Security Framework” (ESF), which entailed the sharing of information between Silicon Valley tech companies and Pentagon-affiliated agencies “at network speed.” Emails obtained in 2014 under Freedom of Information requests show Schmidt and his fellow Googler Sergey Brin corresponding on first-name terms with NSA chief General Keith Alexander about ESF.

Reportage on the emails focused on the familiarity in the correspondence: “General Keith…so great to see you…!” Schmidt wrote. But most reports over-looked a crucial detail. “Your insights as a key member of the Defense Industrial Base,” Alexander wrote to Brin, “are valuable to ensure ESF’s efforts have measurable impact.”

The Department of Homeland Security defines the Defense Industrial Base as “the worldwide industrial complex that enables research and development, as well as design, production, delivery, and maintenance of military weapons systems, subsystems, and components or parts, to meet U.S. military requirements [emphasis added].” The Defense Industrial Base provides “products and services that are essential to mobilize, deploy, and sustain military operations.”

Does it include regular commercial services purchased by the U.S. military? No. The definition specifically excludes the purchase of regular commercial services. Whatever makes Google a “key member of the Defense Industrial Base,” it is not recruitment campaigns pushed out through Google AdWords or soldiers checking their Gmail.

In 2012, Google arrived on the list of top-spending Washington, D.C., lobbyists—a list typically stalked exclusively by the U.S. Chamber of Commerce, military contractors, and the petro-carbon leviathans. Google entered the rankings above military aerospace giant Lockheed Martin, with a total of $18.2 million spent in 2012 to Lockheed’s $15.3 million. Boeing, the military contractor that absorbed McDonnell Douglas in 1997, also came below Google, at $15.6 million spent, as did Northrop Grumman at $17.5 million.

In autumn 2013 the Obama administration was trying to drum up support for U.S. airstrikes against Syria. Despite setbacks, the administration continued to press for military action well into September with speeches and public announcements by both President Obama and Secretary of State John Kerry. On September 10, Google lent its front page—the most popular on the Internet—to the war effort, inserting a line below the search box reading “Live! Secretary Kerry answers questions on Syria. Today via Hangout at 2pm ET.”

As the self-described “radical centrist” New York Times columnist Tom Friedman wrote in 1999, sometimes it is not enough to leave the global dominance of American tech corporations to something as mercurial as “the free market”:

The hidden hand of the market will never work without a hidden fist. McDonald’s cannot flourish without McDonnell Douglas, the designer of the F-15. And the hidden fist that keeps the world safe for Silicon Valley’s technologies to flourish is called the U.S. Army, Air Force, Navy and Marine Corps.

If anything has changed since those words were written, it is that Silicon Valley has grown restless with that passive role, aspiring instead to adorn the hidden fist like a velvet glove. Writing in 2013, Schmidt and Cohen stated,

What Lockheed Martin was to the twentieth century, technology and cyber-security companies will be to the twenty-first.

One way of looking at it is that it’s just business. For an American Internet services monopoly to ensure global market dominance, it cannot simply keep doing what it is doing and let politics take care of itself. American strategic and economic hegemony becomes a vital pillar of its market dominance. What’s a megacorp to do? If it wants to straddle the world, it must become part of the original “don’t be evil” empire.

But part of the resilient image of Google as “more than just a company” comes from the perception that it does not act like a big, bad corporation. Its penchant for luring people into its services trap with gigabytes of “free storage” produces the perception that Google is giving it away for free, acting directly contrary to the corporate profit motive.

Google is perceived as an essentially philanthropic enterprise—a magical engine presided over by otherworldly visionaries—for creating a utopian future. The company has at times appeared anxious to cultivate this image, pouring funding into “corporate responsibility” initiatives to produce “social change”—exemplified by Google Ideas.

But as Google Ideas shows, the company’s “philanthropic” efforts, too, bring it uncomfortably close to the imperial side of U.S. influence. If Blackwater/Xe Services/Academi was running a program like Google Ideas, it would draw intense critical scrutiny. But somehow Google gets a free pass.

Whether it is being just a company or “more than just a company,” Google’s geopolitical aspirations are firmly enmeshed within the foreign-policy agenda of the world’s largest superpower. As Google’s search and Internet service monopoly grows, and as it enlarges its industrial surveillance cone to cover the majority of the world’s population, rapidly dominating the mobile phone market and racing to extend Internet access in the global south, Google is steadily becoming the Internet for many people. Its influence on the choices and behavior of the totality of individual human beings translates to real power to influence the course of history.

If the future of the Internet is to be Google, that should be of serious concern to people all over the world—in Latin America, East and Southeast Asia, the Indian subcontinent, the Middle East, sub-Saharan Africa, the former Soviet Union and even in Europe—for whom the Internet embodies the promise of an alternative to U.S. cultural, economic, and strategic hegemony.

A “don’t be evil” empire is still an empire.

Extracted from When Google Met Wikileaks by Julian Assange published by OR Books. Newsweek readers can obtain a 20 percent discount on the cover price when ordering from the OR Books website and including the offer code word NEWSWEEK.

     
  Brynhildr in the Darkness - Uncensored

Submitter: [anonymous]
Category: News / Articles - Movies / Television
exhibition Date: 2015-12-19 19:43:17
Last Update: 2018-07-04 17:19:43
Views: 1161
Score: 5.00 / 5.00 (Based on 1 votes.)
 
Brynhildr in the Darkness (極黒のブリュンヒルデ Gokukoku no Buryunhirude?, lit. \"Extreme-Black Brynhildr\") is a science fiction Japanese manga series by Lynn Okamoto that began serialization in January 2012. A television anime adaptation by Arms began airing on April 6, 2014. It is based on Germanic mythology.

Lynn Okamoto is also the creator of Elfen Lied. Also much like Elfen Lied, it is 13 episodes long & an OVA has been released which takes place somewhere within the time span of episode 11. It also features girls being the subject of cruel experimentation; while also wielding great power the government seeks to control If you were a fan of Elfen Lied, you need to see this anime. With the uncensored version available, its the only way to watch it correctly.

     
  Cybernations - MMO Online Nation Simulator

Submitter: [anonymous]
Category: Online Content - Web Games / Interactive
exhibition Date: 2014-07-23 12:20:09
Last Update: 2018-05-06 04:56:08
Views: 757
Score: 1.00 / 5.00 (Based on 1 votes.)
 
Cyber Nations is a free browser-based nation simulation game. Create a nation and decide how you will rule your people by choosing a government type, a national religion, tax rate and more. Build your nation according to your choosing by purchasing infrastructure to support your citizens, land to expand your borders, technology to increase your effectiveness, and military to defend your national interests.

     
  Ways to Stop Your iPhone from Spying on You

Submitter: [anonymous]
Category: Guides / Tutorials - Software
exhibition Date: 2018-08-08 01:49:24
Last Update: 2018-08-08 01:52:22
Views: 23
Score: 5.00 / 5.00 (Based on 1 votes.)
 
In an increasingly chaotic and frightening world, more people than ever are concerned about the government surveillance. Surveillance is probably easier than ever before thanks to the wealth of data captured and stored on devices like the iPhone. From our communications to the locations we visit to our social networks, our phones contain a lot of sensitive information about us and our activities.

Luckily, they also contain features that help us protect our digital privacy and prevent government spying. Check out these tips for keeping your data and your activities private.

Security for Web, Chat, and Email
Communications are one of the key things that surveillance seeks to gain access to. Encryption and taking certain precautions with the apps you use can help.

Use a VPN for Web Browsing
A Virtual Private Network, or VPN, routes all of your Internet browsings through a private "tunnel" which is protected with encryption from surveillance. While there have been reports of governments being able to crack some VPNs, using one will provide more protection than not. To use a VPN, you need two things: a VPN app and a subscription to a VPN service provider who provides the encrypted access to the internet. There's a VPN app built into the iOS, and numerous options available in the App Store, including:

ExpressVPN—Free app. Service costs US$8-13/month.
Download at the App Store
IPVanish VPN—Free app. Service costs $6.50-$10/month.
Download at the App Store
VPN by NordVPN—Free app. Service costs $5.75-$12/month.
Download at the App Store
Always Use Private Browsing
When you browse the web, Safari tracks your browsing history, information which can be relatively easy to access if someone gets access to your iPhone. Avoid leaving a trail of web browsing data by using Private Browsing. This feature built into Safari ensures that your browsing history isn't saved. Turn the feature on by following these steps:

Tap Safari
Tap the two-squares icon at the bottom right
Tap Private
Tap + to open a new Private Browsing window.
Use an Encrypted Chat App
Eavesdropping on conversations can net a ton of useful information—unless your conversations can't be cracked. To do that, you need to use a chat app with end-to-end encryption. This means that every step of a chat—from your phone to the chat server to the recipient's phone—is encrypted. Apple's iMessage platform works this way, as do a number of other chat apps. IMessage is a great option since Apple has taken a strong stand against creating a "backdoor" for the government to access conversations. Just make sure that no one in your iMessage group chats is using Android or another smartphone platform; that breaks encryption for the entire conversation.

The Electronic Frontier Foundation (EFF), a digital rights and policy organization, provides a useful Secure Messaging Scorecard to help you find the best chat app for your needs.

Ditch Email—Unless It's End-to-End Encrypted
As noted in the last section, encryption is a key way to keep prying eyes away from your private communications. While there are a number of totally encrypted chat apps, it's much harder to find unbreakably encrypted email. In fact, some encrypted email providers have shut down due to government pressure.

One good option includes ProtonMail, but just make sure that you're emailing someone who also uses it. Like with chat, if a recipient isn't using encryption, all of your communications are at risk.

Sign Out of Social Networks
Social networks are increasingly used for communication and organizing travel and events. Government access to your social networks will reveal your network of friends, activities, movements, and plans. Make sure to always sign out of your social networking apps when you're done using them. You should also sign out at an OS level, by following these steps:

Tap Settings
Tap Twitter or Facebook
Sign out of, or delete, your account (this won't delete the social networking account, just the data on your phone).
Passcode and Device Access
Spying doesn't just happen over the Internet. It can also happen when police, immigration and customs agents, and other governmental entities get physical access to your iPhone. These tips can help make it harder for them to view your data.

Set a Complex Passcode
Everyone should use a passcode to secure their iPhone, and the more complex your passcode, the harder it is to break into. We saw this in the showdown between Apple and the FBI over the iPhone in the San Bernardino terrorism case. Because a complex passcode was used, the FBI had an extremely difficult time accessing the device. A four-digit passcode isn't enough. Make sure to use the most complex passcode you can remember, combining numbers, letters (lowercase and uppercase). For tips on creating secure passwords, check out this article from the EFF.

Set a complex passcode by following these instructions:

Tap Settings
Tap Touch ID & Passcode
Enter your passcode, if needed
Tap Change Passcode
Tap Passcode Options
Tap Custom Alphanumeric Code and enter a new passcode.
Set Your Phone to Delete Its Data
The iPhone includes a feature that automatically deletes its data if an incorrect passcode is entered 10 times. This is a great feature if you want to keep your data private but no longer have possession of your phone. Enable this setting by following these steps:

Tap Settings
Tap Touch ID & Passcode
Enter your passcode, if needed
Move Erase Data slider to on/green.
Turn Off Touch ID in Some Cases
We think of the fingerprint-based security offered by Apple's Touch ID fingerprint scanner as very powerful. Unless someone can forge your fingerprint, they're locked out of your phone. Recent reports from protests have said that police are bypassing this restriction by physically forcing people who have been arrested to put their fingers on the Touch ID sensor to unlock their phones. If you're in a situation where you think you could be arrested, it's smart to turn off Touch ID. That way you can't be forced to put your finger on the sensor and can rely on a complex passcode to protect your data.

Turn it off by following these steps:

Tap Settings
Tap Touch ID & Passcode
Enter your passcode
Move all of the sliders in the Use Touch ID For: section to off/white.
Set Autolock to 30 Seconds
The longer your iPhone is unlocked, the more chance there is for someone with physical access to it to view your data. Your best bet is to set your phone to autolock as quickly as possible. You'll have to unlock it more frequently in day-to-day use, but it also means that the window for unauthorized access is much smaller. To change this setting, follow these steps:

Tap Settings
Tap Display & Brightness
Tap Auto-Lock
Tap 30 Seconds.
Disable All Lock Screen Access
Apple makes it easy to access data and features from the iPhone's lockscreen. In most situations, this is great—a few swipes or button clicks get at the features you need, without unlocking your phone. If your phone isn't in your physical control, though, these features can give others access to your data and apps. While turning off these features makes your phone a bit less convenient to use, it protects you, too. Change your settings by following these steps:

Tap Settings
Tap Touch ID & Passcode
Enter your passcode, if needed
Move the following sliders to off/white:
Voice Dial
Today View
Notifications View
Siri
Reply with Message
Wallet.
Only Use Camera From The Lockscreen
If you're taking pictures at an event—a protest, for instance—your phone is unlocked. If someone is able to grab your phone while it's unlocked, they can access your data. Having a very short autolock setting can help with this, but it's not foolproof in this scenario. Not unlocking your phone at all is a better security measure. You can do this, and still take pictures, by launching the Camera app from your lockscreen. When you do this, you can only use the Camera app and view the pictures you've just taken. Try to do anything else, and you'll need the passcode.

To launch the Camera app from the lockscreen, swipe from right to left.

Set Up Find My iPhone
Find My iPhone is extremely useful for protecting your data if you don't have physical access to your iPhone. That's because you can use it to delete all data on the phone over the Internet. To do that, make sure you've set up Find My iPhone.

Then, read this article about how to use Find My iPhone to delete your data.

Privacy Settings
The Privacy controls built into the iOS let you restrict apps, advertisers, and other entities from accessing data stored in apps. In the case of defending against surveillance and spying, these settings offer a few useful protections.

Disable Frequent Locations
Your iPhone tries to learn your habits. For instance, it tries to figure out the GPS location of your home and your job so that it can tell you when you wake up in the morning how long your commute is going to take. Learning these Frequent Locations can be helpful, but that data also tells a lot about where you go, when, and what you may be doing. To keep your movements harder to track, disable Frequent Locations by following these steps:

Tap Settings
Tap Privacy
Tap Location Services
Scroll to the very bottom and tap System Services
Tap Frequent Locations
Clear any existing locations
Move the Frequent Locations slider to off/white.
Prevent Apps from Accessing Your Location
Third-party apps may try to access your location data, too. This can be helpful—if Yelp can't figure out your location, it can't tell you what restaurants nearby offer the food you want—but it can also make it easier to track your movements. Stop apps from accessing your location by following these steps:

Tap Settings
Tap Privacy
Tap Location Services
Either move the Location Services slider to off/white or tap each individual app that you want to restrict and then tap Never.
Here are a few other tips that can generally serve you well in protecting your privacy.

Sign Out of iCloud
A lot of important personal data is likely stored in your iCloud account. Make sure to sign out of that account if you think there's a chance that you'll lose physical control of your device. To do that:

Tap Settings
Tap iCloud
Tap Sign Out at the bottom of the screen.
Delete Your Data Before Crossing Borders
Recently, the U.S. Customs and Border Patrol has begun asking people coming into the country—even legal permanent residents—to provide access to their phones as a condition of entering the country. If you don't want the government rooting through your data on your way into the country, don't leave any data on your phone in the first place.

Instead, before you travel back up all the data on your phone to iCloud (a computer can work, too, but if that's crossing the border with you, too, it might also be inspected).

Once you're sure that all of your data is safe, restore your iPhone to its factory settings. This deletes all of your data, accounts, and other personal information. As a result, there's nothing to inspect on your phone.

When your phone is no longer at risk of being examined, you can restore your iCloud backup and all of your data onto your phone.

Update to Latest OS
Hacking the iPhone is often accomplished by taking advantage of security flaws in older versions of the iOS, the operating system that runs the iPhone. If you're always running the latest version of the iOS, those security flaws are likely to have been fixed. Anytime there's a new version of the iOS, you should update—assuming it doesn't conflict with any other security tools you use.

To learn how to update your iOS, check out:

How to Update the iPhone Operating System
Install iOS Updates Without Connecting to iTunes

More Tips to Protect Your Privacy at https://ssd.eff.org/en

     
  S2 Institute - Safety & Intelligence Institute

Submitter: [anonymous]
Category: Guides / Tutorials - Miscellaneous
exhibition Date: 2014-07-24 13:20:23
Last Update: 2014-08-04 14:35:53
Views: 771
Score: 5.00 / 5.00 (Based on 1 votes.)
 
Since 1998, the S2 Safety & Intelligence Institute has trained thousands of security, intelligence, and law enforcement professionals in critical public safety topics. With a staff of world-class instructors, S2 has earned a reputation as one of the premier sources for security and public safety training.

S2 Institute Tampa
7402 N. 56th Street
Building 800, Suite 835
Tampa, FL 33617
Tel. (813) 227-8585
Florida License: DS9800005

S2 Institute Tampa offers many high-quality security and law enforcement courses , including:

Basic Security Officer Course
(Class D License Training, Full 40-Hour Class)
Armed Security Officer Course
(Class G License Training)
Class G Annual Requalification

     
  Adrenochrome

Submitter: [anonymous]
Category: News / Articles - People / Celebrities
exhibition Date: 2018-04-08 20:46:24
Views: 153
Score: 5.00 / 5.00 (Based on 2 votes.)
 
What makes adrenochrome so valuable? It has psychoactive properties and can be used as a mind control drug. It can also be consumed to give someone an “adrenaline high.” Who would want adrenochrome? Former U.S. Vice President AL GORE was once apprehended at an airport with a suitcase full of packets of his own adrenochrome-laden blood. According to ALEX JONES, ALAN WATT and FRITZ SPRINGMEIER, all high-level bureaucrats and V.I.P.’s carry around at least 2 pints of their own adrenochrome-laden blood at ALL times.

……….Aside from mind control and euphoric properties, what else can adrenochrome do? Some believe that consuming the blood of a living creature steals its “life force” and transfers it to the drinker. Aside from “vampires,” many cults [Satanic and otherwise] are known for drinking human blood [“The Illuminati” would rank high in that list].

……….Why would Satanic and Illuminist cults want to drink human blood? ENTER: The Reptilian Blood Legacy. Whether you call them aliens, Annunaki, Nephilim, Chitauri, Dracos, Nagas or otherwise, many believe that our planet has long been infiltrated and ruled by extraterrestrial / extradimensional reptilian entities who manipulate global politics, business, banking, military and media.

     
  NORML Action Center

Submitter: [anonymous]
Category: Guides / Tutorials - Health / Medical
exhibition Date: 2018-05-06 07:26:59
Last Update: 2018-05-06 07:27:29
Views: 150
Score: 5.00 / 5.00 (Based on 1 votes.)
 
NORML's Action Center

Register to Vote
Federal Priorities:
AG Jeff Sessions: Tell Congress to Reject Jeff Session's Reversal of the Cole Memo
MJ Justice: The Marijuana Justice Act of 2017 Introduced
Caucus: Tell Your Congressional Representative: Join the Cannabis Caucus
Protect Our Progress: Bipartisan Leaders Reintroduce the Respect State Marijuana Laws Act
Deschedule Marijuana: The Ending Marijuana Prohibition Act of 2017
Tell Your State Lawmakers To Put Marijuana On Their 2018 Agenda
2018 Legislation Pending Gubernatorial Action
Georgia: Legislation to Expand Medical CBD Access
Hawaii: Medical Marijuana Reciprocity Effort
Kansas: Legislation to Legalize the Retail Sale of CBD
Maine: Legislation to Expand Medical Marijuana Access
Maryland: Industrial Hemp Expansion Legislation
Missouri: Legislation to Allow Industrial Hemp Research
New Hampshire: Legislation to Expand Patient Access
2018 State Legislation: Legalization
Timely! New Jersey: Deschedule Marijuana
Connecticut: Marijuana Legalization Effort
Delaware: Marijuana Legalization Effort
Illinois: Legislation to Put Legalization to a Public Vote
Illinois: Marijuana Legalization Effort
Minnesota: Marijuana Legalization Effort
New Jersey: Marijuana Depenalization Effort
New Jersey: Marijuana Legalization Effort
New York: Marijuana Legalization Effort
Vermont: Legislation to Tax and Regulate Marijuana
2018 State Legislation: Decriminalization
Alabama: Marijuana Decriminalization Effort
Pennsylvania: Marijuana Decriminalization Effort
2018 State Legislation: Medical
Timely! New Jersey: Tell Regulators to Put Patients First
California: Protect Medical Marijuana Patients from Employment Discrimination
Colorado: Legislation to Protect Medical Marijuana Patients from Employment Discrimination
Delaware: Legislation to Expand Medical Marijuana Program
Florida: Medical Marijuana Reciprocity Effort
Illinois: Permit Doctors to Recommend Cannabis in Place of Opioids
Louisiana: Legislation to Expand Medical Cannabis Program
New Jersey: Legislation to Expand Patient Access
New Jersey: Let Doctors Decide When to Recommend Medical Marijuana
New Jersey: Protect Medical Marijuana Patients from Employment Discrimination
New York: Legislation to Expand Veteran Access to Medical Marijuana
New York: Let Doctors Decide When to Recommend Medical Marijuana
New York: Permit Physicians to Recommend Cannabis in Place of Opioids
Rhode Island: Protect Medical Marijuana Patients from Employment Discrimination
South Carolina: Medical Marijuana Legislation
Tennessee: Legislation to Establish Medical Marijuana Access
Tennessee: Legislation to Regulate Medical Marijuana Extracts
Tennessee: Medical Marijuana Exemption Bill
District of Columbia: Legislation to Expand Medical Cannabis Access
2018 State Legislation: Other
Alaska: Legislation to Seal Past Marijuana Convictions
Alaska: Legislation to Expand Banking Options to Cannabis Businesses
Alaska: Seeking Sanctuary State Status for Marijuana Operators
California: Legislation to Automatically Expunge Past Marijuana Convictions
California: Legislation to Expand Banking Options for Marijuana Businesses
California: Legislation to make California a Marijuana Industry Sanctuary State
California: Legislation to Temporarily Lower Cannabis Taxes
California: Protect Cannabis Delivery Services
Delaware: Legislation to Expunge Past Cannabis Possession Convictions
Illinois: Legislation to Expunge Past Cannabis Law Violations
Iowa: Legislation to Expand Medical CBD Program
Massachusetts: Bill Seeking Sanctuary State Status for Marijuana Operators
New Hampshire: Legislation to Allow Expungement of Certain Marijuana Convictions
New Jersey: Legislation to Allow Expungement of Marijuana Convictions
New Jersey: Legislation to Protect Cannabis Consumers from Employment Discrimination
Oklahoma: Establish the Oklahoma Cannabis Commission
Pennsylvania: Resolution Urging Congress to Deschedule Marijuana
Vermont: Legislation to Expunge Past Marijuana Convictions
Washington: Legislation to Expand Banking Options for Marijuana Businesses
2018 State Legislation: Hemp
Illinois: Industrial Hemp Expansion Legislation
Iowa: Industrial Hemp Research Legislation
2018 State Legislation NORML Opposes
Missouri: Oppose Unscientific Zero Tolerance DUI Drug Legislation
New Hampshire: Oppose Additional Possession Penalties
Oklahoma: Legislative Effort to Preemptively Amend Pending Medical Marijuana Legislation
Additional Federal Efforts:
Medical: Legislation to Protect Lawful Medical Marijuana Use From Housing Discrimination
Veterans: Legislation to Explicitly Authorize the Veterans Administration to Facilitate Medical Marijuana Research
Medical: Acknowledge the Role of Cannabis in Combating the Prescription Drug Overdose Epidemic
Judicial: Protect Legal Marijuana from Federal Interference
Legalization: The Marijuana Revenue and Regulation Act Introduced (Senate and House Bill)
Veterans: House Bill Introduced to Expand Veterans’ Access to Medical Marijuana
Medical: Legislation To Protect Medical Marijuana Patients Pending In Senate (CARERS Act)
Medical: Bill Seeks to Reschedule Marijuana Under the CSA
Medical: Remove Federal Restrictions on CBD
Judicial: Demand That The New US Attorney’s Respect State Marijuana Laws
Judicial: End Arbitrary License Suspensions For Minor Marijuana Possession (The Better Drive Act)
Economic: Legislation Pending To Halt Federal Forfeiture Actions Against Marijuana Facilities
Economic: Legislation Pending To Cease Penalizing State-Compliant Marijuana Businesses Under the Federal Tax Code
Economic: Support The Secure and Fair Enforcement Banking Act (SAFE Banking Act)
Economic: Support the State Marijuana And Regulatory Tolerance (SMART) Enforcement Act
Economic: Support the Sensible Enforcement Of Cannabis Act
Economic: House and Senate Measures Seek to Protect Marijuana Businesses and Consumers
Economic: The Stop Civil Asset Forfeiture Funding for Marijuana Suppression Act
Hemp: Exclude Hemp From the Controlled Substances Act
Research: Legislation Introduced to Facilitate Federally-Approved Cannabis Research
Science: Legislation To Facilitate Medical Marijuana Research
Advocacy: Tell AAA To Stop Lying About Legalization
Advocacy: Tell President Trump to Abolish the Office of the Drug Czar
Advocacy: Tell the ONDCP Opioid Commission: Medical Marijuana as an Alternative
2018 State Enacted Legislation
Alaska: Industrial Hemp Pilot Program Legislation
Indiana: Legislation to Expand CBD Access
Kansas: Industrial Hemp Pilot Program Legislation
Maine: Legislation Implements Retail Adult Use Sales, Amends Home Grow Limits
Massachusetts: Marijuana Expungement Bill Provision Signed Into Law
Oklahoma: Industrial Hemp Pilot Program Legislation
Utah: Legislation to Allow Medical Marijuana Research
Vermont: Marijuana Depenalization Effort
Virginia: Expand State's Medical CBD Law

     
  Syrian Attack Story

Submitter: [anonymous]
Category: Online Content - Videos
exhibition Date: 2018-04-24 13:00:48
Views: 114
Score: 5.00 / 5.00 (Based on 2 votes.)
 
Anonymous
@Anon_decoder
Apr 14
More
Last night I posted live troop concentration on Duma, attacks by Rus/Assad
Today Duma is under Rus/Assad control
(City of fake gas attack)
Duma was rebel/clown stronghold
https://twitter.com/Anon_decoder/status/985164991547535360

Anonymous
@Anon_decoder
Apr 14
More
Now this is what separate the boys from men:
Putin will say he will retaliate
But under cover of "retaliation" he will bomb the shit out of bad actors his intelligence expose

They tried to start WWIII
Instead they got a rain of fire

Anonymous
@Anon_decoder
Apr 14
More Anonymous Retweeted Breitbart News
Syrian/Rus forces have captured U.K. Operatives in rebel controlled areas
The reports are out there
Some of which I've seen in U.K. News outlets
https://twitter.com/Anon_decoder/status/985166517720449024

Anonymous


@Anon_decoder
Apr 14
More
UK is stronghold of Roths
UK is under control
May is a puppet traitor
Anons been saying for a while that UK may have poisoned Skripals to blame Rus
Now there is evidence Rus not involved

Bad actors in UK working hard to start WW3
https://twitter.com/Anon_decoder/status/985205564237139968

     
  US Police Have Killed 5,000+ Civilians Since 9/11

Submitter: [anonymous]
Category: News / Articles - Government / Politics
exhibition Date: 2014-08-17 16:40:52
Last Update: 2014-08-17 16:42:17
Views: 900
Score: 5.00 / 5.00 (Based on 4 votes.)
 
US Police Have Killed Over 5,000 Civilians Since 9/11
Statistically speaking, Americans should be more fearful of the local cops than “terrorists.”
By Katie Rucke @katierucke | November 6, 2013

Though Americans commonly believe law enforcements role in society is to protect them and ensure peace and stability within the community, the sad reality is that police departments are often more focused on enforcing laws, making arrests and issuing citations. As a result of this as well as an increase in militarized policing techniques, Americans are eight times more likely to be killed by a police officer than by a terrorist, estimates a Washington’s Blog report based on official statistical data.

Though the U.S. government does not have a database collecting information about the total number of police involved shootings each year, it’s estimated that between 500 and 1,000 Americans are killed by police officers each year. Since 9/11, about 5,000 Americans have been killed by U.S. police officers, which is almost equivalent to the number of U.S. soldiers who have been killed in the line of duty in Iraq.

Because individual police departments are not required to submit information regarding the use of deadly force by its officers, some bloggers have taken it upon themselves to aggregate that data. Wikipedia also has a list of “justifiable homicides” in the U.S., which was created by documenting publicized deaths.

Mike Prysner, one of the local directors of the Los Angeles chapter for ANSWER — an advocacy group that asks the public to Act Now to Stop War and End Racism — told Mint Press News earlier this year that the “epidemic” of police harassment and violence is a nationwide issue.

He said groups like ANSWER are trying to hold officers accountable for abuse of power. “[Police brutality] has been an issue for a very long time,” Prysner said, explaining that in May, 13 people were killed in Southern California by police.

As Mint Press News previously reported, each year there are thousands of claims of police misconduct. According to the CATO Institute’s National Police Misconduct Reporting Project, in 2010 there were 4,861 unique reports of police misconduct involving 6,613 sworn officers and 6,826 alleged victims.

Most of those allegations of police brutality involved officers who punched or hit victims with batons, but about one-quarter of the reported cases involved firearms or stun guns.

Racist policing
A big element in the police killings, Prysner says, is racism. “A big majority of those killed are Latinos and Black people,” while the police officers are mostly White, he said. “It’s a badge of honor to shoot gang members so [the police] go out and shoot people who look like gang members,” Prysner argued, giving the example of 34-year-old Rigoberto Arceo, who was killed by police on May 11.

According to a report from the Los Angeles Times, Arceo, who was a biomedical technician at St. Francis Medical Center, was shot and killed after getting out of his sister’s van. The Los Angeles County Sheriff’s Department says Arceo “advanced on the deputy and attempted to take the deputy’s gun.” However, Arceo’s sister and 53-year-old Armando Garcia — who was barbecuing in his yard when the incident happened — say that Arceo had his hands above his head the entire time.

Prysner is not alone in his assertion that race is a major factor in officer-related violence. This past May, a study from the the Malcolm X Grassroots Movement, an anti-racist activist organization, found that police officers, security guards or self-appointed vigilantes killed at least 313 Black people in 2012 — meaning one Black person was killed in the U.S. by law enforcement roughly every 28 hours.

Prysner said the relationship between police departments and community members needs to change and that when police shoot an unarmed person with their arms in the air over their head, the officer should be punished.

Culture of misconduct
“You cannot have a police force that is investigating and punishing itself,” Prysner said, adding that taxpayer money should be invested into the community instead of given to police to buy more guns, assault rifles and body armor.

Dissatisfied with police departments’ internal review policies, some citizens have formed volunteer police watch groups to prevent the so-called “Blue Code of Silence” effect and encourage police officers to speak out against misconduct occurring within their department.

As Mint Press News previously reported, a report released earlier this year found that of the 439 cases of police misconduct that then had been brought before the Minneapolis’s year-old misconduct review board, not one of the police officers involved has been disciplined.

Although the city of Minneapolis spent $14 million in payouts for alleged police misconduct between 2006 and 2012, despite the fact that the Minneapolis Police Department often concluded that the officers involved in those cases did nothing wrong.

Other departments have begun banning equipment such as Tasers, but those decisions were likely more about protecting the individual departments from lawsuits than ensuring that officers are not equipped with weapons that cause serious and sometimes fatal injuries when used.

To ensure officers are properly educated on how to use their weapons and are aware of police ethics, conflict resolution and varying cultures within a community, police departments have historically held training programs for all officers. But due to tighter budgets and a shift in priorities, many departments have not provided the proper continuing education training programs for their officers.

Charles Ramsey, president of both the Major Cities Chiefs Association and the Police Executive Research Forum, called that a big mistake, explaining that it is essential officers are trained and prepared for high-stress situations:

“Not everybody is going to be able to make those kinds of good decisions under pressure, but I do think that the more reality-based training that we provide, the more we put people in stressful situations to make them respond and make them react.”



GI Joe replaces Carl Winslow
In order to help local police officers protect themselves while fighting the largely unsuccessful War on Drugs, the federal government passed legislation in 1994 allowing the Pentagon to donate surplus military equipment from the Cold War to local police departments. Meaning that “weaponry designed for use on a foreign battlefield has been handed over for use on American streets … against American citizens.”

So while the U.S. military fights the War on Terror abroad, local police departments are fighting another war at home with some of the same equipment as U.S. troops, and protocol that largely favors officers in such tactics as no-knock raids.

Radley Balko, author of “Rise of the Warrior Cop,” wrote in the Wall Street Journal in August:

“Since the 1960s, in response to a range of perceived threats, law-enforcement agencies across the U.S., at every level of government, have been blurring the line between police officer and soldier.

“Driven by martial rhetoric and the availability of military-style equipment—from bayonets and M-16 rifles to armored personnel carriers—American police forces have often adopted a mind-set previously reserved for the battlefield. The war on drugs and, more recently, post-9/11 antiterrorism efforts have created a new figure on the U.S. scene: the warrior cop—armed to the teeth, ready to deal harshly with targeted wrongdoers, and a growing threat to familiar American liberties.”

As Mint Press News previously reported, statistics from an FBI report released in September reveal that a person is arrested on marijuana-related charges in the U.S. every 48 seconds, on average — most were for simple possession charges.

According to the FBI’s report, there were more arrests for marijuana possession than for the violent crimes of murder and nonnegligent manslaughter, forcible rape, robbery and aggravated assault — 658,231 compared with 521,196 arrests.

While groups that advocate against police brutality recognize and believe that law enforcement officials should be protected while on duty, many say that local police officers do not need to wear body armor, Kevlar helmets and tactical equipment vests — all while carrying assault weapons.

“We want the police to keep up with the latest technology. That’s critical,” American Civil Liberties Union senior counsel Kara Dansky said. “But policing should be about protection, not combat.”

According to the National Law Enforcement Officers Memorial Fund, there are more than 900,000 sworn law enforcement officers in the United States. In 2012, 120 officers were killed in the line of duty. The deadliest day in law enforcement history was reportedly Sept. 11, 2001, when 72 officers were killed.

Despite far fewer officers dying in the line of duty compared with American citizens, police departments are not only increasing their use of protective and highly volatile gear, but are increasingly setting aside a portion of their budget to invest in new technology such as drones, night vision goggles, remote robots, surveillance cameras, license plate readers and armored vehicles that amount to unarmed tanks.

Though some officers are on board with the increased militarization and attend conferences such as the annual Urban Shield event, others have expressed concern with the direction the profession is heading.

For example, former Arizona police officer Jon W. McBride said police concerns about being “outgunned” were likely a “self-fulfilling prophecy.” He added that “if not expressly prohibited, police managers will continually push the arms race,” because “their professional literature is predominately [sic] based on the acquiring and use of newer weapons and more aggressive techniques to physically overwhelm the public. In many cases, however, this is the opposite of smart policing.”

“Coupled with the paramilitary design of the police bureaucracy itself, the police give in to what is already a serious problem in the ranks: the belief that the increasing use of power against a citizen is always justified no matter the violation. The police don’t understand that in many instances they are the cause of the escalation and bear more responsibility during an adverse outcome.

“The suspects I encountered as a former police officer and federal agent in nearly all cases granted permission for me to search their property when asked, often despite unconcealed contraband. Now, instead of making a simple request of a violator, many in law enforcement seem to take a more difficult and confrontational path, fearing personal risk. In many circumstances they inflame the citizens they are engaging, thereby needlessly putting themselves in real and increased jeopardy.”

Another former police officer who wished to remain anonymous agreed with McBride and told Balko,

“American policing really needs to return to a more traditional role of cops keeping the peace; getting out of police cars, talking to people, and not being prone to overreaction with the use of firearms, tasers, or pepper spray. … Don’t get me wrong, I’ve been in more than my share tussles and certainly appreciate the dangers of police work, but as Joseph Wambaugh famously said, the real danger is psychological, not physical.”

     
  63% of Citizens Think Marijuana Should Be Legal

Submitter: [anonymous]
Category: News / Articles - Health / Medical
exhibition Date: 2018-04-29 07:01:19
Last Update: 2018-05-02 02:33:13
Views: 179
Score: 5.00 / 5.00 (Based on 1 votes.)
 
https://poll.qu.edu/national/release-detail?ReleaseID=2539

American voters have a 30 - 41 percent negative opinion of former FBI Director James Comey, but they believe him more than President Donald Trump 54 - 35 percent, according to a Quinnipiac University National Poll released today.

Believing President Trump more than Comey are Republicans 76 - 13 percent, white men 47 - 39 percent and white voters with no college degree, 47 - 40 percent, the independent Quinnipiac (KWIN-uh-pe-ack) University Poll finds. Every other party, gender, education, age and racial group backs Comey.

American voters believe 53 - 35 percent that the Russian government has compromising information about President Trump. Only Republicans and white men don't believe this. White voters with no college degree are divided 45 - 46 percent.

Trump should not fire Special Counsel Robert Mueller, voters say 74 - 13 percent, including 59 - 25 percent among Republicans. But voters are divided in their support of a bill to prevent the president from firing the special counsel with 46 percent supporting the bill and 44 percent opposed. Voters oppose 52 - 42 percent impeaching Trump if he fires Mueller.

American voters say 54 - 31 percent that Mueller is conducting a fair investigation into possible links between the Russian government and the 2016 Trump presidential campaign.

Asked differently, 52 percent of voters say the investigation is legitimate and 44 percent say it is a "political witch hunt."

"American voters aren't enamored of former FBI Director James Comey, but they trust, by 19 points, his version of events more than President Donald Trump's version," said Peter A. Brown, assistant director of the Quinnipiac University Poll.

"Americans also seem to be on Independent Counsel Robert Mueller's side in his ongoing look at the president and his people."

American voters disapprove 52 - 25 percent of the job Scott Pruitt is doing as Administrator of the Environmental Protection Agency.

The news media is an important part of democracy, 66 percent of American voters say, while 22 percent say the media is the enemy of the people. Republicans say 51 - 37 percent that the media is the enemy of the people, rather than an important part of democracy, the only group to believe that. Voters trust the media more than President Trump 53 - 37 percent to tell the truth about important issues.

Legalizing Marijuana

American voters support 63 - 33 percent legalizing marijuana in the U.S., the highest level of support ever measured in a Quinnipiac University Poll. The previous high was 61 - 33 percent in an August 3, 2017 survey.

Support for use of medical marijuana is 93 - 5 percent, similar to prior polls.

There is a wide gender gap as 43 percent of American voters say they have used recreational marijuana, including 54 percent of men and 33 percent of women.

Voters oppose 70 - 23 percent enforcement of federal laws against marijuana in states that have legalized medical or recreational marijuana. In fact, voters support 74 - 20 percent a bill protecting states with legal medical or recreational marijuana from federal prosecution.

Recreational marijuana is legal in the state in which they live, 22 percent of voters say. Increased revenue from taxes on recreational marijuana is a good reason to legalize marijuana, voters say 54 - 42 percent.

American voters say 61 - 31 percent that marijuana is not a "gateway drug."

Legalizing marijuana will make people more likely to use opioids, 20 percent of voters say, while 20 percent say it will be less likely to lead to opioid use and 56 percent say legalized marijuana will not have much impact on opioid use.

"Voters are more favorable to legalizing marijuana than in any previous Quinnipiac University survey, and do not see its use as a gateway to more serious drugs," Brown said.

From April 20 - 24, Quinnipiac University surveyed 1,193 voters nationwide, with a margin of error of +/- 3.4 percentage points, including the design effect. Live interviewers call landlines and cell phones.

The Quinnipiac University Poll, directed by Douglas Schwartz, Ph.D., conducts nationwide public opinion surveys, and statewide polls in Pennsylvania, New York, New Jersey, Connecticut, Florida, Ohio, Virginia, Iowa, Colorado and Texas as a public service and for research.

Visit poll.qu.edu or www.facebook.com/quinnipiacpoll

Call (203) 582-5201, or follow us on Twitter @QuinnipiacPoll.


15. Do you approve or disapprove of the way Scott Pruitt is handling his job as Administrator of the Environmental Protection Agency?
WHITE......
COLLEGE DEG
Tot Rep Dem Ind Men Wom Yes No

Approve 25% 51% 7% 20% 31% 20% 22% 31%
Disapprove 52 18 76 61 52 52 58 45
DK/NA 23 31 16 19 16 28 20 24

AGE IN YRS.............. WHITE.....
18-34 35-49 50-64 65+ Men Wom Wht Blk Hsp

Approve 20% 20% 30% 28% 32% 22% 26% 18% 28%
Disapprove 60 53 52 48 53 51 52 54 46
DK/NA 20 27 18 24 15 28 22 27 25


26. Is your opinion of James Comey favorable, unfavorable or haven't you heard enough about him?
WHITE......
COLLEGE DEG
Tot Rep Dem Ind Men Wom Yes No

Favorable 30% 8% 49% 34% 28% 32% 37% 23%
Unfavorable 41 67 20 40 46 37 45 46
Hvn't hrd enough 25 23 26 23 24 27 14 29
REFUSED 3 2 5 3 3 4 5 2

AGE IN YRS.............. WHITE.....
18-34 35-49 50-64 65+ Men Wom Wht Blk Hsp

Favorable 21% 28% 38% 32% 27% 33% 30% 38% 16%
Unfavorable 30 41 40 49 52 40 45 22 42
Hvn't hrd enough 47 28 17 15 19 23 21 37 37
REFUSED 2 3 5 4 2 5 4 3 5

TREND: Is your opinion of James Comey favorable, unfavorable or haven't you heard enough about him?
Fav Unfav HvntHrd REF

Apr 26, 2018 30 41 25 3
Jun 29, 2017 38 36 21 4
Jun 07, 2017 30 34 31 4
May 24, 2017 32 33 31 4


27. Who do you trust more to tell you the truth about important issues: President Trump or former FBI Director James Comey?
WHITE......
COLLEGE DEG
Tot Rep Dem Ind Men Wom Yes No

Trump 35% 76% 6% 27% 41% 29% 33% 47%
Comey 54 13 90 59 46 61 57 40
DK/NA 12 10 5 14 13 10 10 13

AGE IN YRS.............. WHITE.....
18-34 35-49 50-64 65+ Men Wom Wht Blk Hsp

Trump 23% 31% 36% 46% 47% 34% 40% 9% 31%
Comey 61 55 55 49 39 57 49 81 56
DK/NA 16 14 9 5 14 9 11 10 13

TREND: Who do you trust more to tell you the truth about important issues: President Trump or former FBI Director James Comey?
Trump Comey DK/NA

Apr 26, 2018 35 54 12
Dec 12, 2017 32 56 12
Jun 29, 2017 36 56 8


28. Who do you trust more to tell you the truth about important issues: President Trump or the news media?
WHITE......
COLLEGE DEG
Tot Rep Dem Ind Men Wom Yes No

Trump 37% 81% 4% 31% 42% 32% 36% 51%
News media 53 13 90 54 46 59 54 40
DK/NA 10 6 6 14 12 9 11 10

AGE IN YRS.............. WHITE.....
18-34 35-49 50-64 65+ Men Wom Wht Blk Hsp

Trump 29% 33% 37% 45% 49% 37% 43% 12% 35%
News media 56 57 55 47 38 54 47 77 53
DK/NA 15 10 8 7 12 8 10 11 12

TREND: Who do you trust more to tell you the truth about important issues: President Trump or the news media?
News
Trump Media DK/NA

Apr 26, 2018 37 53 10
Nov 14, 2017 34 54 12
Oct 12, 2017 37 52 11
Aug 23, 2017 36 54 10
Aug 16, 2017 37 55 9
May 25, 2017 34 53 13
May 10, 2017 31 57 12
Mar 07, 2017 37 53 10
Feb 22, 2017 37 52 10


29. Which comes closer to your point of view: the news media is the enemy of the people, or the news media is an important part of democracy?
WHITE......
COLLEGE DEG
Tot Rep Dem Ind Men Wom Yes No

Enemy of the people 22% 51% 3% 16% 26% 18% 20% 33%
Part of democracy 66 37 91 70 62 70 71 56
NEITHER(VOL) 4 4 2 5 4 4 4 4
DK/NA 8 8 4 9 8 7 5 7

AGE IN YRS.............. WHITE.....
18-34 35-49 50-64 65+ Men Wom Wht Blk Hsp

Enemy of the people 19% 18% 24% 27% 32% 22% 26% 7% 20%
Part of democracy 62 72 70 62 57 70 64 78 65
NEITHER(VOL) 6 4 2 4 5 4 4 2 2
DK/NA 13 5 4 7 7 5 6 14 12


30. If the Democratic party wins control of the House of Representatives in 2018, would you like to see them begin the process to impeach President Trump, or not?
WHITE......
COLLEGE DEG
Tot Rep Dem Ind Men Wom Yes No

Yes/Impeach 38% 6% 71% 38% 32% 44% 34% 30%
No 55 92 21 54 63 47 59 65
DK/NA 7 2 8 8 5 9 7 5

AGE IN YRS.............. WHITE.....
18-34 35-49 50-64 65+ Men Wom Wht Blk Hsp

Yes/Impeach 48% 40% 40% 31% 22% 41% 32% 69% 46%
No 44 55 56 60 74 52 62 23 47
DK/NA 8 5 4 8 4 8 6 8 7

TREND: If the Democratic party wins control of the House of Representatives in 2018, would you like to see them begin the process to impeach President Trump, or not?
Yes/
Impeach No DK/NA

Apr 26, 2018 38 55 7
Jan 10, 2018 45 51 5


35. Do you think that the use of marijuana should be made legal in the United States, or not?
WHITE......
COLLEGE DEG
Tot Rep Dem Ind Men Wom Yes No

Yes 63% 41% 75% 67% 65% 60% 61% 62%
No 33 55 21 27 29 36 36 33
DK/NA 4 4 4 5 5 4 3 5

AGE IN YRS.............. WHITE.....
18-34 35-49 50-64 65+ Men Wom Wht Blk Hsp

Yes 82% 70% 63% 43% 61% 62% 62% 71% 60%
No 16 25 33 52 34 34 34 26 34
DK/NA 3 4 5 5 4 4 4 3 5

TREND: Do you think that the use of marijuana should be made legal in the United States, or not?
Yes No DK/NA

Apr 26, 2018 63 33 4
Jan 11, 2018 58 36 6
Aug 03, 2017 61 33 5
Apr 20, 2017 60 34 6
Feb 23, 2017 59 36 5
Jun 06, 2016 54 41 5
Dec 05, 2012 51 44 5


36. Do you support or oppose allowing adults to legally use marijuana for medical purposes if their doctor prescribes it?
WHITE......
COLLEGE DEG
Tot Rep Dem Ind Men Wom Yes No

Support 93% 86% 97% 95% 93% 94% 95% 91%
Oppose 5 12 2 4 6 5 4 8
DK/NA 1 2 1 1 1 1 1 1

AGE IN YRS.............. WHITE.....
18-34 35-49 50-64 65+ Men Wom Wht Blk Hsp

Support 96% 93% 95% 91% 92% 94% 93% 95% 95%
Oppose 4 5 5 7 7 5 6 5 2
DK/NA - 2 1 2 1 1 1 - 3

TREND: Do you support or oppose allowing adults to legally use marijuana for medical purposes if their doctor prescribes it?
Sup Opp DK/NA

Apr 26, 2018 93 5 1
Jan 11, 2018 91 6 2
Aug 03, 2017 94 4 1
Apr 20, 2017 94 5 1
Feb 23, 2017 93 6 1
Jun 06, 2016 89 9 2


37. Keeping in mind that your answers are confidential, have you ever recreationally used marijuana or not?
WHITE......
COLLEGE DEG
Tot Rep Dem Ind Men Wom Yes No

Yes 43% 28% 53% 45% 54% 33% 43% 44%
No 54 70 45 52 44 64 55 53
DK/NA 2 2 1 3 2 2 2 3

AGE IN YRS.............. WHITE.....
18-34 35-49 50-64 65+ Men Wom Wht Blk Hsp

Yes 63% 50% 46% 25% 53% 36% 44% 53% 49%
No 37 49 51 74 45 62 54 45 50
DK/NA - 2 4 1 2 3 2 2 1


38. If you agreed with a political candidate on other issues, but not on the issue of legalizing marijuana, do you think you could still vote for that candidate or not?
WHITE......
COLLEGE DEG
Tot Rep Dem Ind Men Wom Yes No

Yes 82% 75% 87% 86% 83% 81% 87% 79%
No 13 19 8 11 14 12 8 16
DK/NA 5 6 5 3 3 7 6 5

AGE IN YRS.............. WHITE.....
18-34 35-49 50-64 65+ Men Wom Wht Blk Hsp

Yes 84% 89% 84% 73% 84% 82% 83% 86% 69%
No 13 8 11 19 13 11 12 11 25
DK/NA 3 3 5 8 3 7 5 3 6


39. Would you support or oppose the government enforcing federal laws against marijuana in states that have already legalized medical or recreational marijuana?
WHITE......
COLLEGE DEG
Tot Rep Dem Ind Men Wom Yes No

Support 23% 38% 14% 19% 26% 20% 21% 22%
Oppose 70 52 83 76 70 70 72 70
DK/NA 7 10 4 6 4 10 8 7

AGE IN YRS.............. WHITE.....
18-34 35-49 50-64 65+ Men Wom Wht Blk Hsp

Support 21% 24% 19% 26% 26% 17% 21% 24% 35%
Oppose 75 73 76 61 69 73 71 71 61
DK/NA 4 4 5 12 5 9 7 4 4

TREND: Would you support or oppose the government enforcing federal laws against marijuana in states that have already legalized medical or recreational marijuana?
Sup Opp DK/NA

Apr 26, 2018 23 70 7
Jan 11, 2018 23 70 7
Aug 03, 2017 20 75 5
Apr 20, 2017 21 73 6
Feb 23, 2017 23 71 6


40. Would you support or oppose a bill protecting states that have legalized medical or recreational marijuana from federal prosecution?
WHITE......
COLLEGE DEG
Tot Rep Dem Ind Men Wom Yes No

Support 74% 52% 88% 77% 75% 73% 74% 72%
Oppose 20 38 10 17 21 19 19 20
DK/NA 6 10 2 6 4 8 7 8

AGE IN YRS.............. WHITE.....
18-34 35-49 50-64 65+ Men Wom Wht Blk Hsp

Support 81% 78% 78% 63% 74% 73% 73% 75% 79%
Oppose 16 20 18 25 20 19 19 22 16
DK/NA 3 3 4 12 6 9 7 3 6


41. Is recreational marijuana legal in the state in which you live, or not?
WHITE......
COLLEGE DEG
Tot Rep Dem Ind Men Wom Yes No

Yes/Legal 22% 17% 25% 26% 23% 22% 21% 21%
No 72 76 69 71 74 71 74 75
DK/NA 5 7 6 3 4 7 5 4

AGE IN YRS.............. WHITE.....
18-34 35-49 50-64 65+ Men Wom Wht Blk Hsp

Yes/Legal 28% 18% 25% 17% 21% 21% 21% 13% 36%
No 72 76 71 74 76 73 74 82 52
DK/NA - 6 4 10 3 6 5 5 12


41a. (If yes/legal q41) Do you think that legalizing recreational marijuana has been good for your state or bad for your state?
IF YES/LEGAL Q41
Tot Men Wom

Good 48% 57% 40%
Bad 25 27 24
DK/NA 26 16 36


42. As you may know, legalizing recreational marijuana allows states to tax the sale of marijuana, which can result in increased revenue. Do you think that increasing revenue in your state is a good reason or a bad reason for recreational marijuana to be legalized?
WHITE......
COLLEGE DEG
Tot Rep Dem Ind Men Wom Yes No

Good reason 54% 35% 66% 58% 58% 50% 51% 53%
Bad reason 42 61 29 38 39 44 46 45
DK/NA 4 4 4 4 2 6 3 2

AGE IN YRS.............. WHITE.....
18-34 35-49 50-64 65+ Men Wom Wht Blk Hsp

Good reason 76% 63% 54% 33% 53% 51% 52% 64% 61%
Bad reason 20 34 43 62 44 46 46 29 31
DK/NA 5 3 3 5 2 3 3 7 7


43. Do you consider marijuana a so-called "gateway drug", or not?
WHITE......
COLLEGE DEG
Tot Rep Dem Ind Men Wom Yes No

Yes/Gateway drug 31% 47% 18% 30% 29% 33% 35% 30%
No 61 45 74 62 64 57 58 62
DK/NA 8 8 8 8 7 9 8 8

AGE IN YRS.............. WHITE.....
18-34 35-49 50-64 65+ Men Wom Wht Blk Hsp

Yes/Gateway drug 18% 31% 31% 39% 31% 33% 32% 27% 24%
No 78 63 62 48 63 57 60 62 64
DK/NA 5 6 8 13 6 10 8 10 12


44. Do you think that legalizing marijuana will make people more likely to use opioids, less likely to use opioids, or don't you think legalizing marijuana will have much impact either way?
WHITE......
COLLEGE DEG
Tot Rep Dem Ind Men Wom Yes No

More likely 20% 36% 12% 17% 21% 20% 22% 21%
Less likely 20 12 26 20 20 19 20 17
Not much impact 56 47 60 60 54 56 53 57
DK/NA 5 6 2 3 4 5 5 5

AGE IN YRS.............. WHITE.....
18-34 35-49 50-64 65+ Men Wom Wht Blk Hsp

More likely 8% 20% 20% 31% 24% 20% 22% 18% 18%
Less likely 28 27 16 11 20 17 18 22 23
Not much impact 60 50 61 53 52 57 55 59 54
DK/NA 4 3 3 6 5 6 5 1 4


45. As you may know, Special Counsel Robert Mueller was appointed to oversee the criminal investigation into any links or coordination between President Trump's campaign and the Russian government. Do you think that he is conducting a fair investigation into this matter, or not?
WHITE......
COLLEGE DEG
Tot Rep Dem Ind Men Wom Yes No

Yes/Fair 54% 26% 79% 58% 52% 57% 62% 44%
No 31 61 9 26 35 28 28 39
DK/NA 15 13 12 16 13 16 10 17

AGE IN YRS.............. WHITE.....
18-34 35-49 50-64 65+ Men Wom Wht Blk Hsp

Yes/Fair 49% 60% 61% 51% 49% 56% 53% 60% 56%
No 27 26 32 36 38 29 33 21 31
DK/NA 24 14 7 13 12 15 14 19 13

TREND: As you may know, Special Counsel Robert Mueller was appointed to oversee the criminal investigation into any links or coordination between President Trump's campaign and the Russian government. Do you think that he is conducting a fair investigation into this matter, or not?
Yes/
Fair No DK/NA

Apr 26, 2018 54 31 15
Apr 10, 2018 52 32 17
Mar 07, 2018 58 28 14
Feb 06, 2018 56 28 16
Jan 11, 2018 59 26 15
Dec 12, 2017 58 29 13
Nov 15, 2017 60 27 13


46. Do you think President Trump should fire Special Counsel Robert Mueller, or don't you think so?
WHITE......
COLLEGE DEG
Tot Rep Dem Ind Men Wom Yes No

Yes/Fire 13% 25% 6% 9% 17% 10% 9% 17%
No 74 59 82 82 75 73 83 66
DK/NA 12 16 12 9 8 17 9 17

AGE IN YRS.............. WHITE.....
18-34 35-49 50-64 65+ Men Wom Wht Blk Hsp

Yes/Fire 19% 10% 13% 12% 18% 9% 13% 10% 27%
No 61 77 79 80 74 75 74 81 57
DK/NA 21 13 8 8 8 16 13 9 16

TREND: Do you think President Trump should fire Special Counsel Robert Mueller, or don't you think so?
Yes/
Fire No DK/NA

Apr 26, 2018 13 74 12
Apr 10, 2018 13 69 18


47. Would you support or oppose a bill to prevent President Trump from firing Special Counsel Robert Mueller?
WHITE......
COLLEGE DEG
Tot Rep Dem Ind Men Wom Yes No

Support 46% 17% 73% 48% 43% 48% 51% 35%
Oppose 44 74 17 42 49 39 41 51
DK/NA 11 9 10 10 8 13 8 14

AGE IN YRS.............. WHITE.....
18-34 35-49 50-64 65+ Men Wom Wht Blk Hsp

Support 43% 46% 53% 45% 38% 48% 43% 60% 46%
Oppose 39 43 42 47 53 39 46 31 43
DK/NA 18 11 6 7 9 13 11 9 11


48. Do you think President Trump should be impeached and removed from office if he fires Special Counsel Robert Mueller, or don't you think so?
WHITE......
COLLEGE DEG
Tot Rep Dem Ind Men Wom Yes No

Yes/Impeached 42% 6% 76% 43% 36% 47% 40% 29%
No 52 91 16 51 57 46 54 65
DK/NA 7 3 8 6 7 7 6 6

AGE IN YRS.............. WHITE.....
18-34 35-49 50-64 65+ Men Wom Wht Blk Hsp

Yes/Impeached 43% 42% 48% 37% 27% 41% 35% 77% 48%
No 45 51 49 60 68 52 59 13 47
DK/NA 12 7 4 4 5 7 6 10 5

TREND: Do you think President Trump should be impeached and removed from office if he fires Special Counsel Robert Mueller, or don't you think so?
Yes/
Impeach No DK/NA

Apr 26, 2018 42 52 7
Feb 06, 2018 46 47 8


49. Do you think that the investigation into any links or coordination between President Trump's 2016 election campaign and the Russian government is a legitimate investigation, or do you think it is a political witch hunt?
WHITE......
COLLEGE DEG
Tot Rep Dem Ind Men Wom Yes No

Legitimate 52% 14% 88% 53% 48% 56% 58% 39%
Political witch hunt 44 82 9 43 49 38 39 56
DK/NA 4 4 3 4 3 6 3 5

AGE IN YRS.............. WHITE.....
18-34 35-49 50-64 65+ Men Wom Wht Blk Hsp

Legitimate 60% 55% 56% 43% 41% 56% 49% 69% 49%
Political witch hunt 35 40 43 53 55 41 47 24 47
DK/NA 5 5 2 4 4 4 4 7 5

TREND: Do you think that the investigation into any links or coordination between President Trump's 2016 election campaign and the Russian government is a legitimate investigation, or do you think it is a political witch hunt?
Legit- Witch
mate Hunt DK/NA

Apr 26, 2018 52 44 4
Mar 07, 2018 53 42 5
Feb 06, 2018 50 42 7
Jan 18, 2018 52 43 5


50. Do you believe that the Russian government has compromising information about President Trump, or don't you believe that the Russian government has that kind of information about President Trump?
WHITE......
COLLEGE DEG
Tot Rep Dem Ind Men Wom Yes No

Yes/Has info 53% 21% 83% 53% 46% 58% 50% 45%
No 35 67 9 33 41 30 34 46
DK/NA 12 12 8 13 13 12 16 9

AGE IN YRS.............. WHITE.....
18-34 35-49 50-64 65+ Men Wom Wht Blk Hsp

Yes/Has info 62% 49% 53% 53% 38% 56% 48% 81% 61%
No 26 37 39 35 48 33 40 12 31
DK/NA 11 14 8 13 15 11 13 7 7

     
  R-Modafinil Attenuates Nicotine-Taking and Seeking

Submitter: [anonymous]
Category: News / Articles - Health / Medical
exhibition Date: 2018-02-22 19:11:35
Last Update: 2018-03-07 03:47:35
Views: 164
Score: 5.00 / 5.00 (Based on 2 votes.)
 
Neuropsychopharmacology
Nature Publishing Group
R-Modafinil Attenuates Nicotine-Taking and Nicotine-Seeking Behavior in Alcohol-Preferring Rats
Xiao-Fei Wang, Guo-Hua Bi, [...], and Amy Hauck Newman

Additional article information

Abstract
(±)-Modafinil (MOD) is used clinically for the treatment of sleep disorders and has been investigated as a potential medication for the treatment of psychostimulant addiction. However, the therapeutic efficacy of (±)-MOD for addiction is inconclusive. Herein we used animal models of self-administration and in vivo microdialysis to study the pharmacological actions of R-modafinil (R-MOD) and S-modafinil (S-MOD) on nicotine-taking and nicotine-seeking behavior, and mechanisms underlying such actions. We found that R-MOD is more potent and effective than S-MOD in attenuating nicotine self-administration in Long–Evans rats. As Long–Evans rats did not show a robust reinstatement response to nicotine, we used alcohol-preferring rats (P-rats) that display much higher reinstatement responses to nicotine than Long–Evans rats. We found that R-MOD significantly inhibited intravenous nicotine self-administration, nicotine-induced reinstatement, and nicotine-associated cue-induced drug-seeking behavior in P-rats. R-MOD alone neither sustained self-administration in P-rats previously self-administering nicotine nor reinstated extinguished nicotine-seeking behavior. The in vivo brain microdialysis assays demonstrated that R-MOD alone produced a slow-onset moderate increase in extracellular DA. Pretreatment with R-MOD dose-dependently blocked nicotine-induced dopamine (DA) release in the nucleus accumbens (NAc) in both naive and nicotine self-administrating rats, suggesting a DA-dependent mechanism underlying mitigation of nicotine\'s effects. In conclusion, the present findings support further investigation of R-MOD for treatment of nicotine dependence in humans

     
  InterServer Hosting

Submitter: [anonymous]
Category: Online Content - Web Tools
exhibition Date: 2018-08-15 00:30:40
Last Update: 2018-08-15 01:19:42
Views: 4
Score: (not yet rated)
 
Use this link to get your first month for $.01 with code; TRYINTERSERVER

$5 per month is the normal price

     
  BakaBT - High Quality Anime Bittorrent Tracker

Submitter: [anonymous]
Category: Downloads - Miscellaneous
exhibition Date: 2014-08-05 01:21:55
Views: 758
Score: (not yet rated)
 
What makes BakaBT different?

There are many anime torrent sites but BakaBT is unique in the quality of our content. Our goal is to provide torrents only for completed anime or anime-related material and we pick only the best versions. We do not accept public submissions; only Power Users and Power Uploaders may do so.
All submissions are thoroughly checked before they are added to our ever-growing list of series; by ever-growing, we really mean ever-growing in the sense that even old torrents are still seeded. Our mantra in short: quality over quantity, and ease-of-use.

     
  http://www.weisersecurity.com/

Submitter: [anonymous]
Category: Other - Miscellaneous
exhibition Date: 2015-01-16 04:54:23
Last Update: 2015-01-16 06:22:29
Views: 665
Score: 5.00 / 5.00 (Based on 1 votes.)
 
Hitrring officers and accepting new clients now.

     
  Torrentbit - Bittorrent Tracker

Submitter: [anonymous]
Category: Downloads - Miscellaneous
exhibition Date: 2014-08-05 01:15:04
Last Update: 2014-08-05 10:08:16
Views: 639
Score: (not yet rated)
 

     
  PPARδ agonist GW501516 for enhancing running

Submitter: [anonymous]
Category: Guides / Tutorials - Health / Medical
exhibition Date: 2017-01-24 01:00:29
Views: 424
Score: 5.00 / 5.00 (Based on 1 votes.)
 
A metabolomic study of the PPARδ agonist GW501516 for enhancing running endurance in Kunming mice
Wei Chen, Rong Gao[…]Lili Wang
Scientific Reports 5, Article number: 9884 (2015)
doi:10.1038/srep09884

Published online:
06 May 2015

Discussion

This study demonstrated that GW501516 increases exhaustive running performance and the proportion of SDH-positive muscle fibres in both trained and untrained mice. Slow-twitch myofibres are rich in mitochondria and have a high oxidative capacity. Formation of slow-twitch muscle fibres revolves around PGC-1α and its transcripts17,18. Like exercise, GW501516 alone is sufficient to improve running endurance of untrained mice, even after only 1 week of administration (Supplementary Fig. S1 online). Enhanced running endurance is the results of increased fatty acid utilization after PPARδ activation that upregulates PDK4 and other key components of fatty acid oxidation pathways. Accordingly, blood glucose levels of GW501516-treated mice were significantly higher after exercise while blood lactate was lower compared to untrained controls. Although GW501516 or exercise each enhanced fatty acid oxidation in skeletal muscle, GW501516 predominately induces fatty acid metabolism, while training also induced protein metabolism as an energy source.

Studies have demonstrated that GW501516 significantly increased the running performance of trained C57Bl/6J mice5, but not in untrained mice that were treated with 5 mg/kg over periods lasting 4 weeks to 5 months, or 3–30 mg/kg/day gavaged for 2 months5. Our study found that GW501516 increased running performance in KM mice regardless of training and the magnitude of improvement was unexpectedly greater for untrained mice. This finding could be due to different GW501516 administration protocols, exhaustive running protocols, or strain differences. In this study, running performance was determined by wheel running rather than treadmill running because it is more natural for mice, which are specialized climbers, and better measures their natural running abilities. Additionally, studies have shown significant differences in aerobic capacity, treadmill performance, and exercise training responses between different inbred and hybrid rodent strains19,20. The running distance of untreated trained mice (TN) was relatively higher than that of GW501516-treated untrained mice (NG). The effects of wheel training and the skills acquired during the training period cannot be ignored, but are difficult to control for.

PPARδ is the principle isoform involved in regulating muscle fuel utilization. Previous studies demonstrated that changes in expression of genes regulated by PPARδ occurred after 3 days of GW501516 treatment5. We also found that expression of PGC1α, PDK4, and selective biomarkers for fatty acid β oxidation in skeletal muscle were significantly increased by GW501516 treatment. Both palmitic acid and the earlier intermediate in the fatty acid oxidation pathway, 3-hydroxy-hexadecanoic acid, were elevated compared to untrained control mice. However, why the downstream products of fatty acid oxidation were not found to be increased in the GW501516-treated group warrants further investigation. Additionally, GW17046 (another PPARδ agonist) treatment in ob/ob mice markedly reduced levels of saturated long chain fatty acids (15–24 carbon atoms) in untrained GW501516-treated (NG) mice compared to untreated untrained (NN) mice21. This result suggests that unlike exercise, GW501516 is limited to promoting hydrolysis of triglycerides and that the increased serum palmitic acid observed in GW501516-treated (NG) mice may be due to the catabolism of saturated fatty acids. In contrast, the decrease in serum saturated fatty acids was completely reversed when GW501516 treatment was combined with training. Presumably, this is because of enhanced fat metabolism. GW501516 also increased blood glucose and lowered blood lactate compared to control mice, particularly after running tests and in trained mice. This suggests that glycolysis in muscle tissue is reduced after treatment with GW501516, and becomes more apparent immediately after the exhaustive running (Fig. 1 and Supplementary Fig. S1 online). Consistent with this reduced glucose metabolism, increased serum galactose was also only observed after GW501516 treatment. Although glycolytic metabolism of galactose yields no net adenosine triphosphate (ATP), previous research demonstrated that galactose induces a metabolic shift towards a more oxidative phenotype and enhances aerobic mitochondrial metabolism in myotubes22.

PPARδ is intricately involved in enhanced running endurance. It mediates oxidative adaption following exercise training and increased expression in skeletal muscle was reported after both acute exercise and endurance training12,23,24. Similar to chemical activation of PPARδ, endurance training increases fatty acid metabolism in skeletal muscle and reduced lactate production during exercise25. Accordingly, the running distance of untreated trained (TN) mice is over 100% greater of that of untreated untrained (NN), blood glucose levels in the TN group are significantly higher and blood lactate levels are significantly lower than those measured in the NN group. Enhanced fatty acid oxidation in skeletal muscle was also observed by measuring elevated components of the fatty acid oxidation pathway including palmitic acid and octanoic acid. Caproic acid and butyric acid were not significantly different between groups in our assay, but the sensitivity to detect these metabolites may be insufficient. The underlying mechanism for PPARδ and PPARα activation to increase fatty acid oxidation in skeletal muscle is by upregulating components of the electron transport chain (CYT-C and UCP3) and CPT1b in the mitochondria. Serum inositol is also increased by training and may help increase endurance in trained mice. Inositol can help transport fat from the liver and improve the distribution of fat throughout the body, allowing it to be used more efficiently as an energy source. Our results further corroborate that exercise training promotes fat mobilization and fatty acid oxidation as energy substrates during running. Furthermore, this is likely mediated through exercised-induced PPARδ expression in a way that is similar to what was reported previously in human skeletal muscle following exercise training12.

One of the most striking differences between drug treatment and exercise was the increase of serum PUFA and hydroxybutyrate. Compared to training, GW501516 increased levels of UFA, especially PUFA, and they were further increased by the combination of GW501516 and training. This is in agreement with previous studies that showed increases of enzymes that produce UFA after treatment with a PPARδ agonist5,21. Our study demonstrated GW501516 increased levels of 3 PUFA (α-linolenic acid, arachidonic acid, and its precursor 8,  11,  14-Eicosatrienoic acid) regardless of exercise training. Previous studies have demonstrated that all long-chain fatty acids and their derivatives are putative PPAR ligands2,26,27. Endogenous fatty acids that have been shown to activate PPAR include PUFAs such as some ω-3 PUFA (e.g. α-linolenic acid and docosahexaenoic acid), some ω-6 PUFA (e.g. linoleic acid and arachidonic acid), and some saturated fatty acids (e.g. stearic acid)2,3,26,27. UFA and PUFA in particular, could act as activators of PPARδ after being increased by GW501516. Additionally they are sensed by the liver which then mobilizes fatty acids and stimulates hepatic fatty acid oxidation28. We observed hydroxybutyrate, the major constituent of ketone bodies, was significantly increased by GW501516, but not exercise. Leucine, a ketogenic amino acid, was also increased by GW501516 only. However, exercise did increase other BCAA. Increased hepatic synthesis of ketone bodies would be expected during increased release of fatty acids from fat stores and further suggests that GW501516 promotes hepatic fatty acid oxidation that can provide muscle with an alternative energy source during exercise. Ketone bodies are an important energy substrate under stress and hydroxybutyrate can freely enter muscle mitochondria and be metabolized to acetyl CoA.

The impacts of training or GW501516 treatment on essential amino acids were slightly different. The glycogenic amino acids that can be metabolized to form pyruvate (alanine, serine and threonine) were only significantly increased after training alone. This suggests more energy is utilized from pyruvate after training. Elevations in these amino acids were reversed by GW501516 treatment suggesting that GW501516 inhibits gluconeogenesis or the conversion of glycogenic amino acids into pyruvate that was induced by training. This indirectly suggests that GW501516-treated mice specifically rely on fatty acids as energy. Three BCAA (valine, leucine, and isoleucine) were increased by both GW501516 and training. Long-distance running involves mobilization of BCAA29 and many studies demonstrate that BCAA concentrations immediately after exercise are reduced in the serum, but not in muscle30. We found that training or GW501516 treatment, preserved serum BCAA levels after exhaustive running. As essential amino acids, BCAA are primarily metabolized in muscle and are important for protein synthesis, neurotransmitter synthesis, and repair of exercise-induced skeletal muscle damage31,32. Increased BCAA may both act as an energy source (Supplementary Fig. S3 online) and protect mitochondria from exercise-induced damage to preserve mitochondrial function. In addition, increased serum BCAA may reduce tryptophan uptake in the brain and delay fatigue by competitively inhibiting 5-hydroxytryptamine (5-HT) synthesis31,32.

Metabolomic analyses are relatively new technology. It is limited by the complexity of techniques, high inter- and intra- subject variability, incomplete metabolite databases, and incomplete understanding of metabolic pathways. Although there are a total of 122 peaks measured in serum samples, only 43 peaks could be matched to known metabolites.

In conclusion,this study demonstrated that 3-week treatment with GW501516 increased running performance of both trained and untrained mice. Like training, GW501516 promoted mitochondrial fatty acid oxidation and increased fat metabolism in muscle tissue (Summarized in Supplementary Fig. S4 online). However, exercise increased energy supply by promoting catabolism of protein, glycolysis and glucogenesis from amino acids, while GW501516 increased fatty acid oxidation through BCAA and ketone body pathways.

     
  Corazon caring

Submitter: [anonymous]
Category: News / Articles - Health / Medical
exhibition Date: 2017-08-20 14:22:56
Views: 224
Score: (not yet rated)
 
Health ,medical,transportation,laundry,nursing services

     
  Cloning Litecoin - How to Create Your Own Crypto

Submitter: Limitless
Category: Guides / Tutorials - Business / Finance
exhibition Date: 2018-03-05 00:05:06
Last Update: 2018-03-05 00:05:41
Views: 213
Score: 5.00 / 5.00 (Based on 2 votes.)
 
Cloning Litecoin Table of Contents

Pre Installers.
1a. Winrar
1b. Compression
1c. MinGW
Windows Deps.
2a. OpenSSL
2b.Berkeley DB
2c. Boost
2d. MiniUPNP
2e. Protoc and Libprotobuf
2f. Libpng
2g. qrencode
Download and Compile QT.
The Clone
4a. Source Code
4b. Copy and Replace Litecoin
4c. Copy and Replace LTC
4d. Change rpc and port numbers.
4e. Change starting letter for addresses.
4f. Update client version number.
4g. Change Litecoin example addresses to Clonecoin Addresses.
4h. Change char pchMessageStart and ParseHex.
4i. Change alert keys.
4j. Remove Merkel root and Genesis Block.
4k. Remove Nonce and testnet genesis.
4l. Add Epoochtime and Timestamp.
4m. Fixing the checkpoints.
4n. Change max money supply and coinbase maturity.
4o. Change block times from 2.5 minutes to 30 seconds.
4p. Change re-targeting
4q. Add premine and change block rewards.
4r. Update Images.
4s. Update Seed node/ AWS Seed node guide.
Hashing the Genesis Block and Merkel Root.
5a. Ability to hash Genesis Block.
5b. Compiling Clonecoin Windows QT.
5c. Generating Merkel Root
5d. Hashing the Genesis Block.
Connecting your nodes.
6a. Create a conf.
6b. Connect- server and home network.
Checkpointing the premine.
Clean up Your Code.
Compiling Clonecoind.
9a. Compile Clonecoind.
9b. Remove and cleanup.
Github for release, made easy.
10a. Easy Pushing Commits/Launch code.
10b. Easy Revert Commits
10c. Easy Pushing Updates.
Common Errors
Quick Logos
The Website.
13a. The Template.
13b. Upload to a website.
The Launch. Ninja vs Pumped vs ICO.
14a. Prelaunch
14b. The Ninja
14c. The Pumped.
14d. The ICO.

     
  US police killings undercounted by half study

Submitter: [anonymous]
Category: News / Articles - Government / Politics
exhibition Date: 2017-10-21 04:02:22
Views: 172
Score: 5.00 / 5.00 (Based on 2 votes.)
 
Over half of all police killings in 2015 were wrongly classified as not having been the result of interactions with officers, a new Harvard study based on Guardian data has found.

The finding is just the latest to show government databases seriously undercounting the number of people killed by police.

“Right now the data quality is bad and unacceptable,” said lead researcher Justin Feldman. “To effectively address the problem of law enforcement-related deaths, the public needs better data about who is being killed, where, and under what circumstances.”

Young black men again faced highest rate of US police killings in 2016
The Counted project points to continuing racial disparities, with black males aged 15-34 nine times more likely than other Americans to be killed
Read more
Feldman used data from the Guardian’s 2015 investigation into police killings, The Counted, and compared it with data from the National Vital Statistics System (NVSS). That dataset, which is kept by the Centers for Disease Control and Prevention (CDC), was found to have misclassified 55.2% of all police killings, with the errors occurring disproportionately in low-income jurisdictions.

“As with any public health outcome or exposure, the only way to understand the magnitude of the problem, and whether it is getting better or worse, requires that data be uniformly, validly, and reliably obtained throughout the US,” said Nancy Krieger, professor of social epidemiology at Harvard’s Chan School of Public Health and senior author of the study. “Our results show our country is falling short of accurately monitoring deaths due to law enforcement and work is needed to remedy this problem.”

     
  How to Test Real Silver Guide

Submitter: [anonymous]
Category: News / Articles - Business / Economy
exhibition Date: 2018-06-04 16:20:26
Last Update: 2018-07-01 11:21:56
Views: 78
Score: (not yet rated)
 
Look for a stamp. Items advertised as silver and sold internationally should be stamped based on its silver content. If there is no stamp, be leery. It may be still be pure silver, but created in a country that doesn't require stamping.

Evaluate the international silver stamp rating. Look at the silver piece with a magnifying glass. International sellers of silver will stamp silver as 925, 900 or 800. These numbers indicate the percentage of fine silver in the piece. 925 means that the piece is 92.5 percent silver. A stamp of 900 or 800 means the piece is 90 percent or 80 percent silver, and is often called "coin"

Method Two of Six:
Testing Magnetic Qualities

Test with a magnet. In particular, use a strong magnet, such as the rare-earth magnet made out of neodymium. Silver is paramagnetic and exhibits only weak magnetic effects. If your magnet sticks strongly to the piece, it has a ferromagnetic core and is not silver.
Keep in mind that there are a few other metals that do not stick to a magnet and can be made to look like silver. It is better to perform the magnetic test in conjunction with another test to make sure the core is not another metal.

Try the sliding test. If you are testing silver bars, there is another way you can use a magnet to see if your silver is real or not. Angle one of your silver bars so that it is at a 45 degree angle. Slide the magnet down it. The magnet should slide slowly down the face of the bar. This may seem counterintuitive, but silver is paramagnetic and the rare earth magnet induces electric eddy currents in the silver which act as an electromagnet to create a braking effect that slows the descent of the magnet.

Bleach Test

Image titled Test Silver Step 15
1
Simply put a drop of bleach on your item. Silver tarnishes extremely quickly when exposed to a powerful oxidizing agent such as common bleach.
Image titled Test Silver Step 16
2
Watch for tarnishing or no reaction. If it rapidly tarnishes and turns black then the item is silver.
Image titled Test Silver Step 17
3
Note that silver plated items will pass this test.

     
  The Truth About M855 5.56 NATO Ammunition

Submitter: [anonymous]
Category: News / Articles - Government / Politics
exhibition Date: 2015-09-15 11:18:18
Views: 639
Score: (not yet rated)
 
The Truth About M855 5.56 NATO Ammunition
By Nick Leghorn on March 3, 2015

The White House has said recently that banning “armor piercing” ammunition like the wildly popular M855 round is “common sense” and would make our police officers safer, which is a bold claim. Given the quality of journalism on display among the major networks these days, its no surprise that the facts of the matter have been muddled and obfuscated to the point where the details being presented bear little to no resemblance to the actual facts. Some hyperbole is expected, but in an age when the talking heads on TV start claiming that common rifles can shoot down airplanes and blow up railroads you know that fact checking isn’t high on the priority list. I wanted to take a minute and discuss the truth about the M855 round, what it is, what it does, and why it is being targeted.

When the M-16 was first fielded by the U.S. military, the ammunition that accompanied it was designated the M193 cartridge — a standard “ball” 5.56 round. The 55 grain projectile was of the same construction that had been used in similar projectiles for close to a century, namely a solid lead core surrounded by a copper jacket.

The original specifications for the M-16 rifle were that it needed to penetrate the steel helmet of an enemy soldier at a given distance, and while the lighter overall weight of the projectile reduced the penetration power of the projectile at long distance the designers of the ammunition compensated with increased velocity. Increased velocity meant increased muzzle energy, and provided the power to meet the specifications. That faster yet lighter bullet meant that the cartridges were lighter, and therefore the soldier on the field could carry more ammunition into battle than ever before. Even with the lighter projectile, that “armor piercing” capability was still maintained throughout the design process.

After the Vietnam war, there were some deficiencies that needed to be addressed. Soldiers in the field reported issues with the projectile when it penetrated glass or other intermediate barriers, and wanted a heavier projectile to aid in energy transfer to targets downrange (putting down enemy soldiers more efficiently). While the military did adopt a 77 grain lead projectile for long range shooting, they developed the M855 projectile specifically for hitting targets behind light barriers (like glass and tin and heavy clothing).

m855

The internal construction of an M855 round differs from the standard “ball” M193 cartridge in one very important way: there’s a steel core at the tip of the projectile. The solid steel tip added much needed stability to the projectile when traveling through barriers since there was no longer any soft lead to deform upon impact, and increased the stability and accuracy of the round when traveling over long distances due to the increased mass of the projectile.

There were still some major issues, though. As the barrel length of commonly used firearms continued to decrease, the velocity of the round when it exited the barrel decreased as well. The 5.56 NATO cartridge is highly dependent on velocity to generate the energy it transfers to targets, and lower velocity means a much lower muzzle energy. Some of the most recent studies indicate that with a common 16″ barrel, M855 ammunition has severely degraded performance past 150 yards and is only effective to about 500 meters (versus the 600 meters at which it was designed to penetrate a steel helmet with a standard M-16).

Another issue was the lack of expansion. The lead core in normal “ball” ammunition expands upon impact, which increases the diameter of the projectile and aids in transferring energy from the moving projectile to the target. The more energy is transferred, the greater the wound in the target and the more likely it is to stop that target. Using a steel tip meant that the bullets no longer deformed, and therefore the energy transferred to the target was less than with “ball” 5.56. In other words, the M855 ammunition is actually considered to be less effective against living targets than “ball” 55 grain 5.56 ammo. Or, put another way, standard lead ammunition is considered more deadly than M855.

Wile the Army has moved on to an improved version of the M855 projectile, the cartridge has become popular with long range shooters and hunters. Especially for those hunting hogs in the thick brush of the American south, the M855 cartridge has proven to be capable of accurately and effectively hitting a target even after passing through a couple layers of leaves and underbrush. Its also popular among helicopter hog depredation expeditions for the same reason: it punches through the trees and hits the target. And since the cartridge was developed and produced for the military, a massive quantity of the ammunition is produced every year which leads to low prices for recreational shooters looking for a cheap way to feed their firearms. In short, what was once a “military” round has transitioned very well to civilian life.

In recent days, the projectile has come under increased scrutiny as the ATF prepares to ban it based on the existing prohibition on “Armor Piercing” ammunition. As for what exactly constitutes “armor piercing” ammunition, there is a very specific legal definition that is being used. The following is directly from 18 U.S. Code § 921:

(17)
(A) The term “ammunition” means ammunition or cartridge cases, primers, bullets, or propellent powder designed for use in any firearm.
(B) The term “armor piercing ammunition” means—
(i) a projectile or projectile core which may be used in a handgun and which is constructed entirely (excluding the presence of traces of other substances) from one or a combination of tungsten alloys, steel, iron, brass, bronze, beryllium copper, or depleted uranium; or
(ii) a full jacketed projectile larger than .22 caliber designed and intended for use in a handgun and whose jacket has a weight of more than 25 percent of the total weight of the projectile.
(C) The term “armor piercing ammunition” does not include shotgun shot required by Federal or State environmental or game regulations for hunting purposes, a frangible projectile designed for target shooting, a projectile which the Attorney General finds is primarily intended to be used for sporting purposes, or any other projectile or projectile core which the Attorney General finds is intended to be used for industrial purposes, including a charge used in an oil and gas well perforating device.

What is important to note is that the defining feature of “armor piercing” ammunition is not the actual function of the projectile, but instead the construction. It is possible to construct a cartridge using an “armor piercing” projectile that can’t even pierce skin, but if the construction meets the above criteria then it is illegal.

SIG_SAUER_SIGTac_SB15_Pistol_Stabilizing_Brace_on_SIG_MCX_Tactical_Piston_AR_Carbine_SBR_Nick_Leghorn_The_Truth_About_Guns_TTAG_at_SIG_SAUER_Headquarters_New_Media_Writers_Event_2014_David_Crane_DefenseReview.com_DR_1

What has made this change in regulation possible is the prevalence of the AR-15 pistol. Brought to astounding levels of popularity in recent years by the pistol stabilizing brace, the AR-15 pistol is legally a handgun as far as the U.S. government is concerned, and therefore 5.56 ammunition has become by default “projectile […] which may be used in a handgun.” As such, 5.56 NATO ammunition is now subject to regulation under 18 U.S. Code § 921(17)(B).

Technically, M855 ammunition fails to meet the criteria for an “armor piercing” projectile. The requirement of the law is that the projectile be comprised entirely of steel (with trace elements allowed) in order to be classified as “armor piercing,” but as you can see nearly 80% of the mass of the M855 projectile is comprised of standard lead — not steel. However, due to the imprecise wording of the statute it is possible for the ATF and the Attorney General to interpret the law in such a way that M855 meets the required criteria.

This kind of move has been made before. The government classified cheap and commonly available steel core 7.62×39 ammunition as “armor piercing” and banned it from the United States in 1992, as well as 7N6 5.45×39 ammunition only last year. The reasons were the same: with the increase in pistol versions of the AK-47 and AK-74 rifle being produced, the ammunition was now technically a handgun caliber and the broad interpretation of the statute allowed them to take action against those specific projectiles.



The current claim by the White House that M855 ammunition is especially and specifically dangerous due to its “armor piercing” capabilities is, in a word, laughable. The fact is that standard 5.56 ammunition — “ball” ammunition with a traditional lead core — can pierce a “bullet proof” vest just as easily as M855, a fact we have conclusively proven through our own testing. So can commonly available .308 Winchester ammunition, one of the most popular “hunting” cartridges in the world. So can .30-06 Springfield, the “traditional” hunting cartridge in the United States. In fact, almost every full-size and even every intermediate rifle caliber is perfectly capable of piercing the bullet proof vest worn by police officers. The idea that removing this one single projectile from circulation will reduce the lethality of firearms in the United States is quite literally insane.

Let’s look at this from another perspective. According to commonly accepted research, fewer than 2% of crimes are committed with “assault weapons,” including the AR-15 rifle (and pistol variants) that accept this caliber. Note that the most commonly available 5.56 ammunition is 55 grain “ball” ammo and not M855, so even if every single one of those crimes was committed with an AR-15 (which they were not) the probability of M855 ammunition being used in the gun is even smaller than 2%. Even if M855 ammunition was banned, standard “ball” M193 ammunition fails to meet the definition of an “armor piercing” round and therefore is exempt from any possible ban. M193 is plentiful, and available at almost every Wal-Mart in America. Removing M855 ammunition would require a vast amount of effort on the part of the government to implement the ban, impact less than 2% of crimes, and do exactly nothing to remove ammunition that is capable of piercing a “bullet proof” vest from the market. In short, you might as well call whoever is championing this ban “Sisyphus.”

The truth is that, despite the composition of the projectile, M855 ammunition is no greater a threat than any other standard “ball” projectile — traditional hunting rounds included. The 5.56 cartridge has been implicated in far fewer than 2% of crimes in the United States (and M855 in fewer still), and even if it were removed from circulation the remaining millions upon millions of 100% legal projectiles would be able to perform the same function nearly as well. In addition, the projectile has found a legitimate sporting purpose among hunters and sportsmen that the Attorney General has refused to acknowledge. However, due to the lack of any movement on any other front on the issue of gun control, it appears that M855 ammunition has become an unfortunate casualty of a political agenda hell-bent on doing as much damage to American gun owners as possible before leaving office.

     
  The Hacker Wars - Anonymous Documentary 2015

Submitter: [anonymous]
Category: News / Articles - Government / Politics
exhibition Date: 2015-05-16 08:54:32
Last Update: 2015-06-16 08:04:06
Views: 593
Score: (not yet rated)
 
Published on Apr 22, 2015
Ripped from international headlines, The Hacker Wars takes you to the front lines of the high-stakes battle over the fate of the Internet, freedom and privacy. The Hacker Wars tells the tales of the anarchic troll provocateur Andrew “weev” Aurenheimer, prodigy hacker hero Jeremy Hammond, and incendiary watchdog journalist Barrett Brown — three larger than life characters whose separate quests to expose the secrets of empire hurled them into a fateful collision course with shadowy corporations, the FBI, and ultimate betrayal by one of their own.

Featuring interviews with Pulitzer Prize winning journalist Glenn Greenwald, Pulitzer Prize winning journalist Chris Hedges, NSA whistleblower Thomas Drake, The Hacker Wars traces the steps that led from the Internet’s murkiest corners to the heavy shadow of censorship and a century’s worth of prison time.

Internationally acclaimed filmmaker Vivien Lesnik Weisman melds her distinctively subversively bent style with the real life stories of the cyberpunk vanguards who blur the line between hacking and activism. Locked in a murky conflict against world governments, these so-called hacktivists are waging a life-or-death struggle for the freedom of public information and the defense of privacy under siege.

     
  The Voice of Life

Submitter: Nicholai
Category: Online Content - Music
exhibition Date: 2017-02-15 02:34:59
Last Update: 2017-02-15 02:36:55
Views: 374
Score: 5.00 / 5.00 (Based on 1 votes.)
 
By Oksana Kolesnikova

     
  Marijuana Risks vs Benefits for Seizure Treatment

Submitter: Limitless
Category: Guides / Tutorials - Health / Medical
exhibition Date: 2018-02-11 03:22:56
Last Update: 2018-03-10 02:07:22
Views: 182
Score: 5.00 / 5.00 (Based on 3 votes.)
 
Cannabinoids are inherently neuroprotective substances—in fact, our brain produces its own cannabinoids when injured to reduce damage and promote healing. Cannabinoids have a superior safety profile compared to most anti-epileptic drugs, many of which have been shown to impair brain function and development.

     
  Cryptocurrency Market Capitalizations

Submitter: [anonymous]
Category: Guides / Tutorials - Business / Finance
exhibition Date: 2018-01-23 04:38:22
Last Update: 2018-01-23 04:48:49
Views: 142
Score: (not yet rated)
 
View Cryptocurrency Ranking Data, Charts and other important information for potential investors.

     
  Fujitsu New Tech to Detect ETH Smart Contract Bugs

Submitter: Cryptic
Category: News / Articles - Science / Technology
exhibition Date: 2018-03-07 06:44:24
Views: 127
Score: (not yet rated)
 
Japanese IT giant Fujitsu has revealed a new technology that it says could help to mitigate problems with ethereum's smart contracts.

In a statement released Wednesday, Fujitsu said the new system aims to detect in advance the risks associated with a smart contract source code on ethereum. In effect, the tech helps the blockchain authenticate the source call that triggers smart contract transactions.

Smart contracts are a primary feature differentiating ethereum from bitcoin, enabling developers to build applications on top of the ethereum blockchain to automatically execute programming orders (or contracts).

However, Fujitsu said that, currently, there are six common risks associated with the platform. While existing technologies are capable of solving most of those issues, the authenticity of the source call still remains problematic.

For instance, as the firm explained, since multiple smart contracts could have been built indirectly into a blockchain, there's a risk that the system may not correctly execute the original intention of a source call.

     
  How To Grow Medicinal-Grade Cannabis Like the Pros

Submitter: [anonymous]
Category: Guides / Tutorials - Home / Gardening
exhibition Date: 2018-03-31 15:48:39
Views: 125
Score: 5.00 / 5.00 (Based on 1 votes.)
 
How To Grow Medicinal-Grade Cannabis – Like the Pros!
By Seshata
on March 13, 2018

     
  Ripple Coinbase listing Rumor

Submitter: [anonymous]
Category: Guides / Tutorials - Business / Finance
exhibition Date: 2018-02-17 23:51:49
Last Update: 2018-03-01 23:07:07
Views: 122
Score: (not yet rated)
 

     
  Coluracetam

Submitter: Nexus
Category: Guides / Tutorials - Health / Medical
exhibition Date: 2015-01-23 05:11:44
Views: 709
Score: (not yet rated)
 
Coluracetam decision, research and reviews.

     
  Terms and Conditions May Apply

Submitter: [anonymous]
Category: News / Articles - Government / Politics
exhibition Date: 2015-05-16 13:35:02
Last Update: 2015-05-16 14:24:17
Views: 619
Score: (not yet rated)
 
2015

     
  Open-label, single-dose pharmacokinetic profile

Submitter: [anonymous]
Category: News / Articles - Health / Medical
exhibition Date: 2015-01-04 04:20:10
Views: 599
Score: (not yet rated)
 
Open-label, single-dose pharmacokinetic study of modafinil tablets: influence of age



     
  Shop Infusion

Submitter: [anonymous]
Category: Other - Miscellaneous
exhibition Date: 2016-03-21 17:43:13
Last Update: 2016-03-21 17:43:39
Views: 468
Score: (not yet rated)
 

     
  Politics & War (New Online Nation Simulator Game)

Submitter: [anonymous]
Category: Online Content - Web Games / Interactive
exhibition Date: 2016-03-12 18:23:09
Views: 448
Score: (not yet rated)
 
Politics & War is a free to play browser based persistent mmo game where you create your own nation and rule it. Forced to make gruelling political decisions you are truly in charge in Politics & War. Play together with friends and strangers, pit your armies against each other and wage war, or work together cooperatively for mutual prosperity. In Politics & War you call the shots.

Politics & War is not your run-of-the-mill nation simulation game. Its dynamic mechanics and scenarios are always forcing you to think about each decision carefully before making the final call. Many variables come into play, such as your commerce rate, crime rate, pollution, and much more. You are truly in charge, you decide what the national flag is, what your economic and social policies are, and how you build your nation and interact with others. Construct great cities; build stadiums and subways and power plants. The options are limitless.

Start Playing
Signing up to play is free and it only takes a few minutes a day to manage your nation and its people. Invite your friends to play with you and earn rewards, band together with them and create a force to be reckoned with. It all starts with the click of a button.

Apply to join the Libertarian Anarchist Nexus (LAN) in-game to join us!.

     
  Drug Decriminalization in Portugal CATO Institute

Submitter: [anonymous]
Category: News / Articles - Government / Politics
exhibition Date: 2016-07-16 06:10:31
Last Update: 2016-07-16 06:11:10
Views: 430
Score: 5.00 / 5.00 (Based on 1 votes.)
 
On July 1, 2001, a nationwide law in Portugal took effect that decriminalized all drugs, including cocaine and heroin. Under the new legal framework, all drugs were “decriminalized,” not “legalized.” Thus, drug possession for personal use and drug usage itself are still legally prohibited, but violations of those prohibitions are deemed to be exclusively administrative violations and are removed completely from the criminal realm. Drug trafficking continues to be prosecuted as a criminal offense.

While other states in the European Union have developed various forms of de facto decriminalization — whereby substances perceived to be less serious (such as cannabis) rarely lead to criminal prosecution — Portugal remains the only EU member state with a law explicitly declaring drugs to be “decriminalized.” Because more than seven years have now elapsed since enactment of Portugal’s decriminalization system, there are ample data enabling its effects to be assessed.

     
  Gordon Dentistry

Submitter: Limitless
Category: Guides / Tutorials - Health / Medical
exhibition Date: 2017-03-20 08:31:22
Last Update: 2017-03-20 08:33:54
Views: 308
Score: (not yet rated)
 
o
5 stars Dennis P Customer since 2013

Very professional doctor and staff. Pleasant, warm and carrying professionals! My family are warmly received and cared for.

10 days ago
5 stars Roger G Customer since 2010

Great experience. Very thorough and considerate.

13 days ago
5 stars Linda J Verified customer

Painless, kind, wonderful care!

18 days ago
5 stars Anonymous Verified customer

Dr. Gordon & staff are always professional and polite. Dr. Gordon truly cares for her patients.

19 days ago
5 stars Sarah B Customer since 2016

I have never felt more cared for in any dentistry setting than I have with Dr. Gordon and her team, Her knowledge and compassion for the patient blended with her dental skills took away any fears of dental work.

25 days ago
5 stars Anonymous Verified customer

Great service and teamwork!

a month ago
5 stars Beverly O Verified customer

First visit. Nice people. Clean, nicely decorated office. Dr. Gordon was professional. Good experience.

a month ago
5 stars Robert L Customer since 2012

Very nice

a month ago

     
  SpoonSpoon

Submitter: Nicholai
Category: Downloads - Games
exhibition Date: 2017-08-02 14:58:47
Views: 201
Score: (not yet rated)
 
Best PC original PC games made in Florida

     
  Guide to Agorism & Counter Economics

Submitter: [anonymous]
Category: News / Articles - Government / Politics
exhibition Date: 2018-03-11 23:51:06
Views: 181
Score: 5.00 / 5.00 (Based on 1 votes.)
 

     
  Practice Coin - Cryptocurrency Creation Guide Site

Submitter: [anonymous]
Category: Guides / Tutorials - Programming
exhibition Date: 2018-03-05 00:13:26
Last Update: 2018-03-07 03:48:27
Views: 178
Score: 5.00 / 5.00 (Based on 2 votes.)
 
This site is dedicated to a project we call Practice Coin, a new cryptocoin. Its aim is to cut through FUD of Altcoin creation process. Specifically, to go through all the steps of doing and launching and running a coin, from scratch, and documenting it all, in detail. Read more about Practice Coin.


     
  States mull 'sanctuary' status for weed businesses

Submitter: [anonymous]
Category: News / Articles - Government / Politics
exhibition Date: 2018-03-05 02:31:47
Last Update: 2018-03-07 00:44:22
Views: 164
Score: 5.00 / 5.00 (Based on 2 votes.)
 
The Associated Press — By BECKY BOHRER - Associated Press
1/7
JUNEAU, Alaska (AP) — Taking a cue from the fight over immigration, some states that have legalized marijuana are considering providing so-called sanctuary status for licensed pot businesses, hoping to protect the fledgling industry from a shift in federal enforcement policy.

Just hours after U.S. Attorney General Jeff Sessions announced on Jan. 4 that federal prosecutors would be free to crack down on marijuana operations as they see fit, Jesse Arreguin, the mayor in Berkeley, California, summoned city councilman Ben Bartlett to his office with a novel idea.

Berkeley was already the first city in the nation to formally declare itself a sanctuary city on immigration, barring city officials from cooperating with federal authorities. Why not do the same thing with marijuana? Last month, it did.

     
  Norway is dominating these Winter Olympics

Submitter: Limitless
Category: News / Articles - Sports
exhibition Date: 2018-02-19 21:00:14
Views: 152
Score: 5.00 / 5.00 (Based on 1 votes.)
 
MEDALS BY COUNTRY (Currently)
Country Gold Silver Bronze Total
Norway 11 9 8 28
Germany 10 6 4 20
Canada 7 5 6 18
Netherlands 6 5 2 13
United States of America 5 3 3 11
France 4 3 4 11
Sweden 4 3 0 7
Austria 4 2 4 10
South Korea 3 2 2 7
Japan 2 5 3 10
Switzerland 2 4 1 7
Italy 2 1 3 6
Czech Republic 1 2 3 6
Slovakia 1 2 0 3
Belarus 1 1 0 2
Great Britain 1 0 3 4
Poland 1 0 1 2
Ukraine 1 0 0 1
China 0 5 2 7
Olympic Athletes from Russia 0 3 8 11
Australia 0 2 1 3
Slovenia 0 1 0 1
Finland 0 0 3 3
Spain 0 0 2 2
Latvia 0 0 1 1
Kazakhstan 0 0 1 1
Liechtenstein 0 0 1 1


Norway is dominating these Winter Olympics with a unique approach to sports

Dan Wolken, USA TODAY Sports
24 seconds ago
PYEONGCHANG, South Korea — They’re not here to gloat. The Norwegians, in fact, will go out of their way to tell you that there’s still a long way to go at these Olympics before they reach their goals and win the overall medal count. They’re also not here to tell anyone (like the struggling U.S. team; cough, cough) how to go about their business or impose their Norwegian societal values, which they believe are directly tied into the success of their winter sports development.


“We’re not a gorilla beating its chest,” said Tore Ovrebo, the Norwegian Olympic Committee’s director of elite sports. “We know it can change very quickly. We have to work hard.”

     
  Moringa Teas

Submitter: Nicholai
Category: News / Articles - Health / Medical
exhibition Date: 2017-09-19 18:25:17
Views: 144
Score: (not yet rated)
 
Moringa Herbs teas fight cancer, aging and disease.

     
  AnimeTorrents.Me - Source for Anime Manga

Submitter: [anonymous]
Category: Downloads - Miscellaneous
exhibition Date: 2018-03-04 03:27:14
Last Update: 2018-03-04 21:35:17
Views: 131
Score: 5.00 / 5.00 (Based on 1 votes.)
 

     
  Ad Campaign Feature Described on Steemit

Submitter: Limitless
Category: Guides / Tutorials - Web Design / Development
exhibition Date: 2018-03-03 18:43:20
Last Update: 2018-03-03 19:23:08
Views: 130
Score: 5.00 / 5.00 (Based on 3 votes.)
 
I made an article describing how the Ad Network feature works on Steemit

     
  Binance - Cryptocurrency Exchange

Submitter: Limitless
Category: News / Articles - Business / Economy
exhibition Date: 2018-02-11 10:18:23
Last Update: 2018-02-13 05:00:50
Views: 127
Score: 5.00 / 5.00 (Based on 2 votes.)
 
Binance is an up and coming cryptocurrency exchange with a focus on crypto-to-crypto trading. The platform has started to gain popularity in the blockchain community thanks to its impressive coin offerings and insanely low trading fees.

In this Binance review, I’ll be going over:

Key Information
How It Works
Trading Fees
Available Cryptocurrencies
Transfer Limits
Company Trust
Fund Security
Customer Support
Conclusion

Binance Key Information
Key Information
Site Type Cryptocurrency Exchange
Beginner Friendly
Mobile App
Company Location Shibuya-ku, Tokyo
Company Launch 2017
Deposit Methods Cryptocurrency
Withdrawal Methods Cryptocurrency
Available Cryptocurrencies Bitcoin, Ethereum, Litecoin, +45 more coins
Community Trust Great
Security Average
Fees Extremely low
Customer Support Good

Available Cryptocurrencies

Binance has a vast selection of coins with pairings to Bitcoin, Ethereum, and Tether. Some of the available coins are:

Ark
Bitcoin
Bitcoin Cash
Bitcoin Gold
Dash
EOS
Ethereum
Ethereum Classic
IOTA (Binance is one of only two major exchanges where you can buy IOTA)
Litecoin
Neo
OmiseGo
+36 more coins

Many investors like Binance because they offer coins that often aren’t listed on other exchanges such as Bitcoin Gold, IOTA, and Walton Coin.
Transfer Limits

Binance is strictly a cryptocurrency exchange, so you’re not able to fund your account with fiat currency.

You can only deposit cryptocurrency funds, but there’s no limit on the amount that you can deposit. There are also no fees on any of your deposits.

The amount that you can withdraw each day is determined by your verification tier. Without submitting any verification details, you’re placed at Level 1 and can withdraw up to 2 BTC worth of cryptocurrency a day.

To be classified as Level 2, you need to enable either two-factor authentication or Google Authenticator. Following that, you need to provide:

First name
Last name
Gender
Country
Passport ID
Passport photo
Selfie with passport

With Level 2 verification, your daily withdrawal limit increases to 100 BTC. Although personally I've never felt a need to go beyond level 1 verification, since the withdrawal limit is still plenty. The fee for withdrawing xlm is only .01 for example, so very cheap trading fees and withdrawal.

     
  Christ's Curch

Submitter: Governor
Category: News / Articles - People / Celebrities
exhibition Date: 2017-11-26 11:47:45
Views: 127
Score: (not yet rated)
 

     
  Linux Freedom - Linux Distributions and Tips Free

Submitter: Cryptic
Category: Downloads - OS Customizations
exhibition Date: 2018-03-15 18:52:20
Views: 115
Score: (not yet rated)
 
Linux Freedom is proud to provide you with Linux Mint 18.3 "Sylvia"

The purpose of Linux Mint is to produce a modern, elegant and comfortable operating system which is both powerful and easy to use.

Linux Mint is one of the most popular desktop Linux distributions and used by millions of people.

Some of the reasons for the success of Linux Mint are:

It works out of the box, with full multimedia support and is extremely easy to use.
It's both free of cost and open source.
It's community-driven. Users are encouraged to send feedback to the project so that their ideas can be used to improve Linux Mint.
Based on Debian and Ubuntu, it provides about 30,000 packages and one of the best software managers.
It's safe and reliable. Thanks to a conservative approach to software updates, a unique Update Manager and the robustness of its Linux architecture, Linux Mint requires very little maintenance (no regressions, no antivirus, no anti-spyware...etc).

     
  Stop the Kratom Ban by Corrupt Officials!

Submitter: [anonymous]
Category: News / Articles - Government / Politics
exhibition Date: 2018-02-20 20:29:24
Last Update: 2018-02-20 20:31:57
Views: 108
Score: (not yet rated)
 
On 31 August 2016 the Drug Enforcement Administration (DEA) announced its intention to place the active materials in the Kratom plant into Schedule I of the Controlled Substances Act in order to avoid an imminent hazard to public safety. According to the DEA press release \\\"Kratom is abused for its ability to produce opioid-like effects and is often marketed as a legal alternative to controlled substances. Law enforcement nationwide has seized more Kratom in the first half of 2016 than any previous year and easily accounts for millions of dosages intended for the recreational market, according to DEA findings. In addition, Kratom has a high potential for abuse, has no currently accepted medical use in treatment in the United States, and has a lack of accepted safety for use under medical supervision. These three factors constitute a Schedule I controlled substance according to the Controlled Substances Act passed by Congress in 1970.

Schedule I drugs, substances, or chemicals are defined as drugs with no currently accepted medical use and a high potential for abuse. This is not true for Kratom, it has been shown numerous times in reports from users to help recovering Opiate addicts, treat pain, combat depression and anxiety, and much more. Deaths that involve Kratom being a persons\\\' system have always been from the result of mixing Kratom with other drugs, rather than Kratom alone. In states that banned Kratom, Alabama specifically, opiate usage and deaths went up after Kratom was banned in the state. Please stop the DEA from scheduling Kratom as Schedule I, there are many people who will suffer from this.

What is Kratom?
Kratom (Mitragyna speciosa) refers to the leaves of a South East Asian tree closely related to the coffee plant. Like coffee, it has stimulating effects. In large doses, Kratom acts as a sedative and supports the body’s ability to deal with everyday minor aches and pains. It has been used for medicinal purpose in traditional South Eastern medicine for several hundred years.

Mitragyna speciosa has been used by manual laborers to provide energy, positive mood, and to help mitigate everyday aches and pains of the back breaking manual labor associated with agriculture in rural Southeast Asia. It has also been used as an anti-diarrheal against dysentery in the regions that it is native. Here in the U.S., it is primarily used for its mild stimulant effects similar to coffee that promotes a positive and energized state of well being. It is also an important medicinal herb that helps to relax the body and ease life’s every day minor aches and pains.

Kratom has many benefits for those who use it responsibly including beneficial effects on supporting positive mood, energy, immune function, and assisting those who experience various minor aches and pains.

Kratom is remarkably safe when used in a responsible manner. According to the CDC, cigarette smoking causes 440,000 deaths in the United States every year; about one of every five deaths in this country are caused by cigarettes. Alcohol causes more than 1.2 million emergency room visits and 2.7 million physician office visits due to excessive drinking each year. Pharmaceutical drugs are one of the leading causes of death in this country, killing one American every 19 minutes. Prescription opiate pain killers account for more than 475,000 emergency room visits annually. Over-the-counter pain relievers such as Tylenol send over 56,000 people to the emergency room each year with liver-related complications. Between 2011 and 2014, over 11,000 reports were made to Poison Control centers on energy drinks alone. Kratom has never caused a single recorded death and as is about as habit-forming as coffee.

New users are trying Kratom every day after hearing about successful experiences with this plant from friends or stories posted online.
In small amounts, Kratom is energizing like a cup of coffee or tea. Most people that use Kratom say that it gives them an uplifting feeling to their mood and cognitive state. Kratom can also give the feeling of a sense of deep contentment and well-being. In larg doses, Kratom can give the user euphoric feelings. This is likely the result of the mitragynine alkaloid which has been found to offer anti-depressant like qualities. Kratom has also been called an intense focus booster. There are reviews from some users who say it improved ADD/ADHD symptoms, making their thoughts clear and making it easier to concentrate. While supporting a positive mood, Kratom can also calm you down and help rid your mind of stressful thoughts. Kratom is also reported to reduce feelings of nervousness and help ease both physical and mental exhaustion.

Mitragyna Speciosa has been used by many as an effective alternative to prescription pain-killers. Kratom acts similarly to morphine to relieve temporary or chronic pain. Kratom has been reported to relieve conditions from headaches/migraines, muscle pain and soreness as well as chronic pain that has been resistant to prescription medications. Kratom is viewed by some as a much safer and less addictive treatment than some of the addictive medications currently being prescribed.

Another effect of Kratom is its ability to improve the quality of sleep. Kratom helps to turn off your mind before going to bed and put you into a restful state making it easier to fall asleep and wake feeling more refreshed and ready to take on your day. It has also been reported that Kratom usage can enhance your social experiences rid the mind of the anxieties associated with social interaction.

One of the most important uses for Kratom is to ease the effects associated with opiate withdrawal. Kratom is said to offer serious assistance in reducing the effects of withdrawal and reduce the cravings for opiates.

Come join us to show your support for Kratom and its positive uses. For more information please contact us @ info@KratomMarchDC.com.

×
*THE PUBLIC HAS TO ENGAGE THE DEA* Call (202) 307-1000
ENGAGE THE DEA Call (202) 307-1000
The DEA is Not Following the Letter and Spirit of Law. We Need to Stop the Temporary Scheduling Order and Replace It With a Standard Public Comment Period and Process Including Other Federal Agencies That Have Already Studied Kratom and Recommended More Research

Inform the DEA that you would like to continue to take this herbal supplement as a part of your healthy life style. Tell them how your life will be worse if #Kratom is made illegal

*Also Call your Senators & Congressman and Ask for Their Support*

Call Your 2 State Senators to Confirm They are Supporting The Hatch Dear Colleague Letter That Ask\\\'s The DEA to Delay The Kratom Scheduling Order Call (202) 224-3121 Option #1 and Enter Your Zip Code Search For Your Rep @ www.senate.gov/index.htm
Call Your Congressman to Confirm They are Supporting The Pocan/Salmon Dear Colleague letter That Also Ask the DEA to Delay the Ban on Kratom Call (202) 224-3121 and press option #2. Enter your zip code. Search For Your Rep @ www.house.gov
If Kratom Stays Legal It Will Be Because of You #IamKratom

     
  Tampa team competes in NASA Cube Quest

Submitter: [anonymous]
Category: News / Articles - Science / Technology
exhibition Date: 2016-09-12 22:01:05
Last Update: 2016-09-12 22:01:25
Views: 416
Score: 5.00 / 5.00 (Based on 1 votes.)
 
Credit: Marianne Galaris

Team Miles, a group of 12 citizen scientists that formed out of the Tampa Hackerspace, is competing in NASA’s first in-space Centennial Challenge: the Cube Quest Challenge.The mission at hand is to build a CubeSat that’s capable of advanced propulsion and communication in deep space, and of achieving lunar orbit. According to NASA, this marks the first time that private entities have had the chance “to compete to operate at the moon and beyond.”

NASA is offering three free payload slots on its Space Launch System rocket, which is scheduled to blast off on Orion’s first unmanned lunar flyby in 2018. The top three teams at the end of four preliminary ground tournaments will win the free slots, enabling them to compete with a larger pool of paying contestants in the lunar and deep space derbies. One free slot is worth about $2.5 million, and opens up the chance to win prizes for the in-space achievements. In total, NASA is promising $5.5 million in ground tournament and derby prizes.

     
  SeeRFloor.com

Submitter: Nicholai
Category: Guides / Tutorials - Arts / Crafts
exhibition Date: 2017-01-24 19:27:53
Views: 363
Score: 5.00 / 5.00 (Based on 1 votes.)
 
Holiday Help For your Hardwood Floors

     
  Florida Resident Faces False Drug Charges

Submitter: Limitless
Category: News / Articles - Government / Politics
exhibition Date: 2017-02-16 15:22:36
Views: 316
Score: 5.00 / 5.00 (Based on 1 votes.)
 
Florida Resident Facing False Drug Charges & Possible Loss of Right to Bear Arms After Getting Mistakenly Arrested When Assault Victim.