Saturday, May 5, 2012

Scan contents of human brain for Immortality

Will scientists ever discover the secret of immortality?:

Will scientists ever discover the secret of immortality?
Will scientists ever discover the secret of immortality?
As Western science still has not found the immortality gene, it is perhaps not surprising that in Silicon Valley and on the outskirts of Moscow the eccentric wealthy (and it always is the eccentric wealthy) are now turning their attention – and their money – to projects that are promising to deliver a new version of the age-old fantasy (or folly) of everlasting life: digital immortality. And this time it may actually work.  For writer Stephen Cave, author of the new book Immortality, digital immortality does not refer to the "legacy" we have left on our Facebook pages. Cave's book explores the quest to live for ever and how – he believes – it has been the driving force behind civilisations, coming to a climax in modern science. "Digital immortality," he says, "is about there being a silicon you for when the physical you dies" as a kind of "Plan B if bioscience fails to deliver an actual biological immortality".  And of course, he adds, biological immortality would not stop you being run over by a bus.  "So your brain is scanned and your essence uploaded into a digital form of bits and bytes, and this whole brain emulation can be saved in a computer's memory banks ready to be brought back to life as an avatar in a virtual world like Second Life, or even in the body of an artificially intelligent robot that is a replica of who we were."  For Cave, though, this "is not true immortality" as "you physically die" and this new you, "even though its behaviour could fool your mum", is then just a copy. A copy that, he admits, could carry on growing, marrying and even having children.  Currently, however, this is still "almost science fiction", as there are "three big challenges" that stand between us and digital immortality – challenges that projects such as Carbon Copies and Russia 2045 already believe they can overcome within 40 years.  "The first is that we have to be able to read all the information that makes up who you are, and this is likely to be achieved destructively by removing the human brain from the body and then preserving, slicing and scanning in the data it contains. Then there is the challenge to store an amount of information many millions of orders of magnitude bigger than the current computer systems. And finally we need to find a way to animate it."  In the end, Cave argues, "theoretically the problems of digital immortality seem solvable, but whether the solutions are practical is another story... Although when it does happen it is simply inevitable that the rich will get there as they have the most power among us."  Others are more positive about the prospect of true digital immortality within a generation.  For Dr Stuart Armstrong, the rise of the idea of digital immortality is due to the realisation that this time – perhaps – we actually have the key to immortality in our hands. Dr Armstrong is research fellow at the Future of Humanity Institute, University of Oxford.  "Technology is now advancing faster and faster and we understand it a lot better because we built it ourselves. So the problems that digital immortality is facing are merely engineering problems – albeit complicated and difficult ones – that could be solved within the decade if we decided to set up a scheme on the scale of the Manhattan Project."  In particular, he feels that "scanning is the critical problem" and that if you "spent stupid amounts of cash then within a decade many of the limitations of scanning, such as its resolution, could be solved".  If computer power continues to double every two years, as described by "Moore's law", then in the end that will not be an issue either.  "Or it may be that at first we just have to accept a trade-off between what we can do and not do," he suggests. And for Armstrong this represents true immortality, since, rather pragmatically, "if this avatar or robot is to all intents and purposes you, then it is you."  Dr Randal A. Koene, though, is determined to take digital immortality from the pages of books like Cave's and turn it into reality. Koene is founder of the non-profit Carbon Copies Project in California, which is tasked with creating a networking community of scientists to advance digital immortality – "although I prefer to talk about substrate-independent minds, as digital immortality is too much about how long you live, not what you can do with it".  And for Koene it is very much "you", there being a "continuity of self" in the same way that "the person you are today is still the same person you were when you were age five".  "This isn't science fiction, either, this is closer to science fact," he argues. Carbon Copies "is working to create a road map to substrate independence by pulling together all the research that is going on, identify where the gaps are and then what we need to do to plug it.  "A Manhattan Project can easily have its funding removed by government, whereas in this network there are usually multiple projects going on in the same area, and only one needs to succeed."  Furthermore, he feels, the tide of science is moving his way, with India expecting to have built by 2017 a supercomputer big enough to handle the one exaflop of memory required for one brain upload, and such institutions as the Allen Institute for Brain Science spending $300 million to try to crack problems he also needs to solve, such as how the brain encodes, stores and processes information. "Ultimately we won't even be aware that we are being scanned, uploaded and replaced," he believes.  In the end, in Stephen Cave's opinion, digital immortality may well turn out to be a curse, as it always does in mythology.  "If my child died and I replaced her with a digital avatar to help me overcome the grieving, would I let her grow up or even have children of her own? Would I tell her she was a copy? I can imagine just how easy it would be to tell her in a row."  The complications have more serious and wide-ranging implications if humans cannot resist the temptation to "tweak their digital avatars", which may – as Stuart Armstrong argues – lead us closer to a world of "super-upgraded copies" and "the real game changer, multiple copies or clones".  "You could copy the best five programmers in the world a million times or the best call centre worker and these copies would simply replace the humans, who would no longer have any economic value," Armstrong says. "Humans would be left to die, face a life on welfare or live under coercive regulation to control the technology."  For Koene, human societies have faced these kinds of problems many times before. What matters more, he believes, is that digital immortality is the next stage of human evolution as it will "allow us as a species to have the flexibility to survive the process of natural selection that every species has to face", whether on this planet or another.  This time it won't just be the rich who benefit, either, as the technology will be made "open source" for everyone to have the choice whether to be digitally immortal or not. And that would be a curse.

IPhone 5 rumored to use Metal Glass

A damage-tolerant glass:

A damage-tolerant glass
A damage-tolerant glass
Owing to a lack of microstructure, glassy materials are inherently strong but brittle, and often demonstrate extreme sensitivity to flaws. Accordingly, their macroscopic failure is often not initiated by plastic yielding, and almost always terminated by brittle fracture. Unlike conventional brittle glasses, metallic glasses are generally capable of limited plastic yielding by shear-band sliding in the presence of a flaw, and thus exhibit toughness–strength relationships that lie between those of brittle ceramics and marginally tough metals. Here, a bulk glassy palladium alloy is introduced, demonstrating an unusual capacity for shielding an opening crack accommodated by an extensive shear-band sliding process, which promotes a fracture toughness comparable to those of the toughest materials known. This result demonstrates that the combination of toughness and strength (that is, damage tolerance) accessible to amorphous materials extends beyond the benchmark ranges established by the toughest and strongest materials known, thereby pushing the envelope of damage tolerance accessible to a structural metal.

Murdochs News corp under Investigation

Murdochs, News Corp Face Big Week Of Investigations:

Murdochs, News Corp Face Big Week Of Investigations
Murdochs, News Corp Face Big Week Of Investigations
This is a big week for Rupert and James Murdoch. The father and son face more questions from a wide-ranging judicial investigation into press abuses at British units of News Corporation: tabloid phone hacking, computer hacking and a police bribery scandal. Monday marked yet another embarrassing day for News Corp and the Murdochs as Sky News acknowledged it had hacked into the email of the target of two stories, despite explicitly telling the inquiry in September it had not been involved in any hacking. The allegations keep coming of illegal behavior by Rupert Murdoch's News Corporation. Today, an investigation was announced into email hacking by Sky News. News Corp's British operations already stand accused of phone hacking, along with bribing police officers.
As NPR's David Folkenflik reports, the new investigation comes just before Murdoch is scheduled to testify on the sandal.
DAVID FOLKENFLIK, BYLINE: The British media regulator called OfCom announced it would investigate two instances of email hacking by reporters for Sky News. Murdoch's News Corp has a controlling minority stake Sky News' parent company, BSkyB.
During his testimony earlier today, Sky News chief John Ryley was pressed by the presiding judge in that wide-ranging inquiry, Brian Leveson.
JUDGE BRIAN LEVESON: None of this is relevant, is it? Because what you were doing wasn't merely invading somebody's privacy, it was breaching the criminal law?
JOHN RYLEY: It was.
LEVESON: Well, where does the OfCom broadcasting code give any authority to a breach of the criminal law?
RYLEY: It doesn't.
FOLKENFLIK: Sky News told the inquiry last September that it had not been involved in any hacking. Ryley apologized today, saying the company was intending to respond only to questions of criminal mobile phone hacking.
The judicial investigation was set up by Prime Minister David Cameron last July, a week after the report that a Murdoch tabloid had hacked into the cell phone messages of a murdered schoolgirl in a famous case.
One part of the inquiry is into the culture, practices, and ethics of the media; another, into the relationship of the press with police officials and politicians.
A series of newspaper owners - those controlling the rival Telegraph, Evening Standard and Independent - are also testifying this week. But Murdoch and his son James will come in for special scrutiny. The younger Murdoch is to testify tomorrow and Rupert will appear Wednesday and possibly Thursday.
CHRIS BRYANT: Because Rupert Murdoch has had 40 percent of the newspapers and the lion's share of the ownership of BSkyB, he's used the one to protect the other.
FOLKENFLIK: Labor MP Chris Bryant has been a critic and a target of the Murdoch press and other tabloids.
BRYANT: He's used fear and favor with politicians to ensure that in exchange for the support of his newspapers, the politicians would provide legislative support for his cash cow, which was BSkyB, the broadcaster. And when people tried to question that, then sometimes his newspapers would be used to attack with remorseless vigor.
FOLKENFLIK: But, of course, power and influence flow in two directions. And it's not known yet what hidden exchanges Rupert Murdoch may reveal about the favors sought from him, from those who have held the nation's highest offices, such as the very prime minister who created this inquiry last summer.

500 Million multi-state probe

MetLife to pay $500 million in multi-state death benefits probe:

MetLife to pay $500 million in multi-state death benefits probe
MetLife to pay $500 million in multi-state death benefits probe
Life insurance giant MetLife Inc. will shell out nearly $500 million to settle a multi-state probe into its alleged failure to pay death benefits to beneficiaries.  The company said it will pay out about $438 million over the next 17 years, with $188 million going out to beneficiaries this year. Insurance regulators from dozens of states have accused the company of delaying or withholding life insurance payments to many of its policyholders.  About $40 million of that will likely end up in California, said State Controller John Chiang. The funds will either be sent on to beneficiaries of deceased MetLife policyholders or stored in state coffers as unclaimed property.  More than 30,000 California-based MetLife policies are affected, each with an average cash value of $1,200, Chiang said in a statement. MetLife will also cover states’ costs of finding beneficiaries and sending them the benefits overdue to them.  The agreement will "make it clear that if the industry isn't willing to make the payments legally required, we will take action, including lawsuits, to compel them to do right by their customers," Chiang said in a statement.  MetLife failed to properly use the Social Security Administration’s database of deceased individuals, known as the “Death Master File,” according to a joint investigative hearing held by Chiang and California Insurance Commissioner Dave Jones in May.  Regulators concluded that when MetLife was aware of policyholders who passed away, it often didn’t make payments to beneficiaries. And when benefits went unclaimed after several years, Chaing’s office  said, MetLife did not forward on the funds to the State Controller’s office as required by law.  As part of Monday’s settlement, the company has also agreed to reform its benefits payment process, promising to conduct a thorough search for beneficiaries while also attempting to reconnect with policyholders over age 90.  MetLife said in a statement that it paid out about $12 billion in life insurance claims last year, with 99% of claims submitted by beneficiaries. The company said that policyholder deaths that don’t involve a claim are a “small proportion” of the total.  It also said it launched a website to help customers find their policies.  Last year, Chiang struck similar settlements totaling more than $40 million with Manulife Financial Corp.’s John Hancock business and Prudential Financial Inc. Monday’s settlement includes states such as Illinois, Florida, New Hampshire, North Dakota and Pennsylvania.

Monday, April 23, 2012

Humans Are Natural Vegetarians

Meat Myth: Humans Are Natural Vegetarians:

Meat Myth: Humans Are Natural Vegetarians
Meat Myth: Humans Are Natural Vegetarians
Frequently stated notion that eating meat was an essential step in human evolution. While this notion may comfort the meat industry, it's simply not true, scientifically.  Dr. T. Colin Campbell, professor emeritus at Cornell University and author of The China Study, explains that in fact, we only recently (historically speaking) began eating meat, and that the inclusion of meat in our diet came well after we became who we are today. He explains that "the birth of agriculture only started about 10,000 years ago at a time when it became considerably more convenient to herd animals. This is not nearly as long as the time [that] fashioned our basic biochemical functionality (at least tens of millions of years) and which functionality depends on the nutrient composition of plant-based foods."  That jibes with what Physicians Committee for Responsible Medicine President Dr. Neal Barnard says in his book, The Power of Your Plate, in which he explains that "early humans had diets very much like other great apes, which is to say a largely plant-based diet, drawing on foods we can pick with our hands. Research suggests that meat-eating probably began by scavenging--eating the leftovers that carnivores had left behind. However, our bodies have never adapted to it. To this day, meat-eaters have a higher incidence of heart disease, cancer, diabetes, and other problems."  There is no more authoritative source on anthropological issues than paleontologist Dr. Richard Leakey, who explains what anyone who has taken an introductory physiology course might have discerned intuitively--that humans are herbivores. Leakey notes that "[y]ou can't tear flesh by hand, you can't tear hide by hand.... We wouldn't have been able to deal with food source that required those large canines" (although we have teeth that are called "canines," they bear little resemblance to the canines of carnivores).  In fact, our hands are perfect for grabbing and picking fruits and vegetables. Similarly, like the intestines of other herbivores, ours are very long (carnivores have short intestines so they can quickly get rid of all that rotting flesh they eat). We don't have sharp claws to seize and hold down prey. And most of us (hopefully) lack the instinct that would drive us to chase and then kill animals and devour their raw carcasses. Dr. Milton Mills builds on these points and offers dozens more in his essay, "A Comparative Anatomy of Eating."  The point is this: Thousands of years ago when we were hunter-gatherers, we may have needed a bit of meat in our diets in times of scarcity, but we don't need it now. Says Dr. William C. Roberts, editor of the American Journal of Cardiology, "Although we think we are, and we act as if we are, human beings are not natural carnivores. When we kill animals to eat them, they end up killing us, because their flesh, which contains cholesterol and saturated fat, was never intended for human beings, who are natural herbivores."  Sure, most of us are "behavioral omnivores"--that is, we eat meat, so that defines us as omnivorous. But our evolution and physiology are herbivorous, and ample science proves that when we choose to eat meat, that causes problems, from decreased energy and a need for more sleep up to increased risk for obesity, diabetes, heart disease, and cancer.  Old habits die hard, and it's convenient for people who like to eat meat to think that there is evidence to support their belief that eating meat is "natural" or the cause of our evolution.  But in fact top nutritional and anthropological scientists from the most reputable institutions imaginable say categorically that humans are natural herbivores, and that we will be healthier today if we stick with our herbivorous roots. It may be inconvenient, but it alas, it is the truth.

Female Police officer stands against brutality

Female police officer went to help young man being beaten by fellow cops:

female police officer went to help young man being beaten by fellow cops
female police officer went to help young man being beaten by fellow cops

A woman who intervened when two fellow officers were allegedly assaulting an 'emotionally disturbed' young man, will find out in the next few days if she will be sacked.  Officer Regina Tasca in the Bogota Police Department, New Jersey, has been suspended since the incident last April -  the hearing in front of a retired judge started on Tuesday.  When Officer Tasca, an 11-year veteran with numerous commendations, responded to a call in April 2011, she clicked her unit dashboard camera on.
 
Breaking it up: This photo was taken by the teenage boy's distraught mother as she begged the policemen to stop hurting her son. Officer Regina Tasca is seen her trying to pull one of the men off - it was this intervention which may cost her, her jobBreaking it up: This photo was taken by the young man's distraught mother as she begged the policemen to stop hurting her son. Officer Regina Tasca is seen her trying to pull one of the men off - it was this intervention which may cost her, her job.  She did not realise she was about to capture a mother, screaming for police to stop punching her son outside her home on their front lawn, reported Pix 11.com.  The mother - who is thought to be a councilwoman - had called emergency services to help take her son Kyle, 22, to hospital -  he is reported to have 'emotional issues.'  Officer Tasca was the only officer in the area on that day, so she called for back-up, which is part of response protocol and Ridgefield Park Police then sent the two officers.
 
In limbo: Officer Regina Tasca in the Bogota Police Department, has been suspended the incident last April

 
In limbo: Officer Regina Tasca in the Bogota Police Department, has been suspended since the incident last April - she is an 11-year veteran with numerous commendation.  Officer Tasca said one of the officers charged at the young man and she was 'quite shocked.'  'As he's doing that, another Ridgefield Park officer flies to the scene in his car, jumps out and starts punching him in the head,' she added.  On the tape you can hear Tara, the mother, and Kyle, her son, screaming, "Why are you punching him?" and "Stop punching me!", reported the website.  Kyle's mother was so disturbed by the incident that she took a photo of Officer Tasca, seemingly pulling the two officers off her son.  Kyle was not charged or arrested for an offence - Officer Tasca says this is because he did not threaten anyone and did not have a weapon.  She says he was not violent and did not even attempt to resist during the incident.  Officer Tasca says she was eventually successful in yanking the Ridgefield Park policeman off Kyle.  'If another officer is using excessive force, it's my duty to make sure you stop it. and that's what I did,' says Officer Tasca about her actions.  The hospital took several photos documenting the extensive bruises on the 22-year-old's body including his head, back, arms and wrists.Disturbing: The black-and-white tape captures a mother, screaming for police to stop punching her son on their front lawn.  Officer Tasca said when she met her superior officer after the incident she was asked to hand in her weapon and was told she would be sent for a fitness for duty exam.  Bogota Police suspended Officer Tasca and the website reports that after hearing her story, they were concerned she was psychologically incompetent to be a police officer.  But the two officers in the video have not been interviewed by an Internal Affairs Investigator, and are still working the streets today, reported Pix11.com. 
 
Case: After hearing Officer Tasca's story, Bogota PD, believes she is psychologically incompetent to be a police officer, and she is being sent for testingCase: After hearing Officer Tasca's story, Bogota PD, believes she is psychologically incompetent to be a police officer, and she is being sent for testing.  Tasca's attorney Catherine Elston said: This was excessive force used against an emotionally disturbed person.'  'This was an unlawful tackle, this was a punching an emotionally disturbed person whose arms were pinned under his chest with his face pushed into the ground,' she added.  Kyle's mother later called her and said on Officer Tasca's answering machine: 'Thank you Regina. I appreciate you standing up for him, for protecting him while the officer attacked him. I can't figure out what I would have done without you at the scene.'  Raymond Wiss, who represented the borough in a disciplinary hearing, said Officer Tasca’s termination is warranted based on two incidents in April 2011 — one at Holy Name Medical Center, in which she is accused of failing to assist a fellow officer who was attacked by a drunken woman, and the incident with the two Ridgefield Park officers.

U.S. Secret Zug Island testing effects Canada

Mysterious hum in Canada coming from U.S. Industrial Site:
Mysterious hum in Canada coming from U.S.
Mysterious hum in Canada coming from U.S.
WINDSOR, Ontario -- A mysterious humming sound that has drawn hundreds of complaints in Windsor, Canada, for more than a year is emanating from Michigan, testing has determined.  The low-frequency, rumbling noise dubbed the Windsor hum is coming from the area of Zug Island, an industrial site, the Canadian Broadcasting Corp. reported.  But officials in River Rogue, Mich., where Zug Island is located, have said they don't have the money to find the precise source of the noise.  "The government of Canada takes this issue seriously," Bob Dechert, a conservative member of Canadian Parliament, said in a news release. "It is important that we find a solution that works for the people of Windsor."  Jim Bradley, Ontario's environment minister, said the ministry has received nearly 500 complaints about the noise, and about 22,000 residents took part in a telephone forum in February about the hum.  Bradley has sent letters to municipal, state and federal officials in the United States asking them to take action, while Dechert has met with representatives of the Great Lakes Commission, the Council of Great Lakes Industries, the Southeast Michigan Council of Governments and the Regional Office of the International Joint Commission to discuss the hum.  Gary Gross said he's had his fill of the hum. "I was in bed, it was about 2:30 a.m. and I could just hear this pulsing noise," he told CBC News. "I decided to get up. It disturbed my sleep and I couldn't get back to sleep."

Scientists create genetic polymer replacing DNA

Scientists create DNA alternative– expected to reveal how molecules first replicated and drive biotechnology research:
Scientists create DNA alternative
Scientists create DNA alternative
Scientists have created artificial genetic material that can store information and evolve over generations in a similar way to DNA – a feat expected to drive research in medicine and biotechnology, and shed light on how molecules first replicated and assembled into life billions of years ago.  Ultimately, the creation of alternatives to DNA could enable scientists to make novel forms of life in the laboratory.  Researchers at the MRC Laboratory of Molecular Biology, in Cambridge, developed chemical procedures to turn DNA and RNA, the molecular bases for all known life, into six alternative genetic polymers called XNAs.  The process swaps the deoxyribose and ribose (the “d” and “r” in DNA and RNA) for other molecules. It was found the XNAs could form a double helix with DNA and were more stable than natural genetic material.  In the journal Science the researchers describe how they caused one of the XNAs to stick to a protein, an ability that might mean the polymers could deployed as drugs working like antibodies.  Philipp Holliger, a senior author on the study, said the work proved that two hallmarks of life – heredity and evolution – were possible using alternatives to natural genetic material.  “There is nothing Goldilocks about DNA and RNA,” Holliger told Science. “There is no overwhelming functional imperative for genetic systems or biology to be based on these two nucleic acids.”  Vitor Pinheiro, a co-author on the paper, said the research could help scientists unpick how DNA and RNA became so crucial in the evolution of life, and perhaps even help in the search for extraterrestrial organisms. “If a genetic system doesn’t have to be based on DNA and RNA, what then do you define as life? How do you look for life?” he said.  In an accompanying article, Gerald Joyce, of the Scripps Research Institute in La Jolla, California, says the study heralds an “era of synthetic genetics, with implications for exobiology [which deals with extraterrestrial life], biotechnology and understanding life itself”. He adds: “Construction of genetic systems based on alternative chemical platforms may ultimately lead to the synthesis of novel forms of life.”  Other scientists, including a team at the J Craig Venter Institute , in Rockville, Maryland, are hoping to make synthetic organisms from scratch, but the majority of the work so far has used conventional DNA.  In his article on the Cambridge study Joyce alludes to the potential dangers of synthetic genetics. He writes: “As one contemplates all the alternative life forms that might be possible with XNAs and other more exotic genetic molecules, the words of Arthur C Clarke come to mind. In 2010: Odyssey Two, HAL the computer tells humanity, ‘all these worlds are yours’, but warns – ‘except [Jupiter's moon] Europa, attempt no landings there’. Synthetic biologists are beginning to frolic on the worlds of alternative genetics but must not tread into areas that have the potential to harm our biology.”

15 year old hacks 259 Websites

15-year-old hacks 259 websites in just 3 months:

15-year-old hacks 259 websites in just 3 months
15-year-old hacks 259 websites in just 3 months
If you’re looking for a gauge as to how good or bad web security is at the moment, look no further than the case of a 15-year-old from Austria who, over the course of 3 months, managed to hack 259 company websites and databases.  The young man (boy?) was anti-social and turned to the Internet for “praise and affirmation.” He found a hacking community that rewarded successful attacks, downloaded the tools he needed, and set about bypassing the security of different websites.  Between January and March this year he successfully gained access to 259 sites including a few run by adult entertainment companies. Any that he defaced were left with a tag like the one in the screenshot above. His hacker name was ACK!3STX.  The Federal Criminal Police Office (BMI) in Austria identified the boy after many complaints when he failed to hide his IP address during a hack. It was logged and passed to the BMI who arrested him. It didn’t take long for a confession to be forthcoming.  The attacks weren’t aimed at any particular sites, instead it turns out he was just looking for security holes he could exploit in any and all websites he visited. His reason? He was bored as well as wanting praise from the hacker community.  Hacking 259 websites in 3 months is impressive not because a 15-year-old did it, but because it seems to have been done so easily. A boy with no experience and using free tools did this. Clearly website security still isn’t a major concern for the majority of companies being hacked and/or the frameworks being used to implement them.

Police fatally shoots man

Stanislaus deputy Tasers, fatally shoots man:
shooting
shooting
MODESTO, Calif. -- Authorities are investigating the shooting death of a man by a Stanislaus County sheriff's deputy who was responding to reports of a family dispute.  Sheriff's officials say the deputy went to the home in the town of Keyes on Monday afternoon.  Sgt. Anthony Bejaran says the deputy first used a Taser on 32-year-old George Ramirez Jr. and called for backup. Moments later, the deputy reported that he fired shots.  Ramirez's family told KCRA-TV that he was severely depressed and that they urged the deputy not to hurt him. George Ramirez Sr. says the deputy refused to listen and shot his son three times after he staggered back to his feet from the Tasering.  Sheriff's officials declined comment on the family's claims pending the investigation.

Wednesday, April 18, 2012

Microsoft spy's one you reports to Government

A patent filed by Microsoft reveals the company has voluntarily created software that provides the Government and other agencies seeking to spy on you:
Microsoft
A patent filed by Microsoft reveals the company has voluntarily created software that provides the Government and other agencies seeking to spy on you.
A patent filed by Microsoft seeks to give the company exclusive rights to intercept personal electronic communications and resend them directly to the Government and other agencies who may be seeking to spy on you.  By filing the patent, Microsoft clearly shows they have voluntarily created the software,  instead of waiting for a Government mandate to do so. The patent states that “the  government or one of its agencies may need to monitor communications” and software acts as a “recording agent” that is able to silently record the communication”.  The patent specifically names certain types of communications, such as Skype calls, instant messaging, video conferencing software, and even meeting software but does not stop there. Instead it goes on to label just about all electronic devices you can think of as a computer and requests for a patent to be able to intercept digital communications from those devices, and even access data stored in a variety of other storage mediums, and forward the to the Government.  A Gizmodo article on the patent points out that Microsoft appears to trying to patent Skype spying,  which is specifically named within the patent,  but the scope of patent goes far beyond the ability to just spy on Skype calls.  Only by digging into the patent can you see the deceptiveness in Microsoft’s the labeling of certain technologies and realize the true scope of what the software company is trying to provide the Government easy access to spy on.  For example, the label all packet-based communication as VoIP, which clearly nothing is further from the truth. All data that can be sent over the internet is a “packet-based communication”.
[...] the term VoIP is used to refer to standard VoIP as well as any other form of packet-based communication that may be used to transmit audio over a wireless and/or wired network. For example, VoIP may include audio messages transmitted via gaming systems, instant messaging protocols that transmit audio, Skype and Skype-like applications, meeting software, video conferencing software, and the like.
The patent goes on and deceptively labels all digital electronic devices as computers, say that everything from computers, to printers, gaming devices, automobile systems, even printers, home appliances and all other mobile based electronics are computers. The patent even applies to microcontroller which are often the brain of electronic devices and used in products ranging from automobile engine control systems, implantable medical devices, remote controls, office machines, appliances, power tools, and even toys.
A computer may include any electronic device that is capable of executing an instruction[...]
Examples of well known computing systems, environments, or configurations that may be suitable for use [include] personal computers, server computers, hand-held or laptop devices, multiprocessor systems, microcontroller-based systems, set-top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, personal digital assistants (PDAs), smartphones, gaming devices, printers, appliances including set-top, media center, or other appliances, automobile-embedded or attached computing devices, other mobile devices, distributed computing environments that include any of the above systems or devices, and the like.
The patent also doesn’t stop with computers or even communications for that matter. It targets a variety of offline mediums that can used to store data and even computer programs themselves.
[...] a variety of computer-readable media [including] any available media that can be accessed by the computer  removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules, or other data.
Computer storage media includes RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile discs (DVDs) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by the computer.
The patent further reveals that the software’s capability includes the ability to intercept all digital communications regardless of the medium, or whether they are online or offline, bluntly including the ability to intercept all modulated data signals.
Communication media typically embodies computer-readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of any of the above should also be included within the scope of computer-readable media.

America revoke passports of anyone with tax debt

Tax Debt? Feds Want Your Passport:

Tax Slavery
Tax Slavery
A year ago, we reported on the State Department’s new passport application rules, which some have called unconstitutional. A new bill now making its way through Congress could prevent even more Americans from traveling abroad. A transportation bill recently passed by the Senate contains a controversial provision that could allow the State Department to revoke the passport of anyone with an “excessive” tax debt.  Senate Majority Leader Harry Reid added the tax enforcement language to an “Act to reauthorize the Federal - aid highway and highway safety construction programs”, probably categorizing it under the latter part of the title, “and for other purposes”. That bill — SB1813– was introduced by Senator Barbara Boxer (D-CA) in November. Before it was passed by the Senate on a 74-22 vote in March, it became the Moving Ahead for Progress in the 21st Century Act, or MAP-21.  A recent Summary of the Senate Finance Committee Title of the Highway Bill on the Senate’s website reads:
Currently the Federal government revokes passports and denies new passports to individuals who owe more than $2,500 in child support payments. Similarly, this provision would authorize the government to deny the application for a new passport or renewal of an existing passport when the individual has $50,000 or more (indexed for inflation) of unpaid federal taxes which the IRS is collecting through enforcement action. It would also permit the Federal government to revoke a passport upon reentry into the United States for such individuals. This provision is estimated to raise $743 million over ten years.
The provision isn’t as draconian as a first glance would have you believe, but it would be precedent setting, says tax attorney Robert Wood.  “Does this [enforcement] apply in all cases? Mercifully no,” writes Wood in a recent Forbes piece. “You could travel if your tax debt is being paid in a timely manner or in emergency circumstances or for humanitarian reasons. But this isn’t limited to criminal tax cases or situations where the government fears someone is fleeing a tax debt.” Wood reminds his readers that the IRS files liens and levies all the time and that under the tax enforcement provision of MAP-21, all it would take is an accusation of a debt to prevent any U.S. Citizen from leaving the country at their leisure.  According to constitutional attorney Angel Reyes, the provision is a violation of due process and is unconstitutional.  “It takes away your right to enter or exit the country based upon a non-judicial IRS determines that you owe taxes,” Reyes told FOX Business. “It’s a scary thought that our congressional representatives want to give the IRS the power to detain US citizens over taxes, which could very well be in dispute.”  Perhaps Republican presidential candidate Ron Paul wasn’t off his meds when he suggested last September that the lingering economic malaise might encourage federal-level capital controls (and even lead to what he called “people controls”). Those remarks, the target of popular ridicule at the time, came during a nationally televised Republican presidential debate.

Deaf Cyclist Murdered by Police

Police 'Killed Deaf Cyclist With Stun Gun After He Failed To Obey Instructions To Stop':
police-state
police-state
A police officer killed an elderly, deaf and mentally disabled man riding his bicycle by shooting him with a Taser stun gun after he failed to obey instructions to stop. Roger Anthony, 61, was killed as he made his way home in Scotland Neck, South Carolina, after officers responded to a 911 call about a man who had fallen off his bicycle in a car park. The caller told dispatchers that the man appeared drunk and that it looked like he had hurt himself. Officers said they repeatedly told Mr Anthony to get off his bike, but when he didn't respond, they shocked him. The state Office of the Medical Examiner hasn't yet determined a cause of death. Family members claim Mr Anthony had hearing problems and suffered from seizures. Now they're considering whether to file a lawsuit against the town. His brother Michael said: 'What did they tase him for? It's hurting me. It's really hurting me.'  Scotland Neck Mayor James Mills said he wouldn't blame the family for suing. 'There has been no information that this man was a threat to anybody,' he said.
">Scene: Mr Anthony was shot with the Tazer gun as he cycled home in the town of Scotland Neck, South Carolina 
Scene: Mr Anthony was shot with the Tazer gun as he cycled home in the town of Scotland Neck, South Carolina.  'If I was a family member, I'm sure I'd be thinking the same way.'  Mills said he has tried to get information from the police department about what happened to Mr Anthony, but they have turned him away. Police Chief Joe Williams says the officer is on administrative leave while the SBI conducts its investigation. He declined to comment further. Anthony's family said they hope the case is resolved soon.  Excessive force: Family members claim Mr Anthony had hearing problems and suffered from seizures Mr Anthony's niece, Porsha Anthony said: 'I'm sad. I lost an uncle. 'Hopefully it will be rectified so that not another family in Scotland Neck has to go through this'. The State Bureau of Investigation in South Carolina said they are looking into Mr Anthony's death.
Deaf Cyclist
Deaf Cyclist

Powerful forces line up against internet around world

Google: Internet Freedom Faces Greatest Threat Ever:

1984-was-not-supposed-to-be-an-instruction-manual
1984-was-not-supposed-to-be-an-instruction-manual
In an interview published today, Google Co-founder Sergey Brin told The Guardian that internet openness and universal access are under immediate attack by "very powerful forces that have lined up against the open internet on all sides and around the world". "I am more worried than I have been in the past," he said. "It's scary."

Sergey Brin Google co-founder .The threat to the internet comes "from a combination of governments increasingly trying to control access and communication by their citizens, the entertainment industry's attempts to crack down on piracy, and the rise of 'restrictive' walled gardens such as Facebook and Apple, which tightly control what software can be released on their platforms," The Guardian reports.  In the interview Brin alludes to the reach of the US government, telling how Google is forced to hand over data and is restricted from notifying users that their privacy has been breached.
Brin said he and co-founder Larry Page would not have been able to create Google if the internet was dominated by Facebook. "You have to play by their rules, which are really restrictive," he said. "The kind of environment that we developed Google in, the reason that we were able to develop a search engine, is the web was so open. Once you get too many rules, that will stifle innovation."
He criticised Facebook for not making it easy for users to switch their data to other services. "Facebook has been sucking down Gmail contacts for many years," he said. [...]
He reserved his harshest words for the entertainment industry, which he said was "shooting itself in the foot, or maybe worse than in the foot" by lobbying for legislation to block sites offering pirate material.
He said the Sopa and Pipa bills championed by the film and music industries would have led to the US using the same technology and approach it criticised China and Iran for using. The entertainment industry failed to appreciate people would continue to download pirated content as long as it was easier to acquire and use than legitimately obtained material, he said. [...]
Brin acknowledged that some people were anxious about the amount of their data that was now in the reach of US authorities because it sits on Google's servers. He said the company was periodically forced to hand over data and sometimes prevented by legal restrictions from even notifying users that it had done so.

China's heavy-handed censorship accelerate rumors

Rumor, Lies, and Weibo: How Social Media is Changing the Nature of Truth in China:

chinese
chinese
When the message appeared on the Weibo account of Xinhua, China's official news agency on April 10, announcing charges against the family of high-profile party leader Bo Xilai, it ended many days of public speculation on China's largest political crisis in decades. But it also left Chinese web users even more deeply confused about the distinction between political truth and rumor, one that has always been hazy in China but is now blurred even more by social media.  Chinese web users began speculating, following Bo's firing as Chongqing party chief in March, about the Bo family's possible role in the mysterious death of Neil Heywood, a British businessman with close ties to the family. China's Internet censors muzzled the online discussions. The government spokesmen stonewalled inquiries from the British government and told curious Chinese that Heywood died of "excessive drinking," admonishing them "not to spread groundless rumor."  On the morning of April 11, Chinese web users woke up to find that the reports that had previously filled their Weibo pages -- in coded words adopted to evade the censors -- now featured the front page of every official newspaper. The rumor, repressed by censors and dodged by government spokesmen, had become a state-approved fact overnight.  "What was treated as attacks spread by 'international reactionary forces' has now become truth. Then what other 'truths' exposed by foreign media should we believe?...God knows!" wrote Weibo user Jieyigongjiang. "How did it all become truth? Was I being fooled?" user Zousifanye asked. This hall-of-mirrors system can be confusing even for the officials who run it.  For China's new generation of tech-savvy youth, who compose the bulk of the nation's estimated 300 million Weibo users, the downfall of Bo Xilai is the largest political crisis they have witnessed. The sudden volatility of the official versions of truth on the story has left many of them deeply confused. Some see this as a victory for Weibo, which is moderated by censors but often too free-wheeling and fast-moving for them to maintain total control, over more traditional media, which is openly run by the state. "In this political drama that took place in Yuzhou [alternative name for Chongqing], all the media outlets were following Weibo. The power of social media is manifested here," user Tujiayefu wrote. User Kangjialin agreed: " 'Rumor' is the proof that mainstream media is now falling behind Weibo."  The government controls all forms of media in China, including Weibo. But on occasions censorship of Weibo is known to relax, allowing windows of free speech, particularly in the cases of breaking news. Chinese distrust of the country's traditional media, which regularly covers up food scandals and human rights violations, is leading many people to turn to Weibo for information and news. The Twitter-like service has helped expose incidents of mafia intimidation and money laundering. Weibo-based stories like that of Guo Meimei, the 20-year-old "senior official" at the state-run Red Cross Society who posted photos of her new Lamborghini and Maserati online, ignited firestorms of discussions on weightier, more sensitive, and sometimes forbidden subjects such as corruption within state-run social organizations.  In the West, social media is treated skeptically for the exact same reason that it is so embraced in China: it is rife with rumors. Its break-neck speed allows little time for fact-checking or editorial supervision, which also means it can move too quickly for censors. Its noisy, open-source discussion -- anyone can say anything and watch it spread -- makes it tougher for Western users to trust, but easier for Chinese users, who know that censors can pressure official news organizations but not a hundred million anonymous citizen-bloggers. That anonymity is slowly receding, but this hasn't done much damage to the service's popularity or power.  In the Bo Xilai saga, many Weibo users had at first dismissed the dramatic speculations over the Communist Party's divisive infighting as sensationalized rumors. Now that the rumors have turned out to be true, they're re-examining the established beliefs that led them to reject the stories and to take the officials at their word. "The result of rumor turning truth is that from now on all rumors will become more trustworthy," concluded Potomac Xiaowu.  The government is fighting back, reminding Chinese web users that Weibo is also a hot bed of invented rumors, and that believing and spreading them can bring real consequences. Less than a month ago, whispers circulated on Weibo of troop movements near the leadership's Zhongnanhai compound in central Beijing. Those whispers soon grew into a full-blown account of a coup being staged by Bo's Party allies in Beijing. Tanks purportedly rolled in and gunshots were fired, a story with terrifying echoes of the 1989 protest on Tiananmen Square. The rumors quickly made it into Western media. Just as it became clear that these stories weren't true, the government ordered the shutdown of 16 websites and detention of six people over the rumors, which it clearly considered threats to public order. The two massive Weibo sites, Sina and Tencent, were forced to shut down their comment function for three days in order to "carry out a concentrated cleanup."  China's heavy-handed censorship may now actually accelerate the spread of rumors, which could be seen as more plausible precisely because they are censored. Chinese web users trying to figure out the most likely truth must speculate not only about the rumors themselves, but also about every move the government makes in response. Did the state order censors to crack down on a particular story because they want quell a false and potentially destabilizing rumor or because they want to prevent an uncomfortable truth from spreading? If censors clamp down on a growing rumor later than expected or not at all, is this because they're simply slow or because government wants to build up public attention for its own purposes? In the days immediately after Bo's removal from his Chongqing office, for example, Internet rumors about his misdeeds circulated freely, in what many suspect was a state effort to build public knowledge of his corruption and turn people against him. For Chinese netizens trying to parse out truth from rumors, every story and its government response are a new mystery, and the guessing game never really ends.  This hall-of-mirrors system can be confusing even for the officials who run it, and social media consumers are not the only people in China who can confuse truth and rumor. Last February, as protest movements stormed the Middle East, starting with the "Jasmine revolution" in Tunisia, a crowd gathered quietly in central Beijing after anonymous calls for their own Jasmine protests. The small crowd was outnumbered by skittish police, not to mention a number of Western reporters. Both groups had also caught the rumor and responded swiftly.  The movement was ended before it had really started, but it continued to ripple through the life of common Chinese citizens in ways its initiators had probably not expected. In the next months, although few or no protesters actually gathered and there seemed to be little momentum for an Arab Spring-style movement, the government seemed to take the social media mumblings far more seriously than the actual activists. Streets were blocked and plainclothes police were stationed at shopping malls and movie theaters every few hundred of feet. Security officials detained dozens of leading activists, including artist Ai Weiwei, in apparent fear of their stirring further unrest, and threatened foreign journalists for reporting on the incident. When Chinese people realized the word "jasmine" was blocked from the Internet and from text messages, though euphemisms for the word were now well-known, and the flower was banned at Beijing botanic markets, the news of the pseudo-revolution had reached a wide public. The government, in its effort to quell the rumor, had ballooned it into an alternate version of truth. Their over-reaction had communicated the rumors of a revolution far more powerfully than had the actual rumors or its proponents.  The tug-of-war between the government and the people over truth and rumor happens every day in today's China. The rise of social media has made the struggle harder and the stakes higher. The night the government announced the charges against Bo Xilai, a crowd of thousands gathered in Chongqing and clashed with local police. The government vigorously denied any connection between the incident and Bo's expulsion, meanwhile moving to delete relevant messages and photos from Weibo. The Chinese web users reveling in the role of social networking sites in revealing the Bo scandals once again fell into debates, while others have been reflecting on larger questions. "Why does the U.S. not censor rumors?" asked one Weibo user last November. "No matter how wild they are, nobody bans them, and the creators of rumors do not worry about getting arrested. Perhaps for places where truth persists, rumors have no harm. Only places that lack truth are fearful of rumors."  Had the censors tried to look for the original writer of this message, they would not have found him or her. The name is lost amid millions of others, who forward the message after each round of rumor-clearing seizes Weibo in a state-run information purge that can never quite keep up.

President Intelligence agencies safeguarding Leaks

President Creates Task Force to Stop Leaks of Classified Information:
obama_false
obama_false
A joint task force of American law enforcement and intelligence agencies is drafting a plan to prevent cyber attacks and information leaks from those working inside the agencies. The proposal is a requirement of an executive order signed October 7 of last year by President Obama. Executive Order 13587 sets guidelines designed to “to ensure the responsible sharing and safeguarding of classified national security information (classified information) on computer networks.
"One step toward the accomplishment of this goal is the creation of an interagency Insider Threat Task Force. That group is charged with developing a Government-wide program (insider threat program) for deterring, detecting, and mitigating insider threats, including the safeguarding of classified information from exploitation, compromise, or other unauthorized disclosure, taking into account risk levels, as well as the distinct needs, missions, and systems of individual agencies. This program shall include development of policies, objectives, and priorities for establishing and integrating security, counterintelligence, user audits and monitoring, and other safeguarding capabilities and practices within agencies. Reading between the lines it is easy to see what prompted the issuing of this order and the creation of this new bureaucracy: WikiLeaks. President Obama likely was also motivated by the acts of Army Private Bradley Manning. In what is described as “the biggest leak of classified information in U.S. history,” Manning is accused of passing over 700,000 documents and video clips to WikiLeaks, the widely known website devoted to exposing government corruption throughout the world. Private Manning, 24, from Crescent, Oklahoma, has been detained since he was arrested on May 29, 2010 while on deployment with the 10th Mountain Division in Iraq. While on duty near Baghdad, Manning had access to the Secret Internet Protocol Router Network (SIPRNet) and the Joint Worldwide Intelligence Communications System. SIPRNET is the network used by the U.S. government to transmit classified information. Manning’s arrest came as the result of information provided to the FBI by a computer hacker named Adrian Lamo. Lamo told agents that during an online chat in May 2010, Manning claimed to have downloaded classified information from SIPRNet and sent it to WikiLeaks. According to published reports, the material Manning is accused of unlawfully appropriating includes a large cache of U.S. diplomatic cables (approximately 250,000), as well as videos of an American airstrike on Baghdad conducted in July 2007 and a similar attack in May 2009 on a site near Granai, Afghanistan (an event sometimes known as the Granai Massacre). Of course, the new policy is being promoted by the Obama administration as an attempt to assist law enforcement and intelligence to “connect the dots” so as to prevent future terrorist attacks on the homeland. A key member of the task force and the Office of the Director of National Intelligence, John Swift, is quoted in a recent article as saying that the agencies named in the executive order are committed to conforming to the requirements handed down by President Obama. "The National Policy on Insider Threat is in draft and will probably move its way to the White House National Security Staff in the next month or two, which is pretty fast in the federal scheme of things," said Swift during a panel discussion on the insider threat at the FOSE trade show in Washington Wednesday. "However, in order to actually implement a program, you will want to have standards. Those standards are being developed now by the task force, and all the interagency members that are working on it. Those standards have to be issued by October of this year." The Order gives the agencies one year to set and implement the appropriate standards for identifying and eliminating the threats of leaks caused by intelligence insiders.
 
According to the article published by Federal News Radio, Swift said that most agencies have already developed protocols for identifying “troubled employees” who would be the most likely suspects in a case of an insider passing on classified information. The Task Force will take advantage of the protocols that are already in place by examining each and choosing from among them those best suited to being reported to all the relevant departments within the Executive Branch. In reading the description of the policy in the Federal News Radio piece, it would seem that the Task Force is preparing training modules for federal employees that teach them how to recognize behavior that might indicate that a colleague is a potential risk to national security. Prior to the branch-wide implementation of whatever scheme is finally approved by the Task Force and the President, there is a method already set to be enforced that could address the potential for leaks. In order to decrease the “potential for terrorist attacks,” Homeland Security Presidential Directive 12 calls for the creation of a mandatory, Government-wide standard for secure and reliable forms of identification issued by the Federal Government to its employees and contractors (including contractor employees). Rob Carey, the Defense Department deputy chief information officer, said during another session at FOSE that the federal ID card can “prevent unauthorized access to data and promote information sharing at the same time along with improving the cybersecurity of an agency's network.” The absolute requirement that the identification be used by intelligence employees will provide the President with a keystroke-by-keystroke record of every worker’s online activity. This level of after-the-fact monitoring will plug the pores in our nation’s cybersecurity. As Carey explained it, implementation of the key card control mechanism will “add another layer of security while also letting officials know who is on the network, when they were on the network and what they were doing there.” As set forth in the Directive, "Secure and reliable forms of identification" for purposes of this directive means identification that (a) is issued based on sound criteria for verifying an individual employee's identity; (b) is strongly resistant to identity fraud, tampering, counterfeiting, and terrorist exploitation; (c) can be rapidly authenticated electronically; and (d) is issued only by providers whose reliability has been established by an official accreditation process. The Standard will include graduated criteria, from least secure to most secure, to ensure flexibility in selecting the appropriate level of security for each application. The use of the “Common Identification Standard for Federal Employees and Contractors” is only one of the ideas being offered for securing the country’s most critical classified data. One member of the Insider Threat Task Force, Diana Braun, said that the ID cards are just one of five “near term ways to strengthen systems against insider threats.” According to the rubrics contained in Executive Order 13587, the agencies listed therein must submit annual reports to the Steering Committee created by the Order. The Senior Information Sharing and Safeguarding Steering Committee shall be co-chaired by senior representatives of the Office of Management and Budget and the National Security Staff. Members of the committee shall be officers of the United States as designated by the heads of the Departments of State, Defense, Justice, Energy, and Homeland Security, the Office of the Director of National Intelligence, the Central Intelligence Agency, and the Information Security Oversight Office within the National Archives and Records Administration (ISOO), as well as such additional agencies as the co-chairs of the Steering Committee may designate. While it is indisputable that our nation must be protected from the damage that could be caused by intelligence agency insiders who criminally pass classified information to those who could pose a legitimate and demonstrable threat to our national security, what is perhaps more helpful to the long-term freedom of our Republic is the immediate end of all those secret yet reprehensible activities being carried out by our government that bring shame to every citizen.  If we could rid our government of those in high places who are working against the cause of liberty and peace, then we wouldn’t need another task force or federal agency.

Millions of people against monsanto's

Millions Against Monsanto:
Millions Against Monsanto
Millions Against Monsanto
The Food Fight of Our Lives. Finally, public opinion around the biotech industry's contamination of our food supply and destruction of our environment has reached the tipping point. We're fighting back.

 
 
 "If you put a label on genetically engineered food you might as well put a skull and crossbones on it." -- Norman Braksick, president of Asgrow Seed Co., a subsidiary of Monsanto, quoted in the Kansas City Star, March 7, 1994. "Monsanto should not have to vouchsafe the safety of biotech food. Our interest is in selling as much of it as possible. Assuring its safety is the FDA's job." -- Phil Angell, Monsanto's director of corporate communications, quoted in the New York Times, October 25, 1998. For nearly two decades, Monsanto and corporate agribusiness have exercised near-dictatorial control over American agriculture, aided and abetted by indentured politicians and regulatory agencies, supermarket chains, giant food processors, and the so-called “natural” products industry. Finally, public opinion around the biotech industry’s contamination of our food supply and destruction of our environment has reached the tipping point. We’re fighting back. This November, in a food fight that will largely determine the future of what we eat and what we grow, Monsanto will face its greatest challenge to date: a statewide citizens’ ballot initiative that will give Californians the opportunity to vote for their right to know whether the food they buy is contaminated with GMOs. A growing corps of food, health, and environmental activists - supported by the Millions against Monsanto and Occupy Monsanto Movements, and consumers and farmers across the nation - are boldly moving to implement mandatory labeling of genetically engineered foods in California through a grassroots-powered citizens ballot initiative process that will bypass the agribusiness-dominated state legislature.  If passed, the California Right to Know Genetically Engineered Food Act will require mandatory labeling of genetically engineered foods and food ingredients, and outlaw the routine industry practice of labeling GMO-tainted foods as “natural." Passage of this initiative on November 6 will radically alter the balance of power in the marketplace, enabling millions of consumers to identify - and boycott - genetically engineered foods for the first time since 1994, when Monsanto’s first unlabeled, genetically-engineered dairy drug, recombinant Bovine Growth Hormone (rBGH), was forced on the market, As Alexis Baden-Mayer, Political Director for the Organic Consumers Association, pointed out at an Occupy Wall Street teach-in in Washington DC in early April: “The California Right to Know Genetically Engineered Food Act ballot initiative is a perfect example of how the grassroots 99% can mobilize to take back American democracy from the corporate bullies, the 1%. By aggressively utilizing one of the last remaining tools of direct democracy, the initiative process (available to voters not only in California and 23 other states, but in thousands of cities and counties across the nation), we can bypass corrupt politicians, make our own laws, and force corporations like Monsanto to bend to the will of the people, in this case granting us our fundamental right to know what’s in our food.”