Aletho News

ΑΛΗΘΩΣ

NRC Rejects Recommendation to Require Nuclear Plant Owners to Establish Plans to Address a Core-Melt Accident

Commissioners Ignore Lessons of Fukushima

Union of Concerned Scientists | August 28, 2015

Washington (August 28, 2015)—The U.S. Nuclear Regulatory Commission (NRC) has rejected the recommendation of the high-level task force it convened after the March 2011 Fukushima disaster to require nuclear plant owners to develop and maintain plans for coping with a core-melt accident. This decision will allow nuclear plants to continue to maintain those plans voluntarily and deny the agency the authority to review those plans or issue citations if they are deficient.

“Once again, the NRC is ignoring a key lesson of the Fukushima accident: Emergency plans are not worth the paper they are printed on unless they are rigorously developed, maintained and periodically exercised,” said Edwin Lyman, a senior scientist at the Union of Concerned Scientists (UCS). “When it comes to these critical safety measures, the NRC is allowing the industry to regulate itself.”

In a decision posted on the NRC’s ADAMS website on August 27, NRC commissioners instructed agency staff to remove a provision of a proposed draft rule aimed at protecting plants from Fukushima-type accidents that would require nuclear plants to establish Severe Accident Management Guidelines, or SAMGs. The staff’s proposal was in response to Recommendation 8 of the NRC’s post-Fukushima staff recommendations, which questioned the effectiveness of NRC’s current practice of allowing plant owners to develop and maintain the SAMGs on a voluntary basis.

“The NRC has concluded that SAMGs are an essential part of the regulatory framework for the mitigation of the consequences of accidents,” the NRC staff wrote in its proposed draft rule. “Imposition of SAMGs requirements (versus a continuation of the voluntary initiative) would ensure that SAMGs are maintained as an effective guideline set through time.”

The nuclear industry—led by its premier trade organization, the Nuclear Energy Institute (NEI)—opposed the proposal to require SAMGs, arguing that the proposal did not meet a strict cost-benefit standard. Rejecting its own staff’s recommendation, the commissioners voted in favor of the industry and against the public interest.

“The NRC’s process for cost-benefit analysis is defective and is being misused to make bad decisions,” Lyman said. “The American public is not going to be adequately protected unless this process is fixed by taking into account the true costs should a Fukushima-type accident take place in the United States.”

Yesterday’s decision also removes a provision from the proposed draft rule that would require new reactors to have additional design features to protect against Fukushima-type accidents. By eliminating this requirement, Lyman said, the NRC is relinquishing the opportunity to ensure that new reactors built in the United States will have stronger protection measures than the current reactor fleet.

September 2, 2015 Posted by | Environmentalism, Nuclear Power | , , | Leave a comment

Missing From Reports of Yemeni Carnage: Washington’s Responsibility

YemenAirstrike

This photo of the aftermath of an airstrike in Sana, Yemen, accompanied a New York Times story (6/24/15) that provided a detailed account of the human toll of the air war—but made no mention of the US’s responsibility. (photo: Mohamed Al-Sayaghi/Reuters)

By Jim Naureckas | FAIR | August 31, 2015

The New York Times (8/30/15) reported on the deaths of civilians in a military assault in Yemen. Wrote reporter Saeed Al-Batati:

Airstrikes by a Saudi-led military coalition killed at least 13 civilians working early Sunday at a water plant in northern Yemen, the plant’s owner said.

The bombings appeared to be the latest in a series of airstrikes by Saudi Arabia or its Arab coalition partners that have hit civilian facilities with no apparent military target nearby.

The Washington Post (8/30/15) briefly covered the story too, using a Reuters wire report that gave a higher death toll:

An airstrike by warplanes from a Saudi-led coalition, which said it targeted a bomb-making factory, killed 36 civilians working Sunday at a bottling plant in the northern Yemeni province of Hajjah, residents said.

Noting that another airstrike had killed four people in Sanaa, Yemen’s capital, the piece continued:

The attacks were the latest in an air campaign launched in March by a Saudi-led alliance in support of Yemen’s exiled government, which is fighting Houthi forces allied with Iran.

Both of these reports left out the information that made this news particularly relevant to the papers’ mostly American readership: The US government is actively backing the air war in Yemen that killed those civilians, as the Times and Post have both reported. The Times (3/26/15) wrote at the start of the Saudi assault:

A spokeswoman for the National Security Council said Wednesday night that the United States was providing intelligence and logistical support for the campaign in Yemen, and that President Obama had authorized a ”joint planning cell” with Saudi Arabia to coordinate American support for the military offensive.

Saudi Arabia's US-made fighter jets (photo: Fayez Nureldinefayez-Nureldine/AFP)

The Washington Post provided a photo of the kind of jets the US had sold to Saudi Arabia—but when such jets were used to kill civilians, they were out of the picture. (photo: Fayez Nureldine/AFP)

And the Post, in a piece headlined “How US Weapons Will Play a Huge Role in Saudi Arabia’s War in Yemen”  (3/26/15), noted that the weaponry involved largely comes from the US:

US officials said they will offer intelligence and logistical support to the Saudis, but that’s really only a piece of it: The Saudi military is equipped with billions of dollars in advanced American-made weapons.

But that “huge role” often disappears when the the leading papers are discussing the carnage that results from the air attacks that the US is supporting and supplying. Thus when the Times‘ Rick Gladstone (8/22/15) reported that “Saudi-led airstrikes on a residential district in Yemen’s southwestern city of Taiz had killed more than 65 civilians, including 17 people from one family,” according to Doctors Without Borders, and that the death toll in the war included “hundreds of civilians killed in airstrikes,” Washington’s role in facilitating those deaths went unmentioned.

September 2, 2015 Posted by | Deception, Mainstream Media, War Crimes | , , , | Leave a comment

Response to Max Blumenthal remarks about Alison Weir

If Americans Knew – August 31, 2015

If Americans Knew is a 501(c)3 tax-exempt, independent research and information-dissemination institute. The organization’s objective is to provide information to all Americans that is to a large degree missing from American press coverage of Israel-Palestine and the Middle East. http://www.IfAmericansKnew.org

Our full mission statement can be read at http://ifamericansknew.org/about_us/ We believe all people are endowed with inalienable human rights regardless of race, religion, ethnicity, sexuality, or nationality.

The video of Alison Weir describing the founding of If Americans Knew is from Nahid Kabbani’s program, “The Lighthouse,” broadcast on Sacramento Public Access TV. The entire video can be viewed at at https://www.youtube.com/watch?v=IyYID….

The video of Alison speaking about World War I is from the National Summit to Reassess the US-Israel Special Relationship held at the National Press Club in 2014 and broadcast nationally on C-Span. Her entire talk can be seen at http://ifamericansknew.org/us_ints/su….

Jack Dresser’s article can be read in full at http://www.counterpunch.org/2015/08/0…

More information about her book is available at http://www.againstourbetterjudgment.com/. Direct link to purchase on Amazon: http://iakn.us/AOBJ-book

A recent video of Alison’s presentation, “Israel, Palestine and the American connection” is at https://vimeo.com/137338215.

September 2, 2015 Posted by | Book Review, Deception, Ethnic Cleansing, Racism, Zionism, Timeless or most popular, Video | , | Leave a comment

82 Groups in US Demand Investigation of ‘Muslim-Free Zones’

teleSUR | September 2, 2015

In an open letter to the DOJ, 82 groups led by the Council on American-Islamic Relations (CAIR), expressed concern over a growing trend of businesses refusing to serve customers perceived as Muslim.

german8_1“American businesses posting ‘Muslim-Free Zone’ declarations are no different than the ‘Whites Only,’ ‘No Dogs, No Jews,’ ‘No Mexican’ and ‘Irish Need Not Apply’ signs that were posted during past shameful periods of our nation’s history that we hoped were over,” the letter stated.

The letter lamented the DOJ has “remained silent” on the issue, and called on the department to determine whether “Muslim-free zones” violate Title II of the 1964 Civil Rights Act.

“Title II specifically prohibits discrimination by places of entertainment like, in many instances, firing ranges,” the letter read.

Signatories to the letter include the American Civil Liberties Union, National Association for the Advancement of Colored People and others.

“The broad range of groups calling for government action on the ‘Muslim-free zone’ issue clearly indicates that the U.S. Department of Justice should speak out and take concrete action to protect the constitutional rights of American Muslims,” said CAIR National Executive Director Nihad Awad.

At least one business that has declared itself a “Muslim-free zone” is currently being sued by CAIR.

The lawsuit accuses Florida Gun Supply of Inverness and its owner Andrew Hallinan, 28, of violating the federal public accommodations law and seeks an injunction to stop the discrimination, according to the complaint.

September 2, 2015 Posted by | Civil Liberties, Ethnic Cleansing, Racism, Zionism | , | Leave a comment

Amendments to CISA “Cybersecurity” Bill Fail in All Regards

By Mark Jaycox | EFF | September 1, 2015

Although grassroots activism has dealt it a blow, the Senate Intelligence Committee’s Cybersecurity Information Sharing Act (CISA) keeps shambling along like the zombie it is. In July, Senator McConnell vowed to hold a final vote on the bill before Congress left for its six-week long summer vacation. In response, EFF and over 20 other privacy groups ran a successful Week of Action, including over 6 million faxes opposing CISA, causing the Senate to postpone the vote until late September.

Senators submitted many amendments to the bill before going on vacation. The amendments, like the original language of the bill, fail to address key issues like the deep link between these government “cybersecurity” authorities and surveillance, as well as the new spying powers the bill would grant to companies.

But “cybersecurity” is already intimately tied to surveillance—a problem CISA would only worsen. Documents released by the New York Times reveal the government used the Comprehensive National Cyber Security Initiative (CNCI) to pay telecommunications companies to spy on consumers using their networks. The CNCI includes initiatives for information gathering, but it’s always been presented to the public as fostering research and encouraging public awareness of cybersecurity problems—not spying on Americans’ Internet traffic.

The revelations are stunning. The NSA paid telecommunications companies nearly $300 million dollars in the 2010 fiscal year to invest in surveillance equipment as part of the CNCI. In fact, STORMBREW’s Breckenridge site was “100% subsidized with CNCI funding.”

In contrast, the DHS only requested $37.2 million during the same time period to support research and development in cybersecurity science and technology. Even if DHS received what it requested, does the American public really want surveillance to outweigh research and education 10 to 1?

The news is compounded by other recently-released Snowden documents that show how the NSA uses foreign intelligence laws to run an intrusion defense system (IDS) on US soil. The documents show that a Justice Department memo gave the agency permission to monitor Internet cables, “without a warrant and on American soil, for data linked to computer intrusions originating abroad — including traffic that flows to suspicious Internet addresses or contains malware.”

CISA—and its amendments—do not even begin to address these serious problems. Instead, they mandate information sharing with the intelligence community, creating even more cyberspying.

EFF will continue to oppose CISA—even if some of these amendments pass—because CISA’s vague definitions, broad legal immunity, and new spying powers allow for a tremendous amount of unnecessary damage to users’ privacy, and it’s highly unlikely that the public will learn about it. Even an amendment (#2612) offered by by Senator Al Franken, which narrows some of the definitions in CISA, does little to clarify its most troubling provisions.

What’s worse is that information-sharing bills like CISA are being painted as silver bullets to data breaches. They aren’t. The bills don’t address problems like unencrypted filespoor computer architecture, un-updated servers, and employees (or contractors) clicking malware links.

Awful Amendments

Plenty of the amendments would make the bill even worse. We’ve already discussed the horrible CFAA amendment, #2626, proposed by Senator Sheldon Whitehouse. The amendment not only increases the scope of the already expansive Computer Fraud and Abuse Act (CFAA) but also authorizes injunctions against botnets (amending 18 U.S.C. § 1345) in a way that creates serious constitutional issues.  After all, much of what DOJ and FBI want to do in shutting down botnets is, arguably, a search or a seizure under the Fourth Amendment; moreover, such injunctions may prevent users from communicating, thus raising First Amendment issues.  The amendment is a great example of how not to amend the draconian CFAA. If the Senate wants to improve the CFAA, it should take a page out of our book.

Senator Carper has proposed another dubious change to CISA, amendment #2627. The bill attempts to codify the Department of Homeland Security’s EINSTEIN program without any public debate. EINSTEIN is an intrusion detection system—the parent of which was created by the NSA—to scan incoming Internet traffic to the federal government like emails and other connections. DHS has not told the public what agencies are using EINSTEIN. It’s possible that when you email your representative, DHS may also receive a copy. Before codifying EINSTEIN, DHS must be more transparent about the program. The most recent update from DHS about the program is from 2013, and many concerns have been raised about EINSTEIN’s legality and privacy implications. Unlike CISA, Senator Carper’s amendment mandates federal agencies create a plan to identify sensitive information and encrypt it; however, the clause exempts the Department of Defense and the intelligence community.  Nor does the amendment authorize additional funding for federal agencies to improve security.

Senator Carper’s attempt to make a horrible bill marginally better is admirable, but he—along with other Senators—should oppose the bill. Even the best amendments fail to fix CISA’s serious flaws.

Not Awful Amendments

Some of the amendments try to narrow the scope of the bill. Senator Chris Coons’ amendment #2552 would limit information sharing to that necessary to describe or identify a cybersecurity threat, while Senator Wyden’s amendment (#2621) would require companies and the government to remove personal information unrelated to the threat.

But these well-meaning changes don’t address the root problems in the bill: the outrageously broad and vague definition of “cybersecurity threat” and the granting of new authorities to spy on users. Senator Franken’s amendment #2612 attempts to address that definition, but even his amendment isn’t enough. Again, no amendment scales back the two new authorities to spy on users and launch countermeasures in the bill.

Other amendments are better, including Senator Patrick Leahy’s #2587, which would remove the current CISA provision exempting all “cyber threat indicators and defensive measures” received by the government from disclosure under the Freedom of Information Act and may help ensure the public can obtain information about how, if CISA is enacted into law, the information “sharing” system actually operates; Senator Jeff Flake’s 6-year sunset (#2582); and, Senator Mike Lee’s email privacy amendment (#2556), which would codify US v. Warshak by amending the Electronic Communications Privacy Act to require warrants for email and other stored content.

While some advocates will paint these amendments as “steps forward,” the amendments merely shuffle deck chairs on the Titanic—even with the better amendments, the bill is still a bad idea. The Senators are going about the wrong strategy. Democrats and libertarian Republicans should be opposing CISA outright. That’s why we’re asking users to continue emailing their Senators to stop this bill. While CISA is the very definition of a zombie bill, the public outcry against it has made a difference. But we can’t stop now. Join us by tweeting, faxing, or emailing your Senator.

September 2, 2015 Posted by | Civil Liberties, Full Spectrum Dominance | , , | Leave a comment

U.S. Turns Teen into “Terrorist”

 By Margaret Kimberley | Black Agenda Report | September 2, 2015

Ali Shukri Amin is 17-years old, a minor under American law, yet he was just sentenced to eleven years in federal prison. He pleaded guilty and was sentenced as an adult for providing material support for terrorists. This is a crime defined in any way the government wants it to be. Amin had a twitter account, @amreekiwitness, devoted to the group Islamic State, ISIS. He also helped a friend travel to Syria in hopes of joining ISIS. That is the substance of his crime, online opinion and facilitating travel.

The crime of providing material support for terrorists only came into existence with the Patriot Act passed in the aftermath of the September 11th attacks. There are now people serving very long prison terms for providing humanitarian aid, translating documents, sending money abroad, or expressing views in support of nations or groups the United States classifies as terrorist. These crimes are vaguely defined and are often of little consequence to ISIS or any other organization the federal government designates as an enemy.

The prosecutions of Amin and others are meant to make the case for continuing the “war on terror.” This is actually a war of American terror used to justify endless interventions around the world. The Department of Justice would have us believe that a teenager tweeting about making donations to ISIS via bitcoin posed a serious threat. Of course, the United States government is the biggest threat to life in the world. It is the most violent organization with the largest number of kills.

The application of the material support for terror statute is used to capture innocent or harmless people. Some are hoodwinked by agent provocateurs or, like Amin, pose little or no danger. Most importantly, ISIS would not be a credible force in Syria or Libya were it not for American machinations. The United States created the monster and now wants to punish anyone who interacts with it.

At one point Amin, who lived in a Virginia suburb of Washington, DC, had over 4,000 twitter followers who conversed about a variety of issues, including protests in Ferguson, Missouri.

“They cower in fear of us whilst they massacre and oppress you! It’s time to strike fear into the hearts of the oppressors. #FergusonUnderIS”

“May be time to organize Muslims in America upon haqq and mobilize to #Ferguson. Defend the oppressed, start jihad here.”

While Amin and thousands of others expressed their outrage about deadly police brutality, the State Department actually engaged in online debates with the teenager. A bizarre social media program called Think Again, Turn Away is a useless attempt to influence young Muslims who want to fight imperialism through jihad. Aside from having a name reminiscent of a love song title, the effort allowed Amin to engage in argument with and troll the State Department. When the would-be jihad deprogrammers pointed out that ISIS “slaughters innocent people,” Amin had a ready and accurate retort:

“slaughter innocents? You mean like AbdurRahman al-Awlaki, the 16 year old boy not involved with any militants? or what about the thousands killed in drone strikes weekly that make the news? The thousands that don’t? you are nothing more than criminals who betray the Muslims you claim to defend across the globe, butchering them 1.7 million in Iraq, hundreds of thousands in Afghanistan, left, right, everywhere. only an ignoramus who knows nothing about American foreign policy or any Muslim country could accept your lies.”

A few months after these embarrassing interactions, Amin’s mother and his imam unwisely reported him to the FBI in an effort to stop his online involvement with ISIS. He would not have been discovered otherwise.

Killer cops roam the streets with no fear of federal prosecution, but a confused teenager is sent to prison because he holds and expresses opinions contrary to those of the government. Prosecutors use children to make names for themselves and climb the ladder in a corrupt system. American terror is not just carried out abroad with drone strikes and invasions, but it is carried out on a daily basis by the criminal injustice system.

While the Saudis, Israelis and their allies use American money and arms to target civilians for death, anyone who crosses over the thin line of expression is at risk of prosecution and many years in prison. The hypocrisy is stunning but not really surprising. This system will use a child to make its point clear. We live in a police state and anyone who dares to speak up against it is at risk of being made an example.

The federal government does not operate any juvenile facilities. Ali Shukri Amin is now in custody in an adult facility. One need not be a follower of ISIS to see that this is a gross injustice unworthy of a country which claims to be a democracy.

Margaret Kimberley can be reached via e-Mail at Margaret.Kimberley(at)BlackAgendaReport.com.

September 2, 2015 Posted by | Civil Liberties, Deception, Full Spectrum Dominance | , , | Leave a comment

Growing Doubt: a Scientist’s Experience of GMOs

By Jonathan R. Latham, PhD | Independent Science News | August 31, 2015

By training, I am a plant biologist. In the early 1990s I was busy making genetically modified plants (often called GMOs for Genetically Modified Organisms) as part of the research that led to my PhD. Into these plants we were putting DNA from various foreign organisms, such as viruses and bacteria.

I was not, at the outset, concerned about the possible effects of GM plants on human health or the environment. One reason for this lack of concern was that I was still a very young scientist, feeling my way in the complex world of biology and of scientific research. Another reason was that we hardly imagined that GMOs like ours would be grown or eaten. So far as I was concerned, all GMOs were for research purposes only.

Gradually, however, it became clear that certain companies thought differently. Some of my older colleagues shared their skepticism with me that commercial interests were running far ahead of scientific knowledge. I listened carefully and I didn’t disagree. Today, over twenty years later, GMO crops, especially soybeans, corn, papaya, canola and cotton, are commercially grown in numerous parts of the world.

Depending on which country you live in, GMOs may be unlabeled and therefore unknowingly abundant in your diet. Processed foods (e.g. chips, breakfast cereals, sodas) are likely to contain ingredients from GMO crops, because they are often made from corn or soy. Most agricultural crops, however, are still non-GMO, including rice, wheat, barley, oats, tomatoes, grapes and beans.

For meat eaters the nature of GMO consumption is different. There are no GMO animals used in farming (although GM salmon has been pending FDA approval since 1993); however, animal feed, especially in factory farms or for fish farming, is likely to be GMO corn and GMO soybeans. In which case the labeling issue, and potential for impacts on your health, are complicated.

I now believe, as a much more experienced scientist, that GMO crops still run far ahead of our understanding of their risks. In broad outline, the reasons for this belief are quite simple. I have become much more appreciative of the complexity of biological organisms and their capacity for benefits and harms. As a scientist I have become much more humble about the capacity of science to do more than scratch the surface in its understanding of the deep complexity and diversity of the natural world. To paraphrase a cliché, I more and more appreciate that as scientists we understand less and less.

The Flawed Processes of GMO Risk Assessment

Some of my concerns with GMOs are “just” practical ones. I have read numerous GMO risk assessment applications. These are the documents that governments rely on to ‘prove’ their safety. Though these documents are quite long and quite complex, their length is misleading in that they primarily ask (and answer) trivial questions. Furthermore, the experiments described within them are often very inadequate and sloppily executed. Scientific controls are often missing, procedures and reagents are badly described, and the results are often ambiguous or uninterpretable. I do not believe that this ambiguity and apparent incompetence is accidental. It is common, for example, for multinational corporations, whose labs have the latest equipment, to use outdated methodologies. When the results show what the applicants want, nothing is said. But when the results are inconvenient, and raise red flags, they blame the limitations of the antiquated method. This bulletproof logic, in which applicants claim safety no matter what the data shows, or how badly the experiment was performed, is routine in formal GMO risk assessment.

To any honest observer, reading these applications is bound to raise profound and disturbing questions: about the trustworthiness of the applicants and equally of the regulators. They are impossible to reconcile with a functional regulatory system capable of protecting the public.

The Dangers of GMOs

Aside from grave doubts about the quality and integrity of risk assessments, I also have specific science-based concerns over GMOs. I emphasise the ones below because they are important but are not on the lists that GMO critics often make.

Many GMO plants are engineered to contain their own insecticides. These GMOs, which include maize, cotton and soybeans, are called Bt plants. Bt plants get their name because they incorporate a transgene that makes a protein-based toxin (usually called the Cry toxin) from the bacterium Bacillus thuringiensis. Many Bt crops are “stacked,” meaning they contain a multiplicity of these Cry toxins. Their makers believe each of these Bt toxins is insect-specific and safe. However, there are multiple reasons to doubt both safety and specificity. One concern is that Bacillus thuringiensis is all but indistinguishable from the well known anthrax bacterium (Bacillus anthracis). Another reason is that Bt insecticides share structural similarities with ricin. Ricin is a famously dangerous plant toxin, a tiny amount of which was used to assassinate the Bulgarian writer and defector Georgi Markov in 1978. A third reason for concern is that the mode of action of Bt proteins is not understood (Vachon et al 2012); yet, it is axiomatic in science that effective risk assessment requires a clear understanding of the mechanism of action of any GMO transgene. This is so that appropriate experiments can be devised to affirm or refute safety. These red flags are doubly troubling because some Cry proteins are known to be toxic towards isolated human cells (Mizuki et al., 1999). Yet we put them in our food crops.

A second concern follows from GMOs being often resistant to herbicides. This resistance is an invitation to farmers to spray large quantities of herbicides, and many do. As research recently showed, commercial soybeans routinely contain quantities of the herbicide Roundup (glyphosate) that its maker, Monsanto, once described as “extreme” (Bøhn et al 2014).

Glyphosate has been in the news recently because the World Health Organisation no longer considers it a relatively harmless chemical, but there are other herbicides applied to GMOs which are easily of equal concern. The herbicide Glufosinate (phosphinothricin, made by Bayer) kills plants because it inhibits the important plant enzyme glutamine synthetase. This enzyme is ubiquitous, however, it is found also in fungi, bacteria and animals. Consequently, Glufosinate is toxic to most organisms. Glufosinate is also a neurotoxin of mammals that doesn’t easily break down in the environment (Lantz et al. 2014). Glufosinate is thus a “herbicide” in name only.

Thus, even in conventional agriculture, the use of glufosinate is hazardous; but With GMO plants the situation is worse yet. With GMOs, glufosinate is sprayed on to the crop but its degradation in the plant is blocked by the transgene, which chemically modifies it slightly. This is why the GMO plant is resistant to it; but the other consequence is that when you eat Bayers’ Glufosinate-resistant GMO maize or canola, even weeks or months later, glufosinate, though slightly modified, is probably still there (Droge et al., 1992). Nevertheless, though the health hazard of glufosinate is much greater with GMOs, the implications of this science have been ignored in GMO risk assessments of Glufosinate-tolerant GMO crops.

A yet further reason to be concerned about GMOs is that most of them contain a viral sequence called the cauliflower mosaic virus (CaMV) promoter (or they contain the similar figwort mosaic virus (FMV) promoter). Two years ago, the GMO safety agency of the European Union (EFSA) discovered that both the CaMV promoter and the FMV promoter had wrongly been assumed by them (for almost 20 years) not to encode any proteins. In fact, the two promoters encode a large part of a small multifunctional viral protein that misdirects all normal gene expression and that also turns off a key plant defence against pathogens. EFSA tried to bury their discovery. Unfortunately for them, we spotted their findings in an obscure scientific journal. This revelation forced EFSA and other regulators to explain why they had overlooked the probability that consumers were eating an untested viral protein.

This list of significant scientific concerns about GMOs is by no means exhaustive. For example, there are novel GMOs coming on the market, such as those using double stranded RNAs (dsRNAs), that have the potential for even greater risks (Latham and Wilson 2015).

The True Purpose of GMOs

Science is not the only grounds on which GMOs should be judged. The commercial purpose of GMOs is not to feed the world or improve farming. Rather, they exist to gain intellectual property (i.e. patent rights) over seeds and plant breeding and to drive agriculture in directions that benefit agribusiness. This drive is occurring at the expense of farmers, consumers and the natural world. US Farmers, for example, have seen seed costs nearly quadruple and seed choices greatly narrow since the introduction of GMOs. The fight over GMOs is not of narrow importance. It affects us all.

Nevertheless, specific scientific concerns are crucial to the debate. I left science in large part because it seemed impossible to do research while also providing the unvarnished public scepticism that I believed the public, as ultimate funder and risk-taker of that science, was entitled to.

Criticism of science and technology remains very difficult. Even though many academics benefit from tenure and a large salary, the sceptical process in much of science is largely lacking. This is why risk assessment of GMOs has been short-circuited and public concerns about them are growing. Until the damaged scientific ethos is rectified, both scientists and the public are correct to doubt that GMOs should ever have been let out of any lab.

References

Bøhn, T, Cuhra, M, Traavik, T, Sanden, M, Fagan, J and Primicerio, R (2014) Compositional differences in soybeans on the market: Glyphosate accumulates in Roundup Ready GM soybeans. Food Chemistry 153: 207-215.

Droge W, Broer I, and Puhler A. (1992) Transgenic plants containing the phosphinothricin-N-acetyltransferase gene metabolize the herbicide L-phosphinothricin (glufosinate) differently from untransformed plants. Planta 187: 142-151.

Lantz S et al., (2014) Glufosinate binds N-methyl-D-aspartate receptors and increases neuronal network activity in vitro. Neurotoxicology 45: 38-47.

Latham JR and Wilson AK (2015) Off -­ target Effects of Plant Transgenic RNAi: Three Mechanisms Lead to Distinct Toxicological and Environmental Hazards.

Mizuki, E, Et Al., (1999) Unique activity associated with non-insecticidal Bacillus thuringiensis parasporal inclusions: in vitro cell- killing action on human cancer cells. J. Appl. Microbiol. 86: 477–486.

Vachon V, Laprade R, Schwartz JL (2012) Current models of the mode of action of Bacillus thuringiensis insecticidal crystal proteins: a critical review. Journal of Invertebrate Pathology 111: 1–12.

September 2, 2015 Posted by | Economics, Science and Pseudo-Science | , , | Leave a comment

Minority police officers sue NYPD over illegal arrest quotas

RT | September 2, 2015

A dozen black and Latino police officers are suing the New York Police Department and the city claiming that their bosses forced them to carry out illegal arrest quotas “against their own minority community.” The NYPD has denied ever using quotas.

The class action lawsuit, filed in the Manhattan federal court on Monday, argued that by forcing police officers to comply with the “illegal quota system,” New York City and the NYPD subjected black and Latino cops to unfair evaluations and discipline, according to the New York Post.

The suit also said performance evaluation was not evenly applied to all precincts. Police officers in precincts with lots of minorities had to make more arrests and issue more tickets than officers in “a precinct located in a predominantly white residential area,” the suit states.

The lawsuit cites testimony and news articles dating to 2010 that provide evidence of a quota system under former Police Commissioner Ray Kelly. The suit said quotas have remained under Commissioner Bill Bratton.

“The reality is that one year later, quotas remain alive and well and the NYPD is aggressively pursuing a numbers driven agenda with regard to arrests, tickets and summonses,” the suit reads.

The 12 named plaintiffs in the suit are all black and Latino NYPD officers who claim to have been penalized for reporting and complaining about “the illegal quotas and its racially discriminatory application against the minority community,” the suit states.

The suit alleges that police officers were being forced to make at least one arrest and issue 20 summonses a month.

The top NYPD spokesman told the Post that the department doesn’t use quotas.

“There are no numerical enforcement quotas established by the NYPD,” spokesman Stephen Davis said in a statement, according to the New York Post. “Performance evaluations are conducted for all department employees based on an assessment of their duties, responsibilities and specific conditions of their assignments.”

An NYC Law Department spokesman said the city would evaluate the merits of each of these claims and respond accordingly once they are served.

One of the lead plaintiff’s in the suit is Adhyl Polanco, a Latino police officer who first complained to the media in 2009 about how arrest and summons quotas affected communities of color. He testified in the high-profile federal stop-and-frisk case.

Polanco also filed a separate lawsuit in Brooklyn federal court on Monday against the NYPD and the city, according to the New York Daily News, claiming his whistleblowing about quotas and discrimination has resulted in a sustained campaign of retaliation by fellow police officers and management, including repeated suspensions, promotion denials and suggestions that he was mentally ill.

September 2, 2015 Posted by | Ethnic Cleansing, Racism, Zionism, Subjugation - Torture | , , | Leave a comment