SchwartzReport: Government Not Labeling GMO So New Non-Profit Certifiying Non-GMO — Meanwhile, Nanoparticles Entering Food Industry and Harming Blood-Brain Barrier

01 Agriculture, 07 Health, IO Impotency

schwartz reportI love stories like this. Citizens are beginning to do what our corporate controlled government will not. As this report explains a citizen movement has arisen that Aikidos the issue: Instead of listing GMO, they list No-GMO present. It requires no law to list what you don't have in your food. It's a brilliant idea. It now depends on whether customers make a choice on that basis. If enough of us do, it ! will accomplish the same effect as the law that we have been unable to get through the corrupted Congress.

What it Means to Carry the Non GMO Project Certification
MERLYN SEELEY – Examiner (Houston)

Like the untested introduction of GMOs into the food supply, we have here revealed another animal experiment — with us as the lab rates.  Click through to see the graphs, which are very useful.

Nanoparticles: The Tiniest Toxin
DAISY LUTHER – Activist Post

Berto Jongman: The Sigularity of Fools

Cultural Intelligence, IO Impotency
Berto Jongman
Berto Jongman

The Singularity of Fools

A special report from the utopian future.

David Rieff

Foreign Policy, May/June 2013

EXTRACT

Even comparative moderates in the futurological sweepstakes tend to swoon when the subject is the pace of technology-led change. Ethan Zuckerman, director of MIT's Center for Civic Media, argues in his new book, Rewire: Digital Cosmopolitans in the Age of Connection, that it is an entirely realistic goal for humans to “take control of our technologies and use them to build the world we want rather than the world we fear.” The present moment, Zuckerman asserts in his book's concluding sentence, offers “an opportunity to start the process of rewiring the world.”

In his own new book, To Save Everything, Click Here: The Folly of Technological Solutionism, cyber-utopianism's severest and most eloquent critic, Evgeny Morozov, has dubbed such grand assertions about the mastery that we, with or without the help of intelligent machines, can exert over the future of the species the “Superhuman Condition.” (Full disclosure: I blurbed Morozov's book.)

Read full article (four screens)

Continue reading “Berto Jongman: The Sigularity of Fools”

Berto Jongman: Connected Generation, Changing Norms, Big Banks, Privacy and Big Data

Corruption, Cultural Intelligence, Ethics, IO Impotency
Berto Jongman
Berto Jongman

The connected generation

‘Millennials' are leveraging their tech savvy for social change and economic opportunity.

How social network policies are changing speech and privacy norms

Is the proprietary nature of online speech poised to change cultural norms?

Big Banks are Victims of Their Own Success

The biggest banks have done an excellent job of delaying and undermining the Dodd-Frank financial overhaul law and staving off criminal investigations into wrongdoing.

Privacy in the Age of Big Data

Social media, Web 2.0, the Internet of Things, mobile computing, and the expansion of sensors is allowing more information to be gathered than ever before which, coupled with Big Data analytics, offers unprecedented insight into the needs, patterns, and habits of users, citizens, and consumers.

CRYPTOME: NWO Pimps Eric Schmidt’s Book “The New Digital Age”

Corruption, IO Deeds of War, IO Impotency
Amazon Page
Amazon Page

Bilderberg Ghosts Praise Eric Schmidt's Book

“Every day, technological innovations are giving people around the world new opportunities to shape their own destinies. In this fascinating book, Eric Schmidt and Jared Cohen draw upon their unique experiences to show us a future of rising incomes, growing participation, and a genuine sense of community—if we make the right choices today.”

Bill Clinton, Former President of the United States

“This is a book that defines both the nature of the new world which the internet is creating; and its challenges. It describes a technological revolution in the making. How we navigate it is a challenge for countries, communities and citizens. There are no two people better equipped to explain what it means than Eric Schmidt and Jared Cohen.”

Tony Blair, Former Prime Minister of Great Britain and Northern Ireland

“Eric Schmidt and Jared Cohen have produced a searching meditation on technology and world order. Even those who disagree with some of their conclusions will learn much from this thought-provoking volume.”

Henry A. Kissinger, former Secretary of State

Continue reading “CRYPTOME: NWO Pimps Eric Schmidt's Book “The New Digital Age””

David Isenberg: Foreign Affairs on the Rise (and Good) of Big Data

Data, IO Impotency
David Isenberg
David Isenberg

The Rise of Big Data

How It's Changing the Way We Think About the World

Kenneth Neil Cukier and Viktor Mayer-Schoenberger

May/June 2013

Article Summary and Author Biography

EXTRACT

Big data is a resource and a tool. It is meant to inform, rather than explain; it points toward understanding, but it can still lead to misunderstanding, depending on how well it is wielded. And however dazzling the power of big data appears, its seductive glimmer must never blind us to its inherent imperfections. Rather, we must adopt this technology with an appreciation not just of its power but also of its limitations.

Read full article.

Continue reading “David Isenberg: Foreign Affairs on the Rise (and Good) of Big Data”

Mini-Me: Time for a GAO Audit of Claimed Cyber-War Capabilities and Investment Plans

IO Impotency
Who?  Mini-Me?
Who? Mini-Me?

Huh?

Pentagon expands cyber-attack capabilities

Jim Michaels

USA Today, 21 April 2013

WASHINGTON – The U.S. military is increasing its budget for cyber-warfare and expanding its offensive capabilities, including the ability to blind an enemy's radar or shut down its command systems in the event of war, according to two defense officials.

In the 2014 defense budget released last week, the money allocated for cyber-operations rose to $4.7 billion, up from $3.9 billion. Much of that additional money is going into the development of offensive capabilities, usually referred to as computer network attacks, according to budget documents.

Officials say these are capabilities — including targeting military computer networks — that a commander might need in a conflict and would be used only in accordance with the law of armed conflict.

Read rest of article.

Eagle: Stake in the Heart of Freedom of Information Act — Open Government? Please….

Corruption, Government, IO Impotency
300 Million Talons...
300 Million Talons…

SECURE IT's “Technical Amendment” is Really a Massive Change to FOIA

The recently-introduced Strengthening and Enhancing Cybersecurity by Using Research, Education, Information, and Technology Act (SECURE IT), HR 1468, includes a “technical amendment” that actually would be one of the most far-reaching substantive changes to the Freedom of Information Act’s (FOIA) exemptions since 1986.

Similar to a dangerous provision that was included in the version of the bill introduced in the Senate during the last Congress, Section 107 of SECURE IT creates a new exemption to the FOIA that gives the government the authority to withhold information shared with or to the cybersecurity centers created by the bill. The bill also includes troubling language that defines any information shared with the cybersecurity centers as “voluntarily shared information” that is exempt under the FOIA and preempts any State, tribal, or local law requiring disclosure of information or records, and — in case anyone was still confused about the bill's position on public disclosure — creates a new FOIA b(3) exemption for the information.

While the anti-right-to-know language in SECURE IT is particularly bad, the provision is notably similar to cybersecurity bills like CISPA that attempt to encourage companies to share information with the federal government by giving them broad assurances that nothing they share will ever be released to the public. This approach is bad public policy: it ignores that most of the truly sensitive information companies are likely to share is already exempt under the FOIA and does not include a mechanism to weigh the public interest in disclosure of the information. Some of the information that may be shared under the bill — and therefore exempt from disclosure — could be critical for the public to ensure its safety

If the federal government really needs expanded authority to withhold information under the FOIA in order to persuade companies to share cybersecurity information, the issue should be addressed by Committee's that have expertise on public access issues: the House Oversight and Government Reform Committee and Senate Judiciary. Any amendment to the FOIA, especially an amendment of this scope, should begin with careful consideration and public hearings by those Committees. It should not be a dangerously broad provision tucked into a large bill and disguised as a “technical amendment.”

noble gold