(中國‧北京)北京週四(7月30日)晚至今日(週五,7月31日)早上遭今年度最嚴重的暴風雨侵襲。
城市地區週五的平均雨量高達16公釐,天安門雨量有68毫米。
雨水淹沒市內數條道路,交通也受影響。
另外,上海週四也下起“70年來最大雨”,雨水淹沒3000棟房屋,近2000名旅客受困機場。
上海多個地區的雨量介於80至140公釐之間。新華社報導,車輛遭斷落的樹枝砸毀。暫未傳出傷亡報告。
惡劣天氣也耽誤了來回上海浦東和虹橋機場的多班機,造成數以千計名乘客受困。
(中國‧北京)北京週四(7月30日)晚至今日(週五,7月31日)早上遭今年度最嚴重的暴風雨侵襲。
城市地區週五的平均雨量高達16公釐,天安門雨量有68毫米。
雨水淹沒市內數條道路,交通也受影響。
另外,上海週四也下起“70年來最大雨”,雨水淹沒3000棟房屋,近2000名旅客受困機場。
上海多個地區的雨量介於80至140公釐之間。新華社報導,車輛遭斷落的樹枝砸毀。暫未傳出傷亡報告。
惡劣天氣也耽誤了來回上海浦東和虹橋機場的多班機,造成數以千計名乘客受困。
Toxin linked to autism and neurological disorders to be included in shots
The Washington Post confirmed today that the swine flu vaccine, which is set to be rolled out nationwide this fall in what some fear could ultimately become a mandatory vaccination program, will contain mercury, a toxin linked with autism and neurological disorders.
Claims by the CDC and the Institute of Medicine, following a whitewash study that ignored previously verified evidence, that thimerosal, a mercury based preservative, has no causal relationship to skyrocketing cases of autism have been soundly rejected by top doctors and scientists ever since.
Epidemiologist Tom Verstraeten and Dr. Richard Johnston, an immunologist and pediatrician from the University of Colorado, both concluded that thimerosal was responsible for the dramatic rise in cases of autism but their findings were dismissed by the CDC.
Cases of autism in the U.S. have increased by 1,500 per cent since 1991, which is when vaccines for children doubled, and the number of immunizations is only increasing. Just one in 2,500 children were diagnosed with autism before 1991, whereas one in 166 children now have the disease.
A peer reviewed study by Dr. Mark Geier which appeared in the Journal of American Physicians and Surgeons showed that the IOM research was flawed because it was largely based on a Danish study by Anders Peter Hviid, which did not account for the fact that American children have a much higher mercury burden than children in Denmark.
“At the high levels (of thimerosal exposure), it is undeniable there is a causal relationship, and we have gone to high levels. Their studies, therefore are not relevant, I am not saying they are wrong, although there are many criticisms of it. It is just not relative to the US situation,” said Geier.
Geier’s study concludes that there is an increase of neurodevelopment disorders following the use of thimerosal containing vaccines.
Dr. Rashid Buttar, who has pioneered a new treatment for autistic children that removes mercury from their bodies, said the Institute of Medicine’s conclusion that mercury does not cause autism demonstrates the “complete absence of any desire to discover scientific truth at the supposed highest levels of medical academia.”
“When 31 children recover from a devastating disease by a simple transdermal treatment that detoxifies metals, then common sense dictates that perhaps metals are involved,” states Dr. Bob Nash the chairman of the American Board of Clinical Metal Toxicology (ABCMT) in regard to Dr. Buttar’s treatment.
“In 1977, a Russian study found that adults exposed to ethylmercury, the form of mercury in thimerosal, suffered brain damage years later. Studies on thimerosal poisoning also describe tubular necrosis and nervous system injury, including obtundation, coma and death. As a result of these findings, Russia banned thimerosal from children’s vaccines in 1980. Denmark, Austria, Japan, Great Britain and all the Scandinavian countries have also banned the preservative,” writes Dawn Prate.
Mercury is classified by The Department of Defense as a hazardous material that could cause death if swallowed, inhaled or absorbed through the skin, and the EPA is now limiting mercury emissions from factories because the toxin “can damage the brain and nervous system and is especially dangerous to fetuses and small children,” but according to the CDC it’s perfectly safe to inject into your child’s bloodstream.
Despite concerns about thimerosal and mercury, which have led to the preservative being reduced or removed from a large portion of vaccines over the last five years, thimerosal will be an ingredient of the swine flu vaccine which is set to arrive in the U.S. this September.
“Some of the vaccine will be stored in multi-dose vials containing thimerosal, an antibacterial additive that contains mercury,” reports the Washington Post today in an article about which groups will receive the swine flu vaccine first.
“There will also be single-dose syringes without thimerosal, a substance that some assert is harmful to children,” adds the article, without mentioning whether or not people who take the vaccine will get a choice or even be informed if it contains mercury.
Around 12,000 U.S. children will be used as guinea pigs for the experimental swine flu vaccine also known to contain the dangerous ingredient squalene, which has been directly linked with cases of Gulf War Syndrome and a host of other debilitating diseases.
Squalene “contributed to the cascade of reactions called “Gulf War syndrome. (GIs developed) arthritis, fibromyalgia, lymphadenopathy, rashes, photosensitive rashes, malar rashes, chronic fatigue, chronic headaches, abnormal body hair loss, non-healing skin lesions, aphthous ulcers, dizziness, weakness, memory loss, seizures, mood changes, neuropsychiatric problems, anti-thyroid effects, anaemia, elevated ESR (erythrocyte sedimentation rate), systemic lupus erythematosus, multiple sclerosis, ALS, Raynaud’s phenomenon, Sjorgren’s syndrome, chronic diarrhea, night sweats and low-grade fever,” according to Micropaleontologist Dr. Viera Scheibner.
Pharmaceutical companies can be assured that they won’t face reprisals for the many thousands of injuries and deaths that will inevitably occur as a result of exposing millions to mercury and squalene during a mass vaccination program, because the government has already acted to provide them with blanket immunity from lawsuits.
“Vaccine makers and federal officials will be immune from lawsuits that result from any new swine flu vaccine, under a document signed by Secretary of Health and Human Services Kathleen Sebelius,” reported the Associated Press earlier this month.
by Paul Joseph WatsonYour cellular telephone has three major security vulnerabilities:
Before discussing these vulnerabilities, here is a brief tutorial on how cellular phones function. They send radio frequency transmissions through the air on two distinct channels, one for voice communications and the other for control signals. When a cellular telephone is first turned on, it emits a control signal that identifies itself to a cell site by broadcasting its mobile identification number (MIN) and electronic serial number (ESN), commonly known as the "pair."
When the cell site receives the pair signal, it determines if the requester is a legitimate registered user by comparing the requestor's pair to a cellular subscriber list. Once the cellular telephone's pair has been recognized, the cell site emits a control signal to permit the subscriber to place calls at will. This process, known as anonymous registration, is carried out each time the telephone is turned on or picked up by a new cell site.
All cellular telephones are basically radio transceivers. Your voice is transmitted through the air on radio waves. Radio waves are not directional -- they disperse in all directions so that anyone with the right kind of radio receiver can listen in.
Although the law provides penalties for the interception of cellular telephone calls, it is easily accomplished and impossible to detect. Radio hobbyists have web sites where they exchange cell phone numbers of "interesting" targets. Opportunistic hobbyists sometimes sell their best "finds." Criminal syndicates in several major U.S. metropolitan areas maintain extensive cell phone monitoring operations.
Cell phones operate on radio frequencies that can be monitored by commonly available radio frequency scanners.
It is easy for an eavesdropper to determine a target's cellular phone number, because transmissions are going back and forth to the cellular site whenever the cell phone has battery power and is able to receive a call. For a car phone, this generally happens as soon as the ignition is turned on. Therefore, the eavesdropper simply waits for the target to leave his or her home or office and start the car. The initial transmission to the cellular site to register the active system is picked up immediately by the scanner, and the number can be entered automatically into a file of numbers for continuous monitoring.
One of the most highly publicized cases of cellular phone monitoring concerned former Speaker of the House of Representatives Newt Gingrich. A conference call between Gingrich and other Republican leaders was "accidentally" overheard and then taped. The conversation concerned Republican strategy for responding to Speaker Gingrich's pending admission of ethics violations being investigated by the House Ethics Committee. The intercepted conversation was reported in the New York Times and other newspapers. 1
Pagers have similar vulnerabilities. In 1997, police arrested officials of a small New Jersey company, Breaking News Network, that was monitoring pager messages to New York City leaders and police, fire, and court officials, including messages considered too sensitive to send over the police radio. They were selling the information to newspaper and television reporters. The offenses carry a penalty of up to five years in prison and fines of $250,000 for each offense. 3
A cellular telephone can be turned into a microphone and transmitter for the purpose of listening to conversations in the vicinity of the phone. This is done by transmitting to the cell phone a maintenance command on the control channel. This command places the cellular telephone in the "diagnostic mode." When this is done, conversations in the immediate area of the telephone can be monitored over the voice channel. 4
The user doesn't know the telephone is in the diagnostic mode and transmitting all nearby sounds until he or she tries to place a call. Then, before the cellular telephone can be used to place calls, the unit has to be cycled off and then back on again. This threat is the reason why cellular telephones are often prohibited in areas where classified or sensitive discussions are held.
Cellular telephone thieves don't steal cellular telephones in the usual sense of breaking into a car and taking the telephone hardware. Instead, they monitor the radio frequency spectrum and steal the cell phone pair as it is being anonymously registered with a cell site.
Cloning is the process whereby a thief intercepts the electronic serial number (ESN) and mobile identification number (MIN) and programs those numbers into another telephone to make it identical to yours. Once cloned, the thief can place calls on the reprogrammed telephone as though he were the legitimate subscriber.
Cloning resulted in approximately $650 million dollars worth of fraudulent phone calls in 1996. Police made 800 arrests that year for this offense.5 Each day more unsuspecting people are being victimized by cellular telephone thieves. In one case, more than 1,500 telephone calls were placed in a single day by cellular phone thieves using the number of a single unsuspecting owner. 6
The ESN and MIN can be obtained easily by an ESN reader, which is like a cellular telephone receiver designed to monitor the control channel. The ESN reader captures the pair as it is being broadcast from a cellular telephone to a cell site and stores the information into its memory. What makes this possible is the fact that each time your cellular telephone is turned on or used, it transmits the pair to the local cellular site and establishes a talk channel. It also transmits the pair when it is relocated from one cell site to another.
Cloning occurs most frequently in areas of high cell phone usage -- valet parking lots, airports, shopping malls, concert halls, sports stadiums, and high-congestion traffic areas in metropolitan cities. No one is immune to cloning, but you can take steps to reduce the likelihood of being the next victim.
The best defense against these three major vulnerabilities of cell phones is very simple -- do not use the cell phone. If you must use a cell phone, you can reduce the risk by following these guidelines:
References
1. Jessica Lee, "Focus Shifts from Gingrich to Taped Call," USA Today, Jan. 14, 1997, p. 5A.
2. "How O.J. Simpson was Tracked in his Bronco by Los Angeles Law Enforcement," U.S. Scanner News, February 1995.
3. Stephanie Mehta, "Prosecutors Charge Company for Spying on Pager Messages," The Wall Street Journal, August 28, 1997, p. A6.
4. "Just How Secure Is Your Cellular Phone?" article in National Reconnaissance Organization newsletter,1997.
5. "Running Cell-Phone Pirates Aground," Business Week, October 27, 1997, p. 8.
6. Paul F. Barry & Charles L. Wilkinson (Trident Data Systems), "Invasion of Privacy and 90s Technologies," Security Awareness Bulletin, No. 2-96. Richmond, VA: Department of Defense Security Institute, August 1996.
“The powers not delegated to the United States by the Constitution, nor prohibited by it to the states, are reserved to the states respectively, or to the people.”My home state of Tennessee passed both Tenth Amendment and Second Amendmentlegislation, supported in such number as to override our Democrat governor’s attempts to veto.
“Enough is enough! You must be aware at this point of the tempest brewing among the Rank and File. I am writing you in an effort to appeal to your sense of concern for the Military; a concern we share not only for the Military as a whole but for each and every individual who wears the Uniform in the Service of our Country. I am in this regard specifically asking you for your help. I implore you to not wait until the “pot boils over” and we find ourselves in total disarray. –So, how does Obama plan to enforce his global vision upon the masses when the US Constitution which provides for a federal government, delegates no such authority and an increasing number of soldiers and law enforcement are taking a stand against a “potential domestic enemy” in an effort to uphold their oath to protect and defend the US Constitution?
I am convinced, beyond any doubt, that the moral well being and efficiency of our fighting forces to defend our Country is soon to be hanging in a precarious balance if not already. In my humble estimation this is NOT a theoretical possibility to construct a thesis or a contingency plan about. It is a reality and is happening right now. Resolution of this issue must be accomplished in the most expeditious manner available at your disposal to gain immediate relief to those of us who are struggling to fully comply with our sworn Oath to the Constitution while being conflicted by questions relating to the qualifications of the POTUS to hold the office in full and absolute compliance with the Natural Born Citizen Clause.”
“We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the pursuit of Happiness. — That whenever any Form of Government becomes destructive of these ends, it is the Right of the People to alter or to abolish it, and to institute new Government...”If the people fail to quickly alter a Fed run wild, via their state legislatures, they will be left with no option but to abolish and start over from scratch.Republicans in Washington DC have either lost their way or lost their nerve. As a result, they have lost all power.
This man, Zbigniew Brzezinski, is a major U.S. and global Power Broker. Either he is giving us a clandestine warning or he has made a howling error. In either case he should be questioned under oath about these comments and their implications. What he says here is basically an admission of State-Sponsored False-Flag Terrorism being practiced within the U.S. No surprises there.
You have reached us because you or someone you care about is suffering from puzzling chronic conditions such as headaches, stomach disorders, fatigue, depression, and many other problems. Tests have come up negative and you want answers.
What you will find out at this time will most likely be the missing piece of the puzzle. What we discovered helped our family and thousands of others. Some skeptics will think, "It's too simple an explanation", but the truth is, most of us are suffering needlessly because of so-called "safe" food additives, namely excitatory neuro-transmitters (nicknamed excitotoxins). The main ones are monosodium glutamate (MSG), aspartame, and L-cysteine. You may think that you are actually avoiding MSG if you avoid Chinese restaurants, but this factory created flavor enhancer is in almost every bottled, bagged, frozen, or canned processed food on super market shelves. But since MSG is often a component of a formulation, it is not labeled as such. You've seen words like autolyzed yeast, hydrolyzed protein, and whey protein. Each of these substances contain a percentage of glutamate, the harmful component of MSG.
I didn't correlate my headaches and diarrhea to the food I was eating for years. Most of us don't because reactions to these excitatory substances can occur from ten minutes to 48 hours after ingestion. But when my 19 year old son began to develop debilitating headaches, my search for answers led me to the culprit: MSG. See if you suffer from any of these commonly reported symptoms and disorders.
Debby Anglesey
1. Severe headache | 12. Shortness of breath, chest pains, asthma | 23. Slowed speech |
2. Nausea, diarrhea, vomiting | 13. Swelling, pain, or numbness of hands, feet, jaw | 24. Chronic bronchitis-like symptoms, allergy reactions, dry cough, hoarseness or sore throat |
3. Irregular heart beat or blood pressure, racing heart | 14. Pain in joints or bones | 25. Heavy, weak feeling in arms and legs |
4. Depression or mood change, bipolar, SAD | 15. Flushing or tingling in face, chest, pressure behind eyes | 26. Irritable bowel or colitis |
5. Abdominal pain, cramps, bloating, colitis, IBS | 16. Gagging reflex or difficulty swallowing | 27. Attention deficit disorder, anxiety attacks, rage, panic attacks |
6. Balance problems, dizziness, or seizures, mini-strokes | 17. Hyperactivity, behavioral problems | 28. Neurological disorders such as Alzheimer's, fibromyalgia, MS, Parkinson's |
7. Tenderness in localized areas, neck, back, etc. | 18. Chronic post nasal drip | 29. Pressure behind eyes or on head, neck, shoulders |
8. Sleep disorders | 19. Skin rash, itching, hives | 30. ADD, ADHD, Rage Disorder |
9. Blurred vision or difficulty breathing | 20. Bloated face, dark circles under strained eyes | 31. Asthma |
10. Chronic fatigue or sleepiness | 21. Extreme thirst or dry mouth | 32. Weight problems, obesity, hypoglycemia |
11. Excessive perspiring or shuddering and chills | 22. Difficulty concentrating and poor memory |
If any of these conditions plague you, you may be a victim of the myth that monosodium glutamate (MSG) is a safe food additive. The truth is that the average person eats much more glutamate than what is considered to be a safe and normal amount in the typical American diet. MSG is in everything from crackers and soda pop to vitamins and toothpaste.
After suffering for 21 years from several chronic conditions caused by MSG, and finally finding relief for both herself and her son, Debby spent one and a half years researching and writing a book to help other victims. This highly informative book is recommended for people who suspect or know their migraines, stomach disorders, or other chronic conditions are caused by Monosodium Glutamate (MSG) and Aspartame. It offers over 400 recipes and several chapters devoted to educate the wary consumer. Many doctors and clinics use and recommend this book for their sensitive patients. Since glutamate is hidden under many aliases in processed foods, avoiding it is tricky without the facts. This book will educate and guide you to a new world of health as you learn how to substitute your present MSG tainted foods for healthy ones.