PNN 7/6/14
7:01PM - RWS
7:15PM - Steve Horn Journalist Fellow with DeSmog Blog
7:33PM - Allan Hendricks - with Equality Florida
7:33PM - Meredith Ockman - SE Regional Dir of N. O. W.
8:05PM - Matthew Schwartz - with South FLorida Wildlife
PNN Host Rick Spisak welcomes
Steve Horn Journalist Fellow with DeSmog Blog on Oil and Pollution
Allan Hendricks - with Equality Florida - Human Rights
Meredith Ockman - the SouthEast Regional Director of National Organization for Women - Human Rights
Matthew Schwartz with South FLorida Wildlife - discuss protecting the Everglades and its wildlife
Here we go again. According to a piece in Politico Magazine former Secretary of State and likely 2016 presidential candidate Hillary Clinton had some harsh words related to progressives in her $400,000 speeches for Goldman Sachs and friends. Clinton decided to use her speaking opportunity before the super rich to attack those criticizing Wall Street and its numerous criminal practices.
Ordinarily these masters of the universe might have groaned at the idea of a politician taking the microphone…
But Clinton offered a message that the collected plutocrats found reassuring, according to accounts offered by several attendees, declaring that the banker-bashing so popular within both political parties wasunproductive and indeed foolish.
Foolish, as in you don’t get paid $400,000 for saying it? Why criticize Goldman Sachs when you can get paid $400,000 for talking to them the way they like?
Striking a soothing note on the global financial crisis, she told the audience, in effect: We all got into this mess together, and we’re all going to have to work together to get out of it. What the bankers heard her to say was just what they would hope for from a prospective presidential candidate: Beating up the finance industry isn’t going to improve the economy—it needs to stop.
It seems Wall Street has found its candidate, not surprising given that Bill Clinton did more to deregulate Wall Street than Ronald Reagan. It was President Clinton after all who pushed for breaking Glass-Steagall and fired his own CFTC Commissioner, Brooksley Born, to help ensure derivatives were not regulated. The 2008 financial crisis could appropriately be called the Clinton Crash.
Not surprisingly Clinton’s point man on deregulating Wall Street was a former CEO of Goldman Sachs,Robert Rubin.
And now Hillary is signaling a return to the good old days for Wall Street after taking $400,000 of their money. Can we afford a second Clinton Crash?
2. NSA's Listening post tracks more mundane than international communications
Ordinary Internet users, American and non-American alike, far outnumber legally targeted foreigners in the communications intercepted by the National Security Agency from U.S. digital networks, according to a four-month investigation by The Washington Post.
Nine of 10 account holders found in a large cache of intercepted conversations, which former NSA contractor Edward Snowden provided in full to The Post, were not the intended surveillance targets but were caught in a net the agency had cast for somebody else.
Many of them were Americans. Nearly half of the surveillance files, a strikingly high proportion, contained names, e-mail addresses or other details that the NSA marked as belonging to U.S. citizens or residents. NSA analysts masked, or “minimized,” more than 65,000 such references to protect Americans’ privacy, but The Post found nearly 900 additional e-mail addresses, unmasked in the files, that could be strongly linked to U.S. citizens or U.S.residents.
The surveillance files highlight a policy dilemma that has been aired only abstractly in public. There are discoveries of considerable intelligence value in the intercepted messages — and collateral harm to privacy on a scale that the Obama administration has not been willing to address.
Among the most valuable contents — which The Post will not describe in detail, to avoid interfering with ongoing operations — are fresh revelations about a secret overseas nuclear project, double-dealing by an ostensible ally, a military calamity that befell an unfriendly power, and the identities of aggressive intruders into U.S. computer networks.
Months of tracking communications across more than 50 alias accounts, the files show, led directly to the 2011 capture in Abbottabad of Muhammad Tahir Shahzad, a Pakistan-based bomb builder, and Umar Patek, a suspect in a 2002 terrorist bombing on the Indonesian island of Bali. At the request of CIA officials, The Post is withholding other examples that officials said would compromise ongoing operations.
Many other files, described as useless by the analysts but nonetheless retained, have a startlingly intimate, even voyeuristic quality. They tell stories of love and heartbreak, illicit sexual liaisons, mental-health crises, political and religious conversions, financial anxieties and disappointed hopes. The daily lives of more than 10,000 account holders who were not targeted are catalogued and recorded nevertheless.
In order to allow time for analysis and outside reporting, neither Snowden nor The Post has disclosed until now that he obtained and shared the content of intercepted communications. The cache Snowden provided came from domestic NSA operations under the broad authority granted by Congress in 2008 with amendments to the Foreign Intelligence Surveillance Act. FISA content is generally stored in closely controlled data repositories, and for more than a year, senior government officials have depicted it as beyond Snowden’s reach.
The Post reviewed roughly 160,000 intercepted e-mail and instant-message conversations, some of them hundreds of pages long, and 7,900 documents taken from more than 11,000 online accounts.
The material spans President Obama’s first term, from 2009 to 2012, a period of exponential growth for the NSA’s domestic collection.
Taken together, the files offer an unprecedented vantage point on the changes wrought by Section 702 of the FISA amendments, which enabled the NSA to make freer use of methods that for 30 years had required probable cause and a warrant from a judge. One program, code-named PRISM, extracts content stored in user accounts at Yahoo, Microsoft, Facebook, Google and five other leading Internet companies. Another, known inside the NSA as Upstream, intercepts data on the move as it crosses the U.S. junctions of global voice and data networks.
No government oversight body, including the Justice Department, the Foreign Intelligence Surveillance Court, intelligence committees in Congress or the president’s Privacy and Civil Liberties Oversight Board, has delved into a comparably large sample of what the NSA actually collects — not only from its targets but also from people who may cross a target’s path.
Among the latter are medical records sent from one family member to another, résumés from job hunters and academic transcripts of schoolchildren. In one photo, a young girl in religious dress beams at a camera outside a mosque.
Scores of pictures show infants and toddlers in bathtubs, on swings, sprawled on their backs and kissed by their mothers. In some photos, men show off their physiques. In others, women model lingerie, leaning suggestively into a webcam or striking risque poses in shorts and bikini tops.
“None of the hits that were received were relevant,” two Navy cryptologic technicians write in one of many summaries of nonproductive surveillance. “No additional information,” writes a civilian analyst. Another makes fun of a suspected kidnapper, newly arrived in Syria before the current civil war, who begs for employment as a janitor and makes wide-eyed observations about the state of undress displayed by women on local beaches.
By law, the NSA may “target” only foreign nationals located overseas unless it obtains a warrant based on probable cause from a special surveillance court. For collection under PRISM and Upstream rules, analysts must state a reasonable belief that the target has information of value about a foreign government, a terrorist organization or the spread of nonconventional weapons.
Most of the people caught up in those programs are not the targets and would not lawfully qualify as such. “Incidental collection” of third-party communications is inevitable in many forms of surveillance, but in other contexts the U.S. government works harder to limit and discard irrelevant data. In criminal wiretaps, for example, the FBI is supposed to stop listening to a call if a suspect’s wife or child is using the phone.
There are many ways to be swept up incidentally in surveillance aimed at a valid foreign target. Some of those in the Snowden archive were monitored because they interacted directly with a target, but others had more-tenuous links.
If a target entered an online chat room, the NSA collected the words and identities of every person who posted there, regardless of subject, as well as every person who simply “lurked,” reading passively what other people wrote.
“1 target, 38 others on there,” one analyst wrote. She collected data on them all.
In other cases, the NSA designated as its target the Internet protocol, or IP, address of a computer server used by hundreds of people.
The NSA treats all content intercepted incidentally from third parties as permissible to retain, store, search and distribute to its government customers. Raj De, the agency’s general counsel, has testified that the NSA does not generally attempt to remove irrelevant personal content, because it is difficult for one analyst to know what might become relevant to another.
The Obama administration declines to discuss the scale of incidental collection. The NSA, backed by Director of National Intelligence James R. Clapper Jr., has asserted that it is unable to make any estimate, even in classified form, of the number of Americans swept in. It is not obvious why the NSA could not offer at least a partial count, given that its analysts routinely pick out “U.S. persons” and mask their identities, in most cases, before distributing intelligence reports.
If Snowden’s sample is representative, the population under scrutiny in the PRISM and Upstream programs is far larger than the government has suggested. In a June 26 “transparency report,” the Office of the Director of National Intelligence disclosed that 89,138 people were targets of last year’s collection under FISA Section 702. At the 9-to-1 ratio of incidental collection in Snowden’s sample, the office’s figure would correspond to nearly 900,000 accounts, targeted or not, under surveillance.
‘He didn’t get this data’
U.S. intelligence officials declined to confirm or deny in general terms the authenticity of the intercepted content provided by Snowden, but they made off-the-record requests to withhold specific details that they said would alert the targets of ongoing surveillance. Some officials, who declined to be quoted by name, described Snowden’s handling of the sensitive files as reckless.
In an interview, Snowden said “primary documents” offered the only path to a concrete debate about the costs and benefits of Section 702 surveillance. He did not favor public release of the full archive, he said, but he did not think a reporter could understand the programs “without being able to review some of that surveillance, both the justified and unjustified.”
“While people may disagree about where to draw the line on publication, I know that you and The Post have enough sense of civic duty to consult with the government to ensure that the reporting on and handling of this material causes no harm,” he said.
In Snowden’s view, the PRISM and Upstream programs have “crossed the line of proportionality.”
“Even if one could conceivably justify the initial, inadvertent interception of baby pictures and love letters of innocent bystanders,” he added, “their continued storage in government databases is both troubling and dangerous. Who knows how that information will be used in the future?”
For close to a year, NSA and other government officials have appeared to deny, in congressional testimony and public statements, that Snowden had any access to the material.
As recently as May, shortly after he retired as NSA director, Gen. Keith Alexander denied that Snowden could have passed FISA content to journalists.
“He didn’t get this data,” Alexander told a New Yorker reporter. “They didn’t touch —”
“The operational data?” the reporter asked.
“They didn’t touch the FISA data,” Alexander replied. He added, “That database, he didn’t have access to.”
Robert S. Litt, the general counsel for the Office of the Director of National Intelligence, said in a prepared statement that Alexander and other officials were speaking only about “raw” intelligence, the term for intercepted content that has not yet been evaluated, stamped with classification markings or minimized to mask U.S. identities.
“We have talked about the very strict controls on raw traffic, the training that people have to have, the technological lockdowns on access,” Litt said. “Nothing that you have given us indicates that Snowden was able to circumvent that in any way.”
In the interview, Snowden said he did not need to circumvent those controls, because his final position as a contractor for Booz Allen at the NSA’s Hawaii operations center gave him “unusually broad, unescorted access to raw SIGINT [signals intelligence] under a special ‘Dual Authorities’ role,” a reference to Section 702 for domestic collection and Executive Order 12333 for collection overseas. Those credentials, he said, allowed him to search stored content — and “task” new collection — without prior approval of his search terms.
“If I had wanted to pull a copy of a judge’s or a senator’s e-mail, all I had to do was enter that selector into XKEYSCORE,” one of the NSA’s main query systems, he said.
The NSA has released an e-mail exchange acknowledging that Snowden took the required training classes for access to those systems.
‘Minimized U.S. president’
At one level, the NSA shows scrupulous care in protecting the privacy of U.S. nationals and, by policy, those of its four closest intelligence allies — Britain, Australia, Canada and New Zealand.
More than 1,000 distinct “minimization” terms appear in the files, attempting to mask the identities of “possible,” “potential” and “probable” U.S. persons, along with the names of U.S. beverage companies, universities, fast-food chains and Web-mail hosts.
Some of them border on the absurd, using titles that could apply to only one man. A “minimized U.S. president-elect” begins to appear in the files in early 2009, and references to the current “minimized U.S. president” appear 1,227 times in the following four years.
Even so, unmasked identities remain in the NSA’s files, and the agency’s policy is to hold on to “incidentally” collected U.S. content, even if it does not appear to contain foreign intelligence.
In one exchange captured in the files, a young American asks a Pakistani friend in late 2009 what he thinks of the war in Afghanistan. The Pakistani replies that it is a religious struggle against 44 enemy states.
Startled, the American says “they, ah, they arent heavily participating . . . its like . . . in a football game, the other team is the enemy, not the other teams waterboy and cheerleaders.”
“No,” the Pakistani shoots back. “The ther teams water boy is also an enemy. it is law of our religion.”
“haha, sorry thats kind of funny,” the American replies.
When NSA and allied analysts really want to target an account, their concern for U.S. privacy diminishes. The rationales they use to judge foreignness sometimes stretch legal rules or well-known technical facts to the breaking point.
In their classified internal communications, colleagues and supervisors often remind the analysts that PRISM and Upstream collection have a “lower threshold for foreignness ‘standard of proof’ ” than a traditional surveillance warrant from a FISA judge, requiring only a “reasonable belief” and not probable cause.
One analyst rests her claim that a target is foreign on the fact that his e-mails are written in a foreign language, a quality shared by tens of millions of Americans. Others are allowed to presume that anyone on the chat “buddy list” of a known foreign national is also foreign.
In many other cases, analysts seek and obtain approval to treat an account as “foreign” if someone connects to it from a computer address that seems to be overseas. “The best foreignness explanations have the selector being accessed via a foreign IP address,” an NSA supervisor instructs an allied analyst in Australia.
Apart from the fact that tens of millions of Americans live and travel overseas, additional millions use simple tools called proxies to redirect their data traffic around the world, for business or pleasure. World Cup fans this month have been using a browser extension called Hola to watch live-streamed games that are unavailable from their own countries. The same trick is routinely used by Americans who want to watch BBC video. The NSA also relies routinely on locations embedded in Yahoo tracking cookies, which are widely regarded by online advertisers as unreliable.
In an ordinary FISA surveillance application, the judge grants a warrant and requires a fresh review of probable cause — and the content of collected surveillance — every 90 days. When renewal fails, NSA and allied analysts sometimes switch to the more lenient standards of PRISM and Upstream.
“These selectors were previously under FISA warrant but the warrants have expired,” one analyst writes, requesting that surveillance resume under the looser standards of Section 702. The request was granted.
‘I don’t like people knowing’
She was 29 and shattered by divorce, converting to Islam in search of comfort and love. He was three years younger, rugged and restless. His parents had fled Kabul and raised him in Australia, but he dreamed of returning to Afghanistan.
One day when she was sick in bed, he brought her tea. Their faith forbade what happened next, and later she recalled it with shame.
“what we did was evil and cursed and may allah swt MOST merciful forgive us for giving in to our nafs [desires]”
Still, a romance grew. They fought. They spoke of marriage. They fought again.
All of this was in the files because, around the same time, he went looking for the Taliban.
He found an e-mail address on its English-language Web site and wrote repeatedly, professing loyalty to the one true faith, offering to “come help my brothers” and join the fight against the unbelievers.
On May 30, 2012, without a word to her, he boarded a plane to begin a journey to Kandahar. He left word that he would not see her again.
If that had been the end of it, there would not be more than 800 pages of anguished correspondence between them in the archives of the NSA and its counterpart, the Australian Signals Directorate.
He had made himself a target. She was the collateral damage, placed under a microscope as she tried to adjust to the loss.
Three weeks after he landed in Kandahar, she found him on Facebook.
“Im putting all my pride aside just to say that i will miss you dearly and your the only person that i really allowed myself to get close to after losing my ex husband, my dad and my brother.. Im glad it was so easy for you to move on and put what we had aside and for me well Im just soo happy i met you. You will always remain in my heart. I know you left for a purpose it hurts like hell sometimes not because Im needy but because i wish i could have been with you.”
His replies were cool, then insulting, and gradually became demanding. He would marry her but there were conditions. She must submit to his will, move in with his parents and wait for him in Australia. She must hand him control of her Facebook account — he did not approve of the photos posted there.
She refused. He insisted:
“look in islam husband doesnt touch girl financial earnigs unless she agrees but as far as privacy goes there is no room….i need to have all ur details everything u do its what im supposed to know that will guide u whether its right or wrong got it”
Later, she came to understand the irony of her reply:
“I don’t like people knowing my private life.”
Months of negotiations followed, with each of them declaring an end to the romance a dozen times or more. He claimed he had found someone else and planned to marry that day, then admitted it was a lie. She responded:
“No more games. You come home. You won’t last with an afghan girl.”
She begged him to give up his dangerous path. Finally, in September, she broke off contact for good, informing him that she was engaged to another man.
“When you come back they will send you to jail,” she warned.
They almost did.
In interviews with The Post, conducted by telephone and Facebook, she said he flew home to Australia last summer, after failing to find members of the Taliban who would take him seriously. Australian National Police met him at the airport and questioned him in custody. They questioned her, too, politely, in her home. They showed her transcripts of their failed romance. When a Post reporter called, she already knew what the two governments had collected about her.
Eventually, she said, Australian authorities decided not to charge her failed suitor with a crime. Police spokeswoman Emilie Lovatt declined to comment on the case.
Looking back, the young woman said she understands why her intimate correspondence was recorded and parsed by men and women she did not know.
“Do I feel violated?” she asked. “Yes. I’m not against the fact that my privacy was violated in this instance, because he was stupid. He wasn’t thinking straight. I don’t agree with what he was doing.”
What she does not understand, she said, is why after all this time, with the case long closed and her own job with the Australian government secure, the NSA does not discard what it no longer needs.
Jennifer Jenkins and Carol D. Leonnig contributed to this report.
3. Here are the highlights of Justice Ginsburg’s fiery Hobby Lobby dissent
The iconic member of the Supreme Court's liberal wing argues the majority "has ventured into a minefield"
On Monday morning, the Supreme Court finally released its much-anticipated decision on the Hobby Lobby case, a decision that lived up to expectations by being split along ideological lines (the court’s five conservatives overruling its four liberals) and severely weakening Obamacare’s birth control mandate.
Also living up to expectations? Liberal Justice Ruth Bader Ginsburg’s blistering dissent, which excoriated the court’s majority for its ruling, describing it as a “radical” decision “of startling breadth” that would have chaotic and major unintended consequences. You can read her dissent in full here (it starts at page 60) but we’ve also compiled some of its best, key parts.
Ginsburg opens with a bang, immediately describing the decision as one that will have sweeping consequences:
In a decision of startling breadth, the Court holds that commercial enterprises, including corporations, along with partnerships and sole proprietorships, can opt out of any law (saving only tax laws) they judge incompatible with their sincerely held religious beliefs.
She frames the decision as one that denies women access to healthcare, rather than as one that upholds religious liberty:
The exemption sought by Hobby Lobby and Conestoga would…deny legions of women who do not hold their employers’ beliefs access to contraceptive coverage.
In a similar vein, she rejects that the birth control mandate should be seen as an act of government coercion, describing it instead as one that provides women with the ability to make their own choice:
Any decision to use contraceptives made by a woman covered under Hobby Lobby’s or Conestoga’s plan will not be propelled by the Government, it will be the woman’s autonomous choice, informed by the physician she consults.
She affirms her belief that religious organizations and for-profit corporations serve fundamentally different purposes and have fundamentally different rights (and throws some shade at the majority in the process):
Religious organizations exist to foster the interests of persons subscribing to the same religious faith. Not so of for-profit corporations. … The distinction between a community made up of believers in the same religion and one embracing persons of diverse beliefs, clear as it is, constantly escapes the Court’s attention. One can only wonder why the Court shuts this key difference from sight.
She claims that the majority has actually undermined the very principle, religious freedom, it claimed in its ruling to have upheld:
Approving some religious claims while deeming others unworthy of accommodation could be ‘perceived as favoring one religion over another,’ the very ‘risk the [Constitution's] Establishment Clause was designed to preclude.
She writes that the majority has pushed the Religious Freedom Restoration Act past its original intent:
In the Court’s view, RFRA demands accommodation of a for-profit corporation’s religious beliefs no matter the impact that accommodation may have on third parties who do not share the corporation owners’ religious faith—in these cases, thousands of women employed by Hobby Lobby and Conestoga or dependents of persons those corporations employ. Persuaded that Congress enacted RFRA to serve a far less radical purpose, and mindful of the havoc the Court’s judgment can introduce, I dissent.
4. VINYARD JR. TO BARRON COLLIER COMPANIES AND COLLIER ENTERPRISES
Vinyard to Barron Collier & Co
As you know, the actions of Dan A. Hughes has left families in Collier County at unease, and we notified the Company that they must fulfill a list of demands by the Department of Environmental Protection’s (Department) July 15 deadline.
As part of ensuring we do everything possible to protect families’ groundwater from activities at the Collier-Hogan site, the Department went above and beyond to begin its own water testing on June 24, 2014. To date, the tests that were administered by the Department and two private labs have indicated that groundwater has not been impacted.
However, public trust has been damaged by Dan A. Hughes’ previous actions. As you stand to benefit financially from the Company’s activities on your property, we instruct you to work with both Collier County and the Conservancy of Southwest Florida to develop long-term groundwater monitoring strategies, based on sound science, that ensure the safety of current and future operations. Furthermore, we instruct you to exclusively fund the implementation of these strategies.
We look forward to seeing your plan. Obviously, consistent with the Department’s obligation to safeguard the community and the environment, we will continue our monitoring efforts at the site.
Sincerely,
sec
sec
Herschel T. Vinyard Jr.
Secretary
5. The Poisoners and their Enablers - from TRUTHOUT
Poison Spring: The Secret History of Pollution and the EPA
by E.G. Vallianatos and McKay Jenkins,
(Bloomsbury Press)
Poison Spring follows on the tracks of a massive story of deceit, corruption, lies, fear, cover-ups, fascism, i.e., the collusion of corporations with the government, and falsehoods that started to be told over 60 years ago in 1962 by Rachel Carson, a chemist, in Silent Spring, which warned of an impending collapse and death of our country's and planet's bio-systems due to the gratuitous use of chemicals, pesticides, insecticides and herbicides in our agriculture. Rachel Carson described a world without the excited celebration of spring, voided of birdsong and the rustling of animals anxiously preparing for another season of new life and renewal.
Sixty years later, we are no better off. In fact, as shown in this remarkable new book, Poison Spring, we are worse off. Silent Spring has turned into Poison Spring.
This work shows the path that has been taken by the Environmental Protection Agency (EPA), year after year, director after director, US president after US president, Republican or Democrat, from Reagan to Obama, to relinquish enforcement of all regulations and forego all oversight. It demonstrates the agency's obligation to protect the American people and the environment, as mandated by the US Congress and signed into law by President Nixon, but its opting instead to let corporations and the chemical-industrial complex (CIC) perform their own tests, pronounce their own decisions, regulate themselves and deploy an ungodly cocktail of chemicals, biocides, pesticides, insecticides, herbicides, fungicides, chlorinated hydrocarbons, neonicotinoids, neurotoxins, carcinogens, hormone mimickers and disruptors, mutagens, bee, pollinator, developmental and reproductive toxins, and otherwise poison in unimaginable quantities - about 1.2 billion pounds per year in the United States alone. That's about 4 pounds per per person per year in the United States on average, and 5 billion pounds each year worldwide, close to 1 pound of biocides per person on the planet each year, year after year round the clock. It's an amount that has risen a depraved 50-fold since 1950, going straight into our food, environment, agriculture, air, water, land, rivers, oceans, plants and animals.
Data published by the US Department of Agriculture (USDA) show that up to an incredible 86 pesticide residues can be detected in a single food item (cucumbers) that has been grown by the agricultural-industrial complex (AIC) using any or all the chemicals above.
A bizarre new assault wave that seems to have come straight from a Hollywood horror hell nightmare, is headed by a new type of perfidious chemical being deployed in combination with genetically modified organisms (GMOs) and their associated weed killers, glyphosates, growth inhibitors that work by blocking the uptake of nutrients by weed roots, thus stunting plant growth and ultimately killing them, leaving behind the GMO plants only that were genetically modified with DNA from anything such as viruses, bacteria, insects, plants or animals and are resistant to the biocides.
However, this genetically engineered plant resistance is rapidly waning, and an old chemical, 2-4-D dioxin, a defoliant component of the infamous Agent Orange concoction used in Vietnam, is in the initial stages of being approved by the EPA. Dioxins are a class of chlorinated hydrocarbons that are the most poisonous chemical known to mankind, causing birth defects with 500,000 reported cases in Vietnam alone, reproductive problems, cancer, leukemia, and immuno-suppression. Even the remotest idea of approving one of the most toxic chemicals for use in food is complete madness, regarded by many as a criminal act against people, life and the planet.
With close to 400 references, Poison Spring is an extraordinary account that required courage to relay. Some battles have been won; many more urgently need to be won against a relentless chemical/agro-industrial complex. Our nation must come to terms with the rampant dishonesty and deceit in industry and government, hold both accountable, and chart a new, clean, poison free future for the world, for all of us.
6. TUNA FISH… They're HOT!
(NaturalNews) Fish caught off the coast of Oregon have tested positive for radiation and the researchers that discovered this say Fukushima is to blame. An Oregon State University (OSU) research project found that radiation in albacore tuna has been steadily increasing ever since the nuclear disaster back in 2011, with average radiation levels now triple what they were before the consecutive meltdowns.
A team led by graduate research assistant Delvan Neville first began collecting tuna samples back in 2011 and ever since, has been collecting more to make comparisons. Based on what they observed, levels of radioactive cesium in the fish have increased by roughly 300 percent since the project first began, a direct result of radioactive bioaccumulation in the fish over time.
Published in the journal Environmental Science and Technology, the results of the study demonstrate a lingering effect from the Fukushima disaster that the mainstream media has largely downplayed. Though still relatively minute, the radiation levels detected in albacore tuna add to the many other sources of exposure from other foods, as well as from air and seawater.
"You can't say there is absolutely zero risk because any radiation is assumed to carry at least some small risk," admitted Neville, who works in the OSU Department of Nuclear Engineering and Radiation Health Physics.
Neville insists that the levels detected in the fish are so small that a person receives more exposure from other normal activities like sleeping next to another person, for instance, as humans emit radiation from the natural potassium-40 inside their bodies. But once again, this assumption fails to take into account the effects of concentrated doses of ingested ionizing radiation, which can have profound health effects.
According to the researchers, radiation was detected in all areas of the tuna's bodies, including in the loins, carcass and guts. Older fish were also determined to have higher levels of the damaging radionuclides than younger fish, suggesting that the older fish may have traveled across the Pacific Ocean and back several times, each time exposing themselves to more radiation.
Still, many of the three-year-old fish tested had no traces of Fukushima radiation at all, which some may see as reassuring. The researchers also pointed out that once albacore tuna reach the age of about five, they stop their trans-Pacific migrations and head south to warmer waters, never to return to the West Coast of the U.S.
"The presence of these radioactive isotopes is actually helping us in an odd way -- giving us information that will allow us to estimate how albacore tuna migrate between our West Coast and Japan," added Neville. "Fukushima provides the only known source for a specific isotope that shows up in the albacore, so it gives us an unexpected fingerprint that allows us to learn more about the migration."
Learn more: http://www.naturalnews.com/045132_Tuna_Fukushima_radiation.html#ixzz36jG8m3VU
Learn more: http://www.naturalnews.com/045132_Tuna_Fukushima_radiation.html#ixzz36jFzuxLn
7. Gov’t Report: Criticality suspected to have occurred in Fukushima fuel pool — Nuclear chain reaction after massive explosion at Unit 3 compressed fuel together
Top U.S. Official: “The reality is, no technology exists anywhere to solve problem” of Fukushima’s melted fuel — TV: Molten mass “will scorch into the earth” if not cooled, a ‘China Syndrome’; Geysers of radioactive steam shooting up for miles around
NHK: Experts say that one of the most difficult challenges of decommissioning the plant is removing fuel debris… And Magwood says that there is no magic wand to wipeout this problem.
William Magwood, US Nuclear Regulatory Commission: I think people have to be realistic how difficult this is, how long it’s going to take. During my visit to Japan this week, people have asked me from time to time, “Are there technologies in the US that can help solve this problem?” The reality is there is no technology that exists anywhere to solve this problem.
Radiation spikes at WIPP nuclear facility — Hits highest levels since initial hours of radioactive release in February — Document link removed from official website — Gov’t analyzing samples for “potential impact on human health”
8. Gerard, McGarvey urge Senate to act on Keystone XL
WASHINGTON, DC, June 16
06/16/2014
OGJ Washington Editor
The increasingly unsettled Middle East situation makes it more important than ever for the US Senate to press the Obama administration for approval of the proposed Keystone XL crude oil pipeline’s border permit, leaders of the American Petroleum Institute and the nation’s building and trades unions said.
The Senate Energy and Natural Resources Committee should pass Mary L. Landrieu’s (D-La.) bill approving the project at the committee’s scheduled June 18 markup and refer it to Majority Leader Harry M. Reid (D-Nev.) for prompt consideration, API Pres. Jack N. Gerard and Sean McGarvey, president of the AFL-CIO’s Building and Construction Trades Department, told reporters in a June 16 teleconference.
“The growing crisis in the Middle East, as well as ongoing tensions in Ukraine, makes clearer than ever that we cannot stand in the way of smart decisions today that will help to secure a stable supply of energy for our nation in the future,” Gerard said. “We cannot stand by while the administration waits—and waits—until it is politically convenient to do the right thing.”
McGarvey said, “Keystone is a litmus test about whether America is serious about global and regional energy security. Events in the Middle East have driven crude oil prices to their highest point in 9 months. North America’s building and trades unions believe the time for studying this project is over. This extraordinary approval process now has taken longer than it took for the Allies to win World War II.”
Reports that Canadian Prime Minister Stephen J. Harper will make a major announcement soon about a competing project—the Northern Gateway Pipeline—which would transport Alberta heavy crude oil west for export through British Columbia, demonstrate the resource will be produced, Gerard said.
“If he makes the announcement today, it shows the commitment on the Canadians’ part to secure their energy future,” he said. “We hope our elected officials will get our energy security in order, and exercise the political leadership and get on with it to take advantage of this energy resources.”
McGarvey said, “I represent somewhere in the neighborhood of 600,000 workers in Canada. Officials of Alberta and the federal government recognize they need to have more than one customer for their products. It looks to me as if we’re forcing the governments and industry there to look for other customers, and I don’t think we want to be in that position.”
===============================================================
. If you are interested in helping to shape the direction this region takes,
http://www.blogtalkradio.com/newmercurymedia/2014/07/06/pnn--human-rights-and-our-glades
http://alturl.com/wyock
No comments:
Post a Comment