The Prometheus League
Breaking News and Updates
- Abolition Of Work
- Ai
- Alt-right
- Alternative Medicine
- Antifa
- Artificial General Intelligence
- Artificial Intelligence
- Artificial Super Intelligence
- Ascension
- Astronomy
- Atheism
- Atheist
- Atlas Shrugged
- Automation
- Ayn Rand
- Bahamas
- Bankruptcy
- Basic Income Guarantee
- Big Tech
- Bitcoin
- Black Lives Matter
- Blackjack
- Boca Chica Texas
- Brexit
- Caribbean
- Casino
- Casino Affiliate
- Cbd Oil
- Censorship
- Cf
- Chess Engines
- Childfree
- Cloning
- Cloud Computing
- Conscious Evolution
- Corona Virus
- Cosmic Heaven
- Covid-19
- Cryonics
- Cryptocurrency
- Cyberpunk
- Darwinism
- Democrat
- Designer Babies
- DNA
- Donald Trump
- Eczema
- Elon Musk
- Entheogens
- Ethical Egoism
- Eugenic Concepts
- Eugenics
- Euthanasia
- Evolution
- Extropian
- Extropianism
- Extropy
- Fake News
- Federalism
- Federalist
- Fifth Amendment
- Fifth Amendment
- Financial Independence
- First Amendment
- Fiscal Freedom
- Food Supplements
- Fourth Amendment
- Fourth Amendment
- Free Speech
- Freedom
- Freedom of Speech
- Futurism
- Futurist
- Gambling
- Gene Medicine
- Genetic Engineering
- Genome
- Germ Warfare
- Golden Rule
- Government Oppression
- Hedonism
- High Seas
- History
- Hubble Telescope
- Human Genetic Engineering
- Human Genetics
- Human Immortality
- Human Longevity
- Illuminati
- Immortality
- Immortality Medicine
- Intentional Communities
- Jacinda Ardern
- Jitsi
- Jordan Peterson
- Las Vegas
- Liberal
- Libertarian
- Libertarianism
- Liberty
- Life Extension
- Macau
- Marie Byrd Land
- Mars
- Mars Colonization
- Mars Colony
- Memetics
- Micronations
- Mind Uploading
- Minerva Reefs
- Modern Satanism
- Moon Colonization
- Nanotech
- National Vanguard
- NATO
- Neo-eugenics
- Neurohacking
- Neurotechnology
- New Utopia
- New Zealand
- Nihilism
- Nootropics
- NSA
- Oceania
- Offshore
- Olympics
- Online Casino
- Online Gambling
- Pantheism
- Personal Empowerment
- Poker
- Political Correctness
- Politically Incorrect
- Polygamy
- Populism
- Post Human
- Post Humanism
- Posthuman
- Posthumanism
- Private Islands
- Progress
- Proud Boys
- Psoriasis
- Psychedelics
- Putin
- Quantum Computing
- Quantum Physics
- Rationalism
- Republican
- Resource Based Economy
- Robotics
- Rockall
- Ron Paul
- Roulette
- Russia
- Sealand
- Seasteading
- Second Amendment
- Second Amendment
- Seychelles
- Singularitarianism
- Singularity
- Socio-economic Collapse
- Space Exploration
- Space Station
- Space Travel
- Spacex
- Sports Betting
- Sportsbook
- Superintelligence
- Survivalism
- Talmud
- Technology
- Teilhard De Charden
- Terraforming Mars
- The Singularity
- Tms
- Tor Browser
- Trance
- Transhuman
- Transhuman News
- Transhumanism
- Transhumanist
- Transtopian
- Transtopianism
- Ukraine
- Uncategorized
- Vaping
- Victimless Crimes
- Virtual Reality
- Wage Slavery
- War On Drugs
- Waveland
- Ww3
- Yahoo
- Zeitgeist Movement
-
Prometheism
-
Forbidden Fruit
-
The Evolutionary Perspective
Monthly Archives: August 2015
Tor Browser version 4.5 – Security Affairs
Posted: August 28, 2015 at 5:43 pm
Are you a frequent visitor of thedeep web? Is the Tor Network a necessity for youronline anonymity?
You must download the new release for the Tor Browser,Tor Browser 4.5, that was designed with a variety of improvements. The developers at the Tor Project have introduced a number of security, privacy and usability enhancements in theTor Browser 4.5.
On theprivacyfront, theTor Browser 4.5 improves thefirst party isolationfeature that is designed to prevent third party company tracking online activities of the Tor users.
First party isolation provides the property that third party advertisements, like buttons, and mashup content that is included on one site will only know about your activity on that site, and will not be able to match it to your activity while you are on any other site. In other words, with first party isolation, Facebook, Twitter, and Google+ cant track you around the entire web using theirinfamous like buttons. reads a blogpostaboutTor Browser 4.5.
Additionally, the Tor Browser 4.5improves the resolution and locale fingerprinting defenses, developers have disabled thedevice sensor and video statistics APIs.
On the security front, the TorBrowser 4.5 comes with a new Security Slider designed to provide a user-friendly vulnerability surface reduction and allow users to choice the proper security level.
The slider is available from the menu item Privacy and Security Settings.
The Security Slider provides user-friendly vulnerability surface reduction as the security level is increased, browser features that were shown to have a high historical vulnerability count in the iSec Partners hardening study are progressively disabled. continues the post.
Another featurethat enhances the security of the Tor Browser 4.5 is the digital signature of the Windows packages with a hardware token donated by DigiCert CA.
The Tor Browser 4.5 also introduces anew obfs4 obfuscation protocol, which improve resistance for DPI and probing and prevents automated scanning for Tor bridges.
The new Tor Browser 4.5 also cames withDisconnectsearch engine by default, which provides private Google search results without Captchas or bans.
Dont waste time, download the newTor Browser 4.5!
PierluigiPaganini
(Security Affairs Tor Browser 4.5, Deep Web)
See the original post here:
Tor Browser version 4.5 - Security Affairs
Posted in Tor Browser
Comments Off on Tor Browser version 4.5 – Security Affairs
Tor Browser Attacked, Users Should Update Software Immediately …
Posted: at 5:43 pm
An attack against Tor Browser users on Windows machines was discovered this Sunday, and there is speculation that the uncovered malware was used by a law enforcement agency to harvest the IP addresses of users of several hidden services hosted by Freedom Hosting. The malware exploits a serious JavaScript security vulnerability affecting Firefox and other products that share the same code base, including the Tor Browser.
If you are using software based on Firefox major version 21 or earlier, Thunderbird 17.06 or earlier, or SeaMonkey 2.18 or earlier, please update your software immediately. Tor Browser Bundle users who have not updated to the most recent version are also at risk, and so we've provided a screenshot tutorial for how to update the Tor Browser Bundle below.
Tor and the Tor Browser: Security and the Importance of Updating
Tor is a powerful anonymity tool that allows human rights activists, dissidents and whistleblowers to use web services anonymously to avoid harassment, imprisonment and in some cases death. Tor also allows users to circumvent several forms of surveillance and censorship. The Tor Browser is a modified version of Firefox that ships with the Tor Browser Bundle to provide users with an easy way to browse with Tor without any configuration required.
Given the importance of Tor to users around the world, the security of both Tor and the Tor Browser are absolutely critical. This type of attack cannot be narrowly focused on particular Tor or Tor Browser users suspected of breaking the law, and leaves vulnerable the multitude of other users worldwide who depend on these tools for anonymity. In this case, all users of older versions of the Tor Browser Bundle are potentially vulnerable and the issue requires immediate attention.
What Can Users Do?
Tor does not provide automatic security updates. Instead, the Tor Browser currently requires users to manually download and install the update of the Tor Browser Bundle. The Tor Project is working on a fix for this, and this attack highlights the importance of allowing users to auto-update. For now, if you are using an outdated version of the Tor Browser, you should update your Tor Browser Bundle software immediately. Here are detailed instructions for Windows users:
1. Open your current Tor browser, and determine what version of Firefox is running by clicking the "TorBrowser" button:
2. Click on "Help" -> "About TorBrowser" to determine your version. If it below 17.07, then you are vulnerable:
3. Click the TorButton icon and go to "Download Tor Browser Bundle Update":
4. You should be taken to the Tor Browser Bundle homepage, where you click to download the executable file:
5. Download this executable file. Click through the warning about launching the executable file:
6. Once the file is downloaded, extract the application either to the same directory where Tor exists or a new directory for this version:
7. Launch the "Start Tor Browser" executable from the same directory where you extracted the application and check the version to make sure that you're up to date.
If you see Firefox version 17.0.7 or greater, then you're up to date.
This particular attack appears to affect only Windows users who have not updated to the most recent version of the Tor Browser Bundle. Because of this and a variety of other reasons that make it challenging to use Windows securely, Tor advises that "switching away from Windows is probably a good security move." If moving to a different platform is not practical, it is especially important to keep up with software updates. The advisory also recommends that users concerned about their security consider disabling JavaScript and installing the Firefox add-on Request Policy, which allows you to control which origins are loaded from a given website.
Read more:
Tor Browser Attacked, Users Should Update Software Immediately ...
Posted in Tor Browser
Comments Off on Tor Browser Attacked, Users Should Update Software Immediately …
How to Use Tor Browser for Anonymous Web Browsing
Posted: at 5:43 pm
1 of 17
Use to navigate.
(Image Tor Project).
This tutorial was last updated on December 3, 2013.
With increased scrutiny by employers, schools and even governments becoming more commonplace, anonymity while browsing the Web has become a priority. Many users looking for an enhanced sense of privacy are turning to Tor (The Onion Router), a network originally created by the U.S. Navy and now used by countless Web surfers across the globe.
Motives for utilizing Tor, which distributes your incoming and outgoing traffic through a series of virtual tunnels, can range from reporters aiming to keep their correspondence with a secret source private to everyday Internet users wishing to reach websites that have been restricted by their service provider.
While some choose to exploit Tor for nefarious purposes, most Web surfers simply want to stop sites from tracking their every move or determining their geolocation.
The concept of Tor, as well as how to configure your computer to send and receive packets over the network, can prove overwhelming even to some Internet veterans. Enter the Tor Browser Bundle, a software package that can get you up and running on Tor with minimal user intervention. An open-source grouping of Tor combined with the graphical controller Vidalia and a modified version of Mozilla's Firefox browser, Tor Browser Bundle runs on Windows, Mac, Linux, and Android platforms.
This tutorial walks you through the process of obtaining and running Tor Browser Bundle so that your Web communications can once again become your business and yours alone.
Please note that no anonymization method is completely foolproof, and that even Tor users can be susceptible to prying eyes from time to time. It is wise to keep that in mind and always proceed with caution.
Mac users should skip directly to Step 10 at this point.
Go here to see the original:
How to Use Tor Browser for Anonymous Web Browsing
Posted in Tor Browser
Comments Off on How to Use Tor Browser for Anonymous Web Browsing
Genetic Engineering – humans, body, used, process, plants …
Posted: August 27, 2015 at 11:47 pm
Photo by: Gernot Krautberger
Genetic engineering is any process by which genetic material (the building blocks of heredity) is changed in such a way as to make possible the production of new substances or new functions. As an example, biologists have now learned how to transplant the gene that produces light in a firefly into tobacco plants. The function of that genethe production of lighthas been added to the normal list of functions of the tobacco plants.
Genetic engineering became possible only when scientists had discovered exactly what is a gene. Prior to the 1950s, the term gene was used to stand for a unit by which some genetic characteristic was transmitted from one generation to the next. Biologists talked about a "gene" for hair color, although they really had no idea as to what that gene was or what it looked like.
That situation changed dramatically in 1953. The English chemist Francis Crick (1916 ) and the American biologist James Watson (1928 ) determined a chemical explanation for a gene. Crick and Watson discovered the chemical structure for large, complex molecules that occur in the nuclei of all living cells, known as deoxyribonucleic acid (DNA).
DNA molecules, Crick and Watson announced, are very long chains or units made of a combination of a simple sugar and a phosphate group.
Amino acid: An organic compound from which proteins are made.
DNA (deoxyribonucleic acid): A large, complex chemical compound that makes up the core of a chromosome and whose segments consist of genes.
Gene: A segment of a DNA molecule that acts as a kind of code for the production of some specific protein. Genes carry instructions for the formation, functioning, and transmission of specific traits from one generation to another.
Gene splicing: The process by which genes are cut apart and put back together to provide them with some new function.
Genetic code: A set of nitrogen base combinations that act as a code for the production of certain amino acids.
Host cell: The cell into which a new gene is transplanted in genetic engineering.
Human gene therapy (HGT): The application of genetic engineering technology for the cure of genetic disorders.
Nitrogen base: An organic compound consisting of carbon, hydrogen, oxygen, and nitrogen arranged in a ring that plays an essential role in the structure of DNA molecules.
Plasmid: A circular form of DNA often used as a vector in genetic engineering.
Protein: Large molecules that are essential to the structure and functioning of all living cells.
Recombinant DNA research (rDNA research): Genetic engineering; a technique for adding new instructions to the DNA of a host cell by combining genes from two different sources.
Vector: An organism or chemical used to transport a gene into a new host cell.
Attached at regular positions along this chain are nitrogen bases. Nitrogen bases are chemical compounds in which carbon, hydrogen, oxygen, and nitrogen atoms are arranged in rings. Four nitrogen bases occur in DNA: adenine (A), cytosine (C), guanine (G), and thymine (T).
The way in which nitrogen bases are arranged along a DNA molecule represents a kind of genetic code for the cell in which the molecule occurs. For example, the sequence of nitrogen bases T-T-C tells a cell that it should make the amino acid known as lysine. The sequence C-C-G, on the other hand, instructs the cell to make the amino acid glycine.
A very long chain (tens of thousands of atoms long) of nitrogen bases tells a cell, therefore, what amino acids to make and in what sequence to arrange those amino acids. A very long chain of amino acids arranged in a particular sequence, however, is what we know of as a protein. The specific sequence of nitrogen bases, then, tells a cell what kind of protein it should be making.
Furthermore, the instructions stored in a DNA molecule can easily be passed on from generation to generation. When a cell divides (reproduces), the DNA within it also divides. Each DNA molecule separates into two identical parts. Each of the two parts then makes a copy of itself. Where once only one DNA molecule existed, now two identical copies of the molecule exist. That process is repeated over and over again, every time a cell divides.
This discovery gave a chemical meaning to the term gene. According to our current understanding, a specific arrangement of nitrogen bases forms a code, or set of instructions, for a cell to make a specific protein. The protein might be the protein needed to make red hair, blue eyes, or wrinkled skin (to simplify the possibilities). The sequence of bases, then, holds the code for some genetic trait.
The Crick-Watson discovery opened up unlimited possibilities for biologists. If genes are chemical compounds, then they can be manipulated just as any other kind of chemical compound can be manipulated. Since DNA molecules are very large and complex, the actual task of manipulation may be difficult. However, the principles involved in working with DNA molecule genes is no different than the research principles with which all chemists are familiar.
For example, chemists know how to cut molecules apart and put them back together again. When these procedures are used with DNA molecules, the process is known as gene splicing. Gene splicing is a process that takes place naturally all the time in cells. In the process of division or repair, cells routinely have to take genes apart, rearrange their components, and put them back together again.
Scientists have discovered that cells contain certain kinds of enzymes that take DNA molecules apart and put them back together again. Endonucleases, for example, are enzymes that cut a DNA molecule at some given location. Exonucleases are enzymes that remove one nitrogen base unit at a time. Ligases are enzymes that join two DNA segments together.
It should be obvious that enzymes such as these can be used by scientists as submicroscopic scissors and glue with which one or more DNA molecules can be cut apart, rearranged, and the put back together again.
Genetic engineering requires three elements: the gene to be transferred, a host cell into which the gene is inserted, and a vector to bring about the transfer. Suppose, for example, that one wishes to insert the gene for making insulin into a bacterial cell. Insulin is a naturally occurring protein made by cells in the pancreas in humans and other mammals. It controls the breakdown of complex carbohydrates in the blood to glucose. People whose bodies have lost the ability to make insulin become diabetic.
The first step in the genetic engineering procedure is to obtain a copy of the insulin gene. This copy can be obtained from a natural source
Phototake
(from the DNA in a pancreas, for example), or it can be manufactured in a laboratory.
The second step in the process is to insert the insulin gene into the vector. The term vector means any organism that will carry the gene from one place to another. The most common vector used in genetic engineering is a circular form of DNA known as a plasmid. Endonucleases are used to cut the plasmid molecule open at almost any point chosen by the scientist. Once the plasmid has been cut open, it is mixed with the insulin gene and a ligase enzyme. The goal is to make sure that the insulin gene attaches itself to the plasmid before the plasmid is reclosed.
The hybrid plasmid now contains the gene whose product (insulin) is desired. It can be inserted into the host cell, where it begins to function just like all the other genes that make up the cell. In this case, however, in addition to normal bacterial functions, the host cell also is producing insulin, as directed by the inserted gene.
Notice that the process described here involves nothing more in concept than taking DNA molecules apart and recombining them in a different arrangement. For that reason, the process also is referred to as recombinant DNA (rDNA) research.
The possible applications of genetic engineering are virtually limitless. For example, rDNA methods now enable scientists to produce a number of products that were previously available only in limited quantities. Until the 1980s, for example, the only source of insulin available to diabetics was from animals slaughtered for meat and other purposes. The supply was never large enough to provide a sufficient amount of affordable insulin for everyone who needed insulin. In 1982, however, the U.S. Food and Drug Administration approved insulin produced by genetically altered organisms, the first such product to become available.
Since 1982, the number of additional products produced by rDNA techniques has greatly expanded. Among these products are human growth hormone (for children whose growth is insufficient because of genetic problems), alpha interferon (for the treatment of diseases), interleukin-2 (for the treatment of cancer), factor VIII (needed by hemophiliacs for blood clotting), erythropoietin (for the treatment of anemia), tumor necrosis factor (for the treatment of tumors), and tissue plasminogen activator (used to dissolve blood clots).
Genetic engineering also promises a revolution in agriculture. Recombinant DNA techniques enable scientists to produce plants that are resistant to herbicides and freezing temperatures, that will take longer to ripen, and that will manufacture a resistance to pests, among other characteristics.
Today, scientists have tested more than two dozen kinds of plants engineered to have special properties such as these. As with other aspects of genetic engineering, however, these advances have been controversial. The development of herbicide-resistant plants, for example, means that farmers are likely to use still larger quantities of herbicides. This trend is not a particularly desirable one, according to some critics. How sure can we be, others ask, about the risk to the environment posed by the introduction of "unnatural," engineered plants?
The science and art of animal breeding also are likely to be revolutionized by genetic engineering. For example, scientists have discovered that a gene in domestic cows is responsible for the production of milk. Genetic engineering makes it possible to extract that gene from cows who produce large volumes of milk or to manufacture that gene in the laboratory. The gene can then be inserted into other cows whose milk production may increase by dramatic amounts because of the presence of the new gene.
One of the most exciting potential applications of genetic engineering involves the treatment of human genetic disorders. Medical scientists know of about 3,000 disorders that arise because of errors in an individual's DNA. Conditions such as sickle-cell anemia, Tay-Sachs disease, Duchenne muscular dystrophy, Huntington's chorea, cystic fibrosis, and Lesch-Nyhan syndrome result from the loss, mistaken insertion, or change of a single nitrogen base in a DNA molecule. Genetic engineering enables scientists to provide individuals lacking a particular gene with correct copies of that gene. If and when the correct gene begins functioning, the genetic disorder may be cured. This procedure is known as human gene therapy (HGT).
The first approved trials of HGT with human patients began in the 1980s. One of the most promising sets of experiments involved a condition known as severe combined immune deficiency (SCID). Individuals with SCID have no immune systems. Exposure to microorganisms that would be harmless to the vast majority of people will result in diseases that can cause death. Untreated infants born with SCID who are not kept in a sterile bubble become ill within months and die before their first birthday.
In 1990, a research team at the National Institutes of Health (NIH) attempted HGT on a four-year-old SCID patient. The patient received about one billion cells containing a genetically engineered copy of the gene that his body lacked. Another instance of HGT was a procedure, approved in 1993 by NIH, to introduce normal genes into the airways of cystic fibrosis patients. By the end of the 1990s, according to the NIH, more than 390 gene therapy studies had been initiated. These studies involved more than 4,000 people and more than a dozen medical conditions.
In 2000, doctors in France claimed they had used HGT to treat three babies who suffered from SCID. Just ten months after being treated, the babies exhibited normal immune systems. This marked the first time that HGT had unequivocally succeeded.
Controversy remains. Human gene therapy is the source of great controversy among scientists and nonscientists alike. Few individuals maintain that the HGT should not be used. If we could wipe out sickle cell anemia, most agree, we should certainly make the effort. But HGT raises other concerns. If scientists can cure genetic disorders, they can also design individuals in accordance with the cultural and intellectual fashions of the day. Will humans know when to say "enough" to the changes that can be made with HGT?
Photo Researchers, Inc.
Despite recent successes, most results in HGT since the first experiment was conducted in 1990 have been largely disappointing. And in 1999, research into HGT was dealt a blow when an eighteen-year-old from Tucson, Arizona, died in an experiment at the University of Pennsylvania. The young man, who suffered from a metabolic disorder, had volunteered for an experiment to test gene therapy for babies with a fatal form of that disease. Citing the spirit of this young man, researchers remain optimistic, vowing to continue work into the possible lifesaving opportunities offered by HGT.
The commercial potential of genetically engineered products was not lost on entrepreneurs in the 1970s. A few individuals believed that the impact of rDNA on American technology would be comparable to that of computers in the 1950s. In many cases, the first genetic engineering firms were founded by scientists involved in fundamental research. The American biologist Herbert Boyer, for example, teamed up with the venture capitalist Robert Swanson in 1976 to form Genentech (Genetic Engineering Technology). Other early firms like Cetus, Biogen, and Genex were formed similarly through the collaboration of scientists and businesspeople.
The structure of genetic engineering (biotechnology) firms has, in fact, long been a source of controversy. Many observers have questioned the right of a scientist to make a personal profit by running companies that benefit from research that had been carried out at publicly funded universities. The early 1990s saw the creation of formalized working relations between universities, individual researchers, and the corporations founded by these individuals. Despite these arrangements, however, many ethical issues remain unresolved.
Follow this link:
Genetic Engineering - humans, body, used, process, plants ...
Posted in Human Genetic Engineering
Comments Off on Genetic Engineering – humans, body, used, process, plants …
Genetic Engineering In Humans
Posted: at 11:47 pm
Human genetic engineering is one of the most controversial aspects of a science, which is itself highly controversial, and it is still very much in its infancy. There have been a few isolated cases where an illness has been successfully cured by the use of genetic therapy, but there have also been other cases where patients have contracted diseases such as leukemia through experimentation with this type of therapy. At this stage it is impossible to say exactly what the future will hold, or exactly what the consequences of these developments will be.
So far, the only successes which the method has are in treating conditions relating to the human immune system. This is an obvious application of the technology, as the condition is caused purely by genetic factors. By replacing a gene which gives the patient a proclivity towards the disease with a healthy one a cure can be effected. This is more than just theory, as the numbers of cases where this has been successfully carried out is now into double figures, and is constantly increasing. The challenge lies in overcoming the potentially catastrophic side effects which can occur if the treatment does not work.
One of the most controversial of all applications of this technology is in allowing infertile mothers to conceive. This is done by using the eggs from a different mother, leaving the child with the genetic blueprint inherited from three people. This will then be passed on through future generations, leading to untold potential complications. It is still far too early to judge the potential consequences of the use of this type of genetic technology, but if there are any negative side effects they are likely to be far reaching and extremely damaging.
There have been many arguments put forward concerning human genetic engineering, some strongly in favor and some equally strongly against. The potential is there for diseases caused by genetics to be eliminated completely, and this is there area in which fewest dissenting voices will be heard. The use of genetics purely to overcome fertility is far more controversial, especially when you consider the permanent effect that this has on all future generations of that family. There are also many dissenters against the possibility of parents deciding features of their children using an advanced form of this technology, which cannot be used yet but which may be perfectly possible in the future.
If this technology is left unchecked it will definitely have far reaching consequences. There is no doubt that wealthy families would take advantage of such technology to try to give their children every advantage in their future life, and there could be several possible outcomes of this. One would be a rise in productivity and creativity which would penetrate through society, raising the standard of society for everyone and creating more opportunities. It is also possible that poor families who could not afford this technology would be left even further adrift, leading to sharp increases in crime rates, social disorder, and economic chaos.
Even though strong opinions are held on both sides of the argument, the truth is that it is far too early to know for sure exactly what is involved with human genetic engineering. There are some philosophical and moral arguments which will prove exceedingly difficult to resolve one way or another, but there are potential consequences which cannot possibly be known until more research has been carried out. The arguments over this technology are certain to rage for a great many years to come, and it is unlikely there will ever be universal agreement on human genetic engineering.
View original post here:
Posted in Human Genetic Engineering
Comments Off on Genetic Engineering In Humans
Human Nature on Collision Course with Genetic Engineering …
Posted: at 11:47 pm
Human Nature on Collision Course with Genetic Engineering
Human genetic engineering could be the next major battleground for the global conservation movement, according to a series of reports in the latest issue of World Watch magazine, published by the Worldwatch Institute, a Washington, D.C.-based research organization. While previous struggles have involved protecting ecosystems and human societies from the unpredicted consequences of new technologies, this fight over high-risk applications of human genetic engineering is a struggle over who will decide what it means to be human.
Many countries have already banned reproductive cloning, and the U.N. is working on a global treaty to ban it, but even more powerful and much more dangerous are the related technologies to modify the genes we pass on to our children, says Ed Ayres, Editor of World Watch magazine. The contributors to this special issue call on the U.N. and national governments to ban the technology known as inheritable genetic modification.
Many uses of human genetic technology could be beneficial to society, but as political scientist Francis Fukuyama writes in the magazine, our understanding of the relationship between our genes and whatever improvements we might seek for our children (and their descendants) is dangerously deficient. Fukuyama warns that the victim of a failed experiment will not be an ecosystem, but a human child whose parents, seeking to give her greater intelligence, will saddle her with a greater propensity for cancer, or prolonged debility in old age, or some other completely unanticipated side effect that may emerge only after the experimenters have passed from the scene.
Human genetic engineering has ramifications that reach far beyond the life of a single child. Several contributors highlight the disastrous results of the last serious effort to engineer genetic perfection. In the early part of the 20th century, scientists and politicians in the United States relied on the alleged science of eugenics to justify the forced sterilization of tens of thousands of people who were judged to be feebleminded, mentally defective, or epileptics. Hitler passed his own sterilization law soon after taking office in 1933, heading down the path toward the Holocaust. The U.S. biotechnology industry-which dominates the global industry-has become an increasingly powerful economic and political force, with revenues growing fivefold between 1989 ($5 billion) and 2000 ($25 billion). Aided by the equally rapid revolution in computing, laboratories that once took two months to sequence 150 nucleotides can now process over 30 million in a day, and at a small fraction of the earlier cost. The number of patents pending for human DNA sequences has gone from 4,000 in 1991, to 500,000 in 1998, to several million today.
We are publishing this special issue because we dont want to lose the opportunity to decide openly and democratically how this rapidly developing technology is used, says Ayres. This isnt a fight about saving whales, or the last rain forests, or even the health of people living today. The question is whether we can save ourselves from ourselves, to know and respect what we do not know, and to put the breaks on potentially dangerous forms of human genetic engineering.
Excerpts from the authors of the Beyond Cloning issue of World Watch
About World Watch magazine: This bimonthly magazine is published by the Worldwatch Institute, an independent research organization, based in Washington, DC. Launched in 1988, the magazine has won the Alternative Press Award for investigative journalism, the Project Censored Award, and a number of Utne Reader awards. Recent editions have featured articles on the imminent disappearance of more than half of the worlds languages, airport sprawl, and the rapid growth of organic farming. Please visit: http://www.worldwatch.org/mag/.
The Worldwatch Institute is an independent research organization that works for an environmentally sustainable and socially just society, in which the needs of all people are met without threatening the health of the natural environment or the well-being of future generations. By providing compelling, accessible, and fact-based analysis of critical global issues, Worldwatch informs people around the world about the complex interactions between people, nature, and economies. Worldwatch focuses on the underlying causes of and practical solutions to the worlds problems, in order to inspire people to demand new policies, investment patterns, and lifestyle choices. For more information, visit: http://www.worldwatch.org.
Disclaimer: Please note that the statement by eight leaders of environmental NGOs, which appears on page 25 of the magazine, represents the views of the individuals quoted, not necessarily of the organizations they lead.
Follow this link:
Human Nature on Collision Course with Genetic Engineering ...
Posted in Human Genetic Engineering
Comments Off on Human Nature on Collision Course with Genetic Engineering …
NATO Chief: Too Early to Say If Georgia Joins NATO
Posted: at 11:46 pm
NATO Secretary General Jens Stoltenberg said on a visit Thursday to Georgia that it is too early to tell whether the former Soviet republic will be invited to take the final step toward NATO membership.
NATO members voted in 2008 to accept Georgia as a member, but since then the South Caucasus nation has denied been entry into the Membership Action Plan, the last condition for membership.
NATO says Georgia must strengthen its institutions, step up justice reforms and fully respect the rule of law before it is accepted into the action plan. Tbilisi, however, claims that NATO is dragging its heels because of the frozen conflict in the breakaway republic of South Ossetia.
Speaking at the opening of a joint NATO-Georgia training center, Stoltenberg said Georgia already has "the necessary tools to continue to move toward membership."
Georgian Prime Minister Irakli Garibashvili said the training facility would "in no way be directed against any of the neighboring countries," an apparent attempt to assuage Russia's fears about a NATO presence close to its border. Russia and Georgia fought a five-day war over South Ossetia in 2008.
Moscow reacted angrily to the ceremony in Georgia, saying that the NATO presence would tip the balance in the region.
"We consider this move as a continuation of the provocative policy of the alliance aimed at expanding its geopolitical influence," Russian Foreign Minister spokeswoman Maria Zakharova told reporters in Moscow. "Placing this NATO military facility in Georgia will become a substantial destabilizing factor for security in the region."
Nataliya Vasilyeva contributed to this report from Moscow.
Posted in NATO
Comments Off on NATO Chief: Too Early to Say If Georgia Joins NATO
2 NATO soldiers killed in attack in Afghanistan – CNN.com
Posted: at 11:44 am
Story highlights
NATO service members fired back, killing the attackers, the organization's Resolute Support Mission in Afghanistan said in a statement.
It didn't disclose the identities of the service members who were killed, saying that would be left to the relevant national authorities.
Afghan and NATO officials are still looking into the circumstances of the firefight, which took place early Wednesday at an Afghan security forces compound in the southern province of Helmand, the Resolute Support statement said.
It wasn't immediately clear if the attackers were members of the Afghan security forces or had obtained the uniforms by other means.
The Resolute Support Mission, which focuses on training and support of Afghan forces, replaced NATO's formal combat mission at the end of last year.
As of the end of May, it consisted of more than 13,000 troops from 40 different nations. The United States is the largest single contributor, with more than 6,000 service members.
Attacks against NATO's presence in the country are frequent.
Three American contractors with the mission were among at least a dozen people killed in a suicide bombing of a convoy in Kabul, the capital, on Saturday.
Earlier this month, an attack on a NATO coalition base in Kabul killed at least one American, a defense official told CNN.
CNN's Masoud Popalzai reported from Kabul, and Jethro Mullen wrote from Hong Kong.
Go here to read the rest:
2 NATO soldiers killed in attack in Afghanistan - CNN.com
Posted in NATO
Comments Off on 2 NATO soldiers killed in attack in Afghanistan – CNN.com
Court Rules Illegal Aliens Have Second Amendment Rights …
Posted: at 11:44 am
A recent decision by theU.S. Seventh Circuit Court of Appeals that says illegalalienswhat the left likes to call undocumented immigrantsenjoy a Second Amendment right to bear arms, even if their presence in this nation is criminal.
In the case of a Milwaukee man deported over a single .22 caliber cartridge, a federal appeals court ruled last week that even unlawful immigrants can be part of the public that enjoys a Second Amendment right to keep a gun for self defense.
The U.S. 7th Circuit Court of Appeas said even undocumented immigrants can be part of the people protected by the Bill of Rights, though it upheld the mans conviction on a specific law that prohibits most such persons from having guns.
It is now clear that the Second Amendment right to bear arms is no second-class entitlement, (and) we see no principled way to carve out the Second Amendment and say that the unauthorized (or maybe all noncitizens) are excluded, Judge Diane Wood wrote for a panel that included judges Richard Easterbrook and Joel Flaum.
No language in the Amendment supports such a conclusion, nor, as we have said, does a broader consideration of the Bill of Rights.
Because four other federal circuit courts have come to the opposite conclusion, legal commentators were quick to suggest the issue of whether undocumented immigrants have Second Amendment rights could now be headed for the U.S. Supreme Court.
While rejecting the idea that undocumented immigrants could never have any rights under the Second Amendment, Wood noted that even for citizens, those rights are not unlimited. She found that a federal law tailored to keep guns out of the hands of undocumented immigrants like gun restrictions imposed on felons and those convicted of domestic violence was constitutional, and upheld the conviction on those grounds.
My basic, over-riding belief on the Second Amendment is that any case involving the right to keep and bear arms should be held to the legal standard of strict scrutiny, and that all law-abiding citizens and legal resident aliens should have the right to keep and bear arms.
This case, however, is stating that criminals who arent citizens nor legal resident aliens have Second Amendment rights and Im having a hard problem with that. Im apparently not alone, as the Fourth, Fifth, and Eighth Circuit court arent buying the argument, either. The split among the courts suggests that the basic issue will head to the U.S. Supreme court at some point.
Something that makes me even more leery about this case is that the progressives at Think Progress gleefully predict that if the Seventh Circuits views hold, they could use it to win even more rights for illegal aliens. In specific, theyre hoping these illegals will get expanded First, Fourth, and Fourteenth Amendment protections if United States vs. Meza-Rodriguez holds. Put another way, theyre hoping this Second Amendment case will turn into an anchor baby that makes it more difficult to send criminal aliens back home.
Call me a butter if you want, but I dont think for a second that the Founding Fathers would support the concept of granting criminal invaders the same legal status as legal immigrants, legal resident aliens, and citizens. Lets hope that when this case makes it to the Supreme Court that the justices with the Fourth, Fifth, and Eighth circuit courts.
See original here:
Court Rules Illegal Aliens Have Second Amendment Rights ...
Posted in Second Amendment
Comments Off on Court Rules Illegal Aliens Have Second Amendment Rights …
First Amendment news, articles and information:
Posted: at 11:43 am
TV.NaturalNews.com is a free video website featuring thousands of videos on holistic health, nutrition, fitness, recipes, natural remedies and much more.
CounterThink Cartoons are free to view and download. They cover topics like health, environment and freedom.
The Consumer Wellness Center is a non-profit organization offering nutrition education grants to programs that help children and expectant mothers around the world.
Food Investigations is a series of mini-documentaries exposing the truth about dangerous ingredients in the food supply.
Webseed.com offers alternative health programs, documentaries and more.
The Honest Food Guide is a free, downloadable public health and nutrition chart that dares to tell the truth about what foods we should really be eating.
HealingFoodReference.com offers a free online reference database of healing foods, phytonutrients and plant-based medicines that prevent or treat diseases and health conditions.
HerbReference.com is a free, online reference library that lists medicinal herbs and their health benefits.
NutrientReference.com is a free online reference database of phytonutrients (natural medicines found in foods) and their health benefits. Lists diseases, foods, herbs and more.
Posted in First Amendment
Comments Off on First Amendment news, articles and information: