Skip to content

Mandatory Vaccinations in NY Upheld by 2nd Cir.

Originally posted on 2012: What's the 'real' truth?:

Thursday, January 08, 2015
Last Update: 8:27 AM PT
Thanks to A. 


(CN) – Requiring the vaccination of all children attending New York public schools does not violate the constitutional rights of their parents, the 2nd Circuit ruled.

     “Plaintiffs argue that a growing body of scientific evidence demonstrates that vaccines cause more harm to society than good, but as Jacobson [v. Massachusetts] made clear, that is a determination for the legislature, not the individual objectors,” the unsigned opinion published Wednesday in Manhattan states.

     Jacobson, a U.S. Supreme Court from 1905, holds that compulsory vaccination does not violate an individual’s due-process rights, given the state’s interest in protecting the population as a whole.

     Dina Check, the plaintiff who challenged the New York law at issue on the basis of her Catholic beliefs, testified that medical treatment should be “strictly by the word of God,” and…

View original 317 more words

Judaism: 12 Painful Truths

Featured Image -- 544

Originally posted on Michael Sherlock Author:

  1. The Torah (First Five Books of Moses), the very pillar of Judaism, was not written by Moses, but by numerous anonymous authors, who contradicted each other’s theology and historical testimony. [1]
  1. The bulk of the Book of Genesis wasn’t written in the 2nd Millennium BCE, as tradition states, but in the post-Exilic Period (6th Century ~ after the Jewish exile in Babylon). [2]
  1. The Book of Genesis contains numerous plagiarized (adopted) myths, all of which find their origins in the more ancient and established empire of Mesopotamia – The Creation, The Garden of Eden, The Fall of Man, The 12 Patriarchs prior to the flood, who all lived extremely long lives, The Flood, the shortening of lifespans after the flood, The Tower of Babel and even Abraham and Sarah’s descent into Egypt (See Descent of Ishtar and Tammuz). This relates to Truth 2, as the Jews were in…

View original 1,675 more words

Which is Worse, Islam or Christianity?

Originally posted on Sharp and Pointed:

Given the spate of near-daily Islamic-fanatic atrocities,  it’s only natural that many people will conclude that Islam is inherently worse than Christianity. But is it? Let’s take a look at some of the worst structures and practices in both Islamic and Christian lands:


Slavery is still practiced in many Islamic nations. The most notorious recent example is the enslavement of thousands of Yazidis by ISIS in Iraq. The Nigerian fundamentalist group Boko Haram is also notorious for its enslavement of its victims.

At the same time, slavery persisted in widespread form in Christian lands until 1888 (Brazil) and in perhaps its most brutal form ever in the most religiously devout part of the United States until 1865. And enslavement of prisoners in the United States is still very widespread, currently involving at minimum hundreds of thousands of prisoners (“paid” a few pennies per hour by for-profit corporations).

There is plenty…

View original 821 more words



More on the Hack.

Originally posted on Krypt3ia:


Well here we are… It’s the beginning of the cyber wars my friends. POTUS came out on stage and said that we would have a “proportionate response” to the hacking of Sony and that in fact the US believes that it was in fact Kim Jong Un who was behind this whole thing. Yup, time to muster the cyber troops and attack their infrastructure!


So yeah, let’s take a step back here and ponder the FBI statement today on colonel mustard in the study with the laptop before we go PEW PEW PEW ok?

FBI Statement:

Update on Sony Investigation

Washington, D.C. December 19, 2014
  • FBI National Press Office(202) 324-3691

Today, the FBI would like to provide an update on the status of our investigation into the cyber attack targeting Sony Pictures Entertainment (SPE). In late November, SPE confirmed that it was the victim of a cyber attack…

View original 2,853 more words

From Wired: US Predator and Reaper drones infected with keylogger virus.



Originally posted on Marc's Security Ramblings:

Exclusive: Computer Virus Hits U.S. Drone Fleet
By Noah Shachtman, Wired Magazine.
October 7, 2011

US Predator and Reaper drones infected with keylogger virus.

A computer virus has infected the cockpits of America’s Predator and Reaper drones, logging pilots’ every keystroke as they remotely fly missions over Afghanistan and other warzones.

The virus, first detected nearly two weeks ago by the military’s Host-Based Security System, has not prevented pilots at Creech Air Force Base in Nevada from flying their missions overseas. Nor have there been any confirmed incidents of classified information being lost or sent to an outside source. But the virus has resisted multiple efforts to remove it from Creech’s computers, network security specialists say. And the infection underscores the ongoing security risks in what has become the U.S. military’s most important weapons system.

“We keep wiping it off, and it keeps coming back,” says a source familiar with the network infection, one of three that told Danger…

View original 788 more words

Why I *still* dont think it’s likely that North Korea hacked Sony.

Originally posted on Marc's Security Ramblings:


So the FBI has come out and said it. North Korea was behind the Sony hack. With some pretty strongly worded rhetoric, they lay out exactly why they feel confident enough to lay the blame for this criminal act at the doorstep of a foreign nation.  Finally, they express their deep concern about how these events unfolded, stating that these events pose “one of the gravest national security dangers to the United States”. Pretty strong stuff. World-cyber-war One here we come.

Let’s take a look at the evidence that led the FBI to this conclusion. (At least the evidence that they were willing to share publicly).

  • Technical analysis of the data deletion malware used in this attack revealed links to other malware that the FBI knows North Korean actors previously developed. For example, there were similarities in specific lines of code, encryption algorithms, data deletion methods, and compromised networks.


View original 1,805 more words

South Korea’s Deadly Robots

Originally posted on Marc's Security Ramblings:

Tensions between South and North Korea are always high with each side striving to gain the upper hand in some way and the constant threat of incursion by one side or the other hangs over the peninsular – As a result the mountains of Seoul are covered with both manned and unmanned defensive positons.

One radical new strategy favoured by South Korea is the development of autonomous robotic defence systems that can be left to guard the DMZ. There are several different types, though most take the form of static sentry guns with autonomous targeting systems that are *hopefully* capable of determining the correct target to obliterate.

DoDAAM’s Super aEgis II

Picture of DoDAMM's Super aEgis 2

From gizmag:

The Super aEgis 2 is an automated gun tower that can find and lock on to a human-sized target in pitch darkness at a distance of up to 1.36 miles (2.2 kilometers). It uses a 35x zoom CCD camera with ‘enhancement feature’…

View original 306 more words


Get every new post delivered to your Inbox.

Join 4,450 other followers