Tuesday, March 22, 2011

CyberWeapons Deployed On Nuclear Plants

"CyberWeapons"  (Computer Worms)
Deployed on Nuclear Power Plants


Edited May 19, 2011 Reference articles 2 & 3 are pasted
further down this blog.  The other reference material is linked in.


 In the first place, I am very aware that an earthquake and
subsequent tsunami were the cause of the nuclear power
plants problems, in Japan. The issue I am really trying to
raise here is that computer "cyberweapons" have been
deployed against nuclear power plants and and will
probably be deployed again
(1, 2, *3).  Frankly, I think this is a
very bad thing.  Be that by a government (even my own),
a terrorist, or disgruntled employee.

  Recently, a New York Times article was published about
a valve malfunctioning that set a cascading set of circumstances
into motion that caused a hydrogen explosion (BG May 18, 2011).
The article focused on the fact that all of the so called "safe retrofits"
in the USA on the Marc1 nuclear reactors might also be at risk because
this is the same valve that was supposed to correct a problem. A problem
(35 years ago) in
Design Flaws That Caused three GE Scientist To Quit In Protest

   One problem that I have with this (among several) is that it sounds
like the valve had malfunctioned in much the same way it would from
a cyber attack (1, 2, *3) and nobody seems to be even attempting to check out
that "possibility", nor even mentioning it.
  Now if I was ranting that the "Cyberweapon" that was deployed against
a nuclear power plant in Iran and had "gotten loose" and "into the wild"1. while
it was tracked to Japan in July of 2010 (
4) was the cause, I could understand
some people having a problem with what I am saying, if I was saying this
alone was the cause of the disaster in Japan.  And that a "Weather Weapon"
was unleashed to "cover it up". But I am not getting into "weather weapons" nor
"Scaler Weapons" that can cause earthquakes, tsunami's and kill thousands of
birds.

But I can not get my "Tin Foil Hat" to fit well enough right now to try and

say that. Maybe that is because of the "censorship" concerning such
weapons that are considered a "military secret"?

Anyway, the aspect that I really do want to get into is adding such semblance

of balance to the actions of the "military industrial complex" that does control
these various things.  Most certainly the nuclear power part of it, too.  Even
though there is the question of "if" the "powers that be" with the "military
Industrial complex" had such weapons at their disposal, would they use them
to attempt and cover up a nuclear accident that they knew was imminent from
their own cyberweapon ?

To be real specific about this, I am talking about the same military industrial

complex that
President Eisenhower warned us about in his Farewell Address (6).
I mean, even with citing a Presidential warning like that, such a scenario still
sounds like a "nut case conspiracy theory" to the majority of people. So why
would I ever want to go there when I can present viable solutions.



And besides, even if such a thing were true and it could be proved, Amy 
Goodman did a news cast with Democracy Now about how
"Whistleblowing has become Espionage"
 In reference:
Inside Obama's "Orwellian World" Where Whistleblowing Has Become Espionage:
The Case of Thomas Drake  - Democracy Now
https://www.youtube.com/watch?v=Zrl3TMne4Ek&feature=player_embedded

 Additional reference on this topic:>
"Censored Information" regarding "fbi witch hunts" is archived at
http://replay.web.archive.org/20070113205122/http://www.fbiwitchhunt.com/






So a, regardless of such a conspiracy theory being fact or fiction

in a world that must be from "Ripleys Believe It Or Not", every thing is so
out of balance that nobody can deny that there is a problem.  So I have
been attempting to present *editing and researching) legislation for the
mandatory criminal prosecution of individuals for the "reckless operation
of a corporation".  Such "accountability" would cause a set  of circumstances
to go into effect that would actually give some balance to the accountability
and actions of the "military industrial complex"  I have been posting that
research at "American Roulette - Red Collar Crime"
and posted at

http://sites.google.com/site/toxicrevelations/red-collar-crime---american-roulette


End of editing on May 19th, 2011.

---------- ----------


Oh, do I wish this was just another "Tin Hat"
Conspiracy Theory ( 0
).  Vetted reports posted
(1) - TK


Toxic Twitter: Posted

CyberWeapons Deployed On Nuclear Plants 
(Or Dinner with the Donner Party, where R  
The MIC's Table Manners?) http://alturl.com/dusit Re-T

_________________________



The "Stuxnet Worm" MIGHT have been a 
complication at the Fukushima nuclear plant, in Japan
as it was detected in Japan during July 2010 (3, 4).

If not, well there is always "next time"
with another nuclear power plant !
Cyberweapons have been deployed like this since the 1980's (2)
on an ongoing basis (2).

A January 2011 New York Times article calls the 
 "Stuxnet Worm" that was deployed against a nuclear 
plant in Iran "the most sophisticated cyberweapon ever 
deployed".
Read the whole story: New York Times -  
Published: January 15, 2011
Re-posted at the Huffington Post, here.

The "Stuxnet Worm"  was designed to specifically 
attack a nuclear power plant, in Iran. And it 
"got out into the wild".
It did "get loose", ran around China and was going 
around Japan, prior to the earth quake ( 4, 3, 1, video> 5,).

Here is a solid tech report (1) on the "Stuxnet Worm" 
that was deployed on a nuclear plant in Iran 
that also describes the "Operating Procedures"
of the shadowy government agencies responsible(1)
posted in October of 2010.
Documentation here includes a Washington Post 04
newspaper article about the first such "Cyber-
Weapons Program"
(2). It started in the USA during 
1980's. I have pasted the article into this blog,
below (2), with an edit note.

Here is the reference citation:
(2) Titled:
 CIA slipped bugs to Soviets
Memoir recounts Cold War technological sabotage
By David E. Hoffman
The Washington Post  Feb. 27, 2004

Excerpt from the article:

Thomas C. Reed, a former Air Force secretary who was 
serving in the National Security Council at the time, 
describes the episode in "At the Abyss: An Insider's 
History of the Cold War," published in 2004 by Ballantine 
Books. Reed writes that the pipeline explosion was just one
example of "cold-eyed economic warfare" against the Soviet 
Union that the CIA carried out under Director William J. 
Casey during the final years of the Cold War.

 End of excerpt from the Washington Post article.



After some of the documentation about this worm, I have
posted a Youtube video of President Eisenhower's
Farewell Address (6), in which he warned us about the
"Military Industrial Complex"
(6). Or as I call it, "The MIC".

  "The M.I.C." is widely believed to be behind this worm. 
And is also known to have used this CyberWeapon
against a nuclear plant in Iran.  As well as documentation
of other deployments of these types of CyberWeapons (2).

So I do not see this as a matter of "if it was involved", in Japan.
But rather, if it was not this time, it will be at some point.
If this Military Industrial Complex is not "reigned in" from

it's own insanity




The morning news just said that they got the pumps
started at the nuclear power plants in Japan 3-22-2011

With my macular degeneration, I have pasted in vetted
facts as well as I can right now, in a "connect the dots",
fashion.


Google news search terms: 
"Japan Stuxnet Worm in Nuclear Computers"

Information on the Computer Worm that attacks nuclear 
power plants - and the "military Industrial complex"
warning of President Einsenhower 1 minute video link


Just for the record, I have an Associates Degree as an

(Direct Digital Controls and Programmable Logic Controls) 

This Associates Degree and training in these types of 
automated systems are used in these nuclear power plants


Please note the fair use notice at the end of this blog is 
applicable to several of the aticles and videos posted here - TK

 Included is a 1 minute video of President Eisenhower's 
Farewell Address and his warnings about the 
"Military Industrial Complex", with strategies

___________________________________

5
Stuxnet Worm in computers of 
Japan's nuclear facilities ?
by Division by Michael Rivero (about a 7 minute video)


Explained in about seven minutes
http://www.youtube.com/watch?v=b10mGzqY8qA

Tech Information on the "Stuxnet Worm"
Schneier on Security - October 7, 2010
A blog covering security and security technology. 
http://www.schneier.com/blog/archives/2010/10/stuxnet.html
A link to a blog on Cyber-Security that deals specifically  with this "Stuxnet Worm". It is a well written and
informative from October 7, 2010


______________________________

3
    Note! Before you read the main articles below,
read the  comment from the WRH website that 
just posted the Japanese article about the 
"Stuxnet Computer Worm" that was known to be 
loose in Japan and does attack specific computer
controls that are used in the nuclear power plant,
in Japan.

Followed by an article concerning the known deployment 

of such a cyberweapon from the Washington POst
The article is pasted in after the second large red line





Comment from the WRH website that just 
posted the Japanese article

Here is a nightmare scenario for you.




1. Israel and the US create Stuxnet .

2. Stuxnet is deployed to wreck Iran's nuclear power station .

3. But Stuxnet escapes from its intended target and spreads 
across Asia!

4. As the above article documents, Stuxnet was in Japan 
last October, presumably still spreading and intended to 
wreck nuclear power plants.

5. Stuxnet targets the Siemens controller

6. Fukushima uses the Seimens controllers Stuxnet was 
designed to interfere with!


     So now the difficulty the Fukushima nuclear plant operators 
faced in recovering control over their runaway reactors takes 
on a darker significance. Remember that the first problem 
following the quake was that the automated shutdown systems 
failed to operate at some of the reactors, because pumps failed 
and valves would not open even while running on batteries; the 
very sorts of mischief Stuxnet supposedly was designed to cause 
at Iran's power station.

Did we all just get hacked to death by Israel?

Would anyone reading this in Japan please forward to the 
Fukushima managers.

--------------------

-----------                                                                 ----------
4
New cybervirus found in Japan
/ Stuxnet Oct. 5, 2010
designed to attack off-line servers via USB memory sticks
http://www.yomiuri.co.jp/dy/national/T101004003493.htm
 Copy / paste of posting there :>

The Yomiuri Shimbun


Stuxnet, a computer virus designed to attack servers isolated
from the Internet, such as at power plants, has been confirmed
on 63 personal computers in Japan since July, according to
major security firm Symantec Corp.


The virus does not cause any damage online, but once it
enters an industrial system, it can send a certain program
out of control.


Symantec says the virus reaches the servers via USB memory
sticks, and warns against the careless use of such devices.


Systems at power plants, gas stations and water facilities are
not connected to the Internet to protect them from cyber-attacks.


A Symantec engineer who has analyzed the virus said it was
made using advanced technology, and it is highly likely a well-
funded organization, not an individual, produced it. The virus
has spread throughout the globe via the Internet.


After Stuxnet finds its way onto an ordinary computer via the
Internet, it hides there, waiting for a USB memory stick to be
connected to the computer, when it transfers itself to the memory
stick. When the USB device is then connected to a computer l
inked to an isolated server, it can enter the system and take
control of it.


As computers that harbor Stuxnet do not operate strangely,
the virus can be transferred to a memory stick inadvertently.


According to the security company, the virus is designed to
target a German-made program often used in systems managing
water, gas and oil pipelines. The program is used at public utilities
around the world, including in Japan.


The virus could cause such systems to act erratically, and it
could take months to restore them to normal.


The 63 infected computers found in Japan were likely infected
sometime after June.


According to the company, about 60 percent of the computers
that have been infected with the virus were discovered in Iran.
Since September, about 30,000 computers there have been
found to be infected with the virus. The country's Industry and
Mines Ministry has called the virus an electronic act of war.


Some computers at the Iranian Bushehr nuclear power plant,
which is scheduled to begin operation in October, have been
infected with the virus.


A supervisor at the plant said the virus has not damaged the
facility's main computer system and would not affect its planned
opening.


In Japan, no public utilities have been affected by the virus.
Nevertheless, the Cabinet Office's National Information
Security Center has urged electric power companies to
exercise extreme care when using USB devices, and to
scan any programs that may have been tampered with.


____________________________________



____________________________________


(2)
CIA slipped bugs to Soviets  
Memoir recounts Cold War technological sabotage
By David E. Hoffman
The Washington Post  Feb. 27, 2004


In January 1982, President Ronald Reagan approved a CIA plan to sabotage
the economy of the Soviet Union through covert transfers of technology that
contained hidden malfunctions, including software that later triggered a huge
explosion in a Siberian natural gas pipeline, according to a new memoir by a
Reagan White House official.

Thomas C. Reed, a former Air Force secretary who was serving in the
National Security Council at the time, describes the episode in "At the
Abyss: An Insider's History of the Cold War
," published in 2004
by Ballantine Books. Reed writes that the pipeline explosion was just one
example of "cold-eyed economic warfare" against the Soviet Union that
the CIA carried out under Director William J. Casey during the final years
of the Cold War.

At the time, the United States was attempting to block Western Europe
from importing Soviet natural gas. There were also signs that the Soviets
were trying to steal a wide variety of Western technology. Then, a KGB
insider revealed the specific shopping list and the CIA slipped the flawed
software to the Soviets in a way they would not detect it.

'Programmed to go haywire'

"In order to disrupt the Soviet gas supply, its hard currency earnings from
the West, and the internal Russian economy, the pipeline software that was
to run the pumps, turbines, and valves was programmed to go haywire, after
a decent interval, to reset pump speeds and valve settings to produce
pressures far beyond those acceptable to pipeline joints and welds," Reed
writes.

"The result was the most monumental non-nuclear explosion and fire
ever seen from space," he recalls, adding that U.S. satellites picked
up the explosion. Reed said in an interview that the blast occurred in
the summer of 1982.
"While there were no physical casualties from the
pipeline explosion, there was significant damage to the Soviet economy,"
he writes. "Its ultimate bankruptcy, not a bloody battle or nuclear
exchange, is what brought the Cold War to an end. In time the Soviets
came to understand that they had been stealing bogus technology, but
now what were they to do? By implication, every cell of the Soviet
leviathan might be infected. They had no way of knowing which
equipment was sound, which was bogus. All was suspect, which
was the intended endgame for the entire operation."


Edit note:

The Chernobyl disaster was a nuclear accident that occurred on April 26 1986
End of edit note.

Reed said he obtained CIA approval to publish details about the operation.
The CIA learned of the full extent of the KGB's pursuit of Western
technology in an intelligence operation known as the Farewell Dossier.
Portions of the operation have been disclosed earlier, including in a
1996 paper in Studies in Intelligence, a CIA journal.
The paper was
written by Gus W. Weiss, an expert on technology and intelligence
who was instrumental in devising the plan to send the flawed materials
and served with Reed on the National Security Council. Weiss died
Nov. 25 (2004) at 72.


According to the Weiss article and Reed's book, the Soviet authorities
in 1970 set up a new KGB section, known as Directorate T, to plumb
Western research and development for badly needed technology.
Directorate T's operating arm to steal the technology was known
as Line X. Its spies were often sprinkled throughout Soviet delegations
to the United States; on one visit to a Boeing plant, "a Soviet guest
applied adhesive to his shoes to obtain metal samples," Weiss recalled
in his article.

Then, at a July 1981 economic summit in Ottawa, President Francois
Mitterrand of France told Reagan that French intelligence had obtained
the services of an agent they dubbed "Farewell," Col. Vladimir
Vetrov,
a 53-year-old engineer who was assigned to evaluate the intelligence
collected by Directorate T.


Vetrov, who Weiss recalled had provided his services for ideological
reasons, photographed and supplied 4,000 documents on the program.
The documents revealed the names of more than 200 Line X officers
around the world and showed how the Soviets were carrying out a
broad-based effort to steal Western technology.

'Caused a storm'

"Reagan expressed great interest in Mitterrand's sensitive revelations
and was grateful for his offer to make the material available to the
U.S. administration," Reed writes. The Farewell Dossier arrived at
the CIA in August 1981.
"It immediately caused a storm," Reed
says in the book. "The files were incredibly explicit. They set
forth the extent of Soviet penetration into U.S. and other
Western laboratories, factories and government agencies."
"Reading the material caused my worst nightmares to come
true," Weiss recalled. The documents showed the Soviets
had stolen valuable data on radar, computers, machine tools
and semiconductors, he wrote. "Our science was supporting
their national defense."

The Farewell Dossier included a shopping list of future Soviet priorities.
In January 1982, Weiss said he proposed to Casey a program to slip the
Soviets technology that would work for a while, then fail. Reed said the
CIA "would add 'extra ingredients' to the software and hardware on the
KGB's shopping list."

"Reagan received the plan enthusiastically," Reed writes. "Casey was
given a go." According to Weiss, "American industry helped in the
preparation of items to be 'marketed' to Line X." Some details about
the flawed technology were reported in Aviation Week and Space
Technology in 1986 and in a 1995 book by Peter Schweizer,
"Victory: The Reagan Administration's Secret Strategy that Hastened
the Collapse of the Soviet Union."

The sabotage of the gas pipeline has not been previously disclosed,
and at the time was a closely guarded secret. When the pipeline
exploded, Reed writes, the first reports caused concern in the
U.S. military and at the White House. "NORAD feared a missile
liftoff from a place where no rockets were known to be based,"
he said, referring to North American Air Defense Command. "Or
perhaps it was the detonation of a small nuclear device." However,
satellites did not pick up any telltale signs of a nuclear explosion.

"Before these conflicting indicators could turn into an international
crisis," he added, "Gus Weiss came down the hall to tell his fellow
NSC staffers not to worry."

The role that Reagan and the United States played in the collapse
of the Soviet Union is still a matter of intense debate. Some argue
that U.S. policy was the key factor -- Reagan's military buildup;
the Strategic Defense Initiative, Reagan's proposed missile defense
system; confronting the Soviets in regional conflicts; and rapid
advances in U.S. high technology. But others say that internal
Soviet factors were more important, including economic decline
and President Mikhail Gorbachev's revolutionary policies of glasnost
and perestroika.

Reed, who served in the National Security Council from January
1982 to June 1983, said the United States and its NATO allies
later "rolled up the entire Line X collection network, both in the
U.S. and overseas." Weiss said "the heart of Soviet technology
collection crumbled and would not recover."

However, Vetrov's espionage was discovered by the KGB,
and he was executed in 1983.

© 2005 The Washington Post Company
© 2005 MSNBC.com
URL: http://www.msnbc.msn.com/id/439400

                                                                          _______

6
President Eisenhower Farewell Address -- 
Military Industrial Complex
A Short (about one minute)  Youtube video of
http://www.youtube.com/watch?v=nUXtyIQjubU&feature=autofb



And a viable course of action to attempt and create 
legislation for mandatory Negligent Homicide 
charges against C.E.O.'s fir the 
"Reckless Operation of a Corporation" .
This could right many of the wrongs in our world
and dramatically contribute to "stopping the 

corporate madness" of the "Military Industrial Complex" 
a.k.a.
Revolvers are for Russians. 
We use products, services BP Oil rigs and 
what ever else, to play a deadly game of 
corporate profits.


TK

-----------                                                      ----------



Part of the Sad History of Humans 
Used as Guinea Pigs
This forwarded message is available online at
http://www.WantToKnow.info/humanguineapigs

If you go to the "Want To Know page" and type these
search terms into their search )Top right)

nsa spying on americans

You will get an astounding amount of well vetted
stories on this topic.

In fact, the search results, make this R&D e-mail
not really needed.  Lifting the censorship is what
is needed.






This is old news to me (1990's). But some 
of you might not know >

Carnivore was a system implemented by the 
Federal Bureau of Investigation that was designed 
to monitor email and electronic communications
implemented in October 1997 and replaced in 
2005 with improved commercial software such 
More at:



_____________________________



Quote from an unknown source;

 "When you are up to you butt with alligators,
it is hard to remember that your main objective was
to drain the swamp"


Because I am aware of how FDA supervisors threatened the welfare
(if not the lives) of Dr Gamal Akabani's wife and son to try and get his
approval of some reports regarding the safety of some devices using
radiation, I believe he would agree with me, on this. He is in the Cc.


The news story about Dr Gamal Akabani and that "situation" is cited
and linked into my blog of March 3, 2011 on FDA Inadequate

Specially, the reference source of that report is:

Feds reopen probe into medical scanner approvals
Inspectors to re-examine allegations that FDA scientists
were pressured to clear devices
Matthew Perrone, Associated Press Health Writer,
On Tuesday September 28, 2010, 4:52 pm EDT
http://finance.yahoo.com/news/Feds-reopen-probe-into-apf-2838405684.html?x=0&.v=


With that basic premise set:

My mission is stop "situations" like what is happening in the Gulf Area
In reference:
http://toxicreverend.blogspot.com/2011/01/bp-gulf-oil-spill-story-that-everybody.html


My God given mission is to set a set of circumstances into motion that will stop it
See:
Alternative Cancer Rx and Political Strategy 4 Change
http://toxicreverend.blogspot.com/2011/02/alternative-cancer-rx-and-political.html


at
http://sites.google.com/site/toxicrevelations/red-collar-crime---american-roulette


Yes it gets complicated. But if this were simple,
we would not have these "situations" >



Toxic Revelations;
Censored information on biological
weapons and the health care industry

Interactions of toxic chemical combination's with
infectious agent combination's, radiation 

(12,*3*)
and nutritional reaction variations of the 
epigenetic responses. These combination's
often multiply and divide as opposed to
adding and subtracting - The Toxic Lotto
Editing, link updating and research in progress at
http://sites.google.com/site/toxicrevelations/

Database lists over 160 illnesses with the toxic chemicals
that can cause them
is now linked in with a review and comments at :>
The Toxic Reverend - Tribe
http://people.tribe.net/toxicreverend
Doctors are given less than four hours of nutritional training
and even less training in toxicology.  It is as though they arre
trained to treat the symptoms rather than address the problem.


Thanks for you kind suggestion, in that other e-mail.
 
Unfortunately with my wounded brain, I failed in stressing
the "American Roulette" aspect when I was a guest on the


Coast To Coast show.
Toxic Effects - Shows - Coast to Coast AM
posted at
http://www.coasttocoastam.com/show/2010/09/18

My bad. "American Roulette" centers around attempting to
develop legislation for mandatory criminal charges against
C.E.O.'s for "Negligent Homicide" with the "Reckless Operation
of a Corporation" that would set a cascading set of events into
motion that would result in fixing many of the things wrong in our
world today.

Including the "Military Industrial Complex"

If you are unaware of what I am ranting about::

Eisenhower Farewell Address -- Military Industrial Complex
Short Youtube video of
http://www.youtube.com/watch?v=nUXtyIQjubU&feature=autofb

The Coast To Coast Show 
"Military Contractors / Belief Systems"
 is now posted at:
http://www.coasttocoastam.com/show/2011/03/20
One of the main topics was the "Military Industrial Complex"
The show is broadcast to over 500 cities in the USA
with 15,000,000+ Listeners



Attempts at "containment" will be futile.
The "Butterfly Effect of Chaos"
is in motion.  It was the only reasonable response
when you consider the "Art of Whistleblowing"
Expect more treachery from the
"The 25 Rules"

In reference: The 25 Rules
Twenty-Five Ways To Suppress Truth: 
The Rules of Disinformation by H. Michael Sweeney

--


-- End Of Forwarded Messages -----

Regards,

Tom Krohmer
Environmental Technologist
Nephew of Jack Krohmer, deceased expert 
regarding the effects of radiation on humans.
No known relationship to Jon Krohmer MD
Chief Medical Officer of Homeland Security
aka
The Toxic Reverend
- Revelations
Less than 6% of 1,400 chemicals that threaten human health are tracked
A 5-2-2000 Congressional Report is linked into blog of 1-23-10
"As an Environmental Technologist I can not imagine a health care
system that could be viable when it ignores toxic chemical exposures
" - TK
http://toxicreverend.blogspot.com/

FYI:
Doctors Without Morals,
Medical professionals, national security and domestic torture
by Leonard Rubenstein & Stephen Xenakis
March 1, 2010 by The New York Times
http://www.commondreams.org/view/2010/03/01-1

Tom Krohmer
aka
Twitter Toxic Reverend
http://twitter.com/toxicreverend
aka
The Toxic Reverend - Myspace
http://www.myspace.com/toxicreverend
aka
Tom Krohmer - Toxic Reverend - Facebook
http://www.facebook.com/toxicreverend
aka
Justice Is Homeless
- Blog
Listing solutions while
Tracking the Money Trail of Homeless Criminalization
http://homelessjustice.blogspot.com
aka
Justice Is Homeless - Myspace
http://www.myspace.com/justiceishomeless
Justice Is Homeless - Twitter
http://twitter.com/justiceishomele

Toxic Revelations;
Censored information on biological weapons and the health care industry
An incomplete version is
Toxic Revelations
Rough draft
http://www.puppstheories.com/tr.html

Toxic Revelations;
Interactions of toxic chemical combination's with
infectious agent combination's, radiation 

(12,*3*)
and nutritional reaction variations of the 
epigenetic responses. These combination's
often multiply and divide as opposed to
adding and subtracting - The Toxic Lotto
Editing, link updating and research in progress at
http://sites.google.com/site/toxicrevelations/

Database lists over 160 illnesses with the toxic chemicals
that can cause them
is now linked in with a review and comments at :>
The Toxic Reverend - Tribe
http://people.tribe.net/toxicreverend
Doctors are given less than four hours of nutritional training
and even less training in toxicology.  It is as though they arre
trained to treat the symptoms rather than address the problem.

Peer Reviewed Medical Journal on Chronic
Illnesses, cancers and Stealth Infections
from Bio-weapons of the non-lethal variety
www.immed.org
Note:
The Gulf War Vets have posted
"Beyond Treason"
http://www.gulfwarvets.com

FAIR USE NOTICE: This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the U.S. Copyright Law. In accordance with Title 17 U.S. C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes.

No comments:

Post a Comment

All comments are moderated by myself.
You can leave a "do not post" comment,
if you want to contact me, put your
contact information into a "do not post" comment. Because myspace has censored access to this blog (and other information) I rarely use the "Toxic Reverend" profile, at myspace. So far, I have not had such problems with Facebook and Twitter and do use them.