Tuesday, November 23, 2010

WizArmor™Avatar - Cyber Bodyguard for Youth Internet Computer Security - Unleashed on Internet

.


Using fascinating new stealth technologies, algorithms never seen before and incredible futuristic cloning techniques, there may be hope for Internet users, especially the unsuspecting youth, from the WizArmor™Avatar cyber security techology.


Modern technology, especially the Internet, has opened a world of opportunity and wonder with incredible learning and skill development opportunities for our Youth.

At the same time, the Internet is unregulated by any government, beyond the control of any nation, cannot be censored for moral or crime prevention purposes. Children are often victimized by the most vicious and sophisticated criminals, hackers and predators in our history.

Our Youth, our Teens and Tweens, face very real but invisible Internet dangers including Predators, Pornography, Crime, Identity Theft, Child Porn, Scams, Sexting and Invasion of Privacy. In fact more and more Youth every day become victims of the "creepo" deviants seeking to entrap and victimize them.

The WizArmor™Avatar incorporates next generation computer security technology featuring unique patented techniques to create a clone of the user system and route all incoming traffic into the clone for testing, thus capturing all known and unknown malware before it can infect the user pc.

Upon identification of the invader the WizArmor™Avatar destroys the clone along with the invader and never allows the user computer to be infected. A new WizArmor™Avatar clone instantaneously replaces the destroyed clone.

The WizArmor™Avatar protects the individual user computer from all known types of malware such as viruses, worms, spyware and other techniques of invisible predators intended seek out and find potential victims without their knowledge.

WizArmor technology takes a new approach. It does not care how the potential offender “looks” – it does not depend on a database of known viruses or worms. Instead, when installed, the system builds a “clone” of your computer. All the potential offenders are directed into that “clone” and tested there. If the “clone“ is harmed – it is destroyed along with the offender and a new “clone” is immediately erected.

All computer users are painfully familiar with the first generation "legacy" security systems purportedly protecting their computers – the endless “patches” and the urgent updating for “newly discovered critical vulnerabilities”. And, of course, “scanning” – the most annoying activity of searching all your files for the known malware that has already infected and is hiding in their computers. We all know that this scanning usually comes at the worst time, ties up our computers for a long period, and usually is hopeless.

The reason for shortcomings in the first generation "legacy" computer security systems is the principle they are based on. These systems can protect only against known to the database offenders. How do these offenders become known to the database? Simple -- by infecting computers. In other words, when a new virus is released it is not known to the database, so it easily gets through all the defenses and infects computer. Then, if somebody figures out what happened, a “patch” is developed, and the virus is added to the database. But it’s too late; a lot of damage has already been done. Needless to say, maintaining the active virus database and developing “patches” is cumbersome and expensive, and the user eventually pays for it.

Is the threat real? On September 17, 2010 Congressman Chris Smith (R-N.J.) told a House subcommittee that stronger efforts need to be made to curb the scourge of child sex-trafficking, which has gained new fuel through the internet.

A 2009 National Report on Domestic Minor Sex Trafficking, America’s Prostituted Children, conducted by Shared Hope International, found an estimated 100,000 U.S. minors are victimized annually with the average age of initial exploitation between 12-13 years old.

The US State Department’s recent annual report on human trafficking estimates that the number of “adults and children in forced labor, bonded labor, and forced prostitution around the world” is 12.3 million.

Identity theft through malware and hacking results in the hijacking of bank, credit card and other personal information then used to victimize Young users and can lead to long term credit and other problems that can plague them for years.

The WizArmor™Avatar is your cyber bodyguard to protect our Youth from all such unknown attacks that infect personal computers. You can even watch the attacks in Real Time while your Avatar seeks out and destroys your enemy. For information please visit our web site at WizArmor.com and discover for yourself how the WizArmor™Avatar can protect our Youth while allowing Parents the knowledge that a powerful invisible Sentinel is always on guard defending our Children from harm.
.
Wiz Enterprises of Virginia today released the first new generation of Internet Computer Security for our Youth, called the WizArmor™Avatar, designed to provide a cyber bodyguard to protect teen and tween users from the multitude of Internet predators seeking young victims on the Internet. Go to WizArmor.com and see.

Friday, November 19, 2010

Think You Had A Bad Day? Check out WGN News

.

The news anchors on a morning show at Chicago's WGN certainly let out their (tongue-in-cheek) sadness and near-rage when a bridge that they had been training a camera on for minutes imploded the second they cut away from it. In fact, they nearly had a comic meltdown, banging their fists on the table, yelling, throwing and even eating the papers on their desks.



.

Cyber Security - Kids in the Internet Age - an Opportunity or Tragedy? Computer Security Risks

.

What a decision for parents, deciding how to let your teens and tweens use the Internet. I mean look at the pressures to give them free rein of the cyber world.

Modern technology, especially the Internet, has opened a world of opportunity and wonder with incredible learning and skill development opportunities for our Youth.


At the same time, the Internet is unregulated by any government, beyond the control of any nation, cannot be censored for moral or crime prevention purposes. Children are often victimized by the most vicious and sophisticated criminals, hackers and predators in our history.

Our Youth, our Teens and Tweens, face very real but invisible Internet dangers including Predators, Pornography, Crime, Identity Theft, Child Porn, Scams, Sexting and Invasion of Privacy. In fact more and more Youth every day become victims of the "creepo" deviants seeking to entrap and victimize them.




There are thousands of predator sites that use spam, viruses and malware to gain secret access to unsuspecting youth and they are masters at appealing to the lonely, outcast, curious, thrill seeking and just plain lack of common sense attitudes that may prevail when kids take to the cyber highways.

Most kids have no idea they have even become the victims of these cyber predators until they are too far along to face the embarrassment of admitting to their parents they no longer control their own destiny. If they have the inner strength and courage to ask for help it is there, but hundreds of thousands don't and they could get caught up in a world of darkness that may threaten their very lives.


It is estimated over 300,000 youth in America have gotten caught up in child prostitution because of the need for money for drugs or status symbols, or perhaps because of the need for personal attention. Never underestimate the ability of the professional predators to identify the weakness in kids and exploit it to their advantage.

Identity theft through bank, credit card or cell phone records that can be hacked can also cause severe financial distress and may even impact on our kids ability to get into college. And the unlimited and uncensored pornography rampant on the Internet is a big draw for those just coming of age and merely curious.


In addition to the silent and invisible threat on the Internet there is a second, almost as menacing a danger which will test the maturity of your young user, the social sites and their overpowering appeal to any kid who wants to be part of the Now generation. With texting and cell phone apps, applications to the older generation, kids can be wired into the Net 24-7.

We can ill afford to rely on the protection of current computer security systems to protect our youth and long ago the cyber thieves learned how to compromise the old security and parental controls of the current legacy security systems.


Every day there are headlines in cyber security telling of the hacking of files and security breaches in the most expensive, heavily protected systems in the world from banks and credit cards to the National Security sites of our top secret defense and intelligence agencies. If the top secret sites with the best possible security can't keep out the cyber thieves, what chance do our children have to be protected?

Internet use does open up untold wealth in the form of knowledge and learning to our youth. But there is risk involved - we must protected them from the harm on the Internet as well.


There are new generation security systems coming to the market that are designed to meet the needs of the future and the time is long overdue for security systems designed to protect us and our kids today and far into the future.

Using fascinating new technologies to enhance the stealth or invisible appearance of your records and personal information, using algorithms never before in existence and incredible cloning techniques that may only be found in the most technologically advanced intelligence and defense security systems, there is hope for Internet users, especially the unsuspecting youth who have become obsessed with the Internet.


We hope to be able to tell you about these exciting new technological breakthroughs any day now, as soon as the system is available to protect our youth. There are too many hypothetical solutions to our problems and not enough real ones. Too many are discussed in future terms when the problem is immediate.

Our children need effective help now. They need to be protected from the bad guys and their evil ways today. When we report on a breakthrough in Internet Security, we won't be reporting on some theoretical technique far into the future, we will report on something you can use now because hundreds of thousands of our youth will never get to experience their future if we don't act fast.


Stay tuned because there is a tsunami of change about to be available that is the result of some of the greatest minds with the most extensive and diverse experience in intelligence and security who have been working as part of an international team for many years to finally give us the security we deserve today to meet the demands of the future.

.

Happy Thanksgiving from TSA

.

And more...


All photos by Craig F. Walker/ The Denver Post









.

Video of the Week -Horse in Car

.


The video was taken by the Potter family of Osage City, Kansas as the family drove north on I-75 between Osage City and Topeka around 2:15 p.m. The Potters were going to Walmart.


.

Thursday, November 18, 2010

Cyber Security - Stuxnet virus could target many industries

.






By LOLITA C. BALDOR, Associated Press Lolita C. Baldor, Associated Press

WASHINGTON – A malicious computer attack that appears to target Iran's nuclear plants can be modified to wreak havoc on industrial control systems around the world, and represents the most dire cyberthreat known to industry, government officials and experts said Wednesday.

They warned that industries are becoming increasingly vulnerable to the so-called Stuxnet worm as they merge networks and computer systems to increase efficiency. The growing danger, said lawmakers, makes it imperative that Congress move on legislation that would expand government controls and set requirements to make systems safer.

The complex code is not only able to infiltrate and take over systems that control manufacturing and other critical operations, but it has even more sophisticated abilities to silently steal sensitive intellectual property data, experts said.

Dean Turner, director of the Global Intelligence Network at Symantec Corp., told the Senate Homeland Security and Governmental Affairs Committee that the "real-world implications of Stuxnet are beyond any threat we have seen in the past."

Analysts and government officials told the senators they remain unable to determine who launched the attack. But the design and performance of the code, and that the bulk of the attacks were in Iran, have fueled speculation that it targeted Iranian nuclear facilities.

Turner said there were 44,000 unique Stuxnet computer infections worldwide through last week, and 1,600 in the United States. Sixty percent of the infections were in Iran, including several employees' laptops at the Bushehr nuclear plant.

Iran has said it believes Stuxnet is part of a Western plot to sabotage its nuclear program, but experts see few signs of major damage at Iranian facilities.

A senior government official warned Wednesday that attackers can use information made public about the Stuxnet worm to develop variations targeting other industries, affecting the production of everything from chemicals to baby formula.

"This code can automatically enter a system, steal the formula for the product you are manufacturing, alter the ingredients being mixed in your product and indicate to the operator and your antivirus software that everything is functioning as expected," said Sean McGurk, acting director of Homeland Security's national cybersecurity operations center.

Stuxnet specifically targets businesses that use Windows operating software and a control system designed by Siemens AG. That combination, said McGurk, is used in many critical sectors, from automobile assembly to mixing products such as chemicals.


Turner added that the code's highly sophisticated structure and techniques also could mean that it is a one-in-a-decade occurrence. The virus is so complex and costly to develop "that a select few attackers would be capable of producing a similar threat," he said.

Experts said governments and industries can do much more to protect critical systems.

Michael Assante, who heads the newly created, not-for-profit National Board of Information Security Examiners, told lawmakers that control systems need to be walled off from other networks to make it harder for hackers to access them. And he encouraged senators to beef up government authorities and consider placing performance requirements and other standards on the industry to curtail unsafe practices and make systems more secure.

"We can no longer ignore known system weaknesses and simply accept current system limitations," he said. "We must admit that our current security strategies are too disjointed and are often, in unintended ways, working against our efforts to address" cybersecurity challenges.

The panel chairman, Sen. Joe Lieberman, I-Conn., said legislation on the matter will be a top priority after lawmakers return in January.
.


Cyber Security - U.S. Warns Of 'Huge' Cyber Threats


.

Departments of Defense and Homeland Security are monitoring Stuxnet worm and China, among other critical infrastructure risks.

By Elizabeth Montalbano , InformationWeek

Officials from the Departments of Defense (DoD) and Homeland Security (DHS) this week warned that the prospect of a cyber attack remains imminent even as their agencies continue to monitor threats to U.S. critical infrastructure.

More Government Insights

Speaking at The Wall Street Journal's CEO Council, Secretary of Defense Robert M. Gates said the future threat of a cyber attack is "huge," while there is a "considerable current threat."

"That's just the reality we all face," he said according to a transcript of his comments.

He said the DoD thinks it has adequately secured the .mil domain but is working to protect U.S. partners in the defense industrial industry so they are shielded.

National Cybersecurity and Communications Integration Center
Gates added that the DoD's recent agreement with the National Security Agency to work together more closely on cybersecurity also should help the federal government protect its websites from intrusion.

His comments came only a day before a report by a congressional commission unveiled that China Telecom diverted traffic for 18 minutes in April from U.S. government sites -- including those from the .mil and .gov domains -- away from normal traffic routing and through servers in China.

While the annual report by the U.S.-China Economic and Security Review Commission said it could not determine what China was doing with the traffic, a report by Northrop Grumman prepared for the same commission last year said that China is likely using the Internet to spy on the U.S. government in preparation for a future cyber attack.

If China isn't enough to worry about, there is also Stuxnet, a complex computer worm, which was discovered in July when it was believed to be targeting Iranian power plants.

The Senate Committee on Homeland Security and Governmental Affairs convened Thursday to discuss how to protect U.S. critical infrastructure in light of Stuxnet.

Testifying before the committee, Sean McGuirk, acting director of the National Cybersecurity and Communications Integration Center at the DHS, said that federal officials have considerable concern about Stuxnet because of the unique nature of the threat it poses.

Stuxnet, unlike other computer worms, is highly complex, containing more than 4,000 functions, which is comparable to the code in some commercial software, he said, according to a transcript of his testimony.


The worm also is difficult to detect because it "uses a variety of previously seen individual cyber attack techniques, tactics, and procedures, automates them, and hides its presence so that the operator and the system have no reason to suspect that any malicious activity is occurring," McGuirk said.

DHS officials also are concerned that the underlying Stuxnet code could be adapted to target a broad range of control systems -- such as the electricity grid and power plants -- in "any number of critical infrastructure sectors," he added.

To combat Stuxnet, the DHS has been analyzing and reporting on the worm since its detection and has briefed dozens of government and industry organizations, as well as advised the control systems industry about how to detect and mitigate an attack

.

Cyber Security - America's Achilles Heel - Threatens People and Corporations

.

For over 15 years I have been writing about the Internet and cyber security, in particular the sorry state of cyber security on the Internet. During that time internet theft, hacking and multi-billion dollar business losses have become the cost of doing business in our modern world.

The dot.com bust of 2000, just ten years ago, demonstrated how the booming Internet was way over-valued by the greed mongers on Wall Street and in less than two years Internet companies lost an astonishing 78% of their valuation sending many an investor in hot Internet stocks to the poor house.

It was the first real sign of the immaturity of the Internet corporate culture. After ten years of progress the business plans and expanded use of the Internet have been apparent, but the evolution of cyber security has been dismal. While processing power and software sophistication has been leaping generations ahead in recent years, computer security through legacy systems, those that have been around for years, remain stuck in first generation technology trying to meet a need far beyond the capabilities of the past.


The Internet, with it's lack of government regulation and no borders, has become the premiere and preferred method of crime in the 21st century extending from no holds barred pornography to forced child prostitution, from stealing music and movies to raiding bank and credit card accounts, from stealing proprietary corporate information to hacking into top secret government files.

So complete is the saturation of crime into the Internet that it reigns supreme in terms of bank, credit card and cell phone theft, pornography and child slavery, prostitution and illegal gambling, theft of music and movies to pedophiles stalking our children. Yet there have been no real innovations in computer security for nearly a decade. Then again, the legacy security providers are making billions of dollars selling virtually obsolete cyber protection so why would they change?

As General Motors and anyone involved long term in technology knows, the minute you rest on your laurels and rely on products of the past to meet future needs you become a technology Neanderthal.  Like GM, you then fall from number one in the world into the throes of bankruptcy.  In the world of cyber security, if you rely on older systems to meet new technological advances you become victims of the cyber criminals who have stayed one step ahead of existing security systems.


Are you or your children safe on the Internet? Of course not. Can you be safe with the right cyber security? Of course not if it is a legacy system because it is like trying to play a digital download on an old cassette recorder. Legacy systems were the first generation security and they are now technically obsolete. But there are new generation security systems coming to the market that are designed to meet your needs of the future, not just the past.

Using fascinating new technologies to enhance the stealth or invisible appearance of your records and personal information, using algorithms never before in existence and incredible cloning techniques that may only be found in the most technologically advanced intelligence and defense security systems, there is hope for internet users, especially the unsuspecting youth who have become obsessed with the Internet.


We have been made aware of impending announcements of historical new achievements in Internet or cyber security that will finally make the protection of computer users the first consideration instead of the last consideration in the evolvement of computer technology. You should watch for these announcements and check them out as it may finally give you the piece of mind that big brother and the cyber thieves may no longer control the Internet as our dependence on the Internet continues to grow at warp speed. There are new ways of protecting your rights and records on the immediate horizon.
.

Antimatter atoms produced and trapped at CERN

.

CERN

Antimatter atoms produced and trapped at CERN

This press release is available in French at end of story.

Geneva, 17 November 2011. The ALPHA experiment at CERN has taken an important step forward in developing techniques to understand one of the Universe's open questions: is there a difference between matter and antimatter? In a paper published in Nature today, the collaboration shows that it has successfully produced and trapped atoms of antihydrogen. This development opens the path to new ways of making detailed measurements of antihydrogen, which will in turn allow scientists to compare matter and antimatter.

Antimatter – or the lack of it – remains one of the biggest mysteries of science. Matter and its counterpart are identical except for opposite charge, and they annihilate when they meet. At the Big Bang, matter and antimatter should have been produced in equal amounts. However, we know that our world is made up of matter: antimatter seems to have disappeared. To find out what has happened to it, scientists employ a range of methods to investigate whether a tiny difference in the properties of matter and antimatter could point towards an explanation.

One of these methods is to take one of the best-known systems in physics, the hydrogen atom, which is made of one proton and one electron, and check whether its antimatter counterpart, antihydrogen, consisting of an antiproton and a positron, behaves in the same way. CERN is the only laboratory in the world with a dedicated low-energy antiproton facility where this research can be carried out.

The antihydrogen programme goes back a long way. In 1995, the first nine atoms of man-made antihydrogen were produced at CERN. Then, in 2002, the ATHENA and ATRAP experiments showed that it was possible to produce antihydrogen in large quantities, opening up the possibility of conducting detailed studies. The new result from ALPHA is the latest step in this journey.

Antihydrogen atoms are produced in a vacuum at CERN, but are nevertheless surrounded by normal matter. Because matter and antimatter annihilate when they meet, the antihydrogen atoms have a very short life expectancy. This can be extended, however, by using strong and complex magnetic fields to trap them and thus prevent them from coming into contact with matter. The ALPHA experiment has shown that it is possible to hold on to atoms of antihydrogen in this way for about a tenth of a second: easily long enough to study them. Of the many thousands of antiatoms the experiment has created, ALPHA's latest paper reports that 38 have been trapped for long enough to study.

"For reasons that no one yet understands, nature ruled out antimatter. It is thus very rewarding, and a bit overwhelming, to look at the ALPHA device and know that it contains stable, neutral atoms of antimatter," said Jeffrey Hangst of Aarhus University, Denmark, spokesman of the ALPHA collaboration. "This inspires us to work that much harder to see if antimatter holds some secret."

In another recent development in CERN's antimatter programme, the ASACUSA experiment has demonstrated a new technique for producing antihydrogen atoms. In a paper soon to appear in Physical Review Letters, the collaboration reports success in producing antihydrogen in a so-called Cusp trap, an essential precursor to making a beam. ASACUSA plans to develop this technique to the point at which beams of sufficient intensity will survive for long enough to be studied.

"With two alternative methods of producing and eventually studying antihydrogen, antimatter will not be able to hide its properties from us much longer," said Yasunori Yamazaki of Japan's RIKEN research centre and a member of the ASACUSA collaboration. "There's still some way to go, but we're very happy to see how well this technique works."

"These are significant steps in antimatter research," said CERN Director General Rolf Heuer, "and an important part of the very broad research programme at CERN."

Full information about the ASACUSA approach will be made available when the paper is published.



By FRANK JORDANS, Associated Press Frank Jordans, Associated Press – Thu Nov 18, 8:03 am ET

GENEVA – Scientists claimed a breakthrough Thursday in solving one of the biggest riddles of physics, successfully trapping the first "anti-atom" in a quest to understand what happened to all the antimatter that has vanished since the Big Bang.

An international team of physicists at the European Organization for Nuclear Research, or CERN, managed to create an atom of anti-hydrogen and then hold onto it for long enough to demonstrate that it can be studied in the lab.

"For us it's a big breakthrough because it means we can take the next step, which is to try to compare matter and antimatter," the team's spokesman, American scientist Jeffrey Hangst, told The Associated Press.

"This field is 20 years old and has been making incremental progress toward exactly this all along the way," he added. "We really think that this was the most difficult step."

For decades, researchers have puzzled over why antimatter seems to have disappeared from the universe.

Theory posits that matter and antimatter were created in equal amounts at the moment of the Big Bang, which spawned the universe some 13.7 billion years ago. But while matter — defined as having mass and taking up space — went on to become the building block of everything that exists, antimatter has all but disappeared except in the lab.

Hangst and his colleagues, who included scientists from Britain, Brazil, Canada, Israel and the United States, trapped 38 anti-hydrogen for about one tenth of a second, according to a paper submitted to the respected science journal Nature.

Since their first success, the team has managed to hold the anti-atoms even longer.

"Unfortunately I can't tell you how long, because we haven't published the number yet," Hangst told the AP. "But I can tell you that it's much, much longer than a tenth of a second. Within human comprehension on a real clock."

Scientists have long been able to create individual particles of antimatter such as anti-protons, anti-neutrons and positrons — the opposite of electrons. Since 2002, they have also managed to lump these particles together to form anti-atoms, but until recently none could be trapped for long enough to study them, because atoms made of antimatter and matter annihilate each other in a burst of energy upon contact.

"It doesn't help if they disappear immediately upon their creation," said Hangst. "So the big goal has been to hold onto them."

Two teams had been competing for that goal at CERN, the world's largest physics lab best known for its $10 billion smasher, the Large Hadron Collider. The collider, built deep under the Swiss-French border, wasn't used for this experiment.

Hangst's ALPHA team got there first, beating the rival ATRAP team led by Harvard physicist Gerald Gabrielse, who nevertheless welcomed the result.

"The atoms that were trapped were not yet trapped very long and in a very usable number, but one has to crawl before you sprint," he told the AP.

Many new techniques painstakingly developed over five years of experimental trial and error preceded the successful capture of anti-hydrogen.

To trap the anti-atoms inside an electromagnetic field and to stop them from annihilating atoms, researchers had to create anti-hydrogen at temperatures less than half a degree above absolute zero.

"Think of it as a marble rolling back and forth in a bowl," said Hangst. "If the marble is rolling too fast (i.e. the anti-atom is too hot) it just goes over the edge."

Next, scientists plan to conduct basic experiments on the anti-atom, such as shining a laser onto it and seeing how it behaves, he said.

"We have a chance to make a really precise comparison between a matter system and an antimatter system," he said, "That's unique, that's never been done. That's where we're headed now."

Hangst downplayed speculation that antimatter might someday be harnessed as a source of energy, or to create a powerful weapon, an idea popularized in Dan Brown's best-selling novel "Angels and Demons."

"It would take longer than the age of the universe to make one gram of antimatter," he said, calling the process "a losing proposition because it takes much more energy to make antimatter than you get out of it."

French translation

Des atomes d'antimatière produits et capturés au CERN

Ce communiqué est disponible en anglais.

Genève, le 17 novembre 2011. L'expérience ALPHA au CERN1 vient de réaliser une avancée importante dans le développement de techniques pour comprendre l'une des énigmes de l'Univers, à savoir, ce qui différencie la matière de l'antimatière. Dans un article publié aujourd'hui dans la revue Nature, la collaboration annonce qu'elle a réussi à produire et à capturer des atomes d'antihydrogène. Cette avancée va ouvrir la voie à de nouvelles méthodes pour réaliser des mesures précises sur l'antihydrogène, et ainsi permettre aux scientifiques de comparer la matière et l'antimatière.

L'antimati̬re Рou plut̫t l'absence d'antimati̬re Рreste l'un des plus grands myst̬res de la science. La mati̬re et l'antimati̬re sont identiques, mais ont une charge oppos̩e. Elles s'annihilent au contact l'une de l'autre. Lors du big bang, mati̬re et antimati̬re devraient avoir ̩t̩ produites en quantit̩ ̩gale. Or, nous savons que notre monde est constitu̩ uniquement de mati̬re : l'antimati̬re semble avoir disparu. Pour d̩couvrir ce qu'il est advenu de l'antimati̬re, les scientifiques utilisent diverses m̩thodes qui ont pour but de d̩terminer si une infime diff̩rence entre les propri̩t̩s de la mati̬re et celles de l'antimati̬re pourrait apporter un d̩but d'explication.

L'une de ces méthodes consiste à prendre l'un des systèmes les mieux connus de la physique, l'atome d'hydrogène, constitué d'un proton et d'un électron, et de vérifier si son homologue dans l'antimatière, l'antihydrogène, constitué d'un antiproton et d'un positon, se comporte de la même manière. Le CERN, avec son installation pour antiprotons de basse énergie, est le seul laboratoire au monde où de telles recherches puissent être menées.

Le programme antihydrogène ne date pas d'hier. En 1995, les neufs premiers atomes d'antihydrogène produits en laboratoire l'ont été au CERN. Puis, en 2002, les expériences ATHENA et ATRAP ont montré qu'il était possible de produire de grandes quantités d'antihydrogène, et ainsi ouvert la voie à la réalisation d'études détaillées. Le nouveau résultat d'ALPHA constitue la plus récente des étapes de ce voyage.

Les atomes d'antihydrogène sont certes produits sous vide au CERN, mais ils sont entourés de matière ordinaire. La matière et l'antimatière s'annihilant au contact l'une de l'autre, ces atomes d'antihydrogène ont une espérance de vie très brève. Celle-ci peut toutefois être allongée à l'aide de champs magnétiques intenses et complexes qui permettent de capturer les atomes d'antihydrogène et ainsi d'empêcher qu'ils entrent en contact avec la matière. L'expérience ALPHA a montré qu'il est possible de conserver de cette manière des atomes d'antihydrogène pendant un dixième de seconde, un laps de temps suffisamment long pour pouvoir les étudier. Sur les milliers d'antiatomes produits par l'expérience ALPHA, 38, selon le dernier résultat, ont été capturés suffisamment longtemps pour être étudiés.

Pour des raisons que l'on ignore encore, la nature a exclu l'antimatière. Il est donc très gratifiant et assez impressionnant de savoir que le dispositif d'ALPHA contient des atomes, neutres et stables, d'antimatière, explique Jeffrey Hangst, de l'Université d'Aarhus (Danemark), et porte-parole de la collaboration ALPHA. Cela nous incite à poursuivre nos efforts pour découvrir les secrets de l'antimatière.

Toujours dans le cadre du programme antimatière du CERN, l'expérience ASACUSA a mis au point récemment une nouvelle technique pour produire des atomes d'antimatière. Dans un article qui paraîtra prochainement dans Physical Review Letters, la collaboration annonce qu'elle a réussi à produire de l'antihydrogène dans un « piège à étranglement », étape préalable indispensable en vue de la production d'un faisceau. ASACUSA envisage de développer cette technique afin de pouvoir disposer de faisceaux d'intensité suffisante et d'une durée de vie assez longue pour être étudiés.

Nous disposons désormais de deux méthodes pour produire et finalement étudier l'antihydrogène ; l'antimatière ne devrait donc pas pouvoir conserver ses secrets encore bien longtemps, estime Yasunori Yamazaki, du centre de recherche japonais RIKEN, et membre de la collaboration ASACUSA. Il reste encore du chemin à parcourir, mais nous sommes ravis de constater que cette technique fonctionne aussi bien.

Ces résultats représentent des avancées importantes pour la recherche sur l'antimatière, a déclaré le Directeur général du CERN, Rolf Heuer, et tiennent une place importante dans le vaste programme de recherches mené au CERN.

.

Is GE censuring MSNBC News Shows against competing Interests? Today T. Boone Pickens got cut off.

.

Perhaps it is a good thing GE has sold NBC to Comcast because it will finally get GE out of the habit of cutting off news show guests on MSNBC who take positions opposed to the GE/NBC party line. For the second time in the past few weeks a guest on MSNBC Morning Joe Show was cut off mid-sentence while making a powerful point that was contrary to GE financial interests.

This time it was energy advocate T. Boone Pickens who has devoted millions of his own dollars and two and a half years to trying to get Congress to wake up to using natural gas to lead the nation on a responsible path to energy independence. GE is the powerful lobby for alternative energy because they want to own the infrastructure for electric autos.


The minute Pickens said natural gas could replace our 18 wheeler fleet of 8 million trucks in just 7 years, and eliminate 50% of the OPEC oil dependence of the US, he was opposing the GE electric view of the future. Pickens gave a very sound argument for the conversion pointing out that in terms of comparable cost for fuel, just $4 of natural gas equaled $22 of oil. At the same time gas was 40% cleaner and there was no refining of natural gas like there is oil.

All of these arguments show that electric cars are still not going to compete on a large scale until well into the future when GE has bet on lobbying congress for huge short term electric infrastructure money. So as Pickens was rattling off a list of short term benefits of natural gas over electric he suddenly was cut off at 7:55 am and when the broadcast returned there was Senator Kerry replacing Pickens and arguing for the carbon tax, investment in infrastructure for electric, and saying the American public must stop looking at huge energy tax increases as tax increases? What in the world is he saying other than spend and tax more and buy GE stock?


Just last November 4 we wrote a story titled "Was Queen Noor Al-Hussein of Jordan Censured by NBC over Middle East Views during MSNBC Morning Joe Appearance?" In her case she was just explaining how the Israelis were undermining the peace process in the Middle East and was cut off by NBC.

Since GE and NBC operate the television networks over publicly licensed airways it would seem NBC and GE might very well be using unfair business practices to censor guests who do not pitch the company party line. When private corporations involved in business heavily dependent on government regulation and control attempt to influence public opinion by cutting off opposition views in mid-sentence, there is a serious problem in our system.

It seems the FCC or FTC should look into these cases of potential censorship to see if the public airways are being unfairly used to promote the special interests of the owners. As for the Morning Joe Show, they should be a lot more courteous to the guests that oppose the GE and NBC party line rather than being used by the corporate interests as a de facto lobbying arm.
.

Wednesday, November 17, 2010

If politicians and news media took an oath of silence things might get fixed

.

If politicians did not have to campaign all the time and if the news media did not have to sell advertising there would be a lot less tension in our nation. Then they would be free to tell us just the truth and we would have a far more honest and hopeful picture of America.


For example, the headlines scream of the battle over extending the Bush tax cuts. What disagreement? They will be extended for all Americans for probably two years. End of controversy. What about the new START treaty with Russia that has been stuck in the Senate? Today the headlines said the GOP Whip declared the treaty dead. Nonsense!


All the politicians know reducing nuclear arms with Russia is a good thing, duh. Insiders also know our nuclear weapons are older than our Space Shuttles which have now flown their last mission because they are obsolete. Our current nuclear weapons need to be replaced with modern weapons using the most advanced technology. Add some money to modernize some of our weapons and the treaty will pass, Russian President Dmitry Medvedev will be a hero, and Prime Minister and soon to be President again Vladimir Vladimirovich Putin will have to wait to become the super-hero of the super-power.


So what about the bitter battle between alternative energy advocates and conventional energy advocates and their demands for a green future and energy independence? The truth is we have to become energy independent from foreign oil producers who manipulate the prices and supply and threaten our national security. We also need to make the most of green activities to reduce waste and reduce dependence on non-renewal energy like oil.

Forget the political fighting and special interest civil war. Forget the doom and gloom forecasts, special reports and movies by the news media of the destruction and chaos from an energy crisis. One day the president and congress will come to their senses and realize both things must happen.


We can have energy independence from the bad guys by exploiting natural gas, from America, and using it to replace 40-50% of our energy demand. At the same time more domestic oil from the Gulf, Alaska and offshore is needed. One goal of natural gas should be to use it in all semi-trailer trucks to replace diesel fuel currently in use. Diesel is from oil so this could reduce total domestic oil consumption by half.

It is true we are the biggest oil consumer in the world using 22 million barrels a year but Canada and Saudi Arabia use more oil per capita. Saudi Arabia uses 33 barrels per capita, Canada 24, the US 22, South Korea 16, Japan 13, Germany and France 11, the UK and Italy 10, and far down the list are China at 2 and India at less than 1 barrel per year per capita.


Imagine that, the two fastest growing and feared economies in the world, China and India, use a fraction of the oil per person as we do. Of course that is not from good energy conservation, it is a result of their much poorer standard of living, minimum wages and lack of commercial choices in much of these two emerging nations. As they evolve their oil consumption will sky rocket and soon enough they will be like us.

Alternative energy can help a little in the areas of electric cars, solar energy and improved conservation materials but contrary to popular myth, neither will help reduce energy use much. Oil savings must be offset by the high cost of electric generation and maintenance of the alternative. Wind turbines will most likely have even higher operating costs.


If global warming was truly a human created environmental disaster these alternatives might help. But then so does natural gas replacing oil reduce carbon emissions since it is much more efficient. However, since there have been at least four previous periods of global warming followed by ice ages, and we are yet to find evidence of gas stations, automobiles, or hair dryers in any of these previous ages, in fact there weren't even any carbon spewing humans alive back then, then we can assume with or without us Mother Nature will have her global warming and cooling cycles to purify the planet.

So, as for the debate over energy policy, combine aggressive energy independence through expanded natural gas use, oil drilling and alternative techniques combined with an energy compact with our neighbors Mexico and Canada, and we can have the best attack on energy independence and alternative energy possible.


The same thing is true with the economy and our entitlement programs which give politicians and news media a real chance to scare us. I mean without a strong economy and protected entitlement programs like Social Security and Medicare neither we when we retire or our kids yet to be born will be safe in the future. Right now if we have a job we wonder for how long and if we don't things don't seem inclined to change any time soon.

Both the media and the politicians are having a field day with scary stories written to make you afraid of the future. Think about it for a minute before embracing their fear tactics. Is there really any Republican or Democrat in congress who is going to get rid of your pension or earned health benefits? Do they really want you to have worse health care? What nonsense!


Whatever it takes to reduce the deficit from 20% of gnp to 3% of gnp will happen. The super rich should pay more by making certain they don't benefit more than the middle class in tax benefits. Today Warren Buffett, one of the richest billionaires in the world, said he was in the highest tax bracket yet only paid 17% taxes because of tax deductions, a lower percent than his secretaries and office workers who paid up to 34%. Warren said there should be a minimum tax paid by the rich and even with the all deductions they should never pay a lower tax rate than the middle class.

So we have a minimum high tax rate for the rich so they pay their fair share. We extend Social Security retirement a couple of years, make all Medicare and Medicaid recipients use alternative health care like traditional Chinese or Native American for annual maintenance and natural treatment. Instead of rewarding you to be sick by giving you more tests, prescription drugs, doctor and hospital visits, you will be rewarded to be well and use preventive maintenance. This is the only way to reduce health care costs while improving results.


Things may be tough, but they are far from bad. We are still the most powerful economic force on Earth with a gross national income of $9.8 trillion a year, while China is at $1.2 trillion and India is less than one half a trillion. Our old friends and allies of Japan $4.5 trillion, Germany $1.9, UK $1.4 and France $1.3 all are bigger than China or India.

There is only one nation on earth too big to fail because the future of every other country on earth is dependent on the United States for their own economic survival. Love us or hate us they still can't survive without us. So cheer up folks, in due time all will be well again. We are the United States of America, the people not the politicians, the industry not the government, the small business not the entitlements, and no one is going to take that away!
.