web analytics
Categories
Uncategorized

In This Post-Injection World, Much of The Damage Is So Severe, People Choose Suicide By Jet Engine

stock here: We expect both accidents and suicides to increase via Jet Engines. I think the death would be very rapid, yet it is quite rude to destroy a jet engine rather than find some other way to off yourself.

The Sun seems to be the only one that did actual reporting. The rest are just parrots.

https://www.thesun.ie/news/13061666/sucked-into-engine-amsterdam-schiphol-airport/

https://nypost.com/2024/05/29/world-news/person-sucked-into-planes-engine-killed-at-amsterdam-airport/?lctg=63fea7b6dc3bd84b030f8749

January 2023, Piedmont Airlines, a subsidiary of American Airlines, was fined $15,625 after an investigation found it was responsible for a safety breach that resulted in the death of the mother of three

https://nypost.com/2023/01/25/airport-worker-sucked-into-plane-engine-warned-to-stay-back/

July 2023, this was ruled a suicide

https://nypost.com/2023/06/25/san-antonio-airport-worker-killed-after-being-sucked-into-delta-jet-engine/

Categories
Uncategorized

The Cyber Bill Of Rights

stock here: This deserves it’s own article and here it is:

Cyber Bill of Rights

Preamble

In recognition of the rapid advancements in technology and the increasing reliance on digital platforms, it is imperative to ensure that the rights, privileges, privacy, and security of individuals are protected. This Cyber Bill of Rights establishes fundamental principles to safeguard personal information, prevent unauthorized online storage, and ensure informed consent in digital interactions. This document draws inspiration from the Fourth Amendment of the United States Constitution, which guarantees the right of the people to be secure in their persons, houses, papers, and effects against unreasonable searches and seizures.

Section 1: Right to Privacy in Digital Communications

1.1 Default Non-Storage of Personal Information

All personal information shall be protected from being directed to online storage without explicit, informed consent. The default position shall be non-storage, requiring no action to “opt-out.” Individuals must actively “opt-in” to allow any personal information to be stored online through a multi-step process that ensures complete transparency regarding the risks and benefits involved.

1.2 Informed Consent and Risk Assessment

Before consenting to the storage of personal information online, individuals must be provided with a comprehensive risk assessment. This assessment shall outline the potential dangers of online storage and weigh them against any benefits. The process must ensure that individuals are fully informed and make decisions with a clear understanding of the implications.

1.3 Limitation on Two-Factor Authentication

Two-factor authentication (2FA) shall only be mandated for accessing financial or health-related information. Under no circumstances shall 2FA be used to link an individual’s online actions, thoughts, or comments to their actual identity through methods such as phone number verification unless directly related to financial or health security.

Section 2: Accessibility and Security of Digital Services

2.1 Browser Compatibility and Inclusivity

Digital services, especially those related to financial and health sectors, must be compatible with a broad range of web browsers. This ensures that users are not forced to use specific browsers that may compromise their privacy. Services shall not be limited to browsers developed by companies known for invasive data practices.

2.2 Multi-Platform Functionality

All applications, particularly those storing or handling personal information, must function across various devices, including tablets and workstations. This requirement prevents the monopolization of services on smartphones, which often track users’ locations and activities.

2.3 Liability for Data Breaches

Organizations storing personal information shall bear full responsibility for securing such data. This includes accountability for internal theft. Failure to protect personal data shall result in both civil and criminal liabilities. Personal information shall only be stored when critically necessary, and stringent measures must be taken to safeguard it.

2.4 Penalties for Violations

Strict penalties shall be imposed for violations of this Cyber Bill of Rights, akin to those under Federal Code 18-242, which addresses the deprivation of rights under the color of law. These penalties shall reflect the harm caused or potential harm that could have been caused by breaches of digital privacy and security. The Cyber Bill of Rights shall extend beyond the federal level to all levels of government and non-governmental organizations receiving government funding.

Section 3: Additional Protections

3.1 Right to Anonymity

Individuals shall have the right to remain anonymous in digital interactions unless there is a clear, lawful necessity to reveal their identity. This right ensures that individuals can freely express themselves online without fear of undue surveillance or retribution.

3.2 Protection Against Doxxing

The act of doxxing, or publicly revealing private information about an individual without their consent, shall be strictly prohibited. Violators shall face severe penalties to protect individuals from harassment, threats, and potential physical harm resulting from such actions.

3.3 Restriction on Data Mining and Profiling

Organizations shall be prohibited from mining data and creating detailed profiles of individuals without explicit consent. Any data collection must be transparent, and individuals must be informed of how their data will be used, with the option to refuse such practices.

3.4 Right to Data Portability and Deletion

Individuals shall have the right to request the transfer of their data to another service provider and the deletion of their data from any service without undue delay. This right ensures that individuals maintain control over their personal information and can prevent misuse by digital service providers.

3.5 Right to Encryption and Secure Communication

Individuals shall have the right to use strong encryption tools to protect their communications and personal information from unauthorized access. Service providers must offer end-to-end encryption for messaging and data storage, ensuring that only the intended recipients can access the content.

3.6 Transparency in Algorithmic Decision-Making

Organizations using algorithms to make decisions that affect individuals (such as in hiring, lending, or law enforcement) must provide transparency about how these algorithms function. Individuals have the right to understand how their data is being used and to contest decisions made by automated systems. Organizations must disclose the criteria and logic behind their algorithms, ensuring accountability and fairness.

3.7 Right to Digital Dignity

Individuals shall have the right to digital dignity, which includes the right to request the removal of any content that is harmful, defamatory, or violates their personal dignity from online platforms. Digital service providers must establish clear and efficient processes for individuals to report and remove such content, ensuring a respectful and safe online environment.

Conclusion

The Cyber Bill of Rights is a foundational document that enshrines the principles of privacy, security, and informed consent in the digital age. By establishing these protections, we aim to empower individuals to navigate the digital landscape safely and securely, ensuring their fundamental rights are respected and upheld.

Categories
Uncategorized

Collusion of Big Tech, Big Finance, and Big Gov: A Tell From Online Services

stock here: All the Microsoft products are inherently now designed to spy on you, fully. Even the push for EVERYTHING to be default uploaded to the SECURE “Cloud” is amazing. Maybe I need to create a new Meme, a humans right to not be pushed towards spying and intrusion. An online Bill of Rights. I wonder if AI can run with this? At the bottom is today’s screen capture from one of my insurance companies that is forcing me to use un-secure, spying browsers.

prompt: Create a 3 page Cyber Bill Of Rights for all persons to be secure in their papers (link to constitution, pull the exact language). Basics will be preventing any information from being directed to online storage, and there shall be no need to “Opt Out”. Being out is the default and agreeing to allow some information to be stored online shall be a multi-step process in which the person shall be totally informed about the dangers of online storage, and a risk assessment of the benefits (small) versus the risks (large). There shall be no 2 Factor “authorization” which is not directly linked to financial or health information, in which said authorization would link a persons online actions, thoughts, comments, to the actual person via say their phone number which was linked via a 2 factor confirmation type of event. Those in a broad range of fields, but specifically now mentioning Financial (and this definitely include insurance) or Health shall be required to have their online functions, function on a broad range of browsers, not just the spying browsers from Microsoft. There shall be no “apps” aka computer programs that function only on smart phones, they shall all be required to function on tablets and workstations to avoid the push to have every function of your life be on your cell phone, thus allowing tracking of position and events. Any organization storing personal information, shall be responsible, up to criminal and civil liabilities for their failure to secure the data, up to and including inside stealing of such data. i.e. don’t store any personal information unless there is a critical need, and all these companies and persons must protect it. There shall be strict penalties similar to Federal Code 18-242 which provides penalties that match that harm that has been caused or could have been caused by “Deprivation of rights under the color of law”. The Cyber Bill of Rights shall be broader than 18-242, because it will not just function at the Federal level but at all levels of government and all Non-Governmental Organizations that receive Governmental funding. I would like AI to come up with 4 additional features of protection of individuals rights, privileges, privacy, and security. The doxxing of any individual shall be covered in this Cyber Bill of Rights, with strict penalties as there are many deranged authoritarian types that believe that their actions in attacking or otherwise harming others, is justified by their mistaken sense of righteousness.

Und so it begins………………

Cyber Bill of Rights

Preamble

In recognition of the rapid advancements in technology and the increasing reliance on digital platforms, it is imperative to ensure that the rights, privileges, privacy, and security of individuals are protected. This Cyber Bill of Rights establishes fundamental principles to safeguard personal information, prevent unauthorized online storage, and ensure informed consent in digital interactions. This document draws inspiration from the Fourth Amendment of the United States Constitution, which guarantees the right of the people to be secure in their persons, houses, papers, and effects against unreasonable searches and seizures.

Section 1: Right to Privacy in Digital Communications

1.1 Default Non-Storage of Personal Information

All personal information shall be protected from being directed to online storage without explicit, informed consent. The default position shall be non-storage, requiring no action to “opt-out.” Individuals must actively “opt-in” to allow any personal information to be stored online through a multi-step process that ensures complete transparency regarding the risks and benefits involved.

1.2 Informed Consent and Risk Assessment

Before consenting to the storage of personal information online, individuals must be provided with a comprehensive risk assessment. This assessment shall outline the potential dangers of online storage and weigh them against any benefits. The process must ensure that individuals are fully informed and make decisions with a clear understanding of the implications.

1.3 Limitation on Two-Factor Authentication

Two-factor authentication (2FA) shall only be mandated for accessing financial or health-related information. Under no circumstances shall 2FA be used to link an individual’s online actions, thoughts, or comments to their actual identity through methods such as phone number verification unless directly related to financial or health security.

Section 2: Accessibility and Security of Digital Services

2.1 Browser Compatibility and Inclusivity

Digital services, especially those related to financial and health sectors, must be compatible with a broad range of web browsers. This ensures that users are not forced to use specific browsers that may compromise their privacy. Services shall not be limited to browsers developed by companies known for invasive data practices.

2.2 Multi-Platform Functionality

All applications, particularly those storing or handling personal information, must function across various devices, including tablets and workstations. This requirement prevents the monopolization of services on smartphones, which often track users’ locations and activities.

2.3 Liability for Data Breaches

Organizations storing personal information shall bear full responsibility for securing such data. This includes accountability for internal theft. Failure to protect personal data shall result in both civil and criminal liabilities. Personal information shall only be stored when critically necessary, and stringent measures must be taken to safeguard it.

2.4 Penalties for Violations

Strict penalties shall be imposed for violations of this Cyber Bill of Rights, akin to those under Federal Code 18-242, which addresses the deprivation of rights under the color of law. These penalties shall reflect the harm caused or potential harm that could have been caused by breaches of digital privacy and security. The Cyber Bill of Rights shall extend beyond the federal level to all levels of government and non-governmental organizations receiving government funding.

Section 3: Additional Protections

3.1 Right to Anonymity

Individuals shall have the right to remain anonymous in digital interactions unless there is a clear, lawful necessity to reveal their identity. This right ensures that individuals can freely express themselves online without fear of undue surveillance or retribution.

3.2 Protection Against Doxxing

The act of doxxing, or publicly revealing private information about an individual without their consent, shall be strictly prohibited. Violators shall face severe penalties to protect individuals from harassment, threats, and potential physical harm resulting from such actions.

3.3 Restriction on Data Mining and Profiling

Organizations shall be prohibited from mining data and creating detailed profiles of individuals without explicit consent. Any data collection must be transparent, and individuals must be informed of how their data will be used, with the option to refuse such practices.

3.4 Right to Data Portability and Deletion

Individuals shall have the right to request the transfer of their data to another service provider and the deletion of their data from any service without undue delay. This right ensures that individuals maintain control over their personal information and can prevent misuse by digital service providers.

3.5 Right to Encryption and Secure Communication

Individuals shall have the right to use strong encryption tools to protect their communications and personal information from unauthorized access. Service providers must offer end-to-end encryption for messaging and data storage, ensuring that only the intended recipients can access the content.

3.6 Transparency in Algorithmic Decision-Making

Organizations using algorithms to make decisions that affect individuals (such as in hiring, lending, or law enforcement) must provide transparency about how these algorithms function. Individuals have the right to understand how their data is being used and to contest decisions made by automated systems. Organizations must disclose the criteria and logic behind their algorithms, ensuring accountability and fairness.

3.7 Right to Digital Dignity

Individuals shall have the right to digital dignity, which includes the right to request the removal of any content that is harmful, defamatory, or violates their personal dignity from online platforms. Digital service providers must establish clear and efficient processes for individuals to report and remove such content, ensuring a respectful and safe online environment.

Conclusion

The Cyber Bill of Rights is a foundational document that enshrines the principles of privacy, security, and informed consent in the digital age. By establishing these protections, we aim to empower individuals to navigate the digital landscape safely and securely, ensuring their fundamental rights are respected and upheld.

Categories
Uncategorized

Nimrata Haley, A Product of the Zionist Pyschopaths, Writes “Finish Them” On a Bomb As Tent Refuge is Bombed. Remember, The Intention Is Outrage At All Levels

stock here: Rarely have I hated a female more than Hillary Clinton, but Nimrata has rose to that level. To think that this piece of dung (no insult to dung intended) was ever in a position to run to be president of this once great country, is insulting to the core.

Not intending to add to the outrage, but I think it appropriate to point out the “outrage” of recognizing a “Palestinian State”. The absurdity of this is absurd. Palestine has been a great country with a long history, and in the early 1900’s was a thriving bustling trade center.

Then as part of the J$$ banker agreement to fund the entry of the US into the war in Europe while also fighting the Japanese in the Pacific (HINT it wasn’t 1 World War for the US it was really two, increasing the incredulous entry into a massive war in Europe that somehow the Brits and the French couldn’t handle). The agreement was that if the J$$ bankers funded the war machine, aka the Military Industrial Complex, that a Zionist state would be created in the early Holy Lands. And so they simply inserted “Israel” into the existing Palestinian State.

And now they pretend that anyone agreeing to the legitimacy of the Palestinian state is a horrid person. Outage at the Absurd.

Nimrata uses the Heart symbol in her quest for Genocide of the original owners of the land.

https://www.zerohedge.com/geopolitical/us-made-bombs-used-deadly-strike-rafah-tent-camp

Categories
Uncategorized

As Hollywood Implodes, Trolls in the Comment Section are “Hating on Cruise”

Just an observation.

The hate towards Cruise, wishing for him to die during a stunt, “FAA would immediately pull his license”, Should be punched repeatedly in the face. Extremely average in every way. LOL

They’re really trying to push this guy as the next big thing. So much media of late. I don’t see it sorry.

Tom Cruise is flirting with a Death Wish.” He needs to be more careful, somethings done in jest actually come true!

https://www.foxnews.com/entertainment/tom-cruise-terrified-top-gun-co-star-glen-powell-pretending-nearly-crash-helicopter-epic-prank

Categories
Uncategorized

US Cities, Crime Rates, and Ethnicity of Their Mayors

ChatGPT4o helped pull all this information together in a dozen minutes, which could have taken all day. I’ll try to make the spreadsheet downloadable after I clean it up a bit, and maybe add some information. 14% of the population, but almost 50% of the highest crime cities, why is that?

Categories
Uncategorized

As We Give Tribute and Remembrance to Those Fallen Soldier on this One Day, Memorial Day, Consider The LGBTQ “Community” of Misfits Get a Pride Month, and Their Own Flag

’nuff said, stock out

Categories
Uncategorized

The Ohio Presidential Filing Debacle, It Sure Is Curious, Portends The Last Minute Switcharoo

If you won’t vote for Kamala Harris or big Mike, then you are a racist, xenophobic, misogynist, and fully Deplorable.

Are the Dems so focused on their own machinations and evils that they couldn’t even find the spreadsheet that has all the filing dates?

Or is this just another distraction as they plan to steal your freedom and sovereignty under the “One World Gov is the only thing that can fix the greatest countries USA and Israel.”

Or do they know they got the Commie Governor support in Ohio to get him or someone on the ballot no matter what?

Are they delaying to the last possible minute and beyond in order to perform a switcheroo. Polls show Biden losing ground, and those polls already lie as much as is humanly, AI, and computerly possible.

Did I miss something?

stock out, mooch out.

Categories
Uncategorized

WEF and Gates Advocated a Global Injection Campaign

stock here, this is a good one.

Categories
Uncategorized

RFJ Jr. Nailed How the “Vaccine” Narrative Would Play Out from 98% Effective to 25% Effective, But “You Don’t Die Now”

stock here: RFK jr, gets some thing wrong, very wrong, but he nailed this. In 2020, I was like “there will never be a COVID (SARS-2) vaccine, because for a decade they failed on all the SARs-1 vaccines”.

Sorry this in Linkedin, so you may not be able to view unless you create a fake account. It is odd, because there is more truth being spoken on Linkedin than elsewhere, except maybe Twitter, but on Twitter, it is the whole gamut of everything.

I was wrong on the “vaccine”, I was shocked they rolled this shit out. RFJ jr. saw it clearly going to occur, and how it would fail, and how they would lie as it failed.

Categories
Uncategorized

Mission Accomplished: Now 1 in 5 Children In USA Live in Poverty

Statista, truly a tool of the leftist authoritarians, wants you to pay $199 per month, billed at 6 months each pop.

https://www.statista.com/accounts/pa

Categories
Uncategorized

They Really Want You to Eat Ze Bugs, Wisconsin Now Promotes the Bug Eyed Cicada as “Tree Shrimp”

stock here: Let’s get right to it.

https://dnr.wisconsin.gov/newsroom/release/93651

Here is the recipe, they double dog dare you

https://www.food.com/recipe/a-tasty-treat-of-cicadas-90758

Categories
Uncategorized

Shit Loves to Spin

stock here, coined it I have

The phrase “Shit Loves To Spin” is a humorous and informal statement. In the context of scientific terminology, it doesn’t fit neatly into traditional categories like theory, hypothesis, statement of fact, or corollary. However, it can be best described as a colloquial observation or an informal principle. It humorously conveys the idea that many physical systems tend to involve rotational motion or angular momentum.

Not to make light of this tragedy, and this is the best tornado video ever.

Categories
Uncategorized

Elise Stefanik Files Ethics Complaint Against Juan Merchan, As It Should Be, $93M Raised By His Daughter

Elise Stefanik

@EliseStefanik

I just filed an official judicial complaint with the New York State Commission on Judicial Conduct against Acting Supreme Court Justice Juan Merchan for his clear violation of the Rules of Judicial Conduct for the New York State Unified Court System due to his family directly enriching itself off this sham trial against President Trump. Acting Judge Merchan is in clear violation of section 100.3(E)(1)(d)(iii) of the Rules of Judicial Conduct for the New York State Unified Court System as his family has enriched itself through anti-Trump fundraising mentioning this case directly. His family’s wealth is directly tied to attacking President Trump. The idea that he is in a position to preside over this trial fairly would be laughable if it weren’t so dangerous. The naked corruption on display in Judge Merchan’s courtroom isn’t only a threat to President Trump, but a threat to our justice system and democracy. It is election interference for financial gain and cannot be tolerated. Judge Merchan should have recused himself, but since he’s refused, he must be held accountable for his judicial misconduct. Read my full judicial complaint below. Elise Stefanik Post Office Box 500 Glens Falls, New York 12801 (518) 336-5232 May 21, 2024 New York State Commission on Judicial Conduct 61 Broadway, Suite 1200 New York, New York 10006 Members of the Commission: I am writing to alert you to the conflict of interest involving Acting Supreme Court Justice Juan Merchan. Judge Merchan currently presides over the criminal case against President Donald J. Trump brought by Manhattan District Attorney Alvin Bragg. If convicted, President Trump faces a maximum of 136 years’ imprisonment. Moreover, he is the presumptive nominee of the Republican Party for this November’s presidential election. As such, not only are President Trump’s interests at stake, the interests of all Americans are at stake. The conflict issue pertains to Judge Merchan’s daughter. Judge Merchan’s daughter is president of Authentic Campaigns, a group that represents Democrat politicians and political action committees (PACs). When President Trump was indicted in April 2023, U.S. Representative Adam Schiff of California, one of Ms. Merchan’s clients who is running for the United States Senate, sent out a fundraising email requesting $10 donations that stated: It is a somber moment, and unprecedented for a former president to be indicted, but his alleged offenses are unprecedented. Trump will respond as he always does— playing the victim and blaming others for having the temerity to investigate him in the first place.1 The Senate Majority PAC, a client of Judge Merchan’s daughter’s Authentic Campaigns that leads the efforts to elect Democrats to the Senate, fired off a similar fundraising email after the indictment. It stated, in part: BREAKING NEWS: Donald Trump indicted by Manhattan grand jury This is an important moment for our democracy, but our work isn’t over. We must continue protecting our Senate majority from GOP extremists. Please, rush in $10 (becomes $60) to help defend the Senate.2 Since the indictment, Congressman Schiff has raised approximately $20 million, and the Senate Majority PAC has raised approximately $73.6 million. In other words, the clients of Judge Merchan’s daughter have raked in nearly $100 million and have used President Trump’s indictment—a case over which her father presides—as fundraising fodder. It is common sense that, if these groups make no money, they cannot afford to pay for services provided by individuals such as Ms. Merchan. The more money raised, the more it can be spent on services. Section 100.3(E)(1)(d)(iii) of the Rules of Judicial Conduct for the New York State Unified Court System dictates that Judge Merchan should not preside over President Trump’s case. Under this section, a judge is disqualified from a case when the judge knows that a person known by the judge to be within the sixth degree of relationship to him “has an interest that could be substantially affected by the proceeding.” If President Trump is acquitted, such a verdict would benefit him politically and be detrimental to Democrats, including clients of Judge Merchan’s daughter, in their efforts to defeat him in the courts rather than at the ballot box. If, on the other hand, he is convicted, such a verdict would provide a fundraising windfall for Democrat clients of Judge Merchan’s daughter. Congressman Schiff’s fundraising email highlighted the unprecedented nature of the indictment. That is nothing compared to the unprecedented nature of a conviction. Even U.S. District Judge Shira Scheindlin, a retired federal judge in New York City appointed by President Clinton, raised concerns about Judge Merchan’s refusal to recuse in Scheindlin’s April 5, 2024 CNN appearance: The main focus of this motion, as opposed to the previous one, a year ago, which the judge denied, is on the daughter’s line of work. As you already said, the daughter does work with many, many high- profile Democratic candidates. She works on their social media. They put out a post. They get contributions. She, as an owner, gets a percentage of those contributions. So, there is a statute, in New York, which says a judge must disqualify himself, if a person known by the judge, be within the sixth degree of relationship, and a daughter is the first degree, has an interest that could be substantially affected by the outcome of the proceeding. So, the question here is, is this daughter likely to profit, to benefit, from the outcome of this proceeding? And you have to understand, it’s not actual conduct that’s worrisome. It’s the appearance, the appearance to a reasonable person, that this judge cannot be fair and impartial, given that relationship. So ordinarily, I would think that a benefit, financially, would be to a spouse, because they share the income. This is an independent adult daughter. They don’t share income. But according to this — according to this statute, according to this statute, the judge must recuse if she would substantially benefit from the outcome. So that’s one thing that concerns me.3 This is part of a troubling pattern of judicial misconduct by Judge Merchan. Indeed, just last Friday, we learned your office privately cautioned him in July over his illegal political donations to Biden and other Democrats in 2020.4 This private caution has not deterred Judge Merchan’s judicial misconduct, as evidenced by this current complaint. Judge Merchan appears driven by Democrat partisanship and financial gain for his daughter. This caution, as reported by the New York Times, “can be considered in any future cases reviewed by the state’s Commission on Judicial Conduct.”5 It is imperative that New Yorkers and all Americans have confidence that justice is being dispensed fairly in New York.

This is especially true in politically sensitive cases where bias is most likely to rear its ugly head. Here, we are in the middle of a presidential election campaign. The circumstances are unprecedented: President Trump, a former president and the likely nominee of a major party for the presidency, is on trial. These proceedings are under a microscope. Judge Merchan’s clear conflict of interest, based upon his adult daughter’s financial state in this unprecedented criminal trial, has badly damaged the court’s appearance of impartiality.

Given Judge Merchan’s daughter’s clientele—and the vast sums of money that these individuals have raised and will continue to raise off of President Trump’s charges— Judge Merchan’s daughter stands to benefit the more legally imperiled President Trump is. She is well within the sixth degree of relation to Judge Merchan; indeed, as his daughter, she falls within the first degree. A straightforward application of Section 100.3(e)(1)(D)(iii) requires recusal. As Judge Merchan has declined to do so, I request that you investigate his conduct and impose whatever discipline is required. Sincerely, Elise M. Stefanik

— 1 Jon Levine and Rich Calder, Dem clients of daughter of NY judge in Trump hush-money trial raised $93M off the case, New York Post, March 30, 2024, available at (last visited May 21, 2024).

2 Thomas Catenacci, Trump, Democrats immediately begin fundraising off indictment: ‘Our work isn’t over’, Fox News, March 30, 2023, available at https://foxnews.com/politics/trump-democrats-immediately-begin-fundraising-off-indictment-our-work-isnt-over (last visited May 21, 2024).

3 Transcript of broadcast of The Source with Kaitlan Collins, CNN, April 5, 2024, https://transcripts.cnn.com/show/skc/date/2024-04-05/segment/01 (last visited May 21, 2024).

4 Karen Freifeld, Complaint dismissed against Trump hush-money judge who donated to Biden, Reuters, May 17, 2024, available at https://reuters.com/world/us/complaint-dismissed-against-trump-hush-money-judge-who-donated-biden-2024-05-17/ (last visited May 21, 2024).

5 William K. Rashbaum, Jonah E. Bromwich and Ben Protess, Ethics Panel Cautions Judge in Trump Trial Over Political Donations, New York Times, May 17, 2024, available at https://nytimes.com/2024/05/17/nyregion/trump-trial-judge-merchan-donations.html

(last visited May 21, 2024).

Categories
Uncategorized

Airplane Turbulence In The Area “Extremely Rare”, An Analysis

stock here: of course the turbulence was blamed on climate change!

I found this article that stands head and shoulder above the rest.

https://www.straitstimes.com/singapore/one-dead-several-injured-after-sia-flight-from-london-to-s-pore-suffers-severe-turbulence

This accident has more than meets the poorly reported reports. Below article adds context.

https://apnews.com/article/turbulence-singapore-airlines-flight-death-injuries-afdeda536a5e0b7300905a9994c58e4d

1) plane was reported by passenger to be pitching upward rapidly followed by massive downward more that threw passengers and flight attendants to the ceiling

2) claim made that plane hit an “air pocket”

3) radar indicates a rapid descent from 37000 to 31000 in 3 minutes, and then one source chimed in to state “this was in preparation for landing”.    Standard decline rates for landing are 500FPM to 800 FPM and this was 2000.   Plus they were no where near their intended airport Singapore.

4) They landed in Bangkok after declaring medical emergency (apparently 72 YO Brit had a heart attack, with no claim as to whether this was before or after the 6000 ft drop)

Jet streams can cause severe turbulence, it does appear to be a factor by looking at the winds aloft at 250 hPA (pressure level usually associated with 34,000 feet)

Report below is discussion with AI, which can now receive images and files and use those for research and answering questions. 

————–

Regarding the presence of the jet stream, the jet stream is typically found at altitudes between 30,000 and 39,000 feet, which aligns with the cruising altitude of the flight. The Bay of Bengal area can indeed be influenced by the jet stream, especially during the transitional seasons, when weather patterns are more volatile. This can lead to significant wind shear and turbulence​ (Weather Underground)​​ (Windmap)​​ (Metcheck.com)​.

The described turbulence, where passengers felt the plane initially shoot upward before plummeting, suggests an encounter with a significant vertical air movement, possibly within or near the jet stream. This type of turbulence can cause sudden and severe changes in altitude, consistent with the rapid descent observed. Additionally, the presence of strong updrafts and downdrafts in this region, exacerbated by the jet stream’s influence, could explain the extreme conditions experienced during the flight​ (Zoom Earth)​.

In summary, while a 2,000 FPM descent is not typical for a standard landing approach, it can occur under emergency conditions, particularly when dealing with severe turbulence influenced by the jet stream. The flight’s deviation to Bangkok for an emergency landing further underscores the severity of the situation.

what is the hPA equivalent to the jet stream

ChatGPT

The jet stream is typically found at altitudes corresponding to the upper troposphere and lower stratosphere, generally between 30,000 to 39,000 feet. In terms of atmospheric pressure, this altitude range correlates with the 250 to 200 hPa pressure levels.

Here’s a breakdown of the approximate altitude-pressure relationships relevant to the jet stream:

    250 hPa: Approximately 34,000 feet

    200 hPa: Approximately 39,000 feet

These levels can vary slightly depending on atmospheric conditions and temperature profiles, but they provide a good general guide for understanding where the jet streams are located in terms of pressure levels​ (Weather Underground)​​ (Windmap)​​ (Zoom Earth)​.

this is the current jetstream at 250 hPA, near bangkok it does seem possible that was the cause as it appears the stream dips down around India

ChatGPT

The jet stream map at the 250 hPa pressure level you provided indeed shows a notable dip near India, extending towards the Bay of Bengal region. This visual representation supports the possibility that the severe turbulence experienced by the British Airways flight could have been influenced by the jet stream’s presence in that area.

Key Points:

    Jet Stream Presence: The jet stream is visible dipping southward near India, which aligns with the flight path from London to Singapore passing through or near this turbulent region.

    Turbulence and Jet Streams: Jet streams can cause significant turbulence, especially when they create strong wind shear or when an aircraft flies through areas where different air masses meet. These conditions can result in abrupt altitude changes and severe turbulence.

    Flight Path: The flight path likely intersected with the jet stream, which could explain the sudden and severe turbulence reported by passengers and crew. The interaction with these high-velocity air currents could have caused the aircraft to experience rapid changes in altitude and speed.

    Impact on Flight: The encounter with the jet stream would have caused rapid vertical and horizontal wind changes, leading to the severe turbulence described by passengers, where the plane initially shot upward before plummeting. This type of turbulence can result in items and people being thrown around the cabin, causing injuries and necessitating an emergency landing.

Conclusion:

The presence of the jet stream near the Bay of Bengal and its influence on the flight path supports the explanation that the severe turbulence experienced was likely caused by this atmospheric phenomenon. The rapid descent and the severe shaking experienced by the aircraft are consistent with the effects of flying through a turbulent jet stream region.

For further reading on jet streams and their impact on aviation, you can refer to resources such as the NOAA Jet Stream and Live Science.

Categories
Uncategorized

When The Day Care Workers Look Like This, What Parent Would Allow Their Child to be Left With These Cretins?

https://www.foxnews.com/us/new-hampshire-daycare-workers-sprinkled-melatonin-childrens-food-unbeknownst-parents-police-say

See what I did below? LOL

Categories
Uncategorized

Finally, My Meme Is Getting Large Air Play. Classical Liberalism Is Often the Opposite of the “Progressive Woke” Kamp

stock here: I have been spouting this for years. What is going on is simply the Authoritarian types (we saw them on full display in the so called Pandemic) are simply using their tools of media and Hollywood to control those who often operate more on feelings.

Bill Maher is an unusual personality, he gets it and he doesn’t. He was shocked when he was attacked for challenging the narratives regarding the invasion of Iraq, and the “weapons of mass destruction”. Good on him for this one though, it will spread the word far more than my tiny voice, so shadow banned I think I am surrounded by Lahaina’s ghosts. PS I did make a conscience decision to not go to Lahaina, being surrounded by 1000 angry ghosts would not be good for me.

Categories
Uncategorized

Miss USA In Front Of the Re-Growing Lahaina Banyan Tree

stock here:

Categories
Uncategorized

Women in Power

This all started with a ZH article, on how Women in Power are often a real problem. Source

https://elizabethnickson.substack.com/p/a-global-censorship-prison-built

NPR Woman Works With Female Mossad

Mary Louise Kelly, the anchor for ‘All Things Considered’ at NPR
worked with, or ‘shilled for’, Israel’s Mossad spy agency.

Background

There are many strong indicatiors that Israel let Oct 7th happen on purpose.

It was done so as to create the outrage and support for ethnically cleansing Gaza, and
predictably, this would be followed by the same treatment in the West Bank.

The strong indications of LIHOP were numerous:

Netanyahu was three months away from annexing a large portion of the West Bank,
everyone, including Hamas, knew it.
Netanyahu intentionally antagonized the Palestinians by invading the Al-Aqsa Mosque.

**** Israel was in possession of Hamas’ *detailed* plan for Oct 7th a year in advance.
**** Israel removed the majority of it’s forces around Gaza just prior to Oct 7th.

Mossad had humint, spys, crawling all over Gaza.
Gaza was the most watched patch of Earth by satellites.
Plus! Israel’s own intelligence officers were warning — in writing — that they believed an attack was imminent.
Israelis watching the borders of Gaza had been sounding the alert over unusual activity for weeks and months.
Israel relocated the Rave Party into the known danger zone just three miles from Gaza; irregular pressure from higher ups overruled the grave security concerns of the IDF officers who normally were charged with approving or disapproving activities near Gaza.
It was hours before the IDF arrived in force after the Hamas jail break, Israel refuses to explain why.
But even before the arrival in force of the IDF Israel had implemented the Hannabal Directive.

The above are the familiar indicators. You should also be aware that, incredibly, Israel ceased the monitoring of Hamas’ radio network some months before Oct 7th. This is Israel’s stance, that they ceased monitoring altogether; but, more likely is that they compartmentalized it so that only insiders to the LIHOP were getting this critical intelligence.

Israeli media headline: “Unit 8200 could have saved Israel from Oct. 7; why hasn’t it owned up to its failure?”
https://www.israelhayom.com/2023/11/23/unit-8200-could-have-save-israel-from-oct-7-why-hasnt-it-owned-up-to-its-failure/

This is where NPR comes in.

NPR, in the person of Mary Louise Kelly, the anchor for ‘All Things Considered’,
promoted the cover up angle that ceasing of the monitoring was a reasonable thing to do.
Her sounding board was the “retired” Sima Shine, former head of research and analysis for Mossad.

Read it and see that this was not reporting, but advocacy for an Israeli cover-up agenda.
https://www.npr.org/2023/11/06/1211024508/israels-spy-agency-is-one-of-the-best-how-did-it-not-foresee-hamas-attacks

Also, the NPR interview only dealt with the interception of messages by means of monitoring Hamas’ radio network.
***Importantly, NPR did not address the fact that there is sophisticated monitoring equipment capable of giving locations and numbers of radios being used by an enemy.

The radio communication traffic would have become volcanic on Oct 7th, and that itself should have led to a Red Alert. **Israel could have also seen large radio traffic taking place **outside** !!! the walls of Gaza in the minutes after the jail break and this would certainly be cause for a Red Alert. With the monitoring equipment Israel could have then tracked the direction and concentration of Hamas.

Listening to the interview, clearly NPR is actively assisting with explaining away the lack of monitoring.
This is not reporting or journalism this is actively assisting Israel/Mossad with a cover up.

You might find it interesting to listen and you will notice a curious thing.
At the above NPR link is a podcast of the interview.

When the interview gets to the real meat of why it was ok to stop monitoring
the Mossad agent is explaining and suddenly there is a hard edit. You can discern it easily.
Mossad is explaining, “And…”. And then the explanation is cut short.

At the 3:30 mark is the very clear edit.

“SHINE: But it makes sense to me. It makes sense to me. And… “

Categories
Uncategorized

Zelensky Blames The World — New News Source Rachel Blevins

stock here: