British Under More Surveillance

UK TELEGRAPH | APRIL 1, 2012

Ministers are preparing a major expansion of the Government’s powers to monitor the email exchanges and website visits of every person in the UK, it was reported today.

Under legislation expected in next month’s Queen’s Speech, internet companies will be instructed to install hardware enabling GCHQ – the Government’s electronic “listening” agency – to examine “on demand” any phone call made, text message and email sent, and website accessed in “real time”, The Sunday Times reported.

A previous attempt to introduce a similar law was abandoned by the former Labour government in 2006 in the face of fierce opposition.

However ministers believe it is essential that the police and security services have access to such communications data in order to tackle terrorism and protect the public.

Although GCHQ would not be able to access the content of such communications without a warrant, the legislation would enable it to trace people individuals or groups are in contact with, and how often and for how long they are in communication.

The Home Office confirmed that ministers were intending to legislate “as soon as parliamentary time allows”.

Read Full Article →

The World of Free Energy

By Dr. Peter Lindemann
Global Research
January 1, 2011

In the late 1880’s, trade journals in the electrical sciences were predicting free electricity and free energy in the near future. Incredible discoveries about the nature of electricity were becoming common place. Nikola Tesla was demonstrating “wireless lighting” and other wonders associated with high frequency currents. There was an excitement about the future like never before.

Within 20 years, there would be automobiles, airplanes, movies, recorded music, telephones, radio, and practical cameras. The Victorian Age was giving way to something totally new. For the first time in history, common people were encouraged to envision a utopian future filled with abundant modern transportation and communication, as well as jobs, housing and food for everyone. Disease would be conquered, and so would poverty. Life was getting better, and this time, everyone was going to get a piece of the pie. So, what happened? In the midst of this technological explosion, where did the energy breakthroughs go? Was all of this excitement about free energy, which happened just before the beginning of the last century, just wishful thinking that “real science” eventually disproved?

Current State of Technology

Actually, the answer to that question is no. In fact, the opposite is true. Spectacular energy technologies were developed right along with the other breakthroughs. Since that time, multiple methods for producing vast amounts of energy at extremely low cost have been developed. None of these technologies have made it to the consumer market as an article of commerce, however. Exactly why this is true will be discussed shortly.

But first, I would like to describe to you a short list of free energy technologies that I am currently aware of, and that are proven beyond all reasonable doubt. The common feature connecting all of these discoveries, is that they use a small amount of one form of energy to control or release a large amount of a different kind of energy. Many of them tap the underlying Æther field in some way; a source of energy conveniently ignored by modern science.

1) Radiant Energy. Nikola Tesla’s magnifying transmitter, T. Henry Moray’s radiant energy device, Edwin Gray’s EMA motor, and Paul Baumann’s Testatika machine all run on radiant energy. This natural energy form can be gathered directly from the environment (mistakenly called “static” electricity) or extracted from ordinary electricity by the method called fractionation. Radiant energy can perform the same wonders as ordinary electricity, at less than 1% of the cost. It does not behave exactly like electricity, however, which has contributed to the scientific community’s misunderstanding of it. The Methernitha Community in Switzerland currently has 5 or 6 working models of fuelless, self-running devices that tap this energy.

2) Permanent Magnets. Dr. Robert Adams (NZ) has developed astounding designs of electric motors, generators and heaters that run on permanent magnets. One such device draws 100 watts of electricity from the source, generates 100 watts to recharge the source, and produces over 140 BTU’s of heat in two minutes! Dr. Tom Bearden (USA) has two working models of a permanent magnet powered electrical transformer. It uses a 6-watt electrical input to control the path of a magnetic field coming out of a permanent magnet. By channeling the magnetic field, first to one output coil and then a second output coil, and by doing this repeatedly and rapidly in a “ping-pong” fashion, the device can produce a 96-watt electrical output with no moving parts. Bearden calls his device a Motionless Electromagnetic Generator, or MEG. Jean-Louis Naudin has duplicated Bearden’s device in France. The principles for this type of device were first disclosed by Frank Richardson (USA) in 1978. Troy Reed (USA) has working models of a special magnetized fan that heats up as it spins. It takes exactly the same amount of energy to spin the fan whether it is generating heat or not. Beyond these developments, multiple inventors have identified working mechanisms that produce motor torque from permanent magnets alone.

3) Mechanical Heaters. There are two classes of machines that transform a small amount of mechanical energy into a large amount of heat. The best of these purely mechanical designs are the rotating cylinder systems designed by Frenette (USA) and Perkins (USA). In these machines, one cylinder is rotated within another cylinder with about an eighth of an inch of clearance between them. The space between the cylinders is filled with a liquid such as water or oil, and it is this “working fluid” that heats up as the inner cylinder spins. Another method uses magnets mounted on a wheel to produce large eddy currents in a plate of aluminum, causing the aluminum to heat up rapidly. These magnetic heaters have been demonstrated by Muller (Canada), Adams (NZ) and Reed (USA). All of these systems can produce ten times more heat than standard methods using the same energy input.

4) Super-Efficient Electrolysis. Water can be broken into hydrogen and oxygen using electricity. Standard chemistry books claim that this process requires more energy than can be recovered when the gases are recombined. This is true only under the worst case scenario. When water is hit with its own molecular resonant frequency, using a system developed by Stan Meyers (USA) and again recently by Xogen Power, Inc., it collapses into hydrogen and oxygen gas with very little electrical input. Also, using different electrolytes (additives that make the water conduct electricity better) changes the efficiency of the process dramatically. It is also known that certain geometric structures and surface textures work better than others do. The implication is that unlimited amounts of hydrogen fuel can be made to drive engines (like in your car) for the cost of water. Even more amazing is the fact that a special metal alloy was patented by Freedman (USA) in 1957 that spontaneously breaks water into hydrogen and oxygen with no outside electrical input and without causing any chemical changes in the metal itself. This means that this special metal alloy can make hydrogen from water for free, forever.

5) Implosion/Vortex. All major industrial engines use the release of heat to cause expansion and pressure to produce work, like in your car engine. Nature uses the opposite process of cooling to cause suction and vacuum to produce work, like in a tornado. Viktor Schauberger (Austria) was the first to build working models of implosion engines in the 1930’s and 1940’s. Since that time, Callum Coats has published extensively on Schauberger’s work in his book Living Energies and subsequently, a number of researchers have built working models of implosion turbine engines. These are fuelless engines that produce mechanical work from energy accessed from a vacuum. There are also much simpler designs that use vortex motions to tap a combination of gravity and centrifugal force to produce a continuous motion in fluids.

6) Cold Fusion. In March 1989, two chemists from the University of Utah (USA) announced that they had produced atomic fusion reactions in a simple tabletop device. The claims were “debunked” within six months and the public lost interest. Nevertheless, cold fusion is very real. Not only has excess heat production been repeatedly documented, but also low energy atomic element transmutation has been catalogued, involving dozens of different reactions! This technology definitely can produce low cost energy and scores of other important industrial processes.

7) Solar Assisted Heat Pumps. The refrigerator in your kitchen is the only free energy machine you currently own. It’s an electrically operated heat pump. It uses one amount of energy (electricity) to move three amounts of energy (heat). This gives it a co-efficient of performance (COP) of about 3. Your refrigerator uses one amount of electricity to pump three amounts of heat from the inside of the refrigerator to the outside of the refrigerator. This is its typical use, but it is the worst possible way to use the technology. Here’s why. A heat pump pumps heat from the source of heat to the “sink” or place that absorbs the heat. The source of heat should obviously be hot and the sink for heat should obviously be cold for this process to work the best. In your refrigerator, it’s exactly the opposite. The source of heat is inside the box, which is cold, and the sink for heat is the room temperature air of your kitchen, which is warmer than the source. This is why the COP remains low for your kitchen refrigerator. But this is not true for all heat pumps. COP’s of 8 to 10 are easily attained with solar assisted heat pumps. In such a device, a heat pump draws heat from a solar collector and dumps the heat into a large underground absorber, which remains at 55° F, and mechanical energy is extracted in the transfer. This process is equivalent to a steam engine that extracts mechanical energy between the boiler and the condenser, except that it uses a fluid that boils at a much lower temperature than water. One such system that was tested in the 1970’s produced 350 hp, measured on a Dynamometer, in a specially designed engine from just 100-sq. ft. of solar collector. (This is not the system promoted by Dennis Lee.) The amount of energy it took to run the compressor (input) was less than 20 hp, so this system produced more than 17 times more energy than it took to keep it going! It could power a small neighborhood from the roof of a hot tub gazebo, using exactly the same technology that keeps the food cold in your kitchen. Currently, there is an industrial scale heat pump system just north of Kona, Hawaii that generates electricity from temperature differences in ocean water.

There are dozens of other systems that I have not mentioned, many of them are as viable and well tested as the ones I have just recounted. But this short list is sufficient to make my point: free energy technology is here, now. It offers the world pollution-free, energy abundance for everyone, everywhere.

It is now possible to stop the production of greenhouse gases and shut down all of the nuclear power plants. We can now desalinate unlimited amounts of seawater at an affordable price, and bring adequate fresh water to even the most remote habitats. Transportation costs and the production costs for just about everything can drop dramatically. Food can even be grown in heated greenhouses in the winter, anywhere. All of these wonderful benefits that can make life on this planet so much easier and better for everyone have been postponed for decades. Why? Whose purposes are served by this postponement?

Four Invisible Forces

There are four gigantic forces that have worked together to create this situation. To say that there is and has been a conspiracy to suppress this technology only leads to a superficial understanding of the world, and it places the blame for this completely outside of ourselves. Our willingness to remain ignorant and actionless in the face of this situation has always been interpreted by two of these forces as implied consent. So, besides a non-demanding public, what are the other forces that are impeding the availability of free energy technology?

In the United States, and in most other countries around the world, there is a money monopoly in place. I am free to earn as much money as I want, but I will only be paid in Federal Reserve Notes. There is nothing I can do to be paid in Gold Certificates, or some other form of money. This money monopoly is solely in the hands of a small number of private stock banks, and these banks are owned by the wealthiest families in the world. Their plan is to eventually control 100% of all of the capital resources of the world, and thereby control everyone’s life through the availability (or non-availability) of all goods and services.

An independent source of wealth (free energy device) in the hands of each and every person in the world, ruins the plans of the wealthiest families for world domination, permanently. Why this is true is easy to see. Currently, a nation’s economy can be either slowed down or sped up by the raising or lowering of interest rates. But if an independent source of capital (energy) were present in the economy, and any business or person could raise more capital without borrowing it from a bank, this centralized throttling action on interest rates would simply not have the same effect.

Free energy technology changes the value of money. The wealthiest families and the issuers of credit do not want any competition. It’s that simple. They want to maintain their current monopoly control of the money supply. For them, free energy technology is not just something to suppress, it must be permanently forbidden!

So, the wealthiest families and their central banking institutions are the first force operating to postpone the public availability of free energy technology. Their motivations are the imagined divine right to rule, greed, and their insatiable need to control almost everything except themselves. The weapons they have used to enforce this postponement include intimidation, “expert” debunkers, buying and shelving of technology, murder and attempted murder of the inventors, character assassination, arson, and a wide variety of financial incentives and disincentives to manipulate possible supporters. They have also promoted the general acceptance of a scientific theory that states that free energy is impossible (laws of thermodynamics).

The second force operating to postpone the public availability of free energy technology is national governments. The problem here is not so much related to competition in the printing of currency, but in the maintenance of national security. The fact is, the world out there is a jungle, and humans can be counted upon to be very cruel, dishonest, and sneaky. It is government’s job to provide for the common defense. For this, police powers are delegated by the executive branch of government to enforce “the rule of law.” Most of us who consent to the rule of law do so because we believe it is the right thing to do, for our own benefit. There are always a few individuals, however, that believe that their own benefit is best served by behavior that does not voluntarily conform to the generally agreed upon social order. These people choose to operate outside of the rule of law and are considered outlaws, criminals, subversives, traitors, revolutionaries, or terrorists.

Most national governments have discovered, by trial and error, that the only foreign policy that really works, over time, is a policy called “tit for tat.” What this means to you and me is, that governments treat each other the way they are being treated. There is a constant jockeying for position and influence in world affairs, and the strongest party wins! In economics, it’s the Golden Rule, which states: “The one with the gold makes the rules.”

So it is with politics also, but its appearance is more Darwinian. It’s simply survival of the fittest. In politics, however, the fittest has come to mean the strongest party who is also willing to fight the dirtiest. Absolutely every means available is used to maintain an advantage over the adversary, and everyone else is the adversary regardless of whether they are considered friend or foe. This includes outrageous psychological posturing, lying, cheating, spying, stealing, assassination of world leaders, proxy wars, alliances and shifting alliances, treaties, foreign aid, and the presence of military forces wherever possible.

Like it or not, this is the psychological and actual arena national governments operate in. No national government will do anything that simply gives an adversary an advantage for free. It’s national suicide. An activity by any individual, inside or outside the country, that is interpreted as giving an adversary an edge or advantage will be deemed a threat to “national security.”

Free energy technology is a national government’s worst nightmare! Openly acknowledged, free energy technology sparks an unlimited arms race by all governments in a final attempt to gain absolute advantage and domination. Think about it. Do you think Japan will not feel intimidated if China gets free energy? Do you think Israel will sit by quietly as Iraq acquires free energy? Do you think India will allow Pakistan to develop free energy? Do you think the USA would not try to stop Osama bin Laden from getting free energy?

Unlimited energy available to the current state of affairs on this planet leads to an inevitable reshuffling of the balance of power. This could become an all-out war to prevent “the other” from having the advantage of unlimited wealth and power. Everybody will want it, and at the same time, want to prevent everyone else from getting it.

So, national governments are the second force operating to postpone the public availability of free energy technology. Their motivations are “self-preservation.” This self-preservation operates on three levels. First, by not giving undue advantage to an external enemy. Second, by preventing individualized action capable of effectively challenging official police powers (anarchy) within the country. And third, by preserving income streams derived from taxing energy sources currently in use. Their weapons include the preventing of the issuance of patents based on national security grounds, the legal and illegal harassment of inventors with criminal charges, tax audits, threats, phone taps, arrest, arson, theft of property during shipment, and a host of other intimidations which make the business of building and marketing a free energy machine practically impossible.

The third force operating to postpone the public availability of free energy technology consists of the group of deluded inventors and out right charlatans and con men. On the periphery of the extraordinary scientific breakthroughs that constitute the real free energy technologies, lies a shadow world of unexplained anomalies, marginal inventions and unscrupulous promoters. The first two forces have constantly used the media to promote the worst examples of this group, to distract the public’s attention and to discredit the real breakthroughs by associating them with the obvious frauds.

Over the last hundred years, dozens of stories have surfaced about unusual inventions. Some of these ideas have so captivated the public’s imagination that a mythology about these systems continues to this day. Names like Keely, Hubbard, Coler, and Henderschott immediately come to mind. There may be real technologies behind these names, but there simply isn’t enough technical data available in the public domain to make a determination. These names remain associated with a free energy mythology, however, and are sited by debunkers as examples of fraud.

The idea of free energy taps very deeply into the human subconscious mind. A few inventors with marginal technologies that demonstrate useful anomalies have mistakenly exaggerated the importance of their inventions. Some of these inventors also have mistakenly exaggerated the importance of themselves for having invented it. A combination of “gold fever” and/or a messiah complex appears, wholly distorting any future contribution they may make.

While the research thread they are following may hold great promise, these deluded inventors begin to trade enthusiasm for facts, and the value of the scientific work from that point on suffers greatly. There is a powerful, yet subtle seduction that can warp a personality if they believe that the world rests on their shoulders or that they are the world’s savior. Strange things also happen to people when they think they are about to become extremely rich. It takes a tremendous spiritual discipline to remain objective and humble in the presence of a working free energy machine.

Many inventors’ psyches become unstable just believing they have a free energy machine. As the quality of the science deteriorates, some inventors also develop a persecution complex that makes them very defensive and unapproachable. This process precludes them from ever really developing a free energy machine, and fuels the fraud mythologies tremendously.

Then there are the out right con men. In the last 15 years, there is one person in the USA who has raised the free energy con to a professional art. He has raised more than $100,000,000, has been barred from doing business in the state of Washington, has been jailed in California, and he’s still at it. He always talks about a variation of one of the real free energy systems, sells people on the idea that they will get one of these systems soon, but ultimately sells them only promotional information which gives no real data about the energy system itself. He has mercilessly preyed upon the Christian community and the patriot community in the USA, and is still going strong.

This man’s current scam involves signing up hundreds of thousands of people as locations where he will install a free energy machine. In exchange for letting him put the free energy generator in their home, they will get free electricity for life, and his company will sell the excess energy back to the local utility company. After becoming convinced that they will receive free electricity for life, with no out-front expenses, they gladly buy a video that helps draw their friends into the scam as well. Once you understand the power and motivations of the first two forces I have discussed, its obvious that this person’s current business plan cannot be implemented. This one person has probably done more harm to the free energy movement in the USA than any other force, by destroying people’s trust in the technology.

So, the third force postponing the public availability of free energy technology is delusion and dishonesty within the movement itself. The motivations are self-aggrandizement, greed, want of power over others, and a false sense of self-importance. The weapons used are lying, cheating, the “bait and switch” con, self-delusion and arrogance combined with lousy science.

The fourth force operating to postpone the public availability of free energy technology is all of the rest of us. It may be easy to see how narrow and selfish the motivations of the other forces are, but actually, these motivations are still very much alive in each of us as well. Like the Wealthiest Families, don’t we each secretly harbor illusions of false superiority, and the want to control others instead of ourselves? Also, wouldn’t you “sell out” if the price were high enough, say, take a million dollars, cash, today? Or like the governments, don’t we each want to ensure our own survival? If caught in the middle of a full, burning theater, do you panic and push all of the weaker people out of the way in a mad, scramble for the door? Or like the deluded inventor, don’t we trade a comfortable illusion once in a while for an uncomfortable fact? And don’t we like to think more of ourselves than others give us credit for? Or don’t we still fear the unknown, even if it promises a great reward?

You see, really, all four forces are just different aspects of the same process, operating at different levels in the society. There is really only one force preventing the public availability of free energy technology, and that is the unspiritually motivated behavior of the humans. In the last analysis, free energy technology is an outward manifestation of divine abundance. It is the engine of the economy of an enlightened society, where people voluntarily behave in a respectful and civil manner toward each other, where each member of the society has everything they need, and does not covet what their neighbor has, where war and physical violence has become socially unacceptable behavior and people’s differences are at least tolerated, if not enjoyed.

The appearance of free energy technology in the public domain is the dawning of a truly civilized age. It is an epochal event in human history. Nobody can take credit for it. Nobody can get rich on it. Nobody can rule the world with it. It is simply, a gift from God. It forces us all to take responsibility for our own actions and for our own self-disciplined self-restraint when needed. The world as it is currently ordered, cannot have free energy technology without being totally transformed by it into something else. This civilization has reached the pinnacle of its development, because it has birthed the seeds of its own transformation. Unspiritualized humans cannot be trusted with free energy. They will only do what they have always done, which is take merciless advantage of each other, or kill each other and themselves in the process.

If you go back and read Ayn Rand’s Atlas Shrugged or the Club of Rome Report, it becomes obvious that the wealthiest families have understood this for decades. Their plan is to live in the world of free energy, but permanently freeze the rest of us out. But this is not new. Royalty has always considered the general population (us) to be their subjects. What is new, is that you and I can communicate with each other now better than at anytime in the past. The Internet offers us, the fourth force, an opportunity to overcome the combined efforts of the other forces preventing free energy technology from spreading.

The Opportunity

What is starting to happen is that inventors are publishing their work, instead of patenting it and keeping it secret. More and more, people are giving away information on these technologies in books, videos and websites. While there is still a great deal of useless information about free energy on the Internet, the availability of good information is rising rapidly. Check out the list of websites and other resources at the end of this article.

It is imperative that you begin to gather all of the information you can on real free energy systems. The reason for this is simple. The first two forces will never allow an inventor or a company to build and sell a free energy machine to you! The only way you will ever get one is if you, or a friend, build it yourself. This is exactly what thousands of people are already quietly starting to do. You may feel wholly inadequate to the task, but start gathering information now. You may be just a link in the chain of events for the benefit of others. Focus on what you can do now, not on how much there still is to be done. Small, private research groups are working out the details as you read this. Many are committed to publishing their results on the Internet.

All of us constitute the fourth force. If we stand up and refuse to remain ignorant and actionless, we can change the course of history. It is the aggregate of our combined action that can make a difference. Only the mass action that represents our consensus can create the world we want. The other three forces will not help us put a fuelless power plant in our basements. They will not help us be free from their manipulations. Nevertheless, free energy technology is here. It is real, and it will change everything about the way we live, work and relate to each other. In the last analysis, free energy technology obsoletes greed and the fear for survival. But like all exercises of spiritual faith, we must first manifest the generosity and trust in our own lives.

The source of free energy is inside of us. It is that excitement of expressing ourselves freely. It is our spiritually guided intuition expressing itself without distraction, intimidation or manipulation. It is our open-heartedness. Ideally, the free energy technologies underpin a just society where everyone has enough food, clothing, shelter, self-worth, and the leisure time to contemplate the higher spiritual meanings of life. Do we not owe it to each other to face down our fears and take action to create this future for our children’s children?

Free energy technology is here. It has been here for decades. Communications technology and the Internet have torn the veil of secrecy off of this remarkable fact. People all over the world are starting to build free energy devices for their own use. The bankers and the governments do not want this to happen, but cannot stop it. There will be essentially no major media coverage of what is going on. Tremendous economic instabilities and wars will be used in the near future to distract people from joining the free energy movement.

Western society is in many ways spiraling down toward self-destruction due to the accumulated effects of long-term greed and corruption. The general availability of free energy technology cannot stop this trend. It can only reinforce it. If, however, you have a free energy device, you may be better positioned to support the political/social/economic transition that is underway. The question is, who will ultimately control the emerging world government-the first force or the fourth force?

The last great war is almost upon us. The seeds are planted. After this will come the beginning of a real civilization. Some of us who refuse to fight will survive to see the dawn of the world of free energy. I challenge you to be among the ones who try.

LIST OF RESOURCES:

Books:

Living Energies by Callum Coats The Free Energy Secrets of Cold Electricity by Peter Lindemann, D.Sc. Applied Modern 20th Century Aether Science by Dr. Robert Adams Physics Without Einstein by Dr. Harold Aspden Secrets of Cold War Technology by Gerry Vassilatos The Coming Energy Revolution by Jeane Manning Websites:

http://www.free-energy.cc/ developed by Clear Tech, Inc. and Dr. Peter Lindemann http://jnaudin.free.fr/ developed by JLN Labs in France http://www.keelynet.com/ developed by Jerry Decker in the USA http://www.xogen.ca/ site for super electrolysis technology http://www.fortunecity.com/greenfield/bp/16/content1.htm excellent site by Geoff Egel, Australia For links to other excellent resources: http://www.WantToKnow.info/resources#newenergy

Free Energy News Articles Breakthroughs in major media that should have been headline news:

Below are verbatim quotes taken from articles at links provided dealing with free energy

Kids Build Soybean-Fueled Car February 17, 2006, CBS News http://www.cbsnews.com/stories/2006/02/17/eveningnews/main1329941.shtml

The star at last week’s Philadelphia Auto Show wasn’t a sports car or an economy car. It was a sports-economy car-one that combines performance and practicality under one hood. The car that buyers have been waiting decades [for] comes from an unexpected source and runs on soybean bio-diesel fuel to boot. A car that can go from zero to 60 in four seconds and get more than 50 miles to the gallon would be enough to pique any driver’s interest. So who do we have to thank for it. Ford? GM? Toyota? No-just…five kids from the auto shop program at West Philadelphia High School.

Iceland the First Country to Try Abandoning Gasoline January 18, 2006, ABC News http://abcnews.go.com/WNT/story?id=1518556

 Iceland has already started…turning water into fuel – hydrogen fuel. Here’s how it works: Electrodes split the water into hydrogen and oxygen molecules. Hydrogen electrons pass through a conductor that creates the current to power an electric engine. Hydrogen fuel now costs two to three times as much as gasoline, but gets up to three times the mileage of gas, making the overall cost about the same. As an added benefit, there are no carbon emissions – only water vapor.

Fuel’s paradise? Power source that turns physics on its head November 4, 2005, The Guardian (one of the UK’s leading newspapers) http://www.guardian.co.uk/science/story/0,3605,1627424,00.html

It seems too good to be true: a new source of near-limitless power that costs virtually nothing, uses tiny amounts of water as its fuel and produces next to no waste. Randell Mills, a Harvard University medic who also studied electrical engineering at Massachusetts Institute of Technology, claims to have built a prototype power source that generates up to 1,000 times more heat than conventional fuel. “We’ve got 50 independent validation reports, we’ve got 65 peer-reviewed journal articles,” he said. “We ran into this theoretical resistance and there are some vested interests here.

Magnetic energy? Perhaps, September 7, 2005, San Francisco Chronicle
http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2005/09/07/BUG9NEJD3L1.DTL

“All we know is that we’re seeing more energy output than input. Does Goldes realize what’s he’s saying — that he’s perhaps discovered a clean, inexhaustible energy source? “That’s exactly what it appears to be,” he answered. A handful of other companies worldwide are believed also to be pursuing zero-point energy via magnetic systems. One of them…is run by a former scientist at NASA’s Jet Propulsion Laboratory in Pasadena. According to Aviation Week & Space Technology magazine, the Pentagon and at least two large aerospace companies are actively researching zero-point energy as a means of propulsion.

Solar Challenge Finishes in Calgary July 28, 2005, Open Source Energy Network/Detroit News
http://pesn.com/2005/07/28/9600141_Solar_Challenge_results
http://www.detnews.com/2005/schools/0507/28/01-262474.htm
Detroit News http://wwmt.com/engine.pl?station=wwmt&id=18269&template=breakout_local.html  – CBS affiliate

The ten-day solar car race from Austin to Calgary came to a successful finish yesterday. U of Michigan takes prize, finishing the 2500-mile course in 54 hours. They also set a record by averaging 46.2 mph in this, the world’s longest solar car race.
Eco-car more efficient than light bulb July 5, 2005, CNN
http://www.cnn.com/2005/TECH/07/04/eco.car

The hydrogen-powered Ech2o needs just 25 Watts — the equivalent of less than two gallons of petrol — to complete the 25,000-mile global trip, while emitting nothing more hazardous than water. But with a top speed of 30mph, the journey would take more than a month to complete. Ech2o, built by British gas firm BOC, will bid to smash the world fuel efficiency record of over 10,000 miles per gallon at the Shell Eco Marathon. The record is currently….5,385 km/per liter [over 12,000 mpg!].

Advanced vehicles demonstrate zero oil-consumption, reduced emissions May 18, 2005, Boston Globe
http://www.evworld.com/view.cfm?section=communique&newsid=8474  (article removed from Globe website)

Top prize for the Monte-Carlo Rally went to a modified Honda Insight [which] broke the 100-mile-per-gallon barrier over a 150-mile range. The car actually got 107 miles-per gallon. St. Mark’s High School in Southboro, and North Haven Community School, North Haven, ME, demonstrated true zero-oil consumption and true zero climate-change emissions with their modified electric Ford pick-up and Volkswagen bus.

Fans of GM Electric Car Fight the Crusher Washington Post, March 10, 2005
http://www.washingtonpost.com/ac2/wp-dyn/A21991-2005Mar9

GM agrees that the car in question, called the EV1, was a rousing feat of engineering that could go from zero to 60 miles per hour in under eight seconds with no harmful emissions. The market just wasn’t big enough, the company says, for a car that traveled 140 miles or less on a charge before you had to plug it in like a toaster. Ted Flittner, a…Costa Mesa industrial engineer…said, “they have such a brilliant solution they’ve developed. They’ve put it on the market and proved it works. People still want it and they’re taking it away and destroying it.”

100 MPG Car Heralded by London Times in 2002 – Where is it now? December 2 , 2004, WantToKnow.info/LondonTimes
http://www.WantToKnow.info/carmileage  –
WantToKnow.info (includes text of London Times article)
http://www.timesonline.co.uk/article/0,,588-451038,00.html  – London Times

The Toyota Eco Spirit was the talk of the fuel economy car industry in 2002. At over 100 MPG and with the lowest exhaust emissions and a very reasonable sticker price, the Eco Spirit’s debut was widely anticipated. (see London Times article). What happened to it? 1908 Ford Model T: 25 MPG, 2004 EPA Average All Cars: 21 MPG Detroit News/WantToKnow.info, June 4, 2004
http://www.WantToKnow.info/050711carmileageaveragempg

Ford’s Model T, which went 25 miles on a gallon of gasoline, was more fuel efficient than the current Ford Explorer sport-utility vehicle — which manages just 16 miles per gallon.

Note: This last article is an excellent summary of eye-opening contradictions which have received very little media coverage, including links to major media articles to back up the facts presented.

Patents: This list is a sample of inventions that produce free energy.

The links provided will take you directly to the patent on the website of the U.S. Patent Office.

To search for patents by number on the US Patent Office website:
http://patft.uspto.gov/netahtml/PTO/srchnum.htm

Biometrically Identifiable Gesture Technology

If you believe fingerprinting or picture ID’s are invasive forms of technology, wait until you read this.

by Luis R. Miranda
The Real Agenda
July 20, 2011

If you have never seen the documentary Shadow Government, I honestly recommend it. It details the latest information regarding the use of technology to create a global identification system of biblical proportions. In this system that is being built as we wonder “why I have to give my fingerprint to obtain a driver’s license”, every single human being will be accounted for; no exceptions.

The variety of technologies available to effectively identify anyone at work, at the gym, at public events, in Court houses and even at home, is simply mind blowing. However, the producers and buyers of these so-called security enhancing tools do not stop thinking about new ways to get the highest paid contracts from private companies or the government.

The latest example of invasive identification technology is Biometric Signature ID, Inc’s BioSig-ID. According to the manufacturer’s description, BioSig-ID is a “Multi-Factor Identity Proofing Technology”; the best of its kind. This earned the company the trust of a variety of organizations going from sectors such as healthcare, the financial and banking systems, online education, cloud computing, the White House and the Department of Homeland Security.

The BioSig-ID is known for its capacity to gather information such as mouse movement patterns, typing speeds, user gestures, and other personal characteristics to fully identify the person who intends to access information or use a piece of equipment.

Biometric Signature ID announced recently it received approval from the United States Patent and Trademark Office for its latest patent which will be added to the large collection of technology-based identification tools it produces. The BioSig-ID technology collects movements made with various devices such as a mouse, touchscreen markings, fingers and body movements to create a biometric multi-factor password used for identification purposes.

Convenience is the name of the Game

As it often happens, the use of BioSig-ID as well as other invasive technologies, is presented not as a threat to personal privacy, but as a “convenient way to stay safe” or to keep data and information safe. In other examples of privacy violations we encounter the entertainment industry which managed to create products such as video game consoles that record the users movements as a biometric human fingerprint. Kinect, the device that is inside Microsoft’s XBox, allows users to play by just moving their bodies. “The console detects movement and recognizes people through a camera and various sensors installed on the device.” Isn’t that convenient?

Along with video gaming are the infamous full body scanners, which are supposed to keep us all safe from terrorism, but that instead are one of the most invasive forms of technology ever created. The scanners not only render full naked images of the passengers that allow their privacy to be violated -there is an opt out chance- but also bathes them with poisonous doses of radiation. See information on the scanners’ radiation amounts here. Read about full body scanner backscatter radiation here. Learn about radiation flux here.

Creating a need for invasive identification technologies

The amount of biometric-based identification technology production and consumption has increased exponentially in the last decade or so. This does not mean, however, that the use of these technology is so young. Military and technology contractors have been working on ways to fully identify individuals for a long time. In most cases, technology such as the one developed by Biometric Signature ID has been used in highly sensitive places in companies and military installations.

The success of this technology relies on the fact that a market was created -as it happens with many products- to assure its adoption. The evil part is that people’s fear and government policy are also used to push the production and sale of biometric identification. By the time consumers get to know about its existence, it has already been tried and tested for many years. In the case of BioSig-ID, the product was tested initially by The Tolly Group.

As we cited before, many organizations and companies adopt this kind of technologies under the safety excuse. Data safety, information safety, access to premisses safety, web access safety and so on. In the healthcare business, for example, the DEA requires electronic prescription of controlled substances, another failure of the infamous war on drugs. DEA uses this technology to authenticate access to patients’ records.

In the banking and financial markets, both private institutions and government offices use biometric identification to “bring security and safeguard customer information, reduce fraud, etc. It has not worked very well, though, as millions of customer credit card information has been stolen from those very same institutions and neither the hackers nor the banks have been held accountable for endangering the privacy of their customers.

Education has not escaped privacy violation. Both physical and online educational organizations adopted biometric and other invasive identification technologies to “guarantee” the correct accreditation of students as well as for registration and payment controls. Universities and other learning online-based institutions offer classes online which require signing in with more than one fingerprint.

New internet-based services such as Mobile and Cloud computing will pile on the number of consumers and users of Bi0Sig-ID and similar validation tools. As all content migrates to the “Cloud” and the corporations and the government become more empowered by centrally controlling information and how people access it from work or home, biometric identification systems will be key to mandate certified entrance to those “Clouds”. The idea to have a unique internet ID, as it has been proposed by government officials in several countries is suddenly appearing more and more realistic.

And if you are a government employee, as many are nowadays, and more will be in the near future, get ready to give every single piece of information your body emits. In Mexico,  all federal government employees had to submit to biometric identification recognition in order to keep their jobs. All over the world, government implement security protocols that include the use of Government Identity Cards or Credentials to access and manage information.

E-IDs are already available in countries like Hong Kong, Malaysia, Estonia, Finland, Belgium, Portugal, Morocco and Spain.

Is the Internet Making People Dumber?

If you think the Internet was invented by DARPA to make it easier for us to live, enjoy life and more easily buy slave-made products, you are damn wrong.

Paul Joseph Watson
PrisonPlanetLive
July 6, 2011

Like any technology, the Internet is a double-edged sword, but is the world wide web literally re-wiring our brains, dumbing us down by destroying our ability to think analytically and infantilizing our minds in the process?

Are we becoming a world of wireheads as the constant onslaught of new information reduces our attention span to nothing – eviscerating our ability to concentrate?

Some neuroscientists say the Internet is re-moulding brains to rely on associative thinking – which leaves us incapable of reading or writing at length.

But Oxford University’s Susan Greenfield goes further – warning that the likes of Facebook and Twitter are giving people what amounts to a lobotomy of empathy.

“We know how small babies need constant reassurance that they exist,” she told the UK’s Daily Mail. “My fear is that these technologies are infantilizing the brain into the state of small children who are attracted by buzzing noises and bright lights; who have a small attention span and who live for the moment.” Greenfield even fears that real conversation may give way to sanitized screen dialogues.

There are Facebook and Twitter obsessives who can barely visit the bathroom without posting a status update about it. To these people, privacy, individualism and merely the nagging voice of their own conscience are terrifying prospects. They constantly need to fill their environment with sound and fury, signifying nothing. To them, silence is torture – considered thought and peace of mind is anathema.

How do we reach out to people with often complex information when their brains have been frazzled to the point where they can barely maintain a conversation?

This is a book — remember these things? 40 per cent of Americans read one or less over the course of a whole year. A quarter of Americans don’t read any books at all. A lot of our young people only read books because they are forced to do so for school and college. Too many words, not enough pictures, definitely no videos of dancing penguins.

American technologist Nicholas Carr fears that someone, or something, has been tinkering with his brain, remapping the neural-circuitry, reprogramming the memory. His friends tell him how they find it impossible to absorb the information contained in a longer article. Writing for Atlantic Magazine, Carr asks, is Google Making us Stupid?

Now we’ve had to adapt our message to still be relevant in this brave new world of superficial soundbites – if I’d have written all this up in a three page article a lot of people would have simply ignored it.

What do you think? Are social networking websites and the Internet general destroying our ability to think analytically and in any significant depth? How can we craft our message to compete in this world of information overload and 21st century wireheads?

Internet Dictatorship Begins in Singapore

A “new” system that records every move, stores all passwords and homogenizes software and that will control the net from 3 major hubs.

by John Markoff
NYTimes
June 25, 2011

A small group of Internet security specialists gathered in Singapore this week to start up a global system to make e-mail and e-commerce more secure, end the proliferation of passwords and raise the bar significantly for Internet scam artists, spies and troublemakers.

“It won’t matter where you are in the world or who you are in the world, you’re going to be able to authenticate everyone and everything,” said Dan Kaminsky, an independent network security researcher who is one of the engineers involved in the project.

The Singapore event included an elaborate technical ceremony to create and then securely store numerical keys that will be kept in three hardened data centers there, in Zurich and in San Jose, Calif. The keys and data centers are working parts of a technology known as Secure DNS, or DNSSEC. DNS refers to the Domain Name System, which is a directory that connects names to numerical Internet addresses. Preliminary work on the security system had been going on for more than a year, but this was the first time the system went into operation, even though it is not quite complete.

The three centers are fortresses made up of five layers of physical, electronic and cryptographic security, making it virtually impossible to tamper with the system. Four layers are active now. The fifth, a physical barrier, is being built inside the data center.

The technology is viewed by many computer security specialists as a ray of hope amid the recent cascade of data thefts, attacks, disruptions and scandals, including break-ins at Citibank, Sony, Lockheed Martin, RSA Security and elsewhere. It allows users to communicate via the Internet with high confidence that the identity of the person or organization they are communicating with is not being spoofed or forged.

Internet engineers like Mr. Kaminsky want to counteract three major deficiencies in today’s Internet. There is no mechanism for ensuring trust, the quality of software is uneven, and it is difficult to track down bad actors.

One reason for these flaws is that from the 1960s through the 1980s the engineers who designed the network’s underlying technology were concerned about reliable, rather than secure, communications. That is starting to change with the introduction of Secure DNS by governments and other organizations.

The event in Singapore capped a process that began more than a year ago and is expected to be complete after 300 so-called top-level domains have been digitally signed, around the end of the year. Before the Singapore event, 70 countries had adopted the technology, and 14 more were added as part of the event. While large countries are generally doing the technical work to include their own domains in the system, the consortium of Internet security specialists is helping smaller countries and organizations with the process.

The United States government was initially divided over the technology. The Department of Homeland Security included the .gov domain early in 2009, while the Department of Commerce initially resisted including the .us domain because some large Internet corporations opposed the deployment of the technology, which is incompatible with some older security protocols.

Internet security specialists said the new security protocol would initially affect Web traffic and e-mail. Most users should be mostly protected by the end of the year, but the effectiveness for a user depends on the participation of the government, Internet providers and organizations and businesses visited online. Eventually the system is expected to have a broad effect on all kinds of communications, including voice calls that travel over the Internet, known as voice-over-Internet protocol.

“In the very long term it will be voice-over-I.P. that will benefit the most,” said Bill Woodcock, research director at the Packet Clearing House, a group based in Berkeley, Calif., that is assisting Icann, the Internet governance organization, in deploying Secure DNS.

Secure DNS makes it possible to make phone calls over the Internet secure from eavesdropping and other kinds of snooping, he said.

Security specialists are hopeful that the new Secure DNS system will enable a global authentication scheme that will be more impenetrable and less expensive than an earlier system of commercial digital certificates that proved vulnerable in a series of prominent compromises.

The first notable case of a compromise of the digital certificates — electronic documents that establish a user’s credentials in business or other transactions on the Web — occurred a decade ago when VeriSign, a prominent vendor of the certificates, mistakenly issued two of them to a person who falsely claimed to represent Microsoft.

Last year, the authors of the Stuxnet computer worm that was used to attack the Iranian uranium processing facility at Natanz were able to steal authentic digital certificates from Taiwanese technology companies. The certificates were used to help the worm evade digital defenses intended to block malware.

In March, Comodo, a firm that markets digital certificates, said it had been attacked by a hacker based in Iran who was trying to use the stolen documents to masquerade as companies like Google, Microsoft, Skype and Yahoo.

“At some point the trust gets diluted, and it’s just not as good as it used to be,” said Rick Lamb, the manager of Icann’s Secure DNS program.

The deployment of Secure DNS will significantly lower the cost of adding a layer of security, making it more likely that services built on the technology will be widely available, according to computer network security specialists. It will also potentially serve as a foundation technology for an ambitious United States government effort begun this spring to create a system to ensure “trusted identities” in cyberspace.