– has again dismissed rumours suggesting it is linked to the public
health crisis, saying it has been “badly hurt” by conspiracy theories
circulating online.
“The
rumours … have caused severe damage to our researchers who have been
dedicated to working on the front line, and seriously interrupted the
emergency research we are doing during the epidemic,” the Wuhan
Institute of Virology (WIV), which is affiliated with the Chinese
Academy of Sciences, said in a statement.
Those
rumours included that the new virus strain was “man-made”, “leaked from
the WIV lab”, that “the WIV was taken over by the military”, “a WIV
researcher died from the leaked virus”, “a WIV student is patient zero”,
and “a WIV researcher reported to authorities that the WIV chief was
responsible” for the epidemic, the statement posted on its website on
Wednesday said.
The institute runs the Wuhan National Biosafety Laboratory, the only
facility in China equipped to diagnose and research easily transmitted
pathogens at the highest biosafety level of four.
“Looking back on our hard work over the past month, we have nothing to be ashamed of or to regret,” the statement said.
A prominent virologist with the institute has also been targeted by the rumours. Shi Zhengli’s exploration of caves in Yunnan province discovered that another deadly coronavirus – which caused the severe
acute respiratory syndrome, or Sars, epidemic in 2002-03 – had
originated in bats. Her database of viruses found in bats provided
evidence for the theory that the coronavirus at the centre of the
ongoing epidemic was also linked to bats. The new virus strain was found
to be 96 per cent identical to one found in bats.
I'm not a virologist and don't pretend to be. But I can read a fugging manual with the best of them, and understand what I've read. That said, slowly reread the nature paper from 2015 yourself.
Therefore, to examine the emergence potential (that is, the potential to
infect humans) of circulating bat CoVs, we built a chimeric virus
encoding a novel, zoonotic CoV spike protein—from the RsSHC014-CoV
sequence that was isolated from Chinese horseshoe bats1—in
the context of the SARS-CoV mouse-adapted backbone. The hybrid virus
allowed us to evaluate the ability of the novel spike protein to cause
disease independently of other necessary adaptive mutations in its
natural backbone. Using this approach, we characterized CoV infection
mediated by the SHC014 spike protein in primary human airway cells and in vivo,
and tested the efficacy of available immune therapeutics against
SHC014-CoV. Together, the strategy translates metagenomics data to help
predict and prepare for future emergent viruses.
NYTimes | Despite the new virus’s name, though, and
as the people who christened it well know, nCoV-2019 isn’t as novel as
you might think.
Something very much
like it was found several years ago in a cave in Yunnan, a province
roughly a thousand miles southwest of Wuhan, by a team of perspicacious
researchers, who noted its existence with concern. The fast spread of
nCoV-2019 — more than 4,500 confirmed cases,
including at least 106 deaths, as of Tuesday morning, and the figures
will have risen by the time you read this — is startling but not
unforeseeable. That the virus emerged from a nonhuman animal, probably a
bat, and possibly after passing through another creature, may seem
spooky, yet it is utterly unsurprising to scientists who study these
things.
One such scientist is Zheng-Li Shi, of the Wuhan Institute of Virology, a senior author of the draft paper
(not yet peer reviewed and so far available only in preprint) that gave
nCoV-2019 its identity and name. It was Ms. Shi and her collaborators
who, back in 2005, showed that
the SARS pathogen was a bat virus that had spilled over into people.
Ms. Shi and colleagues have been tracing coronaviruses in bats since
then, warning that some of them are uniquely suited to cause human
pandemics.
In a 2017 paper, they set out how, after nearly five years of collecting fecal samples from bats in the Yunnan cave, they had found coronaviruses in multiple individuals of four different species of bats, including one called the intermediate horseshoe bat,
because of the half-oval flap of skin protruding like a saucer around
its nostrils. The genome of that virus, Ms. Shi and her colleagues have
now announced, is 96 percent identical to the Wuhan virus that has
recently been found in humans. And those two constitute a pair distinct
from all other known coronaviruses, including the one that causes SARS.
In this sense, nCoV-2019 is novel — and possibly even more dangerous to
humans than the other coronaviruses.
I'm not a virologist and don't pretend to be. But I can read a fugging manual with the best of them, and understand what I've read. That said, slowly reread the nature paper from 2015 yourself.
Therefore, to examine the emergence potential (that is, the potential to
infect humans) of circulating bat CoVs, we built a chimeric virus
encoding a novel, zoonotic CoV spike protein—from the RsSHC014-CoV
sequence that was isolated from Chinese horseshoe bats1—in
the context of the SARS-CoV mouse-adapted backbone. The hybrid virus
allowed us to evaluate the ability of the novel spike protein to cause
disease independently of other necessary adaptive mutations in its
natural backbone. Using this approach, we characterized CoV infection
mediated by the SHC014 spike protein in primary human airway cells and in vivo,
and tested the efficacy of available immune therapeutics against
SHC014-CoV. Together, the strategy translates metagenomics data to help
predict and prepare for future emergent viruses.
Shi Zhengli - you know you done f'd up....,
Mebbe what I'm watching from other "gain of function" virologists is a poster-child instance of the Weinstein's Distributed Information Suppression Complex?
The Proximal Origin of SARS-C0V2
virological |Since the first reports of a novel pneumonia (COVID-19) in
Wuhan city, Hubei province, China there has been considerable discussion
and uncertainty over the origin of the causative virus, SARS-CoV-2.
Infections with SARS-CoV-2 are now widespread in China, with cases in
every province. As of 14 February 2020, 64,473 such cases have been
confirmed, with 1,384 deaths attributed to the virus. These official
case numbers are likely an underestimate because of limited reporting of
mild and asymptomatic cases, and the virus is clearly capable of
efficient human-to-human transmission. Based on the possibility of
spread to countries with weaker healthcare systems, the World Health
Organization has declared the COVID-19 outbreak a Public Health
Emergency of International Concern (PHEIC). There are currently neither
vaccines nor specific treatments for this disease.
SARS-CoV-2 is the seventh member of the Coronaviridae
known to infect humans. Three of these viruses, SARS CoV-1, MERS, and
SARS-CoV-2, can cause severe disease; four, HKU1, NL63, OC43 and 229E,
are associated with mild respiratory symptoms. Herein, we review what
can be deduced about the origin and early evolution of SARS-CoV-2 from
the comparative analysis of available genome sequence data. In
particular, we offer a perspective on the notable features in the
SARS-CoV-2 genome and discuss scenarios by which these features could
have arisen. Importantly, this analysis provides evidence that
SARS-CoV-2 is not a laboratory construct nor a purposefully manipulated
virus.
Say What?
The genomic comparison of both alpha- and betacoronaviruses (family Coronaviridae
) described below identifies two notable features of the SARS-CoV-2
genome: (i) based on structural modelling and early biochemical
experiments, SARS-CoV-2 appears to be optimized for binding to the human
ACE2 receptor; (ii) the highly variable spike (S) protein of SARS-CoV-2
has a polybasic (furin) cleavage site at the S1 and S2 boundary via the
insertion of twelve nucleotides. Additionally, this event led to the
acquisition of three predicted O-linked glycans around the polybasic
cleavage site.
Nobody
knew this better than the kings of the ancient world. That’s why they
gave themselves an absolute monopoly on minting moolah.
They
turned shiny metal into coins, paid their soldiers and their soldiers
bought things at local stores.
The king then sent their soldiers to the
merchants with a simple message:
“Pay your taxes in this coin or we’ll kill you.”
That’s
almost the entire history of money in one paragraph. Coercion and
control of the supply with violence, aka the “violence hack.” The one
hack to rule them all.
When
power passed from monarchs to nation-states, distributing power from
one strongman to a small group of strongmen, the power to print money
passed to the state. Anyone who tried to create their own money got
crushed.
The reason is simple:
Centralized
enemies are easy to destroy with a “decapitation attack.” Cut off the
head of the snake and that’s the end of anyone who would dare challenge
the power of the state and its divine right to create coins.
Kings and nation states know the real golden rule: Control the money and you control the world.
And so it’s gone for thousands and thousands of years. The very first emperor of China, Qin Shi Huang
(260–210 BC), abolished all other forms of local currency and
introduced a uniform copper coin. That’s been the blueprint ever since.
Eradicate alternative coins, create one coin to rule them all and use
brutality and blood to keep that power at all costs.
In the end, every system is vulnerable to violence.
NYTimes | CIA ties to international drug trafficking date to
the Korean War. In 1949, two of Chiang Kai-shek's defeated generals, Li
Wen Huan and Tuan Shi Wen, marched their Third and Fifth Route armies,
with families and livestock, across the mountains to northern Burma.
Once installed, the peasant soldiers began cultivating the crop they
knew best, the opium poppy.
When China entered the Korean War, the CIA had a
desperate need for intelligence on that nation. The agency turned to the
warlord generals, who agreed to slip some soldiers back into China. In
return, the agency offered arms. Officially, the arms were intended to
equip the warlords for a return to China. In fact, the Chinese wanted
them to repel any attack by the Burmese.
Soon intelligence began to flow to Washington from
the area, which became known as the Golden Triangle. So, too, did
heroin, en route to Southeast Asia and often to the United States.
If the agency never condoned the traffic, it never
tried to stop it, either. The CIA did, however, lobby the Eisenhower
administration to prevent the Bureau of Narcotics and Dangerous Drugs,
the DEA's predecessor, from establishing monitoring posts in the area to
study the traffic. Today, the Golden Triangle accounts for about half
the heroin in circulation in the world.
During the Vietnam War, operations in Laos were
largely a CIA responsibility. The agency's surrogate there was a Laotian
general, Vang Pao, who commanded Military Region 2 in northern Laos. He
enlisted 30,000 Hmong tribesmen in the service of the CIA.
These tribesmen continued to grow, as they had for
generations, the opium poppy. Before long, someone - there were unproven
allegations that it was a Mafia family from Florida - had established a
heroin refining lab in Region Two. The lab's production was soon being
ferried out on the planes of the CIA's front airline, Air America. A
pair of BNDD agents tried to seize an Air America.
A pair of BNDD agents tried to seize an Air America
DC-3 loaded with heroin packed into boxes of Tide soap powder. At the
CIA's behest, they were ordered to release the plane and drop the
inquiry.
The CIA was made officially aware of Manuel Antonio
Noriega's involvement in the drug traffic in 1972, when Mr. Noriega was
chief of intelligence of the Panama National Guard, and a promising CIA
asset. The BNDD found evidence that Mr. Noriega was taking payoffs for
allowing heroin to flow from Spain, through Panama City airport, and on
to the United States. That information was part of a lengthy file on Mr.
Noriega compiled by Jack Ingersoll, then chief of the BNDD.
Mr. Ingersoll was aware of Mr. Noriega's ties to the
CIA, as was President Richard Nixon. When Mr. Nixon ordered Mr.
Ingersoll to Panama to warn the country's military dictator, General
Omar Torrijos, about the activities of Mr. Noriega and General
Torrijos's brother Moises, Mr. Ingersoll hoped that law enforcement was
finally "beginning to get the upper hand in its ongoing struggle with
the CIA." He was wrong. The Watergate break-in occurred shortly after
his visit. Mr. Nixon needed CIA support; his enthusiasm for the drug war
evaporated. Mr. Ingersoll's successors at the newly formed DEA - Peter
Bensinger, Francis Mullen and John Lawn - all told me they never saw his
file, although they had asked to see everything the DEA had on Mr.
Noriega. The material has disappeared.
Shortly after General Torrijos's death in a
mysterious airplane crash, Mr. Noriega, with CIA assistance, took
command of the Panama National Guard.
No one in the Reagan administration was prepared to
do anything about the Noriega drug connection. As Norman Bailley, a
National Security Council staff member at the time, told me, "The CIA
and the Pentagon were resolutely opposed to acting on that knowledge,
because they were a hell of a lot more worried about trying to keep
Panama on our side with reference to Nicaragua than they were about
drugs." Nowhere, however, was the CIA more closely tied to drug traffic
than it was in Pakistan during the Afghan War. As its principal conduit
for arms and money to the Afghan guerrillas, the agency chose the
Pakistan military's Inter-Services Intelligence Bureau. The ISI in turn
steered the CIA's support toward Gulbuddin Hekmatyar, an Islamic
fundamentalist. Mr. Hekmatyar received almost half of the agency's
financial support during the war, and his fighters were valiant and
effective. But many of his commanders were also major heroin
traffickers.
As it had in Laos, the heroin traffic blossomed in
the shadows of a CIA-sustained guerrilla war. Soon the trucks that
delivered arms to the guerrillas in Afghanistan were coming back down
the Khyber Pass full of heroin.
The conflict and its aftermath have given the world
another Golden Triangle: the Golden Crescent, sweeping through
Afghanistan, Pakistan and parts of the former Soviet Union. Many of
those involved in the drug traffic are men who were once armed, trained
and financed by the CIA.
ICH | In the Milwaukee debate, Hillary Clinton took pride in her role in a recent UN Security Council resolution on a Syrian ceasefire:
But I would add this. You know, the Security Council finally got
around to adopting a resolution. At the core of that resolution is an
agreement I negotiated in June of 2012 in Geneva, which set forth a
cease-fire and moving toward a political resolution, trying to bring
the parties at stake in Syria together.
This is the kind of compulsive misrepresentation that makes Clinton
unfit to be President. Clinton's role in Syria has been to help
instigate and prolong the Syrian bloodbath, not to bring it to a close.
In 2012, Clinton was the obstacle, not the solution, to a ceasefire
being negotiated by UN Special Envoy Kofi Annan. It was US
intransigence - Clinton's intransigence - that led to the failure of
Annan's peace efforts in the spring of 2012, a point well known among
diplomats. Despite Clinton's insinuation in the Milwaukee debate, there
was (of course) no 2012 ceasefire, only escalating carnage. Clinton
bears heavy responsibility for that carnage, which has by now displaced
more than 10 million Syrians and left more than 250,000 dead.
As every knowledgeable observer understands, the Syrian War is not
mostly about Bashar al-Assad, or even about Syria itself. It is mostly
a proxy war, about Iran. And the bloodbath is doubly tragic and
misguided for that reason.
Saudi Arabia and Turkey, the leading Sunni powers in the Middle East,
view Iran, the leading Shia power, as a regional rival for power and
influence. Right-wing Israelis view Iran as an implacable foe that
controls Hezbollah, a Shi'a militant group operating in Lebanon, a
border state of Israel. Thus, Saudi Arabia, Turkey, and Israel have all
clamored to remove Iran's influence in Syria.
This idea is incredibly naïve. Iran has been around as a regional power
for a long time--in fact, for about 2,700 years. And Shia Islam is not
going away. There is no way, and no reason, to "defeat" Iran. The
regional powers need to forge a geopolitical equilibrium that
recognizes the mutual and balancing roles of the Gulf Arabs, Turkey,
and Iran. And Israeli right-wingers are naïve, and deeply ignorant of
history, to regard Iran as their implacable foe, especially when that
mistaken view pushes Israel to side with Sunni jihadists.
Yet Clinton did not pursue that route. Instead she joined Saudi Arabia,
Turkey, and right-wing Israelis to try to isolate, even defeat, Iran.
In 2010, she supported secret negotiations between Israel and Syria to attempt to wrest Syria from Iran's influence. Those talks failed. Then the CIA and Clinton pressed successfully for Plan B: to overthrow Assad.
When the unrest of the Arab Spring broke out in early 2011, the CIA and
the anti-Iran front of Israel, Saudi Arabia, and Turkey saw an
opportunity to topple Assad quickly and thereby to gain a geopolitical
victory. Clinton became the leading proponent of the CIA-led effort at
Syrian regime change.
HuffPo | Sunni insurgents from an al Qaeda splinter group extended their control
from the northern city of Mosul on Wednesday to an area further south
that includes Iraq's biggest oil refinery in a devastating show of
strength against the Shi'ite-led government.
Security
sources said militants from the Islamic State in Iraq and the Levant
(ISIL) - Sunni militants waging sectarian war on both sides of the
Iraqi-Syrian frontier - drove into the town of Baiji late on Tuesday in
armed vehicles, torching the court house and police station after
freeing prisoners.
The militants offered safe
passage to some 250 men guarding the refinery on the outskirts of
Baiji, about 200 kilometers south of Mosul, on condition they leave.
Iraq's
Foreign Minister Hoshyar Zebari called on his country's leaders to
come together to face "the serious, mortal" threat. "The response has
to be soon. There has to be a quick response to what has happened," he
said during a trip to Greece.
Zebari said Baghdad would work with forces from the nearby Kurdish autonomous region to drive the fighters from Mosul.
Baiji
resident Jasim al-Qaisi said the militants had also asked senior
tribal chiefs in Baiji to persuade local police and soldiers not to
resist their takeover.
"Yesterday at sunset some
gunmen contacted the most prominent tribal sheikhs in Baiji via
cellphone and told them: 'We are coming to die or control Baiji, so we
advise you to ask your sons in the police and army to lay down their
weapons and withdraw before (Tuesday) evening prayer'."
The
Baiji refinery can process 300,000 barrels per day and supplies oil
products to most of Iraq's provinces and is a major provider of power
to Baghdad. A worker there said the morning shift had not been allowed
to take over and the night shift was still on duty.
The
push into Baiji began hours after ISIL overran Mosul, one of the great
Sunni historic cities, advancing their aim of creating a Sunni
Caliphate straddling the border between Iraq and Syria.
guardian | Massacres of civilians are being exploited for narrow geopolitical competition to control Mideast oil, gas pipelines. Few recall that US agitation against Syria began long before recent atrocities, in the context of wider operations targeting Iranian influence across the Middle East.
In May 2007, a presidential finding
revealed that Bush had authorised CIA operations against Iran.
Anti-Syria operations were also in full swing around this time as part
of this covert programme, according to Seymour Hersh in the New Yorker.
A range of US government and intelligence sources told him that the
Bush administration had "cooperated with Saudi Arabia's government,
which is Sunni, in clandestine operations" intended to weaken the
Shi'ite Hezbollah in Lebanon. "The US has also taken part in clandestine
operations aimed at Iran and its ally Syria," wrote Hersh, "a
byproduct" of which is "the bolstering of Sunni extremist groups"
hostile to the United States and "sympathetic to al-Qaeda." He noted
that "the Saudi government, with Washington's approval, would provide
funds and logistical aid to weaken the government of President Bashir
Assad, of Syria," with a view to pressure him to be "more conciliatory
and open to negotiations" with Israel. One faction receiving covert US
"political and financial support" through the Saudis was the exiled
Syrian Muslim Brotherhood.
According to former French foreign minister Roland Dumas,
Britain had planned covert action in Syria as early as 2009: "I was in
England two years before the violence in Syria on other business", he
told French television:
"I met with top British
officials, who confessed to me that they were preparing something in
Syria. This was in Britain not in America. Britain was preparing gunmen
to invade Syria."
So what was this unfolding strategy to undermine Syria and Iran all about? According to retired NATO Secretary General Wesley Clark,
a memo from the Office of the US Secretary of Defense just a few weeks
after 9/11 revealed plans to "attack and destroy the governments in 7
countries in five years", starting with Iraq and moving on to "Syria,
Lebanon, Libya, Somalia, Sudan and Iran." In a subsequent interview,
Clark argues that this strategy is fundamentally about control of the region's vast oil and gas resources.
Much of the strategy currently at play was candidly described in a 2008 US Army-funded RAND report, Unfolding the Future of the Long War (pdf). The report noted that "the economies of the industrialized states will continue to rely heavily on oil,
thus making it a strategically important resource." As most oil will be
produced in the Middle East, the US has "motive for maintaining
stability in and good relations with Middle Eastern states":
rferl | U.S.-led military intervention in Syria would put Washington on a
collision course with two unwavering allies of Syrian President Bashar
al-Assad -- Iran and Russia.
Just how Tehran and Moscow might react is a key part of the calculus
that U.S. President Barack Obama must consider in weighing his course of
action in Syria.
Although analysts agree that neither country is likely to respond with
direct military support for Assad, they also don't expect Tehran or
Moscow to sit back passively. Iran's Islamic Revolutionary Guards Corps
(IRGC) has said that an attack against Assad is a "red line" that would
trigger a response, although it has not said what that response might
be.
Iran's reaction to date has been mild, with Tehran condemning both the
use of chemical weapons and threats of foreign military intervention.
According to Will Fulton, an Iran analyst with the American Enterprise
Institute in Washington, the IRGC would likely not risk a direct
confrontation with the United States but could act through proxies,
including Hizballah in Lebanon or Shi'ite militias in Iraq.
Tehran would also seek to capitalize on anti-U.S. reaction at home and
across the region. "I think we will absolutely see more condemnations,
more warnings from IRGC and hard-line officials, and this will of course
play into, especially, the IRGC's narrative that the conflict in Syria
is a conspiracy of Israel and the West," Fulton says. "So they will use
this attack to fuel that narrative and it will become a recruiting tool
and a narrative defense of their own foreign interference in Syria."
TheScientist | Though the mechanisms of engulfment may differ among cell and cancer types, the end result is nearly indistinguishable—a whole, living cell is housed within a large vacuole inside a tumor cell. Internalized cells usually follow one of three paths. They can continue living, at least temporarily, within the host cell, even dividing within their vacuole homes. Occasionally, they escape from the host cell to once again become a single, individual cell in the extracellular space. By and large, however, death is the most common fate for cells engulfed by tumor cells. Wang and colleagues demonstrated evidence of the apoptotic death of NK cells following their uptake by tumor cells. Nearly 90 percent of the internalized lymphocytes underwent traditional, programmed cell death, as evidenced by the activation of caspase 3. Work by Overholtzer’s group, on the other hand, suggests that cell engulfment between tumor cells represents a different type of cell death altogether—one mediated by lysosomes. The vacuoles housing the internalized tumor cells, his group observed, became acidic and surrounded by lysosomal membranes, indicative of fusion with lysosomes. Furthermore, when the researchers overexpressed B-cell lymphoma 2 (Bcl-2) to inhibit apoptosis, it had little effect on the death of internalized cells. On the other hand, inhibiting lysosomal acidification of the vacuoles could rescue the captured cells, when it was combined with apoptotic inhibitors. Interestingly, when only the lysosomal inhibitors were introduced, more cells appeared to undergo an apoptotic death, suggesting that apoptosis serves as a backup mechanism to the more common lysosomal death of the internalized cells.
Fais suggests it is simply the acidic environment of the tumor-cell vacuoles in metastatic melanoma cells that kills the internalized lymphocytes, though lytic enzymes may help to further digest the cell, he says. He argues that the engulfment and subsequent killing of cells such as lymphocytes is cell cannibalism in the most literal sense—one cell eating another. Once the victim is digested, the tumor cell can theoretically derive nutrients from it, promoting cancer survival and growth.
“We know that nutritional stress is a common feature of tumors,” says Eileen White, a cancer biologist at The Cancer Institute of New Jersey and Rutgers University. “We know they’ll undergo this process of autophagy where they’ll eat themselves. If they have the capability of eating each other or other cells—that would open a whole new door for tumors to sustain themselves.”
As evidence for this hypothesis, Fais showed in vitro that cell cannibalism increased under starvation conditions, and that the ingestion of T cells promoted the survival of melanoma cells. “The T cell is great because it has all these wonderful complex carbohydrates on the surface,” says cancer biologist Thomas Seyfried of Boston College. “They can all be degraded to glucose and other fuels [that tumor cells] could be using.”
But even if cells are deriving nourishment from their cannibalistic activities, it’s likely not the only benefit of the behavior, says immunologist Yufang Shi, who studies apoptosis at the Chinese Academy of Sciences and the Child Health Institute of New Jersey. “For one cell to digest another cell and to get energy . . . this is very uneconomical,” Shi explains. “You have to really make the cell into amino acids and polysaccharides. It’s very hard to use that as energy.” The fact that cell cannibalism increased when the cells were starving may simply be due to the fact that nutrient deprivation can cause cells to become detached from the extracellular matrix, Shi added—an event that Overholtzer’s group suggests could promote cell engulfment as a result of imbalanced cell-cell adhesion forces.
Another possibility is that the engulfed cells are driving the process. Internalized immune cells, for example, may have the potential to suppress tumor growth. During his initial graduate studies in the 1980s and again when he resumed this work more recently, Wang observed that some NK cells internalized by tumor cells can actually kill their host cells from the inside out. “After they enter into the tumor cells, they make the tumor cells erupt,” Wang says. “When [these NK cells] die, they also release a lot of enzymes,” Shi explains. “They are cytotoxic cells, so they can kill by releasing directly into the target cell, like the suicide bombers.”
But whether the internalized NK cells are initiating the engulfment is still unclear. If, on the other hand, the tumor cells are actively consuming the lymphocytes, it could provide a way for cancer to evade attack by the immune system. “I have a suspicion that maybe tumor [cells] in some conditions can kill the NK cells as a way to escape the surveillance of the immune system,” Wang says. This may become particularly important as the cancer metastasizes, Yao adds. “One of the physical challenges for those tumor cells will be how to survive in the new sites. One way is by taking [up] those NK cells and other immune cells to damage the immune response of cancer [patients].”
The bizarre phenomenon may also contribute to the genetic instability of cells, perhaps contributing to the formation of cancer early on. This March, Overholtzer and colleagues published the finding that cell-in-cell structures can act as cleavage barriers that disrupt cell division, leading to changes in ploidy—the number of sets of chromosomes in the cell—which are known to drive tumor progression.5 Conversely, cell engulfment may act to suppress tumor growth, such as when tumor cells eat other tumor cells. “Entosis has a dual nature,” says Overholtzer. “It clearly can kill [tumor] cells, but also, it can disrupt ploidy—one is predicted to be tumor suppressive, one is tumor promoting.”
For now, the question of function remains “a puzzle,” Fais says, and “I don’t have all the pieces.” But with evidence growing for significance of cell engulfment in tumor pathogenesis, researchers are now considering whether the phenomenon could serve to aid in diagnosis or in the development of new cancer treatments. “I think in the next few years this will be a very active field,” Shi says.
Telegraph | The existential crisis for the world's nuclear industry could hardly have come at a worse moment. The epicentre of the world's oil supply is disturbingly close to its own systemic crisis as the Gulf erupts in conflict.
Libya's civil war has cut global crude supply by 1.1m barrels per day (bpd), eroding Opec's spare capacity to a wafer-thin margin of 2m bpd, if Goldman Sachs is correct.
Now events in the Gulf have turned dangerous after Saudi Arabia sent troops into Bahrain to help the Sunni monarchy crush largely Shi'ite dissent, risking a showdown with Iran.
Russia's finance minister Alexei Kudrin warned on Wednesday that the confluence of events in Japan and the Mid-East could push oil to $200 a barrel in a "short-lived" spike, which would snuff out global recovery.
While there has been no loss of oil output in the Gulf so far, the violent crackdown in Manama on Wednesday left four people dead and risks inflaming the volatile geopolitics of the region. The rout of protesters encamped at the Pearl roundabout had echoes of China's Tiananmen massacre.
The risk group Exclusive Analysis said such heavy-handed methods may provoke Iran to launch a proxy war by arming insurgents. This could rapidly cross the border, fuelling Shia irredentism in Saudi Arabia's Eastern Province. Any threat to Saudi control over the 5m bpd Ghawar oil field nearby would be a global "game-changer". "Much worse headlines can easily be imagined," said Raza Agha from RBS.
medialens | The UK and US media smears described in Part 1 should be kept in mind when considering the gravity and importance of the latest WikiLeaks. In addition to thousands of previously unreported civilian killings, the leaks revealed more than 1,300 claims of torture by Iraqi police and military between 2005 and 2009. More than 180,000 people were detained at some point between 2004 and 2009, or one in 50 Iraqi males.
But these are only the incidents the US military knew about, or chose to know about, or chose to report; and the documents are an unknown sample of all documentation held by the US government. There are, for example, no reports from the “shock and awe” year of 2003, and none from the tens of thousands of after-attack Pentagon bombing assessments. The leaks also report no civilian deaths in major US atrocities, including the offensive that devastated Fallujah in 2004.
The leaks corroborate previous allegations that US forces turned over prisoners to the Wolf Brigade, the feared 2nd battalion of the Iraqi interior ministry's commandos, infamous for their torture and extra judicial killings. This was not merely ‘turning a blind eye’ to torture, as investigative journalist Gareth Porter notes: “The implication was that the Shi'a commandos would be able to extract more information from the detainees than would be allowed by U.S. rules.”
US forces, then, were complicit in the torture. Indeed, under international law, as the occupying power, the coalition is accountable for all of these crimes.
US troops are actually commanded to not investigate the tortures by an order called Frago 242. Issued in June 2004, this instructs coalition troops not to investigate any abuse of detainees unless it directly involves members of the coalition. Where the alleged abuse is committed by Iraqi forces on Iraqis, "only an initial report will be made... No further investigation will be required unless directed by HQ". The leaks reveal that the US military was also aware that the Iraqi government had murdered detainees.
Civilian Deaths - The “Standard Accepted Figure” The leaks reveal, not just a staggering level of violence and criminality in occupied Iraq, but also the determination of the Iraqi government and US forces to hide civilian casualties.
This is hardly surprising and fits with evidence that the US and UK governments have worked hard to smear credible scientific analysis of the likely death toll. A recent study by Professor Brian Rappert of the University of Exeter reported of the UK government: “deliberations were geared in a particular direction – towards finding grounds for rejecting the [2004] Lancet study [estimating almost 100,000 Iraqi deaths from the war] without any evidence of countervailing efforts by government officials to produce or endorse alternative other studies or data”.
Nevertheless, with a near-uniform intellectual sleight of hand, journalists have managed to turn evidence that civilian casualties are likely much higher (as much as ten times higher) than most media have been reporting into evidence that casualties are perhaps 15 per cent higher. As one seasoned journalist told us privately, “WikiLeaks has been Guardianised” - their true significance has been disarmed, defanged and contained by the media.
Concerning to interesting theme on music, I would like to pay attention on physiological aspects of music and their connection with genetic code.
From the information viewpoint, living organisms are information essences. They live due to receiving of the genetic information from the ancestors, and they exist to transfer the genetic information to their descendants. In the biological literature it is possible quite often now to meet the statement that living organisms are the texts since a molecular level of their organization. Just from the information-hereditary viewpoint, all living organisms are unified wonderfully: all of them have identical bases of system of genetic coding (from many other possible viewpoints - for example, locomotion, metabolisms, etc -, living organisms have no such unification, they are differ one from another in many cases).
All heritable physiological aspects of living organisms are co-ordinated with basic structures of genetic code (heritable physiological subsystems of organism can’t be transmitted to next biological generations without such agreement with basic mechanisms of genetic coding).
It’s well known, that special musical forms have essential physiological possibilities to stimulate processes of biological growth, to have therapy effects, etc. So, it can be supposed, that these musical forms are connected (co-ordinated) with genetic coding system structurally. And interesting question is the following: on the base of using of our modern scientific knowledge of structures of genetic code, can we create musical forms which will be else more effective in physiological aspects to use them in the field of mass media, medicine, ergonomics, sport, etc?
My own investigations in this direction are connected with new results on genetic code structures. These results are described at the FIS site http://fis.iguw.tuwien.ac.at/recources/papers.html in my article “Genetic Code and the Ancient Chinese “Book of Changes”” . An existence of binary sub-alphabets of genetic code was shown and a biperiodic octet table of 64 genetic triplets was constructed by me there. This genetic biperiodic table was coincided practically with a historical famous table of 64 hexagrams of the Ancient Chinese “Book of Changes””, written several thousands years ago (according to Ancient Chinese statements, the system of this Book is the main archetype of all nature; this system is a base for many branches of Orient medicine, culture, philosophy, etc.). If “physiological music” has a connection with genetic code, the question on its connection with this ancient conception of archetypes is urgent. According to Ancient Chinese statements, “music is that that represents a harmony of sky and earth, a co-ordination of Yin and Yang” (“Lui shi chun tsu”).
Some of these questions are considered in a special paragraph “Genetic code and music» in my book: S.V.Petoukhov “Biperiodic Table of Genetic Code and Number of Protons”, Moscow, 2001, 258 p. (in Russian; information on this book, on its content, etc. in English is at site http://members.tripod.com/vismath/sg/petoukhov.htm ).
I believe that binary sub-alphabets of genetic code and its biperiodic table permit to investigate a language of music more deeply and to create special forms of musical compositions characterized by the most physiological activity (so named “genetic music” or “genomusic”). Perhaps, due to its structural relationship with genetic code, this genetic music will be addressed to Jungian archetypes of people by the shortest route. (By the way, Carl Jung was connoisseur and profound expert of this “Book of Changes”, and the biperiodic table of genetic code has a connection with Jungian archetypes).
This theme of “genetic structured” music is a small addition to very interesting works by Juan Roederer è Michael Leyton, discussed on this session. In my opinion, physiological mechanisms and mathematical formalisms, analyzed by them for a theory of musical perception, should be coordinated (adjusted) with the specific structure of genetic code. The biological evolution can be interpreted in a whole as a process of deployment and duplicating of the certain forms of ordering (they can be named as “archetypes”). This thesis has a realization in physiological effective music also.
A Foundation of Joy
-
Two years and I've lost count of how many times my eye has been operated
on, either beating the fuck out of the tumor, or reattaching that slippery
eel ...
April Three
-
4/3
43
When 1 = A and 26 = Z
March = 43
What day?
4 to the power of 3 is 64
64th day is March 5
My birthday
March also has 5 letters.
4 x 3 = 12
...
Return of the Magi
-
Lately, the Holy Spirit is in the air. Emotional energy is swirling out of
the earth.I can feel it bubbling up, effervescing and evaporating around
us, s...
New Travels
-
Haven’t published on the Blog in quite a while. I at least part have been
immersed in the area of writing books. My focus is on Science Fiction an
Historic...
Covid-19 Preys Upon The Elderly And The Obese
-
sciencemag | This spring, after days of flulike symptoms and fever, a man
arrived at the emergency room at the University of Vermont Medical Center.
He ...