Showing posts sorted by date for query shi. Sort by relevance Show all posts
Showing posts sorted by date for query shi. Sort by relevance Show all posts

Friday, April 03, 2020

Might I Owe Wuhan Virological Institute Director Shi Zhengli An Apology?


WashingtonTimes |  Chinese government researchers isolated more than 2,000 new viruses, including deadly bat coronaviruses, and carried out scientific work on them just three miles from a wild animal market identified as the epicenter of the COVID-19 pandemic.

Several Chinese state media outlets in recent months touted the virus research and lionized in particular a key researcher in Wuhan, Tian Junhua, as a leader in bat virus work.

The coronavirus strain now infecting hundreds of thousands of people globally mutated from bats believed to have infected animals and people at a wild animal market in Wuhan. The exact origin of the virus, however, remains a mystery.

Reports of the extensive Chinese research on bat viruses likely will fuel more calls for Beijing to make public what it knows about such work.

“This is one of the worst cover-ups in human history, and now the world is facing a global pandemic,” Rep. Michael T. McCaul, Texas Republican and ranking member of the House Foreign Affairs Committee, said last week. Mr. McCaul has said China should be held accountable for the pandemic.

A video posted online in December and funded by the Chinese government shows Mr. Tian inside caves in Hubei province taking samples from captured bats and storing them in vials.

“I am not a doctor, but I work to cure and save people,” Mr. Tian says in the video. “I am not a soldier, but I work to safeguard an invisible national defense line.”

Sunday, March 08, 2020

I'm NOT The Only Cat Seriously Fixated On The Low-Hanging Cornucopia Of SARS-CoV2 Fruit


harvardtothebighouse |  Some of the dystopian carnage creeping across China may be due to the fact that much of China’s population may have already been exposed to coronavirus infection via SARS or other less notorious strains, which would allow the Wuhan Stain COVID-19 to use antibody-dependent enhancement to much more efficiently enter into cells, and then become much more virulent since this enhancement hijacks the body’s preexisting immune response to coronavirus infections and allows easier entry. However whether or not people have been exposed to a coronavirus infection before, once it’s been circulating in a population for long enough the Wuhan Strain may be able to reinfect its own past hosts and use this molecular hijacking on antibodies left from its own previous infection to become far more virulent, regardless of whether or not someone has been exposed to other coronaviruses before COVID-19. And early reporting from Chinese doctors indicates that re-infections of the Wuhan Strain are far more lethal than the first.

– Additionally, although another since-retracted pre-print noted several very short genomic sequences in COVID-19’s spike-protein gene that look far more similar to sequences found in HIV than to other coronaviruses – critics quickly pointed out that the shared homology didn’t reach statistical significance. However a closer look at the data reveals that there were a few small shared genomic segments that, despite being physically separated from each other along each strand of DNA, all worked together to code for the Wuhan Strain’s protein-spike’s crucial receptor binding site. Something that is highly unlikely to have happened by chance. And despite most of its protein-spike being shared with SARS, these substituted segments weren’t shared at all – nor were they found in any other coronavirus. One possible but likely reason for these HIV-like segments is that they were meant to be epitopes, or molecular flags meant to mark intruders for a vaccine to target. It is mathematically possible for this to happen in nature – but only in a ten-thousand bats chained to ten-thousand Petri dishes and given until infinity sense. Alternatively, it could also be produced by infecting a room full of ferrets with a bespoke coronavirus vaccine and sifting through the wreckage for your genomic needle.

– Critics have brushed off the Wuhan Strain’s shared homology with HIV as statistically insignificant, however clinical reporting indicates that the Wuhan Strain may be using this shared HIV homology to attack CD4 immune cells just like HIV does, as an unusually high percentage of patients are showing low white blood cell counts, especially the sickest ones. This pathogenicity may well be due to the unique HIV-live genomics of the Wuhan Strain, as one white-paper by LSU’s professor emeritus of Microbiology, Immunology, and Parasitology who’s also a Harvard-educated virologist with a PhD in Microbiology and Molecular Genetics notes: “This is the first description of a possible immunosuppressive domain in coronaviruses… The three key [mutations] common to the known immunosuppressive domains are also in common with the sequence from [the spike-protein]. While coronaviruses are not known for general immunosuppression of the style shown by HIV-1, this does not rule out immunosuppression at the site of active infection in the lung, which would prolong and potentially worsen infection at that site.” And early research has indicated that this unique region may make COVID-19 up to 1,000 times more likely to bind to human cells than SARS.

– Even more troubling, a peer-reviewed study noted that one particular part of the Wuhan Strain’s spike-protein genome also wasn’t found in any of its relatives, “and may provide a gain-of-function to [COVID-19] for efficient spreading in the human population.”  And according to that paper, this particular type of furin cleavage site makes similar viruses both more pathogenic and more neurotoxic.

– Evidence for the Wuhan Strain’s neurotoxicity arrived in late February, in a published paper which notes that “the most characteristic symptom of COVID‐19 patients is respiratory distress, and most of the patients admitted to the intensive care could not breathe spontaneously.” Combined with the observation that “some COVID‐19 patients also showed neurologic signs such as headache, nausea and vomiting,” this paper asserts that since SARS was found heavily concentrated in the brainstems of its autopsied victims, COVID-19 is also probably crossing the blood-brain barrier and killing its victims not just via pneumonia, but also by causing neurological respiratory failure.

– And it should be noted that SARS – much ballyhooed as a close relative to the Wuhan Strain – didn’t notable effect white blood cell counts.  Additionally, clinical treatment guides published online in late January by established Chinese medical sources note the progressive reduction of white blood cells, as well as the importance of monitoring this decline. And reporting from Thailand indicates that adding a cocktail of two different anti-HIV drugs to the typical flu treatment regime seemed to effectively knock back the Wuhan Strain. Additionally, one of the only autopsies performed outside of China to date found that the deceased had a severely depleted white blood cell count. These lowered counts may come from this shared similarity with HIV, or it could also be the result of antibody-dependent enhancement as well, since this phenomenon primarily targets white blood cells for its hijackings and may help explain why consecutive infections are so lethal.

– In a highly concerning turn, scientists have noted that the Wuhan Strain can have a “striking” short term rate of mutation which doesn’t indicate an artificial origin but captures the unique threat posed by this coronavirus regardless of its providence, since a faster mutation rates makes it more likely this virus can dodge testing and neutralize vaccines. Something there is already early evidence for. Further concerning are reports out of China that even patients who appear cured still harbor COVID-19 in their system, and although the full implications of this are not yet known – none of them are good.

– One of the worst possible scenarios for COVID-19’s mutation rate would be if it falls into the Goldilocks range that would allow it to form mutant viral swarms: too many mutations will cause a virus to eventually implode, not enough allows host immune systems to catch-up, but if things are just right mutant swarms can form and spread across host populations, burrowing into host nervous systems and causing permanent neurological damage. Mutant swarms form when a virus produces mutationally-damaged copies of itself inside a host, some of which aren’t infectious but find their way into the nervous system where they burrow in causing damage, and others that combine with complimentary broken copies inside host cells to produce working infectious copies of the virus. So a host can not only become crippled with neurological issues, but also still be producing infectious copies of the virus. And it seems as if COVID-19 has many characteristics that indicate the potential to form mutant swarms: the “striking” mutation rate mentioned above and the fact a second widespread mutated strain seems to have already emerged in Washington State with many other isolated strains reported elsewhere, crossing between species is another factor and a dog in Hong Kong appears to have tested positive, the fact that the Wuhan Strain can infect not only the respiratory tract but feces as well – multi-organ involvement is an important contributor to viral swarms, and finally the markedly viral load rate of COVID-19 compared to SARS – SARS produced a viral load several times lower which decreased over time, while COVID-19 produces a “very high” viral load that appears to increase over time and can peak several orders of magnitude higher than SARS was measured to reach. And alarming evidence that this phenomenon is occurring emerged from a Chinese pre-print which noted that over one-third of the roughly 200 patients studied has some neurological symptoms, with nearly half of the most severe patients exhibiting neurological issues.

– Another exceptional trait of the Wuhan Strain COVID-19 is that not only does it form its own clade, it’s calculated to have diverged from SARS and its other sister coronaviruses some 260 years ago. And yet in all that time, while it every other branch of the coronavirus tree was busy branching-off into countless variants, if it emerged naturally, COVID-19 somehow spent a quarter of a millennium as the lone known example of its clade, somehow not mutating into related lineages in all that time. Another simpler explanation is that this apparent hereditary distance and genetic uniqueness is the just the result of being altered in a lab. And although two distinct strains of COVID-19 have been identified, there’s no reason to believe this mutational differentiation happened before contact with humans in December of 2019. Additionally, when neutral sites, the specific points in the genome which most reliably show evolutionary change, were examined: COVID-19 looks even more evolutionarily distant from any of its possible relatives.

– Also giving credence to the idea that the Wuhan Strain was bio-engineered is the existence of a patent application registered to a scientist from Wuhan that looks to modulate a coronavirus’ spike-protein genes – the precise region altered by Zhengli Shi at UNC to make a hyper-virulent strain of coronavirus, and whose alteration and adaptation would explain the Wuhan Strain’s unusual behavior as discussed above.

Tuesday, March 03, 2020

Wuhan Institute of Virology: HATERS HURT'N MY FEELINGS! I DINDU NUFFIN!!!


SCMP |  A Chinese research institute in the city of Wuhan – ground zero of the coronavirus outbreak
– has again dismissed rumours suggesting it is linked to the public health crisis, saying it has been “badly hurt” by conspiracy theories circulating online.
 
“The rumours … have caused severe damage to our researchers who have been dedicated to working on the front line, and seriously interrupted the emergency research we are doing during the epidemic,” the Wuhan Institute of Virology (WIV), which is affiliated with the Chinese Academy of Sciences, said in a statement.

Those rumours included that the new virus strain was “man-made”, “leaked from the WIV lab”, that “the WIV was taken over by the military”, “a WIV researcher died from the leaked virus”, “a WIV student is patient zero”, and “a WIV researcher reported to authorities that the WIV chief was responsible” for the epidemic, the statement posted on its website on Wednesday said.

The institute runs the Wuhan National Biosafety Laboratory, the only facility in China equipped to diagnose and research easily transmitted pathogens at the highest biosafety level of four.

“Looking back on our hard work over the past month, we have nothing to be ashamed of or to regret,” the statement said.

A prominent virologist with the institute has also been targeted by the rumours. Shi Zhengli’s exploration of caves in Yunnan province discovered that another deadly coronavirus – which caused the severe acute respiratory syndrome, or Sars, epidemic in 2002-03 – had originated in bats. Her database of viruses found in bats provided evidence for the theory that the coronavirus at the centre of the ongoing epidemic was also linked to bats. The new virus strain was found to be 96 per cent identical to one found in bats.

---------------------------------------------------------------------------------------------------------------------------
 
I'm not a virologist and don't pretend to be. But I can read a fugging manual with the best of them, and understand what I've read. That said, slowly reread the nature paper from 2015 yourself. 
Therefore, to examine the emergence potential (that is, the potential to infect humans) of circulating bat CoVs, we built a chimeric virus encoding a novel, zoonotic CoV spike protein—from the RsSHC014-CoV sequence that was isolated from Chinese horseshoe bats1—in the context of the SARS-CoV mouse-adapted backbone. The hybrid virus allowed us to evaluate the ability of the novel spike protein to cause disease independently of other necessary adaptive mutations in its natural backbone. Using this approach, we characterized CoV infection mediated by the SHC014 spike protein in primary human airway cells and in vivo, and tested the efficacy of available immune therapeutics against SHC014-CoV. Together, the strategy translates metagenomics data to help predict and prepare for future emergent viruses.


 

We Made The Coronavirus Epidemic: NYTimes Called Out Shi Zhengli A Month Ago


NYTimes |  Despite the new virus’s name, though, and as the people who christened it well know, nCoV-2019 isn’t as novel as you might think.

Something very much like it was found several years ago in a cave in Yunnan, a province roughly a thousand miles southwest of Wuhan, by a team of perspicacious researchers, who noted its existence with concern. The fast spread of nCoV-2019 — more than 4,500 confirmed cases, including at least 106 deaths, as of Tuesday morning, and the figures will have risen by the time you read this — is startling but not unforeseeable. That the virus emerged from a nonhuman animal, probably a bat, and possibly after passing through another creature, may seem spooky, yet it is utterly unsurprising to scientists who study these things.

One such scientist is Zheng-Li Shi, of the Wuhan Institute of Virology, a senior author of the draft paper (not yet peer reviewed and so far available only in preprint) that gave nCoV-2019 its identity and name. It was Ms. Shi and her collaborators who, back in 2005, showed that the SARS pathogen was a bat virus that had spilled over into people. Ms. Shi and colleagues have been tracing coronaviruses in bats since then, warning that some of them are uniquely suited to cause human pandemics.

In a 2017 paper, they set out how, after nearly five years of collecting fecal samples from bats in the Yunnan cave, they had found coronaviruses in multiple individuals of four different species of bats, including one called the intermediate horseshoe bat, because of the half-oval flap of skin protruding like a saucer around its nostrils. The genome of that virus, Ms. Shi and her colleagues have now announced, is 96 percent identical to the Wuhan virus that has recently been found in humans. And those two constitute a pair distinct from all other known coronaviruses, including the one that causes SARS. In this sense, nCoV-2019 is novel — and possibly even more dangerous to humans than the other coronaviruses.


Sunday, March 01, 2020

We Built a Chimeric Virus Encoding a Novel, Zoonotic CoV Spike Protein


I'm not a virologist and don't pretend to be. But I can read a fugging manual with the best of them, and understand what I've read. That said, slowly reread the nature paper from 2015 yourself. 

Therefore, to examine the emergence potential (that is, the potential to infect humans) of circulating bat CoVs, we built a chimeric virus encoding a novel, zoonotic CoV spike protein—from the RsSHC014-CoV sequence that was isolated from Chinese horseshoe bats1—in the context of the SARS-CoV mouse-adapted backbone. The hybrid virus allowed us to evaluate the ability of the novel spike protein to cause disease independently of other necessary adaptive mutations in its natural backbone. Using this approach, we characterized CoV infection mediated by the SHC014 spike protein in primary human airway cells and in vivo, and tested the efficacy of available immune therapeutics against SHC014-CoV. Together, the strategy translates metagenomics data to help predict and prepare for future emergent viruses.

Shi Zhengli - you know you done f'd up...., 

Mebbe what I'm watching from other "gain of function" virologists is a poster-child instance of the Weinstein's Distributed Information Suppression Complex?

The Proximal Origin of SARS-C0V2

virological |   Since the first reports of a novel pneumonia (COVID-19) in Wuhan city, Hubei province, China there has been considerable discussion and uncertainty over the origin of the causative virus, SARS-CoV-2. Infections with SARS-CoV-2 are now widespread in China, with cases in every province. As of 14 February 2020, 64,473 such cases have been confirmed, with 1,384 deaths attributed to the virus. These official case numbers are likely an underestimate because of limited reporting of mild and asymptomatic cases, and the virus is clearly capable of efficient human-to-human transmission. Based on the possibility of spread to countries with weaker healthcare systems, the World Health Organization has declared the COVID-19 outbreak a Public Health Emergency of International Concern (PHEIC). There are currently neither vaccines nor specific treatments for this disease.

SARS-CoV-2 is the seventh member of the Coronaviridae known to infect humans. Three of these viruses, SARS CoV-1, MERS, and SARS-CoV-2, can cause severe disease; four, HKU1, NL63, OC43 and 229E, are associated with mild respiratory symptoms. Herein, we review what can be deduced about the origin and early evolution of SARS-CoV-2 from the comparative analysis of available genome sequence data. In particular, we offer a perspective on the notable features in the SARS-CoV-2 genome and discuss scenarios by which these features could have arisen. Importantly, this analysis provides evidence that SARS-CoV-2 is not a laboratory construct nor a purposefully manipulated virus.

Say What?

The genomic comparison of both alpha- and betacoronaviruses (family Coronaviridae ) described below identifies two notable features of the SARS-CoV-2 genome: (i) based on structural modelling and early biochemical experiments, SARS-CoV-2 appears to be optimized for binding to the human ACE2 receptor; (ii) the highly variable spike (S) protein of SARS-CoV-2 has a polybasic (furin) cleavage site at the S1 and S2 boundary via the insertion of twelve nucleotides. Additionally, this event led to the acquisition of three predicted O-linked glycans around the polybasic cleavage site.

Wednesday, March 28, 2018

Have 99.999% Missed The Real Revolutionary Possibilities of Crypto?


hackernoon |  Money is power.

Nobody knew this better than the kings of the ancient world. That’s why they gave themselves an absolute monopoly on minting moolah.

They turned shiny metal into coins, paid their soldiers and their soldiers bought things at local stores. 

The king then sent their soldiers to the merchants with a simple message:

“Pay your taxes in this coin or we’ll kill you.”

That’s almost the entire history of money in one paragraph. Coercion and control of the supply with violence, aka the “violence hack.” The one hack to rule them all.

When power passed from monarchs to nation-states, distributing power from one strongman to a small group of strongmen, the power to print money passed to the state. Anyone who tried to create their own money got crushed.

The reason is simple:

Centralized enemies are easy to destroy with a “decapitation attack.” Cut off the head of the snake and that’s the end of anyone who would dare challenge the power of the state and its divine right to create coins.

Kings and nation states know the real golden rule: Control the money and you control the world.

And so it’s gone for thousands and thousands of years. The very first emperor of China, Qin Shi Huang (260–210 BC), abolished all other forms of local currency and introduced a uniform copper coin. That’s been the blueprint ever since. Eradicate alternative coins, create one coin to rule them all and use brutality and blood to keep that power at all costs.

In the end, every system is vulnerable to violence.

Well, almost every one.


Wednesday, January 18, 2017

If It Does Away With Physical Cash - How Will the Deep State Move Weight?


NYTimes |  CIA ties to international drug trafficking date to the Korean War. In 1949, two of Chiang Kai-shek's defeated generals, Li Wen Huan and Tuan Shi Wen, marched their Third and Fifth Route armies, with families and livestock, across the mountains to northern Burma. Once installed, the peasant soldiers began cultivating the crop they knew best, the opium poppy. 

When China entered the Korean War, the CIA had a desperate need for intelligence on that nation. The agency turned to the warlord generals, who agreed to slip some soldiers back into China. In return, the agency offered arms. Officially, the arms were intended to equip the warlords for a return to China. In fact, the Chinese wanted them to repel any attack by the Burmese. 

Soon intelligence began to flow to Washington from the area, which became known as the Golden Triangle. So, too, did heroin, en route to Southeast Asia and often to the United States. 

If the agency never condoned the traffic, it never tried to stop it, either. The CIA did, however, lobby the Eisenhower administration to prevent the Bureau of Narcotics and Dangerous Drugs, the DEA's predecessor, from establishing monitoring posts in the area to study the traffic. Today, the Golden Triangle accounts for about half the heroin in circulation in the world. 

During the Vietnam War, operations in Laos were largely a CIA responsibility. The agency's surrogate there was a Laotian general, Vang Pao, who commanded Military Region 2 in northern Laos. He enlisted 30,000 Hmong tribesmen in the service of the CIA. 

These tribesmen continued to grow, as they had for generations, the opium poppy. Before long, someone - there were unproven allegations that it was a Mafia family from Florida - had established a heroin refining lab in Region Two. The lab's production was soon being ferried out on the planes of the CIA's front airline, Air America. A pair of BNDD agents tried to seize an Air America. 

A pair of BNDD agents tried to seize an Air America DC-3 loaded with heroin packed into boxes of Tide soap powder. At the CIA's behest, they were ordered to release the plane and drop the inquiry.
The CIA was made officially aware of Manuel Antonio Noriega's involvement in the drug traffic in 1972, when Mr. Noriega was chief of intelligence of the Panama National Guard, and a promising CIA asset. The BNDD found evidence that Mr. Noriega was taking payoffs for allowing heroin to flow from Spain, through Panama City airport, and on to the United States. That information was part of a lengthy file on Mr. Noriega compiled by Jack Ingersoll, then chief of the BNDD.

Mr. Ingersoll was aware of Mr. Noriega's ties to the CIA, as was President Richard Nixon. When Mr. Nixon ordered Mr. Ingersoll to Panama to warn the country's military dictator, General Omar Torrijos, about the activities of Mr. Noriega and General Torrijos's brother Moises, Mr. Ingersoll hoped that law enforcement was finally "beginning to get the upper hand in its ongoing struggle with the CIA." He was wrong. The Watergate break-in occurred shortly after his visit. Mr. Nixon needed CIA support; his enthusiasm for the drug war evaporated. Mr. Ingersoll's successors at the newly formed DEA - Peter Bensinger, Francis Mullen and John Lawn - all told me they never saw his file, although they had asked to see everything the DEA had on Mr. Noriega. The material has disappeared. 

Shortly after General Torrijos's death in a mysterious airplane crash, Mr. Noriega, with CIA assistance, took command of the Panama National Guard. 

No one in the Reagan administration was prepared to do anything about the Noriega drug connection. As Norman Bailley, a National Security Council staff member at the time, told me, "The CIA and the Pentagon were resolutely opposed to acting on that knowledge, because they were a hell of a lot more worried about trying to keep Panama on our side with reference to Nicaragua than they were about drugs." Nowhere, however, was the CIA more closely tied to drug traffic than it was in Pakistan during the Afghan War. As its principal conduit for arms and money to the Afghan guerrillas, the agency chose the Pakistan military's Inter-Services Intelligence Bureau. The ISI in turn steered the CIA's support toward Gulbuddin Hekmatyar, an Islamic fundamentalist. Mr. Hekmatyar received almost half of the agency's financial support during the war, and his fighters were valiant and effective. But many of his commanders were also major heroin traffickers. 

As it had in Laos, the heroin traffic blossomed in the shadows of a CIA-sustained guerrilla war. Soon the trucks that delivered arms to the guerrillas in Afghanistan were coming back down the Khyber Pass full of heroin. 

The conflict and its aftermath have given the world another Golden Triangle: the Golden Crescent, sweeping through Afghanistan, Pakistan and parts of the former Soviet Union. Many of those involved in the drug traffic are men who were once armed, trained and financed by the CIA. 

Wednesday, February 17, 2016

kneegrows for Granny Goodness ignore her proven dangerousness at their own and the world's peril...,


ICH |  In the Milwaukee debate, Hillary Clinton took pride in her role in a recent UN Security Council resolution on a Syrian ceasefire:
But I would add this. You know, the Security Council finally got around to adopting a resolution. At the core of that resolution is an agreement I negotiated in June of 2012 in Geneva, which set forth a cease-fire and moving toward a political resolution, trying to bring the parties at stake in Syria together.
This is the kind of compulsive misrepresentation that makes Clinton unfit to be President. Clinton's role in Syria has been to help instigate and prolong the Syrian bloodbath, not to bring it to a close.

In 2012, Clinton was the obstacle, not the solution, to a ceasefire being negotiated by UN Special Envoy Kofi Annan. It was US intransigence - Clinton's intransigence - that led to the failure of Annan's peace efforts in the spring of 2012, a point well known among diplomats. Despite Clinton's insinuation in the Milwaukee debate, there was (of course) no 2012 ceasefire, only escalating carnage. Clinton bears heavy responsibility for that carnage, which has by now displaced more than 10 million Syrians and left more than 250,000 dead.

As every knowledgeable observer understands, the Syrian War is not mostly about Bashar al-Assad, or even about Syria itself. It is mostly a proxy war, about Iran. And the bloodbath is doubly tragic and misguided for that reason.

Saudi Arabia and Turkey, the leading Sunni powers in the Middle East, view Iran, the leading Shia power, as a regional rival for power and influence. Right-wing Israelis view Iran as an implacable foe that controls Hezbollah, a Shi'a militant group operating in Lebanon, a border state of Israel. Thus, Saudi Arabia, Turkey, and Israel have all clamored to remove Iran's influence in Syria.

This idea is incredibly naïve. Iran has been around as a regional power for a long time--in fact, for about 2,700 years. And Shia Islam is not going away. There is no way, and no reason, to "defeat" Iran. The regional powers need to forge a geopolitical equilibrium that recognizes the mutual and balancing roles of the Gulf Arabs, Turkey, and Iran. And Israeli right-wingers are naïve, and deeply ignorant of history, to regard Iran as their implacable foe, especially when that mistaken view pushes Israel to side with Sunni jihadists.

Yet Clinton did not pursue that route. Instead she joined Saudi Arabia, Turkey, and right-wing Israelis to try to isolate, even defeat, Iran. In 2010, she supported secret negotiations between Israel and Syria to attempt to wrest Syria from Iran's influence. Those talks failed. Then the CIA and Clinton pressed successfully for Plan B: to overthrow Assad.

When the unrest of the Arab Spring broke out in early 2011, the CIA and the anti-Iran front of Israel, Saudi Arabia, and Turkey saw an opportunity to topple Assad quickly and thereby to gain a geopolitical victory. Clinton became the leading proponent of the CIA-led effort at Syrian regime change.

Thursday, June 12, 2014

christian iraqis have no place to go...,


HuffPo |  Sunni insurgents from an al Qaeda splinter group extended their control from the northern city of Mosul on Wednesday to an area further south that includes Iraq's biggest oil refinery in a devastating show of strength against the Shi'ite-led government.

Security sources said militants from the Islamic State in Iraq and the Levant (ISIL) - Sunni militants waging sectarian war on both sides of the Iraqi-Syrian frontier - drove into the town of Baiji late on Tuesday in armed vehicles, torching the court house and police station after freeing prisoners.

The militants offered safe passage to some 250 men guarding the refinery on the outskirts of Baiji, about 200 kilometers south of Mosul, on condition they leave.

Iraq's Foreign Minister Hoshyar Zebari called on his country's leaders to come together to face "the serious, mortal" threat. "The response has to be soon. There has to be a quick response to what has happened," he said during a trip to Greece.

Zebari said Baghdad would work with forces from the nearby Kurdish autonomous region to drive the fighters from Mosul.

Baiji resident Jasim al-Qaisi said the militants had also asked senior tribal chiefs in Baiji to persuade local police and soldiers not to resist their takeover.

"Yesterday at sunset some gunmen contacted the most prominent tribal sheikhs in Baiji via cellphone and told them: 'We are coming to die or control Baiji, so we advise you to ask your sons in the police and army to lay down their weapons and withdraw before (Tuesday) evening prayer'."

The Baiji refinery can process 300,000 barrels per day and supplies oil products to most of Iraq's provinces and is a major provider of power to Baghdad. A worker there said the morning shift had not been allowed to take over and the night shift was still on duty.

The push into Baiji began hours after ISIL overran Mosul, one of the great Sunni historic cities, advancing their aim of creating a Sunni Caliphate straddling the border between Iraq and Syria.

Sunday, September 01, 2013

strategic plan - definitely! narrative plan - not so much...,


guardian | Massacres of civilians are being exploited for narrow geopolitical competition to control Mideast oil, gas pipelines. Few recall that US agitation against Syria began long before recent atrocities, in the context of wider operations targeting Iranian influence across the Middle East.

In May 2007, a presidential finding revealed that Bush had authorised CIA operations against Iran. Anti-Syria operations were also in full swing around this time as part of this covert programme, according to Seymour Hersh in the New Yorker. A range of US government and intelligence sources told him that the Bush administration had "cooperated with Saudi Arabia's government, which is Sunni, in clandestine operations" intended to weaken the Shi'ite Hezbollah in Lebanon. "The US has also taken part in clandestine operations aimed at Iran and its ally Syria," wrote Hersh, "a byproduct" of which is "the bolstering of Sunni extremist groups" hostile to the United States and "sympathetic to al-Qaeda." He noted that "the Saudi government, with Washington's approval, would provide funds and logistical aid to weaken the government of President Bashir Assad, of Syria," with a view to pressure him to be "more conciliatory and open to negotiations" with Israel. One faction receiving covert US "political and financial support" through the Saudis was the exiled Syrian Muslim Brotherhood.

According to former French foreign minister Roland Dumas, Britain had planned covert action in Syria as early as 2009: "I was in England two years before the violence in Syria on other business", he told French television:
"I met with top British officials, who confessed to me that they were preparing something in Syria. This was in Britain not in America. Britain was preparing gunmen to invade Syria."
The 2011 uprisings, it would seem - triggered by a confluence of domestic energy shortages and climate-induced droughts which led to massive food price hikes - came at an opportune moment that was quickly exploited. Leaked emails from the private intelligence firm Stratfor including notes from a meeting with Pentagon officials confirmed US-UK training of Syrian opposition forces since 2011 aimed at eliciting "collapse" of Assad's regime "from within."

So what was this unfolding strategy to undermine Syria and Iran all about? According to retired NATO Secretary General Wesley Clark, a memo from the Office of the US Secretary of Defense just a few weeks after 9/11 revealed plans to "attack and destroy the governments in 7 countries in five years", starting with Iraq and moving on to "Syria, Lebanon, Libya, Somalia, Sudan and Iran." In a subsequent interview, Clark argues that this strategy is fundamentally about control of the region's vast oil and gas resources.

Much of the strategy currently at play was candidly described in a 2008 US Army-funded RAND report, Unfolding the Future of the Long War (pdf). The report noted that "the economies of the industrialized states will continue to rely heavily on oil, thus making it a strategically important resource." As most oil will be produced in the Middle East, the US has "motive for maintaining stability in and good relations with Middle Eastern states":

russia and iran mull their syria options...,



rferl | U.S.-led military intervention in Syria would put Washington on a collision course with two unwavering allies of Syrian President Bashar al-Assad -- Iran and Russia.

Just how Tehran and Moscow might react is a key part of the calculus that U.S. President Barack Obama must consider in weighing his course of action in Syria.

Although analysts agree that neither country is likely to respond with direct military support for Assad, they also don't expect Tehran or Moscow to sit back passively. Iran's Islamic Revolutionary Guards Corps (IRGC) has said that an attack against Assad is a "red line" that would trigger a response, although it has not said what that response might be.

Iran's reaction to date has been mild, with Tehran condemning both the use of chemical weapons and threats of foreign military intervention.

According to Will Fulton, an Iran analyst with the American Enterprise Institute in Washington, the IRGC would likely not risk a direct confrontation with the United States but could act through proxies, including Hizballah in Lebanon or Shi'ite militias in Iraq.

Tehran would also seek to capitalize on anti-U.S. reaction at home and across the region. "I think we will absolutely see more condemnations, more warnings from IRGC and hard-line officials, and this will of course play into, especially, the IRGC's narrative that the conflict in Syria is a conspiracy of Israel and the West," Fulton says. "So they will use this attack to fuel that narrative and it will become a recruiting tool and a narrative defense of their own foreign interference in Syria."

Tuesday, September 20, 2011

what is entosis?

TheScientist | Though the mechanisms of engulfment may differ among cell and cancer types, the end result is nearly indistinguishable—a whole, living cell is housed within a large vacuole inside a tumor cell. Internalized cells usually follow one of three paths. They can continue living, at least temporarily, within the host cell, even dividing within their vacuole homes. Occasionally, they escape from the host cell to once again become a single, individual cell in the extracellular space. By and large, however, death is the most common fate for cells engulfed by tumor cells. Wang and colleagues demonstrated evidence of the apoptotic death of NK cells following their uptake by tumor cells. Nearly 90 percent of the internalized lymphocytes underwent traditional, programmed cell death, as evidenced by the activation of caspase 3. Work by Overholtzer’s group, on the other hand, suggests that cell engulfment between tumor cells represents a different type of cell death altogether—one mediated by lysosomes. The vacuoles housing the internalized tumor cells, his group observed, became acidic and surrounded by lysosomal membranes, indicative of fusion with lysosomes. Furthermore, when the researchers overexpressed B-cell lymphoma 2 (Bcl-2) to inhibit apoptosis, it had little effect on the death of internalized cells. On the other hand, inhibiting lysosomal acidification of the vacuoles could rescue the captured cells, when it was combined with apoptotic inhibitors. Interestingly, when only the lysosomal inhibitors were introduced, more cells appeared to undergo an apoptotic death, suggesting that apoptosis serves as a backup mechanism to the more common lysosomal death of the internalized cells.

Fais suggests it is simply the acidic environment of the tumor-cell vacuoles in metastatic melanoma cells that kills the internalized lymphocytes, though lytic enzymes may help to further digest the cell, he says. He argues that the engulfment and subsequent killing of cells such as lymphocytes is cell cannibalism in the most literal sense—one cell eating another. Once the victim is digested, the tumor cell can theoretically derive nutrients from it, promoting cancer survival and growth.

“We know that nutritional stress is a common feature of tumors,” says Eileen White, a cancer biologist at The Cancer Institute of New Jersey and Rutgers University. “We know they’ll undergo this process of autophagy where they’ll eat themselves. If they have the capability of eating each other or other cells—that would open a whole new door for tumors to sustain themselves.”

As evidence for this hypothesis, Fais showed in vitro that cell cannibalism increased under starvation conditions, and that the ingestion of T cells promoted the survival of melanoma cells. “The T cell is great because it has all these wonderful complex carbohydrates on the surface,” says cancer biologist Thomas Seyfried of Boston College. “They can all be degraded to glucose and other fuels [that tumor cells] could be using.”

But even if cells are deriving nourishment from their cannibalistic activities, it’s likely not the only benefit of the behavior, says immunologist Yufang Shi, who studies apoptosis at the Chinese Academy of Sciences and the Child Health Institute of New Jersey. “For one cell to digest another cell and to get energy . . . this is very uneconomical,” Shi explains. “You have to really make the cell into amino acids and polysaccharides. It’s very hard to use that as energy.” The fact that cell cannibalism increased when the cells were starving may simply be due to the fact that nutrient deprivation can cause cells to become detached from the extracellular matrix, Shi added—an event that Overholtzer’s group suggests could promote cell engulfment as a result of imbalanced cell-cell adhesion forces.

Another possibility is that the engulfed cells are driving the process. Internalized immune cells, for example, may have the potential to suppress tumor growth. During his initial graduate studies in the 1980s and again when he resumed this work more recently, Wang observed that some NK cells internalized by tumor cells can actually kill their host cells from the inside out. “After they enter into the tumor cells, they make the tumor cells erupt,” Wang says. “When [these NK cells] die, they also release a lot of enzymes,” Shi explains. “They are cytotoxic cells, so they can kill by releasing directly into the target cell, like the suicide bombers.”

But whether the internalized NK cells are initiating the engulfment is still unclear. If, on the other hand, the tumor cells are actively consuming the lymphocytes, it could provide a way for cancer to evade attack by the immune system. “I have a suspicion that maybe tumor [cells] in some conditions can kill the NK cells as a way to escape the surveillance of the immune system,” Wang says. This may become particularly important as the cancer metastasizes, Yao adds. “One of the physical challenges for those tumor cells will be how to survive in the new sites. One way is by taking [up] those NK cells and other immune cells to damage the immune response of cancer [patients].”

The bizarre phenomenon may also contribute to the genetic instability of cells, perhaps contributing to the formation of cancer early on. This March, Overholtzer and colleagues published the finding that cell-in-cell structures can act as cleavage barriers that disrupt cell division, leading to changes in ploidy—the number of sets of chromosomes in the cell—which are known to drive tumor progression.5 Conversely, cell engulfment may act to suppress tumor growth, such as when tumor cells eat other tumor cells. “Entosis has a dual nature,” says Overholtzer. “It clearly can kill [tumor] cells, but also, it can disrupt ploidy—one is predicted to be tumor suppressive, one is tumor promoting.”

For now, the question of function remains “a puzzle,” Fais says, and “I don’t have all the pieces.” But with evidence growing for significance of cell engulfment in tumor pathogenesis, researchers are now considering whether the phenomenon could serve to aid in diagnosis or in the development of new cancer treatments. “I think in the next few years this will be a very active field,” Shi says.

Thursday, March 17, 2011

world energy crunch as nuclear and oil both go wrong

Telegraph | The existential crisis for the world's nuclear industry could hardly have come at a worse moment. The epicentre of the world's oil supply is disturbingly close to its own systemic crisis as the Gulf erupts in conflict.

Libya's civil war has cut global crude supply by 1.1m barrels per day (bpd), eroding Opec's spare capacity to a wafer-thin margin of 2m bpd, if Goldman Sachs is correct.

Now events in the Gulf have turned dangerous after Saudi Arabia sent troops into Bahrain to help the Sunni monarchy crush largely Shi'ite dissent, risking a showdown with Iran.

Russia's finance minister Alexei Kudrin warned on Wednesday that the confluence of events in Japan and the Mid-East could push oil to $200 a barrel in a "short-lived" spike, which would snuff out global recovery.

While there has been no loss of oil output in the Gulf so far, the violent crackdown in Manama on Wednesday left four people dead and risks inflaming the volatile geopolitics of the region. The rout of protesters encamped at the Pearl roundabout had echoes of China's Tiananmen massacre.

The risk group Exclusive Analysis said such heavy-handed methods may provoke Iran to launch a proxy war by arming insurgents. This could rapidly cross the border, fuelling Shia irredentism in Saudi Arabia's Eastern Province. Any threat to Saudi control over the 5m bpd Ghawar oil field nearby would be a global "game-changer". "Much worse headlines can easily be imagined," said Raza Agha from RBS.

Tuesday, November 30, 2010

wikileaks true value (smear and denial - part 2)

medialens | The UK and US media smears described in Part 1 should be kept in mind when considering the gravity and importance of the latest WikiLeaks. In addition to thousands of previously unreported civilian killings, the leaks revealed more than 1,300 claims of torture by Iraqi police and military between 2005 and 2009. More than 180,000 people were detained at some point between 2004 and 2009, or one in 50 Iraqi males.

But these are only the incidents the US military knew about, or chose to know about, or chose to report; and the documents are an unknown sample of all documentation held by the US government. There are, for example, no reports from the “shock and awe” year of 2003, and none from the tens of thousands of after-attack Pentagon bombing assessments. The leaks also report no civilian deaths in major US atrocities, including the offensive that devastated Fallujah in 2004.

The leaks corroborate previous allegations that US forces turned over prisoners to the Wolf Brigade, the feared 2nd battalion of the Iraqi interior ministry's commandos, infamous for their torture and extra judicial killings. This was not merely ‘turning a blind eye’ to torture, as investigative journalist Gareth Porter notes: “The implication was that the Shi'a commandos would be able to extract more information from the detainees than would be allowed by U.S. rules.”

US forces, then, were complicit in the torture. Indeed, under international law, as the occupying power, the coalition is accountable for all of these crimes.

US troops are actually commanded to not investigate the tortures by an order called Frago 242. Issued in June 2004, this instructs coalition troops not to investigate any abuse of detainees unless it directly involves members of the coalition. Where the alleged abuse is committed by Iraqi forces on Iraqis, "only an initial report will be made... No further investigation will be required unless directed by HQ".
The leaks reveal that the US military was also aware that the Iraqi government had murdered detainees.

Civilian Deaths - The “Standard Accepted Figure”
The leaks reveal, not just a staggering level of violence and criminality in occupied Iraq, but also the determination of the Iraqi government and US forces to hide civilian casualties.

This is hardly surprising and fits with evidence that the US and UK governments have worked hard to smear credible scientific analysis of the likely death toll. A recent study by Professor Brian Rappert of the University of Exeter reported of the UK government: “deliberations were geared in a particular direction – towards finding grounds for rejecting the [2004] Lancet study [estimating almost 100,000 Iraqi deaths from the war] without any evidence of countervailing efforts by government officials to produce or endorse alternative other studies or data”.

Nevertheless, with a near-uniform intellectual sleight of hand, journalists have managed to turn evidence that civilian casualties are likely much higher (as much as ten times higher) than most media have been reporting into evidence that casualties are perhaps 15 per cent higher. As one seasoned journalist told us privately, “WikiLeaks has been Guardianised” - their true significance has been disarmed, defanged and contained by the media.

Tuesday, May 12, 2009

music and genetic code

Concerning to interesting theme on music, I would like to pay attention on physiological aspects of music and their connection with genetic code.

From the information viewpoint, living organisms are information essences. They live due to receiving of the genetic information from the ancestors, and they exist to transfer the genetic information to their descendants. In the biological literature it is possible quite often now to meet the statement that living organisms are the texts since a molecular level of their organization. Just from the information-hereditary viewpoint, all living organisms are unified wonderfully: all of them have identical bases of system of genetic coding (from many other possible viewpoints - for example, locomotion, metabolisms, etc -, living organisms have no such unification, they are differ one from another in many cases).

All heritable physiological aspects of living organisms are co-ordinated with basic structures of genetic code (heritable physiological subsystems of organism can’t be transmitted to next biological generations without such agreement with basic mechanisms of genetic coding).

It’s well known, that special musical forms have essential physiological possibilities to stimulate processes of biological growth, to have therapy effects, etc. So, it can be supposed, that these musical forms are connected (co-ordinated) with genetic coding system structurally. And interesting question is the following: on the base of using of our modern scientific knowledge of structures of genetic code, can we create musical forms which will be else more effective in physiological aspects to use them in the field of mass media, medicine, ergonomics, sport, etc?

My own investigations in this direction are connected with new results on genetic code structures. These results are described at the FIS site http://fis.iguw.tuwien.ac.at/recources/papers.html in my article “Genetic
Code and the Ancient Chinese “Book of Changes”” . An existence of binary sub-alphabets of genetic code was shown and a biperiodic octet table of 64 genetic triplets was constructed by me there. This genetic biperiodic table was coincided practically with a historical famous table of 64 hexagrams of the Ancient Chinese “Book of Changes””, written several thousands years ago (according to Ancient Chinese statements, the system of this Book is the main archetype of all nature; this system is a base for many branches of Orient medicine, culture, philosophy, etc.). If “physiological music” has a connection with genetic code, the question on its connection with this ancient conception of archetypes is urgent. According to Ancient Chinese statements, “music is that that represents a harmony of sky and earth, a co-ordination of Yin and Yang” (“Lui shi chun tsu”).

Some of these questions are considered in a special paragraph “Genetic code and music» in my book: S.V.Petoukhov “Biperiodic Table of Genetic Code and Number of Protons”, Moscow, 2001, 258 p. (in Russian; information on this book, on its content, etc. in English is at site http://members.tripod.com/vismath/sg/petoukhov.htm ).

I believe that binary sub-alphabets of genetic code and its biperiodic table permit to investigate a language of music more deeply and to create special forms of musical compositions characterized by the most physiological activity (so named “genetic music” or “genomusic”). Perhaps, due to its structural relationship with genetic code, this genetic music will be addressed to Jungian archetypes of people by the shortest route. (By the way, Carl Jung was connoisseur and profound expert of this “Book of Changes”, and the biperiodic table of genetic code has a connection with Jungian archetypes).

This theme of “genetic structured” music is a small addition to very interesting works by Juan Roederer è Michael Leyton, discussed on this session. In my opinion, physiological mechanisms and mathematical formalisms, analyzed by them for a theory of musical perception, should be coordinated (adjusted) with the specific structure of genetic code. The biological evolution can be interpreted in a whole as a process of deployment and duplicating of the certain forms of ordering (they can be named as “archetypes”). This thesis has a realization in physiological effective music also.

With best regards
Sergei Petoukhov

Trash Israeli Professional Boxer Spitting On And Beating On Kids At UCLA...,

sportspolitika  |   On Sunday, however, the mood turned ugly when thousands of demonstrators, including students and non-students, showed ...