Censored 2012 (8 page)

Read Censored 2012 Online

Authors: Mickey Huff

BOOK: Censored 2012
5.06Mb size Format: txt, pdf, ePub

The American military presence in Afghanistan consists of fleets of aircraft, helicopters, armored vehicles, weapons, equipment, troops, and facilities. Since 2001, these together have generated millions of kilograms of hazardous, toxic, and radioactive wastes. Matthew Nasuti asks a simple question in
Kabul Press:
“What have the Americans done with all that waste?” The answer is chilling in that virtually all of it appears to have been buried, burned, or secretly disposed of into the air, soil, groundwater, and surface waters of Afghanistan. Even if the Americans begin to withdraw next year, the toxic chemicals they leave behind will continue to pollute for centuries. Any abandoned radioactive waste may stain the Afghan countryside for thousands of years. Afghanistan has been described in the past as the graveyard of foreign armies. Today, according to Nasuti, Afghanistan has a different title: “Afghanistan is the toxic dumping ground for foreign armies.”

Hundreds of tons of depleted uranium (DU) were used during the invasions of Iraq and Afghanistan. The US forces forbid any kind of DU-related exploration programs or research. They have also covered up and denied DU’s damaging health effects, and refused to release information on the amounts, types, and locations of these weapons. As a consequence, thousands of Iraqi and Afghan children and their families are suffering from various diseases related to low-level radiation (LLR), such as malignancies, congenital heart diseases, chromosomal aberration, and multiple congenital malformations.
Women in the contaminated areas suffered high rates of miscarriages and sterility.

DU weapons are manufactured from radioactive waste generated during the enrichment process of natural uranium, as part of the nuclear fuel cycle. American and British armed forces fired DU bullets and projectiles for the first time against a human population in Iraq during the 1991 Gulf War. When DU munitions hit their target, they ignite prophetically and generate heat that reaches a temperature of 3000–6000 degrees Celsius. This heat causes the DU and other metals to form a gas or aerosol of nanoparticles. These nanoparticles cross the lung-blood barrier, gain entrance to the cells, and create free radicals. Some effects that the people are facing are immune and hormonal systems damage; disruption of thyroid function; and tetrogenic toxicity, as soluble DU oxides cross the placenta to the fetus, resulting in damages that range from behavioral problems to mental retardation and congenital malformations.

President Obama’s undeclared and congressionally unauthorized war against Libya may be compounded by the crime of spreading toxic uranium oxide in populated areas of that country. Concern is being voiced by groups such as the International Coalition to Ban Uranium Weapons, which monitors military use of DU antitank and bunker-penetrating shells.

As of late March 2011, the US has not introduced its A-10 Thunderbolts, known also as Warthogs, into the Libyan campaign, probably because these subsonic, straight-wing craft, while heavily armored, are vulnerable to the shoulder-fired antiaircraft missiles that Libyan forces are known to possess in large numbers. Once the air-control situation is improved by continued bombardment, however, these specialized ground-attack aircraft will probably be added to the attacking forces. The A-10 has a particularly large automatic cannon, which fires an unusually large 30 mm shell. These shells are often fitted with solid uranium projectiles.

Notes

1
. Gregg Zoroya, “Army Suicides Linked to Risky Behavior, Lax Discipline,”
USA Today
, July 29, 2010,
http://www.usatoday.com/news/military/2010-07-29-army-suicides_N.htm
.

2
. Gregg Zoroya, “More Army Guard, Reserve Soldiers Committing Suicide,”
USA
Today
, January 20, 2011,
http://www.usatoday.com/news/military/2011-01-20-suicides20_ST_N.htm
.

3
. “Military Suicides Increase as US Soldiers Struggle with Torment of War,”
Star-Ledger
, November 22, 2009,
http://www.nj.com/news/index.ssf/2009/11/us_military_suicides_increase.html
.

4
. Adam Levine, “Obama Urged to Reverse Policy on No Condolence Letters for Suicides,” CNN, May 26, 2011,
http://articles.cnn.com/2011-05-26/politics/president.suicides.letters_1_condolence-letters-suicide-rate-policy?_s=PM:POLITICS
.

5
. “Army to Train Soldiers in Emotional Resiliency,”
Talk of the Nation
, National Public Radio, September 10, 2009,
http://www.npr.org/templates/story/story.php?storyId=112717611
.

6
. Dana Priest, “US Military Teams, Intelligence Deeply Involved in Aiding Yemen on Strikes,”
Washington Post
, January 27, 2010,
http://www.washingtonpost.com/wp-dyn/content/article/2010/01/26/AR2010012604239_pf.html
.

7
. “Intelligence Official Acknowledges Policy Allowing Targeted Killings Of Americans,” American Civil Liberties Union, February 4, 2010,
http://www.aclu.org/national-security/intelligence-official-acknowledges-policy-allowing-targeted-killings-americans
.

8
. Luke Mogelson, “A Beast in the Heart,”
New York Times
, May 1, 2011, New York edition, MM34.

CENSORED NEWS CLUSTER
Social Media and Internet Freedom
by Elliot D. Cohen

Censored #2:
US Military Manipulates the Social Media

Sources:

Persona Management Software, Department of the Air Force, Air Mobility Command, Federal Business Opportunities, June 22, 2010,
http://www.rawstory.com/rs/wp-content/uploads/2011/03/personamanagementcontract.pdf
.

Nick Fielding and Ian Cobain, “Revealed: US Spy Operation that Manipulates Social Media,”
Guardian
, March 17, 2011,
http://www.guardian.co.uk/technology/2011/mar/17/us-spy-operation-social-networks
.

Darlene Storm, “Army of Fake Social Media Friends to Promote Propaganda,” Computerworld, February 22, 2011,
http://blogs.computerworld.com/17852/army_of_fake_social_media_friends_to_promote_propaganda
.

Stephen Webster, “Exclusive: Military’s ‘persona’ software cost millions, used for ‘classified social media activities,’ ” Raw Story, February 22, 2011,
http://www.rawstory.com/rs/2011/02/22/exclusive-militarys-persona-software-cost-millions-used-for-classified-social-media-activities/
.

Student Researchers:
Ashley Nelson, Alex Miller (Sonoma State University); Michael Smith (San Francisco State University); Wend-Kouni Deo-Gratias Nintiema (St. Cloud University)

Faculty Evaluators:
Peter Phillips (Sonoma State University); Kenn Burrows (San Francisco State University); Julie Andrzejewski (St. Cloud State University); Mickey Huff (Diablo Valley College)

Censored #6:
Google Spying?

Sources:

Eric Sommer, “Google’s Deep CIA Connections,”
Pravda Online
, January 14, 2010,
http://english.pravda.ru/world/asia/14-01-2010/111657-google_china-0/
.

David Vladeck to Albert Gidari, October 21, 2010, Office of the Director Bureau of Consumer Protection, United States Federal Trade Communication,
http://www.ftc.gov/os/closings/101027googleletter.pdf
.

Nicholas Carlson, “Google’s Marissa Mayer Hosting Obama At $30,000-A-Head Fundraiser Tonight (GOOG),”
San Francisco Chronicle
, October 21, 2010,
http://www.sfgate.com/cgi-bin/article.cgi?f=/g/a/2010/10/21/businessinsider-googles-marissa-mayer-to-host-president-obama-for-30000-a-head-fundraiser-2010-10.DTL
.

Student Researchers:
James Dobbs (Indian River State College); Keith Garrett (Sonoma State University)

Faculty Evaluators:
Elliot D. Cohen (Indian River State College); John Kramer (Sonoma State University); Mickey Huff (Diablo Valley College)

Related Validated News Stories, 2009–2011

“Andrew McLaughlin ’94 Leaves Google to Join Obama Administration,” Harvard Law School, June 18, 2009,
http://www.law.harvard.edu/news/2009/06/18_mclaughlin.html
.

Alissa Bohling, “First, Your Shoes; Next, Your DNA: Elliot Cohen on How Surveillance Is Erasing Freedom and Autonomy, Step by Incremental Step,”
Truthout
, January 5, 2011,
http://archive.truthout.org/first-your-shoes-next-your-dna-elliot-cohen-how-surveillance-erasing-freedom-and-autonomy-step-incre
.

James Temple, “FTC Closes Investigation into Google’s Street View Data Collection,”
San Francisco Chronicle
, October 27, 2010,
http://www.sfgate.com/cgi-bin/blogs/techchron/detail?entry_id=75580
.

Noah Shachtman, “Exclusive: US Spies Buy Stake in Firm that Monitors Blogs, Twitter,”
Wired
, October 19, 2009,
http://www.wired.com/dangerroom/2009/10/exclusive-us-spies-buy-stake-in-twitter-blog-monitoring-firm/
.

Juan Gonzalez and Amy Goodman, “CIA Invests in Software Firm Monitoring Blogs, Twitter”
Democracy Now!
, October 22, 2009,
http://www.democracynow.org/2009/10/22/cia_invests_in_software_firm_monitoring
.

Marcia Hofmann, “EFF Posts Documents Detailing Law Enforcement Collection of Data from Social Networks,” Electronic Frontier Foundation, March 16, 2010,
http://www.eff.org/deeplinks/2010/03/eff-posts-documents-detailing-law-enforcement
.

Murry Wardrop, “Facebook Could be Monitored by Government,”
Telegraph
, March 25,
2009,
http://www.telegraph.co.uk/technology/facebook/5046447/Facebook-could-be-monitored-by-the-government.html
.

Nigel Morris, “Now ‘Big Brother’ Targets Facebook,”
Independent
, March 25, 2009,
http://www.independent.co.uk/news/uk/politics/now-big-brother-targets-facebook-1653407.html
.

Mike Elgan, “ ‘Pre-Crime’ Comes to the HR Dept.,” Datamation, September 29, 2010,
http://itmanagement.earthweb.com/features/article.php/12297_3905931_1/Pre-crime-Comes-to-the-HR-Dept.htm
.

Tom Burghart, “Big Brother Only a Mouse Click Away?,” Sky Valley Chronicle, October 17, 2010.
http://www.skyvalleychronicle.com/FEATURE-NEWS/BIG-BROTHER-ONLY-A-MOUSE-CLICK-AWAY-br-Invasive-cyber-technologies-may-mean-Big-Brother-has-his-eye-on-you-in-ways-you-never-thought-possible-494357
.

Rick Rozoff, “US Cyber Command: Waging War In The World’s Fifth Battlespace,” Global Research, May 27, 2010,
http://www.globalresearch.ca/index.php?context=va&aid=19360
.

“US to Set Up Secret ‘Big Brother’ Surveillance System to Monitor Internet for Cyber-attacks,”
Daily Mail
, July 9, 2010,
http://www.dailymail.co.uk/sciencetech/article-1293344/Perfect-Citizen-US-set-secret-Big-Brother-surveillance-monitor-internet-cyber-attacks.html
.

Richard Adhikari, “NSA: Perfect Citizen Is All About R&D, Not Eavesdropping,” Tech-News World, July 9, 2010,
http://www.technewsworld.com/story/NSA-Perfect-Citizen-Is-All-About-RD-Not-Eavesdropping-70384.html
.

Noah Shachtman, “Your Guide to Crimeware Apps,”
Wired
, January 31, 2011,
http://www.wired.com/magazine/2011/01/st_crimeware/
.

Angeline Grace Close, George M. Zinkhan, and R. Zachary Finney, “Cyber-Identity Theft: A Conceptual Model and Implications For Public Policy,” paper, University of Nevada, Las Vegas,
http://faculty.unlv.edu/angeline/Close%5B1%5D%5B1%5D.Zinkhan.CyberIDTheft.pdf
.

Andy Beckett, “The Dark Side of the Internet,”
Guardian
, November 26, 2009,
http://www.guardian.co.uk/technology/2009/nov/26/dark-side-internet-freenet
.

Steve Aquino, “Should Obama Control the Internet?”
Mother Jones
, April 2, 2009,
http://motherjones.com/politics/2009/04/should-obama-control-internet
.

Stephanie Mencimer, “Is Obama Plotting to Shut Down the Internet?”
Mother Jones
, October 27, 2009,
http://motherjones.com/mojo/2009/10/obama-plotting-shut-down-internet
.

Eric Sinrod, “Presidential Powers During Cybersecurity Emergencies,” Findlaw, October 6, 2009,
http://blogs.findlaw.com/technologist/2009/10/presidential-powers-during-cybersecurity-emergencies.html
.

Cybersecurity Act of 2009, S. 773, 111th Cong., 1st sess. (2009),
http://www.open-congress.org/bill/111-s773/show
.

William D. Hartung, “Is Lockheed Martin Shadowing You?,”
Mother Jones
, January 12, 2011,
http://motherjones.com/politics/2011/01/lockheed-martin-shadowing-you
.

John Lasker, “US Space Weapon Now Circling the Globe,” Toward Freedom, May 27, 2010,
http://www.towardfreedom.com/home/special-reports/1980-us-space-weapon-now-circling-the-globe
.

Student Researchers:
Lynn Demos, Ben Solomon, Steve Wojanis, (DePauw University); Tinya Clements and Nick Gedo (Indian River State College); Bradley Shadoan, Shah Baig, Tyler Head, Andrew Nassab, Taylor Falbisaner, and Craig Cekala (Sonoma
State University); Jamaal Rawlings (Indian River Community College); Ryan Shehee (Diablo Valley College)

Other books

Aussie Rules by Jill Shalvis
The Path of Decisions by Mike Shelton
Diary of a Dog-walker by Edward Stourton
The Sunday Gentleman by Irving Wallace
A Heritage and its History by Ivy Compton-Burnett
Fallen Star by Hawke, Morgan
Ruined City by Nevil Shute
Her Last Letter by Nancy C. Johnson