butlincat's blog - a blog...a seeker of the truth, the whole truth, and nothing but the truth...

butlincat's blog...a seeker of the truth, the whole truth, and nothing but the truth...

This site is shadowbanned, as daily viewing figures prove since March 2018, when before then the figures were 10 times as much as they have been since. "Shadowbanning" is the act of blocking or partially blocking a user or their content from an online community - see more: What is SHADOWBANNING: Twitter: are you shadowbanned? - truther sites are targeted, eg: NewsGuard Launches War on Alternative Media - "Censorship is the tool of those who have the need to hide actualities from themselves and from others." - Charles Bukowski

“As long as justice is postponed we always stand on the verge of these darker nights of social disruption”...so said Martin Luther King Jr. in a speech on March 14, 1968, just three weeks before he was assassinated.

...hello + welcome!....FAIR USE NOTICE: This site may contain copyrighted (© ) material. Such material is made available to advance understanding of ecological, political, human rights, economic, democracy, scientific, moral, ethical, and social justice issues. This constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, this material is distributed for analysis, commentary, educational and intellectual purposes. In some cases comedy and parody have been recognized as fair use.

Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License..... For more information please visit:

http://www.law.cornell.edu/uscode/text/17/107

Targeted? victimised?...been dealt particularly "rough justice"? meet some who have, and still are! VICTIMS OF THE STATE https://butlincat.com/

This blog is for regular updates + info connected to the ILLUMINATI, 911, 7/7, recent UFO sightings, CHEMTRAILS, MORGELLONS [98% OF WORLDS POPULATION HAS MORGELLONS DISEASE, they claim - see #Morgellons & #SmartDust Infect Individuals to be Tracked via Satellite https://www.youtu.be/RvNDk2t8TGk], MIND CONTROL {MK ULTRA.MANNEQUIN etc.}, ELECTRONIC SURVEILLANCE, JOHN LEAR, ALEX COLLIER, PROJECT CAMELOT, PROJECT AVALON, MICHAEL TSARION, JORDAN MAXWELL, PRESTON NICHOLS, AL BIELEK, STEWART SWERDELOW, DUNCAN CAMERON, WILLIAM COOPER, PHIL SCHNEIDER, David Wilcock, FRITZ SPRINGMEIER, BILLY MEIER, MAX IGAN, STEW WEBB, "Democracy Now!", Henry Makow, Linda Moulton-Howe, Dan Burisch, Webster Tarpley, Brother Nathanael, Timothy Good, Miles Johnson, Jim Marrs, John Hutchison, Wikileaks, Julian Assange, Dr. John Hall, Edward Snowden, Vladimir Putin, John Lennon, Bob Zimmerman + many more who can only be described as heroes...

Wordpress: VICTIMS OF THE STATE https://butlincat.com/

Twitter: http://www.twitter.com/butlincat

facebook: https://www.facebook.com/#!/butlin.cat.9

"Do not be deceived, God is not mocked; for whatever a man sows, this he will also reap." Galatians 6:7

......Namaste.....John Graham - butlincat

Jai guru deva om जय गुरुदेव ॐ


Monday, 29 November 2010

911

DAY OF ACTION - DEC. 7th



DAY OF ACTION - DEC. 7
The elite with their millions and billions, and the banksters with their billions too, could easily do a great deal in helping to stop people dying of starvation, yet the figure of someone dying of starvation every 3.6 seconds is the same today as it was 2 years ago when I first saw it.Nothings changed, and now because of the preplanned financial crash by them the problem will only get worse.
Make them help.
Thanks.

Take part in the day of action on Dec. 7th - and see the facebook site:

http://www.facebook.com/event.php?eid=13..7793666269183&index=1

and make a stand.

CHILD


"The world hunger problem: Facts, figures and statistics

In the Asian, African and Latin American countries, well over 500 million people are living in what the World Bank has called "absolute poverty"

Every year 15 million children die of hunger

For the price of one missile, a school full of hungry children could eat lunch every day for 5 years

Throughout the 1990's more than 100 million children will die from illness and starvation. Those 100 million deaths could be prevented for the price of ten Stealth bombers, or what the world spends on its military in two days!

http://i511.photobucket.com/albums/s357/butlincat/ACHILD.png

The World Health Organization estimates that one-third of the world is well-fed, one-third is under-fed one-third is starving- Since you've entered this site at least 200 people have died of starvation. Over 4 million will die this year.

One in twelve people worldwide is malnourished, including 160 million children under the age of 5. United Nations Food and Agriculture

The Indian subcontinent has nearly half the world's hungry people. Africa and the rest of Asia together have approximately 40%, and the remaining hungry people are found in Latin America and other parts of the world. Hunger in Global Economy

Nearly one in four people, 1.3 billion - a majority of humanity - live on less than $1 per day, while the world's 358 billionaires have assets exceeding the combined annual incomes of countries with 45 percent of the world's people. UNICEF

3 billion people in the world today struggle to survive on US$2/day.

In 1994 the Urban Institute in Washington DC estimated that one out of 6 elderly people in the U.S. has an inadequate diet.

In the U.S. hunger and race are related. In 1991 46% of African-American children were chronically hungry, and 40% of Latino children were chronically hungry compared to 16% of white children.

The infant mortality rate is closely linked to inadequate nutrition among pregnant women. The U.S. ranks 23rd among industrial nations in infant mortality. African-American infants die at nearly twice the rate of white infants.

One out of every eight children under the age of twelve in the U.S. goes to bed hungry every night.

Half of all children under five years of age in South Asia and one third of those in sub-Saharan Africa are malnourished.

In 1997 alone, the lives of at least 300,000 young children were saved by vitamin A supplementation programmes in developing countries.

Malnutrition is implicated in more than half of all child deaths worldwide - a proportion unmatched by any infectious disease since the Black Death

About 183 million children weigh less than they should for their age

To satisfy the world's sanitation and food requirements would cost only US$13 billion- what the people of the United States and the European Union spend on perfume each year.

The assets of the world's three richest men are more than the combined GNP of all the least developed countries on the planet.

Every 3.6 seconds someone dies of hunger

It is estimated that some 800 million people in the world suffer from hunger and malnutrition, about 100 times as many as those who actually die from it each year."

http://library.thinkquest.org/C002291/hi..gh/present/stats.htm

...namaste...butlincat

DECEMBER 7 = DAY OF ACTION|!



see facebook link = http://www.facebook.com/event.php?eid=137793666269183&index=1

IRANI NUCLEAR SCIENTIST ASSASSINATED



Who is killing Iran's nuclear scientists?One senior physicist killed and another wounded in coordinated attacks in Tehran, raising the question of whether there is a nuclear hit-team at work
guardian.co.uk, Monday 29 November 2010 16.32 GMT
An Iranian scientist at the Isfahan Uranium Conversion Facilities
Assassins on motorbikes have killed an Iranian nuclear scientist and wounded another in identical attacks this morning. They drove up to the scientists' cars as they were leaving for work and attached a bomb to each vehicle which detonated seconds later.

The man who was killed was Majid Shahriari, a member of the engineering faculty at the Shahid Beheshti in Tehran. His wife was wounded. The second attack wounded Fereidoun Abbasi, who is also a professor at Shahid Besheshti University, and his wife.

They are senior figures in Iranian nuclear science. Abbasi was a member of the Islamic Revolutionary Guards, or Pasdaran, and once taught at the Pasdaran-run Imam Hossein University. He was hailed by Mahmoud Ahmadinejad three years ago as Iran's academic of the year.

Abbasi is named on UN Security Council resolution 1747 as being "involved in nuclear or ballistic missile activities". The resolution describes him as a "Senior ministry of defence and armed forces logistics scientist with links to the Institute of Applied Physics, working closing closely with Mohsen Fakhrizadeh-Mahabadi" - believed by Western intelligence to be (or have been) in charge of the Iranian nuclear weapons programme.

Shahriari co-authored a paper on neutron diffusion in a reactor core with Ali Akbar Salehi, the head of the Iranian Atomic Energy Organisation. Salehi said today Shahriari was in charge of a major project at AEOI.

The attacks bear some similarities to the assassination of another nuclear physicist, Masoud Ali Mohammadi, in January. In that attack, the bomb was strapped to a motorcyle and detonated by remote control.

You do not have to look far to see a pattern. All three had professional links. Shahriari and Ali Mohammadi were both member of the Sesame Council, which runs a particle accelerator called a synchrotron in Jordan, which brings together scientists from across the region, including Israel. Ali Mohammadi and Abbasi both taught at the IRGC's Imam Hussein University, while both Shahriari and Abbasi are listed as members of the Nuclear Society of Iran.

If the Security Council is right, Abbasi was clearly deeply involved in banned activities. The picture is not as clear with the other two victims. Ali Mohammadi's friends and colleagues insisted he had nothing to do with the banned programme, but Rahesabz, an online news site with links to the Green movement, said he was "involved in Iranian defence programmes, including nuclear facility programmes and was in possession of classified information."

President Mahmoud Ahmadinejad was quick to assign blame. He was quoted by IRNA, the state news agency as saying: "Western governments and the Zionist regime were involved in today's assassinations in Iran."

It does seem that someone is working their way down a hit-list, perhaps striking as and when targets become vulnerable. The culprits could be anyone with the objective of degrading Iran's nuclear capacity. From a completely callous point of view, it does not matter if the targets are central figures. University teachers are turning out the next generation of Iranian nuclear scientists, and a source of expertise on which the state nuclear programme can draw at any time.

One local suspect would be the Sunni Jundullah movement, which today put up a video of a captive called Amir Hossein Shirani, described as a worker in Iran's secret nuclear complex, confessing to the existence of a weapons programme.

However, the video makes no claim of responsibility for the two attacks today, which would in any case represent something of a leap in sophistication for Jundullah operations. There are also reasons to be sceptical of the role of the People's Mujahedin (MeK or PMOI), which has not participated in any such attacks for years and is currently attempting to clean up its image to get off the state department's terrorist organisations list.

One possibility is that this is a smaller, more tightly-knit group, trained and funded abroad with the specific task of picking off members of Iran's nuclear elite. We know that both the US and Israel have active and wide-ranging programmes aimed at sabotaging the Iranian nuclear programme, which has clearly been experiencing severe problems in recent months.

Ahmadinejad today provided the first high-level admission that the Stuxnet computer worm, unleashed earlier this year and widely attributed to the Israelis, had caused problems for Iran's centrifuge programme. According to Reuters, he told a news conference:

They succeeded in creating problems for a limited number of our centrifuges with the software they had installed in electronic parts. They did a bad thing. Fortunately our experts discovered that and today they are not able [to do that] anymore.


The last possibility is that these scientists have been killed by the state either for giving away secrets, or on suspicion of contemplating defection. The fact that that two of the victims were members of the Sesame Council, with contact with Israelis and westerners, could be seen as possible pointers in that direction.

But the costs to Iran of killing its own would be high indeed. The state would lose valuable human capital, knowedgeable scientists teaching the next generation of nuclear specialists, and the assassinations would put any young Iranian off a career in nuclear science. On balance, it seems more likely that this killings have been carried out by enemies of the Islamic Republic rather than its friends.

Sunday, 28 November 2010

david icke - THE LIZARDS + THE JEWS - FULL FILM

D ICKE - THE LIZARDS + THE JEWS x4 full

Icke has never isolated jews alone - other people manipulate what he says like the assoles they are, who try and defame him over this - these same assoles, + i would put money on it, will deny the indigenous people were murdered, tortured, sterilised + experimented on as children in the residential schools there run by the church + state for decades - these clowns are i bet paid govt. shills and traitors and troublemakers, especially Richard Warman, a typical loudmouth ignorant traitor.


USELESS LAW

Paedophile name-change 'danger' threatens Sarah's Law
By Adrian Goldberg

sara payne

Presenter, 5 live Investigates

......Sarah Payne was murdered by Roy Whiting who had a previous conviction for indecently assaulting a child.

Paedophile support scheme expands

Police dismiss 'Sarah's Law' fear

A law being brought in to protect children from sex offenders will be undermined because it is too easy for them to change their name without informing the authorities, a children's charity has warned.

Kidscape is calling on the Home Office to become more proactive and introduce checks on those changing their name using the services of commercial deed poll companies.

Sarah's Law is being rolled out across England and Wales in spring 2011.

It will allow parents and carers limited access to information on the sex offenders register so they can identify possible risks to children in their care.

But 5 live Investigates has discovered that criminals can effectively evade the restrictions imposed on them by the register, simply by taking a new name.

Under the current system those on the sex offenders register are allowed to change their name but they face up to five years in jail if they fail to inform the authorities within three days of doing so.

There are fears some are purposely neglecting to do this in order to reoffend undetected.

Those working with children say it is dangerous to rely on the honesty of sex offenders and more proactive checks should be put in place instead.

"As someone who works in safeguarding children, I find it unacceptable that the onus is on the offender to follow the set of procedures and then there is a penalty if they don't," said Kidscape director Claude Knights.

"I think we have to be much, much more proactive, because we are dealing with a group that's known for trying to throw obstructions in the way of the truth. There is a devious aspect to it all.

"Their goal… is totally and utterly despicable. Having it, so that we react once something happens, is very, very dangerous in relation to the safety of children."

The Home Office says the UK has one of the "most robust systems" in the world for managing sex offenders.

Continue reading the main story
LISTEN TO THE FULL REPORT
Hear the full report on 5 live Investigates, on Sunday 28 November at 2100 GMT on BBC Radio 5 live.

Listen to the 5 live Investigates podcast
Post comments on Facebook
Send comments via Twitter
But Harry Fletcher, assistant general secretary of the probation officers' trade union Napo, estimates the authorities have lost track of around 500 of the 21,000 sex offenders in the community in England and Wales.

He says the only way to catch these sex offenders under the current system is if they commit another offence.

"We can safely say that hundreds have evaded scrutiny by police and probation because they've gone AWOL [absent without leave] - and helped them going AWOL by changing their name. The only way to catch them is if they commit another offence."

Sarah's Law was brought onto the statute book following the murder of eight year-old Sarah Payne in 2000 by Roy Whiting, who had a previous conviction for abducting and indecently assaulting another child.

Assumed identity

Sarah Payne's mother Sara believes that if the local community in Sussex had been aware of Whiting's criminal past, they might have been more alert to the threat to her child.

Continue reading the main story

Start Quote
The UK has one of the most robust systems in the world for the management of sex offenders, which for nearly 10 years has included key local agencies working successfully together”
End Quote
Home Office spokesman
The case of sex offender Alan Smith illustrates his point. Smith was Stan the Monkey, the official mascot of Accrington Stanley FC, until he was sacked in 2005 following a conviction for an indecent assault on a 14-year old.

He was placed on the sex offenders register for seven years but in 2008, he changed his name by deed poll to Alan Anumm without informing the police. He was then able to apply for a passport in his new name.

This allowed him to travel to the Thai capital, Bangkok - a reocgnised centre of the child sex trade - without the knowledge of the UK authorities.

As Alan Smith he had previously been deported from Thailand in 2006 after being discovered working in a school.

Smith/Anumm was only finally tracked down by chance after the police discovered he had made a claim for disability benefit under his assumed identity.

So just how easy is it to officially change your name and adopt an alias?

Risk management

I made an online application to a company called the UK Deed Poll Service, and received documentation confirming my new identity just two days later - and all for a cost of just £37 - with no questions asked.

I could then legitimately apply for a driving licence or passport in the new name.


Presenter Adrian Goldberg was able to change his name in a matter of minutes There is no suggestion that the company or others like them are doing anything illegal. There are many legitimate reasons for seeking a name change, but the ease with which it can be done also creates opportunities for criminals.

The Home Office says: "The UK has one of the most robust systems in the world for the management of sex offenders, which for nearly 10 years has included key local agencies working successfully together."

"By law sex offenders are required to notify the police of any change to their details, including a change of name, within three days of that change taking place. If they don't they can face up to five years in prison.

"Sex offenders may be subject to multi-agency public protection arrangements by which police, probation and the prison service manage the risk posed by them."

But Claude Knights is still concerned. She said: "Predators are looking for loopholes all the time and since we know about this one, it's our duty as a society to close it."



You can hear the full report on 5 live Investigates on Sunday, 28 November at 2100 GMT on BBC Radio 5 live.


You can also listen again on the BBC iPlayer or by downloading the 5 live Investigates podcast.


Send your comments and stories to 5 live Investigates.

http://www.bbc.co.uk/news/uk-11847694

...namaste...b.

Saturday, 27 November 2010

WIKILEAKS will leak 250.000 documents sunday nov 28 according to the German newsmagazine Der Spiegel

WIKILEAKS will leak 250.000 documents sunday nov 28 according to the German newsmagazine Der Spiegel
The controversial WikiLeaks site is ready to publish over 250,000 documents from the American Foreign Service Sunday evening, said the German newsmagazine Der Spiegel.



The magazine published by mistake an article that was meant to be posted on Sunday, writes the Norwegian National Radio, NRK. Before the editors managed to remove the article, the content distributed online.


8000 diplomatic documentsThe article includes leaks 251,287 telegrams from the U.S. Foreign Service and 8000 diplomatic documents. Most of the material dates from after 2004, and much of it is from January and February this year.


Most of the material about the Middle East and Asia, shows a map in the Der Spiegel article. The heralded leakage occurs despite warnings from U.S. authorities, who fear it would damage relations with a number of countries.


But also the countries covered, fears leak, and in Britain are editors were warned not to publish cases that may harm national security.


The documents are messages that are sent from U.S. embassies abroad to the State Department in Washington. They often contain material that it was in no way meant that the public should be aware of.


Publication of WikiLeaks can be very embarrassing for both host countries and the United States.


Denmark warnedRecently it emerged that the Americans have contacted the Danish Foreign Ministry to give warning of the contents of the next major leak from WikiLeaks.


The Foreign Ministry confirmed to politiken.dk without elaborating on whether this is Ambassador Laurie S. Fulton and Foreign Minister Lene Espersen (K) personally, which has discussed the matter.


- Ministry of Foreign Affairs has been contacted by the Americans on WikiLeaks forthcoming publication. We can not dwell on the content of the conversation, the Foreign Ministry to politiken.dk.

Friday, 26 November 2010

WHO ARE THE MADELEINE FOUNDATION? X2 BBC 21 11 10

gang jailed

A gang of Plymouth paedophiles who hung around mens public toilets swapping information about their prey of innocent vulnerable children, amongst other obscene activities were removed from society for long periods of time today, thankfully......namaste...b.

my vid of UFOs - KING CRIMSON

WIKILEAKS SET TO RELEASE DOCS

Washington Braced For Millions Of Leaks
The British government has been briefed by US authorities about the expected release of millions of diplomatic documents online.
The potentially embarrassing and sensitive communications are expected to be published by Wikileaks - which has already released thousands of military papers on Iraq and Afghanistan.

Around 2.7m million confidential messages between the US government and its embassies around the world are to be released.

Reports suggest the files could include hundreds of cables relating to UK interests, and might include revelations about secret intelligence sources and practices.

The US State Department - America's foreign ministry - has condemned the actions of the website as gratuitous - and likely to harm relations and erode trust between countries.

Sky News understands the US ambassador to the UK, Louis Susman, has been seen going into Downing Street and the Foreign Office for what one source called "contingency planning".

Sky News foreign affairs editor Tim Marshall said: "Potentially this is diplomatic dynamite.

"(It involves) 2.7 million emails that have gone between the State Department and various embassies across the world with candid remarks about world leaders, about ambassadors, about foreign leaders.

"We think that three leaders might be in the firing line, because we know the Americans have criticised (Afghan president) Hamid Karzai, President Asif Ali Zardari of Pakistan and Prime Minister Vladimir Putin, of Russia.

"Those are just three names that we're hearing that may be criticised. There are many, many more and it is very embarrassing for the Americans.



WikiLeaks founder Julian Assange has divided opinion since rising to prominence


"The Americans have spent the last four months poring through these documents and they will have thought 'oh dear, look what we said about X'."

He added there was a debate about whether it was right to publish the documents.

Those in favour of the leaks say they are part of a transparent democracy, however critics argue such revelations may hamper government officials' ability to do their jobs properly due to fears their comments will end up on the internet.

US State Department spokesman PJ Crowley said: "We continue to make clear that this is harmful to our national security.


At the heart of this exchange is the debate over whether a government has the right to conduct any of its business in secret given that citizens fund what the government is doing and thus has a right to know.

Sky foreign affairs editor Tim Marshall

"It does put lives at risk. It does put national interests at risk.

"Inherent in this day-to-day action is trust that we can convey our perspective to other governments in confidence and that they can convey their perspective on events to us.

"When this confidence is betrayed and ends up on the front pages of newspapers or lead stories on television and radio it has an impact.

"These revelations are going to create tension in our relationships between our diplomats and our friends around the world."

Prime Minister David Cameron's spokesman declined to discuss the nature of any confidential communications which may have been obtained by WikiLeaks.

The spokesman said: "Obviously, the Government has been briefed by US officials, by the US ambassador, as to the likely content of these leaks.

"I don't want to speculate about precisely what is going to be leaked before it is leaked."


18

Share
Comments (97)
12:20pm UK, Friday November 26, 2010

Richard Williams, Sky News Online

The British government has been briefed by US authorities about the expected release of millions of diplomatic documents online.
The potentially embarrassing and sensitive communications are expected to be published by Wikileaks - which has already released thousands of military papers on Iraq and Afghanistan.

Around 2.7m million confidential messages between the US government and its embassies around the world are to be released.

Reports suggest the files could include hundreds of cables relating to UK interests, and might include revelations about secret intelligence sources and practices.

The US State Department - America's foreign ministry - has condemned the actions of the website as gratuitous - and likely to harm relations and erode trust between countries.

Sky News understands the US ambassador to the UK, Louis Susman, has been seen going into Downing Street and the Foreign Office for what one source called "contingency planning".

Sky News foreign affairs editor Tim Marshall said: "Potentially this is diplomatic dynamite.

"(It involves) 2.7 million emails that have gone between the State Department and various embassies across the world with candid remarks about world leaders, about ambassadors, about foreign leaders.

"We think that three leaders might be in the firing line, because we know the Americans have criticised (Afghan president) Hamid Karzai, President Asif Ali Zardari of Pakistan and Prime Minister Vladimir Putin, of Russia.

"Those are just three names that we're hearing that may be criticised. There are many, many more and it is very embarrassing for the Americans.



WikiLeaks founder Julian Assange has divided opinion since rising to prominence


"The Americans have spent the last four months poring through these documents and they will have thought 'oh dear, look what we said about X'."

He added there was a debate about whether it was right to publish the documents.

Those in favour of the leaks say they are part of a transparent democracy, however critics argue such revelations may hamper government officials' ability to do their jobs properly due to fears their comments will end up on the internet.

US State Department spokesman PJ Crowley said: "We continue to make clear that this is harmful to our national security.


At the heart of this exchange is the debate over whether a government has the right to conduct any of its business in secret given that citizens fund what the government is doing and thus has a right to know.

Sky foreign affairs editor Tim Marshall

"It does put lives at risk. It does put national interests at risk.

"Inherent in this day-to-day action is trust that we can convey our perspective to other governments in confidence and that they can convey their perspective on events to us.

"When this confidence is betrayed and ends up on the front pages of newspapers or lead stories on television and radio it has an impact.

"These revelations are going to create tension in our relationships between our diplomats and our friends around the world."

Prime Minister David Cameron's spokesman declined to discuss the nature of any confidential communications which may have been obtained by WikiLeaks.

The spokesman said: "Obviously, the Government has been briefed by US officials, by the US ambassador, as to the likely content of these leaks.

"I don't want to speculate about precisely what is going to be leaked before it is leaked."

WIKILEAKS SET TO RELEASE DOCS

Washington Braced For Millions Of Leaks
The British government has been briefed by US authorities about the expected release of millions of diplomatic documents online.
The potentially embarrassing and sensitive communications are expected to be published by Wikileaks - which has already released thousands of military papers on Iraq and Afghanistan.

Around 2.7m million confidential messages between the US government and its embassies around the world are to be released.

Reports suggest the files could include hundreds of cables relating to UK interests, and might include revelations about secret intelligence sources and practices.

The US State Department - America's foreign ministry - has condemned the actions of the website as gratuitous - and likely to harm relations and erode trust between countries.

Sky News understands the US ambassador to the UK, Louis Susman, has been seen going into Downing Street and the Foreign Office for what one source called "contingency planning".

Sky News foreign affairs editor Tim Marshall said: "Potentially this is diplomatic dynamite.

"(It involves) 2.7 million emails that have gone between the State Department and various embassies across the world with candid remarks about world leaders, about ambassadors, about foreign leaders.

"We think that three leaders might be in the firing line, because we know the Americans have criticised (Afghan president) Hamid Karzai, President Asif Ali Zardari of Pakistan and Prime Minister Vladimir Putin, of Russia.

"Those are just three names that we're hearing that may be criticised. There are many, many more and it is very embarrassing for the Americans.



WikiLeaks founder Julian Assange has divided opinion since rising to prominence


"The Americans have spent the last four months poring through these documents and they will have thought 'oh dear, look what we said about X'."

He added there was a debate about whether it was right to publish the documents.

Those in favour of the leaks say they are part of a transparent democracy, however critics argue such revelations may hamper government officials' ability to do their jobs properly due to fears their comments will end up on the internet.

US State Department spokesman PJ Crowley said: "We continue to make clear that this is harmful to our national security.


At the heart of this exchange is the debate over whether a government has the right to conduct any of its business in secret given that citizens fund what the government is doing and thus has a right to know.

Sky foreign affairs editor Tim Marshall

"It does put lives at risk. It does put national interests at risk.

"Inherent in this day-to-day action is trust that we can convey our perspective to other governments in confidence and that they can convey their perspective on events to us.

"When this confidence is betrayed and ends up on the front pages of newspapers or lead stories on television and radio it has an impact.

"These revelations are going to create tension in our relationships between our diplomats and our friends around the world."

Prime Minister David Cameron's spokesman declined to discuss the nature of any confidential communications which may have been obtained by WikiLeaks.

The spokesman said: "Obviously, the Government has been briefed by US officials, by the US ambassador, as to the likely content of these leaks.

"I don't want to speculate about precisely what is going to be leaked before it is leaked."


18

Share
Comments (97)
12:20pm UK, Friday November 26, 2010

Richard Williams, Sky News Online

The British government has been briefed by US authorities about the expected release of millions of diplomatic documents online.
The potentially embarrassing and sensitive communications are expected to be published by Wikileaks - which has already released thousands of military papers on Iraq and Afghanistan.

Around 2.7m million confidential messages between the US government and its embassies around the world are to be released.

Reports suggest the files could include hundreds of cables relating to UK interests, and might include revelations about secret intelligence sources and practices.

The US State Department - America's foreign ministry - has condemned the actions of the website as gratuitous - and likely to harm relations and erode trust between countries.

Sky News understands the US ambassador to the UK, Louis Susman, has been seen going into Downing Street and the Foreign Office for what one source called "contingency planning".

Sky News foreign affairs editor Tim Marshall said: "Potentially this is diplomatic dynamite.

"(It involves) 2.7 million emails that have gone between the State Department and various embassies across the world with candid remarks about world leaders, about ambassadors, about foreign leaders.

"We think that three leaders might be in the firing line, because we know the Americans have criticised (Afghan president) Hamid Karzai, President Asif Ali Zardari of Pakistan and Prime Minister Vladimir Putin, of Russia.

"Those are just three names that we're hearing that may be criticised. There are many, many more and it is very embarrassing for the Americans.



WikiLeaks founder Julian Assange has divided opinion since rising to prominence


"The Americans have spent the last four months poring through these documents and they will have thought 'oh dear, look what we said about X'."

He added there was a debate about whether it was right to publish the documents.

Those in favour of the leaks say they are part of a transparent democracy, however critics argue such revelations may hamper government officials' ability to do their jobs properly due to fears their comments will end up on the internet.

US State Department spokesman PJ Crowley said: "We continue to make clear that this is harmful to our national security.


At the heart of this exchange is the debate over whether a government has the right to conduct any of its business in secret given that citizens fund what the government is doing and thus has a right to know.

Sky foreign affairs editor Tim Marshall

"It does put lives at risk. It does put national interests at risk.

"Inherent in this day-to-day action is trust that we can convey our perspective to other governments in confidence and that they can convey their perspective on events to us.

"When this confidence is betrayed and ends up on the front pages of newspapers or lead stories on television and radio it has an impact.

"These revelations are going to create tension in our relationships between our diplomats and our friends around the world."

Prime Minister David Cameron's spokesman declined to discuss the nature of any confidential communications which may have been obtained by WikiLeaks.

The spokesman said: "Obviously, the Government has been briefed by US officials, by the US ambassador, as to the likely content of these leaks.

"I don't want to speculate about precisely what is going to be leaked before it is leaked."

UFO AND CHEMTRAILS

MOSCOW UFOS

MASSIVE UFOS OVER ICELANDIC VOLCANO

Thursday, 25 November 2010

WTF?

scanner
Body Scanner Operator Caught Masturbating at Colorado Airport
August 4th, 2010by Hugh Muzzbe

Not only do the new airport body scanners take risque pictures but according to the U.S. Marshals Service, the images in their thousands are being saved on hard disks.DENVER - USA - A full body scanner operator was caught masturbating during ...a scanning session by airport staff late Tuesday.

Airport officials at Denver International airport were on high alert yesterday when a full body scanner operator was caught masturbating in his booth as a team of High School netball players went through the scanner.

"The young ladies were going through the scanner one by one, and every time one went through, this guys face was getting redder and redder. His hand was moving and then he started sweating. He was then seen doing his 'O' face. That's when the security dragged him out of his booth and cuffed him. He had his pants round his ankles and everybody was really disgusted," Jeb Rather, a passenger on a flight to New York told CBS news.

The controversial scanners display every minute detail of a person's body and have been called intrusive by privacy campaigners. Body scanners penetrate clothing to provide a highly detailed image so accurate that critics have likened it to a virtual porn shoot. Technologies vary, with millimeter wave systems capturing highly detailed pictures of genitals, and backscatter X-ray machines able to show precise anatomical detail. The U.S. government likes the idea because body scanners can detect concealed weapons better than traditional magnetometers.

"What do you want to do, get blown up by a goddamn Arab at 30,000 feet or we get to see your private parts? It's up to you, the ball's in your park," head of the TSA's scanning department, Rodney Schroeder, told CNN.
http://www.dailysquib.co.uk/?c=124&a=2389See More

CLOAKED TIME

CLOAKED TIME - PLS PUT IN UR BROWSER FOR SENDSPACE PDF {FOR MANY PICS TOO} FILE, WHICH CAN BE SAVED
http://www.sendspace.com/file/cv3jq0

IOP PUBLISHING JOURNAL OF OPTICS

J. Opt. 13 (2011) 024003 (9pp) doi:10.1088/2040-8978/13/2/024003

A spacetime cloak, or a history editor

MartinW McCall1, Alberto Favaro1, PaulKinsler1

and Allan Boardman2

1 Department of Physics, Imperial College London, Prince Consort Road, London SW7 2AZ,

UK

2 Photonics and Nonlinear Science Group, Joule Laboratory, Department of Physics,

University of Salford, Salford M5 4WT, UK

E-mail: m.mccall@imperial.ac.uk

Received 14 September 2010, accepted for publication 22 October 2010

Published 16 November 2010

Online at stacks.iop.org/JOpt/13/024003

Abstract

We introduce a new type of electromagnetic cloak, the spacetime cloak (STC), which conceals

events rather than objects. Non-emitting events occurring during a restricted period are never

suspected by a distant observer. The cloak works by locally manipulating the speed of light of

an initially uniform light distribution, whilst the light rays themselves always follow straight

paths. Any ‘perfect’ spacetime cloak would necessarily rely upon the technology of

electromagnetic metamaterials, which has already been shown to be capable of deforming light

in ways hitherto unforeseen—to produce, for example, an electromagnetic object cloak.

Nevertheless, we show how it is possible to use intensity-dependent refractive indices to

construct an approximate STC, an implementation that would enable the distinct signature of

successful event cloaking to be observed. Potential demonstrations include systems that

apparently violate quantum statistics, ‘interrupt-without-interrupt’ computation on convergent

data channels and the illusion of a Star Trek transporter.

Keywords: electromagnetic cloaking, metamaterials, electromagnetic modulation, spacetime,

observers and events

(Some figures in this article are in colour only in the electronic version)

1. Introduction

Would it not be amazing if, in an age of ubiquitous

surveillance, a method could be devised to somehow remove

a piece of history that would otherwise be recorded by

a surveying camera? A safe-cracker would be able, for

a brief time, to enter a scene, open the safe, remove its

contents, close the door and exit the scene, whilst the record

of a surveillance camera apparently showed that the safe

door was closed all the time. Although this sounds like

science fiction, the lesson from metamaterials research in

the last decade has taught us that, within certain restrictions,

such speculations are not fantasy. We here show how the

magic of editing history can be achieved by introducing the

concept of the spacetime cloak (STC). The proposal opens

up a new paradigm for electromagnetic cloaking and has

major implications for research in metamaterials, slow light

and phase modulation. Metamaterials already bend light in

unconventional ways, producing aberration-free lenses [1] or

spatial ‘object’ cloaks, which coax electromagnetic radiation

around a spatial void invisible to outside observers [2–4].

These latter developments are extensions of our historical and

pre-historical abilities—that light can bend whilst traversing

transparent materials has been known at least since humans

went fishing with spears; even the controlled bending of

light in prisms and lenses has been known for centuries.

In contrast, the STC utilizes time-dependent nanometreengineered

electromagnetic metamaterials to create a temporal

void within which events can be hidden. Remarkably, our

spacetime ‘event’ cloak leaves light rays undeviated from

their expected linear spatial trajectories, and instead works

by dividing illuminating light into a leading part, which is

speeded up and passes before a collection of events occur, and

a trailing part, which is slowed down and passes after they

have occurred. This process is thus utterly distinct from a

spatial ‘object’ cloak, which instead achieves concealment by

bending light around an object. The STC opens a temporary

corridor through which energy, information and matter can be

2040-8978/11/024003+09$33.00 © 2011 IOP Publishing Ltd 1 Printed in the UK & the USA

J. Opt. 13 (2011) 024003 MWMcCall et al

Figure 1. (a) Conventional spatial cloak based on a planar transformation (x, y)→ (x

, y

). An observer located to the far right on the x axis

does not see the object. (b) Spacetime cloak. An analogous coordinate transformation is used, but now in (x, t ) rather than (x, y). The cloak

now conceals events near the spacetime origin. The (schematic) intensity distribution for various times is shown on the right, indicating the

formation and subsequent evaporation of the intensity null that is fully developed at t = 0. The observer to the right never suspects the

occurrence of any non-radiating events near the spacetime origin and sees a uniform intensity for all time.

manipulated or transported undetected. Once the concealed

passage has been used, the STC closes by slowing the leading

part of the light, whilst speeding up the trailing part, leaving no

trace of the cloak, or the concealed events, on the field profile.

To a distant observer, any non-emitting object whose presence

persisted throughout the lifetime of the STC will have had a

finite interval excised from its history. Any object which emits

light during STC operation will have that part of its history

temporally compressed so that, if not absorbed, it will appear to

the observer as if occurring in a single instant. We here outline

the theory and design of the spacetime cloak and describe

potential applications: hiding events from some observers but

not others, using the ‘time gap’ to generate apparent violations

of quantum statistics, allowing the covert interruption of noninterruptible

computation and/or signal processing operations,

and creating the illusion of a Star Trek transporter.

2. The spacetime cloak concept

Our method for redacting history is based on applying

the principles of transformation optics to produce an

electromagnetic cloak working in both space and time, rather

than in just space. Transformation optics relies on mimicking

a coordinate transformation applied to Maxwell’s vacuum

equations by means of an inhomogeneous dielectric/magnetic

medium. A coordinate transformation r → r , taking straight

lines to curves, transforms the electromagnetic field so that in

the new system

∇ × E = −∂B

∂t

, ∇ ·D = 0, (1)

∇ × H = ∂D

∂t

, ∇ · B = 0. (2)

Since the form of Maxwell’s equations is preserved, the

vacuum relations D = 0E,B = μ0H are replaced in

the new coordinate system by appropriate inhomogeneous,

anisotropic relations D =



(r

) · E , B = μ



(r

) ·

H . If instead of transforming coordinates, the original

coordinate space (r) is filled with a medium (r), μ(r),

having the same inhomogeneous, anisotropic (and, strictly

speaking, instantaneously responding) properties prescribed by




(r

),μ



(r

), then the linear light paths of vacuum become

curved, just as straight lines become curved under r → r .

Figure 1(a) shows how a spatial electromagnetic cloak [2] is

produced via a time-invariant planar transformation (x, y) →

(x

, y

) that diverts light rays so as to create a void near the

origin. The polar transformation r = (1 − a/b)r + a, θ

= θ,

z = z distorts linear rays travelling in vacuum from left to right

to those shown. Equivalently, rays in an anisotropic dielectric

with polar parameters ( ,μ)r = (1−a/r )( r,μr )0, ( ,μ)θ =

(1−a/r )

−1( θ,μθ )0, ( ,μ)z = (1−a/b)

−2(1−a/r )( z,μz)0

are curved in exactly the same way to produce a cloak around

a cylindrical object of radius a, centred at the origin [4].

2

J. Opt. 13 (2011) 024003 MWMcCall et al

ct'

x'

(a)

ct x

U

(b)

-4 -2 0 2 4

-4

-2

0

2

4

-2

0

2

-2

0

2

-4

4

0

2

4

Figure 2. (a) Construction of a sub-luminal spacetime cloak. As with figure 1(b) the map (x, t )→ (x t

) creates a void near the spacetime

origin. However, the base space is filled with a medium of refractive index n rather than vacuum, so that prior to the transformation light rays

are straight lines of gradient n. The transformation is a composition of a Lorentz boost, (x, t )→ ( . x, .t), with velocity v = c/n, followed by

applying a ‘curtain map’ .x = [( δ+|c.t |

δ+nσ )( . x − sgn( . x)σ ) + sgn( . x)σ ], .t = .t, followed by an inverse Lorentz transformation, ( . x

, .t

)→ (x

, t

).

(See the appendix for further details.) Shown is the coordinate transformation (x, t )→ (x

, t

) with σ = 1, n = 2, δ = 0.5 for the curtain

map. The deformed rays all have positive gradients (i.e. propagate forwards in time) and have speed c. The coordinate transformation

(x, t )→ (x

, t

) defines the spacetime transformation that yields equations (1) and (2) with t = t . Alternatively, a material with the required

(x, t ),μ(x, t ), β(x, t ), enables the spacetime cloak to be realized in an actual medium. (b) Electromagnetic energy density for various times

for the map of (a). The hard edges of the curtain map defined above have been softened by the use of mollifier functions (see the appendix),

thus avoiding unrealistic instantaneous switching. The intensity is null at events near the spacetime origin.

For our spacetime cloak we consider spacetime transformations

(x, t) → (x

, t

) and restrict to light propagating

forwards along the x axis. In figure 1(b), for example, a

spacetime transformation is carried out in the (x, t) plane that

is analogous to the spatial transformation carried out in the

(x, y) plane of figure 1(a). In contrast to the spatial cloak,

where the direction of propagation in the x–y plane is arbitrary,

the vacuum light rays must follow the straight lines x = ct +

const. These rays are then mapped under the transformation

to the curved rays shown so that the events within the disc

surrounding the origin are avoided by the new rays. The new

light trajectories are actualized when they propagate through

a suitable inhomogeneous time-dependent medium, and will

then curve around the event occurring at x = 0, t = 0. As

discussed in the appendix, the form of Maxwell’s equations

(equations (1) and (2), but now with the addition that t → t )

is again preserved provided the equivalent medium is magnetoelectric

with the transverse field components obeying


Dy

Dz



= (x, t)


Ey

Ez



+ β(x, t)


Hz

−Hy



(3)

3

J. Opt. 13 (2011) 024003 MWMcCall et al


By

Bz



= β(x, t)


−Ez

Ey



+ μ(x, t)


Hy

Hz



. (4)

The medium is thus in general required to be magneto-electric.

In contrast to the spatial cloak, where light curves in the (x, y)

plane, ‘curving’ light in the (x, t) plane now refers to different

parts of the light paths speeding up and slowing down. The

light proceeds only along the x axis and does not curve in

space. As a consequence, events in the neighbourhood of the

event at (x, t) = (0, 0) are never suspected by an observer

located sufficiently far to the right. In fact, all events in

the y–z plane that occur near (x, t) = (0, 0) are similarly

undetected. The concealment results from various parts of the

light distribution slowing down and speeding up so as to avoid

events near the spacetime origin. The intensity along the x

axis for different times is shown on the right of figure 1(b),

indicating the formation of the intensity null that is fully

developed at t = 0. For later times the null closes up, restoring

a uniform intensity distribution so that the observer at x = a

records a constant intensity for all time. Since the events near

(x = 0, t = 0) are never illuminated, the observer to the right

is unaware of their existence. In fact, all events in the (y, z)

plane that occur near (x = 0, t = 0) are concealed, so that

effectively a spacetime corridor is opened along which nonradiating

events, such as the movement of matter, exchange of

information, etc, can occur undetected.

The spacetime cloak of figure 1(b) is symmetric, in

that uniform illumination from the right will avoid the same

cloaked events for an observer located sufficiently far to the

left. As conceived by the symmetric transformation in the

x–t plane of figure 1(b), some rays in the medium will be

required to have a phase speed exceeding the vacuum speed

of light (e.g. ray A in the inset) and some rays very close

to the cloaked region (e.g. ray B) propagate backwards in

time. Superluminal ray trajectories, which occur in purely

spatial cloaks and in plasma propagation above the plasma

frequency, are characterized by the phase velocity exceeding

the vacuum speed of light, and are known to be compatible

with special relativity [5]. Waves travelling backwards in time

are precisely the interpretation of waves undergoing negative

phase velocity propagation, or negative refraction, where the

reversal of time in the wave’s phase φ = k · r−ωt is equivalent

to the reversal of the direction of the wavevector k with respect

to electromagnetic flux [6]. However, both superluminal and

negative phase waves, though accessible through appropriate

metamaterials design, can, through similar design ingenuity,

both be avoided in the spacetime cloak, as we discuss next.

3. Simplified designs

Referring to figure 2, the coordinate transformation is now

carried out against a background of a uniform medium of

refractive index n > 1, rather than vacuum. The complete

transformation consists of a Lorentz transformation into a

frame in which the rays are vertical, opening the void via

a ‘curtain map’, followed finally by an inverse Lorentz

transformation back into the medium rest frame (see the

appendix for further details). The construction is such that

stretched shifted compressed

sd 2d sd

t

x

cloaked

cloaked

Cloaked

Rays

Uncloaked Rays

Fast

Slow Slow

Fast

Figure 3. Spacetime cloak based on refractive index switching. (a)

The base space is a medium of refractive index n with an inner

region of width 2d surrounded by two outer regions of extent sd

identified. For −(1 + s)d x < 0 the transformation is given by x = (s + 2)(s + 1) −1x + d for t nx and by x = s(s + 1) −1x − d for t > nx. For 0 x < (s + 1)d the transformation is given by x = s(s + 1) −1x + d for t nx and by x = (s + 2)(s + 1) −1x − d for t > nx. All other regions are unaffected. All rays are sub-luminal

provided n(1 + 1)(s + 2)

−1 < 1. Unlike the cloak of figure 2(a), a single cloaking operation does not return the system to its original state. Alternating cloak operations as shown permits periodic restoration of the medium to its original state by interleaving a cloak operating in the reverse direction. all rays in figure 2(a) travel slower than the vacuum speed of light. The plots of figure 2(b) show a detailed calculation of the electromagnetic energy density in the equivalent medium defined by the transformation, where the hard edges of the map have been mollified so that the medium is not switched instantaneously. The energy null which develops as the cloak is switched on becomes zero at events near the spacetime origin. Unlike the cloak of figure 1(b), this spacetime cloak only works for light travelling in the +x direction. An observer to the left of the origin does see the cloaked events, though time separations between the cloaked events are first speeded up, then time-shifted, and then finally slowed down, before progression returns to normal. The magneto-electric parameter, β(x, t), in equations (3) and (4) arises almost invariably whenever the transformation 4 J. Opt. 13 (2011) 024003 MWMcCall et al O Occasional 'priorit y' bits A B C D . . . . . . Primary computation 0 5 10 15 20 0 1 2 3 4 5 time (ns) Fluoresence (a.u.) without cloak B A O A B (a) (b) (c) with cloak cloak region B Figure 4. Realization of the spacetime cloak as a set of addressable planes with metallic inclusions. Applications based on how the central region is filled as the intensity null passes over: (a) excited atoms. The exponential fluorescence decay is observed with the emissions during cloak operation all apparently occurring simultaneously, resulting in an intensity spike, followed by resumption of the exponential decay. (b) ‘Interrupt-without-interrupt’. An occasional signal (channel AB) and a primary computation (channel CD) converge at the same physical node. Suppose it is required to process the occasional signal, without interrupting the primary computation. The cloak operation opens a temporal window via which the occasional signal can be processed, whilst the primary computation is reconstituted after the cloak operation to appear as if uninterrupted. (c) A Star Trek transporter. Movement of non-radiating matter whilst the cloak is operating appears to the observer O to have moved from A to B instantaneously. (x, t) → (x , t ) mixes space and time. This occurs, for example, in a medium of refractive index n moving with velocity v wherein the constitutive relations revert to the Minkowski form [7], the magneto-electric parameter then being given by β(x, t) = v(x, t) c n2 − 1 1 − n2v2(x, t)/c2 . (5) The spacetime cloak therefore involves the construction of a metamaterial that mimics propagation in a medium with a velocity v(x, t). The occurrence of the null can then be understood via the velocity addition formula v (x, t) = [v(x, t)+c/n]/[1+v(x, t)/(cn)], where v (x, t) is the velocity of light in the moving medium. Near t = 0, the effective medium is arranged so that v(x, t) is negative for x < 0 and positive for x > 0. The trailing and leading parts of

the light are thus respectively slowed down and speeded up

to produce the required intermediate null. Non-reciprocal bianisotropic

metamaterials that mimic the constitutive relations

for a moving medium have been studied by Tretyakov [8], who

has shown that such media can in principle be constructed from

small magnetized ferrite spheres combined with planar-chiral

metallic inclusions [9].

A spacetime cloak with a transformation of the form t =

t, x = x

(x, t) is illustrated in figure 3 which only requires

manipulation of (x, t) and μ(x, t). The transformation

is devised such that the spatio–temporal variation of these

parameters matches, so that the impedance is uniform. The

refractive index, however, is switched from high to low before

the central region, and from low to high after the central

region. The price of this simplified design is that the index

5

J. Opt. 13 (2011) 024003 MWMcCall et al

Figure 5. Spacetime cloak based on exploiting the nonlinear refractive index properties of optical fibres. The cloak is opened in fibre A, is

held open in fibre B (which contains the core cloak region) and is closed again in fibre C. Two control fields IA and IC modulate the refractive

index in A (C) from low to high (high to low). The much weaker illumination field experiences the index changes required for the cloak

illustrated in figure 3. A signal field injected directly into fibre B is present before, during and after the cloaking from the illumination field.

By monitoring the signal as it is coupled out, the spacetime modulation on it from the illumination and the effect of nonlinear refractive index

can be measured. Changes to the signal field during the cloaking period leave no signature on the illumination field. Timing and

synchronization is only critical in ensuring that the top right apex of the cloaking diamond (figure 5) aligns with the bottom-left corner at an

angle given by the average phase speed of the signals. Fibre parameters: silica refractive index ∼1.5; control field intensity set to yield an

index change n = n2 I ∼ 5 × 10−4.

changes persist in the switched regions, so that, unlike the

previous designs, the medium surrounding the spatial origin

is not returned to its original state after the cloak has operated.

Periodic switching, as shown in figure 3, returns the medium to

its original state every other cycle and, moreover, permits bidirectionality

by alternating the forward cloak with an identical

one for light travelling in the −x direction. If the index

is switched without any impedance matching (as was done

for the first demonstrations of the spatial cloak [4]), then

reflections will occur at the interfaces. The observer to the

right would consequently notice abrupt changes of the overall

field intensity, but still remain ignorant of the events occurring

within the cloaked period.

4. Demonstrations

What effects might be observable using the spacetime cloak?

Figure 4 shows a collage of possibilities based around what

happens in the y–z plane in the region near x = 0 where/when

the cloak operates. Filling this region with excited atoms

(figure 4(a)) will cause the standard exponential fluorescence

decay to be modified by the cloak, as emissions within

the cloaked period will all appear to happen simultaneously

to the distant observer to the right. The observed spike

could be a useful experimental signature, since the required

cloaking period need only be comparable to the spontaneous

lifetime (∼ns), corresponding to a dimension of ∼30 cm

for the cloaked central region. Measurements of the

coherence and statistics of light signals emitted by such

a cloaked source will also yield anomalous results, even

those of a quantum origin such as photon bunching or antibunching.

Figure 4(b) proposes a specific application in

signal processing where two channels, proceeding along the

x and y directions respectively, cross at x = 0. Through

the operation of the spacetime cloak occasional signals

along the y channel can be processed as a priority, whilst

processing and computation proceeds seamlessly, without

interruption, along the x channel, achieving effectively an

‘interrupt-without-interrupt’. Finally, the spacetime cloak

can achieve the illusion of a matter transporter (figure 4(c)),

in which an object moves from (y1, z1) to (y2, z2) during

the cloak’s operation. The observer to the right sees the

object disappear at (y1, z1) to then instantaneously reappear

at (y2, z2).

6

J. Opt. 13 (2011) 024003 MWMcCall et al

It is emphasized that all the above demonstrations only

require light propagation in one dimension since producing a

temporary null in a collimated wave is all that is necessary to

conceal events near x = 0 in the y–z plane for a limited period.

However, it is clear that the spacetime cloak concept can be

extended to more spatial dimensions where the illuminating

light is not collimated. A spherical wave from a point source,

for example, illuminates a set of events lying on a sphere

at radius R from the origin. A spacetime cloak concealing

these events will do so for distant observers positioned at any

viewing angle.

5. Implementation

How practical is it to build a spacetime cloak? As with

the original proposals for a spatial cloak, we have neglected

dispersion, whose effect in this case will be to constrain the

rate at which the cloak can be opened and closed. Figure 5

shows a scheme to implement the design of figure 3 using

nonlinear optical fibres. The cloak is opened in fibre A, is

held open in fibre B (which contains the core cloak region) and

is closed again in fibre C. The primary operation is achieved

by means of two control fields whose intensity allows the

refractive index in A (C) to be modulated from low (high)

to high (low). This is achieved using the nonlinear refractive

index properties of the fibre (e.g. silica). The illumination field

is affected by the refractive index shifts (i.e. by the cloak), but

should have an intensity modulation far weaker than that used

by the control fields. The cloak opens up a spacetime gap in

the intensity profile of the illumination field. This gap could be

detected by monitoring leaky spot(s) on fibre B, and looking

for the intensity dip(s) in the illumination. Alternatively,

a signal field could be injected directly into fibre B, and

would therefore always be present, i.e. before, during and after

the cloaking from the illumination field. By monitoring the

signal as it is coupled out, the spacetime modulation on it

from the illumination and the effect of nonlinear refractive

index could be measured. For a brief period, the presence

of the signal field will be undetectable to the surveilling

illumination field and changes to the signal field during the

cloaking period would leave no signature on the illumination

field. The group velocity of the on/off transitions must be no

slower than the slow phase velocity and no faster than the fast

phase velocity. This ensures that the control/cloaking index

transitions always remain inside the cloak. Good dispersion

control would be required (probably using photonic crystal

fibres): If the various fields all have distinct frequencies or

polarizations then they can be coupled in and out efficiently

and distinctly. The fibre parameters illustrated in figure 5

are optimistic but accessible (though harmonic generation

and Raman and Brillouin scattering would also need to be

considered). Similarly, all coupling is assumed to be perfect,

although slight leakage of control field A into fibres B and C

should be tolerable.

6. Conclusion

We have introduced a fundamentally new concept of

electromagnetic cloaking that exploits the transformation

optics algorithm in one space and one time dimension. The

result is a cloak that operates in a fundamentally distinct way

to the purely spatial, or object, cloak, in that it conceals

events by curving light rays in spacetime rather than in space.

Although this sets new challenges for metamaterials design, we

have shown how these challenges can be minimized through

judicious manipulation of the refractive index of the metamedium.

We have proposed a proof-of-principle design based

on nonlinear fibre optics that could demonstrate the signature

of spacetime cloaking, and how the concept could find practical

applications in signal processing.

We are sure that there are many other possibilities that are

opened up by our introduction of the concept of the spacetime

cloak. Whilst the camera is said to never lie, it does not always

record the whole truth.

Acknowledgments

Support from EPSRC grant no. EP/E031463/1 and a

Leverhulme Embedding Emerging Disciplines award is

acknowledged. One of us (MWM) acknowledges a useful

discussion with Professor David Websdale.

Appendix

A.1. Calculating the material parameters for the spacetime

cloak

Calculating the required spatial and temporal material

properties of the spacetime cloak, and the resultant distribution

of electromagnetic energy, is most easily carried out

using a covariant approach. We take Cartesian–Lorentz

coordinates indexed as α = 0–3, i.e. {xα} = (ct, x, y, z).

The source-free Maxwell equations in a linear medium

responding instantaneously to electromagnetic excitation may

be expressed as



∂xβ

(χαβμν Fμν) = 0, (6)

where Fμν is the electromagnetic field tensor given by (in units

where c = 1)

Fμν =



⎜⎜⎝

0 −Ex −Ey −Ez

Ex 0 Bz −By

Ey −Bz 0 Bx

Ez By −Bx 0



⎟⎟⎠

, (7)

The fourth-rank object χαβμν relates Fμν to Gαβ according to

Gαβ = χαβμν Fμν, (8)

where

Gαβ =



⎜⎜⎝

0 Dx Dy Dz

−Dx 0 Hz −Hy

−Dy −Hz 0 Hx

−Dz Hy −Hx 0



⎟⎟⎠

, (9)

7

J. Opt. 13 (2011) 024003 MWMcCall et al

-4 -2 0 2 4

-4

-3

-2

-1

0

1

2

3

4

-4 -2 0 2 4

-4

-3

-2

-1

0

1

2

3

4

x

ct

-4 -2 0 2 4

-4

-3

-2

-1

0

1

2

3

4

x '

-4 -2 0 2 4

-4

-3

-2

-1

0

1

2

3

4

ct′

x'

(a) (b)

(d) (c)



ct

ct′

x

Figure 6. The detailed construction of the curtain map.

i.e. Gαβ contains the fields D and H. The fourth-rank object

χαβμν contains the electromagnetic material parameters. In

non-covariant notation we have


D

H



=


− α

−αT μ

−1



−E

B



, (10)

where T indicates transpose. In fact, χαβμν is a fourth-rank

tensor density and transforms according to [10]

χα



β



μ



ν

= |det(Lλ



λ )|−1Lα



α Lβ



β Lμ



μ Lν



ν χαβμν , (11)

where Lα



α

= ∂xα



/∂xα.

For a transformation restricted to the (x0, x1) plane and

a base constitutive tensor for which the non-zero elements are

χ0101 = χ0202 = χ0303 = − ; χ2323 = χ3131 = χ1212 = μ

−1

we find the non-zero elements of χα



β



μ



ν

to be

χ0 1 0 1 = |Lα



α

|−1(L0

0 L1

1 L0

0 L1

1

− L0

0 L1

1 L0

1 L1

0

+ L0

1 L1

0 L0

1 L1

0

− L0

1 L1

0 L0

0 L1

1 )(− ) ≡ − || (12)

χ0 2 0 2 = |Lα



α

|−1(− L0

0 L0

0

+ μ

−1L0

1 L0

1 )

= χ0 3 0 3 ≡ − ⊥ (13)

χ2 3 2 3 = |Lα



α

|−1μ

−1 ≡ μ

−1

|| (14)

χ3 1 3 1 = |Lα



α

|−1(− L1

0 L1

0

+ μ

−1L1

1 L1

1 )

= χ1 2 1 2 ≡ μ

−1

⊥ (15)

χ0 2 1 2 = |Lα



α

|−1(− L0

0 L1

0

+ μ

−1L0

1 L1

1 )

= −χ0 3 3 1 = χ1 2 0 2 = −χ3 1 0 3 ≡ α. (16)

The material relations (10) can thus be expressed alternatively

as

Dx = ||Ex , Bx = μ||Hx , (17)


Dy

Dz



= ( ⊥ + α2μ⊥)


Ey

Ez



+ αμ⊥


Hz

−Hy



, (18)


By

Bz



= αμ⊥


−Ez

Ey



+ μ⊥


Hy

Hz



. (19)

Equations (18) and (19) are seen to be of the same form as

equations (3) and (4).

8

J. Opt. 13 (2011) 024003 MWMcCall et al

A.2. The curtain map in detail

The curtain map of figure 2 consists of successive spacetime

coordinate transformations (x, t) → ( . x, . t ) → ( . x

, .t

) →

(x

, t

) as shown in figure 6. Light propagating in a uniform

medium of refractive index n is represented by the straight

sub-luminal world lines of figure 6(a). The transition from

figures 6(a) to 6(b) is a Lorentz boost with speed v = c/n

applied according to

. x = (1 − n−2)

−1/2(x − ct/n), (20)

.t = (1 − n−2)

−1/2(t − x/nc). (21)

This produces the vertical photon world lines of figure 6(b)

wherein the rectangular box (|c.t| < nσ, | . x| < σ) is identified. Within this rectangle a void region is opened up via the operation of a ‘curtain map’ defined via . x = δ + c.t δ + nσ . x − sgn( . x)σ + sgn( . x)σ, (22) . t = .t, (23) with points outside the rectangle being mapped to themselves. The curtain map is shown for which σ = 1, n = 2, δ = 0.5. Inverse Lorentz-transforming back to the medium rest frame, where the coordinates are now (x , t ), yields the obliquely opened curtain as shown in figure 6(d). The deformed photon world lines in figure 6(d) all have positive gradients (i.e. propagate forwards in time) and have speeds (determined by the gradient of the world line) less than the vacuum speed of light. The hard edges of the curtain map induced by the use of | · | and sgn(·) functions in equation (22) may be softened by the use of suitable mollifier functions as explained in the next section. A.3. Mollifying the hard edges of the curtain map As defined above, the composite map (x, t) → ( . x, .t) → ( . x , . t ) → (x , t ) is ‘hard-edged’, meaning that sections of the intensity at a given t will change abruptly from zero inside the void region to a finite value outside. This would require unrealistic instantaneous changes in the material parameters at the edge of the cloak. In order to soften these edges we applied the following procedure. In the vertical ray frame (i.e. figure 6(b)) the functions sgn(ξ ) and |ξ| in equation (22) are replaced by tanh(ξ/) and ξ tanh(ξ/), respectively, where is a small parameter. Note that, as → 0, tanh(ξ/) → sgn(ξ ) and ξ tanh(ξ/) → |ξ|. For points inside the rectangle equations (22) and (23) are therefore replaced with . x in = δ + c.t tanh(c.t/) δ + nσ [ .x − tanh( . x/)σ] + tanh( . x/)σ , (24) .t in = . t . (25) The mollified curtain map of equations (24) and (25) is continuous and differentiable at the origin. Points outside the rectangle (| . x| > σ, |c.t| > nσ) are left unchanged as

before (i.e. . x

out

= .x, . t

out

= . t ). To avoid discontinuities at

the boundary of the box, the maps inside the rectangle and

outside the rectangle are graded into each other by means of

the mollified rectangular ‘top-hat’ function:

ρ( . x, c.t ) = 1

4



tanh


c.t + nσ




− tanh


c.t − nσ




×



tanh


. x + σ




− tanh


. x − σ




. (26)

Note that, as → 0, equation (26) becomes a rectangular tophat

function. The maps inside and outside the rectangle are

then graded into each other according to

. x = ρ . x

in

+ (1 − ρ) . x

out, (27)

.t = .t. (28)

This procedure ensures that the resultant map ( . x, .t ) →

( . x

, . t

) defined by combining equations (27) and (28) with

equations (24)–(26) is continuous at the boundary of the

rectangle. The complete map (x, t) → (x

, t

) is then

specified via the Lorentz transformation of equations (20)

and (21) sending (x, t) → ( . x, . t ), the mollified curtain map of

equations (27) and (28) sending ( . x, . t ) → ( . x

, . t

), followed by

the inverse Lorentz transformation sending ( . x

, . t

) → (x

, t

).

The composite map (x, t) →(x

, t

), with = 0.08, was used

to generate figure 2 in this paper by calculating numerically

the transformed material parameters using equations (12)–

(16), and then calculating the electromagnetic energy density

according to

U = 1

2 (D · E + B ·H). (29)

References

[1] Pendry J B 2000 Negative refraction makes a perfect lens Phys.

Rev. Lett. 85 3966

[2] Pendry J B, Schurig D and Smith D R 2006 Controlling

electromagnetic fields Science 312 1780–2

[3] Leonhardt U and Philbin T G 2006 General relativity in

electrical engineering New J. Phys. 8 247

[4] Schurig D, Mock J J, Justice B J, Cummer S A, Pendry J B,

Starr A F and Smith D R 2006 Metamaterial electromagnetic

cloak at microwave frequencies Science 314 977–80

[5] Brillouin L 1960 Wave Propagation and Group Velocity 1st edn

(New York: Academic)

[6] Pendry J B 2009 Time reversal and negative refraction Science

322 71–3

[7] McCall M W 2007 Relativity and mathematical tools: waves in

moving media Am. J. Phys. 75 1134–40

[8] Tretyakov S A, Nefedov I S and Alitalo P 2008 Generalized

field-transforming metamaterials New J. Phys. 10 115028

[9] Tretyakov S A 2009 On a possibility to imitate media moving

with superluminal velocity 3rd Int. Conf. on Advanced

Electromagnetic Materials in Microwaves and Optics

London

[10] Post E J 1997 Formal Structure of Electromagnetics

(New York: Dover)

9

Wednesday, 24 November 2010

CHEMTRAIL PROTEST IRELAND

Anti-chemtrail activists chain themselves to Dáil railings

http://www.youtube.com/watch?v=IaPqCMIuEk4


From 12pm to 2pm on Saturday the 27th of November a group of activists including 65 year old Breda Murphy, intend to chain themselves to the railings of the Dáil (parliament) in Dublin. Their action has been provoked by the on-going aerial spraying being conducted over much of Ireland and the Irish Government continuing to ignore calls for it address the issue.



Several governments across the planet have been spraying their civilian populations with different (often harmful) biological and chemical agents since the 1940s. The British and German governments have even admitted some of their aerial spraying operations.



http://www.guardian.co.uk/politics/2002/apr/21/uk.medicalscience



http://www.youtube.com/watch?v=IaPqCMIuEk4



Primarily military aircraft are employed in the spraying, although civilian airlines are also employed. The spraying results in trails in the sky that at first glance resemble condensation trails (contrails) left by jet engines. However, these abnormal trails persist far longer than regular contrails and emanate from locations on the plane other than the engines. Concerned observers have dubbed these abnormal trails, chemtrails.



http://www.youtube.com/watch?v=bSSWnXQsgOU&feature=related



When intensive spraying is being carried out (over cities for instance), the lingering chemtrails frequently result in criss-crossed patterns in the sky.





Chemtrails are suspected to cause a multitude of health problems ranging from nose bleeds to respiratory ailments.



http://www.alive.com/691a2a2.php?subject_bread_cramb=161



Breda Murphy has lived in the town of Kildare for much of her life. So when around the 14th of June this year an intensive program of aerial spraying over Kildare began, she noticed almost immediately. She even witnessed large black helicopters spraying the town. Within days of the commencement of the spraying she, and many of her neighbours, started experiencing severe adverse health effects. These included nose bleeds, migraines and serious respiratory complaints.



Breda herself endured headaches, breathlessness, severe aches and pains and an elevated temperature. One side of her face swelled up and her eyes became so badly swollen that she had trouble seeing out of them. She was forced to consult an emergency doctor and was diagnosed with elevated blood pressure and infections of the sinuses and upper respiratory tract. She spent a miserable summer cooped up in her house, leaving it only when absolutely necessary. Since the devastating spraying of the summer, Breda and her neighbours live in perpetual fear of further attacks on their health.



Breda twice contacted John Gormley (Irish Environment Minister) on the issue and both times he failed to reply. On the 29th of September she chained herself to the gates of the Dáil in desperation. On the 29th of October the United Nations banned climate-related geo-engineering. (Many suspect geo-engineering to be one of the purposes of chemtrailing.) In complete disregard for these developments, the spraying of Ireland continues.



http://www.newscientist.com/article/dn19660-what-the-un-ban-on-geoengineering-really-means.html



Anti-chemtrail activists in Ireland and across the world, demand that the Irish Government immediately puts a stop to the spraying of Ireland! As to do otherwise constitutes a serious breach of all affected Irish men and women’s basic human rights!


Breda Murphy is available for interview and may be contacted via:
me @ adamski2012@hotmail.co.uk

...namaste...b.

MUST SEE!!

LONDON STUDENT PROTESTS 14.30 24 11 10 BBC PT 1

kevin annett update 23 11 10

KEVIN ANNETT UPDATE - 24 11 10 =

Kevin Annetts message 23 11 10 in the wake of lies / actions perpetrated by the Royal Canadian Mounted Police {R.C.M.P.} and other parties in an attempt to defame him and his work and campaign.Videos - His banning from COOP Radio, Vancouver: http://www.youtube.com/view_play_list...FOR IMMEDIATE RELEASE: Tuesday, November 23, 2010 (6 am GMT)Ending the Dirty Tricks Campaign by Church and State: An Announcement by Rev. Kevin Annett and the Legal Advisory Group of The International Tribunal into Crimes of Church and State (ITCCS) Over the past month, we have established that a criminal conspiracy exists to defame and discredit Rev. Kevin Annett and destroy the work of our Tribunal in order to protect those responsible for the rape, torture and murder of innocent children. This conspiracy includes but is not restricted to agents of the Royal Canadian Mounted Police's (RCMP's) "E" Division in Vancouver, Canada, headed by Inspector Peter Montague, and two staff members of the state-funded Vancouver Co-op Radio. After receiving a signed affidavit from the woman hired by RCMP operatives to frame Kevin Annett on a false charge on the premises of Co-op Radio on July 20, in unison with an actor impersonating Kevin, we issued a Demand Letter to the Board and Staff of Vancouver Co-op Radio three days ago. This Letter demanded that the station staff and board members cease their public defamation of Kevin and restore him to the airwaves of Co-op Radio on the grounds that their fabrication of the incident used to justify his dismissal has been exposed. Neither Board nor Staff, nor their lawyer, have replied to our Demand. Accordingly, we are now preparing to charge Vancouver Co-op radio and the RCMP with criminal conspiracy and defamation. We do so in order to expose this kind of dirty tricks campaign against those like Kevin who are working to bring to justice the churches and governments responsible for crimes against humanity.We will be commencing these charges and litigation within both domestic and international courts, as well as at the first session of our Tribunal in London, England, during the week of April 4-8, 2011. This week, we will be issuing a Public Summons to Vancouver Co-op Radio Employees and Directors, and to officers of the RCMP, instructing them to appear at this Tribunal to answer charges.BE ADVISED that any programmer or volunteer at Vancouver Co-op Radio who has been or will be involved in disseminating the untrue and defamatory statements of station staff regarding Kevin Annett over the airwaves, or by email, orally, or through any other medium, will be named and included in the legal action launched by our Advisory Group and may also be summoned to our Tribunal.BE FURTHER ADVISED that this legal action will include and name senior officials of the United Church of Canada and the Roman Catholic Church, who are also implicated in this criminal conspiracy.This action is monitored and supported by human rights, media, and governmental bodies associated with the European Union, as well as groups in Ireland, England, Australia, Italy, the United States and Thailand.We urge all victims of church and state terror to support our effort to protect those who are working to expose child trafficking and genocide from such dirty tricks and other subversion by state operatives.Please post this notice. Sincerely,Rev. Kevin D. Annett Dr. Sergio Rossi(Vancouver) (Parma, Italy)For the International Tribunal into Crimes of Church and State (London)Issued publicly on Tuesday, November 23, 2010 at 6 am GMT (London)Cc: ITCCS (London) Human Rights Court of the European Parliament World media International Criminal Court KEVIN ANNETT LINKS =CORK UNIVERSITY SPEECH http://www.youtube.com/view_play_list...RECEIVING SHOES DAIL {Parliament} IRELANDhttp://www.youtube.com/view_play_list...
IRISH STATE RADIO I'VIEW
http://www.youtube.com/view_play_list...
"UNREPENTANT" FILM
http://www.youtube.com/view_play_list...
ANNETT ON ALEX JONES JAN 2009
http://www.youtube.com/view_play_list...
PRIEST CARNEY PAEDOPHILE BBC "PANORAMA" FULL http://www.youtube.com/view_play_list...
http://www.youtube.com/watch?v=qTacyBVaBnQ

WHAT IS "COMMON PURPOSE"

"COMMON PURPOSE" is the secretive organisation, worldwide, that is working with and behind the governments whose aim is to achieve ends often by illegal means, and often to the detriment of ordinary citizens. It is made up of high-flying traitors in positions of power, such as top policemen, politicians, business leaders and people like that who will use any means possible to shape society as they seem fit, one result being many of our rights as citizens are lost as we become prey to their constraints via obtrusive laws and controls. This from hawks-cafe =

"

“[Evidence suggests Clinton-Rubin and Crown Agents Sisters are using a Common Purpose Guild of Contract Hits to extort man-in-the-middle leaders and take control of the sovereign state] Common Purpose is the glue than enables fraud to be committed across government departments to reward pro European politicians. Corrupt deals are enabled that put property or cash into their pockets by embezzling public assets. Although it has 80,000 trainees in 36 cities, 18,000 "graduate" members and enormous power, Common Purpose is largely unknown to the general public. It recruits and trains "leaders" to be loyal to the directives of Common Purpose and the EU, instead of to their own departments, which they then undermine or subvert, the NHS being an example. Common Purpose is identifying leaders in all levels of our government to assume power when our nation is replaced by the European Union. Unlike current leaders, CP leaders are taught to rule without democracy, and will bring the EU police state home to every one of us. It has members in the NHS, BBC, the police, the legal profession, many of Britains 7,000 quangos, local councils, the Civil Service, government ministries, Parliament, and it controls many RDA's (Regional Development Agencies). Cressida Dick is the Common Purpose senior police officer who authorised the "Shoot to kill" policy without reference to Parliament, the law or the British Constitution. Jean de Menezes was one of the innocents who died as a result. Her shoot to kill policy still stands today. Common Purpose trained Janet Paraskeva, the Law Society's Chief Executive Officer. Surprising numbers of lawyers are CP members. It is no coincidence that justice is more expensive, more flawed and more corrupt. And no surprise the courts refused to uphold the law, when a challenge was made to the signing of the six EU treaties, which illegally abolish Britain's sovereignty. Common Purpose is backed by John Prescott's "Office of the Deputy Prime Minister" (ODPM), and its notional Chief Executive is Julia Middleton. The Head of the Civil Service Commission is a member. It is close to controlling Plymouth City Council, where is has subverted the democratic process. Local people cannot get CP's corrupt activities published, because the editors of local papers are in CP, and refuse to let journalists publish the articles. CP started in 1985; in the 1990’s, with its members' cross departmental influence, it was involved with what then became the disasterous New Millennium Dome Company and the squandering of £800 million; it appears £300m of this was diverted into the web of quangos set up by CP. There is a fraud case over this, stalled in the courts thanks to CP's influence in the legal profession. Over £100 million of our money has been spend on CP courses alone, and it’s been hidden from the public. No published accounts, and members’ names are a guarded secret. It charges substantial figures for its courses. Matrix for example costs £3,950 plus VAT, and courses for the high flying ‘leader’ can be as much as £9,950 plus VAT. This money is ours, paid by government departments financing senior staff to become agents for CP, instead of loyal to their own jobs. Common Purpose International (Ltd by guarantee) is registered as a Charity No 1056573 and describes itself as being involved in Adult education. Some charity.”