It’s one of the great engineering achievements in history…
At 48 miles long, the Panama Canal cuts through a narrow strip of land in Central America.
It links up the Atlantic and Pacific oceans, allowing ships to pass through the landmass instead of sailing around a whole continent.
Ships pay dearly to use this shortcut… up to $375,000 for a one-way toll.
It’s worth the price. Continue reading
Still reeling from a disaster it created at a Colorado gold mine, the EPA has so far avoided criticism for a similar toxic waste spill in Georgia.
In Greensboro, EPA-funded contractors grading a toxic 19th-century cotton mill site struck a water main, sending the deadly sediment into a nearby creek. Though that accident took place five months ago, the hazard continues as heavy storms — one hit the area Tuesday — wash more soil into the creek.
The sediment flows carry dangerous mercury, lead, arsenic and chromium downstream to Lake Oconee and then to the Oconee River — home to many federally and state protected species. Continue reading
As was mentioned just the other day, all U.S. intelligence agencies have been compromised in addition to all other government entities that were attacked.
The White House has admitted that systems containing deeply personal information, submitted by current, former and prospective federal government employees for security clearances, had been “exfiltrated.” If the breach of the Office of Personnel Management (OPM) was conducted by hackers linked to China, as suspected, access to the Standard Form 86 submitted by an estimated 41 million federal employees provided them with what may be the world’s largest stolen data base of US intelligence and military personnel.
This is a “gold mine” of unencrypted data that leave US intelligence officers, for example, open to blackmail or coerced recruitment.
While officials speak of two hacks, debkafile’s cyber security and intelligence experts report that it was a single breach and is still ongoing. Known to experts as an “Advanced Persistent Threat,” it amounts to slow, continuous penetration by a computer virus, planted in an individual computer of a network which duplicates itself gradually and insidiously. Continue reading