Language Selection

English French German Italian Portuguese Spanish

Yikes! Mad Cow Cover-Up?

Dr. Lester Friedlander, a former USDA vet, had been blowing the whistle on the USDA beef inspection practices before the latest case of BSE was confirmed. Dr. Friedlander said that inspectors are allowed only 15 seconds of inspection and that unhygenic practices are common in the meat industry; practices such as cow carcass abscesses being hosed off, wrapped up and shipped to the consumer.

The Organic Consumers Association reported last year that hundreds of people are dying in the US each year from CJD (the human counterpart of BSE) and the deaths are being written off as "unexplainable". The disease causes holes in the brains of the victims.

Friedlander also claims that some supervisors were more concerned about falsifying inspection documents than protecting consumers. Dr. Friedlander claims that on June 9,2005, a cow in Texas BSE symptoms was sent straight to the rendering plant without testing.

Oh man, up until this latest Mad Cow scare, I used to eat red meat slash beef about 6 out of 7 nights, being your properly raised southern belle! Seems I'll have to rethink my menu! Big Grin

More in Tux Machines

Today in Techrights

Security News

  • What's the most secure operating system?
    Deciding what operating system (OS) to keep your computer running smoothly—and with the highest level of security—is a controversial yet frequent question many business owners, government officials, and ordinary Joes and Janes ask. There are many different operating systems—the software at the base of every computer, controlling the machine's array of functions—like Mac OS10, which comes pre-loaded on Apple laptops and desktops, and Microsoft Windows that's on the majority of personal computers. Google's Android and Apple's iOS for mobile devices are designed specifically for devices with smaller touchscreens. Whatever OS you use—and many users are very loyal to their operating system of choice and will argue that their's is the best—it's not entirely secure or private. Hackers are still infiltrating systems every day, and they can easily target victims with malware to spy on users and disable their operating system altogether. Because of this, choosing a secure system is essential to staying secure online. Below are the top three secure operating systems that will help users take the next step to ensure proper cyber and hardware security.
  • New IoT Botnet, Attackers Target Tor, and More…
    Firefox’s emergency security patch: If you use Firefox at all, and I’m assuming that most of you do, you might want to run an update to get the latest security patch from Mozilla. The patch was rushed to market on November 30 to fix a zero day vulnerability that was being exploited in the wild to attack the Firefox based Tor browser. In a blog post on Wednesday, Mozilla’s security head Daniel Veditz wrote, “The exploit in this case works in essentially the same way as the ‘network investigative technique’ used by FBI to deanonymize Tor users…. This similarity has led to speculation that this exploit was created by FBI or another law enforcement agency. As of now, we do not know whether this is the case. If this exploit was in fact developed and deployed by a government agency, the fact that it has been published and can now be used by anyone to attack Firefox users is a clear demonstration of how supposedly limited government hacking can become a threat to the broader Web.”

SUSE Leftovers

  • openSUSE Heroes meeting, day 2
    After a long, but exciting first day, we even managed to get some sleep before we started again and discussed the whole morning about our policies and other stuff that is now updated in the openSUSE wiki. After that, we went out for a nice lunch…
  • Installing Tumbleweed, November 2016
    The Tumbleweed system that I already have installed had desktops KDE, Gnome, XFCE and LXDE. But for recent intstalls (as with Leap 42.2), I have been going with KDE, Gnome, XFCE, LXQt, FVWM and MATE. So it seemed reasonable for the new Tumbleweed install to follow the same path. I also added Enlightenment for experimenting.

Android Leftovers