<?xml version="1.0" encoding="ISO-8859-1"?>
<!-- OPML generated by Freedom Controller v0.5.0 on Thu, 11 Jul 2013 13:28:42 +0000 -->
<opml version="2.0">

      <head>
        <title>What Adam Curry is reading</title>
        <dateCreated>Thu, 11 Jul 2013 12:54:56 +0000</dateCreated>
        <dateModified>Thu, 11 Jul 2013 12:54:56 +0000</dateModified>
        <ownerName>Adam Curry</ownerName>
        <ownerId>669</ownerId>
        <expansionState></expansionState>
        <expansionState></expansionState>
        <vertScrollState>1</vertScrollState>
        <windowTop>146</windowTop>
        <windowLeft>107</windowLeft>
        <windowBottom>468</windowBottom>
        <windowRight>560</windowRight>
      </head>

      <body>
              <outline text="VIDEO-Marathon suspect&apos;s hearing frustrates some - Boston News, New England News, WHDH-TV 7NEWS WHDH.COM">
                      <outline text="Link to Article" type="link" url="http://www1.whdh.com/news/articles/local/10011123567590/marathon-suspect-s-hearing-frustrates-some/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373547297_7Bf2adQB.html" />
      <outline text="Thu, 11 Jul 2013 12:54" />
                      <outline text="" />
                      <outline text="BOSTON (AP) -- Survivors of the Boston Marathon bombings got little satisfaction from suspect Dzhokhar Tsarnaev&apos;s first public appearance since the deadly attacks. &quot;Not guilty&quot; was all he said, over and over." />
                      <outline text="The blase-looking 19-year-old, his arm in a cast and his face swollen, entered his pleas Wednesday during a seven-minute arraignment in federal court." />
                      <outline text="Bombing victims showed little reaction in the courtroom after a federal marshal warned them against any outbursts, but some made their views known afterward -- as did a group of chanting Tsaraev supporters." />
                      <outline text="&quot;I thought that maybe he would come with a different attitude or maybe look a little different, maybe look like he cared a little bit. But he didn&apos;t show me that,&quot; said Peter Brown, whose two nephews each lost their right legs in the explosions." />
                      <outline text="Tsarnaev gave a small, lopsided smile to his two sisters upon arriving in the courtroom. He appeared to have a jaw injury and there was swelling around his left eye and cheek." />
                      <outline text="Leaning into the microphone, he told a federal judge, &quot;Not guilty&quot; in his Russian accent. Then he was led away in handcuffs, making a kissing gesture toward his family with his lips. One of his sisters sobbed loudly, resting her head on a woman seated next to her." />
                      <outline text="Tsarnaev, who has been hospitalized since his capture with wounds suffered in a shootout and getaway attempt, faces 30 federal charges, including using a weapon of mass destruction to kill, in connection with the April 15 twin explosions that left three people dead and more than 260 wounded. Tsarnaev also is charged in the killing of a Massachusetts Institute of Technology police officer and the carjacking of a motorist during a getaway attempt. He could get the death penalty if prosecutors choose to pursue it." />
                      <outline text="The proceedings took place in a heavily guarded courtroom packed not only with victims and their families but with police officers, the public and the media." />
                      <outline text="The Russian immigrant and former college student looked much as he did in a photo widely circulated after his arrest, his hair curly and unkempt. Wearing an orange prison jumpsuit, he appeared nonchalant, almost bored, during the hearing. The cast covered his left forearm, hand and fingers." />
                      <outline text="MIT Police Chief John DiFava, who was in the courtroom, said Tsarnaev looked &quot;smug.&quot;" />
                      <outline text="&quot;I didn&apos;t see a lot of remorse. I didn&apos;t see a lot of regret,&quot; he said. &quot;It just seemed to me that if I was in that position, I would have been a lot more nervous, certainly scared.&quot;" />
                      <outline text="DiFava added: &quot;I just wanted to see him. I wanted to see the person that so coldly and callously killed four people, one of whom being an officer of mine.&quot;" />
                      <outline text="Authorities say Tsarnaev orchestrated the bombing along with his older brother, Tamerlan Tsarnaev, who died following a gun battle with police several days after the attack. Dzhokhar Tsarnaev was arrested on April 19, hiding in a bloodstained boat in a suburban backyard after a manhunt that paralyzed much of the Boston area." />
                      <outline text="Tsarnaev&apos;s lawyer, Judy Clarke, an expert in death penalty cases, asked that the judge enter not-guilty pleas for him, but U.S. Magistrate Judge Marianne Bowler said: &quot;I would ask him to answer.&quot;" />
                      <outline text="On the same day as the arraignment, Boston&apos;s police commissioner appeared on Capitol Hill and complained to a Senate panel that the Justice Department failed to share information on terrorism threats with local officials before the bombing." />
                      <outline text="&quot;There is a gap with information sharing at a higher level while there are still opportunities to intervene in the planning of these terrorist events,&quot; Commissioner Edward F. Davis III said." />
                      <outline text="Reporters and spectators began lining up for seats in the Boston courtroom at 7:30 a.m. as a dozen Federal Protective Service officers and bomb-sniffing dogs surrounded the courthouse. Four hours before the 3:30 p.m. hearing, the defendant arrived at the courthouse in a four-vehicle motorcade." />
                      <outline text="About a dozen Tsarnaev supporters cheered as the motorcade arrived. The demonstrators yelled, &quot;Justice for Jahar!&quot; as Tsarnaev is known." />
                      <outline text="Lacey Buckley, 23, said she traveled from her home in Wenatchee, Wash., to attend the arraignment. She said she believes he is innocent. &quot;I just think so many of his rights were violated. They almost murdered an unarmed kid in a boat,&quot; she said." />
                      <outline text="A group of friends who were on the high school wrestling team with Tsarnaev at Cambridge Rindge and Latin waited in line for hours, hoping to get a seat." />
                      <outline text="One of them, Hank Alvarez, said Tsarnaev was calm, peaceful and apolitical in high school." />
                      <outline text="&quot;Just knowing him, it&apos;s hard for me to face the fact that he did it,&quot; said Alvarez, 19, of Cambridge." />
                      <outline text="Prosecutors say Tsarnaev, a Muslim, wrote about his motivations for the bombing on the inside walls and beams of the boat. He scrawled that the U.S. government was &quot;killing our innocent civilians,&quot; and also wrote: &quot;We Muslims are one body, you hurt one you hurt us all.&quot;" />
                      <outline text="Martin Richard, 8, Krystle Marie Campbell, 29, and Lingzi Lu, 23, were killed by the two bombs, which were fashioned out of pressure cookers, gunpowder, nails and other shrapnel. Numerous victims lost legs." />
                      <outline text="(Copyright (c) 2013 The Associated Press. All Rights Reserved. This material may not be published, broadcast, rewritten, or redistributed.)" />
              </outline>

              <outline text="Ex-NYU professor arrested for stalking Citigroup&apos;s chief economist - Daily News">
                      <outline text="Link to Article" type="link" url="http://www.nydailynews.com/ex-nyu-professor-arrested-stalking-citigroup-chief-economist-article-1.1388739" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373545344_QXb2Kr9W.html" />
      <outline text="Thu, 11 Jul 2013 12:22" />
                      <outline text="" />
                      <outline text="Mark Kohn/Hollandse Hoogte/ReduxDutch economist Heleen Mees was apparently obsessed with chief Citigroup economist Willem Buiter, sending him thousands of emails over a two-year period and even continuing to contact him after he filed a cease-and-desist." />
                      <outline text="A SEXY DUTCH economist&apos;s obsession with another number cruncher added up to a whole lot of trouble." />
                      <outline text="Heleen Mees, 44, was busted for stalking and harassing chief Citigroup economist Willem Buiter &apos;-- sending him photos of herself masturbating and images of other naked women, the Daily News has learned." />
                      <outline text="A one-time NYU professor, Mees sent Buiter more than 1,000 emails over a two-year period, authorities said." />
                      <outline text="RELATED: MARION COTILLARD STALKER GETS PROBATION" />
                      <outline text="Some of them were laced with threats, while at least one was a hyper-sexual come-on. &apos;&apos;What can I do to make it right? Shall I lick your b---s?&apos;&apos; Mees allegedly wrote in one email." />
                      <outline text="&apos;&apos;Shall we adopt a child?&apos;&apos; she wrote in another." />
                      <outline text="At least one message was far darker. &apos;&apos;Hope your plane falls out of the sky,&apos;&apos; Mees wrote to Buiter, court papers say." />
                      <outline text="RELATED: &apos;CHARLIE BROWN&apos; VOICE ACTOR SENTENCED TO ONE YEAR IN JAIL" />
                      <outline text="The pair were once lovers &apos;-- but at some point, the romance apparently soured and Mees unleashed her wrath on her fellow Dutchman. A noted researcher and columnist who speaks five languages, Mees barraged Buiter with an avalanche of emails between July 1, 2011, and Monday." />
                      <outline text="In addition to sending him X-rated images of herself, she sent him a photo of dead birds on May 3." />
                      <outline text="Mees also targeted Buiter&apos;s economist wife, Anne, and children, sending them unwanted messages as well, court papers say. Buiter demanded she stop, and still the loony stalker kept harassing him." />
                      <outline text="RELATED: HUGH JACKMAN&apos;S STALKER ORDERED TO TAKE PSYCH EXAM" />
                      <outline text="Even after Buiter sent Mees a cease-and-desist letter Feb. 27, she allegedly wouldn&apos;t stop, sending the object of her twisted desire several hundred more emails. &apos;&apos;Defendant&apos;s actions have caused him severe annoyance and alarm, and fear for his physical safety of his wife and children,&apos;&apos; the criminal complaint says." />
                      <outline text="Mees &apos;-- who once founded a female-empowerment organization called Women on Top &apos;-- was arrested at 11:45 p.m. Monday." />
                      <outline text="She was arraigned Tuesday on stalking, harassment and aggravated harassment charges. She was ordered held on $5,000 bail." />
                      <outline text="RELATED: WOMAN HARASSED HERSELF ON FACEBOOK: COPS" />
                      <outline text="Mees&apos; Legal Aid lawyer, Vaneshka Hyacinthe, said her client &apos;&apos;had a longstanding relationship&apos;&apos; with Buiter and &apos;&apos;the emails go in both directions.&apos;&apos;" />
                      <outline text="Manhattan Criminal Court Judge Robert Mandelbaum issued Mees an order of protection and demanded she stay away from Buiter and his family." />
                      <outline text="&apos;&apos;Do not call them, do not go to their home, school, businesses, place of employment . . . no email, no text messages, instant messages, no phone calls, letters, fax or voice messages,&apos;&apos; the judge said." />
                      <outline text="Buiter, who previously served as chief economist of the European Bank for Reconstruction and Development, declined comment at his posh apartment building on the upper West Side." />
                      <outline text="A spokesman for the NYU Wagner Graduate School of Public Service said Mees taught a course there last fall." />
                      <outline text="A doorman at her building in DUMBO, Brooklyn, described her as a generous tipper and frequent traveler who is always seen with her bike and laptop." />
                      <outline text="With Edgar Sandoval and Nicholas Wells " />
              </outline>

              <outline text="Report Suggests Malaria Drug May Have Played Role In U.S. Soldier&apos;s Deadly Rampage - Forbes">
                      <outline text="Link to Article" type="link" url="http://www.forbes.com/sites/rebeccaruiz/2013/07/10/report-suggests-malaria-drug-may-have-played-role-in-afghanistan-killings/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373544008_VVFE8C3Z.html" />
      <outline text="Thu, 11 Jul 2013 12:00" />
                      <outline text="" />
                      <outline text="Log in with your social account:Or, you can log in or sign up using Forbes.New PostsMost PopularWatch Out Wal-Mart?ListsMost Powerful CelebritiesVideoCountry Cash KingsFREE Report: 12 Stocks to Sell NowHelp|Connect" />
                      <outline text="|Sign up|Log in" />
              </outline>

              <outline text="VIDEO-Video: Spray-On Antenna Material Turns Just About Anything into a Signal Array | Popular Science">
                      <outline text="Link to Article" type="link" url="http://m.popsci.com/technology/article/2012-02/video-spray-antenna-material-turns-just-about-anything-signal-array" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373541589_FxqxfJY5.html" />
      <outline text="Thu, 11 Jul 2013 11:19" />
                      <outline text="" />
                      <outline text="Chamtech&apos;s Spray-On Antenna Material, Magnified" />
                      <outline text="Presenting at Google&apos;s &apos;&apos;Solve for X&apos;&apos; gathering, a Utah startup has unveiled a spray-on antenna that improves signals by anything, just about anywhere, into a signal array. Using a novel nanoparticle spray, Chamtech Enterprises demonstrated how their product can be used on all kinds of materials--trees, walls, fabrics--and in all kinds of environments, even underwater." />
                      <outline text="The material relies on a proprietary formula that uses thousands upon thousands of nano-capacitors that automatically align themselves properly when sprayed onto a surface. They charge and discharge quickly, and notably don&apos;t generate much heat--a major selling point for a product that might be sprayed onto anything from wood structures to cell phone cases to vehicle exteriors." />
                      <outline text="The explanation of exactly how this works is better demonstrated than written, and Chamtech&apos;s CEO, Anthony Sutera, does so in detail in the video below. The company is currently riding high on the results of successful tests that showed that the spray works well underwater, and is currently looking for customers in both the public and private sectors." />
                      <outline text="[PhysOrg]" />
              </outline>

              <outline text="VIDEORCMP makes arrests in plot to bomb B.C. legislature">
                      <outline text="Link to Article" type="link" url="http://www.ottawacitizen.com/touch/story.html?id=8605777" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373541475_hwQVgB4D.html" />
      <outline text="Thu, 11 Jul 2013 11:17" />
                      <outline text="" />
                      <outline text="RCMP makes arrests in plot to bomb B.C. legislature" />
                      <outline text="By Kim Bolan" />
                      <outline text="A Surrey man and woman have been charged after a foiled domestic terrorist plot targeting the B.C. legislature on Canada Day." />
                      <outline text="RCMP say investigators outside the legislature on Monday recovered explosive devices inside pressure cookers similar to the type of bombs used in the Boston Marathon bombings." />
                      <outline text="John Stewart Nuttall, 38 and Amanda Marie Korody, 29 are charged with knowingly facilitating a terrorist activity, possession of an explosive substance and conspiring to commit and indictable offence." />
                      <outline text="Both were arrested on Monday at 2 p.m. without incident in Abbotsford and are in custody in Surrey." />
                      <outline text="&apos;&apos;We detected this threat early and disrupted it,&apos;&apos; said RCMP Assistant Commissioner James Malizia. He said although the police believe the threat was real &apos;&apos;at no time was the security of the public at risk.&apos;&apos;" />
                      <outline text="The investigation began in February when the Canadian Security Intelligence Service tipped the Integrated National Security Enforcement Team about a possible terror plot, leading to the four-month investigation dubbed Project Souvenir." />
                      <outline text="Both Nuttall and Korody are Canadian born, but were inspired by al-Qaida ideology, Malizia said." />
                      <outline text="He said RCMP believe the suspects had planned to build and place explosive devices in Victoria for the purpose of causing death on Canada Day." />
                      <outline text="There is no indication of a link to the Boston bombings, say the RCMP." />
                      <outline text="RCMP Asst. Com. Wayne Rideout said that Nuttall and Korody&apos;s &apos;&apos;self-radicalized behaviour was intended to create maximum impact and harm to Canadian citizens at the B.C. Legislature on a National holiday.&apos;&apos;" />
                      <outline text="&apos;&apos;They took steps to educate themselves and produced explosive devices designed to cause injury and death,&apos;&apos; he said." />
                      <outline text="Rideout said the RCMP used a variety of techniques to &apos;&apos;monitor and control&apos;&apos; the accused throughout their conspiracy, though he said he couldn&apos;t provide specifics now that the case is before the courts." />
                      <outline text="&apos;&apos;The suspects were committed to acts of violence and discussed a wide variety of targets and techniques." />
                      <outline text="In order to ensure public safety, we employed a variety of complex investigative and covert techniques to control any opportunity the suspects had to commit harm,&apos;&apos; Rideout said." />
                      <outline text="However, like the suspects in that case, police are alleging the suspects are self-radicalized." />
                      <outline text="Nuttall, born in 1974, has a criminal record including a 2010 conviction for possessing weapon for dangerous purpose. He also has convictions for robbery, mischief and breaching probation conditions." />
                      <outline text="Victoria lawyer Tom Morino said he has represented John Nuttall in the past, and was contacted by him on Monday evening." />
                      <outline text="&apos;&apos;He and I spoke for quite some time last night about the allegations,&apos;&apos; said Morino, adding he also spoke with Korody, who he said is in a relationship with Nuttall." />
                      <outline text="Standing in the shadow of the B.C. Legislature Tuesday morning, Premier Christy Clark said the province should remain strong in the face of an attempted terror attack." />
                      <outline text="&apos;&apos;Let me say this about those who would resort to terror: You will not succeed,&apos;&apos; Clark told reporters." />
                      <outline text="&apos;&apos;You will not succeed in damaging our democratic institutions. But just as importantly, you will not succeed in tearing down the values that make this country strong,&apos;&apos; she said." />
                      <outline text="Clark said she was alerted about the plot on Monday, not long before the two suspects were arrested." />
                      <outline text="In her comments, Clark urged people to remain vigilant, but not to let Monday&apos;s unsuccessful attack change how we live our lives." />
                      <outline text="&apos;&apos;We will be vigilant, but instead of letting fear grip us we will go to work here in this legislature,&apos;&apos; she said, speaking not long before the Legislature was set to reconvene Tuesday afternoon." />
                      <outline text="&apos;&apos;We will not let suspicion darken our hearts. Instead we will remain open hearted, depending on one another, trusting in one another and we will not be seized by anger,&apos;&apos; she added." />
                      <outline text="Federal Public Safety Minister Vic Toews applauded the work of the law enforcement agencies involved in the investigation." />
                      <outline text="&apos;&apos;Yesterday&apos;s arrests demonstrate that terrorism continues to be a real threat to Canada,&apos;&apos; Toews said in a statement." />
                      <outline text="&apos;&apos;The RCMP has assured me that at no time during the course of this investigation was there an imminent risk to the safety of Canadians.&apos;&apos;" />
                      <outline text="Terrorism in Canada at a glance:" />
                      <outline text="Canadians have been the targets &apos;-- and sometimes the perpetrators &apos;-- of terrorist attacks in the modern era. Here&apos;s a brief look at some major events:" />
                      <outline text="1985" />
                      <outline text="June: Air India flight 182 is blown up off the coast of Ireland, killing 331 people, mostly Canadians. One person, Inderjit Singh Reyat, a militant Sikh nationalist, is convicted for manslaughter related to the attack." />
                      <outline text="2001" />
                      <outline text="September: 24 Canadians are killed in the 9/11 attacks against the World Trade Center in New York and the hijacked airliner that crashed in a field in Pennsylvania." />
                      <outline text="2004" />
                      <outline text="March: Ottawa software engineer Momin Khawaja is arrested and charged with participating in an international plot to bomb locations in London, England on behalf of Islamic extremists. He is convicted in 2008 and given a life sentence." />
                      <outline text="2006" />
                      <outline text="August: Eighteen men from the Toronto area are arrested and charged with various terrorist offences including attempting to assassinate the prime minister, blow up the Peace Tower and bomb the Toronto Stock Exchange. The group is linked to al-Qaida. Eleven are eventually convicted of a number of crimes with sentences ranging from two-and-a-half years to life." />
                      <outline text="2009" />
                      <outline text="October: Pakistani-Canadian Tahawwur Rana is arrested in Chicago by the FBI and charged with providing material support to the Pakistan militant group Lashkar-e-Taiba. He is convicted in 2011 and in January, 2103, sentenced to 14 years in prison." />
                      <outline text="2010" />
                      <outline text="August: Two Ottawa men, Hiva Mohammad Alizadeh and Misbhuddin Ahmed, and one man from London, Ont., Dr. Khurram Sher, are arrested and charged with participating in a terrorist group and conspiring to participate in acts of terror. The attacks were supposedly planned for Canada, Iran, Afghanistan and Pakistan." />
                      <outline text="2013" />
                      <outline text="April: Ali Medlej and Xristos Katsiroubas, from the same high school in London, Ont., are identified as two insurgents who were killed in January during a terror attack on a gas plan in Algeria. A third friend, Aaron Yoon, is in jail in Mauritania serving a two-year sentence for terror-related offences. A fourth man from London, Mujahid Enderi, is also sought by police." />
                      <outline text="April 22: Police say they have arrested Chiheb Esseghaier, from Montreal, and Raed Jaser, from Toronto, in a terrorism plot targeting a Via Rail passenger train route. They are charged with conspiring to carry out an attack and commit murder at the direction of or in association with a terrorist group." />
                      <outline text="&apos;-- With files from Kirsten Smith and Jonathan Fowlie, Postmedia News and The Canadian Press" />
              </outline>

              <outline text="Wall Street beats the City in bidding war to run Libor - Business News - Business - The Independent">
                      <outline text="Link to Article" type="link" url="http://www.independent.co.uk/news/business/news/wall-street-beats-the-city-in-bidding-war-to-run-libor-8698576.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373520042_xdRkCUQm.html" />
      <outline text="Thu, 11 Jul 2013 05:20" />
                      <outline text="" />
                      <outline text="The New York Stock Exchange yesterday beat off the London Stock Exchange in the bidding to run the disgraced Libor benchmark, triggering howls of protest in the UK at yet another &quot;capitulation&quot; to the might of Wall Street." />
                      <outline text="As US financial news networks ran wall-to-wall headlines declaring &quot;London loses Libor&quot;, MPs responded with shock that such a key indicator for the global financial markets was now to be run by New York." />
                      <outline text="The decision was made by a committee led by City grandee Baroness Hogg, whose daughter Charlotte has just taken up office as Mark Carney&apos;s chief operating officer at the Bank of England. She said the award to NYSE Euronext would &quot;play a vital role in restoring the international credibility of Libor&quot;." />
                      <outline text="John Mann, a Labour MP on the Treasury Select Committee, said: &quot;This is a wholesale surrender. Because the Government did not get on top of this scandal and the regulator messed around, we let America take the lead on investigating Libor fixing and they are now getting the prize.&quot;" />
                      <outline text="The Serious Fraud Office originally declined to investigate the Libor scandal, while the Financial Services Authority was seen as having been sluggish to act, giving the impression that Wall Street&apos;s watchdogs were making all the running." />
                      <outline text="In one concession to the UK, the rate will be physically based in NYSE&apos;s London headquarters and regulated by the Bank of England&apos;s Financial Conduct Authority. There are no current plans to change the name. At present, Libor, whose very name &apos;&apos; the London Interbank Offered Rate &apos;&apos; denotes its British heritage, is issued by the British Bankers Association after being collated by Thomson Reuters. It will be replaced by a new company, NYSE Euronext Rate Administration, early next year." />
                      <outline text="As well as the London Stock Exchange, data companies Thomson Reuters and Markit are also thought to have bid. In addition to collating and distributing the Libor data, NYSE will also issue new guidelines to banks about how they should calculate the rates they submit." />
                      <outline text="In the scandal, it emerged that banks were colluding with each other to fix their Libor submissions up or down in order to hit certain targets." />
                      <outline text="The contract award follows growing concern in the UK that the US regulators have been using the financial scandal as a way of securing more power for Wall Street." />
                      <outline text="NYSE paid a nominal &#163;1 for the contract and will now license its use to customers, as it does with other benchmarks it operates, such as the French shares index, the CAC-40." />
                      <outline text="A comparison of the charges from the US and the UK laid against Tom Hayes, currently on trial in London over the Libor scandal, show how the US action makes no mention of the Wall Street banks he worked for. The UK charges cite his work at Citigroup and his alleged conspiring with JPMorgan." />
              </outline>

              <outline text="Britten verliezen &apos;hun&apos; Libor">
                      <outline text="Link to Article" type="link" url="http://www.ftm.nl/copypaste/britten-verliezen-hun-libor.aspx" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373519926_CpAAZ7XX.html" />
        <outline text="Source: FTM - Follow The Money" type="link" url="http://www.ftm.nl/rss/" />
      <outline text="Thu, 11 Jul 2013 05:18" />
                      <outline text="" />
                      <outline text="Kamerleden in het Verenigd Koninkrijk zijn teleurgesteld dat de Londense interbancaire rente in handen is gekomen van een Amerikaans bedrijf." />
                      <outline text="The New York Stock Exchange (NYSE) heeft gisteren de strijd van de London Stock Exchange (LSE) gewonnen om het beheer van de Libor. Dat is een klap in het gezicht voor de Britten want de benchmark is voorheen altijd in hun handen geweest." />
                      <outline text="&apos;London loses Libor&apos;, verklaren Amerikaanse televisiestations. Kamerleden uit het Verenigd Koninkrijk zijn boos dat zo&apos;n belangrijke financile indicator in handen is gekomen van de Amerikanen. Sinds 1 juli wordt bovendien ook de Bank of England bestuurd door een buitenstaander: de Canadees Mark Carney." />
                      <outline text="John Mann, een kamerlid namens de Labour Partij die zich bezighoudt met financin, zegt. &apos;This is a wholesale surrender. Because the Government did not get on top of this scandal and the regulator messed around, we let America take the lead on investigating Libor fixing and they are now getting the prize.&apos;" />
                      <outline text="De Britse waakhond Serious Fraud Office heeft inderdaad nagelaten om het Libor-schandaal, dat vorige zomer aan het licht kwam, te onderzoeken. Ook heeft de Britse toezichthouder Financial Services Authority niet daadkrachtig opgetreden." />
                      <outline text="Banken hebben tot dusver in totaal miljarden dollars aan boetes moeten betalen vanwege het gesjoemel met de interbancaire rente. Barclays moest 450 miljoen dollar aftikken, UBS kon 1,5 miljard dollar inleveren en Royal Bank of Scotland betaalde 615 miljoen dollar aan boetes." />
                      <outline text="Momenteel bepaalt de British Bankers&apos; Association nog de benchmark door middel van een rondgang bij grootbanken. Vanaf begin 2014 neemt het Amerikaanse beursbedrijf NYSE deze taak over. De bedoeling is dat NYSE de Libor meer gaat baseren op daadwerkelijke financile transacties in plaats van de losse schattingen die de Britse bankenlobby gebruikte." />
                      <outline text="Als concessie heeft NYSE in ieder geval beloofd om de Libor-beheertaak uit te voeren in zijn Londense kantoor, en dus niet in New York, waar de hoofdzetel is gevestigd." />
              </outline>

              <outline text="Deja vu all over again:  Canadian pressure cooker bombers were poor and mentally feeble">
                      <outline text="Link to Article" type="link" url="http://www.cbc.ca/news/canada/british-columbia/story/2013/07/09/bc-korody-nuttall-bomb-plot.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373519890_ajDhXQnB.html" />
        <outline text="Source: Dr. Jones reports" type="link" url="http://s3.amazonaws.com/radio2/johnjones/linkblog.xml" />
      <outline text="Thu, 11 Jul 2013 05:18" />
                      <outline text="" />
                      <outline text="The lawyer for one of two Surrey, B.C., residents accused of planning to bomb the province&apos;s legislature on Canada Day says the case has elements of entrapment." />
                      <outline text="John Stewart Nuttall and Amanda Korody were charged earlier this month with knowingly facilitating a terrorist activity, making or possessing an explosive device and conspiracy to place an explosive device with the intent to cause death or injury. Court documents show Korody and Nuttall are each facing an additional charge of conspiracy to murder persons unknown." />
                      <outline text="Nuttall and Korody briefly appeared in court in B.C. provincial court in Surrey Tuesday morning as provincial court charges against the pair were stayed so the case can move to B.C. Supreme Court for a direct indictment." />
                      <outline text="Speaking outside the courtroom, Nuttall&apos;s lawyer Tom Morino alluded to U.S. police forces being involved in the investigation, but said it could be tough to prove whether police set a trap for the pair." />
                      <outline text="&quot;Entrapment is a very high hurdle to clear,&quot; he said. &quot;I think it&apos;s safe to assume there were certain elements of that. Whether or not that officially constitutes the legal definition of entrapment, that remains to be seen.&quot;" />
                      <outline text="Morino says he&apos;ll ask for a four-week to six-week adjournment after the pair is indicted in B.C. Supreme Court on Wednesday." />
                      <outline text="Nuttall and Korody smiled at each other in court, and Nuttall appeared to be clutching a Qur&apos;an." />
                      <outline text="Friends question allegationsNuttall, 38, and Korody, who is 28 or 29, are alleged to have turned ordinary pressure cookers into improvised explosive devices filled with rusted nails, nuts, bolts and washers." />
                      <outline text="Police have claimed the two were inspired by &apos;&apos;al-Qaeda ideology,&apos;&apos; but say there&apos;s no evidence the two were acting &apos;&apos;at the direction of a terror group.&apos;&apos;" />
                      <outline text="Police released this image of &apos;inert&apos; explosive devices seized in the thwarted bomb plot.(RCMP)The couple&apos;s friends have said they find it hard to believe the pair could have organized such a plot." />
                      <outline text="Korody has been described as a bright and creative but impressionable young woman who could have been led astray." />
                      <outline text="Nuttall, meanwhile, is described as a talented musician with the mentality of a 16-year-old." />
                      <outline text="The couple&apos;s landlord described them as having limited means and questioned how they could have financed such a plot." />
                      <outline text="CBC News reporter Steve Lus, who was allowed inside the couple&apos;s basement suite, said the couple lived in squalor, and described a living space strewn with discarded methadone bottles, video games and DVDs." />
                      <outline text="&apos;Too much&apos; into religionHowever, one friend said the couple&apos;s behaviour changed once they found Islam and became increasingly religious." />
                      <outline text="Ashley Volpatti told CBC News the couple started exhibiting odd behaviour about six months ago &apos;-- becoming distant, declining to socialize and selling off Nuttall&apos;s guitars &apos;-- before they were kicked out of a Surrey mosque." />
                      <outline text="Volpatti said she wasn&apos;t sure why they were kicked out, but described the pair as being &apos;&apos;way too much into their religion.&apos;&apos;" />
                      <outline text="A neighbour told CBC News she overheard Nuttall having a loud telephone conversation in which he mentioned jihad." />
                      <outline text="The couple had also been active in the local paintball community, but stopped attending last August." />
              </outline>

              <outline text="Buckmaster OCF Dipole Antenna">
                      <outline text="Link to Article" type="link" url="http://hamcall.net/7bandocf.html#7band" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373517660_Zt624FXU.html" />
      <outline text="Thu, 11 Jul 2013 04:41" />
                      <outline text="" />
                      <outline text="HamCall.netGoogle Translate:Shopping CartProductsAuctionsHamCall DVD     Owner Benefits     Software Features     Subscriptions     HamCall FAQ     Third-party support     User Opinions     Order HamCallHamCall Member BenefitsHamCall Gold PasswordsHCLogOCF Dipole Antennas     7-Band OCF     4-Band OCF     8-Band OCF     Features     Installation     Ordering     Reviews     FAQPL259 ConnectorsAntenna Support RopeStainless PulleysLine-GripWire WindersRF ChokesGreat Circle MapsName BadgesCQ Magazine ArchivesCryptography BookClub DiscountsDealer DiscountsReturn Address LabelsServicesDXSpotsNew Callsign NotificationVEC Renewals/ModsMailing ListsReturn Address Labels73 Archive SearchCallsign DatabaseAdvertising BannersBrowser Search BlankCallsign ServerField SearchMailing ListsNew Callsign NotificationTop CallsignsMost Wanted CallsignsAdd/Update CallsignHamCall DX SpotsBest Station PhotosBrowse QSLsHamCall FAQHTML Lookup CodeAbout/ContactFacebookTwitterAdvertising BannersAbout HamCallContact UsSearch site(Not a callsign search)4-Band: 40, 20, 10, &amp; 6 meters. 68 feet (23+45) long.7-Band: 75/80, 40, 20, 17, 12, 10, &amp; 6 meters. 135 feet (45+90) long.8-Band: 160, 75/80, 40, 20, 17, 12, 10, &amp; 6 meters. 270 feet (90+180) long.The magic is in the mathematical relationship between amateur bands. The charts below speak for themselves!4-Band OCF Antennas   Our 4-Band antennas cover 40, 20, 10, and 6 meters, with no tuner required! 12 meters may also work on the 4-Band 300 watt model. The 4-Band antennas are OCF (off-center-fed), with a 23 foot leg and a 45 foot leg, totaling 68 feet." />
                      <outline text="7-Band OCF Antennas   Our 7-Band antennas cover 80, 40, 20, 17, 12, 10, and 6 meters, with no tuner required! Wire antennas are a great simple way to work 40M and 80M rather than a noisy vertical antenna that requires horizontal radials. Our 7-Band antennas are OCF (off-center-fed), with a 45 foot leg and a 90 foot leg, totaling 135 feet.8-Band OCF Antennas   Most of the information for 7-Band antennas applies to our 8-Band antennas. Balun construction is the same, the antenna just has more wire. A tuner may be needed for 160 meters.Click here for 8-Band OCF information, SWR chart and Frequency/SWR table." />
                      <outline text="Some comments from our users:" />
                      <outline text="Chosen by the 3YX DXpedition to Peter I Island in Antarctica.Used aboard the &apos;DAP Mares&apos; transport ship. Photo of Peter I DXPedition Members     Photo of Bob K4UEE pointing to the Buckmaster OCF Antenna&quot;...its amazing that just two carefully selected lengths of wire can work that well on five [really 7] bands.&quot; - Kent, WA5VJB (CQ, January, 2006, p70)&quot;...works great, I&apos;m impressed, tunes 160m with tuner [not recommended], worked stations on all bands, outstanding quality construction.&quot; - WC4NChosen by KC4AUF leader of the 2004 Tangier Island DXpedition. &quot;Superb design (no tuner), quality manufacture and booming all band signals.&quot; - KC4AUF&quot;It sure is great to have a relatively flat SWR with no tuner all across those six bands! Thanks for a good-quality product! I speak well of it to my friends.&quot; - K3TED&quot;Purchased OCF 3KW antenna. Works fantastic, best dipole I&apos;ve ever used! Not only am I able to hear DX from around the world, I&apos;m able to work anything I hear.&quot; - John, K6LLK&quot;Great signal on both ends of QSO. It is good to get products and service that deliver as, or better than, advertised.&quot; - KA4AQN&quot;These things are built like a tank! ... This is the finest wire antenna I&apos;ve ever used. Just cannot recommend it enough.&quot; - KB0QMF (at eham.net)&quot;Liked it so much I bought a second one. The Buckmaster&apos;s are definitely worth the money.&quot; - K3VV (at eham.net)&quot;Absolutely the best dipole I have owned or tried. Superior to the Windom. Would buy another product from them again without questions.&quot; - KC4QH (at eham.net)&quot;Fine construction and resonant on all advertised bands. I am very pleased with it compared to several previous Radio Works Carolina Windom ANTs.&quot; - N9VV (at eham.net)&quot;After playing around with numerous wire antennas for the last 40 years in amateur radio, I am impressed with the construction and simplicity of installation. The real bonus is that the performance is as advertised.&quot; - Gene, K4COH&quot;I installed the OCF Dipole that I bought last week. I just wanted to tell you that I am very pleased!! It was an easy installation, and the SWR is great on all bands. The signal reports I have gotten are excellent, and the receive is even better. Thanks for a great antenna. I will recommend it any time.&quot; Cordially, Jim Davis N0DNY&quot;As proof of the efficiency of the Buckmaster antenna, I worked the VP6DX Ducie DXpedition on 80meteres with only 2.5watts with my FT-817 QRP rig. The VP6DX is 5248 miles away so that equates to 2099.2 miles per watt.&quot; - Tony KC4AUFSee the eHam.net user reviews for the 7-Band 3,000eHam.net user reviews for the 7-Band 300eHam.net user reviews for the 4-Band 300About the Buckmaster OCF Dipole" />
                      <outline text="In production since early 2004No tuner or counterpoise required, uses just one wire!Quickly switch bands and eliminate a tuner as one more thing to adjust or transport. Eliminate send/receive tuner loss.Due to the fact that one wire leg of the antenna is shorter than the other, the OCF is more convenient to erect than a regular center fed dipole. Less coax is required.We have used an antenna electrically equivalent to this for over 7 years with outstanding results.Short wave listeners will love this antenna because of its low noise reception.Check the SWR always BEFORE using with any antenna tuner (we don&apos;t recommend an antenna tuner). It only takes overheating the Ferrite in the balun one time to change its characteristics. The dipole is constructed using top quality, flexible, tinned, 12 gauge, 65 strand, PVC coated copper wire pictured below. **The 7-band 100 Watt antenna uses 14 gauge 38 strand wire of similar quality.No trimming - fully assembled, complete and ready to go with end insulators and crimped center and end connections. Add your 50 Ohm coaxial feed line, suspension rope (see our OCF Antenna Support Rope) and go.No external hardware to loosen or corrode.Bands, power, height and other identification are clearly and permanently engraved on the exterior of the center insulator. Operation outside those bands are at your own risk and can likely overheat the balun! We inscribe the antenna with the bands and maximum wattage (in any mode) it can handle.Problems of RF on the exterior (common-mode feed line currents) of the coaxial feed line have not been experienced and seldom reported with this antenna. RF problems are generally due to coupling to house wiring, guy wires, downspouts, etc. Any resonant length of metal can rob signal from any antenna, so study your environment and keep the antenna away from metal.Integral PVC moisture drip ring shields and protects coaxial connection (not present on 100 Watt version due to space considerations.)The 300 to 50 Ohm (6:1) balun (also sometimes called an auto-transformer), is sealed in permanent black epoxy potting compound for moisture and corrosion free operation and is internally crimped and hard soldered to a beryllium copper silvered pin, Teflon barrel, SO-239 coaxial connector. Your PL-259 and coax go here (see photo below).Heavy duty stainless 1/4 inch center threaded, cemented with lock nut eyebolt supports the off center insulator for years of trouble free service. The off center insulator has a special drip collar to protect the SO-239 coaxial connector, yet lets moisture evaporate.Complete with permanently sealed white PVC off center weatherproof insulator containing the potted balun and crimped on gray end insulators. Suspension rope and coaxial feed line not included, see our OCF Antenna Support Rope, Stainless Steel Pulleys, and Line Grips.Installation Information" />
                      <outline text="Installation Instruction Sheet: Word DOC   Adobe PDF. These are the instructions that ship with the antennas.Usually works best as an &quot;inverted-V.&quot; Erecting at least 30 feet above ground is recommended. Each end can droop up to 30 degrees from horizontal, 180-(2*30)=120 degrees total is ideal, but anything from 120 to 180 degrees should work well. Ends should be 8 feet or more from the ground for safety reasons.Higher is not always better. If the center is mounted too high off a tower it is very hard to get a 120 degree angle, so mount it lower.If you don&apos;t have anything to hang the center from, consider using a &apos;messenger line&apos; between two supports (trees, etc.) consisting of a run of good quality, UV protected rope with a pulley at one support. Tie the OCF balun along this line in a spot that works for you (and will allow the balun to be reached from the ground) and run the coax away at a ninety degree angle (as possible). This takes tension off of the antenna legs and the pulley at one support makes it easy to take things down for service or inspection (be sure the rope is long enough). Also be sure to make allowances for support trees swaying in the wind by using a weighted gallon milk jug or two and a pulley to handle the movement of the tree supports.We recommend using rope and a pulley to hang the center balun, so the antenna can be easily lowered for access to connectors etc.Coupling to nearby metallic objects and the mineralization of the underlying soil can impact performance and impedance of an OCF antenna system. The impedance can also vary as antenna orientation is changed in relationship to earth. The OCF is generally very forgiving.The balun will test as a short when testing using a DC Ohm meter and will test correctly at RF frequencies when erected and using an antenna analyzer. So use an analyzer or your transceiver&apos;s SWR meter at reduced power.Route coaxial feed line to the shack by running it down to the ground (not tied to a metallic structure or tower) and away from the antenna at a 90 degree angle as possible. The length of the feed line is not critical as the coax is NOT part of the radiating antenna. Shorter is usually better.Use good quality 50 Ohm coaxial cable with appropriate power rating such as: RG58, RG8X, RG8, RG213, Belden 9913F7, Davis RF Bury-Flex. A coax with a dense (or double) braid is worth the money. Don&apos;t lose that weak signal in the coax!Verify your coax and connectors (switches, etc) by temporarily installing a 50 Ohm dummy load instead of the OCF and checking SWR from the transceiver end.ALWAYS physically disconnect the OCF coax from equipment and securely ground both conductors when you are finished operating. Better to lose an antenna to lightning rather than a transceiver!Warranty and Returns" />
                      <outline text="One (1) year unconditional warranty against defects. We will repair or exchange your antenna within the first year of ownership. Warranty not offered if antenna is stretched, over-powered, operated with high SWR, or operated on non-supported bands. Our OCF antennas support the bands inscribed on the balun case." />
                      <outline text="30 Day return privlege. You may return your antenna within 30 days in &quot;as new&quot; condition for a full refund of the antenna purchase price (less shipping.)" />
                      <outline text="Before returning any antenna, please talk to us at the phone number below. It is extremely rare we get a defective antenna back, problems are usually due to a bad coax connector or a resonant length of metal in the vicinity. We also ask you include this RMA form with your antenna so we know who sent it and why." />
                      <outline text="Ordering Information" />
                      <outline text="Shipping weight is estimated at 6 pounds for the 300 Watt, 8 pounds for the 3,000 Watt, and 10 pounds for the 5,000 Watt. 8-Band antennas have a lot more wire, and weigh about 11 pounds. We ship via UPS Ground to continental US addresses, the UPS cost is usually around $17.00-$22.00. If you can ship to a business address that saves several dollars.For antennas shipped outside the USA, we ship USPS Priority Mail International, the cost starts around $67.00. These shipments can take a long time and we insure each shipment for the full value of the antenna. Please check this page to see if full insurance is offered on shipments to your country (click on your country name, look for the section that mentions &quot;Insurance.&quot;) If insurance for the full cost of the antenna is not offered, we will not be able to ship an antenna to you! If possible, ship the antenna to a country where insurance is offered.To order an antenna, click one of the following links:Our 4-Band antennas are 68 feet (20 meters) long and work on 40, 20, 10, &amp; 6 meters.Order 4-Band 300 Watt OCF Dipole Antenna: $267Special Price: $203! (6 or more = $160 ea.)Order 4-Band 3,000 Watt OCF Dipole Antenna: $387Special Price: $294 (6 or more = $232 ea.)Order 4-Band 5,000 Watt OCF Dipole Antenna: $598Special Price: $455 (6 or more = $359 ea.)" />
                      <outline text="Our 7-Band antennas are 135 feet (41 meters) long and work on 80, 40, 20, 17, 12, 10, and 6 meters.Order 7-Band 100 Watt OCF Dipole Antenna: $262Special Price: $199 (6 or more = $157 ea.)Order 7-Band 300 Watt OCF Dipole Antenna: $273Special Price: $207 (6 or more = $163 ea.)Order 7-Band 3,000 Watt OCF Dipole Antenna: $394Special Price: $299 (6 or more = $236 ea.)Order 7-Band 5,000 Watt OCF Dipole Antenna: $605Special Price: $460 (6 or more = $362 ea.)" />
                      <outline text="Our 8-Band antennas are 270 feet (82 meters) long and work on 160 (tuner may be required), 80, 40, 20, 17, 12, 10, &amp; 6 meters.Order 8-Band 300 Watt OCF Dipole Antenna: $357Special Price: $272 (6 or more = $214 ea.)Order 8-Band 3,000 Watt OCF Dipole Antenna: $476Special Price: $362 (6 or more = $285 ea.)Order 8-Band 5,000 Watt OCF Dipole Antenna: $682Special Price: $518 (6 or more = $409 ea.)" />
                      <outline text="View Shopping cart or go to Checkout" />
                      <outline text="For help in erecting your OCF antenna, see our Antenna Support Rope, Line Grips, PL-259 connectors, and Stainless Steel Pulleys." />
                      <outline text="Buckmaster Antennas6196 Jefferson HighwayMineral, Virginia 23117 USA540:894-5777800:282-5628 (Orders)540:894-9141 (Fax)Email: info@buck.com" />
                      <outline text="182509 hits since" />
              </outline>

              <outline text="FBI Director Nomination Hearing - C-SPAN Video Library">
                      <outline text="Link to Article" type="link" url="http://www.c-spanvideo.org/program/IDirecto" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373516112_wcFHupzL.html" />
      <outline text="Thu, 11 Jul 2013 04:15" />
                      <outline text="" />
                      <outline text="Follow Similar Programs1" />
                      <outline text="Senate Committee JudiciaryFollow Sponsors" />
                      <outline text="James Comey testified about his nomination to become the director of the FBI.*Among the issues he addressed were the use of water-boarding in interrogations, National Security Agency (NSA) surveillance programs, and the force .. Read MoreJames Comey testified about his nomination to become the director of the FBI.*Among the issues he addressed were the use of water-boarding in interrogations, National Security Agency (NSA) surveillance programs, and the force feedings of prisoners at Guantanamo Bay detention facility.&apos;&#130;He also said that the secret surveillance court that approved wiretapping requests, known as the FISA court, was &apos;&apos;anything but a rubber stamp.&apos;&apos;" />
                      <outline text="2 hours, 42 minutes | 492 Views" />
              </outline>

              <outline text="$1.1 Million of Soros Money Tied To Magazine That Released McConnell Tape | CNS News">
                      <outline text="Link to Article" type="link" url="http://cnsnews.com/blog/mike-ciandella/11-million-soros-money-tied-magazine-released-mcconnell-tape" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373515350_jtuHh9Un.html" />
      <outline text="Thu, 11 Jul 2013 04:02" />
                      <outline text="" />
                      <outline text="George Soros isn&apos;t behind everything the left does, but it sure seems like he helps fund it all. The lefty magazine Mother Jones released a tape, reportedly obtained from a Democratic Super PAC in Kentucky, in an effort to hurt Mitch McConnell&apos;s bid for reelection in the U.S. Senate. But, Mother Jones has funding baggage of its own." />
                      <outline text="Mother Jones is the news outlet of The Foundation for National Progress, the left-wing &quot;umbrella organization that exists to publish and support Mother Jones.&quot; It also founded the Media Consortium. The FNP received $485,000 in Soros funding in 2008. The Media Consortium, also still under the umbrella of the FNP, has received $675,000 since 2000, adding up to $1,160,000. Those figures come from 990 forms from Soros&apos; Open Society Foundations." />
                      <outline text="The Media Consortium is designed to be a progressive &quot;echo chamber,&quot; where left-wing media outlets can network and share ideas. Other members of the Consortium include such liberal outlets as The Nation, Alternet and The American Prospect." />
                      <outline text="The McConnell tape, released by Mother Jones and promoted by other media outlets, including all three major networks, was recorded by the liberal Democratic Super PAC Progress Kentucky, which has raised nearly $5 million in a campaign to replace McConnell in the U.S. Senate. The FBI is currently investigating the legality of the recording. Mother Jones was also the news outlet that released the &quot;47%&quot; video of Mitt Romney back in September of 2012." />
                      <outline text="Soros&apos;s donations go to fund an extensive network of liberal media outlets, which have received more than $52 million. Those operations include a wide range of liberal news operations as well as the infrastructure of news - journalism schools, investigative journalism and even industry organizations. Since 2000, Soros has given away more than $550 million to liberal organizations in the United States through his Open Society Foundations." />
                      <outline text="Progress Kentucky also made the news back in February, when the group tweeted out a racially-charged comment about McConnell&apos;s wife, former Secretary of Labor Elaine Chao, suggesting that she was working to outsource jobs to China. The tweets have since been deleted, and Progress Kentucky issued a statement apologizing for the incident." />
                      <outline text="See more &quot;Right Views, Right Now.&quot;" />
              </outline>

              <outline text="Donation Information | Freedom of the Press Foundation">
                      <outline text="Link to Article" type="link" url="https://pressfreedomfoundation.org/donation-information" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373515184_qsXkcsG5.html" />
      <outline text="Thu, 11 Jul 2013 03:59" />
                      <outline text="" />
                      <outline text="Tax-Deductible" />
                      <outline text="The Foundation for National Progress, a 501(c)(3) nonprofit organization, is the Freedom of the Press Foundation&apos;s fiscal sponsor and provides users a way to give tax-deductible donations. Our tax ID number is 94-2282759. Your gift is tax-deductible to the full extent provided by law." />
                      <outline text="Checks and Money Orders" />
                      <outline text="We are pleased to receive anonymous donations in the mail. Please make checks and money orders payable to &quot;Foundation for National Progress,&quot; and make sure to write &quot;Freedom of the Press Foundation&quot; in the memo field. Please mail checks and money orders to:" />
                      <outline text="Foundation for National Progressc/o Freedom of the Press Foundation222 Sutter Street, Suite 600San Francisco, CA 94108" />
                      <outline text="If you&apos;d like to designate your donation to particular transparency journalism organization, please specify how you&apos;d like your money allocated in an attached note. Otherwise, your money will be donated directly to the Freedom of the Press Foundation&apos;s general fund." />
              </outline>

              <outline text="Samsung pays Apple $1 Billion sending 30 trucks full of 5 cent coins">
                      <outline text="Link to Article" type="link" url="http://www.nextventured.com/2013/samsung-pays-apple-1-billion-sending-30-trucks-full-of-5-cent-coins/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373514594_LtUU8RX7.html" />
      <outline text="Thu, 11 Jul 2013 03:49" />
                      <outline text="" />
                      <outline text="Thirty trucks filled with 5-cent coins pulled up to the Apple headquarters in Cupertino, California. Initially, the security team at Apple, who protects the tech giants facility, told the trucks that they were in the wrong place. But, just minutes later, Tim Cook, the CEO of Apple, received a phone call from the Samsung CEO explaining how the billion fine was being paid in the form of coins." />
                      <outline text="The funny part is that the signed document does not specify a single payment method, so Samsung is entitled to send the creators of the iPhone their billion dollars in the way they deem best." />
                      <outline text="This dirty but genius geek troll play is a new headache to Apple executives as they will need to put in long hours counting all that money, to check if it is all there and to try to deposit it crossing fingers to hope a bank will accept all the coins." />
                      <outline text="Lee Kun-hee, Chairman of Samsung Electronics, told the media that his company is not going to be intimidated by a group of &apos;&apos;geeks with style&apos;&apos; and that if they want to play dirty, they also know how to do it." />
                      <outline text="You can use your coins to buy refreshments at the little machine for life or melt the coins to make computers, that&apos;s not my problem, I already paid them and fulfilled the law." />
                      <outline text="A total of 20 billion coins, delivery hope to finish this week." />
                      <outline text="Let&apos;s see how Apple will respond to this." />
                      <outline text="Commentscomments" />
              </outline>

              <outline text="Board of Directors | Mother Jones">
                      <outline text="Link to Article" type="link" url="http://www.motherjones.com/about/board-directors" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373513434_BrNSLLaV.html" />
      <outline text="Thu, 11 Jul 2013 03:30" />
                      <outline text="" />
                      <outline text="ChairPhil is a photographer. He straddles the digital/analog border with a 4X5 camera and film, scanning, Photoshop, and toned silver prints. For dozens of thousand-word equivalents answering the question, &quot;What does he photograph?&quot; see his website, at www.strausphoto.com." />
                      <outline text="Phil is on the board of directors of the Center for Defense Information where he&apos;s underwritten the launch of the Straus Military Reform Project. He is supporting a MotherJones.com project on militarism." />
                      <outline text="He&apos;s recently begun playing the piano and composing music and returned to running after a ten-year lapse due to now-eliminated arthritis. He&apos;s looking forward to a return to the study of mathematics. Phil has been a devoted go player for over 35 years." />
                      <outline text="He lives in Philadelphia with his wife, Margaret Harris. They&apos;ve recently become empty-nesters. Phil has degrees in psychology and engineering. For other details of his past life, ask his cousin, Jane Butcher." />
                      <outline text="PresidentBuckingham became president and CEO in February 2010. Prior to this she held the position of COO/CFO; she joined Mother Jones in 2002. She has spent more than 20 years in senior finance and management positions in the publishing and high-tech industries working for a range of publishing companies and Internet startups, including Sony Corp.&apos;s Internet incubator and at International Data Group." />
                      <outline text="Vice PresidentMonika Bauerlein is co-editor of Mother Jones, where, together with Clara Jeffery, she spearheaded an era of editorial growth and innovation, marked by two National Magazine Awards for general excellence, the addition of a seven-person Washington Bureau, and an overhaul of the organization&apos;s digital strategy that tripled MotherJones.com&apos;s traffic. Previously she was Mother Jones&apos; investigative editor, focusing on long-form projects marrying in-depth reportage, document sleuthing, and narrative appeal. She has also worked as an alternative-weekly editor (at Minneapolis/St. Paul&apos;s City Pages), a correspondent for US and European publications in Washington, D.C. and at the United Nations, an AP stringer, corporate trainer, translator, and pastry chef (a very short stint). She lives in Oakland with her husband and their three children." />
                      <outline text="Vice PresidentClara Jeffery is co-editor of Mother Jones, where, together with Monika Bauerlein, she has spearheaded an era of editorial growth and innovation, marked by the addition of an eight-person Washington bureau, an overhaul of the organization&apos;s digital strategy and a corresponding tripling of traffic, and the winning of two National Magazine Awards for general excellence. Before joining the staff of Mother Jones, she was a senior editor of Harper&apos;s magazine. Eight pieces that she personally edited have been finalists for National Magazine Awards, in the categories of essay, profile, reporting, public interest, and fiction. Works she edited have also been selected to appear in various editions of Best American Essays, Best American Travel Writing, Best American Sports Writing, and Best American Science Writing. Clara cut her journalistic teeth at Washington City Paper, where she wrote and edited political, investigative, and narrative features, and was a columnist. Jeffery is a graduate of Carleton College and Northwestern&apos;s Medill School of Journalism. Born in Baltimore and raised in Arlington, Virginia, she now resides in the Mission District of San Francisco with her partner Chris Baum and their two-year-old son Milo. Their burrito joint of choice is El Metate." />
                      <outline text="Vice PresidentSteven Katz is Publisher for Mother Jones and its non-profit publisher, the Foundation for National Progress. He joined MoJo in 2003 after several years as Vice President of Development for Earthjustice, the nation&apos;s leading non-profit environmental law firm. While at Mother Jones, Steve helped found and was the first Project Director for The Media Consortium, a network of more than 40 independent, progressive media organizations around the United States." />
                      <outline text="Steve has thirty years&apos; experience working in the fields of the environment advocacy, the arts, social justice, and neighborhood-based housing development. Prior to joining Earthjustice in 1995, he was Managing Director for the California urban environmental advocacy organization, Communities for a Better Environment, from 1989 to 1994. During the mid and late 1980s, Steve worked in the non-profit arts world, including three years as Managing Director for the San Francisco-based touring ensemble, A Traveling Jewish Theatre. He also was Associate Director for Housing and Planning at Brooklyn&apos;s Flatbush Development Corporation for two years in the early 1980s, and Development Coordinator for the Bronx-based sweat equity urban homesteading group, People&apos;s Development Corporation, from 1976 to 1978." />
                      <outline text="Steve has been on a number of non-profit boards, among them Earthshare of California, the As You Sow Foundation, the Marin Center for Peace and Justice, and Turtle Island Restoration Network. Steve received his PhD in Sociology from the University of California at Santa Cruz in 1987, and his B.A. from Oberlin College in 1974. He lives in the San Francisco Bay Area with his wife Rachelle, and his son, Noah." />
                      <outline text="SecretarySara Frankel has worked in media companies since starting her first job as a Mother Jones intern in 1986. She subsequently worked as an editor and feature writer for both weekly magazines and a daily newspaper. Since receiving her MBA in 1994, she has held a range of business positions in electronic media companies, most recently running an Internet company she founded in 1999. She is currently working as a business consultant in New York." />
                      <outline text="For 25+ years Harriett was a partner at New York based Frankfurt Balkind, an award -winning brand strategy and communications agency with offices in San Francisco and Los Angeles. Known for its innovative integrated approach, the agency was purchased by Interpublic/Hill Holliday during 2002. At Frankfurt Balkind, Harriett was responsible for business development and led client liaison and brand strategy teams for companies whose needs required multi-disciplinary marketing &apos;&apos; identity, print, video, digital, web. Clients ranged from AT&amp;T, Avon, Saks Fifth Avenue, Pitney Bowes, Hearst, Goldman Sachs, HBO, and Sony to the MTA (Grand Central Station) and New Visions for Public Schools." />
                      <outline text="Today Harriett is co-founder of Strat B in New York, providing brand strategy, messaging and marketing communications for established companies such as Time Warner Cable Media and start-ups like Cindy Levine Group. She is a partner of Bemis Balkind, a premier Los Angeles based entertainment marketing agency." />
                      <outline text="Harriett&apos;s career began in San Francisco where she lived for 13 years and worked in retail and banking prior to joining Landor Associates, a brand and creative design consultancy. Moving to New York, she headed advertising and public relations for Reeves Communications, who later became one of her first clients when she started Levin Associates; the other was Gips+Balkind design firm, subsequently, Frankfurt Balkind. Harriett has been published in industry publications such as Communication Arts, Graphic Design: USA, and Direct Marketing News. She has a monthly blog-azine, &quot;Secrets no one ever told you,&quot; www.snoety.com, directed primarily to 45+ women who are interested in new ideas and thoughts on living, and she serves on the Industry Council of Eurica Media Lab. She has one son, Devin, who is 25 and lives in Brooklyn." />
                      <outline text="Harriet is the director of the HKH Foundation, which makes grants in areas relating to the environment, the arms race, and civil liberties, and is also director of the Blue Mountain Center, an upstate New York workplace for artists, writers and activists. Ms. Barlow has also founded and co-founded 12 public interest organizations and has been a member of the board of directors of over 50 non-profits." />
                      <outline text="Jane is co-Chair of the Conference on World Affairs, Chair of the Dean&apos;s Advisory Committee for Arts and Sciences at the University of Colorado, is on the Advisory Board of the Autry National Center and also on the Biotech Advisory Board at the University of Colorado. She is the founder of the consulting firm Conventional Wisdom, Ltd." />
                      <outline text="Andre CarothersAndre Carothers has more than 25 years experience in non-profit management, philanthropy, program development, and organizational and leadership development. He is currently an independent consultant. He is the co-founder, former Executive Director, and now a Senior Fellow at the Rockwood Leadership Institute, a national non-profit training and consulting organization. He serves as Chairman of the Board of the Rainforest Action Network and is a Board Member of International Rivers. He is also senior adviser to the Weinmann Charitable Trust, and Executive Director of the Furthur Foundation and the New Place Fund. From 1984 to 1997 he worked at Greenpeace USA as editor of their national newsmagazine, campaign manager and member of the Board of Directors. He was a regular columnist for &apos;&apos;E&apos;&apos; Magazine and has written extensively on environment and civic issues for many publications. He has authored numerous reports, articles and conference presentations on topics ranging from the economics of timber extraction in Papua New Guinea to the integration of spiritual practice into social activism. He received an MA in environmental science from the Energy and Resources Group at the University of California, Berkeley." />
                      <outline text="Diane FilippiDiane Filippi is the Director of the SPUR Urban Center in San Francisco. Prior to joining SPUR, Ms. Filippi was a founder and Managing Principal of SMWM, an architectural and urban design firm in San Francisco." />
                      <outline text="As the Director of the SPUR Urban Center, Diane has been a guest speaker on Urban Centers to national and international audiences." />
                      <outline text="A few of Diane&apos;s other activities include:Chair, Rail-volution, Washington DC and Portland, Oregon - currentBoard Member, Association of Architectural Organizations, Chicago - currentBoard Member, ULI District Council - currentChair, Urban Land Institute, San Francisco District CouncilBoard Member, San Francisco Chamber of CommerceChair, San Francisco Friends of the LibraryChair, Keep Libraries Alive Political CampaignChair, State of California Friends of the LibraryChair, Libraries for the Future, New York" />
                      <outline text="For the past 8 years, Diane has been named one of San Francisco&apos;s 100 Most Influential Women. In 2010, she was honored as a permanent member of San Francisco Most Influential Women Hall of Fame." />
                      <outline text="In 1996, Mayor Willie L. Brown, Jr. in recognition of service to the people of San Francisco and the San Francisco Public Library, declared February 20 to be Diane Filippi Day in San Francisco." />
                      <outline text="Dave GlasscoDave is a self-described &quot;father, geek, and musician who lives in Austin, Texas.&quot; He is a Texas native, and true to the Austin ethos, he&apos;s creative, passionate, and active in his community." />
                      <outline text="Dave graduated from the University of Texas with a degree in government. He later attended the Berklee College of Music, but returned to Austin to open Satellite Studio. Currently he is the President of the board of The Participatory Culture Foundation, which supports open video on the web. Dave is also very active in Texas and national politics and sits on the board of Be One Texas." />
                      <outline text="Erik is a co-founder and president of the Seattle-based Quixote Foundation. The Quixote Foundation was founded in 1997 by Erik&apos;s father, Arthur, to advance progressive causes through the action, education &amp; policy work of dynamic nonprofit groups. Erik&apos;s wife, Lenore is the Executive Director of the Quixote Foundation." />
                      <outline text="Adam is a writer and was one of the co-founders of Mother Jones. He is the author of seven books: Half the Way Home: a Memoir of Father and Son; The Mirror at Midnight: a South African Journey; The Unquiet Ghost: Russians Remember Stalin; Finding the Trapdoor: Essays, Portraits, Travels; King Leopold&apos;s Ghost: a Story of Greed, Terror and Heroism in Colonial Africa; Bury the Chains: Prophets and Rebels in the Fight to Free an Empire&apos;s Slaves; and To End All Wars: A Story of Loyalty and Rebellion, 1914-1918. In 1997-98, he spent five months as a Fulbright Lecturer in India, and he teaches a writing class at the Graduate School of Journalism at the University of California at Berkeley." />
                      <outline text="Kim Keller is the Executive Director of the David &amp; Anita Keller Family Foundation, a Bay Area-based family foundation committed to human rights as the cornerstone to peace and justice. She is deeply engaged and passionate about international human rights and strategic philanthropy. In addition to serving on the boards of the Foundation for National Progress (Mother Jones) and Accountability Counsel, Kim is an active member of The Philanthropy Workshop West, Global Philanthropy Forum, and the International Human Rights Funders Group. In 2011, she volunteered with the Carter Center as an election observer during the Liberian presidential election." />
                      <outline text="Prior to directing her family&apos;s foundation, Kim worked in social science research and policy analysis for Bay Area non-profits including the Prevention Research Center and the San Francisco AIDS Foundation, and for the Department for Veterans&apos; Affairs." />
                      <outline text="Kim holds degrees from Wellesley College and the London School of Economics and Political Science. " />
                      <outline text="Rick is a founding principal of Melcher &amp; Tucker Consultants, a Chicago-based strategic marketing and communications firm advising small and midsize companies and not-for-profit organizations. Since he co-founded the business in 2000, Rick has helped clients with strategic planning, media and capital campaigns, and in building alliances. Prior to his current endeavors, Rick worked at two leading public policy web sites, and spent two decades at Business Week magazine, managing bureaus in Chicago and London, and where he received the Citation for Excellence from the Overseas Press Club for reporting on Europe and the Center for Education Reform&apos;s award for Excellence in Journalism." />
                      <outline text="Rick is a board member of the Foundation for National Progress, and serves on the national board of trustees and the Chicago advisory board of Facing History and Ourselves. He is also on the executive committee of the board of directors of Chicago Commons and is a member of the Economic Club of Chicago and the Chicago Council on Foreign Relations. A graduate of Duke University, Rick and his wife, Barbara, are the parents of three children." />
                      <outline text="Carolyn Mugar is and has been for twenty years the Executive Director of Farm Aid. Previous to that, she was an organizer with the Oil, Chemical and Atomic Workers International Union and the Amalgamated Clothing and Textile Workers International Union. Both unions have since merged several times. She also founded the Armenia Tree Project based in Watertown Massachusetts and Yerevan, Armenia and is very active on Armenian issues, going back and forth to Armenia several times a year. She likes to bike a lot. She walked the whole Camino in Spain over four years ago. She went to college and received a higher education." />
                      <outline text="Staff Representative" />
                      <outline text="Maddie is the research editor at Mother Jones, managing a team of editorial fellows who fact-check the magazine&apos;s website and print issues and help make its explosive stories bulletproof. She also writes about culture, food politics, and environment for MoJo, and enjoys interviewing writers and comedians for its media section. Before Mother Jones, she worked at several educational nonprofits in the Bay Area and wrote for The Rumpus. She studied literature at Middlebury College and originally hails from Boulder. When not enjoying the victual paradise of San Francisco, you can find her skiing and hiking in the mountains." />
                      <outline text="Jon Pageler has been a Vice President of Diageo, the world&apos;s leading premium drinks company, since 2003 and is currently responsible for Marketing Communications. At Diageo, Mr. Pageler&apos;s responsibilities include overseeing the marketing communications efforts in North America, as well as coordinating these efforts with the other Diageo markets worldwide. Prior to becoming the Head of Marketing Communications for North America, Mr. Pageler served as the Brand Communications Strategist in Diageo&apos;s world Headquarters in London." />
                      <outline text="Mr. Pageler began his tenure with Diageo in Napa, as the Diageo Chateau &amp; Estate Wine Company&apos;s executive in charge of Corporate Relations in the role of Vice President Corporate Relations, Diageo Chateau &amp; Estate Wines." />
                      <outline text="From 2000 to 2003, prior to joining Diageo, Mr. Pageler worked for the Crisis Management and Strategic Communications firm, Westhill Partners, where, among other responsibilities, he managed the firm&apos;s largest client, Diageo. Mr. Pageler came to Westhill from his role as Scheduler and, ultimately, Trip Director on the Bill Bradley for President Campaign, where he served for two years. From 1995 through 1998, Mr. Pageler held positions on several political campaigns including as the Scheduler for Charles Schumer&apos;s successful bid to unseat US Senator Al Damato and as Campaign Manager for Charlie King&apos;s unsuccessful bid for New York State Lieutenant Governor." />
                      <outline text="Prior to that Mr. Pageler worked for the American Red Cross as a communications specialist and as an Investigator for the Neighborhood Defender Service of Harlem, a non-profit criminal defense firm based on 125th Street in Manhattan." />
                      <outline text="Mr. Pageler graduated with honors and a BA in Philosophy from Carleton College in Northfield Minnesota in 1990." />
                      <outline text="Ken is a technologist, designer, musician and amateur chef." />
                      <outline text="Working at the intersection of design and technology, Ken has led several software and design projects over a 30-year career, most recently as CTO at Groupon.com He is currently an investor and advisor to several early stage start-ups, including DesktimeApp.com, TheNounProject.com and Kitchensurfing.com" />
                      <outline text="Ken serves on the board of The Old Town School of Folk Music and The Awesome Foundation of Chicago, and is partner and board member at City Winery Chicago." />
                      <outline text="Ken has had a lifelong interest in cooking and the politics of food. He recently completed the &apos;La Technique&apos; program at The French Culinary Institute, NYC and is a founding member of The Kitchen Community Chicago, a non-profit based in Boulder, CO that is building &apos;learning gardens&apos; in Chicago schools." />
                      <outline text="Ken is a 20-year transplant from the Boston area to Chicago where he lives with his wife, Amanda Lao and their 2 year old rooftop garden." />
                      <outline text="Susan has been active in the arts, education, civil rights and women&apos;s issues for most of her life. She has been a on the board of Pitzer College since 1990 and the chair since 2001. She also serves on the board of directors of Chicago-based Urban Gateways: Center for the Arts in Education, the largest arts-in-education organization in Cook County, Ill. Urban Gateways reinforces the arts curriculum in Chicago public and parochial schools by sponsoring artists to teach visual arts, dance, theater and music. Susan is also chair of the board of directors of the Chicago Foundation for Women, whose goal is to increase philanthropic giving by women for a variety of causes, including shelters for abused women and girls and programs on domestic violence and sexual assault. Susan is married to Nick Pritzker, whose family are owners of the Hyatt Hotel chain." />
                      <outline text="Dr. Nan Schaffer is a conservationist and internationally recognized expert on the rhinoceros and reproduction. Although her research programs focused on reproductive issues in a variety of mammals, Dr. Schaffer&apos;s greatest contributions to science and conservation center on the five species of rhinoceros. In 1998, concerned with the continued decline of these critically endangered species, Dr. Schaffer refocused her efforts and founded SOS Rhino, an international non-profit organization focused on saving rhinoceroses in their natural habitats. SOS Rhino&apos;s community-based conservation programs built on the capacity of all stakeholders to conserve by raising local awareness and promoting protection of habitats and animals." />
                      <outline text="In addition to her contributions to science and conservation, Dr. Schaffer is also a philanthropist and activist in the LGBT community. She was the first woman invited to join the Board of IMPACT, the predecessor to Equality Illinois, the state&apos;s oldest and largest LGBT political action committee. In 1985 she co-founded Outlines, one of the first lesbian newspapers in the Midwest, which became The Windy City Times, the oldest and only surviving LGBT newspaper in Chicago. In addition to her political and publishing efforts, Dr. Schaffer supported numerous LGBT organizations with her time, wisdom and financial resources, and in 2004, she was inducted into the Chicago Gay &amp; Lesbian Hall of Fame." />
                      <outline text="In her retirement, Dr. Schaffer has continued her philanthropy, activism and conservation efforts. She serves as a governing member of the Chicago Zoological Society&apos;s Board of Trustees and continues to consult with Malaysian government officials and leaders of rhinoceros conservation programs." />
                      <outline text="Staff RepresentativeKate Sheppard covers energy and environmental politics in Mother Jones&apos; Washington bureau. She was previously the political reporter for Grist and a writing fellow at The American Prospect. She can be reached by email at ksheppard (at) motherjones (dot) com. Her work has also been featured in the New York Times Room for Debate blog, The Guardian&apos;s Comment is Free, High Country News, The Center for Public Integrity, The Washington Independent, ForeignPolicy.com, Washington Spectator, Who Runs Gov, In These Times, and Bitch. She was raised on a vegetable farm in southern New Jersey (yes, they do exist), but has adapted well to life in the nation&apos;s capitol. She misses trees and having a Congressional representative with voting power, but thinks D.C. is pretty great anyway." />
                      <outline text="Kevin Simmons is the founder and co-director of two nonprofit art spaces: High Concept Laboratories (HCL), and Los Del Patio. HCL collaborates with Chicago-area artists and performers to foster the creation and development of new works, and also curates classes, screenings, lectures, and other events for the community. Los Del Patio, located in Panama City, Panama, entails a gallery, cafe/bar, center for studios and workshops, as well as professionally-oriented programming pertaining to the production and presentation of contemporary art. He is the president of Opera Cabal, a Chicago-based avant-garde contemporary opera company, and in addition to serving on the board of the Foundation for National Progress / Mother Jones Magazine, he is a board member of Molly Shanahan / Mad Shak Dance Company, The Canary Project, and the Azuero Earth Project. A former AmeriCorps*VISTA Site DIrector with LIFT, he studied political science and public policy at Princeton University and has worked in development and programming for a variety of environmental projects in Panama, including the Panama Rainforest Discovery Center and the Frank Gehry-designed BioMuseo / Museum of Biodiversity in collaboration with the Smithsonian Tropical Research Institute." />
              </outline>

              <outline text="How we broke the NSA story - Salon.com">
                      <outline text="Link to Article" type="link" url="http://www.salon.com/2013/06/10/qa_with_laura_poitras_the_woman_behind_the_nsa_scoops/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373512700_7pqNxNb4.html" />
      <outline text="Thu, 11 Jul 2013 03:18" />
                      <outline text="" />
                      <outline text="Shortly after Salon&apos;s biographical sketch on Laura Poitras went live, the award-winning documentary filmmaker agreed to a phone interview, her first since she helped reveal the scope of the National Security Agency&apos;s digital surveillance. &apos;&apos;I feel a certain need to be cautious about not wanting to do the work for the government,&apos;&apos; she told Salon, but agreed to clarify some parts of her role in the story." />
                      <outline text="Poitras is still in Hong Kong, where she is filming the story behind the story &apos;-- including her co-author on the Guardian story and former Salon columnist Glenn Greenwald &apos;-- for her forthcoming documentary on whistle-blowers and leaks. In a wide-ranging interview, she explained how she first made contact with Snowden, her reaction to the possible future investigation into his leaks, and why Snowden didn&apos;t go to the New York Times. What follows is a lightly edited transcript." />
                      <outline text="So how did this all begin?" />
                      <outline text="I was originally contacted in January, anonymously." />
                      <outline text="By Edward Snowden?" />
                      <outline text="Well, I didn&apos;t know who it was." />
                      <outline text="What was the format?" />
                      <outline text="Via email. It said, I want to get your encryption key and let&apos;s get on a secure channel." />
                      <outline text="And he didn&apos;t say what it was about?" />
                      <outline text="He just said &apos;-- that was the first, and the second was, I have some information in the intelligence community, and it won&apos;t be a waste of your time." />
                      <outline text="Do you get a lot of those kinds of requests?" />
                      <outline text="No, I don&apos;t." />
                      <outline text="Did you immediately know what was the best, most secure protocol to go about it?" />
                      <outline text="I actually did. I have a lot of experience because I&apos;ve been working with &apos;-- as you note in your thing, I&apos;ve done filming with WikiLeaks, I know Jacob Appelbaum. I already had encryption keys but what he was asking for was beyond what I was using in terms of security and anonymity." />
                      <outline text="How did it proceed from there?" />
                      <outline text="So that&apos;s where I&apos;m not going into a lot of details, but sort of ongoing correspondence. I didn&apos;t know, I didn&apos;t have any biographical details or where he worked, had no idea. He made claims and said he had documentation. At that point it was all completely theoretical, but I had a feeling it was legit." />
                      <outline text="Why do you think he contacted you? Were you the first person he contacted?" />
                      <outline text="I can&apos;t speak for him. Glenn and I just touched base about, what was your story, because we connected later in the spring. He, I think, got an email in February. But I didn&apos;t know he&apos;d gotten an email." />
                      <outline text="He told me he&apos;d contacted me because my border harassment meant that I&apos;d been a person who had been selected. To be selected &apos;&apos;and he went through a whole litany of things &apos;-- means that everything you do, every friend you have, every purchase you make, every street you cross means you&apos;re being watched. &apos;&apos;You probably don&apos;t like how this system works, I think you can tell the story.&apos;&apos; &apos;... Of course I was suspicious, I worried that it was entrapment, it&apos;s crazy, all the normal responses you have to someone reaching out making, claims. He said he&apos;d seen a piece that I&apos;d done on Bill Binney in the Times." />
                      <outline text="I can say from conversations I had with him after that, I think he had a suspicion of mainstream media. And particularly what happened with the New York Times and the warrantless wiretapping story, which as we know was shelved for a year. So he expressed that to me but I think also in his choices of who he contacted. I didn&apos;t know he was reaching out to Glenn at that point." />
                      <outline text="And you and Glenn were already colleagues, right, you sit on a board together?" />
                      <outline text="At that point the foundation had just opened. So we knew each other and we were colleagues and friends." />
                      <outline text="How did it get to the point where you knew it was going to be a story, and how did you decide where it was going to be published?" />
                      <outline text="Those are the details I&apos;m not going to go into. What I can say is that once I had a few pieces of correspondence, I said, let me ask a couple of people about this, people who have experience, and I sat down with a couple of people, one of whom was Bart Gellman &apos;... and he said, it looks like this person could be legit. And that was probably February." />
                      <outline text="These disputes that have been played out on the internet about who got in touch with whom and who needed assurances &apos;&apos;" />
                      <outline text="In a situation like this, this is a confidential source and has been until very, very recently, actually has been a person whose identity I did not know. To actually go on the record and talk about &apos;-- it seems to be a violation of a lot of relationships with someone who&apos;s trusted you. There&apos;s partly that, so I&apos;ve been hesitant. I&apos;ve asked, you know, like, Bart, don&apos;t go try and tell my story. I&apos;ll tell my story, you know, about my reporting. I don&apos;t need reporters reporting on my reporting. So maybe that stuff contributed to different timelines. But that seems now &apos;-- I&apos;m not quite sure, what makes the most sense. Because I don&apos;t want to tell the whole story now, I don&apos;t think it&apos;s the right time. And I want to tell it in my own words. I&apos;m a storyteller. I&apos;ll tell it when I&apos;m ready to tell it, in detail." />
                      <outline text="But it makes sense to go on the record to explain why I was attached to both of those stories." />
                      <outline text="So you ended up getting in touch with Bart and Glenn because you wanted their help to vet the claims in documents?" />
                      <outline text="There weren&apos;t documents yet &apos;... I wanted to know if this correspondent &apos;-- it was possible something else would be entrapment or just crazy, that&apos;s always an option. I had an instinct that it was legit. I wanted to talk to people who knew." />
                      <outline text="So then they said, my paper would be happy to publish it?" />
                      <outline text="No, it was just colleagues saying, this was happening, what do you think. There was nothing to &apos;-- it was just somebody wanting to start a conversation and claiming to have information &apos;... There was no material at that point." />
                      <outline text="So how did it then become two separate stories in the Washington Post and the Guardian?" />
                      <outline text="The source also has a relationship with Glenn. Which I can&apos;t speak to." />
                      <outline text="I know that Glenn said he had more stories to come. Do you have more footage you&apos;re planning on using in your documentary?" />
                      <outline text="Of course. I&apos;m here working." />
                      <outline text="Are you still in touch with him?" />
                      <outline text="I&apos;m not going to comment on that." />
                      <outline text="Do you know where he is?" />
                      <outline text="Not going to comment." />
                      <outline text="Are you going to be working on more stories in print before your documentary comes out?" />
                      <outline text="I really can&apos;t predict." />
                      <outline text="Are you going to be sticking around Hong Kong for awhile or do you think you&apos;ll come to the U.S.?" />
                      <outline text="I haven&apos;t decided. I&apos;m trying to figure that out right now. But I&apos;m actually based right now outside the U.S." />
                      <outline text="Are you worried about retaliation in any investigation that goes forward?" />
                      <outline text="You know what? I&apos;m not. I&apos;ve been harassed for a long time, I wouldn&apos;t be surprised if that continues. Being here and seeing the kind of &apos;-- actually, Glenn was really inspiring. Really incredible courage in journalism and just saying, we need to talk to him about these things. It&apos;s not OK that we have a secret court that has secret interpretations of secret laws; what kind of democracy is that? I felt like, this is a fight worth having. If there&apos;s fallout, if there&apos;s blowback, I would absolutely do it again, because I think this information should be public. Whatever part I had in helping to do that I think is a service." />
                      <outline text="People take risks. And I&apos;m not the one who&apos;s taking the most in this case." />
                      <outline text="And you feel like the person who is taking the most risk &apos;-- meaning Snowden &apos;-- is aware of all the possible ramifications of it?" />
                      <outline text="You can see it in the video, right? I think he is. I think he wanted to reveal his identity because he didn&apos;t want to create a situation where he was anonymous and everyone would have been investigated. In these investigation cases, there are repercussions for many, many people. I think he wanted to take responsibility." />
                      <outline text="Did he always plan to reveal his identity?" />
                      <outline text="I don&apos;t know. At some point I became aware of that but I don&apos;t know what his intention was." />
                      <outline text="It&apos;s this complicated situation because we have a source who decided to reveal himself. I still feel like I have journalistic obligations to the source even though they&apos;ve made that choice &apos;... There&apos;s something that Glenn said that I actually want to contradict. He said we began &apos;&apos;working with&apos;&apos; him. There was no working with. We were contacted. It was totally cold contact." />
                      <outline text="Since he contacted you before he started working at Booz Allen, the implication people were drawing was that he went to Booz Allen with the express intention of leaking this." />
                      <outline text="That&apos;s completely absurd. I had no dialogue about what the information was &apos;-- there were claims, that&apos;s all I received." />
                      <outline text="So the implication that you sent him into Booz Allen to spy was incorrect." />
                      <outline text="Are you kidding? I didn&apos;t know where he worked, I didn&apos;t know he was NSA, I didn&apos;t know how &apos;-- nothing. There was no like, Oh do you think you &apos;..., no nudging. It&apos;s like the crazy correlations that the NSA does. There&apos;s no connection here. We were contacted, we didn&apos;t know what he was up to, and at some point he came forward with documents." />
              </outline>

              <outline text="GuideStar Exchange Reports for Foundation for National Progress">
                      <outline text="Link to Article" type="link" url="http://www.guidestar.org/organizations/94-2282759/foundation-national-progress.aspx" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373511790_4V5aqJvS.html" />
      <outline text="Thu, 11 Jul 2013 03:03" />
                      <outline text="" />
                      <outline text="Basic Organization InformationFoundation for National Progress" />
                      <outline text="Also Known As:FNP, MoJo, MJ, Mother JonesPhysical Address:San Francisco, CA 94108 EIN:94-2282759Web URL:www.motherjones.com NTEE Category:A Arts, Culture, and Humanities A30 Media, Communications Organizations A Arts, Culture, and Humanities A33 Printing, Publishing A Arts, Culture, and Humanities A99 Other Art, Culture, Humanities Organizations/Services N.E.C. Year Founded:1976 Ruling Year:1975 Sign in or create an account to see this organization&apos;s full address, contact information, and more!" />
                      <outline text="Mission StatementFor over thirty years, the mission of the Foundation for National Progress has been to produce revelatory journalism that in its power and reach seeks to inform and inspire a more just and democratic world. We measure the effectiveness of our public-interest reporting in three ways: 1. The size and nature of audience; 2. The influence of our stories on the larger commercial media industry; and 3. The impact of our reporting when used by people working for progressive change)." />
                      <outline text="Expert AssessmentThere are no Expert Reviews for this organization. Learn more about TakeAction@GuideStar.Impact Summary from the NonprofitThis organization has not provided an impact summary." />
                      <outline text="Personal Reviews" />
                      <outline text="Financial Health Dashboard: Highlights key financial trends and ratios for a selected nonprofit organization over a period of up to five years.Peer Comparison Dashboard: Compares the organization&apos;s financials with up to five peer nonprofits that you select.Graphical Analysis: Provides multi-year graphs and an interpretive guide in a format ready to present to your clients.Printable PDF Report: Provides a complete analysis of the organization for your records. The full report tells you what to look for and why it matters.Advanced Search: Allows you to search by EIN (Employer Identification Number), organization name, city, state, revenue, expenses, and assets.LeadershipMs. Madeleine Buckingham" />
                      <outline text="Term:" />
                      <outline text="Since Feb 2002" />
                      <outline text="Profile:" />
                      <outline text="Buckingham became president and CEO in February 2010. Prior to this she held the position of COO/CFO; she joined Mother Jones in 2002. She has spent more than 20 years in senior finance and management positions in the publishing and high-tech industries working for a range of publishing companies and Internet startups, including Sony Corp.&apos;s Internet incubator and at International Data Group." />
                      <outline text="Highest Paid Employees &amp; Their CompensationHighest Paid Employee Data for 2011, 2010, 2009, 2008, 2007 are included in the GuideStar Premium Report. Upgrade NowReport Added To Cart" />
                      <outline text="Program: Program OverviewBudget:$8,384,399Category:Population Served:General Public/UnspecifiedProgram Description:" />
                      <outline text="The Foundation for National Progress supports the following four programs: Mother Jones magazine: Published six times per year, Mother Jones magazine offers in-depth investigative reports, news analysis, essays, and images on the most important social and political issues of our time. The print magazine currently has a paid circulation of approximately 225,000 readers and subscribers. With a long history of independent, uncompromising journalism, people have come to trust and rely on the information they garner from the pages of Mother Jones magazine. MotherJones.com: In 1993, Mother Jones became the first general interest magazine on the internet. From its inception, MotherJones.com has broadened the reach and impact of Mother Jones magazine through its blend of original content and ability to provide readers with information beyond the scope of a print publication, including timely news analysis, interactive multi-media projects, enhanced in-print investigative pieces, and in-depth reports. Over the past year, traffic to MotherJones.com has more than doubled too nearly 875,000 unique visitors each month. in addition, weekly newsletters are sent out to over 50,000 subscribers informing a broad spectrum of people about the most important issues of the day, and the ways in which they can get involved and create change. The Ben Bagdikian Fellowship Program: Named after a long-time investigative reporter and journalism educator, The Ben Bagdikian Fellowship Program is one of the few independent programs in the nation through which aspiring journalists can get in-the-field experience in critical investigative reporting skills, and nurture the social and professional networks that will enable them to break into reporting. Each year, three cycles of four interns join the staff. Since the program&apos;s inception in 1980, more than 800 interns have passed through Mother Jones. More than six out of ten of our former interns are currently working as journalists or in another media related profession. In addition, the program provides invaluable experience to young people seeking to gain hands-on experience in nonprofit administration, with intern and fellowships in departments throughout the Foundation, including summer placements for high school students. The Media Consortium: The Foundation for National Progress is the sponsor for The Media Consortium, a network of more than 40 leading progressive independent journalism organizations. The Consortium?s goals are to create smart, powerful, and passionate journalism that changes the terms of the American political and cultural debate, to redefine ?independent progressive media? so that it reaches and serves the audience of the 21st century, to create a cooperative infrastructure that supports a sustainable future for progressive journalism, and to help get the message out to millions of Americans looking for honest, fair, and accurate journalism." />
                      <outline text="Program Long-Term Success:" />
                      <outline text="In 2007, Mother Jones bucked the trend of dramatic newsroom cutbacks by opening the first major Washington news bureau set up by a U.S. media organization in years. The eight person bureau, headed by veteran Washington journalist David Corn, is made up of experienced full-time staff reporters and editors. The bureau is also paired with dedicated staff reporters in our San Francisco office, to create the Mother Jones Investigative Team. With these top-notch staff reporters, and an extensive network of some of the best freelance journalists in the world, the I-Team gives Mother Jones the flexibility, concentration of resources, and fast response capacity that simply would not be otherwise possible." />
                      <outline text="Program Short-Term Success:" />
                      <outline text="Program Success Monitored by:" />
                      <outline text="Program Success Examples:" />
                      <outline text="Contractor data is available for this organization!" />
                      <outline text="Independent Contractor information for 2011, 2010, 2009, 2008, 2007 is available for this organization with a subscription to GuideStar Premium Pro." />
                      <outline text="GuideStar Premium Pro also includes:" />
                      <outline text="Comprehensive financial data, including functional expense detail, for every digitized fiscal year in GuideStar&apos;s databaseAbility to download up to 55 fields of data for up to 1,000 organizations at a time and up to five years&apos; worth of Income Statement and Balance Sheet data for individual organizationsComprehensive advanced search capabilities, including criteria for functional expenses, investible assets, investment income and audit &amp; 990T filing requirementsAbility to save organizations and searches for quick referencePeople search with salary range dataAccess to all available Forms 990More information" />
                      <outline text="Upgrade Now!" />
                      <outline text="Evidence of ImpactExpert Comments" />
                      <outline text="There are no comments available for this organization." />
                      <outline text="Organizational StrengthsExpert Comments" />
                      <outline text="There are no comments available for this organization." />
                      <outline text="Areas for ImprovementExpert Comments" />
                      <outline text="There are no comments available for this organization." />
              </outline>

              <outline text="Freedom of the Press Foundation takes 8% from each donation for operational costs.">
                      <outline text="Link to Article" type="link" url="https://pressfreedomfoundation.org/about" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373511599_4gE6m6Ga.html" />
      <outline text="Thu, 11 Jul 2013 02:59" />
                      <outline text="" />
                      <outline text="&apos;&apos;A cantankerous press, an obstinate press, a ubiquitous press must be suffered by those in authority in order to preserve the even greater values of freedom of expression and the right of the people to know.&apos;&apos;" />
                      <outline text="&apos;--Judge Murray Gurfein, Pentagon Papers case, June 17, 1971" />
                      <outline text="Our MissionThe Freedom of the Press Foundation is dedicated to helping defend and support aggressive, public-interest journalism focused on exposing mismanagement, corruption, and law-breaking in government. We accept tax-deductible donations to a variety of journalism organizations that push for government transparency and accountability." />
                      <outline text="The Freedom of the Press Foundation is built on the recognition that this kind of transparency journalism &apos;-- from publishing the Pentagon Papers and exposing Watergate, to uncovering the NSA&apos;s warrantless wiretapping program and CIA secret prisons &apos;-- doesn&apos;t just happen. It requires dogged work by journalists, and often, the courage of whistleblowers and others who work to ensure that the public actually learns what it has a right to know." />
                      <outline text="But in a changing economic and technological age, media organizations are increasingly susceptible to corporate or government pressure. This can lead to watered-down or compromised coverage, or worse: censorship." />
                      <outline text="Increasingly, non-profit media and transparency organizations are emerging as a critical component of the journalism landscape. Leveraging the power of the Internet, these organizations are helping to reinvent and reimagine independent watchdog reporting." />
                      <outline text="Right now, too many of those organizations are struggling for funding, relying on a few large foundations or competing for donors. Our goal is to broaden the financial base of these types of institutions&apos;--both start-ups and established non-profit organizations &apos;-- by crowd-sourcing funding and making it easy for people to support the best journalism from an array of organizations all in one place." />
                      <outline text="Using the same networked, collaborative approach, the Freedom of the Press Foundation will also provide support for organizations and individuals that have been unjustly censored or cut off from funding for doing their job as journalists. Given the variety of corporate and government pressures on journalism outlets around the world, the need has never been greater." />
                      <outline text="How It Works:The process is simple. On our website, you can donate to as many as four journalism and transparency organizations at once. We&apos;ll feature a &apos;&apos;bundle&apos;&apos; of four organizations and provide a bit of background on each. Every two months we will release a new bundle of deserving organizations or individuals. Once you enter the total amount you wish to donate, you can use the sliders to determine the percentage you want each entity to get." />
                      <outline text="You can also donate directly to the Freedom of the Press Foundation to help further our mission. Twice a year, we will distribute a grant to projects our Board of Directors has vetted and selected." />
                      <outline text="Freedom of the Press Foundation takes 8% from each donation for operational costs." />
                      <outline text="Criteria for choosing organizations:Record of engaging in transparency journalism or supporting it in a material way, including support for whistleblowers.Public interest agenda.Organizations or individuals under attack for engaging in transparency journalism.Need for support. The foundation&apos;s goal is to prioritize support for organizations and individuals who are in need of funding or who face obstacles to gaining support on their own.You can go here to see a description of the organizations we are currently crowd-funding donations for." />
              </outline>

              <outline text="Board of Directors &amp; Staff | Freedom of the Press Foundation">
                      <outline text="Link to Article" type="link" url="https://pressfreedomfoundation.org/about/staff" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373511535_W2w3P5dn.html" />
      <outline text="Thu, 11 Jul 2013 02:58" />
                      <outline text="" />
                      <outline text="Daniel Ellsberg" />
                      <outline text="Daniel Ellsberg is a co-founder of the Freedom of the Press Foundation. He is best known as the whistleblower who gave the Pentagon Papers to the New York Times in 1971. Ellsberg is also the author of three books: Papers on the War (1971), Secrets: A Memoir of Vietnam and the Pentagon Papers (2002), and Risk, Ambiguity and Decision (2001). In December 2006, he won the Right Livelihood Award, known as the &apos;&apos;Alternative Nobel Prize,&apos;&apos; in Stockholm, Sweden, &apos;&apos;for putting peace and truth first, at considerable personal risk, and dedicating his life to inspiring others to follow his example.&apos;&apos;" />
                      <outline text="Glenn Greenwald" />
                      <outline text="Glenn Greenwald is a lawyer, journalist, blogger, and author. He worked as a constitutional and civil rights litigator before becoming a contributor to Salon, and now writes for The Guardian about civil liberties issues. He is the author of three New York Times bestselling books, including his latest, With Liberty and Justice for Some. Greenwald was named by The Atlantic as one of the 25 most influential political commentators in the nation. He was the recipient of the first annual I.F. Stone Award for Independent Journalism, and won the 2010 Online Journalism Association Award for his investigative work on the arrest and oppressive detention of Bradley Manning." />
                      <outline text="John Cusack" />
                      <outline text="John Cusack is an actor, director, producer, and screenwriter who has appeared in over 60 films. He&apos;s also a political activist and regularly speaks out and writes on issues of human rights, government transparency, and accountability&apos;--amongst other things." />
                      <outline text="John Perry Barlow" />
                      <outline text="John Perry Barlow is co-founder of the Freedom of the Press Foundation. He is also a retired Wyoming rancher (and native), a former lyricist for the Grateful Dead, and the co-founder and board member of the Electronic Frontier Foundation, a civil liberties organization which has been protecting the free flow of information on the Internet since 1990. He was a founding Fellow at Harvard Law School&apos;s Berkman Center for Internet and Society. He has been writing about Cyberspace since 1988 and was first to apply that name to the global social space it presently describes. Barlow&apos;s piece on the future of copyright, &apos;&apos;The Economy of Ideas,&apos;&apos; is taught in many law schools, and his &apos;&apos;Declaration of the Independence of Cyberspace&apos;&apos; is posted on thousands of websites. Recently, The Guardian named him one of the twenty most influential champions of the Open Internet. He is presently engaged in starting a company, Algae Systems, that aspires to turn sewage into carbon negative jet fuel. He is the father of three daughters and his primary aspiration is to be a good ancestor. He dreams of a world where all general useful knowledge can be available to anyone, of any station, merely for the price of curiosity." />
                      <outline text="Josh Stearns" />
                      <outline text="Josh Stearns is a journalist and organizer working for press freedom and the future of news through media and tech policy. As the Journalism and Public Media Campaign Director at Free Press, Stearns runs national advocacy campaigns to amplify the voice of local people in the policy debates that shape our media. Since 2011 he has been tracking journalist arrests and press suppression across the US, an effort the earned him &apos;&apos;Storify of the Year&apos;&apos; and the Lew Hill Media Ally Award for his use of cutting-edge technology and First Amendment advocacy. His articles have appeared in Mother Jones, Orion Magazine, Yes Magazine and the Columbia Journalism Review." />
                      <outline text="Laura Poitras" />
                      <outline text="Laura Poitras is a documentary filmmaker. Her 2003 film Flag Wars won a Peabody Award. Her 2006 film My Country, My Country was nominated for an Academy Award. Her 2010 film The Oath was nominated for an Emmy Award for outstanding investigative journalism. She is currently working on a documentary about state surveillance, WikiLeaks, Internet freedom, and whistleblowers. She is the recipient of a 2012 MacArthur Fellowship. Her work was included in the 2012 Whitney Biennial." />
                      <outline text="She has been detained and interrogated about her work at the U.S. border over 40 times." />
                      <outline text="Rainey Reitman" />
                      <outline text="Rainey Reitman is a co-founder and chief operating officer of Freedom of the Press Foundation. She&apos;s also a founder and steering committee member for the Bradley Manning Support Network, a network of individuals and organizations advocating for the release of accused WikiLeaks whistleblower Pfc. Bradley Manning. She serves on the board of the directors for the Bill of Rights Defense Committee, a nonprofit whose mission is to organize and support an effective, national grassroots movement to restore civil liberties, and on the steering committee for the Internet Defense League, which organizes Internet users to combat imminent threats to online rights. Reitman is also Activism Director at the Electronic Frontier Foundation." />
                      <outline text="Trevor Timm" />
                      <outline text="Trevor Timm is a co-founder and the executive director of the Freedom of the Press Foundation. He is a writer, activist, and lawyer who specializes in free speech and government transparency issues. He has contributed to The Atlantic, Al Jazeera, Foreign Policy, The Guardian, Harvard Law and Policy Review and PBS MediaShift. He currently works as an activist at the Electronic Frontier Foundation. Previously, Timm helped the longtime General Counsel of The New York Times, James Goodale, write a book on the First Amendment." />
                      <outline text="Xeni Jardin" />
                      <outline text="Xeni Jardin is a founding partner and co-editor of award winning blog Boing Boing. Executive Producer and host of Webby-honored &quot;Boing Boing Video,&quot; online and in-flight on Virgin America. Has contributed to such diverse venues as NPR, Wired, New York Times, Los Angeles Times, The Guardian, and a frequently-sought tech expert in broadcast news." />
              </outline>

              <outline text="Freedom of the Press Foundation - Wikipedia, the free encyclopedia">
                      <outline text="Link to Article" type="link" url="http://en.wikipedia.org/wiki/Freedom_of_the_Press_Foundation" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373511247_SDBeNsr6.html" />
      <outline text="Thu, 11 Jul 2013 02:54" />
                      <outline text="" />
                      <outline text="The Freedom of the Press Foundation is a non-profit organization founded in 2012 to fund and support free speech and freedom of the press. The organization is headed by both mainstream and alternative journalists such as Daniel Ellsberg and Xeni Jardin as well as activists, celebrities, and filmmakers." />
                      <outline text="The mission is to help &quot;promote and fund aggressive, public-interest journalism focused on exposing mismanagement, corruption, and law-breaking in government&quot;,[2] and it offers a way to crowd-source funding for WikiLeaks and independent journalistic organizations.[3] Supported organizations includes WikiLeaks, MuckRock News, the National Security Archive, The UpTake, The Bureau of Investigative Journalism, the Center for Public Integrity and Truthout.[4]" />
                      <outline text="The Freedom of the Press Foundations selects organizations and individuals to support based on four criteria: 1. Record of engaging in transparency journalism or supporting it in a material way, including support for whistleblowers; 2. Public interest agenda; 3. Organizations or individuals under attack for engaging in transparency journalism; and 4. Need for support. The foundation&apos;s goal is to prioritize support for organizations and individuals who are in need of funding or who face obstacles to gaining support on their own." />
                      <outline text="In May 2013, The Freedom of the Press Foundation began crowd-funding donations to hire a professional court stenographer to take transcripts during the trial of Pfc. Bradley Manning, after the government refused to make its transcripts available to the public." />
                      <outline text="See also[edit]References[edit]External links[edit]" />
              </outline>

              <outline text="He Was Taller Than I Expected And Spoke With A Heavy Russian Accent Which He NEVER Had Before">
                      <outline text="Link to Article" type="link" url="http://www.youtube.com/watch?v=hjoz1nqQ1iE&amp;feature=youtube_gdata" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373509967_DxXzP82v.html" />
        <outline text="Source: Uploads by MOXNEWSd0tC0M" type="link" url="http://gdata.youtube.com/feeds/base/users/MOXNEWSd0tC0M/uploads?alt=rss&amp;v=2&amp;orderby=published&amp;client=ytapi-youtube-profile" />
      <outline text="Thu, 11 Jul 2013 02:32" />
                      <outline text="" />
              </outline>

              <outline text="Tired of helping the CIA? Quit Facebook, Venezuela minister urges | Reuters">
                      <outline text="Link to Article" type="link" url="http://www.reuters.com/article/2013/07/11/us-usa-security-venezuela-facebook-idUSBRE96A01120130711?feedType=RSS&amp;feedName=technologyNews" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373509943_tFcHxHtd.html" />
      <outline text="Thu, 11 Jul 2013 02:32" />
                      <outline text="" />
                      <outline text="TweetShare thisEmailPrintA man uses an iPad with a Facebook app in this photo illustration in Sofia January 30, 2013." />
                      <outline text="Credit: Reuters/Stoyan Nenov" />
                      <outline text="CARACAS | Wed Jul 10, 2013 8:30pm EDT" />
                      <outline text="CARACAS (Reuters) - A Venezuelan government minister on Wednesday urged citizens to shut Facebook accounts to avoid being unwitting informants for the U.S. Central Intelligence Agency, referring to recent revelations about U.S. surveillance programs." />
                      <outline text="Edward Snowden, a former U.S. National Security Agency contractor who is stuck in a Moscow airport while seeking to avoid capture by the United States, last month leaked details about American intelligence agencies obtaining information from popular websites including Facebook." />
                      <outline text="&quot;Comrades: cancel your Facebook accounts, you&apos;ve been working for free as CIA informants. Review the Snowden case!&quot; wrote Prisons Minister Iris Varela on her Twitter account." />
                      <outline text="Venezuela has offered to provide asylum for Snowden, but he has not responded and appears unable to leave the transit zone of Sheremetyevo International Airport." />
                      <outline text="He exposed a program known as Prism that relied on customer data supplied by major technology companies." />
                      <outline text="&quot;Countries and people that have fallen victim to gringo spying should sue the United States to ensure fair compensation. We&apos;re going to bankrupt the U.S. economy!&quot; wrote Varela, known for radical rhetoric and ardent support of the late socialist leader Hugo Chavez." />
                      <outline text="(Reporting by Diego Ore; Editing by Will Dunham)" />
                      <outline text="Tweet thisLink thisShare thisDigg thisEmailReprintsComments (1)" />
                      <outline text="What a jerkwad. South America needs leaders that are at least somewhat mature." />
              </outline>

              <outline text="U.S. arms showing up in hands of pro-Assad militias">
                      <outline text="Link to Article" type="link" url="http://www.usatoday.com/story/news/world/2013/07/10/us-weapons-syria-shiites/2503953/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373509740_zTutf3MX.html" />
      <outline text="Thu, 11 Jul 2013 02:29" />
                      <outline text="" />
                      <outline text="M-16 rifles have been spotted with Shiite militias fighting in Syria.(Photo: Garrett Hubbard for USA TODAY)" />
                      <outline text="Story HighlightsEasy flow of weapons is a reason why some U.S. officials oppose sending arms to SyriaIran likes to show it has obtained weapons, analysts sayWeapons include rifles, carbines and grenade launchersU.S. and Western weapons have been reaching Iranian-backed Shiite militias fighting to keep Bashar Assad&apos;s forces in power in Syria." />
                      <outline text="Analysts say it&apos;s unclear if the weapons were captured, stolen or bought on the black market in Syria, Turkey, Iraq or Libya. Propaganda photographs from Shiite militias posted on dozens of websites and Facebook pages show the weapons were acquired in new condition, said Phillip Smyth, an analyst for Jihadology.net, a site affiliated with the Washington Institute for Near East Policy." />
                      <outline text="Many of the weapons are things the militias &quot;shouldn&apos;t really have their hands on,&quot; Smyth said. Iranians love to show &quot;they have weapons and systems that are very close to the Americans.&quot;" />
                      <outline text="The ability of Assad&apos;s allies to obtain U.S. weapons is one of many reasons the United States should not supply Syrian rebels with weapons, which President Obama said he would start to do last month, said Rep. Ileana Ros-Lehtinen, R-Fla., former chairwoman of the House Foreign Affairs Committee." />
                      <outline text="Syria is &quot;already overflowing&quot; with weapons being supplied to the Assad regime and to the rebels &quot;that could one day be turned against the U.S.,&quot; Ros-Lehtinen said." />
                      <outline text="It&apos;s &quot;extremely difficult&quot; to distinguish between friend and foe in Syria, she said, and &quot;no amount of safeguards can guarantee that weapons will not fall into the wrong hands.&quot;" />
                      <outline text="State Department spokeswoman Jen Psaki said the administration has taken steps &quot;to do everything possible to ensure that any aid is making its way into the right hands&quot; in Syria. That is why the United States and its partners have agreed to direct military aid through the secular-leaning, anti-Assad Free Syrian Army&apos;s Supreme Military Council and its chief, Gen. Salim Idris." />
                      <outline text="Many of the U.S. weapons in the hands of pro-Assad militia could have reached the black market after a major U.S. sales to Iraq in 2009, said Christopher Harmer, a senior analyst at the Institute for the Study of War. Almost 10 years of fighting there left thousands of loose weapons floating around Iraq and available for sale on the black market." />
                      <outline text="The U.S. sale included 80,000 M-16s, 25,000 M-4s and 2,550 M-203 grenade launchers, according to an announcement Dec. 9, 2009, by the Defense Security Cooperation Agency." />
                      <outline text="U.S. arms are transferred to foreign militaries only under strict controls that prohibit transfers to third parties without State Department approval, said Neil Hedlund, a spokesman for the U.S. Defense Security Cooperation Agency, which administers U.S. assistance to foreign militaries." />
                      <outline text="Nevertheless, U.S. weapons have often been diverted to militant groups across the Middle East, said Nic Jenzen-Jones, an independent arms specialist based in Perth, Australia. He noticed U.S. weapons in images from the Syrian battlefield since last year, primarily in the hands of Syrian rebel forces." />
                      <outline text="&quot;The most likely source is Lebanon,&quot; where the United States has supplied the Lebanese military and Israeli soldiers armed with American rifles fought as recently as 2006, he said. &quot;Weapons are not fragile, they last for quite some time and will keep on killing as long as there&apos;s ammunition and people to fire them.&quot;" />
                      <outline text="Smyth points to photos on social media sites linked to the Iranian military showing &quot;martyred&quot; Shiite fighters toting U.S.-made M-16s and M-4s fitted with laser and holographic sights and M-203 grenade launchers." />
                      <outline text="Based on more than 30 online forums and 100 Facebook pages, Smyth has found images of U.S. and Belgian weapons in the hands of members of various Iran-backed militias. Liwa&apos;a abu Fadl al-Abbas uses Iraqi, Lebanese and Afghan fighters. Liwa&apos;a Zulfiqar uses Iraqi fighters who prefer working with Iraqi and Shiite commanders, under the leadership of Iranian Revolutionary Guard Corps rather than Syrian leadership, Smyth said." />
                      <outline text="Similar weapons appear in the hands of rebel fighters, including fighters with al-Nusra Front, an al-Qaeda affiliate the State Department has designated a terrorist group, in videos and photos from the civil war. This year, Eliot Higgins, a British military analyst, discovered video footage and photos posted to jihadi social media sites showing that al-Nusra had weapons purchased with Saudi money in Croatia and transferred to Syrian rebels through Jordan." />
                      <outline text="&quot;This operation was run with full U.S. knowledge, and the arms were only meant to go to the FSA,&quot; Higgins said, referring to the secular-leaning Free Syrian Army that U.S. officials prefer to deal with. &quot;After a couple of months, they began to appear in the hands of groups like Ahrar al-Sham and Jabhat al-Nusra, showing they had spread beyond the FSA.&quot;" />
                      <outline text="Harmer said there&apos;s a propaganda aspect to everything Iran does, and the images probably have a dual purpose, for both domestic and Western consumption." />
                      <outline text="&quot;They&apos;re heavily involved through state-owned media and attempting to influence Shiite groups throughout the Middle East,&quot; Harmer said. &quot;It&apos;s absolutely plausible Iran is purposely highlighting U.S. weapons in their hands.&quot;" />
                      <outline text="Their goal is to show the world that Iranian-backed Shiite militiamen have a much higher degree of training and professionalism, and they&apos;re using Western tools to keep Assad in power, Smyth said." />
                      <outline text="Many of the most recent martyrdom photos resulted from fighting in Qusair, a strategic town on the border with Lebanon that regime forces retook after a three-week battle joined by fighters from Hezbollah, the Iranian-backed Lebanese Shiite militia." />
                      <outline text="One of the photos shows Jusoor Muhammed Isma&apos;il, a Lebanese Hezbollah fighter, whose death was announced May 24. In the photo, Isma&apos;il stands in a clearing in the woods by a rudimentary camp stove. Slung from his shoulders is an M-4 fitted with what looks like an EOTech targeting sight and an M-203 grenade launcher." />
                      <outline text="EOTech is an American company that sells holographic accessories to the military and civilians that help shooters aim in a hurry. Pentagon contract documents show the company sold $25 million worth of its sites to the U.S. Special Operations Command in May 2010." />
                      <outline text="In other images, Shiite militia fighters wear camouflage fatigues and tactical gear, including body armor, kneepads, gloves and elbow pads, much like U.S. troops wore to battle in Iraq. In one post, Hezbollah fighters gloated about using netting on their helmets to aid in camouflage, like Israeli forces do. &quot;We&apos;re fighting the Zionists with their own tools,&quot; the author wrote." />
              </outline>

              <outline text="Jacob Applebaum-Interview with Whistleblower Edward Snowden on Global Spying - SPIEGEL ONLINE">
                      <outline text="Link to Article" type="link" url="http://www.spiegel.de/international/world/interview-with-whistleblower-edward-snowden-on-global-spying-a-910006.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373508721_2efFMmCV.html" />
      <outline text="Thu, 11 Jul 2013 02:12" />
                      <outline text="" />
                      <outline text="Shortly before he became a household name around the world as a whistleblower, Edward Snowden answered a comprehensive list of questions. They originated from Jacob Appelbaum, 30, a developer of encryption and security software. Appelbaum provides training to international human rights groups and journalists on how to use the Internet anonymously." />
                      <outline text="Appelbaum first became more broadly known to the public after he spoke on behalf of WikiLeaks founder Julian Assange at a hacker conference in New York in 2010. Together with Assange and other co-authors, Appelbaum recently released a compilation of interviews in book form under the title &quot;Cypherpunks: Freedom and the Future of the Internet.&quot;" />
                      <outline text="Appelbaum wound up on the radar of American authorities in the course of their investigation into the WikiLeaks revelations. They have since served legal orders to Twitter, Google and Sonic to hand over information about his accounts. But Appelbaum describes his relationship with WikiLeaks as being &quot;ambiguous,&quot; and explains here how he was able to pose questions to Snowden." />
                      <outline text="&quot;In mid-May, documentary filmmaker Laura Poitras contacted me,&quot; Appelbaum said. &quot;She told me she was in contact with a possible anonymous National Security Agency (NSA) source who had agreed to be interviewed by her.&quot;" />
                      <outline text="&quot;She was in the process of putting questions together and thought that asking some specific technical questions was an important part of the source verification process. One of the goals was to determine whether we were really dealing with an NSA whistleblower. I had deep concerns of COINTELPRO-style entrapment. We sent our securely encrypted questions to our source. I had no knowledge of Edward Snowden&apos;s identity before he was revealed to the world in Hong Kong. He also didn&apos;t know who I was. I expected that when the anonymity was removed, we would find a man in his sixties.&quot;" />
                      <outline text="&quot;The following questions are excerpted from a larger interview that covered numerous topics, many of which are highly technical in nature. Some of the questions have been reordered to provide the required context. The questions focus almost entirely on the NSA&apos;s capabilities and activities. It is critical to understand that these questions were not asked in a context that is reactive to this week&apos;s or even this month&apos;s events. They were asked in a relatively quiet period, when Snowden was likely enjoying his last moments in a Hawaiian paradise -- a paradise he abandoned so that every person on the planet might come to understand the current situation as he does.&quot;&quot;At a later point, I also had direct contact with Edward Snowden in which I revealed my own identity. At that time, he expressed his willingness to have his feelings and observations on these topics published when I thought the time was right.&quot;" />
                      <outline text="Editor&apos;s note: The following excerpts are taken from the original English-language version of the interview. Potential differences in language between the German and English versions can be explained by the fact that we have largely preserved the technical terms used by Snowden in this transcript. Explanations for some of the terminology used by Snowden as well as editor&apos;s notes are provided in the form of footnotes.Interviewer: What is the mission of America&apos;s National Security Agency (NSA) -- and how is the job it does compatible with the rule of law?" />
                      <outline text="Snowden: They&apos;re tasked to know everything of importance that happens outside of the United States. That&apos;s a significant challenge. When it is made to appear as though not knowing everything about everyone is an existential crisis, then you feel that bending the rules is okay. Once people hate you for bending those rules, breaking them becomes a matter of survival." />
                      <outline text="Interviewer: Are German authorities or German politicians involved in the NSA surveillance system?" />
                      <outline text="Snowden: Yes, of course. We&apos;re1 in bed together with the Germans the same as with most other Western countries. For example, we2 tip them off when someone we want is flying through their airports (that we for example, have learned from the cell phone of a suspected hacker&apos;s girlfriend in a totally unrelated third country -- and they hand them over to us. They3 don&apos;t ask to justify how we know something, and vice versa, to insulate their political leaders from the backlash of knowing how grievously they&apos;re violating global privacy." />
                      <outline text="Interviewer: But if details about this system are now exposed, who will be charged?" />
                      <outline text="Snowden: In front of US courts? I&apos;m not sure if you&apos;re serious. An investigation found the specific people who authorized the warrantless wiretapping of millions and millions of communications, which per count would have resulted in the longest sentences in world history, and our highest official simply demanded the investigation be halted. Who &quot;can&quot; be brought up on charges is immaterial when the rule of law is not respected. Laws are meant for you, not for them." />
                      <outline text="Interviewer: Does the NSA partner with other nations, like Israel?" />
                      <outline text="Snowden: Yes. All the time. The NSA has a massive body responsible for this: FAD, the Foreign Affairs Directorate." />
                      <outline text="Interviewer: Did the NSA help to create Stuxnet? (Stuxnet is the computer worm that was deployed against the Iranian nuclear program.)" />
                      <outline text="Snowden: NSA and Israel co-wrote it." />
                      <outline text="Interviewer: What are some of the big surveillance programs that are active today and how do international partners aid the NSA?" />
                      <outline text="Snowden: In some cases, the so-called Five Eye Partners4 go beyond what NSA itself does. For instance, the UK&apos;s General Communications Headquarters (GCHQ) has a system called TEMPORA. TEMPORA is the signals intelligence community&apos;s first &quot;full-take&quot; Internet buffer that doesn&apos;t care about content type and pays only marginal attention to the Human Rights Act. It snarfs everything, in a rolling buffer to allow retroactive investigation without missing a single bit. Right now the buffer can hold three days of traffic, but that&apos;s being improved. Three days may not sound like much, but remember that that&apos;s not metadata. &quot;Full-take&quot; means it doesn&apos;t miss anything, and ingests the entirety of each circuit&apos;s capacity. If you send a single ICMP packet5 and it routes through the UK, we get it. If you download something and the CDN (Content Delivery Network) happens to serve from the UK, we get it. If your sick daughter&apos;s medical records get processed at a London call center &apos;... well, you get the idea." />
                      <outline text="Interviewer: Is there a way of circumventing that?" />
                      <outline text="Snowden: As a general rule, so long as you have any choice at all, you should never route through or peer with the UK under any circumstances. Their fibers are radioactive, and even the Queen&apos;s selfies to the pool boy get logged." />
                      <outline text="Interviewer: Do the NSA and its partners across the globe do full dragnet data collection for telephone calls, text and data?" />
                      <outline text="Snowden: Yes, but how much they get depends on the capabilities of the individual collection sites -- i.e., some circuits have fat pipes but tiny collection systems, so they have to be selective. This is more of a problem for overseas collection sites than domestic6 ones, which is what makes domestic collection so terrifying. NSA isn&apos;t limited by power, space and cooling PSC constraints." />
                      <outline text="(C) SPIEGEL ONLINE 2013All Rights ReservedReproduction only allowed with the permission of SPIEGELnet GmbH" />
              </outline>

              <outline text="Jacob Applebaum-Snowden confirms NSA created Stuxnet with Israeli aid &apos;-- RT News">
                      <outline text="Link to Article" type="link" url="http://rt.com/news/snowden-nsa-interview-surveillance-831/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373508563_gRtxE8tM.html" />
      <outline text="Thu, 11 Jul 2013 02:09" />
                      <outline text="" />
                      <outline text="The Stuxnet virus that decimated Iranian nuclear facilities was created by the NSA and co-written by Israel, Edward Snowden has confirmed. The whistleblower added the NSA has a web of foreign partners who pay &apos;&apos;marginal attention to human rights.&apos;&apos;" />
                      <outline text="In an interview with Jacob Applebaum published in German daily Der Spiegel on Monday, Snowden stated that the US and Israel were behind the computer worm. Stuxnet infiltrated Iranian nuclear facility networks in 2009-2010 and was used to change the speed of thousands of gas-spinning centrifuges, sabotaging nuclear research.    " />
                      <outline text="Washington and Tel Aviv were thought to have been behind the cyber-attack, however, this was never confirmed by either government. " />
                      <outline text="&apos;&apos;The NSA and Israel wrote Stuxnet together,&apos;&apos; Snowden told Applebaum in the interview that was carried out in May." />
                      <outline text="Snowden stressed that the National Security Agency (NSA) often cooperates with foreign partners through a special body known as the Foreign Affairs Directorate (FAD). Referring to Britain, Australia, New Zealand and Canada, also known as the &apos;Five Eye Partners,&apos; he said their practices often go further than those of the NSA. " />
                      <outline text="In particular he flagged the system used by the UK&apos;s General Communications Headquarters (GCHQ), TEMPORA as one of the worst offenders. " />
                      <outline text="&apos;&apos;TEMPORA is the signals intelligence community&apos;s first &apos;full-take&apos; internet buffer that doesn&apos;t care about content type and pays only marginal attention to the Human Rights Act,&apos;&apos; said Snowden. " />
                      <outline text="The UK buffer is able to hold a vast quantity of internet data for up to three days, said the whistleblower. " />
                      <outline text="&apos;&apos;You should never send information over British lines or British servers. Even the Queen&apos;s &apos;selfies&apos; with her lifeguards would be recorded, if they existed.&apos;&apos;" />
                      <outline text="While Snowden conceded that monitoring abroad had its limits and the NSA has to prioritize the information it collects, he stressed that monitoring on its own territory was &apos;&apos;practically limitless.&apos;&apos;" />
                      <outline text="Private enterprise is also involved in the NSA&apos;s mass collating of internet data, but proving their complicity is very difficult. " />
                      <outline text="&apos;&apos;The names of the cooperating telecom companies are the crown jewels of the NSA... Generally you can say that multinationals with headquarters in the USA should not be trusted until they prove otherwise,&apos;&apos; Snowden pointed out. " />
                      <outline text="When asked about how one could avoid falling into the traps of NSA surveillance, Snowden said anyone who had been targeted &apos;&apos;was just owned.&apos;&apos; The analyst charged with following an individual receives a report every day, meaning the &apos;&apos;target&apos;s machine doesn&apos;t belong to them anymore, it belongs to the US government.&apos;&apos;" />
                      <outline text="Snowden&apos;s interviewer, 30-year-old Jacob Applebaum, has also fallen foul of US law enforcement in the past. Applebaum co-wrote a book with WikiLeaks founder Julian Assange detailing tips on how to evade cyber-surveillance while surfing the web." />
                      <outline text="The book called &apos;Cypherpunks: Freedom and the Future of the Internet&apos;, was also co-written by Jeremie Zimmermann and Andy Muller-Maguhn. Assange invited his co-authors on to the Julian Assange show, which aired on RT last year in March, to discuss cyber resistance. " />
                      <outline text="&apos;&apos;Two of them, besides myself, have been targeted by law enforcement agencies as a result of their work to safeguard privacy and to keep governments accountable. Their words, and their stories, need to be heard,&apos;&apos; Assange told the New York Times." />
                      <outline text="The members of the Cypherpunks movement shared their stories with Julian Assange whilst sitting down to discuss the problems of privacy, online communication and freedom on the internet." />
                      <outline text="US citizen Edward Snowden is believed to be eluding an extradition order to the US on charges of espionage in the transit zone of Moscow&apos;s Sheremetyevo Airport. Snowden has sent a number of applications for political asylum. Thus far Venezuela and Nicaragua have confirmed receipt of the applications, but are yet to grant asylum. However, Snowden is still unable to travel as his passport has been voided by the US authorities." />
              </outline>

              <outline text="Why Did The Obama Administration &apos;&apos;Organize And Manage&apos;&apos; Protests Against George Zimmerman? | InvestmentWatch">
                      <outline text="Link to Article" type="link" url="http://investmentwatchblog.com/why-did-the-obama-administration-organize-and-manage-protests-against-george-zimmerman/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373508491_J8etPWZz.html" />
      <outline text="Thu, 11 Jul 2013 02:08" />
                      <outline text="" />
                      <outline text="July 10th, 2013" />
                      <outline text="by Michael Snyder" />
                      <outline text=" " />
                      <outline text="Is the Obama administration at least partially responsible for turning the George Zimmerman trial into such a huge national spectacle?  Judicial Watch has obtained documents which prove that the Community Relations Service, a division of the Department of Justice, was sent to Sanford, Florida in late March 2012 &apos;&apos;to help organize and manage rallies and protests against George Zimmerman&apos;&apos;.  This included spending quite a bit of money, arranging meetings between the NAACP and local leaders, and providing police escorts for protesters.  Someone needs to ask Obama why the federal government was doing this.  A story that should have never made national headlines now threatens to unleash a firestorm of racial fury unlike anything we have seen since the Rodney King verdict.  One young man, a neighborhood watch captain, shot and killed another young man.  This kind of thing happens in American cities every single night.  George Zimmerman says that he did it in self-defense.  He should be allowed to have his day in court and that should be the end of the matter.  But instead, this thing has been hyped into a massive national spectacle and it is being used to divide us along racial lines.  And it appears that we have clear evidence that the Obama administration was involved in doing the hyping." />
                      <outline text="The documents that Judicial Watch was able to obtain contain some absolutely startling information.  Apparently the role of the Obama administration in these protests was quite substantial&apos;..." />
                      <outline text="*****" />
                      <outline text="JW filed a Freedom of Information Act (FOIA) request with the DOJ on April 24, 2012; 125 pages were received on May 30, 2012. JW administratively appealed the request on June 5, 2012, and received 222 pages more on March 6, 2013. According to the documents:" />
                      <outline text="March 25 &apos;&apos; 27, 2012, CRS spent $674.14 upon being &apos;&apos;deployed to Sanford, FL, to work marches, demonstrations, and rallies related to the shooting and death of an African-American teen by a neighborhood watch captain.&apos;&apos;March 25 &apos;&apos; 28, 2012, CRS spent $1,142.84 &apos;&apos;in Sanford, FL to work marches, demonstrations, and rallies related to the shooting and death of an African-American teen by a neighborhood watch captain.March 30 &apos;&apos; April 1, 2012, CRS spent $892.55 in Sanford, FL &apos;&apos;to provide support for protest deployment in Florida.&apos;&apos;March 30 &apos;&apos; April 1, 2012, CRS spent an additional $751.60 in Sanford, FL &apos;&apos;to provide technical assistance to the City of Sanford, event organizers, and law enforcement agencies for the march and rally on March 31.&apos;&apos;April 3 &apos;&apos; 12, 2012, CRS spent $1,307.40 in Sanford, FL &apos;&apos;to provide technical assistance, conciliation, and onsite mediation during demonstrations planned in Sanford.&apos;&apos;April 11 &apos;&apos; 12, 2012, CRS spent $552.35 in Sanford, FL &apos;&apos;to provide technical assistance for the preparation of possible marches and rallies related to the fatal shooting of a 17 year old African American male.&apos;&apos;*****" />
                      <outline text="But the involvement of the Department of Justice went far beyond just spending money and helping to organize and manage the protests." />
                      <outline text="Apparently, the Department of Justice was involved in setting up meetings between the NAACP and local officials, and the Department of Justice even arranged police escorts for protesters&apos;..." />
                      <outline text="On April 15, 2012, during the height of the protests, the Orlando Sentinel reported, &apos;&apos;They [the CRS] helped set up a meeting between the local NAACP and elected officials that led to the temporary resignation of police Chief Bill Lee according to Turner Clayton, Seminole County chapter president of the National Association for the Advancement of Colored People.&apos;&apos; The paper quoted the Rev. Valarie Houston, pastor of Allen Chapel AME Church, a focal point for protestors, as saying &apos;&apos;They were there for us,&apos;&apos; after a March 20 meeting with CRS agents." />
                      <outline text="Separately, in response to a Florida Sunshine Law request to the City of Sanford, Judicial Watch also obtained an audio recording of a &apos;&apos;community meeting&apos;&apos; held at Second Shiloh Missionary Baptist Church in Sanford on April 19, 2012. The meeting, which led to the ouster of Sanford&apos;s Police Chief Bill Lee, was scheduled after a group of college students calling themselves the &apos;&apos;Dream Defenders&apos;&apos; barricaded the entrance to the police department demanding Lee be fired.  According to the Orlando Sentinel, DOJ employees with the CRS had arranged a 40-mile police escort for the students from Daytona Beach to Sanford." />
                      <outline text="Under what conditions is it ever acceptable for the federal government to arrange police escorts for protesters?" />
                      <outline text="And why did the Obama administration want to help them?" />
                      <outline text="What was the goal?" />
                      <outline text="As a result of all of the hype that this case has been given, we now have more racial tension in the United States than we have had in a very, very long time." />
                      <outline text="And it is becoming apparent to everyone what could potentially happen if George Zimmerman is acquitted.  In fact, law enforcement officials are so concerned about violence in the aftermath of the verdict that they have released a video encouraging young people not to commit violent acts&apos;..." />
                      <outline text="On Monday, the Broward County Sheriff&apos;s Office released a video calling on the public not to riot in the wake of the George Zimmerman verdict, expected this week or next in Florida. The Sheriff&apos;s Office released a statement explaining that it was &apos;&apos;working closely with the Sanford Police Department and other local law enforcement agencies&apos;&apos; to coordinate &apos;&apos;a response plan in anticipation of the verdict.&apos;&apos;" />
                      <outline text="The video, titled &apos;&apos;Raise Your Voice, Not Your Hands,&apos;&apos; focuses on attempting to channel reaction into non-violent response. It depicts two youngsters, one black teenage boy, one Hispanic teenage girl. &apos;&apos;Raise your voice!&apos;&apos; says the girl. &apos;&apos;And not your hands!&apos;&apos; says the boy. &apos;&apos;We need to stand together as one, no cuffs, no guns,&apos;&apos; says the girl. &apos;&apos;Let&apos;s give violence a rest, because we can easily end up arrested,&apos;&apos; says the boy. &apos;&apos;I know your patience will be tested,&apos;&apos; says the girl, and then both conclude, &apos;&apos;but law enforcement has your back!&apos;&apos;" />
                      <outline text="This never should have happened." />
                      <outline text="This case should never have been hyped like this." />
                      <outline text="Instead of being encouraged to look at each other as individuals and fellow American citizens, our politicians and the media continue to hype racial division and strife." />
                      <outline text="Are we ever going to learn how to love one another?" />
                      <outline text="Did you already share this? No? Share it now:" />
                      <outline text="It only takes a few moments to share an article, but the person on the other end that reads it might have their life changed forever" />
                      <outline text="Contact Information:Submit: articles [ at ] investmentwatchblog.com Advertising: ads [ at ] investmentwatchblog.com General: admin [ at ] investmentwatchblog.comSUBMIT YOUR NEWS TIPS OR ARTICLE" />
              </outline>

              <outline text="There&apos;s Alien Gas Flowing Through New York City&apos;s Subways.">
                      <outline text="Link to Article" type="link" url="http://www.popsci.com/science/article/2013-07/theres-alien-gas-running-through-new-york-citys-subways" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373508292_aDDjmhVY.html" />
        <outline text="Source: WT news feed" type="link" url="http://s3.amazonaws.com/radio2/w.tromp@xs4all.nl/linkblog.xml" />
      <outline text="Thu, 11 Jul 2013 02:04" />
                      <outline text="" />
                      <outline text="No need to fear, though: it&apos;s an experiment to see exactly how gases are dispersed through the hundreds of miles of New York City subway tunnels." />
                      <outline text="2nd Avenue Subway Station, Sans GasDan Nosowitz" />
                      <outline text="Starting today, New York City authorities will be releasing perfluorocarbon gas into several subway stops, some above and some below ground. Sounds scary, but isn&apos;t: perfluorocarbon is a harmless gas, odorless and colorless, and it&apos;s being used in the largest airflow experiment ever undertaken." />
                      <outline text="Perfluorocarbon tracers, or PFTs, are used because they&apos;re artificial and do not occur in nature, so a very small amount can be detected fairly easily. The work of detection will be done by a large team from three national labs: the Brookhaven, Argonne, and Los Alamos National Laboratories. About 100 interns in addition to professionals from the labs will be constructing and monitoring small black-and-grey boxes in dozens of locations all around the city, all dedicated to checking the air for these tracers." />
                      <outline text="Those locations aren&apos;t merely in the subway; the thing about New York&apos;s extensive, massively complex subway system is that it&apos;s the quickest way for airborne contaminants to race through (nearly) all portions of the five boroughs. So these testing boxes will be installed on subway platforms, sure, but also on telephone poles above ground." />
                      <outline text="The experiment is only the latest in a series of airflow experiments in the New York City subways. The New York Times claimed that a clandestine test was carried out in the 1960s by smashing a &quot;bulb&quot; of similar tracer gas in the subways to see if the city was prepared for such an attack. (It wasn&apos;t. An engineer involved in that test said a rush hour attack of that sort would &quot;put New York out of commission.&quot;)" />
                      <outline text="But this time, the test is anything but clandestine. The city released details of the experiment to the press, and each box has a phone number and a website that will provide information to anyone who is (reasonably, to be fair) a little alarmed about strange boxes that have something to do with strange gases flowing through the subway tunnels." />
                      <outline text="The study is funded, at a cost of $3.4 million, by a grant from the Department of Homeland Security, and today&apos;s is the first of three non-consecutive tests that will be done between now and July 28th." />
                      <outline text="[via NYTimes]" />
              </outline>

              <outline text="Data Brokers Are Now Selling Your Car&apos;s Location For $10 Online - Forbes">
                      <outline text="Link to Article" type="link" url="http://www.forbes.com/sites/adamtanner/2013/07/10/data-broker-offers-new-service-showing-where-they-have-spotted-your-car/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373508228_KyZePF9V.html" />
      <outline text="Thu, 11 Jul 2013 02:03" />
                      <outline text="" />
                      <outline text="Log in with your social account:Or, you can log in or sign up using Forbes.New PostsMost PopularWatch Out Wal-Mart?ListsMost Powerful CelebritiesVideoCountry Cash KingsFREE Report: 12 Stocks to Sell NowHelp|Connect" />
                      <outline text="|Sign up|Log in" />
              </outline>

              <outline text="VIDEO-Boston Marathon Bombing SUSPECT Dzhokhar Tsarnaev Pleads NOT GUILT ON ALL COUNTS - YouTube">
                      <outline text="Link to Article" type="link" url="http://www.youtube.com/watch?feature=player_embedded&amp;v=6uvoSpQrlUY" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373507927_8tsnvZtN.html" />
      <outline text="Thu, 11 Jul 2013 01:58" />
                      <outline text="" />
              </outline>

              <outline text="Boston Marathon Bombing SUSPECT Dzhokhar Tsarnaev Pleads NOT GUILT ON ALL COUNTS">
                      <outline text="Link to Article" type="link" url="http://www.youtube.com/watch?v=6uvoSpQrlUY&amp;feature=youtube_gdata" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373506818_YtwDaFYG.html" />
        <outline text="Source: Uploads by MOXNEWSd0tC0M" type="link" url="http://gdata.youtube.com/feeds/base/users/MOXNEWSd0tC0M/uploads?alt=rss&amp;v=2&amp;orderby=published&amp;client=ytapi-youtube-profile" />
      <outline text="Thu, 11 Jul 2013 01:40" />
                      <outline text="" />
              </outline>

              <outline text="Poll shows &apos;&apos;Massive Swing&apos;&apos; In Public View Of Terror/Liberty Trade Off">
                      <outline text="Link to Article" type="link" url="http://dprogram.net/2013/07/10/poll-shows-massive-swing-in-public-view-of-terrorliberty-trade-off/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373506578_tVTamyae.html" />
        <outline text="Source: Dprogram.net" type="link" url="http://dprogram.net/feed" />
      <outline text="Thu, 11 Jul 2013 01:36" />
                      <outline text="" />
                      <outline text="Majority of Americans see Snowden as hero, despite relentless government and media attacks" />
                      <outline text="(SteveWatson) &apos;&apos; A new scientific poll out this week finds that former NSA leaker Edward Snowden is viewed by the majority of Americans in a positive light as a whistleblower, and not a &apos;&apos;traitor&apos;&apos;, as the mainstream media and government officials would have it." />
                      <outline text="The poll from Quinnipiac, also reveals that a plurality of registered voters believe that government anti-terrorism programs have gone too far in stripping away liberties." />
                      <outline text="When given the two options, 55% of poll respondents said that they believed Snowden to be a &apos;&apos;whistleblower&apos;&apos;, while only 34% see him as a &apos;&apos;traitor.&apos;&apos;" />
                      <outline text="The terms were used as an acknowledgement of the media talking point that has been repeated again and again since Snowden fled the US to Moscow, from where he is still seeking political asylum." />
                      <outline text="The poll found that the description of Snowden as a whistle-blower and not a traitor was the majority opinion in practically every demographic of voter, regardless of party, gender, income, education or age." />
                      <outline text="Only amongst black voters did more people say they thought Snowden to be a traitor, with the margin at 43% to 42%." />
                      <outline text="&apos;&apos;The verdict that Snowden is not a traitor goes against almost the unified view of the nation&apos;s political establishment,&apos;&apos; commented Peter Brown, assistant director of Quinnipiac&apos;s polling institute." />
                      <outline text="Several elected officials, including House Speaker John Boehner, have referred to Snowden as a traitor, and have called for him to be given the harshest possible punishment." />
                      <outline text="The findings have bolstered the results of similarpolls undertaken when the news first broke last month in early June, and underscore the fact that people no longer believe the idea that exposing government surveillance of Americans makes the country less safe." />
                      <outline text="Perhaps the more telling revelation from the poll is the fact that by a 45-40% margin, voters now believe that the government goes too far in restricting civil liberties in the name of anti-terrorism efforts." />
                      <outline text="Those figures represent a monumental reversal from just over three years ago when the public told Quinnipiac by a 63-25 margin that the government didn&apos;t go far enough." />
                      <outline text="&apos;&apos;The massive swing in public opinion about civil liberties and governmental anti-terrorism efforts, and the public view that Edward Snowden is more whistle-blower than traitor are the public reaction and apparent shock at the extent to which the government has gone in trying to prevent future terrorist incidents,&apos;&apos; said Peter Brown." />
                      <outline text="Put simply, Americans are no longer buying the idea that the threat of terrorism warrants their own government spying on them en mass. Neither do they believe that it is right to punish and demonize anyone who speaks out about it, just as an authoritarian regime would." />
                      <outline text="The poll also revealed that both Democrats and Republicans were evenly divided on whether government counter-terrorism measures have become excessive. By a margin of 49 percent to 36 percent, independent voters said the government has taken things too far." />
                      <outline text="&apos;&apos;The fact that there is little difference now along party lines about the overall anti-terrorism effort and civil liberties and about Snowden is in itself unusual in a country sharply divided along political lines about almost everything,&apos;&apos; Brown said." />
                      <outline text="&apos;&apos;It would be naive to see these numbers as anything but evidence of a rethinking by the public about the tradeoffs between security and freedom,&apos;&apos; Brown added." />
                      <outline text="In related news, Glenn Greenwald, the journalist who broke the Snowden leaks has revealed that Snowden has this week &apos;&apos;vehemently denied media claims that he gave classified information to the governments of China or Russia.&apos;&apos;" />
                      <outline text="&apos;&apos; He also denied assertions that one or both governments had succeeded in &apos;draining the contents of his laptops&apos;. &apos;I never gave any information to either government, and they never took anything from my laptops,&apos; he said.&apos;&apos;" />
                      <outline text="Greenwald explains how the claim was generated in the media without a shred of evidence, and subsequently spread everywhere as &apos;&apos;truth&apos;&apos;, being repeatedly cited in an effort to demonize Snowden." />
                      <outline text="Source: Infowars" />
              </outline>

              <outline text="Linchpin for Obama&apos;s plan to predict future leakers unproven, isn&apos;t likely to work, experts say | McClatchy">
                      <outline text="Link to Article" type="link" url="http://www.mcclatchydc.com/2013/07/09/196211/linchpin-for-obamas-plan-to-predict.html#.Ud2iO-uBFP2" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373506546_7uCjfspS.html" />
      <outline text="Thu, 11 Jul 2013 01:35" />
                      <outline text="" />
                      <outline text="WASHINGTON &apos;-- In an initiative aimed at rooting out future leakers and other security violators, President Barack Obama has ordered federal employees to report suspicious actions of their colleagues based on behavioral profiling techniques that are not scientifically proven to work, according to experts and government documents." />
                      <outline text="The techniques are a key pillar of the Insider Threat Program, an unprecedented government-wide crackdown under which millions of federal bureaucrats and contractors must watch out for &apos;&apos;high-risk persons or behaviors&apos;&apos; among co-workers. Those who fail to report them could face penalties, including criminal charges." />
                      <outline text="Obama mandated the program in an October 2011 executive order after Army Pfc. Bradley Manning downloaded hundreds of thousands of documents from a classified computer network and gave them to WikiLeaks, the anti-government secrecy group. The order covers virtually every federal department and agency, including the Peace Corps, the Department of Education and others not directly involved in national security." />
                      <outline text="Under the program, which is being implemented with little public attention, security investigations can be launched when government employees showing &apos;&apos;indicators of insider threat behavior&apos;&apos; are reported by co-workers, according to previously undisclosed administration documents obtained by McClatchy. Investigations also can be triggered when &apos;&apos;suspicious user behavior&apos;&apos; is detected by computer network monitoring and reported to &apos;&apos;insider threat personnel.&apos;&apos;" />
                      <outline text="Federal employees and contractors are asked to pay particular attention to the lifestyles, attitudes and behaviors &apos;&apos; like financial troubles, odd working hours or unexplained travel &apos;&apos; of co-workers as a way to predict whether they might do &apos;&apos;harm to the United States.&apos;&apos; Managers of special insider threat offices will have &apos;&apos;regular, timely, and, if possible, electronic, access&apos;&apos; to employees&apos; personnel, payroll, disciplinary and &apos;&apos;personal contact&apos;&apos; files, as well as records of their use of classified and unclassified computer networks, polygraph results, travel reports and financial disclosure forms." />
                      <outline text="Over the years, numerous studies of public and private workers who&apos;ve been caught spying, leaking classified information, stealing corporate secrets or engaging in sabotage have identified psychological profiles that could offer clues to possible threats. Administration officials want government workers trained to look for such indicators and report them so the next violation can be stopped before it happens." />
                      <outline text="TSA officers watch for suspicious behavior at airports (Carey Wagner/Sun Sentinel/MCT)&apos;&apos;In past espionage cases, we find people saw things that may have helped identify a spy, but never reported it,&apos;&apos; said Gene Barlow, a spokesman for the Office of the National Counterintelligence Executive, which oversees government efforts to detect threats like spies and computer hackers and is helping implement the Insider Threat Program. &apos;&apos;That is why the awareness effort of the program is to teach people not only what types of activity to report, but how to report it and why it is so important to report it.&apos;&apos;" />
                      <outline text="But even the government&apos;s top scientific advisers have questioned these techniques. Those experts say that trying to predict future acts through behavioral monitoring is unproven and could result in illegal ethnic and racial profiling and privacy violations." />
                      <outline text="&apos;&apos;There is no consensus in the relevant scientific community nor on the committee regarding whether any behavioral surveillance or physiological monitoring techniques are ready for use at all,&apos;&apos; concluded a 2008 National Research Council report on detecting terrorists." />
                      <outline text="&apos;&apos;Doing something similar about predicting future leakers seems even more speculative,&apos;&apos; Stephen Fienberg, a professor of statistics and social science at Carnegie Mellon University in Pittsburgh and a member of the committee that wrote the report, told McClatchy." />
                      <outline text="The emphasis on individual lifestyles, attitudes and behaviors comes at a time when growing numbers of Americans must submit to extensive background checks, polygraph tests and security investigations to be hired or to keep government or federal contracting jobs. The U.S. government is one of the world&apos;s largest employers, overseeing an ever-expanding ocean of information." />
                      <outline text="While the Insider Threat Program mandates that the nearly 5 million federal workers and contractors with clearances undergo training in recognizing suspicious behavior indicators, it allows individual departments and agencies to extend the requirement to their entire workforces, something the Army already has done." />
                      <outline text="Training should address &apos;&apos;current and potential threats in the work and personal environment&apos;&apos; and focus on &apos;&apos;the importance of detecting potential insider threats by cleared employees and reporting suspected activity to insider threat personnel and other designated officials,&apos;&apos; says one of the documents obtained by McClatchy." />
                      <outline text="The White House, the Justice Department, the Peace Corps and the departments of Health and Human Services, Homeland Security and Education refused to answer questions about the program&apos;s implementation. Instead, they issued virtually identical email statements directing inquiries to the Office of the Director of National Intelligence, declined to comment or didn&apos;t respond." />
                      <outline text="Caitlin Hayden, a spokeswoman for the White House National Security Council, said in her statement that the Insider Threat Program includes extra safeguards for &apos;&apos;civil rights, civil liberties and privacy,&apos;&apos; but she didn&apos;t elaborate. Manning&apos;s leaks to WikiLeaks, she added, showed that at the time protections of classified materials were &apos;&apos;inadequate and put our nation&apos;s security at risk.&apos;&apos;" />
                      <outline text="Reply from the National Security Council" />
                      <outline text="Even so, the new effort failed to prevent former National Security Agency contractor Edward Snowden from taking top-secret documents detailing the agency&apos;s domestic and international communications monitoring programs and leaking them to The Guardian and The Washington Post newspapers." />
                      <outline text="The initiative goes beyond classified information leaks. It includes as insider threats &apos;&apos;damage to the United States through espionage, terrorism, unauthorized disclosure of national security information or through the loss or degradation of departmental resources or capabilities,&apos;&apos; according to a document setting &apos;&apos;Minimum Standards for Executive Branch Insider Threat Programs.&apos;&apos;" />
                      <outline text="McClatchy obtained a copy of the document, which was produced by an Insider Threat Task Force that was set up under Obama&apos;s order and is headed by Director of National Intelligence James Clapper and Attorney General Eric Holder. McClatchy also obtained the group&apos;s final policy guidance. The White House, the Justice Department and the Office of the Director of National Intelligence declined requests for both documents, neither of which is classified." />
                      <outline text="Although agencies and departments are still setting up their programs, some employees already are being urged to watch co-workers for &apos;&apos;indicators&apos;&apos; that include stress, divorce and financial problems." />
                      <outline text="When asked about the ineffectiveness of behavior profiling, Barlow said the policy &apos;&apos;does not mandate&apos;&apos; that employees report behavior indicators." />
                      <outline text="&apos;&apos;It simply educates employees about basic activities or behavior that might suggest a person is up to improper activity,&apos;&apos; he said." />
                      <outline text="&apos;&apos;These do not require special talents. If you see someone reading classified documents they should not be reading, especially if this happens multiple times and the person appears nervous that you saw him, that is activity that is suspicious and should be reported,&apos;&apos; Barlow said. &apos;&apos;The insider threat team then looks at the surrounding facts and draws the conclusions about the activity.&apos;&apos;" />
                      <outline text="Departments and agencies, however, are given leeway to go beyond the White House&apos;s basic requirements, prompting the Defense Department in its strategy to mandate that workers with clearances &apos;&apos;must recognize the potential harm caused by unauthorized disclosures and be aware of the penalties they could face.&apos;&apos; It equates unauthorized disclosures of classified information to &apos;&apos;aiding the enemies of the United States.&apos;&apos;" />
                      <outline text="All departments and agencies involved in the program must closely track their employees&apos; online activities. The information gathered by monitoring, the administration documents say, &apos;&apos;could be used against them in criminal, security, or administrative proceedings.&apos;&apos; Experts who research such efforts say suspicious behaviors include accessing information that someone doesn&apos;t need or isn&apos;t authorized to see or downloading materials onto removable storage devices like thumb drives when such devices are restricted or prohibited." />
                      <outline text="&apos;&apos;If you normally print 20 documents a week, well, what happens if the next week or the following week you have to print 50 documents or 100 documents? That could be at variance from your normal activity that could be identified and might be investigated,&apos;&apos; said Randy Trzeciak, acting manager of the Computer Emergency Response Team Insider Threat Center at Carnegie Mellon University&apos;s Software Engineering Institute." />
                      <outline text="&apos;&apos;We&apos;ve come up with patterns that we believe organizations might be able to consider when determining when someone might be progressing down the path to harm the organization,&apos;&apos; said Trzeciak, whose organization has analyzed more than 800 cases and works with the government and private sector on cyber security." />
                      <outline text="But research and other programs that rely on profiling show it remains unproven, could make employees more resistant to reporting violations and might lead to spurious allegations." />
                      <outline text="The Pentagon, U.S. intelligence agencies and the Department of Homeland Security have spent tens of millions of dollars on an array of research projects. Yet after several decades, they still haven&apos;t developed a list of behaviors they can use to definitively identify the tiny fraction of workers who might some day violate national security laws." />
                      <outline text="&apos;&apos;We are back to the needle-in-a-haystack problem,&apos;&apos; said Fienberg, the Carnegie Mellon professor." />
                      <outline text="&apos;&apos;We have not found any silver bullets,&apos;&apos; said Deanna Caputo, principal behavioral psychologist at MITRE Corp., a nonprofit company working on insider threat efforts for U.S. defense, intelligence and law enforcement agencies. &apos;&apos;We don&apos;t have actually any really good profiles or pictures of a bad guy, a good guy gone bad or even the bad guy walking in to do bad things from the very beginning.&apos;&apos;" />
                      <outline text="Different agencies and departments have different lists of behavior indicators. Most have adopted the traditional red flags for espionage. They include financial stress, disregard for security practices, unexplained foreign travel, unusual work hours and unexplained or sudden wealth." />
                      <outline text="But agencies and their consultants have added their own indicators." />
                      <outline text="For instance, an FBI insider threat detection guide warns private security personnel and managers to watch for &apos;&apos;a desire to help the &apos;underdog&apos; or a particular cause,&apos;&apos; a &apos;&apos;James Bond Wannabe&apos;&apos; and a &apos;&apos;divided loyalty: allegiance to another person or company or to a country besides the United States.&apos;&apos;" />
                      <outline text="A report by the Deloitte consulting firm identifies &apos;&apos;several key trends that are making all organizations particularly susceptible to insider threat today.&apos;&apos; These trends include an increasingly disgruntled, post-Great Recession workforce and the entry of younger, &apos;&apos;Gen Y&apos;&apos; employees who were &apos;&apos;raised on the Internet&apos;&apos; and are &apos;&apos;highly involved in social networking.&apos;&apos;" />
                      <outline text="Report from Deloitte" />
                      <outline text="Some government programs that have embraced behavioral indicators have been condemned as failures. Perhaps the most heavily criticized is the Transportation Security Administration&apos;s Screening of Passengers by Observation Techniques, or SPOT, program." />
                      <outline text="The program, which has cost $878 million and employs 2,800 people, uses &apos;&apos;behavior detection officers&apos;&apos; to identify potential terrorists by scrutinizing airline passengers for signs of &apos;&apos;stress, fear or deception.&apos;&apos;" />
                      <outline text="DHS&apos; inspector general excoriated the program, saying in a May 2013 report, &apos;&apos;TSA cannot ensure that passengers at United States airports are screened objectively, show that the program is cost-effective or reasonably justify the program&apos;s expansion.&apos;&apos;" />
                      <outline text="Interviews and internal complaints obtained by The New York Times quoted TSA officers as saying SPOT has led to ethnic and racial profiling by emphasizing certain profiles. They include Middle Easterners, Hispanics traveling to Miami and African-Americans wearing baseball caps backward." />
                      <outline text="Another problem with having employees report co-workers&apos; suspicious behaviors: They aren&apos;t sure which ones represent security threats." />
                      <outline text="&apos;&apos;Employees in the field are not averse to reporting genuine security infractions. In fact, under appropriate conditions they are quite willing to act as eyes and ears for the government,&apos;&apos; said a 2005 study by the Pentagon&apos;s Defense Personnel Security Research Center. &apos;&apos;They are simply confused about precisely what is important enough to report. Many government workers anguish over reporting gray-area behaviors.&apos;&apos;" />
                      <outline text="Even so, the Pentagon is forging ahead with training Defense Department and contractor managers and security officials to set up insider threat offices, with one company emphasizing how its course is designed for novices." />
                      <outline text="&apos;&apos;The Establishing an Insider Threat Program for Your Organization Course will take no more than 90 minutes to complete,&apos;&apos; says the proposal." />
                      <outline text="Officials with the Army, the only government department contacted by McClatchy that agreed to discuss the issue, acknowledged that identifying potential insider threats is more complicated than relying on a list of behaviors." />
                      <outline text="Response from the Army" />
                      <outline text="&apos;&apos;What we really point out is if you&apos;re in doubt, report, because that&apos;s what the investigative personnel are there to do, is to get the bottom of &apos;is this just noise or is this something that is really going on?&apos;&apos;&apos; said Larry Gillis, a senior Army counterintelligence and security official." />
                      <outline text="The Army implemented a tough program a year before Obama&apos;s executive order after Maj. Nidal Hasan, a U.S.-born Muslim, allegedly killed 13 people in a 2009 rampage at Fort Hood, Texas. Hasan, who has not gone on trial, has said he was defending the Afghan Taliban." />
                      <outline text="Gillis said the Army didn&apos;t want a program that would &apos;&apos;get people to snitch on each other,&apos;&apos; nor did it want to encourage stereotyping." />
                      <outline text="&apos;&apos;We don&apos;t have the luxury to make up reasons to throw soldiers out,&apos;&apos; Gillis said. &apos;&apos;It&apos;s a big deal to remove a soldier from service over some minor issue. We don&apos;t want to ruin a career over some false accusation.&apos;&apos;" />
                      <outline text="But some current and former U.S. officials and experts worry that Obama&apos;s Insider Threat Program could lead to false or retaliatory accusations across the entire government, in part because security officials are granted access to information outside their usual purview." />
                      <outline text="These current and former U.S. officials and experts also ridiculed as overly zealous and simplistic the idea of using reports of suspicious behavior to predict potential insider threats. It takes years for professional spy-hunters to learn their craft, and relying on the observations of inexperienced people could lead to baseless and discriminatory investigations, they said." />
                      <outline text="&apos;&apos;Anyone is an amateur looking at behavior here,&apos;&apos; said Thomas Fingar, a former State Department intelligence chief who chaired the National Intelligence Council, which prepares top-secret intelligence analyses for the president, from 2005 to 2008." />
                      <outline text="Co-workers, Fingar said, should &apos;&apos;be attentive&apos;&apos; to colleagues&apos; personal problems in order to refer them to counseling, not to report them as potential security violators. &apos;&apos;It&apos;s simply because they are colleagues, fellow human beings,&apos;&apos; he said." />
                      <outline text="Eric Feldman, a former inspector general of the National Reconnaissance Office, the super-secret agency that oversees U.S. spy satellites, expressed concern that relying on workers to report colleagues&apos; suspicious behaviors to security officials could create &apos;&apos;a repressive kind of culture.&apos;&apos;" />
                      <outline text="&apos;&apos;The answer to it is not to have a Stasi-like response,&apos;&apos; said Feldman, referring to the feared secret police of communist East Germany. &apos;&apos;You&apos;ve removed that firewall between employees seeking help and the threat that any employee who seeks help could be immediately retaliated against by this insider threat office.&apos;&apos;" />
                      <outline text="CORRECTION: A story about the Obama administration&apos;s Insider Threat Program gave the wrong name and title for Deanna Caputo, the principal behavioral psychologist at MITRE Corp." />
              </outline>

              <outline text="Obama&apos;s Insider Threat Program Resembles Nazi Gestapo | Dprogram.net">
                      <outline text="Link to Article" type="link" url="http://dprogram.net/2013/07/10/obamas-insider-threat-program-resembles-nazi-gestapo/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373506514_9h2EgBeV.html" />
      <outline text="Thu, 11 Jul 2013 01:35" />
                      <outline text="" />
                      <outline text="SS propaganda poster of the Day of the German police (1941). Wikimedia Commons" />
                      <outline text="(KurtNimmo) &apos;&apos; The techniques employed by Obama&apos;s Insider Threat Program are reminiscent of those used by the Gestapo in Nazi Germany. Unlike the Nazis, however, Obama&apos;s effort &apos;&apos; the result of an unconstitutional executive order issued in October, 2011 &apos;&apos; is limited, for now, to federal government employees." />
                      <outline text="From McClatchy:" />
                      <outline text="The techniques are a key pillar of the Insider Threat Program, an unprecedented government-wide crackdown under which millions of federal bureaucrats and contractors must watch out for &apos;&apos;high-risk persons or behaviors&apos;&apos; among co-workers. Those who fail to report them could face penalties, including criminal charges." />
                      <outline text="(&apos;...)" />
                      <outline text="Under the program, which is being implemented with little public attention, security investigations can be launched when government employees showing &apos;&apos;indicators of insider threat behavior&apos;&apos; are reported by co-workers, according to previously undisclosed administration documents obtained by McClatchy. Investigations also can be triggered when &apos;&apos;suspicious user behavior&apos;&apos; is detected by computer network monitoring and reported to &apos;&apos;insider threat personnel.&apos;&apos;" />
                      <outline text="Federal employees and contractors are asked to pay particular attention to the lifestyles, attitudes and behaviors &apos;&apos; like financial troubles, odd working hours or unexplained travel &apos;&apos; of co-workers as a way to predict whether they might do &apos;&apos;harm to the United States.&apos;&apos; Managers of special insider threat offices will have &apos;&apos;regular, timely, and, if possible, electronic, access&apos;&apos; to employees&apos; personnel, payroll, disciplinary and &apos;&apos;personal contact&apos;&apos; files, as well as records of their use of classified and unclassified computer networks, polygraph results, travel reports and financial disclosure forms." />
                      <outline text="The effort is not limited to preventing whistleblowers like Edward Snowden. &apos;&apos;The initiative goes beyond classified information leaks,&apos;&apos; McClatchy explains. &apos;&apos;It includes as insider threats &apos;damage to the United States through espionage, terrorism, unauthorized disclosure of national security information or through the loss or degradation of departmental resources or capabilities,&apos; according to a document setting &apos;Minimum Standards for Executive Branch Insider Threat Programs.&apos;&apos;&apos;" />
                      <outline text="In his book, The Third Reich in Power, Richard J. Evans describes a similar pattern in Nazi Germany. The Gestapo, the official secret police of Germany in the 1930s and all of occupied Europe during the Second World War, relied on a large network of informers comprised largely of average citizens. The end result of the Gestapo&apos;s panopticism &apos;&apos; as described by Canadian historian Robert Gellately &apos;&apos; was the creation of widespread fear and the belief that the state was all-seeing, an attribute fictionalized by George Orwell in his seminal novel, Nineteen Eighty Four." />
                      <outline text="Critics will argue that Obama&apos;s effort is limited to the federal workforce and it does not threaten society at large. Developments since September 11, 2001, however, reveal that a Gestapo-like panopticism &apos;&apos; a social theory originally developed by French philosopher Michel Foucault in his book, Discipline and Punish &apos;&apos; is already at work in American society." />
                      <outline text="Because of the Department of Homeland Security&apos;s &apos;&apos;see something, say something&apos;&apos; program and the TSA&apos;s intrusive and humiliating search techniques and revelations of the NSA&apos;s overarching electronic surveillance grid &apos;&apos; a high-tech electronic panopticon &apos;-- it can be categorically stated that America is now a Stasi police state." />
                      <outline text="Mission creep under the rubric of the so-called war on terror is now commonplace. The Department of Homeland security was established in the wake of the September 11, 2001, attacks to address the supposed threat Americans face from foreign terrorists." />
                      <outline text="&apos;&apos;Over the last decade, the feds have established a number of efforts to nationalize law enforcement and create a number of organizations designed to supposedly &apos;protect the homeland&apos; from not only terrorists &apos;&apos; most handled by the FBI and the CIA &apos;&apos; but all sorts of domestic criminals, including those who engage in victimless crimes such as drug use and prostitution,&apos;&apos; we reported last March." />
                      <outline text="There are now dozens of organizations feeding off tax dollars dispensed by the feds &apos;&apos; from FEMA&apos;s Citizen Corps to Volunteers in Police Service and Infragard and beyond. In many ways, these federally-funded and organized groups rival the police state apparatus active in Nazi Germany and Stalin&apos;s Soviet Union." />
                      <outline text="For example, the DHS now &apos;&apos;protects victims&apos;&apos; from &apos;&apos;domestic violence and other violent crimes&apos;&apos; that have nothing to do with the late CIA asset Osama bin Laden or the would-be nineteen hijackers who trained on U.S. military bases. The mega-bureaucracy now doles out money to everything from &apos;&apos;Juvenile Accountability&apos;&apos; to anti-counterfeiting, border security, and computer incident response." />
                      <outline text="But it really shines when it comes to acting as a political surveillance tool for the establishment. It has successfully exploited the global jihad terror myth to spy on antiwar and patriot groups and recently the Occupy movement. So-called fusion centers &apos;&apos; centralized high-tech Orwellian snoop hubs &apos;&apos; now dot the landscape and feed data into the DHS leviathan." />
                      <outline text="Obama&apos;s Insider Threat Program sets a precedent for similar action outside government. In fact, Infragard &apos;&apos; a public-private partnership between business and government (the very essence of fascism) &apos;&apos; serves as an apparatus that shares data with the government&apos;s intelligence network." />
                      <outline text="The ACLU put it mildly when it said there &apos;&apos;is evidence that InfraGard may be closer to a corporate TIPS program, turning private-sector corporations &apos;-- some of which may be in a position to observe the activities of millions of individual customers &apos;-- into surrogate eyes and ears for the FBI.&apos;&apos;" />
                      <outline text="Source: Infowars" />
              </outline>

              <outline text="Apple Rigged Book Prices, Judge Rules">
                      <outline text="Link to Article" type="link" url="http://www.truthdig.com/eartotheground/item/apple_rigged_book_prices_judge_rules_20130710/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373506140_q5aTByfn.html" />
        <outline text="Source: Truthdig: Drilling Beneath the Headlines" type="link" url="http://feeds.feedburner.com/Truthdig" />
      <outline text="Thu, 11 Jul 2013 01:29" />
                      <outline text="" />
                      <outline text="Apple Rigged Book Prices, Judge RulesPosted on Jul 10, 2013When Apple decided to get into the e-book business, it joined a conspiracy with major publishers to raise book prices as much as 50 percent, a judge determined Wednesday." />
                      <outline text="Apple says it will appeal and argues that, on the contrary, its entry into digital book-selling helped offer consumers greater choice in a market dominated by Amazon." />
                      <outline text="Amazon, however, kept prices low, at $9.99 a book (ironically mirroring Apple&apos;s business model in the music business). Amazon could force publishers to keep prices low as long as it was the only viable market for their wares. When Apple launched the iBooks store, publishers simultaneously raised their prices." />
                      <outline text="&apos;&apos;Apple is confronted with the fact that the conspiracy succeeded. It not only succeeded, it did so in record-setting time and at the precise moment that Apple entered the e-book market,&apos;&apos; said U.S. District Judge Denise Cote." />
                      <outline text="Cote said comments from Apple&apos;s late CEO Steve Jobs, who said one day all book prices would be the same, helped lose the company the case." />
                      <outline text="&apos;--Posted by Peter Z. Scheer" />
                      <outline text="More Below the Ad" />
                      <outline text="New and Improved CommentsIf you have trouble leaving a comment, review this help page. Still having problems? Let us know. If you find yourself moderated, take a moment to review our comment policy." />
                      <outline text="Please enable JavaScript to view the comments powered by Disqus." />
              </outline>

              <outline text="US to pay Spain 200 million to host missile shield">
                      <outline text="Link to Article" type="link" url="http://stratrisks.com/geostrat/13954" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373506008_xjKfr4ub.html" />
        <outline text="Source: StratRisks" type="link" url="http://feeds.feedburner.com/StratRisks" />
      <outline text="Thu, 11 Jul 2013 01:26" />
                      <outline text="" />
                      <outline text="Source: ElPais" />
                      <outline text="Spain and the US are expected to formalize an agreement in the coming weeks over the stationing of four destroyers at the naval base in Rota, Cdiz, for an initial period of over four years. The deal is worth 200 million euros to Spanish public company Navantia, which will be responsible for the maintenance of the four Arleigh Burke class vessels. The destroyers form part of the NATO missile defense shield and are equipped with Aegis combat systems capable of intercepting ballistic missiles." />
                      <outline text="The first two ships, the Ross and the Donald Cook, are scheduled to arrive at the Rota base in 2014, with the Porter and the Carney to follow in 2015. The destroyers will come with 1,100 military personnel and their families, which represents a shot in the arm for the local economy in one of the provinces hardest hit by Spain&apos;s prolonged recession." />
                      <outline text="Industry sources said that even more significant than the fiscal boon is the fact that the US has placed the upkeep of some of its most advanced military hardware in the hands of a Spanish company. &apos;&apos;If they are satisfied, there will be more contracts; if they are not, they will find the easiest way to avoid honoring the contract&apos;s duration,&apos;&apos; the sources said." />
                      <outline text="To accommodate the US navy destroyers the existing wharfs at Rota have been extended and a new quay built, to avoid having to dislodge the Spanish navy vessels already based there. The deployment in Rota is the fourth element of the missile defense shield, which will also include radar and interceptor installations in Poland, Turkey and Romania." />
                      <outline text=" " />
                      <outline text="Tags: Arleigh Burke, defense, economy, military, missiles, NATO, Poland, radar, Romania, Spain, Turkey, us" />
              </outline>

              <outline text="Amy Goodman: This Year&apos;s Best-Kept Secret: The Next Generation of Community Radio - Truthdig">
                      <outline text="Link to Article" type="link" url="http://www.truthdig.com/report/item/this_years_best-kept_secret_the_next_generation_of_community_radio_20130710/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373504773_CsnAWynd.html" />
      <outline text="Thu, 11 Jul 2013 01:06" />
                      <outline text="" />
                      <outline text="This Year&apos;s Best-Kept Secret: The Next Generation of Community RadioPosted on Jul 10, 2013By Amy Goodman" />
                      <outline text="A microphone and a radio transmitter in the hands of a community organizer imparts power, which some liken to the life-changing impact when humans first tamed fire. That&apos;s why the prospect of 1,000 new community radio stations in the United States, for which the Federal Communications Commission will accept applications this October, is so vital and urgent." />
                      <outline text="Workers toiling in the hot fields of south-central Florida, near the isolated town of Immokalee, were enduring conditions that U.S. Attorney Doug Molloy called &apos;&apos;slavery, plain and simple.&apos;&apos; Some worked from dawn to dusk, under the watch of armed guards, earning only $20 a week. Twenty years ago, they began organizing, forming the Coalition of Immokalee Workers. Ten years later, working with the Philadelphia-based nonprofit Prometheus Radio Project, the workers started their own radio station, Radio Consciencia, to serve the farmworker community and inform, mobilize and help the struggling workers forge better lives." />
                      <outline text="As the largest media corporations on the planet have been consolidating during the past two decades, putting the power of the media in fewer hands, there has been a largely unreported flowering of small, local media outlets. An essential component of this sector is community radio, stations that have emerged from the Low-Power FM (LPFM) radio movement. This October, community groups in the U.S. will have a once-in-a-generation opportunity to apply to the FCC for an LPFM radio-station license. But the mainstream media are hardly reporting on this critical development." />
                      <outline text="&apos;&apos;This is a historic opportunity for communities all over the country to have a voice over their airwaves,&apos;&apos; Jeff Rousset, national organizer of the Prometheus Radio Project, told me on the &apos;&apos;Democracy Now!&apos;&apos; news hour. &apos;&apos;The airwaves are supposed to belong to the public. This is a chance for groups to actually own and control their own media outlets.&apos;&apos; The Prometheus Radio Project formed in 1998. It was named after the Greek mythological hero who first gave fire to humans to make their lives more bearable." />
                      <outline text="Back in the 1980s and &apos;90s, &apos;&apos;pirate&apos;&apos; radio stations, unlicensed by the FCC, were launched in communities across the U.S. by people frustrated with the failures of the commercial and public media system, which was increasingly closed to the communities and seemingly beholden to corporate underwriters and interest groups. Harassed for their broadcasting efforts by federal agents, the pirates formed Prometheus, intent on changing the federal laws and opening the radio dial to a new generation of noncommercial, community-based stations. After 15 years of organizing, they won. Rousset said, &apos;&apos;We&apos;re going to turn static into sound and use that to amplify people&apos;s voices all over the country.&apos;&apos;" />
                      <outline text="Across the U.S. from Immokalee, farmworkers in rural Woodburn, Ore., were fighting against oppressive conditions similar to the tomato and watermelon pickers in Florida. The largest Latino organization in Oregon, PCUN, Pineros y Campesinos Unidos del Noroeste (in English, the Northwest Treeplanters and Farmworkers United), founded an LPFM radio station, Radio Movimiento (Movement Radio). PCUN&apos;s president, Ramon Ramirez, explained: &apos;&apos;We&apos;ve been able to use Radio Movimiento: La Voz del Pueblo ... not only to organize farmworkers, but also to provide information. ... For example, we&apos;re broadcasting in four indigenous languages from Mexico and Central America, and we&apos;re giving those folks a voice in the community that they never had.&apos;&apos;When I was covering the Zapatista uprising in Chiapas, Mexico, in early 1994, I attended the first press conference held by the Zapatista military commanders, including Subcomandante Marcos and Comandante Ramona. They called it specifically for Mexican radio journalists. Radio, Marcos said, was the most accessible form of mass communication. Even the poorest village had at least one radio around which people could gather, he said." />
                      <outline text="Social-media platforms like Twitter and Facebook have been rightly credited with supporting social movements like the Arab Spring in recent years. But the fact remains that most people in the U.S. receive their news from traditional sources, especially radio and television, more so in groups separated by the &apos;&apos;digital divide&apos;&apos;&apos;--the poor, immigrants and other marginalized communities." />
                      <outline text="LPFM applications must be filed in October, and significant advanced planning is required by any applicant group that hopes to succeed. The Oregon workers knew nothing about radio. Prometheus recruited 300 media activists from around the world to help get them on the air with a radio &apos;&apos;barn raising&apos;&apos; where volunteers literally built the station from the ground up." />
                      <outline text="The airwaves are a public treasure, and we have to take them back. The Prometheus Radio Project is waiting to hear from you." />
                      <outline text="Denis Moynihan contributed research to this column." />
                      <outline text="Amy Goodman is the host of &apos;&apos;Democracy Now!,&apos;&apos; a daily international TV/radio news hour airing on more than 1,000 stations in North America. She is the co-author of &apos;&apos;The Silenced Majority,&apos;&apos; a New York Times best-seller." />
                      <outline text="(C) 2013 Amy Goodman" />
                      <outline text="Distributed by King Features Syndicate" />
                      <outline text="New and Improved CommentsIf you have trouble leaving a comment, review this help page. Still having problems? Let us know. If you find yourself moderated, take a moment to review our comment policy." />
                      <outline text="Please enable JavaScript to view the comments powered by Disqus." />
              </outline>

              <outline text="&quot;Were You The Guy That Was Running From The Bomb Site?&quot; (I Thought They Walked Calmly)">
                      <outline text="Link to Article" type="link" url="http://www.youtube.com/watch?v=ehVSwYo9VYo&amp;feature=youtube_gdata" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373504638_C5xbQJyS.html" />
        <outline text="Source: Uploads by MOXNEWSd0tC0M" type="link" url="http://gdata.youtube.com/feeds/base/users/MOXNEWSd0tC0M/uploads?alt=rss&amp;v=2&amp;orderby=published&amp;client=ytapi-youtube-profile" />
      <outline text="Thu, 11 Jul 2013 01:03" />
                      <outline text="" />
              </outline>

              <outline text="Scientists: H7N9 Avian Flu Has Pandemic Potential">
                      <outline text="Link to Article" type="link" url="http://en.rian.ru/science/20130711/182175823/Scientists-H7N9-Avian-Flu-Has-Pandemic-Potential.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373504315_NNYp2FKn.html" />
        <outline text="Source: RIA Novosti" type="link" url="http://en.rian.ru/export/rss2/index.xml" />
      <outline text="Thu, 11 Jul 2013 00:58" />
                      <outline text="" />
                      <outline text="MOSCOW, July 11 (RIA Novosti) - The H7N9 avian flu, responsible for dozens of deaths in China, has a potential to mutate into a strain that can easily pass from human to human, sparking a global pandemic, an international team of scientists said." />
                      <outline text="The H7N9 strain infected 132 people in China, killing 43 of them as of July 10, according to a Xinhua statement quoting Chinese health authorities. A team of scientists of the University of Wisconsin-Madison and the University of Tokyo has thoroughly analyzed samples of the virus and published their findings in the Nature magazine on Wednesday." />
                      <outline text="&quot;H7N9 viruses have several features typically associated with human influenza viruses and therefore possess pandemic potential and need to be monitored closely,&quot; Yoshihiro Kawaoka, one of the world&apos;s leading experts on avian flu who headed the team, was quoted as saying by the Science Daily." />
                      <outline text="The group found out that the virus is able to infect and replicate in several species of mammals, whose immune system is close to human, such as ferrets and monkeys. The study suggests that the ability of the H7N9 virus to infect and replicate in human cells may be due to just a few amino acid changes in the genetic sequence of the virus." />
                      <outline text="They also established that approximately one third of ferrets became infected by droplet spread." />
                      <outline text="&quot;H7N9 viruses combine several features of pandemic influenza viruses, that is their ability to bind to and replicate in human cells and the ability to transmit via respiratory droplets,&quot; he said. &quot;These two features are necessary, although not sufficient, to cause a pandemic.&quot;" />
                      <outline text="In monkeys, the virus could efficiently infect cells in both the upper and lower respiratory tract. Conventional human flu viruses are typically restricted to the upper airway of infected nonhuman primates." />
                      <outline text="&quot;If H7N9 viruses acquire the ability to transmit efficiently from person to person, a worldwide outbreak is almost certain since humans lack protective immune responses to these types of viruses,&quot; Kawaoka said." />
                      <outline text="However, the study found that the H7N9 strains showed certain sensitivity to antiviral drugs effective against the conventional seasonal flu virus." />
                      <outline text=" " />
              </outline>

              <outline text="Knights of Malta celebrate 900th anniversary - Telegraph">
                      <outline text="Link to Article" type="link" url="http://www.telegraph.co.uk/news/religion/the-pope/9859523/Knights-of-Malta-celebrate-900th-anniversary.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373503555_kGkFNKea.html" />
      <outline text="Thu, 11 Jul 2013 00:45" />
                      <outline text="" />
                      <outline text="During its heyday, would-be members had to prove nobility through all eight great-grandparents. Now, such requirements are largely relaxed except in some European countries." />
                      <outline text="Still, the order&apos;s members are drawn from some of the world&apos;s wealthiest Catholics, who fund its health clinics, homeless shelters and elderly people&apos;s homes in 120 countries and rally for special appeals when disasters strike." />
                      <outline text="Sixty of the 13,500 members are &apos;professed knights&apos; who make vows of poverty, chastity, and obedience and live like monks, albeit without being ordained priests." />
                      <outline text="At one time Order&apos;s forces once occupied Cyprus, Rhodes, and Malta, but Napoleon expelled the order from Malta in 1798, depriving it of the final patch of land over which it ruled." />
                      <outline text="Nevertheless, the order still enjoys many of the trappings of a small country: UN observer status and diplomatic relations with 104 countries, most of them in the developing world where such ties can smooth the delivery of humanitarian aide." />
                      <outline text="But the US, for one, has no relations, precisely because it is a stateless state." />
                      <outline text="Some 4,000 people, volunteers in neon orange civil protection suits, children in red berets and members draped in black cloaks with a white, eight-pointed Maltese Cross on the front, processed through St. Peter&apos;s Square and into the basilica for the Mass marking the 900th anniversary of the order&apos;s recognition by the Holy See." />
                      <outline text="After the Mass, Pope Benedict came to the basilica for an audience during which he thanked the order for its service and urged it to continue providing health care for the world&apos;s neediest while staying true to its Christian ideals." />
                      <outline text="But he acknowledged its peculiar nature, saying the order&apos;s guiding spirit &quot;aims not to exercise power and influence of a worldly character, but in complete freedom to accomplish its own mission for the integral good of man, spirit and body ... with special regard for those whose need of hope and love is greater.&quot;" />
              </outline>

              <outline text="US diplomats cry foul as Obama donors take over top embassy jobs">
                      <outline text="Link to Article" type="link" url="http://www.guardian.co.uk/world/2013/jul/10/obama-donors-top-embassy-jobs-rewards" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373494610_DRTbEgdL.html" />
        <outline text="Source: The Guardian World News" type="link" url="http://feeds.guardian.co.uk/theguardian/rss" />
      <outline text="Wed, 10 Jul 2013 22:16" />
                      <outline text="" />
                      <outline text="Barack Obama has rewarded some of his most active campaign donors with plum jobs in foreign embassies, with the average amount raised by recent or imminent appointees soaring to $1.8m per post, according to a Guardian analysis." />
                      <outline text="The practice is hardly a new feature of US politics, but career diplomats in Washington are increasingly alarmed at how it has grown. One former ambassador described it as the selling of public office." />
                      <outline text="On Tuesday, Obama&apos;s chief money-raiser Matthew Barzun became the latest major donor to be nominated as an ambassador, when the White House put him forward as the next representative to the Court of St James&apos;s, a sought-after posting whose plush residence comes with a garden second only in size to that of Buckingham Palace." />
                      <outline text="As campaign finance chairman, Barzun helped raise $700m to fund President Obama&apos;s 2012 re-election campaign. More than $2.3m of this was raised personally by Barzun, pictured, according to party records leaked to the New York Times, even though he had only just finished a posting as ambassador to Sweden after contributing to Obama&apos;s first campaign." />
                      <outline text="State Department veterans are increasingly concerned about the size of donations raised by political supporters who go on to take up top foreign postings. Thomas Pickering, who recently led the investigation into lethal attacks on the US embassy in Libya and represented the US at the United Nations, claimed the practice had become nothing more than &quot;simony&quot; &apos;&apos; the selling of public office." />
                      <outline text="&quot;All these people want to go to places where the lifestyle issues [are pleasant], and to some extent that produces this notion that life in these western European embassies is like Perle Mesta,&quot; he told the Guardian, referring to the &quot;hostess with the mostest&quot;  who was ambassador to Luxembourg between 1949 and 1953 and who was known for her lavish parties." />
                      <outline text="&quot;It has the effect of diminishing perhaps the sense that the US is treating these countries with the respect they deserve,&quot; Pickering said." />
                      <outline text="Susan Johnson, president of the American Foreign Service Association (AFSA), which represents career US diplomats, added: &quot;The giving of ambassadorships to people who have raised a lot of money for the campaign has increased and that&apos;s a concern to us in particular." />
                      <outline text="&quot;There was some thought that with Obama being such a &apos;change agent&apos; that he might really do things differently &apos;&apos; but it has just been a bigger let down.&quot;" />
                      <outline text="Clutch of foreign appointmentsObama has made a clutch of foreign appointments recently. The 16th century Villa Taverna in Rome has just gone to John Phillips, a Washington lawyer who raised at least $500,000. John Emerson, a Los Angeles fund manger, will get to meet future contacts as ambassador to Germany after he raised $1.5m. Jane Stetson, heiress to the IBM fortune, is tipped as frontrunner for Paris after she raised $2.4m for Obama." />
                      <outline text="In total, nine sought-after postings in Europe, the Caribbean or Asia have been given to major donors in recent weeks, with a further three in France, Switzerland and Hungary earmarked to come soon. Of these 12, the precise bundling data is available for 10. According to a Guardian analysis, using the figures leaked to the New York Times, the average amount raised by each donor is $1.79m." />
                      <outline text="Official campaign finance records give only minimum figures for how much each donor raised among friends and family (a process known as bundling). Even using the published &apos;minimum&apos; donations declared for these bundlers, the amount raised by donors rewarded with foreign postings has soared. The appointees to those same 10 embassies raised at least $5m in 2013, compared to a minimum of $3.3m in 2009, at least $1.3m under George W Bush in 2005 and at least $800,000 for Bush donors in 2001." />
                      <outline text="Many of the capitals have grown resigned to the process. &quot;All that really matters is that the ambassador is close to the White House &apos;&apos; and his top fundraiser usually is,&quot; said one British diplomat, speaking anonymously about Barzun&apos;s appointment." />
                      <outline text="But to State Department veterans, the notion that only fundraisers can get messages through the West Wing is even more alarming. &quot;To some extent, this question of having the ear of the president, and who has it, shows the seriousness of the issue,&quot; said Ambassador Pickering." />
                      <outline text="Johnson, the AFSA president, said many donors have less political influence than their host countries like to imagine. &quot;Some foreign countries like the idea that they are getting a friend of the president, but our experience has been that genuine friends are pretty small; most of these people are friends of friends; and they don&apos;t get to call the president right away,&quot; she said." />
                      <outline text="&quot;In a few exceptional cases they are not detracting from credibility of diplomatic service, but at the scale it&apos;s being done it is undermining the concept of a career diplomatic service and weakening the strength and capacity of the diplomatic service.&quot;" />
                      <outline text="Johnson estimates the percentage of ambassador posts given to political appointees rather than career diplomats has remained roughly steady under Obama at around 30%, but most of these are in parts of the world unattractive to wealthy donors. The share taken by political appointees in western Europe and wealthier Asian capitals has reached between 70% and 85%, the AFSA estimates." />
                      <outline text="One factor cited by defenders of the practice is that private means are needed to fund the lifestyle led by ambassadors, but the importance of this is disputed by State Department veterans." />
                      <outline text="&quot;In the embassies I&apos;ve been in, normally you have a representation budget,&quot; said Johnson. &quot;Whether we skimp on it in places like London and Paris and these people add to it so they can serve the best champagne and canapes I don&apos;t know, but I don&apos;t think it&apos;s necessary to be wildly wealthy any more.&quot;" />
                      <outline text="She also said many are disappointed by the reality of embassy life. &quot;If the dog ruins the furniture, you have to pay for it. It&apos;s like being a guest in someone&apos;s house.&quot;" />
                      <outline text="Dysfunctional leadershipThis can cause problems of its own. A report by the State Department inspector general into a crisis at the embassy in the Bahamas found that Obama campaign finance chair Nicole Avant presided over &quot;an extended period of dysfunctional leadership and mismanagement, which has caused problems throughout the embassy&quot;. Prior to her appointment as ambassador, Avant was vice president of Interior Music Publishing and was absent from the embassy 276 days between September 2009 and November 2011, according to the report. In response to the report Avant said she &quot;had inherited a dysfunctional embassy&quot;." />
                      <outline text="Another official report into the Obama campaign donor appointed to Luxembourg, Cynthia Stroum, found she had been &quot;aggressive, bullying, hostile and intimidating&quot; and left her embassy in a &quot;state of dysfunction&quot;. Stroum resigned after the report." />
                      <outline text="State Department veterans say motivations vary among political donors. &quot;Some go to pleasant islands where the climate and residence are delightful, others just want the title, like British people lust after peerages,&quot; said AFSA&apos;s Johnson. &quot;People think: gee, I really want to call myself ambassador, so I can go buy myself one. Others are perceived to want to just meet people, broaden their contacts of future business contacts people who can help them in their day job.&quot;" />
                      <outline text="The White House insists all its ambassadors are well qualified, regardless of their campaign history. &quot;I am proud that such experienced and committed individuals have agreed to serve the American people in these important roles,&quot; said Obama in a statement issued with Barzun&apos;s appointment." />
                      <outline text="The Foreign Service Act of 1980, states that &quot;contributions to political campaigns should not be a factor in the appointment of an individual as a chief of mission.&quot;" />
                      <outline text="At at time when the US is reaching the limits of its &quot;hard power&quot;, career foreign service staff argue it is time for professional diplomacy to mount a comeback." />
                      <outline text="&quot;We tried a lot of military stuff and have we come to the realisation that not every problem out there can be solved by troops, no-fly zones and drones,&quot; concludes Johnson." />
                      <outline text="&quot;Diplomacy and managing the inter-relationships between countries is actually important, and we ought to be taking it more seriously, preparing people for it and seeing it as a long-term career &apos;&apos; not as just something you do for a few years while you are preparing to do something else.&quot;" />
              </outline>

              <outline text="VIDEO-Oliver Stone Urges Action to End &apos;Surveillance State&apos; - Truthdig">
                      <outline text="Link to Article" type="link" url="http://www.truthdig.com/avbooth/item/oliver_stone_urges_action_to_end_surveillance_state_20130710/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373494450_P4SdsySH.html" />
      <outline text="Wed, 10 Jul 2013 22:14" />
                      <outline text="" />
                      <outline text="Oliver Stone Urges Action to End &apos;Surveillance State&apos;Posted on Jul 10, 2013In a new video produced by the American Civil Liberties Union, Academy Award winner Oliver Stone encourages all U.S. citizens to take action in the wake of the recent revelations about the scope of the National Security Agency&apos;s massive surveillance program." />
                      <outline text="According to Stone, the leaks exposed by NSA whistle-blower Edward Snowden, whom the filmmaker has hailed as a hero, &apos;&apos;have given us a glimpse into our government&apos;s gigantic surveillance machine&apos;&apos; that &apos;&apos;is eating our freedom.&apos;&apos;" />
                      <outline text="Stone says it&apos;s time for Americans to stand up for civil liberties that are being encroached upon and tell congressional representatives to roll back the NSA&apos;s spying programs by repealing section 215 of the Patriot Act and section 702 of the FISA Amendments Act." />
                      <outline text="&apos;&apos;The question is not whether we have something to hide,&apos;&apos; he says. &apos;&apos;The question is whether we control the government or the government controls us.&apos;&apos; " />
                      <outline text="Read more about the ACLU&apos;s campaign here." />
                      <outline text="&apos;--Posted by Tracy Bloom.Get truth delivered toyour inbox every week." />
                      <outline text="Previous item: &apos;I Think I&apos;m an Interesting Woman&apos;" />
                      <outline text="New and Improved CommentsIf you have trouble leaving a comment, review this help page. Still having problems? Let us know. If you find yourself moderated, take a moment to review our comment policy." />
                      <outline text="Please enable JavaScript to view the comments powered by Disqus." />
              </outline>

              <outline text="Obamacare advertising to top $1 billion">
                      <outline text="Link to Article" type="link" url="http://www.theblaze.com/blog/2013/07/10/obamacare-advertising-to-top-1-billion/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373493380_yVMSxrmB.html" />
        <outline text="Source: TheBlaze.com - Blog" type="link" url="http://www.theblaze.com/feed/" />
      <outline text="Wed, 10 Jul 2013 21:56" />
                      <outline text="" />
                      <outline text="Because it&apos;s just so darn popular, or something&apos;..." />
                      <outline text="(Image: File photo)" />
                      <outline text="Via U.S. News and World Report:" />
                      <outline text="More than $1 billion will be spent on advertising for and against the Affordable Care Act, the comprehensive healthcare reform law known as Obamacare, before all is said and done, according to a media firm&apos;s analysis." />
                      <outline text="Counting money spent on ads since debate on the measure heated up in 2009 until the most recent spending records available, the Campaign Media Analysis Group, part of Kantar Media, found more than $500 million has already been spent on trying to sway public opinion and political races tied to the issue." />
                      <outline text="&apos;&apos;The law both parties now call &apos;Obamacare&apos; seems due to join Social Security and Medicare in one respect: as a public policy advertising phenom, a program that is reviled and perhaps eventually revered in political advertising for billions of dollars in ad spend to come,&apos;&apos; said Elizabeth Wilner, vice president for strategic initiatives at CMAG in a release accompanying the analysis. &apos;&apos;Yet while Social Security and Medicare have been litigated on the airwaves for more than 40 years, CMAG expects the ACA to break the $1 billion mark by its fifth birthday.&apos;&apos;" />
                      <outline text="Not surprisingly, opponents of the health care law have outspent supporters by a long-shot &apos;-- an estimated 5-to-1 margin.  But with Democrats relying on Obamacare to be a big campaign issue for them during next year&apos;s midterms, expect this number to continue climbing." />
                      <outline text="&apos;&apos;We expect Democrats on the ballot in 2014 to embrace the individual mandate in TV advertising after basically forfeiting the airwaves to Republicans and other critics for the past three years,&apos;&apos; Wilner said. &apos;&apos;Once the ACA begins to impact voters, we think Democrats will have no choice but to embrace the upsides in advertising.&apos;&apos;" />
                      <outline text="Translation: Once everyone sees what a crap bucket this thing is, Democrats are going to have to spend like crazy trying to defend it." />
              </outline>

              <outline text="Suspected Colombian drug kingpin pleads not guilty in U.S. court">
                      <outline text="Link to Article" type="link" url="http://www.reuters.com/article/2013/07/10/us-colombia-usa-barrera-idUSBRE9690VR20130710?feedType=RSS&amp;feedName=worldNews" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373493368_bWPjA6rG.html" />
        <outline text="Source: Reuters: World News" type="link" url="http://feeds.reuters.com/reuters/worldNews" />
      <outline text="Wed, 10 Jul 2013 21:56" />
                      <outline text="" />
                      <outline text="Police escort Colombian drug trafficker Daniel &apos;El Loco&apos; Barrera (C) as he is brought before the media, before being extradited to the U.S., at an airport in an anti-narcotics base in Bogota July 9, 2013." />
                      <outline text="Credit: Reuters/John Vizcaino" />
                      <outline text="By Bernard Vaughan" />
                      <outline text="NEW YORK | Wed Jul 10, 2013 3:00pm EDT" />
                      <outline text="NEW YORK (Reuters) - Alleged Colombian drug kingpin Daniel Barrera made his first appearance in a U.S. court on Wednesday and pleaded not guilty to conspiring to import cocaine into the United States." />
                      <outline text="Prosecutors accuse Barrera, 44, of manufacturing upwards of 400 tons of cocaine annually in Colombia and trafficking it worldwide." />
                      <outline text="He conspired with others to distribute cocaine &quot;knowing and intending&quot; that some would be imported into the United States, Assistant U.S. Attorney Jenna Dabbs said at the hearing in Manhattan federal court." />
                      <outline text="Barrera, with a light beard and wearing jeans and a black-and-white golf shirt, spoke briefly in Spanish at the hearing, confirming his attorney and that he understood the proceedings. Nicknamed &quot;Loco,&quot; or crazy, he sat back in a chair and listened to an interpreter through earphones." />
                      <outline text="Ruben Oliva, his lawyer, said Barrera would demand a trial by jury." />
                      <outline text="U.S. District Judge Alvin Hellerstein said Barrera would remain in detention. If convicted, he faces a maximum sentence of life in prison." />
                      <outline text="Barrera arrived in the United States on Tuesday after being extradited from Colombia." />
                      <outline text="He is accused of buying raw cocaine paste from the leftist rebel group FARC and processing it in laboratories in areas controlled by the now-demobilized paramilitary group the United Self-Defense Forces of Colombia, or AUC." />
                      <outline text="The AUC collected monthly taxes from Barrera, according to the Manhattan U.S. Attorney&apos;s indictment." />
                      <outline text="Evidence against Barrera includes photographs and other documents related to the seizures of cocaine shipments off the coasts of Venezuela and Florida, Dabbs told Hellerstein." />
                      <outline text="In 2000 Barrera provided 1.4 tons of cocaine to an unnamed co-conspirator in Guatemala via a &quot;go-fast boat,&quot; according to the indictment." />
                      <outline text="He also provided cocaine to the same co-conspirator to be hidden in a container of scrap metal that was being transported to Mexico from Panama in 2004, the indictment said." />
                      <outline text="Barrera was arrested in Venezuela last September with the help of authorities there as well as British and U.S. intelligence agencies." />
                      <outline text="Colombian authorities had been closing in on his organization in the weeks before his arrest, detaining 36 suspected members and seizing five tons of cocaine." />
                      <outline text="Barrera&apos;s next appearance in Manhattan federal court is set for September 4. He also faces charges in federal court in Brooklyn and Miami." />
                      <outline text="(Reporting by Bernard Vaughan; Editing by Xavier Briand)" />
                      <outline text="Link thisShare thisDigg thisEmailReprints" />
              </outline>

              <outline text="BBC News - Boston bomb accused Dzhokhar Tsarnaev denies charges">
                      <outline text="Link to Article" type="link" url="http://www.bbc.co.uk/news/world-us-canada-23264940" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373493236_C7VTnYYT.html" />
      <outline text="Wed, 10 Jul 2013 21:53" />
                      <outline text="" />
                      <outline text="10 July 2013Last updated at17:31 ETBoston Marathon bomb suspect Dzhokhar Tsarnaev has pleaded not guilty to all charges in his first court appearance, as blast victims looked on." />
                      <outline text="Mr Tsarnaev, 19, faces 30 counts of using a weapon of mass destruction in the two 15 April blasts that killed three, including an eight-year-old boy." />
                      <outline text="He appeared in shackles and an orange prison suit, and replied &quot;not guilty&quot; as the charges were read to the court." />
                      <outline text="Prosecutors could press for the death penalty for 17 counts." />
                      <outline text="The suspect has also been charged over the death of a fourth person, a university police officer, who was allegedly shot dead by Mr Tsarnaev and his brother Tamerlan in the days after the attack." />
                      <outline text="He is also charged in a carjacking incident and with downloading internet material from Islamist radicals some time before the blasts." />
                      <outline text="Relatives in courtPeople appeared outside the federal courthouse in Boston as early as 07:30 EST (12:30 BST) to claim a seat inside the court and two overflow rooms for a hearing that lasted just seven minutes." />
                      <outline text="Mr Tsarnaev arrived at court with his face swollen and his arm in a cast." />
                      <outline text="Two of the suspect&apos;s sisters watched the proceedings. One sobbed during the hearing while the other held a baby." />
                      <outline text="Before he was led out of the courtroom, the suspect seemed to smile and to gesture a kiss to his family members in the room." />
                      <outline text="Among the crowd was a young friend of Mr Tsarnaev, Hank Alvarez, 19. He said: &quot;Just knowing him, it&apos;s hard for me to face the fact that he did it.&quot;" />
                      <outline text="Mr Tsarnaev, a US citizen, was not in court last month during an indictment hearing, when a federal grand jury agreed that he should be tried on 30 charges." />
                      <outline text="His first court appearance took place at his hospital bedside, where he was recovering from injuries suffered in a shootout with police during the manhunt. He was later transferred to a prison hospital near Boston." />
                      <outline text="Mr Tsarnaev&apos;s older brother Tamerlan, 26, was killed days after the attack during a massive police operation. He is also suspected of carrying out the attacks." />
                      <outline text="Authorities say the accused ran over his older brother as he fled the shootout in a hijacked car." />
                      <outline text="Dzhokhar Tsarnaev was found the next day, 19 April, hiding in a boat in a residential garden in Watertown, Massachusetts." />
                      <outline text="According to the indictment, he wrote about his motivations for the bombing on the inside walls and beams of the boat." />
                      <outline text="Authorities say he scrawled: &quot;The US Government is killing our innocent civilians&quot; and &quot;I can&apos;t stand to see such evil go unpunished.&quot;" />
                      <outline text="The brothers are from a family of ethnic Chechen Muslims from Russia and had been living in the US for about a decade." />
                      <outline text="More than 260 people were injured when two pressure cooker bombs packed with nails, ball bearings and other shrapnel were detonated at the finish line of the Boston Marathon." />
                      <outline text="The bombing was the worst mass-casualty attack on US soil since 11 September 2001." />
              </outline>

              <outline text="BBC News - Luxembourg PM Juncker to resign over spy scandal">
                      <outline text="Link to Article" type="link" url="http://www.bbc.co.uk/news/world-europe-23264789" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373493203_EwtrUAbn.html" />
      <outline text="Wed, 10 Jul 2013 21:53" />
                      <outline text="" />
                      <outline text="10 July 2013Last updated at16:37 ETLuxembourg will hold new elections after Prime Minister Jean-Claude Juncker announced he would resign following a secret service scandal." />
                      <outline text="Mr Juncker, Europe&apos;s longest-serving head of government, told parliament he would step down on Thursday." />
                      <outline text="The move came as his junior coalition partner called for the dissolution of parliament and early elections." />
                      <outline text="It follows claims he failed to stop illegal security agency activity such as phone-taps and corruption." />
                      <outline text="Mr Juncker has been prime minister since 1995 and was head of the eurozone finance ministers group between 2005 and January 2013." />
                      <outline text="&apos;Not my top priority&apos;&quot;I will convene the government tomorrow morning at 10:00 (08:00 GMT) and will go to the Palace to suggest snap elections to the Grand Duke,&quot; he said on Wednesday." />
                      <outline text="Luxembourg&apos;s parliament had reviewed a report alleging a series of cases of misconduct by the country&apos;s SREL security agency, which the prime minister oversees." />
                      <outline text="It included claims of illegal bugging of politicians, the purchase of cars for private use and payments in exchange for access to local officials." />
                      <outline text="Mr Juncker has denied any wrongdoing." />
                      <outline text="&quot;The intelligence service was not my top priority,&quot; he told parliament in a two-hour speech." />
                      <outline text="&quot;Moreover, I hope Luxembourg will never have a prime minister who sees SREL as [his or her] priority.&quot;" />
                      <outline text="But there were demands for action from the Luxembourg Socialist Workers Party (LSAP), Mr Juncker&apos;s coalition partner." />
                      <outline text="&quot;We invite the prime minister to take full political responsibility in this context and ask the government to intervene with the head of state to clear the path for new elections,&quot; LSAP President Alex Bodry said." />
                      <outline text="It was not immediately clear whether the outgoing prime minister and head of Luxembourg&apos;s Christian Social People&apos;s Party was planning to fight the next election, which must be held within three months." />
                      <outline text="As the head of state, only the Grand Duke can officially dissolve parliament." />
                      <outline text="The current government would remain until elections take place, but it would be unable to pass any new laws." />
                      <outline text="However, with parliament due to go on its summer break, it is unlikely the government will have to face any important decision-making for some months." />
              </outline>

              <outline text="US still plans to send F-16s to Egypt in coming weeks">
                      <outline text="Link to Article" type="link" url="http://www.ynetnews.com/articles/0,7340,L-4403574,00.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373492789_XgyqCAwQ.html" />
        <outline text="Source: ynet - News" type="link" url="http://www.ynet.co.il/Integration/StoryRss3082.xml" />
      <outline text="Wed, 10 Jul 2013 21:46" />
                      <outline text="" />
                      <outline text="Official says no current change in plan to deliver fighter jets to Egyptian military in AugustReuters" />
                      <outline text="The United States will go through with the delivery of four F-16 fighter jets to Egypt in the coming weeks, US officials told Reuters on Wednesday as Washington deliberated whether to call the ouster of Egypt&apos;s elected leader a military coup." />
                      <outline text=" " />
                      <outline text="A decision to call last week&apos;s overthrow of Egyptian President Mohamed Morsi a coup would, by law, require the Obama administration to halt aid to the Egyptian army." />
                      <outline text=" " />
                      <outline text="Related stories:" />
                      <outline text=" " />
                      <outline text="Egypt is the second-largest recipient of US aid behind Israel, receiving $1.5 billion a year. The jets were part of that aid package, a US defense official confirmed." />
                      <outline text=" " />
                      <outline text="One defense official said the delivery of the four F-16s was likely to take place in August." />
                      <outline text=" " />
                      <outline text=" " />
                      <outline text="&quot;There is no current change in the plan to deliver F-16s to the Egyptian military,&quot; a second US official said on condition of anonymity." />
                      <outline text=" " />
                      <outline text="Islamists who back Morsi, Egypt&apos;s first freely elected president, blame the United States for allowing what they call a military coup. The country&apos;s military and interim political leaders say Morsi&apos;s Muslim Brotherhood incited violence when Egyptians took to the streets to protest the president&apos;s policies." />
                      <outline text=" " />
                      <outline text="The White House also pointed out that millions of Egyptians had wanted a change in government and said it would wait before deciding how to describe Morsi&apos;s ouster." />
                      <outline text=" " />
                      <outline text="&quot;We are evaluating how the authorities are responding to and handling the current situation,&quot; White House spokesman Jay Carney said on Wednesday." />
                      <outline text=" " />
                      <outline text="The United States has already disbursed $650 million in military aid to Egypt for fiscal year 2013 which ends in September, and another $585 million is pending, the first US official said." />
                      <outline text=" " />
                      <outline text="Another eight F-16s were due to be delivered in December." />
                      <outline text=" " />
                      <outline text=" " />
                      <outline text="Receive Ynetnews updates directly to your desktop  " />
              </outline>

              <outline text="Nigerian leader secures $1.1bn on China trip">
                      <outline text="Link to Article" type="link" url="http://www.aljazeera.com/news/africa/2013/07/2013710171651692540.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373492667_tqJk75bR.html" />
        <outline text="Source: AL JAZEERA ENGLISH (AJE)" type="link" url="http://www.aljazeera.com/Services/Rss/?PostingId=2007731105943979989" />
      <outline text="Wed, 10 Jul 2013 20:02" />
                      <outline text="" />
                      <outline text="Nigerian President Goodluck Jonathan and his Chinese counterpart, Xi Jinping, have presided over the signing of accords between their governments to facilitate $1.1bn in low-interest loans for much-needed infrastructure in Nigeria." />
                      <outline text="The ceremony took place on Wednesday in Beijing at the start of Jonathan&apos;s four-day visit." />
                      <outline text="China, which is increasingly looking to Africa for oil and other natural resources, is offering Nigeria loans to help fund airport terminals in four cities, roads, a light-rail line for its capital, a hydropower plant and oil and gas infrastructure." />
                      <outline text="Jonathan&apos;s visit comes a few months after Xi&apos;s trip to Africa, which took him to the Republic of Congo, Tanzania and South Africa. All three countries are rich in natural resources." />
                      <outline text="Xi said China and Nigeria had been brought together by a common task of pursuing national development." />
                      <outline text="&quot;China and Nigeria share the same goal of achieving prosperity for both countries, and this shared task brings our two countries together.&quot;" />
                      <outline text="Jonathan is visiting with a dozen of his cabinet ministers, including those for petroleum resources, trade and transport, as well as several state governors, senior government officials and business-people." />
                      <outline text="&quot;China is a very good country, has a very robust economy. And that&apos;s why when I was coming, I came with quite a number of cabinet ministers and other very senior government functionaries,&quot; Jonathan said." />
                      <outline text="Following a meeting between Xi and Jonathan, representatives from both countries signed five deals, including a lending agreement between China&apos;s Import-Export Bank and the Nigerian finance ministry for the expansion of the airport terminals and an economic and technical cooperation pact." />
                      <outline text="Details of the agreements were not immediately available." />
                      <outline text="Ngozi Okonjo-Iweala, the Nigerian finance minister, said the loans being finalised during the trip were part of $3bn approved by China at interest rates of less than 3 percent." />
                      <outline text="Chinese companies are already building roads across Nigeria in contracts worth $1.7bn." />
                      <outline text="China&apos;s demand for crude oil produced in Nigeria is expected to rise tenfold to 200,000 barrels a day by 2015, according to information provided by a team accompanying the Nigerian president." />
                      <outline text="341" />
              </outline>

              <outline text="Public Opinion Shifts on Security-Liberty Balance - NYTimes.com">
                      <outline text="Link to Article" type="link" url="http://fivethirtyeight.blogs.nytimes.com/2013/07/10/public-opinion-shifts-on-security-liberty-balance/?partner=rss&amp;emc=rss" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373492629_7Tr7cyA6.html" />
      <outline text="Wed, 10 Jul 2013 21:43" />
                      <outline text="" />
                      <outline text="A new Quinnipiac poll has found a significant shift in public opinion on the trade-off between civil liberties and national security. In the new survey, released on Wednesday, 45 percent of the public said they thought the government&apos;s antiterrorism policies have &apos;&apos;gone too far in restricting the average person&apos;s civil liberties&apos;&apos; &apos;-- as compared with 40 percent who said they have &apos;&apos;not gone far enough to adequately protect the country.&apos;&apos;" />
                      <outline text="By comparison, in a January 2010 Quinnipiac poll that posed the same question, only 25 percent of the public said the government had gone too far in restricting civil liberties, while 63 percent said it hadn&apos;t gone far enough to protect the country." />
                      <outline text="Although the shift in opinion is apparent among virtually all demographic groups, it has been somewhat more pronounced among Republicans, who may be growing more skeptical about President Obama&apos;s national security policies. Whereas, in the 2010 survey, 17 percent of Republicans said the government had gone too far to restrict civil liberties while 72 percent said it had not gone far enough to protect the country, the numbers among G.O.P. voters were nearly even in the new poll, with 41 percent saying that antiterrorism programs had gone too far and 46 percent saying they haven&apos;t gone far enough." />
                      <outline text="We generally caution against reading too much into a single poll result. But there are several reasons to think that the shift detected by the Quinnipiac poll is meaningful. First, the magnitude of the change was considerably larger than the margin of error in the poll. Second, the poll applied exactly the same question wording in both 2010 and 2013, making a direct comparison more reliable. Third, this was a well-constructed survey question, describing both the benefit (protecting the country) and the cost (restricting civil liberties) of antiterrorism programs in a balanced way." />
                      <outline text="What is less clear how much of the shift was triggered by the recent disclosures about the National Security Administration&apos;s domestic surveillance programs, as opposed to reflecting a longer-term trend in public opinion. A Fox News poll conducted in April, just after the Boston Marathon bombings but before the N.S.A. story broke, found that only 43 percent of the public was &apos;&apos;willing to give up some of your personal freedom in order to reduce the threat of terrorism&apos;&apos; &apos;-- considerably lower than in other instances of the survey. However, Fox News had last posed this question in 2006. Either way, it seems safe to conclude that the climate of public opinion on this issue has changed considerably since the years closely following the Sept. 11 attacks." />
                      <outline text="The Quinnipiac poll also asked about Edward J. Snowden, the former N.S.A. contractor who disclosed details about the agency&apos;s programs to newspapers. The Quinnipiac poll, in contrast to other recent surveys, found ostensibly sympathetic views toward Mr. Snowden, with 34 percent of respondents describing him as &apos;&apos;more of a traitor&apos;&apos; while 55 percent said he was &apos;&apos;more of a whistle-blower.&apos;&apos;" />
                      <outline text="Whereas I find Quinnipiac&apos;s broader question on national security to be quite meaningful, I&apos;m not sure that the one about Mr. Snowden tells us very much. The problem is that the sympathetic response toward him in the poll may reflect a sympathetically worded question." />
                      <outline text="The poll described Mr. Snowden as &apos;&apos;the national security consultant who released information to the media about the phone scanning program.&apos;&apos; However, Mr. Snowden has also released information to the news media about other N.S.A. activities, such as those it has conducted in China. Some Americans may be pleased by Mr. Snowden&apos;s disclosures about how the N.S.A. conducted surveillance against U.S. citizens &apos;&apos; but displeased that he has also disclosed details about its international surveillance. The Quinnipiac poll should probably have described a fuller spectrum of the information that Mr. Snowden has released." />
              </outline>

              <outline text="ANH-USA Exclusive: Drug Companies Plan to Use Compounding Bill to Take Away Your Compounded Medications | The Alliance for Natural Health USA">
                      <outline text="Link to Article" type="link" url="http://www.anh-usa.org/compounded-medications/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373492341_va9zAbNj.html" />
      <outline text="Wed, 10 Jul 2013 21:39" />
                      <outline text="" />
                      <outline text="Here is the &apos;&apos;smoking gun&apos;&apos;&apos;--the proof of what we have been suspecting. Action Alert!" />
                      <outline text="We&apos;ve been telling you about S.959, the Senate compounding pharmacy bill. We and other groups oppose it mainly because it is written in a way that would likely shut off access to important medications like bioavailable estriol and time-released natural thyroid." />
                      <outline text="Remember the political saying, &apos;&apos;Never let a crisis go to waste!&apos;&apos; In other words, try to manipulate the political process to get what you want. We thought this was happening with the compounding bill. Now we know it is. And this scheme is fueled by powerful former politicians working for industry and even by a key lobbyist married to a key Senate staffer." />
                      <outline text="What ANH-USA has feared in particular is that special interests in the pharmaceutical industry would try to use the call for federal regulation of compounding pharmacies to outlaw compounded estriol and thyroid and replace them with standard drugs. Compounded, bioidentical estriol became popular in the first place because the standard drug used for the same purpose was proven to be dangerous, a risk for both heart disease and cancer. It would be understandable that the drug companies would want this huge market back. Here is how some of them have gone about it." />
                      <outline text="When the call for federal regulation of compounding arose, pharmaceutical companies formed the so-called Working Group on Pharmaceutical Safety to lobby for the bill. The group is led by Tommy Thompson, the former governor of Wisconsin and former Director of Health and Human Services under George W. Bush, and recently a failed Senate candidate, and Sarah Sellers, a former FDA official who worked on compounding pharmacy policy. The group represents some of the drug companies with vested interests in the compounding bill: the &apos;&apos;participants&apos;&apos; of the Working Group include TherapeuticsMD (a specialty pharmaceutical company), KV Pharmaceuticals, Auxilium Pharmaceuticals, and Mobius Therapeutics." />
                      <outline text="Not coincidentally, Thompson is chairman of TherapeuticsMD. And until recently, Sellers worked for Ther-RX, the marketing and distribution arm of KV Pharmaceuticals. You may recall our article on KV&apos;s fight against the compounded version of the successful progesterone-based drug 17P, which is used to prevent premature births; KV was displeased by the FDA&apos;s decision (due to grassroots pressure) to allow compounders to continue making the inexpensive 17P when KV wants to control the market with their high-priced version of the drug, Makena." />
                      <outline text="In other words, the Working Group on Pharmaceutical Safety and their clients have a direct financial interest in language that would allow the FDA to shut down vital compounded medications and thus a vested interest in passing S.959. Even more concerning is that TherapeuticsMD is in the process of developing a new form of the bioidentical hormones estradiol and progesterone; if these receive FDA approval and S.959 passes, it is very likely that these important hormones will no longer be available except in this new form&apos;--of unknown safety&apos;--and at what will almost certainly be outrageous prices." />
                      <outline text="Under S.959, all compounded versions of FDA-approved drugs will almost certainly be banned as &apos;&apos;copies&apos;&apos; of the approved drug, depending on how strictly that term is interpreted. We expect it to be defined broadly in order to ensure market exclusivity by eliminating competition from compounding pharmacies offering natural products. Because they are natural, these products cannot be patent-protected." />
                      <outline text="In a remarkably candid interview with Bloomberg, TherapeuticsMD CEO Robert Finizio recognized the superior safety of bioidentical hormones. This is important because FDA&apos;s main argument against estriol has been that it is by definition unsafe because it has not won FDA approval, a circular and misleading argument since the FDA knows very well that no one can afford to take an unpatentable product through the FDA process. Finizio&apos;s comment directly refutes critics who claim compounded products are dangerous. But he also admits that his company sees these hormones as a $10 to $12 billion market which they want to control by offering an FDA-approved drug." />
                      <outline text="Even more telling, ANH-USA has obtained a document in which TherapeuticsMD, pitching itself to potential investors, describes the safety and efficacy of bioidentical hormones. They also give their investors some statistics on the bioidentical HRT market, reveal that well over three-quarters of the market is currently held by compounding pharmacies&apos;--and state that this is the market they are going after. If this isn&apos;t a smoking gun, we don&apos;t know what one would look like." />
                      <outline text="Certain drug companies, it seems clear, want to take advantage of what is supposed to be regulation of the compounding industry by replacing compounded products with their own. Will Congress please take note and amend this legislation before it is too late?" />
                      <outline text="Doing the lobbying for the Working Group on Pharmaceutical Safety is BGR Group, also known as Barbour Griffith &amp; Rogers (the firm was founded by Haley Barbour, former governor of Mississippi). The connections between BGR and the federal government are myriad:" />
                      <outline text="BGR&apos;s vice president for governmental affairs is Dave Boyer, who worked for Tommy Thompson at HHS, and served as special assistant to the president for legislative affairs under George W. Bush, followed by a stint as senior director of federal affairs for the Pharmaceutical Research and Manufacturers of America (PhRMA), the drug companies&apos; trade association. BGR now lobbies on behalf of PhRMA.David Boyer also represents drugmaker Eli Lilly, which has an animal drug division that would have benefited from an earlier version of the compounding bill that severely limited compounding for dogs, cats, and horses. While that provision has been dropped from the current version of the S.959, an amendment to restore these compounding restrictions is expected when the bill is considered on the Senate floor.One of PhRMA&apos;s members is Pfizer (which, you may recall, purchased Wyeth, who started the whole attack on bioidentical hormone replacement therapy with a petition to ban estriol in favor of their synthetic drug). Pfizer would benefit from the very specific language in the bill that would allow FDA to remove estriol from the market.Dave Boyer&apos;s wife, Jennifer Boyer, is the health policy advisor for Sen. Pat Roberts (R-KS). She is also one of the primary staffers working on the Senate compounding bill. If you think this sounds like a conflict of interest, you&apos;re right: in meetings she has been a strident voice against compounding and has opposed both compounded 17P and estriol.Doing much of BGR&apos;s actual lobbying for the Working Group is Bob Wood, president of BGR&apos;s government affairs. Wood worked as Tommy Thompson&apos;s chief of staff when Thompson was governor of Wisconsin; he continued in the same capacity when Thompson directed HHS.In other words, TherapeuticsMD and the Working Group&apos;s other &apos;&apos;participants&apos;&apos; are following in footsteps of KV Pharmaceuticals. They&apos;re attempting to change the business playing field legislatively. Unfortunately, if they follow KV&apos;s example too far, they may wind up in trouble." />
                      <outline text="KV Pharmaceuticals has had a lot of legal trouble&apos;--to the extent that we&apos;re amazed any former FDA official or HHS secretary would work with them. In 2011, KV&apos;s former CEO spent time in jail (and is now banned from ever doing business in the US) for falsifying the amount of morphine that was in their pills. The company has also had to settle with numerous state attorneys general for Medicare and Medicaid fraud&apos;--to the tune of $17 million." />
                      <outline text="Action Alert! Sen. Lamar Alexander (R-TN) is calling for a vote on S.959 as quickly as possible. Even if you sent Congress your message on S.959 previously, please write them again. We have added new information to the Action Alert letter, and it&apos;s vital that we fight with all our strength against the powerful lobbyists and deep-pocketed drug companies to preserve our right to safe, inexpensive, effective compounded medicines. Please take action immediately!" />
              </outline>

              <outline text="VIDEO-Jeff Daniels: Second Amendment &apos;Was a Different Time,&apos; Wants More Background Checks | MRCTV">
                      <outline text="Link to Article" type="link" url="http://www.mrctv.org/videos/jeff-daniels-second-amendment-was-different-time-wants-more-background-checks" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373492165_pZJpTH4U.html" />
      <outline text="Wed, 10 Jul 2013 21:36" />
                      <outline text="" />
                      <outline text="If the player does not load, please check that you are running the latest version of Adobe Flash Player." />
                      <outline text="On Tuesday&apos;s Piers Morgan Live, actor Jeff Daniels pushed for universal background checks because the Second Amendment was written during a &quot;different time.&quot;" />
              </outline>

              <outline text="Ironically, Obama&apos;s delay of Obamacare implementation is itself unconstitutional">
                      <outline text="Link to Article" type="link" url="http://www.naturalnews.com/041112_Obamacare_unconstitutional_implementation_delay.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373491120_bX2d4f7K.html" />
      <outline text="Wed, 10 Jul 2013 21:18" />
                      <outline text="" />
                      <outline text="(NaturalNews) So much of what President Obama does in wielding the power of his office is unconstitutional, so it should surprise no one that action he took recently regarding the implementation timeline of his signature achievement - Obamacare - is most likely unconstitutional as well.Bypassing Congress as usual, Obama - through executive action - ordered a one-year delay in the so-called employer healthcare mandate contained within Obamacare that was set to kick in, so that Democrats who passed the unpopular act won&apos;t have to face tremendous voter backlash during the 2014 election cycle." />
                      <outline text="In announcing the delay, the White House said it was simply &quot;listening to businesses about the health care law,&quot; but that&apos;s pure BS. If Obama and Democrats cared about the impact this law would have on businesses, they would not have included the mandate - which requires businesses with 50 or more full-time employees to provide them with expensive health insurance coverage- in the first place." />
                      <outline text="What is really going on, you see, is that Obama and his Democrat supporters who voted for the law are afraid of voter backlash. Americans are beginning to figure out that the so-called &quot;Affordable Care Act&quot; a) will not be affordable at all and, in fact, will increase coverage costs for most Americans; b) will expose lawmakers who touted its benefits as liars when the law does not deliver as promised; and c) is more likely to collapse the nation&apos;s healthcare system than &quot;reform&quot; it. And many of us will want to take out our frustrations on those who forced Obamacare down our throats." />
                      <outline text="That will likely come anyway, employer mandate or not. Business owners aren&apos;t stupid; they realize that, sooner or later, the administration definitely will enforce the employer mandate. So they will make hiring decisions appropriately (reducing the number of full-time employees while increasing the number of part-time employees, among other tactics)." />
                      <outline text="Imperial president" />
                      <outline text="But what is at issue now is whether Obama&apos;s decision to do another end-run around Congress is even legal, since his job is to enforce the law of the land - and in this case, provisions of the very law he wanted." />
                      <outline text="Not surprisingly, the administration is claiming it has all the authority in the world to implement the delay. According to Roll Call, a publication that focuses on Congress, a Treasury Department official says the administration has &quot;longstanding administrative authority to grant transition relief when implementing new legislation like the ACA.&quot;" />
                      <outline text="Three House committees beg to differ and are already looking into the decision. And Rep. Darrell Issa, R-Calif., chairman of the House Oversight and Government Reform Committee, said the decision is just &quot;another in a string of extra legal decisions&quot; made by this president." />
                      <outline text="&quot;As a former constitutional law teacher, President Obama must know that this action gets into very questionable constitutional territory,&quot; Issa said in a statement. &quot;It also paves the way for future administrations to simply not enforce parts of Obamacare they don&apos;t believe are functioning well.&quot;" />
                      <outline text="Rep. Phil Roe, R-Tenn., chairman of the Education and Workforce subcommittee of the House Ways and Means Committee, has asked the Congressional Research Service to investigate Obama&apos;s action." />
                      <outline text="&quot;I believe this administration has made a habit of bypassing Congress and it sets a very dangerous precedent,&quot; he said in a statement. &quot;Both Republicans and Democrats should be very concerned, and I will continue to closely monitor these actions and hold the president accountable.&quot;" />
                      <outline text="&quot;If President Obama wants to make changes to Obamacare, he must come to Congress. ... We are a nation governed by laws written by Congress, not memos and blog posts written by bureaucrats,&quot; adds Rep. Steve King, R-Iowa." />
                      <outline text="Obama&apos;s penchant to act as an &quot;imperial&quot; president is &quot;a fascinating transformation&quot; for him, says Jonathan Turley, a constitutional law professor at George Washington University who has become a top administration legal critic." />
                      <outline text="&quot;He rightfully criticized President Bush for violating the separation of powers and using signing statements to rewrite legislation, but Obama has been far more aggressive in circumventing Congress and far more successful in creating an imperial presidency,&quot; Turley told Roll Call." />
                      <outline text="&apos;There really isn&apos;t anything they can do&apos;" />
                      <outline text="Some see this as a &quot;transformation&quot; of Obama, but those who knew him before he took office and who studied his legislative and legal positions when he was an ascending state and U.S. senator, like me, know that this is the real Obama - always has been, always will be." />
                      <outline text="This president, like his most recent predecessor, has no respect for the rule of law and does not feel constrained by the U.S. Constitution. What&apos;s more, he has co-opted the very constitutional system he abuses. Under the very same Constitution, we the people have no legal recourse to remove this president from office because even if the House impeaches him, the Senate won&apos;t convict because it is held by a Democrat majority." />
                      <outline text="Regarding delaying the Obamacare employer mandate, Timothy Jost, a longtime supporter of the health care law and a law professor at Washington and Lee University, summed it up when he told Roll Call: &quot;I don&apos;t see the courts intervening here. I&apos;m sure Congress will hold hearings but there really isn&apos;t anything they can do.&quot;" />
                      <outline text="The time has come to stop allowing &quot;The Establishment&quot; to spoon-feed us candidates. Washington, in its present form, is not going to fix Washington in its present form, because those who currently make up The Establishment created Washington in its present form. If that sounds like an anti-incumbent rant, maybe it is. But truth be told, we&apos;re not getting closer to liberty and freedom with the current bunch of career politicians and bureaucrats. It&apos;s time to clean house." />
                      <outline text="Sources:" />
                      <outline text="http://cdn.rollcall.com" />
                      <outline text="http://www.forbes.com" />
                      <outline text="http://www.foxnews.com" />
                      <outline text="Please enable JavaScript to view the comments powered by Disqus." />
                      <outline text="comments powered by" />
              </outline>

              <outline text="VIDEO-Carney to Reporter: &apos;Read the Federal Register, I Know That&apos;d Be a Lot to Ask&apos; | The Weekly Standard">
                      <outline text="Link to Article" type="link" url="http://www.weeklystandard.com/blogs/carney-report-read-federal-register-i-know-thatd-be-lot-ask_739208.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373491014_SxekmFGu.html" />
      <outline text="Wed, 10 Jul 2013 21:16" />
                      <outline text="" />
                      <outline text="White House spokesman Jay Carney told a Fox News reporter to &quot;read the Federal Register&quot; in response to whether the president had the authority to change parts of the Obamacare law:" />
                      <outline text="&quot;The ability to postpone the deadline is clear,&quot; said Carney." />
                      <outline text="&quot;I invite you to read the Federal Register,&quot; he said. &quot;I know that&apos;d be a lot to ask.&quot;" />
                      <outline text="&quot;You&apos;ll have to ask me?&quot; the reporter said. " />
                      <outline text="&quot;Yes,&quot; said Carney, smirking. &quot;Exactly.&quot;" />
              </outline>

              <outline text="Boston Bombing Suspect Pleads Not Guilty to All Charges">
                      <outline text="Link to Article" type="link" url="http://en.rian.ru/world/20130710/182166086/Boston-Bombing-Suspect-Tsarnaev-Court-Appearance-Pleads-Not-Guilty.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373490656_mw6mNcp2.html" />
        <outline text="Source: RIA Novosti" type="link" url="http://en.rian.ru/export/rss2/index.xml" />
      <outline text="Wed, 10 Jul 2013 21:10" />
                      <outline text="" />
                      <outline text="WASHINGTON, July 10 (RIA Novosti) &apos;&apos; Suspected Boston Marathon bomber Dzhokhar Tsarnaev on Wednesday pleaded not guilty to all charges against him, including murder and using a weapon of mass destruction in connection with the deadly April 15 attack that left three people dead and more than 260 injured." />
                      <outline text="In his first public appearance since he was detained days after the twin bombing, Tsarnaev rubbed his neck and adjusted his collar as he repeated &apos;&apos;not guilty&apos;&apos; to each of the 30 charges against him read by the clerk in a fifth-floor courtroom overflowing with media, police, victims and supporters of the suspect, the RAPSI legal news agency reported from the courtroom." />
                      <outline text="Magistrate Judge Marianne B. Bowler required Tsarnaev to answer each of the charges for himself, refusing to allow his attorney to respond to the charges for him. At the end of the hearing, which lasted around 10 minutes, Bowler remanded Tsarnaev to the custody of US Marshals." />
                      <outline text="The next hearing in the case was scheduled for Sept. 23." />
                      <outline text="Tsarnaev, whose left hand was in a cast and his face swollen, appeared relaxed throughout the hearing, The Associated Press (AP) reported." />
                      <outline text="As he was preparing to be escorted out of the courtroom in handcuffs by three bulky officers with shaved heads, Tsarnaev looked over his shoulders at his family and made a kissing motion with his lips, according to reporters present at the hearing." />
                      <outline text="Television cameras were not allowed inside the courtroom at the Joseph Moakley federal courthouse for Wednesday&apos;s hearing." />
                      <outline text="Tsarnaev, 19, faces a 30-count indictment, including charges of killing a police officer at the campus of the Massachusetts Institute of Technology (MIT) as police chased him and his brother, fellow suspect Tamerlan Tsarnaev, in a frantic manhunt days after the bombing." />
                      <outline text="Tamerlan Tsarnaev was killed during a shootout with police in the Boston suburb of Watertown, while Dzhokhar suffered nonfatal wounds and was apprehended on April 19." />
                      <outline text="Prosecutors in the case said they expect to call between 80 and 100 witnesses and that the trial will likely last three to four months. " />
                      <outline text="Inside the courtroom, several Tsarnaev supporters wearing T-shirts bearing the visage of the accused terrorist were told by security officials that such T-shirts would not be allowed in the courtroom in the future, the local Boston affiliate of Fox News reported prior to the hearing. " />
                      <outline text="Victims and their relatives were present in the courtroom as well Wednesday, as were members of Tsarnaev&apos;s family, including two sisters wearing Muslim garb, according to media reports. One of the sisters held a baby, while the other wiped away tears with a tissue during the hearing, the AP reported." />
                      <outline text="Tsarnaev&apos;s parents, who have repeatedly proclaimed their son&apos;s innocence, were in the restive republic of Dagestan in southern Russia on Wednesday, US media reported." />
                      <outline text="Tsarnaev could face the death penalty on 17 of the 30 charges in the indictment against him." />
                      <outline text="Security officers and the international news media were swarming outside the courthouse before and after Wednesday&apos;s hearing, as were supporters of Tsarnaev who shouted encouragement and carried signs claiming the suspect is innocent." />
                      <outline text="A group of the slain MIT policeman&apos;s fellow officers stood in a line across the street from the courthouse before Wednesday&apos;s hearing to show solidarity with their fallen colleague, Sean Collier." />
                      <outline text="Numerous people became tangled with Tsarnaev supporters in verbal confrontations following the hearing, with one person yelling at the alleged terrorist&apos;s backers: &apos;&apos;If you don&apos;t like this country, go back to yours,&apos;&apos; RAPSI reported." />
                      <outline text="Police officers stepped in and told both camps to calm down, the legal news agency said." />
                      <outline text="Members of the news media and the public began lining up before 8 a.m. EDT Wednesday to secure a seat in the courtroom for the hearing. Among those hoping to get a seat were Tsarnaev&apos;s former teammates on the wrestling team at Cambridge Rindge and Latin high school." />
                      <outline text="One of the young men, Hank Alvarez, told the AP that he had difficulty reconciling Tsarnaev&apos;s calm, apolitical nature with the violent crimes he allegedly committed." />
                      <outline text="&apos;&apos;Just knowing him, it&apos;s hard for me to face the fact that he did it,&apos;&apos; Alvarez, 19, was quoted by the AP as saying." />
                      <outline text="Russian law enforcement authorities have been cooperating with their US counterparts in the investigation of the brothers, ethnic Chechens whose family roots lie in the turbulent North Caucasus region of southern Russia." />
                      <outline text="In 2011, Russia asked the US Federal Bureau of Investigation (FBI) to interview Tamerlan Tsarnaev over concerns relating to his interest in &apos;&apos;radical Islam.&apos;&apos; However, an FBI statement said that it &apos;&apos;did not find any terrorism activity, domestic or foreign,&apos;&apos; after questioning Tamerlan and members of his family at that time." />
                      <outline text="Updated with details, quotes and background throughout." />
              </outline>

              <outline text="VIDEO-ABC-CLIMATE-Catalyst: Extreme Weather - ABC TV Science">
                      <outline text="Link to Article" type="link" url="http://www.abc.net.au/catalyst/stories/3796205.htm" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373488876_B4PaLzMC.html" />
      <outline text="Wed, 10 Jul 2013 20:41" />
                      <outline text="" />
                      <outline text="download segment mp4| wmv (average size 10 MB)" />
                      <outline text="NARRATIONHeat waves that kill tens of thousands. Apocalyptic floods. Blizzards in the Middle East. How is it that a slightly warmer atmosphere can create weather that swings from one extreme to the next? From lazy jet streams to baking soils, in this report we explain the mechanisms behind some of the most catastrophic events of the decade." />
                      <outline text="Anja TaylorUnderstanding exactly how a warmer world drives weather wild is crucial to predicting just how bumpy a ride we&apos;re in for." />
                      <outline text="NARRATIONIn 2003, a heatwave settled over Europe. But this was no ordinary heatwave. By the time it was over, more than 40,000 people were dead." />
                      <outline text="Dr Erich FischerSo 2003 was remarkable in many aspects. It was far warmer than ever before - two to five degrees on average over the whole summer." />
                      <outline text="NARRATIONIt was likely the hottest weather event in Europe in 500 years. Yet, just seven years later, an even more intense heatwave hit Russia, setting the country on fire. Summer temperatures reached up to 13 degrees above average, and the death toll from heat stress and respiratory illness was estimated at more than 50,000." />
                      <outline text="Dr Erich FischerIt was much larger in spatial extent, so it covered almost two million square kilometres. Really, we&apos;re not that used to such extremely hot summers. So it is surprising to see a clustering of such strong events. It wasn&apos;t only the two, there were three other very warm summers within the same decade." />
                      <outline text="Anja TaylorGlobal average temperatures have only increased by 0.8 of a degree Celsius. One would think that this would just lead to slightly warmer summers. But, actually, it&apos;s greatly increasing the chances of extremely hot weather." />
                      <outline text="NARRATIONThis past year in Australia, we&apos;ve seen plenty of heat. At the Bureau of Meteorology, forecasters have been watching record after record tumble." />
                      <outline text="Dr Karl BraganzaJanuary was the hottest month on record. The summer was the hottest on record. And the sea surface temperatures around Australia were the hottest on record. We had temperatures in Bass Strait, south of Melbourne and south of Adelaide, up to six degrees above average. But, in terms of heatwaves, what we find is the elevated ocean temperatures reduce the amount of cold outbreaks we get. And, particularly during April, we had a prolonged heatwave with very hot night-time temperatures, and those sustained night-time temperatures are indicative of warmer waters to the south of Australia, and that&apos;s what we saw." />
                      <outline text="NARRATIONAlthough an exceptional year, it&apos;s not outside the range of what&apos;s now considered normal. If you plot temperature records, they fall in a typical bell-curve pattern, with the majority only a small deviation from the average, and the outliers representing extreme hot or cold events. With a 0.8 degree rise in temperature, a much larger portion now sits in the warmer-than-average section, and hot to extremely hot days are far more frequent." />
                      <outline text="Dr Karl BraganzaSuddenly, you&apos;ve actually doubled the frequency of those events - and, in Australia&apos;s case, up to five times an increase in the frequency of extreme heat compared to the middle of last century. And that has all sorts of implications. Just in January alone, we did about 1,600 spot-fire forecasts. That&apos;s this very detailed forecast for the firefighters. And that&apos;s the equivalent of the last several years." />
                      <outline text="NARRATIONWorldwide, heatwaves have been increasing in duration and frequency since the 1950s." />
                      <outline text="Dr Lisa AlexanderWhat we thought as kind of exceptional in the past has really started to become the norm." />
                      <outline text="NARRATIONBut even in the context of global warming, the European and Russian heatwaves are way off the charts. Is this just natural variability, or is something else happening to make temperatures soar? The Swiss Institute of Technology is a world leader in climate modelling. Here, Dr Erich Fischer has focused intensive research on the causes of the 2003 scorcher and other recent severe heatwaves in Europe." />
                      <outline text="Dr Erich FischerWhat&apos;s mainly the key factor is always the atmospheric circulations, so there needs to be a high-pressure system in place to get such an extreme heatwave." />
                      <outline text="NARRATIONBut there was something else they all had in common - dry soils." />
                      <outline text="Dr Erich FischerAll of them were actually preceded by very dry conditions in the spring. So we think that these conditions were already preconditioning the later heatwave." />
                      <outline text="NARRATIONLow rainfall in the spring months led to an early and rapid loss of soil moisture. And dry soils can be a double whammy on an evolving heatwave." />
                      <outline text="Anja TaylorWhen the sun&apos;s rays hit the land surface, a lot of their energy goes into evaporating moisture from the soil and from plants as they transpire. But when soils dry out and plants stop transpiring, the sun&apos;s energy is no longer channelled into that process. Instead, it&apos;s free to heat the surface." />
                      <outline text="NARRATIONThe result is a jump in temperatures. It was dry soils that turned the European heatwave of 2003 into a deadly scorcher." />
                      <outline text="Dr Erich FischerWith the very same conditions in the atmosphere, but wet soils rather than dry soils, the 2003 summer would have still been a very warm summer, but much less extreme, with much less devastating impacts." />
                      <outline text="NARRATIONAn early snow melt and dry soils also amplified the Russian heatwave of 2010. What&apos;s disturbing is that many regions appear to be trending to patterns of lower rainfall in winter and spring months, making those areas more prone to mega heatwaves." />
                      <outline text="Dr Erich FischerEurope and central Europe was always thought to be always humid basically. So, it was a surprise that in that event more dry conditions was actually enough to amplify the heatwave - something that usually only occurs over dry regions, such as the Mediterranean or the central US or Australia, for instance." />
                      <outline text="Anja TaylorFrom where I&apos;m standing, heatwaves seem a long, long way away. So do dry soils. And although this summer has been the hottest on record, it&apos;s also had some torrential downpours. So how is it that it can be getting hotter, drier and wetter at the same time?" />
                      <outline text="NARRATIONIt&apos;s simple physics. When air gets warmer, it can carry more water vapour - much more. So any rise in temperatures should lead to considerably more moisture being sucked from the Earth&apos;s surface. But what goes up must eventually come down." />
                      <outline text="Dr Susan WijffelsRainfall, as we all know from personal experience, is really spotty. I mean, it can be raining, you know, in your suburb, and next door not raining at all. And so that spatial sort of graininess of rainfall makes it an incredibly hard thing to measure - and, in particular, to measure over larger areas accurately." />
                      <outline text="NARRATIONTo find out if a warmer climate is cranking up the water cycle, scientists have been searching for clues in the restless, churning oceans." />
                      <outline text="Dr Susan WijffelsMost of the evaporation and most of the rainfall in the world actually cycles through the ocean surface, not through the land. Because it covers 75 percent of the Earth, most of the action&apos;s actually happening over the ocean." />
                      <outline text="NARRATIONEvery time rain falls or water evaporates from the sea, surface salinity changes." />
                      <outline text="Dr Susan WijffelsWhen we look at the ocean salinity field right now, we see this beautiful reflection of what happens in the atmosphere. So the places that are very rainy - say, the Tropics, where there&apos;s a large amount of rainfall all the time - the surface salinity field is very fresh. When we go to the parts of the atmosphere where we find deserts on land, there are desert equivalents over the ocean, where evaporation dominates, and that&apos;s where we find the surface of the ocean is very, very salty." />
                      <outline text="NARRATIONKeeping track of how salty seas change, more than 3,000 ocean robots called &apos;Argo floats&apos; have been bobbing about on the global currents, beaming back data over time. The oceans are always mixing, so results are smoothed out instead of patchy like land records. Argo data and long-term records from research vessels reveal an unmistakable trend." />
                      <outline text="Dr Susan WijffelsOver the last 50 years, that contrast has gone up quite markedly. So, for instance, the Atlantic Ocean is becoming saltier and saltier and saltier. And the Pacific is becoming fresher and fresher. Essentially translates to the fact that the wet areas have become wetter and the dry areas have become drier." />
                      <outline text="NARRATIONThe big surprise is how fast the change is occurring. For every degree rise in air temperature, the water cycle is intensifying by percent. That&apos;s double the climate-model predictions." />
                      <outline text="Dr Susan WijffelsThe intensity of the storms are likely to go up, because the moisture in the atmosphere is actually the feeder energy stop that drives storms. And we expect droughts and floods to amplify as well." />
                      <outline text="NARRATIONAnd that&apos;s what&apos;s happening. These days, when it rains, it really pours. In January 2011, Toowoomba set a terrifying example of what can happen when too much water comes down too fast." />
                      <outline text="ManThe house... We are moving!" />
                      <outline text="NARRATIONThe town experienced an inland tsunami as 100mm of rain fell in under an hour." />
                      <outline text="Dr Lisa AlexanderYou get very intense rainfall events in a very short period of time, like you did in Toowoomba. The soil just can&apos;t absorb that much water. And then you do start getting these very large inland flooding events." />
                      <outline text="NARRATIONBy studying over 8,000 rain gauges across the world, Australian scientists have confirmed that extreme rainfall events have also been intensifying. That means we&apos;re getting more water from a big storm than we would have 30 or 40 years ago. Around 7 percent more per degree rise in temperature." />
                      <outline text="Dr Lisa AlexanderIt surprised us all, I have to say, that we got the answer we expected. So... Because usually, in science, you don&apos;t always end up with the answer you expect. So, to sort of see this coming out consistently in the data, was... was somewhat of a surprise." />
                      <outline text="Dr Susan WijffelsWe&apos;re already starting to detect and see big changes in the extreme events. And we&apos;ve only really warmed the Earth by 0.8 of a degree. If we were to warm the Earth by 3 or 4 degrees, the changes in the hydrological cycle could be near 30 percent. I mean, that&apos;s just a huge change, and it&apos;s very hard for us to imagine." />
                      <outline text="Anja TaylorWell, that explains heatwaves and floods, but it doesn&apos;t take a genius to work out that higher temperatures don&apos;t set the scene for blizzards. In marked contrast to a sweltering March last year, this year the US suffered through nailbiting cold. In fact, much of the Northern Hemisphere was buried under record-breaking snowfalls. How can global warming possibly explain that?" />
                      <outline text="NARRATIONTo understand how, you need to consider the basic drivers of climate. As the sun heats the Earth unevenly, it sets up temperature gradients on many different scales. These create the winds and currents that influence weather." />
                      <outline text="Dr Karl BraganzaAll the ocean currents are driven by basically the temperature gradient between the Equator and the Pole, and it&apos;s the same in the atmosphere." />
                      <outline text="NARRATIONThe atmospheric gradient between the Tropics and the Poles creates the major westerly winds called &apos;jet streams&apos;. Wind rushes down a slope from a warm, puffed up atmosphere to a cold, compressed atmosphere." />
                      <outline text="Dr Jennifer FrancisThe stronger that gradient, the stronger the force that that wind is being pulled by, if you will, and then, because the Earth is spinning, instead of flowing directly from the south to the north, it actually gets turned to the right by the spinning of the Earth." />
                      <outline text="NARRATIONThese fast-moving wavy winds encircle the Northern and Southern Hemispheres and mark the divide between cold, polar air and warm, tropical air." />
                      <outline text="Dr Jennifer FrancisThey swing north and then they swing south, and the weather that you experience is completely related to where you are relative to one of these waves." />
                      <outline text="NARRATIONBut what happens when you mess with a temperature gradient? It&apos;s a hotly debated topic, and, right now, we&apos;re running an extraordinary real-world experiment by turning up the thermostat in the Arctic." />
                      <outline text="Dr Jennifer FrancisIt&apos;s hard to get your mind around how fast the Arctic is changing. It&apos;s really mind-boggling - even to someone like me, who&apos;s been studying it for decades now." />
                      <outline text="NARRATIONThe Arctic is warming faster than anywhere on Earth, largely to do with the feedback effect of melting sea ice. White, bright ice bounces the sun&apos;s rays back into space before they have a chance to warm the surface. But when a small rise in temperatures melts some of the ice, the dark ocean below is exposed. This absorbs almost all the sun&apos;s energy, and heats up, causing more ice to melt, leading to more warming and so on." />
                      <outline text="Dr Jennifer FrancisWhat we&apos;re seeing is the Arctic sea ice disappearing at just an amazing rate. This is the ice that&apos;s floating on top of the Arctic ocean. This past summer, it was half as big as it was only 30 years ago." />
                      <outline text="NARRATIONResearch by Dr Jennifer Francis has shown that Arctic summers with a low sea ice extent leads to a gentler atmospheric gradient." />
                      <outline text="Dr Jennifer FrancisThe force that&apos;s creating those winds in the jet stream is getting weaker as well." />
                      <outline text="NARRATIONLike fast-flowing mountain rivers meander when they slowly cross the coastal plain, Jennifer predicted a weaker, slower jet stream would display a much wavier pattern." />
                      <outline text="Dr Jennifer FrancisWe were able to determine that, in fact, these waves are actually getting larger in the north-south direction, which we know through weather theory that those waves then tend to move more slowly from west to east." />
                      <outline text="NARRATIONAnd a lazy, meandering jet stream can have an extraordinary effect on weather." />
                      <outline text="Dr Jennifer FrancisA big dip south, for example, will allow that cold air from the Arctic to plunge farther south. And, conversely, if you have a big swing northward in one of what we call a &apos;ridge&apos;, then that allows the warm, tropical air to extend farther northward. So, in both of these cases, we tend to get more unusual weather patterns setting up." />
                      <outline text="NARRATIONThat&apos;s exactly what happened when frigid Arctic weather plunged into Europe and south-eastern US this March, bringing record snowfalls and leading many to wonder what happened to global warming. The year before, the US was caught in a jet-stream upswing. Unprecedented heat smashed over 1,000 temperature records and set the scene for a staggering drought and massive agricultural losses. This decade the Northern Hemisphere has seen some catastrophic results from a highly deformed jet stream. While a big, stagnant high settled over Russia in 2010, cold air from Siberia plunged into Pakistan, colliding with warm, wet air from the Bay of Bengal. As Russian burned, Pakistan drowned under a deluge that lasted nearly two months." />
                      <outline text="Dr Jennifer FrancisAs the jet stream takes on this wavier character, what this means is that the weather that you&apos;re experiencing in your location is going to stick around longer. It&apos;s going to feel like those weather conditions just won&apos;t give up and bring something else. It feels like it&apos;s stuck." />
                      <outline text="NARRATIONHow jet streams are being affected by a warming Arctic is still highly unpredictable, with many other interactions affecting their speed and movement. But one thing&apos;s certain - we&apos;d better get used to wacky weather." />
                      <outline text="Dr Karl BraganzaAnd we talk about climate change in the future of 1, 2, 3 degrees - that&apos;s actually hard to imagine." />
                      <outline text="Dr Jennifer FrancisIt&apos;s going to be a difficult next few decades, I think." />
                      <outline text="Anja TaylorWhen it comes to extreme weather, the connection is pretty clear. The warmer the world, the wilder it gets. And, with the speed that emissions still enter the atmosphere, we&apos;re right on track for an unrecognisable future." />
                      <outline text="Reporter: Anja TaylorProducer: Anja TaylorResearcher: Anja TaylorCamera: Kevin May, Scott Ross, Jodi Silver, Anja Taylor, Dirk FrenkelSound: Steve Ravich, Markus Graber, Allen Freeman, Dave FraserEditor: Andrew GloverDr Erich FischerInstitute for Atmospheric and Climate Science, ETH" />
                      <outline text="Dr Karl BraganzaBureau of Meteorology" />
                      <outline text="Dr Lisa AlexanderClimate Change Research Centre, UNSW" />
                      <outline text="Dr Susan WijffelsMarine and Atmospheric Research, CSIRO" />
                      <outline text="Professor Jennifer FrancisInstitute of Marine and Coastal Sciences, Rutgers University" />
                      <outline text="Dr Erich Fischer Heatwave Research" />
                      <outline text="Heatwaves increasing" />
                      <outline text="Water cycle intensifying" />
                      <outline text="Rainfall extremes intensifying" />
                      <outline text="Jet stream changes linked to sea ice" />
                      <outline text="Evidence linking Arctic amplification to extreme weather in mid-latitudes &apos;&apos; geophysical research letters" />
                      <outline text="Deformed Jet stream linked to extreme Pakistan floods/Russia Fires" />
                      <outline text="Frozen jet stream links Pakistan floods, Russian fires" />
                      <outline text="Met office meeting about jet streams" />
                      <outline text="Has global warming brought an early summer to the US?" />
                      <outline text="&#094; top" />
              </outline>

              <outline text="VACCINE$-As Army Ducks for Cover, Document Points to Malaria Drug in Afghan Massacre - AGE OF AUTISM">
                      <outline text="Link to Article" type="link" url="http://www.ageofautism.com/2013/07/army-ducks-document-points-to-malaria-drug-afghan-massacre.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373487169_x3rMKmTc.html" />
      <outline text="Wed, 10 Jul 2013 20:12" />
                      <outline text="" />
                      <outline text="By Dan Olmsted" />
                      <outline text="They&apos;re getting away with it again. " />
                      <outline text="The U.S. military is ignoring documented evidence that links a violence-inducing prescription drug with the worst American war crime in decades -- the massacre last year of 16 Afghan civilians by Army Sgt. Robert Bales." />
                      <outline text="The Army invented the drug, called Lariam or mefloquine,  and has consistently avoided reckoning with the consequences, including a string of bizarre murder-suicides stretching back more than a decade." />
                      <outline text="Officials haven&apos;t said whether Bales took Lariam, but I&apos;ve just obtained   a formal report filed by the drug company with the Food and Drug Administration that says he did -- the first direct evidence U.S. officials have been aware of the prospect, and for more than a year. (See event/problem narrative below.)" />
                      <outline text=" " />
                      <outline text="I got the report from Dr. Remington Nevin, a former Army officer who has studied the drug and published peer-reviewed articles about its dangers. In fact, Nevin and former Army psychiatrist Elspeth Cameron Ritchie just published last month in the Journal of the American Academy of Psychiatric and the Law Online, noting the &quot;potent psychotropic potential&quot; of the drug. &quot;Severe psychiatric side effects due to mefloquine intoxication are well documented,&quot; they wrote, &quot;including anxiety, panic attacks, paranoia, persecutory delusions, dissociative psychosis, and anterograde amnesia. Exposure to the drug has been associated with acts of violence and suicide.&quot;" />
                      <outline text="Nevin told Congress last year it could become &quot;the Agent Orange of our generation.&quot; The alarm apparently fell on deaf ears." />
                      <outline text="&quot;It remains possible this report was submitted by someone without first-hand knowledge,&quot; Nevin told me about the newly disclosed FDA report. &quot;However, by any reasonable standard, the fact that this report clearly alludes to a case that can only be Bales&apos; calls for greater transparency by DoD as to whether he was in fact taking the drug.&quot;" />
                      <outline text="Last month, Time magazine wrote about a similar report filed with the Irish drug agency, which refers to the incident as &quot;medically confirmed.&quot; Time called that report a &quot;smoking pillbox.&quot;" />
                      <outline text="The document  reproduced here today is specific about the source -- it says the information came from a pharmacist. The report does not name Bales, but the killing of 17 [later reduced to 16] Afghanis would seem to rule out anyone else. It is hard to see how someone at the FDA could have failed to bring it to the attention of the military, or how the military in its exhaustive criminal investigation of the case could have failed to learn what drugs it had prescribed to Bales." />
                      <outline text="The Army allowed Bales to plead guilty to the rampage last month and avoid the death penalty. A sentencing trial is scheduled for next month on whether he should receive life in prison with or without parole." />
                      <outline text="At the time, I wrote a piece asking, &quot;What is the death penalty for?&quot; and wondering why it would have been taken off the table by allowing a plea deal, in the face of deep anger from of Afghan allies. I speculated the Army might want to avoid an unpleasant discussion of its own drug, in return for sparing Bales&apos; life." />
                      <outline text="At the plea hearing, Bales acknowledged using steroids, and there were also reports of drinking alcohol and snorting Valium. If he took Lariam, however, it could create a classic &quot;but for&quot; defense -- but for the drug the Army prescribed him, it&apos;s reasonable to argue the murder would not have occurred." />
                      <outline text="Absent that, the onus was on Bales for using banned substances, even if they affected his mental state to the point he committed the atrocity. But other soldiers have used alcohol, drugs, and steroids without killing men, women and children and setting some on fire." />
                      <outline text="As the New York Times wrote of his guilty plea:" />
                      <outline text="&quot;But the curtain of enigma about the man himself, and his descent into darkness and murder on the night of the killings, remained firmly in place. The millions of Americans who have pondered the mechanisms of atrocity since the attacks in March 2012 were left in the dark. Even Sergeant Bales himself, finally pressed by the presiding judge, Col. Jeffery Nance, to explain more deeply what happened, seemed baffled.&quot;" />
                      <outline text="&apos;&apos;There&apos;s not a good reason in this world for why I did the horrible things I did,&apos;&apos; he said." />
                      <outline text="Well, Lariam could be a good reason, not in the sense of an excuse but an explanation, one that might even have rendered Bales not criminally responsible. It would point a finger directly at what, in my view, amounts to a long-running coverup of the drug&apos;s toxic effects on both soldiers and civilians. I first wrote about it in 1999 and, with my reporting partner at UPI, Mark Benjamin, published a multi-part investigation." />
                      <outline text="&quot;A startling pattern of violence and suicide by America&apos;s most elite soldiers has followed their use of a controversial anti-malaria drug, an investigation by United Press International and CNN has found,&quot; we reported in 2004." />
                      <outline text="Those articles clearly showed aberrant behavior by highly trained troops who had taken the drug, and included a string of murder-suicides at Fort Bragg, N.C., in 2002 among troops recently returned from Afghanistan." />
                      <outline text="Certainly the VA is aware of the dangers, and has alerted vets it will consider disability claims based on the drug&apos;s psychiatric effects. Sen. Dianne Feinstein has written scalding letters to the Pentagon in the past trying to get it to stop - not just dial back - use of the drug, and the Bales massacre could be a direct result of ignoring those requests." />
                      <outline text="In its report to the FDA on what appears to be the Bales case, the drug manufacturer, Roche, notes Lariam should not have been prescribed to anyone with a history of traumatic brain injury, as Bales had. But that hardly exempts the pharmaceutical company, which tracked suicides from the drug beginning in the 1990s but just used the word &quot;depression&quot; -- on the theory that depression can lead to suicide, so there was no need to mention the more alarming word." />
                      <outline text="If nothing happens, and Bales is sentenced without any discussion of what role the drug may have played, our government will have basically gotten away with avoiding crucial questions that deserve answers. In less polite terms, the coverup would continue." />
                      <outline text="It would not be the first time, and, worst of all, probably not the last; the drug company acknowledges effects that include aggression and psychosis can last &quot;long after&quot; someone stops taking it -- and if the manufacturer is willing to go that far, that means they can basically last forever." />
                      <outline text="This delay and denial is a pattern that has played out not just in the military, which claims it can&apos;t understand the rate of suicide in soldiers and veterans, but across-the-board in a failure to detect, track, and acknowledge the sometimes terrible consequences of medical interventions and medicines." />
                      <outline text="This might be a good time for Sen. Feinstein to write another letter, one marked &quot;urgent,&quot; to the Secretary of Defense." />
                      <outline text="--" />
                      <outline text="Dan Olmsted is Editor of Age of Autism. His reporting, with Mark Benjamin, on the severe effects of Lariam on U.S. soldiers won best wire-service reporting from the National Mental Health Association in 2005." />
                      <outline text=" " />
                      <outline text=" " />
                      <outline text=" " />
                      <outline text=" " />
                      <outline text=" " />
                      <outline text=" " />
                      <outline text=" " />
              </outline>

              <outline text="BBC News - Swansea measles epidemic: Worries over MMR uptake after outbreak">
                      <outline text="Link to Article" type="link" url="http://www.bbc.co.uk/news/uk-wales-politics-23244628" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373486809_LeNtb3zn.html" />
      <outline text="Wed, 10 Jul 2013 20:06" />
                      <outline text="" />
                      <outline text="10 July 2013Last updated at07:26 ETSome parents are still ignoring the message to immunise their children against measles, an inquiry into the Swansea outbreak has heard." />
                      <outline text="A GP at the centre of the recent epidemic said some people had been invited to get their children vaccinated with the MMR jab 15 times." />
                      <outline text="Ian Millington gave evidence to the Welsh assembly&apos;s health committee." />
                      <outline text="The inquiry into the outbreak began on Wednesday, a week after it was declared over." />
                      <outline text="More than 1,200 people fell ill, 88 visited hospital and one person died in the outbreak which began in November." />
                      <outline text="The response cost Abertawe Bro Morgannwg University Health Board an estimated &#163;470,000." />
                      <outline text="The health board offered 35,000 vaccinations, including more than 5,000 for 10 to 18-year-olds - the main age group affected." />
                      <outline text="Last month the board said 95% of children and teenagers in Swansea, Neath Port Talbot and Bridgend had received one MMR jab for the first time." />
                      <outline text="So-called herd immunity is reached when 95% have had both doses." />
                      <outline text="Continue reading the main story1988: Combined measles, mumps and rubella (MMR) vaccine is introduced to the UK1998: Dr Andrew Wakefield&apos;s now discredited research is published linking the MMR jab to autism2003: MMR uptake for two-year-olds falls from a peak of 94% in 1995 to 78% by 2003. In Swansea it fell to 67.5%November 2012: Swansea outbreak starts when a small number of children return with measles from a holiday camp in south-west EnglandNovember 28: The first outbreak control meeting takes place. Abertawe Bro Morgannwg University Health Board agrees to provide a vaccination session for susceptible pupils in schoolsEarly 2013: Around 10 to 20 suspected measles cases are reported per weekFebruary 2013: By 7 February a total of 168 notifications have been received. A nationally-led response starts and a senior team meets for the first time on 18 February. The whole of the health board area is treated as an outbreak area18 April: Gareth Colfer-Williams, 25, is found dead at home in Port Tennant, Swansea. An inquest later found he died from pneumonia after contracting measles22 April: There is a rapid increase in cases. The outbreak reaches its peak, with nearly 200 notifications in a single week22 May: Last laboratory-confirmed case3 July: Outbreak declared overDr Millington, secretary of Abertawe Bro Morgannwg Local Medical Committee, said that until the outbreak the health service had been &quot;fighting a losing battle&quot; because of the now discredited research linking MMR to autism." />
                      <outline text="&quot;There was a refusal to have immunisation in the cohort that had not been immunised despite very considerable effort. Having said that we&apos;ve offered it whenever we can wherever we can,&quot; he said." />
                      <outline text="&quot;Some of the responses we get are really quite difficult. &apos;Mind your own business.&apos;" />
                      <outline text="&quot;People say &apos;Every time I come here you ask me about my child&apos;s immunisation status. Why don&apos;t you mind your own business?&apos;" />
                      <outline text="&quot;That&apos;s a very difficult conversation to have. I do think we&apos;ve tried everything else. Once the outbreak started I think things were different and I think different methods were used and I think they were effective." />
                      <outline text="&quot;But it is surprising how many people did not listen to the message and it&apos;s surprising how many people have still not listened to the message - they don&apos;t want to hear it.&quot;" />
                      <outline text="A drop in the number of children getting the MMR vaccine in Swansea 10 years ago has been blamed on the coverage of a link between autism and the MMR jab in the local press at the time. The link has since been discredited." />
                      <outline text="Uptake of the vaccine for two-year-olds in Wales fell from a quarterly peak of 94% in 1995 to 78% by 2003. In Swansea it fell to 67.5%." />
                      <outline text="It meant the region had a &quot;vulnerable&quot; age group, AMs were told." />
                      <outline text="Abertawe Bro Morgannwg University Health Board said Wales should capitalise from the boost in immunisations by launching a publicity campaign about MMR, particularly targeted at teenagers." />
                      <outline text="In evidence to the committee, Betsi Cadwaladr health board, which covers north Wales, said it had faced costs of &#163;90,000." />
                      <outline text="Aneurin Bevan health board in south east Wales spent &#163;60,000 on its emergency measles plan." />
                      <outline text="The Welsh government has praised the response to the outbreak, saying Wales had a public health system &quot;capable of leading and co-ordinating an intense and effective effort&quot;." />
                      <outline text="&quot;This enabled services to respond quickly and establish processes to deliver large numbers of vaccinations efficiently and effectively outside routine arrangements,&quot; it said." />
                      <outline text="However, the Welsh Conservatives said a full public inquiry was needed to learn the lessons of the outbreak." />
                      <outline text="In its evidence, the British Medical Association (BMA) said: &quot;A lack of experience in identifying the disease, both in the population and amongst medical and nursing staff, also meant that these initial cases might not have been diagnosed swiftly.&quot;" />
                      <outline text="Consideration was given to quarantining susceptible people, but it was judged that there was unlikely to be political or public support for the move, the BMA said." />
                      <outline text="When the outbreak reached &quot;the explosive growth stage&quot;, the NHS &quot;leapt to respond&quot;, it added." />
              </outline>

              <outline text="VIDEO-WTF: Justin Bieber Urinates Into Mop Bucket While Yelling &apos;F*ck Bill Clinton&apos; For Some Reason | Mediaite">
                      <outline text="Link to Article" type="link" url="http://www.mediaite.com/online/wtf-justin-bieber-urinates-into-mop-bucket-while-yelling-fck-bill-clinton-for-some-reason/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373473474_4bSUTayW.html" />
      <outline text="Wed, 10 Jul 2013 16:24" />
                      <outline text="" />
                      <outline text="When the Biebs needs to go, the Biebs needs to go." />
                      <outline text="Apparently unable to find a convenient restroom in a New York restaurant earlier this year, teen celebrity Justin Bieber relieved himself in a mop bucket." />
                      <outline text="The singer&apos;s actions were filmed by one of his friends, during which the group is heard to tell the restaurant&apos;s employees&apos;--who may or may not have been present&apos;--that they should feel honored Bieber chose their establishment to befoul." />
                      <outline text="&apos;&apos;That&apos;s the coolest spot to piss,&apos;&apos; an off-screen voice is heard to say. &apos;&apos;You&apos;ll forever remember that.&apos;&apos;" />
                      <outline text="&apos;&apos;You&apos;re not gonna remember him pissin&apos; in the restroom,&apos;&apos; says another member of the entourage. &apos;&apos;Like everybody does that.&apos;&apos;" />
                      <outline text="On the way up the staircase, Bieber grabbed a bottle of Windex and sprayed a photo of former President Bill Clinton while yelling, &apos;&apos;F*ck Bill Clinton!&apos;&apos; The last sentence heard before the video cuts off is &apos;&apos;Who stole my beer?!&apos;&apos;" />
                      <outline text="Bill Clinton is commonly credited with having created 21 million jobs during his presidency. Perhaps one of them was the busboy who got to clean up after Bieber." />
                      <outline text="Watch the field trip here, courtesy TMZ:" />
                      <outline text="[h/t TMZ]" />
                      <outline text="&apos;--&gt;&gt; Follow Evan McMurry (@evanmcmurry) on Twitter" />
              </outline>

              <outline text="More Frequent, Devastating Hurricanes Coming Due to Climate Change - AccuWeather.com">
                      <outline text="Link to Article" type="link" url="http://www.accuweather.com/en/features/trend/more_major_hurricanes_coming_t/15072258" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373468582_Brprx9hv.html" />
      <outline text="Wed, 10 Jul 2013 15:03" />
                      <outline text="" />
                      <outline text="More Frequent, Devastating Hurricanes Coming Due to Climate ChangeJuly 09, 2013; 8:04 AM" />
                      <outline text="Strong hurricanes could hit Asia and the U.S. East Coast more often this century, a new study finds." />
                      <outline text="The research adds to a growing body of evidence that hurricanes are becoming more intense as global warming heats the oceans. This means Category 1, 2 and 3 storms will have fiercer winds, bumping them up to Category 3, 4 and higher. Overall, the study&apos;s modeling approach predicts a 40 percent global increase in tropical cyclones of Category 3 and higher during the 21st century." />
                      <outline text="The findings were published in today&apos;s (July 8) issue of the journal Proceedings of the National Academy of Sciences." />
                      <outline text="The new study also projects that these strong storms will become more frequent in the North Pacific, the North Atlantic and the South Indian Oceans." />
                      <outline text="&quot;We see an increase, in particular, toward the middle of the century,&quot; said Kerry Emanuel, study author and an MIT climatologist. &quot;The results surprised us, but we haven&apos;t gotten so far as to understand why this is happening.&quot;" />
                      <outline text="Scientists actively debate whether tropical cyclones (the broad name for hurricanes, typhoons and tropical storms) will become more frequent, more intense or both as a result of climate change. Global warming has heated the oceans along with the atmosphere, and sea-surface temperature is one of the most important influences on hurricane strength. But other factors - such as climate cycles, like the El Ni&#177;o Southern Oscillation, and interactions with other storms, which can weaken or strengthen storms - also alter tropical storm strength. Hurricanes are also marvelous heat transporters, affecting climate by moving energy around the planet. [Hurricanes from Above: See Nature&apos;s Biggest Storms]" />
                      <outline text="&quot;For scientists, this is far from a solved problem,&quot; said Emanuel, who has been a main participant in the debates on the future of hurricanes. &quot;The main message is, we have to continue to regard there being a not-trivial risk of increasing problems from tropical cyclones because of climate change.&quot;" />
                      <outline text="Hurricane Sandy Credit: NOAA | NASA." />
                      <outline text="How global warming fuels hurricanes" />
                      <outline text="Hurricanes feed off warm ocean water. In the ocean&apos;s hurricane nurseries, heat rising from the ocean turns into water vapor. As the vapor rises and cools, it condenses into rain. This releases heat, which helps strengthen circulating tropical cyclones. Warmer oceans mean more water vapor, and more intense storms." />
                      <outline text="Emanuel relies on a technique called downscaling to estimate how future climate change will shift hurricane strength and frequency. In the new study, he used the latest global climate models, called CMIP5, which project future climate change but are too coarse to resolve &quot;small&quot; features, such as hurricanes. Emanuel ran the models at higher-resolution and randomly generated disturbances similar to tropical cyclones, and then used a theoretical model to predict how strong the storms would become. Emanuel first presented this approach, with an earlier version of the CMIP models (CMIP3), in a 2008 paper in the Bulletin of the American Meteorological Society." />
                      <outline text="One limitation of relying on global climate models to predict future hurricanes is that these models do not capture the past decade&apos;s climate variability, such as relatively stable temperatures between 1998 and 2008, said Peter Webster, a climatologist at Georgia Tech who was not involved in the study. (The hiatus is attributed to natural variability in Earth&apos;s climate system, superimposed on the longer-term warming trend.)" />
                      <outline text="&quot;It should be remembered that the study is a model interpretation of how things might be,&quot; Webster said. &quot;So, elegant as [the study] is, it is not going to tilt the scales on global warming one way or the other. The scales will be tilted substantially once we understand the role of tropical cyclones in climate and how tropical cyclones, in turn, modify climate itself.&quot;" />
                      <outline text="More storms in Asia, Atlantic Coast" />
                      <outline text="In the new study, the North Pacific Ocean basin showed the strongest change in tropical-cyclone frequency and intensity. This means Asia and its global supply chains will be hit hardest by the changes, with higher-intensity storms striking more often, said Matthew Huber, a climatologist and director of the Purdue University Climate Change Research Center who was not involved in the study. [How Strong Can a Hurricane Get?]" />
                      <outline text="In addition, the model predicts that the North Atlantic and South Indian Oceans will also see an increase in storm frequency and intensity. This contradicts Emanuel&apos;s earlier research and other studies based on the previous generation of climate models, which predicted fewer but stronger hurricanes in the North Atlantic, the basin where storms that threaten the East Coast and Southeast form. However, a recent study of coastal storm surge records in the southern United States supports Emanuel&apos;s new data." />
                      <outline text="But Huber said Emanuel&apos;s results for the East Coast are not well supported by previous research and should be viewed as less certain." />
                      <outline text="But something the scientists do agree on is that coastal cities need to improve their defenses, as sea level rise alone will increase the vulnerability of such areas to storm surge." />
                      <outline text="&quot;The result represents a significant upward revision of previous estimates of tropical cyclone activity in a warmer world, so it is unlikely that communities and states are prepared for, or even preparing for, the magnitude of future risks appropriately,&quot; Huber said." />
                      <outline text="EmailBecky Oskinor follow her@beckyoskin.Follow us@livescience,Facebook&amp;Google+. Original article onLiveScience.com." />
                      <outline text="Copyright 2013 LiveScience, a TechMediaNetwork company. All rights reserved. This material may not be published, broadcast, rewritten or redistributed." />
                      <outline text="By Becky Oskin, Staff WriterContinue Reading on LiveScience.com &gt;" />
              </outline>

              <outline text="Moundalexis.com: /bin/rm: Argument list too long.">
                      <outline text="Link to Article" type="link" url="http://www.moundalexis.com/archives/000035.php" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373468333_HPDVE3FF.html" />
      <outline text="Wed, 10 Jul 2013 14:58" />
                      <outline text="" />
                      <outline text="/bin/rm: Argument list too long.After years working with BSD and Linux, this morning I was limited by rm. Apparently there is a maximum number of files that can be passed as arguments to rm. Thankfully, there&apos;s an easy workaround." />
                      <outline text="Using rm to delete files is as natural to many as breathing, particularly in the BSD/Linux community. Whether it be removing a single named file, a directory, or a set of files using a complex regular expression; rm is generally used with ease on a daily basis. So imagine my surprise when an apparently simple rm command doesn&apos;t work." />
                      <outline text="I use amavisd-new to perform spam/virus checks on my email. I think it&apos;s an excellent method for controlling email of questionable content, since it allows the administrator much control in what action to take when dealing with spam/virus-loaded messages. Without getting into a lot of details, one of the things I have amavisd-new configured to do is move spam/virus mail scored at a particular threshold to /var/virusmails. They aren&apos;t delivered to the end user, and they are contained in a location only available to root." />
                      <outline text="As you can see, each message classified as spam is gzipped in a timestamp sort of fashion. The same goes for the viruses, although they aren&apos;t gzipped." />
                      <outline text="root@mx /var/virusmails # lsrazor-agent.logspam-3398a20c9a59797df9b57fbe34feeace-20040519-084342-19051-05.gzspam-57e230b6d1dca0dadf83d858d0b10788-20040519-084400-19144-03.gzspam-6f3be6d2304f90e418db23443916101a-20040519-082357-18227-10.gzvirus-20040419-091017-12544-01virus-20040419-130621-14993-07virus-20040421-120113-57877-07virus-20040421-165651-61698-07virus-20040423-020850-90966-03virus-20040423-090733-97665-04virus-20040427-211030-99133-07virus-20040427-225312-01622-01virus-20040428-190241-18845-05virus-20040505-103654-59956-10After a time, these messages begin to fill /var rather needlessly. My /var partition isn&apos;t monstrously large. So from time to time I go in and remove the spam archives. The last example was after a recent removal, hence only three spam messages." />
                      <outline text="So I went in and attempt to remove all the files starting with &quot;spam-&quot; - simple enough, right?" />
                      <outline text="root@mx /var/virusmails # rm spam-*/bin/rm: Argument list too long.Wrong. The irritating (if not slightly elusive) error message. How many files was I dealing with here?" />
                      <outline text="root@mx /var/virusmails # ls -1 | grep virus | wc -l 1667After a brief search -- checking out limitations on rm and tcsh -- the only useful information that I could find regarding maximum number of arguments was from rm&apos;s manpage. It states that &quot;[t]he rm command uses getopt(3) to parse its arguments,&quot; which doesn&apos;t tell me a whole lot. Perhaps it can&apos;t handle more than 1024 arguments?" />
                      <outline text="The workaround is simple enough. Use find to pipe all the matching files to rm, one at a time." />
                      <outline text="root@mx /var/virusmails # find . -name &apos;spam-*&apos; | xargs rmWorks like a charm." />
                      <outline text="May 25, 2004 - Update" />
                      <outline text="I&apos;ve received a handful of emails from Slashdot readers about this article, offering more information on this issue. The most well researched one came from John Simpson, who originally saw (and answered) a similar question on the Linux Enthusiasts &amp; Professionals mailing list. While my solution does work for the files in question (in this case), John&apos;s comments describe some of its limitations, as well as some history on why the limits are there to begin with." />
                      <outline text="i found your site through a slashdot link, and your comment about &quot;rm:Argument list too long&quot; caught my eye... i have a correction and anexplanation of what the problem really is... it&apos;s not a limitation of&quot;rm&quot; or of your shell, it&apos;s a limit inside the kernel.first the correction: the &quot;find | xargs rm&quot; thing only worked correctlybecause none of the filenames involved had any spaces in them. if thefilenames involved have spaces, you will need to do use find&apos;s&quot;-print0&quot; option in conjunction with xargs&apos;s &quot;-0&quot; option. otherwise theshell that xargs uses to execute the &quot;rm&quot; command line will treat thespace as a token separator, thereby treating the name as two (or more)names, none of which are the thing you&apos;re trying to actually delete.the command line should look like this...find . -name &apos;spam-*&apos; -print0 | xargs -0 rmand the explanation: in the linux kernel is the function execve(),which is how all of the other exec() functions (execl, execlp, execle,etc.) are actually implemented. the way it works is by creating a 128Kbuffer at the top end of the memory space and copying the command lineand environment for the new process into this space. it then loads thenew program into memory, sets its argv and envp pointers, and jumps toits entry point.there&apos;s a lot more to it than that, but the point is that there is a128K buffer which is the only thing &quot;held&quot; from the parent process tothe child. the &quot;Argument list too long&quot; error message is actually thekernel&apos;s E2BIG error code, returned when the execve() is not able tofit the supplied argument list and environment into the 128K buffer.this came up a while back on my linux user group&apos;s mailing list, withsomebody who wanted some obscenely huge number of environmentvariables. i got curious and walked the kernel source code in order tofind the answer. my post is here...http://leap-cf.org/oldarchive/2004-May/038802.htmlthe mailing list archiver didn&apos;t clean up the extra &quot;=20&quot; marks thatgpg put at the end of each line when it signed it, but other than thatit&apos;s pretty clear.For a more in depth technical explanation regarding the Linux kernel, read John&apos;s orginal post to the LEAP list. While I use BSD kernels, I imagine that there are similar (if not identical) limits there as well." />
                      <outline text="Thanks John!" />
              </outline>

              <outline text="Obama claims broccoli is his favorite food">
                      <outline text="Link to Article" type="link" url="http://mobile.reuters.com/article/idUSBRE96819X20130709?irpc=932" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373459515_KPvT8WC8.html" />
      <outline text="Wed, 10 Jul 2013 12:31" />
                      <outline text="" />
                      <outline text="Obama claims broccoli is his favorite foodTop News" />
                      <outline text="Obama claims broccoli is his favorite food" />
                      <outline text="Tue, Jul 09 18:31 PM EDT" />
                      <outline text="WASHINGTON (Reuters) - President Barack Obama likes burgers, hot dogs and such, but when it came time to answer a kid journalist&apos;s question about his favorite food, broccoli was the first word that sprang from his lips." />
                      <outline text="This revelation came on Tuesday at a White House event that recognized children who won a healthy recipe contest, as part of first lady Michelle Obama&apos;s anti-obesity campaign." />
                      <outline text="Having fun with the children, Obama agreed to take two questions from the journalists among them. The first asked what was Obama&apos;s favorite food. Broccoli was the presidential reply, according to a White House aide." />
                      <outline text="This from a politician who has literally eaten his way across the country: Burgers in a Washington suburb with Russian Prime Minister Dmitry Medvedev; ribs in Asheville, North Carolina; hot dogs at a basketball game in Dayton, Ohio; and a tasty pastry called a kringle in Wisconsin." />
                      <outline text="Obama&apos;s disclosure puts him starkly at odds with the culinary tastes of George H.W. Bush, who as president famously declared his dislike for broccoli." />
                      <outline text="&quot;And I haven&apos;t liked it since I was a little kid and my mother made me eat it. And I&apos;m president of the United States, and I&apos;m not going to eat any more broccoli!&quot; Bush said in 1990." />
                      <outline text="Steamed broccoli growers shipped thousands of pounds of broccoli to the White House in protest, and the vegetable was farmed out to homeless shelters." />
                      <outline text="Obama was clearly enjoying the spirit of the anti-obesity event, called the &quot;Kids&apos; State Dinner,&quot; which recognized winning recipes like &quot;picky eater pita pizza pockets&quot; and &quot;sweet potato turkey sliders.&quot;" />
                      <outline text="&quot;Food can be fun. It can be healthy,&quot; Obama said. &quot;You are setting up habits that are going to be great your entire life.&quot;" />
                      <outline text="He joked that he&apos;s not much of a cook. &quot;(In) my family, when they cooked vegetables, they were all boiled.&quot; Since then, he said, he has learned that healthy food can also taste good." />
                      <outline text="(Reporting by Steve Holland; Editing by Stacey Joyce)" />
                      <outline text="Obama claims broccoli is his favorite foodTop News" />
                      <outline text="Obama claims broccoli is his favorite food" />
                      <outline text="Tue, Jul 09 18:31 PM EDT" />
                      <outline text="WASHINGTON (Reuters) - President Barack Obama likes burgers, hot dogs and such, but when it came time to answer a kid journalist&apos;s question about his favorite food, broccoli was the first word that sprang from his lips." />
                      <outline text="This revelation came on Tuesday at a White House event that recognized children who won a healthy recipe contest, as part of first lady Michelle Obama&apos;s anti-obesity campaign." />
                      <outline text="Having fun with the children, Obama agreed to take two questions from the journalists among them. The first asked what was Obama&apos;s favorite food. Broccoli was the presidential reply, according to a White House aide." />
                      <outline text="This from a politician who has literally eaten his way across the country: Burgers in a Washington suburb with Russian Prime Minister Dmitry Medvedev; ribs in Asheville, North Carolina; hot dogs at a basketball game in Dayton, Ohio; and a tasty pastry called a kringle in Wisconsin." />
                      <outline text="Obama&apos;s disclosure puts him starkly at odds with the culinary tastes of George H.W. Bush, who as president famously declared his dislike for broccoli." />
                      <outline text="&quot;And I haven&apos;t liked it since I was a little kid and my mother made me eat it. And I&apos;m president of the United States, and I&apos;m not going to eat any more broccoli!&quot; Bush said in 1990." />
                      <outline text="Steamed broccoli growers shipped thousands of pounds of broccoli to the White House in protest, and the vegetable was farmed out to homeless shelters." />
                      <outline text="Obama was clearly enjoying the spirit of the anti-obesity event, called the &quot;Kids&apos; State Dinner,&quot; which recognized winning recipes like &quot;picky eater pita pizza pockets&quot; and &quot;sweet potato turkey sliders.&quot;" />
                      <outline text="&quot;Food can be fun. It can be healthy,&quot; Obama said. &quot;You are setting up habits that are going to be great your entire life.&quot;" />
                      <outline text="He joked that he&apos;s not much of a cook. &quot;(In) my family, when they cooked vegetables, they were all boiled.&quot; Since then, he said, he has learned that healthy food can also taste good." />
                      <outline text="(Reporting by Steve Holland; Editing by Stacey Joyce)" />
              </outline>

              <outline text="Getting Started With the BeagleBone Black: A 1GHz ARM Linux Machine for $45 | Linux.com">
                      <outline text="Link to Article" type="link" url="http://www.linux.com/learn/tutorials/725368-getting-started-with-the-beaglebone-black-a-1ghz-arm-linux-machine-for-45/?hootPostID=93fbe8d7678b0edbc1dceb32d25e7047" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373427502_jAbE5D6b.html" />
      <outline text="Wed, 10 Jul 2013 03:38" />
                      <outline text="" />
                      <outline text="The BeagleBone Black (BBB) provides a 1GHz ARM Cortex-A8 with 512Mb of RAM and 2Gb of eMMC flash from which you can run a GNU/Linux system around a 3.8 Linux Kernel. Throw ethernet, HDMI, and a load of IO pins into the mix and you have a little machine that straddles the border between embedded Linux and the Arduino world. The Black is the latest addition to the Beagle series of ARM-based, single-board computers and is based on the BeagleBone before it. The package I got with the BBB contained the board and a single USB cable. You can power the BBB over the USB cable from a HUB so a dedicated power brick is not a necessity." />
                      <outline text="Looking at the rows of 46 pins on each side of the BBB indicates that the board is very useful for many hardware projects. Depending on how you configure your BBB you can have up to 65 general-purpose, digital IO pins, 8 PWMs, 4 timers, 7 1.8V analog inputs, some serial UARTs, 2 I2C, and 2 SPI along with access to 3.3V and 5V. Some of the pins can be used for multiple purposes. For example, pin 17 on one header serves as a digital IO pin, an I2C, and an SPI pin, so you have to choose for which purpose you want to use it. The two header blocks on the BBB are referred to as the P8 and P9." />
                      <outline text="The HDMI output on the BBB is implemented by bringing a &quot;cape&quot; onto the main board. Capes are what the Beagle community calls the cards, which can be attached to the pin headers, similar to what are called Shields in the Arduino world. The HDMI output on the BBB uses a collection of the general-purpose output pins from the two headers on the BBB. Specifically, it wants 3 SPI pins on header P9 and 30 pins on the P8 header. So if you have an HDMI display then you lose about 2/3 of the pins on the P9 header. More disturbing, if you are planning to output to a 1080 display you can only get a 24Hz output at that resolution (Page 68 of the System Reference Manual). Though that limitation has changed over software revisions." />
                      <outline text="Getting Started with the BeagleBone BlackWhen I first booted the BBB I got a graphical display over its HDMI but I couldn&apos;t get any mouse or keyboard to work on any USB port with either a passive or powered hub. That was when I decided I needed to update to the latest software before proceeding. The first step in updating the Linux distribution on the eMMC of the BBB is to download the Angstrom Distribution eMMC flasher from the Latest Images. Use unxz to uncompress the downloaded image and dd to write it to a microSD card. Many of the directions, including those that came on my BBB itself are very Windows-centric." />
                      <outline text="Once you have written the roughly 4GB image to a microSD card, turn off the BBB, insert the card into the BBB, and apply power while holding the &quot;boot&quot; button which is on the opposite side of the BBB from where the microSD card plugs in. During flashing, the LEDs will flash and when done all the LEDs will remain on. For me, the flashing procedure took around an hour to complete." />
                      <outline text="After updating the eMMC I found that if I booted the BBB with a network cable plugged in, I never got HDMI output. To get a display I had to boot without the network cable and then plug in the network cable to gain network access." />
                      <outline text="Power wise, the BBB drew 2.7 Watts sitting idle at a 720p desktop with a passive hub, keyboard and mouse connected but without a network connection. Plugging in an ethernet cable boosted the draw to 3.2 W. Running the CPU at 100 percent moved to 3.9 W total. Disconnecting the hub (and thus keyboard and mouse) dropped the power draw by 0.8 W." />
                      <outline text="How to Use the GPIO PinsAccess to the various pins in the headers on the left and right side of the BBB is done through the Linux kernel using its GPIO Interfaces. To demonstrate how to give this a spin I attached an LED from pin 42 (GPIO_7) to the ground pin 44 next to it. That is the red LED shown in the photo, above. The BBB booted up without the LED lit." />
                      <outline text="To get the LED to shine you have to map the GPIO_7 pin into the filesystem. This is done by echoing the GPIO pin into the export file. As you can see, below, I created the new gpio7 link using the export file in order to control that pin. The value is initially zero but when I echo high into the direction the LED lit up!" />
                      <outline text="root@bbb:/sys/class/gpio# echo 7 &gt; /sys/class/gpio/exportroot@bbb:/sys/class/gpio# ls -lhtotal 0--w------- 1 root root 4.0K Jun 1 10:54 exportlrwxrwxrwx 1 root root 0 Jun 1 10:54 gpio7 -&gt; ../../devices/virtual/gpio/gpio7lrwxrwxrwx 1 root root 0 Jan 1 2000 gpiochip0 -&gt; ../../devices/virtual/gpio/gpiochip0lrwxrwxrwx 1 root root 0 Jan 1 2000 gpiochip32 -&gt; ../../devices/virtual/gpio/gpiochip32lrwxrwxrwx 1 root root 0 Jan 1 2000 gpiochip64 -&gt; ../../devices/virtual/gpio/gpiochip64lrwxrwxrwx 1 root root 0 Jan 1 2000 gpiochip96 -&gt; ../../devices/virtual/gpio/gpiochip96--w------- 1 root root 4.0K Jan 1 2000 unexportroot@bbb:/sys/class/gpio# cd gpio7root@bbb:/sys/class/gpio/gpio7# cat value 0root@bbb:/sys/class/gpio/gpio7# echo low &gt; direction root@bbb:/sys/class/gpio/gpio7# echo high &gt; direction To use GPIO pins that are not connected to the first gpio controller chip (which controls 32 pins), you should refer to the Expansion Header Pinout table in the System Reference Manual to calculate the correct number to echo into the exports file. For example GPIO_51 on pin 16 of the P9 header is gpio1[19]. This makes it the 19th pin on the second gpio controller so you would echo 32+19=51 into the exports file to access GPIO_51." />
                      <outline text="One issue I encountered with the hardware design is that the large USB port on the BBB is very close to the microHDMI port which is attached to the other side of the board. The common combination of plugging in cables to both ports left the cable sleaves pushing each other slightly." />
                      <outline text="In my next article on the BBB I&apos;ll show benchmarks for its CPU, along with performance figures for the eMMC flash that comes on the board." />
              </outline>

              <outline text="Canada Day Pressure Cooker Bomb Plot Will Go Straight To Canadian Supreme Court">
                      <outline text="Link to Article" type="link" url="http://www.youtube.com/watch?v=3QiVVW6d3MI&amp;feature=youtube_gdata" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373426790_dTLMV2tE.html" />
        <outline text="Source: Uploads by MOXNEWSd0tC0M" type="link" url="http://gdata.youtube.com/feeds/base/users/MOXNEWSd0tC0M/uploads?alt=rss&amp;v=2&amp;orderby=published&amp;client=ytapi-youtube-profile" />
      <outline text="Wed, 10 Jul 2013 03:26" />
                      <outline text="" />
              </outline>

              <outline text="MSNBC&apos;s Michael Eric Dyson: Justice System Racist Against Black People, &apos;&apos;George Zimmermans Of The World Continue To Get Away With Killing&apos;&apos; Black Kids&apos;...">
                      <outline text="Link to Article" type="link" url="http://weaselzippers.us/2013/07/09/msnbcs-michael-eric-dyson-justice-system-racist-against-black-people-george-zimmermans-of-the-world-continue-to-get-away-with-killing-black-kids/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373426165_HaQBjAg8.html" />
        <outline text="Source: Weasel Zippers" type="link" url="http://weaselzippers.us/feed/" />
      <outline text="Wed, 10 Jul 2013 03:16" />
                      <outline text="" />
                      <outline text="WARNING: Watching this video may cause your eyes to bleed." />
                      <outline text="Via Mediaite:" />
                      <outline text="On Tuesday, Georgetown University Professor Michael Eric Dyson told MSNBC&apos;s Martin Bashir that he believes, if the racial distinctions were reversed in the case against George Zimmerman for the 2012 murder of Trayvon Martin, the public&apos;s reaction to the cases would be dramatically different. He added that the &apos;&apos;George Zimmermans of the world continue to get away&apos;&apos; with &apos;&apos;the killing of our children&apos;&apos; without facing justice. [...]" />
                      <outline text="&apos;&apos;Time and again, for one reason or another, young black people lose their lives and it is seen as the necessary condition for the justice system to prevail,&apos;&apos; Dyson insisted." />
                      <outline text="He asked if the victim in this case were white, or if Zimmerman were black, &apos;&apos;would we see the same outcome?&apos;&apos;" />
                      <outline text="&apos;&apos;The unfortunate and tragic reality is that our children of color pay the price for the contradictions in a justice system,&apos;&apos; he declared. &apos;&apos;And the George Zimmermans of the world continue to get away, if it is true, with the killing of our children without necessarily facing the kind of consequences that a justice system would demand.&apos;&apos;" />
              </outline>

              <outline text="Pro-Abortion Fanatics Shout &apos;&apos;Fuck The Church&apos;&apos; During Chants At Texas Capitol&apos;...">
                      <outline text="Link to Article" type="link" url="http://weaselzippers.us/2013/07/09/pro-abortion-fanatics-shout-fuck-the-church-during-chants-at-texas-capitol/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373426133_hvaXvNP9.html" />
        <outline text="Source: Weasel Zippers" type="link" url="http://weaselzippers.us/feed/" />
      <outline text="Wed, 10 Jul 2013 03:15" />
                      <outline text="" />
                      <outline text="Class acts." />
                      <outline text="Via LifeNews:" />
                      <outline text="The pro-abortion madness is continuing for yet another week. On the heels of death threats from an abortion activist to the Lt. Governor comes another outrage." />
                      <outline text="As members of the Texas legislature attempt to debate a bill that would ban late-term abortions after 20 weeks, abortion activists are shouting." />
                      <outline text="The typical pro-abortion chant goes something like this: &apos;&apos;Women must decide their fate, not the church, not the state.&apos;&apos; Bryan Kemper of Stand True is on the scene with his staff and says many of the dozens of abortion advocates screaming tonight in the Texas capitol are replacing &apos;&apos;not the church&apos;&apos; with &apos;&apos;f&apos;-- the church.&apos;&apos;" />
                      <outline text="Keep reading&apos;..." />
              </outline>

              <outline text="Fugitive Snowden is likely Venezuela bound: U.S. journalist">
                      <outline text="Link to Article" type="link" url="http://www.reuters.com/article/2013/07/10/us-usa-security-snowden-greenwald-idUSBRE96901G20130710?feedType=RSS&amp;feedName=worldNews" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373426032_JJPMXxvs.html" />
        <outline text="Source: Reuters: World News" type="link" url="http://feeds.reuters.com/reuters/worldNews" />
      <outline text="Wed, 10 Jul 2013 03:13" />
                      <outline text="" />
                      <outline text="Glenn Greenwald, the blogger and journalist who broke the U.S. National Security Agency (NSA) surveillance scandal, uses his lapton after an exclusive interview with Reuters in Rio de Janeiro July 9, 2013." />
                      <outline text="Credit: Reuters/Sergio Moraes" />
                      <outline text="By Paulo Prada" />
                      <outline text="RIO DE JANEIRO | Tue Jul 9, 2013 10:02pm EDT" />
                      <outline text="RIO DE JANEIRO (Reuters) - Fugitive former U.S. intelligence contractor Edward Snowden will likely accept asylum in Venezuela to escape prosecution in the United States, said Glenn Greenwald, the U.S. journalist who first published the secret documents that Snowden leaked." />
                      <outline text="In an interview immediately after speaking to Snowden by online chat on Tuesday, Greenwald said that Venezuela - one of three Latin American countries that have offered Snowden asylum - is the one most likely to guarantee his safety, especially as the United States pressures other nations not to take him if he is able to leave his current limbo at a Russian airport." />
                      <outline text="Nicaragua and Bolivia have also said they would accept Snowden but Venezuela is better poised &quot;to get him safely from Moscow to Latin America and to protect him once he&apos;s there,&quot; Greenwald said. &quot;They&apos;re a bigger country, a stronger country and a richer country with more leverage in international affairs.&quot;" />
                      <outline text="WikiLeaks, the anti-secrecy group that has been advising Snowden on his legal options in the search for asylum, suggested earlier on Tuesday that new developments in Snowden&apos;s search could unfold on Wednesday." />
                      <outline text="Greenwald, though, said a resolution to the crisis is still unclear and could take &quot;days or hours or weeks.&quot;" />
                      <outline text="Greenwald, a blogger and columnist for the London-based Guardian newspaper, said he based his opinion on an &quot;informed guess&quot; after recent contacts with Snowden." />
                      <outline text="Those discussions, he said, also lead him to believe that the trove of documents that Snowden took from the U.S. National Security Agency, or NSA, remains safely out of the hands of any foreign governments." />
                      <outline text="Greenwald returned to his home in Rio de Janeiro after a June meeting with Snowden in Hong Kong, from where Greenwald published the first of many reports that rattled the U.S. intelligence community by disclosing the breadth and depth of alleged surveillance by the NSA on telephone and internet usage of U.S. citizens." />
                      <outline text="The reports also appear to shed light on efforts by U.S. intelligence to get similar data in Europe, Latin America and elsewhere." />
                      <outline text="At first, Greenwald lost contact with Snowden as the former contractor traveled from Hong Kong to Russia in search of a destination that would shield him from U.S. prosecutors. On Saturday, however, Snowden reached out to Greenwald via an encrypted internet chat service the two use to communicate." />
                      <outline text="SNOWDEN&apos;S CHALLENGE" />
                      <outline text="Since then, Greenwald said, Snowden has explained his options but given no clear sign of how soon he might travel. While Russia has denied him entry beyond the international area of a Moscow airport terminal, Snowden has had Internet access and been able to communicate with those seeking to help him." />
                      <outline text="&quot;He&apos;s not in anyone&apos;s custody or detention and never has been,&quot; Greenwald said." />
                      <outline text="Snowden&apos;s challenge, he added, is &quot;figuring out how to get to the country that has offered him asylum&quot; despite the efforts of the United States, which Greenwald characterized as &quot;the rogue, lawless empire that has proven itself willing to engage in rogue behavior to prevent him physically from getting there.&quot;" />
                      <outline text="Greenwald dismissed suggestions that Snowden&apos;s passage through China and Russia had given authorities in either country the opportunity to seize the intelligence in his possession." />
                      <outline text="&quot;He gave no information of any kind to the Chinese government or the Russian government,&quot; Greenwald said." />
                      <outline text="Media reports have said Snowden is traveling with numerous laptop computers but Greenwald said the former contractor is not foolish enough to store information where it could be easily seized." />
                      <outline text="&quot;There are all sorts of smarter and safer ways for someone who knows what they&apos;re doing - and he knows what he&apos;s doing - to store and carry large amounts of data.&quot;" />
                      <outline text="Greenwald is facing pressure of his own as he filters through the more than 5,000 documents, a sliver of the entire trove, that Snowden gave him. In addition to a media onslaught and criticism by opponents of the leaks back in the United States, Greenwald said he may have already been targeted by intelligence forces." />
                      <outline text="While in Hong Kong, he said he told his longtime boyfriend, a Brazilian communications student, on an Internet call that he would send him some of the documents by email. Two days later, Greenwald said, his boyfriend&apos;s laptop went missing from their Rio home." />
                      <outline text="Greenwald said he has no evidence of a break-in, but that &quot;obviously it&apos;s a possibility.&quot;" />
                      <outline text="Now, Greenwald said, he is focused on digesting the rest of the documents and writing additional stories, a process he expects to last months. Future coverage, he said, would shed more light on how the NSA collects data and interacts with telecommunications, software companies and other intelligence agencies in the United States." />
                      <outline text="Without giving further details, Greenwald said the bulk of his energy would go toward figuring out how to corroborate and explain what is often highly technical and arcane subject matter in the documents. &quot;You can really alienate people with the technological and legal complexity of the stories.&quot;" />
                      <outline text="Despite Snowden&apos;s recent association with WikiLeaks, which in recent years upended intelligence circles with high-profile military leaks of its own, Greenwald said Snowden is unlikely to disclose the rest of his intelligence in the large, unprocessed quantities that WikiLeaks has used in the past." />
                      <outline text="&quot;If he had wanted a WikiLeaks-style document dump he could have gone to them in the first instance,&quot; Greenwald said." />
                      <outline text="Greenwald said he has for years sought to scrutinize and draw attention to the scope of U.S. intelligence gathering." />
                      <outline text="&quot;I have been trying to do everything possible to expose the excesses of the NSA and the dangers of extreme secrecy behind which the U.S. government operates,&quot; he said. &quot;So to be essentially given thousands of top secret documents that prove all the things I have been saying ... and much more ... is very invigorating.&quot;" />
                      <outline text="(Reporting by Paulo Prada; Editing by Kieran Murray and Lisa Shumaker)" />
                      <outline text="Link thisShare thisDigg thisEmailReprints" />
              </outline>

              <outline text="New Cell Phone Spying Revelations: Phones Near Targeted Individual Remotely Activated As Bugs">
                      <outline text="Link to Article" type="link" url="http://dprogram.net/2013/07/09/new-cell-phone-spying-revelations-phones-near-targeted-individual-remotely-activated-as-bugs/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373425430_dwKW89mv.html" />
        <outline text="Source: Dprogram.net" type="link" url="http://dprogram.net/feed" />
      <outline text="Wed, 10 Jul 2013 03:03" />
                      <outline text="" />
                      <outline text="July 9th, 2013" />
                      <outline text="(MarkDice) &apos;&apos; New Cell Phone Spying Revelations: Phones Near Targeted Individual Remotely Activated As Bugs If Their Phone&apos;s Mic is Muffled or Has the Battery Removed." />
                      <outline text="Tags: battery removed, bugs, cell phone spying, dice, mark, mic, targeted remotelyThis entry was posted on Tuesday, July 9th, 2013 at 7:49 pm and is filed under Dictatorship, Education/Mind Control, Fascism, Film/Video, Martial Law/Police State, NWO. You can follow any responses to this entry through the RSS 2.0 feed. You can skip to the end and leave a response. Pinging is currently not allowed." />
              </outline>

              <outline text="Maddow: Ron Paul And Rand Paul Are RACISTS!">
                      <outline text="Link to Article" type="link" url="http://www.youtube.com/watch?v=OkzjZ6Wocjg&amp;feature=youtube_gdata" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373425360_jZutJHLG.html" />
        <outline text="Source: Uploads by MOXNEWSd0tC0M" type="link" url="http://gdata.youtube.com/feeds/base/users/MOXNEWSd0tC0M/uploads?alt=rss&amp;v=2&amp;orderby=published&amp;client=ytapi-youtube-profile" />
      <outline text="Wed, 10 Jul 2013 03:02" />
                      <outline text="" />
              </outline>

              <outline text="Re: The Decline of Shortwave Radio Means the Spread of World Conflict">
                      <outline text="Link to Article" type="link" url="http://radiopreppers.com/index.php/topic,512.msg4675.html#msg4675" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373425073_9xrAR4ZM.html" />
        <outline text="Source: Radio Preppers" type="link" url="http://radiopreppers.com/index.php?PHPSESSID=8ece1c9371845b163b56a6b8e202d5c2&amp;action=.xml;type=rss" />
      <outline text="Wed, 10 Jul 2013 02:57" />
                      <outline text="" />
                      <outline text="KC9TNH and geek - here&apos;s a link from the ARRL website:2012 Marks All Time High for Amateur Radio Licenses" />
                      <outline text="Here&apos;s the pertinent (for me) excerpt(s):" />
                      <outline text="&quot;... &apos;&apos;This is an all-time high for Technician, General and Amateur Extra class licensees,&apos;&apos; she said. &apos;&apos;When looking at the three current license classes, the number of Technicians, Generals and Amateur Extras peaked in December at 345,369, 163,370 and 130,736, respectively...(classes that saw growth)" />
                      <outline text="&quot;...The number of licensees increased at an average rate of 21 per day, while the number of US licensees has increased by 7 percent since 2008!&apos;&apos; More than 3000 new licenses were issued in 2012 than in 2011..." />
                      <outline text="The source data the article was drawn from comes from this FCC chart - check out the numbers for 2013...so far..." />
                      <outline text="Graphs of All FCC Licensees by License Class" />
                      <outline text="Oh, and if I&apos;m reading this correctly - in just the 4 years since 2008 - there have been over 49,000 new amateur licenses issued...that&apos;s the largest increase in the last 15 years...and 2007 actually corrected a seven year decline that started in 2002..." />
                      <outline text="No, I don&apos;t think truckers can account for this trend...." />
                      <outline text="Sent from my iPad using Tapatalk HD" />
              </outline>

              <outline text="Abortion restrictions pass Texas House, gain votes since Wendy Davis filibuster">
                      <outline text="Link to Article" type="link" url="http://twitchy.com/2013/07/09/abortion-restrictions-pass-texas-house-gain-votes-since-wendy-davis-filibuster/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373425043_eGwxhfDc.html" />
        <outline text="Source: Twitchy » US Politics" type="link" url="http://twitchy.com/category/us-politics/feed/" />
      <outline text="Wed, 10 Jul 2013 02:57" />
                      <outline text="" />
                      <outline text="It was Texas state Sen. Wendy Davis&apos; nearly 11-hour filibuster against new abortion restrictions that brought national attention to Texas&apos; debate over late-term abortion, but her efforts didn&apos;t sway many votes in the state House, at least in her direction. GOP consultant Matt Mackowiak and others noted that the legislation actually picked up a few votes." />
                      <outline text="Orange-shirted abortion rights activists crowded the rotunda and met Republican representatives with a chant of &apos;&apos;Shame on you!&apos;&apos;" />
                      <outline text="The bill moves to a final vote tomorrow in the House before moving to the Senate on Thursday." />
              </outline>

              <outline text="Fears Syrian War Spreading Into Lebanon">
                      <outline text="Link to Article" type="link" url="http://www.youtube.com/watch?v=5W4ZyMZQklw&amp;feature=youtube_gdata" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373423103_mnDYAPd4.html" />
        <outline text="Source: Uploads by MOXNEWSd0tC0M" type="link" url="http://gdata.youtube.com/feeds/base/users/MOXNEWSd0tC0M/uploads?alt=rss&amp;v=2&amp;orderby=published&amp;client=ytapi-youtube-profile" />
      <outline text="Wed, 10 Jul 2013 02:25" />
                      <outline text="" />
              </outline>

              <outline text="Pant Suits Gets Her Own Attack Watch-Style Website&apos;...">
                      <outline text="Link to Article" type="link" url="http://weaselzippers.us/2013/07/09/pant-suits-gets-her-own-attack-watch-style-website/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373422982_n24JWjMF.html" />
        <outline text="Source: Weasel Zippers" type="link" url="http://weaselzippers.us/feed/" />
      <outline text="Wed, 10 Jul 2013 02:23" />
                      <outline text="" />
                      <outline text="Via National Journal:" />
                      <outline text="With Hillary Clinton already facing attacks from the right, a Democratic super PAC specializing in opposition research is expanding its mission to playing defense." />
                      <outline text="American Bridge, which made a name for itself in the 2012 election by knocking down Republican candidates from Mitt Romney to Todd Akin, is launching a web site to defend potential Democratic presidential candidates in 2016. The web site, CorrecttheRecord2016.org, will aim to debunk attacks against Democrats while flogging gaffes and flip-flops by possible Republican contenders." />
                      <outline text="Fueled by the Supreme Court&apos;s ruling in the Citizens United case that opened the floodgates to super PACS, the oppo wars are evolving into an arms race. The American Bridge project comes less than three weeks after a new Republican super PAC, America Rising, started an anti-Clinton initiative called StopHillary2016.org. Another super PAC, American Crossroads, unleashed an online video in May criticizing Clinton&apos;s response to the attacks on the U.S. consulate in Benghazi that killed four people." />
                      <outline text="These missives against Clinton were answered only by an unofficial collection of her supporters, since the former Secretary of State, U.S. senator and First Lady is not an elected official or a candidate. (She has not officially endorsed a super PAC, called Ready for Hillary, trying to build support for her presidential bid.) In the meantime, Democrats and Republicans are eager to use the pre-campaign period to try to define her on their own terms." />
                      <outline text="The mudslinging against Clinton &apos;&apos; and other possible Democratic candidates like Vice President Joe Biden and Maryland Gov. Martin O&apos;Malley &apos;-- is expected to intensify with each passing day as the 2016 election approaches. Last month, the New York Times reported that Republicans were testing the message that Clinton was too old to be president, eager to contrast their younger crop of prospective candidates against her." />
                      <outline text="Keep reading&apos;..." />
                      <outline text="HT: Rare" />
              </outline>

              <outline text="The Real IRS Scandal Isn&apos;t Being Reported By Anyone">
                      <outline text="Link to Article" type="link" url="http://crooksandliars.com/karoli/real-irs-scandal-being-reported-no-media-ou" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373422915_R6HBCpWQ.html" />
        <outline text="Source: Crooks and Liars" type="link" url="http://feeds.feedburner.com/crooksandliars/YaCP" />
      <outline text="Wed, 10 Jul 2013 02:21" />
                      <outline text="" />
                      <outline text="Even Lawrence O&apos;Donnell isn&apos;t talking about the real IRS scandal. Yes, he&apos;s been vindicated and Salon&apos;stimeline of events demonstrates just how badly the media blew the whole story. But still, the IRS is doing scandalous things, but no media outlets are talking about it." />
                      <outline text="Here&apos;s the real scandal. The IRS is releasing information that is private, confidential, and includes people&apos;s Social Security numbers. It is pure incompetence and shows just how behind the times they are with regard to best practices and privacy issues." />
                      <outline text="Here&apos;s a statement from Public Resource about it:" />
                      <outline text="Public.Resource.Org has discovered that the Internal Revenue Service has posted the Social Security Numbers of tens of thousands of Americans on government web sites. The database in question contains the filings of Section 527 political organizations such as campaign committees. This Section 527 database is an essential tool used by journalists, watchdog groups, congressional staffers, and citizens. While the public posting of this database serves a vital public purpose (and this database must be restored as quickly as possible), the failure to remove individual Social Security Numbers is an extraordinarily reckless act." />
                      <outline text="On July 2, Public.Resource.Org discovered this systematic violation of Americans&apos; privacy and notified the U.S. Treasury Inspector General for Tax Administration. We documented our findings in an audit document, copies of which were furnished to I.R.S. officials and senior White House officials. On July 3, the administration removed this database from public view." />
                      <outline text="Public.Resource.Org uncovered this serious violation of federal law in the course of an unrelated audit which was sparked when, on June 18, the I.R.S. notified Public.Resource.Org that it had sent out an improperly-vetted shipment of data on DVD for the January release of the Form 990-T, the Exempt Organization Business Income Tax Return. Because the I.R.S. had publicly released that data in February, and had not notified recipients of the bulk data subscription of this privacy breach for several months, Public.Resource.Org conducted a systematic examination of the breach and how it was handled and delivered that audit to the Inspector General on July 1, 2013." />
                      <outline text="But wait, there&apos;s more:" />
                      <outline text="The tainted political money database run by the government on the Internet is just one symptom of a deeply broken dissemination strategy the I.R.S. has insisted on pursuing. The I.R.S.deliberately dumbs down the e-filed returns of big nonprofits, many of which are able to hide lavish compensation schemes, excessive fund-raising expenses, and other expenditures that have little to do with public benefit." />
                      <outline text="If you read through the entire release, it appears as though Public Resource is saying that the IRS intentionally released a tainted database in order to shield non-profits from transparency and scrutiny by the public and by journalists. Because of the data breaches, they requested that the database be pulled from public view, which means none of us can actually access the data and use it properly." />
                      <outline text="That&apos;s a scandal. A big one. And if it isn&apos;t repaired and those databases released soon, we&apos;ll all lose the ability to know who is lying to us about our politics, our politicians, and our elections." />
              </outline>

              <outline text="The Rainmakers: How Human Beings Control the Weather">
                      <outline text="Link to Article" type="link" url="http://usfollowme.blogspot.com/2013/07/the-rainmakers-how-human-beings-control.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373422815_6TFXrhHz.html" />
        <outline text="Source: usfollowme" type="link" url="http://usfollowme.blogspot.com/feeds/posts/default?alt=rss" />
      <outline text="Wed, 10 Jul 2013 02:20" />
                      <outline text="" />
                      <outline text="http://gizmodo.com/the-rainmakers-how-human-beings-control-the-weather-707081383" />
              </outline>

              <outline text="The Plus Three, Minus Eight Rule Could Help You Survive a Plane Crash">
                      <outline text="Link to Article" type="link" url="http://www.economicpolicyjournal.com/2013/07/the-plus-three-minus-eight-rule-could.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373422775_4G6uBTBW.html" />
        <outline text="Source: EconomicPolicyJournal.com" type="link" url="http://www.economicpolicyjournal.com/feeds/posts/default?alt=rss" />
      <outline text="Wed, 10 Jul 2013 02:19" />
                      <outline text="" />
                      <outline text="Via LifeHacker:Do you tune out as soon as you get on the plane or it&apos;s about to land? That&apos;s probably not a good idea, according to research on when most accidents happen. The &quot;plus three, minus eight&quot; rule can help you stay alert when you fly." />
                      <outline text="In an article on ABC News, Ben Sherwood, author of &quot;The Survivors Club &apos;-- The Secrets and Science That Could Save Your Life&quot; (and president of ABC News) says that 80 percent of all plane crashes happen within the first three minutes of takeoff or in the eight minutes before landing. These are the times you&apos;ll want to stay alert just in case. Leave your shoes on, the reading for later, etc." />
              </outline>

              <outline text="VIDEO: Two flight attendants ejected on impact">
                      <outline text="Link to Article" type="link" url="http://www.bbc.co.uk/news/world-us-canada-23250717#sa-ns_mchannel=rss&amp;ns_source=PublicRSS20-sa" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373422646_7VHVBPat.html" />
        <outline text="Source: BBC News - Home" type="link" url="http://feeds.bbci.co.uk/news/rss.xml" />
      <outline text="Wed, 10 Jul 2013 02:17" />
                      <outline text="" />
                      <outline text="This page is best viewed in an up-to-date web browser with style sheets (CSS) enabled. While you will be able to view the content of this page in your current browser, you will not be able to get the full visual experience. Please consider upgrading your browser software or enabling style sheets (CSS) if you are able to do so." />
              </outline>

              <outline text="CNN moves to 24/7 Zimmerman format">
                      <outline text="Link to Article" type="link" url="http://theviewfromfallingdowns.blogspot.com/2013/07/cnn-moves-to-247-zimmerman-format.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373422570_FWmByLSw.html" />
        <outline text="Source: The View From Falling Downs" type="link" url="http://theviewfromfallingdowns.blogspot.com/feeds/posts/default?alt=rss" />
      <outline text="Wed, 10 Jul 2013 02:16" />
                      <outline text="" />
                      <outline text="That&apos;s right folks, they&apos;ve made it official; you don&apos;t ever again have to miss a single moment of the biggest news story in the world; the Zimmerman trial.Nevermind exploding planes in San Francisco, exploding trains in Canada, imploding governments in the Middle East." />
                      <outline text="CNN knows that the only story you care about is the one where that white dumbshit in Florida killed that black kid." />
                      <outline text="While young black males are by far the most likely to get shot in America, what makes this case special is that he was shot by a white civilian and not a cop or a gangsta." />
                      <outline text="Mind you, Zimmerman was an achingly wannabe cop, but he didn&apos;t have his badge yet." />
                      <outline text="So that must be why it&apos;s a big story." />
                      <outline text="The hundreds of black kids who have been shot down since Trayvon Martin are merely so many footnotes." />
              </outline>

              <outline text="ISI Chief: Pakistan Has &apos;Understanding&apos; With US on Drone Strikes">
                      <outline text="Link to Article" type="link" url="http://news.antiwar.com/2013/07/09/isi-chief-pakistan-has-understanding-with-us-on-drone-strikes/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373422497_bbQAeVp5.html" />
        <outline text="Source: News From Antiwar.com" type="link" url="http://news.antiwar.com/feed/" />
      <outline text="Wed, 10 Jul 2013 02:14" />
                      <outline text="" />
                      <outline text="Buried in a several-hundred page leaked report on the US raid on Abbotabad, former ISI chief Lt. Gen. Ahmed Shuja Pasha confirmed that the Pakistani government has a long-standing &apos;&apos;understanding&apos;&apos; with the Obama Administration about US drone strikes." />
                      <outline text="Pasha confirmed that while the Pakistani civilian government regularly complains about the drones in public, they have privately acquiesced to the US on the strikes, believing they were &apos;&apos;useful&apos;&apos; despite being hugely unpopular." />
                      <outline text="Recently elected Prime Minister Nawaz Sharif has promised to revoke any &apos;&apos;tacit&apos;&apos; agreements with the US on drone strikes, but since those agreements were never written down in the first place, the US has assumed the public complaints are just part of the narrative." />
                      <outline text="Pasha confirmed that at this point it would be difficult to convince the US that the &apos;&apos;understanding&apos;&apos; no longer applies, and that it would&apos;ve been much easier if Pakistan had simply rejected the strikes in the first place instead of trying to retroactively retract a secret deal." />
                      <outline text="Last 5 posts by Jason Ditz" />
              </outline>

              <outline text="&quot;Snowden Should Come Back To The US Which Is The Model Of Justice In The World!&quot; Sen Menendez">
                      <outline text="Link to Article" type="link" url="http://www.youtube.com/watch?v=pnUBHor5c1g&amp;feature=youtube_gdata" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373422466_zm38MDQT.html" />
        <outline text="Source: Uploads by MOXNEWSd0tC0M" type="link" url="http://gdata.youtube.com/feeds/base/users/MOXNEWSd0tC0M/uploads?alt=rss&amp;v=2&amp;orderby=published&amp;client=ytapi-youtube-profile" />
      <outline text="Wed, 10 Jul 2013 02:14" />
                      <outline text="" />
              </outline>

              <outline text="Texas Democrat: Anti-Abortion Men Were Taught &apos;&apos;How To Potty&apos;&apos; By Women&apos;...">
                      <outline text="Link to Article" type="link" url="http://weaselzippers.us/2013/07/09/texas-democrat-anti-abortion-men-were-taught-how-to-potty-by-women/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373422339_VL9sVcwd.html" />
        <outline text="Source: Weasel Zippers" type="link" url="http://weaselzippers.us/feed/" />
      <outline text="Wed, 10 Jul 2013 02:12" />
                      <outline text="" />
                      <outline text="And pro-abortion men weren&apos;t?" />
                      <outline text="Via TPM:" />
                      <outline text="A female Texas state representative took to the state House floor on Tuesday with some sharp words for the men in the legislature who were trying to push through a bill to limit abortions." />
                      <outline text="Texas state Rep. Senfronia Thompson (D) was answering questions about amendment she proposed, which would allow an exemption to the proposed 20-week abortion restriction in cases of rape and incest. Thompson was exasperated about the Republican effort." />
                      <outline text="&apos;&apos;We were these men&apos;s first teachers. We taught them how to put their pants on, how to tie their shoes, how to potty,&apos;&apos; Thompson said. &apos;&apos;And all of a sudden when we get to be adults, then we become senile to the extent that we don&apos;t know what is good for ourselves, we cannot make decisions for ourselves, like we can&apos;t think ourselves out of a paper bag. And we can.&apos;&apos;" />
              </outline>

              <outline text="Texas State Senator Responds To Wendy Davis&apos; Sneakers With Baby Shoes&apos;...">
                      <outline text="Link to Article" type="link" url="http://weaselzippers.us/2013/07/09/texas-state-senator-responds-to-wendy-davis-sneakers-with-baby-shoes/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373422313_6aA2hTT2.html" />
        <outline text="Source: Weasel Zippers" type="link" url="http://weaselzippers.us/feed/" />
      <outline text="Wed, 10 Jul 2013 02:11" />
                      <outline text="" />
                      <outline text="Love it." />
                      <outline text="Via LifeNews:" />
                      <outline text="During the hearing in the state House yesterday on the 20-week abortion ban, Texas State Senator State Senator Bob Deuell, MD held up a pair of baby shoes to represent the unborn children who are aborted." />
                      <outline text="The shoes are a powerful visual symbol counteracting the running shoes that have been a pro-abortion symbol of the Wendy Davis filibuster against the late-term abortion ban." />
                      <outline text="Above is the picture of Duell holding up the shoes along with a collection of tweets with pictures and commentary on the hearing yesterday and the thousands of pro-life advocates who showed up in Austin to support the bill." />
              </outline>

              <outline text="Snowden has not yet accepted asylum in Venezuela: WikiLeaks">
                      <outline text="Link to Article" type="link" url="http://www.reuters.com/article/2013/07/10/us-usa-security-snowden-russia-idUSBRE96810I20130710?feedType=RSS&amp;feedName=worldNews" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373422045_FyvMtVrM.html" />
        <outline text="Source: Reuters: World News" type="link" url="http://feeds.reuters.com/reuters/worldNews" />
      <outline text="Wed, 10 Jul 2013 02:07" />
                      <outline text="" />
                      <outline text="Protesters supporting Edward Snowden, a contractor at the National Security Agency (NSA), hold a photo of Snowden during a demonstration outside the U.S. Consulate in Hong Kong June 13, 2013." />
                      <outline text="Credit: Reuters/Bobby Yip" />
                      <outline text="By Steve Gutterman" />
                      <outline text="MOSCOW | Tue Jul 9, 2013 9:05pm EDT" />
                      <outline text="MOSCOW (Reuters) - Former U.S. spy agency contractor Edward Snowden has not yet formally accepted asylum in Venezuela, the anti-secrecy group WikiLeaks said on Tuesday after a Russian lawmaker posted a statement to that effect on Twitter and then deleted it." />
                      <outline text="WikiLeaks, on its own Twitter feed, said that states involved in deciding an asylum destination for Snowden, who fled the United States last month, &quot;will make the announcement if and when the appropriate time comes.&quot;" />
                      <outline text="On its Twitter feed, Wikileaks later said: &quot;Tomorrow the first phase of Edward Snowden&apos;s &apos;Flight of Liberty&apos; campaign will be launched. Follow for further details.&quot;" />
                      <outline text="The group did not immediately provide any further information." />
                      <outline text="Snowden, who is wanted in the United States on espionage charges after revealing details of secret surveillance programs, is believed to be holed up in the transit area at a Moscow airport where he arrived on June 23 from Hong Kong." />
                      <outline text="Venezuelan President Nicolas Maduro said on Friday that he had decided to offer the 30-year-old American asylum, but his government confirmed it had heard nothing back so far." />
                      <outline text="&quot;He has to be on Venezuelan territory ... The reality is that he is trapped in the airport&apos;s transit zone,&quot; Foreign Minister Elias Jaua told reporters in Caracas on Tuesday." />
                      <outline text="Nicaragua and Bolivia also have said they would take in Snowden, who has appealed to about 20 countries for asylum." />
                      <outline text="Alexei Pushkov, the pro-Kremlin chairman of the international affairs committee in Russia&apos;s lower house of parliament, tweeted that Snowden had accepted Venezuela&apos;s asylum offer, but the tweet swiftly disappeared from his Twitter feed." />
                      <outline text="Pushkov later tweeted that he had seen the news on state-run Russian television channel Rossiya-24, but a representative of Rossiya-24 said it had been referring to Pushkov&apos;s initial tweet." />
                      <outline text="&quot;Edward #Snowden has not yet formally accepted asylum in Venezuela,&quot; Wikileaks, whose British legal researcher Sarah Harrison is assisting Snowden and traveled to Moscow with him, later said on Twitter." />
                      <outline text="Russian President Vladimir Putin has said Snowden should choose a final destination and go there as soon as possible, but it is unclear how he would get to any of the Latin American countries that have offered him asylum." />
                      <outline text="Bolivia has accused Spain, France, Portugal and Italy of closing their skies to President Evo Morales&apos; plane last week after being told it was carrying Snowden from Moscow to Bolivia." />
                      <outline text="There are no direct commercial flights from Moscow to Venezuela, Nicaragua or Bolivia, and U.S. authorities have urged nations around the world not to give Snowden refuge." />
                      <outline text="&quot;Mr Snowden ought to be returned to the United States where he is wanted on felony charges,&quot; White House spokesman Jay Carney said on Tuesday. &quot;He should not be permitted to engage in further international travel beyond the travel necessary to return to the United States.&quot;" />
                      <outline text="&quot;And we&apos;ve communicated that position with our Russian counterparts and with every country, broadly speaking, that has been discussed as a possible either transition point or destination point for Mr Snowden,&quot; Carney told reporters at a daily briefing." />
                      <outline text="(Additional reporting by Gabriela Baczynska in Moscow, Roberta Rampton in Washington and Daniel Wallis in Caracas; Editing by Robin Pomeroy and Stacey Joyce)" />
                      <outline text="Link thisShare thisDigg thisEmailReprints" />
              </outline>

              <outline text="Lone Ranger film review: false-flag attacks by US oligarchs for genocide, resource control">
                      <outline text="Link to Article" type="link" url="http://www.washingtonsblog.com/2013/07/lone-ranger-film-review-false-flag-attacks-by-us-oligarchs-for-genocide-resource-control.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373421671_5TaKPMpv.html" />
        <outline text="Source: Washington's Blog" type="link" url="http://www.washingtonsblog.com/feed" />
      <outline text="Wed, 10 Jul 2013 02:01" />
                      <outline text="" />
                      <outline text="The Lone Ranger&apos;s story builds a literal bridge from past to present to understand  our real-world US oligarchs&apos; lies and false flag attacks to take land and resources. Plot:" />
                      <outline text="The movie opens with a 1933 view of the construction of a bridge: the Golden Gate. Bridges connect one area to another, but only for those who wish to make the connection. A young boy receives a story from an aged Native American; I don&apos;t know about you, but that boy would be just a few years older than my own father.The antagonists in the story are connected by birth: two brothers. One brother orders the Texas Rangers for law enforcement and is a railroad baron; the other brother is an openly sadistic criminal who enjoys murder and eating human flesh. They pretend to be enemies and unknown to each other, but always are working together.The criminal brother stages false flag attacks on ranches to blame Native Americans. The white collar criminal brother marshals the military to attack, kill, and drive Native Americans off the land.The goal of the two brothers, from their introduction together as young men, is to take silver off the land for their personal wealth.One bro is a psychopath in political and economic power who conducts press conferences and orders the military. The other bro is the terrorist who &apos;&apos;justifies&apos;&apos; the psychopath&apos;s policies. They only pretend to be enemies, but use each other&apos;s roles to further their mutual policy agenda and wealth.Our real-world US oligarchs in government, money, and media continue to lie and stage false flag attacks to war-steal land and resources. They, too, pretend that &apos;&apos;terrorists&apos;&apos; are enemies rather than their own creations to justify their wars and looting. From history to the present:" />
                      <outline text="The most elegant solution is for Americans in military and government to recognize &apos;&apos;emperor has no clothes&apos;&apos; unlawful orders, refuse them, and arrest those who issued them." />
              </outline>

              <outline text="Will new production facility raise the bar for YouTube videos?">
                      <outline text="Link to Article" type="link" url="http://news.cnet.com/8301-1023_3-57592982-93/will-new-production-facility-raise-the-bar-for-youtube-videos/?part=rss&amp;subj=news&amp;tag=title" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373421575_FH48NGQH.html" />
        <outline text="Source: CNET News" type="link" url="http://news.cnet.com/2547-1_3-0-20.xml" />
      <outline text="Wed, 10 Jul 2013 01:59" />
                      <outline text="" />
                      <outline text="YouTube Space LA offers a place for creators to use high-end equipment and get technical advice from experts. CNET&apos;s Sumi Das gets a tour." />
                      <outline text="YouTube Space." />
                      <outline text="(Credit: CNET)If you&apos;ve ever spent time on YouTube, you know that it&apos;s a mixed bag. There are the slick professional videos, the shaky (but often side-splitting) clips shot on smartphones and everything in between." />
                      <outline text="In an effort to raise the quality of YouTube videos, the company has built YouTube Space LA, a 41,000-square-foot facility that offers practically every type of video production tool, free of charge. Of course, only serious creators need apply. Applicants must be YouTube Partners who have a track record of regularly contributing videos. But that doesn&apos;t mean they have to be churning out hits a la &quot;Gangnam Style.&quot; The YouTube Space LA FAQ states that the goal is to help both established and emerging creators." />
                      <outline text="YouTube offers creators free use of production facilityThe facility itself is production heaven. Liam Collins, who runs the facility, gave us a tour, showing us the various sound stages, green screen studios, editing areas, and control rooms. Equipment available for creators includes cinema cameras, DSLRs and even a Phantom camera -- a top-of-the-line high-speed camera that produces stunning slow-mo shots. The facility also runs workshops and &quot;labs&quot; for creators, a chance to advance their technical skills." />
                      <outline text="Within 15 minutes of walking into YouTube Space, I ran into four friends and former co-workers. Collins said the lobby with its large video wall and comfy sofas that encourage lounging and shoulder-rubbing was designed specifically for those sorts of run-ins. Why? Because it leads to collaboration and that&apos;s a key ingredient of YouTube Space LA. The hope is that creators will work together, leveraging their individual strengths and assisting fellow partners with their videos. And if the videos look a little more polished as a result, that translates into valuable page views for YouTube." />
              </outline>

              <outline text="The NSA Has Inserted Its Code Into Android OS, Bugging Three Quarters Of All Smartphones">
                      <outline text="Link to Article" type="link" url="http://www.zerohedge.com/news/2013-07-09/nsa-has-inserted-its-code-android-os-bugging-three-quarters-all-smartphones" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373420970_EQRr24JA.html" />
        <outline text="Source: Zero Hedge" type="link" url="http://feeds.feedburner.com/zerohedge/feed" />
      <outline text="Wed, 10 Jul 2013 01:49" />
                      <outline text="" />
                      <outline text="Over a decade ago, it was discovered that the NSA embedded backdoor access into Windows 95, and likely into virtually all other subsequent internet connected, desktop-based operating systems. However, with the passage of time, more and more people went &quot;mobile&quot;, and as a result the NSA had to adapt. And adapt they have: as Bloomberg reports, &quot;The NSA is quietly writing code for Google&apos;s Android OS.&quot;" />
                      <outline text="Is it ironic that the same &quot;don&apos;t be evil&quot; Google which went to such great lengths in the aftermath of the Snowden scandal to wash its hands of snooping on its customers and even filed a request with the secretive FISA court asking permission to disclose more information about the government&apos;s data requests, is embedding NSA code into its mobile operating system, which according to IDC runs on three-quarters of all smartphones shipped in the first quarter? Yes, yes it is." />
                      <outline text="Google spokeswoman Gina Scigliano confirms that the company has already inserted some of the NSA&apos;s programming in Android OS. &quot;All Android code and contributors are publicly available for review at source.android.com.&quot; Scigliano says, declining to comment further." />
                      <outline text="From Bloomberg:" />
                      <outline text="Through its open-source Android project, Google has agreed to incorporate code, first developed by the agency in 2011, into future versions of its mobile operating system, which according to market researcher IDC runs on three-quarters of the smartphones shipped globally in the first quarter. NSA officials say their code, known as Security Enhancements for Android, isolates apps to prevent hackers and marketers from gaining access to personal or corporate data stored on a device. Eventually all new phones, tablets, televisions, cars, and other devices that rely on Android will include NSA code, agency spokeswoman Vanee&apos; Vines said in an e-mailed statement. NSA researcher Stephen Smalley, who works on the program, says, &apos;&apos;Our goal is to raise the bar in the security of commodity mobile devices.&apos;&apos;" />
                      <outline text="See, there&apos;s no need to worry: the reason the NSA is generously providing the source code for every Google-based smartphone is for your own security. Oh but it&apos;s open-sourced, so someone else will intercept any and all attempts at malice. We forgot." />
                      <outline text="The story continues:" />
                      <outline text="In a 2011 presentation obtained by Bloomberg Businessweek, Smalley listed among the benefits of the program that it&apos;s &apos;&apos;normally invisible to users.&apos;&apos; The program&apos;s top goal, according to that presentation: &apos;&apos;Improve our understanding of Android security.&apos;&apos;" />
                      <outline text="Well one wouldn&apos;t want their bug to be visible to users now, would one..." />
                      <outline text="Vines wouldn&apos;t say whether the agency&apos;s work on Android and other software is part of or helps with Prism. &apos;&apos;The source code is publicly available for anyone to use, and that includes the ability to review the code line by line,&apos;&apos; she said in her statement. Most of the NSA&apos;s suggested additions to the operating system can already be found buried in Google&apos;s latest release&apos;--on newer devices including Sony&apos;s Xperia Z, HTC&apos;s One, and Samsung Electronics&apos; Galaxy S4. Although the features are not turned on by default, according to agency documentation, future versions will be. In May the Pentagon approved the use of smartphones and tablets that run Samsung&apos;s mobile enterprise software, Knox, which also includes NSA programming, the company wrote in a June white paper. Sony, HTC, and Samsung declined to comment." />
                      <outline text="Apple appears to be immune from this unprecedented breach of customer loyalty, if only for now, although open-sourced Linux may not be as lucky:" />
                      <outline text="&apos;&apos;Apple (AAPL) does not accept source code from any government agencies for any of our operating systems or other products,&apos;&apos; says Kristin Huguet, a spokeswoman for the company. It&apos;s not known if any other proprietary operating systems are using NSA code. SE for Android is an offshoot of a long-running NSA project called Security-Enhanced Linux. That code was integrated a decade ago into the main version of the open-source operating system, the server platform of choice for Internet leaders including Google, Facebook (FB), and Yahoo! (YHOO). Jeff Zemlin, the executive director of the Linux Foundation, says the NSA didn&apos;t add any obvious means of eavesdropping. &apos;&apos;This code was peer-reviewed by a lot of people,&apos;&apos; he says." />
                      <outline text="But that&apos;s not all:" />
                      <outline text="The NSA developed a separate Android project because Google&apos;s mobile OS required markedly different programming, according to Smalley&apos;s 2011 presentation. Brian Honan, an information technology consultant in Dublin, says his clients in European governments and multinational corporations are worried about how vulnerable their data are when dealing with U.S. companies. The information security world had been preoccupied with Chinese hacking until recently, Honan says. &apos;&apos;With Prism, the same accusations can be laid against the U.S. government.&apos;&apos;" />
                      <outline text="In short: the (big brother supervised) fun never stops in Stasi 2.0 world. Just buy your 100 P/E stocks, eat your burgers, watch your Dancing With The Stars, pay your taxes, and engage in as much internet contact with other internet-addicted organisms as possible and all shall be well." />
                      <outline text="Oh, and from this..." />
                      <outline text="To this (courtesy of @paradism_)" />
                      <outline text="Average:Your rating: NoneAverage: 5(10 votes)" />
              </outline>

              <outline text="Witness At Bradley Manning Trial Says NO Harm Was Done To National Security">
                      <outline text="Link to Article" type="link" url="http://www.youtube.com/watch?v=dxMZkuul3cw&amp;feature=youtube_gdata" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373420868_ewM2HFQB.html" />
        <outline text="Source: Uploads by MOXNEWSd0tC0M" type="link" url="http://gdata.youtube.com/feeds/base/users/MOXNEWSd0tC0M/uploads?alt=rss&amp;v=2&amp;orderby=published&amp;client=ytapi-youtube-profile" />
      <outline text="Wed, 10 Jul 2013 01:47" />
                      <outline text="" />
              </outline>

              <outline text="&quot;HEY Snowden! Don&apos;t Come Here! We&apos;ve Become A Police State! They&apos;ll Lock You Up FOREVER!&quot;">
                      <outline text="Link to Article" type="link" url="http://www.youtube.com/watch?v=xC6qL1txgtU&amp;feature=youtube_gdata" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373420854_cwJ7fHNt.html" />
        <outline text="Source: Uploads by MOXNEWSd0tC0M" type="link" url="http://gdata.youtube.com/feeds/base/users/MOXNEWSd0tC0M/uploads?alt=rss&amp;v=2&amp;orderby=published&amp;client=ytapi-youtube-profile" />
      <outline text="Wed, 10 Jul 2013 01:47" />
                      <outline text="" />
              </outline>

              <outline text="Quebec train blast: police open criminal investigation as death toll rises">
                      <outline text="Link to Article" type="link" url="http://www.guardian.co.uk/world/2013/jul/09/quebec-train-blast-criminal-investigation" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373420776_WVRRN9gk.html" />
        <outline text="Source: The Guardian World News" type="link" url="http://feeds.guardian.co.uk/theguardian/rss" />
      <outline text="Wed, 10 Jul 2013 01:46" />
                      <outline text="" />
                      <outline text="Wrecked oil tankers and debris from the runaway train in Lac-M(C)gantic, Quebec. A criminal investigation into the incident has been opened. Photograph: AP" />
                      <outline text="Canadian police said on Tuesday they had opened a criminal probe into Saturday&apos;s fatal fuel train blast in the town of Lac-M(C)gantic, an explosion they said was unlikely to have been caused by terrorism." />
                      <outline text="Police also raised the death toll to 15 from 13 and said the total number of dead and missing was 50. Police spokesman Michel Forget gave few details of the investigation and said it was unclear whether it would lead to criminal charges being filed." />
              </outline>

              <outline text="Scripting News: Housekeeping note.">
                      <outline text="Link to Article" type="link" url="http://threads2.scripting.com/2013/july/housekeepingNote" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373420116_nqwayXgF.html" />
        <outline text="Source: Dave Winer" type="link" url="http://scripting.com/rss.xml" />
      <outline text="Wed, 10 Jul 2013 01:35" />
                      <outline text="" />
                      <outline text="BTW, I&apos;m doing my blogging in Fargo now, and that hasn&apos;t yet been connected to scripting.com. This happens every so often, because I develop blogging software. So for now, if you want to keep up with what I&apos;m writing, you should follow me on dave.smallpict.com. Sorry for the trouble. Dig we must! :-)" />
              </outline>

              <outline text="Judge: Chevron can access its critics&apos; private user information | EarthRights International">
                      <outline text="Link to Article" type="link" url="http://www.earthrights.org/blog/judge-chevron-can-access-its-critics-private-user-information" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373419016_Vqu259h6.html" />
      <outline text="Wed, 10 Jul 2013 01:16" />
                      <outline text="" />
                      <outline text="After more than eight months of silence, U.S. District Court Judge Lewis Kaplan recently issued a long-awaited decision on the enforceability of a subpoena served by Chevron on Microsoft in connection with Chevron&apos;s lawsuit claiming that it has been the victim of a conspiracy in the $18.2 billion judgment against it for massive environmental contamination in Ecuador. But Kaplan&apos;s decision begs more questions than it answers." />
                      <outline text="The sweeping subpoena was one of three issued to Google, Yahoo! and Microsoft, demanding IP usage records and identity information for the holders of more than 100 email accounts, including environmental activists, journalists and attorneys. Chevron&apos;s subpoena sought personal information about every account holder and the IP addresses associated with every login to each account over a nine-year period." />
                      <outline text="This could allow Chevron to determine the countries, states, cities or even buildings where the account-holders were checking their email so as to &apos;&apos;infer the movements of the users over the relevant period and might permit Chevron to makes inferences about some of the user&apos;s professional and personal relationships.&apos;&apos; (see Order, below, p6). Confronted with this affront to their privacy and rights of speech and association, the account-holders, represented by ERI and Electronic Frontier Foundation (EFF), brought &apos;&apos;motions to quash&apos;&apos; the subpoenas in courts in California and New York on First Amendment grounds." />
                      <outline text="Judge Kaplan, who presides over Chevron&apos;s conspiracy lawsuit in the Southern District of New York, and who has been accused of prejudice against the Ecuadorians and their lawyers, managed to sit by &apos;&apos;special designation&apos;&apos; in the Northern District of New York so that he could decide the enforceability of the subpoena to Microsoft as well." />
                      <outline text="And decide he did. Kaplan&apos;s decision upheld Chevron&apos;s sweeping subpoena with an argument that is as breathtaking as the subpoena itself. According to Judge Kaplan, none of the accountholders could benefit from First Amendment protections since the accountholders had &apos;&apos;not shown that they were U.S. citizens.&apos;&apos;" />
                      <outline text="Now, let&apos;s break this down. The account-holders in this case were proceeding anonymously, which the First Amendment permits. Because of this, Judge Kaplan was provided with no information about the account holders&apos; residency or places of birth. It is somewhat amazing then, that Judge Kaplan assumed that the account holders were not U.S. citizens. As far as I know, a judge has never before made this assumption when presented with a First Amendment claim. We have to ask then: on what basis did Judge Kaplan reach out and make this assumption?" />
                      <outline text="Whether or not this assumption was correct &apos;&apos; and whether or not it matters &apos;&apos; the account-holders were never given the chance to submit evidence on the question of their citizenship. Judge Kaplan is hoping he made a lucky guess, but First Amendment rights, and the account-holders they protect, are entitled to more respect than judicial guesswork. " />
              </outline>

              <outline text="Crystal Nix-Hines, attorney and &apos;&apos;Alias&apos;&apos; writer, tapped for UNESCO post | Variety">
                      <outline text="Link to Article" type="link" url="http://variety.com/2013/biz/biz/crystal-nix-hines-attorney-and-alias-writer-tapped-for-unesco-post-1200560686/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373418041_eAy9JZ7F.html" />
      <outline text="Wed, 10 Jul 2013 01:00" />
                      <outline text="" />
                      <outline text="Crystal Nix-Hines, a Los Angeles attorney and former writer on &apos;&apos;Alias&apos;&apos; and &apos;&apos;The Practice,&apos;&apos; is being nominated to a State Department post as a representative to the United Nations Educational, Scientific and Cultural Organization, or UNESCO." />
                      <outline text="The post, which must be confirmed by the Senate, carries to rank of ambassador. The White House announced on Tuesday that President Obama intended to nominate Nix-Hines to the post." />
                      <outline text="Nix-Hines is of counsel at the law firm of Quinn Emanuel in Los Angeles, where entertainment and intellectual property are among her specialties. She previously served at Fairbank &amp; Vincent, and in the litigation department at O&apos;Melveny &amp; Myers. She was assistant to the general counsel and senior vice president at Capital Cities/ABC from 1992 to 1993." />
                      <outline text="In her pursuit of a screenwriting career, Nix-Hines also was consulting producer on &apos;&apos;Commander-in-Chief,&apos;&apos; and held the titles of co-producer and executive story editor on &apos;&apos;Alias.&apos;&apos; During the 1990s she held several positions at the State Department, including counselor to the assistant secretary for democracy, human rights and labor." />
                      <outline text="Nix-Hines was a bundler for President Obama in the most recent election cycle, raising between $200,000 and $500,000. She was a classmate of Michelle Obama&apos;s at Princeton and graduated from Harvard Law School in 1990, a year before Barack Obama." />
                      <outline text="UNESCO was set up in 1945 to promote international cooperation through science, education and culture and communication." />
              </outline>

              <outline text="Silent Circle: Mike Janke&apos;s iPhone app makes encryption easy, governments nervous. - Slate Magazine">
                      <outline text="Link to Article" type="link" url="http://www.slate.com/articles/technology/future_tense/2012/10/silent_circle_mike_janke_s_iphone_app_makes_encryption_easy_governments.single.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373408776_LLFWDthw.html" />
      <outline text="Tue, 09 Jul 2013 22:26" />
                      <outline text="" />
                      <outline text="Silent Circle logo." />
                      <outline text="Courtesy Silent Circle." />
                      <outline text="Lately, Mike Janke has been getting what he calls the &apos;&apos;hairy eyeball&apos;&apos; from international government agencies. The 44-year-old former Navy SEAL commando, together with two of the world&apos;s most renowned cryptographers, was always bound to ruffle some high-level feathers with his new project&apos;--a surveillance-resistant communications platform that makes complex encryption so simple your grandma can use it." />
                      <outline text="This week, after more than two years of preparation, the finished product has hit the market. Named Silent Circle, it is in essence a series of applications that can be used on a mobile device to encrypt communications&apos;--text messages, plus voice and video calls. Currently, apps for the iPhone and iPad are available, with versions for Windows, Galaxy, Nexus, and Android in the works. An email service is also soon scheduled to launch." />
                      <outline text="The encryption is peer to peer, which means that Silent Circle doesn&apos;t centrally hold a key that can be used to decrypt people&apos;s messages or phone calls. Each phone generates a unique key every time a call is made, then deletes it straight after the call finishes. When sending text messages or images, there is even a &apos;&apos;burn&apos;&apos; function, which allows you to set a time limit on anything you send to another Silent Circle user&apos;--a bit like how &apos;&apos;this tape will self destruct&apos;&apos; goes down in Mission: Impossible, but without the smoke or fire." />
                      <outline text="Silent Circle began as an idea Janke had after spending 12 years working for the U.S. military and later as a security contractor. When traveling overseas, he realized that there was no easy-to-use, trustworthy encrypted communications provider available to keep in touch with family back home. Cellphone calls, text messages, and emails sent over the likes of Hotmail and Gmail can just be &apos;&apos;pulled right out of the air,&apos;&apos; according to Janke, and he didn&apos;t think the few commercial services offering encryption&apos;--like Skype and Hushmail&apos;--were secure enough. He was also made uneasy by reports about increased government snooping on communications. &apos;&apos;It offended what I thought were my God-given rights&apos;--to be able to have a free conversation,&apos;&apos; Janke says. &apos;&apos;And so I began on this quest to find something to solve it.&apos;&apos;" />
                      <outline text="Janke assembled what he calls an &apos;&apos;all-star team&apos;&apos;: Phil Zimmerman, a recent inductee to the Internet&apos;s Hall of Fame, who in 1991 invented PGP encryption, still considered the standard for email security. Jon Callas, the man behind Apple&apos;s whole-disk encryption (which is used to secure hard drives in Macs across the world), became Silent Circle&apos;s chief technology officer. Other employees were top engineers and ex-special-forces communications experts based in England, Latvia, and Germany. Together, they designed their own software, created a new encryption protocol called SCimp, registered their company offshore and outside U.S. jurisdiction, then built up their own network in Canada. (They eventually plan to expand to Switzerland and Hong Kong.)" />
                      <outline text="Though many encryption options already exist, they are often difficult to use, which is a barrier for those without the skills, patience, or time to learn. Silent Circle helps remove these hurdles. As a result, organizations that have a real need for secure communications but have maybe not understood how to implement them are coming forward and expressing interest in Silent Circle." />
                      <outline text="Janke says he&apos;s already sold the technology worldwide to nine news outlets, presumably keen to help protect their journalists&apos; and sources&apos; safety through encryption. (ProPublica, for one, confirmed it&apos;s had &apos;&apos;preliminary discussions&apos;&apos; with Silent Circle.) A major multinational company has already ordered 18,000 subscriptions for its staff, and a couple of A-list actors, including one Oscar winner, have been testing the beta version. The basic secure phone service plan will cost $20 a month per person, though Janke says a number of human rights groups and NGOs will be provided with the service for free." />
                      <outline text="The company has also attracted attention from 23 special operations units, intelligence agencies, and law enforcement departments in nine countries that are interested in using Silent Circle to protect the communications of their own employees&apos;--particularly on the personal devices that they use at home or bring to work. Some of these same agencies, perhaps unsurprisingly, have contacted Janke and his team with concerns about how the technology might be used by bad guys. Because Silent Circle is available to just about anyone, Janke accepts there is a real risk that a minority of users could abuse it for criminal purposes. But he argues you could say the same thing about baseball bats and says if the company is ever made aware someone is using the application for &apos;&apos;bad illegal things&apos;&apos;&apos;--he cites an example of a terrorist plotting a bomb attack&apos;--it reserves the right to shut off that person&apos;s service and will do so &apos;&apos;in seven seconds.&apos;&apos;" />
                      <outline text="The very features that make Silent Circle so valuable from a civil liberties and privacy standpoint make law enforcement nervous. Telecom firms in the United States, for instance, have been handing over huge troves of data to authorities under a blanket of secrecy and with very little oversight. Silent Circle is attempting to counter this culture by limiting the data it retains in the first place. It will store only the email address, 10-digit Silent Circle phone number, username, and password of each customer. It won&apos;t retain metadata (such as times and dates calls are made using Silent Circle). Its IP server logs showing who is visiting the Silent Circle website are currently held for seven days, which Janke says the company plans to reduce to just 24 hours once the system is running smoothly." />
                      <outline text="Almost every base seems to have been covered. Biannually, the company will publish requests it gets from law enforcement in transparency reports, detailing the country of origin and the number of people the request encompassed. And any payment a person makes to Silent Circle will be processed through third-party provider Stripe, so even if authorities could get access to payment records, Janke says, &apos;&apos;that in no way gives them access to the data, voice, and video the customer is sending-receiving ... nor does it tie the two together.&apos;&apos; If authorities wanted to intercept the communications of a person using Silent Circle, it is likely they&apos;d have to resort to deploying Trojan-style tools&apos;--infecting targeted devices with spyware to covertly record communications before they become encrypted." />
                      <outline text="Among security geeks and privacy advocates, however, there&apos;s still far from consensus how secure Silent Circle actually is. Nadim Kobeissi, a Montreal-based security researcher and developer, took to his blog last week to pre-emptively accuse the company of &apos;&apos;damaging the state of the cryptography community.&apos;&apos; Kobeissi&apos;s criticism was rooted in an assumption that Silent Circle would not be open source, a cornerstone of encrypted communication tools because it allows people to independently audit coding and make their own assessments of its safety (and to check for secret government backdoors). Christopher Soghoian, principal technologist at the ACLU&apos;s Speech Privacy and Technology Project, said he was excited to see a company like Silent Circle visibly competing on privacy and security but that he was waiting for it to go open source and be audited by independent security experts before he would feel comfortable using it for sensitive communications." />
                      <outline text="When I asked Janke about this, he said he recognized the importance of the open-source principle. He says the company, contrary to Kobeissi&apos;s assertion, will be using a noncommercial open-source license, which will allow developers to &apos;&apos;do their own builds&apos;&apos; of Silent Circle. &apos;&apos;We will put it all out there for scrutiny, inspection, and audit by anyone and everyone,&apos;&apos; he added." />
                      <outline text="Another factor is that a number of countries are pushing for new surveillance laws that will force many communications providers to build in backdoors for wiretapping. The Silent Circle team has been following these developments closely, and it seems to have played into the decision to register offshore and locate its multimillion-dollar network outside U.S. jurisdiction. Janke says he has consulted with Canada&apos;s privacy commissioners and understands that the new push to upgrade surveillance capabilities in Canada will not affect the company because its technology is encrypted peer-to-peer (making it technically incapable of facilitating a wiretap request even if it receives one)." />
                      <outline text="But what if, one day down the line, things change and Canada or another country where Silent Circle has servers tries to force them to build in a secret backdoor for spying? Janke has already thought about that&apos;--and his answer sums up the maverick ethos of his company." />
                      <outline text="&apos;&apos;We won&apos;t be held hostage,&apos;&apos; he says, without a quiver of hesitation. &apos;&apos;All of us would rather shut Silent Circle down than ever allow a backdoor or be bullied into an &apos;or else&apos; position.&apos;&apos;" />
                      <outline text="In an age of ever-increasing surveillance, it&apos;s a gutsy stance to take. Perhaps Big Brother has finally met its match." />
                      <outline text="This article arises from Future Tense, a collaboration among Arizona State University, the New America Foundation, and Slate. Future Tense explores the ways emerging technologies affect society, policy, and culture. To read more, visit the Future Tense blog and theFuture Tense home page. You can also follow uson Twitter." />
              </outline>

              <outline text="Petition | McDonald&apos;s: Stop paying employees with debit cards loaded with fees | Change.org">
                      <outline text="Link to Article" type="link" url="https://www.change.org/petitions/mcdonald-s-stop-paying-employees-with-debit-cards-loaded-with-fees" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373408554_fWkzs6zb.html" />
      <outline text="Tue, 09 Jul 2013 22:22" />
                      <outline text="" />
                      <outline text="I was looking forward to my new job when I started working at a McDonald&apos;s location in Pennsylvania in April, but I was disappointed to find out that in order to be paid, I would have to activate a JP Morgan Chase debit card with heavy fees attached." />
                      <outline text="I&apos;m a young single mom. When I started my job at McDonald&apos;s, I knew that I would only be making slightly more than minimum wage. I didn&apos;t expect that the only way I would be paid would be on a debit card that would dock pay that I earned through lots of different fees. When I asked if McDonald&apos;s could pay me through direct deposit to my local credit union, which doesn&apos;t charge withdrawal fees, I was told that the debit card was the only option." />
                      <outline text="These cards come with a lot of fees: from fees for cash withdrawals to balance inquiries to lost or stolen cards to overdrafts and even inactivity fees. The federal government has helped reduce fees on credit and debit cards that most consumers use, but those protections don&apos;t apply to the kinds of cards companies like McDonald&apos;s are using to pay employees. In the end, I feared that once all of the fees from getting my own hard-earned wages through this card were taken out, my pay would go below minimum wage." />
                      <outline text="I decided to leave my job at McDonald&apos;s not because I didn&apos;t like the people, but because I think it&apos;s only fair that I get paid for all of my work there. Since I quit, I&apos;ve found out that paying employees through these cards with fees attached is a growing trend among dozens of major employers. The New York Times reported that last year roughly 4.6 million active payroll cards were issued by companies like McDonald&apos;s." />
                      <outline text="Like millions of other workers, I deserve to get fairly paid for my work. When I stood up and spoke out against the lack of choices for employees, the local franchise in Pennsylvania that I worked for announced that it would offer employees more options for payment. But I&apos;ve seen that employees at other McDonald&apos;s franchises as far away as Milwaukee are still dealing with the same problems and that&apos;s not fair. I think everyone should be given the choice of what they want to do with their hard-earned money." />
                      <outline text="I think McDonald&apos;s should be a leader nationwide in ensuring that employees get to keep their own wages in full and I&apos;m concerned for other McDonald&apos;s employees who don&apos;t have that option. Will you join me in calling on McDonald&apos;s to ensure that all employees nationwide can keep their wages and chose to say no to fee-heavy cards?" />
                      <outline text="To:Don Thompson, CEO, McDonald&apos;sRichard Floersch, Chief Human Resources Officer, McDonald&apos;sHeidi Barker, Global External Communications VP, McDonald&apos;sLisa McComb, Director of Global External Communications, McDonald&apos;sDanya Proud, U.S. Media Relations Director, McDonald&apos;s" />
                      <outline text="Stop paying employees nationwide with debit cards loaded with fees and make sure that your franchisees all across the country allow employees to have more options for payment." />
                      <outline text="Sincerely,[Your name]" />
              </outline>

              <outline text="Who coined the name &apos;United States of America&apos;? Mystery gets new twist. - CSMonitor.com">
                      <outline text="Link to Article" type="link" url="http://www.csmonitor.com/USA/Politics/The-Vote/2012/0816/Who-coined-the-name-United-States-of-America-Mystery-gets-new-twist" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373407503_ahskz3Eb.html" />
      <outline text="Tue, 09 Jul 2013 22:05" />
                      <outline text="" />
                      <outline text="Historians continue to debate who came up with the formulation &apos;United States of America&apos; as the name for the new nation. A new discovery could shift the discussion." />
                      <outline text="It may seem surprising, but nobody is really sure who came up with the phrase, &apos;&apos;United States of America.&apos;&apos;" />
                      <outline text="Skip to next paragraphRecent postsSubscribe Today to the Monitor" />
                      <outline text="Click Here for your FREE 30 DAYS ofThe Christian Science MonitorWeekly Digital Edition" />
                      <outline text="Speculation generally swirls around a familiar cast of characters &apos;&apos; the two Toms (Thomas Paine and Thomas Jefferson), Alexander Hamilton, Ben Franklin, and even a gentleman named Oliver Ellsworth (a delegate from the Constitutional Convention of 1787). But every instance of those gentlemen using the name &quot;United States of America&quot; is predated by a recently discovered example of the phrase in the Revolutionary-era Virginia Gazette." />
                      <outline text="So who was perhaps the first person ever to write the words &quot;United States of America&quot;? " />
                      <outline text="A PLANTER. " />
                      <outline text="That was how the author of an essay in the Gazette signed the anonymous letter. During that time, it was common practice for essays and polemics to be published anonymously in an attempt to avoid future charges of treason &apos;&apos; only later has history identified some of these authors. " />
                      <outline text="The discovery adds a new twist &apos;&apos; as well as the mystery of the Planter&apos;s identity &apos;&apos; to the search for the origin of a national name that has now become iconic. " />
                      <outline text="Several references mistakenly credit Paine with formulating the name in January 1776. Paine&apos;s popular and persuasive book, &quot;Common Sense,&quot; uses &apos;&apos;United Colonies,&apos;&apos; &apos;&apos;American states,&apos;&apos; and &apos;&apos;FREE AND INDEPENDENT STATES OF AMERICA,&apos;&apos; but he never uses the final form. " />
                      <outline text="The National Archives, meanwhile, cite the first known use of the &apos;&apos;formal term United States of America&apos;&apos; as being the Declaration of Independence, which would recognize Jefferson as the originator. Written in June 1776, Jefferson&apos;s &apos;&apos;original Rough draught&apos;&apos; placed the new name at the head of the business &apos;&apos; &apos;&apos;A Declaration by the Representatives of the UNITED STATES OF AMERICA in General Congress assembled.&quot;" />
                      <outline text="Jefferson clearly had an idea as to what would sound good by presenting the national moniker in capitalized letters. But in the final edit, the line was changed to read, &apos;&apos;The unanimous Declaration of the thirteen united States of America.&apos;&apos; The fact that &apos;&apos;United States of America&apos;&apos; appears in both versions of the Declaration may have been enough evidence to credit Jefferson with coining the phrase, but there is another example published three months earlier." />
              </outline>

              <outline text="VIDEO-President Obama on Counterterrorism and U.S. Foreign Policy - C-SPAN Video Library">
                      <outline text="Link to Article" type="link" url="http://www.c-spanvideo.org/program/ObamaDis" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373405192_VRpKc2ud.html" />
      <outline text="Tue, 09 Jul 2013 21:26" />
                      <outline text="" />
                      <outline text="Follow Similar Programs10" />
                      <outline text="National Defense UniversityWhite House Travel | DC EventFollow Sponsors" />
                      <outline text="President Obama spoke about a range of U.S. counterterrorism issues including controversial drone strikes, the Guantanamo Bay prison and detention of terrorist suspects, security at diplomatic missions abroad, the role of .. Read MorePresident Obama spoke about a range of U.S. counterterrorism issues including controversial drone strikes, the Guantanamo Bay prison and detention of terrorist suspects, security at diplomatic missions abroad, the role of foreign assistance in international security, and the future role of military force in efforts to counter terrorist threats.During the speech he was heckled by a woman in the audience several times before holding his remarks until she was escorted out." />
                      <outline text="1 hour, 1 minute | 3,796 Views" />
                      <outline text="View Program TranscriptView Full Event (2 Programs)" />
              </outline>

              <outline text="FBI Director Nomination Hearing">
                      <outline text="Link to Article" type="link" url="http://www.c-spanvideo.org/program/313811-1" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373402374_Md78s87f.html" />
        <outline text="Source: Featured Programs on C-SPAN" type="link" url="http://www.c-spanvideo.org/feeds/featuredPrograms.php" />
      <outline text="Tue, 09 Jul 2013 20:39" />
                      <outline text="" />
                      <outline text="Follow Similar Programs0" />
                      <outline text="Senate Committee JudiciaryFollow Sponsors" />
                      <outline text="James Comey testified about his nomination to become the director of the FBI.*Among the issues he addressed were the use of water-boarding in interrogations, National Security Agency (NSA) surveillance programs, and the force .. Read MoreJames Comey testified about his nomination to become the director of the FBI.*Among the issues he addressed were the use of water-boarding in interrogations, National Security Agency (NSA) surveillance programs, and the force feedings of prisoners at Guantanamo Bay detention facility.&apos;&#130;He also said that the secret surveillance court that approved wiretapping requests, known as the FISA court, was &apos;&apos;anything but a rubber stamp.&apos;&apos;" />
                      <outline text="2 hours, 42 minutes | 105 Views" />
              </outline>

              <outline text="Iran launches &apos;national email service&apos;">
                      <outline text="Link to Article" type="link" url="http://www.guardian.co.uk/world/2013/jul/09/iran-launches-national-email-service" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373402293_nEkZ4c3s.html" />
        <outline text="Source: The Guardian World News" type="link" url="http://feeds.guardian.co.uk/theguardian/rss" />
      <outline text="Tue, 09 Jul 2013 20:38" />
                      <outline text="" />
                      <outline text="An internet cafe in Tehran. Hassan Rouhani has expressed more liberal attitudes to social media than Mahmoud Ahmadinejad. Photograph: Abedin Taherkenareh/EPA" />
                      <outline text="Iran has launched its own &quot;national email service&quot;, requiring all citizens to sign up to it to &quot;safely&quot; communicate with government officials." />
                      <outline text="Prior to use, account holders will have to provide their local post office with their full name, national identification number and postcode." />
                      <outline text="Mohammad Hasan Nami, Iran&apos;s minister for information and communication technology, said all citizens would be assigned a national email address, but did not say whether this would affect access to other email providers." />
                      <outline text="&quot;For mutual interaction and communication between the government and the people, from now on every Iranian will receive a special email address along with their postcode,&quot; Nami was quoted as saying by the semi-official Mehr news agency." />
                      <outline text="&quot;With the assignment of an email address to every Iranian, government interactions with the people will take place electronically.&quot;" />
                      <outline text="Users will have to go to mail.post.ir to sign up to the service, which is not free, and receive an @post.ir email address. Mehr reported that the website can provide services to 100 million users and its emailing service is compatible with Farsi as well as English, French and Arabic. Each account is also said to have 50MB capacity, which can be upgraded to 2GB." />
                      <outline text="Independent experts, however, doubt the plan will materialise across the country as the newly elected president, Hassan Rouhani, who has taken a softer line on internet and web censorship, is due to be sworn-in in August." />
                      <outline text="Amin Sabeti, an Iranian media and web researcher, said the authorities had previously boasted about similar &quot;national email services&quot;, including mail.iran.ir, but none has yet been come into force in earnest. Government employees are also being encouraged to use the national email providers instead of services such as Gmail or Yahoo Mail, which are popular in Iran." />
                      <outline text="Sabeti said there are serious security problems with the new service, which he said does not encrypt data and would be easy to hack." />
                      <outline text="Hadi Nili, an Iranian journalist, said Iranians use foreign services such as Gmail because they believe it provides anonymity and privacy, and said there is a lack of trust in the new service." />
                      <outline text="In an echo of some of the questions about the NSA surveillance by the US government revealed by the whistleblower Edward Snowden, he added: &quot;Iranian users are worried how much the government can access their data and also how secure the new service is in the face of cyber attacks and intrusions from other parties.&quot;" />
                      <outline text="Some 40% of Iran&apos;s 75 million population are estimated to have access to the internet and many services are provided online, such as bill payment and online banking." />
                      <outline text="Under Mahmoud Ahmadinejad, Iran has announced various ambitious plans for its online community including an &quot;Islamic Google Earth&quot;." />
                      <outline text="In 2012, the authorities said they were carrying out tests to launch Iran&apos;s &quot;national internet&quot;, a countrywide network aimed at substituting services run through the world wide web. At the time, Iran&apos;s police also imposed tighter regulations on internet cafes, requiring owners to keep detailed records of their customers each time they use their services." />
                      <outline text="Iran has been a victim of western-backed cyber attacks against its nuclear programme and is therefore suspicious of western online services such as Google, Facebook and Twitter. In contrast to the current officials, Rouhani has said he considers Facebook a welcome phenomenon." />
                      <outline text="At least two institutions have been set up in recent years to enforce an online crackdown. Iran&apos;s cyber police, known as Fata, is in charge of policing the country&apos;s online community, identifying bloggers and users breaking its &quot;Islamic&quot; laws. The supreme council of virtual space is another body tasked with blocking access to websites deemed inappropriate. At least five million websites are blocked in Iran." />
                      <outline text="Last year the death of blogger Sattar Beheshti in jail, while he was being interrogated by Fata forces, prompted a national outcry." />
              </outline>

              <outline text="Google hosts fundraiser for climate change denying US senator">
                      <outline text="Link to Article" type="link" url="http://www.guardian.co.uk/environment/2013/jul/09/google-climate-denier-jim-inhofe" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373402075_9ZaGeXva.html" />
        <outline text="Source: The Guardian World News" type="link" url="http://feeds.guardian.co.uk/theguardian/rss" />
      <outline text="Tue, 09 Jul 2013 20:34" />
                      <outline text="" />
                      <outline text="Proceeds of Google&apos;s lunch will go to US senator James Inhofe, who has called climate change a &apos;hoax&apos;. Photograph: Axel Schmidt/AFP/Getty Images" />
                      <outline text="Google, which prides itself on building a &quot;better web that is better for the environment&quot;, is hosting a fundraiser for the most notorious climate change denier in Congress, it has emerged." />
                      <outline text="The lunch, at the company&apos;s Washington office, will benefit the Oklahoma Republican Jim Inhofe, who has made a career of dismissing climate change as a &quot;hoax&quot; on the Senate floor." />
                      <outline text="Proceeds of the 11 July lunch, priced at $250 to $2,500, will also go to the national Republican Senatorial Committee." />
                      <outline text="It&apos;s the second show of support from Google for the anti-climate cause in recent weeks." />
                      <outline text="Last month, the Washington Post reported that the internet company had donated $50,000 for a fundraising dinner for the ultra-conservative Competitive Enterprise Institute &apos;&apos; topping the contributions even of the Koch oil billionaires." />
                      <outline text="The Competitive Enterprise Institute has launched multiple law suits aimed at trying to discredit the science behind climate change &apos;&apos; accusing scientists of fraud. None have so far succeeded." />
                      <outline text="The CEI also specialises in filing open records requests, demanding universities turn over email correspondence of climate scientists with journalists." />
                      <outline text="Facebook also contributed $25,000 to the CEI dinner last month." />
                      <outline text="Google&apos;s show of support for the leading climate contrarian in Congress was criticised by climate activists on Tuesday. &quot;Google&apos;s motto is &apos;Don&apos;t Be Evil&apos;, but it is supporting one of the worst deniers of climate science in the world,&quot; said the Climate Progress website, which first reported on the story." />
                      <outline text="Inhofe has spent more than a decade challenging the science behind climate change, and trying to stop Congress from acting on climate change. He has repeatedly dismissed climate change as a &quot;hoax&quot; or &quot;hysteria&quot;, and cited the benefits of global warming for the economy and the environment." />
                      <outline text="The campaign group Forecast the Facts launched a petition calling for Google&apos;s chief executive officer, Larry Page, to cancel the fundraiser." />
                      <outline text="Google has been a corporate leader in fighting climate change. The company claims on its Google Green website to be creating &quot;a better web that is better for the environment&quot;by investing $1bn in renewable energy and making considerable savings in electricity use at its data centres." />
                      <outline text="Google initially refused to comment on the record about its support for Inhofe." />
                      <outline text="However, a company spokesperson noted that Google maintained data centres in Oklahoma. The spokesperson then sent an email saying: &quot;We regularly host fundraisers for candidates, on both sides of the aisle, but that doesn&apos;t mean we endorse all of their positions. And while we disagree on climate change policy, we share an interest with Senator Inhofe in the employees and data center we have in Oklahoma.&quot;" />
                      <outline text="Google&apos;s website notes the company has invested $700m in two data centres in Oklahoma. The state is a leading oil and gas producer - and Inhofe has been a strong promoter of the industry. However, Google has contracted to power its data centres through wind energy." />
                      <outline text="&quot;They can probably rightfully claim that the facility is powered 100% by wind,&quot; said Gary Cook, technology campaigner for Greenpeace, which tracks greenhouse gas emissions from the IT sector. He added: &quot;But even so, Jim Inhofe is the biggest obstacle to climate change action in the Senate so what are they doing raising money for him?&quot;" />
              </outline>

              <outline text="30,000 California prisoners launch largest hunger-strike in state history">
                      <outline text="Link to Article" type="link" url="http://www.blacklistednews.com/30%2C000_California_prisoners_launch_largest_hunger-strike_in_state_history/27219/0/0/0/Y/M.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373402035_YJLwrsHu.html" />
        <outline text="Source: BlackListedNews.com" type="link" url="http://feeds.feedburner.com/blacklistednews/hKxa" />
      <outline text="Tue, 09 Jul 2013 20:33" />
                      <outline text="" />
                      <outline text="Source: RT" />
                      <outline text="Prisoners at 11 state facilities began refusing meals early Monday after months of plotting a demonstration that they hope will bring change to a number of longstanding grievances held by inmates against the California Department of Corrections and Rehabilitation, particularly the practice of indefinitely housing some detainees in total isolation." />
                      <outline text="In a letter obtained by the Los Angeles Times, protesters reportedly demand that the state retire its current solitary confinement policies and let inmates accused of prison gang involvement spend a maximum of only five years in isolation. Currently there is no limit to how long inmates thought to be connected to internal gangs can spend in Segregated Housing Units, or SHUs, and the Times claim 4,527 inmates at four state prisons are living like that now, including 1,180 at Pelican Bay State Prison in northern California where the latest demonstration was first hatched." />
                      <outline text="&apos;&apos;The principal prisoner representatives from the PBSP SHU Short Corridor Collective Human Rights Movement do hereby present public notice that our nonviolent peaceful protest of our subjection to decades of indefinite state-sanctioned torture, via long term solitary confinement will resume today,&apos;&apos; reads the letter as it appears on the Prisoner Hunger Strike Solidarity website, &apos;&apos;consisting of a hunger strike/work stoppage of indefinite duration until CDCR signs a legally binding agreement meeting our demands, the heart of which mandates an end to long-term solitary confinement (as well as additional major reforms).&apos;&apos;" />
                      <outline text="According to the Times, the inmates are also seeking education and rehabilitation programs and the right to make monthly phone calls." />
                      <outline text="Prisoners in California have held similar protests before, including a hunger strike in 2011 that also originated at Pelican Bay and eventually accumulated the support of 6,000 inmates across the state." />
                      <outline text="That hunger strike eventually led to a class-action lawsuit to be filed against the corrections department which has recently entered a mediation phase. Two years after that action sent a message to the state, though, prisoners still aren&apos;t satisfied with the response they&apos;ve received." />
                      <outline text="&apos;&apos;While the CDCR has claimed to have made reforms to its SHU system &apos;-- how a prisoner ends up in the solitary units, for how long, and how they can go about getting released into the general population &apos;-- prisoners&apos; rights advocates and family members point out that the CDCR has potentially broadened the use of solitary confinement, and that conditions in the SHUs continue to constitute grave human rights violations,&apos;&apos; reads their latest letter." />
                      <outline text="Officially the state does not recognize a hunger strike until participants have refused nine consecutive meals. On Monday, corrections spokeswoman Terry Thornton told the Los Angeles Times that 30,000 prisoners skipped breakfast and lunch, putting them on course to launch an actual strike by the middle of the week." />
                      <outline text="Despite gearing towards what could become the largest hunger strike in state history, however, Thornton said, &quot;Everything has been running smoothly.&apos;&apos;" />
                      <outline text="&quot;It was normal. There were no incidents,&apos;&apos; she told the Times of Monday&apos;s protest. But according to the paper&apos;s Paige St. John, around 2,300 prisoners have taken the protest beyond the realm of refusing to eat and have also started to skip work and class." />
                      <outline text="Ms. Thornton did not immediately respond for comment when approached by RT about the status of the budding strike early Tuesday." />
                      <outline text="According to the inmates, the California prison system currently holds over 10,000 prisoners in solitary confinement units, including dozens who have spent more than 20 years each in isolation. Gabriel Reyes has spent 16 years in the SHU, and in a letter published this week by Truth-Out, writes, &apos;&apos;I understand I broke the law, and I have lost liberties because of that. But no one, no matter what they&apos;ve done, should be denied fundamental human rights, especially when that denial comes in the form of such torture.&apos;&apos;" />
                      <outline text="Reyes is currently serving a sentence of 25-years-to-life for burgling an unoccupied swelling. He says that the prison&apos;s determination of a &apos;&apos;gang affiliation&apos;&apos; has left him spending 22.5 hours a day in isolation." />
              </outline>

              <outline text="Saudi Arabia and UAE to lend Egypt&apos;s central bank up to $8 billion">
                      <outline text="Link to Article" type="link" url="http://www.blacklistednews.com/Saudi_Arabia_and_UAE_to_lend_Egypt%E2%80%99s_central_bank_up_to_%248_billion/27220/0/0/0/Y/M.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373402001_9jyvLKg4.html" />
        <outline text="Source: BlackListedNews.com" type="link" url="http://feeds.feedburner.com/blacklistednews/hKxa" />
      <outline text="Tue, 09 Jul 2013 20:33" />
                      <outline text="" />
                      <outline text="Source: RT" />
                      <outline text="The United Arab Emirates will give Egypt $1 billion and lend it a further $2 billion. Saudi Arabia has also said it has approved a $5billion aid package to Cairo." />
                      <outline text="The UAE loan would be in the form of a $2 billion interest free deposit in Egypt&apos;s central bank, state news agency WAM said on Tuesday. The UAE is also to give Egypt $1 billion." />
                      <outline text="The UAE delegation to Cairo included the Gulf country&apos;s national security adviser, foreign minister and energy minister." />
                      <outline text="The UAE visit was to &apos;&apos;show full support to the people of Egypt - political support, economic support,&apos;&apos; Badr Abdelatty an Egyptian foreign ministry spokesman told Reuters." />
                      <outline text="The UAE was one of the first countries to congratulate Egypt following the army&apos;s decision to oust the Muslim Brotherhood&apos;s Mohammed Morsi." />
                      <outline text="Saudi Arabia also approved a $5 billion aid package to Egypt Tuesday, comprising a $2 billion central bank deposit, $2 billion in energy products and $1 billion in cash, Ibrahim Alassaf, the Saudi Finance Minister told Reuters." />
                      <outline text="Meanwhile Washington has said that there will be no immediate cut off of US aid to Egypt, although the 700 million for 2013 has not yet been disbursed and aid for 2014 has not yet been discussed." />
                      <outline text="Please enable JavaScript to view the comments powered by Disqus." />
              </outline>

              <outline text="Your Life is Now Classified: NSA Rejecting All FOIA Requests by American Citizens">
                      <outline text="Link to Article" type="link" url="http://www.blacklistednews.com/Your_Life_is_Now_Classified%3A_NSA_Rejecting_All_FOIA_Requests_by_American_Citizens/27218/0/0/0/Y/M.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373401978_ph7vYKKS.html" />
        <outline text="Source: BlackListedNews.com" type="link" url="http://feeds.feedburner.com/blacklistednews/hKxa" />
      <outline text="Tue, 09 Jul 2013 20:32" />
                      <outline text="" />
                      <outline text="Clayton Seymour, a 36-year-old IT specialist from Hilliard, Ohio, recently sent a Freedom of Information Act (FOIA) request to the NSA, curious as to whether any data about him was being collected." />
                      <outline text="What he received in response made his blood boil.  " />
                      <outline text="&apos;&apos;I am a generally law abiding citizen with nothing I can think of that would require monitoring,&apos;&apos; Seymour wrote to me, &apos;&apos;but I wanted to know if I was having data collected about me and if so, what.&apos;&apos;" />
                      <outline text="So Seymour sent in an FOIA request. Weeks later, a letter from the NSA arrived explaining that he was not entitled to any information. &apos;&apos;When I got the declined letter, I was furious,&apos;&apos; he told me. &apos;&apos;I feel betrayed.&apos;&apos;" />
                      <outline text="Seymour had decided to request his NSA file after coming across a recent post of mine instructing Americans on how to properly request such files from the FBI and NSA. A Navy vet and two-time Obama voter who supported the President&apos;s platform of greater governmental transparency, Seymour was shocked by the letter he received." />
                      <outline text="The letter, which first acknowledges the media coverage surrounding its surveillance systems, quickly moves to justify why none of that data can be obtained by an American citizen in a standard FOIA request:" />
                      <outline text="Seymour isn&apos;t the only one who has recently had an FOIA request denied by the NSA &apos;&apos; dozens of citizens have emailed me to say they&apos;ve received a similar, if not identical, letter. And it&apos;s clear from the exemption the NSA is using that every single American is having their FOIA requests similarly rejected." />
                      <outline text="Unjustly so." />
                      <outline text="It should be noted that there are legitimate exemptions to the Freedom of Information Act, the first of which states that documents requested may be denied if they are &apos;&apos;properly classified as secret in the interest of national defense or foreign policy.&apos;&apos;" />
                      <outline text="However, the central problem is this: Seymour&apos;s letter from the NSA points to Executive Order 13526, signed by President Obama in 2009, as justification for the NSA&apos;s FOIA exemption." />
                      <outline text="This order signed by Obama established a uniform system for classifying national security information, and stipulates that &apos;&apos;information shall not be considered for classification unless its unauthorized disclosure could reasonably be expected to cause identifiable or describable damage to the national security.&apos;&apos;" />
                      <outline text="This qualification appears in section 1.4 of the executive order, after which follow many categories of information which maybe marked as classified. The category the NSA points to in justifying the classification of all its data is this:" />
                      <outline text="(c) intelligence activities (including covert action), intelligence sources or methods, or cryptology" />
                      <outline text="Meaning: the NSA is classifying every single bit of data it receives from ordinary American citizens based on the premise that it has been gathered covertly." />
                      <outline text="Meaning: the NSA&apos;s advertised justification for not granting FOIA requests is to protect our country. However, the real justification is the NSA&apos;s covert violation of Americans&apos; Fourth Amendment right not to be subject to unwarranted searches and seizures (in this case of their personal, digital data)." />
                      <outline text="The NSA, it seems, has classified every single piece of data on American citizens that it has seized and saved, even benign data culled from people like Seymour, who are no threat to U.S. national security." />
                      <outline text="&apos;&apos;I believe in the concept of America,&apos;&apos; Seymour told me. &apos;&apos;[But] not its current execution.&apos;&apos;" />
                      <outline text="I sense the Founding Fathers would agree with him.=" />
              </outline>

              <outline text="VIDEO-Activist Post: Flashback: Mos Def Schools Bill Maher on 9/11">
                      <outline text="Link to Article" type="link" url="http://www.activistpost.com/2013/07/flashback-mos-def-schools-bill-maher-on.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373401657_KzM2KZbC.html" />
      <outline text="Tue, 09 Jul 2013 20:27" />
                      <outline text="" />
                      <outline text="Youtube" />
              </outline>

              <outline text="Don&apos;t Ever Tell Me Young Women Don&apos;t Care">
                      <outline text="Link to Article" type="link" url="http://www.geezersisters.com/women/dont-ever-tell-me-young-women-dont-care" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373397532_uPX4Uxdt.html" />
        <outline text="Source: The Fabulous Geezersisters’ Weblog" type="link" url="http://feeds.feedblitz.com/thefabulousgeezersistersweblog&amp;x=1" />
      <outline text="Tue, 09 Jul 2013 19:18" />
                      <outline text="" />
                      <outline text="about reproductive rights. Watch this kick-ass young woman and cheer." />
                      <outline text="Tagged as: feminism, pro choice, reproductive rights, texas, texas legislature, women" />
              </outline>

              <outline text="A message from National Security Agency subject number 70900">
                      <outline text="Link to Article" type="link" url="http://www.homelandsecurityus.com/archives/8821" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373397059_sjTWZdeH.html" />
        <outline text="Source: Northeast Intelligence Network" type="link" url="http://www.homelandsecurityus.com/feed" />
      <outline text="Tue, 09 Jul 2013 19:10" />
                      <outline text="" />
                      <outline text=" Please comment on this article at Canada Free Press" />
                      <outline text="&apos;&apos;If you let them do this to me and get away with it, then you&apos;re giving them the eternal right to do the same damn thing to any one of you!&apos;&apos; -Buford Pusser" />
                      <outline text="By Douglas J. Hagmann" />
                      <outline text="9 July 2013: To a lie, truth is toxic. To the purveyors of lies, truth-tellers are a poisonous threat. To the corrupt men and women of government, exposure of corruption is a serious threat that cannot be permitted to see the light of day. Those seeking to expose the lies, deceit and corruption by our elected officials or those holding the reins of power are the targets of marginalization, vilification, or worse. I write these words not only under my own name, but with contempt and disgust as an American citizen known to the National Security Agency as FOIA file number 70900. More precisely, it is the number assigned to my case by the NSA, stemming from my efforts to expose criminal government overreach against every American citizen. I will wear that number as I &apos;&apos;walk tall&apos;&apos; in my continuous quest for the truth." />
                      <outline text="Allow me to briefly take you back 40 years, as I believe you will see certain parallels that are perhaps more relevant today than they were then. And those parallels are applicable not just to my situation, but to everyone reading this." />
                      <outline text="The original film &apos;&apos;Walking Tall&apos;&apos; was a 1973 movie based on the real life of Buford Pusser, former sheriff of McNairy County, Tennessee from 1964-1970. Anyone old enough to remember seeing the movie in theaters will likely recall the plot as well. At 6&apos;6&apos;&quot; tall, Pusser was a one-time professional wrestler, although was convinced by his wife Pauline to leave the theater of professional wrestling to return home to McNairy County, Tennessee, a backwoods area located along the northern border of Mississippi to start a business with his father in the lumber industry." />
                      <outline text="Following his return home, Pusser and a friend visited a well known gambling house known as the Lucky Spot. It was unlucky for Pusser, however, when he became a front line loser after he discovered that the craps game was rigged. His protests resulted in a near fatal stab wound that required 200 stitches. Like any other victim of attempted murder, Pusser complained to the county sheriff, who promptly did nothing and allowed his attackers to remain free and unmolested of any criminal charges." />
                      <outline text="Undeterred by this lack of official justice, Pusser does his own investigation. He soon learns that not only were the games at the Lucky Spot rigged, the whole system in McNairy County was rigged, and the men in power were corrupt. But who do you complain to when the very men who are supposed to represent law and order are themselves corrupt? Is any of this sounding remotely familiar to today&apos;s federal government?" />
                      <outline text="And so his quest for justice began. Fashioning a club from a tree branch at his family&apos;s lumber mill, Pusser pays a visit to the men who stabbed him and left him for dead. His actions promptly caused the sheriff to arrest Pusser, and a jury trial ensued. It is here that I hope readers will see the relevance to the larger issues of today." />
                      <outline text="During a jury trial, Pusser represented himself. At one point during the trial, he ripped open his shirt and showed the jury the hideous scar left by the stabbing and the 200 stitches needed to close the near fatal wound. At the same time, he stared at those in the jury box and emphatically stated: &apos;&apos;If you let them do this to me and get away with it, then you&apos;re giving them the eternal right to do the same damn thing to any one of you!&apos;&apos; Buford Pusser was acquitted of all charges." />
                      <outline text="Disgusted at the rampant corruption he saw, Pusser ran for the office of sheriff of McNair County Tennessee and became Tennessee&apos;s youngest sheriff ever elected. He vowed to clean up the county, and hit the ground running to do just that." />
                      <outline text="The cost of justice" />
                      <outline text="Buford Pusser soon learned that justice comes at a price that few are willing to pay. In his quest for &apos;&apos;justice for all,&apos;&apos; several attempts were made on his life by those in power. Some attempts nearly succeeded. Others had sad consequences. His wife of just 7 years at the time, Pauline, was murdered on August 12, 1967 in an assassination attempt meant for him. The killer, although identified by Pusser, was never brought to justice." />
                      <outline text="Men of nearly unfathomable hubris and defiance not only to a system of laws, but to the people they enslaved by their illegal actions, ran roughshod over Pusser and continue unabated today. Has the template of injustice and oppression changed over the years? It indeed has&apos;... it has been consolidated and refined. Some things, however, don&apos;t change. Some techniques continue to work because we allow them to work, either because of fear, general malaise by a self-absorbed populace, or the feeling that we cannot make a difference. Again, it seems that some things don&apos;t change." />
                      <outline text="On the hot August night of August 21, 1974, Buford Pusser&apos;s life came to a tragic end in a manner that just might ring a familiar bell &apos;&apos; a ringing that continues today. Following an appearance at the county fair that evening, Pusser was returning home as the driver and sole occupant of his car when inexplicably, he slammed into an embankment at a high rate of speed. The force was so great that Pusser was ejected from his vehicle and, of course, the car burst into flames, leaving nothing but a pile of twisted metal and shouldering embers that prevented any forensic analysis of the vehicle for signs of tampering. Is any of this sounding familiar?" />
                      <outline text="You can find for yourself the tales associated with the final hours of Buford Pusser&apos;s life, including allegations that he was drunk at the time of the crash, although there was no autopsy ordered or performed. Interestingly enough, the Tennessee State Trooper who led the investigation of the crash and Pusser&apos;s death, Paul Ervin, later became the sheriff of McNairy County, Tennessee." />
                      <outline text="Justice denied" />
                      <outline text="I believe that the print space devoted to Buford Pusser is necessary against the backdrop of the injustice we are seeing today. Like Buford Pusser, the very people who are attempting to expose the rampant corruption within our own government are themselves being targeted by the people in power. We are being systematically victimized by an all-powerful, out-of-control tyrannical system where, like the former Lucky Spot in McNairy County, Tennessee, all of the games are rigged and the house always wins, and wins big. Like Jon Corzine big, as it was just announced that the former New Jersey governor and former CEO of Goldman Sachs and MF Global will not face any criminal charges for his role in $1.6 billion of missing, segregated customer money that led to the demise of MF Global and ruined the lives of countless families &apos;&apos; members of the unwashed masses. Can&apos;t people see that &apos;&apos;every game in the house&apos;&apos; is rigged, and the people in power are laughing at you?" />
                      <outline text="The story of Buford Pusser, however, has never been as personal to me as it is today. Having seen the film in the theater shortly after its release, I can recall my disgust as a young man at the injustice portrayed in the film, and the resistance to the efforts of Buford Pusser. While I certainly make no claims being akin to his real-life persona, I understand his passionate outrage at the injustice he saw and personally experienced  and wanted so badly to correct. I too am outraged, and you should be as well." />
                      <outline text="Considering that the whole system is rigged, are we not all victims, or prospective victims like Pusser as he attempted to expose and root out corruption in the county where he lived? Like Pusser, what do we do when there is no one or no agency to right the wrongs, or even consider our grievances?" />
                      <outline text="The surveillance state" />
                      <outline text="In the grand scheme of things, I am no one special. In the files of the NSA, however, I am File number 70900. And as an American citizen, I apparently pose a national security threat due to questions no one wants to answer, and to corruption few wish to expose." />
                      <outline text="It was made clear to a FOIA request made on my behalf by my Canada Free Press colleague Marinka Peschmann that the National Security Agency can do whatever they damn well please to me and by extension, to you and anyone else with impunity and under the cover of darkness by executive order 13526 signed by Barack Hussein Obama on December 29, 2009. How&apos;s that for the promise of transparency?" />
                      <outline text="Regardless of what you think of Edward Snowden, he exposed an unchecked surveillance apparatus that violates our Constitutional rights and civil liberties. It is that very apparatus that has created a web designed to ensnare anyone seeking the truth about the surveillance process and those behind it. It has been deliberately turned upon those who dare to expose the truth about what is really taking place in America today, and what is being planned for tomorrow." />
                      <outline text="It was just two days ago that a fellow journalist told me that he would no longer talk to me, as I have now become &apos;&apos;toxic&apos;&apos; by my presence on the radar of the federal government. The very fact that the NSA is not only collecting information, but content, is having a chilling effect on those of us seeking to expose corruption and provide the truth to the American public. You see, it&apos;s not about metadata and other innocuous sounding information. That&apos;s the cover for what&apos;s truly taking place, which is identifying anyone who does not wish to go along with the agenda of those in power. You are being lied to, and no one in the press is questioning the lies, save for a few." />
                      <outline text="We must not allow this process that is contrary to our Constitution to continue. With no one in congress challenging the legalities of the Executive Orders, the trampling of our rights as American citizens, and a Justice Department that is clearly in the back pocket of the Executive Branch, to whom do we turn? Shall we write our congressmen, or patiently wait for a &apos;&apos;regime&apos;&apos; change? How&apos;s that been working for us?" />
                      <outline text="Perhaps justice will not be of this world, as suggested in the words of Thomas Jefferson. &apos;&apos;I tremble for my country when I reflect that God is just; that his justice cannot sleep forever.&apos;&apos;" />
                      <outline text="For me, file number 70900, I will continue my quest for the truth and to expose the corruption and depraved indifference of those in power. I merely ask that you do the same. And pray." />
                      <outline text="Click here to save this article in PDF format" />
              </outline>

              <outline text="Is the NSA Rejecting All Freedom of Information Act Requests from U.S. Citizens? | TheBlaze.com">
                      <outline text="Link to Article" type="link" url="http://www.theblaze.com/stories/2013/07/07/is-the-nsa-rejecting-all-freedom-of-information-act-requests-from-u-s-citizens/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373396190_9gsg6P2K.html" />
      <outline text="Tue, 09 Jul 2013 18:56" />
                      <outline text="" />
                      <outline text="The National Security Administration campus in Fort Meade, Md. (Credit: AP)" />
                      <outline text="Clayton Seymour recently sent a Freedom of Information Act (FOIA) request to the National Security Agency; the IT specialist was interested in knowing if the NSA was collecting data on him." />
                      <outline text="Weeks later, the Navy vet from Hilliard, Ohio&apos;--who voted for President Obama in 2008 and 2012 and supported his platform of greater governmental transparency&apos;--got a response that made him &apos;&apos;furious.&apos;&apos;" />
                      <outline text="It was a letter from the NSA explaining that he was not entitled to any information. Seymour tells Tikkun Daily Blog scribe David Harris-Gershon that he &apos;&apos;felt betrayed.&apos;&apos;" />
                      <outline text="The rejection letter details why &apos;&apos;none of that data can be obtained by an American citizen in a standard FOIA request,&apos;&apos; the Tikkun Daily notes:" />
                      <outline text="(Credit: Tikkun Daily Blog)" />
                      <outline text="As it turns out, according to Harris-Gershon, &apos;&apos;dozens of citizens have emailed me to say they&apos;ve received a similar, if not identical, letter. And it&apos;s clear from the exemption the NSA is using that every single American is having their FOIA requests similarly rejected.&apos;&apos;" />
                      <outline text="Seymour had decided to request his NSA file after coming across a recent post of Harris-Gershon&apos;s instructing Americans on how to properly request such files from the FBI and NSA." />
                      <outline text="Harris-Gershon adds:" />
                      <outline text="It should be noted that there are legitimate exemptions to the Freedom of Information Act, the first of which states that documents requested may be denied if they are &apos;&apos;properly classified as secret in the interest of national defense or foreign policy.&apos;&apos;" />
                      <outline text="However, the central problem is this: Seymour&apos;s letter from the NSA points to Executive Order 13526, signed by President Obama in 2009, as justification for the NSA&apos;s FOIA exemption." />
                      <outline text="This order signed by Obama established a uniform system for classifying national security information, and stipulates that &apos;&apos;information shall not be considered for classification unless its unauthorized disclosure could reasonably be expected to cause identifiable or describable damage to the national security.&apos;&apos;" />
                      <outline text="This qualification appears in section 1.4 of the executive order, after which follow many categories of information which may be marked as classified. The category the NSA points to in justifying the classification of all its data is this:" />
                      <outline text="(c) intelligence activities (including covert action), intelligence sources or methods, or cryptology" />
                      <outline text="Meaning: the NSA is classifying every single bit of data it receives from ordinary American citizens based on the premise that it has been gathered covertly." />
                      <outline text="Meaning: the NSA&apos;s advertised justification for not granting FOIA requests is to protect our country. However, the real justification is the NSA&apos;s covert violation of Americans&apos; Fourth Amendment right not to be subject to unwarranted searches and seizures (in this case of their personal, digital data)." />
                      <outline text="The NSA, it seems, has classified every single piece of data on American citizens that it has seized and saved, even benign data culled from people like Seymour, who are no threat to U.S. national security." />
                      <outline text="&apos;&apos;I believe in the concept of America,&apos;&apos; Seymour wrote to Harris-Gershon. &apos;&apos;[But] not its current execution.&apos;&apos;" />
                      <outline text="NSA Rejection Letter" />
                      <outline text="(H/T: Daily Kos, Tikkun Daily Blog)" />
                      <outline text="&apos;&apos;" />
                      <outline text="Related Contributions:" />
                      <outline text="&apos;&apos;" />
              </outline>

              <outline text="Executive Order 13526- Classified National Security Information | The White House">
                      <outline text="Link to Article" type="link" url="http://www.whitehouse.gov/the-press-office/executive-order-classified-national-security-information" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373396177_rbUS64JY.html" />
      <outline text="Tue, 09 Jul 2013 18:56" />
                      <outline text="" />
                      <outline text="The White House" />
                      <outline text="Office of the Press Secretary" />
                      <outline text="For Immediate Release" />
                      <outline text="December 29, 2009" />
                      <outline text="This order prescribes a uniform system for classifying, safeguarding, and declassifying national security information, including information relating to defense against transnational terrorism.  Our democratic principles require that the American people be informed of the activities of their Government.  Also, our Nation&apos;s progress depends on the free flow of information both within the Government and to the American people.  Nevertheless, throughout our history, the national defense has required that certain information be maintained in confidence in order to protect our citizens, our democratic institutions, our homeland security, and our interactions with foreign nations.  Protecting information critical to our Nation&apos;s security and demonstrating our commitment to open Government through accurate and accountable application of classification standards and routine, secure, and effective declassification are equally important priorities." />
                      <outline text="NOW, THEREFORE, I, BARACK OBAMA, by the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby ordered as follows:" />
                      <outline text="PART 1 -- ORIGINAL CLASSIFICATION" />
                      <outline text="Section 1.1.  Classification Standards.  (a)  Information may be originally classified under the terms of this order only if all of the following conditions are met:" />
                      <outline text="(1)  an original classification authority is classifying the information;" />
                      <outline text="(2)  the information is owned by, produced by or for, or is under the control of the United States Government;" />
                      <outline text="(3)  the information falls within one or more of the categories of information listed in section 1.4 of this order; and" />
                      <outline text="(4)  the original classification authority determines that the unauthorized disclosure of the information reasonably could be expected to result in damage to the national security, which includes defense against transnational terrorism, and the original classification authority is able to identify or describe the damage." />
                      <outline text="(b)  If there is significant doubt about the need to classify information, it shall not be classified.  This provision does not:" />
                      <outline text="(1)  amplify or modify the substantive criteria or procedures for classification; or" />
                      <outline text="(2)  create any substantive or procedural rights subject to judicial review." />
                      <outline text="(c)  Classified information shall not be declassified automatically as a result of any unauthorized disclosure of identical or similar information." />
                      <outline text="(d)  The unauthorized disclosure of foreign government information is presumed to cause damage to the national security." />
                      <outline text="Sec. 1.2.  Classification Levels.  (a)  Information may be classified at one of the following three levels:" />
                      <outline text="(1)  &quot;Top Secret&quot; shall be applied to information, the unauthorized disclosure of which reasonably could be expected to cause exceptionally grave damage to the national security that the original classification authority is able to identify or describe." />
                      <outline text="(2)  &quot;Secret&quot; shall be applied to information, the unauthorized disclosure of which reasonably could be expected to cause serious damage to the national security that the original classification authority is able to identify or describe." />
                      <outline text="(3)  &quot;Confidential&quot; shall be applied to information, the unauthorized disclosure of which reasonably could be expected to cause damage to the national security that the original classification authority is able to identify or describe." />
                      <outline text="(b)  Except as otherwise provided by statute, no other terms shall be used to identify United States classified information." />
                      <outline text="(c)  If there is significant doubt about the appropriate level of classification, it shall be classified at the lower level." />
                      <outline text="Sec. 1.3.  Classification Authority.  (a)  The authority to classify information originally may be exercised only by:" />
                      <outline text="(1)  the President and the Vice President;" />
                      <outline text="(2)  agency heads and officials designated by the President; and" />
                      <outline text="(3)  United States Government officials delegated this authority pursuant to paragraph (c) of this section." />
                      <outline text="(b)  Officials authorized to classify information at a specified level are also authorized to classify information at a lower level." />
                      <outline text="(c)  Delegation of original classification authority." />
                      <outline text="(1)  Delegations of original classification authority shall be limited to the minimum required to administer this order.  Agency heads are responsible for ensuring that designated subordinate officials have a demonstrable and continuing need to exercise this authority." />
                      <outline text="(2)  &quot;Top Secret&quot; original classification authority may be delegated only by the President, the Vice President, or an agency head or official designated pursuant to paragraph (a)(2) of this section." />
                      <outline text="(3)  &quot;Secret&quot; or &quot;Confidential&quot; original classification authority may be delegated only by the President, the Vice President, an agency head or official designated pursuant to paragraph (a)(2) of this section, or the senior agency official designated  under section 5.4(d) of this order, provided that official has been delegated &quot;Top Secret&quot; original classification authority by the agency head." />
                      <outline text="(4)  Each delegation of original classification authority shall be in writing and the authority shall not be redelegated except as provided in this order.  Each delegation shall identify the official by name or position." />
                      <outline text="(5)  Delegations of original classification authority shall be reported or made available by name or position to the Director of the Information Security Oversight Office." />
                      <outline text="(d)  All original classification authorities must receive training in proper classification (including the avoidance of over-classification) and declassification as provided in this order and its implementing directives at least once a calendar year.  Such training must include instruction on the proper safeguarding of classified information and on the sanctions in section 5.5 of this order that may be brought against an individual who fails to classify information properly or protect classified information from unauthorized disclosure.  Original classification authorities who do not receive such mandatory training at least once within a calendar year shall have their classification authority suspended by the agency head or the senior agency official designated under section 5.4(d) of this order until such training has taken place.  A waiver may be granted by the agency head, the deputy agency head, or the senior agency official if an individual is unable to receive such training due to unavoidable circumstances.  Whenever a waiver is granted, the individual shall receive such training as soon as practicable." />
                      <outline text="(e)  Exceptional cases.  When an employee, government contractor, licensee, certificate holder, or grantee of an agency who does not have original classification authority originates information believed by that person to require classification, the information shall be protected in a manner consistent with this order and its implementing directives.  The information shall be transmitted promptly as provided under this order or its implementing directives to the agency that has appropriate subject matter interest and classification authority with respect to this information.  That agency shall decide within 30 days whether to classify this information." />
                      <outline text="Sec. 1.4.  Classification Categories.  Information shall not be considered for classification unless its unauthorized disclosure could reasonably be expected to cause identifiable or describable damage to the national security in accordance with section 1.2 of this order, and it pertains to one or more of the following:" />
                      <outline text="(a)  military plans, weapons systems, or operations;" />
                      <outline text="(b)  foreign government information;" />
                      <outline text="(c)  intelligence activities (including covert action), intelligence sources or methods, or cryptology;" />
                      <outline text="(d)  foreign relations or foreign activities of the United States, including confidential sources;" />
                      <outline text="(e)  scientific, technological, or economic matters relating to the national security;" />
                      <outline text="(f)  United States Government programs for safeguarding nuclear materials or facilities;" />
                      <outline text="(g)  vulnerabilities or capabilities of systems, installations, infrastructures, projects, plans, or protection services relating to the national security; or" />
                      <outline text="(h)  the development, production, or use of weapons of mass destruction." />
                      <outline text="Sec. 1.5.  Duration of Classification.  (a)  At the time of original classification, the original classification authority shall establish a specific date or event for declassification based on the duration of the national security sensitivity of the information.  Upon reaching the date or event, the information shall be automatically declassified.  Except for information that should clearly and demonstrably be expected to reveal the identity of a confidential human source or a human intelligence source or key design concepts of weapons of mass destruction, the date or event shall not exceed the time frame established in paragraph (b) of this section." />
                      <outline text="(b)  If the original classification authority cannot determine an earlier specific date or event for declassification, information shall be marked for declassification 10 years from the date of the original decision, unless the original classification authority otherwise determines that the sensitivity of the information requires that it be marked for declassification for up to 25 years from the date of the original decision." />
                      <outline text="(c)  An original classification authority may extend the duration of classification up to 25 years from the date of origin of the document, change the level of classification, or reclassify specific information only when the standards and procedures for classifying information under this order are followed." />
                      <outline text="(d)  No information may remain classified indefinitely.  Information marked for an indefinite duration of classification under predecessor orders, for example, marked as &quot;Originating Agency&apos;s Determination Required,&quot; or classified information that contains incomplete declassification instructions or lacks declassification instructions shall be declassified in accordance with part 3 of this order." />
                      <outline text="Sec. 1.6.  Identification and Markings.  (a)  At the time of original classification, the following shall be indicated in a manner that is immediately apparent:" />
                      <outline text="(1)  one of the three classification levels defined in section 1.2 of this order;" />
                      <outline text="(2)  the identity, by name and position, or by personal identifier, of the original classification authority;" />
                      <outline text="(3)  the agency and office of origin, if not otherwise evident;" />
                      <outline text="(4)  declassification instructions, which shall indicate one of the following:" />
                      <outline text="(A)  the date or event for declassification, as prescribed in section 1.5(a);" />
                      <outline text="(B)  the date that is 10 years from the date of original classification, as prescribed in section 1.5(b);" />
                      <outline text="(C)  the date that is up to 25 years from the date of original classification, as prescribed in section 1.5(b); or" />
                      <outline text="(D)  in the case of information that should clearly and demonstrably be expected to reveal the identity of a confidential human source or a human intelligence source or key design concepts of weapons of mass destruction, the marking prescribed in implementing directives issued pursuant to this order; and" />
                      <outline text="(5)  a concise reason for classification that, at a minimum, cites the applicable classification categories in section 1.4 of this order." />
                      <outline text="(b)  Specific information required in paragraph (a) of this section may be excluded if it would reveal additional classified information." />
                      <outline text="(c)  With respect to each classified document, the agency originating the document shall, by marking or other means, indicate which portions are classified, with the applicable classification level, and which portions are unclassified.  In accordance with standards prescribed in directives issued under this order, the Director of the Information Security Oversight Office may grant and revoke temporary waivers of this requirement.  The Director shall revoke any waiver upon a finding of abuse." />
                      <outline text="(d)  Markings or other indicia implementing the provisions of this order, including abbreviations and requirements to safeguard classified working papers, shall conform to the standards prescribed in implementing directives issued pursuant to this order." />
                      <outline text="(e)  Foreign government information shall retain its original classification markings or shall be assigned a U.S. classification that provides a degree of protection at least equivalent to that required by the entity that furnished the information.  Foreign government information retaining its original classification markings need not be assigned a U.S. classification marking provided that the responsible agency determines that the foreign government markings are adequate to meet the purposes served by U.S. classification markings." />
                      <outline text="(f)  Information assigned a level of classification under this or predecessor orders shall be considered as classified at that level of classification despite the omission of other required markings.  Whenever such information is used in the derivative classification process or is reviewed for possible declassification, holders of such information shall coordinate with an appropriate classification authority for the application of omitted markings." />
                      <outline text="(g)  The classification authority shall, whenever practicable, use a classified addendum whenever classified information constitutes a small portion of an otherwise unclassified document or prepare a product to allow for dissemination at the lowest level of classification possible or in unclassified form." />
                      <outline text="(h)  Prior to public release, all declassified records shall be appropriately marked to reflect their declassification." />
                      <outline text="Sec. 1.7.  Classification Prohibitions and Limitations.  (a)  In no case shall information be classified, continue to be maintained as classified, or fail to be declassified in order to:(1)  conceal violations of law, inefficiency, or administrative error;" />
                      <outline text="(2)  prevent embarrassment to a person, organization, or agency;" />
                      <outline text="(3)  restrain competition; or" />
                      <outline text="(4)  prevent or delay the release of information that does not require protection in the interest of the national security." />
                      <outline text="(b)  Basic scientific research information not clearly related to the national security shall not be classified." />
                      <outline text="(c)  Information may not be reclassified after declassification and release to the public under proper authority unless:" />
                      <outline text="(1)  the reclassification is personally approved in writing by the agency head based on a document-by-document determination by the agency that reclassification is required to prevent significant and demonstrable damage to the national security;" />
                      <outline text="(2)  the information may be reasonably recovered without bringing undue attention to the information;" />
                      <outline text="(3)  the reclassification action is reported promptly to the Assistant to the President for National Security Affairs (National Security Advisor) and the Director of the Information Security Oversight Office; and" />
                      <outline text="(4)  for documents in the physical and legal custody of the National Archives and Records Administration (National Archives) that have been available for public use, the agency head has, after making the determinations required by this paragraph, notified the Archivist of the United States (Archivist), who shall suspend public access pending approval of the reclassification action by the Director of the Information Security Oversight Office.  Any such decision by the Director may be appealed by the agency head to the President through the National Security Advisor.  Public access shall remain suspended pending a prompt decision on the appeal." />
                      <outline text="(d)  Information that has not previously been disclosed to the public under proper authority may be classified or reclassified after an agency has received a request for it under the Freedom of Information Act (5 U.S.C. 552), the Presidential Records Act, 44 U.S.C. 2204(c)(1), the Privacy Act of 1974 (5 U.S.C. 552a), or the mandatory review provisions of section 3.5 of this order only if such classification meets the requirements of this order and is accomplished on a document-by-document basis with the personal participation or under the direction of the agency head, the deputy agency head, or the senior agency official designated under section 5.4 of this order.  The requirements in this paragraph also apply to those situations in which information has been declassified in accordance with a specific date or event determined by an original classification authority in accordance with section 1.5 of this order." />
                      <outline text="(e)  Compilations of items of information that are individually unclassified may be classified if the compiled information reveals an additional association or relationship that:  (1) meets the standards for classification under this order; and (2) is not otherwise revealed in the individual items of information." />
                      <outline text="Sec. 1.8.  Classification Challenges.  (a)  Authorized holders of information who, in good faith, believe that its classification status is improper are encouraged and expected to challenge the classification status of the information in accordance with agency procedures established under paragraph (b) of this section." />
                      <outline text="(b)  In accordance with implementing directives issued pursuant to this order, an agency head or senior agency official shall establish procedures under which authorized holders of information, including authorized holders outside the classifying agency, are encouraged and expected to challenge the classification of information that they believe is improperly classified or unclassified.  These procedures shall ensure that:" />
                      <outline text="(1)  individuals are not subject to retribution for bringing such actions;" />
                      <outline text="(2)  an opportunity is provided for review by an impartial official or panel; and" />
                      <outline text="(3)  individuals are advised of their right to appeal agency decisions to the Interagency Security Classification Appeals Panel (Panel) established by section 5.3 of this order." />
                      <outline text="(c)  Documents required to be submitted for prepublication review or other administrative process pursuant to an approved nondisclosure agreement are not covered by this section." />
                      <outline text="Sec. 1.9.  Fundamental Classification Guidance Review.  (a)  Agency heads shall complete on a periodic basis a comprehensive review of the agency&apos;s classification guidance, particularly classification guides, to ensure the guidance reflects current circumstances and to identify classified information that no longer requires protection and can be declassified.  The initial fundamental classification guidance review shall be completed within 2 years of the effective date of this order." />
                      <outline text="(b)  The classification guidance review shall include an evaluation of classified information to determine if it meets the standards for classification under section 1.4 of this order, taking into account an up-to-date assessment of likely damage as described under section 1.2 of this order." />
                      <outline text="(c)  The classification guidance review shall include original classification authorities and agency subject matter experts to ensure a broad range of perspectives." />
                      <outline text="(d)  Agency heads shall provide a report summarizing the results of the classification guidance review to the Director of the Information Security Oversight Office and shall release an unclassified version of this report to the public." />
                      <outline text="PART 2 -- DERIVATIVE CLASSIFICATION" />
                      <outline text="Sec. 2.1.  Use of Derivative Classification.  (a)  Persons who reproduce, extract, or summarize classified information, or who apply classification markings derived from source material or as directed by a classification guide, need not possess original classification authority." />
                      <outline text="(b)  Persons who apply derivative classification markings shall:(1)  be identified by name and position, or by personal identifier, in a manner that is immediately apparent for each derivative classification action;" />
                      <outline text="(2)  observe and respect original classification decisions; and" />
                      <outline text="(3)  carry forward to any newly created documents the pertinent classification markings.  For information derivatively classified based on multiple sources, the derivative classifier shall carry forward:" />
                      <outline text="(A)  the date or event for declassification that corresponds to the longest period of classification among the sources, or the marking established pursuant to section 1.6(a)(4)(D) of this order; and" />
                      <outline text="(B)  a listing of the source materials." />
                      <outline text="(c)  Derivative classifiers shall, whenever practicable, use a classified addendum whenever classified information constitutes a small portion of an otherwise unclassified document or prepare a product to allow for dissemination at the lowest level of classification possible or in unclassified form." />
                      <outline text="(d)  Persons who apply derivative classification markings shall receive training in the proper application of the derivative classification principles of the order, with an emphasis on avoiding over-classification, at least once every 2 years.  Derivative classifiers who do not receive such training at least once every 2 years shall have their authority to apply derivative classification markings suspended until they have received such training.  A waiver may be granted by the agency head, the deputy agency head, or the senior agency official if an individual is unable to receive such training due to unavoidable circumstances.  Whenever a waiver is granted, the individual shall receive such training as soon as practicable." />
                      <outline text="Sec. 2.2.  Classification Guides.  (a)  Agencies with original classification authority shall prepare classification guides to facilitate the proper and uniform derivative classification of information.  These guides shall conform to standards contained in directives issued under this order." />
                      <outline text="(b)  Each guide shall be approved personally and in writing by an official who:" />
                      <outline text="(1)  has program or supervisory responsibility over the information or is the senior agency official; and" />
                      <outline text="(2)  is authorized to classify information originally at the highest level of classification prescribed in the guide." />
                      <outline text="(c)  Agencies shall establish procedures to ensure that classification guides are reviewed and updated as provided in directives issued under this order." />
                      <outline text="(d)  Agencies shall incorporate original classification decisions into classification guides on a timely basis and in accordance with directives issued under this order." />
                      <outline text="(e)  Agencies may incorporate exemptions from automatic declassification approved pursuant to section 3.3(j) of this order into classification guides, provided that the Panel is notified of the intent to take such action for specific information in advance of approval and the information remains in active use." />
                      <outline text="(f)  The duration of classification of a document classified by a derivative classifier using a classification guide shall not exceed 25 years from the date of the origin of the document, except for:" />
                      <outline text="(1)  information that should clearly and demonstrably be expected to reveal the identity of a confidential human source or a human intelligence source or key design concepts of weapons of mass destruction; and" />
                      <outline text="(2)  specific information incorporated into classification guides in accordance with section 2.2(e) of this order." />
                      <outline text="PART 3 -- DECLASSIFICATION AND DOWNGRADING" />
                      <outline text="Sec. 3.1.  Authority for Declassification.  (a)  Information shall be declassified as soon as it no longer meets the standards for classification under this order." />
                      <outline text="(b)  Information shall be declassified or downgraded by:" />
                      <outline text="(1)  the official who authorized the original classification, if that official is still serving in the same position and has original classification authority;" />
                      <outline text="(2)  the originator&apos;s current successor in function, if that individual has original classification authority;" />
                      <outline text="(3)  a supervisory official of either the originator or his or her successor in function, if the supervisory official has original classification authority; or" />
                      <outline text="(4)  officials delegated declassification authority in writing by the agency head or the senior agency official of the originating agency." />
                      <outline text="(c)  The Director of National Intelligence (or, if delegated by the Director of National Intelligence, the Principal Deputy Director of National Intelligence) may, with respect to the Intelligence Community, after consultation with the head of the originating Intelligence Community element or department, declassify, downgrade, or direct the declassification or downgrading of information or intelligence relating to intelligence sources, methods, or activities." />
                      <outline text="(d)  It is presumed that information that continues to meet the classification requirements under this order requires continued protection.  In some exceptional cases, however, the need to protect such information may be outweighed by the public interest in disclosure of the information, and in these cases the information should be declassified.  When such questions arise, they shall be referred to the agency head or the senior agency official.  That official will determine, as an exercise of discretion, whether the public interest in disclosure outweighs the damage to the national security that might reasonably be expected from disclosure.  This provision does not:" />
                      <outline text="(1)  amplify or modify the substantive criteria or procedures for classification; or" />
                      <outline text="(2)  create any substantive or procedural rights subject to judicial review." />
                      <outline text="(e)  If the Director of the Information Security Oversight Office determines that information is classified in violation of this order, the Director may require the information to be declassified by the agency that originated the classification.  Any such decision by the Director may be appealed to the President through the National Security Advisor.  The information shall remain classified pending a prompt decision on the appeal." />
                      <outline text="(f)  The provisions of this section shall also apply to agencies that, under the terms of this order, do not have original classification authority, but had such authority under predecessor orders." />
                      <outline text="(g)  No information may be excluded from declassification under section 3.3 of this order based solely on the type of document or record in which it is found.  Rather, the classified information must be considered on the basis of its content." />
                      <outline text="(h)  Classified nonrecord materials, including artifacts, shall be declassified as soon as they no longer meet the standards for classification under this order." />
                      <outline text="(i)  When making decisions under sections 3.3, 3.4, and 3.5 of this order, agencies shall consider the final decisions of the Panel." />
                      <outline text="Sec. 3.2.  Transferred Records.  (a)  In the case of classified records transferred in conjunction with a transfer of functions, and not merely for storage purposes, the receiving agency shall be deemed to be the originating agency for purposes of this order." />
                      <outline text="(b)  In the case of classified records that are not officially transferred as described in paragraph (a) of this section, but that originated in an agency that has ceased to exist and for which there is no successor agency, each agency in possession of such records shall be deemed to be the originating agency for purposes of this order.  Such records may be declassified or downgraded by the agency in possession of the records after consultation with any other agency that has an interest in the subject matter of the records." />
                      <outline text="(c)  Classified records accessioned into the National Archives shall be declassified or downgraded by the Archivist in accordance with this order, the directives issued pursuant to this order, agency declassification guides, and any existing procedural agreement between the Archivist and the relevant agency head." />
                      <outline text="(d)  The originating agency shall take all reasonable steps to declassify classified information contained in records determined to have permanent historical value before they are accessioned into the National Archives.  However, the Archivist may require that classified records be accessioned into the National Archives when necessary to comply with the provisions of the Federal Records Act.  This provision does not apply to records transferred to the Archivist pursuant to section 2203 of title 44, United States Code, or records for which the National Archives serves as the custodian of the records of an agency or organization that has gone out of existence." />
                      <outline text="(e)  To the extent practicable, agencies shall adopt a system of records management that will facilitate the public release of documents at the time such documents are declassified pursuant to the provisions for automatic declassification in section 3.3 of this order." />
                      <outline text="Sec. 3.3.  Automatic Declassification.  (a)  Subject to paragraphs (b)&apos;&apos;(d) and (g)&apos;&apos;(j) of this section, all classified records that (1) are more than 25 years old and (2) have been determined to have permanent historical value under title 44, United States Code, shall be automatically declassified whether or not the records have been reviewed.  All classified records shall be automatically declassified on December 31 of the year that is 25 years from the date of origin, except as provided in paragraphs (b)&apos;&apos;(d) and (g)&apos;&apos;(i) of this section.  If the date of origin of an individual record cannot be readily determined, the date of original classification shall be used instead." />
                      <outline text="(b)  An agency head may exempt from automatic declassification under paragraph (a) of this section specific information, the release of which should clearly and demonstrably be expected to:" />
                      <outline text="(1)  reveal the identity of a confidential human source, a human intelligence source, a relationship with an intelligence or security service of a foreign government or international organization, or a nonhuman intelligence source; or impair the effectiveness of an intelligence method currently in use, available for use, or under development;" />
                      <outline text="(2)  reveal information that would assist in the development, production, or use of weapons of mass destruction;" />
                      <outline text="(3)  reveal information that would impair U.S. cryptologic systems or activities;" />
                      <outline text="(4)  reveal information that would impair the application of state-of-the-art technology within a U.S. weapon system;" />
                      <outline text="(5)  reveal formally named or numbered U.S. military war plans that remain in effect, or reveal operational or tactical elements of prior plans that are contained in such active plans;" />
                      <outline text="(6)  reveal information, including foreign government information, that would cause serious harm to relations between the United States and a foreign government, or to ongoing diplomatic activities of the United States;" />
                      <outline text="(7)  reveal information that would impair the current ability of United States Government officials to protect the President, Vice President, and other protectees for whom protection services, in the interest of the national security, are authorized;" />
                      <outline text="(8)  reveal information that would seriously impair current national security emergency preparedness plans or reveal current vulnerabilities of systems, installations, or infrastructures relating to the national security; or" />
                      <outline text="(9)  violate a statute, treaty, or international agreement that does not permit the automatic or unilateral declassification of information at 25 years." />
                      <outline text="(c)(1)  An agency head shall notify the Panel of any specific file series of records for which a review or assessment has determined that the information within that file series almost invariably falls within one or more of the exemption categories listed in paragraph (b) of this section and that the agency proposes to exempt from automatic declassification at 25 years." />
                      <outline text="(2)  The notification shall include:" />
                      <outline text="(A)  a description of the file series;" />
                      <outline text="(B)  an explanation of why the information within the file series is almost invariably exempt from automatic declassification and why the information must remain classified for a longer period of time; and" />
                      <outline text="(C)  except when the information within the file series almost invariably identifies a confidential human source or a human intelligence source or key design concepts of weapons of mass destruction, a specific date or event for declassification of the information, not to exceed December 31 of the year that is 50 years from the date of origin of the records." />
                      <outline text="(3)  The Panel may direct the agency not to exempt a designated file series or to declassify the information within that series at an earlier date than recommended.  The agency head may appeal such a decision to the President through the National Security Advisor." />
                      <outline text="(4)  File series exemptions approved by the President prior to December 31, 2008, shall remain valid without any additional agency action pending Panel review by the later of December 31, 2010, or December 31 of the year that is 10 years from the date of previous approval." />
                      <outline text="(d)  The following provisions shall apply to the onset of automatic declassification:" />
                      <outline text="(1)  Classified records within an integral file block, as defined in this order, that are otherwise subject to automatic declassification under this section shall not be automatically declassified until December 31 of the year that is 25 years from the date of the most recent record within the file block." />
                      <outline text="(2)  After consultation with the Director of the National Declassification Center (the Center) established by section 3.7 of this order and before the records are subject to automatic declassification, an agency head or senior agency official may delay automatic declassification for up to five additional years for classified information contained in media that make a review for possible declassification exemptions more difficult or costly." />
                      <outline text="(3)  Other than for records that are properly exempted from automatic declassification, records containing classified information that originated with other agencies or the disclosure of which would affect the interests or activities of other agencies with respect to the classified information and could reasonably be expected to fall under one or more of the exemptions in paragraph (b) of this section shall be identified prior to the onset of automatic declassification for later referral to those agencies." />
                      <outline text="(A)  The information of concern shall be referred by the Center established by section 3.7 of this order, or by the centralized facilities referred to in section 3.7(e) of this order, in a prioritized and scheduled manner determined by the Center." />
                      <outline text="(B)  If an agency fails to provide a final determination on a referral made by the Center within 1 year of referral, or by the centralized facilities referred to in section 3.7(e) of this order within 3 years of referral, its equities in the referred records shall be automatically declassified." />
                      <outline text="(C)  If any disagreement arises between affected agencies and the Center regarding the referral review period, the Director of the Information Security Oversight Office shall determine the appropriate period of review of referred records." />
                      <outline text="(D)  Referrals identified prior to the establishment of the Center by section 3.7 of this order shall be subject to automatic declassification only in accordance with subparagraphs (d)(3)(A)&apos;&apos;(C) of this section." />
                      <outline text="(4)  After consultation with the Director of the Information Security Oversight Office, an agency head may delay automatic declassification for up to 3 years from the date of discovery of classified records that were inadvertently not reviewed prior to the effective date of automatic declassification." />
                      <outline text="(e)  Information exempted from automatic declassification under this section shall remain subject to the mandatory and systematic declassification review provisions of this order." />
                      <outline text="(f)  The Secretary of State shall determine when the United States should commence negotiations with the appropriate officials of a foreign government or international organization of governments to modify any treaty or international agreement that requires the classification of information contained in records affected by this section for a period longer than 25 years from the date of its creation, unless the treaty or international agreement pertains to information that may otherwise remain classified beyond 25 years under this section." />
                      <outline text="(g)  The Secretary of Energy shall determine when information concerning foreign nuclear programs that was removed from the Restricted Data category in order to carry out provisions of the National Security Act of 1947, as amended, may be declassified.  Unless otherwise determined, such information shall be declassified when comparable information concerning the United States nuclear program is declassified." />
                      <outline text="(h)  Not later than 3 years from the effective date of this order, all records exempted from automatic declassification under paragraphs (b) and (c) of this section shall be automatically declassified on December 31 of a year that is no more than 50 years from the date of origin, subject to the following:" />
                      <outline text="(1)  Records that contain information the release of which should clearly and demonstrably be expected to reveal the following are exempt from automatic declassification at 50 years:" />
                      <outline text="(A)  the identity of a confidential human source or a human intelligence source; or" />
                      <outline text="(B)  key design concepts of weapons of mass destruction." />
                      <outline text="(2)  In extraordinary cases, agency heads may, within 5 years of the onset of automatic declassification, propose to exempt additional specific information from declassification at 50 years." />
                      <outline text="(3)  Records exempted from automatic declassification under this paragraph shall be automatically declassified on December 31 of a year that is no more than 75 years from the date of origin unless an agency head, within 5 years of that date, proposes to exempt specific information from declassification at 75 years and the proposal is formally approved by the Panel." />
                      <outline text="(i)  Specific records exempted from automatic declassification prior to the establishment of the Center described in section 3.7 of this order shall be subject to the provisions of paragraph (h) of this section in a scheduled and prioritized manner determined by the Center." />
                      <outline text="(j)  At least 1 year before information is subject to automatic declassification under this section, an agency head or senior agency official shall notify the Director of the Information Security Oversight Office, serving as Executive Secretary of the Panel, of any specific information that the agency proposes to exempt from automatic declassification under paragraphs (b) and (h) of this section." />
                      <outline text="(1)  The notification shall include:" />
                      <outline text="(A)  a detailed description of the information, either by reference to information in specific records or in the form of a declassification guide;" />
                      <outline text="(B)  an explanation of why the information should be exempt from automatic declassification and must remain classified for a longer period of time; and" />
                      <outline text="(C)  a specific date or a specific and independently verifiable event for automatic declassification of specific records that contain the information proposed for exemption." />
                      <outline text="(2)  The Panel may direct the agency not to exempt the information or to declassify it at an earlier date than recommended.  An agency head may appeal such a decision to the President through the National Security Advisor.  The information will remain classified while such an appeal is pending." />
                      <outline text="(k)  For information in a file series of records determined not to have permanent historical value, the duration of classification beyond 25 years shall be the same as the disposition (destruction) date of those records in each Agency Records Control Schedule or General Records Schedule, although the duration of classification shall be extended if the record has been retained for business reasons beyond the scheduled disposition date." />
                      <outline text="Sec. 3.4.  Systematic Declassification Review.  (a)  Each agency that has originated classified information under this order or its predecessors shall establish and conduct a program for systematic declassification review for records of permanent historical value exempted from automatic declassification under section 3.3 of this order.  Agencies shall prioritize their review of such records in accordance with priorities established by the Center." />
                      <outline text="(b)  The Archivist shall conduct a systematic declassification review program for classified records:  (1) accessioned into the National Archives; (2) transferred to the Archivist pursuant to 44 U.S.C. 2203; and (3) for which the National Archives serves as the custodian for an agency or organization that has gone out of existence." />
                      <outline text="Sec. 3.5.  Mandatory Declassification Review.  (a)  Except as provided in paragraph (b) of this section, all information classified under this order or predecessor orders shall be subject to a review for declassification by the originating agency if:" />
                      <outline text="(1)  the request for a review describes the document or material containing the information with sufficient specificity to enable the agency to locate it with a reasonable amount of effort;" />
                      <outline text="(2)  the document or material containing the information responsive to the request is not contained within an operational file exempted from search and review, publication, and disclosure under 5 U.S.C. 552 in accordance with law; and" />
                      <outline text="(3)  the information is not the subject of pending litigation." />
                      <outline text="(b)  Information originated by the incumbent President or the incumbent Vice President; the incumbent President&apos;s White House Staff or the incumbent Vice President&apos;s Staff; committees, commissions, or boards appointed by the incumbent President; or other entities within the Executive Office of the President that solely advise and assist the incumbent President is exempted from the provisions of paragraph (a) of this section.  However, the Archivist shall have the authority to review, downgrade, and declassify papers or records of former Presidents and Vice Presidents under the control of the Archivist pursuant to 44 U.S.C. 2107, 2111, 2111 note, or 2203.  Review procedures developed by the Archivist shall provide for consultation with agencies having primary subject matter interest and shall be consistent with the provisions of applicable laws or lawful agreements that pertain to the respective Presidential papers or records.  Agencies with primary subject matter interest shall be notified promptly of the Archivist&apos;s decision.  Any final decision by the Archivist may be appealed by the requester or an agency to the Panel.  The information shall remain classified pending a prompt decision on the appeal." />
                      <outline text="(c)  Agencies conducting a mandatory review for declassification shall declassify information that no longer meets the standards for classification under this order.  They shall release this information unless withholding is otherwise authorized and warranted under applicable law." />
                      <outline text="(d)  If an agency has reviewed the requested information for declassification within the past 2 years, the agency need not conduct another review and may instead inform the requester of this fact and the prior review decision and advise the requester of appeal rights provided under subsection (e) of this section." />
                      <outline text="(e)  In accordance with directives issued pursuant to this order, agency heads shall develop procedures to process requests for the mandatory review of classified information.  These procedures shall apply to information classified under this or predecessor orders.  They also shall provide a means for administratively appealing a denial of a mandatory review request, and for notifying the requester of the right to appeal a final agency decision to the Panel." />
                      <outline text="(f)  After consultation with affected agencies, the Secretary of Defense shall develop special procedures for the review of cryptologic information; the Director of National Intelligence shall develop special procedures for the review of information pertaining to intelligence sources, methods, and activities; and the Archivist shall develop special procedures for the review of information accessioned into the National Archives." />
                      <outline text="(g)  Documents required to be submitted for prepublication review or other administrative process pursuant to an approved nondisclosure agreement are not covered by this section." />
                      <outline text="(h)  This section shall not apply to any request for a review made to an element of the Intelligence Community that is made by a person other than an individual as that term is defined by 5 U.S.C. 552a(a)(2), or by a foreign government entity or any representative thereof." />
                      <outline text="Sec. 3.6.  Processing Requests and Reviews.  Notwithstanding section 4.1(i) of this order, in response to a request for information under the Freedom of Information Act, the Presidential Records Act, the Privacy Act of 1974, or the mandatory review provisions of this order:" />
                      <outline text="(a)  An agency may refuse to confirm or deny the existence or nonexistence of requested records whenever the fact of their existence or nonexistence is itself classified under this order or its predecessors." />
                      <outline text="(b)  When an agency receives any request for documents in its custody that contain classified information that originated with other agencies or the disclosure of which would affect the interests or activities of other agencies with respect to the classified information, or identifies such documents in the process of implementing sections 3.3 or 3.4 of this order, it shall refer copies of any request and the pertinent documents to the originating agency for processing and may, after consultation with the originating agency, inform any requester of the referral unless such association is itself classified under this order or its predecessors.  In cases in which the originating agency determines in writing that a response under paragraph (a) of this section is required, the referring agency shall respond to the requester in accordance with that paragraph." />
                      <outline text="(c)  Agencies may extend the classification of information in records determined not to have permanent historical value or nonrecord materials, including artifacts, beyond the time frames established in sections 1.5(b) and 2.2(f) of this order, provided:" />
                      <outline text="(1)  the specific information has been approved pursuant to section 3.3(j) of this order for exemption from automatic declassification; and" />
                      <outline text="(2)  the extension does not exceed the date established in section 3.3(j) of this order." />
                      <outline text="Sec. 3.7.  National Declassification Center  (a)  There is established within the National Archives a National Declassification Center to streamline declassification processes, facilitate quality-assurance measures, and implement standardized training regarding the declassification of records determined to have permanent historical value.  There shall be a Director of the Center who shall be appointed or removed by the Archivist in consultation with the Secretaries of State, Defense, Energy, and Homeland Security, the Attorney General, and the Director of National Intelligence." />
                      <outline text="(b)  Under the administration of the Director, the Center shall coordinate:" />
                      <outline text="(1)  timely and appropriate processing of referrals in accordance with section 3.3(d)(3) of this order for accessioned Federal records and transferred presidential records." />
                      <outline text="(2)  general interagency declassification activities necessary to fulfill the requirements of sections 3.3 and 3.4 of this order;" />
                      <outline text="(3)  the exchange among agencies of detailed declassification guidance to enable the referral of records in accordance with section 3.3(d)(3) of this order;  " />
                      <outline text="(4)  the development of effective, transparent, and standard declassification work processes, training, and quality assurance measures;" />
                      <outline text="(5)  the development of solutions to declassification challenges posed by electronic records, special media, and emerging technologies;" />
                      <outline text="(6)  the linkage and effective utilization of existing agency databases and the use of new technologies to document and make public declassification review decisions and support declassification activities under the purview of the Center; and" />
                      <outline text="(7)  storage and related services, on a reimbursable basis, for Federal records containing classified national security information." />
                      <outline text="(c)  Agency heads shall fully cooperate with the Archivist in the activities of the Center and shall:" />
                      <outline text="(1)  provide the Director with adequate and current declassification guidance to enable the referral of records in accordance with section 3.3(d)(3) of this order; and" />
                      <outline text="(2)  upon request of the Archivist, assign agency personnel to the Center who shall be delegated authority by the agency head to review and exempt or declassify information originated by their agency contained in records accessioned into the National Archives, after consultation with subject-matter experts as necessary." />
                      <outline text="(d)  The Archivist, in consultation with representatives of the participants in the Center and after input from the general public, shall develop priorities for declassification activities under the purview of the Center that take into account the degree of researcher interest and the likelihood of declassification." />
                      <outline text="(e)  Agency heads may establish such centralized facilities and internal operations to conduct internal declassification reviews as appropriate to achieve optimized records management and declassification business processes.  Once established, all referral processing of accessioned records shall take place at the Center, and such agency facilities and operations shall be coordinated with the Center to ensure the maximum degree of consistency in policies and procedures that relate to records determined to have permanent historical value." />
                      <outline text="(f)  Agency heads may exempt from automatic declassification or continue the classification of their own originally classified information under section 3.3(a) of this order except that in the case of the Director of National Intelligence, the Director shall also retain such authority with respect to the Intelligence Community." />
                      <outline text="(g)  The Archivist shall, in consultation with the Secretaries of State, Defense, Energy, and Homeland Security, the Attorney General, the Director of National Intelligence, the Director of the Central Intelligence Agency, and the Director of the Information Security Oversight Office, provide the National Security Advisor with a detailed concept of operations for the Center and a proposed implementing directive under section 5.1 of this order that reflects the coordinated views of the aforementioned agencies." />
                      <outline text="PART 4 -- SAFEGUARDING" />
                      <outline text="Sec. 4.1.  General Restrictions on Access.  (a)  A person may have access to classified information provided that:" />
                      <outline text="(1)  a favorable determination of eligibility for access has been made by an agency head or the agency head&apos;s designee;" />
                      <outline text="(2)  the person has signed an approved nondisclosure agreement; and" />
                      <outline text="(3)  the person has a need-to-know the information." />
                      <outline text="(b)  Every person who has met the standards for access to classified information in paragraph (a) of this section shall receive contemporaneous training on the proper safeguarding of classified information and on the criminal, civil, and administrative sanctions that may be imposed on an individual who fails to protect classified information from unauthorized disclosure." />
                      <outline text="(c)  An official or employee leaving agency service may not remove classified information from the agency&apos;s control or direct that information be declassified in order to remove it from agency control." />
                      <outline text="(d)  Classified information may not be removed from official premises without proper authorization." />
                      <outline text="(e)  Persons authorized to disseminate classified information outside the executive branch shall ensure the protection of the information in a manner equivalent to that provided within the executive branch." />
                      <outline text="(f)  Consistent with law, executive orders, directives, and regulations, an agency head or senior agency official or, with respect to the Intelligence Community, the Director of National Intelligence, shall establish uniform procedures to ensure that automated information systems, including networks and telecommunications systems, that collect, create, communicate, compute, disseminate, process, or store classified information:" />
                      <outline text="(1)  prevent access by unauthorized persons;" />
                      <outline text="(2)  ensure the integrity of the information; and" />
                      <outline text="(3)  to the maximum extent practicable, use:" />
                      <outline text="(A)  common information technology standards, protocols, and interfaces that maximize the availability of, and access to, the information in a form and manner that facilitates its authorized use; and" />
                      <outline text="(B)  standardized electronic formats to maximize the accessibility of information to persons who meet the criteria set forth in section 4.1(a) of this order." />
                      <outline text="(g)  Consistent with law, executive orders, directives, and regulations, each agency head or senior agency official, or with respect to the Intelligence Community, the Director of National Intelligence, shall establish controls to ensure that classified information is used, processed, stored, reproduced, transmitted, and destroyed under conditions that provide adequate protection and prevent access by unauthorized persons." />
                      <outline text="(h)  Consistent with directives issued pursuant to this order, an agency shall safeguard foreign government information under standards that provide a degree of protection at least equivalent to that required by the government or international organization of governments that furnished the information.  When adequate to achieve equivalency, these standards may be less restrictive than the safeguarding standards that ordinarily apply to U.S. &quot;Confidential&quot; information, including modified handling and transmission and allowing access to individuals with a need-to-know who have not otherwise been cleared for access to classified information or executed an approved nondisclosure agreement." />
                      <outline text="(i)(1)  Classified information originating in one agency may be disseminated to another agency or U.S. entity by any agency to which it has been made available without the consent of the originating agency, as long as the criteria for access under section 4.1(a) of this order are met, unless the originating agency has determined that prior authorization is required for such dissemination and has marked or indicated such requirement on the medium containing the classified information in accordance with implementing directives issued pursuant to this order." />
                      <outline text="(2)  Classified information originating in one agency may be disseminated by any other agency to which it has been made available to a foreign government in accordance with statute, this order, directives implementing this order, direction of the President, or with the consent of the originating agency.  For the purposes of this section, &quot;foreign government&quot; includes any element of a foreign government, or an international organization of governments, or any element thereof." />
                      <outline text="(3)  Documents created prior to the effective date of this order shall not be disseminated outside any other agency to which they have been made available without the consent of the originating agency.  An agency head or senior agency official may waive this requirement for specific information that originated within that agency." />
                      <outline text="(4)  For purposes of this section, the Department of Defense shall be considered one agency, except that any dissemination of information regarding intelligence sources, methods, or activities shall be consistent with directives issued pursuant to section 6.2(b) of this order." />
                      <outline text="(5)  Prior consent of the originating agency is not required when referring records for declassification review that contain information originating in more than one agency." />
                      <outline text="Sec. 4.2.  Distribution Controls.  (a)  The head of each agency shall establish procedures in accordance with applicable law and consistent with directives issued pursuant to this order to ensure that classified information is accessible to the maximum extent possible by individuals who meet the criteria set forth in section 4.1(a) of this order." />
                      <outline text="(b)  In an emergency, when necessary to respond to an imminent threat to life or in defense of the homeland, the agency head or any designee may authorize the disclosure of classified information (including information marked pursuant to section 4.1(i)(1) of this order) to an individual or individuals who are otherwise not eligible for access.  Such actions shall be taken only in accordance with directives implementing this order and any procedure issued by agencies governing the classified information, which shall be designed to minimize the classified information that is disclosed under these circumstances and the number of individuals who receive it.  Information disclosed under this provision or implementing directives and procedures shall not be deemed declassified as a result of such disclosure or subsequent use by a recipient.  Such disclosures shall be reported promptly to the originator of the classified information.  For purposes of this section, the Director of National Intelligence may issue an implementing directive governing the emergency disclosure of classified intelligence information." />
                      <outline text="(c)  Each agency shall update, at least annually, the automatic, routine, or recurring distribution mechanism for classified information that it distributes.  Recipients shall cooperate fully with distributors who are updating distribution lists and shall notify distributors whenever a relevant change in status occurs." />
                      <outline text="Sec. 4.3.  Special Access Programs.  (a)  Establishment of special access programs.  Unless otherwise authorized by the President, only the Secretaries of State, Defense, Energy, and Homeland Security, the Attorney General, and the Director of National Intelligence, or the principal deputy of each, may create a special access program.  For special access programs pertaining to intelligence sources, methods, and activities (but not including military operational, strategic, and tactical programs), this function shall be exercised by the Director of National Intelligence.  These officials shall keep the number of these programs at an absolute minimum, and shall establish them only when the program is required by statute or upon a specific finding that:" />
                      <outline text="(1)  the vulnerability of, or threat to, specific information is exceptional; and" />
                      <outline text="(2)  the normal criteria for determining eligibility for access applicable to information classified at the same level are not deemed sufficient to protect the information from unauthorized disclosure." />
                      <outline text="(b)  Requirements and limitations.  (1)  Special access programs shall be limited to programs in which the number of persons who ordinarily will have access will be reasonably small and commensurate with the objective of providing enhanced protection for the information involved." />
                      <outline text="(2)  Each agency head shall establish and maintain a system of accounting for special access programs consistent with directives issued pursuant to this order." />
                      <outline text="(3)  Special access programs shall be subject to the oversight program established under section 5.4(d) of this order.  In addition, the Director of the Information Security Oversight Office shall be afforded access to these programs, in accordance with the security requirements of each program, in order to perform the functions assigned to the Information Security Oversight Office under this order.  An agency head may limit access to a special access program to the Director of the Information Security Oversight Office and no more than one other employee of the Information Security Oversight Office or, for special access programs that are extraordinarily sensitive and vulnerable, to the Director only." />
                      <outline text="(4)  The agency head or principal deputy shall review annually each special access program to determine whether it continues to meet the requirements of this order." />
                      <outline text="(5)  Upon request, an agency head shall brief the National Security Advisor, or a designee, on any or all of the agency&apos;s special access programs." />
                      <outline text="(6)  For the purposes of this section, the term &quot;agency head&quot; refers only to the Secretaries of State, Defense, Energy, and Homeland Security, the Attorney General, and the Director of National Intelligence, or the principal deputy of each." />
                      <outline text="(c)  Nothing in this order shall supersede any requirement made by or under 10 U.S.C. 119." />
                      <outline text="Sec. 4.4.  Access by Historical Researchers and Certain Former Government Personnel.  (a)  The requirement in section 4.1(a)(3) of this order that access to classified information may be granted only to individuals who have a need to-know the information may be waived for persons who:" />
                      <outline text="(1)  are engaged in historical research projects;" />
                      <outline text="(2)  previously have occupied senior policy-making positions to which they were appointed or designated by the President or the Vice President; or" />
                      <outline text="(3)  served as President or Vice President." />
                      <outline text="(b)  Waivers under this section may be granted only if the agency head or senior agency official of the originating agency:" />
                      <outline text="(1)  determines in writing that access is consistent with the interest of the national security;" />
                      <outline text="(2)  takes appropriate steps to protect classified information from unauthorized disclosure or compromise, and ensures that the information is safeguarded in a manner consistent with this order; and" />
                      <outline text="(3)  limits the access granted to former Presidential appointees or designees and Vice Presidential appointees or designees to items that the person originated, reviewed, signed, or received while serving as a Presidential or Vice Presidential appointee or designee." />
                      <outline text="PART 5 -- IMPLEMENTATION AND REVIEW" />
                      <outline text="Sec. 5.1.  Program Direction.  (a)  The Director of the Information Security Oversight Office, under the direction of the Archivist and in consultation with the National Security Advisor, shall issue such directives as are necessary to implement this order.  These directives shall be binding on the agencies.  Directives issued by the Director of the Information Security Oversight Office shall establish standards for:" />
                      <outline text="(1)  classification, declassification, and marking principles;" />
                      <outline text="(2)  safeguarding classified information, which shall pertain to the handling, storage, distribution, transmittal, and destruction of and accounting for classified information;" />
                      <outline text="(3)  agency security education and training programs;" />
                      <outline text="(4)  agency self-inspection programs; and" />
                      <outline text="(5)  classification and declassification guides." />
                      <outline text="(b)  The Archivist shall delegate the implementation and monitoring functions of this program to the Director of the Information Security Oversight Office." />
                      <outline text="(c)  The Director of National Intelligence, after consultation with the heads of affected agencies and the Director of the Information Security Oversight Office, may issue directives to implement this order with respect to the protection of intelligence sources, methods, and activities.  Such directives shall be consistent with this order and directives issued under paragraph (a) of this section." />
                      <outline text="Sec. 5.2.  Information Security Oversight Office.  (a)  There is established within the National Archives an Information Security Oversight Office.  The Archivist shall appoint the Director of the Information Security Oversight Office, subject to the approval of the President." />
                      <outline text="(b)  Under the direction of the Archivist, acting in consultation with the National Security Advisor, the Director of the Information Security Oversight Office shall:" />
                      <outline text="(1)  develop directives for the implementation of this order;" />
                      <outline text="(2)  oversee agency actions to ensure compliance with this order and its implementing directives;" />
                      <outline text="(3)  review and approve agency implementing regulations prior to their issuance to ensure their consistency with this order and directives issued under section 5.1(a) of this order;" />
                      <outline text="(4)  have the authority to conduct on-site reviews of each agency&apos;s program established under this order, and to require of each agency those reports and information and other cooperation that may be necessary to fulfill its responsibilities.  If granting access to specific categories of classified information would pose an exceptional national security risk, the affected agency head or the senior agency official shall submit a written justification recommending the denial of access to the President through the National Security Advisor within 60 days of the request for access.  Access shall be denied pending the response;" />
                      <outline text="(5)  review requests for original classification authority from agencies or officials not granted original classification authority and, if deemed appropriate, recommend Presidential approval through the National Security Advisor;" />
                      <outline text="(6)  consider and take action on complaints and suggestions from persons within or outside the Government with respect to the administration of the program established under this order;" />
                      <outline text="(7)  have the authority to prescribe, after consultation with affected agencies, standardization of forms or procedures that will promote the implementation of the program established under this order;" />
                      <outline text="(8)  report at least annually to the President on the implementation of this order; and" />
                      <outline text="(9)  convene and chair interagency meetings to discuss matters pertaining to the program established by this order." />
                      <outline text="Sec. 5.3.  Interagency Security Classification Appeals Panel." />
                      <outline text="(a)  Establishment and administration." />
                      <outline text="(1)  There is established an Interagency Security Classification Appeals Panel.  The Departments of State, Defense, and Justice, the National Archives, the Office of the Director of National Intelligence, and the National Security Advisor shall each be represented by a senior-level representative who is a full-time or permanent part-time Federal officer or employee designated to serve as a member of the Panel by the respective agency head.  The President shall designate a Chair from among the members of the Panel." />
                      <outline text="(2)  Additionally, the Director of the Central Intelligence Agency may appoint a temporary representative who meets the criteria in paragraph (a)(1) of this section to participate as a voting member in all Panel deliberations and associated support activities concerning classified information originated by the Central Intelligence Agency." />
                      <outline text="(3)  A vacancy on the Panel shall be filled as quickly as possible as provided in paragraph (a)(1) of this section." />
                      <outline text="(4)  The Director of the Information Security Oversight Office shall serve as the Executive Secretary of the Panel.  The staff of the Information Security Oversight Office shall provide program and administrative support for the Panel." />
                      <outline text="(5)  The members and staff of the Panel shall be required to meet eligibility for access standards in order to fulfill the Panel&apos;s functions." />
                      <outline text="(6)  The Panel shall meet at the call of the Chair.  The Chair shall schedule meetings as may be necessary for the Panel to fulfill its functions in a timely manner." />
                      <outline text="(7)  The Information Security Oversight Office shall include in its reports to the President a summary of the Panel&apos;s activities." />
                      <outline text="(b)  Functions.  The Panel shall:" />
                      <outline text="(1)  decide on appeals by persons who have filed classification challenges under section 1.8 of this order;" />
                      <outline text="(2)  approve, deny, or amend agency exemptions from automatic declassification as provided in section 3.3 of this order;" />
                      <outline text="(3)  decide on appeals by persons or entities who have filed requests for mandatory declassification review under section 3.5 of this order; and" />
                      <outline text="(4)  appropriately inform senior agency officials and the public of final Panel decisions on appeals under sections 1.8 and 3.5 of this order." />
                      <outline text="(c)  Rules and procedures.  The Panel shall issue bylaws, which shall be published in the Federal Register.  The bylaws shall establish the rules and procedures that the Panel will follow in accepting, considering, and issuing decisions on appeals.  The rules and procedures of the Panel shall provide that the Panel will consider appeals only on actions in which:  " />
                      <outline text="(1)  the appellant has exhausted his or her administrative remedies within the responsible agency;" />
                      <outline text="(2)  there is no current action pending on the issue within the Federal courts; and" />
                      <outline text="(3)  the information has not been the subject of review by the Federal courts or the Panel within the past 2 years." />
                      <outline text="(d)  Agency heads shall cooperate fully with the Panel so that it can fulfill its functions in a timely and fully informed manner.  The Panel shall report to the President through the National Security Advisor any instance in which it believes that an agency head is not cooperating fully with the Panel." />
                      <outline text="(e)  The Panel is established for the sole purpose of advising and assisting the President in the discharge of his constitutional and discretionary authority to protect the national security of the United States.  Panel decisions are committed to the discretion of the Panel, unless changed by the President." />
                      <outline text="(f)  An agency head may appeal a decision of the Panel to the President through the National Security Advisor.  The information shall remain classified pending a decision on the appeal." />
                      <outline text="Sec. 5.4.  General Responsibilities.  Heads of agencies that originate or handle classified information shall:" />
                      <outline text="(a)  demonstrate personal commitment and commit senior management to the successful implementation of the program established under this order;" />
                      <outline text="(b)  commit necessary resources to the effective implementation of the program established under this order;" />
                      <outline text="(c)  ensure that agency records systems are designed and maintained to optimize the appropriate sharing and safeguarding of classified information, and to facilitate its declassification under the terms of this order when it no longer meets the standards for continued classification; and" />
                      <outline text="(d)  designate a senior agency official to direct and administer the program, whose responsibilities shall include:" />
                      <outline text="(1)  overseeing the agency&apos;s program established under this order, provided an agency head may designate a separate official to oversee special access programs authorized under this order.  This official shall provide a full accounting of the agency&apos;s special access programs at least annually;" />
                      <outline text="(2)  promulgating implementing regulations, which shall be published in the Federal Register to the extent that they affect members of the public;" />
                      <outline text="(3)  establishing and maintaining security education and training programs;" />
                      <outline text="(4)  establishing and maintaining an ongoing self inspection program, which shall include the regular reviews of representative samples of the agency&apos;s original and derivative classification actions, and shall authorize appropriate agency officials to correct misclassification actions not covered by sections 1.7(c) and 1.7(d) of this order; and reporting annually to the Director of the Information Security Oversight Office on the agency&apos;s self-inspection program;" />
                      <outline text="(5)  establishing procedures consistent with directives issued pursuant to this order to prevent unnecessary access to classified information, including procedures that:" />
                      <outline text="(A)  require that a need for access to classified information be established before initiating administrative clearance procedures; and" />
                      <outline text="(B)  ensure that the number of persons granted access to classified information meets the mission needs of the agency while also satisfying operational and security requirements and needs;" />
                      <outline text="(6)  developing special contingency plans for the safeguarding of classified information used in or near hostile or potentially hostile areas;" />
                      <outline text="(7)  ensuring that the performance contract or other system used to rate civilian or military personnel performance includes the designation and management of classified information as a critical element or item to be evaluated in the rating of:" />
                      <outline text="(A)  original classification authorities;" />
                      <outline text="(B)  security managers or security specialists; and" />
                      <outline text="(C)  all other personnel whose duties significantly involve the creation or handling of classified information, including personnel who regularly apply derivative classification markings;" />
                      <outline text="(8)  accounting for the costs associated with the implementation of this order, which shall be reported to the Director of the Information Security Oversight Office for publication;" />
                      <outline text="(9)  assigning in a prompt manner agency personnel to respond to any request, appeal, challenge, complaint, or suggestion arising out of this order that pertains to classified information that originated in a component of the agency that no longer exists and for which there is no clear successor in function; and" />
                      <outline text="(10)  establishing a secure capability to receive information, allegations, or complaints regarding over-classification or incorrect classification within the agency and to provide guidance to personnel on proper classification as needed." />
                      <outline text="Sec. 5.5.  Sanctions.  (a)  If the Director of the Information Security Oversight Office finds that a violation of this order or its implementing directives has occurred, the Director shall make a report to the head of the agency or to the senior agency official so that corrective steps, if appropriate, may be taken." />
                      <outline text="(b)  Officers and employees of the United States Government, and its contractors, licensees, certificate holders, and grantees shall be subject to appropriate sanctions if they knowingly, willfully, or negligently:" />
                      <outline text="(1)  disclose to unauthorized persons information properly classified under this order or predecessor orders;" />
                      <outline text="(2)  classify or continue the classification of information in violation of this order or any implementing directive;" />
                      <outline text="(3)  create or continue a special access program contrary to the requirements of this order; or" />
                      <outline text="(4)  contravene any other provision of this order or its implementing directives." />
                      <outline text="(c)  Sanctions may include reprimand, suspension without pay, removal, termination of classification authority, loss or denial of access to classified information, or other sanctions in accordance with applicable law and agency regulation." />
                      <outline text="(d)  The agency head, senior agency official, or other supervisory official shall, at a minimum, promptly remove the classification authority of any individual who demonstrates reckless disregard or a pattern of error in applying the classification standards of this order." />
                      <outline text="(e)  The agency head or senior agency official shall:" />
                      <outline text="(1)  take appropriate and prompt corrective action when a violation or infraction under paragraph (b) of this section occurs; and" />
                      <outline text="(2)  notify the Director of the Information Security Oversight Office when a violation under paragraph (b)(1), (2), or (3) of this section occurs." />
                      <outline text="PART 6 -- GENERAL PROVISIONS" />
                      <outline text="Sec. 6.1.  Definitions.  For purposes of this order:" />
                      <outline text="(a)  &quot;Access&quot; means the ability or opportunity to gain knowledge of classified information." />
                      <outline text="(b)  &quot;Agency&quot; means any &quot;Executive agency,&quot; as defined in 5 U.S.C. 105; any &quot;Military department&quot; as defined in 5 U.S.C. 102; and any other entity within the executive branch that comes into the possession of classified information." />
                      <outline text="(c)  &quot;Authorized holder&quot; of classified information means anyone who satisfies the conditions for access stated in section 4.1(a) of this order." />
                      <outline text="(d)  &quot;Automated information system&quot; means an assembly of computer hardware, software, or firmware configured to collect, create, communicate, compute, disseminate, process, store, or control data or information." />
                      <outline text="(e)  &quot;Automatic declassification&quot; means the declassification of information based solely upon:" />
                      <outline text="(1)  the occurrence of a specific date or event as determined by the original classification authority; or" />
                      <outline text="(2)  the expiration of a maximum time frame for duration of classification established under this order." />
                      <outline text="(f)  &quot;Classification&quot; means the act or process by which information is determined to be classified information." />
                      <outline text="(g)  &quot;Classification guidance&quot; means any instruction or source that prescribes the classification of specific information." />
                      <outline text="(h)  &quot;Classification guide&quot; means a documentary form of classification guidance issued by an original classification authority that identifies the elements of information regarding a specific subject that must be classified and establishes the level and duration of classification for each such element." />
                      <outline text="(i)  &quot;Classified national security information&quot; or &quot;classified information&quot; means information that has been determined pursuant to this order or any predecessor order to require protection against unauthorized disclosure and is marked to indicate its classified status when in documentary form." />
                      <outline text="(j)  &quot;Compilation&quot; means an aggregation of preexisting unclassified items of information." />
                      <outline text="(k)  &quot;Confidential source&quot; means any individual or organization that has provided, or that may reasonably be expected to provide, information to the United States on matters pertaining to the national security with the expectation that the information or relationship, or both, are to be held in confidence." />
                      <outline text="(l)  &quot;Damage to the national security&quot; means harm to the national defense or foreign relations of the United States from the unauthorized disclosure of information, taking into consideration such aspects of the information as the sensitivity, value, utility, and provenance of that information." />
                      <outline text="(m)  &quot;Declassification&quot; means the authorized change in the status of information from classified information to unclassified information." />
                      <outline text="(n)  &quot;Declassification guide&quot; means written instructions issued by a declassification authority that describes the elements of information regarding a specific subject that may be declassified and the elements that must remain classified." />
                      <outline text="(o)  &quot;Derivative classification&quot; means the incorporating, paraphrasing, restating, or generating in new form information that is already classified, and marking the newly developed material consistent with the classification markings that apply to the source information.  Derivative classification includes the classification of information based on classification guidance.  The duplication or reproduction of existing classified information is not derivative classification." />
                      <outline text="(p)  &quot;Document&quot; means any recorded information, regardless of the nature of the medium or the method or circumstances of recording." />
                      <outline text="(q)  &quot;Downgrading&quot; means a determination by a declassification authority that information classified and safeguarded at a specified level shall be classified and safeguarded at a lower level." />
                      <outline text="(r)  &quot;File series&quot; means file units or documents arranged according to a filing system or kept together because they relate to a particular subject or function, result from the same activity, document a specific kind of transaction, take a particular physical form, or have some other relationship arising out of their creation, receipt, or use, such as restrictions on access or use." />
                      <outline text="(s)  &quot;Foreign government information&quot; means:(1)  information provided to the United States Government by a foreign government or governments,an international organization of governments, or any element thereof, with the expectation that the information, the source of the information, or both, are to be held in confidence;" />
                      <outline text="(2)  information produced by the United States Government pursuant to or as a result of a joint arrangement with a foreign government or governments, or an international organization of governments, or any element thereof, requiring that the information, the arrangement, or both, are to be held in confidence; or" />
                      <outline text="(3)  information received and treated as &quot;foreign government information&quot; under the terms of a predecessor order." />
                      <outline text="(t)  &quot;Information&quot; means any knowledge that can be communicated or documentary material, regardless of its physical form or characteristics, that is owned by, is produced by or for, or is under the control of the United States Government." />
                      <outline text="(u)  &quot;Infraction&quot; means any knowing, willful, or negligent action contrary to the requirements of this order or its implementing directives that does not constitute a &quot;violation,&quot; as defined below." />
                      <outline text="(v)  &quot;Integral file block&quot; means a distinct component of a file series, as defined in this section, that should be maintained as a separate unit in order to ensure the integrity of the records.  An integral file block may consist of a set of records covering either a specific topic or a range of time, such as a Presidential administration or a 5-year retirement schedule within a specific file series that is retired from active use as a group.  For purposes of automaticdeclassification, integral file blocks shall contain only records dated within 10 years of the oldest record in the file block." />
                      <outline text="(w)  &quot;Integrity&quot; means the state that exists when information is unchanged from its source and has not been accidentally or intentionally modified, altered, or destroyed." />
                      <outline text="(x)  &quot;Intelligence&quot; includes foreign intelligence and counterintelligence as defined by Executive Order 12333 of December 4, 1981, as amended, or by a successor order." />
                      <outline text="(y)  &quot;Intelligence activities&quot; means all activities that elements of the Intelligence Community are authorized to conduct pursuant to law or Executive Order 12333, as amended, or a successor order." />
                      <outline text="(z)  &quot;Intelligence Community&quot; means an element or agency of the U.S. Government identified in or designated pursuant to section 3(4) of the National Security Act of 1947, as amended, or section 3.5(h) of Executive Order 12333, as amended." />
                      <outline text="(aa)  &quot;Mandatory declassification review&quot; means the review for declassification of classified information in response to a request for declassification that meets the requirements under section 3.5 of this order." />
                      <outline text="(bb)  &quot;Multiple sources&quot; means two or more source documents, classification guides, or a combination of both." />
                      <outline text="(cc)  &quot;National security&quot; means the national defense or foreign relations of the United States." />
                      <outline text="(dd)  &quot;Need-to-know&quot; means a determination within the executive branch in accordance with directives issued pursuant to this order that a prospective recipient requires access to specific classified information in order to perform or assist in a lawful and authorized governmental function." />
                      <outline text="(ee)  &quot;Network&quot; means a system of two or more computers that can exchange data or information." />
                      <outline text="(ff)  &quot;Original classification&quot; means an initial determination that information requires, in the interest of the national security, protection against unauthorized disclosure." />
                      <outline text="(gg)  &quot;Original classification authority&quot; means an individual authorized in writing, either by the President, the Vice President, or by agency heads or other officials designated by the President, to classify information in the first instance." />
                      <outline text="(hh)  &quot;Records&quot; means the records of an agency and Presidential papers or Presidential records, as those terms are defined in title 44, United States Code, including those created or maintained by a government contractor, licensee, certificate holder, or grantee that are subject to the sponsoring agency&apos;s control under the terms of the contract, license, certificate, or grant." />
                      <outline text="(ii)  &quot;Records having permanent historical value&quot; means Presidential papers or Presidential records and the records of an agency that the Archivist has determined should be maintained permanently in accordance with title 44, United States Code." />
                      <outline text="(jj)  &quot;Records management&quot; means the planning, controlling, directing, organizing, training, promoting, and other managerial activities involved with respect to records creation, records maintenance and use, and records disposition in order to achieve adequate and proper documentation of the policies and transactions of the Federal Government and effective and economical management of agency operations." />
                      <outline text="(kk)  &quot;Safeguarding&quot; means measures and controls that are prescribed to protect classified information." />
                      <outline text="(ll)  &quot;Self-inspection&quot; means the internal review and evaluation of individual agency activities and the agency as a whole with respect to the implementation of the program established under this order and its implementing directives." />
                      <outline text="(mm)  &quot;Senior agency official&quot; means the official designated by the agency head under section 5.4(d) of this order to direct and administer the agency&apos;s program under which information is classified, safeguarded, and declassified." />
                      <outline text="(nn)  &quot;Source document&quot; means an existing document that contains classified information that is incorporated, paraphrased, restated, or generated in new form into a new document." />
                      <outline text="(oo)  &quot;Special access program&quot; means a program established for a specific class of classified information that imposes safeguarding and access requirements that exceed those normally required for information at the same classification level." />
                      <outline text="(pp)  &quot;Systematic declassification review&quot; means the review for declassification of classified information contained in records that have been determined by the Archivist to have permanent historical value in accordance with title 44, United States Code." />
                      <outline text="(qq)  &quot;Telecommunications&quot; means the preparation, transmission, or communication of information by electronic means." />
                      <outline text="(rr)  &quot;Unauthorized disclosure&quot; means a communication or physical transfer of classified information to an unauthorized recipient." />
                      <outline text="(ss)  &quot;U.S. entity&quot; includes:" />
                      <outline text="(1)  State, local, or tribal governments;" />
                      <outline text="(2)  State, local, and tribal law enforcement and firefighting entities;" />
                      <outline text="(3)  public health and medical entities;" />
                      <outline text="(4)  regional, state, local, and tribal emergency management entities, including State Adjutants General and other appropriate public safety entities; or" />
                      <outline text="(5)  private sector entities serving as part of the nation&apos;s Critical Infrastructure/Key Resources." />
                      <outline text="(tt)  &quot;Violation&quot; means:" />
                      <outline text="(1)  any knowing, willful, or negligent action that could reasonably be expected to result in an unauthorized disclosure of classified information;" />
                      <outline text="(2)  any knowing, willful, or negligent action to classify or continue the classification of information contrary to the requirements of this order or its implementing directives; or" />
                      <outline text="(3)  any knowing, willful, or negligent action to create or continue a special access program contrary to the requirements of this order." />
                      <outline text="(uu)  &quot;Weapons of mass destruction&quot; means any weapon of mass destruction as defined in 50 U.S.C. 1801(p)." />
                      <outline text="Sec. 6.2.  General Provisions.  (a)  Nothing in this order shall supersede any requirement made by or under the Atomic Energy Act of 1954, as amended, or the National Security Act of 1947, as amended.  &quot;Restricted Data&quot; and &quot;Formerly Restricted Data&quot; shall be handled, protected, classified, downgraded, and declassified in conformity with the provisions of the Atomic Energy Act of 1954, as amended, and regulations issued under that Act." />
                      <outline text="(b)  The Director of National Intelligence may, with respect to the Intelligence Community and after consultation with the heads of affected departments and agencies, issue such policy directives and guidelines as the Director of National Intelligence deems necessary to implement this order with respect to the classification and declassification of all intelligence and intelligence-related information, and for access to and dissemination of all intelligence and intelligence-related information, both in its final form and in the form when initially gathered.  Procedures or other guidance issued by Intelligence Community element heads shall be in accordance with such policy directives or guidelines issued by the Director of National Intelligence.  Any such policy directives or guidelines issued by the Director of National Intelligence shall be in accordance with directives issued by the Director of the Information Security Oversight Office under section 5.1(a) of this order." />
                      <outline text="(c)  The Attorney General, upon request by the head of an agency or the Director of the Information Security Oversight Office, shall render an interpretation of this order with respect to any question arising in the course of its administration." />
                      <outline text="(d)  Nothing in this order limits the protection afforded any information by other provisions of law, including the Constitution, Freedom of Information Act exemptions, the Privacy Act of 1974, and the National Security Act of 1947, as amended.  This order is not intended to and does not create any right or benefit, substantive or procedural, enforceable at law by a party against the United States, its departments, agencies, or entities, its officers, employees, or agents, or any other person.  The foregoing is in addition to the specific provisos set forth in sections 1.1(b), 3.1(c) and 5.3(e) of this order." />
                      <outline text="(e)  Nothing in this order shall be construed to obligate action or otherwise affect functions by the Director of the Office of Management and Budget relating to budgetary, administrative, or legislative proposals." />
                      <outline text="(f)  This order shall be implemented subject to the availability of appropriations." />
                      <outline text="(g)  Executive Order 12958 of April 17, 1995, and amendments thereto, including Executive Order 13292 of March 25, 2003, are hereby revoked as of the effective date of this order." />
                      <outline text="Sec. 6.3.  Effective Date.  This order is effective 180 days from the date of this order, except for sections 1.7, 3.3, and 3.7, which are effective immediately." />
                      <outline text="Sec. 6.4.  Publication.  The Archivist of the United States shall publish this Executive Order in the Federal Register." />
                      <outline text="BARACK OBAMA" />
                      <outline text="THE WHITE HOUSE,December 29, 2009." />
                      <outline text="# # #" />
                      <outline text=" " />
              </outline>

              <outline text="Your Life is Now Classified: NSA Rejecting All FOIA Requests by American Citizens">
                      <outline text="Link to Article" type="link" url="http://www.freerepublic.com/focus/f-news/3040823/posts" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373396107_gqH68YSa.html" />
      <outline text="Tue, 09 Jul 2013 18:55" />
                      <outline text="" />
                      <outline text="Your Life is Now Classified: NSA Rejecting All FOIA Requests by American CitizensSkip to comments." />
                      <outline text="Your Life is Now Classified: NSA Rejecting All FOIA Requests by American CitizensSurvival and Beyond &#094; | 7/9/13 | Ed Corcoran" />
                      <outline text="Posted on 07/09/2013 11:41:17 AM PDT by Nachum" />
                      <outline text="Clayton Seymour, a 36-year-old IT specialist from Hilliard, Ohio, recently sent a Freedom of Information Act (FOIA) request to the NSA, curious as to whether any data about him was being collected." />
                      <outline text="What he received in response made his blood boil." />
                      <outline text="&apos;&apos;I am a generally law abiding citizen with nothing I can think of that would require monitoring,&apos;&apos; Seymour wrote to me, &apos;&apos;but I wanted to know if I was having data collected about me and if so, what.&apos;&apos;" />
                      <outline text="So Seymour sent in an FOIA request. Weeks later, a letter from the NSA arrived explaining that he was not entitled to any information. &apos;&apos;When I got the declined letter, I was furious,&apos;&apos; he told me. &apos;&apos;I feel betrayed.&apos;&apos;" />
                      <outline text="Seymour had decided to request his NSA file after coming across a recent post of mine instructing Americans on how to properly request such files from the FBI and NSA. A Navy vet and two-time Obama voter who supported the President&apos;s platform of greater governmental transparency, Seymour was shocked by the letter he received." />
                      <outline text="The letter, which first acknowledges the media coverage surrounding its surveillance systems, quickly moves to justify why none of that data can be obtained by an American citizen in a standard FOIA request:" />
                      <outline text="(Excerpt) Read more at survivalandbeyond.net ..." />
                      <outline text="TOPICS:Government; News/Current EventsKEYWORDS:666; foia; nsa" />
                      <outline text="Not a bad idea. What if a few million people all demanded to see their NSA files under a FOIA, then after rejection sued in a class action suit?" />
                      <outline text="1 posted on 07/09/2013 11:41:17 AM PDT by NachumTo: Nachum" />
                      <outline text="And if they weren&apos;t collecting info on him specifically then, they are now." />
                      <outline text="2 posted on 07/09/2013 11:45:11 AM PDT by freeangel ( (free speech is only good until someone else doesn&apos;t like it)To: Nachum" />
                      <outline text="3 posted on 07/09/2013 11:45:42 AM PDT by cripplecreek (REMEMBER THE RIVER RAISIN!)To: Nachum" />
                      <outline text="&apos;&apos; What if a few million people all demanded to see their NSA files under a FOIA, then after rejection sued in a class action suit? &apos;&apos;" />
                      <outline text="Laudable. Only problem is we are now under a dictatorship. Laws mean nothing." />
                      <outline text="To: Nachum" />
                      <outline text="then after rejection sued in a class action suit?The employees of the agency would perjure themselves in court, refuse to cooperate with the court, claim the court has no jurisdiction over them, and rationalize it all by saying anything they do is for the Greater Good because they can&apos;t let The Enemy (roughly defined as whoever is bothering them at a particular moment) get an advantage on them." />
                      <outline text="It&apos;s pretty clear to the populace at large that these guys now run the government for their own benefit, and consider the citizenry to be a subservient serf class." />
                      <outline text="5 posted on 07/09/2013 11:51:05 AM PDT by RegulatorTo: Nachum" />
                      <outline text="ONLY terrorists get protection from the NSA." />
                      <outline text="THEIR communications are ignored.THEIR Passports not needed.AND they are weaponized by Holder (Fast&amp;Furious)and Obama/Clinton (MANPADs)." />
                      <outline text="To: Nachum" />
                      <outline text="You&apos;re &apos;&apos;enlightened&apos;&apos; if you voted for transparency. You&apos;re a racist if you&apos;re pissed off that you didn&apos;t get it." />
                      <outline text="7 posted on 07/09/2013 11:51:50 AM PDT by tacticalogic (&quot;Oh, bother!&quot; said Pooh, as he chambered his last round.)To: Nachum" />
                      <outline text="two-time Obama voter who supported the President&apos;s platform of greater governmental transparency, Seymour was shocked by the letter he receivedI&apos;m not shocked at all. obama thanks you for your vote. Think before voting next time, Seymour." />
                      <outline text="8 posted on 07/09/2013 11:52:00 AM PDT by FoxInSocks (&quot;Hope is not a course of action.&quot; -- M. O&apos;Neal, USMC)To: Nachum" />
                      <outline text="It&apos;s not our government anymore.It belongs to King Zero and his Democrat Court. Oligarchy with a monarchical figurehead is our future if we can&apos;t &quot;wake up&quot; the American electorate (and stop Dem election theft)." />
                      <outline text="9 posted on 07/09/2013 11:53:25 AM PDT by jeffc (The U.S. media are our enemy)To: Nachum" />
                      <outline text="A Navy vet and two-time Obama voter who supported the President&apos;s platform of greater governmental transparency, Seymour was shocked by the letter he received.A Navy vet who voted twice for Zero? Wonder if he woke up yet....." />
                      <outline text="10 posted on 07/09/2013 11:54:45 AM PDT by capydick (&apos;&apos;Life&apos;s tough.......it&apos;s even tougher if you&apos;re stupid.&apos;&apos;)Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works." />
                      <outline text="FreeRepublic.com is powered by software copyright 2000-2008 John Robinson" />
                      <outline text="Your Life is Now Classified: NSA Rejecting All FOIA Requests by American CitizensSkip to comments." />
                      <outline text="Your Life is Now Classified: NSA Rejecting All FOIA Requests by American CitizensSurvival and Beyond &#094; | 7/9/13 | Ed Corcoran" />
                      <outline text="Posted on 07/09/2013 11:41:17 AM PDT by Nachum" />
                      <outline text="Clayton Seymour, a 36-year-old IT specialist from Hilliard, Ohio, recently sent a Freedom of Information Act (FOIA) request to the NSA, curious as to whether any data about him was being collected." />
                      <outline text="What he received in response made his blood boil." />
                      <outline text="&apos;&apos;I am a generally law abiding citizen with nothing I can think of that would require monitoring,&apos;&apos; Seymour wrote to me, &apos;&apos;but I wanted to know if I was having data collected about me and if so, what.&apos;&apos;" />
                      <outline text="So Seymour sent in an FOIA request. Weeks later, a letter from the NSA arrived explaining that he was not entitled to any information. &apos;&apos;When I got the declined letter, I was furious,&apos;&apos; he told me. &apos;&apos;I feel betrayed.&apos;&apos;" />
                      <outline text="Seymour had decided to request his NSA file after coming across a recent post of mine instructing Americans on how to properly request such files from the FBI and NSA. A Navy vet and two-time Obama voter who supported the President&apos;s platform of greater governmental transparency, Seymour was shocked by the letter he received." />
                      <outline text="The letter, which first acknowledges the media coverage surrounding its surveillance systems, quickly moves to justify why none of that data can be obtained by an American citizen in a standard FOIA request:" />
                      <outline text="(Excerpt) Read more at survivalandbeyond.net ..." />
                      <outline text="TOPICS:Government; News/Current EventsKEYWORDS:666; foia; nsa" />
                      <outline text="Not a bad idea. What if a few million people all demanded to see their NSA files under a FOIA, then after rejection sued in a class action suit?" />
                      <outline text="1 posted on" />
                      <outline text="07/09/2013 11:41:17 AM PDT by" />
                      <outline text="NachumTo: Nachum" />
                      <outline text="And if they weren&apos;t collecting info on him specifically then, they are now." />
                      <outline text="2 posted on" />
                      <outline text="07/09/2013 11:45:11 AM PDT by" />
                      <outline text="freeangel ( (free speech is only good until someone else doesn&apos;t like it)" />
                      <outline text="To: Nachum" />
                      <outline text="3 posted on" />
                      <outline text="07/09/2013 11:45:42 AM PDT by" />
                      <outline text="cripplecreek (REMEMBER THE RIVER RAISIN!)" />
                      <outline text="To: Nachum" />
                      <outline text="&apos;&apos; What if a few million people all demanded to see their NSA files under a FOIA, then after rejection sued in a class action suit? &apos;&apos;" />
                      <outline text="Laudable. Only problem is we are now under a dictatorship. Laws mean nothing." />
                      <outline text="To: Nachum" />
                      <outline text="then after rejection sued in a class action suit?The employees of the agency would perjure themselves in court, refuse to cooperate with the court, claim the court has no jurisdiction over them, and rationalize it all by saying anything they do is for the Greater Good because they can&apos;t let The Enemy (roughly defined as whoever is bothering them at a particular moment) get an advantage on them." />
                      <outline text="It&apos;s pretty clear to the populace at large that these guys now run the government for their own benefit, and consider the citizenry to be a subservient serf class." />
                      <outline text="5 posted on" />
                      <outline text="07/09/2013 11:51:05 AM PDT by" />
                      <outline text="RegulatorTo: Nachum" />
                      <outline text="ONLY terrorists get protection from the NSA." />
                      <outline text="THEIR communications are ignored.THEIR Passports not needed.AND they are weaponized by Holder (Fast&amp;Furious)and Obama/Clinton (MANPADs)." />
                      <outline text="To: Nachum" />
                      <outline text="You&apos;re &apos;&apos;enlightened&apos;&apos; if you voted for transparency. You&apos;re a racist if you&apos;re pissed off that you didn&apos;t get it." />
                      <outline text="7 posted on" />
                      <outline text="07/09/2013 11:51:50 AM PDT by" />
                      <outline text="tacticalogic (&quot;Oh, bother!&quot; said Pooh, as he chambered his last round.)" />
                      <outline text="To: Nachum" />
                      <outline text="two-time Obama voter who supported the President&apos;s platform of greater governmental transparency, Seymour was shocked by the letter he receivedI&apos;m not shocked at all. obama thanks you for your vote. Think before voting next time, Seymour." />
                      <outline text="8 posted on" />
                      <outline text="07/09/2013 11:52:00 AM PDT by" />
                      <outline text="FoxInSocks (&quot;Hope is not a course of action.&quot; -- M. O&apos;Neal, USMC)" />
                      <outline text="To: Nachum" />
                      <outline text="It&apos;s not our government anymore." />
                      <outline text="It belongs to King Zero and his Democrat Court. Oligarchy with a monarchical figurehead is our future if we can&apos;t &quot;wake up&quot; the American electorate (and stop Dem election theft)." />
                      <outline text="9 posted on" />
                      <outline text="07/09/2013 11:53:25 AM PDT by" />
                      <outline text="jeffc (The U.S. media are our enemy)" />
                      <outline text="To: Nachum" />
                      <outline text="A Navy vet and two-time Obama voter who supported the President&apos;s platform of greater governmental transparency, Seymour was shocked by the letter he received.A Navy vet who voted twice for Zero? Wonder if he woke up yet....." />
                      <outline text="10 posted on" />
                      <outline text="07/09/2013 11:54:45 AM PDT by" />
                      <outline text="capydick (&apos;&apos;Life&apos;s tough.......it&apos;s even tougher if you&apos;re stupid.&apos;&apos;)" />
                      <outline text="Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works." />
                      <outline text="FreeRepublic.com is powered by software copyright 2000-2008 John Robinson" />
              </outline>

              <outline text="Daily Kos: Want to See Your NSA or FBI File? Here&apos;s How...">
                      <outline text="Link to Article" type="link" url="http://www.dailykos.com/story/2013/06/11/1215421/-Want-to-See-Your-NSA-or-FBI-File-Here-s-How" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373396009_89Q6RVua.html" />
      <outline text="Tue, 09 Jul 2013 18:53" />
                      <outline text="" />
                      <outline text="Have you ever Tweeted a politically subversive message, attended a protest, or signed an oppositional petition? If so, you may have a dedicated file on you kept by the FBI and/or the NSA." />
                      <outline text="With a simple Freedom of Information Act (FOIA) request, any U.S. citizen can obtain one&apos;s NSA or FBI file, if such a file exists." />
                      <outline text="It simply takes a few minutes to fill out the requisite forms and mail them to the appropriate address. An independent site &apos;&apos; www.getmyfbifile &apos;&apos; will, free of charge, generate the necessary forms for you already filled out." />
                      <outline text="Of course, you can also do this directly through the NSA or FBI if you are worried about providing personal information to an independent site." />
                      <outline text="While an appropriate level of cynicism may be warranted concerning the level of transparency one should expect from such a request &apos;&apos; should your file be substantial &apos;&apos; it is the law that your complete file be provided to you upon request." />
                      <outline text="Demand that the law be followed, for it is your right as a citizen to know this information." />
                      <outline text="My request is going in the mail today." />
                      <outline text="(Load)(Load)(Load)(Load)(Load)(Load)(Load)" />
              </outline>

              <outline text="HILLARY CLINTON&apos;S SECRET PLASTIC SURGERY MAKEOVER - Globe Magazine">
                      <outline text="Link to Article" type="link" url="http://www.globemagazine.com/story/1034" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373395694_w33jU8HZ.html" />
      <outline text="Tue, 09 Jul 2013 18:48" />
                      <outline text="" />
                      <outline text="Hillary Clinton is finally ready to divorce her womanizing hubby Bill after undergoing a secret plastic surgery makeover to look years younger! ONLY this week&apos;s GLOBE has startling before and after photos of Hillary and reveals what finally pushed her into the $120 million divorce - including Bill&apos;s refusal to take a DNA test to determine if he&apos;s the father of a hooker&apos;s love child." />
              </outline>

              <outline text="Ahmad Jarba - Wikipedia, the free encyclopedia">
                      <outline text="Link to Article" type="link" url="http://en.wikipedia.org/wiki/Ahmad_Jarba" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373394520_baFzYjWu.html" />
      <outline text="Tue, 09 Jul 2013 18:28" />
                      <outline text="" />
                      <outline text="Ahmad Jarba, born in the Qamishli tribe in 1969, is a Syrian leader and politician, President of the National Coalition for Syrian Revolutionary and Opposition Forces[1], the main opposition group of the Syrian Civil War, since 6 July 2013. His election took place in the second round of voting of a three days meeting organized by the Coalition in order to renew its board. He obtained 55 votes, three more than his rival Mustafa Sabbagh, who was supported by Qatar." />
                      <outline text="Jarba holds a bachelor of law and is also member of the Revolutionary Council of Syrian Clans representing Al-Hasakah and has close ties with Saudi Arabia Government." />
              </outline>

              <outline text="Syrian opposition coalition elects president - Times Of India">
                      <outline text="Link to Article" type="link" url="http://articles.timesofindia.indiatimes.com/2013-07-06/middle-east/40406443_1_opposition-coalition-coalition-members-businessman-mustafa-sabbagh" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373394426_ytsPHvhH.html" />
      <outline text="Tue, 09 Jul 2013 18:27" />
                      <outline text="" />
                      <outline text="ISTANBUL: The main Syrian opposition National Coalition elected Ahmad Jarba as its president on Saturday after a close runoff vote held in Istanbul, coalition members said." />
                      <outline text="Jarba is a tribal figure from the eastern province of Hasaka who has connections with Saudi Arabia. He defeated businessman Mustafa Sabbagh, Qatar&apos;s point man in the opposition." />
              </outline>

              <outline text="NSA and CIA have maintained in Brasilia staff to collect data filtered satellite - News - World - Nominuto.com">
                      <outline text="Link to Article" type="link" url="http://nominuto.com/noticias/mundo/nsa-e-cia-mantiveram-em-brasilia-equipe-para-coleta-de-dados-filtrados-de-satelite/2933/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373394128_YwqSeBEa.html" />
      <outline text="Tue, 09 Jul 2013 18:22" />
                      <outline text="" />
                      <outline text="Roberto Kaz e Jos(C) Casado ,O Globo, 8 de julho de 2013Funcionou em Bras&#173;lia, pelo menos at(C) 2002, uma das esta&#167;&#181;es de espionagem nas quais agentes da Ag&#170;ncia de Seguran&#167;a Nacional (NSA, na sigla em ingl&#170;s) trabalharam em conjunto com a Ag&#170;ncia Central de Intelig&#170;ncia (CIA) dos Estados Unidos. N&#163;o se pode afirmar que continuou depois desse ano por falta de provas." />
                      <outline text="Documentos da NSA a que O GLOBO teve acesso revelam que Bras&#173;lia fez parte da rede de 16 bases dessa ag&#170;ncia dedicadas a um programa de coleta de informa&#167;&#181;es atrav(C)s de sat(C)lites de outros pa&#173;ses. Um deles tem o t&#173;tulo &apos;&apos;Primary Fornsat Collection Operations&apos;&apos; e destaca as bases da ag&#170;ncia." />
                      <outline text="Sat(C)lites s&#163;o vitais aos sistemas nacionais de comunica&#167;&#181;es, tanto quanto as redes de fibras &quot;ticas em cabos submarinos. O Brasil n&#163;o possui nenhum, mas aluga oito, todos do tipo geoestacionrio - ou seja, que permanecem estacionados sobre uma regi&#163;o espec&#173;fica da Terra, em geral na linha do Equador." />
                      <outline text="H tamb(C)m um conjunto de documentos da NSA, de setembro de 2010, cuja leitura pode levar   conclus&#163;o de que escrit&quot;rios da Embaixada do Brasil em Washington e da miss&#163;o brasileira nas Na&#167;&#181;es Unidas, em Nova York, em algum momento teriam sido alvos da ag&#170;ncia. N&#163;o foi poss&#173;vel confirmar a informa&#167;&#163;o e nem se esse tipo de prtica prossegue." />
                      <outline text="Essa mesma documenta&#167;&#163;o exp&#181;e os padr&#181;es da NSA para monitoramento de informa&#167;&#181;es em escrit&quot;rios estrangeiros, nos EUA. S&#163;o softwares de espionagem operados a partir de implantes f&#173;sicos nas redes digitais privadas e em computadores: Highlands (C) o codinome de um programa de coleta direta de sinais digitais; o Vagrant funciona atrav(C)s de c&quot;pias das telas de computadores; e o Lifesaver, via c&quot;pia dos discos r&#173;gidos onde ficam armazenadas as mem&quot;rias das mquinas. Os tr&#170;s programas teriam sido usados para espionar dados brasileiros." />
                      <outline text="Os documentos da NSA foram vazados por Edward Snowden, t(C)cnico em redes de computa&#167;&#163;o. Ex-empregado da CIA, ele trabalhou na ag&#170;ncia nos &#186;ltimos quatro anos como especialista subcontratado de empresas privadas. H um m&#170;s, o jornal britnico &apos;&apos;The Guardian&apos;&apos; publicou reportagens com as primeiras revela&#167;&#181;es de Snowden sobre opera&#167;&#181;es de vigilncia de comunica&#167;&#181;es realizadas dentro e fora das fronteiras dos Estados Unidos." />
                      <outline text="No domingo, O GLOBO mostrou que, na &#186;ltima d(C)cada, a NSA espionou telefonemas e correspond&#170;ncia eletr&#180;nica de pessoas residentes ou em trnsito no Brasil, assim como empresas instaladas no pa&#173;s. N&#163;o h n&#186;meros precisos, mas em janeiro passado, por exemplo, o Brasil ficou pouco atrs dos Estados Unidos, que teve 2,3 bilh&#181;es de telefonemas e mensagens espionados." />
                      <outline text="Para tanto, a ag&#170;ncia contou com parceiros corporativos no uso de ao menos tr&#170;s programas de computa&#167;&#163;o. Um deles (C) o software Prism, que permite acesso aos e-mails, conversas online e chamadas de voz de clientes de empresas como Facebook, Google, Microsoft e YouTube, entre outras. Outro programa (C) o Boundless Informant, para rastrear registros como hora, local, etc., de e-mails enviados ou recebidos. H tamb(C)m o X-Keyscore, capaz de reconhecer uma mensagem escrita em diferentes idiomas em correspond&#170;ncia de e para o Brasil. E ainda existe o Fairview, pelo qual (C) poss&#173;vel monitorar grandes quantidades de informa&#167;&#181;es trocadas por pessoas e empresas em distintos lugares." />
                      <outline text="Bras&#173;lia se destacou como &#186;nica esta&#167;&#163;o na Am(C)rica do Sul no mapa descritivo das opera&#167;&#181;es americanas de espionagem por sat(C)lites estrangeiros." />
                      <outline text="Tamb(C)m era uma das duas cidades-base do Fornsat, que hospedaram espi&#181;es da NSA e da CIA designados para trabalhar em conjunto nesse programa. Na linguagem caracter&#173;stica usada na documenta&#167;&#163;o copiada por Snowden, eles compunham uma for&#167;a-tarefa, a Special Collection Service (SCS). Al(C)m de Bras&#173;lia, haveria outro grupo em Nova D(C)lhi, na &#141;ndia." />
                      <outline text="A NSA descreve, em apresenta&#167;&#163;o interna datada de 2002, como opera esse cons&quot;rcio de ag&#170;ncias americanas de espionagem. O foco, segundo a documenta&#167;&#163;o oficial, est em &quot;converter sinais de intelig&#170;ncia captados no exterior a partir de estabelecimentos oficiais dos Estados Unidos, como embaixadas e consulados.&quot; Acrescenta: &quot;A NSA trabalha junto com a CIA. (...) Agentes da NSA, disfar&#167;ados de diplomatas, conduzem o acervo&quot;. O documento foi feito uma d(C)cada atrs e n&#163;o foi poss&#173;vel confirmar se a prtica prossegue." />
                      <outline text="Essas duas ag&#170;ncias mantinham equipes SCS em 75 cidades, conforme o documento de 2002. N&#163;o foi poss&#173;vel saber se atualmente continuam. Dessas, 65 eram capitais nacionais. Mas os documentos da NSA deixam claro que apenas nas esta&#167;&#181;es de Bras&#173;lia e de Nova D(C)li, existiam for&#167;as-tarefa SCS com trabalho diretamente relacionado ao programa de espionagem atrav(C)s de sat(C)lites de outros pa&#173;ses, o Fornsat." />
                      <outline text="A a&#167;&#163;o conjunta proporciona &apos;&apos;intelig&#170;ncia considervel sobre comunica&#167;&#163;o de lideran&#167;as&apos;&apos;, esclarece o documento da NSA de 2002. Ela (C) facilitada, ressalta, pela &apos;&apos;presen&#167;a dentro de uma capital nacional&apos;&apos;." />
                      <outline text="Complexo para a coleta" />
                      <outline text="O n&#186;mero de &apos;&apos;alvos&apos;&apos; (C) grande: &apos;&apos;Sistemas de comunica&#167;&#163;o de sat(C)lites comerciais estrangeiros s&#163;o usados no mundo inteiro por governos estrangeiros, organiza&#167;&#181;es militares, corpora&#167;&#181;es, bancos e ind&#186;strias.&apos;&apos; A estrutura desse sistema de coleta de informa&#167;&#181;es, segundo a NSA, se baseia nas alian&#167;as da ag&#170;ncia com empresas privadas, proprietrias ou operadoras: &apos;&apos;A NSA, em conjunto com seus parceiros estrangeiros, acessa sinais de comunica&#167;&#163;o de sat(C)lites estrangeiros.&apos;&apos;" />
                      <outline text="No mapa sobre opera&#167;&#181;es do sistema Fornsat aparecem de forma claramente identificveis duas importantes bases militares dos EUA." />
                      <outline text="Uma (C) da pr&quot;pria NSA, a de Sugar Grove - &apos;&apos;Timberline&quot; (C) o seu codinome. Fica no condado de Pendleton, em West Virginia (EUA). Segundo reportagem de 2005 do jornal &apos;&apos;New York Times&apos;&apos;, funciona como uma esp(C)cie de central do sistema de coleta de informa&#167;&#181;es por sinais digitais no lado Leste dos Estados Unidos." />
                      <outline text="Um outro ponto-chave de coleta de dados (C) a base de Misawa, no Jap&#163;o. Ali est&#163;o estacionadas unidades da For&#167;a A(C)rea dos EUA (basicamente, o 35&#186; Fighter Wing) e um grupamento da For&#167;a A(C)rea de Autodefesa do Jap&#163;o." />
                      <outline text="Como as ag&#170;ncias de espionagem de outros pa&#173;ses, a NSA sustenta grandes investimentos anuais em tecnologia. &#137; o resultado de uma obsess&#163;o por Intelig&#170;ncia &apos;&apos;acabada&apos;&apos; - a produ&#167;&#163;o diria de um conjunto de informa&#167;&#181;es de qualidade para quem det(C)m o poder de decis&#163;o na pol&#173;tica governamental dom(C)stica e externa. Mas como tudo (C) segredo nesse ramo, os abusos e os fracassos jamais s&#163;o conhecidos." />
                      <outline text="Tags: Bras&#173;liasat(C)lite" />
              </outline>

              <outline text="Researchers gas New York City Subway to prepare for terror attacks | The Verge">
                      <outline text="Link to Article" type="link" url="http://mobile.theverge.com/2013/7/9/4506836/nypd-study-chemical-attack-on-new-york-city-subway" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373393576_pP98EH8X.html" />
      <outline text="Tue, 09 Jul 2013 18:12" />
                      <outline text="" />
                      <outline text="At 8AM ET this morning commuters were guinea pigs for a mock chemical attack on the New York City Subway. If you were on the subway you likely didn&apos;t notice anything &apos;-- the test was silently set off and the gas dispersed through the system was harmless, odorless, and invisible. The planned attack was carried out by the New York Police Department and Brookhaven National Laboratory, and the gas that found its way though New York&apos;s tubes (and New Yorkers&apos; lungs) is known as perfluorocarbon tracer. Researchers set off the gas at &quot;several dozen&quot; subway stations around the five boroughs for a sustained 30-minute attack, and around 200 air sampling boxes placed around the subway and on street level were set to track the gas as it moved around the city." />
                      <outline text="&quot;It&apos;s planning for the worst and hoping we don&apos;t ever have to use it.&quot;" />
                      <outline text="The purpose of this harmless attack? You may have guessed already, but it&apos;s said that the data on how gases move through the subway system and the city will help inform officials when making emergency response plans. As NYPD deputy commissioner Paul Browne told reporters, &quot;it&apos;s planning for the worst and hoping we don&apos;t ever have to use it.&quot; Brookhaven also notes that the data could also assist if an industrial accident introduced harmful gases to the subway system. Typically, computer models can provide enough information to help when coming up with such emergency plans, but officials say that the complexity of New York&apos;s subway system and the aboveground structures made it difficult to accurately model such an attack." />
                      <outline text="This isn&apos;t the first time officials have launched a fake chemical attack on a public transit system &apos;-- though today&apos;s test is the largest of its kind in the US. Similar studies have been carried out on a smaller scale in Washington, DC and Boston, and there are plans for an air flow test in London&apos;s tube this summer. Today&apos;s study will be replicated two more times through July 28th, and the project is funded by a $3.4 million grant from the US Department of Homeland Security." />
                      <outline text="Update: This article has been modified with additional information on the study and similar tests." />
              </outline>

              <outline text="VIDEO-McCain calls Morsi ouster a coup d&apos;etat, urges blocking aid - The Hill&apos;s Video">
                      <outline text="Link to Article" type="link" url="http://thehill.com/video/senate/309467-mccain-calls-morsi-ouster-a-coup-detat" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373392207_rGLpQSLu.html" />
      <outline text="Tue, 09 Jul 2013 17:50" />
                      <outline text="" />
                      <outline text="Comments begin at 1:13 mark." />
                      <outline text="Sen. John McCain (R-Ariz.) called the ouster of Egyptian President Mohammed Morsi a coup d&apos;etat and pressed the Obama administration to suspend aid to the country on Sunday." />
                      <outline text="&quot;It was a coup and it was the second time in two and a half years that we have seen the military step in,&quot; McCain said on CBS&apos;s &quot;Face the Nation.&quot; " />
                      <outline text="&quot;Reluctantly I believe that we have to suspend aid until such time as there is a new constitution and a free and fair election,&apos;&apos; McCain added.The Arizona senator who has been a tough critic of Morsi and his Muslim Brotherhood party, stressed that he was not excusing the deposed leader&apos;s missteps in office." />
                      <outline text="&apos;&apos;Morsi was a terrible president, their economy is in terrible shape thanks to their policies but the fact is the United States should not be supporting this coup. And it&apos;s a tough call,&quot; McCain added. " />
                      <outline text="Morsi was removed from office by military leaders last week, following days of mass protests from opponents of his regime. But the move failed to settle tensions, with the Muslim Brotherhood vowing to restore him to power." />
                      <outline text="On Friday. over 30 were killed in clashes between Morsi supporters and opponents. " />
                      <outline text="The White House is declining to call Morsi&apos;s removal a coup. Using that language could trigger laws which would block the U.S. from sending the $1.5 billion in annual aid provided to Egypt. " />
                      <outline text="On Saturday the Obama administration condemned the violence and denied charges that it was picking sides in the fight." />
                      <outline text="&quot;The United States categorically rejects the false claims propagated by some in Egypt that we are working with specific political parties or movements to dictate how Egypt&apos;s transition should proceed,&quot; a White House statement said Saturday. &quot;We remain committed to the Egyptian people and their aspirations for democracy, economy opportunity, and dignity.  But the future path of Egypt can only be determined by the Egyptian people.&quot;" />
                      <outline text="On Sunday, Gehan El-Haddad, a spokesman for the Muslim Brotherhood, urged the Obama administration to label Morsi&apos;s ouster and the military takeover of Egypt as a coup." />
                      <outline text="&quot;I don&apos;t understand what naivete can behold any person to see all the ingredients, political signs of a coup, and not see the coup,&quot; El-Haddad said on ABC&apos;s &quot;This Week.&quot; &quot;It&apos;s a military junta on TV, tanks on the streets, troops on protest. Military people shooting civilians. I mean it&apos;s every ingredient of a full police state. I mean what else are people waiting for?&quot;" />
              </outline>

              <outline text="22 USC &#167; 8422 - Authorization of assistance | Title 22 - Foreign Relations and Intercourse | U.S. Code | LII / Legal Information Institute">
                      <outline text="Link to Article" type="link" url="http://www.law.cornell.edu/uscode/text/22/8422" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373391802_HVk9TdRa.html" />
      <outline text="Tue, 09 Jul 2013 17:43" />
                      <outline text="" />
                      <outline text="The table below lists the classification updates, since Jan. 3, 2012, for this section. Updates to a broader range of sections may be found at the update page for containing chapter, title, etc." />
                      <outline text="The most recent Classification Table update that we have noticed was Thursday, June 27, 2013" />
                      <outline text="An empty table indicates that we see no relevant changes listed in the classification tables. If you suspect that our system may be missing something, please double-check with the Office of the Law Revision Counsel." />
                      <outline text="How To UseMultiple entries for a section are listed most recent first, within the section." />
                      <outline text="The Session Year indicates which session of Congress was responsible for the changes classified. The Congress number forms the first part of the Public Law number; each Congress has two sessions." />
                      <outline text="Abbreviations used in the Description of Change column:" />
                      <outline text="An empty field implies a standard amendment.&quot;new&quot; means a new section or new note, or all new text of an existing section or note.&quot;nt&quot; means note.&quot;nt [tbl]&quot; means note [table].&quot;prec&quot; means preceding.&quot;fr&quot; means a transfer from another section.&quot;to&quot; means a transfer to another section.&quot;omitted&quot; means the section is omitted.&quot;repealed&quot; means the section is repealed.&quot;nt ed change&quot; and &quot;ed change&quot; - See the Editorial Classification Change Table [pdf].The Public Law field is linked to the development of the law in the Thomas system at the Library of Congress." />
                      <outline text="The Statutes at Large field is linked to the text of the law, in the context of its volume of the Statutes at Large, at the Government Printing Office. Please note that it takes a while for these pages to get posted, so for very recent legislation, you need to look at the &quot;enrolled&quot; version at the Thomas site." />
                      <outline text="The Statutes at Large references have been rendered in the format used as page numbers in the Public Law web pages to which we link, to facilitate copy-paste into browser &quot;find on this (web) page&quot; tools. We are still working on a more direct link facility." />
                      <outline text="For serious comparison work, we suggest copying all or a portion of the Public Law text into your favorite text editor, for convenient content traversal and window control." />
                      <outline text="Sections with change type &quot;new&quot; are a special case, still under development. All are now listed, at the title level only." />
                      <outline text="You will find that occassionally a specific update you notice in a Public Law listed in a classification table will already have made it into the Code. We assume this is an artifact of the LRC edit process. The LII does not edit the LRC content." />
                      <outline text="topGeneral ReferenceRefer to the LRC (Law Revision Council) for explanations about the US Code from the folks who put it all together." />
                      <outline text="You can look for information about what it is and is not, which titles are positive law, the schedule of Supplements, etc. Under download you can find the source data we use here (GPO locator files), as well as, PDF files that look just like the paper books (these may be rather large)." />
                      <outline text="Refer to the Thomas site for changes that have not yet made it into the classification tables." />
                      <outline text="22 USCDescription of ChangeSession YearPublic LawStatutes at Large" />
              </outline>

              <outline text="Law says the U.S. is required to cut aid after coups. Will it?">
                      <outline text="Link to Article" type="link" url="http://www.washingtonpost.com/blogs/worldviews/wp/2013/07/03/law-says-the-u-s-is-required-to-cut-aid-after-coups-will-it/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373391778_Km4FLRzF.html" />
      <outline text="Tue, 09 Jul 2013 17:42" />
                      <outline text="" />
                      <outline text="(Khaled Desouki/AFP/Getty Images)" />
                      <outline text="Outside observers might not have much trouble calling the events in Egypt on Wednesday a military coup. When a khaki-clad, beret-wearing general commandeers state TV to announce that the constitution is suspended and the president no longer president, &apos;&apos;coup&apos;&apos; seems like a pretty safe word." />
                      <outline text="But it&apos;s not quite as safe for the Obama administration. According to a section of the Foreign Assistance Act, a law first enacted in 1961, the United States is required to suspend foreign aid to any country that suffers a military coup. The law, according to its text, &apos;&apos;restricts assistance to the government of any country whose duly elected head of government is deposed by military coup or decree.&apos;&apos; So if the U.S. determines that there was a coup in Egypt, that would seem to require an end to its aid for the country." />
                      <outline text="The United States sends enormous amounts of aid to Egypt, much of it direct military aid contingent on the 1979 Camp David Accords that established peace between Egypt and Israel. But it&apos;s not all military: Just in March, the Obama administration announced $250 million in aid to help Egypt through its ongoing economic struggles." />
                      <outline text="The Obama administration had suggested that it might follow through on the threat implicit in the Foreign Assistance Act. According to the Associated Press, U.S. officials told members of the Egyptian military that any coup would yield &apos;&apos;consequences&apos;&apos; for the U.S. aid they depend on." />
                      <outline text="It is probably unlikely that the Obama administration will want to substantially cut aid to Egypt. (Put aside the Camp David money for a moment &apos;-- it&apos;s not clear to me that this is effected by the Foreign Assistance Act, and even if it is, it&apos;s very difficult to imagine Congress or the White House being willing to jeopardize this lynchpin of peace with Israel.) Like many aid programs, the hundreds of millions of dollars that goes to Egypt is not meant as a present or a reward; it&apos;s considered to ultimately serve U.S. interests. Egypt&apos;s troubled economy has been a key contributor the political instability there. That instability is bad for everyone, including U.S. interests." />
                      <outline text="If the Obama administration believes that its aid money to Egypt will ease its political transition, then it&apos;s unlikely to cut it substantially, even if that risks the appearance of hypocrisy. (It is possible that the U.S. might suspend some aid, perhaps in a symbolic gesture.) As University of North Carolina political science professor Greg Weeks points out on his blog, the Obama administration faced a similar dilemma during the 2009 Honduran political crisis that included a military coup. At first it called the events a coup, then it backpedaled, apparently to avoid triggering sanctions or other measures it wished to avoid. Politics superseded the letter of the law in that case and it may well happen again. But if you notice people in Washington getting on the White House&apos;s case to either label the events a &apos;&apos;coup&apos;&apos; or to not do so, this is why." />
              </outline>

              <outline text="definition of coup - Google Search">
                      <outline text="Link to Article" type="link" url="https://www.google.com/search?q=definition+of+coup&amp;oq=definition+of+coup&amp;aqs=chrome.0.57j5j0l2j62l2.3249j0&amp;sourceid=chrome&amp;ie=UTF-8&amp;gbv=1&amp;sei=IUzcUcGiLq-v4AOQ4YHoAg" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373391748_buxwrmdD.html" />
      <outline text="Tue, 09 Jul 2013 17:42" />
                      <outline text="" />
                      <outline text="coup - definition of coup by the Free Online Dictionary, Thesaurus ...b. A sudden appropriation of leadership or power; a takeover: a boardroom coup.3. Among certain Native American peoples, a feat of bravery performed in ...Coup - Definition and More from the Free Merriam-Webster DictionaryDefinition of coup from the Merriam-Webster Online Dictionary with audiopronunciations, thesaurus, Word of the Day, and word games.Coup d&apos;(C)tat - Wikipedia, the free encyclopediaA coup d&apos;(C)tat also known as a coup, a putsch, or an overthrow, is the suddendeposition of a government, usually by a small group of the existing state ...coup: definition of coup in Oxford dictionary (British &amp; World English)oxforddictionaries.com/definition/english/coup- CachedDefinition of coup in British and World English in Oxford dictionary. Meaning,pronunciation and example sentences. English to English reference content.Coup | Define Coup at Dictionary.coma highly successful, unexpected stroke, act, or move; a clever action oraccomplishment. 2. (among the Plains Indians of North America) a brave orreckless deed ...coup - definition of coup by Macmillan Dictionarywww.macmillandictionary.com/dictionary/british/coup- Cached - SimilarDefine coup. What is coup? coup meaning and more by Macmillan Dictionary.coup - Oxford Advanced Learner&apos;s Dictionaryoald8.oxfordlearnersdictionaries.com/dictionary/coup- Cachedcoup - Clear definition, audio pronunciation, synonyms and related words, realexample sentences, English grammar, usage notes and more in Oxford ...Urban Dictionary: coupUsually done by a military - an overthrow of the current government by force.Sometimes bloody, sometimes not. Either way, the military ends up in ...Definition of Coup D&apos;Etat | Chegg.comwww.chegg.com/homework-help/definitions/coup-detat-53- CachedDefinition of coup d&apos;etat and related terms and concepts.palace coup noun - definition in British English Dictionary...dictionary.cambridge.org/dictionary/british/palace-coup- Cachedpalace coup noun - definition, audio pronunciation, synonyms and more forpalace coup noun: a situation in which a leader is removed from power by the ...Searches related to definition of coup" />
              </outline>

              <outline text="About - Global Strategy Group">
                      <outline text="Link to Article" type="link" url="http://globalstrategygroup.com/about/#our-story" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373391017_Emw9WdtU.html" />
      <outline text="Tue, 09 Jul 2013 17:30" />
                      <outline text="" />
                      <outline text="Jon SilvanFounding Partner and CEO" />
                      <outline text="Jefrey PollockFounding Partner and President" />
                      <outline text="Jeffrey PlautFounding Partner" />
                      <outline text="Britt PowerPartner" />
                      <outline text="Scott ElderPartner" />
                      <outline text="Justin LapatinePartner, Public Affairs" />
                      <outline text="Joseph Del PrioreSenior Vice President and CFO" />
                      <outline text="Nick GourevitchSenior Vice President and Director of Research" />
                      <outline text="Bill BurtonExecutive Vice President, Managing Director" />
                      <outline text="Tanya MeckSenior Vice President and Managing Director" />
                      <outline text="Jim PapaSenior Vice President and Managing Director" />
                      <outline text="Alan SextonExecutive Vice President, Communications" />
                      <outline text="Stephen SigmundOf Counsel" />
                      <outline text="Roy OcchiogrossoManaging Director" />
                      <outline text="Chris AllenVice President and Director, Competitive Intelligence" />
                      <outline text="Meira BernsteinAssociate, Communications" />
                      <outline text="Bob BibelVice President, Director of Finance" />
                      <outline text="Khristyn BrimmeierVice President, Communications" />
                      <outline text="Anna BrowerSenior Associate, Communications" />
                      <outline text="Jonathan BrownVice President and West Coast Research Director" />
                      <outline text="Allison BryanAssociate, Communications" />
                      <outline text="Jennifer BurnerDirector, Communications" />
                      <outline text="Drew CaskoVice President, Human Resources" />
                      <outline text="Carlos CorralesOffice Manager" />
                      <outline text="James DeloreyVice President, Research" />
                      <outline text="Rick FrombergVice President, Grassroots" />
                      <outline text="Mark GershSenior Adviser" />
                      <outline text="David GoldAssociate, Research" />
                      <outline text="Kevin GoldenAdministrative Assistant" />
                      <outline text="Caroline GrahamAssociate, Competitive Intelligence" />
                      <outline text="Joe HickersonVice President, Research" />
                      <outline text="Julie HootkinSenior Vice President, Research" />
                      <outline text="Alex HoweVice President, Communications" />
                      <outline text="Elissa JanofskyAdministrative Assistant to the President" />
                      <outline text="Carter JohnsonVice President, Communications" />
                      <outline text="Liana KlippelExecutive Assistant to the CEO" />
                      <outline text="Kelsey LabrotAdministrative Assistant" />
                      <outline text="Ben LeeSenior Associate, Research" />
                      <outline text="Jonathan LesserAssociate, Communications" />
                      <outline text="Shira LevyDirector, Communications" />
                      <outline text="Scott LowensteinSenior Associate, Research" />
                      <outline text="Marshall MaherVice President, Digital + Social" />
                      <outline text="Marcia MaxwellDirector, Grassroots" />
                      <outline text="Marjorie McCarthyVice President, Marketing and External Relations" />
                      <outline text="Hugh McMullenDirector, Digital + Social" />
                      <outline text="Melissa McNamaraVice President, Communications" />
                      <outline text="Will MatthewsSenior Associate, Research" />
                      <outline text="Flora MendozaAssociate, Grassroots" />
                      <outline text="Naomi MukaiAssociate, Digital + Social" />
                      <outline text="Ben NovakManager, Research" />
                      <outline text="Luke PartridgeAssociate" />
                      <outline text="Kyle PursellSenior Associate, Human Resources" />
                      <outline text="Victoria RupekaDirector, Communications" />
                      <outline text="Dori ScalletQualitative Research Manager" />
                      <outline text="Emily (Harris) StaniszewskiVice President, Communications" />
                      <outline text="Ruth ThomasAssociate, Communications" />
                      <outline text="Sarah VazquezReceptionist" />
                      <outline text="Michelle WoodruffDirector, Corporate and Advocacy Research" />
              </outline>

              <outline text="Global Strategy Group - Wikipedia, the free encyclopedia">
                      <outline text="Link to Article" type="link" url="http://en.wikipedia.org/wiki/Global_Strategy_Group" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373390818_YLBdfFyu.html" />
      <outline text="Tue, 09 Jul 2013 17:26" />
                      <outline text="" />
                      <outline text="Global Strategy Group (GSG) is an American public affairs and research firm; specializing in research, strategic communications, digital strategy, grassroots and grasstops organizing, marketing and branding. GSG clients include political candidates, corporations and advocacy organizations worldwide. In the United States, the company works with Democratic Party candidates and office holders." />
                      <outline text="Clients of the firm, which has been called &quot;a ubiquitous presence in New York&apos;s circles of power&quot; in a 2008 New York Times article, have included New York Gov. Eliot Spitzer, who used the firm in his successful 2006 campaign, New York state Attorney General Andrew M. Cuomo and New York Governor David A. Paterson. The New York state Democratic Party also uses the firm, as do many New York state members of Congress. The firm is also one of the &quot;top consultants to corporations and other special interests,&quot; according to an article in the Times.[1]" />
                      <outline text="&quot;They have carved out the niche of being the premier Democratic political polling firm,&quot; William T. Cunningham, a political consultant, said in 2008.[1] Political clients include or have included Iowa Governor Chet Culver, West Virginia Senator Joe Manchin, Montana Governor Brian Schweitzer, New York State Attorney General Andrew M. Cuomo, presidential candidate Al Gore Congresswomen Loretta and Linda Snchez. The New York state Democratic Party and New York state members of Congress also consult with the firm. GSG has managed political campaigns in Albania, Aruba, Colombia, Dominican Republic, Greece, Kazakhstan, Mexico, Republic of Georgia, Trinidad and Venezuela." />
                      <outline text="In 2008, the firm&apos;s annual revenues were said to total about $20 million, and it had 50 employees.[2] In addition to New York City, Global has offices in Washington, D.C. and Hartford, Connecticut.[3]" />
                      <outline text="Along with its political roster of clients, GSG has been retained by large corporations, nonprofits and advocacy organizations like Bill and Melinda Gates Foundation, Cond(C) Nast, General Electric, GlaxoSmithKline, Goldman Sachs, Microsoft, Scholastic, Silverstein Properties, Starwood, Ultimate Fighting Championship (UFC), United Way and Yale University, among others. As of 2009 GSG was using the marketing tag, &quot;Campaign to Win.&quot;" />
                      <outline text="The firm was mentioned on the TV show The West Wing and is also referenced in a Trivial Pursuit board game question." />
                      <outline text="History[edit]Jonathan Silvan, CEO, Jefrey Pollock, President and Jeffrey Plaut, Partner, started GSG together in 1995 as a boutique polling firm,[1] conducting market research for political and corporate clients." />
                      <outline text="Since its founding, the firm has broadened its work beyond research and polling to include various communications services, such as public relations, planning and running political campaigns, paid media and advertising, grassroots and grasstops advocacy, and new media and interactive services and products." />
                      <outline text="Executives[edit]The firm&apos;s top executives include:" />
                      <outline text="Jon Silvan, founding partner and CEO, has guided Global Strategy Group&apos;s growth from a boutique market research firm into a nationally recognized, full-service public affairs and research firm. Jon&apos;s clients include companies, organizations and individuals at the top of their fields, including World Trade Center developer Silverstein Properties, Senator Kirsten Gillibrand (NY), General Electric, and the National Cable and Telecommunications Association (NCTA). Jon earned a dual degree in political communications and economic development from the University of Massachusetts Amherst and he currently serves on the Steering Committee of the Association for a Better New York (ABNY). Jon lives in New York City with his wife Marnie and their three children.[4]Jefrey Pollock, president and founding partner, leads the firm&apos;s research practice. He has advised several U.S. Governors &apos;&apos; including Brian Schweitzer (MT), Joe Manchin (WV) and Chet Culver (IA) &apos;&apos; Senators Kirsten Gillibrand (NY) and Arlen Specter (PA), and many other members of Congress. He has also consulted on behalf of many of the world&apos;s leading NGOs and corporations, including the Bill &amp; Melinda Gates Foundation, Goldman Sachs, Con Edison and Starwood. Jefrey earned degrees from the University of Pennsylvania and Columbia University, where he is currently an Adjunct Professor of Public Policy and Administration.[5]Jeffrey Plaut, founding partner, serves as a strategic advisor and pollster to candidates and campaigns across the country. Recent clients include the New Jersey Democratic Assembly Campaign Committee, U.S. Representatives Mike McMahon (NY) and Nydia Velazquez (NY), the Empire State Pride Agenda and The Daily Show. Jeffrey also leads the firm&apos;s public affairs practice for unions, nonprofits and associations. An alumnus of Brown University, Jeffrey is a graduate of the Coro Foundation Fellowship for Public Affairs, an Adjunct Professor at Fordham University and advisory board member of the Bellevue/New York University Program for Survivors of Torture.[6]Britt Power, partner, specializes in developing research and positioning strategies for clients looking to extend and promote their brands. Britt&apos;s clients count on her when they are looking to launch services or products, expand their client base or gain a competitive edge within their industry. She is an experienced moderator and focus group facilitator and currently heads the firm&apos;s Qualitative Research Department. Her client list includes some of the world&apos;s most recognized brands, including Cond(C) Nast, ESPN, Scholastic, Time Inc. and Victoria&apos;s Secret. Britt earned a degree in communications from New York University.[7]Scott Elder, partner, specializes in conducting strategic research for corporations, domestic political campaigns and associations. In a project manager role, Scott oversees the research process from survey design to data collection, data processing and analysis. Recent clients include Merrill Lynch, United Water, Senator Kirsten Gillibrand (NY), the National Democratic Institute for International Affairs and the Los Angeles Police Protective League. He also runs the firm&apos;s market research practice for the trial consulting industry. Scott earned his Bachelor&apos;s degree in Business Administration from the University of Washington in Seattle.[8]Alan Sexton, Executive Vice President for Communications. Prior to joining GSG, Alan led the public affairs practice at Ogilvy Public Relations Worldwide in New York, where he oversaw all aspects of the group&apos;s work. An expert in corporate reputation, crisis management, brand positioning and influencer engagement, Alan was named one of the industry&apos;s &apos;&apos;40 Under 40&apos;&apos; leaders by PR Week in 2010. While at Ogilvy, Alan managed global and U.S. communications campaigns for some of the agency&apos;s best-known clients, including American Express, BP, the Ford Motor Company, LexisNexis and DHL. Alan&apos;s track record of crafting successful campaigns for his clients has been recognized numerous times. In 2008 he and his client, FM Global, one of the world&apos;s leading commercial property insurance companies, won the PR News Platinum award for Global Campaign of the Year. The FM Global program was also named as a Global Campaign of the Year finalist in the 2009 PR Week awards, and shortlisted for two SABRE awards in 2008. Prior to Ogilvy, Alan spent several years with The Harbour Group, a public affairs and lobbying firm based in Washington, D.C. Before that, he worked on issues management and media relations campaigns as a member of the Public Affairs Practice at Ogilvy PR in Washington, D.C. Alan began his career in communications with a small public affairs firm in Dublin, Ireland, where he worked with a diverse group of clients that included British Nuclear Fuels and the Irish Hospital Consultants Association.[9]Stephen Sigmund, senior vice president, Stephen Sigmund serves as Global Strategy Group&apos;s Senior Vice President, Managing Director of Communications. Steve most recently served as the Chief of Public and Government Affairs for the Port Authority of New York and New Jersey, where he was the chief communications and government affairs strategist for the nation&apos;s largest regional public authority and led the organization&apos;s public efforts on the World Trade Center redevelopment. Steve has strong experience in New York City and New Jersey government and politics. He was the Communications Director and Senior Policy Advisor for City Council Speaker Gifford Miller and Acting Communications Director for Governor Jon Corzine in New Jersey. Steve&apos;s experience extends into the private sector as well. Steve was a Vice President at Robinson Lerer &amp; Montgomery, a nationally recognized strategic and crisis communications firm. At RLM, Steve played a leading role on key top-tier clients like America Online, EMI Music and Pfizer. He was also a Vice President at AOL Time Warner and was Senior Director for the company&apos;s Corporate Responsibility efforts, which included an ambitious initiative to improve technology literacy in public schools. In addition to his broad professional experience, Steve has written pieces for The New York Times, The New York Times Book Review, Trenton Times, and New York Observer, and he has served as an Adjunct Professor for Columbia University&apos;s Strategic Communications Program since 2003.[10]Justin Lapatine, senior vice president, manages Global Strategy Group&apos;s public affairs practice area where he develops and executes full service campaigns on behalf of corporate, advocacy and political clients. Justin has managed grassroots, grasstops and coalition building campaigns for Silverstein Properties, the YES Network and Ultimate Fighting Championship. Named a &apos;&apos;Rising Star&apos;&apos; by Campaigns &amp; Elections in 2006 and one of &apos;&apos;40 Under 40&apos;&apos; by City Hall News, Justin serves as consultant to the New York State Senate Democrats, Manhattan Borough President Scott Stringer and Public Advocate Candidate Bill de Blasio. Before joining GSG, Justin worked for Gore Lieberman in the 2000 presidential race and for Mark Green in the 2001 New York City Mayor&apos;s race. Justin earned a B.A. in Political Science and History from Duke University and a Masters in Political Science from Columbia University.[11]Tanya Meck, Senior Vice President, leads Global Strategy Group&apos;s Connecticut office, based in Hartford and has extensive experience in public affairs, corporate communications and advocacy campaign coordination. Prior to joining GSG, Tanya served as Assistant Secretary of the State of Connecticut and Chief of Staff for the Secretary&apos;s office. She has worked as a corporate communications director for a Fortune 500 company, as a non-profit development director, and as a political consultant to local, state and federal elected officials. Her professional experience includes television and radio appearances, keynoting seminars and conferences, and emceeing events. A Phi Beta Kappa and Summa Cum Laude graduate of Drew University in Madison, New Jersey, she majored in Behavioral Science and was an All-American athlete. Tanya earned her Master&apos;s Degree in Public Policy Studies from Trinity College in Hartford, Connecticut.[12]Clients[edit]Political clients[edit]Corporate clients[edit]Nonprofit &amp; advocacy clients[edit]References[edit]&#094; abcConfessore, Nicholas, &quot;In Consulting Group&apos;s Rise, Hints of How Albany Works&quot;, article, The New York Times, September 29, 2008, retrieved same day&#094;Web page titled &quot;Jefrey Pollock, 35, President, profiled in Crain&apos;s 40 under 40&quot;, quoting from a brief article in Crain&apos;s New York, retrieved September 29, 2008&#094;Website, Global Strategy Group, retrieved November 07, 2010&#094;Web page titled &quot;Jon Silvan, CEO&quot; at Global Strategy Group website, retrieved November 7, 2010&#094;Web page titled &quot;Jefrey Pollock, President&quot; at Global Strategy Group website, retrieved November 7, 2010&#094;Web page titled &quot;Jeffrey Plaut&quot; at Global Strategy Group website, retrieved November 7, 2010&#094;Web page titled &quot;Britt Power, Partner&quot; at Global Strategy Group website, retrieved November 7, 2010&#094;Web page titled &quot;Scott Elder, Partner&quot; at Global Strategy Group website, retrieved November 7, 2010&#094;Web page titled &quot;Alan Sexton, Executive Vice President&quot; at Global Strategy Group website, retrieved August 1, 2011&#094;Web page titled &quot;Stephen Sigmund, Senior Vice President&quot; at Global Strategy Group website, retrieved November 7, 2010&#094;Web page titled &quot;Justin Lapatine, Senior Vice President&quot; at Global Strategy Group website, retrieved November 7, 2010&#094;Web page titled &quot;Tanya Meck, Senior Vice President&quot; at Global Strategy Group website, retrieved August 1st, 2011&#094; abcdefghijWeb page titled &quot;Political&quot; (a list of political clients), at Global Strategy Group website, accessed September 29, 2008External links[edit]" />
              </outline>

              <outline text="Arshad Mohammed | Journalist Profile | Reuters.com">
                      <outline text="Link to Article" type="link" url="http://blogs.reuters.com/arshad-mohammed/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373389989_xWnWppMx.html" />
      <outline text="Tue, 09 Jul 2013 17:13" />
                      <outline text="" />
                      <outline text="Jun 13, 2013" />
                      <outline text="WASHINGTON (Reuters) &apos;&apos; Among the consequences facing U.S. President Barack Obama if he decides against arming Syria&apos;s rebels is that Arab and European states may step in more aggressively, perhaps further fracturing rebel forces." />
                      <outline text="Having watched government forces seize the strategic town of Qusair from the rebels last week, Obama&apos;s senior national security advisers have held a series of meetings on what more, if anything, they are willing to do to help the opposition." />
                      <outline text="Jun 10, 2013" />
                      <outline text="WASHINGTON (Reuters) &apos;&apos; The United States could decide as early as this week whether to arm Syrian rebels, U.S. officials said on Monday, as Secretary of State John Kerry put off a Middle East trip to attend meetings on the subject." />
                      <outline text="The meetings are taking place as the battlefield has tilted against the rebels in the Syrian civil war as Lebanese Hezbollah has entered the fray on the side of Syrian President Bashar al-Assad, helping his forces retake the strategic town of Qusair last week." />
                      <outline text="Jun 10, 2013" />
                      <outline text="WASHINGTON (Reuters) &apos;&apos; The United States could make a decision as early as this week on whether to arm Syrian rebels, U.S. officials said on Monday, as U.S. Secretary of State John Kerry put off a Middle East trip to attend meetings on the subject." />
                      <outline text="However, the U.S. government has debated for months whether to provide weaponry to the rebels in their civil war against Syrian President Bashar al-Assad&apos;s forces and has so far decided against." />
                      <outline text="Jun 5, 2013" />
                      <outline text="WASHINGTON (Reuters) &apos;&apos; Samantha Power, who won a Pulitzer Prize for her study of U.S. failure to prevent genocide and is seen as an advocate of an activist U.S. foreign policy, would get a bigger platform for her views as U.S. ambassador to the United Nations." />
                      <outline text="The former journalist, Harvard University professor and White House national security staffer was chosen on Wednesday to serve in the high-profile post as U.S. President Barack Obama weighs whether to do more to end Syria&apos;s civil war." />
                      <outline text="Jun 2, 2013" />
                      <outline text="WASHINGTON (Reuters) &apos;&apos; Four months into his term, U.S. Secretary of State John Kerry is trying, simultaneously, to end two of the world&apos;s most intractable conflicts: the Syrian civil war and the struggle between Israel and the Palestinians." />
                      <outline text="The two issues, according to an aide, have consumed the vast majority of Kerry&apos;s time and energy &apos;&apos; he has already flown more than 100,000 miles to 23 countries, including four trips to Israel &apos;&apos; since he took office February 1." />
                      <outline text="Jun 2, 2013" />
                      <outline text="WASHINGTON (Reuters) &apos;&apos; Four months into his term, Secretary of State John Kerry is trying, simultaneously, to end two of the world&apos;s most intractable conflicts: the Syrian civil war and the struggle between Israel and the Palestinians." />
                      <outline text="The two issues, according to an aide, have consumed the vast majority of Kerry&apos;s time and energy &apos;&apos; he has already flown more than 100,000 miles to 23 countries, including four trips to Israel &apos;&apos; since he took office February 1." />
                      <outline text="May 28, 2013" />
                      <outline text="PARIS (Reuters) &apos;&apos; Holding a conference to end Syria&apos;s civil war will be a &apos;&apos;tall order&apos;&apos;, Russia&apos;s foreign minister said on Monday after talks with his U.S. counterpart, but he saw some chance of success." />
                      <outline text="U.S. Secretary of State John Kerry and Russian Foreign Minister Sergei Lavrov said they would do their utmost to bring Syria&apos;s warring parties to the table, as fighting intensified and new allegations of chemical weapons use surfaced." />
                      <outline text="May 27, 2013" />
                      <outline text="PARIS (Reuters) &apos;&apos; The U.S. and Russian foreign ministers met on Monday to discuss a planned conference aimed at ending Syria&apos;s civil war against a backdrop of widening regional violence and new allegations of chemical weapons use." />
                      <outline text="John Kerry and Sergey Lavrov began one-on-one discussions in Paris, a U.S. official said, with such issues as when to hold the meeting on Syria, how to bring the warring parties to the table and whether to include Iran all likely to be on the table." />
                      <outline text="May 26, 2013" />
                      <outline text="DEAD SEA, Jordan (Reuters) &apos;&apos; Secretary of State John Kerry sketched out a plan on Sunday to spur Palestinian growth with up to $4 billion in private investment, but did not say where the money would come from." />
                      <outline text="Kerry drew a picture of prosperity in the West Bank that could spread to Israel and Jordan, while acknowledging it would not fully materialize without movement toward peace between Israel and the Palestinians." />
                      <outline text="May 25, 2013" />
                      <outline text="ADDIS ABABA (Reuters) &apos;&apos; Secretary of State John Kerry urged Egypt to act swiftly on economic reforms to secure a $4.8 billion International Monetary Fund loan, saying the measures were needed to get further aid from the U.S. Congress, an American official said." />
                      <outline text="Kerry met Egyptian President Mohamed Mursi for about an hour on the sidelines of an African Union summit on Saturday, discussing Syria&apos;s civil war, the Israeli-Palestinian conflict, human rights in Egypt and the country&apos;s faltering economy, the official said." />
              </outline>

              <outline text="VIDEO-how somebody behaves and how they govern-state psaki">
                      <outline text="Link to Article" type="link" url="http://www.state.gov/r/pa/prs/dpb/2013/07/211603.htm" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373388397_dGVGjqFC.html" />
      <outline text="Tue, 09 Jul 2013 16:46" />
                      <outline text="" />
                      <outline text="1:24 p.m. EDT" />
                      <outline text="MS. PSAKI: Hi, everyone. Elise, welcome back from Israel." />
                      <outline text="QUESTION: Thank you, everybody." />
                      <outline text="MS. PSAKI: Good to see you here. I don&apos;t have anything at the top. I imagine what may &apos;&apos; oh, and Arshad&apos;s back, too. What a day. I imagine what&apos;s probably on your minds, but why don&apos;t we start there?" />
                      <outline text="QUESTION: Well, let&apos;s &apos;&apos; just so you don&apos;t forget that we are, in fact, human beings, let&apos;s start with the condition of the Secretary&apos;s wife and whether there are any updates on that after the statement that &apos;&apos; since the statement that was put out in Glen&apos;s name earlier." />
                      <outline text="MS. PSAKI: There are not; and you all should have seen, and if you have not we&apos;re happy to provide to any of you, the statement that was issued by Glen Johnson just about in the last hour, which stated that after conducting tests overnight and this morning, doctors at Massachusetts General Hospital determined that Mrs. Heinz Kerry is no longer in critical condition. She&apos;s undergoing further evaluation, and Secretary of State John Kerry, her son, and other family members remain with her at the hospital in Boston, as they have been since she became ill." />
                      <outline text="As you all know, Mrs. Heinz Kerry is, of course, a private citizen, though she&apos;s married to a public official, and I will not be providing updates from here on her condition. But any updates would come from Glen Johnson who is in Boston." />
                      <outline text="QUESTION: Do you know which son it is, or is that something you can&apos;t get into?" />
                      <outline text="MS. PSAKI: I don&apos;t have that level of detail." />
                      <outline text="QUESTION: Okay. If any &apos;&apos; unless anyone has more questions on that, I&apos;d like to move to Egypt." />
                      <outline text="QUESTION: Please." />
                      <outline text="QUESTION: Okay. So what is the Administration&apos;s thinking about what &apos;&apos; the developments, the situation &apos;&apos; the deteriorating situation on the ground in Egypt?" />
                      <outline text="MS. PSAKI: Well, Matt, we remain, of course, deeply concerned by the increasing violence across Egypt and Egypt&apos;s dangerous level of political polarization. We strongly condemn any violence as well as any incitement to violence. We express our condolences for those who have been killed and hope those who are wounded recover quickly. We call on the military to use maximum restraint responding to protesters, just as we urge all those demonstrating to do so peacefully." />
                      <outline text="And finally, during this transitional period which we are in and have been in for the last couple of days, Egypt&apos;s stability and democratic political order are, of course, at stake. Our focus is on returning stability to the region, returning that to the country, and we are hopeful that they will be able to emerge from this crisis. We know they will not be able to unless people of the country come together in a nonviolent and inclusive way." />
                      <outline text="QUESTION: So have you --" />
                      <outline text="QUESTION: Do you think it might have been helpful if the Egyptian military had exercised maximum restraint last week when it ousted the democratically elected government?" />
                      <outline text="MS. PSAKI: Well, Arshad, I would point you to the statement the President made just over the weekend about those steps. Of course, we remain in the same place on that, and our view is in the same place on that as is the Secretary&apos;s. But right now we&apos;re focused on the path forward. And of course this is an incredibly complex and difficult situation on the ground. You&apos;ve seen, because we&apos;ve read out a number of these calls, how engaged the Secretary has been, not just with officials in Egypt, but also with officials in the region who all have a stake. And that just portrays how important we think resolution is here in this case." />
                      <outline text="QUESTION: So you can&apos;t address more directly whether it would have been better for the military not to have intervened?" />
                      <outline text="MS. PSAKI: Well, I think the President&apos;s statement makes pretty clear what our position is on that and where our focus is here is where we can go moving forward." />
                      <outline text="QUESTION: But since then &apos;&apos; may I? But since then, President Morsy appears to be under house arrest, many members of the Muslim Brotherhood have been detained or are unaccounted for. And this seems to be part of the reason that there is all of this violence right now going on between pro-Morsy supporters and members of the opposition. So do you think, right now, the actions of the military are contributing to stability or to &apos;&apos; actually causing some of the chaos that&apos;s going on right now?" />
                      <outline text="MS. PSAKI: Well, Elise, I mean, this is a situation where it&apos;s very volatile on the ground, there are lots of parties contributing to that volatility. We&apos;re of course paying close &apos;&apos; very close attention to that and are very engaged in it both on the ground and here in Washington. And we have been urging, and continue to urge both publicly and privately, the military to use maximum restraint in how they&apos;re behaving." />
                      <outline text="QUESTION: Well, but do you see the arrest of President &apos;&apos; the house arrest of President Morsy, other members of the Muslim Brotherhood, as exercising maximum restraint here? I mean, could you speak to &apos;&apos; I understand that you want to leave &apos;&apos; the President said at the time about what they did with deposing him, but could you speak to what they&apos;re doing right now and whether you think that&apos;s in line with what the President called for?" />
                      <outline text="MS. PSAKI: Well, again, this is a situation that is very fluid every single day --" />
                      <outline text="QUESTION: I understand it&apos;s fluid, but I mean --" />
                      <outline text="MS. PSAKI: And there&apos;s a lot of volatility on the ground, there&apos;s a lot of violence on the ground, all of which we&apos;re concerned about. Our goal here is to move all sides to a political solution, a political transition. Obviously, there are a lot of factors in that. So that&apos;s why we&apos;re in touch with all the different parties and why we&apos;ll continue to be." />
                      <outline text="QUESTION: Have you &apos;&apos; I&apos;m assuming that the review as to the legal determination of what happened is not yet complete. Is that correct?" />
                      <outline text="MS. PSAKI: That is correct." />
                      <outline text="QUESTION: Do you know, one, the State Department takes the lead in this kind of thing, correct?" />
                      <outline text="MS. PSAKI: Well, Matt, this is obviously the policy moving forward for Egypt and how we&apos;ll approach it." />
                      <outline text="QUESTION: I mean the legal office here takes the lead in determining whether &apos;&apos; making the legal determination about whether there in fact was a coup. Is that correct?" />
                      <outline text="MS. PSAKI: Well, they certainly play a significant role. In terms of the exact legal tick-tock, I don&apos;t have that in front of me." />
                      <outline text="QUESTION: Are the developments &apos;&apos; are the events that are going on right now on the ground and since the actual ouster of the President, are those being factored into the review to determine whether there was a coup?" />
                      <outline text="MS. PSAKI: Certainly, the events that have happened, how things happened last week, how it&apos;s been handled since and how things will be handled moving forward are all factors being considered." />
                      <outline text="QUESTION: In the review." />
                      <outline text="MS. PSAKI: Absolutely." />
                      <outline text="QUESTION: Okay. Is it &apos;&apos; still, is it correct that the Administration&apos;s position is is that continued U.S. military aid &apos;&apos; FMF &apos;&apos; is in the U.S. national security interest?" />
                      <outline text="MS. PSAKI: Well, that is why we have provided the aid. Of course, aid and providing that in the future is being &apos;&apos; is part of the review and you&apos;re very familiar, as all of you are, with the process and what it would mean if we make certain determinations." />
                      <outline text="QUESTION: Yeah, no, I understand that. I just wanted to make sure that the Administration still believes that it continuing the assistance to the Egyptian military is in &apos;&apos; is a U.S. national security priority." />
                      <outline text="MS. PSAKI: Well, broadly speaking, Matt, yes." />
                      <outline text="QUESTION: Yes. Okay." />
                      <outline text="MS. PSAKI: That is why we have --" />
                      <outline text="QUESTION: So second --" />
                      <outline text="MS. PSAKI: Let me just finish, because I think this is an important point you&apos;re raising &apos;&apos; is that broadly the reason we have provided this aid in the past doesn&apos;t mean we have supported even prior to this every action taken by the Government of Egypt. But there are security interests in the region; there are security interests for the United States, but I&apos;m not going to predetermine for you. It&apos;s a wide-ranging, high-level interagency process determining the next steps on our policy for Egypt." />
                      <outline text="QUESTION: But it is also correct, after you responded, &apos;&apos;Yes,&apos;&apos; that it is &apos;&apos; continued aid is in the U.S. national security interests. So that&apos;s one." />
                      <outline text="Number two is a coup &apos;&apos; to determine a legal determination that a coup happened would require a suspension or cutoff in all non-humanitarian assistance to Egypt, including the 1.3 billion in FMF. Is that correct?" />
                      <outline text="MS. PSAKI: Well, Matt, because we&apos;re not there, we haven&apos;t made that determination." />
                      <outline text="QUESTION: I know, but the &apos;&apos; that determination would trigger a cutoff or suspension of the assistance; is that correct?" />
                      <outline text="MS. PSAKI: Again, I don&apos;t want to be analyzing what the legal options are here. That is being closely looked at. There are a number of factors that are being closely looked at. I know we&apos;ll continue to talk about this in the days ahead, but I&apos;m not going to get ahead of where we are in the process." />
                      <outline text="QUESTION: But I&apos;m not asking you to get ahead of anything. If anything, I&apos;m asking you just to confirm what the law says, which is that if there is a determination that a coup happened, that a democratically elected government was overthrown by unconstitutional means, that that would require a suspension or a cutoff in assistance." />
                      <outline text="QUESTION: Or a waiver." />
                      <outline text="MS. PSAKI: Well, that is &apos;&apos; there is a broad legal definition that is applicable in many cases, right, Matt? But we&apos;re also looking at what happened here on the ground. There are millions of people on the ground who do not think it was a coup. We factor lots of factors in. We&apos;re in the analysis process right now, and I&apos;m not going to get ahead of where that may or may not go." />
                      <outline text="QUESTION: But why does the fact that there are a lot of people on the ground in Egypt who don&apos;t think it was a coup have any bearing on this? I mean, the determination is not being made by people on the ground in Egypt; the determination, as Matt rightly points out, is normally made by the Legal Adviser&apos;s Office at the State Department." />
                      <outline text="MS. PSAKI: And through an interagency process, Arshad, that, of course, takes a lot of factors into play here, and I just don&apos;t want to get ahead of that process and that determination." />
                      <outline text="QUESTION: But why does it make any difference what people on the ground think? I mean presumably the people who ousted the civilian, democratically elected government have a different view." />
                      <outline text="MS. PSAKI: Because taking a look at what happened on the ground is a factor in the process." />
                      <outline text="QUESTION: And is it &apos;&apos; one more on this one, please. Historically, it is the Legal Adviser&apos;s Office, as I have understood it, that, as Matt said, takes the lead on making that determination. If in this instance they are not taking the lead, then who ultimately will make what is a legal determination here? I mean, it&apos;s not just a policy determination; it&apos;s a legal one in response to a law. If it&apos;s not the Legal Adviser&apos;s Office, who is it? Is it the White House counsel&apos;s office? Is somebody at the Justice Department? I mean, what is the legal authority within the government that ultimately will make this call if it is not the Legal Adviser&apos;s Office?" />
                      <outline text="MS. PSAKI: Well, again, I wasn&apos;t implying that the Legal Office at the State Department does not have a very significant role that they play and that they are continuing to play in any case like this. There are a number of determinations that are being made about our policy moving forward in Egypt. That is happening at a very high level. So I was just conveying that that decision-making process and those conversations continue to be in place and happening now." />
                      <outline text="QUESTION: But I still don&apos;t get who makes the ultimate call on what is a legal determination. Is it the Legal Adviser? Is it the Secretary of State? Is it the President? Is it somebody else?" />
                      <outline text="MS. PSAKI: Well, there are a number of factors that go into it. I will check and see if there is a specific historical, legal tick-tock of the exact order of decision-making for you." />
                      <outline text="QUESTION: Would you clarify something on &apos;&apos;" />
                      <outline text="MS. PSAKI: Sure, Said." />
                      <outline text="QUESTION: -- something that you said? You said that you are in touch with all parties. Are you in touch with the Muslim Brotherhood? How are you in touch with them?" />
                      <outline text="MS. PSAKI: We have been in touch, and that should not be at all unexpected given we are in touch with all parties in Egypt. In those conversations we have conveyed the following message &apos;&apos; I&apos;m just getting to your next question here, but then you can ask another one. We urge them to engage in the political process and to support the process to full civilian government through elections that are currently &apos;&apos; that&apos;s the path we&apos;re asking them to move toward." />
                      <outline text="QUESTION: So you&apos;re saying --" />
                      <outline text="QUESTION: Okay. But you&apos;re in touch with &apos;&apos;" />
                      <outline text="QUESTION: -- just to clarify, so when you say that &apos;&apos; I&apos;m sorry, Said. When you say that you&apos;re engaging them to accept the process towards a civilian transition of &apos;&apos;" />
                      <outline text="MS. PSAKI: To engage in the political process." />
                      <outline text="QUESTION: So are you asking them to kind of abandon their fight to get Morsy back into power or to accept his ouster?" />
                      <outline text="MS. PSAKI: That&apos;s not a determination for us to make. We&apos;re asking them to engage in the process moving forward from here." />
                      <outline text="QUESTION: But Jen, they did engage in the process &apos;&apos;" />
                      <outline text="MS. PSAKI: They did." />
                      <outline text="QUESTION: -- and their candidate won, and now their candidate is not the winner; now their candidate is the loser, and he is the loser because he was ousted by the military. Why should they engage in the process again if they did it the first time and essentially got screwed?" />
                      <outline text="MS. PSAKI: Well, I know I said this so many times people were tired of it on Wednesday in that a democratic process is not just about casting your ballot. There are other factors in terms of &apos;&apos; in addition to that, including how somebody behaves and how they govern, and this is a case where millions of people have spoken in the country. We are not judging that, but again, that&apos;s a real factor here." />
                      <outline text="QUESTION: Millions of people spoke when they went to the polls last &apos;&apos; whenever it &apos;&apos; a year ago and elected President Morsy. It&apos;s not his fault that the opposition couldn&apos;t get their act together and present a decent candidate or present &apos;&apos; I just don&apos;t understand how you can tell them with a straight face to please engage in the democratic process when they did, they won, and now their guy is gone." />
                      <outline text="MS. PSAKI: Well &apos;&apos;" />
                      <outline text="QUESTION: Why should they &apos;&apos; why should they?" />
                      <outline text="MS. PSAKI: Well, Matt, because obviously &apos;&apos;" />
                      <outline text="QUESTION: Because you say they should?" />
                      <outline text="MS. PSAKI: No. That&apos;s not at all what I was going to say. Millions of people in the country have spoken and have expressed some legitimate grievances, and there is an opportunity moving forward to have folks from the Muslim Brotherhood engage in the process." />
                      <outline text="QUESTION: But millions of people participated in the democratic process before, and just because some people &apos;&apos; millions maybe &apos;&apos; were unhappy with that, they took to the streets, and it was not a democratic move that happened. So I just don&apos;t understand how the Administration expects itself to be taken seriously, by the Muslim Brotherhood in particular, when you say that you should go back and engage in a process that didn&apos;t work out for you the first time." />
                      <outline text="QUESTION: Well, a couple of things here." />
                      <outline text="MS. PSAKI: Mm-hmm. Go ahead." />
                      <outline text="QUESTION: First of all, when you make this legal determination, are you &apos;&apos; about whether this was a coup &apos;&apos; so you are taking into consideration the millions of people that signed this petition and called for his &apos;&apos; for him to be removed from power. Is that right?" />
                      <outline text="MS. PSAKI: Well, there are a number of factors that are taken in. There are very significant consequences, I think as everybody is aware, that go along with this determination, and certainly it is relevant that this is a highly charged issue for tens of millions of Egyptians who have differing views about what happened, but we are going to take the time necessary. I know it feels urgent right now; it certainly is, but these determinations take time." />
                      <outline text="QUESTION: I&apos;m not saying &apos;&apos; I mean is it relevant that it&apos;s an emotionally charged issue, or is it relevant that millions of people &apos;&apos; 22 million if I&apos;m correct &apos;&apos; signed a petition that called for him &apos;&apos; for the military to take him from power? I mean, is that relevant to your determination of whether this was a democratic act or not?" />
                      <outline text="MS. PSAKI: Again, certainly there are lots of factors that are taken into consideration here at a very high level, and those conversations are ongoing." />
                      <outline text="QUESTION: Is that one of them though?" />
                      <outline text="MS. PSAKI: Well, certainly what&apos;s happened on the ground, where we are now, and how it&apos;s handled moving forward are all factors." />
                      <outline text="QUESTION: When you are talking to the military about exercising restraint, are you urging them to release President Morsy and other members of the Muslim Brotherhood from house arrest?" />
                      <outline text="MS. PSAKI: We&apos;re not taking positions on specific cases. Of course, we have been very publicly and privately expressing concern about arbitrary arrests, but beyond that, we&apos;re not taking positions on individuals. We know this will be --" />
                      <outline text="QUESTION: The President of &apos;&apos; I mean --" />
                      <outline text="MS. PSAKI: We know this will be looked into over the &apos;&apos; and there will be a process for doing that." />
                      <outline text="QUESTION: Can I go back to my question, please?" />
                      <outline text="MS. PSAKI: Mm-hmm." />
                      <outline text="QUESTION: Who is talking to who the Muslim Brotherhood? Who are you talking to in the Muslim Brotherhood leadership?" />
                      <outline text="MS. PSAKI: I&apos;m not going to get into specifics on that, just to say that we are in touch with all parties, including representatives from the &apos;&apos; of the Muslim Brotherhood and the Freedom and Justice Party." />
                      <outline text="QUESTION: And related to Elise&apos;s last question on the status of President Morsy, are you aware of his status, where is he, what kind of condition is he under, and so on? Are you getting any reports on his status?" />
                      <outline text="MS. PSAKI: I just don&apos;t have any update on that. We have not, of course, been in touch with him, that I&apos;m aware of, since he was arrested last week." />
                      <outline text="QUESTION: Do you call the interim leader to release him, like some of the leaders did over the weekend?" />
                      <outline text="MS. PSAKI: I think I just answered that question when Elise asked it." />
                      <outline text="Go ahead." />
                      <outline text="QUESTION: Why has the Secretary not called for his release?" />
                      <outline text="QUESTION: Excuse me." />
                      <outline text="QUESTION: Why not?" />
                      <outline text="MS. PSAKI: Because we&apos;re not taking positions on specific cases. I understand that he is &apos;&apos; has been the president, was the president, and that is a unique case. But again, I don&apos;t have a specific position on each case from the U.S. Government." />
                      <outline text="QUESTION: Well, but it&apos;s not on each case; it&apos;s on the case of the democratically elected president of the country. It seems to me to be odd that you would not wish to take a position when the democratically elected &apos;&apos; odd to say the least &apos;&apos; when the democratically elected president of a country is removed from power. So can you explain to me how you justify not taking a position on this specific case?" />
                      <outline text="MS. PSAKI: We&apos;re just not taking a position on this specific case." />
                      <outline text="QUESTION: You just don&apos;t want to." />
                      <outline text="MS. PSAKI: We have not." />
                      <outline text="Go ahead." />
                      <outline text="QUESTION: Yes, ma&apos;am. A question about Brazil?" />
                      <outline text="MS. PSAKI: Oh, wait, I think there&apos;s probably more on Egypt, and we&apos;ll come back to Brazil, I promise." />
                      <outline text="QUESTION: In the answer &apos;&apos; the first answer to Arshad&apos;s question, you said he was the democratically-elected president, he was the president. Does the mean that you no longer regard him as the person who was elected --" />
                      <outline text="MS. PSAKI: Well, Matt, he was elected a year ago --" />
                      <outline text="QUESTION: -- but he is no longer the president in your eyes?" />
                      <outline text="MS. PSAKI: I think there&apos;s been &apos;&apos; I&apos;m not &apos;&apos; I think it&apos;s been pretty clear, Matt, what&apos;s happened here on the ground." />
                      <outline text="QUESTION: So I just want to make sure --" />
                      <outline text="MS. PSAKI: And we&apos;re looking --" />
                      <outline text="QUESTION: -- I understand that the Administration no longer regards Mohamed Morsy as the president of Egypt?" />
                      <outline text="MS. PSAKI: I&apos;m not taking a specific position on that, Matt. I&apos;m conveying that --" />
                      <outline text="QUESTION: (Inaudible) past tense, though, which is a position." />
                      <outline text="MS. PSAKI: Well, I was conveying when he was elected. That was what I was trying to convey." />
                      <outline text="QUESTION: But when he was elected --" />
                      <outline text="QUESTION: Until a week ago &apos;&apos; until a week ago, you recognized him as the legitimately-elected leader of Egypt. So in the interim, a coup takes place; now he&apos;s no longer the legitimate leader of Egypt? Is that what you &apos;&apos; can you say that clearly?" />
                      <outline text="MS. PSAKI: Well, again, we&apos;re &apos;&apos; this is a situation where we are taking a very close look at what&apos;s happened on the ground. I understand the great level of interest in this. It&apos;s only a couple of days old. There are ongoing conversations at a very high level here in the government." />
                      <outline text="QUESTION: Okay. In retrospect though, retroactively, do you consider Morsy to be &apos;&apos; to have been elected, perhaps, wrongly or not fairly or whatever?" />
                      <outline text="MS. PSAKI: I&apos;m not doing retrospectives. I think we spoke on the election at the time. I don&apos;t have anything new for you on that. Obviously, we&apos;re focused on where things are now and where we can go moving forward." />
                      <outline text="QUESTION: So, Jen, who&apos;s in charge in Egypt right now, then?" />
                      <outline text="MS. PSAKI: Well, I think, as you know, there&apos;s an interim government. There are a number of players that&apos;s being worked through. Part of the Secretary&apos;s focus over the weekend has been continuing to encourage a move towards that transitional government and towards elections, but again, it&apos;s a very fluid situation on the ground." />
                      <outline text="QUESTION: Well, there&apos;s an interim president; I don&apos;t think they&apos;ve agreed on the government yet as such." />
                      <outline text="MS. PSAKI: That&apos;s true, it&apos;s still being determined for --" />
                      <outline text="QUESTION: So who is the Secretary &apos;&apos; who is his counterpart that the Secretary can talk to within that structure?" />
                      <outline text="MS. PSAKI: Well, he&apos;s been in touch with a number of officials there that we read out over the course of the weekend." />
                      <outline text="QUESTION: No, I don&apos;t &apos;&apos; sorry, I missed it. Who did he talk to over the weekend?" />
                      <outline text="MS. PSAKI: Let&apos;s see. I mean, I&apos;m happy to provide you of the list that we sent out broadly. He spoke with &apos;&apos; I mean, he was on the phone for dozens of hours, I would say, over the course of the weekend. ElBaradei he spoke with a number of times over the course &apos;&apos; he also spoke with leaders in the region. Obviously, as I mentioned at the top, there is a great stake for good reason from leaders like the Qataris and the Emiratis, who he spoke with. And I&apos;ll get you the rest of the list, Jo, afterwards just so you have it." />
                      <outline text="QUESTION: Okay." />
                      <outline text="QUESTION: Talking about his contacts --" />
                      <outline text="MS. PSAKI: Mm-hmm." />
                      <outline text="QUESTION: -- I mean, I &apos;&apos; as much as I remember, this press release of the statement was released at the end of Saturday, and almost now 48 hours passed." />
                      <outline text="MS. PSAKI: The Secretary&apos;s statement? And the President, and the President. Mm-hmm." />
                      <outline text="QUESTION: Yes, and you released the first one, which was about the contacts." />
                      <outline text="MS. PSAKI: Mm-hmm." />
                      <outline text="QUESTION: Any new contacts was done yesterday or today?" />
                      <outline text="MS. PSAKI: I don&apos;t have any &apos;&apos; he was --" />
                      <outline text="QUESTION: Because this one that you mentioned was released on Saturday, so it --" />
                      <outline text="MS. PSAKI: It was." />
                      <outline text="QUESTION: Yeah." />
                      <outline text="MS. PSAKI: It was. He was in touch with a number of those same officials yesterday as well." />
                      <outline text="QUESTION: So the other question is related to the &apos;&apos; to being in touch with the different parties, especially Muslim Brotherhood, and it was reported today in The New York Times that there are contacts with the Muslim Brotherhood, whatever leadership if I can say, because most of them they are under house arrest or they are not there anymore, they are hiding. What kind of contacts were done in order to &apos;&apos; it specifically was said in The New York Times story, to accept the reality, which is whatever is the status quo now? Can you confirm or deny this report or this activity in general?" />
                      <outline text="MS. PSAKI: Well, I think I just confirmed earlier that we have had officials in touch with members of the Muslim Brotherhood, and I conveyed what message we&apos;re sending during those conversations." />
                      <outline text="QUESTION: Is it correct that the last conversation anyone had with Morsy from the U.S. side was the President, late Monday a week ago? Is that correct, or do you know of a new contact?" />
                      <outline text="MS. PSAKI: I&apos;d have to double-check on that, Matt. I&apos;m not aware of another one, but I&apos;m happy to check on that for all of you." />
                      <outline text="QUESTION: Jen, do you support an early presidential elections, or do you call for an early presidential elections in Egypt?" />
                      <outline text="MS. PSAKI: Well, clearly a part of the process is the creation of the transitional government, and then, of course, elections as well." />
                      <outline text="QUESTION: Jen, are you concerned that what&apos;s going on in Egypt right now might well happen again in countries like in Tunisia, for example? Are you reaching out to the Tunisian Government and Tunisian army, for example, to &apos;&apos; I mean, to avoid such a situation?" />
                      <outline text="MS. PSAKI: Well, clearly there is a focus on moving toward a resolution in Egypt, given the impact on stability there and stability in the region. And that&apos;s one of the reasons that we are so engaged, and the Secretary has been engaged with many different leaders in the region. I don&apos;t have any specific calls to the Government of Tunisia to read out to you." />
                      <outline text="QUESTION: Yesterday was big demonstrations in Cairo regarding not just for the support of the army, and especially for the &apos;&apos; what the people are considering a cooperation of Americans and Muslim Brothers to whatever kind of reality was created in the last year or so, almost a year. So do you have anything to say about that? Because it was big signs of the President and Morsy together, and Patterson was part of it, and all these things." />
                      <outline text="MS. PSAKI: Just to say that any notion that we have taken sides in this and that we are siding with one side or the other is incorrect." />
                      <outline text="QUESTION: Jen?" />
                      <outline text="MS. PSAKI: Mm-hmm." />
                      <outline text="QUESTION: I know you ordered the evacuation of nonessential personnel." />
                      <outline text="MS. PSAKI: Mm-hmm." />
                      <outline text="QUESTION: Could you tell us who remains in Cairo? Is the Ambassador still there? And then roughly how many staff you still have at the Embassy?" />
                      <outline text="MS. PSAKI: The Ambassador is. I&apos;d have to get you an update on the specific number of staff or how we&apos;re characterizing that. Happy to do that." />
                      <outline text="QUESTION: Have you talked to Ankara regarding Egypt over the weekend? It seems that the Turkish leaders are pretty upset that the Western world have not called coup what happened in Egypt." />
                      <outline text="MS. PSAKI: Well, I&apos;m not going to comment specifically on the comments of the Turkish leaders. But I can tell you that the Secretary has been in touch on multiple occasions with Foreign Minister Davutoglu over the course of the weekend about the events in Egypt." />
                      <outline text="QUESTION: How will this affect your relationship with the &apos;&apos; I mean, the neighbor countries in terms of this disappointment by your allies, especially Turkey, actually? Because the Prime Minister is accusing the Western world in this, especially U.S.A. not characterizing this incident as a coup. How your relationship will be affected from this?" />
                      <outline text="MS. PSAKI: Well, again, we are clearly going through the process of making our own determination, and I don&apos;t want to get ahead of that. We have been in close contact, as I mentioned the Secretary has been, with the Foreign Minister over the weekend. As you know, they have a very close working relationship on a number of issues, and they had many conversations about Egypt. But I don&apos;t want to speak for any other country, but it&apos;s clear that there are many countries in the region who have a stake in the stability of Egypt, and that&apos;s what our focus is on as well." />
                      <outline text="QUESTION: And about the perception of &apos;&apos; among some Egyptians about this &apos;&apos;Mother America&apos;&apos; story which appeared on New York Times, I mean, the involvement &apos;&apos; about the U.S. involvement on this incident and &apos;&apos; et cetera --" />
                      <outline text="MS. PSAKI: Mm-hmm." />
                      <outline text="QUESTION: -- but how did public diplomacy of U.S. with the Egyptians will be affected from in near future after this incident?" />
                      <outline text="MS. PSAKI: Well, we just have to keep conveying what&apos;s accurate, which is that we&apos;re on the side of the Egyptian people. We&apos;re not taking sides, but we are in touch with all parties and our interest is in moving towards a stable Egypt, and that&apos;s why we&apos;re so engaged." />
                      <outline text="QUESTION: Do you have anything to say about this perception within Egyptians about the U.S. involvement? I mean, is it fair, or how do you see it?" />
                      <outline text="MS. PSAKI: Well, we&apos;re just working to convey what is accurate." />
                      <outline text="QUESTION: How would you respond to people who would say that by insisting that you&apos;re not taking sides in this, that you in fact are taking a side because you&apos;re not sticking up for the person who was elected, who you recognized as a democratically elected president of a country?" />
                      <outline text="MS. PSAKI: Well, Matt, I think it&apos;s not as simple as that, and not as black-and-white as that &apos;&apos; I&apos;m responding to your question &apos;&apos; and that there were millions of people who have expressed legitimate grievances. There have been steps that have been taken by others as well that we haven&apos;t been supportive of, including some by the military. And so we aren&apos;t taking sides because we don&apos;t think that is in the interests of Egypt and the interest of moving this process forward toward stability." />
                      <outline text="QUESTION: Right. But generally, when there are people who are unhappy, and however many the numbers are, in a country, the United States would say, well, you can get involved politically, and if you&apos;re unhappy with your leadership, you change it at the ballot box. Is that not correct?" />
                      <outline text="In this case, did you think the situation was so bad that you could actually come to consider condoning a military coup?" />
                      <outline text="MS. PSAKI: Well, again, Matt, we&apos;re not condoning anything here." />
                      <outline text="QUESTION: By not taking a position --" />
                      <outline text="MS. PSAKI: We haven&apos;t even made decision about what --" />
                      <outline text="QUESTION: -- you are condoning it in the interim." />
                      <outline text="MS. PSAKI: -- has taken place." />
                      <outline text="QUESTION: You do recognize that, right?" />
                      <outline text="MS. PSAKI: Well --" />
                      <outline text="QUESTION: By having no opinion, you are in essence saying that nothing was wrong, that this wasn&apos;t &apos;&apos; you do get that, that&apos;s what people look at it --" />
                      <outline text="MS. PSAKI: I would disagree with Matt &apos;&apos; what I would &apos;&apos; with you, Matt, on that. What I would say is that each circumstance is different. You can&apos;t compare what&apos;s happening in Egypt with what&apos;s happened in every other country, and that&apos;s how we&apos;re handling this situation." />
                      <outline text="QUESTION: Jen? You said that you support an early election. Does this mean that you don&apos;t recognize Morsy as the Egyptian president anymore?" />
                      <outline text="MS. PSAKI: Again, I think I&apos;ve been pretty clear about the steps that were taken. There have been steps that have been taken in Egypt. We&apos;re doing our own evaluation of what&apos;s happened on the ground, and I&apos;m certain we&apos;ll continue to discuss that." />
                      <outline text="QUESTION: But you&apos;re not doing anything about U.S. aid right now; U.S. aid to Egypt continues?" />
                      <outline text="MS. PSAKI: Correct." />
                      <outline text="QUESTION: So just now you said you&apos;re not taking sides because you don&apos;t think that&apos;s in the interests of Egypt and Egyptians. Exactly why? Do you fear that it&apos;s going to inflame tensions even further if you do, or --" />
                      <outline text="MS. PSAKI: Well, I don&apos;t think we see the benefit of inserting the U.S. view in a situation that continues to be volatile. We want to play a role in helping to move towards stability, and that&apos;s where our focus is." />
                      <outline text="QUESTION: But, like, what &apos;&apos; but by doing what, though? I mean, you&apos;re not calling either side out on their actions that you would consider either excessive, undemocratic, violent, so --" />
                      <outline text="MS. PSAKI: I think we&apos;ve called all sides to reduce violence --" />
                      <outline text="QUESTION: You just urge &apos;&apos; to urge restraint." />
                      <outline text="MS. PSAKI: We&apos;ve called all sides to increase restraint. This is a case where the situation is unfolding on the ground. And what we&apos;re doing is we are in touch with close partners in the region, we&apos;re in close touch with officials in Egypt, we are making our own determinations, but obviously, there are a lot of factors that go into that. So we have a very high level of engagement here. But our focus is on encouraging stability, reducing violence, and moving toward that." />
                      <outline text="QUESTION: Jen. One last thing. I want to ask you about the current president --" />
                      <outline text="MS. PSAKI: Yeah." />
                      <outline text="QUESTION: -- the temporary president of Egypt, Adly Mansour. Do you consider him to be the legitimate leader of Egypt currently?" />
                      <outline text="MS. PSAKI: He&apos;s the interim, as you know. Beyond that, I don&apos;t have a further definition for you. Obviously, they&apos;ll be &apos;&apos; our hope is that there are elections." />
                      <outline text="QUESTION: So I just &apos;&apos; will you let us know when the heat from the flames of the burning hoops that you&apos;re jumping through to avoid taking a position on this get too hot, or will that just be obvious from what you&apos;re saying at the podium?" />
                      <outline text="MS. PSAKI: Matt, if you&apos;re having a good time today, I&apos;ll be back here tomorrow. We&apos;ll do this again." />
                      <outline text="QUESTION: Syria?" />
                      <outline text="QUESTION: Sorry, more on Egypt." />
                      <outline text="MS. PSAKI: Let&apos;s just see if there&apos;s any more Egypt. Dana?" />
                      <outline text="QUESTION: I just want to be clear. So part of the legal definition of a coup is whether people on the ground were in support of the ouster of a president?" />
                      <outline text="MS. PSAKI: I was not defining that as a legal definition as much as a factor that is being discussed and considered in our policy moving forward in Egypt." />
                      <outline text="QUESTION: I mean, I know you said you can&apos;t compare other situations, but, like, for example, in 2010, there was a coup in Niger, and a week before, tens of thousands of people protested, U.S. had already even suspended aid to Niger because they found the president to be dictatorial. And yet when the military did take over, the very next day the State Department came out and said &apos;&apos; called it a coup." />
                      <outline text="MS. PSAKI: Well, I think that just further illustrates the fact that each circumstance is different. We&apos;re going to take the time to make an evaluation here. There are a number of factors that impact our policy moving forward. Of course, the legal implications and the legal requirements are a part of that, and those are all being discussed." />
                      <outline text="QUESTION: Could you &apos;&apos; do you think that you could provide us with some talking points or some of the actual standards that determine whether something is &apos;&apos; a situation is labeled a coup or not? Are there &apos;&apos; is there like a list? Are there standards that are held to as this determination is being made? Is that something you can provide to us?" />
                      <outline text="MS. PSAKI: If there is a legal definition to provide, I&apos;m happy to provide that. I will see what we have." />
                      <outline text="QUESTION: Yeah, I think there is (inaudible). I mean, it&apos;s well defined. You can find it." />
                      <outline text="MS. PSAKI: Said, are you a lawyer on the side? (Laughter.)" />
                      <outline text="QUESTION: No, I&apos;m not. I&apos;m just saying &apos;&apos; (laughter)." />
                      <outline text="QUESTION: Senator McCain just issued a statement saying that while he understood that this was done with the acquiescence of millions of Egyptians, that he can only conclude that this was a coup in which the military played a decisive role and that current U.S. law is very clear about the implications of foreign aid, and he calls for a withdrawal of U.S. aid." />
                      <outline text="MS. PSAKI: Well, I know that a number of elected officials, including Senator McCain and many yesterday, have spoken out about their views, and that is certainly to be expected. But we&apos;re making our own determination and we&apos;re going to take the time to do that." />
                      <outline text="QUESTION: And you have no comment on the African Union suspending Egypt for what they&apos;re calling a coup either?" />
                      <outline text="MS. PSAKI: I don&apos;t." />
                      <outline text="QUESTION: Change subjects?" />
                      <outline text="MS. PSAKI: Any more on Egypt?" />
                      <outline text="QUESTION: Let me just --" />
                      <outline text="MS. PSAKI: Okay." />
                      <outline text="QUESTION: Is it your view that the law on suspending aid if the legal determination of coup is made &apos;&apos; of a coup is made is able to be interpreted, that it can be &apos;&apos; sorry, interpreted is not the right word &apos;&apos; that there &apos;&apos; it is open to interpretation?" />
                      <outline text="MS. PSAKI: Well, the --" />
                      <outline text="QUESTION: That if a &apos;&apos; that it is possible under the law that if a democratically elected president is removed by a military in an unconstitutional manner, it might not meet the standard, the legal standard, of --" />
                      <outline text="MS. PSAKI: Well, Matt, let me just be very clear --" />
                      <outline text="QUESTION: I just --" />
                      <outline text="MS. PSAKI: -- that our focus is absolutely on abiding by the law. That is being analyzed and looked at right now. There are also a number of other factors that go into our policy related to Egypt, so I didn&apos;t want to do one without the other." />
                      <outline text="QUESTION: All right, okay. So that just leads me to believe that you&apos;re not particularly &apos;&apos; in this case, and you say it&apos;s a case-by-case basis &apos;&apos; but in this case, you&apos;re not particularly interested in interpreting the law as it is written; you&apos;re interested in trying to find a way to skirt the requirements of the law that --" />
                      <outline text="MS. PSAKI: I think the Legal Office is certainly determining and analyzing the law as it is written, Matt." />
                      <outline text="QUESTION: Right. So you&apos;ll let us know when those hoops (inaudible) --" />
                      <outline text="MS. PSAKI: But I&apos;m not going to get ahead of their own analysis, and I&apos;m not a lawyer and I&apos;m not aware that you are either, but you never know." />
                      <outline text="Do we have any more on Egypt? Okay." />
                      <outline text="QUESTION: Can I ask a question about Brazil?" />
                      <outline text="MS. PSAKI: Sure." />
                      <outline text="QUESTION: Could you confirm whether, with or without the consent or an agreement with the Brazilian Government, the United States Government has maintained a database of monitoring or a monitoring center in Brasilia or have ever collected data at the Embassy of Brazil in Washington or at the Embassy of Brazil in the United Nations using physical devices installed in computers and using software such as Highlands, Vagrant, and Lifesaver?" />
                      <outline text="MS. PSAKI: Well, as has been our policy, we&apos;re not going to comment publicly on every specific alleged intelligence activity. As a matter of policy, we have been clear that the United States does gather foreign intelligence of the type gathered by all nations. I can tell you that we have spoken with Brazilian officials regarding these allegations. We plan to continue our dialogue with the Brazilians through normal diplomatic channels, but those are conversations that, of course, we would keep private." />
                      <outline text="QUESTION: To clarify, the physical presence of devices of the United States in consulates or embassies of Brazil anywhere in the world, can you confirm that existence or not?" />
                      <outline text="MS. PSAKI: I do not have anything more for you on that." />
                      <outline text="Go ahead." />
                      <outline text="QUESTION: Can I have a follow-up on Latin America --" />
                      <outline text="MS. PSAKI: Sure." />
                      <outline text="QUESTION: -- and Mr. Snowden --" />
                      <outline text="QUESTION: No, no. Still Brazil?" />
                      <outline text="MS. PSAKI: Okay, go ahead." />
                      <outline text="QUESTION: Yes, yes. I wonder regarding the reaction of Brazilian officials, among them the Minister of Foreign Relations Antonio Patriota, I wanted to know how much this issue can contaminate the visit of President Dilma Rousseff to United States in October." />
                      <outline text="MS. PSAKI: Well, clearly, as I mentioned, we&apos;ve been already in touch with Brazilian authorities regarding these allegations and we&apos;re planning to continue that dialogue. We work with Brazil on a wide range of issues and we are hopeful that we can continue to discuss and resolve through normal diplomatic conversations." />
                      <outline text="QUESTION: Who&apos;s in this side of the diplomatic channel in the U.S. side? Who is talking to the Brazilian Government? Can you tell us?" />
                      <outline text="MS. PSAKI: I don&apos;t have any specific readout of officials for &apos;&apos; on that for you." />
                      <outline text="QUESTION: Secretary Kerry has talked with Minister Antonio Patriota or --" />
                      <outline text="MS. PSAKI: Not that I&apos;m aware of in recent days. I&apos;m happy to check on that for you and see if there has been a call I&apos;m just not aware of." />
                      <outline text="QUESTION: Is that the first time that the United States have faced these sort of queries from Brazil, these sort of clarifying requests from Brazil?" />
                      <outline text="MS. PSAKI: I&apos;d leave that to you to determine historically if this has been an issue in the past. But obviously, this is a unique case. We all know the history here. We&apos;re in close contact and we&apos;ll continue those conversations." />
                      <outline text="QUESTION: Since 2001, has Brazil agreed to collaborate with United States in data mining or data reporting?" />
                      <outline text="MS. PSAKI: I just don&apos;t have anything more on this for you." />
                      <outline text="QUESTION: Jen, is that (inaudible) Turkish Government --" />
                      <outline text="MS. PSAKI: Hold on, let&apos;s finish on Brazil and then we can go to you next, if that&apos;s okay." />
                      <outline text="QUESTION: Actually, it&apos;s on Venezuela." />
                      <outline text="MS. PSAKI: Oh, okay." />
                      <outline text="QUESTION: Okay. It is regarding Mr. Snowden, as you probably are aware that Mr. Snowden has been granted asylum. Venezuela has granted asylum to Mr. Snowden among two other countries in Latin America. I was wondering if you have any reaction on that or if this is going to have any impact considering that the U.S. and Venezuela are trying to work on their bilateral relation." />
                      <outline text="MS. PSAKI: So let me say first that, of course, as in all of our communications with foreign governments regarding Mr. Snowden, we have advised the Government of Venezuela of the felony charges against him and urged that he should not be allowed to proceed in any further international travel other than as necessary to return him to the United States. We&apos;ve had our differences with Venezuela on some issues, but we&apos;ve also been able to work together on some. And this is a case where, as someone who&apos;s facing felony charges, we&apos;re hopeful that any government involved would take that into account and support his return to the United States." />
                      <outline text="As you know, this is all, at this point, a hypothetical given he still remains in the transit room, if that&apos;s the right term, in the airport in Moscow." />
                      <outline text="QUESTION: Is it your determination that in order for him &apos;&apos; that he is physically unable to make it from Russia to Venezuela or Bolivia or one of those countries without transit &apos;&apos; without having to refuel through a third country that wouldn&apos;t necessarily provide him with &apos;&apos; that wouldn&apos;t agree not to &apos;&apos; would agree to extradite him?" />
                      <outline text="MS. PSAKI: Well, it&apos;s speculating a few steps down the path here, because obviously we know that he would need to transfer somewhere out of there. We&apos;ve been very clear to governments across the board of our desire to have Mr. Snowden returned to the United States. I don&apos;t think there&apos;s any secret of that. In terms of the paths or steps, I mean, you&apos;d have to either look at the airport maps or talk to the various governments that could be the options." />
                      <outline text="QUESTION: So where do things stand right now in terms of &apos;&apos; is your &apos;&apos; kind of &apos;&apos; I know you&apos;re casting a wide net in countries not to admit him or to extradite him and not to give him asylum, but, like, where is kind of the frontline of your diplomacy right now in this? This is with Russia, to try and urge them to send him back or --" />
                      <outline text="MS. PSAKI: Well, I don&apos;t want to get into too many levels of specifics here, but obviously we have been in touch with a wide range of officials. It&apos;s no secret where he is located now. We agree with the comments of President Putin last week that we wouldn&apos;t want this to impact our relationship. We certainly feel that anyone &apos;&apos; any country granting asylum to Mr. Snowden would create grave difficulties in our bilateral relationship, and that&apos;s a message that we&apos;ve conveyed publicly and, of course, privately in conversations as well." />
                      <outline text="QUESTION: Jen --" />
                      <outline text="QUESTION: Specifically on Venezuela, you said we&apos;ve had our disagreements with Venezuela, but we have been able to cooperate on some issues. Is that what you said?" />
                      <outline text="MS. PSAKI: I did." />
                      <outline text="QUESTION: Can you name one issue since the election of Chavez that the United States and Venezuela have cooperated on?" />
                      <outline text="MS. PSAKI: Well, Matt, I think I was making a broad point there and making a point about the fact that the Secretary also --" />
                      <outline text="QUESTION: In other words, no." />
                      <outline text="MS. PSAKI: Let me finish. The Secretary also had a meeting, as you know, with the Foreign Minister that was a potential opening. We&apos;re not getting ahead of where we are, but of course we would look closely and it would certainly impact our bilateral relationship if any country, including Venezuela, were to grant him asylum." />
                      <outline text="QUESTION: Right, right. No, no. I just want to &apos;&apos; so you would point to the meeting that happened in Guatemala as a sign of cooperation, as one of the few areas of cooperation between Venezuela and the United States since President Chavez was elected. I realize this is now President Maduro." />
                      <outline text="MS. PSAKI: Yes." />
                      <outline text="QUESTION: But I&apos;m asking you if you can &apos;&apos; you would say that that&apos;s evidence of cooperation, a meeting?" />
                      <outline text="MS. PSAKI: Well, Matt, I think what we&apos;re looking to do --" />
                      <outline text="QUESTION: Can you name --" />
                      <outline text="MS. PSAKI: -- is re-step our relationship here. That&apos;s where we&apos;re hoping to go." />
                      <outline text="QUESTION: Right. And this would be a problem?" />
                      <outline text="MS. PSAKI: This would be a problem. Absolutely." />
                      <outline text="QUESTION: Okay." />
                      <outline text="QUESTION: Jen, can I ask &apos;&apos; Kommersant Daily in Russia has reported today that &apos;&apos; quoting State Department sources &apos;&apos; that the Putin administration has been told that if this is not resolved by September, this could threaten a potential state visit by President Obama." />
                      <outline text="MS. PSAKI: I believe the White House disputed that this weekend. I would point you to them for any specific comment on that." />
                      <outline text="QUESTION: I don&apos;t think they did, because my White House colleague said that he wasn&apos;t getting any information from the White House about this." />
                      <outline text="MS. PSAKI: Well, I would point you to them for any comment on that specifically." />
                      <outline text="QUESTION: But, I mean, is the State Department &apos;&apos; is there any knowledge at the State Department that this would be the case?" />
                      <outline text="MS. PSAKI: None that I&apos;m aware of." />
                      <outline text="QUESTION: Can I make a follow-up on what you said regarding that you have told Venezuela about the inconvenience of granted asylum to Mr. Snowden?" />
                      <outline text="MS. PSAKI: And just to be clear, it&apos;s not &apos;&apos; it&apos;s broadly any country where he could move through transit --" />
                      <outline text="QUESTION: It&apos;s not specifically to Venezuela, so you have --" />
                      <outline text="MS. PSAKI: It is any country where he may be moving in transit, where he could end up, and certainly any country that were to grant asylum, that could have an impact, of course, on our bilateral relationship." />
                      <outline text="QUESTION: But you haven&apos;t been in touch with Venezuela or with any government official in that regard?" />
                      <outline text="MS. PSAKI: Well, I know we&apos;ve communicated that publicly. I&apos;m not aware of the most recent private calls or private conversations." />
                      <outline text="QUESTION: Because I wanted to know if it&apos;s with the new person, the charge d&apos;affaires, who is coming to Washington. Did you make that specific request to him, or --" />
                      <outline text="MS. PSAKI: I&apos;d have to check on the channel for you and see if that&apos;s something we can share more details on." />
                      <outline text="QUESTION: On that, do you know if there&apos;s been a second meeting between Roberta Jacobson and Venezuelans?" />
                      <outline text="MS. PSAKI: I --" />
                      <outline text="QUESTION: Has the rapprochement gone beyond --" />
                      <outline text="MS. PSAKI: Sure, Matt. I&apos;m not aware. I&apos;d have to check on that for you as well." />
                      <outline text="QUESTION: If I could follow up on the question of the &apos;&apos; Mr. Snowden. There seems to be an indication that the Russian Government has given its blessing to his going to Venezuela. Will there be an effort by the United States and its allies to deny passage to any airplane that will carry him there?" />
                      <outline text="MS. PSAKI: I&apos;m not going to speak to that. Of course, our position here is very clear. I don&apos;t think there&apos;s any secret that we would like to see him returned. We&apos;ve communicated that publicly and privately to any area where he may be stopping in transit, any area where he could possibly end up. So it&apos;s hard for me to see where there would be anybody who&apos;d be confused about where we stand." />
                      <outline text="QUESTION: So you&apos;re just &apos;&apos; so just to put a fine point on it, you will &apos;&apos; you don&apos;t want to characterize the lengths that the United States Government would go to to prevent Mr. Snowden from going to a &apos;&apos; to get asylum in Venezuela or any other country." />
                      <outline text="MS. PSAKI: I&apos;m not going to speculate on that. I&apos;m not going to speculate on that. It&apos;s purely a hypothetical." />
                      <outline text="QUESTION: But you could see though where leaders feel that you&apos;re &apos;&apos; especially in Latin America, when you see what happened with the President of Bolivia&apos;s plane and all the speculation that the U.S. was involved in getting &apos;&apos; being &apos;&apos; forcing it to land and being checked for whether he was on it &apos;&apos; you can see where the leaders of particularly Latin America think you&apos;re taking extraordinary measures." />
                      <outline text="MS. PSAKI: Well, I don&apos;t think any of that, Elise, has been validated or confirmed out there, in terms of the sources of that or the reasons for it, and I would refer you to any of those countries to speak to that. But beyond that, this is an individual who has been accused of three felony charges, who&apos;s been accused of leaking classified information. We&apos;ve been clear we would like to see him returned, and I don&apos;t think it should come as a surprise that if he were granted asylum that would impact our bilateral relationship." />
                      <outline text="QUESTION: So does this issue of Mr. Snowden kind of supersede all other interests that you have with any of these countries?" />
                      <outline text="MS. PSAKI: Certainly not. Certainly not. This is an issue where, again, we&apos;ve been very clear where we stand. But we work with all of these countries on a range of different issues. It&apos;s different from country to country. But the Secretary met with Foreign Minister Lavrov, as you know, just maybe ten days ago, and this was an issue that was discussed briefly. But the thrust of their conversation was on Syria." />
                      <outline text="QUESTION: I think it was less than ten days ago." />
                      <outline text="MS. PSAKI: Was it less than? Maybe it&apos;s just time is taking longer than I thought. So that is a good example. But there are countless examples, country by country, on all the issues we work together on." />
                      <outline text="QUESTION: Does the U.S. condemn explicitly that what happened with the Bolivian President? Because tomorrow is going to be a meeting to this at the OAS to this (inaudible) specifically what happened with the Bolivian President. So what will be the U.S. position on that?" />
                      <outline text="MS. PSAKI: I would just refer you to any of the countries there who were involved &apos;&apos;France, Spain, Italy, Portugal &apos;&apos; for any further comment on that." />
                      <outline text="QUESTION: There&apos;s been a report that Snowden has obtained a second passport. Have you heard about this?" />
                      <outline text="MS. PSAKI: I don&apos;t have anything on that for you. I haven&apos;t actually heard that." />
                      <outline text="QUESTION: Is there concern by the State Department that the question of Snowden here is providing, as Chairman Rogers and Senator Menendez said, a way for the Latin American nations to get back at the United States because of its supposedly mining of information in Latin America?" />
                      <outline text="MS. PSAKI: Again, I think you&apos;d have to speak to any of these individual countries. But we have broad bilateral relationships with a number of these countries. We hope that will continue. We hope to work with them on a range of issues, and our focus here is not targeted at any one country, it&apos;s targeted at having Mr. Snowden return to the United States." />
                      <outline text="QUESTION: Do you deny though that you urged any of those countries to kind of deny airspace to the President of Bolivia&apos;s plane in order to check the plane?" />
                      <outline text="MS. PSAKI: We just haven&apos;t had any specific comment on that, Elise, and we&apos;re referred everybody to the specific countries for more details." />
                      <outline text="QUESTION: Jen, I mean, the Turkish Government has request an explanation for these eavesdropping allegations. Do you have anything to share with us on it?" />
                      <outline text="MS. PSAKI: Just that we&apos;ve been in touch bilaterally with any country that raises an issue. I mentioned that the Secretary has been in touch with Foreign Minister Davutoglu. They speak quite frequently, as you know, about a range of issues &apos;&apos; Egypt, Syria. I&apos;m not aware of whether this has come up or not in any recent conversations; I would refer you to them. But certainly we take up this issue as it&apos;s brought up, we enjoy important relationships on a range of issues, including sharing of information with a number of countries, and we&apos;ll continue those conversations diplomatically." />
                      <outline text="QUESTION: Turkey?" />
                      <outline text="MS. PSAKI: Sure." />
                      <outline text="QUESTION: The protests are going on in Turkey as of this weekend, even today. And my first question is: What is your understanding, current understanding? I know that you have been in contact with the Turkish administration. The second is that a few weeks ago, you said that you had full confidence, I believe, in Turkish authorities to go on with the investigations against &apos;&apos; about police brutality. Do you have any update? Did you receive an update from Turkey at least?" />
                      <outline text="MS. PSAKI: Well, again, we have been following this very closely for a number of weeks. We&apos;ve talked about it quite a bit in here; we continue to. We&apos;ve called on all parties, and I&apos;ll call on them again, to ease tensions and resolve the situation through dialogue, and we urge all sides to exercise restraint and avoid violence. I don&apos;t have any other update. As you mentioned, they&apos;ll be looking into various incidents that have happened over the course of the last several weeks, but I would refer you to the Government of Turkey for any update on that." />
                      <outline text="QUESTION: U.S.-China?" />
                      <outline text="MS. PSAKI: Sure, China. Mm-hmm. Go ahead." />
                      <outline text="QUESTION: Do you have any readout on U.S.-China working group on cybersecurity? I think it&apos;s being held today." />
                      <outline text="MS. PSAKI: It is. You&apos;re right, it is being held today. And let me just take this opportunity to remind everybody that today is the first civilian-military cyber working group meeting. The representative from the United States is &apos;&apos; it is being led, I should say, by State Department Coordinator for Cyber Issues Christopher Painter &apos;&apos; he&apos;s chairing the working group &apos;&apos; and Deputy Assistant Secretary of Defense Eric Rosenbach will be the Defense Department lead. This is a working group that was announced back in April, when the Secretary was in Beijing, and this first meeting we&apos;re hopeful will enable the two sides to share perspectives on international laws and norms in cyberspace, raise concerns as needed, develop processes for future cooperation, and set the tone for future constructive and cooperative bilateral dialogues. I expect there&apos;ll be more of a readout as the meetings conclude later this afternoon." />
                      <outline text="QUESTION: I just want to check on that. When you say that you&apos;re hoping that they&apos;ll be able to come up with or to share perspectives on international laws and norms on cybersecurity and that kind of thing, your position would be that the United States respects all international laws and norms when it comes to cybersecurity and protection of private information, correct?" />
                      <outline text="MS. PSAKI: I do, Matt." />
                      <outline text="QUESTION: You do." />
                      <outline text="MS. PSAKI: I&apos;m not sure where you&apos;re going with this, but I&apos;m interested to see." />
                      <outline text="QUESTION: I just want to see how much you can &apos;&apos; I --" />
                      <outline text="MS. PSAKI: I think we&apos;ve been very clear in expressing our concern." />
                      <outline text="QUESTION: So you believe that any --" />
                      <outline text="MS. PSAKI: China has expressed their own concerns." />
                      <outline text="MS. PSAKI: You believe that any U.S. Government programs that deal with cyber &apos;&apos; computers, cyber information &apos;&apos; comply with existing international laws and regulations and they fit the norm, the international norms. Is that correct?" />
                      <outline text="MS. PSAKI: Yes, Matt." />
                      <outline text="QUESTION: Okay. Everything the U.S. Government has done with respect to computers and cybersecurity is legal under international law? You would say the Administration believes that?" />
                      <outline text="MS. PSAKI: Matt, do you have any specific program questions or specific --" />
                      <outline text="MS. PSAKI: That&apos;s &apos;&apos; yes. Well, no, I just wanted to know that the Administration&apos;s position is that it has respected all relevant international laws and norms when it comes to computer security and cybersecurity." />
                      <outline text="MS. PSAKI: Well, Matt, I think we&apos;ve differentiated &apos;&apos; this is a relevant point here, as you look at me &apos;&apos; we&apos;ve differentiated here between our concerns we&apos;ve had about steps taken by China as it relates to economic data, data threatening infrastructure. That&apos;s a concern I&apos;m certain will be raised during these meetings, and that&apos;s the purpose of the cyber working group." />
                      <outline text="QUESTION: Okay. But you, the Administration, does not believe that it has violated laws or &apos;&apos; international laws or norms as it relates to cybersecurity with this data mining that&apos;s been going on?" />
                      <outline text="MS. PSAKI: I&apos;m not going to speak to all of our different programs, Matt, but I&apos;m not aware of any violation." />
                      <outline text="QUESTION: The Administration is not &apos;&apos; your position is that the Administration is not breaking any international laws when it comes to computer security. Is that correct?" />
                      <outline text="MS. PSAKI: Correct." />
                      <outline text="QUESTION: All right." />
                      <outline text="QUESTION: I have --" />
                      <outline text="QUESTION: From the --" />
                      <outline text="QUESTION: -- U.S.-China?" />
                      <outline text="MS. PSAKI: Okay. Go ahead. One more on U.S.-China." />
                      <outline text="QUESTION: Could you characterize that meeting more? Are you going to figure out some rules or, I mean, just exchange view &apos;&apos; both viewpoint of the cyber issue? Or --" />
                      <outline text="MS. PSAKI: Well, again, as I mentioned at the end there, there&apos;s going to be more of a readout. I know we&apos;re going to be doing a backgrounder later this afternoon on the S&amp;ED meetings, and I expect a readout of the working group meetings today will be a part of that, and they can give you more of an overview and understanding of what was discussed and where they landed." />
                      <outline text="QUESTION: Is that just a one day, today? The working group just meets for one day, or are they meeting for over --" />
                      <outline text="MS. PSAKI: I believe it&apos;s today, focused on today. Of course, this is an issue that &apos;&apos; which will be continued to be discussed." />
                      <outline text="QUESTION: But how about tomorrow? Tomorrow, I think you have also the security dialogue between U.S. and China. Cyber issue going to be a topic?" />
                      <outline text="MS. PSAKI: It is one of the issues I&apos;m certain will be in docket of issues discussed." />
                      <outline text="QUESTION: Jen, can I just ask, obviously, understandably, the Secretary is with his wife at the moment. Has any determination been made yet who will lead the main U.S.-China Strategic Dialogue if he&apos;s unable to be in Washington?" />
                      <outline text="MS. PSAKI: Well, we&apos;re making determinations as it relates to his schedule kind of day by day here. We haven&apos;t made any determinations that have changed his schedule yet for later this week. If we do, we will, of course, communicate that with all of you as well as what would happen in his place. But that&apos;s ahead of where we are currently." />
                      <outline text="QUESTION: Okay. Thank you." />
                      <outline text="QUESTION: Can we change topics?" />
                      <outline text="QUESTION: Just on more on China." />
                      <outline text="QUESTION: Go onto Syria?" />
                      <outline text="MS. PSAKI: Oh, one more on China. Go ahead." />
                      <outline text="QUESTION: Yes. Is that correct, Snowden&apos;s allegation on the U.S. hacks on Chinese computer is going to complicate your cyber dialogue with China?" />
                      <outline text="MS. PSAKI: Well, again, I&apos;m not going to validate the range of accusations being made by Mr. Snowden. I will say that, of course, this is an open conversation and the U.S. will raise our own concerns, and certainly I would send you to the Chinese for them to talk about what their concerns may be." />
                      <outline text="QUESTION: Can we go to Syria?" />
                      <outline text="MS. PSAKI: Sure." />
                      <outline text="QUESTION: Do you have any comment on the election of Mr. Jarba to head of the National Coalition?" />
                      <outline text="MS. PSAKI: I do." />
                      <outline text="QUESTION: Syrian National Coalition?" />
                      <outline text="MS. PSAKI: And I believe we put something out yesterday too, but let me reiterate that here." />
                      <outline text="QUESTION: That&apos;s just &apos;&apos; you&apos;re just going to repeat what you said yesterday?" />
                      <outline text="MS. PSAKI: Well, I&apos;m sure we&apos;ll have a dialogue here with questions, but I may start there. We welcome the July 6th election of Syrian Coalition President Jarba and look forward to working with him and with his team. We hope to make progress together to prevent the total collapse of Syria into chaos, and the rebuilding &apos;&apos; push to rebuild the social fabric, and we look to him and the new leaders to reach out to all Syrian communities and bring greater unity of purpose and further organization to the coalition as the legitimate representatives of the Syrian people." />
                      <outline text="QUESTION: Are you aware of Mr. Jarba&apos;s reputation as an obstinate and a hardliner, who is not even liked by other members of the opposition?" />
                      <outline text="MS. PSAKI: Well, again, he is somebody who has been elected by the opposition. We&apos;re going to be working with him and we&apos;re eager to do that." />
                      <outline text="QUESTION: And do you believe --" />
                      <outline text="QUESTION: Do you have a comment on the resignation of the Prime Minister, though, Ghassan Hitto, which came almost directly afterwards?" />
                      <outline text="MS. PSAKI: I don&apos;t have anything specific for you on that. I know I saw the reports as well. Obviously there&apos;s been a transition in the leadership, or they&apos;re going through a transition in the leadership, I should say, of the opposition. So --" />
                      <outline text="QUESTION: Is this going to hinder the efforts, America&apos;s efforts to work with the opposition towards a cohesive body which can then go into some kind of negotiation in Geneva?" />
                      <outline text="MS. PSAKI: I don&apos;t &apos;&apos; we don&apos;t expect that it will. Obviously, the election of the coalition president was an important step forward. Obviously, there&apos;s more that needs to do &apos;&apos; they need to do, but we felt that was an important step and is a positive sign." />
                      <outline text="QUESTION: You made a very strong statement --" />
                      <outline text="QUESTION: So you said you&apos;re going to work with them to help &apos;&apos; or to prevent the collapse of Syria into total chaos? Exactly where do you think Syria is now? Is it &apos;&apos; it&apos;s not total chaos? You think it&apos;s &apos;&apos; it could go that way?" />
                      <outline text="MS. PSAKI: Well, Matt, we&apos;ve been very clear about our concerns about what&apos;s happening on the ground in Syria." />
                      <outline text="QUESTION: You would not describe --" />
                      <outline text="MS. PSAKI: We&apos;re hopeful that they will --" />
                      <outline text="QUESTION: -- it as total chaos now? It&apos;s still --" />
                      <outline text="MS. PSAKI: We are hopeful that the new coalition president and the rest of the leadership will be partners working with us in moving towards a transition." />
                      <outline text="QUESTION: Sorry, Jen, but I just want &apos;&apos; are you aware of his statement against any negotiation with the regime? Mr. Jarba?" />
                      <outline text="MS. PSAKI: We have seen that statement, of course, and our objective, as you know, is, of course, to move towards a political solution and a political transition in resolving this crisis. We&apos;ve talked a bit in here about the number of factors that will go into bringing all sides to the table. And since the ground game is, of course, among &apos;&apos; the ground situation, I should say, is among the factors that will guide the opposition&apos;s participation in the Geneva conference, which they are a key participant, we will continue to consult closely with them and with others in determining the best time to have the conference. So yes, of course, we&apos;ve seen the comments and we&apos;re going to continue to discuss and work with them." />
                      <outline text="QUESTION: I have a new topic." />
                      <outline text="MS. PSAKI: Okay." />
                      <outline text="QUESTION: On Syria?" />
                      <outline text="QUESTION: Sure." />
                      <outline text="MS. PSAKI: Okay." />
                      <outline text="QUESTION: Also, similarly, I wondered if you&apos;d seen the reports that the Baath parties had some kind of reorganization and ousted Farouk al-Sharaa from the Baath Party leadership, although he&apos;s staying as vice president. He seems to be one of the few, if not the only person within the Baath party that had been calling for some kind of political resolution to the conflict. Again, the same question, I guess: Is this going to hinder your attempts to build some kind of reconciliation between the two sides?" />
                      <outline text="MS. PSAKI: Well, we have, of course, seen the reports of the cabinet reshuffle in the Baath -- ruling Baath Party. We &apos;&apos; as we&apos;ve said many times before, we don&apos;t recognize the legitimacy of Assad, the legitimacy of his regime. We continue to ask him to step aside, but we know that we need to find a way to work with all parties to get back to the table." />
                      <outline text="So I wouldn&apos;t draw a connection between the reshuffle and our ability to do that. There are a number of factors, including the ability of the opposition to feel comfortable coming to the table, coming to Geneva, the ground situation determining what participants are the most productive, and as well as the agenda that will actually move things forward." />
                      <outline text="QUESTION: But I guess if he was one of the lone voices who was talking about a political reconciliation or a political solution to the conflict, and he&apos;s now out of the picture, that means that you&apos;re going to have a more hardline, if it&apos;s possible, leadership to deal with in Damascus." />
                      <outline text="MS. PSAKI: Well, again, we&apos;re not quite at that point yet because we&apos;re still determining when we could have a conference, how we can bring both sides together. Obviously, the Russians are our partner in this. And we will see where this goes and how it impacts things in the days and weeks ahead." />
                      <outline text="QUESTION: On Syria." />
                      <outline text="MS. PSAKI: Mm-hmm." />
                      <outline text="QUESTION: Just two questions." />
                      <outline text="MS. PSAKI: Mm-hmm." />
                      <outline text="QUESTION: There are recent claims again around Homs --" />
                      <outline text="MS. PSAKI: Mm-hmm." />
                      <outline text="QUESTION: -- that there are new chemical weapon attacks. Would you be able to confirm that?" />
                      <outline text="MS. PSAKI: I can&apos;t confirm it. We have, of course, seen news reports and ground updates from opposition context &apos;&apos; contacts detailing the possible use of chemical weapons. We are still seeking more information and unfortunately don&apos;t have any independent confirmation at this time." />
                      <outline text="QUESTION: So it has been about six weeks now that the U.S. Government officially declared that the redline has been crossed." />
                      <outline text="MS. PSAKI: Mm-hmm." />
                      <outline text="QUESTION: And then the President Obama long time ago said that that would be the game-changer. Where is that game-changer step that the U.S. Government is supposed to take?" />
                      <outline text="MS. PSAKI: Well, I think if you remember at the time, just a couple of weeks ago, we did make an announcement that we had changed the scale and scope of our aid &apos;&apos; I still am not in a position to detail exactly what that means &apos;&apos; and that the Administration, high levels of the Administration, which includes, of course, the President and the Secretary of State, the national security team, all are considering additional options, all options aside from boots on the ground. So both of those steps have been in play, including expanding the scale and scope and continuing to consider additional options." />
                      <outline text="QUESTION: So Syrians &apos;&apos; you can assure the Syrians that the game-changing step is on its way? It&apos;s coming?" />
                      <outline text="MS. PSAKI: Well, I think we&apos;ve made steps to provide additional kinds of aid. I don&apos;t have any further detail on that for you." />
                      <outline text="QUESTION: So you are saying that you already took the game-changing step? I cannot figure out --" />
                      <outline text="MS. PSAKI: We announced that at the time. I don&apos;t have any new update for you on any new decisions that have been made." />
                      <outline text="QUESTION: So you&apos;ve announced, but you did not take the step?" />
                      <outline text="MS. PSAKI: I don&apos;t have any new additional updates on the timing or status." />
                      <outline text="QUESTION: But my question is --" />
                      <outline text="MS. PSAKI: Mm-hmm." />
                      <outline text="QUESTION: You announced but you did not take the step? I&apos;m trying to understand." />
                      <outline text="MS. PSAKI: Again, I don&apos;t have any new update for you on the status. I still am not in a position to discuss specifics on that front." />
                      <outline text="QUESTION: Can I change topic, Guyana? It&apos;s been reported that a U.S. Embassy official has been removed for allegedly being involved in a sex-for-visa scandal. Does the State Department have a comment on that?" />
                      <outline text="MS. PSAKI: I think I do have something. Just give me a moment here. Well, we are aware of the allegations of improprieties relating to a consular officer formerly assigned to Georgetown, Guyana. This Department takes all allegations of misconduct by employees seriously. We are reviewing the matter thoroughly. If the allegations are substantiated, we will work with the relevant authorities to hold anyone involved accountable." />
                      <outline text="QUESTION: So is he &apos;&apos; he&apos;s back here in Washington now?" />
                      <outline text="MS. PSAKI: I don&apos;t have an update on their location." />
                      <outline text="Elise." />
                      <outline text="QUESTION: The report also says that this gentleman is currently been suspended, or has been relieved of his actual duties while this matter has been investigated." />
                      <outline text="MS. PSAKI: I don&apos;t have any further update on it for all of you. I&apos;m happy to check on that and see if there&apos;s anything else --" />
                      <outline text="QUESTION: Yeah." />
                      <outline text="MS. PSAKI: -- that I&apos;m able to provide." />
                      <outline text="QUESTION: &apos;&apos;Recently withdrawn from normal duties pending completion of an official investigation.&apos;&apos;" />
                      <outline text="MS. PSAKI: Okay. I&apos;m happy to check on that." />
                      <outline text="Catherine." />
                      <outline text="QUESTION: New topic?" />
                      <outline text="MS. PSAKI: Sure." />
                      <outline text="QUESTION: Pakistan. They compiled a report and did a report, some 300 page report, the Abbottabad Commission about the OBL raid and the aftermath and how he could have been in the country for so long. Was the report shared with the United States at any point? Or do you have a comment on it? It also called the unilateral military action an act of war." />
                      <outline text="MS. PSAKI: I&apos;d have to check on that for you. I&apos;ve seen, of course, the reports, but I just don&apos;t have anything new or any further comment on it." />
                      <outline text="Arshad." />
                      <outline text="QUESTION: A small one on Singapore. Back in May, the Singaporean authorities announced plans for new regulation of Internet --" />
                      <outline text="MS. PSAKI: Mm-hmm." />
                      <outline text="QUESTION: -- news websites. Today, a group of U.S.-based internet companies &apos;&apos; Facebook, eBay, Yahoo, and Google &apos;&apos; essentially criticized that decision. Does the U.S. Government have any position on those regulations, and in particular on the one that I believe would require websites to take down any story &apos;&apos; news story which the Singaporean Government deemed to be unacceptable within 24 hours?" />
                      <outline text="MS. PSAKI: Mm-hmm. Well, we are deeply concerned by the new restrictive Singaporean policy requiring the licensing of news websites. We raise Internet freedom regularly in bilateral and multilateral dialogues with foreign governments, including Singapore. We urge Singapore to ensure that freedom of expression is protected in accordance with its international obligations and commitments. We closely monitor and often speak out, as you all know, on both Internet freedom and media freedom throughout the world. This case is no different, and we are concerned, of course, to see Singapore applying press restrictions to the online world." />
                      <outline text="QUESTION: So can you assure us that the reason that you push for Internet freedom and that kind of thing in all these countries around the world isn&apos;t to make it easier for this government to listen in and bug people?" />
                      <outline text="MS. PSAKI: I just &apos;&apos; I want to make sure --" />
                      <outline text="QUESTION: No?" />
                      <outline text="MS. PSAKI: -- that the AP and Reuters stories are available to all the people of Singapore." />
                      <outline text="QUESTION: Thank you. I&apos;ve got a small one on Cambodia." />
                      <outline text="MS. PSAKI: Mm-hmm." />
                      <outline text="QUESTION: Opposition leader Sam Rainsy says he&apos;s going to go back. Do you have anything &apos;&apos; facing arrest, I think, if he does?" />
                      <outline text="MS. PSAKI: Yeah, I think I do have something on that. Let me see here. Matt, I know I do. Let me get that to you and anyone else right after the briefing." />
                      <outline text="QUESTION: Thank you." />
                      <outline text="MS. PSAKI: Sure. All right. Last one here, in the red and white shirt in the back." />
                      <outline text="QUESTION: Can I return to Snowden really quickly and ask --" />
                      <outline text="MS. PSAKI: Sure." />
                      <outline text="QUESTION: The Government of Bolivia issued a statement, I believe, saying that the act of governments who forced President Morales&apos; plane down was state terrorism. Do you have any response to that, given that the countries involved were close U.S. allies?" />
                      <outline text="MS. PSAKI: Well, again, I would refer you, and I continue to refer you, to the individual governments here for any further comment on the circumstances of last week." />
                      <outline text="QUESTION: The U.S. has no response?" />
                      <outline text="MS. PSAKI: I don&apos;t have anything more for you on it." />
                      <outline text="QUESTION: Okay. And just to follow up, does &apos;&apos; is there any more information on where the original information or the leak came from that Snowden was on that plane? Does the U.S. have any more idea --" />
                      <outline text="MS. PSAKI: I don&apos;t have anything for you on that, no." />
                      <outline text="Thanks, everyone." />
                      <outline text="QUESTION: Thank you." />
                      <outline text="(The briefing was concluded at 2:30 p.m.)" />
                      <outline text="DPB # 113" />
              </outline>

              <outline text="Kimberly Dvorak - San Diego County Political Buzz Examiner - Government | Examiner.com">
                      <outline text="Link to Article" type="link" url="http://www.examiner.com/county-political-buzz-in-san-diego/kimberly-dvorak" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373388096_SYZN8eXS.html" />
      <outline text="Tue, 09 Jul 2013 16:41" />
                      <outline text="" />
                      <outline text="It&apos;s been nearly three weeks since Michael Hastings was killed in a fiery car accident in West Los Angeles. The award-winning journalist earned his stripes as a wartime reporter and captured fame with his 2010 Rolling Stone..." />
              </outline>

              <outline text="VIDEO-KImberly Dvorak-San Diego 6 - Details of Reporter Hastings&apos; Death Remain Elusive">
                      <outline text="Link to Article" type="link" url="http://www.sandiego6.com/story/details-of-reporter-hastings-death-remain-elusive-20130708" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373387903_ZF7zMWzm.html" />
      <outline text="Tue, 09 Jul 2013 16:38" />
                      <outline text="" />
                      <outline text="By Kimberly Dvorak" />
                      <outline text="Created: Mon, 08 Jul 2013 09:40:00 PST" />
                      <outline text="Updated: Mon, 08 Jul 2013 09:44:36 PST" />
                      <outline text="It&apos;s been nearly three weeks since Michael Hastings was killed in a fiery car accident in West Los Angeles. The award-winning journalist earned his stripes as a wartime reporter and captured fame with his 2010 Rolling Stone story that forced General Stanley McChrystal to resign as commander of the US forces in Afghanistan." />
                      <outline text="According to City News Service Hastings, 33, &apos;&apos;was driving south on Highland Avenue when he apparently lost control of the compact (2013 Mercedes Benz CLK250) near Melrose Avenue and crashed into palm trees in the median about 4:20 a.m. Tuesday (June 18). The car&apos;s engine reportedly ended up about 200 feet away from the impact site.&apos;&apos;" />
                      <outline text="An eyewitness at the scene, Jose, employed at nearby business ALSCO Inc said, the car was travelling very fast and he heard a couple explosions shortly before the car crashed.In fact, the explosion was so intense that it took the LA County assistant corner, Ed Winter, two days to identify the burned-beyond recognition body of Hastings. Officials confirm that an autopsy has been performed, but the cause of death is pending. LAPD media spokesperson Lieutenant Andrew Neiman said, &apos;&apos;it will take several weeks to get the toxicology results.&apos;&apos; By stark contrast, in Italy, &apos;Sopranos&apos; star James Gandolfini&apos;s family received the toxicology report within a few days." />
                      <outline text="Despite the intensity of the single car accident, an LAPD statement determined that there was &apos;&apos;no foul play&apos;&apos; involved." />
                      <outline text="As news of the journalist&apos;s death reached family and work colleagues another story emerged, one that would seemingly contradict the LAPD&apos;s verdict. It quickly surfaced that Hastings reached out to Wikileaks attorney Jennifer Robinson just a few hours before his death claiming the FBI was investigating him." />
                      <outline text="In an atypical response the FBI Los Angeles-based bureau spokeswoman Laura Eimiller emailed media emphatically denying their agency was looking into Mr. Hastings background." />
                      <outline text="Once the back and forth commenced, friends of Hastings posted the last frantic email they would receive from their colleague. It read:" />
                      <outline text="&apos;&apos;Subject: FBI Investigation, re: NSA -Hey (redacted names) &apos;-- the Feds are interviewing my &apos;&apos;close friends and associates.&apos;&apos; Perhaps if the authorities arrive &apos;&apos;BuzzFeed GQ,&apos;&apos; er HQ, may be wise to immediately request legal counsel before any conversations or interviews about our news gathering practices or related journalism issues. Also: I&apos;m onto a big story, and need to go off the rada[r] for a bit." />
                      <outline text="All the best, and hope to see you all soon. Michael&apos;&apos;" />
                      <outline text="After learning about Hastings death, Ben Smith, editor in chief of BuzzFeed.com, released a statement saying the staff was &apos;&apos;shocked and devastated by the news that Michael Hastings is gone. Michael was a great, fearless journalist with an incredible instinct for the story, and a gift for finding ways to make his readers care about anything he covered from wars to politicians.&apos;&apos;" />
                      <outline text="One particular passage in Hastings book, &apos;&apos;The Operators: The Wild and Terrifying Inside Story of America&apos;s War in Afghanistan,&apos;&apos; revealed that a former McChrystal staff member made a death threat. &apos;&apos;We&apos;ll hunt you down and kill you if we don&apos;t like what you write,&apos;&apos; the unnamed staffer said. Hastings coolly retorted: &apos;&apos;Well, I get death threats like that about once a year, so no worries.&apos;&apos;" />
                      <outline text="He later wrote; &apos;&apos;I wasn&apos;t disturbed by the claim. Whenever I&apos;d been reporting around groups of dudes whose job it was to kill people, one of them would usually mention that they were going to kill me.&apos;&apos;" />
                      <outline text="Disturbing details surrounding the actual accident" />
                      <outline text="After reading accounts of the car crash and examining the scene of the accident erroneous details were hard to overlook. Stories discussed the road as narrow, not true, it&apos;s a four-lane road with a large median dividing traffic. Some reports said there was a curve in the road, also not true; in fact it&apos;s straight freeway-to-freeway. Also, there was no damage to the median curb, only fire discoloration. But the most significant missing evidence was the absence of any skid marks&apos;--even though the car made a 60-degree turn into a palm tree." />
                      <outline text="Research of this topic reveals a new angle to this story, namely &apos;--Boston Brakes." />
                      <outline text="This theory was explained by a former Marine Gordon Duff who refers to the &apos;&apos;Boston Brakes&apos;&apos; technique, in which &apos;&apos;drive by wire&apos;&apos; cars, specifically a Mercedes Benz, can be manipulated remotely to simulate an out-of-control accident, according to his Veterans Today story (The 2010 story is a must read). The story details are eerily similar to Hastings fiery accident scene as there were no skid marks." />
                      <outline text="Adding credence to the possible car-hacking scenario is former U.S. National Coordinator for Security, Infrastructure Protection, and Counter-terrorism Richard Clarke. After news broke on the Hastings car accident, he confirmed the &apos;&apos;drive by wire&apos;&apos; concept." />
                      <outline text="Clarke told The Huffington Post that a single-vehicle crash is &apos;&apos;consistent with a car cyber attack. There is reason to believe that intelligence agencies for major powers -- including the United States -- know how to remotely seize control of a car.&apos;&apos;" />
                      <outline text="Specifically, a 2010 research project conducted by the University of California at San Diego and the University of Washington Engineering Departments demonstrated how easy it was to override a vehicle&apos;s computer system and drive it remotely. A request for an on/off camera interview by this reporter was declined." />
                      <outline text="Clarke&apos;s interview with The Huffington Post explains, &apos;&apos;You can do some really highly destructive things now, through hacking a car, and it&apos;s not that hard.&apos;&apos;" />
                      <outline text="Another significant detail pointed out by some members of law enforcement, is the intensity of the fire inside the car. It&apos;s highly unusual since gasoline generally doesn&apos;t burn that hot. Reviewing video footage from the scene, the intensity of the fire resembles a &apos;&apos;thermite&apos;&apos; burn." />
                      <outline text="No matter how you slice this highly suspicious car accident, a Mercedes is not going to explode into flames without assistance. Car aficionados say fires in new cars happen for three main reasons, &apos;&apos;running the engine out of oil, running the engine out of coolant, or a mammoth car mangling accident, that leaves the hot side of the battery to short out against the frame before it reaches the fuse panel.&apos;&apos;" />
                      <outline text="First, thanks to science and mathematics accident scene re-construction analysts should be able to &apos;&apos;somewhat&apos;&apos; calculate things like the dynamic energy of the impact in addition to the gravity force required for separating the engine/transmission from the vehicle." />
                      <outline text="The 2013 Mercedes Hastings drove that fateful night in June is equipped with MBRACE (emergency call system), SOS telephone and the Voice Control System. It is similar to the ONSTAR program, and can directly link the driver to a representative in case of emergencies. The Mercedes manual reads: &apos;&apos;Information about electronic data acquisition in the vehicle (Including notice pursuant to California Code &#167; 9951). If your vehicle is equipped with MBRACE, data is transmitted in the event of an accident.&apos;&apos;" />
                      <outline text="The manual continues: &apos;&apos;The wireless devices of this vehicle comply with Part 15 of the FCC Rules Operation and is subject to the following two conditions: 1) These devices may not cause harmful interference, and 2) These devices must accept any interference received, including interference that may cause undesired operation." />
                      <outline text="Changes or modifications not expressly approved by the party responsible for compliance could void the user&apos;s authority to operate the equipment.&apos;&apos;" />
                      <outline text="In a statement from Mercedes, Olivia C. states; &apos;&apos;At this time, the police are still conducting their investigation into this tragedy. They have not yet asked for our assistance, but we stand ready to assist if and when they do.&apos;&apos;" />
                      <outline text="Despite the LAPD&apos;s categorization of the Hasting fatal accident as a &quot;no (evidence of) foul play&quot; accident, LAPD refuses to release the accident and toxicology reports, or make the Mercedes available for inspection which only fuels speculation." />
                      <outline text="Relevant to the single car accident conclusion by LAPD, it must be noted that Michael Hastings had history that included alcohol and drug abuse, but reports from his family and friends say he kicked the habit." />
                      <outline text="Stay tuned for further news as this reporter&apos;s investigation continues." />
              </outline>

              <outline text="Report: Railway head says train in Canada tampered with - CNN.com">
                      <outline text="Link to Article" type="link" url="http://www.cnn.com/2013/07/09/world/americas/canada-runaway-train/index.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373387550_44CdxHs3.html" />
      <outline text="Tue, 09 Jul 2013 16:32" />
                      <outline text="" />
                      <outline text="Train derails, explodes in Canadian town" />
                      <outline text="Train derails, explodes in Canadian town" />
                      <outline text="Train derails, explodes in Canadian town" />
                      <outline text="Train derails, explodes in Canadian town" />
                      <outline text="Train derails, explodes in Canadian town" />
                      <outline text="Train derails, explodes in Canadian town" />
                      <outline text="Train derails, explodes in Canadian town" />
                      <outline text="Train derails, explodes in Canadian town" />
                      <outline text="Train derails, explodes in Canadian town" />
                      <outline text="Train derails, explodes in Canadian town" />
                      <outline text="Train derails, explodes in Canadian town" />
                      <outline text="Train derails, explodes in Canadian town" />
                      <outline text="Train derails, explodes in Canadian town" />
                      <outline text="Train derails, explodes in Canadian town" />
                      <outline text="Train derails, explodes in Canadian town" />
                      <outline text="Train derails, explodes in Canadian town" />
                      <outline text="Train derails, explodes in Canadian town" />
                      <outline text="Train derails, explodes in Canadian town" />
                      <outline text="Train derails, explodes in Canadian town" />
                      <outline text="STORY HIGHLIGHTS" />
                      <outline text="The railroad CEO says the locomotive was shut down by responders to an earlier fireA Canadian official says there is no sign of sabotage in the Lac-Megantic crashSome residents of the town are allowed to return home, officials sayAt least 13 people are dead and about 37 are unaccounted forLac-Megantic, Quebec (CNN) -- The driverless train that barreled into a small Quebec town and derailed, unleashing a deadly inferno that killed at least 13 people, may have had its brakes inadvertently disabled, the chairman of the company operating the train said Tuesday." />
                      <outline text="Firefighters in the nearby town of Nantes put out a blaze on the train hours before it rolled into Lac-Megantic. Ed Burkhardt, chief executive officer and president of Rail World, the parent company of the Montreal, Maine &amp; Atlantic Railway, told media outlets there&apos;s evidence the engine powering the brakes was shut down at some point." />
                      <outline text="Pressed to elaborate by CTV, Burkhardt wrote in an e-mail exchange, &quot;We are now aware the firefighters shut down the locomotive. By the time (Montreal, Maine &amp; Atlantic) people found out, it was too late.&quot;" />
                      <outline text="In earlier comments to the Montreal Gazette, he said the matter needs further investigation, and his company has begun an internal inquiry." />
                      <outline text="&quot;There are a number of missing pieces here,&quot; Burkhardt told the paper, saying he didn&apos;t suspect &quot;the event was malicious or an act of terrorism.&quot;" />
                      <outline text="The company did not immediately return phone calls from CNN about the report." />
                      <outline text="Asked during a news conference if authorities suspected sabotage, Ed Belkaloul, manager of rail operations for Canada&apos;s Transportation Safety Board&apos;s eastern region, said there was no evidence to that effect." />
                      <outline text="The train began rolling -- unbeknownst to dispatchers and rail traffic controllers -- about an hour after the fire in Nantes was reported. It picked up speed because the track between Nantes and Lac-Megantic lies on a 1.2% downward slope, which Belkaloul said was relatively steep." />
                      <outline text="Seventy-two tanker cars carrying crude oil jumped the track early Saturday, setting off a huge fireball. At least 37 people are missing. Officials in the town 130 miles east of Montreal say some victims were likely vaporized by the intense blaze, which burned for 36 hours after the crash." />
                      <outline text="The fire is under control, authorities said Tuesday morning. Of the roughly 2,000 residents evacuated, about 1,200 will be permitted to return home immediately. Another 800 cannot go back yet, the officials said." />
                      <outline text="Notices were placed on doors instructing residents how to clean and air out their homes. Officials suggested throwing out any food and boiling all water because the city&apos;s water treatment plant is not operational." />
                      <outline text="Firefighters are now using infrared detectors to find any remaining hot spots in the wreckage. They&apos;ve stopped hosing down the area because it was inhibiting the investigation, officials said." />
                      <outline text="Rolling oil bomb?" />
                      <outline text="The train had already been on fire hours before the Saturday accident, Canadian broadcaster CBC reported, sourcing fire officials. Firefighters in the town of Nantes, 7 miles northwest of Lac-Megantic, extinguished a small blaze on the freight train." />
                      <outline text="When they left, the train was still parked where it was supposed to stay for the night, the Montreal, Maine &amp; Atlantic Railway said." />
                      <outline text="But air brakes holding it in place failed, allowing the train to barrel downhill into Lac-Megantic, the company said. It was not clear if Burkhardt was suggesting to CTV that firefighters were responsible for disabling the brakes, but he told Reuters earlier that the brakes were disabled when firefighters shut down the engine powering them." />
                      <outline text="Investigators plan to check the brakes once the crumpled, burned tankers are accessible." />
                      <outline text="The train rolled into town much faster than a train under an engineer&apos;s control would have." />
                      <outline text="&quot;Usually they&apos;re traveling between 5 and 10 miles an hour,&quot; said Quebec police officer Benoit Richard. &quot;On that night, this train was going at least between 30 and 40 miles an hour.&quot;" />
                      <outline text="Sonia Pepin recalls hearing the train like never before. The tracks are a few feet from her home, and her whole house shook, she said." />
                      <outline text="Investigators with the Transportation Safety Board of Canada found the locomotive event recorder, which they can analyze for information on throttle position and speed, among other data." />
                      <outline text="Oil transport safe?" />
                      <outline text="Petroleum products have increasingly been transported via rail in the past five years, according to the railroad industry, and Canada has had multiple issues with derailments in recent months." />
                      <outline text="Last month, four Canadian Pacific rail cars carrying flammable petrochemicals used to dilute oil derailed on a flood-damaged bridge spanning Calgary&apos;s Bow River, according to the Calgary Herald." />
                      <outline text="In another incident involving Canadian Pacific, five tankers containing oil derailed in rural Saskatchewan in May, spilling 575 barrels of crude, the Toronto Sun reported." />
                      <outline text="A month earlier, 22 Canadian Pacific rail cars jumped the tracks near White River, Ontario. Two of the cars leaked about 400 barrels -- almost 17,000 gallons -- of oil, The Globe and Mail in Toronto reported." />
                      <outline text="Canadian Pacific was also involved in a stateside spill in March. Fourteen cars on a mile-long, 94-car train derailed in western Minnesota, about 150 miles northwest of Minneapolis, spilling about 30,000 gallons of crude, Reuters reported." />
                      <outline text="A rail car can carry roughly 700 barrels of oil, with 42 gallons per barrel." />
                      <outline text="Popular Quebec performer missing" />
                      <outline text="The runaway train rumbled toward Lac-Megantic while patrons at the Musi-Cafe were enjoying a summer night of live music. Some were sitting on the pub&apos;s front porch." />
                      <outline text="The Musi-Cafe is no longer standing, one of an estimated 40 buildings leveled in the crash and explosions. Some of its patrons have been counted among the 13 confirmed dead." />
                      <outline text="&quot;We know that there will be many more,&quot; said police Lt. Michel Brunet." />
                      <outline text="Authorities believe some of those still missing were in the pub at the time of the accident. Quebecois musician Guy Bolduc had been performing there." />
                      <outline text="The pub&apos;s Facebook page is filling up with messages of condolence, as has a page created for the victims of the disaster. Bolduc&apos;s fans are searching for him on social media." />
                      <outline text="&quot;All of his fans, all over Quebec, but also his fellow singers (of whom I am one) hope to see him again alive!!! Come on my GuyBol, come out of your hiding place,&quot; one member wrote." />
                      <outline text="A &apos;war zone&apos;" />
                      <outline text="When 1,200 evacuees from the Canadian town return Tuesday, they will find Lac-Megantic gutted for blocks." />
                      <outline text="&quot;Hot zones&quot; lingering more than two days after the train derailment hampered authorities&apos; efforts to search for missing people." />
                      <outline text="Forensic specialists have asked victims&apos; families for hair samples, clothing, anything to help identify their loved ones." />
                      <outline text="In a town of just 6,000 residents, most everyone is affected by the deaths and destruction." />
                      <outline text="Prime Minister Stephen Harper has described the scene as a &quot;war zone.&quot;" />
                      <outline text="Flash flooding traps Toronto train passengers, stalls rush hour traffic" />
                      <outline text="CNN&apos;s Holly Yan, Umaro Djau, Jonathan Mann, Pierre Meilhan and Deanna Hackney contributed to this report." />
              </outline>

              <outline text="Railway air brake - Wikipedia, the free encyclopedia">
                      <outline text="Link to Article" type="link" url="https://en.wikipedia.org/wiki/Railway_air_brake" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373387519_XMBVczVD.html" />
      <outline text="Tue, 09 Jul 2013 16:31" />
                      <outline text="" />
                      <outline text="An air brake is a conveyance braking system actuated by compressed air. Modern trains rely upon a fail-safe air brake system that is based upon a design patented by George Westinghouse on March 5, 1868. The Westinghouse Air Brake Company (WABCO) was subsequently organized to manufacture and sell Westinghouse&apos;s invention. In various forms, it has been nearly universally adopted." />
                      <outline text="The Westinghouse system uses air pressure to charge air reservoirs (tanks) on each car. Full air pressure signals each car to release the brakes. A reduction or loss of air pressure signals each car to apply its brakes, using the compressed air in its reservoirs." />
                      <outline text="Overview[edit]In the air brake&apos;s simplest form, called the straight air system, compressed air pushes on a piston in a cylinder. The piston is connected through mechanical linkage to brake shoes that can rub on the train wheels, using the resulting friction to slow the train. The mechanical linkage can become quite elaborate, as it evenly distributes force from one pressurized air cylinder to 8 or 12 wheels." />
                      <outline text="The pressurized air comes from an air compressor in the locomotive and is sent from car to car by a train line made up of pipes beneath each car and hoses between cars. The principal problem with the straight air braking system is that any separation between hoses and pipes causes loss of air pressure and hence the loss of the force applying the brakes. This could easily cause a runaway train. Straight air brakes are still used on locomotives, although as a dual circuit system, usually with each bogie (truck) having its own circuit." />
                      <outline text="In order to design a system without the shortcomings of the straight air system, Westinghouse invented a system wherein each piece of railroad rolling stock was equipped with an air reservoir and a triple valve, also known as a control valve." />
                      <outline text="The triple valve is described as being so named as it performs three functions: Charging air into an air tank ready to be used, applying the brakes, and releasing them. In so doing, it supports certain other actions (i.e. it &apos;holds&apos; or maintains the application and it permits the exhaust of brake cylinder pressure and the recharging of the reservoir during the release). In his patent application, Westinghouse refers to his &apos;triple-valve device&apos; because of the three component valvular parts comprising it: the diaphragm-operated poppet valve feeding reservoir air to the brake cylinder, the reservoir charging valve, and the brake cylinder release valve. When he soon improved the device by removing the poppet valve action, these three components became the piston valve, the slide valve, and the graduating valve." />
                      <outline text="If the pressure in the train line is lower than that of the reservoir, the brake cylinder exhaust portal is closed and air from the car&apos;s reservoir is fed into the brake cylinder to apply the brakes. This action continues until equilibrium between the brake pipe pressure and reservoir pressure is achieved. At that point, the airflow from the reservoir to the brake cylinder is lapped off and the cylinder is maintained at a constant pressure.If the pressure in the train line is higher than that of the reservoir, the triple valve connects the train line to the reservoir feed, causing the air pressure in the reservoir to increase. The triple valve also causes the brake cylinder to be exhausted to the atmosphere, releasing the brakes.As the pressure in the train line and that of the reservoir equalize, the triple valve closes, causing the air pressure in the reservoir and brake cylinder to be maintained at the current level.Unlike the straight air system, the Westinghouse system uses a reduction in air pressure in the train line to apply the brakes. When the engine driver applies the brake by operating the locomotive brake valve, the train line vents to atmosphere at a controlled rate, reducing the train line pressure and in turn triggering the triple valve on each car to feed air into its brake cylinder. When the engine driver releases the brake, the locomotive brake valve portal to atmosphere is closed, allowing the train line to be recharged by the compressor of the locomotive. The subsequent increase of train line pressure causes the triple valves on each car to discharge the contents of the brake cylinder to the atmosphere, releasing the brakes and recharging the reservoirs." />
                      <outline text="Under the Westinghouse system, therefore, brakes are applied by reducing train line pressure and released by increasing train line pressure. The Westinghouse system is thus fail safe&apos;--any failure in the train line, including a separation (&quot;break-in-two&quot;) of the train, will cause a loss of train line pressure, causing the brakes to be applied and bringing the train to a stop, thus preventing a runaway train." />
                      <outline text="Modern air brake systems serve two functions:" />
                      <outline text="The service brake system, which applies and releases the brakes during normal operations, andThe emergency brake system, which applies the brakes rapidly in the event of a brake pipe failure or an emergency application by the engine driver (generally referred to as the automatic brake).When the train brakes are applied during normal operations, the engine driver makes a &quot;service application&quot; or a &quot;service rate reduction&apos;&apos;, which means that the train line pressure reduces at a controlled rate. It takes several seconds for the train line pressure to reduce and consequently takes several seconds for the brakes to apply throughout the train. In the event the train needs to make an emergency stop, the engine driver can make an &quot;emergency application,&quot; which immediately and rapidly vents all of the train line pressure to atmosphere, resulting in a rapid application of the train&apos;s brakes. An emergency application also results when the train line comes apart or otherwise fails, as all air will also be immediately vented to atmosphere." />
                      <outline text="In addition, an emergency application brings in an additional component of each car&apos;s air brake system: the emergency portion. The triple valve is divided into two portions: the service portion, which contains the mechanism used during brake applications made during service reductions, and the emergency portion, which senses the immediate, rapid release of train line pressure. In addition, each car&apos;s air brake reservoir is divided into two portions&apos;--the service portion and the emergency portion&apos;--and is known as the &quot;dual-compartment reservoir&apos;&apos;. Normal service applications transfer air pressure from the service portion to the brake cylinder, while emergency applications cause the triple valve to direct all air in both the service portion and the emergency portion of the dual-compartment reservoir to the brake cylinder, resulting in a 20&apos;&apos;30% stronger application." />
                      <outline text="The emergency portion of each triple valve is activated by the extremely rapid rate of reduction of train line pressure. Due to the length of trains and the small diameter of the train line, the rate of reduction is high near the front of the train (in the case of an engine driver-initiated emergency application) or near the break in the train line (in the case of the train line coming apart). Farther away from the source of the emergency application, the rate of reduction can be reduced to the point where triple valves will not detect the application as an emergency reduction. To prevent this, each triple valve&apos;s emergency portion contains an auxiliary vent port, which, when activated by an emergency application, also locally vents the train line&apos;s pressure directly to atmosphere. This serves to propagate the emergency application rapidly along the entire length of the train." />
                      <outline text="Use of distributed power (i.e., remotely controlled locomotive units midtrain and/or at the rear end) mitigates somewhat the time-lag problem with long trains, because a telemetered radio signal from the engine driver in the front locomotive commands the distant units to initiate brake pressure reductions that propagate quickly through nearby cars." />
                      <outline text="Enhancements[edit]Electro-pneumatic or EP brakes are a type of air brake that allows for immediate application of brakes throughout the train instead of the sequential application. EP brakes have been in use in German high-speed trains (most notably the ICE) since the late 1980s, and in British practice since 1949, fully described in Electro-pneumatic brake system on British railway trains. Electro-pneumatic brakes are currently in testing in North America and South Africa in captive service ore and coal trains." />
                      <outline text="Passenger trains have had for a long time a 3-wire version of the electro-pneumatic brake, which gives seven levels of braking force. In most cases the system is not fail-safe, with the wires being energized in sequence to apply the brakes, but the conventional automatic air brake is also provided to act as a fail safe, and in most cases can be used independently in the event of a failure of the EP brakes." />
                      <outline text="In North America, WABCO supplied HSC (High Speed Control) brake equipment for several post-World War II streamlined passenger trains. This was an electrically controlled overlay on conventional D-22 passenger and 24-RL locomotive brake equipment. On the conventional side, the control valve set a reference pressure in a volume, which set brake cylinder pressure via a relay valve. On the electric side, pressure from a second straight-air trainline controlled the relay valve via a two-way check valve. This &quot;straight air&quot; trainline was charged (from reservoirs on each car) and released by magnet valves on each car, controlled electrically by a 3 wire trainline, in turn controlled by an &quot;electro-pneumatic master controller&quot; in the controlling locomotive. This controller compared the pressure in the straight air trainline with that supplied by a self lapping portion of the engineers valve, signaling all of the &quot;apply&quot; or &quot;release&quot; magnets valves in the train to open simultaneously, changing the pressure in the &quot;straight air&quot; trainline much more rapidly and evenly than possible by simply supplying air directly from the locomotive. The relay valve was equipped with four diaphragms, magnet valves, electric control equipment, and an axle-mounted speed sensor, so that at speeds over 60 mph full braking force was applied, and reduced in steps at 60, 40 and 20 mph, bringing the train to a gentle stop. Each axle was also equipped with anti-lock brake equipment. The combination minimized braking distances, allowing more full-speed running between stops. The &quot;straight air&quot; (electro-pneumatic trainline), anti-lock, and speed graduating portions of the system were not dependent on each other in any way, and any or all of these options could be supplied separately.[2]" />
                      <outline text="Later systems replace the automatic air brake with an electrical wire (in the UK, at least, known as a &quot;round the train wire&quot;) that has to be kept energized to keep the brakes off." />
                      <outline text="More recent innovations are electronically controlled pneumatic brakes where the brakes of all the wagons (cars) and locomotives are connected by a kind of local area network, which allows individual control of the brakes on each wagon, and the reporting back of performance of each wagon&apos;s brakes." />
                      <outline text="Limitations[edit]The Westinghouse air brake system is very trustworthy, but not infallible. Recall that the car reservoirs recharge only when the brake pipe pressure is higher than the reservoir pressure, and that the car reservoir pressure will rise only to the point of equilibrium. Fully recharging the reservoirs on a long train can require considerable time (8 to 10 minutes in some cases[3]), during which the brake pipe pressure will be lower than locomotive reservoir pressure." />
                      <outline text="If the brakes must be applied before recharging has been completed, a larger brake pipe reduction will be required in order to achieve the desired amount of braking effort, as the system is starting out at a lower point of equilibrium (lower overall pressure). If many brake pipe reductions are made in short succession (&quot;fanning the brake&quot; in railroad slang), a point may be reached where car reservoir pressure will be severely depleted, resulting in substantially reduced brake cylinder piston force, causing the brakes to fail. On a descending grade, the unfortunate result will be a runaway." />
                      <outline text="In the event of a loss of braking due to reservoir depletion, the engine driver may be able to regain control with an emergency brake application, as the emergency portion of each car&apos;s dual-compartment reservoir should be fully charged&apos;--it is not affected by normal service reductions. The triple valves detect an emergency reduction based on the rate of brake pipe pressure reduction. Therefore, as long as a sufficient volume of air can be rapidly vented from the brake pipe, each car&apos;s triple valve will cause an emergency brake application. However, if the brake pipe pressure is too low due to an excessive number of brake applications, an emergency application will not produce a large enough volume of air flow to trip the triple valves, leaving the engine driver with no means to stop the train." />
                      <outline text="To prevent a runaway due to loss of brake pressure, dynamic (rheostatic) braking can be utilized so the locomotive(s) will assist in retarding the train. Often, blended braking, the simultaneous application of dynamic and train brakes, will be used to maintain a safe speed and keep the slack bunched on descending grades. Care would then be given when releasing the service and dynamic brakes to prevent draw gear damage caused by a sudden run out of the trains slack." />
                      <outline text="Another solution to loss of brake pressure is the two-pipe system, fitted on most modern passenger stock and many freight wagons. In addition to the traditional brake pipe, this enhancement adds the main reservoir pipe, which is continuously charged with air directly from the locomotive&apos;s main reservoir. The main reservoir is where the locomotive&apos;s air compressor output is stored, and is ultimately the source of compressed air for all systems that use it." />
                      <outline text="Since the main reservoir pipe is kept constantly pressurized by the locomotive, the car reservoirs can be charged independently of the brake pipe, this being accomplished via a check valve to prevent backfeeding into the pipe. This arrangement helps to reduce the above described pressure loss problems, and also reduces the time required for the brakes to release, since the brake pipe only has to recharge itself." />
                      <outline text="Main reservoir pipe pressure can also be used to supply air for auxiliary systems such as pneumatic door operators or air suspension. Nearly all passenger trains (all in the UK and USA), and many freights, now have the two-pipe system." />
                      <outline text="Accidents[edit]The air brake can fail if one of the cocks where the pipes of each carriage are joined together is accidentally closed. In this case, the brakes on the wagons behind the closed cock will fail to respond to the driver&apos;s command. This happened in 1953 to the Federal Express, a Pennsylvania Railroad train pulling into Washington DC&apos;s Union Station, causing the train to crash into the passenger concourse and fall through the floor. Similarly, in the Gare de Lyon train accident a valve was accidentally closed by the crew, reducing braking power." />
                      <outline text="There are a number of safeguards that are usually taken to prevent this sort of accident happening. Railroads have strict government-approved procedures for testing the air brake systems when making up trains in a yard or picking up cars en route. These generally involve connecting the air brake hoses, charging up the brake system, setting the brakes and manually inspecting the cars to ensure the brakes are applied, and then releasing the brakes and manually inspecting the cars to ensure the brakes are released. Particular attention is usually paid to the rearmost car of the train, either by manual inspection or via an automated end-of-train device, to ensure that brake pipe continuity exists throughout the entire train. When brake pipe continuity exists throughout the train, failure of the brakes to apply or release on one or more cars is an indication that the cars&apos; triple valves are malfunctioning. Depending on the location of the air test, the repair facilities available, and regulations governing the number of inoperative brakes permitted in a train, the car may be set out for repair or taken to the next terminal where it can be repaired." />
                      <outline text="Standardisation[edit]The modern air brake is not identical with the original airbrake as there have been slight changes in the design of the triple valve, which are not completely compatible between versions, and which must therefore be introduced in phases. That said, the basic air brakes used on railways worldwide are remarkably compatible." />
                      <outline text="Vacuum brakes[edit]The main competitor to the air brake is the vacuum brake, which operates on negative pressure. The vacuum brake is a little simpler than the air brake, with an ejector with no moving parts on steam engines or a mechanical or electrical &quot;exhauster&quot; on a diesel or electric locomotive replacing the air compressor. Disconnection taps at the ends of cars are not required as the loose hoses are sucked onto a mounting block." />
                      <outline text="However, the maximum pressure is limited to atmospheric pressure, so that all the equipment has to be much larger and heavier to compensate. This disadvantage is made worse at high altitude. The vacuum brake is also considerably slower acting in both applying and releasing the brake; this requires a greater level of skill and anticipation from the driver. Conversely, the vacuum brake had the advantage of gradual release long before the Westinghouse automatic air brake, which was originally only available in the direct-release form still common in freight service. A primary fault of vacuum brakes is the inability to easily find leaks. In a positive air system, a leak is quickly found due to the escaping pressurized air; discovering a vacuum leak is more difficult, although it is easier to repair when found because a piece of rubber (for example) can just be tied around the leak and will be firmly held there by the vacuum." />
                      <outline text="Electro-vacuum brakes have also been used with considerable success on South African electric multiple unit trains. Despite requiring larger and heavier equipment as stated above, the performance of the electro-vacuum brake approached that of contemporary electro-pneumatic brakes. However, their use has not been repeated." />
                      <outline text="See also[edit]References[edit]&#094;&quot;Welcome to Saskrailmuseum.org&quot;. Contact Us. September 11, 2008. Retrieved 2008-10-03. &#094;Westinghouse 24RL air brake manual&#094;EMD Enginemen&apos;s Operating ManualAAR wheel dynamometer - braking: [1]Compressed Air Operations manual, ISBN 0-07-147526-5, McGraw Hill Book CompanyExternal links[edit]Information" />
                      <outline text="Patents" />
                      <outline text="US 16220  Carson Samuel: Air engine 1856-12-09US 88929  Westinghouse George: Steam power brake 1869-04-13" />
              </outline>

              <outline text="Michael Hastings&apos; wife vows to &apos;&apos;take down whoever did this&apos;&apos; | Hang The Bankers | He Who Controls the Money Supply, Controls the World">
                      <outline text="Link to Article" type="link" url="http://www.hangthebankers.com/michael-hastings-wife-vows-to-take-down-whoever-did-this/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373386449_vYhuqUmn.html" />
      <outline text="Tue, 09 Jul 2013 16:14" />
                      <outline text="" />
                      <outline text="The wife of Rolling Stone journalist Michael Hastings, who was killed in what many people believe was a suspicious car crash last week, has vowed to &apos;&apos;take down whoever did this,&apos;&apos; according to the man who released an email in which Hastings told friends he was being harassed by the government." />
                      <outline text="Staff Sergeant Joseph Biggs, who yesterday told Fox News that Hastings was working on &apos;&apos;the biggest story yet&apos;&apos; about the CIA before his untimely death, was responsible for releasing an email Hastings wrote 15 hours before his car crash in which the journalist stated he was &apos;&apos;onto a big story&apos;&apos; and needed &apos;&apos;to go off the rada[r] for a bit.&apos;&apos;" />
                      <outline text="Biggs tweeted that the reason he released the email was because Hastings&apos; other friends and colleagues who received it were &apos;&apos;too scared&apos;&apos; to do so." />
                      <outline text="After the email was released, Hastings&apos; wife Elise Jordan thanked Biggs and vowed to &apos;&apos;take down whoever did this,&apos;&apos; according to Biggs." />
                      <outline text="Biggs, who met Hastings when he was an embedded journalist in Afghanistan in 2008, added, &apos;&apos;I won&apos;t let a man die in vein [sic] because I&apos;m too scared of what will happen to me. If I sent that email to Mike he wouldn&apos;t rest, he would fight.&apos;&apos;" />
                      <outline text="In his interview with Fox News yesterday, Biggs also said that Hastings &apos;&apos;drove like a grandma&apos;&apos; and that it was totally out of character for him to be speeding in the early hours of the morning." />
                      <outline text="Earlier this week, former counter-terror czar under two different presidents Richard Clarke told the Huffington Post that the fatal crash of Hastings&apos; Mercedes C250 Coupe was &apos;&apos;consistent with a car cyber attack.&apos;&apos;" />
                      <outline text="Hastings had made numerous powerful enemies as a result of his exposure of Gen. Stanley A. McChrystal in 2010, receiving several death threats in the process." />
                      <outline text="According to Hastings&apos; colleague Cenk Uygur, the writer was, &apos;&apos;incredibly tense and very worried, and was concerned that the government was looking in on his material,&apos;&apos; and also a &apos;&apos;nervous wreck&apos;&apos; in response to the surveillance of journalists revealed by the AP phone tapping scandal and the NSA PRISM scandal." />
                      <outline text="BuzzFeed editor Ben Smith added that Hastings had told friends and family &apos;&apos;he was concerned that he was under investigation.&apos;&apos;" />
                      <outline text="Another close friend who wishes to remain anonymous said that Hastings was &apos;&apos;very paranoid that he was being watched by the FBI.&apos;&apos;" />
                      <outline text="SEE ALSO:- Evidence indicates journalist Michael Hastings was assassinated- Richard Clarke: Hastings accident &apos;&apos;consistent with a car cyber attack&apos;&apos;- Another whistleblower dead: journalist Michael Hastings" />
                      <outline text="Source: http://www.infowars.com/michael-hastings-wife-vows-to-take-down-whoever-did-this/" />
              </outline>

              <outline text="ELise Jordan transcribed McChrystal tapes personally Michael Hastings&apos; Wife Obliterates New York Times For Dismissive Obituary">
                      <outline text="Link to Article" type="link" url="http://www.huffingtonpost.com/2013/06/19/michael-hastings-wife_n_3469095.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373386317_6sN5wTr9.html" />
      <outline text="Tue, 09 Jul 2013 16:11" />
                      <outline text="" />
                      <outline text="In the 24 hours since the tragic death of journalist and author Michael Hastings was first reported on Tuesday, those who knew him, worked with him, and covered his work have offered numerous remembrances of the man best known for his Polk Award-winning Rolling Stone piece, &apos;&apos;The Runaway General.&apos;&apos;" />
                      <outline text="That article, which presented a dim view of the U.S. strategy in the Afghanistan war and exposed a military command structure working to actively undermine its civilian leadership, also contained several accounts of less-than-professional behavior and comments by Gen. Stanley McChrystal, the International Security Assistance Force commander, the disclosure of which led to McChrystal tendering his resignation in June 2010." />
                      <outline text="But it&apos;s an obituary in The New York Times that has sounded a discordant note amid the rest of the encomiums. And now Hastings&apos; widow, Elise Jordan, is firing back at Times brass." />
                      <outline text="In its obituary of Hastings, posted online Wednesday evening, the paper of record casts doubt on the accuracy of his profile of McChrystal. Here&apos;s the salient part of the obit, penned by Margalit Fox:" />
                      <outline text="An inquiry into the article by the Defense Department inspector general the next year found &apos;&apos;insufficient&apos;&apos; evidence of wrongdoing by the general, his military aides and civilian advisers. The inspector general&apos;s report also questioned the accuracy of some aspects of the article, which was repeatedly defended by Mr. Hastings and Rolling Stone." />
                      <outline text="(Fox also identifies Hastings&apos; piece as a &apos;&apos;cover story.&apos;&apos; It was not. Rolling Stone featured Lady Gaga on the cover of the issue containing &apos;&apos;The Runaway General.&apos;&apos;)" />
                      <outline text="But the notion that McChrystal was somehow &apos;&apos;cleared&apos;&apos; in this matter is a story to which the Times has long tried to stick. When the inspector general&apos;s report was first released, the Times headlined it: &quot;Pentagon Inquiry Into Article Clears McChrystal and Aides.&quot; It did no such thing." />
                      <outline text="That said, it&apos;s unclear whether the Times&apos; reaction to Hastings&apos; story is rooted in professional jealousy or a knee-jerk defense of the establishment. The inspector general&apos;s report said it could not confirm some elements of Hastings&apos; reporting, but that was to be expected. Hastings quotes the general and his aides making disparaging remarks about their civilian superiors. Such people would be unlikely to acknowledge having said such things, especially considering that Hastings allowed some of them to remain nameless." />
                      <outline text="Jordan did not take kindly to the Times&apos; remembrance, and in an email to Times&apos; editor Jill Abramson, asked the paper correct its report before printing it in the morning paper. Abramson sent the note to Bill McDonald, obituaries editor, who rejected the request. Both emails were provided to The Huffington Post:" />
                      <outline text="Dear Jill, I was shocked and saddened to read a blatant mischaracterization of my late husband Michael Hastings&apos;s Rolling Stone story &apos;&apos;The Runaway General&apos;&apos; in his obituary." />
                      <outline text="The obituary states: &apos;&apos;An inquiry into Mr. Hastings&apos;s article by the Defense Department inspector general the next year found &apos;insufficient&apos; evidence of wrongdoing by the general, his military aides and civilian advisers. The inspector general&apos;s report also questioned the accuracy of some aspects of the article, which was repeatedly defended by Mr. Hastings and Rolling Stone&apos;s editors.&apos;&apos;" />
                      <outline text="If a reporter at the Times actually would read and properly analyze the Pentagon report, they would find exactly the opposite. The report clearly states: &apos;&apos;In some instances, we found no witness who acknowledged making or hearing the comments as reported. In other instances, we confirmed that the general substance of an incident at issue occurred, but not in the exact context described in the article.&apos;&apos;" />
                      <outline text="As Rolling Stone stated in response to the Pentagon report, &apos;&apos;The report by the Pentagon&apos;s inspector general offers no credible source &apos;-- or indeed, any named source &apos;-- contradicting the facts as reported in our story, &apos;The Runaway General.&apos; Much of the report, in fact, confirms our reporting, noting only that the Pentagon was unable to find witnesses &apos;who acknowledged making or hearing the comments as reported.&apos; This is not surprising, given that the civilian and military advisers questioned by the Pentagon knew that their careers were on the line if they admitted to making such comments.&apos;&apos;" />
                      <outline text="Unfortunately, the mischaracterization in the obituary reflects a longstanding -&apos;&apos; and ongoing &apos;&apos;- misrepresentation of the facts in and surrounding this story by the Times. Your archived story of the Pentagon report, for example, still carries the headline: &apos;&apos;Pentagon Inquiry Into Article Clears McChrystal and Aides,&apos;&apos; even though the report did no such thing. Insufficient evidence to prosecute is not the same as &apos;&apos;clearing&apos;&apos; someone of a misdeed. It is as if a district attorney had found no witnesses to prosecute a suspected murderer &apos;&apos; the only other witnesses being his accomplices -&apos;&apos; and the Times ran a story headlined, &apos;&apos;DA Clears Alleged Killer.&apos;&apos;" />
                      <outline text="I personally transcribed and have all the tape recordings of Michael&apos;s interviews during his time with McChrystal and his staff. I can personally verify that some of the most damning comments were made by McChrystal himself, and many others made by his aides in his presence were greeted with his enthusiastic approval. Michael refused to give further evidence to the Pentagon investigators, even though he could have directly attributed a host of insubordinate comments to others on the general&apos;s staff, in part because he believed that it was not the role of a journalist to open his notebooks to the military, and in part because he felt that what was needed when it came to the war in Afghanistan was not a change in personnel, but in policy." />
                      <outline text="I trust you&apos;ll make these corrections online and before you print tomorrow&apos;s paper." />
                      <outline text="Here&apos;s McDonald&apos;s reply:" />
                      <outline text="Dear Ms. Jordan Jill Abramson passed along your email concerning our obituary about Mr. Hastings. First, I hope you&apos;ll accept our condolences. I must say, however, that I don&apos;t believe we&apos;ve mischaracterized the Defense Department report from 2011. As the report stated, &apos;&apos;Not all of the events at issue occurred as reported in the article. In some instances, we found no witness who acknowledged making or hearing the comments as reported. In other instances, we confirmed that the general substance of an incident at issue occurred, but not in the exact context described in the article.&apos;&apos; In other words, as the obit states, &apos;&apos;the inspector general&apos;s report &apos;... questioned the accuracy of some aspects of the article.&apos;&apos; I don&apos;t know how else you could interpret the passage quoted above (&apos;&apos;not all of the events occurred as reported,&apos;&apos; incidents occurred &apos;&apos;not in the exact context described&apos;&apos;). I think it&apos;s also clear that it&apos;s not The Times that is questioning the article&apos;s accuracy; it was the Defense Department. We&apos;re simply reporting what it publicly said, while noting that your husband received a Polk Award for the article and was vigorously defended by Rolling Stone. So we see no reason to change the obituary. Again, I&apos;m very sorry about your loss." />
                      <outline text="Jordan&apos;s letter to Jill Abramson also was sent to New York Times national news editor Sam Sifton, and to New York Times public editor Margaret Sullivan." />
                      <outline text="Also on HuffPost:" />
              </outline>

              <outline text="Elise Jordan-The Phillips Foundation -">
                      <outline text="Link to Article" type="link" url="http://www.thephillipsfoundation.org/fellows/2010/elise__jordan/novak_profiles.cfm" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373386157_2a2W9UUA.html" />
      <outline text="Tue, 09 Jul 2013 16:09" />
                      <outline text="" />
                      <outline text="Project: Muslim Girls and Women as Equal AmericansBio:Elise Jordan is a journalist and commentator whose writing on politics and foreign policy has been published in the Atlantic.com, Newsweek/Daily Beast, Marie Claire, National Review Online, New York Post, Wall Street Journal, and the Weekly Standard.  Elise is a frequent guest on CNN, Fox News, and MSNBC, and has also commentated on the BBC, CTV, Fox Business Network, and National Public Radio.  During the Bush administration, Elise worked at the State Department as speechwriter to Secretary of State Condoleezza Rice and in the White House Office of Presidential Speechwriting. In 2007, she joined the National Security Council, where she worked on press and communications strategy for Afghanistan, Iraq, and Pakistan.  While at the White House, Elise worked for extended periods at the U.S. Embassy Baghdad and for the Commanding General&apos;s Strategic Advisory Group at the International Security Assistance Force (ISAF) headquarters in Kabul, Afghanistan.  She is on the board of UNICEF&apos;s Next Generation Steering Committee, an effort to promote UNICEF&apos;s humanitarian mission among under forty year old supporters, and the advisory board to the G(irls)20 Summit, a summit for young women from G20 nations and the African Union.  A 2004 graduate of Yale College with a degree in history, Elise was born and raised in Holly Springs, Mississippi." />
                      <outline text="http://www.theatlantic.com/elise-jordan/http://www.marieclaire.com/celebrity-lifestyle/articles/living/women-soldiers-afghanistan" />
                      <outline text="http://online.wsj.com/article/SB10001424052748704013004574517323667596310.html" />
                      <outline text="http://www.weeklystandard.com/Content/Public/Articles/000/000/017/288gfbig.asp?page=2&amp;pg=1" />
                      <outline text="http://www.nypost.com/p/news/opinion/opedcolumnists/negotiations_only_boost_the_taliban_gFe1VDjVNQ8ujBKy81rclJ" />
              </outline>

              <outline text="VIDEO-Remembering Michael Hastings &apos;&apos; Reliable Sources - CNN.com Blogs">
                      <outline text="Link to Article" type="link" url="http://reliablesources.blogs.cnn.com/2013/07/07/remembering-michael-hastings/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373386079_vkEx3DEj.html" />
      <outline text="Tue, 09 Jul 2013 16:07" />
                      <outline text="" />
                      <outline text="Guy MontagHere&apos;s an excerpt, &apos;&apos;What Burns Faster, Memories or Flames,&apos;&apos; from the post, &apos;&apos;More Lies Borne Out by Facts, If Not the Truth,&apos;&apos; at the Feral Firefighter blog:" />
                      <outline text="&apos;&apos;A woman I loved [Andi Parhamovich] was killed in Baghdad in January 2007 &apos;&apos; al-Qaeda in Iraq took credit for it &apos;... The memorial service with me crying over an empty coffin.&apos;&apos;" />
                      <outline text="- Michael Hastings, &apos;&apos;The Operators&apos;&apos; (2012). . .." />
                      <outline text="&apos;&apos;Twenty-five hundred degrees Fahrenheit, fire burns down&apos;...&apos;&apos;" />
                      <outline text="&apos;&apos;I find her personal writings and her diary&apos;... I find a note that says: &apos;career, death card.&apos; Another, dated January 12, says that she and I will &apos;take the journey home together.&apos;&apos;&apos;" />
                      <outline text="&apos;&apos;The men cannot get the doors open. They cannot get into the car&apos;... The grenade doesn&apos;t make a sound when it is dropped&apos;... The explosion. In less than a second, the gas tank will catch fire.&apos;&apos;" />
                      <outline text="&apos;&apos;She sees her life. It all comes at once.&apos;&apos;" />
                      <outline text="&apos;&apos;There is more noise; there is a loud noise. What is faster, sound or memories?&apos;&apos;" />
                      <outline text="&apos;&apos;The flames are hot. It is so hot now. What burns faster, memories or flames?&apos;&apos;" />
                      <outline text="&apos;&apos;She sees what happens. &apos;... Her father&apos;... holding a picture of her, inconsolable. She sees her mother shaking softly in church, looking at her face, framed in a picture. &apos;... She watches her fianc(C)e writing with tears in his eyes.&apos;&apos;" />
                      <outline text="&apos;&apos;It is almost over now. &apos;&apos;" />
                      <outline text="&apos;&apos;She sees the rest of her life. She sees the ring. She sees a pure white wedding dress and an aisle. She sees her parents and brothers and sisters and friends smiling proudly. She sees the children and the house. She sees the reunions in Ohio; she feels the warmth and hears the laughter and feels the love for her.&apos;&apos;" />
                      <outline text="&apos;&apos;The noise continues, but she is gone.&apos;&apos;" />
                      <outline text="- Michael Hastings, &apos;&apos;I Lost My Love In Baghdad&apos;&apos; (2008). . ." />
                      <outline text="&apos;&apos;&apos;... I didn&apos;t think I could love again. I feel very blessed and fortunate that Elise [Jorndan] would have me. The fact that she was able to get past that&apos;--I feel pretty lucky.&apos;&apos;" />
                      <outline text="- Michael Hastings, from CNN Reliable Sources interview" />
              </outline>

              <outline text="VIDEO-&quot;Daniel Ellsberg May Have Been Misguided But He Was Certainly Patriotic&quot; Zbigniew Brzezinski - YouTube">
                      <outline text="Link to Article" type="link" url="http://www.youtube.com/watch?v=KZTZdqfOlcI&amp;noredirect=1" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373385493_hcEmxmjB.html" />
      <outline text="Tue, 09 Jul 2013 15:58" />
                      <outline text="" />
              </outline>

              <outline text="BP settlement lawyer quits amidst misconduct accusations; prompts oversight - New Orleans Environmental News | Examiner.com">
                      <outline text="Link to Article" type="link" url="http://www.examiner.com/article/bp-settlement-lawyer-quts-amidst-misconduct-accusations-prompts-oversight" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373384481_Xgzr9jwA.html" />
      <outline text="Tue, 09 Jul 2013 15:41" />
                      <outline text="" />
                      <outline text="In the seemingly unending story that is the BPDeepwater Horizon disaster of Apr. 20, 2010, the news that an attorney would have to resign and be investigated for ethical reasons should not be shocking. What is more surprising is that for once, BP -- which has long contested the billions paid off in settlement claims -- has one legitimate gripe, at least." />
                      <outline text="The June 22 resignation of Lafayette, La.-based Lionel H. Sutton III caused Federal Judge Carl Barbier to issue an order July 2 announcing that an independent party, the FBI-trained Louis Freeh of Freeh Group International Solutions would be a &quot;special master&quot; on the case." />
                      <outline text="The judge wrote in his order, re: Oil Spill by the Oil Rig &apos;&apos;Deepwater Horizon&apos;&apos; in theGulf of Mexico, on April 20, 2010 in a document applying to No. 12-970, Bon Secour Fisheries, Inc., et al. v. BP Exploration &amp; Production Inc., et al. thaton June 25," />
                      <outline text="the Court advised counsel for BP and the Plaintiffs&apos; Steering Committee (&apos;&apos;PSC&apos;&apos;) of its intent to appoint Louis Freeh of the Freeh Group International Solutions, LLC, as a Special Master in this proceeding under Federal Rule of Civil Procedure 53. No one objected to this appointment. By this Order, the Court formally appoints Mr. Freeh and the Freeh Group as Special Master. This appointment is made pursuant to Rule 53 and the inherent authority of the Court..." />
                      <outline text="In 2012 counsel for BP and the PSC agreed to settle claims brought by non-governmental private claimants for economic damages arising from the spill. The Court established the Deepwater Horizon Court Supervised Settlement Program (CSSP) on June 4, 2012." />
                      <outline text="Freeh, whom the judge says has extensive expertise in both internal and external investigations and fact finding, was brought on board because," />
                      <outline text="&quot;recent events have arisen that led to the resignation of a staff attorney at the CSSP. An internal investigation by the CSSP is underway. However, the Court has concluded that in order to ensure the integrity of the program for the bene fit of the parties and the public, an independent, external investigation of this matter should be performed." />
                      <outline text="The AP and many other news outlets reported in late June that Sutton had resigned. Apparently, according to WPTV, Sutton has been accused of pocketing parts of settlement payments from a NOLA firm to which he once referred claims. This was originally reported by the AP, who spoke to a BPPLC official concerning the allegations." />
                      <outline text="The Examiner will keep you updated as news comes in." />
                      <outline text="Read a copy of the judge&apos;s order here." />
                      <outline text="Bold marks are those of the Examiner&apos;s." />
              </outline>

              <outline text="Lionel H. Sutton Resigns From BP Gulf Oil Spill Case After Accusations Of Misconduct">
                      <outline text="Link to Article" type="link" url="http://www.huffingtonpost.com/2013/06/21/lionel-h-sutton-resigns_n_3480252.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373384427_HQdX3qhZ.html" />
      <outline text="Tue, 09 Jul 2013 15:40" />
                      <outline text="" />
                      <outline text="NEW ORLEANS &apos;-- For months, BP has complained that a Louisiana attorney who is administering its settlement with tens of thousands of Gulf Coast businesses and residents has made decisions that expose the company to what could be billions of dollars in fictitious claims arising from the 2010 oil spill in the Gulf of Mexico." />
                      <outline text="Now the court-appointed administrator himself is investigating allegations that could provide the London-based oil giant with fodder for its argument that it hasn&apos;t gotten a fair shake from the claims-processing team." />
                      <outline text="Lafayette-based lawyer Patrick Juneau confirmed Friday that he has opened an internal investigation of alleged misconduct by one of his staff attorneys, Lionel H. Sutton III." />
                      <outline text="Sutton resigned Friday morning, Juneau spokesman Nick Gagliano told The Associated Press." />
                      <outline text="A report outlining the allegations, a copy of which was obtained by the AP, accuses Sutton of &quot;writing polices&quot; that benefited himself and other plaintiffs&apos; lawyers. It does not elaborate." />
                      <outline text="Prepared by Juneau&apos;s office, the report also says a &quot;confidential source&quot; who contacted Juneau&apos;s security chief accused Sutton of trying to influence a claim filed by the New Orleans-based Andry Law Firm. The same firm allegedly paid Sutton a portion of settlement proceeds for claims he had referred to it before he went to work for Juneau." />
                      <outline text="Juneau provided the report to U.S. District Judge Carl Barbier during a meeting in his chambers Thursday. The administrator has pledged to thoroughly investigate the claims involving Sutton, who started working for his office in November 2012, according to the report." />
                      <outline text="Both BP and claimants &quot;rightfully expect fairness and objectivity from this claims process,&quot; Juneau wrote." />
                      <outline text="&quot;Our goal is to operate in an efficient, transparent and fair manner. All allegations are taken seriously and investigated thoroughly.&quot;" />
                      <outline text="But in its own statement Friday, BP said only a &quot;comprehensive and independent investigation will ensure the integrity of the claims process.&quot;" />
                      <outline text="Sutton acknowledged in an email late Thursday that he had been told he was suspended &quot;pending an investigation of an anonymous allegation against me.&quot;" />
                      <outline text="&quot;I have not been made aware of the substance of the allegation or the status of the investigation,&quot; Sutton wrote. &quot;Once this is resolved, I would be happy to discuss it all with you.&quot;" />
                      <outline text="According to the report, Sutton denied the allegations when Juneau discussed them with him." />
                      <outline text="&quot;Sutton advised Juneau that he did not retain any interest in the claims or clients and the allegations were 100 percent incorrect,&quot; the report says." />
                      <outline text="But the report also cites passages from a string of email exchanges in which Sutton allegedly asks about his cut of nearly $500,000 in settlement payments to an individual who had filed several seafood-related claims." />
                      <outline text="In response to a lawyer who emailed him in January 2013 and asked him about his fee, Sutton allegedly responded, &quot;They sent you the check for my fee. The total fee on (the claimant) was 10k (+ or -). They sent you 5 for me and kept the other 5.&quot;" />
                      <outline text="Jonathan Andry, a lawyer at the firm that allegedly paid Sutton, didn&apos;t immediately respond to messages left at his office and with his answering service." />
                      <outline text="BP attorney Mark Holstein, in a letter to the judge Friday, said it&apos;s possible no further investigation into the matter would have happened had the company not pushed the issue with Juneau by requesting a meeting this week." />
                      <outline text="&quot;It is undisputed that the CSSP first became aware of the Sutton allegations at the end of May 2013, yet it appears that Mr. Sutton&apos;s emails were not locked down, searched and reviewed for almost three weeks...&quot; he wrote, referring to the Court Supervised Settlement Program." />
                      <outline text="Holstein said the Andry law firm and a related entity represent clients with roughly 675 claims and has its own claim worth more than $7.5 million. But the firm&apos;s own claim has been placed on hold, according to Holstein." />
                      <outline text="The report indicates that Juneau&apos;s security head, David Welker, notified the FBI&apos;s New Orleans division about the lawyer&apos;s alleged misconduct. Welker until recently was the special agent in charge of the FBI office in New Orleans." />
                      <outline text="An FBI spokeswoman in New Orleans declined to comment Thursday." />
                      <outline text="Before the allegations even surfaced, BP PLC had sued to block what could be billions of dollars in settlement payouts to businesses over the spill. The company has accused Juneau of trying to rewrite the terms of the deal and asserts that he has made decisions that expose the company to fictitious losses that were never contemplated in the settlement." />
                      <outline text="Barbier, who is overseeing the massive settlement, appointed Juneau last year and has upheld his decisions for calculating payments. BP has appealed, and the 5th U.S. Circuit Court of Appeals is scheduled to hear the case in July." />
                      <outline text="It&apos;s unclear how much influence Sutton had over the process of evaluating and paying scores of claims spawned by the deadly Deepwater Horizon disaster, which killed 11 rig workers and led to the nation&apos;s offshore oil spill." />
                      <outline text="The report prepared by Juneau&apos;s office Thursday doesn&apos;t elaborate on the allegation from the confidential source that Sutton was &quot;writing policies within the (settlement program) that ultimately may benefit his friends who are attorneys and himself.&quot;" />
                      <outline text="But the revelation could strengthen BP&apos;s position as it forges ahead with a high-stakes challenge to Juneau&apos;s interpretation of the settlement terms." />
                      <outline text="&quot;If I&apos;m Judge Barbier, I&apos;ve got to worry about this,&quot; said Howard Erichson, a Fordham University law professor specializing in complex litigation. &quot;Any claims settlement relies on a reliable claims process. If the integrity of the claims process is challenged, the judge is going to take that very seriously.&quot;" />
                      <outline text="The spill began in April 2010 after the BP-leased drilling rig Deepwater Horizon exploded off the Louisiana coast. Roughly 200 million gallons of crude oil were released from the Macondo well a mile under the Gulf surface. Marshes, fisheries and beaches from Louisiana to Florida were fouled by the oil until a cap was placed over the blown-out well in July 2010." />
                      <outline text="BP set up a compensation fund for individuals and businesses affected by the spill and committed $20 billion. The claims fund initially was handled by lawyer Kenneth Feinberg but Juneau took over the processing of claims after the settlement was reached last year." />
                      <outline text="Juneau&apos;s office announced in May that it has determined more than $3 billion in claims are eligible for payment through the settlement agreement. More than 162,000 claims were filed and more than $2 billion had been paid to claimants as of May 6." />
                      <outline text="Also on HuffPost:" />
              </outline>

              <outline text="Pollution Leads to Drop in Life Span in Northern China, Research Finds - NYTimes.com">
                      <outline text="Link to Article" type="link" url="http://mobile.nytimes.com/2013/07/09/world/asia/pollution-leads-to-drop-in-life-span-in-northern-china-study-finds.html?_r=2&amp;" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373381921_ZhkHyxjb.html" />
      <outline text="Tue, 09 Jul 2013 14:58" />
                      <outline text="" />
                      <outline text="BEIJING &apos;-- Southern Chinese on average have lived at least five years longer than their northern counterparts in recent decades because of the destructive health effects of pollution from the widespread use of coal in the north, according to a study released Monday by a prominent American science journal." />
                      <outline text="The study, which appears in The Proceedings of the National Academy of Sciences, was conducted by an American, an Israeli and two Chinese scholars and was based on analyses of health and pollution data collected by official Chinese sources from 1981 to 2001." />
                      <outline text="The results provide a new assessment of the enormous cost of China&apos;s environmental degradation, which in the north is partly a result of the emissions of deadly pollutants from coal-driven energy generation. The researchers project that the 500 million Chinese who live north of the Huai River will lose 2.5 billion years of life expectancy because of outdoor air pollution." />
                      <outline text="&apos;&apos;It highlights that in developing countries there&apos;s a trade-off in increasing incomes today and protecting public health and environmental quality,&apos;&apos; said the American member of the research team, Michael Greenstone, a professor of environmental economics at the Massachusetts Institute of Technology. &apos;&apos;And it highlights the fact that the public health costs are larger than we had thought.&apos;&apos;" />
                      <outline text="Pollution from widespread coal use in northern China has led to an average decrease in life span, research shows." />
                      <outline text="Donald Chan / Reuters" />
                      <outline text="Mr. Greenstone said in a telephone interview that another surprising result of the study was that the higher mortality rates were found across all age groups." />
                      <outline text="The study is the first measuring this kind of impact that relies purely on data collected within China. Its conclusions are based on analyses of population groups living in areas north and south of the Huai River. The Chinese government has for years maintained a policy of free coal for boilers to generate winter heating north of the river, which runs parallel to and between the Yellow and Yangtze Rivers. That policy and the ubiquity of northern coal-fired factories have contributed to the vast gap between the coal pollutants emitted in north and south." />
                      <outline text="Howard Frumkin, dean of the School of Public Health at the University of Washington, said a &apos;&apos;strong point&apos;&apos; of the study was its basis in the &apos;&apos;natural experiment&apos;&apos; resulting from China&apos;s disparate coal policies. &apos;&apos;The results are biologically plausible, and consistent with previous research,&apos;&apos; he said." />
                      <outline text="For every additional 100 micrograms of particulate matter per cubic meter above the average pollution levels in the south, the life expectancy at birth drops by three years, the researchers found. Mr. Greenstone said that estimate could be roughly applied to other developing nations where the baseline level of pollutants was high." />
                      <outline text="&apos;&apos;This adds to the growing mountain of evidence of the heavy cost of China&apos;s pollution,&apos;&apos; said Alex L. Wang, a law professor at the University of California, Los Angeles, who studies Chinese environmental policies. &apos;&apos;Other studies have shown significant near-term harms, in the form of illness, lost work days and even risks to children beginning in utero. This study suggests that the long-term harms of coal pollution might be worse than we thought.&apos;&apos;" />
                      <outline text="Mr. Wang said the new study could &apos;&apos;help to build the case for more aggressive environmental regulation&apos;&apos; &apos;-- for example, a previous order by Chinese leaders to shut down coal-fired boilers in some areas could be widened, and faster shutdown times could be required." />
                      <outline text="The health statistics recorded through the two-decade period by Chinese officials and examined by the study&apos;s researchers showed that the 5.5-year drop in life expectancy in the north was almost entirely due to a rise in deaths attributed to cardiorespiratory diseases or related health problems." />
                      <outline text="The pollution data, also recorded by officials, indicated that the concentration of particulates north of the Huai was 184 micrograms per cubic meter higher than in the south, or 55 percent greater." />
                      <outline text="Several recent scientific studies have revealed the toll that China&apos;s outdoor air pollution is taking on humans. This spring, new data released from the 2010 Global Burden of Disease Study revealed that such pollution contributed to 1.2 million premature deaths in 2010, or nearly 40 percent of the global total." />
                      <outline text="Some Chinese officials have sought to quash reports that link premature deaths to pollution. According to news reports, Chinese officials excised parts of a 2007 report called &apos;&apos;Cost of Pollution in China&apos;&apos; that had concluded that 350,000 to 400,000 people die prematurely in China each year because of outdoor air pollution. The study was done by the World Bank with the help of the Chinese State Environmental Protection Administration, the precursor to the Ministry of Environmental Protection." />
                      <outline text="This year, many Chinese have expressed fury and frustration over the surging levels of air pollution, especially in the north, which in January had record levels of particulate matter. Pollution levels have remained high this summer, and many foreigners and middle- or upper-class Chinese with children are looking to leave the country rather than tolerate the health risks." />
                      <outline text="Mr. Greenstone said he did not have a basis for comparing pollution levels now with those during the period covered by the study, 1981 to 2001. During that time, the method of measuring particulate matter was different. Mr. Greenstone also said he did not know how pollution in northern China affected the life expectancy for people not living there for their entire lives, or for residents of northern China who made frequent or long trips to less polluted areas." />
              </outline>

              <outline text="Syrian Government Claims Massive Seizure of Toxic Chemicals &apos;&apos;Controlled by Anti-government Forces&apos;&apos;">
                      <outline text="Link to Article" type="link" url="http://www.blacklistednews.com/Syrian_Government_Claims_Massive_Seizure_of_Toxic_Chemicals_%E2%80%9CControlled_by_Anti-government_Forces%E2%80%9D/27202/0/0/0/Y/M.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373371631_hz9wxrzc.html" />
        <outline text="Source: BlackListedNews.com" type="link" url="http://feeds.feedburner.com/blacklistednews/hKxa" />
      <outline text="Tue, 09 Jul 2013 12:07" />
                      <outline text="" />
                      <outline text="Source: Global Research" />
                      <outline text="The Syrian government&apos;s ambassador to the United Nations on Monday told reporters in New York that a cache of toxic chemicals, &apos;&apos;enough to destroy a city&apos;&apos; and presumably left by opposition forces, was discovered in northwestern Syria." />
                      <outline text="Ambassador Bashar Ja&apos;afari said the cache included about 280 containers filled with various toxic substances, such as ethylene glycol, ethanolamine, diethanolamine and triethanolamine." />
                      <outline text="&apos;&apos;This is enough to destroy a whole city, if not the whole country,&apos;&apos; Ja&apos;afari said, without mentioning the date when the discovery was made. &apos;&apos;At the moment, an investigation is underway with regard to this batch of chemical weapons.&apos;&apos;" />
                      <outline text="All the substances mentioned by Ja&apos;afari are indeed harmful for humans, but are extensively used in various industrial and consumer products. None of them is considered a chemical weapon." />
                      <outline text="The Syrian ambassador said the cache was &apos;&apos;controlled and supervised by armed anti-government groups.&apos;&apos;" />
                      <outline text="Both sides in the ongoing Syrian civil war have traded allegations regarding chemical weapons in recent months, with government officials accusing opposition forces of using chemical weapons against Assad&apos;s military in a March attack outside of the northern city of Aleppo." />
                      <outline text="The Syrian diplomat invited a UN commission investigating the use of chemical weapons in Syria and the organization&apos;s high representative for disarmament affairs, Angela Kane, to visit his country with another inspection." />
                      <outline text="However, he said, inspections would only be possible in Aleppo, but not in other Syrian regions as previously proposed by UN Secretary General Ban Ki-moon." />
                      <outline text="Some 93,000 people are believed to have died since fighting broke out between Syrian government forces and rebels in March 2011, according to the latest UN figures." />
                      <outline text="Please enable JavaScript to view the comments powered by Disqus." />
              </outline>

              <outline text="We interrupt this program to warn the Emergency Alert System is hackable | Ars Technica">
                      <outline text="Link to Article" type="link" url="http://arstechnica.com/security/2013/07/we-interrupt-this-program-to-warn-the-emergency-alert-system-is-hackable/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373370460_XBzWPjEh.html" />
      <outline text="Tue, 09 Jul 2013 11:47" />
                      <outline text="" />
                      <outline text="The US Emergency Alert System, which interrupts live TV and radio broadcasts with information about national emergencies in progress, is vulnerable to attacks that allow hackers to remotely disseminate bogus reports and tamper with gear, security researchers warned." />
                      <outline text="The remote takeover vulnerability affects the DASDEC-I and DASDEC-II application servers made by a company called Digital Alert Systems. It stems from the a recent firmware update that mistakenly included the private secure shell (SSH) key, according to an advisory published Monday by researchers from security firm IOActive. Administrators use such keys to remotely log in to a server to gain unfettered &quot;root&quot; access. The publication of the key makes it trivial for hackers to gain unauthorized access on Digital Alert System appliances that run default settings on older firmware." />
                      <outline text="&quot;An attacker who gains control of one or more DASDEC systems can disrupt these stations&apos; ability to transmit and could disseminate false emergency information over a large geographic area,&quot; the IOActive advisory warned. &quot;In addition, depending on the configuration of this and other devices, these messages could be forwarded and mirrored by other DASDEC systems.&quot;" />
                      <outline text="Other advisories warning of the vulnerability were published here and here by the Industry Control Systems Cyber Emergency Response Team and the US CERT. The US CERT advisory, which also warns against vulnerabilities in the One-Net E189 Emergency Alert System device sold by Digital Alert Systems parent company Monroe Electronics, was published two weeks ago." />
                      <outline text="The warnings come five months after hackers took over the emergency alert system of a Montana TV station and broadcast a bogus emergency bulletin warning TV viewers of an imminent zombie apocalypse. Devices used by stations in Michigan, California, Tennessee, and New Mexico were also reportedly commandeered. &quot;Civil authorities in your area have reported that the bodies of the dead are rising from the grave and attacking the living,&quot; at least one of the prank messages said. The advisories from IOActive and the CERT groups didn&apos;t say if the February attacks were carried out by exploiting the SSH key vulnerability." />
                      <outline text="The Emergency Alerting System is designed to enable the US president to deliver speeches to the entire country within 10 minutes of a disaster occurring. Application servers such as the DASDEC-I and DASDEC-II interrupt regular programming broadcast by TV and radio stations and relay an emergency message, which is preceded and followed by alert tones. In addition to tampering with the delivery of legitimate emergency messages, attackers who use the SSH key to log in to vulnerable systems could make unauthorized changes to the server and glean potentially sensitive configure information that could lead to additional hacks." />
                      <outline text="Stations that use vulnerable gear should upgrade to version 2.0-2, which is available by sending an e-mail to suport@digitalalertsystems.com." />
              </outline>

              <outline text="Lac-Megantic, Quebec Train Incident &apos;-- Roadwolf&apos;s Blog">
                      <outline text="Link to Article" type="link" url="http://www.roadwolf.ca/blog/?p=2407" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373370368_ksGq5G4r.html" />
      <outline text="Tue, 09 Jul 2013 11:46" />
                      <outline text="" />
                      <outline text="I have been loosely following this story over the past few days.  And I have largely declined comment, until I gathered the information.  As it turns out, it seems that the crew left the train parked, in neutral and removed the reverser handle, which is basically the key to the train.  With this handle removed the train could not of been placed into powered movement.  These keys are assigned to train crews when they are assigned their locomotive, and if they leave the train they are supposed to bring the reverser handle with them." />
                      <outline text="The train may remain running however, and railroads rarely will turn off large diesels which are idle unless they are forced to by environmental regulations.  It just will not be able to be put in gear, so to speak." />
                      <outline text="Railroad air breaks operate like truck breaks.  You apply pressure to release them.  This means that this article here:  http://www.cnbc.com/id/100871020 is full of bullshit.  Shutting down a locomotive would not release the breaks.  If anything it may be more likely to release the air pressure, and hold the breaks on." />
                      <outline text="The only way I could see the fire crews, possibly causing the train to roll, would be to manipulate the trains break controls to release the breaks while the engine was still on.   Waiting a while for the engine to pressurize the break line, and then decouple the trainline air break hose from the cars, before shutting the engine down (if in-fact this is what they did).   That way the engine shuts down and bleeds its breaks, but the cars would remain pressurized (they can remain pressurized when uncoupled) with no breaks.   The engines breaks alone wouldn&apos;t of been able to hold a long train stationary on a grade." />
                      <outline text="Alternatively; Assuming the fire crew did not shut the engine down (or shut down only one engine of a multi-engine set), and instead fumbled around inside the train cab, not understanding what the controls did; a firefighter could of inadvertently released the trains breaks without realizing it.  The train wouldn&apos;t of started to show signs of movement for about a minute or so as it pressurized the line.  Also note, they may have shut down the engine that was on fire, however the other engines must of been still running.  The trainline air is common to the whole train, and if an engine is off, the other engines can still pressurize it." />
                      <outline text="That is quite a mistake for a fire crew to accomplish.  Another common theory is that it was more like something a &apos;terrorist&apos; would do." />
                      <outline text="Adam Curry (of No Agenda) has a theory about pipelines.  Specifically that pipelines in the mid-east are the cause of much of the turmoil which is going on over there.  Everyone wants to be in control of the flow of fuel.  And pipelines are easy enough to target.   Well, as it seems, so are freight trains." />
                      <outline text="However, This incident smells like a &apos;terrorist&apos; related incident.  Perhaps not a typical one however.  I wouldn&apos;t expect Al Queda to be claiming responsibility for it anytime soon.  But I believe that this is perhaps either politically motivated or corporate warfare.  In either case I believe it could possibly be being masked as an accident." />
                      <outline text="It is interesting to note that I received my August 2013 issue of Trains magazine in the mail today, and on page 6, was a lengthy article proclaiming the safety and convenience of transporting crude oil by rail.  The article touts rails dominance in transporting crude oil, and outlines the Keystone XL proponents as &apos;attacking&apos; the railroads.  The article also makes light of Canadian Prime Minister, Stephen Harper&apos;s push for the Keystone XL pipeline, and his general distaste with transporting crude oil by rail.  The article itself does not mention the incident in Quebec, and I am sure it was printed and mailed out before the incident took place.  Kinda spooky how the article was placed in print just before this happened." />
                      <outline text="Crude oil is also thick and needs to be heated by steam in order to flow as a fluid.  These insulated tank cares are fitted with steam pipes which can be hooked to a steam generator at the point of delivery to warm up the crude.  But without this action, the crude remains in a thick tar-like state inside the car." />
                      <outline text="I am unsure about the properties of crude oil.  I have never seen it myself, or played with it.  But I do know that it has a lot of impurities which need to be refined out in order for it to become useful.  I know if you throw a match into diesel, or oil, or thicker, less refined oil products, they tend not to ignite, and rather extinguish the flame.  I imagine the same is true for crude oil.  So how did this explode into a blaze of fire?" />
                      <outline text="This is sad because if this is true, this could raise the security around rail travel more then it is, and ruin the hobby of railfanning for good.  Coincidentally, in the same issue of Trains Magazine, on page 10, there is a article about terrorism, railfans and the railroads." />
                      <outline text="The rail transport industry is always under attack somehow, and they really aren&apos;t the multi-billion dollar ventures that other corporations are.  That being said, they provide the cleanest and most convenient method for transporting bulk loads long distances.  They are also union based, and generally care about their employees and safety.  They can&apos;t afford not to." />
                      <outline text=" " />
                      <outline text="It will be interesting to see what the &apos;official&apos; findings come up with, but to me, it looks quite suspicious." />
                      <outline text="Tags: News // Add Comment &gt;&gt;" />
              </outline>

              <outline text="Quebec rail tragedy shows need for oil pipelines | Columnists | Opinion | Toronto Sun">
                      <outline text="Link to Article" type="link" url="http://www.torontosun.com/2013/07/08/quebec-rail-tragedy-shows-need-for-oil-pipelines" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373368448_DH89zWru.html" />
      <outline text="Tue, 09 Jul 2013 11:14" />
                      <outline text="" />
                      <outline text="Wynne&apos;s wind fiasco" />
                      <outline text="There&apos;s a simple way to understand the real story of electricity generation in Ontario &apos;-- as opposed to the bafflegab coming from Premier Kathleen Wynne and the Liberals." />
                      <outline text="0Admired, respected, trusted!" />
                      <outline text="Those of us lucky enough to live in Canada shouldn&apos;t be surprised that for the third year in a row, our home and native land has been judged the world&apos;s most reputable country." />
                      <outline text="0See more from Lorrie Goldstein &gt;&gt;" />
              </outline>

              <outline text="AP Interview: Ex-FBI Chief on Risk of Cyber Terror - NYTimes.com">
                      <outline text="Link to Article" type="link" url="http://mobile.nytimes.com/aponline/2013/07/07/world/europe/ap-eu-ireland-cyber-terror.html?smid=tw-share&amp;_r=4&amp;" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373339615_L6ZeFuSR.html" />
      <outline text="Tue, 09 Jul 2013 03:13" />
                      <outline text="" />
                      <outline text="DUBLIN &apos;-- United States intelligence officials must do a better job analyzing the mountains of global internet, telephone and financial data they already collect to thwart the cyber terrorists of tomorrow, according to former FBI director Louis Freeh." />
                      <outline text="Speaking to The Associated Press ahead of the Global Intelligence Forum starting Monday in Ireland, Freeh said hackers seeking to take control of, or take down, key pieces of U.S. infrastructure could do more damage than the attackers of 9/11. He said computer systems controlling power plants, the navigation of aircraft and ships, and even the switching of street lights could be hijacked to gridlock societies and kill large groups of people." />
                      <outline text="&quot;People traditionally think of this threat as somebody stealing their identity or their credit card number, or making it inconvenient to go to the ATM (cash machine). That&apos;s a very benign view of the potential for what cyber terrorism really is,&quot; Freeh said." />
                      <outline text="&quot;You could manipulate transportation systems, aviation guidance systems, highway safety systems, maritime operations systems. You could shut down an energy system in the northeast U.S. in the middle of winter. The potential for mass destruction in terms of life and property is really only limited by (the attackers&apos;) access and success in penetrating and hijacking these networks,&quot; he said." />
                      <outline text="Freeh said people shouldn&apos;t be lulled into complacency just because hackers&apos; attacks on government and business targets to date hadn&apos;t directly killed anybody." />
                      <outline text="&quot;There&apos;s a lot of technology and a lot of ability out there, particularly with state actors,&quot; he said, referring to other governments&apos; cyber-spying operations including in China, which U.S. authorities previously have blamed for stealing American corporate trade secrets. &quot;We went through the Cold War without anybody using a nuclear bomb, but that didn&apos;t mean the capability and threat weren&apos;t there.&quot;" />
                      <outline text="Freeh, 63, directed the Federal Bureau of Investigation from 1993 to 2001, leaving just before the al-Qaida attacks on the World Trade Center and Pentagon. In the years since he&apos;s become a top private investigator, most recently publishing the report into the cover-up of child abuse in the Penn State University football program. Last week he was appointed to oversee a probe into alleged corruption and malpractice in the payouts of billions in compensation from BP&apos;s 2010 oil spill in the Gulf of Mexico." />
                      <outline text="He said his keynote speech Monday to an annual seminar organized by Mercyhurst University&apos;s Institute for Intelligence Studies would focus on how intelligence and law-enforcement agencies need to use the internet to identify threats &apos;-- and keep their own secrets secure. The four-day conference brings together intelligence officials worldwide, with a focus this year on combating internet-based crime." />
                      <outline text="It takes place against the backdrop of continuing revelations from former U.S. National Security Agency analyst Edward Snowden, who is believed still to be holed up in Moscow&apos;s airport three weeks after the U.S. Justice Department charged him with espionage and theft of government property." />
                      <outline text="Freeh questioned Snowden&apos;s description as a whistleblower &apos;-- and why the NSA ever gave Snowden such access to its secrets without effective supervision." />
                      <outline text="He said Snowden should &quot;come to a forum or an arena where he can raise his whistleblower defense.&quot; He said the NSA, like other U.S. government agencies, has an internal reporting process for whistleblowers alleging wrongdoing but Snowden appears not to have used this." />
                      <outline text="&quot;He&apos;s said publicly that he was witnessing and participating at least indirectly in what he thought was a mass violation of U.S. rights, constitutional rights, human rights, and so was forced to publicly disclose this. It&apos;s just not accurate. It&apos;s Hollywood-esque and may be romantic for somebody to think: My God, this guy had no choice. But the reality is he had plenty of options and choices,&quot; Freeh said." />
                      <outline text="He said the NSA gave Snowden system-wide access with &quot;the ability to extract and copy top-secret documents detailing secured and elaborate programs.&quot; He noted that a recent PricewaterhouseCoopers survey found that employee insiders committed around a third of all breaches of sensitive data." />
                      <outline text="And that, he said, was the biggest issue for government agencies and corporations: What should be accessible on its own internal intranet connections, and who should be cleared to see it?" />
                      <outline text="As things stand now, he said, &quot;too many people have too much access&quot; to sensitive documents in companies and government agencies. He suggested that a group&apos;s most confidential information might have to be left without an electronic fingerprint at all and be kept, old school, like the Coca-Cola company&apos;s recipe for its soft drinks once was under lock and key in a safe." />
                      <outline text="But he said, conversely, everyone in the 21st century should assume that every time we click our keyboard, or thumb our smart phone, it&apos;s being put blindly into multiple databases ranging from internet aggregators to NSA hard drives." />
                      <outline text="For law enforcement officials, he said, the challenge was whether this tsunami of information could be mined effectively before an attack. While he described U.S. collection of data as &quot;very robust,&quot; its analysis and use in detecting crimes was not." />
                      <outline text="&quot;In the internet world we live in, all of our data is collected. I&apos;m going to walk around with my cell phone today and my carrier is going to know my location on a minute-by-minute basis,&quot; he said. &quot;So it&apos;s not really the data. It&apos;s how you protect it, how you manage it, and what people&apos;s expectations are for its utilization.&quot;" />
                      <outline text="___" />
                      <outline text="Online:" />
                      <outline text="Mercyhurst event, http://www.globalintelligenceforum.com/" />
              </outline>

              <outline text="UPDATE 2-Quebec firemen cut power to runaway train&apos;s brakes, railway says">
                      <outline text="Link to Article" type="link" url="http://www.cnbc.com/id/100871020" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373325416_GKws28d2.html" />
      <outline text="Mon, 08 Jul 2013 23:16" />
                      <outline text="" />
                      <outline text="By: Richard Valdmanis and P.J. Huffstutter" />
                      <outline text="(Releads with comments by railway chairman)" />
                      <outline text="LAC-MEGANTIC, Quebec, CHICAGO, July 8 (Reuters) - Airbrakes that would have prevented the Quebec train disaster failed because they were powered by an engine that was shut down by firefighters as they dealt with a fire shortly before the calamity occurred, the head of the railway that operated the train said on Monday." />
                      <outline text="The runaway oil tanker train derailed in Lac-Megantic shortly after one o&apos;clock in the morning on Saturday, exploding in a deadly ball of flames and killing at least five people, with another 40 still missing and feared dead." />
                      <outline text="The train had been parked at a siding on a slope near the town of Nantes, which is 12 km (8 miles) west of Lac-Megantic. The volunteer Nantes fire service was called out late on Friday night to deal with an engine fire on one of the train&apos;s locomotives." />
                      <outline text="Nantes Fire Chief Patrick Lambert told Reuters the crew had switched off the engine as they extinguished a &quot;good-sized&quot; blaze in the engine, probably caused by a fuel or oil line break in the engine." />
                      <outline text="The problem was that the engine had been left on by the train&apos;s engineer to maintain pressure in the air brakes, Ed Burkhardt, chairman of Montreal, Maine &amp; Atlantic Railway (MMA), said in an interview. As the pressure gradually &quot;leaked off&quot;, the air brakes failed and the train began to slide downhill, he said." />
                      <outline text="The fire service said it contacted a local MMA dispatcher in Farnham, Quebec, after the blaze was out. &quot;We told them what we did and how we did it,&quot; Lambert said." />
                      <outline text="Asked whether there had been any discussion about the brakes, he replied: &quot;There was no discussion of the brakes at that time. We were there for the train fire. As for the inspection of the train after the fact, that was up to them.&quot;" />
                      <outline text="It was not immediately clear what the MMA dispatcher did after speaking with the fire service. Burkhardt said the fire service should have also tried to contact the train&apos;s operator, who was staying at a nearby hotel." />
                      <outline text="&quot;If the engine was shut off, someone should have made a report to the local railroad about that,&quot; he said." />
                      <outline text="Andre Gendron, 38, lives on a wooded property next to the rail yard in Nantes. He said he was burning a campfire outside his trailer on Friday night when he heard the fire trucks." />
                      <outline text="&quot;About five minutes after the firemen left, I felt the vibration of a train moving down the track. I then saw the train move by without its lights on,&quot; Gendron told Reuters." />
                      <outline text="&quot;I found it strange its lights weren&apos;t on and thought it was an electrical problem on board. It wasn&apos;t long after that I heard the explosion. I could see the light from the fires in Lac Megantic.&quot;" />
                      <outline text="The center of Lac-Megantic, a lakeside town of 6,000 near the border with Maine, was still cordoned off on Monday morning. One of the destroyed buildings was a music bar popular with young people, and witnesses reported fleeing the area around the building as the heat and flames closed in." />
                      <outline text="Police said they had been unable to examine much of the town center overnight because the area was still too dangerous. Dozens of rail tanker wagons, some of them destroyed, were sprawled around the accident site." />
                      <outline text="&quot;It&apos;s an area that is still extremely risky... The fire service decided they could not allow us to go there for security reasons. We&apos;ll see what we can do today,&quot; police spokesman Benoit Richard told reporters on Monday." />
                      <outline text="Canadian crash investigators said they will look at the two sets of brakes on the train, the airbrakes and the handbrakes, as they probe what could turn out to be Canada&apos;s deadliest rail accident since 1956." />
                      <outline text="Burkhardt said that after the pressure leaked out of the airbrakes, the handbrakes would not have been strong enough to keep the train in place." />
                      <outline text="Montreal Maine &amp; Atlantic is one of many North American railroads that have vastly stepped up shipments of crude oil as pipelines from North Dakota and from oil-producing regions in Western Canada fill to capacity, and the accident is bound to raise concern about the practice of transporting oil by rail." />
                      <outline text="(Additional reporting by Julie Gordon in Lac-Megantic; Writing by David Ljunggren and Janet Guttsman; Editing by Peter Galloway)" />
                      <outline text="LAC-MEGANTIC, Quebec, CHICAGO, July 8- Airbrakes that would have prevented the Quebec train disaster failed because they were powered by an engine that was shut down by firefighters as they dealt with a fire shortly before the calamity occurred, the head of the railway that operated the train said on Monday." />
              </outline>

              <outline text="Perry Will Not Seek Re-election as Texas Governor - NYTimes.com">
                      <outline text="Link to Article" type="link" url="http://mobile.nytimes.com/2013/07/09/us/perry-will-not-seek-re-election-as-texas-governor.html?_r=1&amp;" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373322657_tUw2569m.html" />
      <outline text="Mon, 08 Jul 2013 22:30" />
                      <outline text="" />
                      <outline text="SAN ANTONIO, Tex. &apos;-- Rick Perry, the longest-serving governor of Texas and an unsuccessful Republican presidential candidate in 2012, announced that he would not seek another term in Austin but would instead &apos;&apos;pray and reflect and work to determine my own future path.&apos;&apos;" />
                      <outline text="&apos;&apos;The time has come to pass on the mantle of leadership,&apos;&apos; Mr. Perry told a crowd of supporters in a cavernous heavy equipment dealership here. &apos;&apos;Today I am announcing I will not seek re-election as governor of Texas.&apos;&apos;" />
                      <outline text="As for what happens after his term is over in 18 months, he said he would remain focused on the state. He made no mention of a presidential run in 2016, but instead extolled the advances Texas had made under his leadership since 2000." />
                      <outline text="Standing on a temporary dais against a backdrop of American and Texas flags, Mr. Perry said, &apos;&apos;It&apos;s been an improbable journey that has taken me from a farm in this place called Paint Creek, Texas, to the governor&apos;s office, and each day has been an honor.&apos;&apos;" />
                      <outline text="He faced a friendly crowd of longtime supporters and employees of Holt Cat, a Caterpillar dealership. The owner, Peter Holt, also owns the San Antonio Spurs and is a major contributor to Mr. Perry&apos;s campaigns." />
                      <outline text="&apos;&apos;We have created the strongest economy in the nation,&apos;&apos; Mr. Perry told the crowd, through encouraging growth, balancing budgets and overhauling the tort system." />
                      <outline text="&apos;&apos;We have stood strong against unwise policies from Washington that would break the bank,&apos;&apos; he said. &apos;&apos;We have better protected the right to life. We have protected the sanctity of marriage.&apos;&apos;" />
                      <outline text="Mr. Perry said he was proudest of the jobs created in the state while he has been governor, claiming 1.6 million new positions." />
                      <outline text="&apos;&apos;I will truly miss serving in this capacity,&apos;&apos; he said, &apos;&apos;because it is the greatest job in modern politics.&apos;&apos;" />
                      <outline text="Mr. Perry assumed the governorship after George W. Bush left office to become president; he was then elected to three full terms." />
                      <outline text="He withdrew from the 2012 presidential race after a lackluster primary showing. But he recently regained the national stage when he squared off with Democrats in the State Senate who opposed a stringent anti-abortion bill, which seems headed for easy passage in the Republican-controlled Legislature." />
                      <outline text="In particular, he took on Senator Wendy Davis, a Fort Worth Democrat, after her 11-hour filibuster halted the bill&apos;s progress, at least temporarily." />
                      <outline text="He also spoke out against her directly at a National Right to Life convention in Texas, suggesting that Ms. Davis especially should understand that &apos;&apos;every life matters.&apos;&apos; He later explained to reporters that she had been a teen mother, and that her own mother had been a single mother and might have considered abortion." />
                      <outline text="&apos;&apos;What if her mom had said, &apos;I just can&apos;t do this, I don&apos;t want to do this&apos;?&apos;&apos; Mr. Perry said. The comments angered fans of Ms. Davis, who saw the attack as unstatesmanlike and offensive." />
                      <outline text="The anti-abortion bill is almost certain to pass during a special legislative session called by Mr. Perry. Ms. Davis has said she will not filibuster again, and with weeks before the end of the session, a filibuster would not be humanly possible in any case." />
                      <outline text="In an interview on &apos;&apos;Fox News Sunday,&apos;&apos; Mr. Perry predicted, &apos;&apos;This is going to pass.&apos;&apos; He added, &apos;&apos;I&apos;m pretty good at counting votes.&apos;&apos;" />
                      <outline text="He also criticized the outburst in the Senate gallery the night of Ms. Davis&apos;s filibuster, which delayed the vote on the bill until after the midnight deadline. &apos;&apos;Never in the history of Texas have they seen that kind of a mob rule,&apos;&apos; he said." />
                      <outline text="As for his previous comments about Ms. Davis, he said they &apos;&apos;were meant to be a compliment for what she&apos;s accomplished in her life.&apos;&apos;" />
                      <outline text="Outside Texas, Americans mainly remember Mr. Perry for his startling stumble as a presidential candidate in the 2012 primaries, culminating in his inability in a major debate to name the third of three federal agencies he would eliminate if elected &apos;-- and then saying, after an agonizingly long pause, &apos;&apos;oops.&apos;&apos;" />
              </outline>

              <outline text="Hawaii is a spot for sun, surf _ and spies">
                      <outline text="Link to Article" type="link" url="http://bigstory.ap.org/article/hawaii-spot-sun-surf-and-spies" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373322554_ACgZnYnJ.html" />
      <outline text="Mon, 08 Jul 2013 22:29" />
                      <outline text="" />
                      <outline text="HONOLULU (AP) &apos;-- Clandestine agents. Foreign spies. Intelligence. Hawaii is better known for sunbathing on the beach or surfing than high-stakes sleuthing." />
                      <outline text="But the case of a 59-year-old civilian defense contractor accused of giving military secrets to his much younger Chinese girlfriend is a reminder of the state&apos;s little-known identity as a prime target for espionage. A high concentration of important military commands means there&apos;s a great deal of information on the islands that potential adversaries want to know." />
                      <outline text="Case in point: Most of the FBI&apos;s resources in Hawaii are concentrated on counterintelligence &apos;-- not drug trafficking or terrorism." />
                      <outline text="&quot;One of the FBI&apos;s priorities in Hawaii is keeping America&apos;s secrets safe from agents of foreign powers,&quot; said Tom Simon, a special agent in Honolulu. &quot;With the amount of military and classified material in Hawaii, it remains a top priority for the FBI.&quot;" />
                      <outline text="It helps that the state, population 1.4 million, isn&apos;t a hotbed of violent crime. That allows agents to focus much of their efforts on thwarting spooks." />
                      <outline text="The case against Benjamin Bishop, a defense contractor working for the U.S. Pacific Command when he was arrested March 15, offers a glimpse of the information potential adversaries might be looking for." />
                      <outline text="Bishop knows U.S. secrets on countering weapons of mass destruction, nuclear deterrence and ballistic missile defense, according to a declaration filed in court by Maj. Gen. Anthony Crutchfield, the Pacific Command&apos;s chief of staff." />
                      <outline text="More recently, Bishop worked on cyber security and is familiar with how the U.S. would counter adversaries in electronic warfare, air combat, undersea warfare, energy security and cyberspace, the declaration says." />
                      <outline text="Investigators say Bishop gave his girlfriend &apos;-- a 27-year-old graduate student he met at an international military conference in Hawaii&apos;-- classified information on nuclear weapons, war plans and missile defense." />
                      <outline text="Bishop hasn&apos;t been charged with outright espionage, which the law defines as giving national security secrets to someone for the purpose of helping a foreign government or harming the United States. But he has been charged with two violations of the Espionage Act: communicating defense secrets to someone not entitled to receive it and unlawful retention of defense documents." />
                      <outline text="Prosecutors haven&apos;t said they believe the girlfriend is working for the Chinese government or that she&apos;s given anything she learned from Bishop to anyone else. But an FBI affidavit filed in support of the charges speculates she may have attended the military conference specifically to target people like Bishop who work with classified information." />
                      <outline text="Bishop has not yet entered a plea, but his lawyer says his client wouldn&apos;t do anything to harm the U.S. The attorney, Birney Bervar, says the case isn&apos;t about espionage but about two people in love." />
                      <outline text="Spying isn&apos;t new to Hawaii." />
                      <outline text="In the months before the attack on Pearl Harbor on Dec. 7, 1941, a Japanese vice consul in Honolulu spent much of his time monitoring and reporting back home on the comings and goings of the U.S. Navy. Takeo Yoshikawa is said to have favored the view of Pearl Harbor he would get at a tea house &apos;-- still in business today as the Natsunoya restaurant &apos;-- in a hilly neighborhood overlooking the naval base." />
                      <outline text="The Soviet Union kept an intelligence collecting ship off the coast of Oahu during the Cold War to monitor U.S. military communications, said Ralph Cossa, president of Pacific Forum Center for Strategic and International Studies." />
                      <outline text="Today, the FBI says countries from the Asia-Pacific region are the ones most likely to attempt to gather intelligence about U.S. military operations in Hawaii." />
                      <outline text="China would have the biggest interest, followed by Russia, Cossa said. North Korea would be interested but doesn&apos;t have as many resources." />
                      <outline text="Their targets? Pacific Command is the U.S. military&apos;s headquarters for the Asia-Pacific region. The Navy, Air Force, Army and Marine Corps also each have their own headquarters for the Pacific on Oahu. The National Security Agency keeps an intelligence center tucked away in central Oahu." />
                      <outline text="There&apos;s a major missile defense testing site on Kauai. A high-powered missile defense radar capable of tracking a baseball-sized object 2,500 miles away &apos;-- called the Sea-Based X-band Radar &apos;-- visits Pearl Harbor regularly." />
                      <outline text="These days, computer hacking and cyber espionage &apos;-- the area Bishop was working in most recently &apos;-- are major spying methods." />
                      <outline text="Eyes and ears are useful too, whether they belong to undercover agents or to businessmen, tourists and students who may share what they see with their governments." />
                      <outline text="Honolulu has nearly 1 million residents, and the state is a mecca for sun-seeking tourists from around the world. This makes Hawaii an easier place for intelligence gatherers to blend in than, say, remote parts of Wyoming where the U.S. keeps ballistic missiles." />
                      <outline text="Pressure to gather intelligence from the islands is likely growing as the Obama administration places a greater emphasis on the region with the military&apos;s &quot;pivot&quot; to the Pacific. Cossa said the policy &quot;shines a big target&quot; on Hawaii." />
                      <outline text="&quot;I&apos;m sure every intel guy in China has been told &apos;Get more details. What does it really mean?,&apos;&quot; said Cossa, who spent 26 years in the Air Force, including three tours at Pacific Command." />
                      <outline text="The reconnaissance goes both ways. On the other side of the Pacific Ocean, the U.S. is eager to gather its own intelligence on new ships, planes and other equipment China is adding to its military." />
                      <outline text="Cossa said allegations like those against Bishop make for flashy headlines but account for a small percentage of the spying going on." />
                      <outline text="Most of the espionage involves people trying to listen to phone conversations and hack into email and computers, he said. It&apos;s easier for people to steal information this way and it&apos;s harder to detect." />
                      <outline text="&quot;Obviously if you&apos;re working with classified information in the military, in Hawaii, you should expect somebody is trying to listen, someone is trying to copy,&quot; Cossa said." />
              </outline>

              <outline text="Obama Supporters Sign Petition to Repeal the BILL OF RIGHTS to Support the President - YouTube. (God help us)">
                      <outline text="Link to Article" type="link" url="https://www.youtube.com/watch?v=k0he0cqHH20" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373321952_AysVLVPn.html" />
        <outline text="Source: pg.chrys news feed" type="link" url="http://s3.amazonaws.com/radio2/pg.chrys/linkblog.xml" />
      <outline text="Mon, 08 Jul 2013 22:19" />
                      <outline text="" />
              </outline>

              <outline text="Egypt interim leader sets poll plan">
                      <outline text="Link to Article" type="link" url="http://www.bbc.co.uk/news/world-middle-east-23236534#sa-ns_mchannel=rss&amp;ns_source=PublicRSS20-sa" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373321930_cV4DXtKc.html" />
        <outline text="Source: BBC News - Middle East" type="link" url="http://newsrss.bbc.co.uk/rss/newsonline_world_edition/middle_east/rss.xml" />
      <outline text="Mon, 08 Jul 2013 22:18" />
                      <outline text="" />
                      <outline text="8 July 2013Last updated at17:52 ETEgypt&apos;s interim leader has outlined his timetable for new elections, amid continuing unrest in the country." />
                      <outline text="Adly Mansour&apos;s decree says a panel to amend the constitution must be formed within 15 days and general elections could then be held by February." />
                      <outline text="This comes as at least 51 people were killed in the capital Cairo." />
                      <outline text="The Muslim Brotherhood says its members were fired on at a sit-in for ousted President Mohammad Morsi. The army says it responded to an armed provocation." />
                      <outline text="Mr Morsi, an Islamist and Egypt&apos;s first freely elected leader, was removed from office by the army last week after mass protests." />
                      <outline text="His supporters accuse the military of staging a coup, but his opponents say the move is the continuation of the revolution that ousted President Hosni Mubarak in 2011." />
              </outline>

              <outline text="Lone Wolf Trading Company-LA Times - Police chief killed with rifle lost in ATF gun-tracking program">
                      <outline text="Link to Article" type="link" url="http://touch.latimes.com/#section/-1/article/p2p-76571135/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373321728_7Z2k5k2b.html" />
      <outline text="Mon, 08 Jul 2013 22:15" />
                      <outline text="" />
                      <outline text="LA Times  Loading..." />
                      <outline text="The page cannot be loaded because you are currently offline. Please check your internet connection and try again, or go back to the previous page." />
                      <outline text="The page you requested was not found." />
              </outline>

              <outline text="VIDEO-himmi Bloomberg bows down to the Islamofascists AGAIN! | BARE NAKED ISLAM">
                      <outline text="Link to Article" type="link" url="http://www.barenakedislam.com/2013/06/29/dhimmi-bloomberg-bows-down-to-the-islamofascists-again/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373321430_HFvybD5U.html" />
      <outline text="Mon, 08 Jul 2013 22:10" />
                      <outline text="" />
                      <outline text="I still have a hard time with believing that all the people who rightfully resist the filthy, headbanging, butt wavind muslims still find it impossible to identify with anything remotely Jewish. It&apos;s like they&apos;re afraid they might catch something they have to scratch.We have one of the premier, NO compromise, pro-gun organizations anywhere in the world, but it is correctly named &apos;&apos;JEWS For The Preservation of Firearm Ownership&apos;&apos;, or JPFO. All across the country, big ol&apos; wool shirted guys are ignoring it because they fear somebody might think they&apos;re Jewish. Whata buncha wimps !And in New York, the melon headed electorate keep electing worthless, self serving Jews like Schumer, but would hide in a storaga locker if anyone sugessted they voted for the waste just because he was a Jew. Go figure !Now the sanity challenged voters of the Big Apple have allowed this laughingstock, law breaking, supreme egotist munchkin Bloomberg, to buy himself the mayors office and make a fool of himself and them on a National basis by supporting terrorist aiding, non assimilating, welfare draining,butt waving, head banging scabs on society muslims to grossly insult all Jews and to shatter the normal noise of the city with their ungodly yodeling five times a day. I&apos;m not Jewish, but I know what a &apos;&apos;petzil&apos;&apos; is and Bloombrg is one !" />
              </outline>

              <outline text="Gov. Walker Signs Sneak Attack On Wisconsin Abortion Rights | Crooks and Liars">
                      <outline text="Link to Article" type="link" url="http://crooksandliars.com/susie-madrak/gov-walker-signs-sneak-attack-wiscons" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373320407_vfGLvzKJ.html" />
      <outline text="Mon, 08 Jul 2013 21:53" />
                      <outline text="" />
                      <outline text="So you may have heard by now that Scott Walker signed a sneak attack on Wisconsin abortion rights. It&apos;s clear that this wave of stealth legislative assaults on abortion is being driven by ALEC&apos;s corporate agenda, and it doesn&apos;t have a damned thing to do with &quot;protecting the unborn.&quot; It&apos;s about keeping people poor, desperate and docile. It&apos;s about cheap, disposable labor -- which is what Republicans and their corporate sponsors always want, and of course they&apos;re shameless enough to manipulate people into thinking they have some noble purpose behind it. Via the Maddow blog:" />
                      <outline text="Every conceivable element of this story is offensive." />
                      <outline text="Wisconsin Governor Scott Walker signed into law on Friday new abortion restrictions that opponents said could lead to the closing of two of the state&apos;s four abortion clinics. [...]The law requires women to undergo an ultrasound before they get an abortion and doctors who perform abortions to have admitting privileges at a hospital within 30 miles of their clinics." />
                      <outline text="So, in addition to forcing two of the state&apos;s four abortion providers to shut down, Walker will now require women undergo a medically unnecessary procedure before exercising their constitutional rights. What if a woman doesn&apos;t want the ultrasound? Too bad; her governor is imposing one on her anyway. What if her physician says there&apos;s no need for an ultrasound? It doesn&apos;t matter; Republican politicians in Wisconsin have decided to put themselves between patients and their doctors." />
                      <outline text="And of course, insurance companies won&apos;t cover an ultrasound unless it&apos;s medically indicated, so the cost falls fully on the patient, who probably can&apos;t afford it! (If she could afford it, she&apos;d fly to a sane state for her abortion.)" />
                      <outline text="This, we&apos;re told, is the result of sensible policymaking from advocates of limited government." />
                      <outline text="But the way in which the Wisconsin governor signed this legislation into law adds insult to injury (in this case, almost literally). Scott Walker could have approved the measure in any number of ways, but he chose to do so privately, over the course of a holiday weekend, when the governor apparently thought it&apos;d generate less attention." />
                      <outline text="There is, in other words, a degree of cowardice here -- if Walker thought he was doing the right thing, signing a measure with broad support into law, he wouldn&apos;t have been reduced to hiding." />
              </outline>

              <outline text="Decorated, wounded Marine treated &apos;shamefully&apos; by security screeners | Army Times | armytimes.com">
                      <outline text="Link to Article" type="link" url="http://www.armytimes.com/article/20130705/NEWS/307050026/Decorated-wounded-Marine-treated-shamefully-by-security-screeners" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373319943_SwbzcjSm.html" />
      <outline text="Mon, 08 Jul 2013 21:45" />
                      <outline text="" />
                      <outline text="Wearing the uniform of the Few and Proud doesn&apos;t rate preferential treatment from the Transportation Security Administration or California capitol security officers, retired Marine Cpl. Nathan Kemnitz recently found." />
                      <outline text="Kemnitz, severely injured in 2004 in a roadside bomb attack in Fallujah, has limited use of his right arm and cannot lift it above his head. So when security guards at the state capitol building in Sacramento, Calif., asked him to remove his dress blue blouse &apos;&apos;because he was wearing too much metal,&apos;&apos; and TSA asked him to raise his arms above his head for the full-body scanner at Sacramento International Airport, he could not comply." />
                      <outline text="&apos;&apos;My right arm doesn&apos;t work. It&apos;s a lot of hassle for me to do that,&apos;&apos; Kemntiz said." />
                      <outline text="At the state capitol, the Marine&apos;s refusal to remove his uniform top grew into a heated exchange between Kemnitz, a friend who was accompanying him and security officers." />
                      <outline text="At the airport, bystanders stared as the TSA security screener looked under Kemnitz&apos;s medals, ran his hands under the Marine&apos;s waistband and swabbed his shoes for explosives." />
                      <outline text="&apos;&apos;What does a uniform and heroism represent if our own citizens &apos;-- in this case employees of the TSA and security personnel &apos;-- have no regard for them?&apos;&apos; wrote Kemnitz&apos;s escort, Patricia Martin, to Veterans Affairs Secretary Eric Shinseki following the incidents." />
                      <outline text="Martin took photos and disseminated them to family, friends and members of the media." />
                      <outline text="&apos;&apos;I feel so strongly that you need to know just how shamefully even a Purple Heart recipient/disabled veteran can be treated by some TSA and security employees,&apos;&apos; she said." />
                      <outline text="Kemnitz said after the incidents that he was not as annoyed with TSA officers as he was with a security screener at the California state capitol, whom he described as rude and unapologetic." />
                      <outline text="Kemnitz was visiting the building to be honored as his legislative district&apos;s veteran of the year." />
                      <outline text="&apos;&apos;At some places I&apos;m treated like royalty and at some like a terrorist. There&apos;s got to be something in the middle,&apos;&apos; he said." />
                      <outline text="The incident was not the first to spark similar outrage. In January, NBC journalist Luke Russert tweeted his irritation at an enhanced security screening at Reagan National Airport of a troop wearing a prosthetic." />
                      <outline text="&apos;&apos;Making Wounded Warriors with prosthetic legs go through extra explosives screening. #fail,&apos;&apos; Russert wrote." />
                      <outline text="In March, bystanders notified Rep. Duncan Hunter, R-Calif., about what they perceived to be maltreatment of a double amputee by TSA screeners at Phoenix&apos;s Sky Harbor Airport." />
                      <outline text="Concurrent with that incident, TSA announced it had changed its rules to eliminate a requirement that injured troops remove their shoes, jackets or hats. But to receive the expedited service, TSA asks affected personnel to call the agency&apos;s Military Severely Injured Joint Service Operations Center before traveling." />
                      <outline text="TSA also offers escorted &apos;&apos;curb-to-gate service&apos;&apos; for injured or ill personnel who request it as well as the TSA Pre program to service members with a military common access card at four airports: Charlotte Douglas International Airport in North Carolina, Ronald Reagan Washington National Airport, Seattle-Tacoma International Airport, and Washington Dulles International Airport." />
                      <outline text="The Senate Sergeant-At-Arms is responsible for security screenings at the California capitol building. No one was available Friday to speak with the media regarding the incident." />
              </outline>

              <outline text="Obama on signing statements and fisa">
                      <outline text="Link to Article" type="link" url="http://www.boston.com/news/politics/2008/specials/CandidateQA/ObamaQA/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373319203_4vVgzjmA.html" />
      <outline text="Mon, 08 Jul 2013 21:33" />
                      <outline text="" />
                      <outline text="1. Does the president have inherent powers under the Constitution to conduct surveillance for national security purposes without judicial warrants, regardless of federal statutes?" />
                      <outline text="The Supreme Court has never held that the president has such powers. As president, I will follow existing law, and when it comes to U.S. citizens and residents, I will only authorize surveillance for national security purposes consistent with FISA and other federal statutes." />
                      <outline text="2. In what circumstances, if any, would the president have constitutional authority to bomb Iran without seeking a use-of-force authorization from Congress? (Specifically, what about the strategic bombing of suspected nuclear sites -- a situation that does not involve stopping an IMMINENT threat?)" />
                      <outline text="The President does not have power under the Constitution to unilaterally authorize a military attack in a situation that does not involve stopping an actual or imminent threat to the nation." />
                      <outline text="As Commander-in-Chief, the President does have a duty to protect and defend the United States. In instances of self-defense, the President would be within his constitutional authority to act before advising Congress or seeking its consent. History has shown us time and again, however, that military action is most successful when it is authorized and supported by the Legislative branch. It is always preferable to have the informed consent of Congress prior to any military action." />
                      <outline text="As for the specific question about bombing suspected nuclear sites, I recently introduced S.J. Res. 23, which states in part that &apos;&apos;any offensive military action taken by the United States against Iran must be explicitly authorized by Congress.&apos;&apos; The recent NIE tells us that Iran in 2003 halted its effort to design a nuclear weapon. While this does not mean that Iran is no longer a threat to the United States or its allies, it does give us time to conduct aggressive and principled personal diplomacy aimed at preventing Iran from developing nuclear weapons." />
                      <outline text="3. Does the Constitution empower the president to disregard a congressional statute limiting the deployment of troops -- either by capping the number of troops that may be deployed to a particular country or by setting minimum home-stays between deployments? In other words, is that level of deployment management beyond the constitutional power of Congress to regulate?" />
                      <outline text="No, the President does not have that power. To date, several Congresses have imposed limitations on the number of US troops deployed in a given situation. As President, I will not assert a constitutional authority to deploy troops in a manner contrary to an express limit imposed by Congress and adopted into law." />
                      <outline text="4. Under what circumstances, if any, would you sign a bill into law but also issue a signing statement reserving a constitutional right to bypass the law?" />
                      <outline text="Signing statements have been used by presidents of both parties, dating back to Andrew Jackson. While it is legitimate for a president to issue a signing statement to clarify his understanding of ambiguous provisions of statutes and to explain his view of how he intends to faithfully execute the law, it is a clear abuse of power to use such statements as a license to evade laws that the president does not like or as an end-run around provisions designed to foster accountability." />
                      <outline text="I will not use signing statements to nullify or undermine congressional instructions as enacted into law. The problem with this administration is that it has attached signing statements to legislation in an effort to change the meaning of the legislation, to avoid enforcing certain provisions of the legislation that the President does not like, and to raise implausible or dubious constitutional objections to the legislation. The fact that President Bush has issued signing statements to challenge over 1100 laws &apos;&apos; more than any president in history &apos;&apos; is a clear abuse of this prerogative. No one doubts that it is appropriate to use signing statements to protect a president&apos;s constitutional prerogatives; unfortunately, the Bush Administration has gone much further than that." />
                      <outline text="5. Does the Constitution permit a president to detain US citizens without charges as unlawful enemy combatants?" />
                      <outline text="No. I reject the Bush Administration&apos;s claim that the President has plenary authority under the Constitution to detain U.S. citizens without charges as unlawful enemy combatants." />
                      <outline text="6. Does executive privilege cover testimony or documents about decision-making within the executive branch not involving confidential advice communicated to the president himself?" />
                      <outline text="With respect to the &apos;&apos;core&apos;&apos; of executive privilege, the Supreme Court has not resolved this question, and reasonable people have debated it. My view is that executive privilege generally depends on the involvement of the President and the White House." />
                      <outline text="7. If Congress defines a specific interrogation technique as prohibited under all circumstances, does the president&apos;s authority as commander in chief ever permit him to instruct his subordinates to employ that technique despite the statute?" />
                      <outline text="No. The President is not above the law, and the Commander-in-Chief power does not entitle him to use techniques that Congress has specifically banned as torture. We must send a message to the world that America is a nation of laws, and a nation that stands against torture. As President I will abide by statutory prohibitions, and have the Army Field Manual govern interrogation techniques for all United States Government personnel and contractors." />
                      <outline text="8. Under what circumstances, if any, is the president, when operating overseas as commander-in-chief, free to disregard international human rights treaties that the US Senate has ratified?" />
                      <outline text="It is illegal and unwise for the President to disregard international human rights treaties that have been ratified by the United States Senate, including and especially the Geneva Conventions. The Commander-in-Chief power does not allow the President to defy those treaties." />
                      <outline text="9. Do you agree or disagree with the statement made by former Attorney General Gonzales in January 2007 that nothing in the Constitution confers an affirmative right to habeas corpus, separate from any statutory habeas rights Congress might grant or take away?" />
                      <outline text="Disagree strongly." />
                      <outline text="10. Is there any executive power the Bush administration has claimed or exercised that you think is unconstitutional? Anything you think is simply a bad idea?" />
                      <outline text="First and foremost, I agree with the Supreme Court&apos;s several decisions rejecting the extreme arguments of the Bush Administration, most importantly in the Hamdi and Hamdan cases. I also reject the view, suggested in memoranda by the Department of Justice, that the President may do whatever he deems necessary to protect national security, and that he may torture people in defiance of congressional enactments. In my view, torture is unconstitutional, and certain enhanced interrogation techniques like &apos;&apos;waterboarding&apos;&apos; clearly constitute torture. And as noted, I reject the use of signing statements to make extreme and implausible claims of presidential authority." />
                      <outline text="Some further points:" />
                      <outline text="The detention of American citizens, without access to counsel, fair procedure, or pursuant to judicial authorization, as enemy combatants is unconstitutional." />
                      <outline text="Warrantless surveillance of American citizens, in defiance of FISA, is unlawful and unconstitutional." />
                      <outline text="The violation of international treaties that have been ratified by the Senate, specifically the Geneva Conventions, was illegal (as the Supreme Court held) and a bad idea." />
                      <outline text="The creation of military commissions, without congressional authorization, was unlawful (as the Supreme Court held) and a bad idea." />
                      <outline text="I believe the Administration&apos;s use of executive authority to over-classify information is a bad idea. We need to restore the balance between the necessarily secret and the necessity of openness in our democracy &apos;&apos; which is why I have called for a National Declassification Center." />
                      <outline text="11. Who are your campaign&apos;s advisers for legal issues?" />
                      <outline text="Laurence Tribe, Professor of Law, Harvard University" />
                      <outline text="Cass Sunstein, Professor of Law, University of Chicago" />
                      <outline text="Jeh C. Johnson, former General Counsel of Department of the Air Force (1998-2001)" />
                      <outline text="Gregory Craig, former Assistant to the President and Special Counsel (1998-1999), former Director of Policy Planning for U.S. Department of State (1997-1998)" />
                      <outline text="12. Do you think it is important for all would-be presidents to answer questions like these before voters decide which one to entrust with the powers of the presidency? What would you say about any rival candidate who refuses to answer such questions?" />
                      <outline text="Yes, these are essential questions that all the candidates should answer. Any President takes an oath to, &apos;&apos;preserve, protect and defend the Constitution of the United States.&quot; The American people need to know where we stand on these issues before they entrust us with this responsibility &apos;&apos; particularly at a time when our laws, our traditions, and our Constitution have been repeatedly challenged by this Administration." />
                      <outline text="(C) Copyright 2008 Globe Newspaper Company." />
              </outline>

              <outline text="Who&apos;s In Charge Of The FISA Court? John Roberts, And Apparently Just John Roberts">
                      <outline text="Link to Article" type="link" url="http://www.outsidethebeltway.com/whos-in-charge-of-the-fisa-court-john-roberts-and-apparently-just-john-roberts/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373318823_gS8fVYv4.html" />
      <outline text="Mon, 08 Jul 2013 21:27" />
                      <outline text="" />
                      <outline text="When it comes to the Foreign Intelligence Surveillance Court, which isn&apos;t so much a Court unto itself as it is a rotating group of Federal Judges appointed to hear warrant requests and other matter designated as appropriate for secret proceedings under the Foreign Intelligence Surveillance Act, there&apos;s nobody more powerful than Chief Justice John Roberts:" />
                      <outline text="The 11 FISA judges, chosen from throughout the federal bench for seven-year terms, are all appointed by the chief justice. In fact, every FISA judge currently serving was appointed by Roberts, who will continue making such appointments until he retires or dies. FISA judges don&apos;t need confirmation &apos;-- by Congress or anyone else." />
                      <outline text="No other part of U.S. law works this way. The chief justice can&apos;t choose the judges who rule on health law, or preside over labor cases, or decide software patents. But when it comes to surveillance, the composition of the bench is entirely in his hands, and, as a result, so is the extent to which the National Security Agency and the Federal Bureau of Investigation can spy on citizens." />
                      <outline text="&apos;&apos;It really is up to these FISA judges to decide what the law means and what the NSA and FBI gets to do,&apos;&apos; said Julian Sanchez, a privacy scholar at the Cato Institute. &apos;&apos;So Roberts is single-handedly choosing the people who get to decide how much surveillance we&apos;re subject to.&apos;&apos;" />
                      <outline text="One some level, I suppose this makes sense. Like James Joyner, I accept the general idea of the need for a Court that conducts secret, or to use the precise legal terminology sealed, proceedings when dealing with matters as potentially sensitive as requests from law enforcement to conduct surveillance on people who may be agents of foreign governments or involved with foreign terrorist elements. Because all warrant requests in a normal Federal District Court are matters of public record, it would simply be impractical and unwise for those matters to be easily accessible on the public record in a manner that could potentially tip off targets of an investigation. Indeed, even in these courts there are procedures that allow law enforcement to keep their warrant requests, Criminal Complaints, and even Grand Jury Indictments under seal until its felt advisable to make them public. That works in the odd case here and there, but it&apos;s easy to see how things could fall through the cracks if FISA cases were all processed through a non-FISA Court." />
                      <outline text="It&apos;s also easy to see how it is that the Chief Justice ended up being the person responsible for staffing the FISA Court itself.. In addition to heading the Supreme Court, Roberts, whose official title is Chief Justice of the United States, sits at the top of the entire Federal Judiciary. The Court&apos;s administrative arm reports directly to  him, for example, and he directly involved in the preparation and presentation of the Judiciary Department&apos;s budget request to Congress each year, among other administrative responsibilities. When the FISA law was adopted in 1978, Congress no doubt saw the idea of the Chief Justice making these appointments, from among a group of Federal Judges who had already been confirmed to lifetime appointments by the Senate, as the best and most efficient manner in which to staff the Court. Ezra Klein, though, sees a danger of group think setting in:" />
                      <outline text="Roberts&apos;s nominations to the FISA court are almost exclusively Republican. One of his first appointees, for instance, was Federal District Judge Roger Vinson of Florida, who not only struck down the Affordable Care Act&apos;s individual mandate but the rest of the law, too. (The Supreme Court disagreed.) Vinson&apos;s term expired in May, but the partisan tilt on the court continues: Only one of the 11 members is a Democrat." />
                      <outline text="Critics contend the FISA court is too compromised to conduct genuine oversight. It meets in secret, and the presiding judge hears only the government&apos;s argument before issuing a decision that can&apos;t be appealed or even reviewed by the public. &apos;&apos;Like any other group that meets in secret behind closed doors with only one constituency appearing before them, they&apos;re subject to capture and bias,&apos;&apos; said Elizabeth Goitein, co-director of the Brennan Center for Justice&apos;s Liberty and National Security Program." />
                      <outline text="A Reuters investigation found that from 2001 to 2012, FISA judges approved 20,909 surveillance and property search warrants while rejecting only 10. Almost 1,000 of the approved requests required modification, and 26 were withdrawn by the government before a ruling. That&apos;s a startling win rate for the government." />
                      <outline text="(&apos;...)" />
                      <outline text="The FISA court is composed of federal judges. All are appointed by the same man. All but one hail from the same political party. And unlike judges in normal courts, FISA judges don&apos;t hear opposing testimony or feel pressure from colleagues or the public to moderate their rulings. Under these circumstances, group polarization is almost a certainty. &apos;&apos;There&apos;s the real possibility that these judges become more extreme over time, even when they had only a mild bias to begin with,&apos;&apos; Cato&apos;s Sanchez said." />
                      <outline text="Just as the likelihood of polarization in the FISA court is more pronounced than in normal courts, the stakes are also higher. If trial judges are unduly biased, their rulings can be overturned on appeal. But FISA judges decide the momentous questions of whom the government may spy on and how. Their power is awesome, and their word is final. As the great legal scholar Kanye West said, no one man should have all that power." />
                      <outline text="To be fair, there are explanations other than partisanship that likely account for the largely Republican makeup of FISA Judges under Roberts tenure today. Judging from this list of recent Judges on the Court, it seems quite apparent that there is a bias toward appointing older and more experienced Judges to this Court. For example, Judge Vinson, who Klein specifically mentions in the quote above, was appointed to the Court in 2006, his 23rd year on the Federal Bench. Former members of the FISA Court Judge Thomas Hogan and Judge Claude Hilton were also appointed well into the second decade of their time on the bench. There are understandable reasons why this would be the case. Given the sensitive and complicated nature of the cases that FISA Judges it&apos;s not at all surprising that Roberts&apos; selections for this assignment would be drawn from more senior members of the Judiciary and, right now, that is primarily made up of judges appointed between 1981 and 1989 by Presidents Reagan and George H.W Bush. So, it&apos;s likely less a conspiracy or blatant partisanship than it is a pure accident of history. The seven year length of service on the FISA Court also contributes to this to some extent. Give it 5-10 years and we&apos;ll start seeing Judges appointed by President Clinton appointed to FISA assignments." />
                      <outline text="Leaving that aside, though, Klein does make some good points. The secret and one-sided nature of the Court&apos;s proceedings make it likely that FISA Judges are likely to be biased toward the government, but I&apos;d be interested to see whether there&apos;s really that much of a difference between FISA proceedings and those in a normal Federal District Court. When law enforcement applies for a warrant to a U.S. District Court Judge, they don&apos;t give notice to the party they are seeking to execute it against, or any third parties that may be impacted by it. The difference, of course, is that the applications are generally public and can be subjected to further review. Nonetheless, it&apos;s largely the case that Judges grant warrant requests far more than they grant them (though admittedly not with the &apos;&apos;success&apos;&apos; rate of the FISA Court) so I&apos;m not sure it&apos;s correct to single out the FISA Court, or the fact that the Judges on it are all appointed by one man." />
              </outline>

              <outline text="VIDEO-Cameras Catch Mystery Break-In at Whistleblower&apos;s Law Firm | The Cable">
                      <outline text="Link to Article" type="link" url="http://thecable.foreignpolicy.com/posts/2013/07/07/cameras_catch_mystery_break_in_at_whistleblowers_law_firm" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373318768_ehkz8UbE.html" />
      <outline text="Mon, 08 Jul 2013 21:26" />
                      <outline text="" />
                      <outline text="The offices of a Dallas law firm representing a high-profileState Department whistleblower were broken into last weekend. Burglars stolethree computers and broke into the firm&apos;s file cabinets. But silver bars, videoequipment and other valuables were left untouched, according to local Fox affiliate KDFW, which aired securitycamera footage of the suspected burglars entering and leaving the officesaround the time of the incident." />
                      <outline text="The firm Schulman &amp; Mathias represents Aurelia Fedenisn, aformer investigator at the State Department&apos;s Office of the Inspector General.In recent weeks, she raised a slew of explosive allegations against thedepartment and its contractors ranging from illicit drug use, soliciting sexual favors from minors and prostitutesand sexual harassment." />
                      <outline text="&quot;It&apos;s a crazy, strange and suspicious situation,&quot; attorney CarySchulman told The Cable. &quot;It&apos;s clearto me that it was somebody looking for information and not money. My mosthigh-profile case right now is the Aurelia Fedenisn case, and I can&apos;t think ofany other case where someone would go to these great lengths to get ourinformation.&quot; " />
                      <outline text="According to the KDFW report, the firm was the only suiteburglarized in the high-rise office building and an unlocked office adjacentwas left untouched." />
                      <outline text="The State Department, which has repeatedly disputed Fedenisn&apos;sallegations, denied any involvement in the incident. &quot;Any allegation that theDepartment of State authorized someone to break into Mr. Schulman&apos;s law firm isfalse and baseless,&quot; spokeswoman Jen Psaki said." />
                      <outline text="After assessing the surveillance footage, Schulman said hebelieved the motivations were likely political, but did not suspect departmentinvolvement. &quot;It wasn&apos;t professional enough,&quot; he said. &quot;It is possible that anObama or Hillary supporter feels that I am unfairly going after them. And thetiming of this is right after several weeks of very public media attention soit seems to me most likely that the information sought is related to that case.I don&apos;t know for sure and I want the police to do their work.&quot;" />
                      <outline text="Fedenisn&apos;s case, in particular, has gained attention not justbecause of the substance of the allegations, but for her insistence that internal investigations intomisconduct were &quot;influenced, manipulated or simply called off&quot; by senior StateDepartment officials. The suppression of investigations was noted in an earlydraft of an Inspector General report she gave to CBS News, but softened in thefinal version." />
                      <outline text="Last month, her lawyers told The Cablethat the department tried to intimidate her into silence. &quot;They had lawenforcement officers camp out in front of her house, harass her children andattempt to incriminate herself,&quot; claimed Schulman." />
                      <outline text="Schulman said the purpose of the visit was to get Fedenisn tosign documents admitting that she stole State Department documents -- a chargeFedenisn denies." />
                      <outline text="Schulman &amp; Mathias represent a range ofclients on matters from fraud to wrongful death to bad faith insurancepractices to medical malpractice. Any number of those cases could&apos;ve exposed thefirm to such a break in, but Schulman said he was skeptical. &quot;I&apos;m involved inother cases locally, but those cases are rather stale.&quot;" />
              </outline>

              <outline text="VIDEO-C-SPAN Callers Won&apos;t Shut Up About 9/11 Inside Job - YouTube">
                      <outline text="Link to Article" type="link" url="http://www.youtube.com/watch?v=bHAiB7tOeGo" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373318723_nMdAK2W3.html" />
      <outline text="Mon, 08 Jul 2013 21:25" />
                      <outline text="" />
              </outline>

              <outline text="Somali American caught up in a shadowy Pentagon counterpropaganda campaign - The Washington Post">
                      <outline text="Link to Article" type="link" url="http://www.washingtonpost.com/world/national-security/somali-american-caught-up-in-a-shadowy-pentagon-counterpropaganda-campaign/2013/07/07/b3aca190-d2c5-11e2-bc43-c404c3269c73_story.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373317966_XBPvhb48.html" />
      <outline text="Mon, 08 Jul 2013 21:12" />
                      <outline text="" />
                      <outline text="In MINNEAPOLIS &apos;-- Two days after he became a U.S. citizen, Abdiwali Warsame embraced the First Amendment by creating a raucous Web site about his native Somalia. Packed with news and controversial opinions, it rapidly became a magnet for Somalis dispersed around the world, including tens of thousands in Minnesota." />
                      <outline text="The popularity of the site, Somalimidnimo.com, or United Somalia, also attracted the attention of the Defense Department. A military contractor, working for U.S. Special Operations forces to &apos;&apos;counter nefarious influences&apos;&apos; in Africa, began monitoring the Web site and compiled a confidential research dossier about its founder and its content." />
                      <outline text="In a May 2012 report, the contractor, the Northern Virginia-based Navanti Group, branded the Web site &apos;&apos;extremist&apos;&apos; and asserted that its &apos;&apos;chief goal is to disseminate propaganda supportive&apos;&apos; of al-Shabab, an Islamist militia in Somalia that the U.S. government considers a terrorist group. The contractor then delivered a copy of its dossier &apos;-- including Warsame&apos;s Minnesota home address and phone number &apos;-- to the FBI. A few days later, federal agents knocked on the webmaster&apos;s door." />
                      <outline text="Although he did not know it, Warsame had been caught up in a shadowy Defense Department counterpropaganda operation, according to public records and interviews." />
                      <outline text="In its written analysis of his Web site, Navanti Group identified &apos;&apos;opportunities&apos;&apos; to conduct &apos;&apos;Military Information Support Operations,&apos;&apos; more commonly known as psychological operations, or &apos;&apos;psy-ops,&apos;&apos; that would target Somali audiences worldwide. The report did not go into details, but it recommended that the U.S. military consider a &apos;&apos;messaging campaign&apos;&apos; by repeating comments posted on the United Somalia Web site by readers opposed to al-Shabab." />
                      <outline text="Military propaganda and the spread of disinformation are as old as war itself, but commanders usually confined the tactics to war zones." />
                      <outline text="With the Iraq war over and U.S. combat operations scheduled to finish in Afghanistan by the end of next year, however, the Pentagon has begun shifting psy-ops missions to other parts of the world to influence popular opinion. Many of the missions are overseen by the Special Operations Command, which plays a leading role in global counterterrorism efforts." />
                      <outline text="In the past, psychological operations usually meant dropping leaflets or broadcasting propaganda on the battlefield. Today, the military is more focused on manipulating news and commentary on the Internet, especially social media, by posting material and images without necessarily claiming ownership." />
                      <outline text="Much of the work is carried out by military information support teams that the Special Operations Command has deployed to 22 countries. The command, which is based in Tampa, also operates multilingual news Web sites tailored to specific regions." />
                      <outline text="The Southeast European Times covers the Balkans with original news dispatches and feature stories written in 10 languages. Magharebia covers North and West Africa in Arabic, French and English. Readers have to scour the Web sites to find an acknowledgment that they are sponsored by the U.S. military." />
              </outline>

              <outline text="VIDEO- REALLY? Edward Snowden: &apos;The US government will say I aided our enemies&apos; &apos;&apos; video interview | World news | guardian.co.uk">
                      <outline text="Link to Article" type="link" url="http://www.guardian.co.uk/world/video/2013/jul/08/edward-snowden-video-interview" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373316707_kqjbKfMc.html" />
      <outline text="Mon, 08 Jul 2013 20:51" />
                      <outline text="" />
                      <outline text="Glenn Greenwald on security and libertyPrevious |Next |IndexIn the second part of an exclusive interview with Glenn Greenwald and Laura Poitras, former NSA contractor Edward Snowden contemplates the reaction from the US government to his revelations of top-secret documents regarding its spying operations on domestic and foreign internet traffic, email and phone use. This interview was recorded in Hong Kong on 6 June 2013" />
                      <outline text="&apos; Watch the first part of the exclusive interview with Edward Snowden" />
                      <outline text="&apos; Read the Guardian&apos;s full NSA files coverage" />
                      <outline text="Laura Poitras and Glenn Greenwald in Hong KongSource: Guardian USLength: 7min 07secMonday 8 July 2013Share       Tweet this        Email  Share Autoplay settings Send to a friendSender&apos;s name" />
                      <outline text="Recipient&apos;s email address" />
                      <outline text="Your IP address will be logged" />
                      <outline text="Video play settingsAutoplay is on | Turn autoplay off" />
                      <outline text="Turn autoplay on | Autoplay is off" />
                      <outline text="When autoplay is on, videos on these pages will autoplay" />
                      <outline text="More about our videos" />
                      <outline text="Please activate cookies in order to turn autoplay off" />
                      <outline text="More about our videos" />
                      <outline text="ShareShort link for this page:http://gu.com/p/3h634StumbleUponredditTumblrDiggLinkedInGoogle Bookmarksdel.icio.uslivejournalFacebookTwitterEmbed videoCopy and paste the embed code below" />
                      <outline text="Terms and conditions of use" />
              </outline>

              <outline text="NSA Rejecting Every FOIA Request Made by U.S. Citizens">
                      <outline text="Link to Article" type="link" url="http://www.tikkun.org/tikkundaily/2013/07/06/nsa-rejecting-every-foia-request-made-by-u-s-citizens/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373315695_caHZkxUh.html" />
      <outline text="Mon, 08 Jul 2013 20:34" />
                      <outline text="" />
                      <outline text="Clayton Seymour, a 36-year-old IT specialist from Hilliard, Ohio, recently sent a Freedom of Information Act (FOIA) request to the NSA, curious as to whether any data about him was being collected." />
                      <outline text="What he received in response made his blood boil." />
                      <outline text="&apos;&apos;I am a generally law abiding citizen with nothing I can think of that would require monitoring,&apos;&apos; Seymour wrote to me, &apos;&apos;but I wanted to know if I was having data collected about me and if so, what.&apos;&apos;" />
                      <outline text="So Seymour sent in an FOIA request. Weeks later, a letter from the NSA arrived explaining that he was not entitled to any information. &apos;&apos;When I got the declined letter, I was furious,&apos;&apos; he told me. &apos;&apos;I feel betrayed.&apos;&apos;" />
                      <outline text="Seymour had decided to request his NSA file after coming across a recent post of mine instructing Americans on how to properly request such files from the FBI and NSA. A Navy vet and two-time Obama voter who supported the President&apos;s platform of greater governmental transparency, Seymour was shocked by the letter he received." />
                      <outline text="The letter, which first acknowledges the media coverage surrounding its surveillance systems, quickly moves to justify why none of that data can be obtained by an American citizen in a standard FOIA request:" />
                      <outline text="Seymour isn&apos;t the only one who has recently had an FOIA request denied by the NSA &apos;&apos; dozens of citizens have emailed me to say they&apos;ve received a similar, if not identical, letter. And it&apos;s clear from the exemption the NSA is using that every single American is having their FOIA requests similarly rejected." />
                      <outline text="Unjustly so." />
                      <outline text="It should be noted that there are legitimate exemptions to the Freedom of Information Act, the first of which states that documents requested may be denied if they are &apos;&apos;properly classified as secret in the interest of national defense or foreign policy.&apos;&apos;" />
                      <outline text="However, the central problem is this: Seymour&apos;s letter from the NSA points to Executive Order 13526, signed by President Obama in 2009, as justification for the NSA&apos;s FOIA exemption." />
                      <outline text="This order signed by Obama established a uniform system for classifying national security information, and stipulates that &apos;&apos;information shall not be considered for classification unless its unauthorized disclosure could reasonably be expected to cause identifiable or describable damage to the national security.&apos;&apos;" />
                      <outline text="This qualification appears in section 1.4 of the executive order, after which follow many categories of information which may be marked as classified. The category the NSA points to in justifying the classification of all its data is this:" />
                      <outline text="(c) intelligence activities (including covert action), intelligence sources or methods, or cryptology" />
                      <outline text="Meaning: the NSA is classifying every single bit of data it receives from ordinary American citizens based on the premise that it has been gathered covertly." />
                      <outline text="Meaning: the NSA&apos;s advertised justification for not granting FOIA requests is to protect our country. However, the real justification is the NSA&apos;s covert violation of Americans&apos; Fourth Amendment right not to be subject to unwarranted searches and seizures (in this case of their personal, digital data)." />
                      <outline text="The NSA, it seems, has classified every single piece of data on American citizens that it has seized and saved, even benign data culled from people like Seymour, who are no threat to U.S. national security." />
                      <outline text="&apos;&apos;I believe in the concept of America,&apos;&apos; Seymour told me. &apos;&apos;[But] not its current execution.&apos;&apos;" />
                      <outline text="I sense the Founding Fathers would agree with him." />
                      <outline text="Follow David Harris-Gershon on Twitter@David_EHG" />
                      <outline text=" " />
              </outline>

              <outline text="Bad Bankers Face Criminal Charges And Jail">
                      <outline text="Link to Article" type="link" url="http://news.sky.com/story/1112996/bad-bankers-face-criminal-charges-and-jail" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373315360_FCwcrwkW.html" />
      <outline text="Mon, 08 Jul 2013 20:29" />
                      <outline text="" />
                      <outline text="Reckless bankers could face criminal charges and jail after the Chancellor pledged to implement most of the recommendations produced by the Parliamentary Commission on Banking Standards." />
                      <outline text="George Osborne is also backing calls for tighter control of bonuses but he has rejected the Commission&apos;s recommendation that UK Financial Investments (UKFI) - the body that handles the state&apos;s holdings in the Royal Bank of Scotland and Lloyds Banking Group - be abolished." />
                      <outline text="In a statement, the Government set out key proposals from the commission to be added to the banking reform Bill in the autumn." />
                      <outline text="These are to include a new offence of &quot;reckless misconduct&quot; for senior bankers, with those found guilty facing a possible jail sentence." />
                      <outline text="Lloyds then RBS face returns to private ownership after taxpayer bailoutsMr Osborne also backed moves to allow bonuses to be deferred for up to 10 years and enable 100% &quot;claw back&quot; of bonuses where banks are propped up by the state." />
                      <outline text="Further measures, designed to improve competition, will include asking the new payments regulator to look into making it easier to switch between accounts, and beefing up the role of the new Prudential Regulation Authority." />
                      <outline text="Labour has accused the Government of ducking radical reforms and is demanding that ministers explain how it will protect taxpayers&apos; interests when the state-owned stakes in Lloyds and RBS are sold off." />
                      <outline text="The commission, chaired by Conservative MP Andrew Tyrie, was set up by the Chancellor in the wake of the financial crisis and the Libor rate-rigging scandal." />
                      <outline text="Mr Osborne said the main recommendations of its report, published last month, were being delivered." />
                      <outline text="He said cultural reform was necessary in banking &quot;to move the whole sector from rescue to recovery and ensure that UK banks demonstrate the highest standards, and are able to support business and drive economic growth.&quot;" />
                      <outline text="He added: &quot;The Government is determined to raise standards across the banking industry to create a stronger and safer banking system.&quot;" />
                      <outline text="Business Secretary Vince Cable said: &quot;If we&apos;re to get our economy back on track, we need to get the banking system back on track first." />
                      <outline text="&quot;Creating new powers to jail bankers who are reckless with other people&apos;s money and getting more competition into banking, is a start.&quot;" />
                      <outline text=" " />
              </outline>

              <outline text="Vulnerability Note VU#662676 - Digital Alert Systems DASDEC and Monroe Electronics R189 One-Net firmware exposes private root SSH key">
                      <outline text="Link to Article" type="link" url="http://www.kb.cert.org/vuls/id/662676" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373312253_NFWGpCjM.html" />
      <outline text="Mon, 08 Jul 2013 19:37" />
                      <outline text="" />
                      <outline text="Original Release date: 26 Jun 2013 | Last revised: 02 Jul 2013" />
                      <outline text="OverviewDigital Alert Systems DASDEC and Monroe Electronics One-Net E189 Emergency Alert System (EAS) devices exposed a shared private root SSH key in publicly available firmware images. An attacker with SSH access to a device could use the key to log in with root privileges." />
                      <outline text="DescriptionThe Digital Alert Systems DASDEC-I and DASDEC-II and Monroe Electronics R189 One-Net/R189SE One-NetSE are Linux-based EAS encoder/decoder (ENDEC) devices that are used to broadcast EAS messages over digital and analog channels. IOActive has reported several security issues affecting these devices. The most severe of these issues is the public disclosure of the default private root SSH key. The less severe issues could also contribute to an attacker&apos;s ability to compromise a vulnerable device." />
                      <outline text="Compromised root SSH key(CVE-2013-0137)Publicly available firmware images for these devices included a private root SSH key that was authorized to log in to the devices (CWE-798, CWE-321). The fingerprint for the compromised SSH key is 0c:89:49:f7:62:d2:98:f0:27:75:ad:e9:72:2c:68:c3. Although this key is not hard-coded, it may be impractical for less technical users to manually disable or change they key prior to firmware version 2.0-2." />
                      <outline text="Predictable session IDIOActive reports that the administrative web server uses a predictable, monotonically increasing session ID. This finding is based on running the web server in a test environment. Testing on a variety of firmware versions on devices both at the factory and in the field, Monroe Electronics could not reproduce this finding." />
                      <outline text="Log information disclosureLogs available via the web server provide a variety of information about the configuration, operation, and status of the device (CWE-532). Some of the log information is public and may be required by regulation." />
                      <outline text="Predictable password generationThe dasdec_mkuser script generates passwords in a deterministic way (CWE-341), however these passwords are not for administrative access, and the script is not used for general user account configuration." />
                      <outline text="Default passwordLike many similar devices, the DASDEC and One-Net ENDECs use default administrative credentials. Some sites fail to change the default administrative password and allow unrestricted internet access." />
                      <outline text="ImpactAn attacker with the private key and SSH access can log in to a device with root privileges." />
                      <outline text="Predictable session IDs could allow an attacker to take control of an existing administrative web session." />
                      <outline text="Predictable and unchanged default passwords can allow an attacker to log in to a device with root privileges. Devices exposed to the internet are at particularly high risk, for example, see Secure EAS Codecs Prevent Zombie Attacks and US-CERT Alert TA13-175A." />
                      <outline text="Logs may disclose configuration information that can benefit an attacker." />
                      <outline text="SolutionApply an update" />
                      <outline text="On April 24, 2013, Monroe Electronics and Digital Alert Systems released firmware version 2.0-2 that disables the compromised SSH key, provides a simplified user option to install new unique keys, and enforces a new password policy. Monroe Electronics has taken considerable effort to provide update information to DASDEC and One-NetSE users." />
                      <outline text="DASDEC users can obtain updated firmware and release notes by contacting . R189 One-Net users can contact ." />
                      <outline text="Disable compromised SSH key" />
                      <outline text="The compromised root SSH key should be disabled immediately, especially if the SSH service is exposed to untrusted networks such as the internet. If SSH connectivity is required, generate, install, and test new SSH keys before disabling the compromised key. The fingerprint for the compromised SSH key is 0c:89:49:f7:62:d2:98:f0:27:75:ad:e9:72:2c:68:c3." />
                      <outline text="Manually inspect SSH keys" />
                      <outline text="To identify a compromised key, examine the authorized_keys file at /root/.ssh/authorized_keys2.dasdec and use the ssh-keygen command to show SSH key fingerprints. The following example shows the fingerprint for the compromised key:" />
                      <outline text="$ ssh-keygen -l -f authorized_keys2.dasdec1024 0c:89:49:f7:62:d2:98:f0:27:75:ad:e9:72:2c:68:c3 wood@endec1 (DSA)" />
                      <outline text="Note that ssh-keygen only shows the fingerprint for the first key/line in the file. If authorized_keys2.dasdec contains multiple keys (multiple lines, one key per line), it will be necessary to extract each key (line) to a separate file and run the ssh-keygen command on each key/file. These shell scripts can be used to list and test multiple SSH keys in an authorized_keys file:" />
                      <outline text="To generate new SSH keys, use ssh-kegen.Restrict access" />
                      <outline text="If for some reason you are not able to remove and replace the compromised SSH key, restrict access to the SSH service to highly trusted hosts and networks only. As a general good security practice, restrict access to all services to trusted hosts and networks." />
                      <outline text="Change default passwords" />
                      <outline text="Change any default passwords, and do not deploy production systems without changing default passwords. Search engines like Shodan can index systems exposed to the internet and default passwords are usually documented and well-known. It is often trivial for an attacker to identify and access systems on the internet using default passwords." />
                      <outline text="Vendor Information (Learn More)If you are a vendor and your product is affected, let us know.CVSS Metrics (Learn More)GroupScoreVectorBase10.0AV:N/AC:L/Au:N/C:C/I:C/A:CTemporal8.7E:ND/RL:OF/RC:CEnvironmental6.8CDP:LM/TD:M/CR:ND/IR:M/AR:NDReferencesCreditThanks to Mike Davis and Cesar Cerrudo of IOActive for reporting these issues. Thanks also to Monroe Electronics for their efforts to contact affected users." />
                      <outline text="This document was written by Art Manion." />
                      <outline text="Other InformationCVE IDs:CVE-2013-0137Date Public:24 Jun 2013Date First Published:26 Jun 2013Date Last Updated:02 Jul 2013Document Revision:86FeedbackIf you have feedback, comments, or additional information about this vulnerability, please send us email." />
              </outline>

              <outline text="Hitler&apos;s National Security Court">
                      <outline text="Link to Article" type="link" url="http://mwcnews.net/focus/politics/1270-hitlers-national-security-court.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373292294_xcfjXCAj.html" />
      <outline text="Mon, 08 Jul 2013 14:04" />
                      <outline text="" />
                      <outline text="| Print | E-mail" />
                      <outline text="Tuesday, 16 March 2010 07:38" />
                      <outline text="by Jacob G. HornbergerLet&apos;s make no bones about it. Adolf Hitler, who served as chancellor of Germany from 1933 to 1945, could easily be the inspiration for those here in the United States now calling for the creation of a special national security court for trying terrorists. After all, it was Hitler who first established a national security court, and he did it for the same reason that U.S. proponents are now calling for such a court: the concern that regular courts would fail to convict people that government officials knew were terrorists." />
                      <outline text="Hitler&apos;s national security court, which he established in 1934, was called the People&apos;s Court. It consisted of a tribunal of judges, both civilian and military. There was no trial by jury consisting of regular citizens. The most famous of the lead judges of the People&apos;s Court was a man named Roland Freisler, who presided over the now-famous trials of Hans and Sophie Scholl and the other members of the White Rose." />
                      <outline text="Hitler established the People&apos;s Court after the terrorist bombing of the German parliament building, the Reichstag. After a trial in a regularly constituted German court, many of the people charged with that terrorist act were acquitted, which, needless to say, outraged Hitler as much as it would have outraged current U.S. proponents of a national security court. After all, Hitler argued, those people who were acquitted were terrorists &apos;-- otherwise they wouldn&apos;t have been charged and prosecuted &apos;-- and, therefore, they deserved to be convicted and punished, not acquitted and released." />
                      <outline text="To ensure that terrorists and other criminals were never again acquitted, Hitler established the People&apos;s Court. Like the national security court that some Americans are now advocating for the United States, the purpose of the court was to create the appearance of justice while ensuring that terrorists and other criminals were convicted and punished." />
                      <outline text="Proceedings before the People&apos;s Court would easily serve as a model for U.S. advocates of a national security. The trial of Hans and Sophie Scholl was over in less than an hour. Criminal defense lawyers were expected to remain silent during the proceedings, and did so. Defendants were presumed guilty and treated as such. Hearsay was permitted, as was evidence acquired by torture. There was no due process of law. Confessions could be coerced out of defendants. The judges on the tribunal would berate, humiliate, convict, and then swiftly issue sentences, including the death penalty." />
                      <outline text="For a good example of how a national security court would operate here in the United States, see Part 13 and Part 14 of the great movie Sophie Scholl: The Final Days ." />
                      <outline text="Yes, I know what the American proponents of a national security court would say in response: Just because Hitler was the first to establish such a court doesn&apos;t necessarily mean that it is a bad thing. They would point out that Hitler&apos;s People&apos;s Court had an extremely high conviction rate, and they would claim that it kept the German people safe. Why, perhaps they might even recommend that a bust of Hitler be placed in America&apos;s national security court, much as the U.S. Social Security Administration has posted a bust of Otto von Bismarck, who was known as the Iron Chancellor of Germany, on its Social Security website." />
                      <outline text="Proponents of a U.S. national security court would also undoubtedly point out that Hitler&apos;s National Socialist regime also embraced such much-vaunted American socialist programs as public (i.e., government) schooling, social security, national health care, government-business partnerships, and a military-industrial complex. And they would remind us that Hitler&apos;s socialist autobahn system served as the inspiration for America&apos;s giant boondoggle of a public-works project known as the Interstate Highway System." />
                      <outline text="But shouldn&apos;t the fact that it was Adolf Hitler who first came up with the idea of a national security court to make sure that terrorists and other criminals were duly convicted and punished at least be enough to raise eyebrows among the American people?" />
                      <outline text="Jacob Hornberger is founder and president of The Future of Freedom Foundation." />
                      <outline text="Subscribe via RSS or Email:" />
              </outline>

              <outline text="Surveillance Society: If You Drive, You Get Tracked">
                      <outline text="Link to Article" type="link" url="http://www.blacklistednews.com/Surveillance_Society%3A_If_You_Drive%2C_You_Get_Tracked/27166/0/0/0/Y/M.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373290049_bNVxfP6t.html" />
        <outline text="Source: BlackListedNews.com" type="link" url="http://feeds.feedburner.com/blacklistednews/hKxa" />
      <outline text="Mon, 08 Jul 2013 13:27" />
                      <outline text="" />
                      <outline text="Source: Wolf Richter, Testosterone PitWe&apos;ve been teased for weeks with tantalizing leaks about the NSA, its cohorts in corporate America, and their programs and technologies that capture, store, and mine vast amounts of our personal data obtained from the internet and telecommunications. Data is power. And money. It&apos;s for our own good, we&apos;re told incessantly." />
                      <outline text=" " />
                      <outline text="There are also physical aspects, like video surveillance with facial-recognition technologies and smartphone detectors to let your favorite retail store know when you &apos;&apos; in true name &apos;&apos; are looking at their display. Then there&apos;s a technology that surreptitiously captures practically everyone out on the street, combines that data with other data, and makes it available to government agencies." />
                      <outline text="Palantir Technologies is the quintessential Silicon Valley startup. Its website is graced with photos of purposefully goofy but smart-looking young people: a guy in shorts and flips flops, feet propped against the conference-room table; a guy cradling a pooch; a guy holding a fixed-gear bike; a girl resting a saddle on a fence.... &apos;&apos;We&apos;re all engineers,&apos;&apos; it says. Theyhosted the Girl Geek Dinner #32. The kind of company that makes Silicon Valley great." />
                      <outline text="Its mantra: &apos;&apos;to radically change how groups analyze information.&apos;&apos; Okay, it&apos;s a slightly hackneyed mantra in Silicon Valley, but hey. More concretely:" />
                      <outline text="We currently offer a suite of software applications for integrating, visualizing and analyzing the world&apos;s information. We support many kinds of data including structured, unstructured, relational, temporal and geospatial.... They are broadly deployed in the intelligence, defense, law enforcement and financial communities." />
                      <outline text="The company sent its engineers to Oklahoma to help out after the tornado disaster, and one of its people testified at the House Subcommittee hearing on Emergency Preparedness, Response and Communications &apos;&apos;to discuss the importance of open data portals and information sharing in disaster scenarios.&apos;&apos; Their business is Big Data &apos;&apos; and they&apos;re putting their expertise to work for the public good. Awesome!" />
                      <outline text="One of its early investors was In-Q-Tel (IQT), the venture-capital branch of the CIA, which put $2 million into it in 2005. &apos;&apos;Palantir was developed to address the most complex information analysis and security challenges faced by the U.S. intelligence, military, and law enforcement communities,&apos;&apos; IQT explained." />
                      <outline text="A year ago, the company signed a contract with the Northern California Regional Intelligence Center, &apos;&apos;one of dozens of law enforcement intelligence-sharing centers set up after the terrorist attacks of Sept. 11, 2001,&apos;&apos; according to a report just published by the Center for Investigative Reporting. Goal: to build a database for information captured by license-plate scanners deployed by police agencies in 14 counties that &apos;&apos;stretch from Monterey County to the Oregon border.&apos;&apos; Local and state law enforcement agencies along with federal authorities can mine that database." />
                      <outline text="In the Bay Area alone, at least 32 agencies use the technologies. Some systems are mounted on vehicles. Others are fixed, such as red-light cameras at major intersections. One town, Tiburon, a wealthy enclave in Marin County with gorgeous views of San Francisco across the Bay, placed scanners and cameras on the only two roads leading into and out of town. And they all operate automatically." />
                      <outline text="So just how intrusive are they?" />
                      <outline text="Computer security consultant Michael Katz-Lacabe found out when he filed a California Public Records Act request in 2010 in San Leandro, a town of 80,000 souls just south of Oakland, for all records that the town&apos;s license-plate scanners had captured of his cars. He received a report with images of his two cars that had been captured on 112 occasions, dating back to 2008. The report didn&apos;t include the countless times scanners and cameras had captured his cars in other parts of the Bay Area." />
                      <outline text="&apos;&apos;I was surprised there were some pictures where I could actually identify people,&apos;&apos; he told theWall Street Journal. &apos;&apos;Here&apos;s one where I&apos;m driving,&apos;&apos; he said as he was looking through the report. &apos;&apos;Here&apos;s me in my Cal shirt.&apos;&apos; One image from 2009 showed him and his daughters getting out of his car in their driveway. With the technology, &apos;&apos;you can tell who your friends are, who you hang out with, where you go to church, whether you&apos;ve been to a political meeting,&apos;&apos; he said. He was under surveillance, and yet, as he noted, he hadn&apos;t done anything wrong." />
                      <outline text="Government and law enforcement agencies love it. &apos;&apos;It&apos;s new technology, we&apos;re learning as we go, but it works 100 times better than driving around looking for license plates with our eyes,&apos;&apos; said Lt. Randall Brandt of the San Leandro police. Stories abound of law-enforcement successes: locating stolen cars, identifying suspected murders as they&apos;re driving through town, or pinpointing cars of people who haven&apos;t paid a parking ticket." />
                      <outline text="There are over 9 million residents in the Bay Area, and millions of tourists flow through it, and wherever they drive or park their car (or rental car!), the tag and location data may be captured, along with an image of the car, whoever is in it or near it, and whatever is behind it. Ever more devices are being deployed for a denser network of surveillance." />
                      <outline text="Granted, some of them actually make life easier: all-electronic tolling at the Golden Gate Bridge, for example. You no longer need to stop to pay, even if you don&apos;t have FasTrak. As you drive through, the system captures your tag, and you&apos;ll get the bill in the mail. On Sunday evening, traffic no longer gets backed up for eight miles just to get across the bridge." />
                      <outline text="What is new is the sheer sophistication of database and data-mining applications, such as those developed by Palantir. And as part of its agreement with In-Q-Tel, the company shares these technologies with the CIA and other agencies in the Intelligence Community." />
                      <outline text="In Southern California, it&apos;s the same thing. &apos;&apos;In San Diego, 13 federal and local law enforcement agencies have compiled more than 36 million license-plate scans in a regional database since 2010 with the help of federal homeland security grants,&apos;&apos; found the Center for Investigative Reporting." />
                      <outline text="There were efforts to limit it. In 2012, before he was term-limited out of office, state Senator Joe Simitian, a Democrat, introduced a bill that would have required law enforcement agencies and companies that collect license-plate data to delete it after 60 days. But the bill died under heavy fire from law enforcement and corporations." />
                      <outline text="&apos;&apos;Do we really want to maintain a database that tracks personal movements of law-abiding citizens in perpetuity? That&apos;s the fundamental question here,&apos;&apos; wondered Simitian. &apos;&apos;Larger and larger amounts of data collected over longer periods of time provide a very detailed look at the personal movements of private citizens,&apos;&apos; he warned." />
                      <outline text="The scanners are also used by companies, including two, as the Wall Street Journal reported, that were &apos;&apos;founded by &apos;repo men&apos; &apos;&apos; specialists in repossessing cars or property from deadbeats.&apos;&apos; Their camera-equipped cars drive around nationwide to capture license plates, location data, and images, a less conspicuous version of Google Street View cars (Google blurs license plates and faces on Street View, but retains the data in its database)." />
                      <outline text="&apos;&apos;What would the 1950s Soviet Union have done with the technology we have now?&apos;&apos;wondered Col. Lisa Shay, electrical engineering professor and tracking specialist at the US Military Academy at West Point. &apos;&apos;We don&apos;t have a police state in this country, but we have the technology.&apos;&apos;" />
                      <outline text="Scary thought. As these technologies are getting ever more sophisticated and cheaper, they spread. Unlike the near-flawless surveillance of our online lives, or of our purchasing habits [my take... Perfecting The Surveillance Society &apos;&apos; One Payment At A Time], these systems cover us still imperfectly, but in real-life situations, out on the street, and leave behind a permanent record of each incident." />
                      <outline text="This data is then combined into the larger data set on us. It&apos;s Big Data &apos;&apos; the era when data has become an asset class. A whole industry of the most creative companies is chasing after this asset class, and startups are getting funded &apos;&apos; by the Intelligence Community, no less &apos;&apos; based on its promise, and they&apos;re all working hand in glove with their respective governments to maximize their returns. Getting shafted: the people on the street." />
                      <outline text="But, these technologies can be used to do cool things. Hashima, a speck of an island off the coast of Nagasaki, Japan, used to serve as a coal mine where 5,000 people lived and toiled. But in the 1970s, it was abandoned and the concrete structures left to decay, only to resurface in the last James Bond flick, Skyfall. Now Google captured it for Street View &apos;&apos; and made an awesome brief video of this eerie industrial wasteland. Check it out.... Eerie Abandoned Japanese Island Comes Alive On Google (video)" />
                      <outline text=" " />
              </outline>

              <outline text="Freddie Mercury gorilla &apos;must go&apos;">
                      <outline text="Link to Article" type="link" url="http://www.bbc.co.uk/news/uk-england-norfolk-23226366#sa-ns_mchannel=rss&amp;ns_source=PublicRSS20-sa" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373289923_hkpr8epF.html" />
        <outline text="Source: BBC News - Home" type="link" url="http://feeds.bbci.co.uk/news/rss.xml" />
      <outline text="Mon, 08 Jul 2013 13:25" />
                      <outline text="" />
                      <outline text="8 July 2013Last updated at09:10 ETA gorilla sculpture painted as Freddie Mercury has been removed because it infringes copyright." />
                      <outline text="Organisers of Go Go Gorillas, a conservation art trail in Norwich, were contacted by Mercury Phoenix Trust, an Aids charity set up in memory of the Queen singer who died in 1991." />
                      <outline text="The trust claimed the suit the gorilla is wearing breaches copyright." />
                      <outline text="It asked that the sculpture, called Freddie &quot;Radio Go Go&quot; Gorilla, be removed and repainted." />
                      <outline text="The sculpture, which stood on Millennium Plain outside The Forum, was painted by Mik Richardson." />
                      <outline text="Continue reading the main storyFreddie is one of our most popular gorillas on the trail and now we&apos;ve got to remove him from the streets&apos;&apos;" />
                      <outline text="End QuoteMartin GreenBreak&apos;Dreadful and petty&apos;Mr Richardson, 50, of Aylsham, Norfolk, said the decision to order its removal was &quot;absolutely shocking&quot;." />
                      <outline text="He said: &quot;It&apos;s dreadful. It&apos;s petty, really. The night I was told I couldn&apos;t sleep.&quot;" />
                      <outline text="Mr Richardson was paid &#163;800 to design and paint the gorilla, which took him three days." />
                      <outline text="&quot;I&apos;m a mural artist and I have to be very careful about copyright,&quot; he said." />
                      <outline text="&quot;I didn&apos;t copy the suit exactly. I alter enough so that it&apos;s fan art, rather than a copy of it." />
                      <outline text="The &quot;Radio Go Go&quot; gorilla is one of 53 life-size gorillas decorated by Norfolk artists and displayed on the streets of Norwich over the summer." />
                      <outline text="An additional 67 baby gorillas, painted at local schools, made up the public art trail." />
                      <outline text="Mercury Phoenix Trust contacted Wild in Art, the company that supplied the gorilla glass-fibre canvases, according to director Charlie Langhorne." />
                      <outline text="&quot;They just said that they own the copyright on the suit and asked us to change it,&quot; Mr Langhorne said." />
                      <outline text="&quot;That&apos;s being sorted. To save any bother we will change it." />
                      <outline text="&quot;We do quite a few bits and pieces for them but it&apos;s no great shakes." />
                      <outline text="&quot;We would rather not have to do it but it&apos;s not the end of the world.&quot;" />
                      <outline text="&apos;Enjoy a gorilla&apos;He said the gorilla would be repainted with a &quot;new and exciting design&quot; and should be back in place within 10 days." />
                      <outline text="Please turn on JavaScript. Media requires JavaScript to play." />
                      <outline text="The Freddie Mercury gorilla sculpture will be repainted" />
                      <outline text="&quot;People in Norwich will have a new gorilla to enjoy soon,&quot; he said." />
                      <outline text="Martin Green of Break, one of two charities that will benefit from the auction of the gorillas once the exhibition is over, said: &quot;It&apos;s a disappointing position they have put us in." />
                      <outline text="&quot;Freddie is one of our most popular gorillas on the trail and now we&apos;ve got to remove him from the streets, but we&apos;re respecting the wishes of another charity." />
                      <outline text="&quot;It&apos;s a sad story, but the positive news is that we&apos;ll end up with another gorilla on the streets.&quot;" />
                      <outline text="The Born Free Foundation, which counts Queen guitarist Brian May among its celebrity supporters, was also set to benefit from the October auction of the Freddie Mercury gorilla to help support conservation projects in the Congo." />
                      <outline text="Mercury Phoenix Trust was unavailable for comment." />
                      <outline text="They previously commissioned a &quot;Freddie Lion&quot; for a Pride of Cape Town art trail in May." />
              </outline>

              <outline text="Asiana Airlines Flight 214 &apos;-- What We REALLY Know">
                      <outline text="Link to Article" type="link" url="http://rdougwicker.com/2013/07/08/asiana-airlines-flight-214-what-we-really-know/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373289603_QXFpKvWP.html" />
        <outline text="Source: R. Doug Wicker — Author" type="link" url="http://rdougwicker.com/feed/" />
      <outline text="Mon, 08 Jul 2013 13:20" />
                      <outline text="" />
                      <outline text="And it ain&apos;t much." />
                      <outline text="Speculation this early after a plane crash is nearly always incorrect because of insufficient information, yet speculation abounds on Saturday&apos;s crash of Asiana Airlines Flight 214.  You could write a book on what we do not currently know &apos;-- the cockpit crew interviews, the information from the &apos;&apos;Black Boxes,&apos;&apos; witness interviews, crash damage analysis, etc., etc., etc." />
                      <outline text="Here&apos;s what we do know about the crash:  Asian Airlines Flight 214, a Boeing 777-28EER operating with two Pratt &amp; Whitney PW4090 engines (an important detail as you&apos;ll see in a moment), landed short of Runway 28 Left at San Francisco International Airport (SFO).  Aboard Flight 214 were sixteen crew and 291 passengers for a total of 307 POB (Personnel on Board).  The aircraft apparently struck the seawall located short of the approach end of Runway 28L.  The vertical and both horizontal stabilizers were sheared off and lay upon the runway just short of the landing threshold line and threshold markings (see images below).  Landing gear parts lay between the threshold markings and the touchdown zone markings.  The aircraft skidded off the runway to the left and at some point caught fire.  Two passengers (both schoolgirls) died, their bodies both found outside of the wreckage (not reported is if the bodies were still strapped to their respective seats).  Injuries were sustained by 181 people.  Of those 181 people, forty-nine are deemed in critical condition." />
                      <outline text="Asiana Airlines Flight 214 debris field &apos;-- photo linked from ww2.hdnux.com" />
                      <outline text="Here&apos;s what we know leading up to the crash:  The weather at SFO was VMC (Visual Meteorological Conditions) with blue skies, few clouds, good visibility, and light winds reported.  The Runway 28L ILS (Instrument Landing System) was out of service, so the pilots would not have had a Glide Slope instrument indication in the cockpit to advise them of their angle of descent.  They would however (provided it was working, which appears to be the case) have a good view of the Runway 28L 4-Light Precision Approach Path Indicator (PAPI), which was set to visually guide pilots onto a 2.85&#176; glide path (slightly below the more normal three-degree angle most commonly used)." />
                      <outline text="Here&apos;s some expert Air Traffic Control speculation:  Since the weather was clear and the ILS was out of service, it is reasonable to assume that Asiana Airlines Flight 214 was conducting what is known as a Visual Approach (See definition below) to Runway 28L at the time of the accident.  If that is the case, the cockpit crew would have been responsible for maintaining the proper descent angle to the runway using visual references (including the PAPI previously mentioned) and other on-board, non-ILS derived information (radar altimeter, etc.)." />
                      <outline text="Visual Approach Definition (U.S.):  An approach conducted on an instrument flight rules (IFR) flight plan which authorizes the pilot to proceed visually and clear of clouds to the airport.  The pilot must, at all times, have either the airport or the preceding aircraft in sight.  This approach must be authorized and under the control of the appropriate air traffic control facility.  Reported weather at the airport must be ceiling at or above 1,000 feet and visibility of 3 miles or greater" />
                      <outline text="What we know about the Boeing 777:  Quite simply put, this aircraft is one of the safest in existence.  Over 1,100 have been built since 1993, and the aircraft remains a bestseller for Boeing to this day.  There have been a total of only three &apos;&apos;hull losses&apos;&apos; (meaning the aircraft was a total write-off) involving the Boeing 777 and only one previous fatality.  The previous two hull losses and one fatality were:" />
                      <outline text="September 5, 2001 &apos;-- Denver International Airport:  British Airways Flight 2019, Boeing 777-236, suffered a mishap during a refueling operation at Terminal Gate A37.  Minor, reparable damage was sustained to the left wing and the left engine cowling and thrust reverser.  A ground crewman died six days after the accident from injuries sustained during the fire.January 17, 2008 &apos;-- Heathrow Airport, London:  British Airways Flight 38, a Boeing 777-200ER, landed short of Runway 27 Left.  That may sound familiar, but keep in mind those Pratt &amp; Whitney PW4090 engines I told you about above.  We&apos;ll get back to that in a moment.  Forty-seven people were injured; there were no fatalities.  The aircraft was destroyed.July 29, 2011 &apos;-- Cairo Airport, Egypt:  Egyptair Flight 667, a Boeing 777-200 pushing back from Gate F7, Terminal 3, experienced a fire in the cockpit.  The twelve crew and 307 passengers deplaned with no injuries.  The aircraft was irreparably damaged.So, what&apos;s so important about those engines, and why is speculation so prone to error at this point?  Here&apos;s why:  Already at least one major news organization, The Daily Mail, has had one blazing headline pronouncing, &apos;&apos;Crash landing at San Francisco mirrors that of BA Boeing 777 crash at London Heathrow five years ago.&apos;&apos;  Uh . . . no, guys, it really doesn&apos;t.  The only similarity is that both aircraft impacted short of the runway and skidded onto it.  Beyond that the crashes are in no way &apos;&apos;mirrored.&apos;&apos;" />
                      <outline text="The Daily Mail speculates that, as in the British Airways 38 crash, there was something amiss with the engines on Asiana 214.  The problem with British Airways 38 (and two other loss-of-power incidents involving the Boeing 777) was eventually tracked down to a flaw in the design of the fuel/oil heat exchanger used in the Rolls-Royce Trent 800 engine.  That flaw allowed ice slush to reduce fuel flow to the engines, allowing enough fuel to keep them turning but restricting fuel needed to apply go-around power (powering up the engines to sufficiently and safely lift the aircraft back into the air after an aborted approach to the runway).  That component has since been redesigned and flown without incident ever since that redesign was incorporated into existing fleets and subsequently manufactured aircraft.  The Pratt &amp; Whitney PW4090 has never displayed any such problem.  Ever.  If there was an engine problem with the engines on Asiana 214, it is unlikely to have affected both engines simultaneously and only one engine is needed to abort a landing." />
                      <outline text="What to watch for (and what to ignore) in the coming investigation:" />
                      <outline text="It&apos;s far too early to speculate on the possibility of pilot error, but right now that appears to be the focus.  Did the crew wait too long to initiate a go-around (unknown at this time, but it appears a go-around order was given only seven seconds before impact)?  Did the aircraft come in too fast and/or too low (no evidence to date, but eyewitness accounts and video seem to show that the aircraft was far below normal height on the final approach)?  Were the pilots under- or overcorrecting from initially coming in too high (no indication of this as yet)?  These answers will come from the crew interviews and the Digital Flight Data and Cockpit Voice Recorders (DFDR and CVR &apos;-- the orange colored &apos;&apos;Black Boxes&apos;&apos; about which you hear so much).Cockpit Voice Recorder (CVR) left; Digital Flight Data Recorder (DFDR) right &apos;-- photo linked from en.wikipedia.org" />
                      <outline text="There&apos;s been some online speculation that the left wing flaps appear to have not been extended.  Sorry guys, but you&apos;re incredibly wrong here.  The slats are obviously extended so the flaps would have been as well.  Additionally, the right side flaps can clearly be seen in the extended position.  And if the right side were somehow extended while the left side flaps remained retracted, the Boeing would have experienced an uncontrollable roll to the left such as happened in the case of American Airlines Flight 191 at Chicago O&apos;Hare on May 25, 1979.  This is not a retracted flap/slat issue.  If it is a flap/slat issue, it&apos;s related to insufficient extension of the flaps and slats for that phase of flight, which is highly doubtful considering the warning devices aboard modern aircraft.Could this be a simultaneous engine problem?  Such things have occurred in the past, but such events are exceeding rare and have usually been attributed to outside influences (ingestation of birds, hail or extremely heavy precipitation, volcanic ash, etc.).  The few mechanical events on record were either poor design (see the Roll-Royce Trent 800 discussion above) or maintenance errors (Eastern Airlines Flight 855; Miami International Airport; May 5, 1983).  So far the CVR shows no indication of an engine malfunction, and the pilot is heard calling for go-around power as if the engines were operating normally.Easter Airlines Flight 855 &apos;-- photo linked from en.wikipedia.org" />
                      <outline text="For those with a fear of flying I would ask that you keep in mind the number of survivors in this otherwise devastating crash &apos;-- over 99.3% of those aboard got out, and most of them with either no or only minor injuries." />
                      <outline text="As for the rank speculation you&apos;re hearing so far, take all that guesswork from the rank amateurs and wannabe pilots for what it is &apos;-- the rantings of people who will gladly (and in most cases anonymously) point fingers now but who won&apos;t retract unwarranted accusations later if and when they&apos;re proven wrong." />
                      <outline text="About the author&apos;s credentials:  R. Doug Wicker spent over thirty-four years as an Air Traffic Controller for both the U.S.A.F. and F.A.A.  During his time in the F.A.A. he was also trained in accident/incident investigation for his duties as a Quality Assurance &amp; Training Instructor (QATS) for El Paso International Airport from 1987 until 1996.  Mr. Wicker is the author of The Bombing of Pan Am Flight 103 as well as three as yet unpublished novels on aircraft sabotage." />
                      <outline text="The Bombing of Pan Am Flight 103 &apos;-- Rosen Publishing, 2003" />
                      <outline text="About these ads" />
              </outline>

              <outline text="Unidentified Cosmic Radio Bursts Baffle Astronomers.">
                      <outline text="Link to Article" type="link" url="http://newsweeds.com/unidentified-cosmic-radio-bursts-baffle-astronomers/144461" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373289067_wm3J4gFW.html" />
        <outline text="Source: News Weeds" type="link" url="http://newsweeds.com/feed" />
      <outline text="Mon, 08 Jul 2013 13:11" />
                      <outline text="" />
                      <outline text="&quot;We have uncovered four millisecond-duration radio transientsall more than 40&#176; from the Galactic plane.&quot;" />
                      <outline text="- Dan Thornton, Ph.D., Univ. of Manchester, U. K." />
                      <outline text="Parkes Radio Telescope, Australia, where&quot;A Population of Fast Radio Bursts at Cosmological Distances,&quot;was studied by astronomer Dan Thornton and international colleaguesand published in Science on July 5, 2013. The radio signals havecome from between 6 to 11 billion light-years away in this particularmatter universe aged 13.8 billion light-years. See Earthfiles Headlines for more." />
                      <outline text="Read the original article here onEarthfiles.com Articles" />
              </outline>

              <outline text="&apos;Overheid, doe eens wat aan de werkloosheid in plaats van aan het tekort&apos;">
                      <outline text="Link to Article" type="link" url="http://www.volkskrant.nl/vk/nl/3184/opinie/article/detail/3472186/2013/07/08/Overheid-doe-eens-wat-aan-de-werkloosheid-in-plaats-van-aan-het-tekort.dhtml" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373288946_Phqys23P.html" />
        <outline text="Source: VK: Home" type="link" url="http://www.volkskrant.nl/rss.xml" />
      <outline text="Mon, 08 Jul 2013 13:09" />
                      <outline text="" />
                      <outline text="OPINIE -Peter van der Meer &apos;&apos; 08/07/13, 13:14" />
                      <outline text="(C) anp." />
                      <outline text="opinie Ooit streefde de overheid volledige werkgelegenheid na. Nu is het begrotingsevenwicht het enige doel, schrijft Peter van der Meer." />
                      <outline text=" " />
                      <outline text="Van alle grote levensgebeurtenissen kent werkloosheid de negatiefste effecten" />
                      <outline text="Momenteel stijgt de werkloosheid in Nederland hard en de overheid doet er niets aan. Dat is heel erg. Waarom? Omdat werkloosheid (C)(C)n van de ergste dingen is die mensen kan overkomen. Het is bekend dat werklozen ongelukkiger zijn dan werkenden. Het is ook bekend dat langdurige werkloosheid littekens bij mensen achterlaat. Langdurig werklozen raken beschadigd en komen er niet meer geheel bovenop." />
                      <outline text="Zelfs in vergelijking met andere grote levensgebeurtenissen heeft werkloosheid de meest negatieve effecten. Mensen die scheiden zijn ongelukkig op het moment van scheiden, maar zijn vijf jaar later weer even gelukkig als voorheen. Mensen die ziek worden, zijn ongelukkig maar ook zij herstellen hiervan binnen vijf jaar. Mensen krabbelen zelfs weer op na het verlies van hun man of vrouw, hoe onwaarschijnlijk dat ook klinkt. De klap van langdurige werkloosheid komen ze echter niet te boven." />
                      <outline text="Aanvaardbaar niveauAlle reden voor de overheid om de zeilen bij te zetten om de werkloosheid niet verder omhoog te laten lopen. Na elke crisis duurt het lang voordat de werkloosheid weer tot een enigszins aanvaardbaar niveau gedaald is. De daling van de werkloosheid gaat veel langzamer dan het herstel van de economie, of het herstel van de overheidsfinancin. Dat was zo in de jaren tachtig en in de jaren dertig van de vorige eeuw. Twee crises die diepe sporen hebben getrokken en die langdurige effecten hebben gehad op het leven van mensen. En nu is zich dat aan het herhalen en de overheid doet er niks aan." />
                      <outline text="We hebben een overheid die streng door blijft bezuinigen om maar aan de voorwaarde van 3 procent overheidstekort te voldoen. Een percentage dat ooit uit de lucht is komen vallen en nu in Brussel - en daarmee in Den Haag - heilig is verklaard. Een percentage waar we eigenlijk aan voldoen, want het structurele tekort zoals berekend door het Centraal Planbureau (CPB) is lager dan 3 procent. Bij verder bezuinigingen neemt de overheid de beschadigingen die ze aan de economie - en nog erger aan de werklozen - toebrengt voor lief." />
                      <outline text="En dat terwijl de beste manier om het overheidstekort omlaag te brengen is de economie weer aan het groeien te krijgen. Het tekort is immers uitgedrukt als een percentage van het bruto binnenlandsproduct. Stijgt het binnenlandsprocuct dan daalt het overheidstekort en de overheidsschuld. Het huidige beleid verlaagt het binnenlandsproduct, want de bestedingen worden afgeremd, waardoor er weer een verdere noodzaak tot bezuinigen ontstaat." />
                      <outline text="Op die manier bezuinigen we ons kapot, met alle desastreuze gevolgen van dien. We zullen zien dat als gevolg van de nieuw aangekondigde bezuinigingen volgend jaar de economie minder hard groeit dan voorspeld door het Centraal Planbureau. Deze gevolgen zullen ook langdurig negatief uitpakken. Langduriger dan de duur van de crisis en die zullen vooral gevolgen hebben voor de werklozen, de ware slachtoffers van de crisis." />
                      <outline text="Volledige werkgelegenheidOoit deed de overheid haar best volledige werkgelegenheid na te streven, naast een stabiel prijspeil, evenwicht op de betalingsbalans, een bevredigend percentage van (selectieve) economische groei en een redelijke inkomensverdeling. Geen van deze doelstellingen lijkt meer in de belangstelling te staan." />
                      <outline text="Het enige doel is nog begrotingsevenwicht, waarvan we weten dat dit juist geen doel op zich zou moeten zijn. Momenteel zitten we in een situatie van onderbesteding, dat zien we aan de werkloosheid en onbenutte kapitaalgoederen, zie de bouw." />
                      <outline text="Het zijn werkgevers die niet investeren en consumenten die niet consumeren, bang als ze zijn hun kapitaal als appeltje voor de dorst nodig te hebben. In zo&apos;n situatie zou het juist de overheid moeten zijn die de economie weer aanjaagt. Zij moet als vliegwiel fungeren en niet op de rem trappen. Op die manier bestrijd je de werkloosheid, volksvijand nummer (C)(C)n, het best." />
                      <outline text="Het huidige beleid heeft tot gevolg dat de economie blijft steken op een niveau met veel te hoge werkloosheid. De overheid heeft haar huishoudboekje dan op orde, als het haar lukt, maar met als resultaat dat er veel huishoudens zullen zijn die hun boekje helemaal niet meer op orde kunnen krijgen." />
                      <outline text="Wellicht hebben ze er helemaal geen meer, waarom zou je boekhouden als je toch geen inkomsten meer hebt. Waar blijven de politici die het opnemen voor de werklozen?" />
                      <outline text="Peter van der Meer is universitair docent economie en bedrijfskunde in Groningen." />
              </outline>

              <outline text="Reckless bankers to face jail threat">
                      <outline text="Link to Article" type="link" url="http://www.bbc.co.uk/news/business-23229300#sa-ns_mchannel=rss&amp;ns_source=PublicRSS20-sa" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373288321_JqdXS4ME.html" />
        <outline text="Source: BBC News - Home" type="link" url="http://feeds.bbci.co.uk/news/rss.xml" />
      <outline text="Mon, 08 Jul 2013 12:58" />
                      <outline text="" />
                      <outline text="8 July 2013Last updated at08:30 ETThe government has said it will support most of the recommendations produced by the Parliamentary Commission for Banking Standards." />
                      <outline text="Top of the list will be a new criminal offence of reckless misconduct by top bankers, with a possible jail term." />
                      <outline text="Banker bonuses are to be deferred by up to 10 years, and could be repayable if the bank has to be bailed out." />
                      <outline text="But the government did not agree to toughen limits on banks&apos; risk-taking or to scrap its bank holding company." />
                      <outline text="In a 571-page report issued last month, the Commission had called for a much tougher &quot;leverage ratio&quot; for banks - a measure that limits the total amount of loans and investments a bank can make relative to the amount of capital the bank holds to absorb losses on those assets." />
                      <outline text="But Chancellor George Osborne has stuck steadfastly to the lower level internationally agreed and laid out by the Bank for International Settlements in Basel." />
                      <outline text="Mr Osborne was also called on to abolish the UK Financial Investments - the government&apos;s holding company for its stakes in Royal Bank of Scotland and Lloyds Banking Group - which the Commission described as a &quot;fig leaf&quot; for government intervention in the banking sector." />
                      <outline text="Continue reading the main storyThe Parliamentary Commission on Banking Standards was appointed in July 2012 following the Libor scandal and other episodes that damaged the reputation of banks in the UKIt includes MPs and peers and is chaired by Andrew Tyrie, who also heads the House of Commons&apos; Treasury CommitteeMembers include the Archbishop of Canterbury, Justin WelbyIt heard evidence from major figures in the banking sectorThe government refused, noting that &quot;UKFI is staffed by highly expert professionals with extensive experience in the banking sector&quot;." />
                      <outline text="However, the government did reiterate that it would consider the case for splitting Royal Bank of Scotland - currently 81%-owned by the government via UKFI - into a &quot;good&quot; High Street bank that could be quickly sold back to the private sector, and a &quot;bad&quot; bank to sit on and work out existing problematic loans." />
                      <outline text="Burden of proofThe chancellor said that he was pleased to accept the Commission&apos;s main recommendations, promising: &quot;Where legislative changes are required, we will amend the Banking Reform Bill, which is currently before Parliament.&quot;" />
                      <outline text="The Commission&apos;s report focused primarily on the problem of making bankers individually responsible for the performance of their institutions and business areas." />
                      <outline text="Among the plethora of recommendations to be adopted by the government:" />
                      <outline text="there will be a new system for approving who can fill senior positions at UK banks, with senior bankers being given clear individual responsibilitiesif a bank breaks any rules, the burden of proof will be on the relevant senior bankers to show that they took all reasonable steps to stop it happeningthe time limit for regulators to bring action against miscreant bankers will be extended beyond the current three yearsThe government also threw its weight behind proposals to increase competition between the High Street banks." />
                      <outline text="The newly-created Prudential Regulation Authority - which sits within the Bank of England and is responsible for ensuring that excess risks do not build up within the banking system - will be given an additional role in ensuring competition among the banks." />
                      <outline text="A new &quot;payments regulator&quot;, which has yet to be created, will be asked by the government to explore ways of making it easier for people to transfer their accounts to rival banks, and to look at whether the banks should no longer collectively control the inter-bank payments system." />
              </outline>

              <outline text="This Call Is Being Recorded">
                      <outline text="Link to Article" type="link" url="http://shkspr.mobi/blog/2013/07/this-call-is-being-recorded/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373288128_gGcQYsUe.html" />
        <outline text="Source: Hacker News" type="link" url="https://news.ycombinator.com/rss" />
      <outline text="Mon, 08 Jul 2013 12:55" />
                      <outline text="" />
                      <outline text="We&apos;ve all been stuck on hold to some call centre and heard a distant voice say &quot;For your security, and our training purposes, your call may be recorded.&quot;" />
                      <outline text="I&apos;ve always wanted to say to people &quot;just so you know, I am also recording this call.&quot; Well, now I can." />
                      <outline text="Around 4 years ago, I experimented with recording phone calls. It was quite a clunky process, involving conference calling in another line." />
                      <outline text="Of course, Android has theoretically supported native call recording since its inception. However, Google have ignored all the requests to actually enable it." />
                      <outline text="Android has a number of call recording apps. On most phones, the call recording works by putting the phone on speaker mode and using the microphone to record both sides of the conversation. That has obviously disadvantages for call quality - not to mention that you don&apos;t always want to have your conversations on speakerphone!" />
                      <outline text="Luckily the enterprising chaps at GrinZone have found a way round this limitations on some phones." />
                      <outline text="With InCall Recorder on my Galaxy Note II, I can finally record line quality audio on my phone calls." />
                      <outline text="Take a listen:Voice Call With Mum" />
                      <outline text="One of the great things about InCall Recorder is that it automatically upload the recorded MP3s up to DropBox - so your calls are instantly available to you and anyone else with whom you choose to share the folder.In the UK, it is perfectly legal for an individual to record their calls - and there is no need to inform the other party nor obtain consent. Individuals are exempt from having to comply with the data protection act. Interestingly, so are journalists..." />
                      <outline text="In other countries, check your local laws :-)" />
                      <outline text="Of course, it&apos;s polite to inform someone that you&apos;re recording them. More than that, for some people it really improves their attitude and their service. At the moment, I&apos;m going through the tedious process of buying a house - I&apos;ve found that with some individuals, it&apos;s very handy not only to record the call and play it back for reference, but to let the other party know that&apos;s what I&apos;m doing." />
                      <outline text="Listening back to some of my favourite calls over the last year has been very interesting and quite emotional - I can certainly see why our security services enjoy listening in so much!" />
                      <outline text="Like this:LikeLoading..." />
                      <outline text="We&apos;ve all been stuck on hold to some call centre and heard a distant voice say &quot;For your security, and our training purposes, your call may be recorded.&quot; I&apos;ve always..." />
              </outline>

              <outline text="The Snowden Effect, Continued">
                      <outline text="Link to Article" type="link" url="http://www.esquire.com/blogs/politics/Today_In_Snowdenland?src=rss" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373287961_Vt4Tv6ZJ.html" />
        <outline text="Source: The Politics Blog with Charles P. Pierce RSS Feed" type="link" url="http://www.esquire.com/blogs/politics/politics-rss/" />
      <outline text="Mon, 08 Jul 2013 12:52" />
                      <outline text="" />
                      <outline text="Can we take just a short break from the good fun we&apos;re all having trying to guess where Edward Snowden will land, and about how much of self-promoting show pony he may be, and return, however briefly, to the very serious argument within our democracy that his revelations have set off?" />
                      <outline text="In more than a dozen classified rulings, the nation&apos;s surveillance court has created a secret body of law giving the National Security Agency the power to amass vast collections of data on Americans while pursuing not only terrorism suspects, but also people possibly involved in nuclear proliferation, espionage and cyberattacks, officials say...The 11-member Foreign Intelligence Surveillance Court, known as the FISA court, was once mostly focused on approving case-by-case wiretapping orders. But since major changes in legislation and greater judicial oversight of intelligence operations were instituted six years ago, it has quietly become almost a parallel Supreme Court, serving as the ultimate arbiter on surveillance issues and delivering opinions that will most likely shape intelligence practices for years to come, the officials said. Last month, a former National Security Agency contractor, Edward J. Snowden, leaked a classified order from the FISA court, which authorized the collection of all phone-tracing data from Verizon business customers. But the court&apos;s still-secret decisions go far beyond any single surveillance order, the officials said. &quot;We&apos;ve seen a growing body of law from the court,&quot; a former intelligence official said. &quot;What you have is a common law that develops where the court is issuing orders involving particular types of surveillance, particular types of targets.&quot;  " />
                      <outline text="There should be no reason to belabor this in a democracy, but you really cannot have secret courts developing a new &quot;common law.&quot; In this country, at any rate, the common law is exactly what it says it is -- a law created in common, by the representatives elected by the people, under which we all agree openly to live. What secret courts &quot;develop&quot; is not a &quot;common law&quot; but, rather, an entire infrastructure of loopholes, exceptions, and trapdoors that allow the government to evade what we all believe is the &quot;common law.&quot; Increasingly, and sadly, the courts that are not secret have been helping them along." />
                      <outline text="In one of the court&apos;s most important decisions, the judges have expanded the use in terrorism cases of a legal principle known as the &quot;special needs&quot; doctrine and carved out an exception to the Fourth Amendment&apos;s requirement of a warrant for searches and seizures, the officials said.The special needs doctrine was originally established in 1989 by the Supreme Court in a ruling allowing the drug testing of railway workers, finding that a minimal intrusion on privacy was justified by the government&apos;s need to combat an overriding public danger. Applying that concept more broadly, the FISA judges have ruled that the N.S.A.&apos;s collection and examination of Americans&apos; communications data to track possible terrorists does not run afoul of the Fourth Amendment, the officials said. That legal interpretation is significant, several outside legal experts said, because it uses a relatively narrow area of the law - used to justify airport screenings, for instance, or drunken-driving checkpoints - and applies it much more broadly, in secret, to the wholesale collection of communications in pursuit of terrorism suspects. &quot;It seems like a legal stretch,&quot; William C. Banks, a national security law expert at Syracuse University, said in response to a description of the decision. &quot;It&apos;s another way of tilting the scales toward the government in its access to all this data.&quot;" />
                      <outline text="If you&apos;re not driving drunk, why do you care about roadblocks? If you&apos;re not doing drugs, what do you care if they test you? See how it starts? Now we&apos;re all the way to, if you&apos;re not contacting terrorists, what do you care if the NSA collects your data? And this last part of the slide was undertaken in secret, by a secret court. And this is the Snowden Effect in action. Without the revelations, the president would not have made the preposterous public claim that the rubber-stamp FISA court qualified as &quot;oversight&quot; by any but the most laughable definition. There then would not have been the pushback against that silliness, and then there would not have been the FISA court itself responding that it was not a rubber stamp which, I am sure, is part of what intrigued the Times enought to produce this story which brings us all the way back around to how preposterous the president&apos;s original claim was." />
                      <outline text="Unlike the Supreme Court, the FISA court hears from only one side in the case - the government - and its findings are almost never made public. A Court of Review is empaneled to hear appeals, but that is known to have happened only a handful of times in the court&apos;s history, and no case has ever been taken to the Supreme Court. In fact, it is not clear in all circumstances whether Internet and phone companies that are turning over the reams of data even have the right to appear before the FISA court. Created by Congress in 1978 as a check against wiretapping abuses by the government, the court meets in a secure, nondescript room in the federal courthouse in Washington. All of the current 11 judges, who serve seven-year terms, were appointed to the special court by Chief Justice John G. Roberts Jr., and 10 of them were nominated to the bench by Republican presidents. Most hail from districts outside the capital and come in rotating shifts to hear surveillance applications; a single judge signs most surveillance orders, which totaled nearly 1,800 last year. None of the requests from the intelligence agencies was denied, according to the court." />
                      <outline text="Whether he likes it or not, this is the &quot;national conversation&quot; that the president said he wanted. Edward Snowden, world traveler, international man of luggage, made it impossible to avoid." />
              </outline>

              <outline text="Digital Arms Trade">
                      <outline text="Link to Article" type="link" url="http://www.youtube.com/watch?v=GxYCMmP5eGs&amp;feature=youtu.be" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373287941_ZzQEUZPC.html" />
        <outline text="Source: Open Rights Group" type="link" url="http://www.openrightsgroup.org/feed/" />
      <outline text="Mon, 08 Jul 2013 12:52" />
                      <outline text="" />
              </outline>

              <outline text="Secret move keeps bin Laden records in the shadows.">
                      <outline text="Link to Article" type="link" url="http://bigstory.ap.org/article/secret-move-keeps-bin-laden-records-shadows" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373287596_WLJJfXBS.html" />
        <outline text="Source: DaDenMan news feed" type="link" url="http://s3.amazonaws.com/radio2/dennisc/linkblog.xml" />
      <outline text="Mon, 08 Jul 2013 12:46" />
                      <outline text="" />
                      <outline text="WASHINGTON (AP) &apos;-- The nation&apos;s top special operations commander ordered military files about the Navy SEAL raid on Osama bin Laden&apos;s hideout to be purged from Defense Department computers and sent to the CIA, where they could be more easily shielded from ever being made public." />
                      <outline text="The secret move, described briefly in a draft report by the Pentagon&apos;s inspector general, set off no alarms within the Obama administration even though it appears to have sidestepped federal rules and perhaps also the Freedom of Information Act." />
                      <outline text="An acknowledgement by Adm. William McRaven of his actions was quietly removed from the final version of an inspector general&apos;s report published weeks ago. A spokesman for the admiral declined to comment. The CIA, noting that the bin Laden mission was overseen by then-CIA Director Leon Panetta before he became defense secretary, said that the SEALs were effectively assigned to work temporarily for the CIA, which has presidential authority to conduct covert operations." />
                      <outline text="&quot;Documents related to the raid were handled in a manner consistent with the fact that the operation was conducted under the direction of the CIA director,&quot; agency spokesman Preston Golson said in an emailed statement. &quot;Records of a CIA operation such as the (bin Laden) raid, which were created during the conduct of the operation by persons acting under the authority of the CIA Director, are CIA records.&quot;" />
                      <outline text="Golson said it is &quot;absolutely false&quot; that records were moved to the CIA to avoid the legal requirements of the Freedom of Information Act." />
                      <outline text="The records transfer was part of an effort by McRaven to protect the names of the personnel involved in the raid, according to the inspector general&apos;s draft report." />
                      <outline text="But secretly moving the records allowed the Pentagon to tell The Associated Press that it couldn&apos;t find any documents inside the Defense Department that AP had requested more than two years ago, and could represent a new strategy for the U.S. government to shield even its most sensitive activities from public scrutiny." />
                      <outline text="&quot;Welcome to the shell game in place of open government,&quot; said Thomas Blanton, director of the National Security Archive, a private research institute at George Washington University. &quot;Guess which shell the records are under. If you guess the right shell, we might show them to you. It&apos;s ridiculous.&quot;" />
                      <outline text="McRaven&apos;s directive sent the only copies of the military&apos;s records about its daring raid to the CIA, which has special authority to prevent the release of &quot;operational files&quot; in ways that can&apos;t effectively be challenged in federal court. The Defense Department can prevent the release of its own military files, too, citing risks to national security. But that can be contested in court, and a judge can compel the Pentagon to turn over non-sensitive portions of records." />
                      <outline text="Under federal rules, transferring government records from one executive agency to another must be approved in writing by the National Archives and Records Administration. There are limited circumstances when prior approval is not required, such as when the records are moved between two components of the same executive department. The CIA and Special Operations Command are not part of the same department." />
                      <outline text="The Archives was not aware of any request from the U.S. Special Operations Command to transfer its records to the CIA, spokeswoman Miriam Kleiman said. She said it was the Archives&apos; understanding that the military records belonged to the CIA, so transferring them wouldn&apos;t have required permission under U.S. rules." />
                      <outline text="Special Operations Command also is required to comply with rules established by the chairman of the Joint Chiefs of Staff that dictate how long records must be retained. Its July 2012 manual requires that records about military operations and planning are to be considered permanent and after 25 years, following a declassification review, transferred to the Archives." />
                      <outline text="Also, the Federal Records Act would not permit agencies &quot;to purge records just on a whim,&quot; said Dan Metcalfe, who oversaw the U.S. government&apos;s compliance with the Freedom of Information Act as former director of the Justice Department&apos;s Office of Information and Privacy. &quot;I don&apos;t think there&apos;s an exception allowing an agency to say, &apos;Well, we didn&apos;t destroy it. We just deleted it here after transmitting it over there.&apos; High-level officials ought to know better.&quot;" />
                      <outline text="It was not immediately clear exactly which Defense Department records were purged and transferred, when it happened or under what authority, if any, they were sent to the CIA. No government agencies the AP contacted would discuss details of the transfer. The timing may be significant: The Freedom of Information Act generally applies to records under an agency&apos;s control when a request for them is received. The AP asked for files about the mission in more than 20 separate requests, mostly submitted in May 2011 &apos;-- several were sent a day after Obama announced that the world&apos;s most wanted terrorist had been killed in a firefight. Obama has pledged to make his administration the most transparent in U.S. history." />
                      <outline text="The AP asked the Defense Department and CIA separately for files that included copies of the death certificate and autopsy report for bin Laden as well as the results of tests to identify the body. While the Pentagon said it could not locate the files, the CIA, with its special power to prevent the release of records, has never responded. The CIA also has not responded to a separate request for other records, including documents identifying and describing the forces and supplies required to execute the assault on bin Laden&apos;s compound." />
                      <outline text="The CIA did tell the AP it could not locate any emails from or to Panetta and two other top agency officials discussing the bin Laden mission." />
                      <outline text="McRaven&apos;s unusual order would have remained secret had it not been mentioned in a single sentence on the final page in the inspector general&apos;s draft report that examined whether the Obama administration gave special access to Hollywood executives planning a film, &quot;Zero Dark Thirty,&quot; about the raid. The draft report was obtained and posted online last month by the Project on Government Oversight, a nonprofit watchdog group in Washington." />
                      <outline text="McRaven, who oversaw the bin Laden raid, expressed concerns in the report about possible disclosure of the identities of the SEALs. The Pentagon &quot;provided the operators and their families an inordinate level of security,&quot; the report said. McRaven also directed that the names and photographs associated with the raid not be released." />
                      <outline text="&quot;This effort included purging the combatant command&apos;s systems of all records related to the operation and providing these records to another government agency,&quot; according to the draft report. The sentence was dropped from the report&apos;s final version." />
                      <outline text="Since the raid, one of the SEALs published a book about the raid under a pseudonym but was subsequently identified by his actual name. And earlier this year the SEAL credited with shooting bin Laden granted a tell-all, anonymous interview with Esquire about the raid and the challenges of his retiring from the military after 16 years without a pension." />
                      <outline text="Current and former Defense Department officials knowledgeable about McRaven&apos;s directive and the inspector general&apos;s report told AP the description of the order in the draft report was accurate. The reference to &quot;another government agency&quot; was code for the CIA, they said. These individuals spoke on the condition of anonymity because they were not authorized to discuss the matter by name." />
                      <outline text="There is no indication the inspector general&apos;s office or anyone else in the U.S. government is investigating the legality of transferring the military records. Bridget Serchak, a spokeswoman for the inspector general, would not explain why the reference was left out of the final report and what, if any, actions the office might be taking." />
                      <outline text="&quot;Our general statement is that any draft is pre-decisional and that drafts go through many reviews before the final version, including editing or changing language,&quot; Serchak wrote in an email." />
                      <outline text="The unexplained decision to remove the reference to the purge and transfer of the records &quot;smells of bad faith,&quot; said Steven Aftergood, director of the Project on Government Secrecy at the Federation of American Scientists. &quot;How should one understand that? That adds insult to injury. It essentially covers up the action.&quot;" />
                      <outline text="McRaven oversaw the raid while serving as commander of the Joint Special Operations Command, the secretive outfit in charge of SEAL Team Six and the military&apos;s other specialized counterterrorism units. McRaven was nominated by Obama to lead Special Operations Command, JSOC&apos;s parent organization, a month before the raid on bin Laden&apos;s compound. He replaced Adm. Eric Olson as the command&apos;s top officer in August 2011." />
                      <outline text="Ken McGraw, a spokesman for Special Operations Command, referred questions to the inspector general&apos;s office." />
                      <outline text="The refusal to make available authoritative or contemporaneous records about the bin Laden mission means that the only official accounts of the mission come from U.S. officials who have described details of the raid in speeches, interviews and television appearances. In the days after bin Laden&apos;s death, the White House provided conflicting versions of events, falsely saying bin Laden was armed and even firing at the SEALs, misidentifying which of bin Laden&apos;s sons was killed and incorrectly saying bin Laden&apos;s wife died in the shootout. Obama&apos;s press secretary attributed the errors to the &quot;fog of combat.&quot;" />
                      <outline text="A U.S. judge and a federal appeals court previously sided with the CIA in a lawsuit over publishing more than 50 &quot;post-mortem&quot; photos and video recordings of bin Laden&apos;s corpse. In the case, brought by Judicial Watch, a conservative watchdog group, the CIA did not say the images were operational files to keep them secret. It argued successfully that the photos and videos must be withheld from the public to avoid inciting violence against Americans overseas and compromising secret systems and techniques used by the CIA and the military." />
                      <outline text="The Defense Department told the AP in March 2012 it could not locate any photographs or video taken during the raid or showing bin Laden&apos;s body. It also said it could not find any images of bin Laden&apos;s body on the USS Carl Vinson, the aircraft carrier from which he was buried at sea. The Pentagon also said it could not find any death certificate, autopsy report or results of DNA identification tests for bin Laden, or any pre-raid materials discussing how the government planned to dispose of bin Laden&apos;s body if he were killed. It said it searched files at the Pentagon, Special Operations Command headquarters in Tampa, Fla., and the Navy command in San Diego that controls the Carl Vinson." />
                      <outline text="The Pentagon also refused to confirm or deny the existence of helicopter maintenance logs and reports about the performance of military gear used in the raid. One of the stealth helicopters that carried the SEALs in Pakistan crashed during the mission and its wreckage was left behind." />
                      <outline text="The Defense Department also told the AP in February 2012 that it could not find any emails about the bin Laden mission or his &quot;Geronimo&quot; code name that were sent or received in the year before the raid by McRaven. The department did not say they had been moved to the CIA. It also said it could not find any emails from other senior officers who would have been involved in the mission&apos;s planning. It found only three such emails written by or sent to then-Defense Secretary Robert Gates, and these consisted of 12 pages sent to Gates summarizing news reports after the raid." />
                      <outline text="The Defense Department in November 2012 released copies of 10 emails totaling 31 pages found in the Carl Vinson&apos;s computer systems. The messages were heavily censored and described how bin Laden&apos;s body was prepared for burial." />
                      <outline text="These records were not among those purged and then moved to the CIA. Pentagon spokesman Lt. Col. James Gregory said the messages from the Carl Vinson &quot;were not relating to the mission itself and were the property of the Navy.&quot;" />
                      <outline text="___" />
                      <outline text="AP Intelligence Writer Kimberly Dozier contributed to this report." />
                      <outline text="___" />
                      <outline text="Follow Richard Lardner on Twitter: https://twitter.com/rplardner" />
              </outline>

              <outline text="NYC cases show crooked cops&apos; abuse of FBI database.">
                      <outline text="Link to Article" type="link" url="http://news.yahoo.com/nyc-cases-show-crooked-cops-abuse-fbi-database-162152158.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373287580_ymMhJRNH.html" />
        <outline text="Source: DaDenMan news feed" type="link" url="http://s3.amazonaws.com/radio2/dennisc/linkblog.xml" />
      <outline text="Mon, 08 Jul 2013 12:46" />
                      <outline text="" />
                      <outline text="HomeMailNewsSportsFinanceWeatherGamesGroupsAnswersFlickrMoreomg!ShineMoviesMusicTVHealthShoppingTravelAutosHomesSearch NewsSearch WebSign InMailHelpAccount InfoHelpSuggestionsYahoo!HomeU.S.WorldPoliticsTechScienceHealthOdd NewsOpinionLocalDear AbbyComicsABC NewsY! News Originals {{/show_more}} ]]&gt;" />
              </outline>

              <outline text="&apos;&apos;Why did you shoot me? I was reading a book&apos;&apos;: The new warrior cop is out of control - Salon.com">
                      <outline text="Link to Article" type="link" url="http://www.salon.com/2013/07/07/“why_did_you_shoot_me_i_was_reading_a_book_the_new_warrior_cop_is_out_of_control/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373286453_U4schg8f.html" />
      <outline text="Mon, 08 Jul 2013 12:27" />
                      <outline text="" />
                      <outline text="Sal Culosi is dead because he bet on a football game &apos;-- but it wasn&apos;t a bookie or a loan shark who killed him. His local government killed him, ostensibly to protect him from his gambling habit." />
                      <outline text="Several months earlier at a local bar, Fairfax County, Virginia, detective David Baucum overheard the thirty-eight-year-old optometrist and some friends wagering on a college football game. &apos;&apos;To Sal, betting a few bills on the Redskins was a stress reliever, done among friends,&apos;&apos; a friend of Culosi&apos;s told me shortly after his death. &apos;&apos;None of us single, successful professionals ever thought that betting fifty bucks or so on the Virginia&apos;&apos;Virginia Tech football game was a crime worthy of investigation.&apos;&apos; Baucum apparently did. After overhearing the men wagering, Baucum befriended Culosi as a cover to begin investigating him. During the next several months, he talked Culosi into raising the stakes of what Culosi thought were just more fun wagers between friends to make watching sports more interesting. Eventually Culosi and Baucum bet more than $2,000 in a single day. Under Virginia law, that was enough for police to charge Culosi with running a gambling operation. And that&apos;s when they brought in the SWAT team." />
                      <outline text="On the night of January 24, 2006, Baucum called Culosi and arranged a time to drop by to collect his winnings. When Culosi, barefoot and clad in a T-shirt and jeans, stepped out of his house to meet the man he thought was a friend, the SWAT team began to move in. Seconds later, Det. Deval Bullock, who had been on duty since 4:00 AM and hadn&apos;t slept in seventeen hours, fired a bullet that pierced Culosi&apos;s heart." />
                      <outline text="Sal Culosi&apos;s last words were to Baucum, the cop he thought was a friend: &apos;&apos;Dude, what are you doing?&apos;&apos;" />
                      <outline text="In March 2006, just two months after its ridiculous gambling investigation resulted in the death of an unarmed man, the Fairfax County Police Department issued a press release warning residents not to participate in office betting pools tied to the NCAA men&apos;s basketball tournament. The title: &apos;&apos;Illegal Gambling Not Worth the Risk.&apos;&apos; Given the proximity to Culosi&apos;s death, residents could be forgiven for thinking the police department believed wagering on sports was a crime punishable by execution." />
                      <outline text="In January 2011, the Culosi family accepted a $2 million settlement offer from Fairfax County. That same year, Virginia&apos;s government spent $20 million promoting the state lottery." />
                      <outline text="The raid on Sal Culosi was merely another red flag indicating yet more SWAT team mission creep in America. It wasn&apos;t even the first time a Virginia SWAT team had killed someone during a gambling raid. In 1998 a SWAT team in Virginia Beach shot and killed security guard Edward C. Reed during a 3:00 AM raid on a private club suspected of facilitating gambling. Police said they approached the tinted car where Reed was working security, knocked, and identified themselves, then shot Reed when he refused to drop his handgun. Reed&apos;s family insisted the police story was unlikely. Reed had no criminal record. Why would he knowingly point his gun at a heavily armed police team? More likely, they said, Reed mistakenly believed the raiding officers were there to do harm, particularly given that the club had been robbed not long before the raid. Statements by the police themselves seem to back that account. According to officers at the scene, Reed&apos;s last words were, &apos;&apos;Why did you shoot me? I was reading a book.&apos;&apos;" />
                      <outline text="As the Texas Hold &apos;Em craze picked up momentum in the mid-2000s, fans of the game started hosting tournaments at private clubs, bars, and residences. Police in many parts of the country responded with SWAT raids. In 2011, for example, police in Baltimore County, Maryland, sent a tactical unit to raid a $65 buy-in poker game at the Lynch Point Social Club. From 2006 to 2008, SWAT teams in South Carolina staged a number of raids to break up poker games in the suburbs of Charleston. Some were well organized and high-stakes, but others were friendly games with a $20 buy-in. &apos;&apos;The typical police raid of these games . . . is to literally burst into a home in SWAT gear with guns drawn and treat poker players like a bunch of high-level drug dealers,&apos;&apos; an attorney representing poker players told a local newspaper. &apos;&apos;Using the taxpayers&apos; resources for such useless Gestapo-like tactics is more of a crime than is playing of the game.&apos;&apos;" />
                      <outline text="In 2007 a Dallas SWAT team actually raided a Veterans of Foreign Wars outpost for hosting charity poker games. Players said the tactics were terrifying. One woman urinated on herself. When police raided a San Mateo, California, poker game in 2008, card players described cops storming the place &apos;&apos;in full riot gear&apos;&apos; and &apos;&apos;with guns drawn.&apos;&apos; The games had buy-ins ranging from $25 to $55. Under California law, the games were legal so long as no one took a &apos;&apos;rake,&apos;&apos; or a cut of the stakes. No one had, but police claimed the $5 the hosts charged players to buy refreshments qualified as a rake. In March 2007, a small army of local cops, ATF agents, National Guard troops, and a helicopter raided a poker game in Cary, North Carolina. They issued forty-one citations, all of them misdemeanors. A columnist at the Fayetteville Observer remarked, &apos;&apos;They were there to play cards, not to foment rebellion. . . . [I] wonder . . . what other minutiae, personal vices and petty crimes are occupying [the National Guard&apos;s] time, and where they&apos;re occupying it. . . . Until we get this sorted out, better not jaywalk. There could be a military helicopter overhead.&apos;&apos;" />
                      <outline text="Police have justified this sort of heavy-handedness by claiming that people who run illegal gambling operations tend to be armed, a blanket characterization that absurdly lumps neighborhood Hold &apos;Em tournaments with Uncle Junior Soprano&apos;s weekly poker game. And in any case, if police know that people inside an establishment are likely to be armed, it makes even less sense to come in with guns blazing. Police have also defended the paramilitary tactics by noting that poker games are usually flush with cash and thus tend to get robbed. That too is an absurd argument, unless the police are afraid they&apos;re going to raid a game at precisely the same moment it&apos;s getting robbed. Under either scenario, the police are acknowledging that the people playing poker when these raids go down have good reason to think that the men storming the place with guns may be criminals, not cops." />
                      <outline text="Indeed, that&apos;s exactly what happened to seventy-two-year-old Aaron Awtry in 2010. Awtry was hosting a poker tournament in his Greenville, South Carolina, home when police began breaking down the door with a battering ram. Awtry had begun carrying a gun after being robbed. Thinking he was about to be robbed again, he fired through the door, wounding Deputy Matthew May in both arms. The other officers opened fire into the building. Miraculously, only Awtry was hit. As he fell back into a hallway, other players reporting him asking, &apos;&apos;Why didn&apos;t you tell me it was the cops?&apos;&apos; The raid team claimed they knocked and announced several times before putting ram to door, but other players said they heard no knock or announcement. When Awtry recovered, he was charged with attempted murder. As part of an agreement, he pleaded guilty and was sentenced to five years in prison. Police had broken up Awtry&apos;s games in the past. But on those occasions, they had knocked and waited, he had let them in peacefully, and he&apos;d been given a $100 fine." />
                      <outline text="The poker raids have gotten bad enough that the Poker Players Alliance, an interest group that lobbies to make the game legal, has established a network of attorneys around the country to help players who have been raided and arrested." />
                      <outline text="But the mission creep hasn&apos;t stopped at poker games. By the end of the 2000s, police departments were sending SWAT teams to enforce regulatory law. In August 2010, for example, a team of heavily armed Orange County, Florida, sheriff&apos;s deputies raided several black-and Hispanic-owned barbershops in the Orlando area. More raids followed in September and October. The Orlando Sentinel reported that police held barbers and customers at gunpoint and put some in handcuffs, while they turned the shops inside out. The police raided a total of nine shops and arrested thirty-seven people." />
                      <outline text="By all appearances, these raids were drug sweeps. Shop owners told the Sentinel that police asked them where they were hiding illegal drugs and weapons. But in the end, thirty-four of the thirty-seven arrests were for &apos;&apos;barbering without a license,&apos;&apos; a misdemeanor for which only three people have ever served jail time in Florida.The most disturbing aspect of the Orlando raids was that police didn&apos;t even attempt to obtain a legal search warrant. They didn&apos;t need to, because they conducted the raids in conjunction with the Florida Department of Business and Professional Regulation. Despite the guns and handcuffs, under Florida law these were licensure inspections, not criminal searches, so no warrants were necessary." />
                      <outline text="That such &apos;&apos;administrative searches&apos;&apos; have become an increasingly common way for police to get around the Fourth Amendment is bad enough. More disturbing is the amount of force they&apos;re opting to use when they do. In the fall of 2010, police in New Haven, Connecticut, sent a SWAT team to a local bar to investigate reports of underage drinking. Patrons were lined up at gunpoint while cops confiscated cell phones and checked IDs. There have been similar underage drinking SWAT raids on college fraternities. The Atlanta City Council recently agreed to pay a $1 million settlement to the customers and employees of a gay nightclub after a heavy-handed police raid in which police lined up sixty-two people on the floor at gunpoint, searched for drugs, and checked for outstanding warrants and unpaid parking tickets. Police conducted the September 2009 raid after undercover vice cops claimed to have witnessed patrons and employees openly having sex at the club. But the police never obtained a search warrant. Instead, the raid was conducted under the guise of an alcohol inspection. Police made no drug arrests, but arrested eight employees for permit violations." />
                      <outline text="Federal appeals courts have upheld these &apos;&apos;administrative searches&apos;&apos; even when it seems obvious that the real intent was to look for criminal activity as long as the government can plausibly claim that the primary purpose of the search was regulatory. In the case of the Orlando raids, simply noting the arrests of thirty-four unlicensed barbers would be enough to meet the test." />
                      <outline text="But the Fourth Amendment requires that searches be &apos;&apos;reasonable.&apos;&apos; If using a SWAT team to make sure a bar isn&apos;t serving nineteen-year-olds is a reasonable use of force, it&apos;s hard to imagine what wouldn&apos;t be. At least a couple of federal appeals courts have recognized the absurdity. In 2009 the US Court of Appeals for the Fifth Circuit struck a small blow for common sense, allowing a civil rights suit to go forward against the sheriff&apos;s department of Rapides Parish, Louisiana, after a warrantless SWAT raid on a nightclub thinly veiled as an administrative search. And in 1995 the US Court of Appeals for the Eleventh Circuit made an even broader ruling, finding that having probable cause and a warrant for the arrest of one person in a club did not justify a SWAT raid and subsequent search of the entire club and everyone inside." />
                      <outline text="But other legal challenges to paramilitary-style administrative searches have been less successful. Consider the bizarre case of David Ruttenberg, owner of the Rack &apos;n&apos; Roll pool hall in Manassas Park, Virginia. In June 2004, local police conducted a massive raid on the pool hall with more than fifty police officers, some of whom were wearing face masks, toting semi-automatic weapons, and pumping shotguns as they entered. Customers were detained, searched, and zip-tied. The police were investigating Ruttenberg for several alleged drug crimes, although he was never charged. The local narcotics task force had tried unsuccessfully to get a warrant to search Ruttenberg&apos;s office but were denied by a judge. Instead, they simply brought along several representatives of the Virginia Department of Alcoholic Beverage Control and claimed that they were conducting an alcohol inspection. Ruttenberg was cited only for three alcohol violations, based on two bottles of beer a distributor had left that weren&apos;t clearly marked as samples, and a bottle of vodka they found in his private office." />
                      <outline text="In June 2006, Ruttenberg filed a civil rights suit alleging that, among other things, using a SWAT team to conduct an alcohol inspection was an unreasonable use of force. (The town&apos;s vendetta against Ruttenberg stretched on for years and is one of the strangest cases I&apos;ve ever encountered. He eventually sold his bar and moved to New York.) In 2010, the US Court of Appeals for the Fourth Circuit denied his claim. So for now, in the Fourth Circuit, sending a SWAT team to make sure a bar&apos;s beer is labeled correctly is not a violation of the Fourth Amendment.By the end of the decade, state and local SWAT teams were regularly being used not only for raids on poker games and gambling operations but also for immigration raids (on both businesses and private homes) and raids on massage parlors, cat houses, and unlicensed strip clubs. Today the sorts of offenses that can subject a citizen to the SWAT treatment defy caricature. If the government wants to make an example of you by pounding you with a wholly disproportionate use of force, it can. It&apos;s rare that courts or politicians even object, much less impose consequences." />
                      <outline text="Another example is the use of these tactics on people suspected of downloading child pornography." />
                      <outline text="Because people suspected of such crimes are generally considered among the lowest of the low, there&apos;s generally little objection to using maximum force to apprehend them. But when police use force to demonstrate disgust for the crimes the target is suspected of committing, there&apos;s always a risk of letting disgust trump good judgment. In one recent case in West Virginia, police violently stormed a house after a Walmart employee reported seeing an image of a man&apos;s genitals near a child&apos;s cheek in a set of photos a customer had left at the store to be developed. After terrorizing the customer&apos;s family (he was out of town), the police learned that the cheek in the photo wasn&apos;t a child&apos;s but that of a thirty-five-year-old Filipino woman." />
                      <outline text="Given that most child pornography investigations today involve people who use the Internet to find or distribute the offending images and videos, the investigations can be fraught with problems. There have been several instances in recent years of police waging child porn raids on people after tracing IP addresses, only to learn after the fact that the victims of the raid had an open wireless router that someone else had used to download the pornography. Inevitably, the lesson drawn by police and by the media covering these stories is not that a SWAT raid may be an inappropriate way to arrest someone suspected of looking at child porn on a computer, or that police who insist on using such tactics should probably factor the possibility of an open router into their investigation before breaking down someone&apos;s door, but rather that we should all make sure our wireless routers are password-protected&apos;--so we too don&apos;t get wrongly raided by a SWAT team, too." />
                      <outline text="It can also be difficult to trace an IP address to a physical address, which can lead to yet more mistaken raids. An example of that problem manifested in one of the more bizarre botched raids in recent years. It took place in September 2006, when a SWAT team from the Bedford County sheriff&apos;s department stormed the rural Virginia home of A. J. Nuckols, his wife, and their two children. Police had traced the IP address of someone trading child porn online to the Nuckols&apos; physical address. They had made a mistake. As if the shock of having his house invaded by a SWAT team wasn&apos;t enough, Nuckols was in for another surprise. In a letter to the editor of the Chatham Star Review, he described the raid: &apos;&apos;Men ran at me, dropped into shooting position, double-handed semi-automatic pistols pointed at me, and made me put my hands against my truck. I was held at gunpoint, searched, taunted, and led into the house. I had no idea what this was about. I was scared beyond description.&apos;&apos;" />
                      <outline text="He then looked up, and saw . . . former NBA star Shaquille O&apos;Neal." />
                      <outline text="O&apos;Neal, an aspiring lawman, had been made an &apos;&apos;honorary deputy&apos;&apos; with the department. Though he had no training as a SWAT officer, Shaq apparently had gone on several such raids with other police departments around the country. The thrill of bringing an untrained celebrity along apparently trumped the requirement that SWAT teams be staffed only with the most elite, most highly qualified and best-trained cops. According to Nuckols, O&apos;Neal reached into Nuckols&apos;s pickup, snatched up his (perfectly legal) rifle, and exclaimed, &apos;&apos;We&apos;ve got a gun!&apos;&apos; O&apos;Neal told Time that Nuckols&apos;s description of the raid on his home was exaggerated. &apos;&apos;It ain&apos;t no story,&apos;&apos; he said. &apos;&apos;We did everything right, went to the judge, got a warrant. You know, they make it seem like we beat him up, and that never happened. We went in, talked to him, took some stuff, returned it&apos;--bada bam, bada bing.&apos;&apos;" />
                      <outline text="Incidentally, there have been other strange incidents of SWAT teams with star power. Matt Damon accompanied SWAT officers on several raids while preparing for the movie &apos;&apos;The Departed.&apos;&apos; And after police mistakenly shot and killed immigrant and father Ismael Mena on a raid in Denver in 1999, they revealed that Colorado Rockies first baseman Mike Lansing had gone along for the ride. Denver police added that it was fairly common to take sports stars on drug raids." />
                      <outline text="In 2010 a massive Maricopa County SWAT team, including a tank and several armored vehicles, raided the home of Jesus Llovera. The tank in fact drove straight into Llovera&apos;s living room. Driving the tank? Action movie star Steven Seagal, whom Sheriff Joe Arpaio had recently deputized. Seagal had also been putting on the camouflage to help Arpaio with his controversial immigration raids. All of this, by the way, was getting caught on film. Seagal&apos;s adventures in Maricopa County would make up the next season of the A&amp;E TV series Steven Seagal, Lawman.Llovera&apos;s suspected crime? Cockfighting. Critics said that Arpaio and Seagal brought an army to arrest a man suspected of fighting chickens to play for the cameras. Seagal&apos;s explanation for the show of force: &apos;&apos;Animal cruelty is one of my pet peeves.&apos;&apos; All of Llovera&apos;s chickens were euthanized. During the raid, the police also killed his dog." />
                      <outline text="In the end, while the Supreme Court has laid down some avoidable requirements for obtaining a no-knock warrant (or deciding to conduct a no-knock raid at the scene), there are few court decisions, laws, or regulations when it comes to when it is and isn&apos;t appropriate to use a SWAT team and all the bells and whistles of a dynamic entry. The decision is almost always left to the discretion of the police agency&apos;--or in the case of the multi-jurisdictional task forces, to the SWAT team itself. The mere fact that there&apos;s actually a split in the federal court system over the appropriateness of using SWAT teams to perform regulatory alcohol inspections at bars shows just how little attention the courts pay to the Fourth Amendment&apos;s reasonableness requirement." />
                      <outline text="In other words, if the DEA wants to stick it to medical marijuana users because they&apos;re flouting federal law, they can. If Steven Seagal wants to drive a tank into a man&apos;s living room to demonstrate his love of animals, he can. If the Consumer Products Safety Commission (CPSC) wants to send a SWAT team to a physicist&apos;s house to show that it&apos;s cracking down on illegal bottle rockets, it can. At worst, the DEA, the CPSC, and Steven Seagal will be chastised by a judge after the fact, though that seldom happens. Even on the rare occasions when someone actually gets into court and wins an excessive-force lawsuit stemming from a raid, the damages are usually borne by taxpayers, not by the cops who used excessive force. In some cases, community outrage and bad press have persuaded police agencies to change a policy here or there regarding the deployment of their SWAT teams. But if they want to reneg and go back to breaking down the doors of people suspected of stealing decorative fish, there&apos;s very little to stop them." />
                      <outline text="* * *" />
                      <outline text="Toward the end of the 2000s there were hints that the public was beginning to want a change, though that desire could manifest in unexpected ways. A former colleague at the Cato Institute, Tim Lynch, has told me that when he gives talks about the Waco raid, he finds that people are somewhat sympathetic to the argument that the government overreacted, but that they still can&apos;t get past the weirdness of the Branch Davidians themselves&apos;--their stockpile of weapons and the claims of sexual abuse and drug distribution in the community. Even the children who died are sometimes dismissed with guilt by association. But when he mentions that the ATF agents killed the Davidians&apos; dogs, Lynch tells me, people become visibly angry. I have found the same thing to be true in my reporting on drug raids." />
                      <outline text="At first, that may seem to indicate that people callously value the lives of pets more than the lives of people. But the fact that killing the dog during these raids has become nearly routine in many police agencies demonstrates just how casually those agencies have come to accept drug war collateral damage. When I started logging cop-shoots-dog incidents on my blog (under the probably sensational term &apos;&apos;puppycide&apos;&apos;), people began sending me new stories as they happened. Cops are now shooting dogs at the slightest provocation. As of this writing, I&apos;m sent accounts of a few incidents each week." />
                      <outline text="It&apos;s difficult to say if this is happening more frequently. There are no national figures, and estimates are all over the map. One dog handler recently hired to train a police department in Texas estimates there are up to 250,000 cop-shoots-dog cases each year. That seems high. In 2009 Randal Lockwood of the American Society for the Prevention of Cruelty to Animals (ASPCA) told the Las Vegas Review-Journal that he sees 250 to 300 incidents per year in media reports, and he estimates that another 1,000 aren&apos;t reported. The Indianapolis Star reported that between 2000 and 2002 police in that city shot 44 dogs. A recent lawsuit filed by the Milwaukee owner of a dog killed by cops found that police in that city killed 434 dogs over a nine-year period, or about one every seven and a half days. But those figures aren&apos;t all that helpful. They don&apos;t say how many of those dogs were actually vicious, how many were strays, or how many were injured and perhaps killed as an act of mercy versus how many were unjustified killings of pets." />
                      <outline text="What is clear is that police are almost always cleared of any wrongdoing in these shootings. An officer&apos;s word that he felt a dog posed a threat to his safety is generally all it takes. Whether or not the officer&apos;s fear was legitimate doesn&apos;t seem to matter. Thanks to smart phones and surveillance cameras, a growing batch of these incidents have been caught on video have shown that officers&apos; claims that the dog was threatening often aren&apos;t matched by the dog&apos;s body language. In recent years, police officers have shot and killed chihuahuas, golden retrievers, labs, miniature dachshunds, Wheaton terriers, and Jack Russell terriers. In 2012 a California police officer shot and killed a boxer puppy and pregnant chihuahua, claiming the boxer had threatened him. The chihuahua, he said, got caught in the crossfire. Police officers have also recently shot dogs that were chained, tied, or leashed, going so far as to kill pets while merely questioning neighbors about a crime in the area, cutting across private property while in pursuit of a suspect, and after responding to false burglar alarms." />
                      <outline text="It&apos;s possible that these incidents could just be attributed to rogue cops. But the fact that the police are nearly always excused in these cases&apos;--even in the more ridiculous examples&apos;--suggests there may be an institutional problem. So does the fact that only a handful of police departments give their cops any training at all when it comes to reading and handling the dogs they may encounter. In a 2012 article for the Huffington Post, my intern J. L. Greene and I looked at twenty-four recent cases of &apos;&apos;puppycide&apos;&apos; and called the relevant police departments to inquire about training. Only one department could confirm that its officers received training at the time of the incident in question. (Eleven departments did not return our phone calls.) That jibes with an earlier article I wrote for The Daily Beast in which both the ASPCA and the Humane Society told me that they offer such training to any police department that wants it, while few take advantage of the offer. Joseph Pentangelo, the ASPCA&apos;s assistant director for law enforcement, who also served twenty-one years with the NYPD, told me, &apos;&apos;New York is the only state I know of that mandates formalized training, and that&apos;s during academy. There are some individual departments in other parts of the country that avail themselves of our training, but not many. Not enough.&apos;&apos;" />
                      <outline text="Given how likely it is that police officers will often interact with animals, you would think that such training would be common. It is at the US Postal Service. A spokesman for the USPS told me that while dog bites do happen on occasion, serious dog attacks on mail carriers are almost nonexistent. Postal workers are given regular training in distracting dogs with toys, subduing them with voice commands, or, at worst, incapacitating them with Mace. Mail carriers are shown a two-hour video and then given annual instruction on topics like recognizing and reading a dog&apos;s body language and differentiating between aggressive charging and playful bounding, and between a truly dangerous dog and a merely territorial one." />
                      <outline text="The fact that the Postal Service offers such training and most police departments don&apos;t lends some credence to the theory that dog shootings are part of the larger problem of a battlefield mentality that lets police use lethal force in response to the slightest threat&apos;--usually with few consequences. &apos;&apos;It&apos;s an evolving phenomenon,&apos;&apos; says Norm Stamper, the former Seattle police chief. &apos;&apos;It started when drug dealers began to recruit pit bulls to guard their supply. These dogs weren&apos;t meant to attack cops. They were meant to attack other drug dealers who came to rob them. But of course they did attack cops. And yes, that&apos;s awfully scary if one of those things latches on to your leg.&apos;&apos;" />
                      <outline text="But Stamper says that like many aspects of modern policing, dog shootings may have had a legitimate origin, but the practice has since become a symptom of the mind-set behind a militarized police culture. &apos;&apos;Among other things, it really shows a lack of imagination. These guys think that the only solution to a dog that&apos;s yapping or charging is shooting and killing it. That&apos;s all they know. It goes with this notion that police officers have to control every situation, to control all the variables. That&apos;s an awesome responsibility, and if you take it on, you&apos;re caving to delusion. You no longer exercise discrimination or discretion. You have to control, and the way you control is with authority, power, and force. With a dog, the easiest way to take control is to simply kill it. I mean, especially if there are no consequences for doing so.&apos;&apos;" />
                      <outline text="A handful of police departments do now mandate dog training, including Nashville, Omaha, and Milwaukee. Police departments in Austin, Fort Worth, and Arlington, Texas, do too. All began offering training after public backlash over one or more cop-shoots-dog incidents." />
                      <outline text="&apos;&apos;In my ten years in law enforcement on the street, I can&apos;t remember one case where a police officer shot a dog,&apos;&apos; says Russ Jones, the former narcotics cop with the San Jose Police Department and the DEA. &apos;&apos;I don&apos;t understand it at all. I guess somewhere along the line a cop shot a dog under questionable circumstances and got away with it. Word got out, and now it seems like some cops are just looking for reasons to take a shot at a dog. Maybe it just comes down to that&apos;--we can get away with it, therefore we do it.&apos;&apos;" />
                      <outline text="* * *" />
                      <outline text="On the Friday afternoon before the 2009 G-20 summit was to begin in Pittsburgh at the David L. Lawrence Convention Center, a reader in the city sent me a photo he&apos;d snapped moments earlier. The photo was of a police officer standing in the middle of an intersection. He was wearing a military-green top, camouflage pants, and combat boots. He had a gun strapped to his thigh and looked to be carrying another one. The camouflage in particular seemed odd&apos;--as it does whenever it&apos;s worn by a police officer in an urban area. It was unclear why this cop would have wanted to hide, and even if he did, how camouflage would help him do so in the city. There seemed to be little purpose for it other than to mimic the military. In any case, it was a sign of what was to come." />
                      <outline text="This is how the country that gave the world the First Amendment now handles protest. There&apos;s a disquieting ease now with which authorities are willing to crush dissent&apos;--and at the very sorts of events where the right to dissent is the entire purpose of protecting free speech&apos;--that is, events where influential policymakers meet to make high-level decisions with far-reaching consequences. In fact, the more important the policymakers and the more consequential the decisions they&apos;ll be making, the more likely it is that police will use more force to keep protesters as far away as possible. As Norm Stamper said, this unfortunately was the lesson the country&apos;s law enforcement agencies took from the 1999 WTO protests in Seattle." />
                      <outline text="A number of police departments from across the country had sent officers to Pittsburgh to help police the 2009 summit. Nearly all were dressed in similar paramilitary garb. In one widely circulated video from the summit, several police officers dressed entirely in camouflage emerged from an unmarked car, apprehended a young backpack-toting protester, stuffed him into the car, then drove off. It evoked the sort of &apos;&apos;disappearance&apos;&apos; you might envision happening in a Latin American country headed by a junta, or one of the countries of the Soviet bloc. Matt Drudge linked to the video with a headline describing the officers in it as members of the military. They weren&apos;t, though it&apos;s certainly easy to understand how someone might make that mistake." />
                      <outline text="Another video showed a police unit with a handcuffed protester. Officers surrounded the protester, propped him up, then posed with him while another officer snapped a trophy photo. (YouTube later removed the video, citing a terms of use violation.) It was later revealed that the police unit was from Chicago. They had taken vacation time to come to Pittsburgh to provide &apos;&apos;freelance security&apos;&apos; for the G-20 summit." />
                      <outline text="As the summit went on, Twitter feeds and uploaded photos and videos claimed (and sometimes provided some evidence to prove) that police fired tear-gas canisters into dorm rooms, used sound cannons, and fired bean bags and rubber bullets. One man was arrested for posting the locations of riot police to his Twitter feed. The charges were later dropped." />
                      <outline text="Emily Tanner, a grad student at the University of Pittsburgh who described herself as a &apos;&apos;capitalist&apos;&apos; who didn&apos;t agree with the general philosophy of the antiglobalization protesters, covered the summit, the protests, and the fallout on her blog. The most egregious police actions seemed to take place on the Friday evening before the summit, around the university, when police began ordering students who were in public spaces to disperse, despite the fact that they had broken no laws. Students who moved too slowly were arrested, as were students who were standing in front of the dormitories where they lived." />
                      <outline text="A University of Pittsburgh spokesman later said that the tactic was to break up crowds that &apos;&apos;had the potential of disrupting normal activities, traffic flow, egress and the like. . . . Much of the arrests last night had to do with failure to disperse when ordered.&apos;&apos; Note that no one needed to have broken any actual laws to get arrested. The potential to break a law was more than enough. That standard was essentially a license for the police to arrest anyone, anywhere in the city, at any time, for any reason." />
                      <outline text="Pennsylvania ACLU legal director Vic Walczak said the problem was that police didn&apos;t bother to attempt to manage the protests. They simply suppressed them. In the process, they rounded up not only innocent protesters but innocent students who had nothing to do with the protests at all. In all, 190 people were arrested. One of the arrestees was a reporter from the left-leaning organization Indy-Media. When they apprehended her, the police took her camera. When they returned her camera, it was broken, and the police had deleted her photos and videos of the protests and police reaction. The police presence &apos;&apos;seemed to focus almost exclusively on peaceful demonstrators,&apos;&apos; Walczak said. &apos;&apos;On [Friday] night they didn&apos;t even have the excuse of property damage going on or any illegal activity. It&apos;s really inexplicable.&apos;&apos;" />
                      <outline text="Inexcusable perhaps, but not inexplicable. Since Seattle, this had become the template. At the 2008 Republican National Convention in Minneapolis, police conducted peremptory raids on the homes of protesters before the convention had even started. Police broke into the homes of people known to be activist rabble-rousers before they had any evidence of any actual crime. Journalists who inquired about the legitimacy of the raids and arrests made during the convention were also arrested. In all, 672 people were put in handcuffs. The arrest of Democracy Now journalist Amy Goodman was captured on a widely viewed video. She was charged with &apos;&apos;conspiracy to riot.&apos;&apos; That charge against Goodman was later dropped. So were the charges against most of the others arrested. The Minneapolis Star-Tribune reported the following February that charges were dropped or dismissed for 442 of the 672 people arrested." />
                      <outline text="There were similar problems at the 2008 Democratic National Convention. Police in Denver showed up for the protests decked out in full riot gear. One particularly striking photo from Denver &#188;&#188;&#188;&#188;&#188;&#188;&#188;&#188;&#188;showed a sea of cops in shiny black armor, batons in hand, surrounding a small, vastly outnumbered group of protesters. The most volatile night of the convention featured one incident in which Jefferson County, Colorado, deputies unknowingly clashed with and then pepper-sprayed undercover Denver cops posing as violent protesters. The city later paid out $200,000 to settle a lawsuit alleging that a Denver SWAT team was making indiscriminate arrests, rounding up protesters and bystanders alike." />
                      <outline text="Perhaps the best insight into the mentality the police brought to the DNC protests could be found on the T-shirts the Denver police union had printed up for the event. The shirts showed a menacing cop holding a baton. The caption: DNC 2008: WE GET UP EARLY, TO BEAT THE CROWDS. Police were spotted wearing similar shirts at the 2012 NATO summit in Chicago. At the 1996 DNC convention in Chicago, cops were seen wearing shirts that read: WE KICKED YOUR FATHER&apos;S ASS IN 1968 . . . WAIT &apos;TIL YOU SEE WHAT WE DO TO YOU!" />
                      <outline text="This default militaristic response to protest of overkill was then given an extended national stage during the Occupy protests of 2011. In the most infamous incident, now forever captured in countless Internet memes and mashups, Lt. John Pike of the University of California&apos;&apos;Davis campus police casually hosed down a peaceful group of protesters with a pepper-spray canister. But that was far from the only incident. Police across the country met protesters in riot gear, once again anticipating&apos;--and in too many instances seemingly even craving&apos;--confrontation. In Oakland, the skull of Iraq War veteran Scott Olsen was fractured by a tear-gas canister that the police had fired into the crowd. In New York, NYPD officer Anthony Bologna pepper-sprayed a group of helpless protesters who had been penned in by police fencing." />
                      <outline text="One thing the Occupy crackdowns did seem to do was focus renewed attention on police tactics and police militarization. Big-picture stories about the Pentagon buildup, Department of Homeland Security (DHS) funding for antiterror gear, and the proliferation of SWAT teams started streaming out of media outlets, giving the militarization issue the most coverage it had received since Kraska&apos;s studies came out in the late 1990s. Part of that was due to social media. The ubiquity of smart phones and the viral capacity of Twitter, Facebook, Tumblr, and blogs were already bringing unprecedented accountability to police misconduct and government oppression, be it a Baltimore cop screaming obscenities at a kid on a skateboard, a transit cop in Oakland shooting a man who lay handcuffed on his stomach, or government paramilitaries in Iran gunning down a young woman in cold blood during Arab Spring democracy protests. But the Occupiers, who tended to be young, white, and middle-to upper-middle-class, knew social media like few other demographics. They knew how to live-stream video directly to the Internet. They all had smart phones, so police couldn&apos;t suppress incriminating video by confiscating one or two or ten phones&apos;--someone was bound to have video of not only the original incident but also of police trying to confiscate phones to cover it up." />
                      <outline text="The political reaction to the Occupy crackdowns was interesting to watch. In the 1990s, it had been the right wing&apos;--particularly the far right&apos;--that was up in arms over police militarization. Recall the outrage on the right over Waco, Ruby Ridge, and the raid to seize Elin Gonzlez. The left had largely either remained silent or even defended the government&apos;s tactics in those cases. But the right-wing diatribes against jackbooted thugs and federal storm-troopers all died down once the Clinton administration left office, and they were virtually nonexistent after September 11, 2001. By the time cops started cracking heads at the Occupy protests, some conservatives were downright gleeful. The militarization of federal law enforcement certainly didn&apos;t stop, but the 9/11 attacks and a friendly administration seemed to quell the conservatives&apos; concerns. So long as law enforcement was targeting hippie protesters, undocumented immigrants, suspected drug offenders, and alleged terrorist sympathizers, they were back to being heroes." />
                      <outline text="Steven Greenhut, a conservative-leaning columnist for the Orange County Register and editor of the investigative journalism site CalWatchdog, was dismayed by the right&apos;s reaction. &apos;&apos;What&apos;s really disgusting is the natural instinct of so many conservatives to stick up for the police,&apos;&apos; Greenhut wrote. &apos;&apos;They don&apos;t like the Occupy protesters, so they willingly back brutality against them, without considering the possibility that conservatives at some point might be on the receiving end of this aggression.&apos;&apos;" />
                      <outline text="Unfortunately, consistent voices like Greenhut&apos;s have been rare. Partisan reaction to aggressive police actions against opponents tends to fall somewhere between indifference and schadenfreude." />
                      <outline text="After the December 2012 shooting massacre in Newtown, Connecticut put the issue of gun control back into the political discourse, some progressives again dredged up the right&apos;s criticism of the ATF in the early 1990s. In one lengthy segment, MSNBC host Rachel Maddow aired old footage from Waco and Ruby Ridge while making some tenuous connections between gun rights politicians and activists and Weaver, McVeigh, and Koresh. She referred to a &apos;&apos;conspiracy-driven corner of the gun world&apos;s paranoia about federal agents,&apos;&apos; without paying much heed to the fact that the ATF was inflicting the same sort of abuse on suspected gun offenders that Maddow herself has decried when used against suspected undocumented immigrants or Occupy protesters. More tellingly, Maddow added that there&apos;s nothing wrong with wanting to give more power to the ATF based only on the politics of the people opposed to doing so. &apos;&apos;Sometimes the character of the opposition defines why something ought to be the most politically viable thing in the world,&apos;&apos; she said." />
                      <outline text="But even before Newtown, progressives have been advocating for the use of more government force against political factions they find unsavory. In 2009 the Department of Homeland Security issued a controversial report on what the author&apos;--DHS analyst Daryl Johnson&apos;--called a resurgence of right-wing extremism and the threat it posed to domestic security. The report was widely criticized on the right and was eventually criticized and revoked by DHS secretary Janet Napolitano. But after a spate of mass killings in the following years by assailants with political views that in some cases could loosely be characterized as right-wing, Johnson became something of a progressive hero. Most of the incidents involved clearly mentally ill attackers whose politics were all over the place. Even Johnson acknowledged that the incident most in line with his thesis&apos;--the massacre at a Sikh Temple in Oak Creek, Wisconsin, by a white supremacist named Wade Michael Page&apos;--was the work of a &apos;&apos;lone wolf&apos;&apos; attacker and likely would not have been prevented by the recommendations in his report." />
                      <outline text="Still, he was celebrated on the left. The progressive advocacy group Media Matters declared him &apos;&apos;vindicated.&apos;&apos; Similar sentiment popped up on progressive outlets like ThinkProgress, Salon, Rachel Maddow&apos;s MSNBC blog, and Democracy Now." />
                      <outline text="In truth, attacks by groups on the fringes of the right wing have actually dropped in recent years, despite some claims that they&apos;ve increased in response to the election of a black president. Attacks from groups on the fringes of the left wing are in decline too, as are alleged attempted terrorist attacks by fringe Muslim groups." />
                      <outline text="In a 2012 interview with the Idaho Spokesman Review, Johnson showed why it may not have been such a great idea for progressives to embrace him simply because he wanted to shut down opinions they found distasteful. Johnson was interviewed for an article on the twentieth anniversary of the Ruby Ridge fiasco, and he took one step further Rachel Maddow&apos;s idea of supporting government force simply because you don&apos;t like the factions opposing it. Johnson in fact suggested that merely having concerns about police militarization is a worry only borne by extremists. In fact, he appeared to have suggested that even recognizing that militarization is happening is an indication of fringe extremism." />
                      <outline text="&apos;&apos;For American extremists, the siege at Ruby Ridge symbolizes the &apos;militarized police state,&apos;&apos;&apos; said Johnson. The US government, through its Department of Homeland Security in particular, he said, &apos;&apos;has unintentionally fostered, and even solidified, Orwellian conspiracies concerning an overzealous, oppressive federal government and its perceived willingness to kill to ensure citizen compliance. . . . In the minds of modern-day extremists, [Homeland Security] has enhanced the lethal capability of many underfunded, small-town police forces through its grant programs.&apos;&apos; Using federal grants, state and local law enforcement agencies have been able to buy expensive equipment and training that are &apos;&apos;commonly associated with the military,&apos;&apos; he said, adding that &apos;&apos;extremists view such a security buildup as a continuation of the Ruby Ridge legacy.&apos;&apos; That legacy is a continuing drumbeat for extremists and white supremacists who recruit with the message of &apos;&apos;big government versus the little guy&apos;&apos; and &apos;&apos;the government set me up.&apos;&apos; These extremist ideas continue as messages and even recruiting themes among various radical groups in the United States, Johnson said." />
                      <outline text="I attempted to contact Johnson to ask if he&apos;d like to clarify his comments. He didn&apos;t return my calls. As they stand, these quotes are striking, particularly from someone who once worked for the Department of Homeland Security and now runs a consulting firm that works with law enforcement agencies. They certainly appear to dismiss police militarization&apos;--a phenomenon documented by a wide range of media outlets and criticized by interests all across the political spectrum&apos;--as merely a fantasy cooked up by extremists to boost their recruiting. Incidentally, the publications and advocacy groups who have recently expressed concerns about police militarization include ThinkProgress, Wired, Salon, MSNBC, and Democracy Now&apos;-- all of them also ran articles praising Johnson." />
                      <outline text="So long as partisans are only willing to speak out against aggressive, militarized police tactics when they&apos;re used against their own and are dismissive or even supportive of such tactics when used against those whose politics they dislike, it seems unlikely that the country will achieve enough of a political consensus to begin to slow down the trend." />
                      <outline text="Excerpted from &apos;&apos;Rise of the Warrior Cop: The Militarization of America&apos;s Police Forces&apos;&apos; by Radley Balko.  Reprinted with permission from PublicAffairs Books." />
              </outline>

              <outline text="VIDEO-Fox News Watch: Why Did Greenwald Expose NSA Leak Story?">
                      <outline text="Link to Article" type="link" url="http://www.breitbart.com/Breitbart-TV/2013/07/07/Fox-News-Watch-Why-did-Greenwald-expose-the-NSA-leak-story" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373263090_SQdT66Fx.html" />
      <outline text="Mon, 08 Jul 2013 05:58" />
                      <outline text="" />
                      <outline text="Fox News Watch: Why Did Greenwald Expose NSA Leak Story?         7 Jul 2013, 10:30 PM PDT7 Jul 2013, 3:39 PM PDT7 Jul 2013, 2:52 PM PDT7 Jul 2013, 1:52 PM PDT7 Jul 2013, 12:24 PM PDT  7 Jul 2013, 9:45 PM PDT7 Jul 2013, 9:30 PM PDT7 Jul 2013, 9:00 PM PDT7 Jul 2013, 4:59 PM PDT7 Jul 2013, 1:17 PM PDT  7 Jul 2013, 10:09 PM PDT7 Jul 2013, 9:41 PM PDT7 Jul 2013, 8:48 PM PDT7 Jul 2013, 8:47 PM PDT7 Jul 2013, 8:33 PM PDT" />
              </outline>

              <outline text="Margin Calls Coming On US Too-Big-To-Fail Banks">
                      <outline text="Link to Article" type="link" url="http://wtfrly.com/2013/07/08/margin-calls-coming-on-us-too-big-to-fail-banks/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373262808_9bddFs88.html" />
        <outline text="Source: WTF RLY REPORT" type="link" url="http://wtfrly.com/feed" />
      <outline text="Mon, 08 Jul 2013 05:53" />
                      <outline text="" />
                      <outline text="TradingFloor.comby Steen Jakobsen" />
                      <outline text="This week&apos;s biggest news is not the Nonfarm Payrolls, or the European Central Bank or even Portugal&apos;s government falling. No &apos;&apos; this week&apos;s big deal is the openness with which the Federal Reserve is preparing a major margin call on the too-big-to-fail banks in the US. " />
                      <outline text="This has been a long time coming since the introduction of the Dodd-Frank law back in 2010 but it is a game changer. Remember all macro paradigm shifts come from policy impulses, often mistakes." />
                      <outline text="Fed approves step one in a three step plan" />
                      <outline text="Under the final rule, minimum requirements will increase for both the quantity and quality of capital held by banking organisations. Consistent with the international Basel framework, the rule includes a new minimum ratio of common equity tier 1 capital to risk-weighted assets of 4.5 percent and a common equity tier 1 capital conservation buffer of 2.5 percent of risk-weighted assets that will apply to all supervised financial institutions. The rule also raises the minimum ratio of tier 1 capital to risk-weighted assets from four percent to six percent and includes a minimum leverage ratio of four percent for all banking organisations. In addition, for the largest, most internationally-active banking organisations, the final rule includes a new minimum supplementary leverage ratio that takes into account off-balance sheet exposures. (See the press release here) " />
                      <outline text="I know you are thinking: Wow, this is the most interesting thing I have seen in years  but alas it is &apos;&apos; because it is in fact a major margin call on the US holding banks." />
                      <outline text="Note how this adoption is only the first set of a series of new rules. Let me introduce you to: Daniel Tarullo, The Federal Reserve Governor in charge of regulation after the implementation of the Dodd-Frank law in 2010. (As a consequence of Dodd-Frank, the Fed got a permanent regulatory governor.) " />
                      <outline text="I had nothing else to do so I read his latest speeches which are surprisingly clear (considering that he&apos;s a policy guy)." />
                      <outline text="Governor Daniel K. Tarullo At the Peterson Institute for International Economics, Washington, D.C." />
                      <outline text="May 3, 2013 Evaluating Progress in Regulatory Reforms to Promote Financial Stability" />
                      <outline text="The speech considers the &apos;&apos;additional charges&apos;&apos; which are coming and today&apos;s Basel III was only item number one:" />
                      <outline text="First, the basic prudential framework for banking organisations is being considerably strengthened, both internationally and domestically. Central to this effort are the Basel III changes to capital standards, which create a new requirement for a minimum common equity capital ratio. This new standard requires substantial increases in both the quality and quantity of the loss-absorbing capital that allows a firm to remain a viable financial intermediary. Basel III also established for the first time an international minimum leverage ratio which, unlike the traditional US leverage requirement, takes account of off-balance-sheet items." />
                      <outline text=" " />
                      <outline text="Second, a series of reforms have been targeted at the larger financial firms that are more likely to be of systemic importance. When fully implemented, these measures will have formed a distinct regulatory and supervisory structure on top of generally applicable prudential regulations and supervisory requirements. The governing principle for this new set of rules is that larger institutions should be subject to more exacting regulatory and supervisory requirements, which should become progressively stricter as the systemic importance of a firm increases." />
                      <outline text=" " />
                      <outline text="This principle has been codified in Section 165 of the Dodd-Frank Act, which requires special regulations applicable with increasing stringency to large banking organizations. Under this authority, the Federal Reserve will impose capital surcharges on the eight large US banking organizations identified in the Basel Committee agreement for additional capital requirements on banking organisations of global systemic importance. The size of surcharge will vary depending on the relative systemic importance of the bank. Other rules to be applied under Section 165&apos;--including counterparty credit risk limits, stress testing, and the quantitative short-term liquidity requirements included in the internationally-negotiated Liquidity Coverage Ratio (LCR)&apos;--will apply only to large institutions, in some cases with stricter standards for firms of greatest systemic importance." />
                      <outline text=" " />
                      <outline text="An important, related reform in Dodd-Frank was the creation of orderly liquidation authority, under which the Federal Deposit Insurance Corporation can impose losses on a failed systemic institution&apos;s shareholders and creditors and replace its management, while avoiding runs and preserving the operations of the sound, functioning parts of the firm. This authority gives the government a real alternative to the Hobson&apos;s choice of bailout or disorderly bankruptcy that authorities faced in 2008. Similar resolution mechanisms are under development in other countries, and international consultations are underway to plan for cooperative efforts to resolve multinational financial firms." />
                      <outline text=" " />
                      <outline text="A third set of reforms has been aimed at strengthening financial markets generally, without regard to the status of relevant market actors as regulated or systemically important. The greatest focus, as mandated under Titles VII and VIII of Dodd-Frank, has been on making derivatives markets safer through requiring central clearing for derivatives that can be standardised and creating margin requirements for derivatives that continue to be written and traded outside of central clearing facilities. The relevant US agencies are working with their international counterparts to produce an international arrangement that will harmonise these requirements so as to promote both global financial stability and competitive parity. In addition, eight financial market utilities engaged in important payment, clearing, and settlement activities have been designated by the Financial Stability Oversight Council as systemically important and, thus, will now be subject to enhanced supervision." />
                      <outline text="A margin call is coming&apos;..." />
                      <outline text="To illustrate the case, here&apos;s  several quotes and links from today&apos;s media:" />
                      <outline text="Crenews.com: Federal regulators on Tuesday are scheduled to unveil and vote on the final provisions they have set for the US&apos;s implementation of international banking standards that could result in banks pulling back on their commercial real estate activities, including lending, mortgage servicing and CMBS investments. Industry groups are lobbying to lessen the potential impact of the rules." />
                      <outline text=" " />
                      <outline text="See also USA Today: Most banks are already in compliance with the rule, according to the Fed, though it estimates about 100 banks will need to raise roughly USD 4.5 billion in capital by 2019.The new rules simplify the risk calculations for mortgages, a process that community lenders had argued was too complex and would limit their ability to provide home loans. Community and regional banks comprise more than 90% percent of US lenders, according to the Federal Deposit Insurance Corp (FDIC). The Fed unanimously approved the 792-page set of standards, which were mandated by the 2010 financial overhaul law. The FDIC and the Office of the Comptroller of the Currency are also expected to approve the new standards" />
                      <outline text=" " />
                      <outline text="Reuters: However, the Fed warned it was drafting four more rules that would go beyond what the Basel accord called for, including one on leverage and another on a capital surcharge. (See full version of this story here.)" />
                      <outline text="Conclusion" />
                      <outline text="Why is this important? Because part of the Fed&apos;s new remit since Dodd-Frank makes it responsible for bubbles in banking &apos;-- it is even more interesting because clearly, to me at least, this is a major part of why Bernanke and Dudley at the FOMC are willing to ignore the lower inflation. This low inflation has both monetarist and Keynesians up in arms, and as it is often the case, the REAL reason for major macro paradigm shifts comes from policy mistakes in this case pro-cyclical regulation." />
                      <outline text="Prepare yourself and please do read the above. If not we are doomed to focus on QE-petering while Fed gives the whole banking industry a major margin call." />
                      <outline text="Via TradingFloor.com" />
              </outline>

              <outline text="10 Killed in Alaska Plane Crash">
                      <outline text="Link to Article" type="link" url="http://topinfopost.com/2013/07/08/10-killed-in-alaska-plane-crash" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373262662_FXCqtbTQ.html" />
        <outline text="Source: The Top Information Post" type="link" url="http://topinfopost.com/feed" />
      <outline text="Mon, 08 Jul 2013 05:51" />
                      <outline text="" />
                      <outline text="An air taxi crashed Sunday at a small Alaska airport, killing all 10 people on board and leaving the aircraft fully engulfed in flames before firefighters could get to it, authorities said." />
                      <outline text="The de Havilland DHC3 Otter air taxi crashed just after 11 a.m. at the airport in Soldotna, a community about 75 miles southwest of Anchorage and located on the Kenai Peninsula." />
                      <outline text="&apos;&apos;We do have 10 fatalities, unfortunately, nine passengers, one pilot,&apos;&apos; National Transportation Safety Board investigator Clint Johnson told The Associated Press." />
                      <outline text="The Federal Aviation Administration said the Otter was operated by Rediske Air, based out of another Kenai Peninsula community, Nikiski." />
                      <outline text="Will Satathite, who was working Sunday at Rediske Air&apos;s Nikiski office, confirmed to the Peninsula Clarion newspaper that the aircraft was flown by Nikiski pilot and company owner Willy Rediske with nine passengers onboard." />
                      <outline text="A man who didn&apos;t identify himself at the Rediske office declined comment later Sunday to the AP, saying the crash was under investigation." />
                      <outline text="Alaska State Troopers spokeswoman Meagan Peters said the aircraft erupted in flames and the fire initially kept firefighters from reaching the wreckage. The victims have not been identified." />
                      <outline text="The Soldotna Police Department said Sunday evening that the remains of all 10 people have been recovered and sent to the State Medical Examiner&apos;s Office in Anchorage for autopsies and positive identifications." />
                      <outline text="Police said in a release through the Alaska State Troopers that weather at the time of the crash was reported to be cloudy with a light wind." />
                      <outline text="Johnson said initial reports have the plane crashing after departure, but that will have to be confirmed by investigators." />
                      <outline text="The NTSB is sending an investigative team from Washington, D.C., and they are scheduled to arrive Monday afternoon. Also taking part will be Alaska-based investigator Brice Banning, who was called back from the Asiana crash in San Francisco Sunday." />
                      <outline text="For many Alaskans, flying across the state is common because of the limited road system, exposing residents to a litany of hazards including treacherous mountain passes and volatile weather. It&apos;s possible to drive from Anchorage to Soldotna, but it&apos;s about a four-hour trip as the highway hugs Turnagain Arm and then cuts through a mountain passage." />
                      <outline text="Alaska has already seen a several plane crashes this year, including a June 28 crash that killed a pilot and two passengers on a commercial tour in the Alaska Range. The Soldotna crash comes a day after two teenagers were killed when the Asiana flight crashed at San Francisco&apos;s airport." />
                      <outline text="The municipal airport is located about a mile from Soldotna&apos;s commercial business area and is adjacent to the Kenai River, according to the city&apos;s website." />
                      <outline text="The runway is 5,000 foot long and paved" />
                      <outline text="Mirror" />
                      <outline text="Leave CommentsComments" />
              </outline>

              <outline text="Executive Order -- Assignment of National Security and Emergency Preparedness Communications Functions | The White House">
                      <outline text="Link to Article" type="link" url="http://m.whitehouse.gov/the-press-office/2012/07/06/executive-order-assignment-national-security-and-emergency-preparedness-" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373261803_YAtk5LVm.html" />
      <outline text="Mon, 08 Jul 2013 05:36" />
                      <outline text="" />
                      <outline text="The White House" />
                      <outline text="Office of the Press Secretary" />
                      <outline text="For Immediate Release" />
                      <outline text="July 06, 2012" />
                      <outline text="EXECUTIVE ORDER" />
                      <outline text="- - - - - - -" />
                      <outline text="ASSIGNMENT OF NATIONAL SECURITY ANDEMERGENCY PREPAREDNESS COMMUNICATIONS FUNCTIONS" />
                      <outline text="By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby ordered as follows:" />
                      <outline text="Section1. Policy. The Federal Government must have the ability to communicate at all times and under all circumstances to carry out its most critical and time sensitive missions. Survivable, resilient, enduring, and effective communications, both domestic and international, are essential to enable the executive branch to communicate within itself and with: the legislative and judicial branches; State, local, territorial, and tribal governments; private sector entities; and the public, allies, and other nations. Such communications must be possible under all circumstances to ensure national security, effectively manage emergencies, and improve national resilience. The views of all levels of government, the private and nonprofit sectors, and the public must inform the development of national security and emergency preparedness (NS/EP) communications policies, programs, and capabilities." />
                      <outline text="Sec. 2. Executive Office Responsibilities." />
                      <outline text="Sec. 2.1. Policy coordination, guidance, dispute resolution, and periodic in-progress reviews for the functions described and assigned herein shall be provided through the interagency process established in Presidential Policy Directive-1 of February 13, 2009 (Organization of the National Security Council System) (PPD-1)." />
                      <outline text="Sec. 2.2. The Director of the Office of Science and Technology Policy (OSTP) shall: (a) issue an annual memorandum to the NS/EP Communications Executive Committee (established in section 3 of this order) highlighting national priorities for Executive Committee analyses, studies, research, and development regarding NS/EP communications;" />
                      <outline text="(b) advise the President on the prioritization of radio spectrum and wired communications that support NS/EP functions; and" />
                      <outline text="(c) have access to all appropriate information related to the test, exercise, evaluation, and readiness of the capabilities of all existing and planned NS/EP communications systems, networks, and facilities to meet all executive branch NS/EP requirements." />
                      <outline text="Sec. 2.3. The Assistant to the President for Homeland Security and Counterterrorism and the Director of OSTP shall make recommendations to the President, informed by the interagency policy process established in PPD-1, with respect to the exercise of authorities assigned to the President under section 706 of the Communications Act of 1934, as amended (47 U.S.C. 606). The Assistant to the President for Homeland Security and Counterterrorism and the Director of OSTP shall also jointly monitor the exercise of these authorities, in the event of any delegation, through the process established in PPD-1 or as the President otherwise may direct." />
                      <outline text="Sec. 3. The NS/EP Communications Executive Committee." />
                      <outline text="Sec. 3.1. There is established an NS/EP Communications Executive Committee (Executive Committee) to serve as a forum to address NS/EP communications matters." />
                      <outline text="Sec. 3.2. The Executive Committee shall be composed of Assistant Secretary-level or equivalent representatives designated by the heads of the Departments of State, Defense, Justice, Commerce, and Homeland Security, the Office of the Director of National Intelligence (DNI), the General Services Administration, and the Federal Communications Commission, as well as such additional agencies as the Executive Committee may designate. The designees of the Secretary of Homeland Security and the Secretary of Defense shall serve as Co-Chairs of the Executive Committee." />
                      <outline text="Sec. 3.3. The responsibilities of the Executive Committee shall be to: (a) advise and make policy recommendations to the President, through the PPD-1 process, on enhancing the survivability, resilience, and future architecture of NS/EP communications, including what should constitute NS/EP communications requirements;" />
                      <outline text="(b) develop a long-term strategic vision for NS/EP communications and propose funding requirements and plans to the President and the Director of the Office of Management and Budget (OMB), through the PPD-1 process, for NS/EP communications initiatives that benefit multiple agencies or other Federal entities;" />
                      <outline text="(c) coordinate the planning for, and provision of, NS/EP communications for the Federal Government under all hazards;" />
                      <outline text="(d) promote the incorporation of the optimal combination of hardness, redundancy, mobility, connectivity, interoperability, restorability, and security to obtain, to the maximum extent practicable, the survivability of NS/EP communications under all circumstances;" />
                      <outline text="(e) recommend to the President, through the PPD-1 process, the regimes to test, exercise, and evaluate the capabilities of existing and planned communications systems, networks, or facilities to meet all executive branch NS/EP communications requirements, including any recommended remedial actions;" />
                      <outline text="(f) provide quarterly updates to the Assistant to the President for Homeland Security and Counterterrorism and the Director of OSTP, through the Co-Chairs, on the status of Executive Committee activities and develop an annual NS/EP communications strategic agenda utilizing the PPD-1 process;" />
                      <outline text="(g) enable industry input with respect to the responsibilities established in this section; and" />
                      <outline text="(h) develop, approve, and maintain a charter for the Executive Committee." />
                      <outline text="Sec. 4. Executive Committee Joint Program Office." />
                      <outline text="Sec. 4.1. The Secretary of Homeland Security shall establish an Executive Committee Joint Program Office (JPO) to provide full-time, expert, and administrative support for the Executive Committee&apos;s performance of its responsibilities under section 3.3 of this order. Staff of the JPO shall include detailees, as needed and appropriate, from agencies represented on the Executive Committee. The Department of Homeland Security shall provide resources to support the JPO. The JPO shall be responsive to the guidance of the Executive Committee." />
                      <outline text="Sec. 4.2. The responsibilities of the JPO shall include: coordination of programs that support NS/EP missions, priorities, goals, and policy; and, when directed by the Executive Committee, the convening of governmental and nongovernmental groups (consistent with the Federal Advisory Committees Act, as amended (5 U.S.C. App.)), coordination of activities, and development of policies for senior official review and approval." />
                      <outline text="Sec. 5. Specific Department and Agency Responsibilities." />
                      <outline text="Sec. 5.1. The Secretary of Defense shall: (a) oversee the development, testing, implementation, and sustainment of NS/EP communications that are directly responsive to the national security needs of the President, Vice President, and senior national leadership, including: communications with or among the President, Vice President, White House staff, heads of state and government, and Nuclear Command and Control leadership; Continuity of Government communications; and communications among the executive, judicial, and legislative branches to support Enduring Constitutional Government;" />
                      <outline text="(b) incorporate, integrate, and ensure interoperability and the optimal combination of hardness, redundancy, mobility, connectivity, interoperability, restorability, and security to obtain, to the maximum extent practicable, the survivability of NS/EP communications defined in section 5.1(a) of this order under all circumstances, including conditions of crisis or emergency;" />
                      <outline text="(c) provide to the Executive Committee the technical support necessary to develop and maintain plans adequate to provide for the security and protection of NS/EP communications; and" />
                      <outline text="(d) provide, operate, and maintain communication services and facilities adequate to execute responsibilities consistent with Executive Order 12333 of December 4, 1981, as amended." />
                      <outline text="Sec. 5.2. The Secretary of Homeland Security shall: (a) oversee the development, testing, implementation, and sustainment of NS/EP communications, including: communications that support Continuity of Government; Federal, State, local, territorial, and tribal emergency preparedness and response communications; non-military executive branch communications systems; critical infrastructure protection networks; and non-military communications networks, particularly with respect to prioritization and restoration;" />
                      <outline text="(b) incorporate, integrate, and ensure interoperability and the necessary combination of hardness, redundancy, mobility, connectivity, interoperability, restorability, and security to obtain, to the maximum extent practicable, the survivability of NS/EP communications defined in section 5.2(a) of this order under all circumstances, including conditions of crisis or emergency;" />
                      <outline text="(c) provide to the Executive Committee the technical support necessary to develop and maintain plans adequate to provide for the security and protection of NS/EP communications;" />
                      <outline text="(d) receive, integrate, and disseminate NS/EP communications information to the Federal Government and State, local, territorial, and tribal governments, as appropriate, to establish situational awareness, priority setting recommendations, and a common operating picture for NS/EP communications information;" />
                      <outline text="(e) satisfy priority communications requirements through the use of commercial, Government, and privately owned communications resources, when appropriate;" />
                      <outline text="(f) maintain a joint industry-Government center that is capable of assisting in the initiation, coordination, restoration, and reconstitution of NS/EP communications services or facilities under all conditions of emerging threats, crisis, or emergency;" />
                      <outline text="(g) serve as the Federal lead for the prioritized restoration of communications infrastructure and coordinate the prioritization and restoration of communications, including resolution of any conflicts in or among priorities, in coordination with the Secretary of Defense when activities referenced in section 5.1(a) of this order are impacted, consistent with the National Response Framework. If conflicts in or among priorities cannot be resolved between the Departments of Defense and Homeland Security, they shall be referred for resolution in accordance with section 2.1 of this order; and" />
                      <outline text="(h) within 60 days of the date of this order, in consultation with the Executive Committee where appropriate, develop and submit to the President, through the Assistant to the President for Homeland Security and Counterterrorism, a detailed plan that describes the Department of Homeland" />
                      <outline text="Security&apos;s organization and management structure for its NS/EP communications functions, including the Government Emergency Telecommunications Service, Wireless Priority Service, Telecommunications Service Priority program, Next Generation Network Priority program, the Executive Committee JPO, and relevant supporting entities." />
                      <outline text="Sec. 5.3. The Secretary of Commerce shall: (a) provide advice and guidance to the Executive Committee on the use of technical standards and metrics to support execution of NS/EP communications;" />
                      <outline text="(b) identify for the Executive Committee requirements for additional technical standards and metrics to enhance NS/EP communications;" />
                      <outline text="(c) engage with relevant standards development organizations to develop appropriate technical standards and metrics to enhance NS/EP communications;" />
                      <outline text="(d) develop plans and procedures concerning radio spectrum allocations, assignments, and priorities for use by agencies and executive offices;" />
                      <outline text="(e) develop, maintain, and publish policies, plans, and procedures for the management and use of radio frequency assignments, including the authority to amend, modify, or revoke such assignments, in those parts of the electromagnetic spectrum assigned to the Federal Government; and" />
                      <outline text="(f) administer a system of radio spectrum priorities for those spectrum-dependent telecommunications resources belonging to and operated by the Federal Government and certify or approve such radio spectrum priorities, including the resolution of conflicts in or among such radio spectrum priorities during a crisis or emergency." />
                      <outline text="Sec. 5.4. The Administrator of General Services shall provide and maintain a common Federal acquisition approach that allows for the efficient centralized purchasing of equipment and services that meet NS/EP communications requirements. Nothing in this section shall be construed to impair or otherwise affect the procurement authorities granted by law to an agency or the head thereof." />
                      <outline text="Sec. 5.5. With respect to the Intelligence Community, the DNI, after consultation with the heads of affected agencies, may issue such policy directives and guidance as the DNI deems necessary to implement this order. Procedures or other guidance issued by the heads of elements of the Intelligence Community shall be in accordance with such policy directives or guidelines issued by the DNI." />
                      <outline text="Sec. 5.6. The Federal Communications Commission performs such functions as are required by law, including: (a) with respect to all entities licensed or regulated by the Federal Communications Commission: the extension, discontinuance, or reduction of common carrier facilities or services; the control of common carrier rates, charges, practices, and classifications; the construction, authorization, activation, deactivation, or closing of radio stations, services, and facilities; the assignment of radio frequencies to Federal Communications Commission licensees; the investigation of violations of pertinent law; and the assessment of communications service provider emergency needs and resources; and" />
                      <outline text="(b) supporting the continuous operation and restoration of critical communications systems and services by assisting the Secretary of Homeland Security with infrastructure damage assessment and restoration, and by providing the Secretary of Homeland Security with information collected by the Federal Communications Commission on communications infrastructure, service outages, and restoration, as appropriate." />
                      <outline text="Sec. 6. General Agency Responsibilities. All agencies, to the extent consistent with law, shall: (a) determine the scope of their NS/EP communications requirements, and provide information regarding such requirements to the Executive Committee;" />
                      <outline text="(b) prepare policies, plans, and procedures concerning communications facilities, services, or equipment under their management or operational control to maximize their capability to respond to the NS/EP needs of the Federal Government;" />
                      <outline text="(c) propose initiatives, where possible, that may benefit multiple agencies or other Federal entities;" />
                      <outline text="(d) administer programs that support broad NS/EP communications goals and policies;" />
                      <outline text="(e) submit reports annually, or as otherwise requested, to the Executive Committee, regarding agency NS/EP communications activities;" />
                      <outline text="(f) devise internal acquisition strategies in support of the centralized acquisition approach provided by the General Services Administration pursuant to section 5.4 of this order; and" />
                      <outline text="(g) provide the Secretary of Homeland Security with timely reporting on NS/EP communications status to inform the common operating picture required under 6 U.S.C. 321(d)." />
                      <outline text="Sec. 7. General Provisions. (a) For the purposes of this order, the word &quot;agency&quot; shall have the meaning set forth in section 6.1(b) of Executive Order 13526 of December 29, 2009." />
                      <outline text="(b) Executive Order 12472 of April 3, 1984, as amended, is hereby revoked." />
                      <outline text="(c) Executive Order 12382 of September 13, 1982, as amended, is further amended by striking the following language from section 2(e): &quot;in his capacity as Executive Agent for the National Communications System&quot;." />
                      <outline text="(d) Nothing in this order shall be construed to impair or otherwise affect:" />
                      <outline text="(i) the authority granted by law to an agency, or the head thereof; or" />
                      <outline text="(ii) the functions of the Director of the OMB relating to budgetary, administrative, or legislative proposals." />
                      <outline text="(e) This order shall be implemented consistent with applicable law and subject to the availability of appropriations." />
                      <outline text="(f) This order is not intended to, and does not, create any right or benefit, substantive or procedural, enforceable at law or in equity by any party against the United States, its departments, agencies, or entities, its officers, employees, or agents, or any other person." />
                      <outline text="BARACK OBAMA" />
              </outline>

              <outline text="VIDEO-Teen blasted out of Rod Laver after &apos;Timebomb&apos; tweet | P!ink">
                      <outline text="Link to Article" type="link" url="http://m.theage.com.au/entertainment/music/teen-blasted-out-of-rod-laver-after-timebomb-tweet-20130708-2pl4d.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373251574_nCse5K5T.html" />
      <outline text="Mon, 08 Jul 2013 02:46" />
                      <outline text="" />
                      <outline text="JESSICA WRIGHTJuly 08, 2013" />
                      <outline text="Hold on a second ... Teen&apos;s troublesome tweet was ill thought-out, but not threatening, his father says. Photo: Michael Clayton-Jones" />
                      <outline text="A teenage boy is facing criminal charges after he set off a bomb scare by tweeting some of the lyrics of a Pink song at the US pop songstress&apos;s concert on Sunday night at Rod Laver Arena." />
                      <outline text="The 16-year-old was thrown out of the concert and subsequently arrested by police after he tweeted a reference to Pink&apos;s song &quot;Timebomb&quot;, off her chart-topping new album, and linked the tweet to the Rod Laver Arena official twitter account." />
                      <outline text="The tweet read:" />
                      <outline text="@Pink I&apos;m ready with my Bomb. Time to blow up #RodLaverArena. Bitch." />
                      <outline text="The boy&apos;s father, David King, told radio station 3AW radio on Monday that security had seriously overreacted to what was an innocent - if ill thought-out - message of teenage enthusiasm." />
                      <outline text="&apos;&apos;When he wrote that, he didn&apos;t have time to put &apos;Timebomb&apos;, you know,&apos;&apos; he said." />
                      <outline text="Mr King - who lives in Warrnambool and had to make the three-hour drive to Melbourne to collect his son - said police were prepared to be more lenient when they realised the boy was not, in fact, a terrorist." />
                      <outline text="But at the arena&apos;s urging, the boy was arrested and charged with being a public nuisance." />
                      <outline text="&apos;&apos;The policeman said to me, &apos;if it was up to me, I would have booted him in the backside and said go home&apos;.&apos;&apos;" />
                      <outline text="&apos;&apos;But they demanded (he) be arrested.&apos;&apos;" />
                      <outline text="It is understood security at the concert were able to locate the boy in the 12,000-strong crowd by using his Twitter profile photo." />
              </outline>

              <outline text="Wikileaks Twiiter Attack on Glenn Greenwald">
                      <outline text="Link to Article" type="link" url="http://www.economicpolicyjournal.com/2013/07/wikileaks-twiiter-attack-on-glenn.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1373203556_kQ3SNvgu.html" />
        <outline text="Source: EconomicPolicyJournal.com" type="link" url="http://www.economicpolicyjournal.com/feeds/posts/default?alt=rss" />
      <outline text="Sun, 07 Jul 2013 13:25" />
                      <outline text="" />
                      <outline text="A crack in the relationship between the two Snowden supporters?@GGreenwald &quot;They have never flinched in reporting these stories,&quot; Guardian deserves much credit, but this Glenn, is simply not true.&apos;-- WikiLeaks (@wikileaks) July 7, 2013" />
                      <outline text="@GGreenwald Guardian didn&apos;t walk away, in the end, but it flinched and redacted repeatedly and continues to withhold vital information.&apos;-- WikiLeaks (@wikileaks) July 7, 2013" />
              </outline>
      </body>
  </opml>