<?xml version="1.0" encoding="ISO-8859-1"?>
<!-- OPML generated by Freedom Controller v0.5.2 on Sun, 18 Aug 2013 14:31:49 +0000 -->
<opml version="2.0">

      <head>
        <title>What Adam Curry is reading</title>
        <dateCreated>Sun, 18 Aug 2013 14:16:33 +0000</dateCreated>
        <dateModified>Sun, 18 Aug 2013 14:16:33 +0000</dateModified>
        <ownerName>Adam Curry</ownerName>
        <ownerId>669</ownerId>
        <expansionState></expansionState>
        <expansionState></expansionState>
        <vertScrollState>1</vertScrollState>
        <windowTop>146</windowTop>
        <windowLeft>107</windowLeft>
        <windowBottom>468</windowBottom>
        <windowRight>560</windowRight>
      </head>

      <body>
              <outline text="ITAR-TASS : Gas well on fire at Bulla-Deniz offshore Caspian field">
                      <outline text="Link to Article" type="link" url="http://www.itar-tass.com/en/c32/844240.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376835393_DVes2Hff.html" />
      <outline text="Sun, 18 Aug 2013 14:16" />
                      <outline text="" />
                      <outline text="BAKU, August 18 (Itar-Tass) - There has been a fire outbreak in a well at the Bulla-Deniz gas condensate field on the Caspian Sea shelf. According to a report posted on the website of the State Oil Company of Azerbaijan (SOCAR), which is the operator of the field, the fire has engulfed exploration well No 90 in the northeast wing of Bulla-Deniz." />
                      <outline text="According to SOCAR, the fire broke out on Saturday night during drilling at a depth of more than 5.8 thousand meters. &apos;&apos;At 23:30 local time (22:30 MSK) a wild gas blowout occurred after which the fire started,&apos;&apos; the statement says. It says that all the workers who were on the platform were evacuated to the shore." />
                      <outline text="&apos;&apos;At present, fire-fighting vessels that have surrounded the platform control the situation. The fire extinguishing operation will begin after the plan for shutting down the well is prepared,&apos;&apos; SOCAR stated." />
                      <outline text="The causes of the fire outbreak are being investigated." />
                      <outline text="The Bulla-Deniz field is located in the open sea at a distance of 80 kilometres from Baku. It was discovered in the mid-1970s. The sea depth at the field is about 26 metres." />
              </outline>

              <outline text="Albania - Wikipedia, the free encyclopedia">
                      <outline text="Link to Article" type="link" url="http://en.wikipedia.org/wiki/Albania" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376834575_keM2NyEA.html" />
      <outline text="Sun, 18 Aug 2013 14:02" />
                      <outline text="" />
                      <outline text="Republic of AlbaniaRepublika e Shqipris" />
                      <outline text="Motto: (official)&quot;You, Albania, give me honor, give me the name Albanian&quot;Anthem: Location of  Albania  (green)in Europe  (dark grey)  &apos;--  [Legend]" />
                      <outline text="Capitaland largest cityTirana41&#176;20&apos;&#178;N19&#176;48&apos;&#178;E&gt;&gt; / &gt;&gt;41.333&#176;N 19.800&#176;E&gt;&gt; / 41.333; 19.800Official languagesAlbanianaEthnic groupsGovernmentUnitaryparliamentary republic - PresidentBujar Nishani - Prime MinisterSali BerishaLegislatureParliamentFormation - Principality of Arbr1190  - League of Lezh2 March 1444  - Independent Albania28 November 1912  - Principality of Albania29 July 1913  - Current constitution28 November 1998 Area - Total28,748 km2 (143rd)11,100 sq mi  - Water (%)4.7Population - 2011 census2,821,977[7] - Density98.16/km2 (63rd)254/sq miGDP (PPP)2012 estimate - Total$26.110 billion[8] - Per capita$9,231[8]GDP (nominal)2012 estimate - Total$13.12 billion[8] - Per capita$4,634[8]Gini (2005)26.7[9]lowHDI (2013) 0.749[10]high &#183;70thCurrencyLek (ALL)Time zoneCET(UTC+1) - Summer (DST)CEST (UTC+2)Date formatdd.mm.yyyyDrives on therightCalling code355ISO 3166 codeALInternet TLD.ala.Greek, Vlach, Macedonian and other regional languages are government-recognized minority languages.Albania (i//al-BAY-nee-&#201;, Albanian: Shqipri/Shqipria; Gheg Albanian: Shqipni/Shqipnia), officially known as the Republic of Albania (Albanian: Republika e Shqipris; Albanian pronunciation: [&#201;&#190;&#201;&#155;pu&#203;blika &#201;&#155; &#202;&#131;cip&#201;&#203;&#201;&#190;i&#203;&#144;s]), is a country in Southeastern Europe. It is bordered by Montenegro to the northwest, Kosovo to the northeast, Macedonia to the east and Greece to the south and southeast. It has a coast on the Adriatic Sea to the west, and on the Ionian Sea to the southwest. It is less than 72 km (45 mi) from Italy, across the Strait of Otranto which links the Adriatic Sea to the Ionian Sea." />
                      <outline text="Albania is a member of the UN, NATO, the Organization for Security and Co-operation in Europe, Council of Europe, World Trade Organisation and one of the founding members of the Union for the Mediterranean. Albania has been a potential candidate for accession to the European Union since January 2003, and it formally applied for EU membership on 28 April 2009.[11]" />
                      <outline text="The modern-day territory of Albania was at various points in history part of the Roman provinces of Dalmatia (southern Illyricum), Macedonia (particularly Epirus Nova), and Moesia Superior. The modern Republic became independent after the collapse of the Ottoman Empire in Europe following the Balkan Wars.[2] Albania declared independence in 1912 (to be recognised in 1913), becoming a Principality, Republic, and Kingdom until being invaded by Italy in 1939, which formed Greater Albania, which in turn became a Nazi protectorate in 1943.[12] In 1944, a socialistPeople&apos;s Republic was established under the leadership of Enver Hoxha and the Party of Labour. In 1991, the Socialist republic was dissolved and the Republic of Albania was established." />
                      <outline text="Albania is a parliamentary democracy with a transition economy. The Albanian capital, Tirana, is home to 600.000 of the country&apos;s 2,831,741 people.[13] and it is also the financial capital of the country. Free-market reforms have opened the country to foreign investment, especially in the development of energy and transportation infrastructure.[14][15][16] Albania was chosen as the No.1 Destination in Lonely Planet&apos;s list of ten top countries to visit for 2011.[17]" />
                      <outline text="Etymology and terminologyAlbania is the Medieval Latin name of the country which is called Shqipri by its people. In Medieval Greek, the country&apos;s name is Albania besides variants Albanitia, Arbanitia." />
                      <outline text="The name may be derived from the Illyrian tribe of the Albani recorded by Ptolemy, the geographer and astronomer from Alexandria who drafted a map in 150 AD[18] that shows the city of Albanopolis[19] (located northeast of Durrs)." />
                      <outline text="The name may have a continuation in the name of a medieval settlement called Albanon and Arbanon, although it is not certain this was the same place.[20] In his History written in 1079&apos;&apos;1080, the Byzantine historian Michael Attaliates was the first to refer to Albanoi as having taken part in a revolt against Constantinople in 1043 and to the Arbanitai as subjects of the Duke of Dyrrachium.[21] During the Middle Ages, the Albanians called their country Arbr or Arbn and referred to themselves as Arbresh or Arbnesh.[22][23]" />
                      <outline text="As early as the 17th century the placename Shqipria and the ethnic demonym Shqiptar gradually replaced Arbria and Arbresh. While the two terms are popularly interpreted as &quot;Land of the Eagles&quot; and &quot;Children of the Eagles&quot;, they derive from the adverb shqip, which means &quot;understanding each other&quot;.[24][25] Under the Ottoman Empire Albania was referred to officially as Arnavutluk and its inhabitants as Arnauts (Turkic Arnavutlar). These terms remain the same officially and in common usage in the current Republic of Turkey.[26] The word is considered to be a metathesis from the word Arvanite, which was the Medieval Greek name for the Albanians.[27]" />
                      <outline text="HistoryThe history of Albania emerged from the prehistoric stage from the 4th century BC, with early records of Illyria in Greco-Roman historiography. The modern territory of Albania has no counterpart in antiquity, comprising parts of the Roman provinces of Dalmatia (southern Illyricum) and Macedonia (particularly Epirus Nova)." />
                      <outline text="The territory remained under Roman (Byzantine) control until the Slavic migrations of the 7th century, and was integrated into the Bulgarian Empire in the 9th century. After the weakening of the Byzantine Empire and the Bulgarian Empire in the middle and late 13th century, most of the territory of modern-day Albania became part of Serbia. Initially, as a part of the Serbian Grand Principality and in 14th century as a part of the Serbian Empire. The territorial nucleus of the Albanian state formed in the Middle Ages, as the Principality of Arbr and the Kingdom of Albania. The first records of the Albanian people as a distinct ethnicity also date to this period." />
                      <outline text="Ottoman PeriodAt the dawn of the establishment of the Ottoman Empire in Southeast Europe, the geopolitical landscape was marked by scattered kingdoms of small principalities. The Ottomans erected their garrisons throughout southern Albania by 1415 and established formal jurisdiction over most of Albania by 1431.[28] Along with the Bosniaks, Muslim Albanians occupied an outstanding position in the empire, and were the main pillars of Ottoman policy in the Balkans.[29] However, on 1443 a great and longstanding revolt broke under the lead of the Albanian national hero Skanderbeg, which lasted until 1468, many times defeating major Ottoman armies led by sultans Murad II and Mehmed II." />
                      <outline text="Enjoying this privileged position in the empire, Muslim Albanians held various administrative positions, with over two dozen Grand Viziers of Albanian origin, such as Gen. K&#182;pr&#188;l&#188; Mehmed Pasha, who commanded the Ottoman forces during the Ottoman-Persian Wars; Gen. K&#182;pr&#188;l&#188; Faz&#196;&#177;l Ahmed, who led the Ottoman army during the Austro-Turkish War (1663&apos;&apos;1664); and, later, Muhammad Ali Pasha of Egypt.[31]" />
                      <outline text="In the 15th century, when the Ottomans were gaining a firm foothold in the region, Albanian towns were organised into four principal sanjaks. The government fostered trade by settling a sizeable Jewish colony of refugees fleeing persecution in Spain (at end of the 15th century). Vlor saw passing through its ports imported merchandise from Europe such as velvets, cotton goods, mohairs, carpets, spices and leather from Bursa and Istanbul. Some citizens of Vlor even had business associates in Europe.[31]" />
                      <outline text="Albanians could also be found throughout the empire, in Iraq, Egypt, Algeria and across the Maghreb as vital military and administrative retainers.[32] This owed largely to their early use as part of the Dev&#197;&#159;irme system. The process of Islamization was an incremental one, commencing from the arrival of the Ottomans in the 14th century (to this day, a minority of Albanians are Catholic or Orthodox Christians, though the vast majority became Muslim). Timar holders, the bedrock of early Ottoman control in Southeast Europe, were not necessarily converts to Islam, and occasionally rebelled; the most famous of these rebels is Skanderbeg (his figure would be used later in the 19th century as a central component of Albanian national identity). The most significant impact on the Albanians was the gradual Islamisation process of a large majority of the population, although such a process became widespread only in the 17th century.[33]" />
                      <outline text="Mainly Catholics converted in the 17th century, while the Orthodox Albanians followed suit mainly in the following century. Initially confined to the main city centres of Elbasan and Shkoder, by this period the countryside was also embracing the new religion.[33] The motives for conversion according to scholars were diverse, depending on the context. The lack of source material does not help when investigating such issues.[34]" />
                      <outline text="Albania remained under Ottoman control as part of the Rumelia province until 1912, when the first independent Albanian state was declared. The formation of an Albanian national consciousness dates to the latter 19th century and is part of the larger phenomenon of the rise of nationalism under the Ottoman Empire." />
                      <outline text="Era of Nationalism &amp; League of PrizrenThe first organization that opposed the partition of Albania and pushed for greater autonomy was the League of Prizren, formed on 1 June 1878, in Prizren, Kosovo. The League used military force to prevent the annexing of northern Albanian areas assigned to Montenegro and Serbia, and southern Albanian areas assigned to Greece by the Congress of Berlin. After several battles with Montenegrin troops, the league was forced to give up Ulcinj to Montenegro and then was defeated by the Ottoman army sent by the Sultan in order to prevent the league from achieving autonomy for Albania.[35] The uprisings of 1910&apos;&apos;1912, the Ottoman defeat in the Balkan Wars and the advancing Montenegrin, Serbian and Greek armies into the territories where Albanians were majority, led to the proclamation of independence by Ismail Qemali in Vlora, on 28 November 1912." />
                      <outline text="IndependenceAlbania&apos;s independence was recognized by the Conference of London on 29 July 1913, but the drawing of the borders of Albania ignored the demographic realities of the time.[36] The short-lived monarchy (1914&apos;&apos;1925) was succeeded by an even shorter-lived first Albanian Republic (1925&apos;&apos;1928), to be replaced by another monarchy (1928&apos;&apos;1939). Albania was occupied by Fascist Italy and then by Nazi Germany during World War II." />
                      <outline text="Communist Albania (1944&apos;&apos;1992)After the liberation of Albania from Nazi occupation, the country became a Communist state, the People&apos;s Republic of Albania (renamed &quot;the People&apos;s Socialist Republic of Albania&quot; in 1976), which was led by Enver Hoxha and the Party of Labour of Albania." />
                      <outline text="The socialist reconstruction of Albania was launched immediately after the annulling of the monarchy and the establishment of a &quot;People&apos;s Republic&quot;. In 1947, Albania&apos;s first railway line was completed, with the second completed eight months later. New land reform laws were passed granting the land to the workers and peasants who tilled it. Agriculture began to become cooperative, and production increased significantly, leading to Albania becoming agriculturally self-sufficient. By 1955, illiteracy was eliminated among Albania&apos;s adult population.[37]" />
                      <outline text="During this period Albania became industrialized and saw rapid economic growth, as well as unprecedented progress in the areas of education and health. The average annual rate of increase of Albania&apos;s national income was 29% higher than the world average and 56% higher than the European average. Also during this period, because of the monopolized socialist economy, Albania was the only country in the world that did not impose any tax on its people.[38]" />
                      <outline text="Religious freedoms were severely curtailed during the Communist period, with many forms of worship being outlawed. In August 1945, the Agrarian Reform Law meant that large swaths of property owned by religious groups (mostly Islamic waqfs) were nationalized, along with the estates of monasteries and dioceses. Many believers, with the ulema, and many priests were arrested, tortured and executed. In 1949, a new Decree on Religious Communities required that they and all their activities be sanctioned by the state alone.[39]" />
                      <outline text="In 1967 Hoxha proclaimed Albania the world&apos;s first &apos;atheist state&apos;. Hundreds of mosques and dozens of Islamic libraries &apos;-- containing priceless manuscripts &apos;-- were destroyed.[40] Churches were not spared either, and many were converted into cultural centers for young people. The new law banned all &quot;fascist, religious, warmongerish, antisocialist activity and propaganda.&quot; Preaching religion carried a three- to ten-year prison sentence. Nonetheless, many Albanians continued to practice in secret." />
                      <outline text="Hoxha&apos;s political successor Ramiz Alia oversaw the dismemberment of the &quot;Hoxhaist&quot; state during the wider collapse of the Eastern Bloc in the later 1980s." />
                      <outline text="Contemporary AlbaniaThe People&apos;s Republic was dissolved in 1991-92 after protests beginning in 1989 and reforms made by the communist government in 1990, and the Republic of Albania was founded. The Communists retained a stronghold in parliament after popular support in the elections of 1991. However, in March 1992, amid liberalisation policies resulting in economic collapse and social unrest, a new front led by the new Democratic Party took power. The economic crisis spread in late 1996 following the failure of some Ponzi schemes operating in the country, peaking in 1997 in an armed rebellion that led to another mass emigration of Albanians, mostly to Italy, Greece, Switzerland, Germany and North America. In 1999, the country was affected by the Kosovo War, when a great number of Albanians from Kosovo found refuge in Albania. Albania became a full member of NATO in 2009, and is applying to join the European Union." />
                      <outline text="Albanian state flagGovernanceAlbania" />
                      <outline text="This article is part of the series:Politics and government ofAlbaniaParliamentary:2001, 2005, 2009,2013Local:2000, 2003, 2007,2011, 2015Referendums:1994, 1997, 1998Presidents (indirect):2002, 2007,2012, 2017Political partiesThe Albanian republic is a parliamentary democracy established under a constitution renewed in 1998. Elections are held every four years to a unicameral 140-seat chamber, the People&apos;s Assembly. In June 2002, a compromise candidate, Alfred Moisiu, former Army General, was elected to succeed President Rexhep Meidani. Parliamentary elections in July 2005 brought Sali Berisha, the leader of the Democratic Party, while on 20 July 2007 Bamir Topi became president. The current Albanian president Bujar Nishani was elected by Parliament in July 2012." />
                      <outline text="The Euro-Atlantic integration of Albania has been the ultimate goal of the post-communist governments. Albania&apos;s EU membership bid has been set as a priority by the European Commission." />
                      <outline text="Albania, along with Croatia, joined NATO on 1 April 2009, becoming the 27th and 28th members of the alliance.[41]" />
                      <outline text="Executive branchThe head of state in Albania is the President of the Republic. The President is elected to a 5-year term by the Assembly of the Republic of Albania by secret ballot, requiring a 50%+1 majority of the votes of all deputies. The current President of the Republic is Bujar Nishani elected in July 2012." />
                      <outline text="The President has the power to guarantee observation of the constitution and all laws, act as commander in chief of the armed forces, exercise the duties of the Assembly of the Republic of Albania when the Assembly is not in session, and appoint the Chairman of the Council of Ministers (prime minister)." />
                      <outline text="Executive power rests with the Council of Ministers (cabinet). The Chairman of the Council (prime minister) is appointed by the president; ministers are nominated by the president on the basis of the prime minister&apos;s recommendation. The People&apos;s Assembly must give final approval of the composition of the Council. The Council is responsible for carrying out both foreign and domestic policies. It directs and controls the activities of the ministries and other state organs." />
                      <outline text="Legislative branchThe Assembly of the Republic of Albania (Kuvendi i Republiks s Shqipris) is the lawmaking body in Albania. There are 140 deputies in the Assembly, which are elected through a party-list proportional representation system. The President of the Assembly (or Speaker), who has two deputies, chairs the Assembly. There are 15 permanent commissions, or committees. Parliamentary elections are held at least every four years." />
                      <outline text="The Assembly has the power to decide the direction of domestic and foreign policy; approve or amend the constitution; declare war on another state; ratify or annul international treaties; elect the President of the Republic, the Supreme Court, and the Attorney General and his or her deputies; and control the activity of state radio and television, state news agency and other official information media." />
                      <outline text="Armed forcesThe Albanian Armed Forces (Forcat e Armatosura t Shqipris) were first formed after independence in 1912. Albania reduced the number of active troops from 65,000 in 1988[42] to 14,500 in 2009[43] and the military now consists mainly of a small fleet of aircraft and sea vessels. In the 1990s, the country scrapped enormous amounts of obsolete hardware, such as tanks and SAM systems from China.[citation needed]" />
                      <outline text="Today it consists of: the General Staff, the Albanian Land Force, the Albanian Air Force and the Albanian Naval Force. Increasing the military budget was one of the most important conditions for NATO integration. Military spending has generally been lower than 1.5% since 1996 only to peak in 2009 at 2% and fall again to 1.5%.[44] Since February 2008, Albania participates officially in NATO&apos;s Operation Active Endeavor in the Mediterranean Sea.[45] It received a NATO membership invitation on 3 April 2008.[46] Albania became a full member of NATO on 2 April 2009." />
                      <outline text="Administrative divisionsAlbania is divided into 12 administrative counties (Albanian: qark or prefektur). These counties include 36 districts (Albanian: rreth) and 373 municipalities (Albanian: bashki or komun). 72 municipalities have city status (Albanian: qytet). There are overall 2980 villages/communities (Albanian: fshat) in all Albania. Each district has its council which is composed of a number of municipalities. The municipalities are the first level of local governance, responsible for local needs and law enforcement.[47]" />
                      <outline text="GeographyAlbania has a total area of 28,748 square kilometers. It lies between latitudes 39&#176; and 43&#176; N, and mostly between longitudes 19&#176; and 21&#176; E (a small area lies east of 21&#176;). Albania&apos;s coastline length is 611 km (380 mi)[48]:240 and extends along the Adriatic and Ionian Seas. The lowlands of the west face the Adriatic Sea." />
                      <outline text="The 70% of the country that is mountainous is rugged and often inaccessible from the outside. The highest mountain is Korab situated in the district of Dibr, reaching up to 2,764 metres (9,068 ft). The climate on the coast is typically Mediterranean with mild, wet winters and warm, sunny, and rather dry summers." />
                      <outline text="Inland conditions vary depending on elevation, but the higher areas above 1,500 m/5,000 ft are rather cold and frequently snowy in winter; here cold conditions with snow may linger into spring. Besides the capital city of Tirana, which has 420,000 inhabitants, the principal cities are Durrs, Kor&#167;, Elbasan, Shkodr, Gjirokastr, Vlor and Kuks. In Albanian grammar, a word can have indefinite and definite forms, and this also applies to city names: both Tiran and Tirana, Shkodr and Shkodra are used." />
                      <outline text="The three largest and deepest tectonic lakes of the Balkan Peninsula are partly located in Albania. Lake Shkodr in the country&apos;s northwest has a surface which can vary between 370 km2 (140 sq mi) and 530 km2, out of which one third belongs to Albania and rest to Montenegro. The Albanian shoreline of the lake is 57 km (35 mi). Ohrid Lake is situated in the country&apos;s southeast and is shared between Albania and Republic of Macedonia. It has a maximal depth of 289 meters and a variety of unique flora and fauna can be found there, including &quot;living fossils&quot; and many endemic species. Because of its natural and historical value, Ohrid Lake is under the protection of UNESCO. There is also Butrinti Lake which is a small tectonic lake. It is located in the national park of Butrint." />
                      <outline text="ClimateWith its coastline facing the Adriatic and Ionian seas, its highlands backed upon the elevated Balkan landmass, and the entire country lying at a latitude subject to a variety of weather patterns during the winter and summer seasons, Albania has a high number of climatic regions relative to its landmass. The coastal lowlands have typically Mediterranean weather; the highlands have a Mediterranean continental climate. In both the lowlands and the interior, the weather varies markedly from north to south." />
                      <outline text="The lowlands have mild winters, averaging about 7 &#176;C(45 &#176;F). Summer temperatures average 24 &#176;C(75 &#176;F). In the southern lowlands, temperatures average about 5 &#176;C(9 &#176;F) higher throughout the year. The difference is greater than 5 &#176;C(9 &#176;F) during the summer and somewhat less during the winter." />
                      <outline text="Inland temperatures are affected more by differences in elevation than by latitude or any other factor. Low winter temperatures in the mountains are caused by the continental air mass that dominates the weather in Eastern Europe and the Balkans. Northerly and northeasterly winds blow much of the time. Average summer temperatures are lower than in the coastal areas and much lower at higher elevations, but daily fluctuations are greater. Daytime maximum temperatures in the interior basins and river valleys are very high, but the nights are almost always cool." />
                      <outline text="Average precipitation is heavy, a result of the convergence of the prevailing airflow from the Mediterranean Sea and the continental air mass. Because they usually meet at the point where the terrain rises, the heaviest rain falls in the central uplands. Vertical currents initiated when the Mediterranean air is uplifted also cause frequent thunderstorms. Many of these storms are accompanied by high local winds and torrential downpours." />
                      <outline text="When the continental air mass is weak, Mediterranean winds drop their moisture farther inland. When there is a dominant continental air mass, cold air spills onto the lowland areas, which occurs most frequently in the winter. Because the season&apos;s lower temperatures damage olive trees and citrus fruits, groves and orchards are restricted to sheltered places with southern and western exposures, even in areas with high average winter temperatures." />
                      <outline text="Lowland rainfall averages from 1,000 millimeters (39.4 in) to more than 1,500 millimeters (59.1 in) annually, with the higher levels in the north. Nearly 95% of the rain falls in the winter." />
                      <outline text="Rainfall in the upland mountain ranges is heavier. Adequate records are not available, and estimates vary widely, but annual averages are probably about 1,800 millimeters (70.9 in) and are as high as 2,550 millimeters (100.4 in) in some northern areas. The western Albanian Alps (valley of Boga) are among the wettest areas in Europe, receiving some 3,100 mm (122.0 in) of rain annually.[49] The seasonal variation is not quite as great in the coastal area." />
                      <outline text="The higher inland mountains receive less precipitation than the intermediate uplands. Terrain differences cause wide local variations, but the seasonal distribution is the most consistent of any area." />
                      <outline text="In 2009 an expedition from University of Colorado discovered four small glaciers in the &apos;Cursed&apos; mountains in North Albania. The glaciers are at the relatively low level of 2,000 meters &apos;&apos; almost unique for such a southerly latitude.[50]" />
                      <outline text="Flora and faunaAlthough a small country, Albania is distinguished for its rich biological diversity. The variation of geomorphology, climate and terrain create favorable conditions for a number of endemic and sub-endemic species with 27 endemic and 160 subendemic vascular plants present in the country. The total number of plants is over 3250 species, approximately 30% of the entire flora species found in Europe." />
                      <outline text="Over a third of the territory of Albania &apos;&apos; about 10,000 square kilometers (2.5 million acres)  &apos;&apos; is forested and the country is very rich in flora. About 3,000 different species of plants grow in Albania, many of which are used for medicinal purposes.Phytogeographically, Albania belongs to the Boreal Kingdom and is shared between the Adriatic and East Mediterraneanprovinces of the Mediterranean Region and the Illyrian province of the Circumboreal Region. Coastal regions and lowlands have typical Mediterranean macchia vegetation, whereas oak forests and vegetation are found on higher elevations. Vast forests of black pine, beech and fir are found on higher mountains and alpine grasslands grow at elevations above 1800 meters.[52]" />
                      <outline text="According to the World Wide Fund for Nature and Digital Map of European Ecological Regions by the European Environment Agency, the territory of Albania can be subdivided into three ecoregions: the Illyrian deciduous forests, Pindus Mountains mixed forests and Dinaric Alpine mixed forests. The forests are home to a wide range of mammals, including wolves, bears, wild boars and chamois. Lynx, wildcats, pine martens and polecats are rare, but survive in some parts of the country." />
                      <outline text="There are around 760 vertebrate species found so far in Albania. Among these there are over 350 bird species, 330 freshwater and marine fish and 80 mammal species. There are some 91 globally threatened species found within the country, among which the Dalmatian pelican, Pygmy cormorant, and the European sea sturgeon. Rocky coastal regions in the south provide good habitats for the endangered Mediterranean monk seal." />
                      <outline text="Some of the most significant bird species found in the country include the golden eagle &apos;&apos; known as the national symbol of Albania[53]  &apos;&apos; vulture species, capercaillie and numerous waterfowl. The Albanian forests still maintain significant communities of large mammals such as the brown bear, gray wolf, chamois and wild boar.[52] The north and eastern mountains of the country are home to the last remaining Balkan Lynx &apos;&apos; a critically endangered population of the Eurasian lynx.[54]" />
                      <outline text="EconomyAlbania&apos;s troubled transition from communist to free-market capitalism has been largely successful. There are signs of increasing investments, and power cuts are reduced to the extent that Albania is now exporting energy.[55] Its GDP per capita (expressed in PPS&apos;--Purchasing Power Standards) stood at 35 percent of the EU average in 2012.[56] Still, Albania has shown potential for economic growth, as more and more businesses relocate there and consumer goods are becoming available from emerging market traders as part of the current massive global cost-cutting exercise. Albania, Cyprus, and Poland are the only countries in Europe that recorded economic growth in the first quarter of 2010.[57][58]International Monetary Fund (IMF) predicted 2.6% growth for Albania in 2010 and 3.2% in 2011.[59]" />
                      <outline text="Albania and Croatia have discussed the possibility of jointly building a nuclear power plant at Lake Shkoder, close to the border with Montenegro, a plan that has gathered criticism from Montenegro due to seismicity in the area.[60] In addition, there is some doubt whether Albania would be able to finance a project of such a scale with a total national budget of less than $5 billion.[2] However, in February 2009 Italian company Enel announced plans to build an 800 MW coal-fired power plant in Albania, to diversify electricity sources.[61] Nearly 100% of the electricity is generated by ageing hydroelectric power plants, which are becoming more ineffective due to increasing droughts.[61]" />
                      <outline text="The country has some deposits of petroleum and natural gas, but only produced 6,438 barrels of oil per day in 2009 (BNK-TC).[62][63] Natural gas production, estimated at about 30 million cubic meters, is sufficient to meet consumer demands.[2] Other natural resources include coal, bauxite, copper and iron ore." />
                      <outline text="Agriculture is the most significant sector, employing a significant proportion of the labor force and generating about 21% of GDP. Albania produces significant amounts of wheat, corn, tobacco, figs (13th largest producer in the world)[64] and olives." />
                      <outline text="Tourism is gaining a fair share of Albania&apos;s GDP with visitors growing every year." />
                      <outline text="TourismAn important percentage of Albania&apos;s national income comes from tourism. Tourism - as of 2013 - funds 10% of the gross domestical product, and this number is expected to increase dramatically within the next decade. Albania welcomed around 4,2 million visitors in 2012, mostly from neighbouring countries and the European Union. In 2011 Albania was listed as the top travel destination worldwide, by lonely planet.[17]" />
                      <outline text="Albania despite its relatively small size offers a great variety of touristical attractions. There are plenty of things to do in Albania. For those, who prefer a relaxing way of spending their holidays, Albanian seaside is perfect. The beautiful beaches of the Ionian and Adriatic seas combined with great Mediterranean climate and delicious freshly caught seafood would make up for a great holiday. For those, who are interested in the World History, Albania is the place to come. Historical tours around the towns of Butrint, Gjirokastr, Berat, Durrs and many others would not leave you disappointed. For the travelers, which prefer active holidays, Albania has a lot to share as well." />
                      <outline text="The bulk of the tourist industry is concentrated along the Adriatic and the Ionian Sea coast. The latter has the most beautiful and pristine beaches, and is often called as the Albanian Riviera. The increase in foreign visitors is dramatic, Albania had only 500,000 visitors in 2005, while in 2012 had an estimated 4,2 milion tourists. An increase of 840% in only 7 years." />
                      <outline text="Crime and Law EnforcementLaw Enforcement in Albania is primarily the responsibility of the Albanian Police. Albania also has a counter-terrorism unit called RENEA. On a list of 75 countries, Albania listed at 17th lowest crime rate ahead of many western nations such as Denmark, the United Kingdom, Sweden and France.[65] However, homicide is still a problem in the country, especially blood feuds in rural areas of the north and domestic crime.[66]" />
                      <outline text="Science and technologyFrom 1993 human resources in sciences and technology have drastically decreased. Various surveys show that during 1991&apos;&apos;2005, approximately 50% of the professors and research scientists of the universities and science institutions in the country have emigrated.[67]" />
                      <outline text="However in 2009 the government approved the &quot;National Strategy for Science, Technology and Innovation in Albania&quot;[68] covering the period 2009&apos;&apos;2015. It aims to triple public spending on research and development (R&amp;D) to 0.6% of GDP and augment the share of gross domestic expenditure on R&amp;D from foreign sources, including via the European Union&apos;s Framework Programmes for Research, to the point where it covers 40% of research spending, among others." />
                      <outline text="TransportHighwaysCurrently there are three main motorways in Albania: the dual carriageway connecting Durrs with Vlor, the Albania-Kosovo Highway, and the Tirana-Elbasan Highway." />
                      <outline text="The Albania-Kosovo Highway links Kosovo to Albania&apos;s Adriatic coast: the Albanian side was completed in June 2009,[69] and now it takes only two hours and a half to go from the Kosovo border to Durrs. Overall the highway will be around 250 km (155 mi) when it reaches Pristina. The project was the biggest and most expensive infrastructure project ever undertaken in Albania. The cost of the highway appears to have breached &apos;&#130;&#172;800 million, although the exact cost for the total highway has yet to be confirmed by the government." />
                      <outline text="Two additional highways will be built in Albania in the near future: Corridor VIII, which will link Albania with the Republic of Macedonia and Bulgaria, and the north-south highway, which corresponds to the Albanian side of the Adriatic&apos;&apos;Ionian motorway, a larger regional highway connecting Croatia with Greece along the Adriatic and Ionian coasts. When all three corridors are completed Albania will have an estimated 759 kilometers of highway linking it with all its neighboring countries: Serbia/Kosovo, the Republic of Macedonia, Montenegro, and Greece." />
                      <outline text="AviationThe civil air transport in Albania marked its beginnings in November 1924, when the Republic of Albania signed a governmental agreement with German Air Company Lufthansa. On the basis of a ten-year concession agreement, the Albanian Airlines Company Adria Aero Lloyd was established.[citation needed] In the spring of 1925, the first domestic flights from Tirana to Shkoder and Vlora began.[citation needed]" />
                      <outline text="In August 1927, the office of Civil Aviation of Air Traffic Ministry of Italy purchased Adria Aero Lloyd. The company, now in Italian hands, expanded its flights to other cities, such as Elbasan, Kor&#167;a, Kuksi, Peshkopia and Gjirokastra, and opened up international lines to Rome, Milan, Thessaloniki, Sofia, Belgrade, and Podgorica." />
                      <outline text="The construction of a more modern airport in Lapraka started in 1934 and was completed by the end of 1935. This new airport, which was later officially named &quot;Airport of Tirana&quot;, was constructed in conformity with optimal technological parameters of that time, with a reinforced concrete runway of 2,700 m (8,858 ft), and complemented with technical equipment and appropriate buildings." />
                      <outline text="During 1955&apos;&apos;1957, the Rinasi Airport was constructed for military purposes. Later, its administration was shifted to the Ministry of Transport. On 25 January 1957 the State-owned Enterprise of International Air Transport (Albtransport) established its headquarters in Tirana. Aeroflot, Jat Airways, Malev, Tarom and Interflug were the air companies that started to have flights with Albania until 1960.[70]" />
                      <outline text="During 1960&apos;&apos;1978, several airlines ceased to operate in Albania due to the impact of the politics, resulting in a decrease of influx of flights and passengers. In 1977 Albania&apos;s government signed an agreement with Greece to open the country&apos;s first air links with non-communist Europe. As a result, Olympic Airways was the first non-communist airline to commercially fly into Albania after World War II. By 1991 Albania had air links with many major European cities, including Paris, Rome, Zurich, Vienna and Budapest, but no regular domestic air service.[70]" />
                      <outline text="A French-Albanian joint venture Ada Air, was launched in Albania as the first private airline, in 1991. The company offered flights in a thirty-six-passenger airplane four days a week between Tirana and Bari, Italy and a charter service for domestic and international destinations.[70]" />
                      <outline text="From 1989 to 1991, because of political changes in the Eastern European countries, Albania adhered to the International Civil Aviation Organization (ICAO), opened its air space to international flights, and had its duties of Air Traffic Control defined. As a result of these developments, conditions were created to separate the activities of air traffic control from Albtransport. Instead, the National Agency of Air Traffic (NATA) was established as an independent enterprise. In addition, during these years, governmental agreements of civil air transport were established with countries such as Bulgaria, Germany, Slovenia, Italy, Russia, Austria, the UK and Macedonia." />
                      <outline text="The Directory General of Civil Aviation (DGCA) was established on 3 February 1991, to cope with the development required by the time. Albania has one international airport, Tirana International Airport Nn Tereza, which is linked to 29 destinations by 14 airlines. It has seen a dramatic rise in passenger numbers and aircraft movements since the early 1990s. The data for 2009 is 1.3 million passengers served and an average of 44 landings and takeoffs per day.[citation needed]" />
                      <outline text="RailwaysThe railways in Albania are administered by the national railway company Hekurudha Shqiptare (HSH) (which means Albanian Railways). It operates a 1,435 mm (4 ft 8 1&apos;&#129;2 in) gauge (standard gauge) rail system in Albania. All trains are hauled by Czech-built &#196;&#140;KDdiesel-electric locomotives." />
                      <outline text="The railway system was extensively promoted by the totalitarian regime of Enver Hoxha, during which time the use of private transport was effectively prohibited. Since the collapse of the former regime, there has been a considerable increase in car ownership and bus usage. Whilst some of the country&apos;s roads are still in very poor condition, there have been other developments (such as the construction of a motorway between Tirana and Durrs) which have taken much traffic away from the railways.[citation needed]" />
                      <outline text="DemographicsPopulation in Albania[71]YearMillion19712.219903.320083.120112.8Source: OECD/World BankAccording to the 2011 Census results, the total population of Albania is 2,821,977. Its population is relatively young by European standards, with a median age of 28.9 years.[72] The fall of the Communist regime in 1990 Albania was accompanied with massive migration. External migration was prohibited in Communist Albania while internal one was quite limited, hence this was a new phenomenon. Between 1991 and 2004, roughly 900,000 people have migrated out of Albania, about 600,000 of them settling in Greece.[73] Migration greatly affected Albania&apos;s internal population distribution. Population decreased mainly in the North and South of the country while increased in Tirana and Durrs center districts.[citation needed]" />
                      <outline text="Issues of ethnicity are a delicate topic and subject to debate. &quot;Although official statistics have suggested that Albania is one of the most homogenous countries in the region (with an over 97 per cent Albanian majority) minority groups (such as Greeks, Macedonians, Montenegrins, Roma and Vlachs/Aromanians) have often questioned the official data, claiming a larger share in the country&apos;s population.&quot;[74] The last census that contained ethnographic data (before the 2011 one) was conducted in 1989.[75]" />
                      <outline text="Albania recognizes three national minorities, Greeks, Macedonians and Montenegrins, and two cultural minorities, Aromanians and Romani people.[76] Other Albanian minorities are Bulgarians, Gorani, Serbs, Balkan Egyptians, Bosniaks and Jews. Regarding the Greeks, &quot;it is difficult to know how many Greeks there are in Albania. The Greek government, it is typically claimed, says that there are around 300,000 ethnic Greeks in Albania, but most western estimates are around 200,000 mark (although EEN puts the number at a probable 100,000). The Albanian government puts the number at only 60,000.&quot;[77] The CIA World Factbook estimates the Greek minority at 3% of the total population and the US State Department uses 1.17% for Greeks and 0.23% for other minorities.[78]" />
                      <outline text="According to the 2011 census the population of Albania declared the following ethnic affiliation: Albanians 2,312,356 (82.6% of the total), Greeks 24,243 (0.9%), Macedonians 5,512 (0.2%), Montenegrins 366 (0.01%), Aromanians 8,266 (0.30%), Romani 8,301 (0.3%), Balkan Egyptians 3,368 (0.1%), other ethnicities 2,644 (0.1%), no declared ethnicity 390,938 (14.0%), and not relevant 44,144 (1.6%).[7]" />
                      <outline text="Macedonian and some Greek minority groups have sharply criticized Article 20 of the Census law, according to which a $1,000 fine will be imposed on anyone who will declare an ethnicity other than what is stated on his or her birth certificate. This is claimed to be an attempt to intimidate minorities into declaring Albanian ethnicity, according to them the Albanian government has stated that it will jail anyone who does not participate in the census or refuse to declare his or her ethnicity.[79] Genc Pollo, the minister in charge has declared that: &quot;Albanian citizens will be able to freely express their ethnic and religious affiliation and mother tongue. However, they are not forced to answer these sensitive questions&quot;.[80] The amendments criticized do not include jailing or forced declaration of ethnicity or religion, only a fine is envisioned which can be overthrown by court.[81][82]" />
                      <outline text="Greek representatives form part of the Albanian parliament and the government has invited Albanian Greeks to register, as the only way to improve their status.[74] On the other hand, nationalists,as well as intellectuals, various organizations and, political parties in Albania have expressed their concern that the census might artificially increase the number of Greek minority, which might be then exploited by Greece to threaten Albania&apos;s territorial integrity.[74][83][84][85] Large parts of Albanians, similarly fear irredentist claims on northern Epirus following Albanians changing their nationality to Greek due to monetary and other benefits.[74][83][86][87][88]" />
                      <outline text="LanguageAlbanian is the official language of Albania. Its standard spoken and written form is revised and merged from the two main dialects, Gheg and Tosk; though, it is notably based more on the Tosk dialect. Shkumbin River is the rough dividing line between the two dialects. Also a dialect of Greek that preserves features now lost in standard modern Greek is spoken in areas inhabited by the Greek minority. Other languages spoken by ethnic minorities in Albania include Vlach, Serbian, Macedonian, Bosnian, Bulgarian, Gorani, and Roma.[89] Macedonian is official in Pustec Municipality in East Albania." />
                      <outline text="According to the 2011 population census, 2,765,610 or 98.767% of the population declared Albanian as their mother tongue (&quot;mother tongue is defined as the first or main language spoken at home during childhood&quot;).[7]" />
                      <outline text="ReligionAlbanian census 2011Sunni Islam &apos;&#137;" />
                      <outline text="56.70%Catholicism &apos;&#137;" />
                      <outline text="10.03%Eastern Orthodoxy &apos;&#137;" />
                      <outline text="6.75%Bektashis &apos;&#137;" />
                      <outline text="2.09%Other Christian &apos;&#137;" />
                      <outline text="0.14%Others &apos;&#137;" />
                      <outline text="5.49%Undeclared &apos;&#137;" />
                      <outline text="13.79%Atheism &apos;&#137;" />
                      <outline text="2.5%According to 2011 census, 58.79% of Albania adheres to Islam, making it the largest Religion in the country. Majority of Albanian Muslims are Secular Sunni with a significant Bektashi Shia minority. Christianity is practiced by 16.99% of the population, making it the 2nd largest religion in the country. Remaining population is either Irreligious or belongs to other Religious groups.[90] Before World War II, there was given a distribution of 70% Muslims, 20% Eastern Orthodox, and 10% Roman Catholics.[2] Today, Gallup Global Reports 2010 shows that religion plays a role in the lives of only 39% of Albanians, and ranks Albania the thirteenth least religious country in the world.[91]" />
                      <outline text="The Albanians first appear in the historical record in Byzantine sources of the late-11th century. At this point, they were already fully Christianised. Islam later emerged as the majority religion during the centuries of Ottoman rule, though a significant Christian minority remained. After independence (1912) from the Ottoman Empire, the Albanian republican, monarchic and later Communist regimes followed a systematic policy of separating religion from official functions and cultural life. Albania never had an official state religion either as a republic or as a kingdom. In the 20th century, the clergy of all faiths was weakened under the monarchy, and ultimately eradicated during the 1940s and 1950s, under the state policy of obliterating all organized religion from Albanian territories." />
                      <outline text="The Communist regime that took control of Albania after World War II persecuted and suppressed religious observance and institutions and entirely banned religion to the point where Albania was officially declared to be the world&apos;s first atheist state. Religious freedom has returned to Albania since the regime&apos;s change in 1992. Albanian Muslim populations (mainly secular and of the Sunni branch) are found throughout the country whereas Orthodox Christians are concentrated in the south and Roman Catholics are found in the north of the country. No reliable data are available on active participation in formal religious services, but estimates range from 25% to 40%.[92]" />
                      <outline text="The first recorded Albanian Protestant was Said Toptani, who traveled around Europe, and in 1853 returned to Tirana and preached Protestantism. He was arrested and imprisoned by the Ottoman authorities in 1864. Mainline evangelical Protestants date back to the work of Congregational and later Methodist missionaries and the work of the British and Foreign Bible Society in the 19th century. The Evangelical Alliance, which is known as VUSh, was founded in 1892. Today VUSh has about 160 member congregations from different Protestant denominations. VUSh organizes marches in Tirana including one against blood feuds in 2010. Bibles are provided by the Interconfessional Bible Society of Albania. The first full Albanian Bible to be printed was the Filipaj translation printed in 1990." />
                      <outline text="The Seventh-day Adventist Church sent its first missionaries into Albanian territory as early as 1909. Following decades of communist repression, the Albanian Mission of Seventh-day Adventists was re-established in Tirana in 1992 and has now over 10 churches and groups throughout the country.[93] Its humanitarian wing, the Adventist Development and Relief Agency (ADRA) is renowned for being the first humanitarian organization to enter post-communist Albania.[94]" />
                      <outline text="The Church of Jesus Christ of Latter-day Saints (LDS or &apos;Mormons&apos;) involvement in Albania began with humanitarian aid during the 1990s. The first missionaries were sent in 1992 with the Albania Tirana Mission being opened in 1996. In 2008, there were nearly 2,000 members of the LDS church in Albania, spread throughout ten branches with two purpose-built chapels and one Family History Center.[95]" />
                      <outline text="There are about 4,000 active Jehovah&apos;s Witnesses in Albania.[96]" />
                      <outline text="CultureMusic and folkloreAlbanian folk music falls into three stylistic groups, with other important music areas around Shkodr and Tirana; the major groupings are the Ghegs of the north and southern Labs and Tosks. The northern and southern traditions are contrasted by the &quot;rugged and heroic&quot; tone of the north and the &quot;relaxed&quot; form of the south." />
                      <outline text="These disparate styles are unified by &quot;the intensity that both performers and listeners give to their music as a medium for patriotic expression and as a vehicle carrying the narrative of oral history&quot;, as well as certain characteristics like the use of rhythms such as 3/8, 5/8 and 10/8.[97] The first compilation of Albanian folk music was made by Pjetr Dungu in 1940." />
                      <outline text="Albanian folk songs can be divided into major groups, the heroic epics of the north, and the sweetly melodic lullabies, love songs, wedding music, work songs and other kinds of song. The music of various festivals and holidays is also an important part of Albanian folk song, especially those that celebrate St. Lazarus Day, which inaugurates the springtime. Lullabies and vajtims are very important kinds of Albanian folk song, and are generally performed by solo women.[98]" />
                      <outline text="Albanian language and literatureAlbanian was proved to be an Indo-European language in 1854 by the German philologistFranz Bopp. The Albanian language comprises its own branch of the Indo-European language family." />
                      <outline text="Some scholars believe that Albanian derives from Illyrian[99] while others[100] claim that it derives from Daco-Thracian. (Illyrian and Daco-Thracian, however, might have been closely related languages; see Thraco-Illyrian.)" />
                      <outline text="Establishing longer relations, Albanian is often compared to Balto-Slavic on the one hand and Germanic on the other, both of which share a number of isoglosses with Albanian. Moreover, Albanian has undergone a vowel shift in which stressed, long o has fallen to a, much like in the former and opposite the latter. Likewise, Albanian has taken the old relative jos and innovatively used it exclusively to qualify adjectives, much in the way Balto-Slavic has used this word to provide the definite ending of adjectives." />
                      <outline text="The cultural renaissance was first of all expressed through the development of the Albanian language in the area of church texts and publications, mainly of the Catholic region in the North, but also of the Orthodox in the South. The Protestant reforms invigorated hopes for the development of the local language and literary tradition when cleric Gjon Buzuku brought into the Albanian language the Catholic liturgy, trying to do for the Albanian language what Luther did for German." />
                      <outline text="Meshari (The Missal) by Gjon Buzuku, published in 1555, is considered the first literary work of written Albanian. The refined level of the language and the stabilised orthography must be the result of an earlier tradition of written Albanian, a tradition that is not well understood. However, there is some fragmented evidence, pre-dating Buzuku, which indicates that Albanian was written from at least the 14th century." />
                      <outline text="The earliest evidence dates from 1332 AD with a Latin report from the French Dominican Guillelmus Adae, Archbishop of Antivari, who wrote that Albanians used Latin letters in their books although their language was quite different from Latin. Other significant examples include: a baptism formula (Unte paghesont premenit Atit et Birit et spertit senit) from 1462, written in Albanian within a Latin text by the Bishop of Durrs, Pal Engjlli; a glossary of Albanian words of 1497 by Arnold von Harff, a German who had travelled through Albania, and a 15th-century fragment of the Bible from the Gospel of Matthew, also in Albanian, but written in Greek letters." />
                      <outline text="Albanian writings from these centuries must not have been religious texts only, but historical chronicles too. They are mentioned by the humanist Marin Barleti, who, in his book Rrethimi i Shkodrs (The Siege of Shkodr) (1504), confirms that he leafed through such chronicles written in the language of the people (in vernacula lingua)." />
                      <outline text="During the 16th to 17th centuries, the catechismE mbsuame krishter (Christian Teachings) (1592) by Lek Matrnga, Doktrina e krishter (The Christian Doctrine) (1618) and Rituale romanum (1621) by Pjetr Budi, the first writer of original Albanian prose and poetry, an apology for George Castriot (1636) by Frang Bardhi, who also published a dictionary and folklore creations, the theological-philosophical treaty Cuneus Prophetarum (The Band of Prophets) (1685) by Pjetr Bogdani, the most universal personality of Albanian Middle Ages, were published in Albanian. The most famous Albanian writer is probably Ismail Kadare." />
                      <outline text="EducationBefore the establishment of the People&apos;s Republic, Albania&apos;s illiteracy rate was as high as 85%. Schools were scarce between World War I and World War II. When the People&apos;s Republic was established in 1945, the Party gave high priority to wiping out illiteracy. As part of a vast social campaign, anyone between the ages of 12 and 40 who could not read or write was mandated to attend classes to learn. By 1955, illiteracy was virtually eliminated among Albania&apos;s adult population.[101]" />
                      <outline text="Today the overall literacy rate in Albania is 98.7%; the male literacy rate is 99.2% and female literacy rate is 98.3%.[2] With large population movements in the 1990s to urban areas, the provision of education has undergone transformation as well. The University of Tirana is the oldest university in Albania, having been founded in October 1957." />
                      <outline text="SportFootball is the most popular sport in Albania, both at a participatory and spectator level. The sport is governed by the Football Association of Albania (Albanian: Federata Shqiptare e Futbollit, F.SH.F.), created in 1930, member of FIFA and a founding member of UEFA. Other sports played include basketball, volleyball, tennis, swimming, rugby union, and gymnastics." />
                      <outline text="EntertainmentRadio Televizioni Shqiptar (RTSH) is the public radio and TV broadcaster of Albania, founded in 1938 in Tirana. RTSH runs three television stations named Televizioni Shqiptar (TVSH, TVSH 2, and TVSH Sat), and three radio stations, using the name Radio Tirana, in addition to 4 regional radio stations. The international service broadcasts radio programmes in Albanian and seven other languages via medium wave (AM) and short wave (SW).[102] The international service has used the theme from the song &quot;Keputa nj gjethe dafine&quot; as its signature tune. The international television service via satellite was launched since 1993 and aims at Albanian communities in Kosovo, Serbia, Macedonia, Montenegro and northern Greece, plus the Albanian diaspora in the rest of Europe. RTSH has a past of being heavily influenced by the ruling party in its reporting, whether that party be left or right wing." />
                      <outline text="According the National Council of Radio and Television (KKRT), Albania has an estimated 257 media outlets, including 66 radio stations and 67 television stations, with three national, 62 local and more than 50 cable TV stations. Last years Albania has organized several shows as a part of worldwide series like Dancing with the Stars, Big Brother Albania, Albanians Got Talent, The Voice of Albania, and X-Factor Albania." />
                      <outline text="HealthHealth care has been in a steep decline since the collapse of socialism in the country, but a process of modernization has been taking place since 2000.[103] In the 2000s, there were 51 hospitals in the country, including a military hospital and specialist facilities.[103] Albania has successfully eradicated diseases such as malaria." />
                      <outline text="Life expectancy is estimated at 77.59 years, ranking 51st worldwide, and outperforming a number of European Union countries, such as Hungary and the Czech Republic.[104] The most common causes of death are circulatory disease followed by cancerous illnesses. Demographic and Health Surveys completed a survey in April 2009, detailing various health statistics in Albania, including male circumcision, abortion and more.[105]" />
                      <outline text="The Faculty of Medicine of the University of Tirana is the main medical school in the country. There are also nursing schools in other cities. Newsweek ranked Albania 57 out of 100 Best Countries in the World in 2010.[106]" />
                      <outline text="The general improvement of health conditions in the country is reflected in the lower mortality rate, down to an estimated 6.49 deaths per 1,000 in 2000, as compared with 17.8 per 1,000 in 1938. In 2000, average life expectancy was estimated at 74 years, compared to 38 years at the end of World War II. Albania&apos;s infant mortality rate, estimated at 20 per 1,000 live births in 2000, has also declined over the years since the high rate of 151 per 1,000 live births in 1960. There were 69,802 births in 1999 and the fertility rate in 1999 was 2.5 while the maternal mortality rate was 65 per 100,000 live births in 1993. In addition, in 1997, Albania had high immunization rates for children up to one year old: tuberculosis at 94%; diphtheria, pertussis, and tetanus, 99%; measles, 95%; and polio, 99.5%. In 1996, the incidence of tuberculosis was 23 in 100,000 people. In 1995 there were two reported cases of AIDS and seven cases in 1996. In 2000 the number of people living with HIV/AIDS was estimated at less than 100. The leading causes of death are cardiovascular disease, trauma, cancer, and respiratory disease.[citation needed]" />
                      <outline text="CuisineThe cuisine of Albania &apos;&apos; as with most Mediterranean and Balkan nations &apos;&apos; is strongly influenced by its long history. At different times, the territory which is now Albania has been claimed or occupied by Greece, Serbia, Italy and the Ottoman Turks and each group has left its mark on Albanian cuisine. The main meal of Albanians is the midday meal, which is usually accompanied by a salad of fresh vegetables such as tomatoes, cucumbers, green peppers and olives with olive oil, vinegar and salt. It also includes a main dish of vegetables and meat. Seafood specialties are also common in the coastal cities of Durrs, Sarand and Vlor. In high elevation localities, smoked meat and pickled preserves are common." />
                      <outline text="See alsoNotesReferences&#094;&quot;File:Ligji 8926 22.07.2002.pdf &apos;-- Wikimedia Commons&quot;. Commons.wikimedia.org. Retrieved 2013-03-25. &#094; abcdefg&quot;The World Factbook: Albania&quot;. Central Intelligence Agency. Retrieved 21 June 2013. &#094;Europa Publications (24 June 2008). The Europa World Year Book 2008. Taylor &amp; Francis. ISBN 978-1-85743-452-1. Retrieved 22 December 2012. &quot;...and Greece formally annulled claims to North Epirus (southern Albania), where there is a sizeable Greek minority. ... strained by concerns relating to the treatment of ethnic Greeks residing in Albania (numbering an estimated 300,000) ...&quot; &#094;Author No; Europa Publications Staff (6 September 2007). The Europa World Year Book: 2007. Routledge. ISBN 978-1-85743-413-2. Retrieved 22 December 2012. &quot;During the early 1990s, however, bilateral relations were severely strained by concerns relating to the treatment of ethnic Greeks residing in Albania (numbering an estimated 300,000) and to ...&quot; &#094;RFE/RL Research Report: Weekly Analyses from the RFE/RL Research Institute. Radio Free Europe/Radio Liberty, Incorporated. 1993. Retrieved 22 December 2012. &quot;Albanian officials alleged that the priest was promoting irredentist sentiments among Albania&apos;s Greek minority &apos;&apos; estimated at between 60,000 and 300,000.&quot; &#094;United States, Committee on Armed Services, General Accounting Office, Congress, National Security and International Affairs Division, House. Balkans security : current and projected factors affecting regional stability : briefing report to the Chairman, Committee on Armed Services, House of Representatives. DIANE Publishing. p. 14. ISBN 978-1-4289-7030-4. Retrieved 22 December 2012. &#094; abc&quot;Population and Housing Census 2011&quot;. INSTAT (Albanian Institute of Statistics). &#094; abcd&quot;Albania&quot;. The World Bank. Retrieved 17 April 2013. &#094;&quot;Distribution of family income &apos;&apos; Gini index&quot;. The World Factbook. CIA. Archived from the original on 23 July 2010. Retrieved 1 September 2009. &#094;&quot;Human Development Report 2010&quot;. United Nations. 2010. Retrieved 5 November 2010. &#094;&quot;Albania applies for EU membership&quot;. BBC News. 28 April 2009. Archived from the original on 30 April 2009. Retrieved 29 April 2009. &#094;Zolo, D. Invoking Humanity: War, Law and Global Order, Continuum International Publishing Group, 27 Aug 2002, 224 pages. p. 180 [1]&#094;&quot;Population and Housing Census in Albania&quot;. Institute of Statistics of Albania. 2011. &#094;Reports: Poverty Decreases In Albania After Years Of Growth.Dow Jones Newswires, 201-938-5500 201-938-5500 201-938-5500.Nasdaq.com&#094;Albania plans to build three hydropower plants.People&apos;s Daily&#094;Strong GDP growth reduces poverty in Albania-study. Reuters.Forbes.com&#094; ab&quot;Lonely Planet&apos;s top 10 countries for 2011 &apos;&apos; travel tips and articles &apos;&apos; Lonely Planet&quot;. Archived from the original on 4 November 2010. Retrieved 7 August 2013. &#094;Madrugearu A, Gordon M. The wars of the Balkan Peninsula. Rowman &amp; Littlefield, 2007. p. 146.&#094;Richard Talbert, Barrington Atlas of the Greek and Roman World, (ISBN 0-691-03169-X), Map 49 &amp; notes.&#094;The Illyrians by J. J. Wilkes, 1992, ISBN 978-0-631-19807-9, page 279,&quot;We cannot be certain that the Arbanon of Anna Comnena is the same as Albanopolis of the Albani, a place located on the map of Ptolemy (3.12)&quot;&#094;Robert Elsei. The Albanian lexicon of Dion Von Kirkman. Earliest reference to the existence of the Albanian language, pp. 113&apos;&apos;122.&#094;Pinocacozza.it (Italian)(Albanian)&#094;Radio-Arberesh.eu (Italian)&#094;Kristo Frasheri. History of Albania (A Brief Overview). Tirana, 1964.&#094;Lloshi, Xhevat. &quot;The Albanian Language&quot;. United Nations Development Programme. Retrieved 9 November 2010. &#094;Arnaut at the Free Dictionary&#094;Akademia e Shkencave e RPSH. Instituti Gjuhseis dhe i Letersis (1982). &quot;Studime filologjike&quot;. Studime filologjike (in Albanian) (Tirana) (36): 44. &#094;Licursi, Emiddio Pietro (2011). Empire of Nations: The Consolidation of Albanian and Turkish National Identities in theLate Ottoman Empire, 1878&apos;&apos;1913. New York: Columbia University. p. 19. &quot;By 1415, after a chaotic interregnum, Sultan Mehmet I sent the military to erect the first Ottoman garrisons throughout southern Albania, establishing direct military authority in the region...l jurisdiction over most of Albania...&quot; &#094;Clayer, Nathalie. &quot; Albania .&quot; Encyclopaedia of Islam, THREE. Edited by: Gudrun Kr&#164;mer, Denis Matringe, John Nawas, Everett Rowson. Brill Online , 2012. Reference. 18 December 2012&#094;Conflict and Conquest in the Islamic World: A Historical Encyclopedia. Google Books.au. 31 July 2011. ISBN 9781598843378. Retrieved 2013-03-25. &#094; ab&quot; Arnawutlu&#225;&#184;&quot;.&quot; Encyclopaedia of Islam, Second Edition. Brill Online , 2012. Reference. 2 January 2009.[2]&#094;H. T. Norris, Islam in the Balkans: Religion and Society Between Europe and the Arab World, p. 196.&#094; abClayer, Nathalie. &quot; Albania .&quot; Encyclopaedia of Islam, THREE. Edited by: Gudrun Kr&#164;mer, Denis Matringe, John Nawas, Everett Rowson. Brill Online , 2012. 2 April 2012&#094;Clayer, Nathalie. &quot; Albania .&quot; Encyclopaedia of Islam, THREE. Edited by: Gudrun Kr&#164;mer, Denis Matringe, John Nawas, Everett Rowson. Brill Online , 2012. Reference. 17 April 2012 &#094;&quot;Albanian League&quot;. Encyclop...dia Britannica. Retrieved 5 January 2012. &#094;&quot;Albania:History&quot;. Retrieved 9 January 2012. &#094;40 Years of Socialist Albania, Dhimiter Picani&#094;Pano, Aristotel. &quot;Panorama of the Economic-Social Development of Socialist Albania&quot;. Retrieved 11 April 2012. &#094;Library of Congress Country Studies, Albania: Hoxha&apos;s Antireligious Campaign&#094;Kombsia dhe feja n Shqipri, 1920-1944 / Roberto Moroco dela Roka ; e prktheu nga origjinali Luan Omari.&#094;&quot;Nato welcomes Albania and Croatia&quot;. BBC News. 1 April 2009. Archived from the original on 4 April 2009. Retrieved 2 April 2009. &#094;&quot;Albania sells off its military hardware&quot;. BBC News. 17 April 2002. &#094;&quot;Albania to abolish conscription by 2010&quot;. SETimes.com. 21 August 2008. Retrieved 29 December 2009. &#094;&quot;Albanian military expenditure as % of GDP&quot;. World Bank. &#094;[3][dead link]&#094;&quot;Albania membership Nato&quot;. NATO. &#094;&quot;On the Organization and Functioning of the Local Government, Republic of Albania, 2000&quot; (PDF). Archived from the original on 20 September 2010. Retrieved 27 August 2010. &#094;R. Eftimi. &quot;SOME CONSIDERATIONS ON SEAWATER-FRESHWATER RELATIONSHIP IN ALBANIAN COASTAL AREA&quot;. ITA Consult. &#094;&quot;Tiparet e pergjithshme te klimes&quot;. Qendrim.forumotion.net. 2009-12-20. Retrieved 2013-05-05. &#094;&quot;Twenty-first Century Glaciers and Climate in the Prokletije Mountains, Albania Journal Arctic, Antarctic, and Alpine Research Publisher Institute of Arctic and Alpine Research, University of Colorado ISSN 1523-0430 (Print) 1938&apos;&apos;4246 (Online) Issue Volume 41, Number 4 / November 2009 DOI 10.1657/1938-4246-41.4.455 Pages 455&apos;&apos;459 Online Date: 30 November 2009&quot;. Instaar.metapress.com. 30 November 2009. Retrieved 27 August 2010. [dead link]&#094;&quot;Conservation of the Critically Endangered Balkan Lynx&quot;. Catsg.org. Retrieved 5 January 2011. &#094; abhttp://www.cbd.int/doc/world/al/al-nbsap-01-p1-en.pdf&#094; abStreissguth, Thomas (2010). Albania in Pictures. Twenty-First Century Books. ISBN 978-0-7613-4629-6. &#094;&quot;The Balkan Lynx Conservation Compendium&quot;. Catsg.org. Retrieved 29 December 2009. &#094;&quot;Albania&apos;s strides to EU accession&quot;. BBC News. 11 December 2009. &#094;&quot;Albania&apos;s GDP per capita in PPS (2008)&quot; (PDF). Eurostat. Retrieved 13 December 2011. &#094;Business: Albania, Cyprus register economic growth SEtimes.com&#094;Strong economic growth potential puts Albania and Panama top of long term investment list,Propertywire.com&#094;International Monetary Fund (IMF), 9 October 2010. Albania and the IMF&#094;&quot;Albania, Croatia plan nuclear power plant&quot;. Balkaninsight.com. Retrieved 27 August 2010. [dead link]&#094; abEnel Albanian Joint Venture Introduces Coal In Albania&apos;s Power Mix, Business Monitor Online, 24 February 2009&#094;&quot;Download SEDAR Filings - Code Verification and Accept Terms of Use&quot;. Sedar.com. Retrieved 2013-05-05. &#094;&quot;CIA The World Factbook: Oil producers&quot;. Retrieved 23 June 2013. &#094;Albania Country Profile, Food and Agriculture Organization&#094;&quot;Crime Index by Country 2013&quot;. Numbeo.com. Retrieved 2013-03-25. &#094;&quot;Gendercide Watch: &quot;Honour&quot; Killings and Blood Feuds&quot;. Gendercide.org. Retrieved 2013-03-25. &#094;Research for Development Highly Skilled Migration from Albania&#094;&quot;Strategy of Science, Technology and Innovation 2009&apos;&apos;2015&quot; (PDF). Retrieved 27 August 2010. &#094;Wynne, Alexandra. &quot;Albania highway: Making the first move , Features , New Civil Engineer&quot;. Nce.co.uk. Retrieved 29 December 2009. &#094; abc&quot;History of the Airport&quot;. Tirana International Airport Website. Retrieved 15 January 2011. &#094;CO2 Emissions from Fuel Combustion Population 1971&apos;&apos;2009 IEA pdf pages 87&apos;&apos;89&#094;Women, Men and shefit&apos;s in Albania 2006, Instat, Tirana, 2007&#094;&quot;Albania: Looking Beyond Borders&quot;. Migration Policy Institute.&#094; abcd&quot;The politics of numbers and identity in Albania&quot;. EUDO Observatory on Citizenship. &#094;Kosta Barjarba. &quot;Migration and Ethnicity in Albania: Synergies and Interdependencies&quot; (PDF). &#094;United Nations High Commissioner for Refugees (2005-05-11). &quot;World Directory of Minorities and Indigenous Peoples &apos;-- Albania : Overview&quot;. Unhcr.org. Retrieved 2013-05-05. &#094;&apos;,Eastern Europe at the end of the 20th century&apos;,, Ian Jeffries, p. 69. Google Books. 25 June 1993. ISBN 978-0-415-23671-3. Retrieved 27 August 2010. &#094;Albania, U.S. Department of State Bureau of European and Eurasian Affairs, Background Note November 2008. Retrieved 14 May 2009&#094;&quot;Macedonians and Greeks Join Forces against Albanian Census&quot;. balkanchronicle. Retrieved 24 September 2011. &#094;&quot;Albania passes census law&quot;. MINA. &#094;&quot;Census Legislation&quot;. &#094;&quot;&#190;Microsoft Word &apos;-- Law Nr 10442 date 07.07.2011.doc&quot; (PDF). Retrieved 2013-03-25. &#094; abMaria Karathanos , Constantine Callaghan. &quot;Ethnic tensions in Albania&quot;. Athensnews. Retrieved 7 January 2013. &quot;...in line with Albanian nationalist sentiment alleging that the census poses a threat to Albanian territorial integrity&quot; &#094;Likmeta, Besar. &quot;Albania Nationalist Leader Resigns from Top Justice Job&quot;. Balkannsight. Retrieved 7 January 2013. &#094;&quot;Census stirs Balkan melting pot&quot;. 20 October 2011. &quot;... nationalist critics are up in arms at efforts to provide an accurate picture of Albania&apos;s ethnic breakdown, seeing a plot to weaken the state...The group has denounced the ethnicity section of the national census, and Spahiu warns the results could upset Albania&apos;s &quot;good model&quot; of ethnic and religious tolerance...&quot; &#094;&quot;Some Albanians consider changing nationality for profit&quot;. SETimes. &#094;&quot;Courts in Albania suspend changing nationality to Greek&quot;. SETimes. &#094;&quot;Greek Consul Statement Angers Albanian MPs&quot;. BalkanInsight. &#094;&quot;Languages of Albania&quot;. Retrieved 31 October 2010. &#094;http://www.instat.gov.al/media/177358/njoftim_per_media_-_fjala_e_drejtorit_te_instat_ines_nurja_per_rezultatet_finale_te_census_2011.pdf&#094;&quot;Gallup Global Reports&quot;. Gallup.com. Retrieved 2013-03-25. &#094;&quot;Albania: International Religious Freedom Report 2007&quot;. State.gov. 14 September 2007. Archived from the original on 28 August 2010. Retrieved 27 August 2010. &#094;&quot;Albania&quot;. TED Adventist. Retrieved 2013-03-25. &#094;&quot;Famous British celebrity visits ADRA Albania&quot;. &#094;&quot;LDS Newsroom-Country Profile-Albania&quot;. The Church of Jesus Christ of Latter-day Saints. &#094;&quot;2008 Jehovah&apos;s Witnesses Worldwide Status Report&quot;. Watch Tower. Archived from the original on 19 October 2009. Retrieved 27 September 2009. &#094;Arbatsky, Yuri, cited in Koco with the footnote Translated and published by Filip Fishta in Shkolla Kombtare (The National School; No.1, May 1939), 19, and quoted from his Preface to Pjetr Dungu&apos;s Lyra Shqiptare (see note 2).&#094;&quot;Albanian Music&quot;. Eno Koco at the University of Leeds. Archived from the original on 28 August 2005. Retrieved 28 August 2005. &#094;Encyclopedia of Indo-European Culture By J. P. Mallory, Douglas Q. Adams Edition: illustrated Published by Taylor &amp; Francis, 1997 ISBN 978-1-884964-98-5, ISBN 978-1-884964-98-5 (&quot;Although there are some lexical items that appear to be shared between Romanian (and by extension Dacian) and Albanian, by far the strongest connections can be argued between Albanian and Illyrian.&quot; page 11) Concise Encyclopedia of Languages of the World By Keith Brown, Sarah Ogilvie Contributor Keith Brown, Sarah Ogilvie Edition: illustrated Published by Elsevier, 2008 ISBN 978-0-08-087774-7, ISBN 978-0-08-087774-7 (&quot;Albanian constitutes a single branch of the Indo-European family of languages. It is often held to be related to Illyrian, a poorly attested language spoken in the Western Balkans in classical times&quot; page 22)&#094;&quot;The Thracian language&quot;. The Linguist List. Archived from the original on 3 February 2008. Retrieved 27 January 2008. &quot;An ancient language of Southern Balkans, belonging to the Satem group of Indo-European. This language is the most likely ancestor of modern Albanian (which is also a Satem language), though the evidence is scanty. 1st Millennium BC &apos;&apos; 500 AD.&quot; &#094;Zickel, Iwaskiw, 1994&#094;&quot;Radio Tirana&apos;s Broadcasting Schedule as of 2007 &apos;&apos; RadioTirana.org&quot;. Picasaweb.google.es. 2008-10-25. Retrieved 2013-05-05. &#094; ab&quot;Albania-prel.pmd&quot; (PDF). Archived from the original on 27 December 2009. Retrieved 29 December 2009. &#094;CIA &apos;&apos; The World Factbook, Life Expectancy ranks&#094;Albania DHS Surveys .&#094;&quot;The World&apos;s Best Countries&quot;. Newsweek. 16 August 2010. Archived from the original on 16 August 2010. Retrieved 27 August 2010.  This article incorporates public domain material from websites or documents of the CIA World Factbook. (Article on Albania)" />
                      <outline text="External linksCoordinates: 41&#176;N20&#176;E&gt;&gt; / &gt;&gt;41&#176;N 20&#176;E&gt;&gt; / 41; 20" />
                      <outline text=" International membership" />
              </outline>

              <outline text="File:Trans Adriatic Pipeline.png - Wikimedia Commons">
                      <outline text="Link to Article" type="link" url="http://commons.wikimedia.org/wiki/File:Trans_Adriatic_Pipeline.png" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376834371_ksrug5Ld.html" />
      <outline text="Sun, 18 Aug 2013 13:59" />
                      <outline text="" />
                      <outline text="From Wikimedia Commons, the free media repository" />
                      <outline text="No higher resolution available." />
                      <outline text="Summary[edit]DescriptionTrans Adriatic Pipeline.pngEnglish: Trans Adriatic Gas Pipeline Map" />
                      <outline text="Date14 August 2012SourceOwn workAuthorGenti77Licensing[edit]I, the copyright holder of this work, hereby publish it under the following license:" />
                      <outline text="File historyClick on a date/time to view the file as it appeared at that time." />
                      <outline text="You cannot overwrite this file.File usage on CommonsThe following file is a duplicate of this file (more details):" />
                      <outline text="There are no pages that link to this file." />
                      <outline text="File usage on other wikisThe following other wikis use this file:" />
                      <outline text="Usage on de.wikipedia.orgUsage on hu.wikipedia.orgUsage on sq.wikipedia.orgThis file contains additional information, such as EXIF metadata, probably added from the digital camera or scanner used to create or digitize it. If the file has been modified from its original state, some details may not fully reflect the modified file. The timestamp is only as accurate as the clock in the camera and may be completely wrong." />
              </outline>

              <outline text="Nabucco Map | European Dialogue">
                      <outline text="Link to Article" type="link" url="http://eurodialogue.org/Nabucco-Map" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376834327_UMQw2WsD.html" />
      <outline text="Sun, 18 Aug 2013 13:58" />
                      <outline text="" />
                      <outline text="20082009January, 2009(14)February, 2009(21)March, 2009(28)April, 2009(39)May, 2009(45)June, 2009(47)July, 2009(40)August, 2009(26)September, 2009(43)October, 2009(36)November, 2009(46)December, 2009(30)2010January, 2010 (27)February, 2010 (31)March, 2010 (41)April, 2010 (60)May, 2010 (63)June, 2010 (58)July, 2010 (57)August, 2010 (23)September, 2010 (67)October, 2010 (54)November, 2010 (57)December, 2010 (42)20112012August 2013MonTueWedThuFriSatSun293031123456789101112131415161718192021222324252627282930311" />
              </outline>

              <outline text="Azerbaijan-Gazprom agreement puts Nabucco in jeopardy - Today&apos;s Zaman, your gateway to Turkish daily news">
                      <outline text="Link to Article" type="link" url="http://www.todayszaman.com/news-181072-azerbaijan-gazprom-agreement-puts-nabucco-in-jeopardy.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376834250_hkPtqJNg.html" />
      <outline text="Sun, 18 Aug 2013 13:57" />
                      <outline text="" />
                      <outline text="Russian President Dmitry Medvedev&apos;s visit to the Azerbaijani capital of Baku last week, this time accompanied by Russian businessman Alexei Miller, the CEO of Gazprom, Russia&apos;s largest company and the biggest gas company in the world, was part of efforts to secure Baku&apos;s gas. The gas is also coveted by the EU-backed $11 billion Nabucco project, a gas pipeline project that is envisioned to transport primarily Caspian Sea gas to Europe through Turkey, bypassing Russia. Gazprom&apos;s CEO Miller and R&#182;vnaq Abdullayev, the head of SOCAR, signed an agreement to transfer 500 million cubic meters of gas from the rich Shah Deniz gas field starting in January of next year. Russian President Medvedev and Azerbaijani President &#196;&#176;lham Aliyev labeled the agreement a huge step forward in energy policy and bilateral relations." />
                      <outline text="There is speculation that the deal is part of Russia&apos;s effort to control all of Europe&apos;s energy routes and make the Nabucco project redundant when considering the gas oversupply of South Stream, a Russian-orchestrated gas pipeline aiming to transfer Caspian gas via the Black Sea to Eastern Europe. However, President Medvedev said their motives are solely based on economic, not political, interest. Miller said they are looking forward to getting special privileges in the second phase of the Shah Deniz gas field, which will be inevitable unless other companies offer more attractive deals to Azerbaijan. Although the current deal only allows 500 million cubic meters of gas to be sold to Gazprom, the company foresees annual increases in supplies to Russia in the future." />
                      <outline text="Although the Nabucco pipeline&apos;s sources of gas are still to be decided, the project has been seen as one of the primary actions to counter the difficulties raised by Russia&apos;s harsh and strict energy policies. The EU is not a partner in the Nabucco project, but it has great interest in keeping it safe and out of Russia&apos;s control. In the meantime, Russia is planning to establish the rival South Stream gas pipeline." />
                      <outline text="Commenting on the rivalry between Nabucco and South Stream, Shirvani Abdullayev, Russia&apos;s Alfa Bank&apos;s top oil and gas analyst, told The Associated Press that giving Gazprom priority for the Shah Deniz gas field would spell the end for Europe&apos;s Nabucco project. &apos;&apos;Nabucco was designed to use Shah Deniz gas,&apos;&apos; he said. &apos;&apos;Now it is left without the source of gas.&apos;&apos; Abdullayev said it was &apos;&apos;unrealistic to think&apos;&apos; that South Stream and Nabucco could coexist. &apos;&apos;The market does not need so much gas,&apos;&apos; he said." />
                      <outline text="Ferruh Demirmen, an independent energy analyst based in Texas, told Today&apos;s Zaman that &apos;&apos;Azerbaijan sent a message to Turkey and to the West by signing a contract with Russia.&apos;&apos; He continued, saying, &apos;&apos;The first gas supply for Nabucco will be from Shah Deniz-2. Nabucco&apos;s future is in question as Shah Deniz-2&apos;s gas went to Russia.&apos;&apos;" />
                      <outline text="Also speculating on the aftermath of the agreement on the Nabucco project, Demirmen said, &apos;&apos;It is undeniable that with Shah Deniz-2&apos;s gas stream to Russia, Nabucco will be adversely influenced.&apos;&apos; Demirmen also claimed that this agreement would &apos;&apos;force&apos;&apos; the other partners in the Shah Deniz Consortium to act the same way as SOCAR. &apos;&apos;Although as a partner country, SOCAR has only a 10 percent share of the gas consortium, according to the Production Sharing Agreement,&apos;&apos; Demirmen said, &apos;&apos;SOCAR will get the rights for a significant portion of the gas and sell it to Russia. This situation will also push other partners to sell their shares of gas to Russia.&apos;&apos;" />
                      <outline text="Azerbaijan, undoubtedly, also plans to use the agreement in its foreign policy. The long protracted conflict over the disputed territory of Nagorno-Karabakh, an Azerbaijani territory currently controlled by Armenian military forces, has been Azerbaijan&apos;s primary foreign policy challenge for nearly two decades. In his interview with Today&apos;s Zaman, Demirmen said: &apos;&apos;Azerbaijan plans to use its gas reserves in its foreign policy with this agreement, too. Russia, throughout the history of gas trade with Europe, has also used its gas policy as a geopolitical tool. This agreement shows that Azerbaijan has allied itself with Russia. Azerbaijan&apos;s primary message to the West is about its Nagorno-Karabakh problem.&apos;&apos;" />
                      <outline text="Sami Sevin&#167;, a member of the Turkish Industrialists and Businessmen&apos;s Association&apos;s (T&apos;S&#196;&#176;AD) Energy Working Group, told Today&apos;s Zaman that &apos;&apos;Turkey still produces 60 percent of its electricity from gas. If Turkey gets gas through Gazprom and not directly from Azerbaijan, it will be a losing situation for Turkey.&apos;&apos; At a Strategic Cooperation Conference in Baku in September of last year there was great support for the Nabucco project. &quot;Azerbaijan is not giving up on the Nabucco project,&quot; Azerbaijani Industry and Energy Minister Natiq Aliyev had said, &quot;This is a project that has a future.&quot;" />
                      <outline text="Sohbet Karbuz, the head of the oil and natural gas department at the Union of Mediterranean Energy Companies (OME), told Today&apos;s Zaman that &apos;&apos;the details of Azerbaijan&apos;s agreement with Gazprom are not yet clear. An annual 500 million cubic meters of gas does not really have importance. What&apos;s important is Shah Deniz&apos;s second phase. There was a short &apos;gas crisis&apos; between Russia and Turkmenistan, and thus Russia&apos;s agreement with Azerbaijan also sends a warning alarm to Turkmenistan. However, Russia cannot give up Turkmenistan. For the South Stream [pipeline] Russia needs Turkmen gas.&apos;&apos; Speaking optimistically about Azerbaijan&apos;s intention not to cooperate with Nabucco, Karbuz said: &apos;&apos;Right now, the most reasonable deal is to send gas to Russia as there is a real gas pipeline. However, as the fate of Nabucco is not clear, Azerbaijan, I believe, will not become involved in large-scale agreements with Russia&apos;&apos;." />
                      <outline text="In his interview with Today&apos;s Zaman, Mert Bilgin, a professor at Bah&#167;e&#197;&#159;ehir University, said: &apos;&apos;Azerbaijan&apos;s political goal is about Nagorno-Karabakh and the limits of compromise in Turkey-Armenia talks. If Russia supports Azerbaijan&apos;s cause to keep the Nagorno-Karabakh region within Azerbaijan&apos;s territory with a largely autonomous nature, then Azerbaijan may increase the gas supply to Russia. If Turkey makes solving this problem a priority, the normalization of relations with Armenia, for whatever goals and real intentions, will not be welcomed in Azerbaijan, and Russia&apos;s regional influence will increase.&apos;&apos;" />
                      <outline text="To end the discussions on the issue, Azerbaijani President &#196;&#176;lham Aliyev, in a Monday speech at Chatham House in London, said they have enough oil to sell to various parties." />
              </outline>

              <outline text="ITAR-TASS : Azerbaijan&apos;s SOCAR to buy 66 percent stake in Greece&apos;s DESFA">
                      <outline text="Link to Article" type="link" url="http://www.itar-tass.com/en/c32/780073.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376834232_Qbx8PHeu.html" />
      <outline text="Sun, 18 Aug 2013 13:57" />
                      <outline text="" />
                      <outline text="BAKU, June 21 (Itar-Tass) - The State Oil Company of Azerbaijan Republic (SOCAR) will acquire a 66 percent stake in Greece&apos;s natural gas grid operator DESFA." />
                      <outline text="The agreement in principle was reached with Hellenic Republic Asset Development Fund (HRADF), SOCAR said in its statement on Friday." />
                      <outline text="&apos;&apos;At present, advisory groups of SOCAR and HRADF are finalizing technicalities,&apos;&apos; the statement read." />
                      <outline text="SOCAR President Rovnag Abdullayev said his company&apos;s decision to buy DESFA &apos;&apos;proves a high level of bilateral relations between Azerbaijan and Greece and their leading energy companies.&apos;&apos;" />
                      <outline text="&apos;&apos;SOCAR that has accumulated good experience in operating gas pipelines in the Caspian Sea region is ready to start work in the first such project in the EU member-states, namely in Greece. The State Oil Company of Azerbaijan Republic looks optimistically into future cooperation with Greece,&apos;&apos; he said." />
                      <outline text="The deal&apos;s sum has not been disclosed, but several sources say SOCAR offered 400 million euro for the stake." />
                      <outline text="At present, Greece&apos;s top oil refiner Hellenic Petroleum owns a 35 percent stake in DESFA and the Greek government - a 31 percent stake. It is expected that the latter will get around 188 million euro for its stake." />
                      <outline text="On the list of contenders in the bidding contest were also Russia&apos;s Sintez Group and Greek-Czech group PPF-Terna. However, in June 2013 both companies abandoned their plans." />
              </outline>

              <outline text="Shah Deniz partners take stake in TAP - Offshore">
                      <outline text="Link to Article" type="link" url="http://www.offshore-mag.com/articles/2013/jan/shah-deniz-partners-take-stake-in-tap-.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376834130_BUvpwnn6.html" />
      <outline text="Sun, 18 Aug 2013 13:55" />
                      <outline text="" />
                      <outline text="Offshore staff" />
                      <outline text="BAAR, Switzerland &apos;&apos; The Trans Adriatic Pipeline (TAP) consortium and shareholders Axpo, Statoil, and E.ON have struck an agreement with three of the partners in the Shah Deniz field in the Caspian Sea." />
                      <outline text="This stipulates how the TAP joint venture will be governed by an enlarged shareholder group comprising Statoil, E.ON, Axpo, and Shah Deniz co-owners SOCAR, BP, and Total. The field trio could take a combined stake of up to 50%.  " />
                      <outline text="TAP is one of three planned offshore/onshore pipelines in the running to take gas to Europe from the Shah Deniz II project in the offshore Azeri sector. The others are the Trans Anatolian Pipeline (TANAP) and the South Caucasus Pipeline (SCP)." />
                      <outline text="The Shah Deniz consortium expects to make a final decision on the preferred European gas transportation solution by mid-2013." />
                      <outline text="TAP would transport gas from the Caspian region via Greece and Albania and across the Adriatic Sea to southern Italy and onto western Europe." />
                      <outline text="The project could provide 10-20 bcm/yr (373-706 bcf/yr) of transportation capacity, with options for physical reverse flow of up to 80%, and development of natural gas storage facilities in Albania, strengthening supply security should gas deliveries be interrupted." />
                      <outline text="TAP&apos;s shareholders are Axpo of Switzerland (42.5%), Statoil (42.5%), and E.ON Ruhrgas of Germany (15%). Statoil is also a partner in Shah Deniz." />
                      <outline text="Last week the Albanian Ministry of Economy, Trade and Energy and the TAP partners signed a host government agreement, setting out their terms of engagement within Albania." />
                      <outline text="These include TAP&apos;s land easement and acquisition and permitting processes, and implementation of technical, environmental and safety standards. Additionally, TAP agreed to provide technical support for development of the local Albanian gas market." />
                      <outline text="The Albanian section of the TAP pipeline would start at Bilisht Qendr in Korc&#204;&#167;a region at the border with Greece. The offshore Albania section in the Adriatic Sea would be about 60 km (37 mi) long." />
                      <outline text="1/23/2013" />
              </outline>

              <outline text="Trans-Adriatic Pipeline to take Shah Deniz gas to southern Europe - Offshore">
                      <outline text="Link to Article" type="link" url="http://www.offshore-mag.com/articles/2013/07/trans-adriatic-pipeline-to-take-shah-deniz-gas-to-southern-europe.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376834073_czEC3uQU.html" />
      <outline text="Sun, 18 Aug 2013 13:54" />
                      <outline text="" />
                      <outline text="Offshore staff" />
                      <outline text="BAKU, Azerbaijan &apos;&apos; The Shah Deniz Consortium (SDC) has selected the Trans-Adriatic Pipeline (TAP) to transport gas from the Shah Deniz II offshore project in the Caspian Sea to Europe." />
                      <outline text="The partners decided that TAP was economically and technically the best option." />
                      <outline text="Gas from the Shah Deniz field in the Azeri offshore sector will head west through the new 20 bcm/yr (706 bcf/yr) capacity TAP pipeline. This will connect with another new overland system, the Trans-Anatolian Pipeline (TANAP), near the Turkish/Greek border at Kipoi. TAP will traverse Greece and Albania and a 115-km (71-mi) section of the Adriatic Sea, finally making landfall in Sana Foca, southern Italy." />
                      <outline text="The route will facilitate gas supplies to southeast Europe countries such as Bulgaria, Albania, Bosnia and Herzegovina, Montenegro and Croatia, and the landfall in Italy will provide further openings for gas deliveries to Germany, France, the UK, Switzerland and Austria." />
                      <outline text="TAP&apos;s shareholders are Axpo of Switzerland (42.5%), Norway&apos;s Statoil (42.5%) and E.ON of Germany (15%). Shah Deniz Consortium members BP, SOCAR, and Total are co-funding the development and have options to purchase shares in TAP up to a total of 50%." />
                      <outline text="Shah Deniz Stage 2 is expected to produce up to 16 bcm/yr (565 bcf/yr), in addition to the 9 bcm/yr (318 bcf/yr) already delivered by Shah Deniz Stage 1. TANAP construction is scheduled to start next year and is expected to be completed in 2018." />
                      <outline text="Last month Azerbaijan&apos;s state oil company SOCAR agreed to acquire a 66% stake in DESFA, the Greek gas transmission network operator, for $609 million. Nearly half will be allocated to reviving the ailing Greek economy." />
                      <outline text="Analysts Wood Mackenzie claimed the BP-led Shah Deniz consortium favored TAP&apos;s greater commercial attractions over the strategic benefits of the rival Nabucco West project. " />
                      <outline text="Massimo Di-Odoardo, senior European Gas &amp; Power research analyst, said: &apos;&apos;The shorter TAP option will have been able to propose a more attractive tariff, overcoming long-held strategic support for the Nabucco project. Nabucco West is a downsized version of the original Nabucco pipeline, and a means of diversifying supply to southeast Europe, which is dominated by Russian gas. The decision has been driven by commercial considerations, including the financial robustness of the pipeline consortia and expected prices in target markets.&apos;&apos;" />
                      <outline text="Nick Gellatly, lead analyst &apos;&apos; Caspian Upstream research, added: &apos;&apos;A final investment decision on Shah Deniz Phase 2 is expected to be taken before the end of the year, with gas sales agreements finalized before then. First gas could be achieved in late 2018, with first volumes reaching Europe in 2019." />
                      <outline text="&apos;&apos;The initial 10 bcm capacity of TAP is strategically significant but represents only a small percentage of current European gas demand. SOCAR has consistently emphasized the importance of scalability as it seeks to become an influential supplier to Europe in future. To this end, future TAP expansion to greater than 20 bcm will be important.&apos;&apos;" />
                      <outline text="However, the costs of constructing the connecting TANAP overland line remain to be confirmed. &apos;&apos;The pipeline&apos;s construction has major political support, but will be expensive,&apos;&apos; Gellatly said. &apos;&apos;If progress is delayed, Shah Deniz Phase 2 gas could reach western Turkey via expansion of the existing BOTAS network. This would be a lower cost, albeit less scalable, option." />
                      <outline text="&apos;&apos;The future ramp-up in Azerbaijan&apos;s gas exports will still depend on development constraints in the country, such as a lack of rigs and the high cost and complexity of many of the offshore projects.&apos;&apos;" />
                      <outline text="Di-Odoardo added: &apos;&apos;Gas may still flow along parts of the proposed Nabucco West route via the incremental construction of interconnectors and spur lines. That said, the wider ambitions of the original Nabucco project are now unlikely to be realized.&apos;&apos;" />
                      <outline text="7/02/2013" />
              </outline>

              <outline text="Shah Deniz gas export routes under review - Offshore">
                      <outline text="Link to Article" type="link" url="http://www.offshore-mag.com/articles/2013/04/shah-deniz-gas-export-routes-under-review.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376833990_TJTpVQjT.html" />
      <outline text="Sun, 18 Aug 2013 13:53" />
                      <outline text="" />
                      <outline text="Offshore staff" />
                      <outline text="BAKU, Azerbaijan &apos;&apos; The Shah Deniz field partners have started to evaluate final bids received for transportation of Shah Deniz Stage 2 gas in the Caspian Sea to Europe." />
                      <outline text="These came from the Nabucco Gas Pipeline International and Trans Adriatic Pipeline (TAP) consortia, and include detailed information on the technical, regulatory, financial, and other aspects of both projects." />
                      <outline text="According to Shah Deniz operator BP, the partners will assess both offers for commerciality, project deliverability, financial deliverability, engineering design, alignment and transparency, operability, scalability, and public policy considerations." />
                      <outline text="A decision on the preferred export route to Europe is expected by end-June." />
                      <outline text="The transportation offers should become legally binding by the end of April. Over the next few weeks the Shah Deniz partners also expect to receive binding gas sales offers from buyers in Europe." />
                      <outline text="Shah Deniz Stage 2 should add a further 16 bcm/yr (565 bcf/yr) of gas production to the 9 bcm/yr (318 bef/yr) currently flowing from Shah Deniz Stage 1." />
                      <outline text="New facilities will likely include two new bridge-linked production platforms; 26 subsea wells to be drilled by two semisubmersible rigs; 500 km (310 mi) of subsea pipelines in water depths of up to 550 m (1,804 ft); a 16 bcm/yr upgrade for the overland South Caucasus Pipeline (SCP); and expansion of the Sangachal terminal." />
                      <outline text="Further pipelines will be built and expanded to transport Shah Deniz gas through Turkey and Europe." />
                      <outline text="4/5/2013" />
              </outline>

              <outline text="McCain and Graham flipflop on aid to Egypt &apos;&apos; after AIPAC gives them their orders - David Icke Website">
                      <outline text="Link to Article" type="link" url="http://www.davidicke.com/headlines/89165-mccain-and-graham-flipflop-on-aid-to-egypt-after-aipac-speaks-up" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376833620_a8XWaMFA.html" />
      <outline text="Sun, 18 Aug 2013 13:47" />
                      <outline text="" />
                      <outline text="Sunday, 18 August 2013 12:03" />
                      <outline text="Why would Israel want $1.3 billion in annual US military aid to the Egyptian Army to continue when a civil war is unfolding just across their border? Because the whole idea is to play the factions off against each other - triggered by the US-owned Egyptian army - just as they have done in Libya and Syria." />
                      <outline text="Lieberman, McCain and Graham: See All Evil, Speak All Evil, Seek All Evil." />
                      <outline text="&apos;In early July, John McCain went on CBS&apos;s Face the Nation saying that the U.S. should cut off aid to Egypt, which is a principled stand. McCain had good company: Libertarian Kentucky Senator Rand Paul and South Carolina&apos;s Lindsey Graham too.McCain and Graham made clear that this was a matter of principle. They wrote a long op-ed in calling for a cut-off of aid to Egypt in the Washington Post last month." />
                      <outline text="But then former Connecticut Senator Joe Lieberman said that he disagreed with McCain. And then AIPAC, the leading Israel lobby group, said in a letter that they opposed cutting off aid to Egypt." />
                      <outline text="Abracadabra. Just like that McCain and Graham completely changed their opinion and started spouting the AIPAC position. Both McCain and Graham even cited the letter from AIPAC opposing cutting off aid to Egypt in Senate debate. Just who runs Congress?? AIPAC or the American people?&apos;" />
                      <outline text="The question answers itself." />
                      <outline text="Read more: McCain and Graham flipflop on aid to Egypt &apos;&apos; after AIPAC speaks up" />
                      <outline text="----------------------------------------------------------------" />
                      <outline text="Obama and the Egyptian Massacre" />
                      <outline text="&apos;Wednesday&apos;s massacre of hundreds of unarmed protesters by the US-backed Egyptian military junta shatters Washington&apos;s hypocritical claims that its Middle East policy is based on democracy and human rights." />
                      <outline text="Obama faced a dilemma as he spoke on Egypt yesterday, from his vacation spot in the multi-million-dollar mansion of a corporate finance manager on Martha&apos;s Vineyard. Washington would have preferred to arrange a compromise between the army and the Muslim Brotherhood (MB) of deposed President Mohamed Mursi. However, amid rising mass protests in July, it ultimately gave its blessing to a military coup, removing Mursi in order to preempt renewed revolutionary struggles by the working class." />
                      <outline text="Washington apparently failed to fully foresee the implications of allowing the military and its supporters in the liberal bourgeoisie to settle accounts with the MB. It now fears that with the latest massacre, the army has overreached itself, irretrievably destabilizing Egypt and undermining US Middle East policy.&apos;" />
                      <outline text="Read more ..." />
                      <outline text="-----------------------------------------------------------------" />
                      <outline text="Massacre on the Streets of EgyptJavaScript is disabled!To display this content, you need a JavaScript capable browser." />
                      <outline text="---------------------------------------------------------------" />
                      <outline text="Egypt expert: &apos;The old guard is back in power&apos;&apos;Riots in the streets, state of emergency, curfew: Egypt descends into chaos. The military has taken over power. It is the return of the old Mubarak guard, Egypt expert Cilja Harders told DW.&apos;" />
                      <outline text="Read more ..." />
              </outline>

              <outline text="US Arms Industry Would Lose Big from Egypt Aid Cut-Off | Common Dreams">
                      <outline text="Link to Article" type="link" url="http://www.commondreams.org/headline/2013/08/17-0" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376833287_BxvjZu4F.html" />
      <outline text="Sun, 18 Aug 2013 13:41" />
                      <outline text="" />
                      <outline text="An Egyptian army M1 Abrams tank placed near Tahrir Square during the 2011 Egyptian protests. (Credit: Sherif9282 GNU license)UNITED NATIONS- The United States, which has refused to cut off its hefty 1.3 billion dollars in annual military aid to Egypt, continues to argue that depriving arms to the 438,500-strong security forces will only &apos;&apos;destabilise&apos;&apos; the crisis-ridden country." />
                      <outline text="There is perhaps a more significant &apos;&apos; but undisclosed &apos;&apos; reason for sustaining military aid flows to Egypt: protecting U.S. defence contractors." />
                      <outline text="Virtually all &apos;&apos; or an overwhelming proportion &apos;&apos; of the 1.3 billion dollars granted under Foreign Military Financing (FMF) is plowed back into the U.S. economy, specifically into the U.S. defence industry." />
                      <outline text="William Hartung, director of the Arms and Security Project at the Centre for International Policy (CIP), told IPS U.S. President Barack Obama&apos;s refusal to cut-off military aid to Egypt while U.S. weapons are being used to murder protesters is &apos;&apos;unconscionable&apos;&apos;." />
                      <outline text="&apos;&apos;The reasons given for continuing this aid no longer hold up to scrutiny. It is not a source of stability, as the Obama administration claims,&apos;&apos; he said." />
                      <outline text="And it has certainly not given the United States any leverage to moderate the behaviour of the regime, said Hartung, who has written extensively on the politics and economics of the U.S. defence industry." />
                      <outline text="&apos;&apos;One thing the aid has done and continues to do is to enrich U.S. defence contractors like Lockheed and General Dynamics,&apos;&apos; he added." />
                      <outline text="With the exception of a tank factory built with U.S. assistance, he pointed out, the vast bulk of the roughly 40 billion dollars in U.S. military aid to Egypt over the past 30 years has gone straight into the coffers of U.S. weapons makers." />
                      <outline text="The sophisticated weapons systems already purchased by Egypt &apos;&apos; with much more still in the pipeline &apos;&apos; include F-16 fighter planes, E2-C Hawkeye reconnaissance aircraft, Apache and Sikorsky helicopters, C-130 transports, Sidewinder, Sparrow, Improved-Hawk and Hellfire missiles, M-1A1 Abrams and M60A1 battle tanks, and M113A2 armoured personnel carriers." />
                      <outline text="All of these weapons have either been delivered &apos;&apos; or are in the process of being delivered &apos;&apos; by some of the major U.S. defence contractors, including Lockheed Martin, Northrop Grumman, General Electric, Boeing, Sikorsky, General Dynamics, United Defence and Raytheon, among others." />
                      <outline text="Besides the 1.3 billion dollars in FMF outright grants, Egypt also receives 1.9 million dollars annually for International Military Education and Training (IMET) and about 250,000 dollars in Economic Support Funds (ESF)." />
                      <outline text="Egypt also receives, at minimum cost as delivery charges, second-hand U.S. equipment under Excess Defence Articles (EDA) worth hundreds of millions of dollars annually." />
                      <outline text="The U.S. defence contractor General Dynamics is involved in helping Egypt co-produce the M1A1 Abrams battle tank, described as &apos;&apos;one of the cornerstones of U.S. military assistance to Egypt&apos;&apos;." />
                      <outline text="Additionally, there is an ongoing programme to continue upgrading equipment in the Egyptian arsenal and follow-on support and maintenance contracts for the upkeep of U.S. equipment." />
                      <outline text="In a piece published in Common Dreams online, Jacob Chamberlain, a staff writer, quotes a report from National Public Radio (NPR) as saying that every year, the U.S. Congress appropriates more than one billion dollars in military aid to Egypt." />
                      <outline text="&apos;&apos;But that money never gets to Egypt. It goes to the Federal Reserve Bank of New York, then to a trust fund at the Treasury and, finally, out to U.S. military contractors that make the tanks and fighter jets that ultimately get sent to Egypt.&apos;&apos;" />
                      <outline text="So far, the Obama administration has penalised Egypt by suspending the delivery of four F-16 fighter planes (the Egyptian air force already has 143 F-16s, with the last order of 20 dating back to March 2010 still in the pipeline) and the cancellation of joint military exercises with Egypt scheduled for September." />
                      <outline text="The Obama administration has also refused to describe the military takeover of a civilian government as a &apos;&apos;coup&apos;&apos; because under U.S. legislation such a designation would automatically generate a cut off of U.S. aid." />
                      <outline text="As of Friday, the death toll from the military crackdown has been estimated at between 500 and 1,000, with nearly 4,000 injured." />
                      <outline text="Pieter Wezeman, a senior researcher with the Arms Transfers Programme at the Stockholm International Peace Research Institute (SIPRI), told IPS, &apos;&apos;It is correct that the U.S. military industry benefits from U.S. military aid to Egypt." />
                      <outline text="&apos;&apos;And it is correct that if the United States would stop altogether with supplying such aid to Egypt, that would have some effect on the turnover of the U.S. arms industry,&apos;&apos; he added." />
                      <outline text="However, he said, &apos;&apos;I am doubtful if arms industry lobbying [or] concern for the arms industry is a reason of any significance for the U.S. to not halt all FMF aid to Egypt.&apos;&apos;" />
                      <outline text="There are several reasons, he said, including a temporary stop which would have only a minor effect." />
                      <outline text="&apos;&apos;After all, some of the equipment that has been contracted for can be produced and stored by the U.S. government &apos;&apos; which is, after all, the entity that signed the contracts with the U.S. industry &apos;&apos; until the situation in Egypt changes.&apos;&apos;" />
                      <outline text="Presumably, funding not earmarked can be withheld and would benefit the industry later, he added." />
                      <outline text="Moreover, said Wezeman, the U.S. has embargoed major buyers of U.S. arms and cut military aid before, despite the obvious costs for the industry." />
                      <outline text="The best examples are Iran in 1979 &apos;&apos; although that was arguably as well a decision by Iran at that time &apos;&apos; Pakistan in early 1990s and India in 1963." />
                      <outline text="Citing other examples, he said, in the case of Saudi Arabia and the United Arab Emirates (UAE), the U.S. has foregone some major deals due to the fact they did want to supply certain advanced equipment. For example, it is generally assumed that France clinched a major deal for combat aircraft in the late 1990s because it included 300 km range cruise missiles which the U.S. had refused." />
                      <outline text="Military aid to countries like Greece has diminished from high in the 1980 and &apos;90s to a very low level now." />
                      <outline text="Wezeman said although 1.3 billion dollars a year is a lot of money, it is relatively small compared to the current cutbacks in U.S. military spending and the sequestration issue, which will have a much bigger effect on the U.S. arms industry." />
                      <outline text="(C) 2013 IPS North America" />
              </outline>

              <outline text="Russian anti-gay laws &apos;mustn&apos;t affect Sochi&apos;: Rogge">
                      <outline text="Link to Article" type="link" url="http://www.france24.com/en/20130818-russian-anti-gay-laws-mustnt-affect-sochi-rogge" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376832817_vCKbZSmU.html" />
        <outline text="Source: WT news feed" type="link" url="http://s3.amazonaws.com/radio2/w.tromp@xs4all.nl/linkblog.xml" />
      <outline text="Sun, 18 Aug 2013 13:33" />
                      <outline text="" />
                      <outline text="Jacques Rogge visits Sochi in June 2010. Rogge, the president of the International Olympic Committee (IOC), has insisted the 2014 Winter Games in Sochi must remain open to all despite the Russian government&apos;s controversial anti-gay laws." />
                      <outline text="Jacques Rogge (left) with Vladimir Putin in Sochi in February this year. &quot;The International Olympic Committee is aware that sport is a human right and must be accessible to all, regardless of ethnicity, gender or sexual orientation,&quot; the 71-year-old told Sunday&apos;s edition of German newspaper Tagesspiegel." />
                      <outline text="AFP - Jacques Rogge, the president of the International Olympic Committee (IOC), has insisted the 2014 Winter Games in Sochi must remain open to all despite the Russian government&apos;s controversial anti-gay laws." />
                      <outline text="&quot;The International Olympic Committee is aware that sport is a human right and must be accessible to all, regardless of ethnicity, gender or sexual orientation,&quot; the 71-year-old told Sunday&apos;s edition of German newspaper Tagesspiegel." />
                      <outline text="&quot;The Games themselves must be open to all, this applies to spectators, officials, journalists and, of course, the athletes.&quot;" />
                      <outline text="After 12 years in office, Rogge will be replaced as IOC president next month when elections are held at the 125th IOC Session in Buenos Aires, Argentina." />
                      <outline text="But the Belgian said there can be no place for discrimination at any Olympic Games." />
                      <outline text="&quot;The IOC will continue to work to ensure that the Games take place without discrimination,&quot; Rogge added." />
                      <outline text="&quot;We would oppose, with all our might, any movement that threatens this principle.&quot;" />
                      <outline text="In June, Russian president Vladimir Putin signed a law against &quot;gay propaganda&quot; which punishes the dissemination of information about homosexuality to minors." />
                      <outline text="Activists say the law can be used for a broad crackdown against gays and there are fears it could be used against participants at the Sochi Olympics." />
                      <outline text="It has sparked calls for a boycott in some quarters and Russian officials have said all athletes will have to obey the law at the Games." />
                      <outline text="But Rogge has said he has reassurances from &quot;the highest level&quot; that the Sochi games, which run from February 7-23, will take place without discrimination against homosexuals." />
                      <outline text="&quot;The IOC has commitments from the highest authorities in Russia that this legislation will not affect anyone who attends the Games or takes part in them,&quot; added Rogge." />
              </outline>

              <outline text="Gay Propaganda Ban in Russia">
                      <outline text="Link to Article" type="link" url="http://en.rian.ru/trend/gaypropaganda/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376832632_J3KT6zge.html" />
        <outline text="Source: RIA Novosti" type="link" url="http://en.rian.ru/export/rss2/index.xml" />
      <outline text="Sun, 18 Aug 2013 13:30" />
                      <outline text="" />
                      <outline text="Isinbayeva Claims She Was &apos;Misunderstood&apos; on Anti-Gay Comments15:08   16/08/2013  Russian pole vault great Yelena Isinbayeva on Friday claimed she &quot;may have been misunderstood&quot; over anti-gay remarks she made in defense of controversial legislation in her home country that forbids the promotion of homosexuality to minors." />
                      <outline text="Gay UK Choreographer Rejects Work in Russia, Slams &apos;Prejudice&apos;12:23   16/08/2013  A prominent British choreographer has rejected an invitation to work in Russia because of the Kremlin&apos;s stance on gay rights and what he called Russia&apos;s &apos;&apos;lethal legitimization of prejudice,&apos;&apos; according to an open letter published in a contemporary dance magazine this week." />
                      <outline text="Gay US TV Personality Skips on &apos;Miss Universe&apos; in Russia over Safety Fears00:33   16/08/2013  A gay United States talk show host and executive producer of the hit reality TV shows &apos;&apos;Real Housewives&apos;&apos; and &apos;&apos;Top Chef&apos;&apos; has turned down the post of co-host for the upcoming &apos;&apos;Miss Universe&apos;&apos; beauty pageant in Moscow, over fears he will be &apos;&apos;unsafe,&apos;&apos; an entertainment website has reported." />
                      <outline text="Senators Seek California Freeze on Russia Investment Over Gay Law21:57   12/08/2013  Three California state senators were set Monday to submit a resolution calling on the state&apos;s two largest public retirement plans to halt investment in Russia in protest at Russia&apos;s new law on homosexuality, a lawmaker and business media said." />
                      <outline text="US Lawmaker Calls for Olympic Gay Rainbow Flag Parade to &apos;Embarrass&apos; Putin21:37   12/08/2013  A week after senior US lawmaker Sen. Chuck Schumer called Russian President Vladimir Putin a &apos;&apos;schoolyard bully,&apos;&apos; on Monday he urged athletes marching in the opening ceremonies at the Winter Olympics in Sochi next year to wave the rainbow flag to show support for gay rights and embarrass the Russian leader." />
                      <outline text="Q&amp;A on Russia&apos;s Anti-Gay Law20:32   12/08/2013  The bill on &apos;&apos;propaganda of nontraditional sexual relations among minors&apos;&apos; was signed into law by President Vladimir Putin on July 29. Originally titled the bill on&apos;&apos;homosexual propaganda,&apos;&apos; the law criminalizes the public expression of support for &apos;&apos;nontraditional&apos;&apos; relationships." />
                      <outline text="Russia Confirms Anti-Gay Law Will Be Enforced at Olympics19:41   12/08/2013  Originally posted at 18:34Russia&apos;s Interior Ministry, which controls the police force, confirmed Monday that the country&apos;s controversial anti-gay law will be enforced during the Sochi 2014 Olympics." />
                      <outline text="Hurdles Champion Ed Moses Slams Calls for Sochi Boycott18:31   12/08/2013  Two-time Olympic 400-meter hurdles champion Edwin Moses on Monday slammed calls for the United States to boycott an Olympic Games in Russia for a second time." />
                      <outline text="Russian Ex-Deputy PM Questioned over &apos;Gay &amp; Oral Phobias&apos;09:34   10/08/2013  A former government official-turned-popular blogger reported Friday being questioned over a complaint by the lawmaker behind Russia&apos;s notorious anti-gay legislation." />
                      <outline text="Russia&apos;s Anti-Gay-Promotion Law Must Be Respected - IAAF President23:23   08/08/2013  IAAF president Lamine Diack said Thursday that Russia&apos;s controversial legislation banning the promotion of homosexuality to minors &quot;has to be respected&quot; but will have no impact on the upcoming world athletics championships in Moscow." />
                      <outline text="Moscow Dismisses Western Criticism of Gay Propaganda Law23:34   07/08/2013  A senior Russian Foreign Ministry official on Wednesday deflected Western criticism of the so-called anti-gay law, saying the recently adopted legislation did not violate the rights of sexual minorities in the country but was aimed at protecting minors." />
                      <outline text="Lady Gaga Fires Back at Russia in Twitter Rant19:46   06/08/2013  The American pop star known the world over as Lady Gaga is all but taunting Russian authorities in response to reports they may prosecute her for violating the terms of her visa by giving a performance in Russia last year." />
                      <outline text="Congressmen Ask Kerry to Ensure Gays Safe at Sochi19:53   05/08/2013  More than 80 members of Congress have called on US Secretary of State John Kerry to take steps to ensure the safety of gay American athletes, staff and spectators at the winter Olympic Games in Sochi, Russia next year, a US congressman said Monday ." />
                      <outline text="Russia Gay Laws Cheered by US Conservatives01:50   03/08/2013  Politics, it has been said, makes strange bedfellows. Now, as US gay rights groups protest against Russia&apos;s new laws on homosexuality, conservatives across America have quietly begun to align themselves with the Russian government in a rare union that defies a long history of animosity." />
                      <outline text="US Senator Condemns Russia&apos;s Gay Laws as Calls for Boycott Grow01:28   02/08/2013  The newest US senator on Capitol Hill took aim at the Russian government this week, condemning what he called the country&apos;s &apos;&apos;hateful&apos;&apos; new law on homosexuality, and asking Russia&apos;s Ambassador to the United States Sergey Kislyak for assurances that American athletes and tourists at the Sochi 2014 Winter Olympic Games will be safe." />
                      <outline text="Same-Sex Couple Demands Marriage Registration in Russian Court21:53   01/08/2013  A same-sex couple on Thursday asked a Moscow court to overturn as illegal a refusal by St. Petersburg authorities to register them as married, a court spokeswoman told the RAPSI legal news agency." />
                      <outline text="IOC Unmoved by Russian Minister&apos;s Comments on Anti-Gay Law20:00   01/08/2013  The International Olympic Committee told R-Sport on Thursday that it was unmoved by comments from a Russian minister that athletes at next year&apos;s Winter Olympics in Sochi would be subject to the country&apos;s law banning so-called gay propaganda." />
                      <outline text="Madonna, Lady Gaga Violated Russian Law &apos;&apos; Prosecutors19:37   01/08/2013  US pop divas Madonna and Lady Gaga, who championed gay rights during their shows in Russia, had cultural exchange visas that &apos;&apos;did not provide for&apos;&apos; performing for profit, Russian prosecutors said Thursday." />
                      <outline text="US Gay Activists Emboldened as Russian Vodka, Sochi Protests Spread01:17   31/07/2013  As boycotts of Russian vodka spread across the globe in protest over new Russian laws on homosexuality, US gay rights activists warn the campaign could be the first stage in a broader drive targeting Russia&apos;s economy and image with the Sochi Winter Olympics six months away." />
                      <outline text="Trendwatcher: Mizulina, Gay Activists &apos;&apos; And Fame01:03   30/07/2013  Weekly column by Natalia AntonovaIn Russia, it is illegal to insult a government official &apos;&apos; though this law doesn&apos;t make headlines very often." />
                      <outline text="Russian MPs Seek Probe Into Gay Activist&apos;s Twitter Remarks07:36   29/07/2013  Two Russian lawmakers requested prosecutors to launch a criminal case against a prominent Russian gay rights activist over his Twitter remarks, the Izvestia daily said on Monday." />
                      <outline text="US Visa Ban Sought for Russian Lawmakers &apos;Responsible&apos; for Anti-Gay Laws21:48   28/07/2013  Signatures are being gathered for a petition to the White House to impose US visa bans on two Russian lawmakers who, the plea says, were personally responsible for anti-gay legislation." />
                      <outline text="Amid Gay Boycott, Stolichnaya Downplays Russian Identity02:19   27/07/2013  It is perhaps the single best-known Russian brand. But as US gay groups call for boycott of Stolichnaya vodka to protest new Russian laws on homosexuality, the beverage&apos;s owner is racing to convince them that &apos;&apos;Stoli,&apos;&apos; as it is popularly known, is not Russian at all." />
                      <outline text="6 Gay-Rights Activists Briefly Detained Over Rally in Moscow19:53   24/07/2013  Originally published at 17:33Six gay-rights activists who were detained on Wednesday for holding an unauthorized rally in central Moscow have been released, police told RIA Novosti." />
                      <outline text="Russia Issues Travel Ban for Dutch Gay Propaganda Suspects21:33   23/07/2013  Russian migration authorities on Tuesday banned four Dutch nations from entering Russia for three years after the group was implicated in promoting homosexual relations among minors." />
                      <outline text="US City Mulls Breaking Up with Russian &apos;Sister City&apos; Over Anti-Gay Law01:09   23/07/2013  &apos;&apos;Sister city relations with St. Petersburg are listed as the first item on the agenda&apos;&apos; at a city council committee meeting Monday evening, city clerk Chris Swope told RIA Novosti by phone." />
                      <outline text="4 Dutch Citizens Suspected of Gay Propaganda Crime in Russia18:06   22/07/2013  Four Dutch citizens detained by police during a gay rights seminar outside the northern Russian city of Murmansk appeared in a local court Monday suspected of promoting homosexual relationships among minors, according to human rights activists and local media reports." />
                      <outline text="Russian Lawmaker to Create Defense From Gays Group15:21   09/07/2013  A Siberian regional lawmaker who has advocated the flogging of gay people in public said Tuesday that he intends to set up a group to protect Russians from homosexuals." />
                      <outline text="British Actress Flies LGBT Rainbow Flag at Kremlin21:59   05/07/2013  British actress Tilda Swinton raised a rainbow flag in front of the Kremlin to show solidarity with the LGBT community, media reports said Friday, citing her publicist." />
                      <outline text="Police Detain 4 Gay-Rights Activists in Central Moscow18:52   02/07/2013  Four gay-rights activists were detained on Tuesday afternoon for staging an unsanctioned rally in downtown Moscow, the city&apos;s police press service said." />
                      <outline text="Dozens Held at LGBT Rally in Russia&apos;s St.Petersburg17:52   29/06/2013  A sanctioned gay pride gathering in St. Petersburg on Saturday ended in the detention of demonstrators and violent scuffles between police and anti-gay campaigners." />
                      <outline text="Gay Activist Ordered to Pay Costs to Anti-Gay Lawmaker11:42   28/06/2013  A St. Petersburg court has ordered a gay rights activist to pay compensation to the lawmaker responsible for the city&apos;s controversial law banning &apos;&apos;gay propaganda.&apos;&apos;" />
                      <outline text="Gay Rights Not Violated in Russia &apos;&apos; Putin20:37   25/06/2013  Russian President Vladimir Putin reiterated on Tuesday that the rights of sexual minorities in Russia were not being violated in any way." />
                      <outline text="Russia to Push &apos;Anti-Gay&apos; Law Despite German Concerns - MP21:30   12/06/2013  Russia will not abandon plans to enact a law banning homosexual &quot;propaganda,&quot; despite concerns raised by the German chancellor, a senior Russian lawmaker said Wednesday." />
                      <outline text="Russian &apos;Anti-Gay&apos; Bill Passes With Overwhelming Majority20:17   11/06/2013  Russia&apos;s lower house of parliament on Tuesday gave its final approval for a controversial &apos;&apos;anti-gay&apos;&apos; bill, with only one of the 436 lawmakers present abstaining and no votes against, after a day of clashes outside the building and dozens of arrests by police." />
                      <outline text="Moscow Protest Over &apos;Anti-Gay&apos;, &apos;Religious Offense&apos; Bills Turns Violent17:01   11/06/2013  Protests outside the Russian parliament building turned violent on Tuesday as clashes broke out between activists for and against two proposed bills &apos;&apos; one restricting the &quot;promotion&quot; of homosexuality, the other &apos;&apos;to protect religious believers&apos; feelings.&apos;&apos;" />
                      <outline text="Elton John&apos;s Clothing &apos;Gay Propaganda,&apos; Communist Group Says19:46   06/06/2013  A Communist group in southern Russia wants openly gay British pop star Elton John to wear a traditional Cossack uniform at an upcoming concert because his usual flamboyant clothing is &apos;&apos;homosexual propaganda,&apos;&apos; the group&apos;s leader told RIA Novosti on Thursday." />
                      <outline text="EU Appeals to Russia Not to Introduce Gay Propaganda Law17:58   19/05/2013  The European Union appealed to Russia on Sunday not to introduce a law banning so-called &apos;&apos;gay propaganda,&apos;&apos; the EU said." />
                      <outline text="Moscow Authorities Refuse to Sanction LGBT &apos;Rainbow Rally&apos;15:44   17/05/2013  Moscow City Hall has refused a request by LGBT activists to hold a &apos;&apos;Rainbow Rally&apos;&apos; in Moscow&apos;s Gorky Park on May 25, citing last day of school festivities scheduled for the same day." />
                      <outline text="Gay Pride Event Organizers Appeal Ban in Court15:44   16/05/2013  The organizers of several planned gay pride events have appealed to a local court over Moscow City Hall&apos;s refusal to authorize their events, activists said in a press release published on the Gayrussia.eu website on Thursday." />
                      <outline text="Moscow Says No to May 25 Gay Pride Parade19:13   15/05/2013  The Moscow mayor&apos;s office has refused to authorize a gay pride parade planned for May 25, and will thwart any unsanctioned action, the city&apos;s top security official Alexei Mayorov said on Wednesday." />
                      <outline text="Gay Rights Not Violated in Russia - Putin01:13   09/04/2013  Russian President Vladimir Putin on Monday denied that the rights of gay people are being violated in Russia." />
                      <outline text="Ashton Concerned about Russia&apos;s &apos;Gay Propaganda&apos; Ban02:45   31/01/2013  EU foreign policy chief Catherine Ashton on Wednesday expressed her concern about a Russian bill making &apos;&apos;homosexual propaganda&apos;&apos; among minors an administrative offense." />
                      <outline text="Moscow Police Release Gay &apos;Propaganda&apos; Bill Protesters09:30   26/01/2013  All those detained during an unsanctioned rally over the &apos;&apos;gay propaganda&apos;&apos; bill have been released, Moscow&apos;s Interior Ministry confirmed on Saturday." />
                      <outline text="Duma Approves Gay &quot;Propaganda&quot; Bill20:43   25/01/2013  The State Duma, Russia&apos;s lower house of parliament, overwhelmingly approved in its first reading on Friday a vaguely defined bill that would ban the promotion of &apos;&apos;homosexual propaganda.&apos;&apos;" />
                      <outline text="As New Ban Looms, Gays in Russia Face Uphill Battle20:10   24/01/2013  Pavel Samburov exudes confidence when he recalls the night in October, on International Coming Out Day, when a group of masked hoodlums stormed and ransacked a Moscow gay club." />
                      <outline text="Activists Clash Over Gay Propaganda Bill Outside Parliament17:04   22/01/2013  Supporters and opponents of a proposed federal law banning gay propaganda clashed on Tuesday outside the State Duma, the lower chamber of the Russian parliament, a RIA Novosti correspondent reported from the scene." />
                      <outline text="Gay Activists Beaten During Picket in Southwest Russia15:25   20/01/2013  Updated 11:50Gay activists were beaten by an angry crowd during an authorized picket in the city of Voronezh in southwest Russia on Sunday." />
                      <outline text="Russian Pop Stars Chime in on &apos;Sodomite Propaganda&apos;21:24   20/12/2012  They are the people whom many Russians blame for &apos;&apos;gay propaganda,&apos;&apos; but at least they are not afraid to speak out on the issue." />
                      <outline text="Lady Gaga to Medvedev: &apos;&apos;Thank You!&apos;&apos;11:26   08/12/2012  American pop diva Lady Gaga expressed her gratitude to Russian Prime Minister Dmitry Medvedev for what she perceives to be his lack of support for legislation barring &apos;&apos;homosexual propaganda&apos;&apos; in Russia." />
                      <outline text="St. Petersburg &apos;Gay Propaganda&apos; Law Author Defiant after Milan Snub18:40   28/11/2012  The author of a controversial law banning &apos;&apos;homosexual propaganda&apos;&apos; in St. Petersburg sounded a defiant note on Wednesday after Milan suspended its sister city status with Russia&apos;s northern capital in protest at the controversial legislation." />
                      <outline text="Madonna &apos;Gay Propaganda&apos; Suit Thrown Out by Russian Court20:01   22/11/2012  US pop star Madonna did not break city laws on the promotion of a homosexual lifestyle among minors during a concert in St. Petersburg earlier this year, a court ruled on Thursday." />
                      <outline text="Madonna &apos;Gay Propaganda&apos; Lawsuits Go to Court15:20   11/10/2012  MOSCOW, October 11 (RIA Novosti)A St. Petersburg city court will hold a preliminary hearing on Thursday into multi-million-dollar lawsuits against US pop diva Madonna and the organizers of her recent St. Petersburg concert over an alleged violation of the city&apos;s law against &quot;gay propaganda.&quot;" />
                      <outline text="Supreme Court Rejects Complaint on Gay Propaganda15:39   03/10/2012  MOSCOW, October 3 (RIA Novosti)Russia&apos;s Supreme Court on Wednesday rejected a complaint from a human rights organization over St. Petersburg&apos;s controversial law prohibiting propaganda of homosexuality among minors." />
                      <outline text="Russian Supreme Court Defines &apos;Gay Propaganda&apos;19:27   13/09/2012  MOSCOW, September 13 (RIA Novosti)Russia&apos;s Supreme Court upheld a controversial regional ban on &apos;&apos;gay propaganda,&apos;&apos; but said it only covers the direct promotion of homosexual relations among minors, LGBT activists said on Thursday." />
                      <outline text="Gay Propaganda Lawsuit Against Madonna Advances18:33   13/09/2012  ST. PETERSBURG, September 13 (RIA Novosti)A group of Russian activists resubmitted on Thursday lawsuits against U.S. pop diva Madonna and organizers of her St. Petersburg concert seeking $10.5 million in compensation for &apos;&apos;moral damages,&apos;&apos; a lawyer for the plaintiffs, Alexander Pochuyev, told RIA Novosti." />
                      <outline text="Madonna Breaks &apos;Gay Propaganda&apos; Law - St. Petersburg Lawmaker19:54   10/08/2012  MOSCOW, August 10 (RIA Novosti)A city councilor in St. Petersburg has accused U.S. pop star Madonna of violating a controversial local law banning &quot;homosexual propaganda&quot; during her concert there." />
                      <outline text="St. Petersburg Gay Activists Appeal to Strasbourg Court18:38   14/07/2012  MOSCOW, July 14 (RIA Novosti)An organization of St. Petersburg gay rights activists has filed a complaint against the city&apos;s authorities with the European Court of Human Rights in Strasbourg, local media reported on Saturday." />
                      <outline text="St. Petersburg Gays to Rally despite Ban16:17   06/07/2012  ST. PETERSBURG, July 6 (RIA Novosti)The St. Petersburg gay and transsexual community will stage a parade despite the city council&apos;s ban on the event, organizer Yury Gavrikov said on Friday." />
                      <outline text="LGBT Rally Approved by St. Petersburg Authorities20:40   04/07/2012  ST. PETERSBURG, July 4 (RIA Novosti)St. Petersburg authorities have approved for the first time an event in support of civil rights for Russia&apos;s gay and transsexual community, an organizer said on Wednesday." />
                      <outline text="Russian Lawmaker Threatens &apos;Harsh Laws&apos; if Madonna Strips14:56   04/07/2012  MOSCOW, July 4 (RIA Novosti)A Russian lawmaker who authored a controversial law banning &quot;homosexual propaganda&quot; has threatened to fine U.S. pop star Madonna if she undresses at her upcoming performance in St. Petersburg, the tabloid Moskovsky Komsomolets reported." />
                      <outline text="St. Pete Police to Look for Gay Propaganda in Recent Campaign18:41   23/05/2012  ST. PETERSBURG, May 23 (RIA Novosti)St. Petersburg police on Wednesday said they will investigate whether the actions of the recent sanctioned gay parade in one of the city parks involved elements of gay propaganda." />
                      <outline text="Attack on Gays in St. Petersburg Spreads to Migrant Workers14:39   18/05/2012  MOSCOW, May 18 (RIA Novosti)Several dozen masked individuals attacked the first sanctioned gay demonstration in St. Petersburg and vented their anger on migrant workers after police drove the gays from the scene, Fontanka.ru said." />
                      <outline text="Masked Individuals Hurl Stones at Buses After Gay-Rights Rally in St. Petersburg13:04   18/05/2012  A group of unknown masked individuals hurled rocks at buses at a gay-rights rally in St. Petersburg, dedicated to the International Day Against Homophobia." />
                      <outline text="Half of Russians Believe Media Makes People Gay &apos;&apos; Poll17:24   17/05/2012  MOSCOW, May 17 (RIA Novosti)Almost half of Russians believe homosexuality is a human behavior acquired under the influence of the media, according to a poll taken by state-run pollster VTsIOM earlier this month." />
                      <outline text="First &apos;Gay Propaganda&apos; Fine Handed out in St. Petersburg13:53   04/05/2012  ST. PETERSBURG, May 4 (RIA Novosti)Russia&apos;s most vocal gay rights campaigner has become the first person to be fined under a new law banning homosexual &quot;propaganda&quot; in St. Petersburg, the country&apos;s second city." />
                      <outline text="Church Activists Picket Gay Film Festival12:19   27/04/2012  MOSCOW, April 27 (RIA Novosti)Activists from a fundamentalists Russian Orthodox organization held a protest before the opening ceremony of an international gay and lesbian film festival in Moscow, the Ridus information agency reported on Thursday." />
                      <outline text="Gay Teen Put into Rehab After Coming Out15:11   25/04/2012  MOSCOW, April 25 (RIA Novosti, Alexey Eremenko)In a coming-out story to discourage many adolescent Russians from leaving the closet, a gay teenager in the Moscow region was put away in a drug clinic by his irate traditionalist father." />
                      <outline text="Activists Set Date for Gay Pride Parade18:53   24/04/2012  MOSCOW, 24 April (RIA Novosti)Gay activists plan to hold a gay pride parade in Moscow on May 27, where the main theme of the event will be bans on &quot;gay propaganda&quot; in Russia, the leader of the Russian LGBT movement, Nikolai Alekseyev, said." />
                      <outline text="Rights Activists Protest &apos;Gay Propaganda&apos; Law18:55   23/04/2012  MOSCOW, April 23 (RIA Novosti)Gay rights activists protested at the Moscow City Duma on Monday afternoon against a law banning &quot;gay propaganda&quot; among minors that could be imposed by the Moscow authorities." />
                      <outline text="Majority of Russians Oppose &apos;Gay Propaganda&apos;18:35   19/04/2012  MOSCOW, April 19 (RIA Novosti)Most Russians have never faced &apos;&apos;gay propaganda&apos;&apos; but still support a ban on it, according to a poll published on Thursday." />
                      <outline text="Russian Gay Rights Leader Detained in St. Petersburg18:13   12/04/2012  MOSCOW, April 12 (RIA Novosti)A leader of the Russian LGBT movement, Nikolai Alekseyev, has been detained in a one-man picket in St. Petersburg protesting against a new local law that bans &quot;gay propaganda&quot; among minors, GayRussia.ru website reported on Thursday." />
                      <outline text="Gay Rights Activists Detained for &apos;Gay Propaganda&apos; Released18:43   07/04/2012  ST. PETERSBURG, April 7 (RIA Novosti)Two gay rights activists detained by police on Saturday for picketing against the law that bans &quot;gay propaganda&quot; among minors have been released after police compiled a report of administrative offence, a representative of St. Petersburg&apos;s LGBT group said." />
                      <outline text="Gay Rights Activists Arrested Under New St. Pete Law14:54   06/04/2012  ST. PETERSBURG, April 6 (RIA Novosti)Police in St. Petersburg arrested two gay rights activists on Thursday for violating a new local law that bans &quot;gay propaganda&quot; among minors, police said." />
                      <outline text="Gay Propaganda Bill Challenged in Court21:11   02/04/2012  ST. PETERSBURG, April 2 (RIA Novosti)Gay rights activists on Monday asked a court to strike down a controversial bill passed by St. Petersburg legislature and prohibiting &apos;&apos;propaganda&apos;&apos; of homosexuality and pedophilia among minors." />
                      <outline text="Russia to Consider Nationwide &apos;Gay Propaganda&apos; Ban16:02   29/03/2012  MOSCOW, March 29 (RIA Novosti)A Siberian regional legislature submitted to the Russian parliament a bill to make promotion of homosexuality among minors an administrative offense, the State Duma said on its website on Thursday." />
                      <outline text="Madonna to Support Russia&apos;s Gays at St. Petersburg Show12:26   22/03/2012  MOSCOW, March 22 (RIA Novosti)Madonna will &quot;speak up&quot; at her upcoming St. Petersburg show in support of Russia&apos;s gay community, following a ban on gay propaganda imposed by the city authorities." />
                      <outline text="Gay Activists Seek Travel Ban for Propaganda Law Backers16:53   19/03/2012  ST. PETERSBURG, March 19 (RIA Novosti)Gay rights activists in St. Petersburg have sent letters to governments of U.S., EU, Australia and Canada asking them to ban entry for city officials behind the controversial gay propaganda ban." />
                      <outline text="Canada Warns St. Petersburg Gay Travellers11:23   17/03/2012  MOSCOW, March 17 (RIA Novosti)Canada&apos;s foreign ministry has warned gay travellers to &quot;tread carefully&quot; in St. Petersburg as the city&apos;s law banning homosexual &quot;propaganda&quot; comes into force, the National Post newspaper reports." />
                      <outline text="Sochi Court Denies Registration to Gay Group21:30   14/03/2012  MOSCOW, March 14 (RIA Novosti)A Sochi appeals court has upheld a lower court ruling denying registration to Pride House, a local gay movement, saying it constitutes a threat to Russia&apos;s sovereignty, the Yugopolis news portal said on Wednesday." />
                      <outline text="Church Official Urges Nationwide &apos;Gay Propaganda&apos; Law16:34   12/03/2012  MOSCOW, March 12 (Alexei Korolyov, RIA Novosti)A new law in Russia&apos;s second city, St. Petersburg, that imposes fines for spreading &quot;gay propaganda&quot; among minors should be implemented nationwide, an Orthodox Church official said on Monday, a day after the legislation was signed by the city&apos;s governor." />
                      <outline text="&apos;Gay Propaganda&apos; Ban Comes into Force in St Petersburg18:32   11/03/2012  ST. PETERSBURG, March 11 (RIA Novosti)St. Petersburg&apos;s Governor Georgy Poltavchenko on Sunday signed off a law penalizing &quot;the propaganda of homosexuality and pedophilia among minors.&quot;" />
                      <outline text="St. Petersburg Approves Fines for &apos;Gay Promotion&apos;17:18   08/02/2012  MOSCOW, February 8 (RIA Novosti)St. Petersburg&apos;s city legislature approved on Wednesday a bill imposing fines up to $16,700 for the promotion of homosexuality." />
                      <outline text="Russia Lawmakers Back Fines for &apos;Gay Promotion&apos;18:07   02/02/2012  MOSCOW, February 2 (Alexei Korolyov, RIA Novosti)The city legislature in the central Russian town of Kostroma approved a bill on Thursday which would see fines for the promotion of homosexuality." />
                      <outline text="Gays Detained After Unsanctioned Rally on Red Square10:40   20/01/2012  MOSCOW, January 20 (RIA Novosti)Three people who took part in an unsanctioned gay rally on Moscow&apos;s Red Square were detained on Thursday night, police said." />
                      <outline text="Protests over Russian &apos;gay propaganda&apos; bill18:22   26/12/2011  MOSCOW, December 26 (RIA Novosti, Alexei Korolyov)Gay rights activists staged protests in the central Russian city of Kostroma on Monday against plans to impose fines for the promotion of homosexuality." />
                      <outline text="Russian gays plead for letup in Kremlin crackdown16:04   02/12/2011  MOSCOW, December 2 (RIA Novosti)Russia&apos;s LGBT community on Friday called for an end to what they see as an ongoing crackdown spearheaded by the ruling United Russia party." />
                      <outline text="Moscow mayor pledges no gay pride parades on his watch23:27   24/11/2011  MOSCOW, November 24 (RIA Novosti)Moscow Mayor Sergei Sobyanin reiterated on Thursday his opposition to the holding of gay pride events in the Russian capital." />
                      <outline text="St.Petersburg gay bill violates minorities&apos; rights - U.S.05:56   24/11/2011  WASHINGTON, November 24 (RIA Novosti)The United States is concerned about a bill by St. Petersburg&apos;s city legislature imposing fines for the promotion of homosexuality, a Department of State spokeswoman said." />
                      <outline text="St. Petersburg lawmakers shelve gay &apos;propaganda&apos; bill vote15:20   23/11/2011  MOSCOW, November 23 (RIA Novosti, Alexei Korolyov)St. Petersburg&apos;s city legislature has postponed debate on a bill imposing fines for the promotion of homosexuality after lawmakers failed to agree on its &apos;&apos;legal definitions.&apos;&apos;" />
                      <outline text="Russia&apos;s gays under attack as MPs back fines for &apos;gay promotion&apos;17:07   18/11/2011  RIA Novosti correspondent Alexei KorolyovRussia&apos;s gay rights activists have come under intense fire after the city legislature in St. Petersburg approved a bill to impose fines for the &quot;promotion&quot; of homosexuality." />
                      <outline text="Police detain 40 gay parade opponents in downtown Moscow18:41   01/10/2011  MOSCOW, October 1 (RIA Novosti)About 40 gay parade opponents were detained during an authorized gay rally on Saturday in downtown Moscow, the city&apos;s police said." />
                      <outline text="EU Council &apos;regrets&apos; Moscow&apos;s gay parade clashes21:12   30/05/2011  The Secretary General of the Council of Europe, Thorbjorn Jagland expressed regret on Monday over the crackdown on gay activists during an unsanctioned parade in Moscow at the weekend." />
                      <outline text="France urges Moscow to respect human rights after gay parade ban17:18   30/05/2011  The French Foreign Ministry called on Russia on Monday to respect the right to freedom of expression and assembly, two days after gay activists were dispersed in the center of Moscow." />
                      <outline text="Over 30 gay parade supporters, opponents arrested in central Moscow20:37   28/05/2011  Over 30 gay parade supporters and opponents were arrested on Saturday, the city&apos;s police representative said." />
                      <outline text="Amnesty International urges Moscow to permit gay parade14:36   19/05/2011  Amnesty International is urging authorities in Moscow to reverse their decision to ban a gay parade." />
                      <outline text="Moscow bans gay parade21:06   17/05/2011  Moscow&apos;s city government has officially rejected an application to hold a gay pride parade, the mayor&apos;s press service said on Tuesday." />
                      <outline text="Moscow allows first ever gay parade16:04   26/04/2011  The Moscow city authorities gave official permission on Tuesday to hold the first ever gay pride march in the capital, in an important victory for the country&apos;s gay community, the parade&apos;s organizer said." />
                      <outline text="No gay parades in Moscow - Mayor Sobyanin19:54   16/02/2011  Moscow Mayor Sergei Sobyanin said on Wednesday that gay parades in Moscow are inadmissible, ruining hopes of the Russian gay community for holding sanctioned sexual minority events." />
              </outline>

              <outline text="&apos;PRINCESS DIANA MURDERED BY SPECIAL AIR SERVICES&apos; - REPORT">
                      <outline text="Link to Article" type="link" url="http://aangirfan.blogspot.com/2013/08/princess-diana-murdered-by-special-air.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376832169_KxKEp5Aa.html" />
        <outline text="Source: aangirfan" type="link" url="http://aangirfan.blogspot.com/feeds/posts/default?alt=rss" />
      <outline text="Sun, 18 Aug 2013 13:22" />
                      <outline text="" />
                      <outline text="The Sunday People reports that UK police are investigating the claim that Princess Diana was murdered by the SAS, the UK military&apos;s special forces regiment." />
                      <outline text="&quot;The allegation emerged at the second court martial of Sergeant Danny Nightingale, who was found guilty of illegally possessing a gun and ammunition.&quot;Princess Diana: Police probe sensational claim she was killed by SAS" />
                      <outline text="The allegation came in a letter to the SAS&apos;s commanding officer." />
                      <outline text="The letter is from the parents-in-law of a special forces sniper, Soldier N.Soldier N. was Sgt Nightingale&apos;s former housemate and a key witness for the prosecution.The letter says Solider N boasted the SAS &apos;was behind Princess Diana&apos;s death&apos;." />
                      <outline text="The UK authorities have known about the allegation since the letter was sent in September 2011." />
                      <outline text="The SAS passed the letter to the Service Prosecuting Authority prior to the start of the Sgt Nightingale trial." />
                      <outline text="The Service Prosecuting Authority removed all references to the SAS before it released the letter to the court.The letter says: " />
                      <outline text="&quot;He (Soldier N) also told her (his wife) that it was the XXX who arranged Princess Diana&apos;s death and that has been covered up.&quot;It was a tip-off from Soldier N&apos;s estranged wife that led to a Glock 17 pistol being found in Nightingale&apos;s room at a Hereford house the SAS colleagues shared." />
                      <outline text=" mirror.co.uk/news/uk-news/princess-diana-death-cops-probe" />
                      <outline text="Soldier N." />
                      <outline text="&quot;The sergeant is the subject of a new inquiry into &apos;&apos;historic&apos;&apos; claims of abuses by British soldiers. " />
                      <outline text="&quot;The case is the first murder inquiry involving a member of the special forces to form part of the wider Iraq Historical Allegations Team (Ihat) inquiry.&quot;The sergeant, a trained sniper known only as Soldier N, was the key prosecution witness in the court martial of Sgt Danny Nightingale, the SAS sniper found guilty last week of illegally possessing a Glock pistol and ammunition in his civilian quarters.&quot;" />
                      <outline text="SAS sniper in inquiry over Iraq &apos;murder&apos; - Telegraph" />
                      <outline text="Britain&apos;s SAS (Special Air Services)trained the Khmer Rouge.The British Special Air Services (SAS) firm Keenie Meenie Services reportedly trained the Tamil Tigers." />
                      <outline text="In the early 1970s Rafael Eitan, head of the Mossad hit-squad known as the &apos;Kidon&apos;, toured Northern Ireland and the Special Air Services (SAS) base in Hereford, England.Shortly after his visit there were big changes in UK security policy, including the setting up of what was to become the Force Reconnaissance Unit (FRU) ." />
                      <outline text="The FRU may have been involved in the de Menezes killing." />
                      <outline text="aangirfan: IRA RUN BY THE SPOOKS" />
              </outline>

              <outline text="AL_ZAWAHIRI ARRESTED IN EGYPT">
                      <outline text="Link to Article" type="link" url="http://aangirfan.blogspot.com/2013/08/alzawahiri-arrested-in-egypt.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376832142_GaQjzKWr.html" />
        <outline text="Source: aangirfan" type="link" url="http://aangirfan.blogspot.com/feeds/posts/default?alt=rss" />
      <outline text="Sun, 18 Aug 2013 13:22" />
                      <outline text="" />
                      <outline text="On 17 August 2013, the Egyptian authorities arrested Mohammed al-Zawahiri, the brother of al-Qaida&apos;s chief Ayman al-Zawahri.Ayman al-Zawahiri, who works for the US government, and who was granted US residence.Mohammed al-Zawahiri, leader of the Jihadi Salafist group, was detained at a checkpoint in Giza, across the Nile from Cairo.Mohammed al-Zawahiri&apos;s group is allied with Mohammed Morsi and the Muslim Brotherhood." />
                      <outline text="The authorities say that that Mohammed al-Zawahiri has commanded terrorists in the Sinai Peninsula." />
              </outline>

              <outline text="New Software Forces You to Pay Attention During Company Training">
                      <outline text="Link to Article" type="link" url="http://www.cryptogon.com/?p=36523" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376831416_qMawUBA8.html" />
        <outline text="Source: cryptogon.com" type="link" url="http://www.cryptogon.com/?feed=rss2" />
      <outline text="Sun, 18 Aug 2013 13:10" />
                      <outline text="" />
                      <outline text="August 18th, 2013 Attending to multiple streams of information and entertainment while studying, doing homework, or even sitting in class has become common behavior among young people&apos;--so common that many of them rarely write a paper or complete a problem set any other way." />
                      <outline text="&apos;--Students can&apos;t resist multitasking, and it&apos;s impairing their memory" />
                      <outline text="And now&apos;..." />
                      <outline text="Via: Bloomberg:" />
                      <outline text="Online training technology company Mindflash on Tuesday announced a new feature called FocusAssist for iPad that uses the tablet&apos;s camera to track a user&apos;s eye movements. When it senses that you&apos;ve been looking away for more than a few seconds (because you were sending e-mails, or just fell asleep), it pauses the course, forcing you to pay attention&apos;--or at least look like you are&apos;--in order to complete it." />
                      <outline text="Sound kind of creepy, even Big Brother-y? Mindflash doesn&apos;t think so. Donna Wells, the company&apos;s chief executive officer, writes in an e-mail: &apos;&apos;Our focus is making sure trainees get all the information they need to do their jobs well, not penalizing learners.&apos;&apos; Trainers do not receive any reporting on individual users&apos; attention spans, but they are supplied with information on which content isn&apos;t engaging trainees." />
                      <outline text="Leave a ReplyYou must be logged in to post a comment." />
              </outline>

              <outline text="Gracenote | Company Overview">
                      <outline text="Link to Article" type="link" url="http://www.gracenote.com/company/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376831334_twBHtHXE.html" />
      <outline text="Sun, 18 Aug 2013 13:08" />
                      <outline text="" />
                      <outline text="Gracenote By the NumbersGracenote touches hundreds of millions of music fans and TV viewers everyday. Gracenote is the industry standard for music and video recognition and is supported by the largest source of music and video metadata on the planet, featuring descriptions of more than 130 million tracks and TV listings for 28 countries. The database receives more than 500 million queries everyday and more than 15 billion every month. If you measured Gracenote against a search engine, we would rank among the world&apos;s biggest." />
                      <outline text="With more than 350 employees and growing, Gracenote has offices in Tokyo, Munich, Berlin, Seoul and Taipei with worldwide headquarters in Emeryville, Calif." />
                      <outline text="How Do You Connect?When you connect your smart phone or USB in a car, Gracenote makes finding your favorite music easy with Album Cover Art and enhanced voice recognition. When you are playing music on your iPhone, Gracenote helps power song recommendations. And when you are sitting on your couch, Gracenote TV listings and smart recommendations show you what&apos;s on tonight, and help you discover new programs to watch." />
                      <outline text="A Division of Sony Corp. of AmericaGracenote is a wholly owned, independent subsidiary of the Sony Corporation of America (SCA). In &apos;&apos;non-legal&apos;&apos; speak this means we are owned by Sony, but operate as an independent company." />
                      <outline text="We work closely with other Sony companies, including Sony Electronics, Sony Pictures Entertainment and Sony Entertainment Network. We are featured in millions of Sony products. However, we also have the flexibility to work other entertainment leaders, including Apple, Google, Amazon and Ford." />
                      <outline text="Customer and Partner ResourcesGracenote has a number of resources available for customers, developers and even consumers. If you have a question about iTunes, Ford Sync or other Gracenote powered consumer products and services, check our Support page. If you are a Gracenote customer looking for the latest SDK or documentation, visit our Customer Dev Zone. If you are an App developer looking for access to an API or Gracenote Hacks, check out our Gracenote Developer portal." />
              </outline>

              <outline text="Gracenote, music publishers in lyrics deal - Computerworld">
                      <outline text="Link to Article" type="link" url="http://m.computerworld.com/s/article/9001803/Gracenote_music_publishers_in_lyrics_deal" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376831146_WwYtWBFj.html" />
      <outline text="Sun, 18 Aug 2013 13:05" />
                      <outline text="" />
                      <outline text="News" />
                      <outline text="By Sue Zeidler" />
                      <outline text="July 14, 2006 12:00 PM ET" />
                      <outline text="Reuters - U.S. digital entertainment company Gracenote on Thursday said it obtained licenses to distribute lyrics as music publishers mulled legal action against Web sites that provide them without authorization." />
                      <outline text="&quot;When we first approached the publishers with this, they were excited. They thought lyrics had been an untapped resource for them and there&apos;s quite a bit of lyrics being taken for free on the Web,&quot; Ross Blanchard, Gracenote&apos;s vice president of business development, told Reuters in an interview." />
                      <outline text="Gracenote obtained the rights to the lyrics of more than 1 million songs from the North American catalogs of Bertelsmann AG&apos;s BMG Music Publishing, Vivendi&apos;s Universal Music Publishing Group, Sony/ATV Music Publishing, jointly owned by Sony Corp and Michael Jackson, peermusic and other publishers." />
                      <outline text="Gracenote also said it was talking with all of its partners, including Yahoo Inc. and Apple Computer Inc&apos;s iTunes, on its plans to launch a service to offer legal and accurate lyrics for all digital media." />
                      <outline text="The service, to be initially available in North America, would be the first industry-backed move to providing lyrics legally, Gracenote said." />
                      <outline text="Until now, consumers&apos; access to song lyrics has been largely through unauthorized sources, which usually provide inaccurate content, the company said." />
                      <outline text="Publishing industry officials cited Web sites such as lyrics.com and azlyrics.com among those who provide their catalogs&apos; lyrics without their authorization. These sites could not be reached for comment." />
                      <outline text="&quot;This license creates a new revenue stream which will guarantee that songwriters are paid for their work,&quot; said Nicholas Firth, chairman and chief executive officer of BMG Music Publishing." />
                      <outline text="Ralph Peer II, Firth&apos;s counterpart at peermusic, said licensing lyrics should boost worldwide music publishing revenues, estimated at about $4 billion annually. Peer said he hopes the unauthorized sites will seek licenses." />
                      <outline text="&quot;I think we&apos;ll see a reasonable increase, as much as a 5 percent increase, in industry music publishing revenues five years out from where we are right now,&quot; Peer said." />
                      <outline text="&quot;Clearly, there are copyright issues involving these unlicensed sites, which are making good income through advertising and other sources, while the composers are not getting their due,&quot; he said." />
                      <outline text="Gracenote&apos;s Blanchard said it was up to digital music retailers to decide how they will package or price the lyrics, but he did not expect it would involve significant added costs to consumers." />
                      <outline text="&quot;We anticipate that you&apos;ll see different kinds of offers in the market, where lyrics are combined with recorded music in a total package like a subscription. This extra element should help drive sales growth. There are a lot of ways the services will derive value outside of adding an extra charge,&quot; he said." />
              </outline>

              <outline text="Gmail Overhaul Has Marketers Saying &apos;Ack&apos;">
                      <outline text="Link to Article" type="link" url="http://online.wsj.com/article/SB10001424127887323455104579015021688974880?mg=reno64-wsj.html?dsk=y" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376830881_MtJBD4mj.html" />
      <outline text="Sun, 18 Aug 2013 13:01" />
                      <outline text="" />
                      <outline text="Agence France-Presse/Getty ImagesFor some retailers that rely on emailed promotions, Google Inc. is adding insult to injury." />
                      <outline text="When the search giant overhauled its free email service three months ago, it set up algorithms to automatically siphon the flow of airfare offers and spa deals away from users&apos; main inboxes and into an easily bypassed &quot;Promotions&quot; folder." />
                      <outline text="But there is another wrinkle: For Gmail users that do visit those Promotions folders, the first items they see will often be ads sold by Google." />
                      <outline text="Gmail&apos;s overhaul that files emails into special folders streamlines your inbox but has frustrated companies offering deals to customers. WSJ&apos;s Drew FitzGerald explains on digits. Photo: Google." />
                      <outline text="The ads are different from those that already appear inside users&apos; opened messages. Instead, they look like emails sitting in an inbox but are shaded yellow and feature informational &quot;i&quot; icons explaining their purpose. Marketers still complain that the ads threaten to draw attention away from the coupons and pitch emails they want their targets to read first." />
                      <outline text="&quot;People are not very amused by those,&quot; said Tom Monaghan, product manager for the email service at marketing service HubSpot Inc." />
                      <outline text="Google shows no more than two inbox ads per user, spokeswoman Andrea Freund said. Some users&apos; inboxes showed no ads after Google tightened its &quot;quality thresholds&quot; for targeting the messages." />
                      <outline text="&quot;Our goal was to put them someplace that was more relevant, and we thought that was the promotions tab,&quot; she said. &quot;When you&apos;re looking at promotions, you&apos;re looking for deals,&quot; she added. &quot;We do try to clearly label them as ads.&quot;" />
                      <outline text="Special DeliveryUnique visitors to top U.S. email services in June (desktop and mobile)" />
                      <outline text="Google Gmail: 100 millionYahoo Mail: 88.8 millionOutlook.com: 32.5 millionAOL Email: 20.4 millionSource: comScore Inc. *Figures exclude corporate and government domain names, non-Web email &apos;clients&apos; such as Outlook for Microsoft Windows and Mail for Apple iOS." />
                      <outline text="If past software updates are any indication, Google will likely tread carefully as it introduces the new inbox ads, according to Ben Chestnut, chief executive of email marketing service MailChimp. Too many ads could alienate users, he said." />
                      <outline text="The ads are compounding the concern over the changes to Gmail, which has more than 425 million active users worldwide. Though Gmail users can&apos;t see the changes when accessing their messages on iPhones, Google&apos;s Web mail application is widely used on desktops. Ms. Freund said more than half of all users have the updated Gmail layout, which the company has been gradually rolling out since May." />
                      <outline text="Prolific emailers like Delta Air Lines Inc., Gap Inc., Gilt Groupe Inc. and Groupon Inc. have sent step-by-step instructions to their mailing lists on how to move messages out of the Promotions tab and back to Gmail&apos;s &quot;Primary&quot; folder." />
                      <outline text="Marketers fear the new system could spread and put an unwanted kink in a tried-and-true method of driving sales, not to mention business models that rely on emailed coupons." />
                      <outline text="&quot;We think other email providers will be adopting this as well,&quot; LivingSocial Chief Marketing Officer Barry Judge said of the new categorization system. &quot;We don&apos;t know when and we don&apos;t know who, but we think they will.&quot;" />
                      <outline text="The reason for the instructions is simple, Mr. Judge said: &quot;We clearly just want users to see our emails.&quot;" />
                      <outline text="&quot;Let&apos;s stay together,&quot; apparel retailer Kate Spade Saturday pleaded in an email to its newsletter subscribers. Gmail&apos;s &quot;new inbox settings may have started filing away your Saturday.com emails into the depths of something called a &apos;Promotions&apos; tab.&quot;" />
                      <outline text="&quot;Ack,&quot; it added." />
                      <outline text="Google redesigned its service to help users manage email overload, Ms. Freund said. Users can reroute emails they want to land in their regular inbox with a simple drag-and-drop, or by going back to the old layout altogether." />
                      <outline text="The shift appears to have made a noticeable but small impact on the rate at which recipients open marketers&apos; pitches. MailChimp last month found the percentage of emails that were opened by its 3 million customers fell by about 1 percentage point for Gmail, to between 12% and 13%." />
                      <outline text="Analysis from HubSpot showed the percentage of Gmail users who opened clients&apos; emails slid slightly over the summer, though activity spiked during the weekends. Open rates have declined at the same slow rate since April, suggesting user engagement is suffering from too many emails rather than Gmail." />
                      <outline text="&quot;There&apos;s a little bit of Chicken Little happening right now over this,&quot; Mr. Monaghan said." />
                      <outline text="Gilt, an online service that alerts members to deals on luxury goods, said it hasn&apos;t had any problems with Gmail&apos;s new layout. &quot;Having said that, we think the best thing to do is to educate our members,&quot; said Elizabeth Francis, the company&apos;s chief marketing officer." />
                      <outline text="Groupon Chief Executive Eric Lefkofsky last week said the changes had no &quot;material&quot; impact on his business, because the daily-deals service has shifted away from emailed pitches to offering deals on its website. But just in case, the company sent a batch of emails to subscribers later that week explaining how to move its messages from &quot;promotions&quot; to &quot;primary.&quot;" />
                      <outline text="Gap and Banana Republic sent emails about the new inbox because customers &quot;value personalized and relevant emails,&quot; spokeswoman Edie Kissko said." />
                      <outline text="Write to Drew FitzGerald at andrew.fitzgerald@dowjones.com" />
                      <outline text="A version of this article appeared August 16, 2013, on page B5 in the U.S. edition of The Wall Street Journal, with the headline: With Gmail Overhaul, Not All Mail Is Equal." />
              </outline>

              <outline text="Keep Calm &amp; Send Email: Industry Experts Offer Hopeful Outlook On The New Gmail Inbox Tabs">
                      <outline text="Link to Article" type="link" url="http://marketingland.com/still-too-early-to-throw-in-the-towel-email-marketing-experts-offer-insight-on-the-new-gmail-inbox-tabs-54435" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376830546_HLdq7JW7.html" />
      <outline text="Sun, 18 Aug 2013 12:55" />
                      <outline text="" />
                      <outline text="On May 29, Google began rolling out a newly designed Gmail inbox that includes five separate tabs to group emails. After the announcement on Google&apos;s official Gmail blog, users began seeing their emails sorted into three tabs &apos;&apos; Primary, Social and Promotions &apos;&apos; with the two additional tabs, Updates and Forums, available from the Configure inbox settings." />
                      <outline text="According to Google, the new inbox organizes emails in a way that lets users, &apos;&apos;&apos;...see what&apos;s new at a glance and decide which emails you want to read when.&apos;&apos;" />
                      <outline text="The new Gmail tabs sent a shock wave through the email marketing community. Would email marketing, still one of the most popular marketing channels, cease to be effective with Gmail users once Google began organizing their emails for them?" />
                      <outline text="While the initial panic immediately following the announcement has calmed, Google&apos;s Gmail tabs still has many marketers wondering how much traction they can gain when their email messages are being automatically categorized under the Promotions tab." />
                      <outline text="Quick Overview of the New Gmail TabsThe desktop version, as well as the Android and iOS apps all include the new tabs, with personal emails going to the Primary tab, while social emails are sent to the Social tab (messages from social networks, media-sharing sites, online dating services, gaming platforms and other social sites). Promotional emails such as deals, offers, and, most any mass email sent from an email service provider are delivered to the Promotions tab." />
                      <outline text="While the Primary, Social and Promotions tabs are automatically launched in Gmail inboxes, users may choose to add the Updates and Forums tabs from the Configure inbox settings link. The Updates tab includes notifications such as confirmation emails, receipts, bills and statements; messages from online groups, discussion boards and mailing lists are sent to the Forums tab." />
                      <outline text="The Android 4.0 and iOS Gmail apps show the Primary inbox when the app is opened, with easy navigation to accompanying tabs." />
                      <outline text="Google notes that if a tab is not used, emails that would be categorized within that tab are sent to the Primary tab. Users are also given the opportunity to disable the tabs and revert to the classic inbox view, with all emails going to one list." />
                      <outline text="How Will Gmail Tabs Impact Your Email MarketingWhile many industry insiders agree it&apos;s too early to determine how the new Gmail tabs will impact email marketing response rates, many experts are hopeful." />
                      <outline text="&apos;&apos;We don&apos;t know how people are going to use it,&apos;&apos; says Silverpop VP of industry relations Loren McDonald, &apos;&apos;It&apos;s too early to have any sense of an impact on long-term performance.&apos;&apos;" />
                      <outline text="According to a Silverpop blog post published by McDonald on June 6, he believes it will take, at least, 12 to 18 months before marketers can truly understand the impact of the new Gmail tabs. &apos;&apos;What we don&apos;t know yet and won&apos;t know for a long time is whether separating promotional and other marketing related messages will actually be good for marketers, because their messages won&apos;t get lost in a sea of unrelated emails,&apos;&apos; writes McDonald, &apos;&apos;It may also train users to be in &apos;&apos;shopping&apos;&apos; mode when perusing the promotions tab.&apos;&apos;" />
                      <outline text="During our phone interview, McDonald reinforced his positive outlook, saying that many Gmail users may find themselves liking the new tabs, performing new habits around the way they consume email and engaging more with the brands they like. In his blog post, McDonald also points out that users are slow to adopt new email features, &apos;&apos;While we lack specific numbers, history shows that user adoption of inbox innovations often is very low, perhaps only in the single digits.&apos;&apos;" />
                      <outline text="Gail Goodman, CEO of Constant Contact, said she sees no reason for major concerns. &apos;&apos;We&apos;ve been actively monitoring our customers&apos; open rates since the launch of Gmail tabs to see what impact the new feature has had, and found small decreases in open rates among Gmail users,&apos;&apos; says Goodman, &apos;&apos;The bottom line is that marketers shouldn&apos;t panic. Given that Gmail tabs is early in both its adoption and consumer usage patterns, we&apos;ll continue to monitor this in the coming weeks and months to see if there is any further impact.&apos;&apos;" />
                      <outline text="What Email Providers Are Seeing So FarPopular email service provider MailChimp published a blog post on July 23 offering insight into what they&apos;ve seen happen around open rates with Gmail users since the new tabs were released." />
                      <outline text="&apos;&apos;I trimmed my data to a lean six weeks around the introduction of tabs. That&apos;s about 1.5 billion emails, which is plenty of records for a good analysis,&apos;&apos; writes MailChimp&apos;s Matthew Grove, &apos;&apos;I learned from my research that the new Gmail inbox is bringing down open rates, but the change isn&apos;t dramatic at this point.&apos;&apos;" />
                      <outline text="MailChimp&apos;s Gmail open rates before &amp; after Gmail tabs launched" />
                      <outline text="According to Grove&apos;s findings, open rates for Gmail users had remained above 13 percent for 15 weeks, dipping only below the 13 percent mark during holidays. A week after Google launched the Gmail inbox tabs, open rates dropped and remained down for three consecutive weeks." />
                      <outline text="&apos;&apos;From looking at a year and a half&apos;s worth of data, I can say that kind of behavior isn&apos;t normal,&apos;&apos; writes Grove, &apos;&apos;I&apos;m not willing to declare an emergency just yet. After all, I don&apos;t even know what the adoption rate is on Gmail&apos;s side. However, I would say this is an early indicator, and we&apos;re definitely keeping our eye on it.&apos;&apos;" />
                      <outline text="Lyris CMO Alex Lustberg confirmed his email marketing company has also witnessed a decline in open rates, but Lustberg thinks the new tabs will prove eventually to be a good thing for marketers:" />
                      <outline text="Consumers have always filtered the way they read emails into those that are useful and relevant and those that are not. The only difference with the new Gmail system is that it does this automatically. So while it&apos;s no surprise we have seen a slight decline in email open rates (by approximately .57 percentage points) and clicks (.08 percentage points), the overall browsing is net positive for email marketing and open rates." />
                      <outline text="The promotions tab grabs attention for an audience that is more receptive and the action is done with intent and in a way that is respectful to the customer. As such, the click throughs are more qualified leads, which is ultimately much more helpful for marketers." />
                      <outline text="Silverpop has conducted a simple four-question survey to gauge their client&apos;s awareness level around the new Gmail tabs. At the time of my conversation with Silverpop&apos;s VP of industry relations, they had received only 30 responses to the survey." />
                      <outline text="Of the clients who had completed Silverpop&apos;s survey, 81 percent were aware of the new Gmail tabs and functionality. From the 81 percent, McDonald says 12 percent claim to have experienced a decrease in open rates and CTRs when asked if they are monitoring performance, while 42 percent said it was too early to tell, and 46 percent responded that they were not monitoring performance." />
                      <outline text="What Email Marketers Can Do In the MeantimeMany marketers are curious if there is a way to get marketing emails into the Primary tab. MailChimp&apos;s Matthew Grove conducted his own test to see if he could get emails to show up in the Primary tab versus the Promotions tab." />
                      <outline text="&apos;&apos;I&apos;ve messed around with a ton of different content and header configurations,&apos;&apos; writes Grove, &apos;&apos;And anything that looks like it came from an ESP (has a list-unsubscribe header, unsubscribe links in the content, etc.) goes to either the Promotions tab or the Updates tab.&apos;&apos;" />
                      <outline text="MailChimp, Silverpop&apos;s McDonald and Constant Contact CEO Goodman all agree that the best way to get marketing emails from the Promotions tab into the Primary tab is by sending an email instructing list subscribers how to move emails from one tab to the other." />
                      <outline text="&apos;&apos;Marketers should think about the things they can do to make sure their email subscribers continue to look for and read their emails. Gmail tabs make it even more important that email marketers send relevant, valuable content to the people who have opted into their list &apos;&apos; content that people will look for,&apos;&apos; says Contact CEO Gail Goodman, &apos;&apos;In addition, marketers should proactively ask Gmail users on their list to move their emails to the Primary tab, either by dragging and dropping their emails from the Promotions tab to the Primary tab or by clicking the star next to the email.&apos;&apos;" />
                      <outline text="Marketing Land staffers have already seen such emails surface, including a message from Delta&apos;s Skylines&#174; Dining program with a subject line that read, &apos;&apos;Urgent: Your SkyMiles Dining emails need attention&apos;&apos; followed by a message that offered, &apos;&apos;&apos;...two easy steps to send our bonus offers, restaurant updates and earning opportunities to the front of your inbox.&apos;&apos;" />
                      <outline text="The email told readers to drag SkyMiles Dining emails from the Promotions to the Primary tab, then click yes so that, &apos;&apos;You&apos;ll never miss out on an offer or update.&apos;&apos;" />
                      <outline text="Of course, before telling readers to relocate their emails, it may be worth waiting to see how users interact with the new tabs. There&apos;s a chance brands will see higher engagement levels as users form new habits with the way they read their emails, being able to focus on their Promotion tab emails when they are in the mood to shop or browse deals." />
                      <outline text="McDonald sees the Gmail tabs as a major shift towards a more intuitive mobile experience." />
                      <outline text="&apos;&apos;With many brands seeing around 50 percent of emails opened on mobile devices, inbox management features are ultimately going to come down to the mobile email apps consumers use,&apos;&apos; writes McDonald in his Silverpop blog post, &apos;&apos;Because our mobile devices are a bit more context-centric, consumers might want to see all of their promotional emails or social network notifications when they are at lunch or on the train home from work, not throughout the day.&apos;&apos;" />
                      <outline text="Overall, McDonald sees the new Gmail tabs as good news for the email marketing industry, &apos;&apos;It&apos;s important to remember that other big email providers  &apos;&apos; Microsoft, Yahoo and AOL &apos;&apos; are changing their email services and features because they see email is even more relevant in the social and mobile era&apos;...Let&apos;s be thankful that these companies continue to invest in email and are ensuring an ongoing positive and relevant experience for users.&apos;&apos;" />
                      <outline text="Correction: This article has been updated since it&apos;s original publication to correct Loren McDonald&apos;s title to VP of industry relations." />
                      <outline text="Related Topics:Channel: Email Marketing | Email Marketing | Google: Gmail | Interviews | Mobile Marketing | Top News" />
              </outline>

              <outline text="Newegg, Gap Beg Customers Not To Relegate Them To Gmail&apos;s &apos;Promotions&apos; Tab &apos;&apos; Consumerist">
                      <outline text="Link to Article" type="link" url="http://consumerist.com/2013/08/16/newegg-gap-beg-customers-not-to-relegate-them-to-gmails-promotions-tab/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376830148_UaqCwH3j.html" />
      <outline text="Sun, 18 Aug 2013 12:49" />
                      <outline text="" />
                      <outline text="Even though some early studies have showed that Gmail&apos;s recent effort to put all of our marketing e-mails in one folder for us hasn&apos;t really affected response rates for the businesses that blast us with e-mails, some companies are desperate to persuade us to keep them in our inboxes. Desperate enough to walk us through changing our e-mail preferences." />
                      <outline text="Buzzfeed notes that Gap may have started it, letting customers know how to fill their inbox with promos. Now it&apos;s Newegg&apos;s turn to be needy." />
                      <outline text="&apos;&apos;Sorry, Newegg, not interested,&apos;&apos; notes reader ZyphBear." />
              </outline>

              <outline text="Opt out of global data surveillance programs like PRISM, XKeyscore, and Tempora - PRISM Break">
                      <outline text="Link to Article" type="link" url="https://prism-break.org/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376829560_9RSJKfLZ.html" />
      <outline text="Sun, 18 Aug 2013 12:39" />
                      <outline text="" />
                      <outline text="Apple, Google, and Microsoft are allegedly a part of PRISM. Their proprietary operating systems cannot be trusted to safeguard your personal information from the NSA. We have two free alternatives: GNU/Linux and BSD." />
                      <outline text="GNU/Linux has a much larger community to help you with the transition. It&apos;s recommended that you begin your explorations by looking for a GNU/Linux distribution that suits your needs." />
                      <outline text="Debian has a long tradition of software freedom. Contributers have to sign a social contract and adhere to the ethical manifesto. Strict inclusion guidelines make sure that only certified open source software gets packaged in the main repositories." />
                      <outline text="Gentoo describes itself as a meta-distribution. The source code is compiled to binary applications on the user&apos;s machine allowing near-unlimited adaptability and complete retraceability of the program logic." />
                      <outline text="Linux Mint Debian Edition (LMDE) is probably the easiest-to-use distribution for people migrating from Microsoft Windows." />
                      <outline text="Both Fedora and openSUSE are community editions that serve as the stable basis for enterprise ready GNU/Linux distributions with commercial support. Companies all over the world trust Red Hat Inc. and SUSE Linux GmbH because of their transparency throughout the whole development process." />
                      <outline text="Parabola GNU/Linux is effectively 99% Arch Linux with a de-blobbed kernel and a meta-package that blocks unfree licenses. Both of these features can be installed under Arch." />
                      <outline text="Canonical&apos;s Ubuntu is not recommended by PRISM Break because it contains Amazon ads and data leaks by default. GNU/Linux distributions based on Ubuntu are also currently not recommended due to several other reasons." />
              </outline>

              <outline text="Turophile | Define Turophile at Dictionary.com">
                      <outline text="Link to Article" type="link" url="http://dictionary.reference.com/browse/turophile" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376792707_UNVb6HQ6.html" />
      <outline text="Sun, 18 Aug 2013 02:25" />
                      <outline text="" />
                      <outline text="&apos;var prefix = &apos;&#092;n&apos;;window[&apos;spLabel&apos;] = &apos;Ads&apos;;if(num==1){window[&apos;spLabel&apos;] = &apos;Ad&apos;;}var suffix = &apos;" />
                      <outline text="&apos;;var template = &apos;{label}" />
                      <outline text="&apos;;s += prefix;var ads = window[&apos;google_ads&apos;];var ajslAds=window[&apos;ajsl_ads&apos;];var spnrAds=window[&apos;spnr_ads&apos;];for(var i = 0; i = topHeavyCharCount){longDescriptionPresent = true;break;}}if(ajslAds){for(var i = 0; i 65 ? ads[i].visible_url.substring(0, 65) : ads[i].visible_url);if(false){fragment = fragment.replace(/&#092;{ncbmwidth&#092;}/,&quot;width:px&quot;);fragment = fragment.replace(/&#092;{ncbm1width&#092;}/,&quot;width:px&quot;);}ads[i].line1 = highlightQuery(ads[i].line1);var dbgInfo=&quot;&quot;;if(false){adt = &apos;afc&apos;;if(ads[i].adType != null &amp;&amp; &apos;ta&apos; == ads[i].adType){adt = &apos;ta&apos;;}dbgInfo=&quot;[id=&quot; + ads[i].n +&quot;,type=&quot;+adt+&quot;]&quot;;}fragment = fragment.replace(/&#092;{title&#092;}/, dbgInfo+ads[i].line1);ads[i].line2 = highlightQuery(ads[i].line2);ads[i].line3 = highlightQuery(ads[i].line3);if(longDescriptionPresent){fragment = fragment.replace(/class=&#092;&quot;slD&#092;&quot;/,&quot;class=&#092;&quot;slDL&#092;&quot;&quot;);}fragment = fragment.replace(/&#092;{abstract&#092;}/, ads[i].line2 + &quot; &quot; + ads[i].line3);return fragment;}function render_inhouse_ad(top, ads, template,i,label) {if(!label){label= false;}var fragment = template;if(window[&apos;spShadedLabel&apos;] &amp;&amp; i==window[&apos;ad_config_top&apos;]+ads.length-1) {fragment = fragment.replace(/&#092;{label&#092;}/, spShadedLabel);} else if((window[&apos;spLabel&apos;] &amp;&amp; i==window[&apos;ad_config_top&apos;]+ads.length-1 ) || label){fragment = fragment.replace(/&#092;{label&#092;}/, spLabel);}else {fragment = fragment.replace(/&#092;{label&#092;}/,&quot;&quot;);}for(var k=0;fragment.indexOf(&quot;{pickJavascript}&quot;)!= -1;k++){fragment = fragment.replace(/&#092;{pickJavascript&#092;}/,ads[i].pickJavascript);fragment = fragment.replace(/&#092;(position&#092;)/,&quot;&quot;);fragment = fragment.replace(/&#092;{counter&#092;}/,&quot;&quot;);fragment = fragment.replace(/&#092;{io&#092;}/, i);}fragment = fragment.replace(/&#092;{en&#092;}/g, ads[i].adType);fragment = fragment.replace(&apos;gg_&apos;, ads[i].adType+&quot;_&quot; + i);fragment = fragment.replace(/&#092;{ec&#092;}/g, ads.length);fragment = fragment.replace(/&#092;{url&#092;}/g, ads[i].url);fragment = fragment.replace(/&#092;{visibleUrl&#092;}/, ads[i].visible_url.length &gt; 65 ? ads[i].visible_url.substring(0, 65) : ads[i].visible_url);if(false){fragment = fragment.replace(/&#092;{ncbmwidth&#092;}/,&quot;width:px&quot;);fragment = fragment.replace(/&#092;{ncbm1width&#092;}/,&quot;width:px&quot;);}ads[i].line1 = highlightQuery(ads[i].line1);var dbgInfo=&quot;&quot;;if(false){dbgInfo=&quot;[id=&quot; + ads[i].n +&quot;,type=&quot;+ads[i].adType +&quot;]&quot;;}fragment = fragment.replace(/&#092;{title&#092;}/, dbgInfo+ads[i].line1);ads[i].line2 = highlightQuery(ads[i].line2);ads[i].line3 = highlightQuery(ads[i].line3);if(longDescriptionPresent){fragment = fragment.replace(/class=&#092;&quot;slD&#092;&quot;/,&quot;class=&#092;&quot;slDL&#092;&quot;&quot;);}fragment = fragment.replace(/&#092;{abstract&#092;}/, ads[i].line2 + &quot; &quot; + ads[i].line3);return fragment;}var ajslAds=new Array();var spnrAds=new Array();var repeatAds=&quot;true&quot;;function debug_info_update_render_ads(){if(document.getElementById(&apos;afc_ads_recieved&apos;)){var no_of_ads_debug_info = document.createTextNode(google_ads.length);document.getElementById(&apos;afc_ads_recieved&apos;).appendChild(no_of_ads_debug_info);}}function google_ad_request_done(google_ads) {debug_info_update_render_ads();window[&apos;google_ads&apos;] = google_ads;inhouseAds = false;if(window[&apos;google_ads&apos;].length ]+$/)){return true;}return false;}function isQueryinInput(firstindex, input_str, j){for(i=firstindex; i&quot; + input_str.substring(first_pos,exactmatch) + &quot;&quot;;input_str = input_str.substring(0,first_pos) + bold_str + input_str.substring(exactmatch);next_pos = input_str.toLowerCase().indexOf(word_arr[0],exactmatch+7);while(next_pos != -1) {return highlightCombinationWords(input_str,next_pos);}}return input_str;}function highlightSimpleWords(input_str,token, first_pos) {var end_pos = first_pos + token.length;if(!isAlpha(input_str.charAt(end_pos)) &amp;&amp; !isAlpha(input_str.charAt(first_pos-1))){bold_str = &quot;&quot; + input_str.substring(first_pos,end_pos) + &quot;&quot;;input_str = input_str.substring(0,first_pos) + bold_str + input_str.substring(end_pos);next_pos = input_str.toLowerCase().indexOf(token,end_pos+7);}else {next_pos = input_str.toLowerCase().indexOf(token,end_pos);}while(next_pos != -1) {return highlightSimpleWords(input_str,token,next_pos);}return input_str;}noun a connoisseur or lover of cheese." />
                      <outline text="More from Dictionary.com Translator" />
                      <outline text="00:10" />
                      <outline text="Turophileis always a great word to know." />
                      <outline text="So is gobo. Does it mean:" />
                      <outline text="Dictionary.com Word FAQs" />
                      <outline text="Dictionary.com presents 366 FAQs, incorporating some of the frequently asked questions from the past with newer queries." />
              </outline>

              <outline text="CDC Study Ordered by Obama Contradicts White House Anti-gun Narrative">
                      <outline text="Link to Article" type="link" url="http://thenewamerican.com/usnews/crime/item/15941-cdc-study-ordered-by-obama-contradicts-white-house-anti-gun-narrative" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376792619_Au7yDX3f.html" />
      <outline text="Sun, 18 Aug 2013 02:23" />
                      <outline text="" />
                      <outline text="In January, following the Sandy Hook Elementary School massacre, President Obama issued a &apos;&apos;Presidential Memorandum directing the Centers for Disease Control to research the causes and prevention of gun violence,&apos;&apos; along with 22 other &apos;&apos;initiatives.&apos;&apos; That study, subcontracted out to the Institute of Medicine and National Research Council, was completed in June and contained some surprises for the president." />
                      <outline text="Obama had announced at the beginning of the year his push for three major gun control initiatives &apos;-- universal background checks, a ban on &apos;&apos;assault weapons,&apos;&apos; and a ban on &apos;&apos;high-capacity&apos;&apos; magazines &apos;-- to prevent future mass shootings, no doubt hoping that the CDC study would oblige him by providing evidence that additional gun control measures were justified to reduce gun violence. On the contrary, that study refuted nearly all the standard anti-gun narrative and instead supported many of the positions taken by gun ownership supporters." />
                      <outline text="For example, the majority of gun-related deaths between 2000 and 2010 were due to suicide and not criminal violence:" />
                      <outline text="Between the years 2000-2010 firearm-related suicides significantly outnumbered homicides for all age groups, annually accounting for 61 percent of the more than 335,600 people who died from firearms related violence in the United States." />
                      <outline text="In addition, defensive use of guns &apos;&apos;is a common occurrence,&apos;&apos; according to the study:" />
                      <outline text="Almost all national survey estimates indicate that defensive gun uses by victims are at least as common as offensive uses by criminals, with estimates of annual uses ranging from about 500,000 to more than 3 million per year, in the context of about 300,000 violent crimes involving firearms in 2008." />
                      <outline text="Accidental deaths due to firearms has continued to fall as well, with &apos;&apos;the number of unintentional deaths due to firearm-related incidents account[ing] for less than 1 percent of all unintentional fatalities in 2010.&apos;&apos;" />
                      <outline text="Furthermore, the key finding the president was no doubt seeking &apos;-- that more laws would result in less crime &apos;-- was missing. The study said that &apos;&apos;interventions,&apos;&apos; such as background checks and restrictions on firearms and increased penalties for illegal gun use, showed &apos;&apos;mixed&apos;&apos; results, while &apos;&apos;turn-in&apos;&apos; programs &apos;&apos;are ineffective&apos;&apos; in reducing crime. The study noted that most criminals obtained their guns in the underground economy &apos;-- from friends, family members, or gang members &apos;-- well outside any influence from gun controls on legitimate gun owners." />
                      <outline text="Also, the report noted that mass shootings such as the one in Newtown, Connecticut, have declined and &apos;&apos;account for a very small fraction of all firearm-related deaths.&apos;&apos;" />
                      <outline text="There was one startling conclusion which, taken at face value, seemed to give the president what he was looking for. The study reported that &apos;&apos;the U.S. rate of firearm-related homicide is higher than that of any other industrialized country: 19.5 times higher than the rates in other high-income countries.&apos;&apos; However, Zara Matheson of the Martin Prosperity Institute, produced a map that compared gun violence rates in the major metropolitan areas of the country to rates of foreign countries. As Graham Noble of Guardian Expressnoted, &apos;&apos;If one were to exclude figures for Illinois, California, New Jersey and Washington, DC, the homicide rate in the United States would be in line with any other country.&apos;&apos; These areas, of course, are noted for the most restrictive gun laws in the country, thus negating any opportunity for the president to celebrate the report&apos;s findings." />
                      <outline text="The current report from the CDC echoed findings the CDC published back in 2003 that showed that suicides were responsible for 58 percent of all firearms-related deaths in 2000. Also noted is that back in 2003 Americans owned an estimated 192 million firearms, while today that number is estimated to be closer to 300 million, an increase of more than 55 percent." />
                      <outline text="Said the CDC back in 2003, &apos;&apos;Evidence was insufficient to determine the effectiveness of any of these laws&quot; (Emphasis added.):" />
                      <outline text="Bans on specified firearms or ammunition," />
                      <outline text="Restrictions on firearm acquisition," />
                      <outline text="Waiting periods for firearm acquisition," />
                      <outline text="Firearm registration and licensing of owners, and" />
                      <outline text="Zero tolerance for firearms in schools." />
                      <outline text="If the president was looking to the CDC report for support on how to reduce the threat of firearm-related violence through legislation restricting the rights of American citizens, he was sorely disappointed. Perhaps that&apos;s why so few of the media have publicized the report. In fact, the only establishment media even to mention the report was theWashington Post, which criticized it for not answering questions that it wasn&apos;t asked to answer!" />
                      <outline text=" " />
                      <outline text="A graduate of Cornell University and a former investment advisor, Bob is a regular contributor to The New American magazine and blogs frequently at www.LightFromTheRight.com, primarily on economics and politics. He can be reached at This email address is being protected from spambots. You need JavaScript enabled to view it." />
                      <outline text=" " />
              </outline>

              <outline text="Here are the questions about gun violence the CDC would study &apos;-- if it could">
                      <outline text="Link to Article" type="link" url="http://www.washingtonpost.com/blogs/wonkblog/wp/2013/06/08/here-are-the-questions-about-gun-violence-the-cdc-would-study-if-it-could/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376792139_rTvNBhQ8.html" />
      <outline text="Sun, 18 Aug 2013 02:15" />
                      <outline text="" />
                      <outline text="Back in January, President Obama signed an executive order directing the Centers on Disease Control and Prevention (CDC) to start studying &apos;&apos;the causes of gun violence.&apos;&apos; The idea was to restart federal research into the topic after a longtime freeze." />
                      <outline text="Hard to study. (AP)" />
                      <outline text="But that still left a key question unanswered: What would the CDC actually study, if it could? What more is there to know about gun violence that we don&apos;t already know?" />
                      <outline text="Quite a bit, it seems. Earlier this week, a panel at the Institutes of Medicine released a big new report outlining a research agenda for the CDC over the next three to five years. Topics would include the effects of media portrayals of violence and a look at whether &apos;&apos;smart guns&apos;&apos; that only fire for registered users could decrease accidents." />
                      <outline text="An accompanying brief (pdf) outlines a number of things that researchers still don&apos;t know &apos;-- and should study. Here are some highlights:" />
                      <outline text="&apos;&apos; &apos;&apos;[The] exact number and location of guns and gun types is unknown.&apos;&apos;" />
                      <outline text="&apos;&apos; &apos;&apos;What characteristics differentiate mass shootings that were prevented from those that were carried out?&apos;&apos;" />
                      <outline text="&apos;&apos; Researchers should try to &apos;&apos;identify factors associated with juveniles and youths having access to, possessing, and carrying guns.&apos;&apos; In other words, it&apos;s still not entirely clear what types of guns kids get, or how they get them." />
                      <outline text="&apos;&apos; Researchers should also &apos;&apos;improve understanding of whether reducing criminal access to legally purchased guns reduces firearm violence.&apos;&apos; For instance, would universal background checks actually work?" />
                      <outline text="&apos;&apos; Another key question: &apos;&apos;Do programs to alter physical environments in high-crime areas result in a decrease in firearm violence?&apos;&apos; Do restrictions on alcohol sales, for instance, have any effect on gun violence?" />
                      <outline text="&apos;&apos; &apos;&apos;Identify the effects of different technological approaches to reduce firearm-related injury and death.&apos;&apos; Are there realistic ways to make guns child-proof, for instance?" />
                      <outline text="&apos;&apos; &apos;&apos;Examine the relationship between exposure to media violence and real-life violence.&apos;&apos;" />
                      <outline text="The report also argues that researchers should try to conduct more studies that involve controlled trials that can actually show causation. At the moment, a big chunk of what we know about gun violence is based on studies that simply look at correlations between different laws in different states &apos;-- which isn&apos;t terribly conclusive." />
                      <outline text="So there&apos;s a lot to find out. That said, it&apos;s still not clear that the CDC will actually move ahead. Congress, after all, has long barred the CDC from funding any research that could be used to &apos;&apos;advocate or promote gun control.&apos;&apos; Technically, that&apos;s not a ban on all gun research, but the law is hazy enough that the centers have shied away from the topic altogether." />
                      <outline text="&apos;&apos;Now scientists will have one interpretation of the law from the executive branch and another from Congress,&apos;&apos; Andrew Rosenberg of the Union of Concerned Scientists back said in January. And lawmakers still control the funding. So until Congress gives its explicit blessing to the CDC, federal gun research is likely to proceed only haltingly." />
                      <outline text="Related: A closer look at why federal gun research has wilted since the 1990s." />
              </outline>

              <outline text="Switching To Gmail May Leave Reporters&apos; Sources At Risk : All Tech Considered : NPR">
                      <outline text="Link to Article" type="link" url="http://www.npr.org/blogs/alltechconsidered/2013/08/16/212678437/switching-to-gmail-may-leave-reporters-sources-at-risk?f=1001&amp;ft=1&amp;sc=tw" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376788991_SmUQ4STA.html" />
      <outline text="Sun, 18 Aug 2013 01:23" />
                      <outline text="" />
                      <outline text="In the digital world, almost everything you do to communicate leaves a trace. Often, emails are stored on servers even after they&apos;re deleted. Phone calls create logs detailing which numbers connected, when and for how long. Your mobile phone can create a record of where you are." />
                      <outline text="If you&apos;re a journalist trying to protect a confidential source, this is a very difficult world to work in." />
                      <outline text="&quot;I have been running around in my newsroom, screaming about this ... for years,&quot; says Julia Angwin, who covers computer security and privacy at The Wall Street Journal. &quot;There&apos;s so much evidence now that journalists are being targeted, that our communications are vulnerable and, mostly, that our sources are being put in jail.&quot;" />
                      <outline text="It&apos;s in this context that The New York Times decided to outsource its email to Google. This summer, the paper moved all of its reporters onto corporate Gmail accounts. Before the switch, Times emails were stored on servers it owned; now those messages are in Google&apos;s digital filing cabinet." />
                      <outline text="&apos;A Sense Of Nervousness&apos;" />
                      <outline text="Unlike the free Gmail used by millions of consumers, corporate Gmail accounts cost money and offer greater privacy protections. But that protection is not complete, and the move could leave Times reporters and their sources with fewer legal protections if they are the subject of a government investigation." />
                      <outline text="Angwin says one of the reasons that so many journalists have been unable to protect their sources is that records about whom they are talking to are collected by third parties. Last year, when the Department of Justice was investigating a leak about a foiled terrorism plot in Yemen, it didn&apos;t subpoena reporters at the Associated Press. Instead, it went to Verizon and asked for the records of calls going into and out of the AP&apos;s bureaus." />
                      <outline text="Prosecutors also go after journalists&apos; private email accounts. And often investigative requests to companies like Google and Verizon come with gag orders." />
                      <outline text="&quot;I find that all of this, including the AP revelations, contributed to a sense of nervousness among sources,&quot; says Jennifer Valentino-DeVries, also of The Wall Street Journal. &quot;Even people who are not discussing particularly sensitive information with me will comment about the possibility of my emails and phone calls being tapped. And I think that&apos;s been disconcerting.&quot;" />
                      <outline text="&quot;I worry a lot about the outsourcing of email at a news organization. We only have two layers of protection, right? One is technological and one is legal,&quot; Angwin says. &quot;So certainly our lawyers at a news organization are gonna fight to protect our emails. But, if they don&apos;t fully control them technically, they can&apos;t mount a very good argument." />
                      <outline text="&quot;If Gmail is handling our emails, then we have to rely on them to mount our legal arguments,&quot; she adds. &quot;And that&apos;s not a situation that news organizations have been in, in the past.&quot;" />
                      <outline text="Investigations And Gag Orders" />
                      <outline text="The New York Times isn&apos;t the only media organization to outsource its email. In a statement, it said it had discussed the legal issues involved in detail and the company is confident that its deal with Google, combined with precautions its journalists are now taking, has enhanced the protection of sensitive information. Right now, the Times believes hackers are a bigger security threat than government investigations or gag orders." />
                      <outline text="Fred Cate, the director of the Center for Applied Cybersecurity Research at Indiana University, says a large email service provider like Google may very well offer better security. Still, Cate says, when it comes to mounting a legal defense against a leak investigation, the Times is making itself vulnerable." />
                      <outline text="&quot;There will be a gap. There is no question that there&apos;s going to be a gap,&quot; Cate says. &quot;Because previously you would have had to serve that piece of paper on The New York Times.&quot;" />
                      <outline text="Now, an investigator would serve Google. And if the request comes with a gag order, the Times might never know." />
              </outline>

              <outline text="Approved Resolution | Meeting of the New gTLD Program Committee | ICANN">
                      <outline text="Link to Article" type="link" url="http://www.icann.org/en/groups/board/documents/resolutions-new-gtld-13aug13-en.htm#1.a" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376787889_aaY3zJy5.html" />
      <outline text="Sun, 18 Aug 2013 01:04" />
                      <outline text="" />
                      <outline text="Dotless DomainsWhereas, dotless domains consist of a single label and require the inclusion of, for example, an A, AAAA, or MX, record in the apex of a TLD zone in the DNS." />
                      <outline text="Whereas, Section 2.2.3.3 of the Applicant Guidebook (AGB) prohibits the use of dotless domain names without evaluation of the registry services and ICANN&apos;s prior approval." />
                      <outline text="Whereas, on 23 February 2012, the ICANN Security and Stability Advisory Committee (SSAC) published SAC 053: SSAC Report on Dotless Domains [PDF, 183 KB], and recommended that the use of DNS resource records such as A, AAAA, and MX in the apex of a Top-Level Domain (TLD) should be contractually prohibited where appropriate, and strongly discouraged in all cases." />
                      <outline text="Whereas, on 23 June 2012, the ICANN Board adopted resolution 2012.06.23.09 tasking ICANN to consult with the relevant communities regarding implementation of the recommendations in SAC053." />
                      <outline text="Whereas, on 24 August 2012, ICANN staff published the SAC053 Report for public comment requesting input to consider in relation to implementing the recommendations of the SSAC report." />
                      <outline text="Whereas, in May 2013 ICANNcommissioned a study on the stability and security implications of dotless domain name functionality to help ICANN prepare an implementation plan for the SAC053 recommendations, and on 29 July 2013 Carve Systems delivered a report to ICANN identifying the security and stability issues that should be mitigated before gTLDs implement dotless domain names (the &quot;Carve Report&quot;)." />
                      <outline text="Whereas, on 10 July 2013 the Internet Architecture Board (IAB) released a statement on dotless domain names, recommending against the use of dotless domain names for TLDs." />
                      <outline text="Whereas, the NGPC has considered the risks associated with dotless domains as presented in SAC053, the IAB statement and the Carve Report, and the impracticality of mitigating these identified risks. The NGPC has also considered the comments received from the community on this issue." />
                      <outline text="Whereas, the NGPC is undertaking this action pursuant to the authority granted to it by the Board on 10 April 2012, to exercise the ICANN Board&apos;s authority for any and all issues that may arise relating to the New gTLD Program." />
                      <outline text="Resolved (2013.08.13.NG01), the NGPC acknowledges the security and stability risks associated with dotless domains as presented in SAC053, the IAB statement and the Carve Report and affirms its commitment to its security and stability mandates as the New gTLD Program is implemented." />
                      <outline text="Resolved (2013.08.13.NG02), in light of the current security and stability risks identified in SAC053, the IAB statement and the Carve Report, and the impracticality of mitigating these risks, the NGPC affirms that the use of dotless domains is prohibited." />
                      <outline text="Resolved (2013.08.13.NG03), the President, Generic Domains Division is authorized to take all necessary steps to implement these resolutions." />
                      <outline text="Rationale for Resolutions 2013.08.13.NG01 &apos;-- 2013.08.13.NG03Why the NGPC is addressing the issue?" />
                      <outline text="The SSAC issued SAC 053 to the ICANN board which requests action be taken to prevent gTLDs from being approved to operate as dotless domain names. The Board requested staff to prepare an implementation plan for SAC 053. The topic has gained attention of the community and was discussed in several forums at the ICANN Meeting 47 in Durban, South Africa." />
                      <outline text="What is the proposal being considered?" />
                      <outline text="The NGPC is being asked to consider taking action to provide clarity to the community that dotless domain names continue to pose technical risks to the security and stability of the DNS and that mitigation of these risks will be very difficult to achieve." />
                      <outline text="Which stakeholders or others were consulted?" />
                      <outline text="The SSAC published SAC 053 in February 2012 and have been consulted over the course of the last year on this issue. ICANN consulted with the community on the issue of dotless domains, and solicited public comment on SAC 053 in August &apos;-- November 2012. Additionally, ICANN commissioned Carve Systems, LLC, a security consulting firm, to perform a detailed study of the potential risks that gTLDs operating as dotless domain names may pose. In July 2013, the Internet Architecture Board (IAB) issued a statement identifying concerns similar to the SSAC and Carve reports, and advising against the use of dotless domain names for gTLDs. The NGPC has considered the information provided from these stakeholders and outside experts on the issue." />
                      <outline text="What concerns or issues were raised by the community?" />
                      <outline text="The SSAC expressed concern about the use of dotless domain names for gTLDs in SAC 053 and recommended against their use. During the public comment on SAC053, some members of the community supported the position of the SSAC and noted that due to the security and stability concerns posed by dotless domains, they should not be allowed. Others in the community have argued that dotless domains should be allowed for technical innovation and that the risk assessment is overly conservative as there are ways to mitigate the risks to not unduly upset the security and stability of the Internet. A report of the public comments can be reviewed at http://www.icann.org/en/news/public-comment/report-comments-sac053-dotless-domains-27nov12-en.pdf [PDF, 138 KB]." />
                      <outline text="What significant materials did the NGPC review?" />
                      <outline text="The NGPC considered the following significant materials:" />
                      <outline text="What factors did the NGPC find to be significant?" />
                      <outline text="The NGPC considered ICANN&apos;s core role as coordinator of the Internet naming system for the security, stability and resiliency of the DNS and the Internet&apos;s unique identifier system. The NGPC also found the reports presented by the SSAC and Carve Systems to be significant factors in its decision. On balance, the NGPC believes technical concerns continue to exist with the implementation of dotless domain names and the use of DNS Resource Records in the apex of a TLD zone beyond SOA, NS, and related DNSSEC records." />
                      <outline text="Are there fiscal impacts or ramifications on ICANN (strategic plan, operating plan, budget); the community; and/or the public?" />
                      <outline text="There is no anticipated fiscal impact of adopting this action." />
                      <outline text="Are there any security, stability or resiliency issues relating to the DNS?" />
                      <outline text="The technical experts of the SSAC, Carve Systems and the IAB believe gTLDs operated as dotless domain names will negatively impact the security, stability and resiliency of the DNS. Approval of the proposed resolution to prohibit use of dotless domains in the DNS will not negatively impact security, stability or resiliency issues relating to the DNS." />
                      <outline text="This is an Organizational Administrative Function for which public comment was received." />
                      <outline text="Reconsideration Request 13-4Whereas, DotConnectAfrica Trust&apos;s (&quot;DCA Trust&quot;) Reconsideration Request, Request 13-4, sought reconsideration of the Board action (through the New gTLD Program Committee) on 4 June 2013, accepting advice from ICANN&apos;s Governmental Advisory Committee regarding DCA Trust&apos;s new gTLD application for .AFRICA, and determining that this particular new gTLD application will not be approved." />
                      <outline text="Whereas, the BGC considered the issues raised in Reconsideration Request 13-4." />
                      <outline text="Whereas, the BGC recommended that Reconsideration Request 13-4 be denied because DCA Trust has not stated proper grounds for reconsideration." />
                      <outline text="Resolved (2013.08.13.NG04), the New gTLD Program Committee adopts the BGC Recommendation on Reconsideration Request 13-4, which can be found at http://www.icann.org/en/groups/board/governance/reconsideration/recommendation-dca-trust-01aug13-en.pdf [PDF, 120 KB]." />
                      <outline text="Rationale for Resolution 2013.08.13.NG04ICANN&apos;s Bylaws call for the Board Governance Committee to evaluate and make recommendations to the Board with respect to Reconsideration Requests. See Article IV, section 3 of the Bylaws. The New gTLD Program Committee (&quot;NGPC&quot;), bestowed with the powers of the Board in this instance, has reviewed and thoroughly considered the BGC Recommendation on Reconsideration Request 13-4 and finds the analysis sound." />
                      <outline text="Having a reconsideration process whereby the BGC reviews and, if it chooses, makes a recommendation to the Board/NGPC for approval positively affects ICANN&apos;s transparency and accountability. It provides an avenue for the community to ensure that staff and the Board are acting in accordance with ICANN&apos;s policies, Bylaws and Articles of Incorporation." />
                      <outline text="This Request asserted that the NGPC should have consulted with and considered the inputs of independent experts before acting on advice from the Governmental Advisory Committee (&quot;GAC&quot;) regarding DCA Trust&apos;s new gTLD application. The Request calls into consideration: (1) whether the NGPC was required to consult with independent experts prior to making the decision on the GAC Advice on DCA Trust&apos;s application and whether consultation with independent experts would have provided additional material information to the NGPC; and (2) whether the prescribed procedure for addressing GAC Advice in the Applicant Guidebook for the New gTLD Program was not complied with because the NGPC did not consult with independent experts in considering GAC Advice." />
                      <outline text="In consideration of the first issue, the BGC reviewed the grounds stated in the Request, including the attachments, as well as the briefing materials presented to the NGPC in advance of its 4 June 2013 decision, the rationale for that decision, the minutes of that meeting, and the material information from both the GAC and DCA Trust that was available and considered prior to the NGPC&apos;s decision. The BGC concluded that DCA Trust failed to adequately state a Request for Reconsideration of Board action because they failed to identify any material information that was not considered by the NGPC. The BGC noted that DCA Trust does not suggest in the Request that the discretionary use of an independent expert would have resulted in a different outcome on their application. The BGC further concluded that, as DCA Trust had an opportunity to provide additional information in their response to the GAC Advice, but remained silent on this point, the NGPC considered all material information in making its 4 June 2013 decision." />
                      <outline text="In consideration of the second issue, the BGC determined that DCA Trust&apos;s interpretation of the Applicant Guidebook to require the Board to seek advice is not accurate. Section 3.1 of the Guidebook provides with Board the discretion to seek the input of an independent expert when considering GAC advice, but does not obligate the Board to do so. Accordingly, the BGC concluded that the plain language of the Guidebook does not support the suggestion that the NGPC violated its process, and therefore made a decision without material information, when it did not seek the input of an independent expert." />
                      <outline text="In addition to the above, the full BGC Recommendation that can be found at http://www.icann.org/en/groups/board/governance/reconsideration/recommendation-dca-trust-01aug13-en.pdf [PDF, 120 KB] and that is attached to the Reference Materials to the Board Submission supporting this resolution, shall also be deemed a part of this Rationale." />
                      <outline text="Although not detailed in DCA Trust&apos;s Request, and therefore not specifically discussed in the BGC Recommendation, the NGPC also considered DCA Trust&apos;s claim that because the designated Kenyan GAC Representative disclaimed the GAC Advice on DCA Trust&apos;s application, GAC Advice is in question. DCA Trust&apos;s communications on this topic were sent to ICANN and the GAC Chair. As the Board has not received any notice of change from the GAC regarding its advice on this application, DCA Trust&apos;s assertions on this topic do not provide any grounds for modification of the decision on Reconsideration Request 13-4." />
                      <outline text="Adopting the BGC&apos;s recommendation has no financial impact on ICANN and will not negatively impact the systemic security, stability and resiliency of the domain name system." />
                      <outline text="This decision is an Organizational Administrative Function that does not require public comment." />
              </outline>

              <outline text="Travelers Beware: Google Play Might Delete All Your Books">
                      <outline text="Link to Article" type="link" url="http://gizmodo.com/travelers-beware-google-play-might-delete-all-your-boo-1159832224" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376787664_L47ZX9vH.html" />
      <outline text="Sun, 18 Aug 2013 01:01" />
                      <outline text="" />
                      <outline text="S" />
                      <outline text="It&apos;s easy to forget that owning something digitally is way different from owning it for real. And if you do forget, it can bite you in the ass. That&apos;s what happened to Jim O&apos;Donnell when he traveled into Singapore and found that Google Play Books app on his iPad had up and deleted all his ebooks." />
                      <outline text="You see, the Google Play Store doesn&apos;t operate in Singapore, Google Play Books aren&apos;t available in Singapore, so obviously it&apos;s not going to sell to people who are there. But apparently the DRM goes a step further, and can/will actually delete your stuff if it catches you visiting the wrong part of town the world." />
                      <outline text="O&apos;Donnell explains on a post in the Current Liblicense Archive:" />
                      <outline text="So when I got here, I noticed that several of my iPad apps had updates on offer, so I clicked and approved. One of them was Google Play. When it finished and I went to open the app, it told me that it needed to update my book files and this might take several minutes. Time passed and the screen filled in the covers of the 30 or 40 titles I keep live on the machine. Two of them were books I am actively reading for my teaching this fall." />
                      <outline text="But all of my books had un-downloaded and needed to be downloaded again. ...It turns out that because I am not in a country where Google Books is an approved enterprise (which encompasses most of the countries on the planet), I cannot download. Local wisdom among the wizards here speculates that the undownloading occurred when the update noted that I was outside the US borders and so intervened." />
                      <outline text="The helpful update didn&apos;t affect O&apos;Donnell&apos;s ownership of the books, of course, but he found that outside of Google Play territory, re-downloading was impossible. And all this could have been avoided by refusing the update, but that&apos;s a shitty thing to have to know ahead of time." />
                      <outline text="It&apos;s unclear if the Android app behaves the same way, but the Google Play Terms of Servicedoes clearly state:" />
                      <outline text="In certain cases (for example, if Google loses the relevant rights, discontinues a service or a Product is discontinued, breaches applicable terms or the law), Google may remove from your Device or cease providing you with access to certain Products that you have purchased." />
                      <outline text="Emphasis ours. Also &quot;bleh.&quot;" />
                      <outline text="But the moral of the story is that you&apos;re buying a license, not a book. And licenses can come with strings attached. Obnoxious strings. [Current Liblicense Archive via Boing Boing]" />
              </outline>

              <outline text="Princess Diana death: Scotland Yard studying new information | UK news | The Observer">
                      <outline text="Link to Article" type="link" url="http://www.theguardian.com/uk-news/2013/aug/17/princess-diana-death-police-information" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376787574_wWqRFwmB.html" />
      <outline text="Sun, 18 Aug 2013 00:59" />
                      <outline text="" />
                      <outline text="Princess Diana, pictured, Dodi Fayed and their chauffeur died in a car crash in Paris in 1997. Photograph: Tim Rooke/Rex Features" />
                      <outline text="The Metropolitan police are to assess new information about the deaths of Princess Diana and Dodi Fayed in a road crash in Paris in 1997." />
                      <outline text="Scotland Yard did not elaborate on the information, or its source, but Sky News said it had come from the former parents-in-law of a former soldier and had been passed on by the Royal Military police." />
                      <outline text="The information, which is thought to include the allegation that the Princess of Wales, Fayed and their driver Henri Paul were killed by a member of the British military, will be assessed by officers from the Specialist Crime and Operations Command." />
                      <outline text="The force said in a statement on Saturday night that it was studying information into the deaths that it had recently received and was &quot;assessing its relevance and credibility&quot;." />
                      <outline text="&quot;This is not a reinvestigation and does not come under Operation Paget,&quot; it said, referring to the police investigation into previous allegations of murder, led by former Met police commissioner Lord Stevens, which reported back in December 2006. It rejected claims of murder and said Paul had been drinking and was driving too fast. Diana, Fayed and their chauffeur were killed when their car crashed in a road tunnel while being pursued by photographers, after the couple left the Ritz hotel on 31 August 1997." />
                      <outline text="The deaths of Diana and Fayed were further investigated and examined during a 90-day inquest led by Lord Justice Scott Baker at the Royal Courts of Justice in 2007." />
                      <outline text="The police statement noted the inquest jury concluded their verdict as &quot;unlawful killing, grossly negligent driving of the following vehicles and of the Mercedes [in which the couple were travelling]&quot;." />
                      <outline text="A royal spokeswoman said there would be no comment on the new information. Diana, mother of Princes William and Harry, was 36 at the time of her death, while Fayed was 42." />
                      <outline text="Fayed&apos;s father, Mohamed Al Fayed, former owner of the Harrods department store, has long claimed the couple were murdered. A spokesman for Fayed said he had no comment to make, but that he would be &quot;interested in seeing the outcome&quot;, adding that he trusted the Met would investigate the information &quot;with vigour&quot;." />
              </outline>

              <outline text="Google goes down for five minutes on Friday night, global internet traffic drops 40%: report  - NY Daily News">
                      <outline text="Link to Article" type="link" url="http://www.nydailynews.com/news/national/google-minutes-web-traffic-plummets-article-1.1429712" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376787190_nkFq8X9W.html" />
      <outline text="Sun, 18 Aug 2013 00:53" />
                      <outline text="" />
                      <outline text="ANDREW KELLY/REUTERSGoogle went black for five minutes on Friday night, causing panic on Twitter and massive dips in internet traffic." />
                      <outline text="The world almost ended on Friday night." />
                      <outline text="At least one would surmise that from the panicked messages on Twitter saying that Google, along with several of its wildly-popular services like YouTube and Gmail, were all down." />
                      <outline text="PHOTOS: GOOGLE EARTH DISCOVERIES" />
                      <outline text="And reports show that the internet search giant did have issues Friday accounting for up to a 40% drop in global web traffic from 11:52pm to 11:57pm British Summer Time." />
                      <outline text="Web analytics company GoSquared showed a massive dip in internet traffic during the brief blackout as users struggled to find what it was they were looking for on the worldwide web." />
                      <outline text="PHOTOS: BIZARRE IMAGES CAPTURED BY GOOGLE&apos;S STREET VIEW CAMERAS" />
                      <outline text="GoSquared developer Simon Tabor told Sky News that the blackout was &quot;huge.&quot;" />
                      <outline text="&quot;As internet users, our reliance on Google.com being up is huge.&quot;" />
                      <outline text="PHOTOS: 2011&apos;S MOST RIDICULOUS INTERNET MEMES" />
                      <outline text="The company did not immediately return the Daily News&apos; request for comment. In fact, Google&apos;s only conspicuous acknowledgement to the blackout lies in its Apps Status Dashboard, showing everything from Gmail to Google Drive and everything in between being down on Aug. 16." />
                      <outline text="When Google when down, the tweets went up." />
                      <outline text="PHOTOS: GOOGLE CHROME COMIC BOOK" />
                      <outline text="According to Topsy analytics, tweets per minute skyrocketed around the point that Google went black, from an average of 200 tweets per minute about Google to more than 1,000." />
                      <outline text="&quot;For five freakin&apos; minutes!&quot; one Twitter user complained. Another wrote, &quot;Google was down for five minutes&apos;... Is it a sign that the END OF THE WORLD has started?&quot;" />
                      <outline text="It is unclear how much revenue was lost by the short-lived but intense outage, though some experts are putting it in the hundreds of thousands of dollars." />
                      <outline text="This isn&apos;t the first time Google has gone dark. The services went down in May 2009 and was later blamed on a massive server failure." />
                      <outline text="bstebner@nydailynews.com" />
              </outline>

              <outline text="GoSquared Engineering &apos;-- Google&apos;s downtime caused a 40% in global traffic">
                      <outline text="Link to Article" type="link" url="https://engineering.gosquared.com/googles-downtime-40-drop-in-traffic" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376787156_cGTHJKdn.html" />
      <outline text="Sun, 18 Aug 2013 00:52" />
                      <outline text="" />
                      <outline text="Google.com was down for a few minutes between 23:52 and 23:57 BST on 16th August 2013. This had a huge effect in the number of pageviews coming into GoSquared&apos;s real-time tracking &apos;&apos; around a 40% drop, as this graph of our global pageviews per minute shows." />
                      <outline text="That&apos;s huge. As internet users, our reliance on google.com being up is huge. It&apos;s also of note that pageviews spiked shortly afterwards, as users managed to get to their destination." />
              </outline>

              <outline text="Bloomberg seeks mandatory fingerprinting for NYC public housing residents">
                      <outline text="Link to Article" type="link" url="http://rt.com/usa/bloomberg-fingerprinting-public-housing-610/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376786738_STchQa2r.html" />
        <outline text="Source: RT - USA" type="link" url="http://rt.com/rss/usa/" />
      <outline text="Sun, 18 Aug 2013 00:45" />
                      <outline text="" />
                      <outline text="The 620,000 residents living in public housing projects should be fingerprinted as a crime-prevention measure, said New York Mayor Michael Bloomberg, but many city residents protest that the proposal is an invasion of privacy." />
                      <outline text="Bloomberg, 71, who has acquired a reputation for promoting controversial ideas, including imposing a ban on the sale of large soft drinks, says his latest proposal will make public housing safer." />
                      <outline text="&apos;&apos;The people that live (in public housing), most of them, want more police protection,&apos;&apos; the three-time mayor said on his weekly WOR radio broadcast Friday. &apos;&apos;They want more people. If you have strangers walking in the halls of your apartment building, don&apos;t you want somebody to stop and say: &apos;Who are you, why are you here?&apos;&apos;&apos;" />
                      <outline text="He added: &apos;&apos;What we really should have is fingerprinting to get in, since there&apos;s an allegation that some of the apartments aren&apos;t occupied by the people who originally have the lease.&apos;&apos;" />
                      <outline text="Just 5 percent of New York&apos;s population lives in public housing, but 20 percent of the city&apos;s reported crime is committed by residents of government-subsidized housing projects, Bloomberg said." />
                      <outline text="&apos;&apos;We&apos;ve just got to find some way to keep bringing crime down there.&apos;&apos;" />
                      <outline text="His spokesman said Bloomberg wants to introduce biometric security technology that would include the introduction of a citywide electronic keycard system for housing residents, AP reported." />
                      <outline text="Critics say Bloomberg&apos;s latest proposal is a political step too far, especially as it comes on the heels of the highly divisive stop-and-frisk legislation, which opponents say amounts to racial profiling on the part of the police." />
                      <outline text="&apos;&apos;We live here all these years, I mean, what seems to be the problem? This is not jail,&apos;&apos; Deborah Gatling, a resident of Chelsea Houses, told CBS." />
                      <outline text="US District Judge Shira A. Scheindlin on Monday ruled that the NYPD&apos;s stop-and-frisk searches are a violation of constitutional rights, according to documents filed in a Manhattan court." />
                      <outline text="The federal court found that stop-and-frisk represented a violation of the Fourth Amendment, which forbids unreasonable searches. The court presented statistics that police conducted at least 200,000 such searches without reasonable suspicion from 2004 through 2012." />
                      <outline text="Bloomberg, whose estimated fortune is $27 billion, making him the US&apos;s 7th-wealthiest person, defended the stop-and-frisk policy, arguing it had contributed to a falling murder rate in the city. Murders have been halved since he took office nearly 12 years ago, he noted." />
                      <outline text="New York City officials say they will file an appeal against Scheindlin&apos;s decision." />
                      <outline text="In a recent poll conducted by The New York Times, people were asked to rate Michael Bloomberg&apos;s 12 years as the city&apos;s 108th mayor: 52 percent described his performance as fair or poor, compared with 46 percent who described it as excellent or good." />
                      <outline text="Meanwhile, the controversial stop-and-frisk tactic, which city officials say has also reduced gun violence, has split the electorate: 50 percent approve and 47 percent disapprove of it, the poll found. Public approval for the policing tactic that critics slam as racial profiling is lowest among black residents (28 percent), compared with whites (55 percent) and Hispanics (59 percent)." />
                      <outline text="Following the global financial crash of 2008, Bloomberg requested that restrictions on term limits for New York mayors be relaxed to enable him to run again to bring the city out of the crisis. In October 2008, the City Council voted 29&apos;&apos;22 in favor of extending the limit to three consecutive four-year terms, thus allowing Bloomberg to run again." />
                      <outline text="The next New York City mayoral election is scheduled to occur on November 5, 2013." />
              </outline>

              <outline text="Mayoral Candidates Slam Bloomberg Over Fingerprint Comments">
                      <outline text="Link to Article" type="link" url="http://www.wor710.com/articles/local-news-465659/mayoral-candidates-slam-bloomberg-over-fingerprint-11579591/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376786663_thSrZ7Wx.html" />
      <outline text="Sun, 18 Aug 2013 00:44" />
                      <outline text="" />
                      <outline text="Posted Friday, August 16th 2013 @ 2pm" />
                      <outline text="Comments Mayor Bloomberg made on WOR 710&apos;s &quot;The John Gambling Show&quot; Friday is causing an uproar among the mayoral candidates. Bloomberg told John Gambling, &quot;what we really should have is fingerprinting to get in,&quot; when talking about ways to improve safety in NYC&apos;s public housing." />
                      <outline text="Since making those comments numerous mayoral candidates have come out blasting Bloomberg&apos;s suggestion." />
                      <outline text="Bill Thompson: &quot;Just like stop-and-frisk, this is another direct act of treating minorities like criminals,&apos;&apos; Thompson said in a statement. &quot;Mayor Bloomberg wants to make New Yorkers feel like prisoners in their own homes.&quot;" />
                      <outline text="Bill de Blasio: &quot;The mayor&apos;s comments that New Yorkers who enter public housing should be fingerprinted is outrageous and insulting, and shows just how out of touch this administration has become,&quot; de Blasio said in a statement. &quot;Mayor Bloomberg needs to apologize for these remarks.&quot;" />
                      <outline text="According to the Wall Street Journal, both Thompson and de Blasio have suggested installing security cameras in public housing to try and improve safety." />
                      <outline text="Listen to Bloomberg&apos;s comments on WOR 710 below." />
                      <outline text="Photo Credit: Getty Images" />
                      <outline text=" " />
              </outline>

              <outline text="Prospective Grant of Exclusive License: Development of Brachyury Tumor Associated Antigens as Cancer Vaccines for Colorectal Cancer">
                      <outline text="Link to Article" type="link" url="https://www.federalregister.gov/articles/2013/08/19/2013-20057/prospective-grant-of-exclusive-license-development-of-brachyury-tumor-associated-antigens-as-cancer" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376782564_nd49A7G8.html" />
        <outline text="Source: Federal Register Latest Entries" type="link" url="http://www.federalregister.gov/articles.rss" />
      <outline text="Sat, 17 Aug 2013 12:51" />
                      <outline text="" />
                      <outline text="This is notice, in accordance with 35 U.S.C. 209 and 37 CFR Part 404, that the National Institutes of Health, Department of Health and Human Services, is contemplating the grant of an exclusive patent license to practice the inventions embodied in the following U.S. Patents and Patent Applications to Bavarian Nordic Immunotherapeutics (&apos;&apos;BNIT&apos;&apos;) located in Mountain View, CA, USA." />
                      <outline text="Intellectual Property: U.S. Provisional Patent Application No. 61/701,528 [HHS Ref. No. E-054-2011/0-US-01] filed September 17, 2012, entitled &apos;&apos;Methods and Compositions for the Treatment of Cancer,&apos;&apos; as well as all international applications, continuation applications and divisional applications." />
                      <outline text="The patent rights in these inventions have been assigned to the government of the United States of America." />
                      <outline text="The prospective exclusive license territory may be worldwide and the field of use will be limited to the use of Licensed Patent Rights for development of pox virus-based immunotherapeutics for colorectal cancer." />
                      <outline text=" " />
                      <outline text="Only written comments and/or applications for a license which are received by the NIH Office of Technology Transfer on or before September 18, 2013 will be considered." />
                      <outline text="Requests for copies of the patent application, inquiries, and comments relating to the contemplated exclusive license should be directed to: Sabarni K. Chatterjee, Ph.D., M.B.A. Licensing and Patenting Manager, Cancer Branch, Office of Technology Transfer, National Institutes of Health, 6011 Executive Boulevard, Suite 325, Rockville, MD 20852-3804; Telephone: (301) 435-5587; Facsimile: (301) 435-4013; Email: chatterjeesa@od.nih.gov." />
                      <outline text="Cancer immunotherapy is a recent approach where tumor associated antigens (TAAs), which are primarily expressed in human tumor cells and not expressed or minimally expressed in normal tissues, are employed to generate a tumor-specific immune response. Specifically, these antigens serve as targets for the host immune system and elicit responses that result in tumor destruction." />
                      <outline text="The technology relates to the development of cancer vaccines utilizing pox virus vectors encoding proteins involved in regulating the epithelial-to-mesenchymal transition (EMT) during vertebrate development, as a cancer antigen. Dr. Jeffrey Schlom et al. at NCI have demonstrated for the first time that a T-box transcription factor and a molecule implicated in EMT, namely the Brachyury protein, appears to be highly expressed in metastasizing tumor cells, and could be a potential target for human T-cell mediated cancer immunotherapy, such as for tumors of the lung, intestine, stomach, kidney, bladder, uterus, ovary, testis, colon and chronic lymphocytic leukemia." />
                      <outline text="The prospective exclusive license will be royalty bearing and will comply with the terms and conditions of 35 U.S.C. 209 and 37 CFR 404.7. The prospective exclusive license may be granted unless within thirty (30) days from the date of this published notice, the NIH receives written evidence and argument that establishes that the grant of the license would not be consistent with the requirements of 35 U.S.C. 209 and 37 CFR 404.7." />
                      <outline text="Applications for a license in the field of use filed in response to this notice will be treated as objections to the grant of the contemplated exclusive license. Comments and objections submitted to this notice will not be made available for public inspection and, to the extent permitted by law, will not be released under the Freedom of Information Act, 5 U.S.C. 552." />
                      <outline text="Dated: August 13, 2013." />
                      <outline text="Richard U. Rodriguez," />
                      <outline text="Director, Division of Technology Development and Transfer, Office of Technology Transfer, National Institutes of Health." />
                      <outline text="[FR Doc. 2013-20057 Filed 8-16-13; 8:45 am]" />
                      <outline text="BILLING CODE 4140-01-P" />
              </outline>

              <outline text="Remote Neural Monitoring : A Technology Used For Controlling Human Brain">
                      <outline text="Link to Article" type="link" url="http://hassam.hubpages.com/hub/Remote-Neural-Monitoring--A-Technology-Used-For-Controlling-Human-Brain" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376778584_ucLBMdSY.html" />
      <outline text="Sat, 17 Aug 2013 22:29" />
                      <outline text="" />
                      <outline text="HAVE you ever thought about something you never shared with anyone, and have been horror-struck at the mere thought of someone coming to know about your little secret? If you have, then you probably have all the more reason to be paranoid now thanks to new and improved security systems being developed around the world to deal with terrorism that inadvertently end up impinging on one&apos;s privacy." />
                      <outline text="Some of the countries involved in such programmes include USA, UK, Spain, Germany and France. Recently, the National Security Agency (NSA) of the US has developed a very efficient method of controlling the human brain. This technology is called Remote Neural Monitoring (RNM) and is expected to revolutionise crime detection and investigation.What is it?RNM works remotely to control the brain in order to read and detect any criminal thought taking place inside the mind of a possible perpetrator. Research studies have shown that the human brain thinks at a rate of about 5000 bits per second and does not have the capacity to compete with supercomputers performing via satellites, implants and biotelemetry. The human brain has a distinctive set of bioelectric resonance system. For the RNM system, supercomputers are being used and, thus, with its help, supercomputers can send messages through an implanted person&apos;s nervous system in order to influence their performance in a desired way." />
                      <outline text="RNM has been developed after about 50 years of neuro-electromagnetic involuntary human experimentations. According to many scientists, within a few years it is expected that DNA microchips will be implanted in the human brain which would make it inherently controllable. With RNM, it will be possible to read and control a person&apos;s emotional thought processes along with the subconscious and dreams. At present, around the world, supercomputers are monitoring millions of people simultaneously with the speed of 20 billion bits per second especially in countries like USA, Japan, Israel and many European countries.RNM has a set of certain programs functioning at different levels, like the signals intelligence system which uses electromagnetic frequencies (EMF), to stimulate the brain for RNM and the electronic brain link (EBL). The EMF Brain Stimulation system has been designed as radiation intelligence which means receiving information from inadvertently originated electromagnetic waves in the environment. However, it is not related to radioactivity or nuclear detonation. The recording machines in the signals intelligence system have electronic equipment that investigate electrical activity in humans from a distance. This computer-generated brain mapping can constantly monitor all electrical activities in the brain. The recording aid system decodes individual brain maps for security purposes.See all 2 photos" />
                      <outline text="What does it do?For purposes of electronic evaluation, electrical activity in the speech centre of the brain can be translated in to the subject&apos;s verbal thoughts. RNM can send encoded signals to the auditory cortex of the brain directly bypassing the ear. This encoding helps in detecting audio communication. It can also perform electrical mapping of the brain&apos;s activity from the visual centre of the brain, which it does by bypassing the eyes and optic nerves, thus projecting images from the subject&apos;s brain onto a video monitor. With this visual and audio memory, both can be visualised and analysed. This system can, remotely and non-invasively, detect information by digitally decoding the evoked potentials in 30-50Hz, 5 millwatt electromagnetic emissions from the brain. The nerves produce a shifting electrical pattern with a shifting magnetic flux which then puts on a constant amount of electromagnetic waves. There are spikes and patterns which are called evoked potentials in the electromagnetic emission from the brain. The interesting part about this is that the entire exercise is carried out without any physical contact with the subject." />
                      <outline text="The EMF emissions from the brain can be decoded into current thoughts, images and sounds in the subject&apos;s brain. It sends complicated codes and electromagnetic pulse signals to activate evoked potentials inside the brain, thus generating sounds and visual images in the neural circuits. With its speech, auditory and visual communication systems, RNM allows for a complete audio-visual brain to brain link or a brain-to-computer link." />
                      <outline text="Of course, the mechanism needs to decode the resonance frequency of each specific site to modulate the insertion of information in that specific location of the brain. RNM can also detect hearing via electromagnetic microwaves, and it also features the transmission of specific commands into the subconscious, producing visual disturbances, visual hallucinations and injection of words and numbers in to the brain through electromagnetic radiation waves. Also, it manipulates emotions and thoughts and reads thoughts remotely, causes pain to any nerve of the body, allows for remote manipulation of behaviour, controls sleep patterns through which control over communication is made easy. This can be used for crime investigation and security management." />
                      <outline text="See all 2 photos" />
                      <outline text="ConcernsWith all the given benefits of RNM for tracking the illicit and treacherous activities, there are many concerns and risks being pointed out by human rights activists and other scientists. The agencies of human rights around the world have criticised RNM as a violation of basic human rights because it violates privacy and the dignity of thoughts and activities of life. Several countries have protested against it and refer to it as an attack on their human and civil rights. The scientists protesting against the use of RNM believe that people who have been implanted involuntarily become biological robots and guinea pigs for RNM activities in the guise of security. This is an important biological concern related to microchip implantation, which is a hidden technology using microwave radiations for the control of the mind." />
                      <outline text="Scientists believe that like leukemia and the cancerous risks posed by mobile phones which also emit microwaves, RNM can also pose similar threats to a subject&apos;s overall health as the heating effect of tissues with the speed of light is a known effect of high powered microwave and electromagnetic pulse weapons." />
                      <outline text="Thus, RNM remains a controversial technology which is being used in many countries for security maintenance and surveillance." />
                      <outline text=" Last updated on October 22, 2011" />
                      <outline text="You can help the HubPages community highlight top quality content by ranking this article up or down." />
              </outline>

              <outline text="Atomic Show #183 - Arjun Makhijani Explains Carbon Free, Nuclear Free Strategy - Atomic Insights">
                      <outline text="Link to Article" type="link" url="http://atomicinsights.com/atomic-show-183-arjun-makhijani-explains-carbon-free-nuclear-free-strategy/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376776719_9dWN4Dy4.html" />
      <outline text="Sat, 17 Aug 2013 21:58" />
                      <outline text="" />
                      <outline text="Dr. Arjun Makhijani has been fighting against the use of nuclear fission energy since his college days in the late 1960s. He was influenced by Professor Thomas Pigford at the University of California, Berkeley who lectured on the need to build 1000 nuclear reactors because using fission was better than depending on coal." />
                      <outline text="After hearing that lecture, Makhijani questioned the need for using so much power in the first place. He spent the next year developing what he called one of the first papers on energy efficiency. Makhijani earned his PhD in 1972. That PhD was awarded in Electrical Engineering. Here is the description of his PhD from his CV:" />
                      <outline text="&apos;&apos;Area of specialization: plasma physics as applied to controlled nuclear fusion. Dissertation topic: multiple mirror confinement of plasmas. Minor fields of doctoral study: statistics and physics.&apos;&apos;" />
                      <outline text="After earning his PhD, Makhijani spent the next two years working on the Ford Foundation Energy Policy Project. He was one of the principle authors of the report. He held a variety of academic positions during the period from 1979-1988" />
                      <outline text="In 1987 Makhijani started working part time for the Institute for Energy and Environmental Research (IEER) which is located in Takoma Park, MD. In 1988 he became the President and Senior Engineer at IEER." />
                      <outline text="Takoma Park is also the home of NIRS and Beyond Nuclear. Robert Alvarez lived there at the time that he served in the Department of Energy." />
                      <outline text="It is a place where antinuclear activism is commonplace." />
                      <outline text="Dr. Makhijani abruptly ended the call, but I think you will enjoy the conversation anyway." />
                      <outline text="Links to documents mentioned during the discussion:" />
                      <outline text="Carbon Free Nuclear Free (PDF download version)" />
                      <outline text="NUREG 1738" />
                      <outline text="Podcast: Play in new window | Download" />
              </outline>

              <outline text="Home - Institute for Energy and Environmental Research">
                      <outline text="Link to Article" type="link" url="http://ieer.org/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376776627_AtC3A7aN.html" />
      <outline text="Sat, 17 Aug 2013 21:57" />
                      <outline text="" />
                      <outline text="Welcome to our new website! We are still uploading our content, so please bear with us during this process. Feel free to contact us if you have any questions. &apos;&apos; IEER Staff" />
                      <outline text="IEER provides activists, policy-makers, journalists, and the public with understandable and accurate scientific and technical information on energy and environmental issues." />
                      <outline text="Your contribution supports IEER efforts to achieve a carbon-free and nuclear-free energy system, prevent nuclear proliferation, and protect environmental and human health." />
              </outline>

              <outline text="VIDEO-Fukushima Reinforces Worst Fears for Japanese Who Are Anti-Nuclear Power | PBS NewsHour | Aug. 8, 2013 | PBS">
                      <outline text="Link to Article" type="link" url="http://www.pbs.org/newshour/bb/world/july-dec13/japan2_08-08.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376776205_M8LEdUuv.html" />
      <outline text="Sat, 17 Aug 2013 21:50" />
                      <outline text="" />
                      <outline text="And we&apos;re joined by Arjun Makhijani, an engineer -- engineer specializing in nuclear fusion. He&apos;s the president of the Institute for Energy and Environmental Research. And Kenji Kushida, research associate in Japanese studies at Stanford University." />
                      <outline text="Well, Arjun Makhijani, let me start with you. Translate for us first to bring us up to date. What exactly is the problem now and how serious is it?" />
                      <outline text="ARJUN MAKHIJANI, Institute for Energy and Environmental Research: So there are a couple of different problems. One of the problems is what they have found in the groundwater and what actually is there." />
                      <outline text="So, so far, we have been concerned about an element called cesium, cesium 137 and 134, which is radioactive. But now they have found strontium-90, which is much more dangerous, at levels that are 30 times more than cesium. So to give you an idea of the level of contamination, if somebody drank that water for a year, they would almost certainly get cancer. So it&apos;s very contaminated." />
                      <outline text="So that&apos;s one problem. The other is the defenses to hold back this water from the sea seem to be overcome. So now the contaminated waters, 70,000, 80,000 gallons is flowing into the sea every day." />
                      <outline text="JEFFREY BROWN: And do we know how far out to sea this contaminated water is going and what happens to it when it goes into the sea?" />
                      <outline text="ARJUN MAKHIJANI: Well, when it goes into the sea, of course, some of it will disperse and dilute. Some of it goes into the sediment and some of it is taken up by the life in the sea." />
                      <outline text="And the unfortunate thing about strontium especially is that it bioaccumulates in algae, it bioaccumulates in fish. It targets the bone, because it&apos;s like calcium. And so this is a problem. We don&apos;t have measurements far out to sea. The Woods Hole Institute has done some surveys. And they were surprised by how much continuing radioactivity they found, but no clear explanation yet." />
                      <outline text="JEFFREY BROWN: All right." />
                      <outline text="Well, Kenji Kushida, how has this news been received in Japan and what is the level of trust at this point in both the company and the government?" />
                      <outline text="KENJI KUSHIDA, Stanford University: Well, clearly, trust in the company has gone down quite seriously, even from a low point after the accident." />
                      <outline text="And the government does need to -- basically, they don&apos;t have to call an election for about three years, so the government is trying to shore up its decision to support restarting nuclear reactors by showing some kind of commitment to preventing this disaster from getting too much worse." />
                      <outline text="JEFFREY BROWN: Well, what kind of steps is it taking and how much has it -- we just heard the clips in the setup talking about action. What kinds of things are they proposing and how energized, how seriously are they taking this?" />
                      <outline text="KENJI KUSHIDA: Well, it seems to be fairly serious, because the budget that they&apos;re asking for is for the following year, for the fiscal year of 2014, to help shore up the defenses against this." />
                      <outline text="And TEPCO itself, it&apos;s been de facto nationalized. So, in essence, it&apos;s basically the government&apos;s problem. The buck stops with the government. So how to deal with this 400 tons a day of water pouring from the underground passageways into the reactor buildings, that&apos;s a problem that the government has to deal with." />
                      <outline text="And about 50 percent of the population in a recent poll was against restarting nuclear reactors after certifying their safety, and about 40 percent were supporting the restarting. And the government, as a strong supporter of restarting reactors, do feel it&apos;s quite a bit of their responsibility to deal with it." />
                      <outline text="JEFFREY BROWN: All right, well, I want to come back to that subject, but first, Arjun Makhijani, what about these measures that they&apos;re taking to try to stop the contamination, the leaking water, building tanks, walls, freezing the ground?" />
                      <outline text="ARJUN MAKHIJANI: Yes." />
                      <outline text="Well, you know, they already built this chemical-reinforced wall, and what happened, of course, it&apos;s like a dam, so you have water coming in from upstream, above the plant. And then at a certain point, it&apos;s going to get -- overtop the dam. It&apos;s like constant rain coming into a reservoir." />
                      <outline text="And so that has been the problem, is those defenses have been breached because there&apos;s too much water and not enough wall. And at a certain point that&apos;s always going to be the case. It seems to me that there&apos;s a risk the same thing will happen with this new wall, because they already had a wall and it didn&apos;t work. So, building a new and longer wall would work for some time." />
                      <outline text="The other problem is, of course, you need a massive amount of water to freeze that much soil. It would be a mile-long, apparently. If you have a power failure, another major earthquake -- they had a power failure a few months ago when a rat ate through a wire -- and that would then be very, very problematic, because now you have got so much water behind." />
                      <outline text="We actually sent a proposal to Japan two years ago, some colleagues of mine and I, saying you should park a supertanker or a large tanker offshore, and put the water in it, and send it off someplace else so that the water treatment and the water management is not such a huge, constant issue. But..." />
                      <outline text="JEFFREY BROWN: It sounds like still an ongoing experiment." />
                      <outline text="ARJUN MAKHIJANI: Yes." />
                      <outline text="JEFFREY BROWN: Well, Kenji Kushida, come back to this question you were raising about the politics of this and the culture of nuclear power there." />
                      <outline text="There are still a lot of people that want to -- that feel it&apos;s necessary for Japan. Right? So, where does all that stand?" />
                      <outline text="KENJI KUSHIDA: Well, the funny thing about the recent Japanese politics is that the nuclear issue didn&apos;t -- wasn&apos;t part of the main issues that were debated." />
                      <outline text="It was mostly about the economy. And there was partly a reason for that. As I just mentioned, the public is pretty deeply divided over this. But, interestingly, in Tokyo, the local candidate from Tokyo metropolitan area was running on an anti-nuclear power platform, and he got elected pretty safely." />
                      <outline text="So what we see here is the anti-nuclear power public, I mean, this is reinforces all their worst fears. You have the operator that doesn&apos;t seem to be in control, the government that says it&apos;s going to back it up, but the technological hurdles are just very high to doing that." />
                      <outline text="And, on the other hand, you have a fairly silent majority -- minority of about 40 percent who do think that some of the other reactors are necessary for maintaining Japan&apos;s economic competitiveness, because Japan doesn&apos;t have any natural resources. So, in the absence of nuclear power, they have to import very large amounts of liquid natural gas to basically generate the power that they need." />
                      <outline text="So there&apos;s this economic constraint that they see. And that&apos;s sort of where the public stands in its divisions." />
                      <outline text="JEFFREY BROWN: And very briefly..." />
                      <outline text="(CROSSTALK)" />
                      <outline text="JEFFREY BROWN: Oh, I&apos;m sorry." />
                      <outline text="I was going to ask very briefly, Arjun Makhijani, is -- those kinds of debates, is what happened still rattling the whole industry worldwide?" />
                      <outline text="ARJUN MAKHIJANI: Well, I think it is different in different places. It rattled Germany, and they decided to shut down. I don&apos;t think it&apos;s rattled the U.S. industry very much." />
                      <outline text="The French are somewhere in between. They, of course, get 75 percent of their power from nuclear, and they have decided or at least the president has said that they will decrease their nuclear to 50 percent. They&apos;re having a big energy debate, much more serious than we have had." />
                      <outline text="JEFFREY BROWN: All right, Arjun Makhijani and Kenji Kushida, thank you both very much." />
                      <outline text="KENJI KUSHIDA: Thank you." />
                      <outline text=" " />
              </outline>

              <outline text="Nuclear Expert: Fukushima Is &apos;Emergency Without End&apos; | Common Dreams">
                      <outline text="Link to Article" type="link" url="https://www.commondreams.org/headline/2013/08/10-0" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376776159_F98aSZQY.html" />
      <outline text="Sat, 17 Aug 2013 21:49" />
                      <outline text="" />
                      <outline text="Photo: Matthias Lambrecht/cc/flickrAs the disaster at Fukushima plant continues to unfold, one nuclear expert is warning that &quot;this is an accident that&apos;s shockingly not stopping.&quot;" />
                      <outline text="Arjun Makhijani, President of the Institute for Energy and Environmental Research (IEER), sounds particular alarm around radioactive strontium that is being released from the trouble-stricken plant:" />
                      <outline text="Fukushima continues to be an emergency without end &apos;&apos; vast amounts of radioactivity, including strontium-90 in the groundwater, evidence of leaks into the sea, the prospect of contaminated seafood. Strontium-90, being a calcium analog, bioaccumulates in the food chain. It is likely to be a seaside nightmare for decades." />
                      <outline text="Speaking with PBS Newshour this week, the Carbon-Free and Nuclear-Free author said that strontium is &quot;much more dangerous&quot; than the cesium 137 and 134 being released from Fukushima, and was found &quot;at levels that are 30 times more than cesium.&quot;  He continued:" />
                      <outline text="So to give you an idea of the level of contamination, if somebody drank that water for a year, they would almost certainly get cancer. So it&apos;s very contaminated." />
                      <outline text="So that&apos;s one problem. The other is the defenses to hold back this water from the sea seem to be overcome. So now the contaminated waters, 70,000, 80,000 gallons is flowing into the sea every day." />
                      <outline text="Dr. Makhijani speaking on PBS Newshour this week. (Sreenshot)When asked what happens when this radioactive strontium reaches the sea, Makhijani replied:" />
                      <outline text="Well, when it goes into the sea, of course, some of it will disperse and dilute. Some of it goes into the sediment and some of it is taken up by the life in the sea." />
                      <outline text="And the unfortunate thing about strontium especially is that it bioaccumulates in algae, it bioaccumulates in fish. It targets the bone, because it&apos;s like calcium. And so this is a problem. We don&apos;t have measurements far out to sea. The Woods Hole Institute has done some surveys. And they were surprised by how much continuing radioactivity they found, but no clear explanation yet." />
                      <outline text="But it&apos;s not just fish that will take in the radiation." />
                      <outline text="When Living on Earth asked Makhijani about how the radioactivity could affect human health, he said:" />
                      <outline text="Well, the strontium-90 and the cesium would both be perilous, and since the strontium-90 is more mobile and also more dangerous biologically, strontium behaves like calcium, so it goes to the bone. It also bioaccumulates in the base of the food chain and algae. Ultimately because it does bioaccumulate and there is quite a lot of strontium, you could have a large part of the food chain near Fukushima being contaminated." />
                      <outline text="If pregnant women eat the contaminated fish or drink the contaminated water, he said" />
                      <outline text="the outcomes could be worse than cancer because then you&apos;re talking about a much more compromised child in the sense of having a compromised immune system - it makes you more vulnerable to all kinds of diseases." />
                      <outline text="Just how TEPCO or other authorities will be able to deal with this &quot;radioactivity that&apos;s essentially forever&quot; is uncertain, he continued." />
                      <outline text="It&apos;s very, very unclear to me how they are going to be able to get at this molten fuel, extract it from the bottoms of these highly damaged buildings and package it for safer or less dangerous storage or disposal." />
                      <outline text="&quot;This is an accident that&apos;s shockingly not stopping,&quot; he warned." />
                      <outline text="There is one certainty among the many unknowns, writes long-time anti-nuke activist Harvey Wasserman:" />
                      <outline text="[W]hat we now know all too well at Fukushima is that the world&apos;s worst atomic catastrophe is very far from over." />
                      <outline text="The only thing predictable is that worse news will come." />
                      <outline text="And when it does, our increasingly fragile planet will be further irradiated, at immeasurable cost to us all." />
                      <outline text="* * *" />
                      <outline text="Watch the PBS Newshour discussion between Makhijani, Kenji Kushida of Stanford University and host Jeffrey Brown below:" />
                      <outline text="Watch Fukushima Reinforces Worst Fears for Japanese on PBS. See more from PBS NewsHour." />
                      <outline text="_______________________" />
                      <outline text="This work is licensed under a Creative Commons Attribution-Share Alike 3.0 License" />
              </outline>

              <outline text="Atomic Show #183 - Discussion with Dr. Arjun Makhijani - Atomic Insights">
                      <outline text="Link to Article" type="link" url="http://atomicinsights.com/atomic-show-183-discussion-with-dr-arjun-makhijani/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376776128_7d5hf9N8.html" />
      <outline text="Sat, 17 Aug 2013 21:48" />
                      <outline text="" />
                      <outline text="This evening I had the opportunity to talk with Dr. Arjun Makhijani, the President and Senior Engineer at the Institute for Energy and Environmental Research (IEER) of Takoma Park, MD. The conversation is available at Atomic Show #183 &apos;&apos; Arjun Makhijani Explains Carbon Free, Nuclear Free Strategy" />
                      <outline text="Dr. Makhijani is the author of Carbon Free, Nuclear Free (PDF download copy). That book is dedicated to Helen Caldicott and S. David Freeman. Makhijani claims that they were the inspiration for the effort." />
                      <outline text="Our conversation abruptly ended when Dr. Makhijani realized that I was not accepting his answers. He seemed disturbed that I wanted to ask more probing questions than he was ready to answer." />
                      <outline text="Categories: Antinuclear activist, Fossil fuel competition" />
                      <outline text="About Rod Adams" />
                      <outline text="Pro-nuclear advocate with small nuclear plant operating and design experience. Former submarine Engineer Officer. Founder, Adams Atomic Engines, Inc. Host and producer, The Atomic Show Podcast. Resume available here. Please subscribe to the Atomic Show RSS feed." />
              </outline>

              <outline text="Arjun Makhijani - Wikipedia, the free encyclopedia">
                      <outline text="Link to Article" type="link" url="http://en.wikipedia.org/wiki/Arjun_Makhijani" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376776065_VShvrwyX.html" />
      <outline text="Sat, 17 Aug 2013 21:47" />
                      <outline text="" />
                      <outline text="Arjun Makhijani is an electrical and nuclear engineer who is President of the Institute for Energy and Environmental Research. Makhijani has written many books and reports analyzing the safety, economics, and efficiency of various energy sources. He has testified before Congress and has served as an expert witness in Nuclear Regulatory Commission proceedings." />
                      <outline text="Arjun Makhijani is an electrical and nuclear engineer with 37 years experience in energy and nuclear issues. He is President of the anti-nuclear Institute for Energy and Environmental Research. IEER has been doing nuclear-related studies for twenty years and is an independent non-profit organization located in Takoma Park, Maryland. Makhijani has a Ph.D. (Engineering), from the Department of Electrical Engineering and Computer Sciences of the University of California, Berkeley, where he specialized in the application of plasma physics to controlled nuclear fusion.[1]" />
                      <outline text="Makhijani has extensive professional experience and is qualified in radioactive waste disposal, standards for protection of human health from radiation, and the relative costs and benefits of nuclear energy and other energy sources. He has testified before Congress and has served as a consultant on energy issues to utilities and other organizations, including the Tennessee Valley Authority, the Lower Colorado River Authority, the Edison Electric Institute, the Lawrence Berkeley Laboratory, the Congressional Office of Technology Assessment, and several agencies of the United Nations. He has also served as an expert witness in Nuclear Regulatory Commission proceedings on nuclear facilities and in numerous lawsuits and has testified on a variety of issues including releases of radioactivity from nuclear facilities. He has testified before Congress on several occasions regarding issues related to nuclear waste, reprocessing, environmental releases of radioactivity, and regulation of nuclear weapons plants." />
                      <outline text="Makhijani has studied the French reprocessing and nuclear energy system and was the director of a team that analyzed ANDRA&apos;s plans for a geological repository for high level radioactive waste in France on behalf of a French government-sponsored stakeholder committee (2004)." />
                      <outline text="Arjun Makhijani has written a number of books and other publications analyzing the safety, economics, and efficiency of various energy sources, including nuclear power and renewable energy sources such as wind power and solar energy. He was the principal author of the first evaluation of energy end-uses and energy efficiency potential in the U.S. economy (published by the Electronics Research Laboratory, University of California at Berkeley in 1971). He was also the principal author of the first overview study on Energy and Agriculture in the Third World[2] (Ballinger 1975). He was one of the principal technical staff of the Ford Foundation Energy Policy Project, and a co-author of its final report, A Time to Choose,[3] which helped shape U.S. energy policy during the mid-to-late 1970s. He is a co-author of Investment Planning in the Electricity Sector, published by the Lawrence Berkeley Laboratory in 1976. He is also the principal author of Nuclear Power Deception[4] (Apex Books 1999), an analysis of the costs of nuclear power in the United States and a co-author and principal editor of the first global assessment of the health and environmental effects of nuclear weapons production (Nuclear Wastelands,[5] 1995 and 2000), which was nominated for a Pulitzer Prize by MIT Press. Most recently, Makhijani has authored Carbon-Free and Nuclear-Free[6] (RDR Books and IEER Press 2007), the first analysis of a transition to a U.S. economy based completely on renewable energy, without any use of fossil fuels or nuclear power. He has many published articles in journals such as The Bulletin of the Atomic Scientists and The Progressive, as well as in newspapers, including the Washington Post. Arjun Makhijani has appeared on ABC World News Tonight, the CBS Evening News, 60 Minutes, NPR, CNN, and BBC, among others.[7]" />
                      <outline text="In 1989, Dr Makhijani received The John Bartlow Martin Award for Public Interest Magazine Journalism[8] of the Medill School of Journalism, Northwestern University, with Robert Alvarez; was awarded the Josephine Butler Nuclear Free Future Award in 2001;[9] the 2007/2008 Jane Bagley Lehman Award for Excellence in Public Advocacy[10] by the Tides Foundation; and was named a Ploughshares Hero, by the Ploughshares Fund (2006). In 2007, he was elected a Fellow of the American Physical Society.[7]" />
                      <outline text="&#094;IEER Program Staff Profiles&#094;&quot;Energy and Agriculture in the Third World&quot;&#094;&quot;A Time to Choose&quot;&#094;&quot;Nuclear Power Deception&quot;&#094;&quot;Nuclear Wastelands&quot;&#094;&apos;&apos;Carbon-Free and Nuclear-Free&apos;&apos;&#094; abShort Biography of Arjun Makhijani&#094;John Bartlow Martin Award&#094;DC Hiroshima-Nagasaki Peace Committee&#094;2007/2008 JBL AwardPersondataNameMakhijani, ArjunAlternative namesShort descriptionDate of birthPlace of birthDate of deathPlace of death" />
              </outline>

              <outline text="VIDEO- 08-17-13 Weekly Address - YouTube">
                      <outline text="Link to Article" type="link" url="http://www.youtube.com/watch?v=iXpbDmiGq-s" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376775786_XZenhX4r.html" />
      <outline text="Sat, 17 Aug 2013 21:43" />
                      <outline text="" />
              </outline>

              <outline text="The Vaccine Hoax is Over. Documents from UK reveal 30 Yeas of Cover-up | nsnbc international">
                      <outline text="Link to Article" type="link" url="http://nsnbc.me/2013/05/10/the-vaccine-hoax-is-over-freedom-of-information-act-documents-from-uk-reveal-30-years-of-coverup/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376775742_wKLAM5QB.html" />
      <outline text="Sat, 17 Aug 2013 21:42" />
                      <outline text="" />
                      <outline text="Andrew Baker ( FFN),- Freedom of Information Act in the UK filed by a doctor there has revealed 30 years of secret official documents showing that government experts have" />
                      <outline text="1. Known the vaccines don&apos;t work2. Known they cause the diseases they are supposed to prevent3. Known they are a hazard to children4. Colluded to lie to the public5. Worked to prevent safety studies" />
                      <outline text="Those are the same vaccines that are mandated to children in the US." />
                      <outline text="Educated parents can either get their children out of harm&apos;s way or continue living inside one of the largest most evil lies in history, that vaccines &apos;&apos; full of heavy metals, viral diseases, mycoplasma, fecal material, DNA fragments from other species, formaldehyde, polysorbate 80 (a sterilizing agent) &apos;&apos; are a miracle of modern medicine." />
                      <outline text="Freedom of Information Act filed in the US with the CDC by a doctor with an autistic son, seeking information on what the CDC knows about the dangers of vaccines, had by law to be responded to in 20 days. Nearly 7 years later, the doctor went to court and the CDC argued it does not have to turn over documents. A judge ordered the CDC to turn over the documents on September 30th, 2011." />
                      <outline text="On October 26, 2011, a Denver Post editorial expressed shock that the Obama administration, after promising to be especially transparent, was proposing changes to the Freedom of Information Act that would allow it to go beyond declaring some documents secret and to actually allow government agencies (such as the CDC) to declare some document &apos;&apos;non-existent.&apos;&apos;" />
                      <outline text="Simultaneous to this on-going massive CDC cover up involving its primary &apos;&apos;health&apos;&apos; not recommendation but MANDATE for American children, the CDC is in deep trouble over its decades of covering up the damaging effects of fluoride and affecting the lives of all Americans, especially children and the immune compromised. Lawsuits are being prepared.  Children are ingesting 3-4 times more fluoride by body weight as adults and &apos;&apos;[t]he sheer number of potentially harmed citizens &apos;-- persons with dental fluorosis, kidney patients tipped into needing dialysis, diabetics, thyroid patients, etc &apos;-- numbers in the millions.&apos;&apos;" />
                      <outline text="The CDC is obviously acting against the health of the American people. But the threat to the lives of the American people posed by the CDC&apos;s behavior does not stop there. It participated in designed pandemic laws that are on the books in every state in the US, which arrange for the government to use military to force unknown, untested vaccines, drugs, chemicals, and &apos;&apos;medical&apos;&apos; treatments on the entire country if it declares a pandemic emergency." />
                      <outline text="The CDC&apos;s credibility in declaring such a pandemic emergency is non-existent, again based on Freedom of Information Act. For in 2009, after the CDC had declared the H1N1 &apos;&apos;pandemic,&apos;&apos; the CDC refused to respond to Freedom of Information Act filed by CBS News and the CDC also attempted to block their investigation.  What the CDC was hiding was its part in one of the largest medical scandals in history, putting out wildly exaggerated data on what it claimed were H1N1 cases, and by doing so, created the false impression of a &apos;&apos;pandemic&apos;&apos; in the US." />
                      <outline text="The CDC was also covering up e financial scandal to rival the bailout since the vaccines for the false pandemic cost the US billions. And worse, the CDC put pregnant women first in line for an untested vaccine with a sterilizing agent, polysorbate 80, in it. Thanks to the CDC,  &apos;&apos;the number of vaccine-related &apos;&apos;fetal demise&apos;&apos; reports increased by 2,440 percent in 2009 compared to previous years, which is even more shocking than the miscarriage statistic [700% increase]." />
                      <outline text="The exposure of the vaccine hoax is running neck and neck with the much older hoax of a deadly 1918-19 flu. It was aspirin  that killed people in 1918-19, not a pandemic flu. It was the greatest industrial catastrophe in human history with 20-50 million people dying but it was blamed on a flu. The beginning of the drug industry began with that success (and Monsanto was part of it). The flu myth was used by George Bush to threaten the world with &apos;&apos;another pandemic flu that could kill millions&apos;&apos; &apos;&apos; a terror tactic to get pandemic laws on the books in every state and worldwide. Then the CDC used hoax of the pandemic hoax to create terror over H1N1 and to push deadly vaccines on the public, killing thousands of unborn children and others.  (CDC will not release the data and continues to push the same vaccine.)" />
                      <outline text="The hoax of the vaccine schedule is over, exposed by FOIAs in the UK. " />
                      <outline text="The hoax of the CDC&apos;s interest in children&apos;s lives has been exposed by its refusal to respond to a doctor&apos;s FOIAs around its knowledge of vaccine dangers." />
                      <outline text="The 1918-19 pandemic hoax has been exposed by Dr. Karen Starko&apos;s work on aspirin&apos;s role in killing people." />
                      <outline text="And despite refusing to respond to FOIAS, the CDC&apos;s scandalous hoax of a 2009 flu pandemic and its part in creating it, was exposed by CBS NEWS. " />
                      <outline text="And the Obama administration, in attempting to salvage the last vestige of secrecy around what is really happening with vaccines, by declaring agency documents non-existent, has made its claim of transparency, non-existent." />
                      <outline text="But pandemic laws arranging for unknown vaccines to be forced on the entire country are still in place with HHS creating a vaccine mixture that should never be used on anyone and all liability for vaccines having been removed. Meanwhile, a Canadian study has just proven that the flu vaccine containing the H1N1 vaccine which kills babies in utero, actually increases the risk of serious pandemic flu." />
                      <outline text="Americans who have been duped into submitting their children to the CDC&apos;s deadly vaccines, have a means to respond now. People from every walk of life and every organization, must" />
                      <outline text="1. take the information from the UK FOIAs exposing 30 years of vaccine lies, the refusal of the CDC to provide any information on what it knows about those lies, and the Obama Administration&apos;s efforts to hide the CDC&apos;s awareness of those lies, and go to their state legislatures, demand the immediate nullification of the CDC vaccine schedule and the pandemic laws." />
                      <outline text="2. inform every vet. active duty military person, law enforcement people, DHS agents and medical personnel they know, of the vaccine hoax, for their families are deeply threatened, too, but they may not be aware of it or that they have been folded into agency structures by the pharmaceutical industry (indistinguishable from the bankers and oil companies) that would make them agents of death for their country with the declaration of a &apos;&apos;pandemic&apos;&apos; emergency or &apos;&apos;bio-terrorist&apos;&apos; attack. It is completely clear now that the terrorism/bioterrorism structures are scams so that any actions taken to &apos;&apos;protect&apos;&apos; this country using those laws would in fact be what threatens the existence of Americans." />
                      <outline text="It was aspirin that killed millions in 1918-19.  Now it is mandated and unknown, untested vaccines with banned adjuvants in them that threaten the country with millions of deaths.  At the same time, the CDC is holding 500,000 mega-coffins, built to be incinerated, on its property outside Atlanta.  Not to put to fine a point on this, but it&apos;s clear now that the CDC should not be involved in any way with public health." />
                      <outline text="Thanks to the Freedom of Information Act (FOIA), we know that vaccines are not a miracle of modern medicine.  Any medical or government authority which insists vaccines prevent diseases is either ignorant of government documents (and endless studies) revealing the exact opposite or of the CDC&apos;s attempts to hide the truth about vaccines from the public, or means harm to the public." />
                      <outline text="Thanks to the Freedom of Information Act (FOIA), we know the vaccine schedule is a hoax." />
                      <outline text="The health danger to American children and adults are vaccines." />
                      <outline text="Andrew Baker via Food Freedom News" />
                      <outline text="Related article:" />
                      <outline text="Bill Gates&apos; Polio Vaccine Program Caused 47,500 Cases of Paralysis Death" />
                      <outline text="New Far East Killer Vaccine. More than 100.000 Deaths By Diverting Funds From Clean Water Programs For Ineffective and Dangerous Vaccine." />
                      <outline text="BBC News Removes False News Claims About Measles Epidemic &apos;&apos;after being busted&apos;&apos;" />
                      <outline text="Documentation" />
                      <outline text="The vaccination policy and the Code of Practice of the Joint Committee on Vaccination and Immunisation ( JCVI): are they at odds?" />
                      <outline text="Please support your independent media by getting a free subscription for nsnbc international at the bottom left and by donating a modest amount by using the donate button at the bottom right of our website. nsnbc international, your independent daily, for your daily independence. " />
              </outline>

              <outline text="NSA broke privacy rules thousands of times per year, audit finds - The Washington Post">
                      <outline text="Link to Article" type="link" url="http://m.washingtonpost.com/world/national-security/nsa-broke-privacy-rules-thousands-of-times-per-year-audit-finds/2013/08/15/3310e554-05ca-11e3-a07f-49ddc7417125_story.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376747008_Tebd2Cns.html" />
      <outline text="Sat, 17 Aug 2013 13:43" />
                      <outline text="" />
                      <outline text="By Barton Gellman, Published: AUGUST 15, 8:48 PM ET  Aa The National Security Agency has broken privacy rules or overstepped its legal authority thousands of times each year since Congress granted the agency broad new powers in 2008, according to an internal audit and other top-secret documents." />
                      <outline text="Most of the infractions involve unauthorized surveillance of Americans or foreign intelligence targets in the United States, both of which are restricted by statute and executive order. They range from significant violations of law to typographical errors that resulted in unintended interception of U.S. e-mails and telephone calls." />
                      <outline text="The documents, provided earlier this summer to The Washington Post by former NSA contractor Edward Snowden, include a level of detail and analysis that is not routinely shared with Congress or the special court that oversees surveillance. In one of the documents, agency personnel are instructed to remove details and substitute more generic language in reports to the Justice Department and the Office of the Director of National Intelligence." />
                      <outline text="In one instance, the NSA decided that it need not report the unintended surveillance of Americans. A notable example in 2008 was the interception of a &apos;&apos;large number&apos;&apos; of calls placed from Washington when a programming error confused the U.S. area code 202 for 20, the international dialing code for Egypt, according to a &apos;&apos;quality assurance&apos;&apos; review that was not distributed to the NSA&apos;s oversight staff." />
                      <outline text="In another case, the Foreign Intelligence Surveillance Court, which has authority over some NSA operations, did not learn about a new collection method until it had been in operation for many months. The court ruled it unconstitutional." />
                      <outline text="[FISA judge: Ability to police U.S. spying program is limited]" />
                      <outline text="The Obama administration has provided almost no public information about the NSA&apos;s compliance record. In June, after promising to explain the NSA&apos;s record in &apos;&apos;as transparent a way as we possibly can,&apos;&apos; Deputy Attorney General James Cole described extensive safeguards and oversight that keep the agency in check. &apos;&apos;Every now and then, there may be a mistake,&apos;&apos; Cole said in congressional testimony." />
                      <outline text="The NSA audit obtained by The Post, dated May 2012, counted 2,776 incidents in the preceding 12 months of unauthorized collection, storage, access to or distribution of legally protected communications. Most were unintended. Many involved failures of due diligence or violations of standard operating procedure. The most serious incidents included a violation of a court order and unauthorized use of data about more than 3,000 Americans and green-card holders." />
                      <outline text="In a statement in response to questions for this article, the NSA said it attempts to identify problems &apos;&apos;at the earliest possible moment, implement mitigation measures wherever possible, and drive the numbers down.&apos;&apos; The government was made aware of The Post&apos;s intention to publish the documents that accompany this article online." />
                      <outline text="&apos;&apos;We&apos;re a human-run agency operating in a complex environment with a number of different regulatory regimes, so at times we find ourselves on the wrong side of the line,&apos;&apos; a senior NSA official said in an interview, speaking with White House permission on the condition of anonymity." />
                      <outline text="&apos;&apos;You can look at it as a percentage of our total activity that occurs each day,&apos;&apos; he said. &apos;&apos;You look at a number in absolute terms that looks big, and when you look at it in relative terms, it looks a little different.&apos;&apos;" />
                      <outline text="There is no reliable way to calculate from the number of recorded compliance issues how many Americans have had their communications improperly collected, stored or distributed by the NSA." />
                      <outline text="The causes and severity of NSA infractions vary widely. One in 10 incidents is attributed to a typographical error in which an analyst enters an incorrect query and retrieves data about U.S phone calls or e-mails." />
                      <outline text="But the more serious lapses include unauthorized access to intercepted communications, the distribution of protected content and the use of automated systems without built-in safeguards to prevent unlawful surveillance." />
                      <outline text="The May 2012 audit, intended for the agency&apos;s top leaders, counts only incidents at the NSA&apos;s Fort Meade headquarters and other &#173;facilities in the Washington area. Three government officials, speak&#173;ing on the condition of anonymity to discuss classified matters, said the number would be substantially higher if it included other NSA operating units and regional collection centers." />
                      <outline text="Senate Intelligence Committee Chairman Dianne Feinstein (D-Calif.), who did not receive a copy of the 2012 audit until The Post asked her staff about it, said in a statement late Thursday that the committee &apos;&apos;can and should do more to independently verify that NSA&apos;s operations are appropriate, and its reports of compliance incidents are accurate.&apos;&apos;" />
                      <outline text="Despite the quadrupling of the NSA&apos;s oversight staff after a series of significant violations in 2009, the rate of infractions increased throughout 2011 and early 2012. An NSA spokesman declined to disclose whether the trend has continued since last year." />
                      <outline text="One major problem is largely unpreventable, the audit says, because current operations rely on technology that cannot quickly determine whether a foreign mobile phone has entered the United States." />
                      <outline text="In what appears to be one of the most serious violations, the NSA diverted large volumes of international data passing through fiber-optic cables in the United States into a repository where the material could be stored temporarily for processing and selection." />
                      <outline text="The operation to obtain what the agency called &apos;&apos;multiple communications transactions&apos;&apos; collected and commingled U.S. and foreign e-mails, according to an article in SSO News, a top-secret internal newsletter of the NSA&apos;s Special Source Operations unit. NSA lawyers told the court that the agency could not practicably filter out the communications of Americans." />
                      <outline text="In October 2011, months after the program got underway, the Foreign Intelligence Surveillance Court ruled that the collection effort was unconstitutional. The court said that the methods used were &apos;&apos;deficient on statutory and constitutional grounds,&apos;&apos; according to a top-secret summary of the opinion, and it ordered the NSA to comply with standard privacy protections or stop the program." />
                      <outline text="James R. Clapper Jr., the director of national intelligence, has acknowledged that the court found the NSA in breach of the Fourth Amendment, which prohibits unreasonable searches and seizures, but the Obama administration has fought a Freedom of Information lawsuit that seeks the opinion." />
                      <outline text="Generally, the NSA reveals nothing in public about its errors and infractions. The unclassified versions of the administration&apos;s semiannual reports to Congress feature blacked-out pages under the headline &apos;&apos;Statistical Data Relating to Compliance Incidents.&apos;&apos;" />
                      <outline text="Members of Congress may read the unredacted documents, but only in a special secure room, and they are not allowed to take notes. Fewer than 10 percent of lawmakers employ a staff member who has the security clearance to read the reports and provide advice about their meaning and significance." />
                      <outline text="The limited portions of the reports that can be read by the public acknowledge &apos;&apos;a small number of compliance incidents.&apos;&apos;" />
                      <outline text="Under NSA auditing guidelines, the incident count does not usually disclose the number of Americans affected." />
                      <outline text="&apos;&apos;What you really want to know, I would think, is how many innocent U.S. person communications are, one, collected at all, and two, subject to scrutiny,&apos;&apos; said Julian Sanchez, a research scholar and close student of the NSA at the Cato Institute." />
                      <outline text="The documents provided by Snowden offer only glimpses of those questions. Some reports make clear that an unauthorized search produced no records. But a single &apos;&apos;incident&apos;&apos; in February 2012 involved the unlawful retention of 3,032 files that the surveillance court had ordered the NSA to destroy, according to the May 2012 audit. Each file contained an undisclosed number of telephone call records." />
                      <outline text="One of the documents sheds new light on a statement by NSA Director Keith B. Alexander last year that &apos;&apos;we don&apos;t hold data on U.S. citizens.&apos;&apos;" />
                      <outline text="Some Obama administration officials, speaking on the condition of anonymity, have defended Alexander with assertions that the agency&apos;s internal definition of &apos;&apos;data&apos;&apos; does not cover &apos;&apos;metadata&apos;&apos; such as the trillions of American call records that the NSA is now known to have collected and stored since 2006. Those records include the telephone numbers of the parties and the times and durations of conversations, among other details, but not their content or the names of callers." />
                      <outline text="The NSA&apos;s authoritative def&#173;inition of data includes those call records. &apos;&apos;Signals Intelligence Management Directive 421,&apos;&apos; which is quoted in secret oversight and auditing guidelines, states that &apos;&apos;raw SIGINT data .&apos;&#137;.&apos;&#137;. includes, but is not limited to, unevaluated and/or unminimized transcripts, gists, facsimiles, telex, voice, and some forms of computer-generated data, such as call event records and other Digital Network Intelligence (DNI) metadata as well as DNI message text.&apos;&apos;" />
                      <outline text="In the case of the collection effort that confused calls placed from Washington with those placed from Egypt, it is unclear what the NSA meant by a &apos;&apos;large number&apos;&apos; of intercepted calls. A spokesman declined to discuss the matter." />
                      <outline text="The NSA has different reporting requirements for each branch of government and each of its legal authorities. The &apos;&apos;202&apos;&apos; collection was deemed irrelevant to any of them. &apos;&apos;The issue pertained to Metadata ONLY so there were no defects to report,&apos;&apos; according to the author of the secret memo from March 2013." />
                      <outline text="The large number of database query incidents, which involve previously collected communications, confirms long-standing suspicions that the NSA&apos;s vast data banks &apos;-- with code names such as MARINA, PINWALE and XKEYSCORE &apos;-- house a considerable volume of information about Americans. Ordinarily the identities of people in the United States are masked, but intelligence &apos;&apos;customers&apos;&apos; may request unmasking, either one case at a time or in standing orders." />
                      <outline text="In dozens of cases, NSA personnel made careless use of the agency&apos;s extraordinary powers, according to individual auditing reports. One team of analysts in Hawaii, for example, asked a system called DISHFIRE to find any communications that mentioned both the Swedish manufacturer Ericsson and &apos;&apos;radio&apos;&apos; or &apos;&apos;radar&apos;&apos; &apos;-- a query that could just as easily have collected on people in the United States as on their Pakistani military target." />
                      <outline text="The NSA uses the term &apos;&apos;incidental&apos;&apos; when it sweeps up the records of an American while targeting a foreigner or a U.S. person who is believed to be involved in terrorism. Official guidelines for NSA personnel say that kind of incident, pervasive under current practices, &apos;&apos;does not constitute a .&apos;&#137;.&apos;&#137;. violation&apos;&apos; and &apos;&apos;does not have to be reported&apos;&apos; to the NSA inspector general for inclusion in quarterly reports to Congress. Once added to its databases, absent other restrictions, the communications of Americans may be searched freely." />
                      <outline text="In one required tutorial, NSA collectors and analysts are taught to fill out oversight forms without giving &apos;&apos;extraneous information&apos;&apos; to &apos;&apos;our FAA overseers.&apos;&apos; FAA is a reference to the FISA Amendments Act of 2008, which granted broad new authorities to the NSA in exchange for regular audits from the Justice Department and the Office of the Director of National Intelligence and periodic reports to Congress and the surveillance court." />
                      <outline text="Using real-world examples, the &apos;&apos;Target Analyst Rationale Instructions&apos;&apos; explain how NSA employees should strip out details and substitute generic descriptions of the evidence and analysis behind their targeting choices." />
                      <outline text="&apos;&apos;I realize you can read those words a certain way,&apos;&apos; said the high-ranking NSA official who spoke with White House authority, but the instructions were not intended to withhold information from auditors. &apos;&apos;Think of a book of individual recipes,&apos;&apos; he said. Each target &apos;&apos;has a short, concise description,&apos;&apos; but that is &apos;&apos;not a substitute for the full recipe that follows, which our overseers also have access to.&apos;&apos;" />
                      <outline text="Julie Tate and Carol D. Leonnig contributed to this report." />
                      <outline text="MORE" />
                      <outline text="My Account" />
                      <outline text="Sign InSubscribe(C) Copyright 1996-2013 The Washington Post" />
                      <outline text="View desktop site" />
              </outline>

              <outline text="NSA Defends Itself After Privacy Breaches Revealed">
                      <outline text="Link to Article" type="link" url="http://online.wsj.com/article/SB10001424127887323455104579017251271640822?mg=reno64-wsj.html?dsk=y" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376746947_aGsWZQkg.html" />
      <outline text="Sat, 17 Aug 2013 13:42" />
                      <outline text="" />
                      <outline text="The National Security Agency sought Friday to defend its operation of sensitive spy programs in the wake of revelations it had violated its own privacy rules on nearly 3,000 occasions." />
                      <outline text="The NSA&apos;s director of compliance, John DeLong, repeatedly said in a conference call with reporters that the 2,776 violations reflected no willful effort to violate Americans&apos; privacy. &quot;NSA has a zero-tolerance policy for willful misconduct,&quot; Mr. DeLong said. &quot;None of the incidents that were in the document released were willful.&quot;" />
                      <outline text="Mr. DeLong reported, however, &quot;a couple&quot; of willful violations in the past decade. He didn&apos;t provide details. &quot;No one at NSA thinks a mistake is OK, but those kinds of reports are designed and generated to make sure we understand when mistakes occur,&quot; he said." />
                      <outline text="Mr. DeLong&apos;s comments were the NSA&apos;s most direct effort to date to counter mounting concern over its spy activities and their effect on Americans since former NSA contractor Edward Snowden began making classified documents public. The internal audit report on privacy violations was revealed by the Washington Post Thursday night." />
                      <outline text="That report analyzed the different types of violations of policy or law for the year ended March 2012. The bulk stemmed from issues where the NSA continued monitoring foreigners through their cellphone use after they crossed into the U.S." />
                      <outline text="&quot;These incidents are largely unpreventable,&quot; the audit report said. The NSA said the surge in &quot;roamer&quot; incidents may be attributable to an increase in Chinese travel to visit friends in the U.S. for the Lunar New Year holiday." />
                      <outline text="The report also cited &quot;significant incidents&quot; of violations. One was a mishandling of telephone data housed in an NSA database, where the NSA found that more than 3,000 records had been retained past their five-year expiration date. Mr. DeLong said the call records were destroyed as soon as they were discovered and that they hadn&apos;t been accessible to analysts." />
                      <outline text="Another violation, according to the audit report, occurred when an individual remained under surveillance even after obtaining a green card, which would have required the NSA to obtain an individualized warrant to keep monitoring the person. Another violation was the improper granting of access to a sensitive database." />
                      <outline text="The Post reported a separate issue where phone data were collected on a &quot;large number&quot; of numbers in Washington, D.C., because the system was incorrectly set to the 202 area code instead of the 20 county code, which is Egypt." />
                      <outline text="Another document the Post made public offered a glimpse of a more serious constitutional violation by NSA, when it established a collection program for &quot;Multiple Communications Transactions&quot; that the Foreign Intelligence Surveillance Court deemed &quot;deficient on statutory and constitutional grounds.&quot;" />
                      <outline text="Mr. DeLong said he couldn&apos;t describe the scope of that violation but said it wasn&apos;t willful. The collection later resumed under new court-approved procedures, he said." />
                      <outline text="In its article, the Washington Post said the audit hadn&apos;t been made available to Congress. Mr. DeLong said NSA provided this type of data to lawmakers and agencies with oversight responsibilities, but he said this particular report was for internal use. The results, he said, were incorporated into other reports provided to Congress." />
                      <outline text="At the White House, spokesman Josh Earnest emphasized that the violations didn&apos;t reflect willful law breaking and the detailed report shows the NSA is aggressively monitoring itself." />
                      <outline text="Lawmakers on the intelligence committees that oversee the programs said more should be done to probe the programs, but added they weren&apos;t aware of intentional violations of the law. The Senate Intelligence Committee &quot;has never identified an instance in which the NSA has intentionally abused its authority to conduct surveillance for inappropriate purposes,&quot; said its chairman, Sen. Dianne Feinstein (D., Calif.), in a written statement." />
                      <outline text="Her House counterpart, Mike Rogers (R., Mich.), said his committee takes seriously all errors but they are &quot;unfortunately inevitable in any organization and especially in a highly technical and complicated system like NSA.&quot;" />
                      <outline text="However, the top Democrat on the House Intelligence Committee, Rep. C.A. &quot;Dutch&quot; Ruppersberger (D., Md.), called the reports of privacy violations &quot;incredibly troubling.&quot; Mr. Ruppersberger, whose district includes the NSA, said he has instructed his staff to investigate, but so far they haven&apos;t found any intentional violations." />
                      <outline text="Senate Judiciary Committee Chairman Patrick Leahy (D., Vt.) said he worried officials weren&apos;t telling a full story. &quot;I remain concerned that we are still not getting straightforward answers from the NSA,&quot; he said, vowing to hold a further hearing on the matter." />
                      <outline text="Rep. Adam Schiff (D., Calif.) said the audit report shows a need for Congress to improve its oversight of intelligence programs. The intelligence committee, he said, &quot;suffers from a tremendous mismatch of resources compared to the agencies,&quot; which makes it reliant on agencies to report their own mistakes." />
                      <outline text="Sens. Ron Wyden (D., Ore.) and Mark Udall (D., Colo.), who have criticized the NSA&apos;s surveillance programs, called the privacy violations &quot;just the tip of a larger iceberg.&quot;" />
                      <outline text="Write to Siobhan Gorman at siobhan.gorman@wsj.com" />
                      <outline text="Corrections &amp; AmplificationsThe first name of Josh Earnest was incorrectly given as John in an earlier version of this article." />
                      <outline text="A version of this article appeared August 16, 2013, on page A5 in the U.S. edition of The Wall Street Journal, with the headline: Spy Agency Defends Itself After Privacy Breaches Revealed." />
              </outline>

              <outline text="Peggy Noonan: What We Lose if We Give Up Privacy">
                      <outline text="Link to Article" type="link" url="http://online.wsj.com/article/SB10001424127887323639704579015101857760922?mg=reno64-wsj.html?dsk=y" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376746704_ucRSffSd.html" />
      <outline text="Sat, 17 Aug 2013 13:38" />
                      <outline text="" />
                      <outline text="What is privacy? Why should we want to hold onto it? Why is it important, necessary, precious?" />
                      <outline text="Is it just some prissy relic of the pretechnological past?" />
                      <outline text="We talk about this now because of Edward Snowden, the National Security Agency revelations, and new fears that we are operating, all of us, within what has become or is becoming a massive surveillance state. They log your calls here, they can listen in, they can read your emails. They keep the data in mammoth machines that contain a huge collection of information about you and yours. This of course is in pursuit of a laudable goal, security in the age of terror." />
                      <outline text="Is it excessive? It certainly appears to be. Does that matter? Yes. Among other reasons: The end of the expectation that citizens&apos; communications are and will remain private will probably change us as a people, and a country." />
                      <outline text="***Among the pertinent definitions of privacy from the Oxford English Dictionary: &quot;freedom from disturbance or intrusion,&quot; &quot;intended only for the use of a particular person or persons,&quot; belonging to &quot;the property of a particular person.&quot; Also: &quot;confidential, not to be disclosed to others.&quot; Among others, the OED quotes the playwright Arthur Miller, describing the McCarthy era: &quot;Conscience was no longer a private matter but one of state administration.&quot;" />
                      <outline text="Privacy is connected to personhood. It has to do with intimate things&apos;--the innards of your head and heart, the workings of your mind&apos;--and the boundary between those things and the world outside." />
                      <outline text="A loss of the expectation of privacy in communications is a loss of something personal and intimate, and it will have broader implications. That is the view of Nat Hentoff, the great journalist and civil libertarian. He is 88 now and on fire on the issue of privacy. &quot;The media has awakened,&quot; he told me. &quot;Congress has awakened, to some extent.&quot; Both are beginning to realize &quot;that there are particular constitutional liberty rights that [Americans] have that distinguish them from all other people, and one of them is privacy.&quot;" />
                      <outline text="Mr. Hentoff sees excessive government surveillance as violative of the Fourth Amendment, which protects &quot;the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures&quot; and requires that warrants be issued only &quot;upon probable cause . . . particularly describing the place to be searched, and the persons or things to be seized.&quot;" />
                      <outline text="But Mr. Hentoff sees the surveillance state as a threat to free speech, too. About a year ago he went up to Harvard to speak to a class. He asked, he recalled: &quot;How many of you realize the connection between what&apos;s happening with the Fourth Amendment with the First Amendment?&quot; He told the students that if citizens don&apos;t have basic privacies&apos;--firm protections against the search and seizure of your private communications, for instance&apos;--they will be left feeling &quot;threatened.&quot; This will make citizens increasingly concerned &quot;about what they say, and they do, and they think.&quot; It will have the effect of constricting freedom of expression. Americans will become careful about what they say that can be misunderstood or misinterpreted, and then too careful about what they say that can be understood. The inevitable end of surveillance is self-censorship." />
                      <outline text="All of a sudden, the room became quiet. &quot;These were bright kids, interested, concerned, but they hadn&apos;t made an obvious connection about who we are as a people.&quot; We are &quot;free citizens in a self-governing republic.&quot;" />
                      <outline text="Mr. Hentoff once asked Justice William Brennan &quot;a schoolboy&apos;s question&quot;: What is the most important amendment to the Constitution? &quot;Brennan said the First Amendment, because all the other ones come from that. If you don&apos;t have free speech you have to be afraid, you lack a vital part of what it is to be a human being who is free to be who you want to be.&quot; Your own growth as a person will in time be constricted, because we come to know ourselves by our thoughts." />
                      <outline text="He wonders if Americans know who they are compared to what the Constitution says they are." />
                      <outline text="Mr. Hentoff&apos;s second point: An entrenched surveillance state will change and distort the balance that allows free government to function successfully. Broad and intrusive surveillance will, definitively, put government in charge. But a republic only works, Mr. Hentoff notes, if public officials know that they&apos;--and the government itself&apos;--answer to the citizens. It doesn&apos;t work, and is distorted, if the citizens must answer to the government. And that will happen more and more if the government knows&apos;--and you know&apos;--that the government has something, or some things, on you. &quot;The bad thing is you no longer have the one thing we&apos;re supposed to have as Americans living in a self-governing republic,&quot; Mr. Hentoff said. &quot;The people we elect are not your bosses, they are responsible to us.&quot; They must answer to us. But if they increasingly control our privacy, &quot;suddenly they&apos;re in charge if they know what you&apos;re thinking.&quot;" />
                      <outline text="This is a shift in the democratic dynamic. &quot;If we don&apos;t have free speech then what can we do if the people who govern us have no respect for us, may indeed make life difficult for us, and in fact belittle us?&quot;" />
                      <outline text="If massive surveillance continues and grows, could it change the national character? &quot;Yes, because it will change free speech.&quot;" />
                      <outline text="What of those who say, &quot;I have nothing to fear, I don&apos;t do anything wrong&quot;? Mr. Hentoff suggests that&apos;s a false sense of security. &quot;When you have this amount of privacy invasion put into these huge data banks, who knows what will come out?&quot; Or can be made to come out through misunderstanding the data, or finagling, or mischief of one sort or another. &quot;People say, &apos;Well I&apos;ve done nothing wrong so why should I worry?&apos; But that&apos;s too easy a way to get out of what is in our history&apos;--constant attempts to try to change who we are as Americans.&quot; Asked about those attempts, he mentions the Alien and Sedition Acts of 1798, the Red Scare of the 1920s and the McCarthy era. Those times and incidents, he says, were more than specific scandals or news stories, they were attempts to change our nature as a people." />
                      <outline text="What of those who say they don&apos;t care what the federal government does as long as it keeps us safe? The threat of terrorism is real, Mr. Hentoff acknowledges. Al Qaeda is still here, its networks are growing. But you have to be careful about who&apos;s running U.S. intelligence and U.S. security, and they have to be fully versed in and obey constitutional guarantees. &quot;There has to be somebody supervising them who knows what&apos;s right. . . . Terrorism is not going to go away. But we need someone in charge of the whole apparatus who has read the Constitution.&quot;" />
                      <outline text="Advances in technology constantly up the ability of what government can do. Its technological expertise will only become deeper and broader. &quot;They think they&apos;re getting to how you think. The technology is such that with the masses of databases, then privacy will get even weaker.&quot;" />
                      <outline text="Mr. Hentoff notes that J. Edgar Hoover didn&apos;t have all this technology. &quot;He would be so envious of what NSA can do.&quot;" />
                      <outline text="A version of this article appeared August 16, 2013, on page A13 in the U.S. edition of The Wall Street Journal, with the headline: What We Lose if We Give Up Privacy." />
              </outline>

              <outline text="Alien and Sedition Acts - Wikipedia, the free encyclopedia">
                      <outline text="Link to Article" type="link" url="http://en.wikipedia.org/wiki/Alien_and_Sedition_Acts" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376746617_6JtzwpKN.html" />
      <outline text="Sat, 17 Aug 2013 13:36" />
                      <outline text="" />
                      <outline text="FIFTH CONGRESS OF THE UNITED STATES:At the Second Session,Begun and held at the city of Philadelphia, in the state of Pennsylvania, on Monday, the thirteenth of November, one thousand seven hundred and ninety-seven.An Act Concerning Aliens." />
                      <outline text="SECTION 1. Be it enacted by the Senate and the House of Representatives of the United States of America in Congress assembled, That it shall be lawful for the President of the United States at any time during the continuance of this act, to order all such aliens as he shall judge dangerous to the peace and safety of the United States, or shall have reasonable grounds to suspect are concerned in any treasonable or secret machinations against the government thereof, to depart out of the territory of the United States, within such time as shall be expressed in such order, which order shall be served on such alien by delivering him a copy thereof, or leaving the same at his usual abode, and returned to the office of the Secretary of State, by the marshal or other person to whom the same shall be directed. And in case any alien, so ordered to depart, shall be found at large within the United States after the time limited in such order for his departure, and not having obtained a license from the President to reside therein, or having obtained such license shall not have conformed thereto, every such alien shall, on conviction thereof, be imprisoned for a term not exceeding three years, and shall never after be admitted to become a citizen of the United States. Provided always, and be it further enacted, that if any alien so ordered to depart shall prove to the satisfaction of the President, by evidence to be taken before such person or persons as the President shall direct, who are for that purpose hereby authorized to administer oaths, that no injury or danger to the United Slates will arise from suffering such alien to reside therein, the President may grant a license to such alien to remain within the United States for such time as he shall judge proper, and at such place as he may designate. And the President may also require of such alien to enter into a bond to the United States, in such penal sum as he may direct, with one or more sufficient sureties to the satisfaction of the per- son authorized by the President to take the same, conditioned for the good behavior of such alien during his residence in the United States, and not violating his license, which license the President may revoke, whenever he shall think proper ." />
                      <outline text="SEC. 2. And be it further enacted, That it shall be lawful for the President of the United States, whenever he may deem it necessary (for the public safety, to order to be removed out of the territory thereof, any alien who mayor shall be in prison in pursuance of this act; and to cause to be arrested and sent out of the United States such of those aliens as shall have been ordered to depart therefrom and shall not have obtained a license as aforesaid, in all cases where, in the opinion of the President, the public safety requires a speedy removal. And if any alien so removed or sent out of the United Slates by the President shall voluntarily return thereto, unless by permission of the President of the United States, such alien on conviction thereof, shall be imprisoned so long as, in the opinion of the President, the public safety may require." />
                      <outline text="SEC. 3. And be it further enacted, That every master or commander of any ship or vessel which shall come into any port of the United States after the first day of July next, shall immediately on his arrival make report in writing to the collector or other chief officer of the customs of such port, of all aliens, if any, on board his vessel, specifying their names, age, the place of nativity, the country from which they shall have come, the nation to which they belong and owe allegiance, their occupation and a description of their persons, as far as he shall be informed thereof, and on failure, every such master and commander shall forfeit and pay three hundred dollars, for the payment whereof on default of such master or commander, such vessel shall also be holden, and may by such collector or other officer of the customs be detained. And it shall be the duty of such collector or other officer of the customs, forthwith to transmit to the office of the department of state true copies of all such returns." />
                      <outline text="SEC. 4. And be it further enacted, That the circuit and district courts of the United States, shall respectively have cognizance of all crimes and offences against this act. And all marshals and other officers of the United States are required to execute all precepts and orders of the President of the United States issued in pursuance or by virtue of this act." />
                      <outline text="SEC. 5. And be it further enacted, That it shall be lawful for any alien who may be ordered to be removed from the United States, by virtue of this act, to take with him such part of his goods, chattels, or other property, as he may find convenient; and all property left in the United States by any alien, who may be removed, as aforesaid, shall be, and re- main subject to his order and disposal, in the same manner as if this act had not been passed." />
                      <outline text="SEC. 6. And be it further enacted, That this act shall continue and be in force for and during the term of two years from the passing thereof." />
                      <outline text="Jonathan Dayton, Speaker of the House of Representatives.TH. Jefferson, Vice President of the United States and President of the Sentate." />
                      <outline text="I Certify that this Act did originate in the Sentate.Attest, Sam. A. Otis, Secretary" />
                      <outline text="APPROVED, June 25, 1798.John AdamsPresident of the United States." />
                      <outline text="An Act Respecting Alien Enemies" />
                      <outline text="SECTION 1. Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, That whenever there shall be a declared war between the United States and any foreign nation or government, or any invasion or predatory incursion shall be perpetrated, attempted, or threatened against the territory of the United States, by any foreign nation or government, and the President of the United States shall make public proclamation of the event, all natives, citizens, denizens, or subjects of the hostile nation or government, being males of the age of fourteen years and upwards, who shall be within the United States, and not actually naturalized, shall be liable to be apprehended, restrained, secured and removed, as alien enemies. And the President of the United States shall be, and he is hereby authorized, in any event, as aforesaid, by his proclamation thereof, or other public act, to direct the conduct to be observed, on the part of the United States, towards the aliens who shall become liable, as aforesaid; the manner and degree of the restraint to which they shall be subject, and in what cases, and upon what security their residence shall be permitted, and to provide for the removal of those, who, not being permitted to reside within the United States, shall refuse or neglect to depart therefrom; and to establish any other regulations which shall be found necessary in the premises and for the public safety: Provided, that aliens resident within the United States, who shall become liable as enemies, in the manner aforesaid, and who shall not be chargeable with actual hostility, or other crime against the public safety, shall be allowed, for the recovery, disposal, and removal of their goods and effects, and for their departure, the full-time which is, or shall be stipulated by any treaty, where any shall have been between the United States, and the hostile nation or government, of which they shall be natives, citizens, denizens or subjects: and where no such treaty shall have existed, the President of the United States may ascertain and declare such reasonable time as may be consistent with the public safety, and according to the dictates of humanity and national hospitality." />
                      <outline text="SEC. 2. And be it further enacted, That after any proclamation shall be made as aforesaid, it shall be the duty of the several courts of the United States, and of each state, having criminal jurisdiction, and of the several judges and justices of the courts of the United States, and they shall be, and are hereby respectively, authorized upon complaint, against any alien or alien enemies, as aforesaid, who shall be resident and at large within such jurisdiction or district, to the danger of the public peace or safety, and contrary to the tenor or intent of such proclamation, or other regulations which the President of the United States shall and may establish in the premises, to cause such alien or aliens to be duly apprehended and convened before such court, judge or justice; and after a full examination and hearing on such complaint. and sufficient cause therefor appearing, shall and may order such alien or aliens to be removed out of the territory of the United States, or to give sureties of their good behaviour, or to be otherwise restrained, conformably to the proclamation or regulations which shall and may be established as aforesaid, and may imprison, or otherwise secure such alien or aliens, until the order which shall and may be made, as aforesaid, shall be performed." />
                      <outline text="SEC. 3. And be it further enacted, That it shall be the duty of the marshal of the district in which any alien enemy shall be apprehended, who by the President of the United States, or by order of any court, judge or justice, as aforesaid, shall be required to depart, and to be removed, as aforesaid, to provide therefor, and to execute such order, by himself or his deputy, or other discreet person or persons to be employed by him, by causing a removal of such alien out of the territory of the United States; and for such removal the marshal shall have the warrant of the President of the United States, or of the court, judge or justice ordering the same, as the case may be." />
                      <outline text="APPROVED, July 6, 1798." />
                      <outline text="FIFTH CONGRESS OF THE UNITED STATES:At the Second Session,Begun and help at the city of Philadelphia, in the state of Pennsylvania, on Monday, the thirteenth of November, one thousand seven hundred and ninety-seven.An Act in Addition to the Act, Entitled &quot;An Act for the Punishment of Certain Crimes Against the United States.&quot;" />
                      <outline text="SECTION 1. Be it enacted by the Senate and House of Representatives of the United States of America, in Congress assembled, That if any persons shall unlawfully combine or conspire together, with intent to oppose any measure or measures of the government of the United States, which are or shall be directed by proper authority, or to impede the operation of any law of the United States, or to intimidate or prevent any person holding a place or office in or under the government of the United States, from undertaking, performing or executing his trust or duty, and if any person or persons, with intent as aforesaid, shall counsel, advise or attempt to procure any insurrection, riot, unlawful assembly, or combination, whether such conspiracy, threatening, counsel, advice, or attempt shall have the proposed effect or not, he or they shall be deemed guilty of a high misdemeanor, and on conviction, before any court of the United States having jurisdiction thereof, shall be punished by a fine not exceeding five thousand dollars, and by imprisonment during a term not less than six months nor exceeding five years; and further, at the discretion of the court may be holden to find sureties for his good behaviour in such sum, and for such time, as the said court may direct." />
                      <outline text="SEC. 2. And be it farther enacted, That if any person shall write, print, utter or publish, or shall cause or procure to be written, printed, uttered or published, or shall knowingly and willingly assist or aid in writing, printing, uttering or publishing any false, scandalous and malicious writing or writings against the government of the United States, or either house of the Congress of the United States, or the President of the United States, with intent to defame the said government, or either house of the said Congress, or the said President, or to bring them, or either of them, into contempt or disrepute; or to excite against them, or either or any of them, the hatred of the good people of the United States, or to stir up sedition within the United States, or to excite any unlawful combinations therein, for opposing or resisting any law of the United States, or any act of the President of the United States, done in pursuance of any such law, or of the powers in him vested by the constitution of the United States, or to resist, oppose, or defeat any such law or act, or to aid, encourage or abet any hostile designs of any foreign nation against United States, their people or government, then such person, being thereof convicted before any court of the United States having jurisdiction thereof, shall be punished by a fine not exceeding two thousand dollars, and by imprisonment not exceeding two years." />
                      <outline text="SEC. 3. And be it further enacted and declared, That if any person shall be prosecuted under this act, for the writing or publishing any libel aforesaid, it shall be lawful for the defendant, upon the trial of the cause, to give in evidence in his defence, the truth of the matter contained in publication charged as a libel. And the jury who shall try the cause, shall have a right to determine the law and the fact, under the direction of the court, as in other cases." />
                      <outline text="SEC. 4. And be it further enacted, That this act shall continue and be in force until the third day of March, one thousand eight hundred and one, and no longer: Provided, that the expiration of the act shall not prevent or defeat a prosecution and punishment of any offence against the law, during the time it shall be in force." />
                      <outline text="Jonathan Dayton, Speaker of the House of Representatives.Theodore Sedgwick, President of the Sentate pro tempore." />
                      <outline text="I Certify that this Act did originate in the Senate.Attest, Sam. A. Otis, Secretary" />
                      <outline text="APPROVED, July 14, 1798John AdamsPresident of the United States." />
              </outline>

              <outline text="MediaPost Publications Time Warner Hurt By CNN Ad Declines, Flat Revs Overall 05/02/2013">
                      <outline text="Link to Article" type="link" url="http://www.mediapost.com/publications/article/199404/time-warner-hurt-by-cnn-ad-declines-flat-revs-ove.html#axzz2cCdAz3WB" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376718646_kdF2WpcA.html" />
      <outline text="Sat, 17 Aug 2013 05:50" />
                      <outline text="" />
                      <outline text="Time Warner CEO Jeff Bewkes expressed bullishness Wednesday on CNN&apos;s prospects, but said the network has to find a way to boost viewership outside wide-interest breaking news.  " />
                      <outline text="&apos;&apos;CNN can&apos;t just mean politics and wars,&apos;&apos; he said. &apos;&apos;We will cover those, but we don&apos;t need to start a war to have success at CNN.&apos;&apos; He cited the need to be more of a player in the morning, where a new show is coming in June." />
                      <outline text="Bewkes touted new talent such as Jake Tapper, Chris Cuomo (who will be a morning co-host) and Rachel Nichols -- as well as Anthony Bourdain, who has a new show. Plus, he&apos;s &apos;&apos;optimistic&apos;&apos; CNN can &apos;&apos;become the destination for compelling TV all the time&apos;&apos; under new chief Jeff Zucker." />
                      <outline text="In the quarter, hurt by CNN&apos;s declining dollars, the company said domestic ad revenues were up about 5%, helped by the Turner entertainment brands. Overall, Time Warner reported flat revenue of $6.9 billion. Profit rose to $720 million from $583 million." />
                      <outline text="The CNN unit saw domestic ad dollars fall in the first quarter by some 10%, although the company said there has been an improvement since the end of March. Bewkes also said CNN should benefit from new affiliate agreements." />
                      <outline text="Separately, speaking on an earnings call, Bewkes said the coming spinoff of Time Inc. was partly rooted in &apos;&apos;relatively small&apos;&apos; synergies between the magazine publisher and other company units. The divestiture, he said, should provide plenty of financial benefits for Time Inc. as well as help it &apos;&apos;attract, retain and reward talent with equity that&apos;s directly tied to its own performance.&apos;&apos;" />
                      <outline text="Once Time Inc. is gone, some 90% of Time Warner profits will be rooted in its TV operations and 80% from cable networks that stretch from CNN to HBO to TBS." />
              </outline>

              <outline text="fish shell tutorial">
                      <outline text="Link to Article" type="link" url="http://fishshell.com/tutorial.html#tut_lists" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376717737_EWdmcGfc.html" />
      <outline text="Sat, 17 Aug 2013 05:35" />
                      <outline text="" />
                      <outline text="Why fish?fish is a fully-equipped command line shell (like bash or zsh) that is smart and user-friendly. fish supports powerful features like syntax highlighting, autosuggestions, and tab completions that just work, with nothing to learn or configure." />
                      <outline text="If you want to make your command line more productive, more useful, and more fun, without learning a bunch of arcane syntax and configuration options, then fish might be just what you&apos;re looking for!" />
                      <outline text="Learning fishThis tutorial assumes a basic understanding of command line shells and Unix commands, and that you have a working copy of fish." />
                      <outline text="If you have a strong understanding of other shells, and want to know what fish does differently, search for the magic phrase unlike other shells, which is used to call out important differences." />
                      <outline text="When you start fish, you should see this:" />
                      <outline text="Welcome to fish, the friendly interactive shellType help for instructions on how to use fishyou@hostname &#126;&gt;fish comes with a default prompt that shows your username, hostname, and working directory. You&apos;ll see how to change your prompt further down. From now on, we&apos;ll pretend your prompt is just a &apos;&gt;&apos; to save space." />
                      <outline text="Running Commandsfish runs commands like other shells: you type a command, followed by its arguments. Spaces are separators:" />
                      <outline text="&gt; echohello worldhello worldYou can include a literal space in an argument with a backslash, or by using single or double quotes:&gt; mkdirMy&#092; Files&gt; cp&#126;/Some&#092; File&apos;My Files&apos;&gt; ls&quot;My Files&quot;Some FileCommands can be chained with semicolons.Getting Helpfish has excellent help and man pages. Run help to open help in a web browser, and man to open it in a man page. You can also ask for help with a specific command, for example, help set to open in a web browser, or man set to see it in the terminal.&gt; mansetset - handle environment variables Synopsis...Syntax HighlightingYou&apos;ll quickly notice that fish performs syntax highlighting as you type. Invalid commands are colored red by default:&gt; /bin/mkdA command may be invalid because it does not exist, or refers to a file that you cannot execute. When the command becomes valid, it is shown in a different color:&gt; /bin/mkdirArguments that are valid file paths are also underlined:&gt; cat&#126;/file1.c &#126;/file2.cThis tells you that file1.c exists, but file2.c does not." />
                      <outline text="These colors, and many more, can be changed by running fish_config, or by modifying variables directly." />
                      <outline text="Wildcardsfish supports the familiar wildcard *. To list all JPEG files:&gt; ls*.jpglena.jpgmeena.jpgsanta maria.jpgYou can include multiple wildcards:" />
                      <outline text="&gt; lsl*.p*lena.pnglesson.pdfEspecially powerful is the recursive wildcard ** which searches directories recursively:" />
                      <outline text="&gt; ls/var/**.log/var/log/system.log/var/run/sntp.logIf that directory traversal is taking a long time, you can control-C out of it." />
                      <outline text="Pipes and RedirectionsYou can pipe between commands with the usual vertical bar:" />
                      <outline text="&gt; echohello world | wc 1 2 12stdin and stdout can be redirected via the familiar &lt; &gt;. Unlike other shells, stderr is redirected with a caret &#094;" />
                      <outline text="&gt; grepfish &lt; &gt; &#126;/output.txt &#094; &#126;/errors.txtAutosuggestionsfish suggests commands as you type, and shows the suggestion to the right of the cursor, in gray. For example:&gt; /bin/hostnameIt knows about paths and options:&gt; grep--ignore-caseAnd history too. Type a command once, and you can re-summon it by just typing a few letters:&gt; rsync -avze ssh . myname@somelonghost.com:/some/long/path/doo/dee/doo/dee/dooTo accept the autosuggestion, hit right arrow or Control-F. If the autosuggestion is not what you want, just ignore it.Tab Completionsfish comes with a rich set of tab completions, that work &quot;out of the box.&quot;" />
                      <outline text="Press tab, and fish will attempt to complete the command, argument, or path:" />
                      <outline text="&gt; /pri &apos;&#134;&apos;/private/If there&apos;s more than one possibility, it will list them:" />
                      <outline text="&gt; &#126;/stuff/s&#126;/stuff/script.sh (Executable, 4.8kB)&#126;/stuff/sources/ (Directory)Hit tab again to cycle through the possibilities." />
                      <outline text="fish can also complete many commands, like git branches:" />
                      <outline text="&gt; gitmerge pr &apos;&#134;&apos; git merge prompt_designer&gt; gitcheckout bbuiltin_list_io_merge (Branch)builtin_set_color (Branch)busted_events (Tag)Try hitting tab and see what fish can do!VariablesLike other shells, a dollar sign performs variable substitution:" />
                      <outline text="&gt; echoMy home directory is $HOMEMy home directory is /home/tutorialVariable substitution also occurs in double quotes, but not single quotes:&gt; echo&quot;My current directory is $PWD&quot;My current directory is /home/tutorial&gt; echo&apos;My current directory is $PWD&apos;My current directory is $PWDUnlike other shells, fish has no dedicated syntax for setting variables. Instead it has an ordinary command: set, which takes a variable name, and then its value.&gt; setname&apos;Mister Noodle&apos;&gt; echo$nameMister Noodle(Notice the quotes: without them, Mister and Noodle would have been separate arguments, and $name would have been made into a list of two elements.)" />
                      <outline text="Unlike other shells, variables are not further split after substitution:" />
                      <outline text="&gt; mkdir$name&gt; lsMister NoodleIn bash, this would have created two directories &quot;Mister&quot; and &quot;Noodle&quot;. In fish, it created only one: the variable had the value &quot;Mister Noodle&quot;, so that is the argument that was passed to mkdir, spaces and all.Exit StatusUnlike other shells, fish stores the exit status of the last command in $status instead of $?.&gt; false&gt; echo$status1Zero is considered success, and non-zero is failure.Exports (Environment Variables)Unlike other shells, fish does not have an export command. Instead, a variable is exported via an option to set, either --export or just -x.&gt; set-x MyVariable SomeValue&gt; env | grepMyVariableMyVariable=SomeValueYou can erase a variable with -e or --erase&gt; set-e MyVariable&gt; env | grepMyVariable(no output)ListsThe set command above used quotes to ensure that Mister Noodle was one argument. If it had been two arguments, then name would have been a list of length 2. In fact, all variables in fish are really lists, that can contain any number of values, or none at all." />
                      <outline text="Some variables, like $PWD, only have one value. By convention, we talk about that variable&apos;s value, but we really mean its first (and only) value." />
                      <outline text="Other variables, like $PATH, really do have multiple values. During variable expansion, the variable expands to become multiple arguments:" />
                      <outline text="&gt; echo$PATH/usr/bin /bin /usr/sbin /sbin /usr/local/binLists cannot contain other lists: there is no recursion. A variable is a list of strings, full stop." />
                      <outline text="Get the length of a list with count:" />
                      <outline text="&gt; count$PATH5You can append (or prepend) to a list by setting the list to itself, with some additional arguments. Here we append /usr/local/bin to $PATH:&gt; setPATH $PATH /usr/local/binYou can access individual elements with square brackets. Indexing starts at 1 from the beginning, and -1 from the end:&gt; echo$PATH/usr/bin /bin /usr/sbin /sbin /usr/local/bin&gt; echo$PATH[1]/usr/bin&gt; echo$PATH[-1]/usr/local/binYou can also access ranges of elements, known as &quot;slices:&quot;&gt; echo$PATH[1..2]/usr/bin /bin&gt; echo$PATH[-1..2]/usr/local/bin /sbin /usr/sbin /binYou can iterate over a list (or a slice) with a for loop:&gt; forvalin$PATHecho&quot;entry: $val&quot;endentry: usr/bin/entry: /binentry: /usr/sbinentry: /sbinentry: /usr/local/binCommand SubstitutionsCommand substitutions use the output of one command as an argument to another. Unlike other shells, fish does not use backticks &#096; for command substitutions. Instead, it uses parentheses:&gt; echoIn (pwd), running (uname)In /home/tutorial, running FreeBSDA common idiom is to capture the output of a command in a variable:&gt; setos (uname)&gt; echo$osLinuxCommand substitutions are not expanded within quotes. Instead, you can temporarily close the quotes, add the command substitution, and reopen them, all in the same argument:&gt; touch&quot;testing_&quot;(date+%s)&quot;.txt&quot;&gt; ls*.txttesting_1360099791.txtCombiners (And, Or, Not)Unlike other shells, fish does not have special syntax like &amp;&amp; or || to combine commands. Instead it has commands and, or, and not.&gt; cpfile1.txt file1_bak.txt; and echo&quot;Backup successful&quot;; or echo&quot;Backup failed&quot;Backup failedConditionals (If, Else, Switch)Use if, else if, and else to conditionally execute code, based on the exit status of a command.if grepfish /etc/shellsechoFound fishelse if grepbash /etc/shellsechoFound bashelseechoGot nothingendThere is also a switch command:switch(uname)caseLinuxechoHi Tux!caseDarwinechoHi Hexley!caseFreeBSD NetBSD DragonFlyechoHi Beastie!case&apos;*&apos;echoHi, stranger!endNote that case does not fall through, and can accept multiple arguments or (quoted) wildcards.FunctionsA fish function is a list of commands, which may optionally take arguments. Unlike other shells, arguments are not passed in &quot;numbered variables&quot; like $1, but instead in a single list $argv. To create a function, use the function builtin:&gt; function say_hello echo Hello $argv end&gt; say_helloHello&gt; say_hello everybody!Hello everybody!Unlike other shells, fish does not have aliases or special prompt syntax. Functions take their place." />
                      <outline text="You can list the names of all functions with the functions keyword (note the plural!). fish starts out with a number of functions:" />
                      <outline text="&gt; functionsalias, cd, delete-or-exit, dirh, dirs, down-or-search, eval, export, fish_command_not_found_setup, fish_config, fish_default_key_bindings, fish_prompt, fish_right_prompt, fish_sigtrap_handler, fish_update_completions, funced, funcsave, grep, help, history, isatty, ls, man, math, nextd, nextd-or-forward-word, open, popd, prevd, prevd-or-backward-word, prompt_pwd, psub, pushd, seq, setenv, sgrep, trap, type, umask, up-or-search, varedYou can see the source for any function by passing its name to functions:" />
                      <outline text="&gt; functionslsfunction ls --description &apos;List contents of directory&apos; command ls -G $argvendLoopsWhile loops:&gt; whiletrueecho&quot;Loop forever&quot;endLoop foreverLoop foreverLoop forever...For loops can be used to iterate over a list. For example, a list of files:&gt; forfile in *.txtcp$file $file.bakendIterating over a list of numbers can be done with &#096;seq&#096;:&gt; forx in (seq5)touchfile_$x.txtendPromptUnlike other shells, there is no prompt variable like PS1. To display your prompt, fish executes a function with the name fish_prompt, and its output is used as the prompt. You can define your own prompt:&gt; function fish_prompt echo &quot;New Prompt % &quot; endNew Prompt % Multiple lines are OK. Colors can be set via set_color, passing it named ANSI colors, or hex RGB values:&gt; functionfish_promptset_colorpurpledate&quot;+%m/%d/%y&quot;set_colorFF0echo(pwd)&apos;&gt;&apos;set_colornormalend02/06/13/home/tutorial &gt;You can choose among some sample prompts by running fish_config prompt. fish also supports RPROMPT through fish_right_prompt." />
                      <outline text="$PATH$PATH is an environment variable containing the directories in which fish searches for commands. Instead of separating entries with a colon, $PATH is a list. You can modify $PATH in a few ways:By modifying the $fish_user_paths variable, which is automatically appended to $PATH. For example, to permanently add /usr/local/bin to your $PATH, you could write:&gt; set-U fish_user_paths $fish_user_paths /usr/local/binDirectly in config.fish (see below).Startup (Where&apos;s .bashrc?)fish starts by executing commands in &#126;/.config/fish/config.fish. You can create it if it does not exist." />
                      <outline text="It is possible to directly create functions and variables in config.fish file, using the commands shown above. For example:" />
                      <outline text="&gt; cat&#126;/.config/fish/config.fishset -x PATH $PATH /sbin/function ll ls -lh $argvendHowever, it is more common and efficient to use autoloading functions and universal variables." />
                      <outline text="Autoloading FunctionsWhen fish encounters a command, it attempts to autoload a function for that command, by looking for a file with the name of that command in &#126;/.config/fish/functions/." />
                      <outline text="For example, if you wanted to have a function ll, you would add a text file ll.fish to &#126;/.config/fish/functions:" />
                      <outline text="&gt; cat&#126;/.config/fish/functions/ll.fishfunction ll ls -lh $argvendThis is the preferred way to define your prompt as well:&gt; cat&#126;/.config/fish/functions/fish_prompt.fishfunction fish_prompt echo (pwd) &apos;&gt; &apos;endSee the documentation for funced and funcsave for ways to create these files automatically." />
                      <outline text="Universal VariablesA universal variable is a variable whose value is shared across all instances of fish, now and in the future - even after a reboot. You can make a variable universal with set -U:" />
                      <outline text="&gt; set-U EDITOR vimNow in another shell:&gt; echo$EDITORvimReady for more?If you want to learn more about fish, there is lots of detailed documentation, an official mailing list, the IRC channel #fish on irc.oftc.net, and the github page." />
              </outline>

              <outline text="The Science of Why We Don&apos;t Believe Science | Mother Jones">
                      <outline text="Link to Article" type="link" url="http://m.motherjones.com/politics/2011/03/denial-science-chris-mooney" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376710470_68PGJZdU.html" />
      <outline text="Sat, 17 Aug 2013 03:34" />
                      <outline text="" />
                      <outline text="How our brains fool us on climate, creationism, and the vaccine-autism link." />
                      <outline text="&quot;A MAN WITH A CONVICTION is a hard man to change. Tell him you disagree and he turns away. Show him facts or figures and he questions your sources. Appeal to logic and he fails to see your point.&quot; So wrote the celebrated Stanford University psychologist Leon Festinger (PDF), in a passage that might have been referring to climate change denial&apos;--the persistent rejection, on the part of so many Americans today, of what we know about global warming and its human causes. But it was too early for that&apos;--this was the 1950s&apos;--and Festinger was actually describing a famous case study in psychology." />
                      <outline text="Festinger and several of his colleagues had infiltrated the Seekers, a small Chicago-area cult whose members thought they were communicating with aliens&apos;--including one, &quot;Sananda,&quot; who they believed was the astral incarnation of Jesus Christ. The group was led by Dorothy Martin, a Dianetics devotee who transcribed the interstellar messages through automatic writing." />
                      <outline text="Through her, the aliens had given the precise date of an Earth-rending cataclysm: December 21, 1954. Some of Martin&apos;s followers quit their jobs and sold their property, expecting to be rescued by a flying saucer when the continent split asunder and a new sea swallowed much of the United States. The disciples even went so far as to remove brassieres and rip zippers out of their trousers&apos;--the metal, they believed, would pose a danger on the spacecraft." />
                      <outline text="Festinger and his team were with the cult when the prophecy failed. First, the &quot;boys upstairs&quot; (as the aliens were sometimes called) did not show up and rescue the Seekers. Then December 21 arrived without incident. It was the moment Festinger had been waiting for: How would people so emotionally invested in a belief system react, now that it had been soundly refuted?" />
                      <outline text="Read also: the truth about Climategate.At first, the group struggled for an explanation. But then rationalization set in. A new message arrived, announcing that they&apos;d all been spared at the last minute. Festinger summarized the extraterrestrials&apos; new pronouncement: &quot;The little group, sitting all night long, had spread so much light that God had saved the world from destruction.&quot; Their willingness to believe in the prophecy had saved Earth from the prophecy!" />
                      <outline text="From that day forward, the Seekers, previously shy of the press and indifferent toward evangelizing, began to proselytize. &quot;Their sense of urgency was enormous,&quot; wrote Festinger. The devastation of all they had believed had made them even more certain of their beliefs." />
                      <outline text="In the annals of denial, it doesn&apos;t get much more extreme than the Seekers. They lost their jobs, the press mocked them, and there were efforts to keep them away from impressionable young minds. But while Martin&apos;s space cult might lie at on the far end of the spectrum of human self-delusion, there&apos;s plenty to go around. And since Festinger&apos;s day, an array of new discoveries in psychology and neuroscience has further demonstrated how our preexisting beliefs, far more than any new facts, can skew our thoughts and even color what we consider our most dispassionate and logical conclusions. This tendency toward so-called &quot;motivated reasoning&quot; helps explain why we find groups so polarized over matters where the evidence is so unequivocal: climate change, vaccines, &quot;death panels,&quot; the birthplace and religion of the president (PDF), and much else. It would seem that expecting people to be convinced by the facts flies in the face of, you know, the facts." />
                      <outline text="The theory of motivated reasoning builds on a key insight of modern neuroscience (PDF): Reasoning is actually suffused with emotion (or what researchers often call &quot;affect&quot;). Not only are the two inseparable, but our positive or negative feelings about people, things, and ideas arise much more rapidly than our conscious thoughts, in a matter of milliseconds&apos;--fast enough to detect with an EEG device, but long before we&apos;re aware of it. That shouldn&apos;t be surprising: Evolution required us to react very quickly to stimuli in our environment. It&apos;s a &quot;basic human survival skill,&quot; explains political scientist Arthur Lupia of the University of Michigan. We push threatening information away; we pull friendly information close. We apply fight-or-flight reflexes not only to predators, but to data itself." />
                      <outline text="We apply fight-or-flight reflexes not only to predators, but to data itself." />
                      <outline text="We&apos;re not driven only by emotions, of course&apos;--we also reason, deliberate. But reasoning comes later, works slower&apos;--and even then, it doesn&apos;t take place in an emotional vacuum. Rather, our quick-fire emotions can set us on a course of thinking that&apos;s highly biased, especially on topics we care a great deal about." />
                      <outline text="Consider a person who has heard about a scientific discovery that deeply challenges her belief in divine creation&apos;--a new hominid, say, that confirms our evolutionary origins. What happens next, explains political scientist Charles Taber of Stony Brook University, is a subconscious negative response to the new information&apos;--and that response, in turn, guides the type of memories and associations formed in the conscious mind. &quot;They retrieve thoughts that are consistent with their previous beliefs,&quot; says Taber, &quot;and that will lead them to build an argument and challenge what they&apos;re hearing.&quot;" />
                      <outline text="In other words, when we think we&apos;re reasoning, we may instead be rationalizing. Or to use an analogy offered by University of Virginia psychologist Jonathan Haidt: We may think we&apos;re being scientists, but we&apos;re actually being lawyers (PDF). Our &quot;reasoning&quot; is a means to a predetermined end&apos;--winning our &quot;case&quot;&apos;--and is shot through with biases. They include &quot;confirmation bias,&quot; in which we give greater heed to evidence and arguments that bolster our beliefs, and &quot;disconfirmation bias,&quot; in which we expend disproportionate energy trying to debunk or refute views and arguments that we find uncongenial." />
                      <outline text="That&apos;s a lot of jargon, but we all understand these mechanisms when it comes to interpersonal relationships. If I don&apos;t want to believe that my spouse is being unfaithful, or that my child is a bully, I can go to great lengths to explain away behavior that seems obvious to everybody else&apos;--everybody who isn&apos;t too emotionally invested to accept it, anyway. That&apos;s not to suggest that we aren&apos;t also motivated to perceive the world accurately&apos;--we are. Or that we never change our minds&apos;--we do. It&apos;s just that we have other important goals besides accuracy&apos;--including identity affirmation and protecting one&apos;s sense of self&apos;--and often those make us highly resistant to changing our beliefs when the facts say we should." />
                      <outline text="Modern science originated from an attempt to weed out such subjective lapses&apos;--what that great 17th century theorist of the scientific method, Francis Bacon, dubbed the &quot;idols of the mind.&quot; Even if individual researchers are prone to falling in love with their own theories, the broader processes of peer review and institutionalized skepticism are designed to ensure that, eventually, the best ideas prevail." />
                      <outline text="Scientific evidence is highly susceptible to misinterpretation. Giving ideologues scientific data that&apos;s relevant to their beliefs is like unleashing them in the motivated-reasoning equivalent of a candy store." />
                      <outline text="Our individual responses to the conclusions that science reaches, however, are quite another matter. Ironically, in part because researchers employ so much nuance and strive to disclose all remaining sources of uncertainty, scientific evidence is highly susceptible to selective reading and misinterpretation. Giving ideologues or partisans scientific data that&apos;s relevant to their beliefs is like unleashing them in the motivated-reasoning equivalent of a candy store." />
                      <outline text="Sure enough, a large number of psychological studies have shown that people respond to scientific or technical evidence in ways that justify their preexisting beliefs. In a classic 1979 experiment (PDF), pro- and anti-death penalty advocates were exposed to descriptions of two fake scientific studies: one supporting and one undermining the notion that capital punishment deters violent crime and, in particular, murder. They were also shown detailed methodological critiques of the fake studies&apos;--and in a scientific sense, neither study was stronger than the other. Yet in each case, advocates more heavily criticized the study whose conclusions disagreed with their own, while describing the study that was more ideologically congenial as more &quot;convincing.&quot;" />
                      <outline text="Since then, similar results have been found for how people respond to &quot;evidence&quot; about affirmative action, gun control, the accuracy of gay stereotypes, and much else. Even when study subjects are explicitly instructed to be unbiased and even-handed about the evidence, they often fail." />
                      <outline text="And it&apos;s not just that people twist or selectively read scientific evidence to support their preexisting views. According to research by Yale Law School professor Dan Kahan and his colleagues, people&apos;s deep-seated views about morality, and about the way society should be ordered, strongly predict whom they consider to be a legitimate scientific expert in the first place&apos;--and thus where they consider &quot;scientific consensus&quot; to lie on contested issues." />
                      <outline text="In Kahan&apos;s research (PDF), individuals are classified, based on their cultural values, as either &quot;individualists&quot; or &quot;communitarians,&quot; and as either &quot;hierarchical&quot; or &quot;egalitarian&quot; in outlook. (Somewhat oversimplifying, you can think of hierarchical individualists as akin to conservative Republicans, and egalitarian communitarians as liberal Democrats.) In one study, subjects in the different groups were asked to help a close friend determine the risks associated with climate change, sequestering nuclear waste, or concealed carry laws: &quot;The friend tells you that he or she is planning to read a book about the issue but would like to get your opinion on whether the author seems like a knowledgeable and trustworthy expert.&quot; A subject was then presented with the r(C)sum(C) of a fake expert &quot;depicted as a member of the National Academy of Sciences who had earned a Ph.D. in a pertinent field from one elite university and who was now on the faculty of another.&quot; The subject was then shown a book excerpt by that &quot;expert,&quot; in which the risk of the issue at hand was portrayed as high or low, well-founded or speculative. The results were stark: When the scientist&apos;s position stated that global warming is real and human-caused, for instance, only 23 percent of hierarchical individualists agreed the person was a &quot;trustworthy and knowledgeable expert.&quot; Yet 88 percent of egalitarian communitarians accepted the same scientist&apos;s expertise. Similar divides were observed on whether nuclear waste can be safely stored underground and whether letting people carry guns deters crime. (The alliances did not always hold. In another study (PDF), hierarchs and communitarians were in favor of laws that would compel the mentally ill to accept treatment, whereas individualists and egalitarians were opposed.)" />
                      <outline text="Head-on attempts to persuade can sometimes trigger a backfire effect, where people not only fail to change their minds when confronted with the facts&apos;--they may hold their wrong views more tenaciously than ever." />
                      <outline text="In other words, people rejected the validity of a scientific source because its conclusion contradicted their deeply held views&apos;--and thus the relative risks inherent in each scenario. A hierarchal individualist finds it difficult to believe that the things he prizes (commerce, industry, a man&apos;s freedom to possess a gun to defend his family) (PDF) could lead to outcomes deleterious to society. Whereas egalitarian communitarians tend to think that the free market causes harm, that patriarchal families mess up kids, and that people can&apos;t handle their guns. The study subjects weren&apos;t &quot;anti-science&quot;&apos;--not in their own minds, anyway. It&apos;s just that &quot;science&quot; was whatever they wanted it to be. &quot;We&apos;ve come to a misadventure, a bad situation where diverse citizens, who rely on diverse systems of cultural certification, are in conflict,&quot; says Kahan." />
                      <outline text="And that undercuts the standard notion that the way to persuade people is via evidence and argument. In fact, head-on attempts to persuade can sometimes trigger a backfire effect, where people not only fail to change their minds when confronted with the facts&apos;--they may hold their wrong views more tenaciously than ever." />
                      <outline text="Take, for instance, the question of whether Saddam Hussein possessed hidden weapons of mass destruction just before the US invasion of Iraq in 2003. When political scientists Brendan Nyhan and Jason Reifler showed subjects fake newspaper articles (PDF) in which this was first suggested (in a 2004 quote from President Bush) and then refuted (with the findings of the Bush-commissioned Iraq Survey Group report, which found no evidence of active WMD programs in pre-invasion Iraq), they found that conservatives were more likely than before to believe the claim. (The researchers also tested how liberals responded when shown that Bush did not actually &quot;ban&quot; embryonic stem-cell research. Liberals weren&apos;t particularly amenable to persuasion, either, but no backfire effect was observed.)" />
                      <outline text="Another study gives some inkling of what may be going through people&apos;s minds when they resist persuasion. Northwestern University sociologist Monica Prasad and her colleagues wanted to test whether they could dislodge the notion that Saddam Hussein and Al Qaeda were secretly collaborating among those most likely to believe it&apos;--Republican partisans from highly GOP-friendly counties. So the researchers set up a study (PDF) in which they discussed the topic with some of these Republicans in person. They would cite the findings of the 9/11 Commission, as well as a statement in which George W. Bush himself denied his administration had &quot;said the 9/11 attacks were orchestrated between Saddam and Al Qaeda.&quot;" />
                      <outline text="One study showed that not even Bush&apos;s own words could change the minds of Bush voters who believed there was an Iraq-Al Qaeda link." />
                      <outline text="As it turned out, not even Bush&apos;s own words could change the minds of these Bush voters&apos;--just 1 of the 49 partisans who originally believed the Iraq-Al Qaeda claim changed his or her mind. Far more common was resisting the correction in a variety of ways, either by coming up with counterarguments or by simply being unmovable:" />
                      <outline text="Interviewer: [T]he September 11 Commission found no link between Saddam and 9/11, and this is what President Bush said. Do you have any comments on either of those?" />
                      <outline text="Respondent: Well, I bet they say that the Commission didn&apos;t have any proof of it but I guess we still can have our opinions and feel that way even though they say that." />
                      <outline text="The same types of responses are already being documented on divisive topics facing the current administration. Take the &quot;Ground Zero mosque.&quot; Using information from the political myth-busting site FactCheck.org, a team at Ohio State presented subjects (PDF) with a detailed rebuttal to the claim that &quot;Feisal Abdul Rauf, the Imam backing the proposed Islamic cultural center and mosque, is a terrorist-sympathizer.&quot; Yet among those who were aware of the rumor and believed it, fewer than a third changed their minds." />
                      <outline text="A key question&apos;--and one that&apos;s difficult to answer&apos;--is how &quot;irrational&quot; all this is. On the one hand, it doesn&apos;t make sense to discard an entire belief system, built up over a lifetime, because of some new snippet of information. &quot;It is quite possible to say, &apos;I reached this pro-capital-punishment decision based on real information that I arrived at over my life,&apos;&quot; explains Stanford social psychologist Jon Krosnick. Indeed, there&apos;s a sense in which science denial could be considered keenly &quot;rational.&quot; In certain conservative communities, explains Yale&apos;s Kahan, &quot;People who say, &apos;I think there&apos;s something to climate change,&apos; that&apos;s going to mark them out as a certain kind of person, and their life is going to go less well.&quot;" />
                      <outline text="This may help explain a curious pattern Nyhan and his colleagues found when they tried to test the fallacy (PDF) that President Obama is a Muslim. When a nonwhite researcher was administering their study, research subjects were amenable to changing their minds about the president&apos;s religion and updating incorrect views. But when only white researchers were present, GOP survey subjects in particular were more likely to believe the Obama Muslim myth than before. The subjects were using &quot;social desirabililty&quot; to tailor their beliefs (or stated beliefs, anyway) to whoever was listening." />
                      <outline text="Which leads us to the media. When people grow polarized over a body of evidence, or a resolvable matter of fact, the cause may be some form of biased reasoning, but they could also be receiving skewed information to begin with&apos;--or a complicated combination of both. In the Ground Zero mosque case, for instance, a follow-up study (PDF) showed that survey respondents who watched Fox News were more likely to believe the Rauf rumor and three related ones&apos;--and they believed them more strongly than non-Fox watchers." />
                      <outline text="Okay, so people gravitate toward information that confirms what they believe, and they select sources that deliver it. Same as it ever was, right? Maybe, but the problem is arguably growing more acute, given the way we now consume information&apos;--through the Facebook links of friends, or tweets that lack nuance or context, or &quot;narrowcast&quot; and often highly ideological media that have relatively small, like-minded audiences. Those basic human survival skills of ours, says Michigan&apos;s Arthur Lupia, are &quot;not well-adapted to our information age.&quot;" />
                      <outline text="A predictor of whether you accept the science of global warming? Whether you&apos;re a Republican or a Democrat." />
                      <outline text="If you wanted to show how and why fact is ditched in favor of motivated reasoning, you could find no better test case than climate change. After all, it&apos;s an issue where you have highly technical information on one hand and very strong beliefs on the other. And sure enough, one key predictor of whether you accept the science of global warming is whether you&apos;re a Republican or a Democrat. The two groups have been growing more divided in their views about the topic, even as the science becomes more unequivocal." />
                      <outline text="So perhaps it should come as no surprise that more education doesn&apos;t budge Republican views. On the contrary: In a 2008 Pew survey, for instance, only 19 percent of college-educated Republicans agreed that the planet is warming due to human actions, versus 31 percent of non-college educated Republicans. In other words, a higher education correlated with an increased likelihood of denying the science on the issue. Meanwhile, among Democrats and independents, more education correlated with greater acceptance of the science." />
                      <outline text="Other studies have shown a similar effect: Republicans who think they understand the global warming issue best are least concerned about it; and among Republicans and those with higher levels of distrust of science in general, learning more about the issue doesn&apos;t increase one&apos;s concern about it. What&apos;s going on here? Well, according to Charles Taber and Milton Lodge of Stony Brook, one insidious aspect of motivated reasoning is that political sophisticates are prone to be more biased than those who know less about the issues. &quot;People who have a dislike of some policy&apos;--for example, abortion&apos;--if they&apos;re unsophisticated they can just reject it out of hand,&quot; says Lodge. &quot;But if they&apos;re sophisticated, they can go one step further and start coming up with counterarguments.&quot; These individuals are just as emotionally driven and biased as the rest of us, but they&apos;re able to generate more and better reasons to explain why they&apos;re right&apos;--and so their minds become harder to change." />
                      <outline text="That may be why the selectively quoted emails of Climategate were so quickly and easily seized upon by partisans as evidence of scandal. Cherry-picking is precisely the sort of behavior you would expect motivated reasoners to engage in to bolster their views&apos;--and whatever you may think about Climategate, the emails were a rich trove of new information upon which to impose one&apos;s ideology." />
                      <outline text="Climategate had a substantial impact on public opinion, according to Anthony Leiserowitz, director of the Yale Project on Climate Change Communication. It contributed to an overall drop in public concern about climate change and a significant loss of trust in scientists. But&apos;--as we should expect by now&apos;--these declines were concentrated among particular groups of Americans: Republicans, conservatives, and those with &quot;individualistic&quot; values. Liberals and those with &quot;egalitarian&quot; values didn&apos;t lose much trust in climate science or scientists at all. &quot;In some ways, Climategate was like a Rorschach test,&quot; Leiserowitz says, &quot;with different groups interpreting ambiguous facts in very different ways.&quot;" />
                      <outline text="Is there a case study of science denial that largely occupies the political left? Yes: the claim that childhood vaccines are causing an epidemic of autism." />
                      <outline text="So is there a case study of science denial that largely occupies the political left? Yes: the claim that childhood vaccines are causing an epidemic of autism. Its most famous proponents are an environmentalist (Robert F. Kennedy Jr.) and numerous Hollywood celebrities (most notably Jenny McCarthy and Jim Carrey). The Huffington Post gives a very large megaphone to denialists. And Seth Mnookin, author of the new book The Panic Virus, notes that if you want to find vaccine deniers, all you need to do is go hang out at Whole Foods." />
                      <outline text="Vaccine denial has all the hallmarks of a belief system that&apos;s not amenable to refutation. Over the past decade, the assertion that childhood vaccines are driving autism rates has been undermined by multiple epidemiological studies&apos;--as well as the simple fact that autism rates continue to rise, even though the alleged offending agent in vaccines (a mercury-based preservative called thimerosal) has long since been removed." />
                      <outline text="Yet the true believers persist&apos;--critiquing each new study that challenges their views, and even rallying to the defense of vaccine-autism researcher Andrew Wakefield, after his 1998 Lancet paper&apos;--which originated the current vaccine scare&apos;--was retracted and he subsequently lost his license (PDF) to practice medicine. But then, why should we be surprised? Vaccine deniers created their own partisan media, such as the website Age of Autism, that instantly blast out critiques and counterarguments whenever any new development casts further doubt on anti-vaccine views." />
                      <outline text="It all raises the question: Do left and right differ in any meaningful way when it comes to biases in processing information, or are we all equally susceptible?" />
                      <outline text="There are some clear differences. Science denial today is considerably more prominent on the political right&apos;--once you survey climate and related environmental issues, anti-evolutionism, attacks on reproductive health science by the Christian right, and stem-cell and biomedical matters. More tellingly, anti-vaccine positions are virtually nonexistent among Democratic officeholders today&apos;--whereas anti-climate-science views are becoming monolithic among Republican elected officials." />
                      <outline text="Some researchers have suggested that there are psychological differences between the left and the right that might impact responses to new information&apos;--that conservatives are more rigid and authoritarian, and liberals more tolerant of ambiguity. Psychologist John Jost of New York University has further argued that conservatives are &quot;system justifiers&quot;: They engage in motivated reasoning to defend the status quo." />
                      <outline text="This is a contested area, however, because as soon as one tries to psychoanalyze inherent political differences, a battery of counterarguments emerges: What about dogmatic and militant communists? What about how the parties have differed through history? After all, the most canonical case of ideologically driven science denial is probably the rejection of genetics in the Soviet Union, where researchers disagreeing with the anti-Mendelian scientist (and Stalin stooge) Trofim Lysenko were executed, and genetics itself was denounced as a &quot;bourgeois&quot; science and officially banned." />
                      <outline text="The upshot: All we can currently bank on is the fact that we all have blinders in some situations. The question then becomes: What can be done to counteract human nature itself?" />
                      <outline text="We all have blinders in some situations. The question then becomes: What can be done to counteract human nature?" />
                      <outline text="Given the power of our prior beliefs to skew how we respond to new information, one thing is becoming clear: If you want someone to accept new evidence, make sure to present it to them in a context that doesn&apos;t trigger a defensive, emotional reaction." />
                      <outline text="This theory is gaining traction in part because of Kahan&apos;s work at Yale. In one study, he and his colleagues packaged the basic science of climate change into fake newspaper articles bearing two very different headlines&apos;--&quot;Scientific Panel Recommends Anti-Pollution Solution to Global Warming&quot; and &quot;Scientific Panel Recommends Nuclear Solution to Global Warming&quot;&apos;--and then tested how citizens with different values responded. Sure enough, the latter framing made hierarchical individualists much more open to accepting the fact that humans are causing global warming. Kahan infers that the effect occurred because the science had been written into an alternative narrative that appealed to their pro-industry worldview." />
                      <outline text="You can follow the logic to its conclusion: Conservatives are more likely to embrace climate science if it comes to them via a business or religious leader, who can set the issue in the context of different values than those from which environmentalists or scientists often argue. Doing so is, effectively, to signal a d(C)tente in what Kahan has called a &quot;culture war of fact.&quot; In other words, paradoxically, you don&apos;t lead with the facts in order to convince. You lead with the values&apos;--so as to give the facts a fighting chance." />
              </outline>

              <outline text="N.S.A. Calls Violations of Privacy &apos;Minuscule&apos; - NYTimes.com">
                      <outline text="Link to Article" type="link" url="http://mobile.nytimes.com/2013/08/17/us/nsa-calls-violations-of-privacy-minuscule.html?emc=rss&amp;partner=rss&amp;_r=0" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376710363_DGTUQxk7.html" />
      <outline text="Sat, 17 Aug 2013 03:32" />
                      <outline text="" />
                      <outline text="WASHINGTON &apos;-- The top National Security Agency official charged with making sure analysts comply with rules protecting the privacy of Americans pushed back on Friday against reports that the N.S.A. had frequently violated privacy rules, after the publication of a leaked internal audit showing that there had been 2,776 such &apos;&apos;incidents&apos;&apos; in a one-year period." />
                      <outline text="The official, John DeLong, the N.S.A. director of compliance, said that the number of mistakes by the agency was extremely low compared with its overall activities. The report showed about 100 errors by analysts in making queries of databases of already-collected communications data; by comparison, he said, the agency performs about 20 million such queries each month." />
                      <outline text="Mr. DeLong, speaking to reporters on a conference call, also argued that the overwhelming majority of the violations were unintentional human or technical errors and that the existence of the report showed that the agency&apos;s efforts to detect and correct violations of the rules were robust. He said the number of willful errors was &apos;&apos;minuscule,&apos;&apos; involving a &apos;&apos;couple over the past decade.&apos;&apos;" />
                      <outline text="&apos;&apos;No one at N.S.A. thinks a mistake is O.K.,&apos;&apos; he said." />
                      <outline text="The agency convened the conference call on Friday afternoon after the publication of an article by The Washington Post on Thursday night based on documents leaked by Edward J. Snowden, the former agency contractor. Mr. Snowden&apos;s leaks to The Post and The Guardian about the scope of N.S.A. spying have set off a crisis for the usually secretive agency, which says it is trying to be more open in explaining to the public what it does." />
                      <outline text="Mr. DeLong emphasized that the majority of the 2,776 incidents &apos;-- 1,904 of them, according to the audit &apos;-- were in a category that did not involve Americans, but rather foreigners abroad whose cellphones were being wiretapped. When they traveled to the United States, where individual warrants are required, the system did not immediately stop recording the calls." />
                      <outline text="With such &apos;&apos;roamers,&apos;&apos; he said, the agency would try to detect the change &apos;&apos;as soon as we can,&apos;&apos; and then stop recording the calls and remove the information from its databases, &apos;&apos;such that analysts may never see information collected while that person was in the United States.&apos;&apos;" />
                      <outline text="Mr. DeLong also sought to clarify a newly disclosed document urging analysts, when recording the reason for eavesdropping on foreigners abroad, to use only a short sentence and not to give &apos;&apos;extraneous information&apos;&apos; to its overseers." />
                      <outline text="Rather than a sign of obfuscation, Mr. DeLong said, that procedure was established to allow overseers like the Department of Justice and the Office of the Director of National Intelligence to be able to scan a long list of targets quickly. The N.S.A. separately provides them with a fuller set of information about each person singled out, he said." />
                      <outline text="In addition, The Post reported that the audit report had not been given to the Senate Intelligence Committee. Mr. DeLong said it was an internal agency document that was used to generate other reports for outside overseers that contained much of the same data." />
                      <outline text="In a statement, Senator Dianne Feinstein, Democrat of California and the Intelligence Committee&apos;s chairwoman, said the panel regularly received information about &apos;&apos;compliance incidents&apos;&apos; involving surveillance by the N.S.A. on domestic networks, though she said it did not get the same level of information about problems with surveillance conducted overseas." />
                      <outline text="&apos;&apos;As I have said previously, the committee has never identified an instance in which the N.S.A. has intentionally abused its authority to conduct surveillance for inappropriate purposes,&apos;&apos; she said. &apos;&apos;I believe, however, that the committee can and should do more to independently verify that N.S.A.&apos;s operations are appropriate, and its reports of compliance incidents are accurate.&apos;&apos;" />
              </outline>

              <outline text="Rupert Murdoch firm dips into hipsters&apos; bible with $70m stake in Vice">
                      <outline text="Link to Article" type="link" url="http://www.theguardian.com/media/2013/aug/17/rupert-murdoch-vice-magazine-stake" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376710028_nNp3vhdt.html" />
      <outline text="Sat, 17 Aug 2013 03:27" />
                      <outline text="" />
                      <outline text="Rupert Murdoch has hinted at being an admirer of the Vice brand in the past, declaring it a &apos;global success&apos; on Twitter last year. Photograph: Rick Wilking/Reuters" />
                      <outline text="Vice Media, the multi-platform purveyor of music, fashion and quixotic journalism from international trouble spots, has sold a 5% stake to Rupert Murdoch&apos;s 21st Century Fox." />
                      <outline text="Fox, which was spun off from News Corp earlier this year, confirmed the $70m (&#163;45m) deal, which marks the latest stage in the evolution of Vice from an off-beat Canadian magazine into a global brand frequently dubbed the hipsters&apos; bible." />
                      <outline text="Murdoch has hinted at being an admirer of the Vice brand in the past, tweeting after a visit last year to Brooklyn, where Vice is based: &quot;Who&apos;s heard of VICE media? Wild, interesting effort to interest millennials who don&apos;t read or watch established media. Global success.&quot;" />
                      <outline text="The link-up allows Vice to expand into Europe and India with the help of 21st Century Fox&apos;s assets, which include stakes in Sky television channels and chimes with the declared aims of Vice&apos;s co-founder, Shane Smith, for his company to become &quot;MTV, ESPN and CNN rolled into one&quot;." />
                      <outline text="Minority shareholders, which include the marketing group WPP, hold around 25% of Vice. Vice&apos;s founders will continue to have majority control of the board in a structure that Smith said &quot;gives us the freedom to do what we want to do&quot;." />
                      <outline text="He told the Financial Times: &quot;The reality is that MTV was bought by Viacom and CNN went to Time Warner. We have set ourselves up to build a global platform but we have maintained control.&quot;" />
                      <outline text="Vice, which is involved in magazine publishing, film production, music recording and operates a range of online channels, has gained attention in recent times with a number of initiatives and stories that have trumped the established media." />
                      <outline text="One included the re-appearance in Guatemala of the on-the-run internet millionaire John McAfee in the company of a couple of young reporters from Vice. In February, a Vice film crew accompanied the flamboyant former NBA star Dennis Rodman on a trip to North Korea in an unlikely act of sports diplomacy." />
                      <outline text="Smith and some friends established Vice as a free and underground music magazine in his native Montreal 20 years ago after taking over a community title called the Voice." />
              </outline>

              <outline text="Duizenden Spanjaarden in de rij voor figurantenrol">
                      <outline text="Link to Article" type="link" url="http://www.volkskrant.nl/vk/nl/3376/Cultuur/article/detail/3493848/2013/08/17/Duizenden-Spanjaarden-in-de-rij-voor-figurantenrol.dhtml" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376709856_WVUKXftt.html" />
        <outline text="Source: VK: Home" type="link" url="http://www.volkskrant.nl/rss.xml" />
      <outline text="Sat, 17 Aug 2013 03:24" />
                      <outline text="" />
                      <outline text="Bewerkt door: redactie &apos;&apos; 17/08/13, 01:42  &apos;&apos; bron: AFP" />
                      <outline text="(C) afp. Een van de Spanjaarden die hopen op een rolletje." />
                      <outline text="Duizenden Spanjaarden hebben de afgelopen dagen urenlang in de rij gestaan in de hoop een figurantenrolletje te krijgen in &apos;Exodus&apos;, de nieuwe film van Ridley Scott. Het aanbod van 80 euro per dag lokte 15.000 mensen naar de audities in de provincie Almeria. Daar is het werkloosheidscijfer tijdens de crisis opgelopen tot 35 procent." />
                      <outline text="De maanlandschappen rond Almeria vormden reeds het decor voor menig spaghettiwestern. Regisseur Ridley Scott wil er nu zijn nieuwe film draaien, ge&#175;nspireerd op het verhaal van Mozes en de exodus van de joden naar het beloofde land." />
                      <outline text="&apos;Half Almeria is komen opdagen&apos;, aldus een verbaasde Nerea Herrero, die de castings organiseert. &apos;Tienduizend mensen zijn naar Almeria gekomen, vijfduizend naar Pechina.&apos;" />
                      <outline text="De makers van de nieuwe film zijn op zoek naar zo&apos;n 3.000   4.000  magere figuranten: ze  moeten slaven voorstellen." />
                      <outline text="De opnames beginnen in oktober." />
              </outline>

              <outline text="Newspaper circulation results shocker: the contagion edition">
                      <outline text="Link to Article" type="link" url="http://www.crikey.com.au/2013/08/16/newspaper-circulation-results-shocker-the-contagion-edition/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376709725_S4kxJ5P8.html" />
        <outline text="Source: Crikey" type="link" url="http://www.crikey.com.au/feed/" />
      <outline text="Sat, 17 Aug 2013 03:22" />
                      <outline text="" />
                      <outline text="Newspaper circulation figures are out for the quarter and it&apos;s bad, bad news across the board. No paper is immune from the dramatic decline in sales. But there are a few magazines holding their own &apos;..." />
                      <outline text="The latest newspaper circulation results offer a grim reality check for both Fairfax and News Corporation Australia. Fairfax&apos;s metropolitan papers continue to bleed sales, despite the shift to commuter-friendly compact formats. News&apos; biggest-selling papers recorded unprecedented double-digit circulation drops year-on-year. And monopoly status is offering no protection for regional papers, which are rivalling their big-city brethren for circulation declines." />
                      <outline text="How strange it is to remember Australian papers were holding relatively steady only three years ago, bucking the downward trend in the US. Now we&apos;ve reached the point of contagion: total newspaper circulation slumped by 11.2% year-on-year in the June quarter, with no papers picking up paid sales." />
                      <outline text="The industry has responded to the results with a mixture of silence and what looks like magical thinking. News Corp kept schtum on the figures; so did industry group The Readership Works, which will no longer comment on print-only data. News and Readership Works are hyping the Monday arrival of new cross-platform readership measure emma (Enhanced Media Metrics Australia), which has been developed for the industry by Ipsos Australia. Some advertisers may wonder about paying the piper to call the tune, but that&apos;d be too cynical, wouldn&apos;t it?" />
                      <outline text="The Australianreports the figures today under the overly optimistic headline &apos;&apos;Digital news surge offsets print&apos;s decline&apos;&apos;. There&apos;s no doubt the Oz&apos;s digital subscription model is performing strongly with 51,213 sales&apos;&#137;&apos;--&apos;&#137;up from 45,869 last quarter. But otherwise there&apos;s little to crow about, with the country&apos;s top-selling paper, the Herald Sun, recording a meagre 30,624 digital sales for the quarter. And in private Fairfax big-wigs aren&apos;t doing cartwheels about the money coming in from The Age and The Sydney Morning Herald metered paywalls. The next survey will give better insights into how News and Fairfax&apos;s paywall strategies are faring." />
                      <outline text="In the land of the dead trees, Fairfax Media recorded another poor quarter. The weekday Sydney Morning Herald was down 17% year-on-year to 141,699 and is now outsold by southern sibling The Age, which fell by 16.2% on weekdays to 142,050. The Saturday SMH (once overflowing with classified ads) slumped by 20.2% to 233,335; The Saturday Age fell by 14.7% to 203, 753. The SMH and The Age also shed copies quarter-on-quarter, showing any circ boost from the shift to compact was shortlived. Perennial under-performer The Sun-Herald fell by 20.4% and The Sunday Age slipped by 11.7%." />
                      <outline text="The Australian Financial Review fell by 6.8% to 66,220 on weekdays and by 14.7% on Saturdays (reversing an anomalous jump in the previous quarter)." />
                      <outline text="Circulation for Fairfax&apos;s regional papers also plummeted: The Canberra Times fell by 8.4% Mon-Fri to 26,153, The Newcastle Herald by 11.5% to 36,368 and The Illawarra Mercury by 15.7% to 18,229. Here are the average daily print circulation figures for the June quarter, compared to the same quarter for the previous year:" />
                      <outline text="It was almost as demoralising at News Corp: no wonder Col Allan has been shipped back from New York to wave his supposedly magic wand. The Australian fell by 9.8% on weekdays year-on-year to 116,655; The Weekend Oz slumped by 10.8% to 254,891. A full 19% of the Oz&apos;s sales are still in the accommodation, airline, education or bundled categories (compared to 13% at the AFR)." />
                      <outline text="Sydney&apos;s The Daily Telegraph posted its first double-digit year-on-year declines: the Tele fell by 11.2% on weekdays to 310,724 and by 10.6% on Saturdays. The Sunday Telegraph shed 11.2% to 541,749 a week. It was almost as ugly in Melbourne, where the Herald Sun dropped by 10.3% on weekdays to 416, 027. On Sundays the Hun was down 8.2%." />
                      <outline text="Brisbane&apos;s Courier-Mail declined by 8.8% to 173,095 Monday to Friday while Adelaide&apos;s The Advertiser slipped by 10% to 155,635. The Hobart Mercury was down 7% to 37,419. Seven West Media&apos;s West Australian was down by 8.7% on weekdays to 178,385 and by 3.8% on Saturdays. Here are the News Corp circulation figures:" />
                      <outline text="Unlike in newspapers, you can find some winners among the normally blighted magazine sector. At least 15 magazines saw their sales rise in the year to June, with the home, garden and lifestyle sectors leading the way. News Corp&apos;s NewsLife Media stable performed well, seeming to vindicate ousted CEO Kim Williams&apos; decision to put Nicole Sheffield in charge. NewsLifeMedia&apos;s Vogue rose 0.4%, Vogue Living rose 1.8%, Delicious rose 5%, Country Style sold 1.5% more copies and Inside Out lifted its sales by 1.4%. Fairfax&apos;s BRW had a nasty drop: 17.4% to only 33,900." />
                      <outline text="Among the big sellers though the news was gloomy, except for Australian Women&apos;s Weekly (Bauer) which saw sales slip just 1.4% to 459,175. Woman&apos;s Day (Bauer) lost 4.2% and Pacific Mags&apos; New Idea shed 4.4%. Other notable falls included 17%-plus plunges by Bauer&apos;s Dolly and Cosmopolitan and a 25.9% decline for struggling lads&apos; mag Zoo Weekly. Craft and culture magazine Frankie was again a standout performer, posting a 10.7% jump to 64,931." />
                      <outline text="*Additional reporting by Glenn Dyer" />
              </outline>

              <outline text="Cyber-bullying brings horror home">
                      <outline text="Link to Article" type="link" url="http://www.bbc.co.uk/news/education-23727673#sa-ns_mchannel=rss&amp;ns_source=PublicRSS20-sa" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376709639_bxHQKw6Q.html" />
        <outline text="Source: BBC News - Home" type="link" url="http://feeds.bbci.co.uk/news/rss.xml" />
      <outline text="Sat, 17 Aug 2013 03:20" />
                      <outline text="" />
                      <outline text="16 August 2013Last updated at21:08 ETBy Angela HarrisonSocial affairs correspondent, BBC News&quot;He was a happy laddie, not depressed and the last type of person you would think would take their life." />
                      <outline text="&quot;We&apos;re a very close family and I just wished he had come to me and said something.&quot;" />
                      <outline text="The words of the mother of 17-year-old Daniel Perry, who took his own life after he was apparently blackmailed after befriending someone he thought was a girl of his age online." />
                      <outline text="In reality, it is thought he was &quot;talking&quot; to an extortion gang." />
                      <outline text="The apprentice mechanic was told on 15 July to deposit thousands of pounds in to an account or images or video of him would be shared with his family and friends or the public." />
                      <outline text="Hours later, he was dead." />
                      <outline text="It is a story that sends shivers down the spine of most parents." />
                      <outline text="In an interview with the Dunfermline Press, his mother said he had &quot;not being doing anything wrong - just what anyone his age might do&quot;, but had been too &quot;embarrassed and horrified&quot; to tell anyone about what had happened." />
                      <outline text="Three months earlier, it is reported, the teenager had been bullied on the social networking site ask.fm and received messages telling him to kill himself." />
                      <outline text="&apos;No signs&apos;Father and co-founder of the Cybersmile website Dan Raisbeck says the case is &quot;extremely distressing&quot; and shows the horrific consequences of &quot;online hate&quot;." />
                      <outline text="&quot;For a person to be manipulated in their home and bullied in their own loving home which is supposed to be where you feel safe... if that is undermined, what has a child got?&quot; he said." />
                      <outline text="&quot;This case is extremely distressing because of the short time span. There seemed to be no signs.&quot;" />
                      <outline text="Continue reading the main story&apos;&apos;Start QuoteIt&apos;s very common for young people to encourage each other to send sexual pictures&apos;&apos;" />
                      <outline text="End QuoteDr Lucy MaddoxPsychologistPsychologist Dr Lucy Maddox said for many young people, opening up to parents about something like cyber blackmail would be extremely difficult." />
                      <outline text="Not commenting on Daniel Perry&apos;s case in particular, she said: &quot;Trying to talk to parents, especially if it&apos;s about sex, is very difficult, especially if you think of it as something you are ashamed of." />
                      <outline text="&quot;Shame is a powerful driver not to tell someone something, so telling a parent that you have sent a naked picture of yourself... it&apos;s no wonder they don&apos;t tell. Sexual shame is a double whammy.&quot;" />
                      <outline text="Dr Maddox said teenagers were prone to risky behaviour and were very influenced by their peer group and wanted to fit in, so might get drawn in to sending intimate images of themselves." />
                      <outline text="&quot;It&apos;s very common for young people to encourage each other to send sexual pictures,&quot; she said." />
                      <outline text="&quot;In the short term, the teenager gets a thrill from sending the picture and feeling grown up but they do not see the long-term consequences of that picture being passed on and then feeling very exposed." />
                      <outline text="Warning signsFor a parent, the thought of a child suffering in silence at the mouse-clicks of bullies while they are just feet away, unaware, is an upsetting idea." />
                      <outline text="But are there warning signs?" />
                      <outline text="Mr Raisbeck set up the Cybersmile charity after his 10-year-old son was bullied online while playing a game where competitors team up against each other." />
                      <outline text="He says there were warning signs in his case." />
                      <outline text="&quot;There was a real stark change in his demeanour, played out in my living room. I could see he was getting frustrated,&quot; he said." />
                      <outline text="&quot;A lot of abuse and banter goes on in this game. His account was hacked. It got very nasty, out of control." />
                      <outline text="&quot;The biggest sign for me was the intensity of the emotional response and distress. It&apos;s as good as being attacked verbally - as if someone is screaming in your face. It&apos;s like they are there in the room with them, with Dad, unaware, sitting next to them.&quot;" />
                      <outline text="Mr Raisbeck got his son to talk to him about what was going on and told him he should not &quot;bite back&quot; if people attacked him online." />
                      <outline text="Dr Maddox, a member of the British Psychological Society, says children of the internet age face the threat of bullies reaching them wherever they are." />
                      <outline text="&quot;Before someone could be bullied at school but could go home and have respite from it, now it can go on for 24 hours,&quot;." />
                      <outline text="Some ask why teenagers - or adults - do not log off permanently from sites where they are getting abused." />
                      <outline text="Dr Maddox says that although staying there might bring &quot;very negative consequences&quot; in the long-term, there could be short-term gains which keep them there." />
                      <outline text="&quot;It&apos;s a hook that keeps people there. If they are getting loads of &apos;likes&apos; for a picture or even one or two people spurring them on, it can be a powerful hook to stay in,&quot; she said." />
                      <outline text="&quot;They make people feel connected and part of something and that sometimes flips, making them feel much more isolated and that the community is against them." />
                      <outline text="&quot;That is such a powerful driver for people who feel very despairing.&quot;" />
                      <outline text="&apos;Audience of trillions&apos;Lucie Russell, campaigns director at the YoungMinds charity, agrees that young people might stay in an online place where they are getting bullied because they want interaction and attention." />
                      <outline text="&quot;They feed on each other, young people feed off each other; they want attention,&quot; she said." />
                      <outline text="&quot;Being online means they are getting attention and there is an audience of trillions.&quot;" />
                      <outline text="According to a recent report from the NSPCC, almost one in five children who use social networking sites had bad experiences online last year, including bullying, unwanted sexual messages and cyber stalking." />
                      <outline text="Continue reading the main story&apos;&apos;Start QuoteHe&apos;d say horrible things about how I looked. He called me fat and ugly, He said I should want to kill myself&apos;&apos;" />
                      <outline text="End QuoteBronaghMs Russell says the media likes to present the situation as one of &quot;goodies and baddies&quot;, but that the reality is often more complicated." />
                      <outline text="&quot;The people doing it [bullying and trolling] can also be victims themselves,&quot; she said." />
                      <outline text="&quot;We say trolls are the baddies but it&apos;s more nuanced than this.&quot;" />
                      <outline text="Bronagh received support from the NSPCC&apos;s ChildLine after she was bullied online when she was 13 and says the person who bullied her went on to suffer too ." />
                      <outline text="In an account she gave through the charity, she described how accepting a casual acquaintance as a contact on a social network led to a stream of attacks." />
                      <outline text="&quot;He started saying really nasty things about me and about my family. The first time it happened I just logged off, but it kept happening." />
                      <outline text="&quot;He&apos;d say horrible things about how I looked. He called me fat and ugly... he said I should want to kill myself." />
                      <outline text="Bronagh said she did not talk to her family about the problem, even though she knew they would be supportive, because the boy was saying nasty things about them. She confided in her friends and one of them challenged the boy online." />
                      <outline text="&quot;He blamed me. I logged back on and he showed me these red marks on his neck over the webcam, and said that he&apos;d tried to hang himself because of what I&apos;d said about him. Then I started to feel like it was all my fault." />
                      <outline text="&quot;I brought it to an end by permanently blocking him and I found out he was creeping [another site] to find out about me, so I changed my settings." />
                      <outline text="&quot;Now I just wish I&apos;d done it sooner - that I&apos;d cut him off straight away and not let him get to me.&quot;" />
                      <outline text="&apos;Emotional cost&apos;Often excluded from the teenage world, what can parents do to help their children?" />
                      <outline text="Continue reading the main story&apos;&apos;Start QuoteWe need to have a massive campaign showing the real emotional cost of losing someone through this and how it happens&apos;&apos;" />
                      <outline text="End QuoteDan RaisbeckCybersmileLucie Russell from YoungMinds said: &quot;We have no idea what they are doing in their rooms and how many things can you block?" />
                      <outline text="&quot;The answer is not to close these sites down but to help young people develop resilience and understanding of themselves and their needs, and to help them find ways of meeting those needs in a better way.&quot;" />
                      <outline text="&quot;The internet is our kids pavement,&quot; says Cybersmile co-founder Dan Raisbeck." />
                      <outline text="&quot;They are learning their social dynamics on the internet and staying abreast of that as a parent is difficult." />
                      <outline text="&quot;Engaging with a teenager about the colour of their socks can be impossible at times, so prying into their internet habits is going to be difficult, but parents need to engage more with them and support them." />
                      <outline text="He believes everyone has a responsibility to &quot;get rid of online hate&quot;." />
                      <outline text="&quot;Schools, authorities and the companies themselves have to do their bit and make sure that the message gets across so this behaviour is seen to be wrong and socially unacceptable,&quot; he said." />
                      <outline text="&quot;We need to have a massive campaign showing the real emotional cost of losing someone through this and how it happens." />
                      <outline text="&quot;I count myself quite lucky that I managed to engage with my kid before it went too far - and that&apos;s where parents need to be.&quot;" />
              </outline>

              <outline text="Google outage reportedly caused big drop in global traffic">
                      <outline text="Link to Article" type="link" url="http://news.cnet.com/8301-17938_105-57598978-1/google-outage-reportedly-caused-big-drop-in-global-traffic/?part=rss&amp;subj=news&amp;tag=title" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376709563_LAVBJezP.html" />
        <outline text="Source: CNET News" type="link" url="http://news.cnet.com/2547-1_3-0-20.xml" />
      <outline text="Sat, 17 Aug 2013 03:19" />
                      <outline text="" />
                      <outline text="Most Google services, including search, were down for a few minutes Friday, prompting much of the Internet to start the weekend early ... and then quickly change its mind." />
                      <outline text="For a very brief few minutes on Friday you may have noticed some Google services, most notably search, appeared to be down. If not, maybe you noticed the ensuing freak-out across Twitter and the rest of the Internet." />
                      <outline text="At first glance the flash outage was little more than an opportunity for a few good one-liners and a chance to actually stand up from the keyboard and walk around for a few minutes. If we had connected nanobots floating around in our bloodstreams, certainly they would have registered a worldwide uptick in caffeine intake during those few moments." />
                      <outline text="As it turns out though, Google&apos;s downtime did appear to have global, measurable repercussions according to analytics firm GoSquared, which estimates that it caused a 40 percent drop in global traffic during a five-minute window:" />
                      <outline text="Google.com was down for a few minutes between 23:52 and 23:57 BST on 16th August 2013. This had a huge effect in the number of pageviews coming into GoSquared&apos;s real-time tracking - around a 40% drop, as this graph of our global pageviews per minute shows. That&apos;s huge. As internet users, our reliance on google.com being up is huge. It&apos;s also of note that pageviews spiked shortly afterwards, as users managed to get to their destination." />
                      <outline text="Google has acknowledged the outage, which it says has been resolved. The official downtime according to a Google status page was between 1 and 5 minutes." />
                      <outline text="In related news, Bing and Yahoo still exist, but apparently failed to find a way to target their marketing to Google users during the outage." />
                      <outline text="Updated at 8:05 pm to correct the duration of the outage reported by Google." />
              </outline>

              <outline text="Fall 2013 International Human Rights program intern | Center for Constitutional Rights">
                      <outline text="Link to Article" type="link" url="http://ccrjustice.org/about-us/job-internship/fall-2013-international-human-rights-program-intern" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376704789_T6vKDqX6.html" />
      <outline text="Sat, 17 Aug 2013 01:59" />
                      <outline text="" />
                      <outline text="Apply by dateAugust 9, 2013" />
                      <outline text="DescriptionThe Center for Constitutional Rights (CCR) seeks a third or fourth year undergraduate student, recent graduate, or graduate student with a strong commitment to social justice to help with several legal and advocacy-related projects as part of a semester-long unpaid internship opportunity.  CCR is a national not-for-profit legal, educational, and advocacy organization dedicated to advancing and protecting the rights guaranteed by the United States Constitution and the Universal Declaration of Human Rights.  Founded in 1966 by attorneys who represented civil rights movements in the South, CCR is committed to the creative use of law as a positive force for social change. The International Human Rights (IHR) docket focuses on holding government officials and corporations accountable for serious violations of international law, primarily under the Alien Tort Statute, the Torture Victim Protection Act, and the principle of universal jurisdiction. It works primarily in U.S. courts, but also is involved in litigation in foreign and international courts, and advocacy using regional or international human rights mechanisms. CCR&apos;s legal internships are part of CCR&apos;s new Social Justice Institute (SJI), an innovative training institute for social justice law students, lawyers, and legal interns created in partnership with the Bertha Foundation. The SJI supports existing and aspiring social justice lawyers through a range of programs including: post-graduate fellowships, the summer Ella Baker Program, fall/spring internships and externships, Continuing Legal Education (CLE) courses, regional conferences and national training institutes." />
                      <outline text="The intern will work10-25 hours per week,assisting legal workers and attorneys in CCR&apos;s IHR docket on several on-going projects and case development.  The intern will have the opportunity to work on a range of issues and cases. " />
                      <outline text="ResponsibilitiesResponsibilities include: assisting in factual research, review, and writing; reviewing and indexing documents, especially those released by government agencies in FOIA requests and litigation; performing literature and press reviews, identifying vendors and experts, and gathering information as part of outreach strategy; and general administrative tasks." />
                      <outline text="QualificationsSpanish or Arabic language skills, graphic design skills, and experience in a legal environment are a plus.  Previous experience working in a non-profit, social justice organization is preferred, as well as an interest in international human rights.  The ideal candidate is organized and detail-oriented, is able to manage multiple tasks and priorities efficiently, works well in a team, and is proficient in Microsoft Office suite.  Candidates should also demonstrate experience in and/or commitment to social justice, organizing and/or social movements." />
                      <outline text="Compensation " />
                      <outline text="Contact" />
              </outline>

              <outline text="Bertha and Us">
                      <outline text="Link to Article" type="link" url="http://britdoc.org/britdoc/bertha-and-us" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376703576_yv2M7Qkt.html" />
      <outline text="Sat, 17 Aug 2013 01:39" />
                      <outline text="" />
                      <outline text="The Bertha Foundation is a visionary organisation with a track record in supporting social justice causes through documentary film.We believe that by joining forces, we can enable documentary filmmakers globally.The Bertha Foundation is investing in BRITDOC&apos;s future, joining the Board of Directors and launching two new funds worth &#163;1.5 million to filmmakers over the next three years." />
                      <outline text="Funding is now available through the Bertha BRITDOC Journalism Fund and the Bertha BRITDOC Connect fund." />
              </outline>

              <outline text="Rebecca Lichtenfeld - IMDb Peter Gabriel">
                      <outline text="Link to Article" type="link" url="http://www.imdb.com/name/nm4002839/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376703487_tky7hFR4.html" />
      <outline text="Sat, 17 Aug 2013 01:38" />
                      <outline text="" />
                      <outline text="Share this page:Quick Links:Do you have a demo reel?Add it to your IMDbPage" />
                      <outline text="  Find out more at IMDbPro &amp;raquoConnect with IMDbTake The Quiz!Test your knowledge of Rebecca Lichtenfeld." />
              </outline>

              <outline text="REBECCA LICHTENFELD good pitch">
                      <outline text="Link to Article" type="link" url="https://goodpitch.org/users/rebecca-lichtenfeld" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376703463_uYEDe3qa.html" />
      <outline text="Sat, 17 Aug 2013 01:37" />
                      <outline text="" />
                      <outline text="Good Pitch brings together documentary filmmakers with foundations, NGOs, campaigners, philanthropists, policy makers, brands and media around leading social and environmental issues &apos;&apos; to forge coalitions and campaigns that are good for all these partners, good for the films and good for society." />
                      <outline text="A partnership between BRITDOC and Sundance Institute Documentary Film Program, Good Pitch has been gaining momentum since the first international event in 2009. Running several times throughout the year, it convenes specially selected attendees with filmmakers to form powerful alliances around groundbreaking films." />
                      <outline text="Each of the filmmaking teams has just 7 minutes to pitch their film and associated outreach campaign. A good pitch will lead to new sources of funding, and access to mass membership, research and experts, archives and lobbying." />
              </outline>

              <outline text="VIDEO-&apos;&#150;&#182; WOW MUST SEE : The Bertha foundation the communists behind Assange , Snowden &amp; Wikileaks ? - YouTube">
                      <outline text="Link to Article" type="link" url="http://www.youtube.com/watch?v=rwzjSGgxqF4" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376700015_RheCZF2k.html" />
      <outline text="Sat, 17 Aug 2013 00:40" />
                      <outline text="" />
              </outline>

              <outline text="Bertha Britdoc Funds">
                      <outline text="Link to Article" type="link" url="http://britdoc.org/real_films/britdoc-bertha-awards" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376699882_9gwFUUX8.html" />
      <outline text="Sat, 17 Aug 2013 00:38" />
                      <outline text="" />
                      <outline text="Director:Dawn Porter" />
                      <outline text="GIDEON&apos;S ARMY follows the personal stories of Travis Williams, Brandy Alexander and June Hardwick, three young public defenders who are part of... [read more]" />
                      <outline text="Director:Mark Grieco" />
                      <outline text="If Colombia is the new El Dorado of the global gold rush then Marmato, a mining town with over 500 years of history, is the new frontier. In its mountain there are over 21... [read more]" />
                      <outline text="Director:Pietra Bretkelly" />
                      <outline text="Teenager Ngaa Rauuira breaks the bonds of Maori culture to be the first to attend Yale and bring a future to his people.  But will New Zealand&apos;s two cultur... [read more]" />
                      <outline text="Director:Lieven Corthouts" />
                      <outline text="Right in the heart of the Ethiopian capital Addis Ababa is a small orphanage called &apos;Little Heaven&apos;. One of the orphans, Lydia, is 13 today. A truly joyful event, ... [read more]" />
                      <outline text="Director:Roger Ross Williams" />
                      <outline text="God Loves Uganda explores the role of the American evangelical movement in Uganda, where American missionaries have been credited with both creating schools and hospitals ... [read more]" />
                      <outline text="Director:Violeta Ayala" />
                      <outline text="From inside one of Bolivia&apos;s notorious prisons, a cocaine worker, a drug mule, and his little sister reveal the country&apos;s relationship with cocaine. COCAINE PRIS... [read more]" />
                      <outline text="Director:Kamar Ahmad Simon &amp; Sara Afreen" />
                      <outline text="By the coastal belts of Bangladesh, in a small village named &apos;Sutarkhali&apos;, RAKHI lives with her man SOUMEN (32) and their son RAHUL (6). Fighting against all t... [read more]" />
                      <outline text="Director:Martha Shane and Lana Wilson" />
                      <outline text="Since the assassination of Dr. George Tiller in Kansas in May 2009, there are only four American doctors left who provide third-trimester abortions. After Tiller ... [read more]" />
                      <outline text="Director:Elizabeth Chai Vasarhelyi" />
                      <outline text="In the Spring of 2011, Senegal was pitched into crisis when President Abdoulaye Wade decided to change the constitution to allow for a third term. An artist-led youth move... [read more]" />
                      <outline text="Director:Victor Buhler" />
                      <outline text="Lott Industries in Toledo, Ohio, employs more than 1200 workers, all with developmental disabilities.  For decades the company excelled in assembling car parts. ... [read more]" />
                      <outline text="Director:Mads Br&#188;gger" />
                      <outline text="If this really is true, if The Secretary of The United Nations really was assassinated by a sinister nexus of big powers working in collusion, it could be the most importa... [read more]" />
                      <outline text="2012Director:David France" />
                      <outline text="In the dark days of 1987, the country was six years into the AIDS epidemic, a crisis that was still largely being ignored both by government officials and health organizat... [read more]" />
                      <outline text="2012Director:Richard Rowley" />
                      <outline text="Dirty Wars follows investigative reporter Jeremy Scahill, author of the international bestseller Blackwater, into the heart of America&apos;s covert war... [read more]" />
                      <outline text="Director:Liz Mermin" />
                      <outline text="A sugary duet with the unintentionally ironic title &apos;&apos;Running Scared&apos;&apos; secured the contest for this oil and gas-rich, secular Shia, former Soviet Republic on the... [read more]" />
                      <outline text="Director:Mona Nicoara and Miruna Coca-Cozma" />
                      <outline text="Three Roma (&apos;&apos;Gypsy&apos;&apos;) children from a small Transylvanian town participate in a project to desegregate the local school, struggling against indifference, tradit... [read more]" />
                      <outline text="2012Director:Ra&apos;anan Alexandrowicz " />
                      <outline text="  The Law In These Parts explores this unprecedented and little-known story through testimonies of the military legal professionals who were ... [read more]" />
                      <outline text="2012Director:Jerry Rothwell" />
                      <outline text="Town Of Runners (www.townofrunners.com) is a feature documentary about young people from the Ethiopian rural town of Bekoji, whose runners have won 8 Olympic Gold m... [read more]" />
                      <outline text="2012Director:Marc Silver" />
                      <outline text="An anonymous body in the Arizona desert sparks the beginning of a real-life human drama. The search for ide... [read more]" />
                      <outline text="2012Director: " />
                      <outline text="Anne Poiret and Florence Martin-Kessler" />
                      <outline text="A year ago, in July 2011, the Republic of South Sudan became the world&apos;s newest State and the United Nations&apos; 193rd member. After a 50-year civil war, which ki... [read more]" />
                      <outline text="Director:Callum Macrae" />
                      <outline text="Our film reveals the true extent of crimes against humanity in the final weeks of the Sri Lankan civil war - told through eye witness testimony and shocking video evidence... [read more]" />
                      <outline text="2012Director:Jehane Noujaim" />
                      <outline text="The Square is an intimate observational documentary that tells an immersive story of the ongoing struggle of the Egyptian Revolution. Beginning in the tents of Ta... [read more]" />
                      <outline text="2012Director:Fredrik Gertten" />
                      <outline text="In April 2009, Swedish filmmakers Fredrik Gertten and Margarete Jang&#165;rd learned that the world premiere of BANANAS!* - their documentary about a lawsuit aga... [read more]" />
                      <outline text="2012Director:Lorie Conway Co-producers: Lorie Conway, Hopewell Chin&apos;Ono &amp; Andrew Meldrum" />
                      <outline text="Our film seeks to highlight the importance of the rule of law by focusing on attorney Beatrice Mtetwa&apos;s efforts in Zimbabwe. In spite of beatings by police, she has ... [read more]" />
                      <outline text="2012Director:Penny Woolcock" />
                      <outline text="Inner cities are little war zones in which small wars are fought. Gangs of young men stab and shoot each other for straying into the wrong postcode. But now, two gang lead... [read more]" />
                      <outline text="2012Director:Steve James" />
                      <outline text="The Interrupters tells the moving and surprising stories of three &apos;&apos;violence interrupters&apos;&apos; - two men and a woman - who with bravado, humility and even ... [read more]" />
                      <outline text="2012Director:Kirby Dick" />
                      <outline text="The Invisible War is a groundbreaking investigative documentary about one of our country&apos;s most shameful and best kept secrets: the epidemic of rape within ou... [read more]" />
                      <outline text="2012Director:Michael Collins" />
                      <outline text="As a tropical storm beats down on the Philippine island of Cebu, two sisters leave work and never make it home... Give Up Tomorrow exposes a Kafkaesque extravagan... [read more]" />
                      <outline text="2012Director:Josh Fox" />
                      <outline text=" " />
                      <outline text="Gasland 2, a sequel to the Oscar Award-nominated and Emmy-winning film by Josh Fox, Gasland, continues the filmmaker&apos;s ongoing investigation into t... [read more]" />
                      <outline text="Director:Mackey Alston" />
                      <outline text="LOVE FREE OR DIE is about a man whose two defining passions are in direct conflict: his love for God and for his partner Mark. Gene Robinson is the first openly gay person... [read more]" />
                      <outline text="Director:Rebekah Wingert-Jabi and Julia Bacha" />
                      <outline text="Mohammed El Kurd is a Palestinian boy growing up in the neighbo... [read more]" />
                      <outline text="2012Director:Yoav Potash" />
                      <outline text="Crime After Crime is the exclusive documentary film on the dramatic legal battle to free Debbie Peagler, a woman imprisoned for over a quarter century due to her ... [read more]" />
                      <outline text="2012Director:Katherine Fairfax Wright &amp; Malika Zouhali-Worrall" />
                      <outline text=" " />
                      <outline text="In Uganda, a new bill threatens to make homosexuality punishable by death. David Kato - Uganda&apos;s first openly gay man - and his fellow activists work against the clock... [read more]" />
                      <outline text="2012Director:Katie Dellamaggiore" />
                      <outline text="Brooklyn Castle takes an intimate look at a year in the lives of several young teens at Brooklyn, New York&apos;s Intermediate School 318 &apos;&apos; where 65% of st... [read more]" />
                      <outline text="Director:Mike Lerner &amp; Maxim Pozdorovkin" />
                      <outline text="Three young women face seven years in a Russian prison for a satirical performance in a Moscow cathedral. But who is really on trial in a case that has gripped the nation ... [read more]" />
              </outline>

              <outline text="Bertha Foundation-AGAIN">
                      <outline text="Link to Article" type="link" url="http://www.berthafoundation.org/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376699766_xCHLp8eA.html" />
      <outline text="Sat, 17 Aug 2013 00:36" />
                      <outline text="" />
                      <outline text="VALUES" />
                      <outline text="RISKWe believe philanthropy is more art than science, and we focus on people with a clear vision for change. We try to be trailblazers in finding daring opportunities that can create positive change." />
                      <outline text="FLEXIBILITYWe know the world is dynamic, and we need to be responsive to change. So although we believe our work must have a focus, we also remain open to new possibilities." />
                      <outline text="FUNWe take our work seriously and we love what we do. We like working with people who feel that same passion." />
                      <outline text="Bertha Foundation dreams of a more just world and supports forms of activism that aim to bring about change. We champion those using media, law and enterprise as tools to achieve their vision." />
                      <outline text="We envision a society where stories come from many different voices, where law is used as a tool for justice and where business delivers positive social impact." />
                      <outline text="We work with a network of people who we believe can change the world - activists working with storytellers and lawyers. While powerful on their own, we also look for opportunities for leaders to collaborate across portfolios." />
                      <outline text="Four pillars support Bertha Foundation&apos;s mission to create more progressive and just societies; Activism, Media, Law and Enterprise." />
              </outline>

              <outline text="Poitras 2012 funding-BB Journalism Fund">
                      <outline text="Link to Article" type="link" url="http://britdoc.org/real_funds/bertha-britdoc-documentary-journalism-fund" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376699748_B6VkeNBG.html" />
      <outline text="Sat, 17 Aug 2013 00:35" />
                      <outline text="" />
                      <outline text="The Bertha BRITDOC Fund for Journalism is an international film fund dedicated to supporting long form feature documentaries of a journalistic nature.We are looking for films that break the important stories of our time, expose injustice, bring attention to unreported issues and cameras into regions previously unseen.This fund recognises such films are often delicate and protracted, making them difficult to fund. With a mission to enable in-depth analysis of issues through long-form investigative filmmaking, we are particularly looking to work with filmmakers with a journalistic background or those who are collaborating with journalists." />
                      <outline text="It is key that the journalistic intent is embedded within the film itself rather than the film simply being about a journalist or journalistic institution." />
                      <outline text="Elements we can support:In-depth research &amp; developmentProduction funding for longitudinal investigationsEditorial support for long-form documentary structureHostile Environment TrainingEmergency transportationLegal Advice during production and post productionLegal advice for complex E&amp;O policiesWhat we DON&apos;T fund:ProfilesNewsCurrent AffairsFiction filmsFormatsSeriesOther things to bear in mind:We will be supporting films 60mins+ in lengthGrants from &#163;5,000 to &#163;50,000 are availableFunding is awarded on a rolling basisFunding decisions will be made within 6 weeks of application, unless your project is an urgent response to eventsWe are unlikely to fully fund a film so it must have international co-financing potential.We don&apos;t fund retrospectivelySince 2011 we have supported over 15 projects. Recent grantees can be found in our Bertha BRITDOC Journalism Fund directory, including:" />
              </outline>

              <outline text="Laura Poitras | a.nolen">
                      <outline text="Link to Article" type="link" url="http://anolen.com/tag/laura-poitras/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376699124_CRCSE8th.html" />
      <outline text="Sat, 17 Aug 2013 00:25" />
                      <outline text="" />
                      <outline text="At least he has a sense of humor." />
                      <outline text="Everyone concerned with the PRISM revelations should now be contacting their representatives and encouraging their friends to do the same.  That&apos;s what should be happening, and it seems to be happening en masse&apos;&apos; in Germany and the US at least." />
                      <outline text="Supporters of the NSA&apos;s abusive programs are trying to distract from Snowden&apos;s important revelations by drawing attention to Wikileaks, which is an organization that is difficult to understand. I think that Lonnie Snowden said it best:" />
                      <outline text="&apos;&apos;I don&apos;t want to put him [Edward] in peril, but I am concerned about those who surround him,&apos;&apos; he says. &apos;&apos;I think WikiLeaks, if you&apos;ve looked at past history, you know, their focus isn&apos;t necessarily the Constitution of the United States. It&apos;s simply to release as much information as possible.&apos;&apos;" />
                      <outline text="Julian Assange is the weakest link for anybody defending Snowden&apos;s actions from NSA shills." />
                      <outline text="I should say, Assange is the weakest link that American talking heads are willing to spout about. There&apos;s one more. His name is Jacob Appelbaum and you probably know him from his promotion of the Tor network." />
                      <outline text="What is Tor? From their website:" />
                      <outline text="Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the Naval Research Laboratory. It was originally developed with the U.S. Navy in mind, for the primary purpose of protecting government communications. Today, it is used every day for a wide variety of purposes by the military, journalists, law enforcement officers, activists, and many others." />
                      <outline text="Jacob Appelbaum released an interview with Snowden to Der Spiegel about Tempora and German intelligence cooperation with the NSA&apos;s abusive programs. Read an English version here." />
                      <outline text="Appelbaum explains how he was granted such an interview:" />
                      <outline text="&apos;&apos;In mid-May, documentary filmmaker Laura Poitras contacted me,&apos;&apos; Appelbaum said. &apos;&apos;She told me she was in contact with a possible anonymous National Security Agency (NSA) source who had agreed to be interviewed by her.&apos;&apos;" />
                      <outline text="&apos;&apos;She was in the process of putting questions together and thought that asking some specific technical questions was an important part of the source verification process. One of the goals was to determine whether we were really dealing with an NSA whistleblower. I had deep concerns of COINTELPRO-style entrapment. We sent our securely encrypted questions to our source. I had no knowledge of Edward Snowden&apos;s identity before he was revealed to the world in Hong Kong. He also didn&apos;t know who I was. I expected that when the anonymity was removed, we would find a man in his sixties.&apos;&apos;" />
                      <outline text="There are a few things different between Appelbaum&apos;s interview and the interviews that Greenwald and Poitras published. First, you&apos;ll notice Snowden&apos;s language is more crass. Second, there was no release of documents involved with Appelbaum. Appelbaum claims that Snowden was willing to have Appelbaum publish their conversation at Appelbaum&apos;s convenience." />
                      <outline text="Now, at face value, Appelbaum&apos;s interest in Edward is very understandable. Appelbaum is famous for supporting internet freedom. Things get less comfortable when you dig deeper though: Appelbaum&apos;s Tor project is part of the US Naval Research Laboratory and is funded by outfits like the NRL, Google, the Broadcasting Board of Governors (that&apos;s a .gov link!), the (US) National Science Foundation, Human Rights Watch, Shinjiru International (Microsoft endorsed), The Knight Foundation, Radio Free Asia and the National Christian Foundation (!?). Read the full list of sponsors here." />
                      <outline text="Appelbaum spends his time educating US law enforcement (like the FBI&apos;&apos; team sport!) on how to monitor websites without revealing that the government is watching, as well as helping dissidents&apos;&apos; particularly dissidents in countries hostile to the US&apos;&apos; send information securely." />
                      <outline text="Why would Poitras go to a guy who is funded by the US military, the abuse-complicit company Google, US propaganda outfits, and a faith-based tax avoidance operation to vet Snowden? Oh yeah, and Appelbaum&apos;s famous for educating the FBI&apos;&apos; that organization from the Verizon tap order." />
                      <outline text="Appelbaum stood in for Assange once when the Wikileaks head couldn&apos;t make it to a speech&apos;&apos; read Rolling Stone&apos;s saccharine piece on Appelbaum here. Yet, despite all the weirdness around Appelbaum, Beltliners keep pounding the Assange drum." />
                      <outline text="Washington: Why not sling mud at Appelbaum? Or is he a little too close to home? Oh yeah, and now Human Rights Watch is &apos;handling&apos; Snowden&apos;s case from the US of A&apos;&apos; sort of like how the FSB is &apos;handling&apos; his case from Russia." />
                      <outline text="Sadly, Edward Snowden has a lot of dangerous people around him. Some are playing damage control, others are trying to make hay. These games are impossible for Snowden to avoid, because what he did is so important." />
                      <outline text="Eyes on the prize everyone: Snowden&apos;s revelations are about constitutional rights and reining in civil servants who have lost touch with reality. Call your senators, congressmen and push for the deepest intelligence funding cuts you can. Lobby like your life depends on it." />
                      <outline text="&apos;--&apos;--&apos;--&apos;--&apos;--&apos;--" />
                      <outline text="I forgot to add that Poitras contacted Appelbaum in order to vet Snowden on the technical details of the whistleblower&apos;s NSA experience. Here&apos;s how Appelbaum describes it:" />
                      <outline text="&apos;&apos;She [Poitras] was in the process of putting questions together and thought that asking some specific technical questions was an important part of the source verification process. One of the goals was to determine whether we were really dealing with an NSA whistleblower. I had deep concerns of COINTELPRO-style entrapment. We sent our securely encrypted questions to our source.&apos;&apos;" />
                      <outline text="And&apos;..." />
                      <outline text="&apos;&apos;The following questions are excerpted from a larger interview that covered numerous topics, many of which are highly technical in nature. Some of the questions have been reordered to provide the required context. The questions focus almost entirely on the NSA&apos;s capabilities and activities. It is critical to understand that these questions were not asked in a context that is reactive to this week&apos;s or even this month&apos;s events. They were asked in a relatively quiet period, when Snowden was likely enjoying his last moments in a Hawaiian paradise &apos;-- a paradise he abandoned so that every person on the planet might come to understand the current situation as he does.&apos;&apos;" />
                      <outline text="So presumably, Poitras thought that Applebaum would know the &apos;right answer&apos; to the technical questions he asked Snowden. (Or at least she believed that Appelbaum would know if an answer was within the NSA&apos;s technical capabilities.) We&apos;re only given some of the questions and answers. So which of these technical questions might Appelbaum know the &apos;right answer&apos; to?" />
                      <outline text="1. Are German authorities or German politicians involved in the NSA surveillance system?" />
                      <outline text="2. But if details about this system are now exposed, who will be charged?" />
                      <outline text="3. Did the NSA help to create Stuxnet? (Stuxnet is the computer worm that was deployed against the Iranian nuclear program.)" />
                      <outline text="4. What are some of the big surveillance programs that are active today and how do international partners aid the NSA? Follow up: Is there a way of circumventing that? [&apos;Cause we all know Tor is weak!- a.nolen]" />
                      <outline text="5. Do the NSA and its partners across the globe do full dragnet data collection for telephone calls, text and data?" />
                      <outline text="6. The NSA is building a massive new data center in Utah. What is its purpose?" />
                      <outline text="7. Do private companies help the NSA?" />
                      <outline text="8. Are there companies that refuse to cooperate with the NSA?" />
                      <outline text="9. What websites should a person avoid if they don&apos;t want to get targeted by the NSA?" />
                      <outline text="10. What happens after the NSA targets a user?" />
                      <outline text="If I was in in Appelbaum&apos;s position, I wouldn&apos;t want to admit knowing the right answer to ANY of these questions." />
                      <outline text="Appelbaum doesn&apos;t differentiate between 1) questions that he used to decide if Snowden was a legit NSA employee (i.e. if Snowden could possibly know what he is talking about) and 2) questions that Appelbaum just wanted to get on record. (For his own sake or Snowden&apos;s, I wonder.) Appelbaum does admit to presenting the questions in Der Spiegel in a different order than which he asked them, though again, we&apos;re not told how the order was changed." />
                      <outline text="Why not tell us which questions convinced you of Snowden&apos;s authenticity, Jacob? Are the rest of us just too stupid to understand the &apos;&apos;highly technical&apos;&apos; parts? When where you sure that Snowden wasn&apos;t a &apos;&apos;COINTELPRO-style&apos;&apos; trap? The public would love to know." />
              </outline>

              <outline text="VIDEO-Psaki Won&apos;t Answer if Egyptian Military Killing Civilians with U.S. Weapons | Washington Free Beacon">
                      <outline text="Link to Article" type="link" url="http://freebeacon.com/psaki-wont-answer-if-egyptian-military-killing-civilians-with-u-s-weapons/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376697919_Cm27fXzh.html" />
      <outline text="Sat, 17 Aug 2013 00:05" />
                      <outline text="" />
                      <outline text="BY:Washington Free Beacon StaffAugust 16, 2013 5:00 pm" />
                      <outline text="CNN anchor Jake Tapper called out State Department spokesperson Jen Psaki for dodging his question about whether the Egyptian military was using U.S.-supplied weapons to kill citizens during the recent crisis there, saying he didn&apos;t want to waste the viewers&apos; time." />
                      <outline text="During an interview on The Lead, Psaki repeated her talking points that the violence was &apos;&apos;deplorable&apos;&apos; and the administration was reviewing the situation day by day, but she would not answer the question, despite Tapper&apos;s follow-up for a direct response." />
                      <outline text="TAPPER: The U.S. has provided tens of billions in aid to the Egyptian military over the years, mostly in the form of assets, weapons and ammunition and the like. I guess the big question right now, as the world watches, is for the Americans. Are supplies that the U.S. has given Egypt now being used to kill civilians in the street?" />
                      <outline text="PSAKI: Well, Jake, first let me say that what&apos;s happening on the ground in Egypt, what we&apos;ve seen over the past couple of days, is deplorable, is horrific. There are not enough adjectives to describe it. You&apos;ve heard the president and the secretary describe it in that way as well. We&apos;re obviously looking very closely at our broad relationship with Egypt. You can&apos;t have business as usual when hundreds of civilians are being killed in the street. But we have a broad, enduring partnership and strategic relationship with Egypt that&apos;s been going on for decades, so that&apos;s why we&apos;re doing this review very carefully. We&apos;ve taken some steps to cut off certain forms of aid but we&apos;re continuing to review day by day." />
                      <outline text="TAPPER: But are American munitions that were given by the U.S. to Egypt, are they actually tools of slaughter? Do we know that one way or the other?" />
                      <outline text="PSAKI: Well, Jake, obviously we&apos;re watching every event happening on the ground very closely. Regardless of where these tools are from, this is horrific what is happening to civilians on the ground. It certainly is not acceptable to the president, to the Secretary of State, to anybody in the administration, and we are evaluating and reviewing the events that are happening on the ground and the steps being taken by the interim government every single day." />
                      <outline text="TAPPER: I don&apos;t want to waste your time or our viewers&apos;, but I&apos;ll respectfully note you&apos;re not answering that question." />
              </outline>

              <outline text="CNN: Marijuana May Kill Cancer Cells!">
                      <outline text="Link to Article" type="link" url="http://www.youtube.com/watch?v=tXzt1fs43hY&amp;feature=youtube_gdata" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376697866_8pNEzhj4.html" />
        <outline text="Source: Uploads by MOXNEWSd0tC0M" type="link" url="http://gdata.youtube.com/feeds/base/users/MOXNEWSd0tC0M/uploads?alt=rss&amp;v=2&amp;orderby=published&amp;client=ytapi-youtube-profile" />
      <outline text="Sat, 17 Aug 2013 00:04" />
                      <outline text="" />
              </outline>

              <outline text="Iraq-Turkey oil pipeline bombed: officials.">
                      <outline text="Link to Article" type="link" url="http://www.reuters.com/article/2013/08/16/us-iraq-oil-pipeline-idUSBRE97F0YD20130816?feedName=worldNews&amp;feedType=RSS" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376697696_FWs8VFXd.html" />
        <outline text="Source: WT news feed" type="link" url="http://s3.amazonaws.com/radio2/w.tromp@xs4all.nl/linkblog.xml" />
      <outline text="Sat, 17 Aug 2013 00:01" />
                      <outline text="" />
                      <outline text="BAGHDAD | Fri Aug 16, 2013 4:17pm EDT" />
                      <outline text="BAGHDAD (Reuters) - A bomb attack halted the flow of crude oil through a pipeline running from Iraq&apos;s Kirkuk oil fields to the Mediterranean port of Ceyhan in Turkey, two Iraqi oil officials said on Friday." />
                      <outline text="The attack took place at around 0100 GMT on Friday near the al-Shura area 60 km (40 miles) to the south of the city of Mosul. The officials said repair work would be complete in around 48 hours." />
                      <outline text="&quot;Attackers planted a roadside bomb near a section of the pipeline,&quot; one official said. The 900 km pipeline has been bombed by militants around 30 times since the start of the year, according to the oil ministry." />
                      <outline text="(Reporting by Ziad al-Sanjary in Mosul; Writing by Sylvia Westall; Editing by Anthony Barker)" />
              </outline>

              <outline text="Breast implants suicide bomb threat: Heathrow on high alert over &quot;credible&quot; intelligence">
                      <outline text="Link to Article" type="link" url="http://www.mirror.co.uk/news/uk-news/breast-implants-suicide-bomb-threat-2172911" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376697650_Uq2zBy4k.html" />
        <outline text="Source: WT news feed" type="link" url="http://s3.amazonaws.com/radio2/w.tromp@xs4all.nl/linkblog.xml" />
      <outline text="Sat, 17 Aug 2013 00:00" />
                      <outline text="" />
                      <outline text="16 Aug 2013 00:00Security has been beefed up after intelligence al-Qaeda is plotting attacks on airlines flying out of London" />
                      <outline text="Getty Images" />
                      <outline text="Heathrow Airport is on high terror alert amid fears women suicide bombers are ready to strike with &#173;explosives concealed in breast implants." />
                      <outline text="Security checks have been beefed up after &apos;&apos;credible&apos;&apos; intelligence that al-Qaeda is plotting attacks on airlines flying out of London." />
                      <outline text="One staff member said: &apos;&apos;There are genuine fears over this." />
                      <outline text="&quot;We have been told to pay particular attention to females who may have concealed hidden explosives in their breasts." />
                      <outline text="&apos;&apos;This is particularly difficult for us to pick up but we are on a very high state of alert." />
                      <outline text="&apos;&apos;It&apos;s led to long queues here at Heathrow &apos;&apos; much longer than usual at this time of the year." />
                      <outline text="&apos;&apos;But because it&apos;s the summer holiday season, no one has complained.&apos;&apos;" />
                      <outline text="Al-Qaeda&apos;s chief bomb-maker Ibrahim al-Asiri is understood to have developed the method of foiling airport scanners by concealing &#173;explosives in an implant or bodily cavity." />
                      <outline text="It is also feared there is no shortage of &#173;volunteers willing to take part in an atrocity after hundreds of extremists recently escaped from prison in Pakistan." />
                      <outline text="Explosives expert Andy Oppenheimer said: &apos;&apos;There is a great fear that al-Qaeda are planning on using internal devices to try and get through airport scanners." />
                      <outline text="&quot;These explosives could be in breast implants.&apos;&apos;" />
                      <outline text="Device: Silicon breast implants" />
                      <outline text="Getty Images" />
                      <outline text="Another specialist, who asked not to be named, said breast implant bombs could be set off by injecting another liquid." />
                      <outline text="The expert added: &apos;&apos;Both are very difficult to pick up with current technology and they are petrified al-Qaeda are a step ahead here." />
                      <outline text="&apos;&apos;It&apos;s pretty top secret and potentially very grisly and ghastly.&apos;&apos;" />
                      <outline text="Independent security analyst Paul Beaver said: &apos;&apos;There are currently deeply serious concerns over body cavities and implants of all kinds &apos;&apos; including breast implants &apos;&apos; being used to hide explosives." />
                      <outline text="&quot;It is taking longer to get through Heathrow and other airports in Europe and North America because of these fears." />
                      <outline text="&apos;&apos;They are taking longer to screen people and there is definitely some sort of profiling going on." />
                      <outline text="&apos;&apos;The general alert state remains the same in the UK but overseas, the recent Pakistan prison breakouts and foiled attacks in Yemen are raising fears of a new jihadist wave of violence.&apos;&apos;" />
                      <outline text="Terrorists are believed to be plotting attacks with the explosive pentaerythritol tetranitrate, or PETN." />
                      <outline text="Limited: Airport bodyscanners" />
                      <outline text="Getty Images" />
                      <outline text="It is also feared they may have &#173;developed an undetectable liquid explosive that could be soaked into clothing." />
                      <outline text="For a suicide bomber sat in a window seat it would take only a relatively small blast to blow a lethal hole in a plane&apos;s fuselage." />
                      <outline text="Mr Beaver added: &apos;&apos;The terrorist is getting clever, but so are detection methods." />
                      <outline text="&apos;&apos;The fact we know about the new methods suggests there are detection and counter-measure options." />
                      <outline text="&apos;&apos;Implant bombs are a one-way ticket anyway so the suicide bomber won&apos;t care what the trigger might be." />
                      <outline text="&quot;It would have to be simple and straightforward &apos;&apos; perhaps electrical.&apos;&apos;" />
                      <outline text="A Heathrow Airport spokesman said: &apos;&apos;We don&apos;t comment on specific security measures.&apos;&apos;" />
                      <outline text="Scans won&apos;t detect them: Expert view by Philip Baum, Editor of Security InternationalThe possibility of medically implanted explosives is a concern to the industry." />
                      <outline text="There are two main ways of initiating a detonation &apos;&apos; by chemical reaction or radio controlled detonators." />
                      <outline text="The problem is another reason why we should be using behavioural analysis as the primary detection method to screen people at airports." />
                      <outline text="Body scanners are good at identifying things outside the body but not inside." />
                      <outline text="Whether or not implants would make effective explosive devices in passenger planes is also questionable." />
                      <outline text="The examples we have seen haven&apos;t quite had the impact those behind them might have hoped for." />
              </outline>

              <outline text="Sibel Edmonds&apos; Boiling Frogs Post | Home of the Irate Minority">
                      <outline text="Link to Article" type="link" url="http://www.boilingfrogspost.com/2013/08/16/bfp-exclusive-bruce-fein-a-bad-penny-that-is-always-turning-up/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376687479_VCnQehRU.html" />
      <outline text="Fri, 16 Aug 2013 21:11" />
                      <outline text="" />
                      <outline text="Friday, 16. August 2013" />
                      <outline text="The Many Hats of Washington&apos;s Favorite Rat- A Lobbyist, A Presidential Campaign Advisor, A Snitch, An Attorney, A Civil-Rights Activist &apos;...You Name It!" />
                      <outline text="In a recentdisclosureto the Huffington Post NSA whistleblower Edward Snowden said the media have been &apos;&apos;misled&apos;&apos; by associates of his father, attorney and lobbyist Bruce Fein and his wife Mattie Fein who have been circulating &apos;&apos;false&apos;&apos; claims about his situation." />
                      <outline text="It has come to my attention that news organizations seeking information regarding my current situation have, due to the difficulty in contacting me directly, been misled by individuals associated with my father into printing false claims about my situation,&apos;&apos; read the text of the message purportedly sent by the younger Snowden." />
                      <outline text="Neither my father, his lawyer Bruce Fein, nor his wife Mattie Fein represent me in any way,&apos;&apos; the message stated. &apos;&apos;None of them have been or are involved in my current situation, and this will not change in the future." />
                      <outline text="&apos;..." />
                      <outline text="Bruce Fein has been representing Edward Snowden&apos;s father, Lon Snowden, while his infamous wife, Mattie Fein, has been a constantly present information (or misinformation) source for the media on Lon Snowden&apos;s status, plans, and supposed communications with his son." />
                      <outline text="Additionally, there seems to be a competitive conflictsurfacingbetween Lon Snowden&apos;s attorney Bruce Fein and Glenn Greenwald, who  was among the first to publicize Edward Snowden&apos;s leaks:" />
                      <outline text="Mattie Fein told the Wall Street Journal on Thursday that the father&apos;s legal team &apos;&apos;doesn&apos;t trust the intentions&apos;&apos; of Guardian journalist Glenn Greenwald who broke the first of the stories on the NSA surveillance programs following contacts with Edward Snowden." />
                      <outline text="A source close to the case told RIA Novosti on Thursday that the conversation earlier this week on an encrypted internet chat service between Lon Snowden and his son had been carried out against the wishes and advice of Lon Snowden&apos;s lawyers." />
                      <outline text="&apos;..." />
                      <outline text="FeinclaimsGreenwald has been trying to shop around an exclusive interview with Snowden for seven figures (read: a deal over a million dollars). Greenwald hasn&apos;t been exactly denying this allegation but characterizing it as &apos;&apos;defamatory.&apos;&apos;" />
                      <outline text="Since the surfacing of these recent developments the entire mainstream media and the alternative blogs have been focusing on what is being claimed or denied, and the back and forth he-said-she-said reportage. However, no one is looking at who really are these new actors who have recently surfaced as players in the ongoing NSA whistleblower&apos;s saga. No one is investigating the backgrounds of two rats who have long been members of Washington&apos;s Rat-Pack. " />
                      <outline text="Let&apos;s begin with Bruce Fein. Who is he? An initialsurface searchwould produce the following titles: A lobbyist, A Foreign Agent, An Active Neocon Member of the American Enterprise Institute, A Presidential Campaign Advisor to a Libertarian Candidate, An Attorney, A Civil-Rights Advocate, A Darling of the New York Times and Washington Post, A Known and ever-present Figure within the Israel Lobby &apos;... and now, mysteriously connected to the biggest US whistleblower case of our time." />
                      <outline text="Okay. That&apos;s only the surface- more than enough to raise eyebrows but far less than what is needed to introduce a crusty Washington rat." />
                      <outline text="You see I beganwriting and reportingabout Bruce Fein and Mattie Fein a while ago-while it was highly unpopular to expose and criticize the couple as members of Washington&apos;s Rat-Pack. At the time Bruce Fein was posing as a Civil-Liberties advocate and had aligned himself with the Ron Paul campaign as a legal advisor." />
                      <outline text="Don&apos;t take me wrong. In my multi-part expos(C) I did not get into massive FBI investigative files on Bruce Fein and his associates involved with one of the biggest foreign criminal networks in the United States. If I had done that I&apos;d either be in a cell next to John Kiriakou, or, in hiding somewhere in Venezuela awaiting a new citizenship." />
                      <outline text="No. I did not do that. Not that doing so would have made any difference in a nation now so inflicted with a severe case of indifference." />
                      <outline text="What I did was to write a series on Bruce Fein based on facts &apos;&apos; nothing but well-established facts. I also urged the Ron Paul 2012 Campaign to distance itself from the crusty weasel tasked with penetrating and corrupting his campaign from within. Short of begging I did my best." />
                      <outline text="I encourage you to visit the series to know the real Bruce Fein:Click Hereand read about this multi-hat Washington Rat with all the supporting links and documents that go with it. Allow me to provide you with a bit of an appetizer sampler- this from August 2011 (exactly two years ago):" />
                      <outline text="Who &apos;Really&apos; Is this Bruce Fein?" />
                      <outline text="He has been a crusty foreign lobbyist making millions of dollars peddling his foreign bosses&apos; interests and influence in Congress and government agencies. For Fein it has never mattered who the foreign client or what their agenda. He does not care whether his foreign clients are criminals or terrorists or dictators. As long as they pay him handsomely he&apos;ll sell their agenda and interest no matter what they may be. The words &apos;principle&apos; or &apos;taking a stand&apos; have never entered this foreign lobbyist&apos;s dictionary or comprehension: One minute, on behalf of one set of his foreign designated &apos;terrorist&apos; bosses, Bruce Fein is busy selling the need for a genocide declaration by the US Congress against onenation&apos;..." />
                      <outline text="&apos;..." />
                      <outline text="The next minute, on behalf of another well-known foreign mob boss, Bruce Fein is busy peddling influence and selling Congress his foreign bosses&apos;anti-genocide agenda:" />
                      <outline text="&apos;&apos;In 2007, Ayasli transferred $30 million in stock to fund a new endeavor, the nonprofit Turkish Coalition of America. The organization is headquartered in a Washington suite that has also been listed as the address for the Turkish Coalition USA PAC, the lobbying firm of Lydia Borland (who has represented the Turkish government), and the law firm of Bruce Fein and Associates (Fein comprises half of the Turkish American Legal Defense Fund)&apos;...&apos;&apos;" />
                      <outline text="&apos;..." />
                      <outline text="Bruce Fein sees no problem with representing foreign groups likethis: Fein hit the jackpot in 1991 when he signed on to represent Mozambique&apos;s notorious guerrilla army, RENAMO, which was seeking to overthrow its country&apos;s leftist government. When Fein came on board, RENAMO&apos;s reputation has hit bottom&apos;... &apos;... Even the Reagan and Bush administrations kept their distance from RENAMO, despite their anti-Communist rhetoric&apos;..." />
                      <outline text="Fein, however, eagerly signed up to flack for Dhlakama&apos;s terror army. Like most foreign lobbyists, he bilked his client for huge sums of money while performing virtually no work." />
                      <outline text="&apos;..." />
                      <outline text="Here is another on-the-spot description of Real Bruce Fein as a crusty &apos;&apos;Beltway Prostitute&apos;&apos;: &apos;&apos;Well, well, well. Wasn&apos;t Bruce Fein just recently condemning the Government of Sri Lanka for trying to put an end to the LTTE? But this time he&apos;s defending a sovereign government for protecting itself &apos;&apos; rather than slandering it using falsehoods. Now you see what I mean when I earlier referred to Mr. Fein as a &apos;&apos;Beltway prostitute.&apos;&apos; He will accept money from anyone who can pay the price &apos;&apos; regardless of where that money came from, or who his legal and public relations services might unjustly hurt. What an embarrassment to the US legal profession.&apos;&apos;" />
                      <outline text="&apos;..." />
                      <outline text="To read further on Bruce Fein as a Foreign Agent lobbyist for Pakistan, Sudan, Turkey, Tamil and several others, to read about Fein&apos;s overt Neocon Ties &amp; Covert Israel Pedigree, and to find out about his ethical violations as an attorney who represented disgraced congresswoman Jean Schmidt Read:Who &apos;Really&apos; Is this Bruce Fein?" />
                      <outline text="To get a flavor of Bruce Fein the Lobbyist and his past clients read this brief article:Conflict of Interest? Compatible Interests? You Tell Me!" />
                      <outline text="Check this out to know a bit more about Bruce Fein the attorney with ethics problems:BFP Breaking News: Court to Order Bruce Fein Removed from Schmidt vs. Krikorian Case" />
                      <outline text="Edward Snowden has his eyes open enough to see and figure out some of the traps and a few of implanted Washington Rats in action. He is smart enough to go on record and disassociate himself from the Washington-Crafted scheme and operatives. I certainly hope that he not only keeps his eyes open enough, but opens them wider and bigger. Because the Fein couple is not the only pit dug for his potential fall. There are others as we speak. Washington&apos;s Rat-Pack does not operate with only one or two rat breeds. Their rats come in many forms, size and breeds- from attorneys to whistleblower NGOs, from journalists to civil-liberties advocates, from pseudo whistleblowers to phony congressmen&apos;..." />
                      <outline text="As for Bruce Fein, for the last 12 years he has been a constantly-popping up  presence in my life. During my work at the FBI I became intimately familiar with him, his associates and operations-too familiar. Then, low and behold, he popped up again during myunder-oath depositionin the Krikorian case as attorney for the disgraced Congresswoman Jean Schmidt. Fast forward a couple of years and there he was: the chieflegal advisorfor Congressman Ron Paul. And now here he is again:insertinghimself into the case of NSA whistleblower Edward Snowden, posing as the representative of his father. The man is like a rotten, dirty, bad penny always turning up." />
                      <outline text="# # # #" />
                      <outline text="Sibel Edmonds is the Publisher &amp; Editor ofBoiling Frogs Postand the author of the MemoirClassified Woman: The Sibel Edmonds Story. She is therecipientof the 2006 PEN Newman&apos;s Own First Amendment Award for her &apos;&apos;commitment to preserving the free flow of information in the United States in a time of growing international isolation and increasing government secrecy&apos;&apos; Ms. Edmonds has a MA in Public Policy and International Commerce from George Mason University, a BA in Criminal Justice and Psychology from George Washington University." />
                      <outline text="This site depends exclusively on readers&apos; support. Please help us continue by SUBSCRIBING, and by ordering our EXCLUSIVE BFP DVDs." />
              </outline>

              <outline text="Sibel Edmonds&apos; Boiling Frogs Post | Home of the Irate Minority">
                      <outline text="Link to Article" type="link" url="http://www.boilingfrogspost.com/category/bruce-fein_the_greatest_threat_to_the_ron_paul_candidacy/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376687307_p7vyyMNn.html" />
      <outline text="Fri, 16 Aug 2013 21:08" />
                      <outline text="" />
                      <outline text="Who &apos;Really&apos; Is this Bruce Fein?  " />
                      <outline text="&apos;&apos;A nation can survive its fools, and even the ambitious. But it cannot survive treason from within. An enemy at the gates is less formidable, for he is known and carries his banner openly. But the traitor moves amongst those within the gate freely, his sly whispers rustling through all the alleys, heard in the very halls of government itself. For the traitor appears not a traitor; he speaks in accents familiar to his victims, and he wears their face and their arguments, he appeals to the baseness that lies deep in the hearts of all men. He rots the soul of a nation, he works secretly and unknown in the night to undermine the pillars of the city, he infects the body politic so that it can no longer resist. A murderer is less to fear. The traitor is the plague.&apos;&apos;- Marcus Tullius Cicero Last week, right after publishing myarticleon Congresswoman Schmidt and Bruce Fein&apos;s brilliant foreign lobby money rechanneling-laundering scheme, and to my shock, I found out aboutthis:" />
                      <outline text="The Ron Paul 2012 Presidential Campaign announced today that constitutional and international law expert Bruce Fein will join the campaign as senior advisor on legal matters." />
                      <outline text="&apos;&apos;Bruce Fein&apos;s participation adds to our campaign&apos;s already intellectual heft, enabling us to more broadly engage the conversation about constitutionality, civil liberties and the dangers to national security of an increasingly interventionist foreign policy,&apos;&apos; said Ron Paul 2012 Campaign Chairman Jesse Benton." />
                      <outline text="While some at Rep. Paul&apos;s Camp were busy celebrating and cheering the announcement as a brilliant strategic move, I was frantically gathering cases and research notes, corresponding with current and former colleagues from the intelligence community who had come to support Rep. Paul, and communicating with a few friends with Rep. Paul&apos;s Campaign who were equally troubled by this development." />
                      <outline text="I understand the &apos;cheering&apos; side of Paul&apos;s camp as they have been excited and impressed by the in- writing-and-words-only side of Bruce Fein. Not so different than those who were fired up and sold on the in-words-only rhetoric and promises staged by President Obama. The Constitutional Scholar Fein and the Constitutional Expert Obama. A Great Penman Fein and the Great Orator Obama&apos;...and of course the contradicting realities and the contradicting facts." />
                      <outline text="However, in this case, there are already too many established facts and too much history on Mr. Fein, and way too many rational and realistic people among Paul supporters to ring the alarm bells and counter this great threat before it&apos;s too late. I will go as far as calling the penetration of the Ron Paul camp by Bruce Fein &apos;the greatest threat to Paul&apos;s camp to date,&apos; and will make a solid case for this characterization based on glaring and alarming facts; facts and concerns shared by several loyal Paul advisors today." />
                      <outline text="Who is the real Bruce Fein? Why there are so many different versions of Fein &apos;&apos; one contradicting the other? How do his real actions and intimate associations stand in stark contrast to Ron Paul? What is the most likely plot in planting Mr. Fein within Paul&apos;s campaign?" />
                      <outline text="Foreign Lobby &amp; Influence Peddling" />
                      <outline text="Ron Paul has been consistent and exemplary in his strongly held principles on the Foreign lobby and influence peddling; a rarity in the US Congress. He has displayed intense disdain for foreign lobbying and foreign influence. He even considers congressional &apos;junkets&apos; as another means to becompromised: stressing that he would not travel abroad on agenda-driven foreigners&apos; dime: &apos;&apos;I just think it&apos;s unnecessary for congressmen to travel overseas, and the people in our district were on my side,&apos;&apos; he said in an interview. &apos;&apos;You don&apos;t need to go to Bosnia to understand we have no business there.&apos;&apos;" />
                      <outline text="With Bruce Fein you have exactly the opposite stand. He has been a crusty foreign lobbyist making millions of dollars peddling his foreign bosses&apos; interests and influence in Congress and government agencies. For Fein it has never mattered who the foreign client or what their agenda. He does not care whether his foreign clients are criminals or terrorists or dictators. As long as they pay him handsomely he&apos;ll sell their agenda and interest no matter what they may be. The words &apos;principle&apos; or &apos;taking a stand&apos; have never entered this foreign lobbyist&apos;s dictionary or comprehension:" />
                      <outline text="One minute, on behalf of one set of his foreign designated &apos;terrorist&apos; bosses, Bruce Fein is busy selling the need for a genocide declaration by the US Congress against onenation:" />
                      <outline text="&apos;&apos;For the past year I have written about Bruce Fein in many articles that have been widely published and circulated. He is reportedly paid $100,000 per month to tell lies in Washington about the Government of Sri Lanka&apos;... Who are the American individuals backing this group? Where are they getting their money to pay Bruce Fein? Does former US Ambassador Blake have something to do with them&apos;...&apos;&apos;" />
                      <outline text="The next minute, on behalf of another well-knownforeign mobboss, Bruce Fein is busy peddling influence and selling Congress his foreign bosses&apos;anti-genocideagenda:" />
                      <outline text="&apos;&apos;In 2007, Ayasli transferred $30 million in stock to fund a new endeavor, the nonprofit Turkish Coalition of America. The organization is headquartered in a Washington suite that has also been listed as the address for the Turkish Coalition USA PAC, the lobbying firm of Lydia Borland (who has represented the Turkish government), and the law firm of Bruce Fein and Associates (Fein comprises half of the Turkish American Legal Defense Fund)&apos;...&apos;&apos;" />
                      <outline text="&apos;&apos;materials put out by the Turkish Coalition of America and authored by a lawyer, Bruce Fein, who now represents Schmidt in the complaint, say that Congresswoman Schmidt has on numerous occasions voiced her opposition to such resolutions and maintains that the historical question is not appropriate for Congress to legislate. The congresswoman, based on her independent research, does not believe the tragic events constitute genocide&apos;...&apos;&apos;" />
                      <outline text="Bruce Fein sees no problem with representing foreign groups likethis:" />
                      <outline text="Fein hit the jackpot in 1991 when he signed on to represent Mozambique&apos;s notorious guerrilla army, RENAMO, which was seeking to overthrow its country&apos;s leftist government. When Fein came on board, RENAMO&apos;s reputation has hit bottom&apos;..." />
                      <outline text="&apos;..." />
                      <outline text="Even the Reagan and Bush administrations kept their distance from RENAMO, despite their anti-Communist rhetoric&apos;..." />
                      <outline text="&apos;..." />
                      <outline text="Fein, however, eagerly signed up to flack for Dhlakama&apos;s terror army. Like most foreign lobbyists, he bilked his client for huge sums of money while performing virtually no work." />
                      <outline text="Mr. Fine, who now fakes and preaches non-interventionism and anti-influence peddling only to echo Ron Paul, inreal lifehas been practicing the exact opposite:" />
                      <outline text="&apos;&apos;Now, Fein has returned to lobbying and is working for a client that has the dubious distinction of making RENAMO look good: The Sudan. That country&apos;s government is barred from receiving U.S. foreign aid because of its support for terrorism and because of its revolting human rights record. Amnesty International reports that the Sudanese government not only assassinates and tortures its &apos;&apos;enemies,&apos;&apos; but that paramilitary forces have kidnapped scores of children, who are believed to be held in domestic slavery by their abductors or taken to camps in remote rural areas, where they are trained for military service&apos;&apos;" />
                      <outline text="Here is another on-the-spotdescriptionof Real Bruce Fein as a crusty &apos;&apos;Beltway Prostitute&apos;&apos;:" />
                      <outline text="&apos;&apos;Well, well, well. Wasn&apos;t Bruce Fein just recently condemning the Government of Sri Lanka for trying to put an end to the LTTE? But this time he&apos;s defending a sovereign government for protecting itself &apos;&apos; rather than slandering it using falsehoods. Now you see what I mean when I earlier referred to Mr. Fein as a &apos;&apos;Beltway prostitute.&apos;&apos; He will accept money from anyone who can pay the price &apos;&apos; regardless of where that money came from, or who his legal and public relations services might unjustly hurt. What an embarrassment to the US legal profession.&apos;&apos;" />
                      <outline text="You see, for Mr. Fein pimping the Congress on behalf of foreign clients is about dollars. Nothing more; nothing less. Whether it is advocating additional foreign aid for one country while our nation is being bankrupted, or dragging our Congress to get involved with domestic meddling and the affairs of another foreign country, Bruce Fein has never been about the United States&apos; interests; just the opposite. Give Fein the dollars and he&apos;ll sign up to lobby for any one: terrorists, corrupt foreign governments, mobsters, assassins &apos;..." />
                      <outline text="Long pocketed as a &apos;lobbyist&apos; byPakistan,Sudan,Turkey,Tamil, and others, Bruce Fein is the exact antithesis to Ron Paul&apos;s principled position on issues related to foreign lobby, corruption and influence peddling in government." />
                      <outline text="Overt Neocon Ties &amp; Covert Israel Pedigree" />
                      <outline text="Ron Paul has been in staunch opposition and a counter to Neocon agendas and field players. Whether on the Israel lobby and agenda driving the hawkish currents in our nation today, or the corporate war machine interests guiding our foreign policy practices, Paul has consistently stood firm and unrelenting." />
                      <outline text="Mr. Fein&apos;spublic pedigreemakes it fairly easy to spot his overt ties and links. For example: he has been an adjunct scholar with theAmerican Enterprise Institute (AEI). By now I think the majority of Americans know about AEI&apos;s claim to fame:" />
                      <outline text="&apos;&apos;AEI is the most prominent think tank associated with American neoconservatism, in both the domestic and international policy arenas.[10] Irving Kristol, widely considered a father of neoconservatism, is a senior fellow at AEI, and many prominent neoconservatives&apos;--including Jeane Kirkpatrick, Ben Wattenberg, and Joshua Muravchik&apos;--spent the bulk of their careers at AEI.&apos;&apos;" />
                      <outline text="A well-known couple of facts about AEI:" />
                      <outline text="1-In order to be accepted by AEI, to become one of their scholars, proven neoconservativeinklingsandtiesare the never-waivered prerequisites." />
                      <outline text="2-AEI seeks candidates who putLoyaltyandAllegianceto Israel above all." />
                      <outline text="John MearsheimerandStephen Waltstate in their controversial bestseller,The Israel Lobby and U.S. Foreign Policy, that the tone of the right-leaning component of the Israel lobby results from the influence of the leaders of the two top lobby groups:AIPAC, and theConference of Presidents of Major American Jewish Organizations. They go on to list, as right-leaningthink tanksassociated with the lobby, theWashington Institute for Near East Policyand theAmerican Enterprise Institute." />
                      <outline text="Acceptance to the tightly knitted and guarded AEI Neocon community also extends to family members and religious affiliations. Bruce Fein has passed both litmus tests in becoming a highly-regarded member of AEI. His wife, Mattie Fein, has been a vocal hawk,neocon propaganda distributor, and a very familiar face within theBeltwayneocon community:Read more &#189;" />
              </outline>

              <outline text="Divisions Widen Among Snowden&apos;s Supporters">
                      <outline text="Link to Article" type="link" url="http://online.wsj.com/article/SB10001424127887324823804579014611497378326?mg=reno64-wsj.html?dsk=y" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376686844_LxLns9kV.html" />
      <outline text="Fri, 16 Aug 2013 21:00" />
                      <outline text="" />
                      <outline text="&apos; Invalid email address." />
                      <outline text="&apos; You can&apos;t enter more than 20 emails." />
                      <outline text="&apos; Seperate multiple addresses with Commas." />
                      <outline text="&apos; Must enter an email address." />
                      <outline text="&apos; You must enter the verification code below to send." />
                      <outline text="&apos; Invalid entry: Please type the verification code again." />
              </outline>

              <outline text="Exclusive: Edward Snowden Says Media Being Misled &apos;About My Situation&apos;">
                      <outline text="Link to Article" type="link" url="http://www.huffingtonpost.com/2013/08/15/edward-snowden-media-misled_n_3764560.html?view=print&amp;comm_ref=false" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376686671_vDaLWFrQ.html" />
      <outline text="Fri, 16 Aug 2013 20:57" />
                      <outline text="" />
                      <outline text="Edward SnowdenFILE - In this handout file photo taken on Friday, July 12, 2013, and made available by Human Rights Watch shows NSA leaker Edward Snowden during his meeting with Russian activists and officials at Sheremetyevo airport, Moscow, Russia . National Security Agency leaker Edward Snowden has received asylum in Russia for one year and left the transit zone of Moscow&apos; airport, his lawyer said Thursday. Kucherena said after meeting with the fugitive at Moscow&apos;s Sheremetyevo airport, where he was stuck since his arrival from Hong Kong on June 23, that he handed him the papers proving his status. Kucherena said that Snowden&apos;s whereabouts will be kept secret for security reasons. (AP Photo/Tatyana Lokshina, Human Rights Watch HO, file)" />
                      <outline text="Edward SnowdenFILE - In this image provided by Human Rights Watch, NSA leaker Edward Snowden, center, attends a news conference at Moscow&apos;s Sheremetyevo Airport with Sarah Harrison of WikiLeaks, left, Friday, July 12, 2013. The whole time Snowden has been seeking asylum, Harrison has been by his side. She has emerged as a central, if mysterious, figure in the saga that has taken Snowden across the world in an attempt to evade U.S. espionage charges. (AP Photo/Human Rights Watch, Tanya Lokshina, File)" />
                      <outline text="Anatoly KucherenaThis image taken from Associated Press Television shows a copy of a temporary document to allow Edward Snowden to cross the border into Russia, held by Russian lawyer Anatoly Kucherena speaking to reporters after visiting Snowden at Sheremetyevo airport outside Moscow, Russia, on Thursday, Aug. 1, 2013. National Security Agency leaker Edward Snowden has received asylum in Russia for one year and left the transit zone of Moscow&apos;s airport, his lawyer said Thursday. (AP Photo/Associated Press Television)" />
                      <outline text="Anatoly Kucherena, Edward SnowdenIn this still image taken on Thursday, Aug. 1, 2013 and released by Russia24 TV channel, shows Russian lawyer Anatoly Kucherena, second right in the center, and National Security Agency leaker Edward Snowden, center back to a camera, as Snowden leaves Sheremetyevo airport outside Moscow, Russia, on Thursday, Aug. 1, 2013. Snowden has received asylum in Russia for one year and left the transit zone of Moscow&apos;s airport, his lawyer said Thursday. Kucherena said that Snowden&apos;s whereabouts will be kept secret for security reasons. (AP Photo/Russia24 via Associated Press Television) TV OUT" />
                      <outline text="WASHINGTON, DC - JULY 30: Lon Snowden, father of Edward SnowdWASHINGTON, DC - JULY 30: Lon Snowden, father of Edward Snowden talks to reporters at The Washington Post via Getty Images in Washington, DC on July 30, 2013. Snowden is a former technical contractor for the NSA and CIA who leaked top secret information to the press regarding government surveillance. (Photo by Linda Davidson / The Washington Post via Getty Images)" />
                      <outline text="Demonstrators Protest NSA SurveillanceBERLIN, GERMANY - JULY 27: A participant demonstrates in support of former NSA employee Edward Snowden at a protest march against the electonic surveillance tactics of the NSA on July 27, 2013 in Berlin, Germany. The NSA scandal has been especially contentious in Germany after media reports claimed the NSA had conducted wide scale gathering of electonic data, including e-mails, of German citizens. Activists are demonstrating against the NSA in cities across Germany today. (Photo by Sean Gallup/Getty Images)" />
                      <outline text="Today - Season 62TODAY -- Pictured: (l-r) Bruce Fein, Lon Snowden, father of Edward Snowden and Matt Lauer appear on NBC News&apos; &apos;Today&apos; show -- (Photo by: Peter Kramer/NBC/NBC NewsWire via Getty Images)" />
                      <outline text="CARICATURE: Edward SnowdenUSA - 2013 300 dpi Chris Ware caricature of NSA leaker Edward Snowden. (MCT via Getty Images)" />
                      <outline text="RUSSIA-US-DIPLOMACY-CHINA-INTELLIGENCEA man looks in Moscow on July 12, 2013, at a computer screen displaying a photo US National Security Agency (NSA) fugitive leaker Edward Snowden (C) during his today&apos;s meeting with leading Russian rights activists and lawyers at Moscow&apos;s Sheremetyevo airport where he has been stuck in transit for the last three weeks. Snowden met today around a dozen Russian rights activists, lawyers and other figures in a closed-door meeting at Moscow&apos;s Sheremetyevo airport, an official said. AFP PHOTO / STR (Photo credit should read -/AFP/Getty Images)" />
                      <outline text="RUSSIA-US-DIPLOMACY-CHINA-INTELLIGENCEPro-Kremlin lawmaker Vyacheslav Nikonov speaks with journalists before his meeting with US National Security Agency (NSA) fugitive leaker Edward Snowden inside the terminal F of Moscow&apos;s Sheremetyevo airport, on July 12, 2013, where Snowden reportedly remains without making any contact with the swarm of international reporters at the scene. Snowden has requested a meeting with leading Russian rights activists and lawyers at the airport in Moscow where he has been stuck in transit for the last three weeks, the campaigners invited said today. AFP PHOTO / VASILY MAXIMOV (Photo credit should read VASILY MAXIMOV/AFP/Getty Images)" />
                      <outline text="RUSSIA-US-DIPLOMACY-CHINA-INTELLIGENCELawyer Genry Reznik speaks with journalists inside the terminal F of Moscow&apos;s Sheremetyevo airport, on July 12, 2013, where US National Security Agency (NSA) fugitive leaker Edward Snowden reportedly remains without making any contact with the swarm of international reporters at the scene. Snowden has requested a meeting with leading Russian rights activists and lawyers, including Genry Reznik, at the airport in Moscow where he has been stuck in transit for the last three weeks, the campaigners invited said today. AFP PHOTO / VASILY MAXIMOV (Photo credit should read VASILY MAXIMOV/AFP/Getty Images)" />
                      <outline text="BOLIVIA-EU-US-SECURITY-INTELLIGENCE-MORALES-PROTESTProtesters burn an effigy of US President Barack Obama as well as a coffin with flags of Spain, Portugal, France and Italy, during a demonstration outside the US embassy in La Paz on July 8, 2013 a week after Bolivian President Evo Morales&apos;s plane, flying home from a trip to Moscow last week, was forced to make an unscheduled stopover in Vienna after these four European nations temporarily closed their airspace over groundless rumours that fugitive US intelligence leaker Edward Snowden was aboard the jet. Snowden won support from Cuba for his bid to seek asylum in Latin America as he began his third week in limbo at a Moscow airport on Monday. Cuba, a key transit point from Russia on the way to Latin America, supported the leaders of Bolivia, Venezuela and Nicaragua, who have offered the 30-year-old a possible lifeline as he remains marooned without documents in the transit area of a Moscow airport. AFP PHOTO / JORGE BERNAL (Photo credit should read JORGE BERNAL/AFP/Getty Images)" />
                      <outline text="FRANCE-US-SECURITY-INTELLIGENCE-INTERNET-SNOWDENA demonstrator with his mouth covered sits next to a banner reading &apos;Let&apos;s protect Snowden&apos; during a demonstration in support of Edward Snowden, the former technical contractor of the US Central Intelligence Agency, at the Place du Trocadero in front of the Eiffel tower in Paris on July 7, 2013. Around forty people, mostly activists from organizations defending rights and freedom on the internet, gathered in support of Snowden, who leaked information on data spying programs of the USA and Great Britain in June 2013 and has sought asylum in 21 countries, according to WikiLeaks. AFP PHOTO / KENZO TRIBOUILLARD (Photo credit should read KENZO TRIBOUILLARD/AFP/Getty Images)" />
                      <outline text="BOLIVIA-LATAM-EU-US-SECURITY-INTELLIGENCE-MORALES(L-R, front row) Presidents Rafael Correa of Ecuador, Jose Mujica of Uruguay, Cristina Fernandez de Kirchner of Argentina, Evo Morales of Bolivia, Nicolas Maduro of Venezuela and Desi Bouterse of Suriname pose for pictures after a meeting called after Evo Morales&apos; plane was rerouted amid suspicions US fugitive Edward Snowden was aboard, in the Bolivian central city of Cochabamba, on July 4, 2013. Leftist Latin American leaders gathered in Cochabamba on Thursday to back President Evo Morales, fuming after some European nations temporarily refused his plane access to their airspace amid suspicions US fugitive Edward Snowden was aboard. Snowden is seeking sanctuary in several nations to evade US espionage charges. AFP PHOTO / JORGE BERNAL (Photo credit should read JORGE BERNAL/AFP/Getty Images)" />
                      <outline text="GERMANY-US-SECURITY-INTELLIGENCE-INTERNET-SNOWDEN-ASYLUMActivists of the organization Campact demonstrate in front of the German Chancellery in support of fugitive US intelligence leaker Edward Snowden , on July 4, 2013 in Berlin, Germany. Fugitive US intelligence leaker Edward Snowden has sought asylum in 21 countries, including Germany, WikiLeaks said. The banner reads &apos;Who fights for our freedom earns our asylum&apos;. PHOTO / DPA/ KAY NIETFELD /GERMANY OUT (Photo credit should read KAY NIETFELD/AFP/Getty Images)" />
                      <outline text="BOLIVIA-US-SECURITY-INTELLIGENCE-INTERNETBolivian President Evo Morales (C) arrives at El Alto Airport on July 3, 2013 in La Paz, Bolivia, after a flight interrupted by an unscheduled stopover caused by suspicions US intelligence leaker Edward Snowden was traveling with him. His plane touched down near La Paz almost 17 hours after leaving Vienna, an AFP reporter observed. It had to land there after several European nations denied it overfly rights as Morales flew back from Moscow. AFP PHOTO/JORGE BERNAL (Photo credit should read JORGE BERNAL/AFP/Getty Images)" />
                      <outline text="HONG KONG-CHINA-US-SECURITY-INTELLIGENCE-FILM-ENTERTAINMENTUS school teacher, Andrew Cromeek smiles in front of a computer screen displaying a photo of himself playing Edward Snowden in &apos;Verax&apos;, the first film on the fugitive US intelligence leaker, during an interview with AFP in Hong Kong on July 2, 2013. Four amateur filmmakers in Hong Kong have beaten Hollywood to the draw by producing the first film on Edward Snowden, a five-minute thriller depicting the nail-biting intrigue surrounding the intelligence leaker when he was hiding in the city. AFP PHOTO / ANTHONY WALLACE (Photo credit should read ANTHONY WALLACE/AFP/Getty Images)" />
                      <outline text="BRUNEI-ASEAN-ARF-SECURITY-US-RUSSIA-DIPLOMACYUS Secretary of State John Kerry (R) deflects a question from a reporter about whether he and Russian Foreign Minister Sergey Lavrov (L) will discuss the fate of fugitive US secrets leaker Edward Snowden, before their meeting at the ASEAN summit in Brunei on July 2, 2013. Kerry is expected to discuss with Lavrov ways of narrowing differences on ending the Syrian bloodshed, a task complicated by the two powers&apos; tug-of-war over Snowden . AFP PHOTO / POOL / Jacquelyn Martin (Photo credit should read JACQUELYN MARTIN/AFP/Getty Images)" />
                      <outline text="UKRAINE-US-RUSSIA-SECURITY-INTELLIGENCE-SNOWDEN-PROTESTUkrainian Internet Party activists hold a &apos;tap the phone and internet lines&apos; protest on June 27, 2013 outside the US Embassy in Kiev to attract public attention to the violation of rights following the United States Internet surveillance program exposed by former spy Edward Snowden. Under the so-called PRISM programme, the US National Security Agency can issue directives to Internet firms like Google or Facebook to gain access to emails, online chats, pictures, files and videos that have been uploaded by foreign users. AFP PHOTO/ SERGEI SUPINSKY (Photo credit should read SERGEI SUPINSKY/AFP/Getty Images)" />
                      <outline text="US-SECURITY-INTELLIGENCE-RUSSIA-CHINAPassengers look in the window as they rest in the transit zone in Sheremetyevo airport terminal F in Moscow on June 26, 2013, where US intelligence leaker Edward Snowden reportedly spent the fourth day with his onward travel. The man responsible for one of the biggest intelligence security breaches in US history has not been sighted since arriving in Moscow on a flight on June 23 from Hong Kong and according to Russia is still in a transit zone at Sheremetyevo airport. AFP PHOTO / KIRILL KUDRYAVTSEV (Photo credit should read KIRILL KUDRYAVTSEV/AFP/Getty Images)" />
                      <outline text="US-SECURITY-INTELLIGENCE-RUSSIA-CHINAA general view of a bathroom in one of the rooms in the Capsule Hotel &apos;Air Express&apos; inside Moscow&apos;s Sheremetyevo terminal F in Moscow on June 26, 2013, where US intelligence leaker Edward Snowden reportedly spent the fourth day with his onward travel. The man responsible for one of the biggest intelligence security breaches in US history has not been sighted since arriving in Moscow on a flight on June 23 from Hong Kong and according to Russia is still in a transit zone at Sheremetyevo airport. AFP PHOTO / KIRILL KUDRYAVTSEV (Photo credit should read KIRILL KUDRYAVTSEV/AFP/Getty Images)" />
                      <outline text="US-SECURITY-INTELLIGENCE-RUSSIA-CHINAA general view one of the rooms in the Capsule Hotel &apos;Air Express&apos; inside Moscow&apos;s Sheremetyevo terminal F in Moscow on June 26, 2013, where US intelligence leaker Edward Snowden reportedly spent the fourth day with his onward travel. The man responsible for one of the biggest intelligence security breaches in US history has not been sighted since arriving in Moscow on a flight on June 23 from Hong Kong and according to Russia is still in a transit zone at Sheremetyevo airport. AFP PHOTO / KIRILL KUDRYAVTSEV (Photo credit should read KIRILL KUDRYAVTSEV/AFP/Getty Images)" />
                      <outline text="The Aeroflot Airbus A330 plane that is to carry National Security Agency leaker Edward Snowden on a flight to Havana, Cuba, arrives at the gate at Sheremetyevo airport, Moscow, Monday, June 24, 2013. Snowden arrived in Moscow on Sunday from Hong Kong, where he had been hiding for several weeks. Ecuador&apos;s foreign minister said Sunday that the country is considering his application for asylum. (AP Photo/Alexander Zemlianichenko)" />
                      <outline text="Ricardo PatinoEcuador&apos;s Foreign Mister Ricardo Patino speaks to reporters at a hotel during his visit to Vietnam Monday, June 24, 2013. Patino said that his government is analyzing an asylum request from Edward Snowden, the former National Security Agency contractor wanted for revealing classified secrets. (AP Photo/Tran Van Minh)" />
                      <outline text="An unidentified passenger, right, who just arrived from Hong Kong and said to waiting journalists that he had seen former CIA employee who leaked top-secret documents about sweeping U.S. surveillance programs Edward Snowden, aboard his flight from Hong Kong, as the unidentified passenger speaks to journalists at Sheremetyevo airport, just outside Moscow. Russia, Sunday, June 23, 2013. The former National Security Agency contractor Snowdon, wanted by the United States for revealing two highly classified surveillance programs has been allowed to leave Hong Kong for a &quot;third country&quot; because a U.S. extradition request did not fully comply with Hong Kong law, the territory&apos;s government said Sunday.(AP Photo / Alexander Zemlianichenko)" />
                      <outline text="Journalists show passengers arriving from Hong Kong a tablet with a photo of Edward Snowden, a former CIA employee who leaked top-secret documents about sweeping U.S. surveillance programs, at Sheremetyevo airport, just outside Moscow, Russia, Sunday, June 23, 2013. The former National Security Agency contractor wanted by the United States for revealing two highly classified surveillance programs has been allowed to leave for a &quot;third country&quot; because a U.S. extradition request did not fully comply with Hong Kong law, the territory&apos;s government said Sunday. (AP Photo/Alexander Zemlianichenko)" />
                      <outline text="Journalists stand next to the Ecuador&apos;s Ambassador&apos;s car while waiting for the arrival of Edward Snowden, a former CIA employee who recently leaked top-secret documents about sweeping U.S. surveillance programs, at Sheremetyevo airport, just outside Moscow, Russia, Sunday, June 23, 2013. The former National Security Agency contractor, Snowdon is wanted by the United States for revealing two highly classified surveillance programs, but was allowed to leave Hong Kong for a &quot;third country&quot; because a U.S. extradition request did not fully comply with Hong Kong law, the territory&apos;s government said Sunday. (AP Photo/Alexander Zemlianichenko Jr)" />
                      <outline text="A TV screen shows a news report of Edward Snowden, a former CIA employee who leaked top-secret documents about sweeping U.S. surveillance programs, at a shopping mall in Hong Kong Sunday, June 23, 2013. The former National Security Agency contractor wanted by the United States for revealing two highly classified surveillance programs has been allowed to leave for a &quot;third country&quot; because a U.S. extradition request did not fully comply with Hong Kong law, the territory&apos;s government said Sunday. (AP Photo/Vincent Yu)" />
                      <outline text="A TV screen shows a news report of Edward Snowden, a former CIA employee who leaked top-secret documents about sweeping U.S. surveillance programs, at a shopping mall in Hong Kong Sunday, June 23, 2013. The former National Security Agency contractor wanted by the United States for revealing two highly classified surveillance programs has been allowed to leave for a &quot;third country&quot; because a U.S. extradition request did not fully comply with Hong Kong law, the territory&apos;s government said Sunday. (AP Photo/Vincent Yu)" />
                      <outline text="FILE - In this June 21, 2013 file photo, a banner supporting Edward Snowden, a former CIA employee who leaked top-secret documents about sweeping U.S. surveillance programs, is displayed at Central, Hong Kong&apos;s business district. The Hong Kong government says Snowden wanted by the U.S. for revealing two highly classified surveillance programs has left for a &quot;third country.&quot; The South China Morning Post reported Sunday, June 23, 2013 that Snowden was on a plane for Moscow, but that Russia was not his final destination. Snowden has talked of seeking asylum in Iceland. (AP Photo/Kin Cheung, File)" />
                      <outline text="RUSSIA-US-SECURITY-INTELLIGENCE-SNOWDENA journalist shows to a passenger a picture of former US spy Edward Snowden on a tablet, at the arrival gate of the Moscow Sheremetevo airport on June 23, 2013. Snowden arrived on June 23, 2013 in Russia from Hong Kong, reportedly on his way to Venezuela, escaping the clutches of US justice after leaking sensational details of cyber-espionage by Washington. Snowden, the target of a US arrest warrant issued on June 21, 2013 after he blew the lid on massive secret surveillance programmes, arrived in Moscow on a direct flight operated by Russian flag carrier Aeroflot. AFP PHOTO / VASILY MAXIMOV (Photo credit should read VASILY MAXIMOV/AFP/Getty Images)" />
                      <outline text="RUSSIA-US-SECURITY-INTELLIGENCE-SNOWDENRussian journalists wait for the arrival of former US spy Edward Snowden at the Moscow Sheremetevo airport on June 23, 2013. Snowden arrived on June 23, 2013 in Russia from Hong Kong, reportedly on his way to Venezuela, escaping the clutches of US justice after leaking sensational details of cyber-espionage by Washington. Snowden, the target of a US arrest warrant issued on June 21, 2013 after he blew the lid on massive secret surveillance programmes, arrived in Moscow on a direct flight operated by Russian flag carrier Aeroflot. AFP PHOTO / VASILY MAXIMOV (Photo credit should read VASILY MAXIMOV/AFP/Getty Images)" />
                      <outline text="The front cover of a local magazine shows Edward Snowden, a former CIA employee who leaked top-secret documents about sweeping U.S. surveillance programs, in Hong Kong Saturday, June 22, 2013. Hong Kong was silent Saturday on whether the former National Security Agency contractor should be extradited to the United States now that he has been charged with espionage, but some legislators said the decision should be up to the Chinese government. (AP Photo/Kin Cheung)" />
                      <outline text="GERMANY-US-DIPLOMACY-OBAMA-PROTESTActivists display a photo of US President Barack Obama (L) and pictures of former US spy Edward Snowden (C) and whistleblower Bradley Manning (R) during a protest action on June 19, 2013 in Berlin on behalf of the visit of the US President in the German capital. Barack Obama will walk in John F. Kennedy&apos;s footsteps this week on his first visit to Berlin as US president, but encounter a more powerful and sceptical Germany in talks on trade and secret surveillance practices.. AFP PHOTO / RONNY HARTMANN (Photo credit should read RONNY HARTMANN/AFP/Getty Images)" />
                      <outline text="A TV screen shows the news of Edward Snowden, a former CIA employee who leaked top-secret documents about sweeping U.S. surveillance programs, in the underground train in Hong Kong Sunday, June 16, 2013. Top U.S. intelligence officials said Saturday that information gleaned from two controversial data-collection programs run by the National Security Agency thwarted potential terrorist plots in the U.S. and more than 20 other countries - and that gathered data is destroyed every five years. (AP Photo/Kin Cheung)" />
                      <outline text="A TV screen shows the news of Edward Snowden, a former CIA employee who leaked top-secret documents about sweeping U.S. surveillance programs, at a shopping mall in Hong Kong Monday, June 17, 2013. Top officials from the Obama and Bush administrations say the government&apos;s newly exposed secret surveillance programs have been essential to disrupting terrorist plots and have not infringed on Americans&apos; civil liberties. The officials justify the massive trawling for phone and Internet data as new revelations add to public disclosures about the classified operations. (AP Photo/Kin Cheung)" />
                      <outline text="A supporter holds picture of Edward Snowden, a former CIA employee who leaked top-secret information about U.S. surveillance programs, and Hong Kong movie star Jackie Chan during a protest outside the Consulate General of the United States in Hong Kong Saturday, June 15, 2013. The protesters accused the U.S. government of infringing people&apos;s rights and privacy. (AP Photo/Kin Cheung)" />
                      <outline text="Supporters of Edward Snowden, a former CIA employee who leaked top-secret information about U.S. surveillance programs demonstrate outside the Consulate General of the United States in Hong Kong Saturday, June 15, 2013 as they accused the U.S. government of infringing people&apos;s rights and privacy. A popular Communist Party-backed newspaper urged China&apos;s leadership to milk a former U.S. contractor for more information rather than send him home, saying his revelations about secret American surveillance programs concern China&apos;s national interest. (AP Photo/Kin Cheung)" />
                      <outline text="Hundreds of supporters of Edward Snowden, a former CIA employee who leaked top-secret information about U.S. surveillance programs march to the Consulate General of the United States in Hong Kong Saturday, June 15, 2013 as they accused the U.S. government of infringing people&apos;s rights and privacy. (AP Photo/Kin Cheung)" />
                      <outline text="Hundreds of supporters of Edward Snowden, a former CIA employee who leaked top-secret information about U.S. surveillance programs march to the Consulate General of the United States in Hong Kong Saturday, June 15, 2013, accussing the U.S. government of infringing people&apos;s rights and privacy. A popular Communist Party-backed newspaper urged China&apos;s leadership to milk the former U.S. contractor for more information rather than send him home, saying his revelations about secret American surveillance programs concern China&apos;s national interest. (AP Photo/Kin Cheung)" />
                      <outline text="A TV screen shows the news report of Edward Snowden, former CIA employee who leaked top-secret documents about sweeping U.S. surveillance programs, at a shopping mall in Hong Kong Friday, June 14, 2013. A popular Communist Party-backed newspaper urged China&apos;s leadership to milk a former U.S. contractor for more information rather than send him home, saying his revelations about secret American surveillance programs concern China&apos;s national interest.(AP Photo/Kin Cheung)" />
                      <outline text="Claudia Mo Man-chingPro-democractic legislator Claudia Mo Man-ching speaks next to a picture of U.S. President Barack Obama and Edward Snowden during a news conference in Hong Kong Friday, June 14, 2013. Two lawmakers in Hong Kong said on Friday that they had written to President Obama to try to persuade him not to bring charges against the former US intelligence contractor Snowden. Snowden revealed last weekend he was the source of a major leak of top-secret information on NSA surveillance, saying he was uncovering wrongdoing. He spoke to reporters from an undisclosed location in the semiautonomous Chinese territory of Hong Kong. (AP Photo/Kin Cheung)" />
                      <outline text="In this photo released by Arthit Suriyawongkul, a U.K. Home Office Carrier Alert notice about NSA leaker Edward Snowden is seen at an airline check-in counter at Chiang Mai airport in Thailand, Friday, June 14, 2013. A British diplomat confirmed the British government issued the alert to airlines around the world, urging them not to allow Snowden to board flights to the United Kingdom. (AP Photo/Arthit Suriyawongkul)" />
              </outline>

              <outline text="Snowden Says Media &apos;Misled&apos; By Father&apos;s Associates | World | RIA Novosti">
                      <outline text="Link to Article" type="link" url="http://en.ria.ru/world/20130816/182802895/Snowden-Says-Media-Misled-By-Fathers-Associates.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376686618_M5QFLJaC.html" />
      <outline text="Fri, 16 Aug 2013 20:56" />
                      <outline text="" />
                      <outline text="WASHINGTON, August 16 (RIA Novosti) &apos;&apos; Fugitive intelligence leaker Edward Snowden contacted a popular US news website, The Huffington Post, and said media have been &apos;&apos;misled&apos;&apos; by associates of his father, Lon Snowden, and have published &apos;&apos;false&apos;&apos; claims about his situation, the website said Friday." />
                      <outline text="&apos;&apos;It has come to my attention that news organizations seeking information regarding my current situation have, due to the difficulty in contacting me directly, been misled by individuals associated with my father into printing false claims about my situation,&apos;&apos; read the text of the message purportedly sent by the younger Snowden." />
                      <outline text="&apos;&apos;Neither my father, his lawyer Bruce Fein, nor his wife Mattie Fein represent me in any way,&apos;&apos; the message stated. &apos;&apos;None of them have been or are involved in my current situation, and this will not change in the future.&apos;&apos;" />
                      <outline text="Lon Snowden has made numerous television appearances in recent weeks accompanied by Bruce Fein, presented as his attorney. In that time, Fein&apos;s wife, Mattie Fein, has been a steady source of information for journalists about Lon Snowden&apos;s plans to travel to Russia to visit his son." />
                      <outline text="The younger Snowden, a former contractor for the US National Security Agency (NSA), is wanted by the United States on espionage and other charges after he gave journalists classified documents detailing the NSA&apos;s far-reaching electronic and telephone surveillance programs. He was granted temporary asylum in Russia last month." />
                      <outline text="The Huffington Post said the American Civil Liberties Union (ACLU) was helping coordinate Edward Snowden&apos;s legal defense in the United States and had confirmed that the email received by the website had indeed been sent by Snowden." />
                      <outline text="Mattie Fein told the Wall Street Journal on Thursday that the father&apos;s legal team &apos;&apos;doesn&apos;t trust the intentions&apos;&apos; of Guardian journalist Glenn Greenwald who broke the first of the stories on the NSA surveillance programs following contacts with Edward Snowden." />
                      <outline text="A source close to the case told RIA Novosti on Thursday that the conversation earlier this week on an encrypted internet chat service between Lon Snowden and his son had been carried out against the wishes and advice of Lon Snowden&apos;s lawyers." />
                      <outline text=" " />
              </outline>

              <outline text="Egypt Is Descending Into Civil War, But Don&apos;t Expect Obama To Cancel His Golf Vacation">
                      <outline text="Link to Article" type="link" url="http://dprogram.net/2013/08/16/egypt-is-descending-into-civil-war-but-dont-expect-obama-to-cancel-his-golf-vacation/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376685051_pEBg5y3U.html" />
        <outline text="Source: Dprogram.net" type="link" url="http://dprogram.net/feed" />
      <outline text="Fri, 16 Aug 2013 20:30" />
                      <outline text="" />
                      <outline text="(EconomicCollapse) &apos;&apos; The largest Islamic nation in the Middle East is on the verge of descending into civil war, the Syrian civil war is starting to spill over into Lebanon, and the worst violence in five years has just hit Iraq, but Barack Obama is way too busy to be bothered with any of that. Right now, Obama is enjoying one of the true loves of his life &apos;&apos; golf." />
                      <outline text="According to the Washington Post, Obama has &apos;&apos;played 18 holes of golf every day but one this week&apos;&apos;, and without a doubt he appears to really be enjoying his time up in Martha&apos;s Vineyard. I hear that it is absolutely beautiful up there this time of the year. And apparently he needs the rest. After all, prior to this vacation he has only had time to play 133 rounds of golf since becoming president. Between snubbing world leaders and getting the U.S. economy going again, it must be really tough for Obama to find enough time to sharpen his game." />
                      <outline text="Of course I am being facetious. It is absolutely ridiculous how much time Obama takes off, and Congress is even worse. Congress is takinga five week vacation right now. Most Americans don&apos;t get that much vacation in an entire year." />
                      <outline text="Meanwhile, as our leaders enjoy their rest, the Middle East is coming apart at the seams." />
                      <outline text="In Egypt, authorities say that 638 people are now confirmed deadand another 3,994 people were wounded in the nightmarish violence that erupted in Cairo this week. Hundreds of bodies remain uncounted by the authorities, and it appears very likely that Egypt is rapidly heading down the path to full-blown civil war&apos;..." />
                      <outline text="Angry supporters of ousted president Mohammed Morsi staged protests and burned buildings Thursday as President Obama condemned the violence on both sides and canceled next month&apos;s joint military operations." />
                      <outline text="The unrest came a day after at least 638 people were killed in violence nationwide, including 43 police officers, the Health Ministry said. Most of the deaths occurred when security forces smashed two pro-Morsi sit-in camps in the capital. In the Nasr City district, 288 people were killed." />
                      <outline text="The Health Ministry said 3,994 people were injured." />
                      <outline text="After the police moved on the camps, street battles broke out across Egypt. Government buildings and police stations were attacked, roads were blocked, and Christian churches were torched, Interior Minister Mohammed Ibrahim said." />
                      <outline text="Sadly, some of the supporters of the Muslim Brotherhood have chosen to express their fury with the government by setting Christian homes, businesses and churches on fire. According to one report, 18 churcheshave been torched so far&apos;..." />
                      <outline text="Now, with the crackdown on Muslim Brotherhood members by the Egyptian army, Islamist fanatics are taking out their frustrations on Coptic Christians. In the past few days, there has been a spate of attacks on Christian businesses, homes, and churches. As of Wednesday morning, according to local witnesses, at least 18 churches had been destroyed, and fires and riots were continuing to spread in Christian areas, the witnesses said." />
                      <outline text="This is absolutely despicable, and it is turning out to be one of the worst disasters for Coptic Christians ever recorded. Over the past few days, Twitter has been absolutely flooded with reports about what has been happening to Christians in Egypt&apos;..." />
                      <outline text="Using the hashtag #EgyChurch, Egyptian users of Twitter and other social networks broadcast messages like &apos;&apos;Can&apos;t keep up with the number of churches, Christian businesses, and affiliates being attacked by &apos;peaceful&apos; Muslim Brotherhood,&apos;&apos; &apos;&apos;It&apos;s clear the Copts are having their churches burnt,&apos;&apos; and &apos;&apos;This is quickly becoming the worst sectarian catastrophe we&apos;ve seen in our lifetimes.&apos;&apos;" />
                      <outline text="Meanwhile, the violence in Iraq continues to escalate. The following is how Reuters described what happened in Baghdad on Thursday&apos;..." />
                      <outline text="Car bomb attacks killed at least 34 people in Baghdad on Thursday but the Interior Ministry said it would not allow al Qaeda, which it blames for a surge in sectarian violence, to turn Iraq into another Syria." />
                      <outline text="ADState Of Mind: The Psychology Of Control, from the creators of A Noble Lie. A film that reveals much of what we believe to be truth is actually deliberate deception." />
                      <outline text="More than 100 people were wounded in at least eight blasts, one of which was near the &apos;&apos;Green Zone&apos;&apos; diplomatic complex, part of a wave of bloodshed that has taken the monthly death toll in Iraq to the highest levels in five years." />
                      <outline text="&apos;&apos;Iraq&apos;s streets have become a battleground for sectarian people who are motivated by hatred and religious edicts and daring to kill innocent people,&apos;&apos; the Interior Ministry said in an unusually frank statement." />
                      <outline text="&apos;&apos;It is our destiny to win this battle which is aimed at destroying the country and turning it into another Syria,&apos;&apos; the ministry said." />
                      <outline text="And the absolutely brutal civil war in Syria is now spilling over into Lebanon. On Thursday, a Shiite stronghold in Beirut was hit by the worst car bomb attack that Lebanon has witnessed in decades&apos;..." />
                      <outline text="A powerful car bomb tore through a bustling south Beirut neighborhood that is a stronghold of Hezbollah on Thursday, killing at least 18 and trapping dozens of others in an inferno of burning cars and buildings in the bloodiest attack yet on Lebanese civilians linked to Syria&apos;s civil war." />
                      <outline text="The blast is the second in just over a month to hit one of the Shiite militant group&apos;s bastions of support, and the deadliest in decades. It raises the specter of a sharply divided Lebanon being pulled further into the conflict next door, which is being fought on increasingly sectarian lines pitting Sunnis against Shiites." />
                      <outline text="And of course we shouldn&apos;t forget about the war in Yemen either. Sadly, as Ron Paul recently noted, most Americans don&apos;t even realize what is going on in Yemen&apos;..." />
                      <outline text="Most Americans are probably unaware that over the past two weeks the US has launched at least eight drone attacks in Yemen, in which dozens have been killed. It is the largest US escalation of attacks on Yemen in more than a decade. The US claims that everyone killed was a &apos;&apos;suspected militant,&apos;&apos; but Yemeni citizens have for a long time been outraged over the number of civilians killed in such strikes. The media has reported that of all those killed in these recent US strikes, only one of the dead was on the terrorist &apos;&apos;most wanted&apos;&apos; list." />
                      <outline text="This significant escalation of US attacks on Yemen coincides with Yemeni President Hadi&apos;s meeting with President Obama in Washington earlier this month. Hadi was installed into power with the help of the US government after a 2011 coup against its long-time ruler, President Saleh. It is in his interest to have the US behind him, as his popularity is very low in Yemen and he faces the constant threat of another coup." />
                      <outline text="Unfortunately, this is probably only just the beginning." />
                      <outline text="The violence in the Middle East is probably going to get much worse, and at some point I expect a major regional war to erupt in the years ahead." />
                      <outline text="But instead of going back to the White House and at least giving the appearance of being on top of things, Obama plans to continue his golf vacation." />
                      <outline text="This is so negligent that even the Washington Post is ripping him to shreds&apos;..." />
                      <outline text="In a sense, then, Obama might as well play golf. He&apos;s dropped the ball on Egypt and the entire region, leaving the United States with few options and the Egyptian people to a bloody future in the short run and a repressive authoritarian junta in the longer run. This is a policy failure of the highest order." />
                      <outline text="But this is just par for the course for Obama." />
                      <outline text="As we learned this week, this is the guy that was actually playing cardsduring the bin Laden raid&apos;..." />
                      <outline text="Despite the picture the White House released showing President Obama intently watching the raid that killed Osama bin Laden, his former &apos;&apos;body man&apos;&apos; says the president spent most of the raid playing a card game." />
                      <outline text="&apos;&apos;Most people were like down in the Situation Room and [the president] was like, &apos;I&apos;m not going to be down there, I can&apos;t watch this entire thing.&apos; So he, myself, Pete Souza, the White House photographer, Marvin [Nicholson], we must have played 15 games of spades,&apos;&apos; former Obama aide Reggie Love said at an event in Los Angeles sponsored by The Artists &amp; Athletes Alliance in July." />
                      <outline text="Love, who played college basketball and football at Duke University, left the White House in 2011 to attend business school." />
                      <outline text="You can see video of Obama&apos;s former &apos;&apos;body man&apos;&apos;, Reggie Love, making these remarks right here." />
                      <outline text="When it comes to foreign policy, Obama seems to be totally clueless." />
                      <outline text="So what would happen someday if a major foreign policy crisis erupted that actually seriously threatened our national security?" />
                      <outline text="Would Obama be up to the task?" />
                      <outline text="Let&apos;s hope that we don&apos;t have to find out." />
                      <outline text="Source: The Economic Collapse" />
                      <outline text="This entry was posted on Friday, August 16th, 2013 at 1:49 pm and is filed under Dictatorship, Education/Mind Control, Egypt, Fascism, NWO, Politics/Corrupt. You can follow any responses to this entry through the RSS 2.0 feed. You can skip to the end and leave a response. Pinging is currently not allowed." />
              </outline>

              <outline text="US used 8-yr-old boy to plant chip on surrogate father so they could kill him in drone strike">
                      <outline text="Link to Article" type="link" url="http://www.blacklistednews.com/US_used_8-yr-old_boy_to_plant_chip_on_surrogate_father_so_they_could_kill_him_in_drone_strike/28158/0/0/0/Y/M.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376684917_2dGSMbej.html" />
        <outline text="Source: BlackListedNews.com" type="link" url="http://feeds.feedburner.com/blacklistednews/hKxa" />
      <outline text="Fri, 16 Aug 2013 20:28" />
                      <outline text="" />
                      <outline text="Source: Daily Mail" />
                      <outline text="A shocking new story reveals that the U.S. army inadvertently had an 8-year-old boy turn into a spy and place electronic tracking devices on his surrogate father so that they could spot him and kill him in a scheduled drone attack." />
                      <outline text="The 8-year-old boy and his biological father have confessed to helping spy on the al Qaeda officer, and now the biological father is believed to have been executed while the fate of the young boy remains unknown." />
                      <outline text="The thorough story was reported by The Atlantic, who claim that the boy, named Barq al-Kulyabi, helped lead American drones to an al Qaeda operative named Adnan al-Qadhi who had been placed on the U.S. &apos;kill list&apos; due to his role in the Yemeni branch of the terrorist organization." />
                      <outline text="Read More...Please enable JavaScript to view the comments powered by Disqus." />
              </outline>

              <outline text="Somalia hit by severe polio outbreak">
                      <outline text="Link to Article" type="link" url="http://www.bbc.co.uk/news/world-africa-23729121#sa-ns_mchannel=rss&amp;ns_source=PublicRSS20-sa" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376682406_9dwBrPg9.html" />
        <outline text="Source: BBC News - Home" type="link" url="http://feeds.bbci.co.uk/news/rss.xml" />
      <outline text="Fri, 16 Aug 2013 19:46" />
                      <outline text="" />
                      <outline text="16 August 2013Last updated at11:30 ETThe UN has warned of a severe outbreak of polio in Somalia, days after a medical charity pulled out of the country, citing insecurity." />
                      <outline text="At least 105 cases of polio have been recorded in Somalia this year - almost half the number of cases around the world in 2012." />
                      <outline text="The World Health Organization is trying to eradicate polio and the number of cases has fallen dramatically." />
                      <outline text="Most of the Somali cases are in areas controlled by Islamist group al-Shabab." />
                      <outline text="Polio is now only considered endemic in three countries - Afghanistan, Nigeria and Pakistan." />
                      <outline text="Somalia was declared polio-free six years ago and some four million people have been vaccinated." />
                      <outline text="&quot;It&apos;s very worrying because it&apos;s an explosive outbreak and of course polio is a disease that is slated for eradication,&quot; said WHO spokesman Oliver Rosenbauer, according to the AP news agency." />
                      <outline text="Another 10 cases have been recorded in north-eastern Kenya, where about half a million Somalis have fled." />
                      <outline text="Just 223 cases of polio were recorded globally in 2012 - down from 350,000 in 1988." />
                      <outline text="The UN humanitarian agency (Ocha) notes that it is &quot;extremely challenging&quot; to carry out vaccination work in Somalia." />
                      <outline text="During the 2011 famine al-Shabab banned most international aid agencies from operating in areas they controlled in southern Somalia." />
                      <outline text="Polio is highly infectious and is exacerbated by poor sanitation and a lack of clean water." />
                      <outline text="It invades the nervous system, and can cause total paralysis in a matter of hours." />
                      <outline text="On Wednesday, medical charity Medecins Sans Frontieres (MSF) said it was closing all its programmes in Somalia after 22 years working in the war-torn country." />
                      <outline text="It said in a statement that the decision had been taken because of &quot;extreme attacks on its staff&quot;." />
                      <outline text="The BBC&apos;s international development correspondent Mark Doyle says in many parts of Somalia the charity is the only provider of health care ranging from basic medical supplies to major surgery." />
                      <outline text="Some 18,000 African Union troops are in the country supporting the UN-backed government - the first one in more than two decades to be recognised by the US and the International Monetary Fund (IMF)." />
                      <outline text="The Islamist al-Shabab militant group no longer has bases in Mogadishu and has also been pushed out of other cities." />
                      <outline text="But it remains in control of smaller towns and large swathes of the countryside in central and southern Somalia and continues to launch occasional suicide attacks." />
              </outline>

              <outline text="Egypt: dozens killed during Muslim Brotherhood&apos;s &apos;Day of Anger&apos;">
                      <outline text="Link to Article" type="link" url="http://www.euronews.com/2013/08/16/egypt-dozens-killed-during-muslim-brotherhood-s-day-of-anger/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376682377_prFmkCqk.html" />
        <outline text="Source: euronews" type="link" url="http://feeds.feedburner.com/euronews/en/news?format=xml" />
      <outline text="Fri, 16 Aug 2013 19:46" />
                      <outline text="" />
                      <outline text="Seventeen died and hundreds were rescued after a ferry sank following a collision with a cargo vessel in the central Philippines, a coastguard commander said. &quot;We don&apos;t know if there are still people missing,&quot; Rear Admiral Luis Tuason told local radio early on Saturday, citing&apos;..." />
              </outline>

              <outline text="Lebanon caught up in the Syrian civil war">
                      <outline text="Link to Article" type="link" url="http://www.euronews.com/2013/08/16/lebanon-caught-up-in-the-syrian-civil-war/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376682348_f7aLL2KM.html" />
        <outline text="Source: euronews" type="link" url="http://feeds.feedburner.com/euronews/en/news?format=xml" />
      <outline text="Fri, 16 Aug 2013 19:45" />
                      <outline text="" />
                      <outline text="Lebanon has once again suffered bloodshed on the streets of Beirut." />
                      <outline text="The most powerful military force in the country, Hezbollah, was the target for the attack in the southern suburbs of the city." />
                      <outline text="The area is a stronghold for the Shia Muslim militia and political movement, which has been backing troops loyal to President Bashar al-Assad." />
                      <outline text="It is a reminder that the Syrian conflict is also having an effect on its neighbour." />
                      <outline text="A Sunni Islamist group &apos;&apos; calling itself the &apos;Brigades of Aisha&apos; has claimed responsibility for the massive car bomb." />
                      <outline text="It gave a clear warning to Hezbollah leader Hassan Nasrallah that this was not the first attack or the last. A bombing in July in a nearby Beirut neighbourhood wounded 53 people." />
                      <outline text="Despite supporting several uprisings during the Arab Spring, Nasrallah has chosen to back the al-Assad regime in Syria." />
                      <outline text="Explaining his decision, the Hezbollah leader said that &apos;&apos;it was after only after much thought that he decided to join the conflict in Syria&apos;&apos;." />
                      <outline text="Hezbollah has been fighting alongside the Syrian army. They helped loyalist troops to retake the city of Al-Qusayr early in the summer as part of the effort to keep the Syrian regime in power." />
                      <outline text="Syrian Free Army rebels have clearly identified their enemies. In a video posted on the internet in June, they showed the identify papers of four Lebanese nationals killed as they attempted to enter Syria. However, the rebels deny they are behind the attacks on Lebanese soil." />
                      <outline text="For several months now tension has been high with almost daily clashes in Lebanon between Sunni Islamist groups." />
                      <outline text="They say their enemies are the Syrian regime and Hezbollah, as well as the Lebanese army." />
                      <outline text="But overshadowing these attacks against Hezbollah &apos;&apos; linked to its support to Assad &apos;&apos; is the presence of Israel, which is key to political alliances in Lebanon." />
                      <outline text="Israel is particularly focused on the Shia group, as Hezbollah is a close ally of Iran." />
                      <outline text="Israel has also been accused of involvement in the attacks, an allegation it strongly denies." />
                      <outline text="More about:Attack, Hezbollah, Lebanon, SyriaCopyright (C) 2013 euronews" />
                      <outline text="JavaScript is required in order to view this article&apos;s accompanying video" />
              </outline>

              <outline text="Veterans Today &gt;&gt; Edward Snowden: Solar-Flare &apos;Killshot&apos; Cataclysm Imminent">
                      <outline text="Link to Article" type="link" url="http://www.veteranstoday.com/2013/08/16/edward-snowden-solar-flare-killshot-cataclysm-imminent/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376682144_kkJdUTkT.html" />
      <outline text="Fri, 16 Aug 2013 19:42" />
                      <outline text="" />
                      <outline text="&apos;&apos;Now [Edward Snowden] has provided The Internet Chronicle with top-secret Federal Emergency Management Agency (FEMA) documents outlining just how terrible the solar flares&apos; results will be. In just two months, &apos;&apos;the killshot&apos;&apos; is set to disable all electronic food and water delivery systems.&apos;&apos; Not to mention the Internet and all our computerized systems! This may be a cover-story in advance for the NSA to detonate a massive EMP, create communication chaos and impose a fascistic, military-police state." />
                      <outline text="I would be surprised if a solar phenomenon of this kind would be predictable with such specificity, which raises serious questions about whether Snowden is out there to put out this story.  It may also be the reason why DHS is gearing up for a civil war with the citizens of the US and why Barack Obama is going crazy promoting gun control and trying to defend the NSA surveillance program, in violation of his oath to preserve, protect and defend the Constitution of the United States. For me, his defense of NSA spying has been the last straw. The man should be impeached." />
                      <outline text="MOSCOW, Russia &apos;&apos; Edward Snowden, hacker-fugitive and former National Security Agency (NSA) contractor, revealed Tuesday that a series of solar flares is set to occur in September, killing hundreds of millions of people. Documents provided by Snowden prove that, as of 14 years ago, Central Intelligence Agency (CIA) remote viewers knew that the event was inevitable. Ever since, the world&apos;s governments have quietly been trying to prepare for the sweeping global famine to result." />
                      <outline text="Speaking from his room at Sheremetyevo Airport&apos;s Hotel Novotel, Snowden revealed that government preparations for September&apos;s catastrophic solar flares have been &apos;&apos;to only limited avail.&apos;&apos; The flares&apos; results, he said, are known casually throughout the global intelligence community as &apos;&apos;the killshot.&apos;&apos;" />
                      <outline text="Remote viewers employed by the CIA&apos;s Project Stargate use their ability to perceive geographically and chronologically distant events to protect America. Since 1999 they have known about the solar-flare event but have been threatened into silence by enforcers on the secret government&apos;s payroll." />
                      <outline text="As a part of hiring Snowden as a contractor, the NSA granted the 30-year-old access to all communications on earth. Now he has provided The Internet Chronicle with top-secret Federal Emergency Management Agency (FEMA) documents outlining just how terrible the solar flares&apos; results will be. In just two months, &apos;&apos;the killshot&apos;&apos; is set to disable all electronic food and water delivery systems." />
                      <outline text="Ever since the late 20th century, hundreds of millions of people have begun to rely on technological automation to enable their very lives. Solar flares release electromagnetic pulses, hazardous to electronic circuits. The smallest electronic circuits, such as those in computers&apos; central processing units, will be the most vulnerable." />
                      <outline text="Snowden said FEMA and the National Disaster Reduction Center of China have been taking steps for 14 years in light of the findings of Project Stargate. FEMA&apos;s own documents, provided by Snowden, lay out how the organization plans to round up tens of millions of the poorest Americans for housing at secure locations &apos;&apos;to better facilitate feeding and provision of consumer goods.&apos;&apos;" />
                      <outline text="YouTube - Veterans Today -" />
                      <outline text="Snowden, for years a CIA contractor, released testimonials from hundreds of remote viewers. Many of those remote viewers are still on the payroll of the governments of the United States and the Russian Federation. Those testimonials, though written independently by the analysts, are comprised of 4,472 pages, every single one of which, alarmingly, evince Snowden&apos;s account." />
                      <outline text="&apos;&apos;The massive electromagnetic pulse from the solar flares, or &apos;the killshot,&apos; will shutter most of the world&apos;s electrical systems,&apos;&apos; said Snowden. &apos;&apos;The Americans whose lives are most at risk are the elderly and the infirmed, those who depend on technology to enable their receiving home care or life-sustaining medical treatment.&apos;&apos;" />
                      <outline text="Throughout the 1970s and the 1990s, Russia and the United States were desperate to track and monitor the construction and maintenance of each other&apos;s nuclear silos. The nations&apos; governments openly admitted having poured billions of dollars into the training of elite teams of remote viewers. With their powers, the remote viewers were able to deter nuclear launches and, ultimately, bring an end to the Cold War.  In the mid-&apos;90s, the CIA simply pretended to close its remote-viewing program, so that it could operate more effectively." />
                      <outline text="Snowden said he hopes that his coming forward will allow Project Stargate&apos;s participants to be able to live normal, open lives again, &apos;&apos;instead of as circus animals, instead of as freaks.&apos;&apos; He added, &apos;&apos;[Significant others of Project Stargate employees] have to get Q clearances just to cohabitate with, without even marrying, their loved ones. That&apos;s tantamount to slavery.&apos;&apos;" />
                      <outline text="Humanity is about to pay a most dire price for its technological dependence. That price, said Snowden, proved a leading factor in his decision to come forward to the press &apos;&apos; about both the global Holocaust to ensue, as well as NSA analysts&apos; power, on the slightest whim, to listen to the phone calls of any person on earth." />
                      <outline text="Snowden said, with regard to CIA remote viewers, &apos;&apos;I have seen too many brave whistleblowers become subjects of smear and ridicule for using their talents to expose the truth.&apos;&apos; Added Snowden, bitterly, &apos;&apos;Well, we&apos;ll see who&apos;s Mr. Chuckles when &apos;the killshot&apos; goes down.&apos;&apos;" />
                      <outline text="WikiLeaks attorneys; and Anatoly Kucherena, Snowden&apos;s own counsel, together produced a video calling for calm and global preparedness. Monday, Snowden sent the video, below, to the Russian Federal Migration Service as part of his call for asylum." />
                      <outline text="This article may be found at &apos;&apos;Edward Snowden Solar-Flare &apos;&apos;Killshot&apos;&apos; Cataclysm Imminent&apos;&apos;." />
              </outline>

              <outline text="What Age Were They When The Deceleration of Independence was Signed?">
                      <outline text="Link to Article" type="link" url="http://www.economicpolicyjournal.com/2013/08/what-age-were-they-when-deceleration-of.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376682005_s3hj7VaA.html" />
        <outline text="Source: EconomicPolicyJournal.com" type="link" url="http://www.economicpolicyjournal.com/feeds/posts/default?alt=rss" />
      <outline text="Fri, 16 Aug 2013 19:40" />
                      <outline text="" />
                      <outline text="A partial list of the Founding Fathers&apos; ages on July 4, 1776:Marquis de Lafayette, 18" />
                      <outline text="Aaron Burr, 20" />
                      <outline text="Alexander Hamilton, 21" />
                      <outline text="James Madison, 25" />
                      <outline text="John Jay, 30" />
                      <outline text="Thomas Jefferson, 33" />
                      <outline text="Thomas Paine, 39" />
                      <outline text="John Adams, 40" />
                      <outline text="George Washington, 44" />
                      <outline text="Samuel Adams, 53" />
                      <outline text="Benjamin Franklin, 70" />
                      <outline text="Historian David McCullough explained the phenomenon of picturing our Founding Fathers as older than they actually were:" />
                      <outline text="We tend to see them as much older than they were. Because we&apos;re seeing them in portraits by Gilbert Stuart and others when they were truly the Founding Fathers &apos;-- when they were president or chief justice of the Supreme Court and their hair, if it hadn&apos;t turned white, was powdered white. We see the awkward teeth. We see the elder statesmen. At the time of the Revolution, they were all young. It was a young man&apos;s&apos;&apos;young woman&apos;s cause." />
                      <outline text="(Via AEI)" />
              </outline>

              <outline text="Law360 Mobile">
                      <outline text="Link to Article" type="link" url="http://www.law360.com/m/articles/382985/8-5m-groupon-mdl-deal-blocked-over-cy-" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376672095_4HQPNzXJ.html" />
      <outline text="Fri, 16 Aug 2013 16:54" />
                      <outline text="" />
                      <outline text="$8.5M Groupon MDL Deal Blocked Over Cy Pres AwardBy Maria Chutchian" />
                      <outline text="Law360, New York (September 28, 2012, 10:15 PM ET) -- A California federal judge declined Friday to approve Groupon Inc.&apos;s $8.5 million settlement with the plaintiffs in multidistrict litigation accusing the daily deals giant of selling certificates with illegal expiration dates, taking issue with the settlement&apos;s cy pres award." />
                      <outline text="U.S. District Judge Dana M. Sabraw overruled the majority of the numerous objections lodged against the deal, but found that the $75,000 reserved for cy pres recipients Electronic Frontier Foundation and the Center for Democracy and Technology was inappropriate when there could be class members who could..." />
                      <outline text="Please log in to read this articleTry Law360 free for seven days" />
              </outline>

              <outline text="Why Hollywood Wins in Judge&apos;s Rejection of Facebook Privacy Settlement">
                      <outline text="Link to Article" type="link" url="http://m.hollywoodreporter.com/thr-esq/why-hollywood-wins-judges-rejection-facebook-google-suit-364041" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376672009_zjzPct7Y.html" />
      <outline text="Fri, 16 Aug 2013 16:53" />
                      <outline text="" />
                      <outline text="In a ruling on Friday, a San Francisco judge rejected a $20 million settlement in a class action lawsuit over whether Facebook violated the privacy of its users by featuring them in a &quot;Sponsored Stories&quot; advertisement program." />
                      <outline text="The rejection of a settlement where half of the money was to go to lawyers and half to &quot;charity&quot; and almost nothing to actual victims could bolster attention on a maneuver that allows big tech companies like Facebook and Google to funnel money to organizations that are hostile to Hollywood&apos;s pro-copyright agenda." />
                      <outline text="The original lawsuit itself had little to do with Hollywood. Nevertheless, it touches entertainment anyway thanks to the judge&apos;s address of cy pres, a legal doctrine born out of Norman French and old estate law that roughly means that when it&apos;s hard or impractical to award compensation in court cases, payment can be made as &quot;near as possible,&quot; including to not-for-profit organizations with similar interests." />
                      <outline text="The plaintiffs in the &quot;Sponsored Stories&quot; case sued Facebook for allegedly violating their rights of publicity and California&apos;s unfair competition law by using their names and images without consent in ads that were shown to users&apos; online friends on the social network. After two years of litigation, the dispute settled. Facebook agreed to pay $10 million to the plaintiffs&apos; lawyers, $10 million to cy pres recipients, and $37,500 to the three class representatives who were named as plaintiffs. Facebook also agreed to make policy changes that the plaintiffs&apos; expert economist estimated to be worth $103.2 million." />
                      <outline text="At a hearing earlier this month, U.S. District Judge Richard Seeborg was openly skeptical about the cy pres award, wondering how lawyers arrived at that amount and how it stood to benefit Facebook&apos;s users. In a ruling rejecting the proposed settlement on Friday, the judge followed this up by saying, &quot;Although it is not a precise science, plaintiffs must show that the cy pres payment represents a reasonable settlement of past damages claims, and that it was not merely plucked from thin air, or wholly inconsequential to them...&quot;" />
                      <outline text="Although the judge didn&apos;t rule out the possibility of a cy pres payment in the case -- and reportedly even asked at the hearing, &quot;Why shouldn&apos;t the cy pres be $100 million?&apos;&apos; -- more focus on who is getting cy press money could be around the bend." />
                      <outline text="In a column for Forbes in late July, legal analyst Roger Parloff pointed out that a good chunk of cy pres money awarded in privacy cases is going to organizations that &quot;would very likely be getting at least some donations from Google or Facebook&quot; anyway. He notes that recipients Electronic Frontier Foundation, the Center for Democracy and Technology, and the Center for Internet and Society at Stanford collect voluntary contributions from the two big tech companies and &quot;all reliably line up on the tech sector side in scrimmages with copyright holders.&quot;" />
                      <outline text="To be fair, each of these organizations does in fact often take strong positions against tech companies on privacy issues, so in a certain regard, it&apos;s perfectly appropriate to award them money to monitor these companies going forward." />
                      <outline text="But so does the Electronic Privacy Information Center, which hasn&apos;t found it as easy to collect such money. The difference is that EPIC doesn&apos;t win friends in Silicon Valley by taking on Hollywood in legislative and policy debates. It doesn&apos;t because copyright matters are mostly outside its purview. Such a disadvantage once led EPIC to complain that one Google cy pres settlement served to divert money &quot;to organizations that are currently paid by Google to lobby for or to consult for the company.&quot;" />
                      <outline text="To avoid being shut out of a possible &quot;sponsored stories&quot; settlement, the EPIC along with other groups like the Center for Digital Democracy, the Privacy Rights Clearinghouse, and the Institute for Public Representation at Georgetown University, have asked to the court to adopt a procedure previously proposed in privacy cases involving Google Buzz and Netflix whereby potential cy pres recipients would disclose connections and contributions from Facebook." />
                      <outline text="E-mail: eriq.gardner@thr.com; Twitter: @eriqgardner" />
                      <outline text=" " />
              </outline>

              <outline text="The Facebook Cy Pres Conspiracy | LawTechie.com">
                      <outline text="Link to Article" type="link" url="http://www.lawtechie.com/2012/08/the-facebook-cy-pres-conspiracy/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376671892_qGpVMpzg.html" />
      <outline text="Fri, 16 Aug 2013 16:51" />
                      <outline text="" />
                      <outline text="The Hollywood Reporter weaves a tantalizing conspiracy story (sincerely, it is tantalizing) about how Facebook&apos;s cy pres settlement payments in the latest privacy class action lawsuits may, in fact, be backhanded methods of buying support of organizations that would have Facebook&apos;s back in any copyright litigation versus Hollywood. Some background:" />
                      <outline text="cy pres [is] a legal doctrine born out of Norman French and old estate law that roughly means that when it&apos;s hard or impractical to award compensation in court cases, payment can be made as &apos;&apos;near as possible,&apos;&apos; including to not-for-profit organizations with similar interests." />
                      <outline text="In Facebook&apos;s case, the company has recently been trying to settle a privacy class action via $10mm to plaintiffs&apos; lawyers, $10mm in cy pres money to various privacy non-profits, and $37,500 to the actual class plaintiffs. The judge said &apos;&apos;no&apos;&apos;:" />
                      <outline text="The rejection of a settlement where half of the money was to go to lawyers and half to &apos;&apos;charity&apos;&apos; and almost nothing to actual victims could bolster attention on a maneuver that allows big tech companies like Facebook and Google to funnel money to organizations that are hostile to Hollywood&apos;s pro-copyright agenda." />
                      <outline text="Interestingly&apos;..." />
                      <outline text="In a column for Forbes in late July, legal analyst Roger Parloff pointed out that a good chunk of cy pres money awarded in privacy cases is going to organizations that &apos;&apos;would very likely be getting at least some donations from Google or Facebook&apos;&apos; anyway. He notes that recipients Electronic Frontier Foundation, the Center for Democracy and Technology, and the Center for Internet and Society at Stanford collect voluntary contributions from the two big tech companies and &apos;&apos;all reliably line up on the tech sector side in scrimmages with copyright holders.&apos;&apos;" />
                      <outline text="This stuff may not quite rise to the level of a paperback thriller, but it certainly entertained this IP lawyer&apos;s morning." />
                      <outline text="Share Our PostsShare this post through social bookmarks." />
                      <outline text="No related posts TrackbacksWebsites mentioned my entry." />
                      <outline text="There are no trackbacks on this entry" />
                      <outline text="Add a CommentFill in the form and submit." />
              </outline>

              <outline text="Is Obama&apos;s Egypt Policy Is &apos;Worthy&apos; of a Nobel Peace Prize Winner?">
                      <outline text="Link to Article" type="link" url="http://www.mrctv.org/videos/obamas-egypt-policy-worthy-nobel-peace-prize-winner" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376670546_BnxZ2ETV.html" />
        <outline text="Source: MRCTV - News &amp; Politics" type="link" url="http://www.mrctv.org/taxonomy/term/1/0/feed" />
      <outline text="Fri, 16 Aug 2013 16:29" />
                      <outline text="" />
                      <outline text="If the player does not load, please check that you are running the latest version of Adobe Flash Player." />
                      <outline text="State Dep&apos;t Asked If Obama&apos;s Egypt Policy Is &apos;Worthy&apos; of a Nobel Peace Prize Winner - See more at: http://www.cnsnews.com/news/article/state-dept-asked-if-obamas-egypt-policy-worthy-nobel-peace-prize-winner#sthash.k96VEKgq.dpuf" />
              </outline>

              <outline text="Oprah: &apos;It&apos;s Ridiculous to Look at Zimmerman Case and Not Think Race Was Involved&apos;">
                      <outline text="Link to Article" type="link" url="http://www.mrctv.org/videos/oprah-its-ridiculous-look-zimmerman-case-and-not-think-race-was-involved" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376670531_QWdWZFd2.html" />
        <outline text="Source: MRCTV - News &amp; Politics" type="link" url="http://www.mrctv.org/taxonomy/term/1/0/feed" />
      <outline text="Fri, 16 Aug 2013 16:28" />
                      <outline text="" />
                      <outline text="MRC TV is an online platform for people to share and view videos, articles and opinions on topics that are important to them -- from news to political issues and rip-roaring humor." />
                      <outline text="MRC TV is brought to you by the Media Research Center, a 501(c) 3 nonprofit research and education organization. The MRC is located at: 1900 Campus Commons Drive, Reston, VA  20194. For information about the MRC, please visit www.MRC.org." />
                      <outline text="Copyright (C) 2013, Media Research Center. All Rights Reserved." />
              </outline>

              <outline text="Bill O&apos;Reilly Accuses Al Sharpton of Lying &apos;Once Again&apos; on National Television">
                      <outline text="Link to Article" type="link" url="http://www.mrctv.org/videos/bill-oreilly-accuses-al-sharpton-lying-once-again-national-television" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376670523_4LctHvqV.html" />
        <outline text="Source: MRCTV - News &amp; Politics" type="link" url="http://www.mrctv.org/taxonomy/term/1/0/feed" />
      <outline text="Fri, 16 Aug 2013 16:28" />
                      <outline text="" />
                      <outline text="MRC TV is an online platform for people to share and view videos, articles and opinions on topics that are important to them -- from news to political issues and rip-roaring humor." />
                      <outline text="MRC TV is brought to you by the Media Research Center, a 501(c) 3 nonprofit research and education organization. The MRC is located at: 1900 Campus Commons Drive, Reston, VA  20194. For information about the MRC, please visit www.MRC.org." />
                      <outline text="Copyright (C) 2013, Media Research Center. All Rights Reserved." />
              </outline>

              <outline text="Google expands personalized search for desktops and mobile">
                      <outline text="Link to Article" type="link" url="http://phys.org/news/2013-08-google-personalized-desktops-mobile.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376670263_3c7wJ8j7.html" />
        <outline text="Source: Phys.org - latest science and technology news stories" type="link" url="http://phys.org/rss-feed/" />
      <outline text="Fri, 16 Aug 2013 16:24" />
                      <outline text="" />
                      <outline text="Google expands personalized search for desktops and mobileJavascript is currently disabled in your web browser. For full site functionality, it is necessary to enable Javascript. In order to enable it, please see these instructions.1 hour ago by Brandon BaileyAre you still scrolling through your email just to locate the particulars of an airline reservation or an online purchase you made weeks ago? That&apos;s so 2012." />
                      <outline text="Google said Wednesday that most U.S.-based users of its search service soon will be able to retrieve useful information from their other Google services, such as Gmail or Calendar, by typing or speaking a conversational question such as &quot;Is my flight on time?&quot; or &quot;Show me my purchases.&quot;" />
                      <outline text="The Internet giant, which has been testing different aspects of the service for the past year, said it will start answering such conversational queries for most people in the United States who use the Google search app on an Apple or Android smartphone or tablet or a personal computer running Google&apos;s Chrome browser." />
                      <outline text="The move is part of a broader Google effort to develop useful services that can be operated through conversational, spoken commands - like the celebrated computer on &quot;Star Trek.&quot; While Google may be further along than most of its competitors, Gartner analyst Whit Andrews said other tech companies, including startups and giants like Apple and Microsoft, are working on related services." />
                      <outline text="That makes it &quot;not only necessary but strategic&quot; for Google to expand its capabilities if it wants to keep dominating the search business, Andrews added. &quot;Siri is the scariest thing Google has seen since Facebook,&quot; he said, referring to Apple&apos;s online personal assistant." />
                      <outline text="Google&apos;s new feature works by tapping other Google services for relevant data, including Calendar items or even photos from a Google+ account. It can retrieve airline information from a confirmation email saved in Gmail, and then get an updated flight status from the Internet. Anticipating privacy concerns, Google said a user can only get personal information from his or her own account, and only when signed in. Users can opt out of the service." />
                      <outline text="For now, the service works with five categories of information - flight information, hotel and restaurant reservations, online purchases, calendar events and photos - but Google spokeswoman Roya Soleimani said the company will add more. &quot;We&apos;re focusing on daily tasks that make your life a little bit easier,&quot; she said." />
                      <outline text="Google already performs a similar function on mobile devices with its Google Now service, which anticipates needs and tries to show relevant information without being asked. It&apos;s offered personalized search service for desktop users who enrolled in a &quot;field test&quot; program last year. Google also has been improving the conversational prowess of its speech technology, available for Chrome users since May." />
                      <outline text="In a blog post, Google product manager Roy Livne said the service now can field variations on a question such as, &quot;What are my plans for tomorrow?&quot; and show a list of events from a person&apos;s calendar as well as email confirmations from hotels, restaurants or airlines." />
                      <outline text="Explore further:Google combines cloud storage for Gmail, Drive, Google+ services" />
                      <outline text="(C)2013 San Jose Mercury News (San Jose, Calif.)Distributed by MCT Information Services" />
                      <outline text="More from Physics Forums - Computers" />
                      <outline text="Related Stories" />
                      <outline text="Google combines cloud storage for Gmail, Drive, Google+ services May 15, 2013" />
                      <outline text="Cloud storage for three of Google&apos;s more popular services - Gmail, Google Drive and Google+ - are being combined to give users more control over how they want to use the storage space." />
                      <outline text="Undisclosed glitch disrupts Google Mail for two hours (Update) Apr 17, 2013" />
                      <outline text="Google suffered disruptions on several of its cloud-based services including Google Mail for about two hours Wednesday for reasons that were not disclosed." />
                      <outline text="Microsoft embraces a Google service for a change May 14, 2013" />
                      <outline text="Microsoft&apos;s disdain for Google doesn&apos;t extend to all of its rival&apos;s products. In a rare bit of cooperation, Microsoft&apos;s Outlook.com is giving users of its free email service the option of logging into Google Chat to exchange ..." />
                      <outline text="Google releases tablet app for social network Jun 27, 2012" />
                      <outline text="Google&apos;s Plus social network will have its own app for tablet computers." />
                      <outline text="Google wants to start a conversation Aug 07, 2013" />
                      <outline text="Search engine companies like Google, Microsoft and, to a lesser extent, Apple are trying their best to get users to stop typing in queries and to start using their voices to ask more conversational questions to perform searches ..." />
                      <outline text="Google appears poised to unveil new Nexus tablets Jul 17, 2013" />
                      <outline text="(AP)&apos;--Google appears to be getting ready to introduce the next generation of its Nexus tablets." />
                      <outline text="Recommended for youBrazil weighs giving email same protection as mail 19 hours ago" />
                      <outline text="Brazil&apos;s communications minister is proposing giving emails the same level of legal protection afforded to letters sent by mail." />
                      <outline text="Washington Post says website hacked by Syrian group (Update) 23 hours ago" />
                      <outline text="The Washington Post said Thursday its website was hacked by the Syrian Electronic Army, becoming the latest media organization victimized by the group that backs strongman Bashar al-Assad." />
                      <outline text="Expert advises caution in online sharing Aug 15, 2013" />
                      <outline text="Seymour &quot;Sy&quot; Goodman, an expert on information security at Georgia Tech&apos;s Sam Nunn School of International Affairs, does not have a Facebook page." />
                      <outline text="Small businesses grapple with handling online image Aug 15, 2013" />
                      <outline text="Restaurants, mom-and-pop shops and other small businesses often face an abundance of frustrating complications during start-up - construction delays and supply shortages being among the top obstacles." />
                      <outline text="Microsoft restores Outlook.com service on the Web (Update) Aug 15, 2013" />
                      <outline text="Microsoft has fixed a problem that prevented some people from getting their email on Outlook.com." />
                      <outline text="New York Times website goes down (Update) Aug 14, 2013" />
                      <outline text="The New York Times&apos; website went offline Wednesday, the result of a server problem, the company said." />
                      <outline text="User comments : 1Adjust slider to filter visible comments by rank" />
                      <outline text="Display comments: newest first" />
                      <outline text="Stephen_Crowleynot rated yet1 hour ago" />
                      <outline text="Is phys.org just a commercial advertising medium for technology companies now? You don&apos;t need google to search your desktop or mobile. There is free open-source software to do that. http://www.lesbon.../recoll/More news stories" />
                      <outline text="New research suggests perovskite as cheaper replacement for silicon-based solar panels(Phys.org) &apos;--Researchers at Oxford Photovoltaics and other companies investigating the use of perovskite&apos;--a crystalline organometal&apos;--as a replacement for silicon in photovoltaic cells have created prototypes ..." />
                      <outline text="Microsoft India team develop secure Peer-to-Peer acoustic NFC system(Phys.org) &apos;--A team of researchers at Microsoft India has developed an alternative to standard NFC communications between hand-held devices&apos;--a software only system that makes use of the speaker and microphone ..." />
                      <outline text="New flow battery could enable cheaper, more efficient energy storageMIT researchers have engineered a new rechargeable flow battery that doesn&apos;t rely on expensive membranes to generate and store electricity. The device, they say, may one day enable cheaper, large-scale energy ..." />
                      <outline text="Intel developer event to discuss 1.6 Tbit/s MXC interconnect breakthrough(Phys.org) &apos;--The word is out that Intel will present an entirely new optical interconnect technology for servers at the Intel Developer Forum in San Francisco next month. The MXC interconnect is capable of ..." />
                      <outline text="New approach assembles big structures from small interlocking piecesMIT researchers have developed a lightweight structure whose tiny blocks can be snapped together much like the bricks of a child&apos;s construction toy. The new material, the researchers say, could revolutionize ..." />
                      <outline text="How DNA repair helps prevent cancerThe biological information that makes us unique is encoded in our DNA. DNA damage is a natural biological occurrence that happens every time cells divide and multiply. External factors such as overexposure ..." />
                      <outline text="Female frogs prefer males who can multitaskFrom frogs to humans, selecting a mate is complicated. Females of many species judge suitors based on many indicators of health or parenting potential. But it can be difficult for males to produce multiple ..." />
                      <outline text="Many stroke, heart-attack survivors make no changes after eventThere&apos;s no stronger scare tactic into leading a healthy lifestyle than suffering a heart attack or stroke, which is why it may be surprising that many survivors don&apos;t make changes needed to improve their health." />
                      <outline text="Drug dosing for older heart patients should differOlder heart patients present unique challenges for determining the optimal dosages of medications, so a new study from researchers at Duke Medicine offers some rare clarity about the use of drugs that are used to treat patients ..." />
                      <outline text="Two Russian cosmonauts turn cable guys in spacewalkRussian cosmonauts are taking a spacewalk to lay cable for a new lab that&apos;s due to arrive at the International Space Station in a few months." />
                      <outline text="(C) Phys.org&apos; 2003-2013" />
                      <outline text="Google expands personalized search for desktops and mobileJavascript is currently disabled in your web browser. For full site functionality, it is necessary to enable Javascript. In order to enable it, please see these instructions.1 hour ago by Brandon BaileyAre you still scrolling through your email just to locate the particulars of an airline reservation or an online purchase you made weeks ago? That&apos;s so 2012." />
                      <outline text="Google said Wednesday that most U.S.-based users of its search service soon will be able to retrieve useful information from their other Google services, such as Gmail or Calendar, by typing or speaking a conversational question such as &quot;Is my flight on time?&quot; or &quot;Show me my purchases.&quot;" />
                      <outline text="The Internet giant, which has been testing different aspects of the service for the past year, said it will start answering such conversational queries for most people in the United States who use the Google search app on an Apple or Android smartphone or tablet or a personal computer running Google&apos;s Chrome browser." />
                      <outline text="The move is part of a broader Google effort to develop useful services that can be operated through conversational, spoken commands - like the celebrated computer on &quot;Star Trek.&quot; While Google may be further along than most of its competitors, Gartner analyst Whit Andrews said other tech companies, including startups and giants like Apple and Microsoft, are working on related services." />
                      <outline text="That makes it &quot;not only necessary but strategic&quot; for Google to expand its capabilities if it wants to keep dominating the search business, Andrews added. &quot;Siri is the scariest thing Google has seen since Facebook,&quot; he said, referring to Apple&apos;s online personal assistant." />
                      <outline text="Google&apos;s new feature works by tapping other Google services for relevant data, including Calendar items or even photos from a Google+ account. It can retrieve airline information from a confirmation email saved in Gmail, and then get an updated flight status from the Internet. Anticipating privacy concerns, Google said a user can only get personal information from his or her own account, and only when signed in. Users can opt out of the service." />
                      <outline text="For now, the service works with five categories of information - flight information, hotel and restaurant reservations, online purchases, calendar events and photos - but Google spokeswoman Roya Soleimani said the company will add more. &quot;We&apos;re focusing on daily tasks that make your life a little bit easier,&quot; she said." />
                      <outline text="Google already performs a similar function on mobile devices with its Google Now service, which anticipates needs and tries to show relevant information without being asked. It&apos;s offered personalized search service for desktop users who enrolled in a &quot;field test&quot; program last year. Google also has been improving the conversational prowess of its speech technology, available for Chrome users since May." />
                      <outline text="In a blog post, Google product manager Roy Livne said the service now can field variations on a question such as, &quot;What are my plans for tomorrow?&quot; and show a list of events from a person&apos;s calendar as well as email confirmations from hotels, restaurants or airlines." />
                      <outline text="Explore further:Google combines cloud storage for Gmail, Drive, Google+ services" />
                      <outline text="(C)2013 San Jose Mercury News (San Jose, Calif.)Distributed by MCT Information Services" />
                      <outline text="More from Physics Forums - Computers" />
                      <outline text="Related Stories" />
                      <outline text="Google combines cloud storage for Gmail, Drive, Google+ services May 15, 2013" />
                      <outline text="Cloud storage for three of Google&apos;s more popular services - Gmail, Google Drive and Google+ - are being combined to give users more control over how they want to use the storage space." />
                      <outline text="Undisclosed glitch disrupts Google Mail for two hours (Update) Apr 17, 2013" />
                      <outline text="Google suffered disruptions on several of its cloud-based services including Google Mail for about two hours Wednesday for reasons that were not disclosed." />
                      <outline text="Microsoft embraces a Google service for a change May 14, 2013" />
                      <outline text="Microsoft&apos;s disdain for Google doesn&apos;t extend to all of its rival&apos;s products. In a rare bit of cooperation, Microsoft&apos;s Outlook.com is giving users of its free email service the option of logging into Google Chat to exchange ..." />
                      <outline text="Google releases tablet app for social network Jun 27, 2012" />
                      <outline text="Google&apos;s Plus social network will have its own app for tablet computers." />
                      <outline text="Google wants to start a conversation Aug 07, 2013" />
                      <outline text="Search engine companies like Google, Microsoft and, to a lesser extent, Apple are trying their best to get users to stop typing in queries and to start using their voices to ask more conversational questions to perform searches ..." />
                      <outline text="Google appears poised to unveil new Nexus tablets Jul 17, 2013" />
                      <outline text="(AP)&apos;--Google appears to be getting ready to introduce the next generation of its Nexus tablets." />
                      <outline text="Recommended for youBrazil weighs giving email same protection as mail 19 hours ago" />
                      <outline text="Brazil&apos;s communications minister is proposing giving emails the same level of legal protection afforded to letters sent by mail." />
                      <outline text="Washington Post says website hacked by Syrian group (Update) 23 hours ago" />
                      <outline text="The Washington Post said Thursday its website was hacked by the Syrian Electronic Army, becoming the latest media organization victimized by the group that backs strongman Bashar al-Assad." />
                      <outline text="Expert advises caution in online sharing Aug 15, 2013" />
                      <outline text="Seymour &quot;Sy&quot; Goodman, an expert on information security at Georgia Tech&apos;s Sam Nunn School of International Affairs, does not have a Facebook page." />
                      <outline text="Small businesses grapple with handling online image Aug 15, 2013" />
                      <outline text="Restaurants, mom-and-pop shops and other small businesses often face an abundance of frustrating complications during start-up - construction delays and supply shortages being among the top obstacles." />
                      <outline text="Microsoft restores Outlook.com service on the Web (Update) Aug 15, 2013" />
                      <outline text="Microsoft has fixed a problem that prevented some people from getting their email on Outlook.com." />
                      <outline text="New York Times website goes down (Update) Aug 14, 2013" />
                      <outline text="The New York Times&apos; website went offline Wednesday, the result of a server problem, the company said." />
                      <outline text="User comments : 1Adjust slider to filter visible comments by rank" />
                      <outline text="Display comments: newest first" />
                      <outline text="Stephen_Crowleynot rated yet1 hour ago" />
                      <outline text="Is phys.org just a commercial advertising medium for technology companies now? You don&apos;t need google to search your desktop or mobile. There is free open-source software to do that." />
                      <outline text="http://www.lesbon.../recoll/More news stories" />
                      <outline text="New research suggests perovskite as cheaper replacement for silicon-based solar panels(Phys.org) &apos;--Researchers at Oxford Photovoltaics and other companies investigating the use of perovskite&apos;--a crystalline organometal&apos;--as a replacement for silicon in photovoltaic cells have created prototypes ..." />
                      <outline text="Microsoft India team develop secure Peer-to-Peer acoustic NFC system(Phys.org) &apos;--A team of researchers at Microsoft India has developed an alternative to standard NFC communications between hand-held devices&apos;--a software only system that makes use of the speaker and microphone ..." />
                      <outline text="New flow battery could enable cheaper, more efficient energy storageMIT researchers have engineered a new rechargeable flow battery that doesn&apos;t rely on expensive membranes to generate and store electricity. The device, they say, may one day enable cheaper, large-scale energy ..." />
                      <outline text="Intel developer event to discuss 1.6 Tbit/s MXC interconnect breakthrough(Phys.org) &apos;--The word is out that Intel will present an entirely new optical interconnect technology for servers at the Intel Developer Forum in San Francisco next month. The MXC interconnect is capable of ..." />
                      <outline text="New approach assembles big structures from small interlocking piecesMIT researchers have developed a lightweight structure whose tiny blocks can be snapped together much like the bricks of a child&apos;s construction toy. The new material, the researchers say, could revolutionize ..." />
                      <outline text="How DNA repair helps prevent cancerThe biological information that makes us unique is encoded in our DNA. DNA damage is a natural biological occurrence that happens every time cells divide and multiply. External factors such as overexposure ..." />
                      <outline text="Female frogs prefer males who can multitaskFrom frogs to humans, selecting a mate is complicated. Females of many species judge suitors based on many indicators of health or parenting potential. But it can be difficult for males to produce multiple ..." />
                      <outline text="Many stroke, heart-attack survivors make no changes after eventThere&apos;s no stronger scare tactic into leading a healthy lifestyle than suffering a heart attack or stroke, which is why it may be surprising that many survivors don&apos;t make changes needed to improve their health." />
                      <outline text="Drug dosing for older heart patients should differOlder heart patients present unique challenges for determining the optimal dosages of medications, so a new study from researchers at Duke Medicine offers some rare clarity about the use of drugs that are used to treat patients ..." />
                      <outline text="Two Russian cosmonauts turn cable guys in spacewalkRussian cosmonauts are taking a spacewalk to lay cable for a new lab that&apos;s due to arrive at the International Space Station in a few months." />
                      <outline text="(C) Phys.org&apos; 2003-2013" />
              </outline>

              <outline text="DigiD na DDoS-aanval weer beschikbaar">
                      <outline text="Link to Article" type="link" url="http://www.volkskrant.nl/vk/nl/2686/Binnenland/article/detail/3493593/2013/08/16/DigiD-na-DDoS-aanval-weer-beschikbaar.dhtml" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376670184_96jcbeSt.html" />
        <outline text="Source: VK: Home" type="link" url="http://www.volkskrant.nl/rss.xml" />
      <outline text="Fri, 16 Aug 2013 16:23" />
                      <outline text="" />
                      <outline text="Bewerkt door: redactie &apos;&apos; 16/08/13, 16:50  &apos;&apos; bron: ANP/BuzzT" />
                      <outline text="(C) ANP." />
                      <outline text="DigiD is vrijdag sinds 16.15 uur weer beschikbaar. Door een zogenoemde DDoS-aanval was inloggen sinds 08.00 uur niet mogelijk." />
                      <outline text="(C) ANP." />
                      <outline text="DigiD is nodig ter identificatie op bepaalde sites van de overheid, zoals van de Belastingdienst en andere organisaties met een publieke taak. De storing werd om 8.00 uur gesignaleerd. Aanvankelijk werd gemeld dat het om een technische storing ging. Later bleek het te gaan om een DDoS-aanval." />
                      <outline text="Bij een DDoS-aanval wordt een server van buitenaf zo bestookt met communicatieverzoeken, dat die onbereikbaar wordt. Er komen bij zo&apos;n aanval geen gegevens van gebruikers op straat te liggen, zegt een woordvoerder." />
                      <outline text="Het is niet de eerste keer dat DigiD (gedeeltelijk) platligt. Volgens de woordvoerder is het ook niet uitgesloten dat DigiD later opnieuw moeilijker bereikbaar is door nieuwe aanvallen." />
              </outline>

              <outline text="The full RNC resolution to bar CNN, NBC from participating in 2016 GOP primary debates">
                      <outline text="Link to Article" type="link" url="http://www.theblaze.com/blog/2013/08/16/the-full-rnc-resolution-to-bar-cnn-nbc-from-participating-in-2016-gop-primary-debates/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376670110_ykrP6BqD.html" />
        <outline text="Source: TheBlaze.com - Blog" type="link" url="http://www.theblaze.com/feed/" />
      <outline text="Fri, 16 Aug 2013 16:21" />
                      <outline text="" />
                      <outline text="Below is the full text of the Republican National Committee Resolution (to be voted on Friday) to bar CNN and NBC from participating in the 2016 GOP primary debates:" />
                      <outline text="WHEREAS, former Secretary Hillary Clinton is likely to run for President in 2016, and CNN and NBC have both announced programming that amounts to little more than extended commercials promoting former Secretary Clinton; and" />
                      <outline text="WHEREAS, these programming decisions are an attempt to show political favoritism and put a thumb on the scales for the next presidential election; and" />
                      <outline text="WHEREAS, airing this programming will jeopardize will the credibility of CNN and NBC as supposedly unbiased news networks and undermine the perceived objectivity of the coverage of the 2016 presidential campaign by these networks; and" />
                      <outline text="WHEREAS, Robert Greenblatt, Chairman of NBC Entertainment, contributed the maximum amount to Hillary Clinton&apos;s 2008 presidential campaign committee, contributed $25,000 to Obama&apos;s 2012 Victory Fund, and this year contributed $10,000 to the Democratic National Committee; therefore be it &apos;&apos;" />
                      <outline text="RESOLVED, that the Republican National Committee calls on CNN and NBC to cancel the airing of these political ads masked as unbiased entertainment; and, be it further" />
                      <outline text="RESOLVED, that if CNN and NBC continue to move forward with this and other such programming, the Republican National Committee will neither partner with these networks in the 2016 presidential primary debates nor sanction any primary debates they sponsor, and, be it finally" />
                      <outline text="RESOLVED, that the Republican National Committee shall endeavor to bring more order to the primary debates and ensure a reasonable number of debates, appropriate moderators and debate partners are chosen, and that other issues pertaining to the general nature of such debates are addressed." />
                      <outline text="h/t TIME" />
              </outline>

              <outline text="36(b)(1) Arms Sales Notification">
                      <outline text="Link to Article" type="link" url="https://www.federalregister.gov/articles/2013/08/16/2013-19986/36b1-arms-sales-notification" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376669635_2F3UddAf.html" />
        <outline text="Source: Federal Register Latest Entries" type="link" url="https://www.federalregister.gov/articles.rss#" />
      <outline text="Fri, 16 Aug 2013 12:00" />
                      <outline text="" />
                      <outline text="Ms. B. English, DSCA/DBO/CFM, (703) 601-3740." />
                      <outline text="The following is a copy of a letter to the Speaker of the House of Representatives, Transmittals 12-67 with attached transmittal, policy justification, and Sensitivity of Technology." />
                      <outline text="Dated: August 13, 2013." />
                      <outline text="Aaron Siegel," />
                      <outline text="Alternate OSD Federal Register Liaison Officer, Department of Defense." />
                      <outline text="BILLING CODE 5001-06-P" />
                      <outline text="BILLING CODE 5001-06-C" />
                      <outline text="Transmittal No. 12-67Notice of Proposed Issuance of Letter of Offer Pursuant to Section 36(b)(1) of the Arms Export Control Act, as amended(i) Prospective Purchaser: Government of Iraq" />
                      <outline text="(ii) Total Estimated Value:" />
                      <outline text="Major Defense Equipment *$ 1.133 billionOther$ 1.270 billionTotal$ 2.403 billion(iii) Description and Quantity or Quantities of Articles or Services under Consideration for Purchase: 40 AVENGER Fire Units, 681 STINGER Reprogrammable Micro-Processor (RMP) Block I 92H Missiles, 13 AN/MPQ-64F1 SENTINEL Radars, 7 AN/YSQ-184D Forward Area Air Defense Command, Control, and Intelligence (FAAD C2I) Systems, 75 AN/VRC-92E SINCGARS Radios, 3 HAWK XXI Batteries (6 Fire Units) which include 6 Battery Fire Direction Centers, 6 High Powered Illuminator Radars, 216 MIM-23P HAWK Tactical Missiles, 2 Mobile Battalion Operation Centers (BOC), 3 HAWK XXI BOC Air Defense Consoles (ADCs), 1DS/GS Shop 20, 1 DS/GS Shop 21, 1 Mini-Certified Round Assembly Facility (MCRAF), Air Command and Control (C2) systems and surveillance radars for the Integrated Air Defense Systems that includes TPS-77 Long-Range Radars (LRR) and Omnyx-I0 Air Command and Control System, and 10 Medium Range Radars. Also included: Ground Air Transmit Receive Ultra High Frequency/Very High Frequency radio capability, facilities and construction for one (1) underground Air Defense Operations Center and two (2) Air Defense Sector Operations Centers, spare and repair parts, repair and return, software support, systems integration, long haul communication technical integration, communications equipment, support equipment and sustainment, tools and test equipment, publications and technical documentation, personnel training and training equipment, U.S. Government and contractor representative engineering, technical, and logistics support services, and other related elements of logistics support." />
                      <outline text="(iv) Military Department: Army (UFU, UEO); Air Force (QBF)" />
                      <outline text="(v) Prior Related Cases, if any: None" />
                      <outline text="(vi) Sales Commission, Fee, etc., Paid, Offered, or Agreed to be Paid: None" />
                      <outline text="(vii) Sensitivity of Technology Contained in the Defense Article or Defense Services Proposed to be Sold: See Attached Annex" />
                      <outline text="(viii) Date Report Delivered to Congress: 5 August 2013" />
                      <outline text="* as defined in Section 47(6) of the Arms Export Control Act." />
                      <outline text="POLICY JUSTIFICATIONIraq&apos;--Integrated Air Defense SystemThe Government of Iraq has requested a possible sale of 40 AVENGER Fire Units, 681 STINGER Reprogrammable Micro-Processor (RMP) Block I 92H Missiles, 13 AN/MPQ-64F1 SENTINEL Radars, 7 AN/YSQ-184D Forward Area Air Defense Command, Control, and Intelligence (FAAD C2I) Systems, 75 AN/VRC-92E SINCGARS Radios, 3 HAWK XXI Batteries (6 Fire Units) which include 6 Battery Fire Direction Centers, 6 High Powered Illuminator Radars, 216 MIM-23P HAWK Tactical Missiles, 2 Mobile Battalion Operation Centers (BOC), 3 HAWK XXI BOC Air Defense Consoles (ADCs), 1DS/GS Shop 20, 1 DS/GS Shop 21, 1 Mini-Certified Round Assembly Facility (MCRAF), Air Command and Control (C2) systems and surveillance radars for the Integrated Air Defense Systems that includes TPS-77 Long-Range Radars (LRR) and Omnyx-I0 Air Command and Control System, and 10 Medium Range Radars. Also included: Ground Air Transmit Receive Ultra High Frequency/Very High Frequency radio capability, facilities and construction for one (1) underground Air Defense Operations Center and two (2) Air Defense Sector Operations Centers, spare and repair parts, repair and return, software support, systems integration, long haul communication technical integration, communications equipment, support equipment and sustainment, tools and test equipment, publications and technical documentation, personnel training and training equipment, U.S. Government and contractor representative engineering, technical, and logistics support services, and other related elements of logistics support. The estimated cost is $2.403 billion." />
                      <outline text="This proposed sale will contribute to the foreign policy and national security of the United States by helping to improve the security of a friendly country. This proposed sale directly supports the Iraqi government and serves the interests of the Iraqi people and the United States." />
                      <outline text="This proposed sale of Ground Based Air Defense Systems will help the Government of Iraq to modernize its armed forces. The proposed air defense system will provide the Iraqi Air Defense Command situational awareness of the country&apos;s airspace and a baseline tactical radar and threat intercept capability. This capability will provide Iraq with the ability to contribute to regional air defenses and reduce its vulnerability to air attacks and also enhance interoperability between the Government of Iraq, the U.S., and other allies." />
                      <outline text="The proposed sale of this equipment and support will not alter the basic military balance in the region." />
                      <outline text="The principal contractors involved in this program are: Lockheed Martin Corporation, San Diego, California; Thales Raytheon Systems, Fullerton, California; Boeing Company and American General, Letterkenny Army Depot, Chambersburg, Pennsylvania; Raytheon Integrated Defense Systems, Andover, Massachusetts; Northrop Grumman, Rolling Meadows, Illinois; and Kratos Defense and Aerospace, Huntsville, Alabama. There are no known offset agreements proposed in connection with this potential sale." />
                      <outline text="Implementation of this proposed sale will require 20-25 U.S. Government or contractor representatives to travel to Iraq for a period of 8-10 weeks for equipment checkout and training." />
                      <outline text="There will be no adverse impact on U.S. defense readiness as a result of this proposed sale." />
                      <outline text="[FR Doc. 2013-19986 Filed 8-15-13; 8:45 am]" />
                      <outline text="BILLING CODE 5001-06-P" />
              </outline>

              <outline text="Probably saw something it shouldn&apos;t have: NASA halts efforts to repair Kepler space telescope">
                      <outline text="Link to Article" type="link" url="http://www.engadget.com/2013/08/15/nasa-halts-efforts-to-repair-damaged-kepler/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376669514_fh6JYShZ.html" />
        <outline text="Source: Engadget RSS Feed" type="link" url="http://www.engadget.com/rss.xml" />
      <outline text="Fri, 16 Aug 2013 16:11" />
                      <outline text="" />
                      <outline text="NASA Ends Attempts to Fully Recover Kepler Spacecraft, Potential New Missions Considered" />
                      <outline text="Following months of analysis and testing, the Kepler Space Telescope team is ending its attempts to restore the spacecraft to full working order, and now is considering what new science research it can carry out in its current condition." />
                      <outline text="Two of Kepler&apos;s four gyroscope-like reaction wheels, which are used to precisely point the spacecraft, have failed. The first was lost in July 2012, and the second in May. Engineers&apos; efforts to restore at least one of the wheels have been unsuccessful." />
                      <outline text="Kepler completed its prime mission in November 2012 and began its four-year extended mission at that time. However, the spacecraft needs three functioning wheels to continue its search for Earth-sized exoplanets, which are planets outside our solar system, orbiting stars like our sun in what&apos;s known as the habitable zone -- the range of distances from a star where the surface temperature of a planet might be suitable for liquid water. As scientists analyze previously collected data, the Kepler team also is looking into whether the space telescope can conduct a different type of science program, including an exoplanet search, using the remaining two good reaction wheels and thrusters." />
                      <outline text="&quot;Kepler has made extraordinary discoveries in finding exoplanets including several super-Earths in the habitable zone,&quot; said John Grunsfeld, associate administrator for NASA&apos;s Science Mission Directorate in Washington. &quot;Knowing that Kepler has successfully collected all the data from its prime mission, I am confident that more amazing discoveries are on the horizon.&quot;" />
                      <outline text="On Aug. 8, engineers conducted a system-level performance test to evaluate Kepler&apos;s current capabilities. They determined wheel 2, which failed last year, can no longer provide the precision pointing necessary for science data collection. The spacecraft was returned to its point rest state, which is a stable configuration where Kepler uses thrusters to control its pointing with minimal fuel use." />
                      <outline text="&quot;At the beginning of our mission, no one knew if Earth-size planets were abundant in the galaxy. If they were rare, we might be alone,&quot; said William Borucki, Kepler science principal investigator at NASA&apos;s Ames Research Center in Moffett Field, Calif. &quot;Now at the completion of Kepler observations, the data holds the answer to the question that inspired the mission: Are Earths in the habitable zone of stars like our sun common or rare?" />
                      <outline text="An engineering study will be conducted on the modifications required to manage science operations with the spacecraft using a combination of its remaining two good reaction wheels and thrusters for spacecraft attitude control." />
                      <outline text="Informed by contributions from the broader science community in response to the call for scientific white papers announced Aug. 2, the Kepler project team will perform a study to identify possible science opportunities for a two-wheel Kepler mission." />
                      <outline text="Depending on the outcome of these studies, which are expected to be completed later this year, NASA will assess the scientific priority of a two-wheel Kepler mission. Such an assessment may include prioritization relative to other NASA astrophysics missions competing for operational funding at the NASA Senior Review board early next year." />
                      <outline text="From the data collected in the first half of its mission, Kepler has confirmed 135 exoplanets and identified over 3,500 candidates. The team continues to analyze all four years of collected data, expecting hundreds, if not thousands, of new discoveries including the long-awaited Earth-size planets in the habitable zone of sun-like stars. Though the spacecraft will no longer operate with its unparalleled precision pointing, scientists expect Kepler&apos;s most interesting discoveries are still to come." />
                      <outline text="Meanwhile, preparations are underway for hosting the second Kepler Science Conference Nov. 4-8, at NASA&apos;s Ames Research Center. This will be an opportunity to share not only the investigations of the Kepler project team, but also those of the wider science community using publicly accessible data from Kepler." />
              </outline>

              <outline text="The Bell Tolls">
                      <outline text="Link to Article" type="link" url="http://www.geezersisters.com/humor/the-bell-tolls" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376669280_eH3Xu9S3.html" />
        <outline text="Source: The Fabulous Geezersisters’ Weblog" type="link" url="http://feeds.feedblitz.com/thefabulousgeezersistersweblog&amp;x=1" />
      <outline text="Fri, 16 Aug 2013 16:07" />
                      <outline text="" />
                      <outline text="Years ago, our phone died. It was a catastrophe." />
                      <outline text="Well, it wasn&apos;t dead, exactly &apos;-- it just didn&apos;t ring. So, we could make calls, but we couldn&apos;t receive them. The phone stayed stubbornly, maddeningly silent even when calls came in." />
                      <outline text="Important calls! Critical calls! Life-changing, career-altering calls! Our lives were being ruined!" />
                      <outline text="The telephone repair guy couldn&apos;t show up for another couple of days, and it was driving us crazy. My husband took to yanking the phone off the hook and answering it at random, ring-free times. Just in case." />
                      <outline text="&apos;&apos;Hello!&apos;&apos; he kept saying. &apos;&apos;Hello!?&apos;&apos;" />
                      <outline text="Nobody was ever there, of course. He was speaking into some kind of existential void. It was enough to make nihilists out of both of us." />
                      <outline text="This had to have been before we got an answering machine. Yes! We were pioneers. We lived &apos;-- or tried to &apos;-- in the grim and hardscrabble days before answering machines and voice mail and everything that makes life worth living. Even when the phone rang correctly, you were always sure you&apos;d just missed a very important phone call that would never come again. If only you&apos;d been there earlier!" />
                      <outline text="Eventually, our phone got fixed and our lives were salvaged. The phone rang or it didn&apos;t ring, but at least it worked." />
                      <outline text="I think about this brouhaha in our earlier lives because everything has changed so completely. We now hate what we&apos;ve learned to call our land line. It rings and we glare at it." />
                      <outline text="These days, I would never, ever answer said land line without first checking the caller i.d. The few times the phone rings, it&apos;s almost always some anonymous number from another zip code, from one charity or another. If it&apos;s important, we figure, the caller will leave a voice mail. It&apos;s almost never important." />
                      <outline text="So &apos;-- why keep a land line? We both have cell phones and email addresses that are used more frequently and are easily accessible. We don&apos;t really need our land line. I know that &apos;-- but I can&apos;t quite cut the cord, even if the damned thing is cordless." />
                      <outline text="I guess it&apos;s some ridiculous clinging to the past on my part (as my husband very unhelpfully likes to point out). Once, I would have broken my neck to get to a ringing phone; once, its failure to ring was a disaster; once, this device was our lifeline." />
                      <outline text="Sure, the &apos;&apos;once&apos;&apos; I&apos;m talking about was 30 years ago &apos;-- but that&apos;s not exactly a century, is it? And 30 years isn&apos;t as long as it used to be, I am discovering." />
                      <outline text="Thirty years ago. That&apos;s about the same time my husband and I used to talk about our tiny stock portfolio. At least we had the AT&amp;T stock from his grandmother, my husband used to say. We&apos;d never sell it, of course. AT&amp;T was one of those timeless investments." />
                      <outline text="It was also around the time when my husband worked one summer as a postman. It was only a summer job during college and he didn&apos;t want to spend his life delivering mail &apos;-- but, hey. Wasn&apos;t it nice to know the postal service would always be there if everything else failed?" />
                      <outline text="The land line rings again and again this morning. An anonymous call, then another call and a voice mail. It&apos;s from my dentist&apos;s office, where I&apos;m supposed to show up tomorrow." />
                      <outline text="I mark down the appointment and think about attrition and the passage of time. Maybe the three of us &apos;-- me, my teeth, and my land line &apos;-- should just stick together. At the rate we&apos;re all becoming obsolete, the existential void must be getting pretty crowded these days." />
                      <outline text="(Copyright 2013 by Ruth Pennebaker)" />
                      <outline text="Read all about Brazilians" />
                      <outline text=" " />
                      <outline text="Tagged as: aging, high tech. telephone, humor, land line, phone, technology, time" />
              </outline>

              <outline text="VIDEO-BBC News - Clinton: &apos;I don&apos;t know&apos; about 2016 presidential race">
                      <outline text="Link to Article" type="link" url="http://www.bbc.co.uk/news/world-africa-23665552" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376668374_N6xpftUS.html" />
      <outline text="Fri, 16 Aug 2013 15:52" />
                      <outline text="" />
                      <outline text="This page is best viewed in an up-to-date web browser with style sheets (CSS) enabled. While you will be able to view the content of this page in your current browser, you will not be able to get the full visual experience. Please consider upgrading your browser software or enabling style sheets (CSS) if you are able to do so." />
              </outline>

              <outline text="NSA report on privacy violations in the first quarter of 2012 - The Washington Post">
                      <outline text="Link to Article" type="link" url="http://apps.washingtonpost.com/g/page/national/nsa-report-on-privacy-violations-in-the-first-quarter-of-2012/395/?hpid=z1" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376667535_TZR9yCwV.html" />
      <outline text="Fri, 16 Aug 2013 15:38" />
                      <outline text="" />
                      <outline text="This is the full executive summary, with names redacted by The Post, of a classified internal report on breaches of NSA privacy rules and legal restrictions." />
                      <outline text="The report covers the period from January through March 2012 and includes comparative data for the full preceding year. Its author is director of oversight and compliance for the NSA&apos;s Signals Intelligence Directorate, but the scope of the report is narrower. Incidents are counted only if they took place within &apos;&apos;NSA-Washington,&apos;&apos; a term encompassing the Ft. Meade headquarters and nearby facilities. The NSA declined to provide comparable figures for its operations as a whole. A senior intelligence official said only that if all offices and directorates were included, the number of violations would &apos;&apos;not double.&apos;&apos;" />
                      <outline text="&gt;&gt; NSA broke privacy rules thousands of times per year, audit finds" />
                      <outline text="Click to see the related section of the document." />
                      <outline text="{{ title }}{{{ text }}}" />
                      <outline text="]]&gt; GRAPHIC: Barton Gellman and Matt DeLong - The Washington Post. Published Aug. 15, 2013." />
              </outline>

              <outline text="America the Omnipotent | Ibishblog">
                      <outline text="Link to Article" type="link" url="http://ibishblog.com/2013/08/13/america-the-omnipotent/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376667115_AhQyCCjX.html" />
      <outline text="Fri, 16 Aug 2013 15:31" />
                      <outline text="" />
                      <outline text="[NOTE: a shorter version of this commentary was published in The National on August 11, 2013]" />
                      <outline text="Anti-Americanism isn&apos;t just a ubiquitous feature of contemporary Arab political culture. It arises from a deeper, more insidious and ingrained concept: the myth of American omnipotence. Thus the will of the United States becomes the default explanation for everything that happens in the Middle East, particularly when people don&apos;t like it." />
                      <outline text="Anti-Americanism follows the same logical distortions, but applied in reverse, of the other great omnipotent power: God. Among the devout, God gets all the credit for everything good that happens, but none of the blame. If large numbers of children are fortuitously saved from disaster, God saved them. If they tragically die, no one ever applies the inescapable logical inverse: God killed them. God is omnipotent and omniscient, but is utterly exempted from blame for from anything the faithful find bad, and only gets credit for the good." />
                      <outline text="America the omnipotent occupies the opposite position in the moral economy of contemporary Arab political thought: it&apos;s always blamed for whatever people don&apos;t like, but never gets the credit for anything perceived as good." />
                      <outline text="Recent events in Egypt are only the most striking and current demonstrations of this very long-standing pattern." />
                      <outline text="Supporters of former Egyptian President Mohammad Morsi are convinced the United States was directly responsible for his ouster. His opponents, perhaps even more ferociously, believe the Americans put him in power and wanted to keep him there. The most bizarre theories, from both sides, about various supposed conspiracies hatched by US Ambassador Anne Patterson abound in the Egyptian media. The only thing Egyptians now agree on is whatever it is they don&apos;t like, it must be the fault of the United States." />
                      <outline text="The same applies in Syria." />
                      <outline text="Last year I was on an Arabic TV debate with three Syrians. The first, a Salafist, said the Americans wanted to keep President Bashar al-Assad in power at the behest of Israel, because they feared the &apos;&apos;Islamic Awakening.&apos;&apos; The second, a nationalist, insisted that the US indeed wanted Assad to stay in power, because he had cooperative relations with Israel. The third, a regime stooge, insisted on an American plot to overthrow Assad because he was the leader of &apos;&apos;resistance&apos;&apos; against Israel." />
                      <outline text="But how did the United States become this &apos;&apos;great Satan,&apos;&apos; for which all bad things can be, and are, blamed by all Arab sides, all the time?" />
                      <outline text="The problem is clearly overdetermined. Like western Islamophobia, it feeds on centuries of ancient rivalry between Dar al Islam and Christendom. Arabs feel, and for good reason, mistreated by the colonial West. Decades of nationalistic, religious, xenophobic and chauvinistic propaganda entrenched anti-American narratives in 20th-century Arab political culture. And since the 1950s the United States has been the primary regional power in the Middle East and acted like it, with all the local resentment that naturally entails." />
                      <outline text="But the underlying, latent theme actually seems to be a profound sense of unrequited love. Why is America so inexplicably biased towards Israel? Why are their policies always so unfair? Since American is omnipotent, and bad things keep happening, why does the US do them?" />
                      <outline text="Yet while Arabs rail against the United States, they love its culture and products. They fight for visas, and to send their children to American universities. Even Islamists like Morsi studied and taught in California." />
                      <outline text="Arab sensibilities about international relations are defined by a profound sense of disempowerment, especially as contrasted with an illusion of American omnipotence. These fantasies feed each other in a neurotic vicious circle." />
                      <outline text="Even as American influence around the world is palpably waning, absurdities &apos;-- such as the idea that the recent abdication of the Emir of Qatar was, for some reason, &apos;&apos;ordered&apos;&apos; by Washington &apos;-- are a commonplace." />
                      <outline text="How radically different things look from DC, where a new and uncharacteristic sense of helplessness has taken root in the aftermath of the Iraq fiasco, the Afghan failure and the fiscal calamity." />
                      <outline text="Washington looks at Syria and most incorrectly conclude there are no effective or useful policy options. The United States thinks that it has virtually no influence in Egypt, even less than it really might. Even in its most familiar territory, the Israeli-Palestinian peace process, American policymakers are not coy about saying they feel at the mercy of the domestic politics and policy caprices of Tel Aviv and Ramallah." />
                      <outline text="The new American feeling of impotence, or at least risk-aversion, is as exaggerated as Arab delusions about American omnipotence. There is much the United States can do to help its friends in the Arab world, if only it would. But there is a persistent, crippling reticence to support those who share American goals or values, particularly if they are not fully trusted by Israel." />
                      <outline text="Arab anti-Americanism rests on two pillars: disillusionment and perceived betrayal by an ideal, combined with a wild overestimation of American power. Arabs therefore oscillate between yearning for American leadership and resenting its clout." />
                      <outline text="Contrast the ubiquitous, and normatively negative, Arab sentiments towards the United States with an almost total disinterest in the role of Russia. Yet if there is an external power up to no good in the Middle East, it is Russia. Its wholehearted support for the Syrian dictatorship helped kill at least 100,000 people in the past two years." />
                      <outline text="But there is no unrequited love affair with Russia. No sense of betrayal. No feeling of an abandoned ideal or love-hate neurosis. That Russia does what&apos;s in its interests is simply accepted with a shrug. The dearth of conspiracy theories about the Kremlin&apos;s machinations &apos;-- especially compared to the plethora of bizarre fantasies attributed to the White House &apos;-- reveals Arab anti-Americanism to be a collective neurotic symptom, fundamentally disconnected from reality." />
                      <outline text="Of course anti-Americanism is consciously and cynically abused in much Arab political rhetoric. It&apos;s too easy a tool of manipulation for unscrupulous demagogues to pass up. And it works, all too often and all too well. Indeed, it&apos;s so pervasive and visceral that it most closely resembles the rage of a jilted lover." />
                      <outline text="." />
              </outline>

              <outline text="Fortune Tech: Technology blogs, news and analysis from Fortune Magazine">
                      <outline text="Link to Article" type="link" url="http://tech.fortune.cnn.com/2012/07/30/google-and-facebooks-new-tactic-in-the-tech-wars/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376666876_TJ5JJSY6.html" />
      <outline text="Fri, 16 Aug 2013 15:27" />
                      <outline text="" />
                      <outline text="By Roger Parloff, senior editor" />
                      <outline text="FORTUNE -- If the Electronic Frontier Foundation, the nation&apos;s preeminent digital rights nonprofit, had disclosed last year that it received a cool $1 million gift from Google -- about 17% of its total revenue -- some eyebrows might have been raised. The group typically describes itself as &quot;member-supported&quot; and, like most nonprofits, it treasures its above-the-commercial-fray, public-interest-group aura and reputation for independence." />
                      <outline text="In fact, Google (GOOG) did transfer $1 million to the EFF last year, but the money did not have to be, and wasn&apos;t, reported as a corporate donation. And if, as currently planned, the EFF receives another $1 million this year from Facebook (FB), it won&apos;t have to report that as a donation either. That&apos;s because both transfers are formally court-ordered outlays being paid by those companies to settle class-action suits." />
                      <outline text="&quot;Well, of course those aren&apos;t donations!&quot; the reader might interject. &quot;They&apos;re the diametric opposite: involuntary, judicially mandated payments forced upon them by an adversary!&quot; That&apos;s not the whole story either. These payments to the EFF are being made in suits the EFF played no role in bringing, and the defendants themselves -- Google and Facebook, in these instances -- helped select EFF to be their beneficiary." />
                      <outline text="These weird, hybridized outlays -- part punitive fine, part voluntary donation -- are called cy pres awards, meaning &quot;as close as possible&quot; (from the old Norman, cy pres comme possible). The theory behind them goes like this: In settling, the plaintiffs lawyers and the defendants agreed that awarding damages to actual class members would be impractical, because the sums owed each would be so tiny as to not warrant the expense of distribution. Accordingly, the parties agreed to pay the class nothing, but to pay a sum instead to charities that would serve as the next best thing, because the charities would theoretically promote the interests of class members in some indirect fashion pertinent to the lawsuit." />
                      <outline text="MORE: Megaupload and the twilight of copyright" />
                      <outline text="These two awards to the EFF, for instance, stem from suits that alleged that Google and Facebook each violated their customers&apos; privacy rights -- in Google&apos;s case, by exposing users&apos; email contacts during its botched launch of its Google Buzz social network in February 2010 and, in Facebook&apos;s, by exploiting users&apos; (including minors&apos;) identities and likenesses without express permission in its so-called &quot;Sponsored Stories&quot; ads in January 2011. In these two cases 21 other nonprofits also received, or stand to receive, money, though the EFF would be the biggest winner, taking in about 12% of the total $16.1 million doled out. (While the Google Buzz settlement was approved in May 2011, the Sponsored Stories settlement was just proposed in June, and is still being challenged by dissenters.)" />
                      <outline text="Giving cy pres money to the EFF makes sense, the parties in each case have argued, because digital privacy issues are one of the subjects the EFF monitors. It has not infrequently scolded (though never sued) Google and Facebook for privacy glitches and intrusions, and has advocated privacy legislation and policies that those companies oppose." />
                      <outline text="At the same time, the EFF is often an ally of Google and Facebook when it comes to staving off liability to rights holders over user-generated infringing content, like pirated movies, photos, or music. Perhaps for these reasons, for instance, Google gave EFF about $25,000 in conventional, purely voluntary donations in 2010, and about $18,000 more in 2011." />
                      <outline text="In fact, at least half of the cy pres recipients in these cases would very likely be getting at least some donations from Google or Facebook this year, whether or not any suit had ever been lodged against them.  For instance, the Center for Democracy and Technology (CDT), which got $500,000 from the Google Buzz cy pres award in 2011, received $340,000 in voluntary contributions from Google the year before. It&apos;s now slated to receive $1 million from the proposed Facebook award, though Facebook has been listed as one of CDT&apos;s leading e-commerce benefactors since at least 2009. Similarly, the Center for Internet and Society at Stanford (CIS), which received $500,000 from the Google Buzz award, had collected $400,000 in voluntary contributions from Google the year before (which amounted to 51% of CIS&apos;s total revenue that year). This year CIS will collect $600,000 from Facebook&apos;s Sponsored Stories settlement, if approved." />
                      <outline text="MORE: One filmmaker&apos;s fight against the cyberlockers" />
                      <outline text="The EFF, CDT, and Stanford&apos;s CIS all reliably line up on the tech sector side in scrimmages with copyright holders. All three supported, for instance, the January Internet blackout protest against the Stop Online Piracy Act -- legislation opposed by both Google and Facebook. EFF and CDT also each submitted amicus briefs supporting Google in its two most important recent litigations: Viacom&apos;s suit against Google&apos;s YouTube unit for copyright infringement, and a suit by Rosetta Stone, the language course company, challenging Google&apos;s practices of auctioning off other companies&apos; trademarks for use as paid-search keywords and allowing them to be used in ad text as well." />
                      <outline text="Now if some neutral individual had been tasked with awarding money to a charity that was single mindedly devoted to fighting precisely the sorts of wrongs alleged in the Google Buzz and Sponsored Stories class actions, his first choice would probably have been one that the settling parties in each case passed over entirely: the Electronic Privacy Information Center (EPIC)." />
                      <outline text="Unlike any of the 22 cy pres recipients jointly proposed by the parties in the two cases, EPIC actually filed complaints against Google and Facebook with the U.S. Federal Trade Commission over the Google Buzz launch and Facebook&apos;s use of members&apos; identities and likenesses in ad campaigns without permission. Prompted by EPIC&apos;s complaints, the FTC brought enforcement actions against each company which culminated in consent decrees." />
                      <outline text="How, then, could the parties -- again and again -- have overlooked EPIC when doling out the cash? How, indeed, when so many of the groups that the parties did select&apos;--like the YMCA of Greater Long Beach, Youth Radio of Oakland, the Brookings Institute (a regular Google beneficiary), and the MacArthur Foundation (a regular Facebook beneficiary) -- are hardly thought of as digital privacy watchdogs?" />
                      <outline text="MORE: The quiet scandal of the HIV home test kit" />
                      <outline text="Could it be that the defendants in each case blackballed EPIC precisely because it was too aggressively devoted to combatting the wrongs that allegedly harmed the class? Lead Google Buzz plaintiffs attorney Gary Mason declined to comment, explaining that settlement negotiations are confidential. Two lead plaintiffs attorneys in the Sponsored Stories case did not return calls." />
                      <outline text="In the Google Buzz case in March 2011, EPIC and seven other privacy-focused nonprofits objected to their exclusion from the cy pres funds, protesting that the plaintiffs lawyers and Google had, in effect, arranged to give the majority of those funds &quot;to organizations that are currently paid by Google to lobby for or to consult for the company.&quot; (The EFF, CDT, and CIS all reject that characterization of their relationship to Google. They aver, rather, their complete independence, and stress that any corporate donations they accept are &quot;unrestricted&quot; in nature&apos;--meaning that they come with no strings attached.)" />
                      <outline text="In May 2011, Chief Judge James Ware of the federal district court in San Jose granted EPIC&apos;s request, carving out a $500,000 tranche for it. (At the same time he spontaneously&apos;--without prompting from anyone&apos;--sliced off another $500,000 piece for an ethics center at Santa Clara University, a school where Judge Ware serves on the law school faculty.)" />
                      <outline text="Tech companies did not invent cy pres awards. The doctrine is ancient, having arisen to address a recurring problem in trusts law. For instance, when President Franklin D. Roosevelt set up the March of Dimes Foundation in 1938, he specified that it would fight polio. But once that disease was tamed, the foundation sought permission to fight other diseases. Invoking the cy pres doctrine, courts granted its request, finding that doing so would carry out Roosevelt&apos;s original intent as closely as possible." />
                      <outline text="MORE: The constitutional right to a free lunch" />
                      <outline text="In the 1980s the cy pres doctrine&apos;--&quot;or rather something parading in its name,&quot; as federal appeals court judge Richard Posner archly put it in a 2004 ruling&apos;--burrowed its way into the realm of class-action settlements. Critics have referred to cy pres awards as judicial &quot;slush funds,&quot; since judges, plaintiffs lawyers, and&apos;--as the Google Buzz and Sponsored Stories cases suggest&apos;--even defendants can use them to further their own agendas. In the past ten months three federal appeals courts have struck down cy pres awards after concluding that they funded charities that had virtually nothing to do with the class members for whom the cases were ostensibly filed." />
                      <outline text="The key recurring concern with any class action settlement is that plaintiffs attorneys, desiring to maximize their fees, and defendant corporations, eager to minimize total payout, will collude to achieve their goals at the expense of class members. Cy pres awards can be enlisted in that abusive process, attorney Theodore H. Frank of the Center for Class Action Fairness, has written, by &quot;disguising the true cost of a settlement to the defendant to maximize the share of the actual recovery received by the plaintiffs attorneys.&quot;" />
                      <outline text="For instance, in the Google Buzz case, on the face of things the plaintiffs attorneys were receiving about one-quarter of the total award -- $2.1 million of an $8.1 million fund -- which sounds well within the normal range. Yet a critic might protest that none of this particular award went to the actual class members, while much of it went to charities the defendant probably would have funded to some degree anyway. If so, then the attorneys fees may have been excessive given how little the lawyers actually won for the class." />
                      <outline text="In the Facebook class action, the potential for fee inflation is even more palpable. If the deal is approved, the plaintiffs attorneys get $10 million, the nonprofits get $10 million, and the class members get zilch, which does not look great even on its face. To the extent that some of the nonprofits are also regular beneficiaries of Facebook&apos;s largesse, and would likely have gotten at least some of their cy pres money even without any lawsuit, the attorneys would be getting more than half the cash generated by the settlement, which looks even worse." />
                      <outline text="MORE: In defense of John Roberts" />
                      <outline text="In court papers supporting the deal, the plaintiffs stress that the Facebook settlement also includes injunctive relief from which class members may benefit in the future, because Facebook has agreed to fiddle with some of the fine print in its terms-of-service agreements and to give its users opportunities to &quot;opt-out&quot; of the Sponsored Stories program. The plaintiffs then claim that these structural changes are effectively worth --are you sitting down? -- $103 million to the class, because class members will &quot;now have the opportunity to control the use of what is essentially a [redacted]/month advertising asset.&quot; (The redacted figure remains under seal.)" />
                      <outline text="In July, EPIC and attorneys representing other objecting class members each challenged the adequacy of the Facebook settlement. Alternatively, EPIC and three other privacy groups have asked the court to redetermine cy pres recipients using transparent, open-application procedures. These objections have not yet been ruled upon, in part because, as soon as they were lodged, U.S. District Judge Lucy Koh recused herself from the case. Though she did not state her reasons, she and her husband had ties to some of the charities that stood to gain from the settlement, according to published reports" />
                      <outline text="Since other cy pres awards have been upheld despite similar or worse apparent conflicts, Judge Koh&apos;s sensitivity was at least progress of a sort." />
              </outline>

              <outline text="English version: The Price of Hypocrisy - Evgeny Morozov on Information Consumerism - &apos;berwachung - FAZ">
                      <outline text="Link to Article" type="link" url="http://www.faz.net/aktuell/feuilleton/debatten/ueberwachung/information-consumerism-the-price-of-hypocrisy-12292374.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376662945_7gdATHGY.html" />
      <outline text="Fri, 16 Aug 2013 14:22" />
                      <outline text="" />
                      <outline text="(C) Hackerphotos.com / Win McNameeDr. Jekyll and Mister Hyde? The military and the IT sphere already affiliated, as you may see in the person of one of the most powerful men of the world: Keith Alexander, Director of the NSA, recruiting hackers at Defcon 2012, wearing a t-shirt of the civil rights organisation &apos;&#158;Electronic Frontier Foundation&apos;&apos;; in service uniform on the rightThe problem with the sick, obsessive superpower revealed to us by Edward Snowden is that it cannot bring itself to utter the one line it absolutely must utter before it can move on: &apos;&apos;My name is America and I&apos;m a dataholic.&apos;&apos; For American spies, Big Data is like crack cocaine: just a few doses &apos;&apos; and you can forget about mending your way and kicking the habit. Yes, there&apos;s an initial illusion of grandeur and narcissistic omnipotence &apos;&apos; just look at us, we could prevent another 9/11! &apos;&apos; but a clearer, unmediated brain would surely notice that one&apos;s judgment has been severely impaired. Prevent another 9/11? When two kids with extensive presence on social media can blow up a marathon in Boston? Really? All this data, all this sacrifice&apos;&apos; and for what?" />
                      <outline text="So let us not pass over America&apos;s surveillance addiction in silence. It is real; it has consequences; and the world would do itself a service by sending America to a Big Data rehab. But there&apos;s more to learn from the Snowden affair. It has also busted a number of myths that are only peripherally related to surveillance: myths about the supposed benefits of decentralized and commercially-operated digital infrastructure, about the current state of technologically-mediated geopolitics, about the existence of a separate realm known as &apos;&apos;cyberspace.&apos;&apos; We must take stock of where we are and reflect on where we soon will be, especially if we fail to confront &apos;&apos; legally but, even more importantly, intellectually &apos;&apos; the many temptations of information consumerism." />
                      <outline text="Why surrender control over electronic communications?First of all, many Europeans are finally grasping, to their great dismay, that the word &apos;&apos;cloud&apos;&apos; in &apos;&apos;cloud computing&apos;&apos; is just a euphemism for &apos;&apos;some dark bunker in Idaho or Utah.&apos;&apos; Borges, had he lived long enough, would certainly choose a server rack &apos;&apos; not a library &apos;&apos; as the primary site for his surreal stories. A database larger than the world it is meant to represent: a Borges short story or a slide from an NSA PowerPoint? One can&apos;t say for sure." />
                      <outline text="Second, ideas that once looked silly suddenly look wise. Just a few months ago, it was customary to make fun of Iranians, Russians and Chinese who, with their automatic distrust of all things American, spoke the bizarre language of &apos;&apos;information sovereignty.&apos;&apos; What, the Iranians want to build their own national email system to lessen their dependence on Silicon Valley? That prospect seemed both futile and wrong-headed to many Europeans: what a silly waste of resources! How could it possibly compete with Gmail, with its trendy video chats and slick design? Haven&apos;t Europeans tried &apos;&apos; and failed &apos;&apos; to launch their own search engine? Building airplanes that can compete with Boeing is one thing &apos;&apos; but an email system? Now, that&apos;s something Europe &apos;&apos; let alone Iran! &apos;&apos; would never be able to pull off." />
                      <outline text="Look who&apos;s laughing now: Iran&apos;s national email system launched a few weeks ago. Granted the Iranians want their own national email system, in part, so that they can shut it down during protests and spy on their own people AT other times. Still, they got the geopolitics exactly right: over-reliance on foreign communications infrastructure is no way to boost one&apos;s sovereignty. If you wouldn&apos;t want another nation to run your postal system, why surrender control over electronic communications?" />
                      <outline text="The public-private partnership of American infrastructureThird, the sense of unconditional victory that civil society in both Europe and America felt over the defeat of the Total Information Awareness program &apos;&apos; a much earlier effort to establish comprehensive surveillance &apos;&apos; was premature. The problem with Total Information Awareness was that it was too big, too flashy, too dependent on government bureaucracy. What we got instead, a decade later, is a much nimbler, leaner, more decentralized system, run by the private sector and enabled by a social contract between Silicon Valley and Washington: while Silicon Valley runs, updates and monetizes the digital infrastructure, the NSA can tap IT on demand. Everyone specializes and everyone wins." />
                      <outline text="This is today&apos;s America in full splendor: what cannot be accomplished through controversial legislation will be accomplished through privatization, only with far less oversight and public control. From privately-run healthcare providers to privately-run prisons to privately-run militias dispatched to war zones, this is the public-private partnership model on which much of American infrastructure operates these days. Communications is no exception. Decentralization is liberating only if there&apos;s no powerful actor that can rip off the benefits after the network has been put in place. If such an actor exists &apos;&apos; like NSA in this case &apos;&apos; decentralization is a mere shibboleth. Those in power get more of what they want quicker &apos;&apos; and pay less for the privilege." />
                      <outline text="A noble mission and awful trip-planning skillsFourth, the idea that digitization has ushered in a new world, where the good old rules of realpolitik no longer apply, has proved to be bunk. There&apos;s no separate realm that gives rise to a new brand of &apos;&apos;digital&apos;&apos; power; it&apos;s one world, one power, with America at the helm. Google&apos;s CEO Eric Schmidt and Jared Cohen, a former senior official at the State Department who went to work for Google, had the misfortune to publish a book that assured us that this was no longer the case &apos;&apos; &apos;&apos;The New Digital Age&apos;&apos; &apos;&apos; just a few months before the Snowden revelations. Rare is a book that ages so quickly. Look no further than &apos;&apos;Internet asylum seekers&apos;&apos; in its index. &apos;&apos;A dissident who can&apos;t live freely under an autocratic Internet and is refused access to other states&apos; Internets will choose to seek physical asylum in another country to gain virtual freedom on its Internet,&apos;&apos; they claim. &apos;&apos;Being granted virtual asylum could be a significant first step toward physical asylum, a sign of trust without the full commitment.&apos;&apos;" />
                      <outline text="The sheer naivete of statements like this &apos;&apos; predicated on the assumption that somehow one can &apos;&apos;live&apos;&apos; online the way one lives in the physical world and that virtual politics works on a logic different from regular politics &apos;&apos; is illustrated by the sad case of Edward Snowden, a man with a noble mission and awful trip-planning skills. If it&apos;s &apos;&apos;virtual asylum&apos;&apos; that Snowden is after, he can get his dose of &apos;&apos;virtual freedom&apos;&apos; in Sheremetyevo airport in Moscow. Somehow &apos;&apos; silly him? &apos;&apos; &apos;&apos;virtual freedom&apos;&apos; doesn&apos;t seem to be enough and it hasn&apos;t occurred to him &apos;&apos; perhaps, he has not read the book yet? &apos;&apos; to seek &apos;&apos;virtual asylum.&apos;&apos; Bolivia&apos;s Evo Morales, stranded in Austria on suspicion that his plane had been carrying Snowden, would have had a good laugh had he stumbled upon &apos;&apos;The New Digital Age&apos;&apos; in a Vienna airport bookstore. Perhaps, had Morales only tweeted harder, none of this would have happened." />
                      <outline text="Security and privacy on the level of the telephone networkFifth, the once powerful myth that there exists a separate, virtual space where one can have more privacy and independence from social and political institutions is dead. To see why, look no further than the Microsoft memo issued after The Guardian had reported that NSA may have been tapping Skype chats and video calls (Skype is now owned by Microsoft). Buried in Microsoft&apos;s non-denial is a very peculiar line. Justifying the need to make its digital products compatible with the needs of security agencies, Microsoft&apos;s general counsel wrote that &apos;&apos;looking forward, as Internet-based voice and video communications increase, it is clear that governments will have an interest in using (or establishing) legal powers to secure access to this kind of content to investigate crimes or tackle terrorism. We therefore assume that all calls, whether over the Internet or by fixed line or mobile phone, will offer similar levels of privacy and security.&apos;&apos; Read this again: here&apos;s a senior Microsoft executive arguing that making new forms of communication less secure is inevitable &apos;&apos; and probably a good thing." />
                      <outline text="For most of the 1990s, everyone thought that digitization would usher in the so-called &apos;&apos;convergence&apos;&apos;: undoubtedly, a good thing as far as security was concerned. Thus, the reasoning went, as they move to one single network, old forms of communication &apos;&apos; the good-old telephone and the like &apos;&apos; would eventually become as secure as encrypted email. But we have actually moved in the opposite direction. What we have now is one single network &apos;&apos; that much we got right &apos;&apos; but the one where security and privacy have returned to the level of the telephone network. It&apos;s the telephone &apos;&apos; not encrypted email &apos;&apos; that is our common denominator at least when it comes to wiretapping potential. Convergence did happen &apos;&apos; we weren&apos;t fooled! &apos;&apos; but, miraculously, technologies converged on the least secure and most wiretap-friendly option available." />
                      <outline text="The users in authoritarian states will suffer the mostThis has disastrous implications for anyone living in dictatorships. Once Microsoft and its peers start building software that is insecure by design, it turbocharges the already comprehensive spying schemes of authoritarian governments. What neither NSA nor elected officials seem to grasp is that, on matters of digital infrastructure, domestic policy is also foreign policy; it&apos;s futile to address them in isolation. So, we want to catch all the terrorists before they are born? Fine, Big Data &apos;&apos; and big bugs in our software and hardware &apos;&apos; are here to help. But, lest we forget, they would also help the governments of China and Iran to predict and catch future dissidents. We can&apos;t be building insecure communication infrastructure and expect that only Western governments would profit from it." />
                      <outline text="This brings us to the most problematic consequence of Snowden&apos;s revelations. As bad as the situation is for Europeans, it&apos;s the users in authoritarian states who will suffer the most. And not from American surveillance, but from domestic censorship. How so? The already mentioned push towards &apos;&apos;information sovereignty&apos;&apos; by Russia, China or Iran would involve much more than protecting their citizens from American surveillance. It would also trigger an aggressive push to shift public communication among these citizens &apos;&apos; which, to a large extent, still happens on Facebook and Twitter &apos;&apos; to domestic equivalents of such services." />
                      <outline text="Instead of blaming Snowden, Washington must thank himAuthoritarian governments have good reasons to fear Twitter and Facebook, over which they exercise far less control. It&apos;s probably not a coincidence that LiveJournal, Russia&apos;s favorite platform, suddenly had maintenance issues &apos;&apos; and was thus unavailable for general use &apos;&apos; at the very same time that a Russian court announced its verdict to the popular blogger-activist Alexei Navalny. For all the concerns about Americanization and surveillance, US-based services like Facebook or Twitter still offer better protection for freedom of expression than their Russian, Chinese or Iranian counterparts. The latter censor more and, as the LiveJournal example shows &apos;&apos; LiveJournal belongs to a Russian oligarch &apos;&apos; they can go offline at politically convenient times. If, as a political dissident, you had to choose between organizing your protest on Facebook or Vkontakte, Facebook&apos;s Russian equivalent, you&apos;d be far better off doing it on Facebook. Governments of less democratic regimes will surely explore the anti-US populism generated by Snowden revelations to leave protesters just one &apos;&apos; domestic &apos;&apos; option." />
                      <outline text="This is the real tragedy of America&apos;s &apos;&apos;Internet freedom agenda&apos;&apos;: it&apos;s going to be the dissidents in China and Iran who will pay for the hypocrisy that drove it from the very beginning. America has managed to advance its communications-related interests by claiming high moral ground and using ambiguous terms like &apos;&apos;Internet freedom&apos;&apos; to hide many profound contradictions in its own policies. On matters of &apos;&apos;Internet freedom&apos;&apos; &apos;&apos; democracy promotion rebranded under a sexier name &apos;&apos; America enjoyed some legitimacy as it claimed that it didn&apos;t engage in the kinds of surveillance that it itself condemned in China or Iran. Likewise, on matters of cyberattacks, it could go after China&apos;s cyber-espionage or Iran&apos;s cyber-attacks because it assured the world that it engaged in neither." />
                      <outline text="Both statements were demonstrably false but lack of specific evidence has allowed America to buy some time and influence. These days are gone. Today, the rhetoric of &apos;&apos;Internet freedom agenda&apos;&apos; looks as trustworthy as George Bush&apos;s &apos;&apos;freedom agenda&apos;&apos; after Abu Ghraib. Washington will have to rebuild its policies from scratch. But, instead of blaming Snowden, Washington must thank him. He only exposed the shaky foundations of already unsustainable policies. These policies, built around vaporous and ambiguous terms like &apos;&apos;Internet freedom&apos;&apos; and &apos;&apos;cyberwar&apos;&apos; would have never survived the complexities of global politics anyway." />
                      <outline text="All objects and appliances turn &apos;&apos;smart&apos;&apos; and get connectedWhat is to be done? Let&apos;s start with surveillance. So far, most European politicians have reached for the low-hanging fruit &apos;&apos; law &apos;&apos; thinking that if only they can better regulate American companies &apos;&apos; for example, by forcing them to disclose how much data and when they share with NSA &apos;&apos; this problem will go away. This is a rather short-sighted, na&#175;ve view that reduces a gigantic philosophical problem &apos;&apos; the future of privacy &apos;&apos; to seemingly manageable size of data retention directives. If only things were that simple! Our current predicaments start at the level of ideology, not bad policies or their poor implementation. This is not to oppose more regulation of technology companies &apos;&apos; Europe should have done this a decade ago instead of getting caught in the heady rhetoric of &apos;&apos;cloud computing&apos;&apos; &apos;&apos; but only to point out that the task ahead is far more intellectually demanding." />
                      <outline text="Assume, for a moment, that Europe forces all the laws it wants on US technology companies. It&apos;s a very unlikely hypothetical &apos;&apos; not with their growing lobbying power in Brussels&apos;&apos; but let&apos;s forget this for a moment. What will happen in five years, as all objects and appliances turn &apos;&apos;smart&apos;&apos; &apos;&apos; i.e. they suddenly have a cheap but sophisticated sensor built into them &apos;&apos; and become connected to each other and to the Internet? Many such objects are already commercially available and many more will be soon: smart forks that monitor how fast we eat; smart toothbrushes that monitor how often we brush our teeth; smart shoes that tell us when they are about to get worn out; smart umbrellas that go online to check when it will rain and warn us to take them with us on leaving the house. And then, of course, there&apos;s that smartphone dangling in your pocket and &apos;&apos; soon &apos;&apos; Google Glasses adoring your face." />
                      <outline text="(Hapilabs presenting a smart fork)" />
                      <outline text="All these objects are capable of generating a data trail. Collect information from several such objects, put it together and &apos;&apos; functionally at least&apos;&apos; you can generate the same inferences and predictions that NSA generates by watching our email communications or phone records. In other words, NSA can figure out where you are by monitoring your cellphone &apos;&apos; or by getting data from your smart shoes or your smart umbrella. Likewise, they don&apos;t have to install a security camera in your kitchen to know what you&apos;ve been eating: they can figure it out by tinkering with the smart toothbrush in your toothbrush or the smart trashbin in your kitchen. If we don&apos;t consider these new listening devices in our legal calculus, there&apos;s little point to build the world&apos;s most secuire email system or a mobile network: NSA will obtain data that allows them to continue their work through other, more creative means." />
                      <outline text="They might even buy IT on the open market. Some dismiss such concerns, arguing that our email communication feels too private to be sold as if it were just another commodity. True. However, we are perfectly okay with having a Google algorithm scour through our email in order to show us an ad. It&apos;s this customized ad &apos;&apos; based on automated on-the-fly analysis and classification &apos;&apos; that allows to keep Google&apos;s sophisticated (and rather costly) email system free of charge. Note that it&apos;s this tacit agreement &apos;&apos; that Google can use an algorithm to analyze our email communications and sell us the matching adds &apos;&apos; that keeps our email communication both free and accessible to the NSA. Google could have easily chosen to encrypt our communications in a way that its own algorithms wouldn&apos;t be able to decipher, depriving both itself and the NSA of much-coveted data. But then Google wouldn&apos;t be able to offer us a free service. And who would be happy about this?" />
                      <outline text="Laws won&apos;t be of much helpAs our gadgets and previously analog objects become &apos;&apos;smart,&apos;&apos; this Gmail model will spread everywhere. One set of business models will supply us with gadgets and objects that will either be free or be priced at a fraction of their real cost. In other words, you get your smart toothbrush for free &apos;&apos; but, in exchange, you allow it to collect data on how you use the toothbrush. It&apos;s this data that will eventually finance the cost of the toothbrush. Or, for objects with screens or speakers, you might see or hear a personalized ad based on your use of the device &apos;&apos; and it&apos;s the ad that will underwrite the cost. This, for example, is the model that Amazon is already pursuing with its Kindle ereaders: if you want a cheaper model, you simply accept to see advertising on their screens. Amazon&apos;s ultimate Faustian bargain would be to offer us a free ereader along with free and instantaneous access to all of the world&apos;s books on one condition: we will agree to let it analyze everything we read and serve us ads accordingly." />
                      <outline text="(A yawn rewarded with a coffee: Douwe Egberts is proud of its using facial recognition)" />
                      <outline text="Under a slightly modified model &apos;&apos; which is already available through various start-ups known as &apos;&apos;personal data lockers&apos;&apos; &apos;&apos; you can actually make money off that data by selling it yourself &apos;&apos; and not just from the toothbrush but from across any smart object that you interact with: your car, your desk, your trashbin. One start-up &apos;&apos; Miinome &apos;&apos; even allows you to make money by putting up your genetic code online; whenever a third-party company accesses it &apos;&apos; perhaps, to customize advertising or to use it in some Big Data experiment &apos;&apos; you get a small payment. Essentially, the ability to insert a sensor and an Internet connection into everything, including our body, makes it possible to commodify everything and to attach a price on the information generated in the context of its use. Sensors and ubiquitous connectivity help to create new, liquid markets in such information, allowing citizens to monetize self-surveillance." />
                      <outline text="If this is, indeed, the future that we are heading towards, it&apos;s obvious that laws won&apos;t be of much help, as citizens would voluntarily opt for such transactions &apos;&apos; the way we already opt for free (but monitorable) email and cheaper (but advertising-funded) ereaders. Spies from the NSA will have two options: they can either go and ask data from companies that build all these smart objects &apos;&apos; from smart shoes to smart toothbrushes &apos;&apos; or they can buy it in the open market &apos;&apos; as this data would eventually be traded &apos;&apos; by us, citizens. In short, what is now collected through subpoenas and court orders could be collected entirely through commercial transactions alone." />
                      <outline text="Market logic has replaced moralityPolicymakers who think that laws can stop this commodificaton of information are deluding themselves. Such commodification is not happening against the wishes of ordinary citizens but because this is what ordinary citizen-consumer want. Look no further than Google&apos;s email and Amazon&apos;s Kindle to see that no one is forced to use them: people do it willingly. Forget laws: it&apos;s only through political activism and a robust intellectual critique of the very ideology of &apos;&apos;information consumerism&apos;&apos; that underpins such aspirations that we would be able to avert the inevitable disaster." />
                      <outline text="Where could such critique begin? Consider what might, initially, seem like a bizarre parallel: climate change. For much of the 20th century, we assumed that our energy use was priced correctly and that it existed solely in the consumer paradigm of &apos;&apos;I can use as much energy as I can pay for.&apos;&apos; Under that paradigm, there was no ethics attached to our energy use: market logic has replaced morality &apos;&apos; which is precisely what has enabled fast rates of economic growth and the proliferation of consumer devices that have made our households electronic paradises free from tiresome household work. But as we have discovered in the last decade, such thinking rested on a powerful illusion that our energy use was priced correctly &apos;&apos; that we in fact paid our fair share. (Carbon credit trading scheme was meant to rectify this problem &apos;&apos; before it collapsed.)" />
                      <outline text="You cannot imagine the information disaster that easilyBut of course we had never priced our energy use correctly because we never factored in the possibility that life on Earth might end even if we balance all of our financial statements. So now your decision what car to drive or how much light to have in your living room is no longer a decision affected solely by your ability to pay for electricity; it&apos;s also an ethical decision that each of us makes for ourselves (apparently, not very effectively). The point is that, partly due to successful campaigns by the environmental movement, a set of purely rational, market-based decisions have suddenly acquired political latency, which has given us differently designed cars, lights that go off if no one is in the room, and so forth. It has also produced citizens who &apos;&apos; at least in theory &apos;&apos; are encouraged to think of implications that extend far beyond the ability to pay their electricity bill." />
                      <outline text="Now, this might seem like an odd parallel to draw to information sharing but it&apos;s actually not that outlandish. Right now, your decision to buy a smart toothbrush with a sensor in it &apos;&apos; and then to sell the data that it generates &apos;&apos; is presented to us as just a purely commercial decision that affects no one but us. But this is so only because we cannot imagine an information disaster as easily as we can imagine an environmental disaster. We have become very bad dystopians &apos;&apos; and our technophilic intellectuals, in love with Silicon Valley and buzzwords like &apos;&apos;innovation,&apos;&apos; are partly to blame. But that the disaster is slow and doesn&apos;t lend itself to vivid visualizations doesn&apos;t make it less of a disaster!" />
                      <outline text="Political and moral consequences to information consumerismWhat we need is a sharper, starker picture of the information apocalypse that awaits us in a world where personal data is traded like coffee or any other commodity. Take the oft-repeated argument about the benefits of trading one&apos;s data in exchange for some tangible commercial benefit. Say, for example, you install a sensor in your car to prove to your insurance company that you are driving much safer than the average driver that figures in their model for pricing insurance policies. Great: if you are better than the average, you get to pay less. But the problem with averages is that half of the population is always worse than the benchmark. Inevitably &apos;&apos;regardless of whether they want to monitor themselves or not &apos;&apos; that other half will be forced to pay more, for as the more successful of us take on self-tracking, most social institutions would (quite logically) assume that those who refuse to self-track have something to hide. Under this model, the implications of my decision to trade my personal data are no longer solely in the realm of markets and economics &apos;&apos; they are also in the realm of ethics. If my decision to share my personal data for a quick buck makes someone else worse off and deprives them of opportunities, then I have an extra ethical factor to consider &apos;&apos; economics alone doesn&apos;t suffice." />
                      <outline text="All of this is to say that there are profound political and moral consequences to information consumerism&apos;&apos; and they are comparable to energy consumerism in scope and importance. Making these consequences more pronounced and vivid is where intellectuals and political parties ought to focus their efforts. We should do our best to suspend the seeming economic normalcy of information sharing. An attitude of &apos;&apos;just business!&apos;&apos; will no longer suffice. Information sharing might have a vibrant market around it but it has no ethical framework to back it up. More than three decades ago, Michel Foucault was prescient to see that neoliberalism would turns us all into &apos;&apos;entrepreneurs of the self&apos;&apos; but let&apos;s not forget that entrepreneurship is not without its downsides: as most economic activities, it can generate negative externalities, from pollution to noise. Entrepreneurship focused on information sharing is no exception." />
                      <outline text="We need the mainstreaming of &apos;&apos;digital&apos;&apos; topicsEuropean politicians can try imposing whatever laws they want but as long as the consumerist spirit runs supreme and people have no clear ethical explanation as to why they shouldn&apos;t benefit from trading off their data, the problem would persist. NSA surveillance, Big Brother, Prism: all of this is important stuff. But it&apos;s as important to focus on the bigger picture -- and in that bigger picture, what must be subjected to scrutiny is information consumerism itself &apos;&apos; and not just the parts of the military-industrial complex responsible for surveillance. As long as we have no good explanation as to why a piece of data shouldn&apos;t be on the market, we should forget about protecting it from the NSA, for, even with tighter regulation, intelligence agencies would simply buy &apos;&apos; on the open market &apos;&apos; what today they secretly get from programs like Prism." />
                      <outline text="Some might say: If only we could have a digital party modeled on the Green Party but for all things digital. A greater mistake is harder to come by. It&apos;s wrong to think that all this digital stuff can just be pigeonholed and delegated to the bright young people who know how to code. This &apos;&apos;digital stuff&apos;&apos; is of fundamental importance for the future of privacy, autonomy, freedom, and democracy itself: these are matters that should be of importance to every political party. For a mainstream political party today to abandon responsibility over the &apos;&apos;digital&apos;&apos; is tantamount to abandoning responsibility over the future of democracy itself." />
                      <outline text="What we need is the mainstreaming of &apos;&apos;digital&apos;&apos; topics &apos;&apos; not their ghettoization in the hands and agendas of the Pirate Parties or whoever will come to succeed them. We can no longer treat the &apos;&apos;Internet&apos;&apos; as just another domain &apos;&apos; like, say, &apos;&apos;the economy&apos;&apos; or the &apos;&apos;environment&apos;&apos; &apos;&apos; and hope that we can develop a set of competencies around it. Rather, we need more topical domains - &apos;&apos;privacy&apos;&apos; or &apos;&apos;subjectivity&apos;&apos; to overtake the domain of the network. Forget an ambiguous goal like &apos;&apos;Internet freedom&apos;&apos; &apos;&apos; it&apos;s an illusion and it&apos;s not worth pursuing. What we must focus on is creating environments where actual freedom can still be nurtured and preserved." />
                      <outline text="A much more dangerous threat to democracy than the NSAThe Pirates&apos;s tragic miscalculation was trying to do too much: they wanted to change both the process of politics and its content. That project was so ambitious that it was doomed to failure from the very beginning. Besides, the political usefulness of changing the process &apos;&apos; whether it was a push towards greater participation or more transparency over legislative meetings &apos;&apos; should itself be in question; whatever reforms the Pirates have been advancing did not seem to stem from some long critical reflections of the pitfalls of the current political system but, rather, from their belief that the political system, incompatible with the most successful digital platforms from Wikipedia to Facebook, must be reshaped in their image. This was &apos;&apos; and is &apos;&apos; nonsense. A parliament is, in fact, different from Wikipedia &apos;&apos; but the success of the latter tells us absolutely nothing about the viability of the Wikipedia model as a template for remodeling our political institutions (and let us not beat around the bush: they are far from perfect, these parliaments, as the financial crisis has indicated). But the good thing that did come out of the Pirates was the nudge to get everyone else thinking about digital matters and their impact on the future of democracy. This is the content &apos;&apos; rather than the process &apos;&apos; part. That project must continue but, perhaps, be reoriented from pursuing the faux goal of &apos;&apos;Internet freedom&apos;&apos; to thinking about preserving real freedoms instead." />
                      <outline text="In as much as the Snowden affair has forced us to confront these issues, it&apos;s been a good thing for democracy. Let&apos;s face it: most of us would rather not think about the ethical implications of smart toothbrushes or the hypocrisy involved in Western rhetoric towards Iran or the genuflection that more and more European leaders show in front of Silicon Valley and its awful, brain-damaging language, the Siliconese. The least we can do is to acknowledge that the crisis is much deeper and that it stems from intellectual causes as much as from legal ones. Information consumerism, like its older sibling energy consumerism, is a much more dangerous threat to democracy than the NSA." />
                      <outline text="Weitere Artikel" />
                      <outline text="Objects and appliances turning &apos;&#158;smart&apos;&apos; and getting connected: some more links" />
                      <outline text="  WeitersagenMerkenDrucken Beitrag per E-Mail versendenEnglish version: The Price of Hypocrisy - Evgeny Morozov on Information Consumerism" />
                      <outline text="Information Consumerism" />
                      <outline text="The Price of Hypocrisy" />
                      <outline text="Von Evgeny MorozovEven the best laws will not lead to a safer internet. We need a sharper picture of the information apocalypse that awaits us in a world where personal data is traded to avert the catastrophy." />
                      <outline text="Ein Fehler ist aufgetreten. Bitte &#188;berpr&#188;fen Sie Ihre Eingaben." />
                      <outline text=" Beitrag per E-Mail versendenVielen DankDer Beitrag wurde erfolgreich versandt." />
                      <outline text="Lesermeinungen zu diesem Artikel (4)" />
              </outline>

              <outline text="The Internet&apos;s Verbal Contrarian - NYTimes.com">
                      <outline text="Link to Article" type="link" url="http://mobile.nytimes.com/2013/08/15/business/media/the-internets-verbal-contrarian.html?_r=1&amp;adxnnl=1&amp;ref=technology&amp;adxnnlx=1376655301-yUotkFduL4/D4DAC+pYskA&amp;" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376662897_d5KWFT2H.html" />
      <outline text="Fri, 16 Aug 2013 14:21" />
                      <outline text="" />
                      <outline text="For every revolution, there is a counterrevolutionary. And so the digital one has brought us Evgeny Morozov." />
                      <outline text="A 29-year-old (C)migr(C) from Belarus, Mr. Morozov has quickly become the most prominent, most multiplatformed critic of the utopian promises coming from Silicon Valley. His first book, &apos;&apos;The Net Delusion,&apos;&apos; looked skeptically at the belief that social networks were responsible for fomenting political change across the globe, and in the new &apos;&apos;To Save Everything, Click Here&apos;&apos; he has expanded that critique to question whether the Internet has improved anything." />
                      <outline text="With the recent revelations about National Security Agency surveillance, Mr. Morozov is taking a victory lap of sorts. In an essay last month, he finds vindication for his pessimistic views about the Internet, as the world turns on the United States over its spying on overseas digital communications and as oppressive governments are emboldened to crack down: &apos;&apos;This is the real tragedy of America&apos;s &apos;Internet freedom agenda&apos;: It&apos;s going to be the dissidents in China and Iran who will pay for the hypocrisy that drove it from the very beginning.&apos;&apos;" />
                      <outline text="Mr. Morozov has written for a long list of publications, including London Review of Books, The New York Times and The New Republic. In addition to the sheer volume of Mr. Morozov&apos;s writings, there is his sheer volume. His style is aggressive and frequently accusatory, with a litany of digital idealists and organizations that he uses as punching bags. These include Facebook, Google, the publisher and writer Tim O&apos;Reilly and the City University of New York professor and new-media guru Jeff Jarvis, whose book &apos;&apos;Public Parts&apos;&apos; Mr. Morozov savaged in a 6,000-word review in The New Republic, which included the memorable line, &apos;&apos;This is a book that should&apos;ve stayed a tweet.&apos;&apos;" />
                      <outline text="The aggressive, barroom quality of his writing has earned him plenty of admirers, as well as detractors who consider him a childish contrarian. But after becoming such a public, public intellectual by his mid-20s, Mr. Morozov has made a curious decision: to further his education. During the semester you could find him finishing his coffee upstairs at a Starbucks before making the walk across Harvard Yard for his seat at a seminar on the history of psychoanalysis as a first-year Harvard doctoral candidate in the history of science." />
                      <outline text="&apos;&apos;I have more influence than I ought to have,&apos;&apos; he said in the train to New York City from Boston, adding that he had a nagging feeling that his criticisms were too shallow. &apos;&apos;The idea of the Internet allowed me to cut too many corners, intellectually.&apos;&apos;" />
                      <outline text="His new thinking is evident in &apos;&apos;To Save Everything,&apos;&apos; released in March. In the book Mr. Morozov puts quotation marks around every reference to &apos;&apos;the Internet,&apos;&apos; and with that tic he makes a larger point: readers should stop and question everything they have been taught about technology, including that the Internet exists." />
                      <outline text="Without such skepticism, Mr. Morozov and his supporters say, the public easily succumbs to the slick promises and catchwords of online entrepreneurs or TED talks &apos;-- &apos;&apos;open&apos;&apos; or &apos;&apos;generative&apos;&apos; or &apos;&apos;transparent&apos;&apos; or &apos;&apos;participatory.&apos;&apos; And those words lead to real beliefs, with real consequences, he argues &apos;-- for example, that privacy is just an archaic notion, or that information &apos;&apos;wants to be free.&apos;&apos;" />
                      <outline text="Critics have generally welcomed &apos;&apos;To Save Everything&apos;&apos; for its contrary take, if not always how that take is expressed. Writing in The Times&apos;s Book Review, Ellen Ullman, a novelist and former computer programmer, says Mr. Morozov &apos;&apos;is taking up the cause of human values against those of the machine,&apos;&apos; though she adds that his &apos;&apos;polemical tone is wearying.&apos;&apos;" />
                      <outline text="Tim Wu, the Columbia Law School professor and frequent Morozov target, writes that the book was more of the same and that his attacks appear to be &apos;&apos;mainly designed to build Morozov&apos;s particular brand of trollism; one suspects he aspires to be a Bill O&apos;Reilly for intellectuals.&apos;&apos;" />
                      <outline text="In person, too, Mr. Morozov can quickly turn adversarial, and not only when he threatens to stop talking because his interlocutor&apos;s knowledge &apos;&apos;is too limited.&apos;&apos; He is as likely to spot a contradiction in his own thinking, saying something like, &apos;&apos;You are going to catch me here, but who cares?&apos;&apos;" />
                      <outline text="Beyond his gnawing arguments and the way he delivers them, Mr. Morozov has benefited from growing public doubts in the prevailing belief in a &apos;&apos;high-tech, techno-libertarian utopia,&apos;&apos; said Ian Bogost, a professor of digital media at Georgia Tech and among the few writers in the field Mr. Morozov counts as a friend and ally. &apos;&apos;This anxiety is one that needs voices who can identify it and find other paths. The reason why it is him is that he has been willing to pull no punches and be as brazen and direct as his targets.&apos;&apos;" />
                      <outline text="Mr. Morozov was born in Soligorsk, a small mining city whose name means &apos;&apos;mountains of salt.&apos;&apos; His quick answer to the question of why he wanted to come to the United States: &apos;&apos;Do you know anything about Belarus?&apos;&apos;" />
                      <outline text="He said he had his epiphany about technology while working for Transitions, an organization that promotes the development of independent journalism in Europe and Central Asia. &apos;&apos;I would show up in Tajikistan with this PowerPoint and tell them about Wikipedia and Flickr and YouTube, they were like: &apos;Dude, we have no electricity. What are you talking about?&apos; &apos;&apos;" />
                      <outline text="The lesson was clear: These ideas had a logic that was divorced from the people being asked to live with them." />
                      <outline text="After leaving Transitions, he got the first of an annual fellowship from the Open Society Institute (now Open Society Foundations) to live in New York and work on what would become &apos;&apos;Net Delusion.&apos;&apos; After time as a visiting scholar at Georgetown and Stanford, he is back to being a student." />
                      <outline text="&apos;&apos;If my idea was just to maintain a certain lifestyle, there would be no need to get a Ph.D.,&apos;&apos; he said. &apos;&apos;But I do care very deeply about the idea side as well.&apos;&apos;" />
                      <outline text="At Harvard Mr. Morozov is branching out and letting down his guard, he said. He has followed a regimen of diet and exercise &apos;-- &apos;&apos;read, write and row,&apos;&apos; as his friend, Mr. Bogost, put it &apos;-- that has transformed his appearance." />
                      <outline text="By studying the history of science, Mr. Morozov said, &apos;&apos;I acknowledge my ignorance from the very beginning.&apos;&apos; But he hasn&apos;t abandoned the skepticism of technology." />
                      <outline text="For all his rage against the servers and their handlers, Mr. Morozov has been masterly in exploiting the Internet. He has more than 40,000 followers on Twitter, where he promotes his latest print pieces with devilish glee &apos;-- &apos;&apos;TNR will publish one of those Jarvis-esque critical reviews I love to write.&apos;&apos;" />
                      <outline text="He has already planned his dissertation, which is set to be a book published by Farrar, Straus &amp; Giroux &apos;-- what he calls a history of the Internet intellectual movements like cybernetics that laid the groundwork for current approaches." />
                      <outline text="&apos;&apos;It is easy to be seen as either a genius or a crank,&apos;&apos; he said. &apos;&apos;If you have a Ph.D., at least you somewhat lower the chances that you will be seen as a crank.&apos;&apos;" />
                      <outline text="Correction: August 14, 2013" />
                      <outline text="An earlier version of this article misspelled an example of an Internet intellectual movement. It is cybernetics, not cyberkinetics." />
              </outline>

              <outline text="This could be beginning of the end for cable boxes - CNBC">
                      <outline text="Link to Article" type="link" url="http://www.cnbc.com/id/100967342" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376662273_S2MgKNfW.html" />
      <outline text="Fri, 16 Aug 2013 14:11" />
                      <outline text="" />
                      <outline text="Most households today have only a few choices for television service: whatever cable company serves their local area, be itComcast, Time Warner Cable or others, and two satellite providers, DirecTV and Dish Network. In some parts of the country, television through Verizon or AT&amp;T is also available. Analysts say cable delivered through the Internet could give households many more choices&apos;--if the new services give customers more for their money and if cable incumbents don&apos;t smother the services." />
                      <outline text="To even have a chance, companies like Sony and Intel need the permission of programmers, and that&apos;s why the Viacom deal is considered a breakthrough. Although Viacom and Sony declined to comment on Thursday, a person directly involved in the negotiations confirmed a Wall Street Journal report about the agreement. The person insisted on anonymity because the companies were not prepared to comment on the record." />
                      <outline text="Having the news spread was advantageous for Sony, though, because having Viacom on board&apos;--even just on a preliminary basis&apos;--will most likely help the company complete other carriage deals. The company has also contacted other top programmers, like theWalt Disney Company and Time Warner." />
                      <outline text="That Viacom&apos;--which has more than 20 channels, including big ones like Comedy Central and small ones like Centric&apos;--was the first to agree to support Sony&apos;s fledgling service is not necessarily surprising, since the company has a reputation for contentious relationships with cable and satellite companies. Last year, Viacom channels were blacked out in DirecTV households for nine days. Sumner Redstone controls both Viacom and the CBS Corporation, which is blacked out in three million Time Warner Cable households because of a contract dispute." />
                      <outline text="Time Warner Cable, and to a lesser extent other TV providers, has thrown up roadblocks for new entrants by inserting language into some carriage contracts that discourages programmers from selling its channels to Internet TV services. The existing providers say they just want to ensure that the upstarts don&apos;t get better terms, like broader video-on-demand rights or cheaper rates for channels." />
                      <outline text="Most likely, Sony will pay higher rates&apos;--one of the downsides of being new and untested. Any deals between programmers and the Sonys of the world will keep the TV bundle intact, despite occasional public agitation for an &apos;&apos;a la carte&apos;&apos; option." />
                      <outline text="&apos;&apos;I don&apos;t think the classic pay TV subscription bundle model of television is going away anytime soon&apos;--it&apos;s a pretty compelling and cost-efficient smorgasbord,&apos;&apos; particularly for older Americans, said Tim Hanlon, a former media agency executive who now runs the Vertere Group. &apos;&apos;But all bets are off with the under-40 set&apos;--the growing group of folks who just want their video content when and where they want it, preferably without the messy commitment part,&apos;&apos; he added." />
                      <outline text="More from The New York TimesSigns of rebound as Sony posts $35 M profitLewis Kornfeld, made Radio Shack an early player in PCs, diesWashington Post site hacked by Syrian group" />
                      <outline text="Sony is well-positioned to reach younger Americans because its PlayStation video game console is already hooked up to TV sets in tens of millions of homes. The company has said almost nothing about its intentions, but it has been interested in selling a bundle of channels at least since 2011. Its TV service could also be made available in the future via smartphones, tablet computers and other devices." />
                      <outline text="Sony hopes to start selling the service in the fourth quarter of 2013 or the first quarter of 2014, said a media company executive briefed on the plans for it." />
                      <outline text="If Sony&apos;s service (or another one like it) gets off the ground, incumbents like Comcast, Time Warner Cable and Verizon are also likely to sell their own versions, furthering this new type of competition. What no one knows&apos;--but everyone in the industry wonders&apos;--is whether these Internet cable services will steal market share; entice people who do not currently pay for any channel bundle to sign up; or fail to sign up customers at all." />
                      <outline text="The overall number of American households paying for television has remained remarkably steady in recent years, though there are some slight signs of fraying around the edges. Mr. Hanlon said he sensed that as younger viewers were getting better at &apos;&apos;cobbling together their own workarounds to all-or-nothing content packages,&apos;&apos; the &apos;&apos;smart programmers are starting to carefully position themselves to take advantage, just in case the classic carriage model starts to break.&apos;&apos;" />
                      <outline text="Of course, all of the alternatives being dreamed up in Silicon Valley and elsewhere are B.Y.O.B. -- Bring Your Own Broadband. Video is data-intensive, and data caps or stiffer monthly charges for broadband imposed by companies like Comcast could inhibit the establishment of virtual cable services. In a recent interview, the departing Time Warner Cable chief Glenn Britt acknowledged as much when he was asked about Intel&apos;s interest in TV." />
                      <outline text="&apos;&apos;The reality is, if everybody watched TV over the Internet, and we were out of the TV business, then we would have to recover more money from the Internet service,&apos;&apos; Mr. Britt said." />
                      <outline text="&apos;--By Brian Stelter, The New York Times." />
                      <outline text="DISCLOSURE: CNBC is owned by Comcast." />
              </outline>

              <outline text="Remarks by the President on the Situation in Egypt">
                      <outline text="Link to Article" type="link" url="http://www.whitehouse.gov/the-press-office/2013/08/15/remarks-president-situation-egypt" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376634688_5NH8RMGh.html" />
        <outline text="Source: White House.gov Press Office Feed" type="link" url="http://www.whitehouse.gov/feed/press" />
      <outline text="Fri, 16 Aug 2013 06:31" />
                      <outline text="" />
                      <outline text="The White House" />
                      <outline text="Office of the Press Secretary" />
                      <outline text="For Immediate Release" />
                      <outline text="August 15, 2013" />
                      <outline text="ResidenceChilmark, Massachusetts" />
                      <outline text="10:30 A.M. EDT THE PRESIDENT:  Good morning, everybody.  I just finished a discussion with my national security team about the situation in Egypt, and I wanted to provide an update about our response to the events of the last several days. Let me begin by stepping back for a moment.  The relationship between the United States and Egypt goes back decades.  It&apos;s rooted in our respect of Egypt as a nation, an ancient center of civilization, and a cornerstone for peace in the Middle East.  It&apos;s also rooted in our ties to the Egyptian people, forged through a longstanding partnership. Just over two years ago, America was inspired by the Egyptian people&apos;s desire for change as millions of Egyptians took to the streets to defend their dignity and demand a government that was responsive to their aspirations for political freedom and economic opportunity.  And we said at the time that change would not come quickly or easily, but we did align ourselves with a set of principles:  nonviolence, a respect for universal rights, and a process for political and economic reform.  In doing so, we were guided by values but also by interests, because we believe nations are more stable and more successful when they&apos;re guided by those principles as well. And that&apos;s why we&apos;re so concerned by recent events.  We appreciate the complexity of the situation.  While Mohamed Morsi was elected President in a democratic election, his government was not inclusive and did not respect the views of all Egyptians.  We know that many Egyptians, millions of Egyptians, perhaps even a majority of Egyptians were calling for a change in course.  And while we do not believe that force is the way to resolve political differences, after the military&apos;s intervention several weeks ago, there remained a chance for reconciliation and an opportunity to pursue a democratic path. Instead, we&apos;ve seen a more dangerous path taken through arbitrary arrests, a broad crackdown on Mr. Morsi&apos;s associations and supporters, and now tragically the violence that&apos;s taken the lives of hundreds of people and wounded thousands more. The United States strongly condemns the steps that have been taken by Egypt&apos;s interim government and security forces.  We deplore violence against civilians.  We support universal rights essential to human dignity, including the right to peaceful protest.  We oppose the pursuit of martial law, which denies those rights to citizens under the principle that security trumps individual freedom, or that might makes right.  And today the United States extends its condolences to the families of those who were killed and those who were wounded. And given the depths of our partnership with Egypt, our national security interests in this pivotal part of the world and our belief that engagement can support a transition back to a democratically elected civilian government, we&apos;ve sustained our commitment to Egypt and its people.  But while we want to sustain our relationship with Egypt, our traditional cooperation cannot continue as usual when civilians are being killed in the streets and rights are being rolled back.  As a result, this morning we notified the Egyptian government that we are canceling our biannual joint military exercise which was scheduled for next month.  Going forward I&apos;ve asked my national security team to assess the implications of the actions taken by the interim government and further steps that we may take as necessary with respect to the U.S.-Egyptian relationship.  Let me say that the Egyptian people deserve better than what we&apos;ve seen over the last several days.  And to the Egyptian people, let me say the cycle of violence and escalation needs to stop.  We call on the Egyptian authorities to respect the universal rights of the people.  We call on those who are protesting to do so peacefully and condemn the attacks that we&apos;ve seen by protesters, including on churches.  We believe that the state of emergency should be lifted, that a process of national reconciliation should begin, that all parties need to have a voice in Egypt&apos;s future, that the rights of women and religious minorities should be respected, and that commitments must be kept to pursue transparent reforms of the constitution and democratic elections of a parliament and a President. Pursuing that path with help Egypt meet the democratic aspirations of its people while attracting the investment, tourism and international support that can help it deliver opportunities to its citizens.  Violence, on the other hand, will only feed the cycle of polarization that isolates Egyptians from one another and from the world, and that continues to hamper the opportunity for Egypt to get back on the path of economic growth. Let me make one final point.  America cannot determine the future of Egypt.  That&apos;s a task for the Egyptian people.  We don&apos;t take sides with any particular party or political figure.  I know it&apos;s tempting inside of Egypt to blame the United States or the West or some other outside actor for what&apos;s gone wrong.  We&apos;ve been blamed by supporters of Morsi.  We&apos;ve been blamed by the other side, as if we are supporters of Morsi.  That kind of approach will do nothing to help Egyptians achieve the future that they deserve.  We want Egypt to succeed.  We want a peaceful, democratic, prosperous Egypt.  That&apos;s our interest.  But to achieve that, the Egyptians are going to have to do the work.  We recognize that change takes time, and that a process like this is never guaranteed.  There are examples in recent history of countries that are transitioned out of a military government towards a democratic government, and it did not always go in a straight line, and the process was not always smooth.  There are going to be false starts.  There will be difficult days.  America&apos;s democratic journey took us through some mighty struggles to perfect our union.  From Asia to the Americas, we know that democratic transitions are measured not in months or even years, but sometimes in generations.  So in the spirit of mutual interest and mutual respect, I want to be clear that America wants to be a partner in the Egyptian people&apos;s pursuit of a better future, and we are guided by our national interest in this longstanding relationship.  But our partnership must also advance the principles that we believe in and that so many Egyptians have sacrificed for these last several years -- no matter what party or faction they belong to. So America will work with all those in Egypt and around the world who support a future of stability that rests on a foundation of justice and peace and dignity. Thank you very much. END 10:37 A.M. EDT" />
              </outline>

              <outline text="VIDEO-Filmmaker of movie initially blamed for Benghazi attacks: Obama administration was irresponsible &apos;&apos; The Lead with Jake Tapper - CNN.com Blogs">
                      <outline text="Link to Article" type="link" url="http://thelead.blogs.cnn.com/2013/08/13/filmmaker-of-movie-initially-blamed-for-benghazi-attacks-obama-administration-was-irresponsible/?hpt=hp_t2" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376630646_LHhTkCc3.html" />
      <outline text="Fri, 16 Aug 2013 05:24" />
                      <outline text="" />
                      <outline text="The man whose anti-Muslim film was wrongly cited for sparking protests that led to the Benghazi debacle doesn&apos;t hold a grudge against the U.S. government, although he was shocked at how it all played out and is working on a book about his experience.Nakoula Basseley Nakoula, speaking to CNN&apos;s Jake Tapper after his release from prison, says the Obama administration acted irresponsibly in initially linking the deadly terror attack last September 11 on the U.S. diplomatic compound in eastern Libya to outrage over &apos;&apos;The Innocence of Muslims.&apos;&apos;" />
                      <outline text="A YouTube trailer of the film, which cast the Prophet Mohammed in an unflattering light, was highlighted by Egyptian media and did spark protests in parts of the Muslim world." />
                      <outline text="The 55-year-old Egyptian-American has been granted supervised release from a federal prison, according to the Justice Department. Bureau of Prisons records show he is at an undisclosed halfway house in Southern California and is due to be formally freed next month." />
                      <outline text="He landed in jail after the uproar over his film for a probation violation related to a 2010 bank fraud conviction" />
                      <outline text="Asked how he felt when the administration tied his film to the attack by armed militants that killed Ambassador Christopher Stevens and three other Americans, Nakoula said he was shocked." />
                      <outline text="&quot;Because, you know, I never thought, my movie can cause anyone trouble or anyone can get killed from my movie,&quot; he said." />
                      <outline text="Asked if he thought the administration put him in danger, Nakoula declined to comment. But he said the government is &quot;hiding&quot; him." />
                      <outline text="He said he personally likes President Barack Obama but says his administration was irresponsible over the Benghazi matter, highlighted in television appearances by then U.N. Ambassador Susan Rice. She said it appeared that the Benghazi attack was linked to protests over the movie, which were later proved untrue." />
                      <outline text="&quot;I don&apos;t blame him. He has a lot of responsibility,&quot; Nakoula said of Obama, but adding a message for his administration." />
                      <outline text="&quot;Guys, before you do anything, please give yourself time to think about it, because you are responsible people. You are in a place - you have to be responsible in it,&quot; he said." />
                      <outline text="But there were others complaining about the film as well." />
                      <outline text="The actors involved in the film said Nakoula misled them on the content and dubbed over their lines with more incendiary, anti-Muslim ones." />
                      <outline text="One of the actresses, Cindy Lee Garcia, filed a lawsuit against Nakoula and others." />
                      <outline text="&quot;When I signed on the film was called &apos;Desert Warrior&apos; and it was supposed to be based on how it was 2000 years ago. On set, Mohammed or Muslims were never mentioned,&quot; Garcia said in September. &quot;My whole life has been turned upside down.&quot;" />
                      <outline text="Nakoula, a Coptic Christian from a community oppressed in Egypt, insists his film is not against Islam, but against terrorism. He does not feel any responsibility for violent protests of his film." />
                      <outline text="Nakoula said protesters and people who reacted violently to the film are &quot;stupid people, they didn&apos;t even show the whole movie.&quot;" />
                      <outline text="&quot;My movie is not a religion movie, it&apos;s political more than [religious]. I never be against any religion. I have a Muslim friends. I am against the terrorism culture,&quot; said Nakoula. &quot;I am against Osama bin Laden. I am against (Al Qaeda leader Ayman al) Zawahiri. I am against (Fort Hood shooting suspect Nidal) Hasan. &apos;...  I am against the culture itself, not the religion.&quot;" />
                      <outline text="Nakoula said he wishes that the accused Boston Marathon bombers and Hasan had seen his film because he bets it would have prevented those attacks." />
              </outline>

              <outline text="MYSTERIOUS SHOOTERS IN EGYPT">
                      <outline text="Link to Article" type="link" url="http://aangirfan.blogspot.com/2013/08/mysterious-shooters-in-egypt.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376620294_HjTXhe6U.html" />
        <outline text="Source: aangirfan" type="link" url="http://aangirfan.blogspot.com/feeds/posts/default?alt=rss" />
      <outline text="Fri, 16 Aug 2013 02:31" />
                      <outline text="" />
                      <outline text="Video footage from army helicopters show men behind palm trees firing Kalashnikov assault rifles at police lines. 1.The Egyptian police are quite capable of peacefully dispersing demonstrators, so long as there are no mysterious provocateurs shooting at them." />
                      <outline text="In Egypt, on 14 August 2013, &quot;state television announced that a second demonstration site at Nadha Square, near Cairo University, had been cleared with relative ease before midday..." />
                      <outline text="&quot;ONTV news showed firearms and rounds of ammunition allegedly seized in the raid." />
                      <outline text="&quot;The demonstrators fled while some skirmished with anti-Morsi mobs." />
                      <outline text="&quot;Witnesses said the police held back as the two sides shot at each other with pistols.&quot;" />
                      <outline text="Egypt: Rifles at dawn, and the bloodshed began - Telegraph" />
                      <outline text="Nahda square, near Cairo University (EPA)2.Someone is trying to start a civil war, so that Egypt can be broken up, just like Yugoslavia." />
                      <outline text="&quot;Mohamed Ibrahim, the interior minister, said that 43 police had been killed in the day&apos;s violence..." />
                      <outline text="&quot;At least half a dozen churches were burnt in Sohag, Minya and other locations in Upper Egypt..." />
                      <outline text="&quot;A deep well of support for the military appeared undiminished by the bloodshed. Residents gathered behind military lines outside Rabaa al-Adawiya, shouting &apos;the army and the people are one hand&apos;." />
                      <outline text="3.Most ordinary Egyptians do not like the Muslim Brotherhood." />
                      <outline text="&quot;The encampments had grown increasingly unpopular among local people and the broader public." />
                      <outline text="&quot;Amnesty International has documented cases of torture within the sit-in and Egyptian media outlets routinely portray the Brotherhood as terrorists...&quot;" />
                      <outline text="Egypt: Rifles at dawn, and the bloodshed began - Telegraph" />
                      <outline text="Mysterious agents provocateurs shoot at police in Cairo" />
                      <outline text="4.The Muslim Brotherhood, or provocateurs, are targeting Christians.A. Peasant comments:" />
                      <outline text="&quot;The Coptic Orthodox Church has condemned the continued attacks on churches and Christian properties on Wednesday." />
                      <outline text="&quot;Angry mobs attacked and torched tens of Christian properties including churches, monasteries, schools and shops, in a number of locations in Egypt including Alexandria, Suez, and a number of cities in Upper Egypt.&quot;" />
                      <outline text="Egyptian president declares state of emergency amid deadly violence" />
                      <outline text="5.The US government and its friends are behind the destabilisation of Egypt." />
                      <outline text="The US ambassador in Egypt, Robert S. Ford, trained under death squad ambassador John Negroponte (a London-born Cypriot Jew)." />
                      <outline text="Robert S. Ford appointed US ambassador in Cairo" />
                      <outline text="&quot;It is very likely that the UK, the US and Qatar, and to a certain extent also Saudi Arabia, are behind this violence.&quot; - Christof LehmannForeign interests in Egypt: &apos;UK, US, and Qatar might be behind the violent clashes&apos; &apos;&apos; expert6.Israel trains mercenaries and provocateurs?" />
                      <outline text="&quot;Three former soldiers of the Irish military elite&quot; have been Training Death Squads" />
                      <outline text="7.Weapons are flowing into Egypt." />
                      <outline text="CAIRO, April 4 2013 (Reuters) &apos;&apos; &quot;Egyptian navy forces seized a ship carrying heavy weapons as it entered Egyptian territorial waters..." />
                      <outline text="&quot;Inside they found a number of weapons and quantities of ammunition of various types..." />
                      <outline text="&quot;The boat belongs to a private maritime security company...&quot;" />
                      <outline text="Egyptian Navy Seizes Private Security Ship in Territorial Waters ..." />
              </outline>

              <outline text="The FCC Road: Part 15 from Concept to Approval - Wireless Solutions | DigiKey">
                      <outline text="Link to Article" type="link" url="http://www.digikey.com/us/en/techzone/wireless/resources/articles/the-fcc-road-part-15-from-concept.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376617436_7P7K69S3.html" />
      <outline text="Fri, 16 Aug 2013 01:43" />
                      <outline text="" />
                      <outline text="Contributed by Linx TechnologiesOnce your wireless widget is ready for market, how do you get FCC Part 15 approval? Knowing the process and starting it from the beginning helps shorten and smooth out the road ahead." />
                      <outline text="Many manufacturers have avoided making their products wireless because of uncertainty over the approval and certification process. While it is true that RF increases the effort and cost of bringing a product to market, it also can add significantly to the function and salability of a completed product. Thanks to a growing number of easily applied radio frequency (RF) devices such as those offered by Linx, manufacturers are now able to quickly and reliably add wireless functionality to their products. The issue of legal compliance for the finished product is straightforward when approached in logical steps." />
                      <outline text="Purpose of this article" />
                      <outline text="This article gives a brief overview of the legal issues governing the manufacture and sale of RF products intended for unlicensed operation in the United States under CFR 47 Part 15. In the United States, the Federal Communications Commission (FCC) is responsible for the regulation of all RF devices. The FCC requires any device that radiates RF energy to be tested for compliance with FCC rules. These rules are contained in the Code of Federal Regulations (CFR), Title 47. Part 15 is the section of the code that deals with devices that emit RF energy and are to be operated without an individual license." />
                      <outline text="While this article will provide you with a basic understanding of the steps involved in certification, it is strongly recommended that you obtain a full copy of the code from your local government bookstore, the Government Printing office, or the FCC website." />
                      <outline text="What is &apos;&apos;Unlicensed&apos;&apos; operation?" />
                      <outline text="Certain bands within the RF spectrum are available for &apos;&apos;unlicensed&apos;&apos; operation. The term &apos;&apos;unlicensed&apos;&apos; is often misunderstood. The manufacturer of a product designed for &apos;&apos;unlicensed&apos;&apos; operation is not exempt from testing and/or certification. Indeed, both the transmitter and receiver must be tested by a qualified testing laboratory. However, once the necessary approvals are received, the end user can then operate the product without further obligation or licensing." />
                      <outline text="Steps to Part 15 certification" />
                      <outline text="Choose the optimum operating frequency" />
                      <outline text="Part 15 governs a broad range of the radio spectrum ranging from below 1 MHz to in excess of 32 GHz. It is broken into individual sections that govern the use of specific frequencies and bands. For example, section 15.249 covers the 902-928 MHz band. In this frequency range a user is allowed to transmit any analog or digital signal they desire so long as the stipulations governing allowed output power, harmonics, and occupied bandwidth are met. Other sections are not so accommodating. For example, in the 260-470 MHz band, the FCC considers not only RF factors but also the intended function and application." />
                      <outline text="In order to determine which operational frequency is best for your product, it is necessary to weigh both technical and legal issues. First, you will want to have a clear understanding of which frequencies are legally available, and then choose a specific frequency based on technical issues such as range, propagation, antenna length, power consumption, and potential interference. (If you are not familiar with these technical issues, consult with a Linx application engineer or read Linx Application Notes focusing on those issues.)" />
                      <outline text="Component selection" />
                      <outline text="Once a frequency of operation has been selected, the RF section and antenna must be carefully designed and optimized to comply with the allowed power and harmonic limitations imposed by Part 15. This process is greatly simplified if you are using a Linx module, but it is still important to recognize that the antenna and layout play key roles in the product&apos;s legal operation." />
                      <outline text="Many modular RF transmitter products, including those manufactured by Linx, have the potential to output RF power in excess of Part 15 limits. This extra power helps designers overcome inefficient antenna styles and take advantage of the FCC&apos;s averaging allowance when modulation techniques such as ASK/OOK are employed. If necessary, output power may be reduced using the module&apos;s level adjust or an external attenuation pad." />
                      <outline text="Another consideration in antenna selection is that Part 15.203 requires the antenna to be permanently attached or coupled with a unique or proprietary connector. While this requirement leaves room for interpretation, the FCC&apos;s intention is that a user not be able to change the radiated characteristics of the device by easily interchanging the antenna with a higher performance model." />
                      <outline text="Build production-ready prototypes" />
                      <outline text="After choosing a frequency for operation and a suitable RF stage, you will want to move from concept breadboard prototypes to a production-ready model as rapidly as possible." />
                      <outline text="Prescreen and optimize" />
                      <outline text="Once a wireless product is finished, its output power and harmonics should be checked to ensure that the RF stage is both optimized and Part 15 compliant. This testing requires a spectrum analyzer and calibrated antennas. If you do not have access to these instruments, consider prescreening services such as those offered by Linx. The prescreening process can result in a cost savings over formal testing and provides an opportunity to maximize product performance." />
                      <outline text="Send the production-ready product to an FCC authorized testing facility" />
                      <outline text="Once your product is in its finished form, exactly as it will be produced, testing should be conducted by a properly approved laboratory. In most cases, it is not necessary to be present for testing and the laboratory will prepare the filing paperwork." />
                      <outline text="The FCC has greatly streamlined the approval process by allowing independent laboratories to issue certifications though the Telecommunication Certification Body (TCB) program." />
                      <outline text="Unless specifically requested pursuant to Section 2.1076, receivers no longer require certification. They just require a quick test and issuance of a Declaration of Conformity (DoC) which should be maintained in the applicant&apos;s files. Transmitter certification is also relatively painless since many labs that are TCB certified are now allowed to issue certifications on behalf of the FCC. Full transmitter and receiver testing can cost around $5,000, transmitter only around $3,500, and the receiver about $1,500. The entire process can now be rapidly completed and many labs can perform other testing at the same time, such as Class A/B." />
                      <outline text="Label the product and market it" />
                      <outline text="Following successful completion of the approval process, products should be labeled as required by Part 2.925 and 2.926 as well as Part 15.19 or otherwise prescribed by the FCC." />
                      <outline text="Summary" />
                      <outline text="Bringing a product through the approval process (summarized in Figure 1) involves cost, effort, and in some cases frustration, but in the end your product will have an exciting new dimension of functionality and market appeal. By following the steps outlined in this application note and reviewing a copy of CFR 47 you will be well on your way to RF success. While complying with applicable provisions may seem unnecessarily restrictive, such regulations serve to ensure the availability of usable RF spectrum for every product." />
                      <outline text="The approval process" />
                      <outline text="Introduction" />
                      <outline text="Here in the United States the Federal Communications Commission (FCC) is responsible for the regulation of all RF devices. The FCC requires any device that radiates RF energy to be tested for compliance with FCC rules. These rules are contained in the Code of Federal Regulations (CFR), Title 47. The first volume of CFR 47 contains parts 0-19. The sections you will be dealing with throughout the approval process are primarily Part 2 and Part 15. Part 2 deals with issues of marking and authorization. Part 15 deals with the operational aspects and requirements for devices that emit RF energy and are to be operated without the end user needing a license. It is strongly recommended that you obtain a full copy of the code from your local government bookstore, the Government Printing office, or the FCC website." />
                      <outline text="Issues such as frequency selection, antenna compliance, and output power are covered elsewhere, therefore this section moves past those issues to the specific steps involved in the approval process." />
                      <outline text="Step one: lab selection" />
                      <outline text="The FCC requires that final product testing be conducted by a registered testing facility. Labs that have indicated they are available to perform Part 15 testing for the public are listed on the Domestic Testing Facilities list." />
                      <outline text="The quality and competence of labs varies widely. Labs appearing on the list are independent. Linx is pleased to make recommendations of test facilities believed to be competent; however, it is the sole responsibility of applicants to select a test lab capable of measuring their specific device." />
                      <outline text="To pay or not to pay" />
                      <outline text="Once you have chosen a lab, you must decide the extent of the services they will provide. Lab services range from basic testing, to full compliance testing and filing." />
                      <outline text="Our advice? Have the lab do as much as possible. Taking time to understand the subtleties of the filing process in the middle of trying to get a product to market is a bad idea. Saving a little money doing things yourself can end up costing far more than you save and in some cases might jeopardize your ability to receive approval." />
                      <outline text="Step two: registering" />
                      <outline text="When your product is completed and ready for testing a Federal Registration Number (FRN) must be obtained. This is free and can be obtained online." />
                      <outline text="Next, request a grantee code from the FCC. This can also be done online. The grantee code costs $60 and must be paid within thirty days of the application. Form 159 is used for this and can be done online or printed and mailed." />
                      <outline text="Step three: testing" />
                      <outline text="As previously mentioned, the FCC requires that final product testing be done in a registered test facility. Here, such items as output power, harmonics, and spurious emissions will be tested. This facility will perform separate measurements on the transmitter and receiver as the transmitter and receiver require different types of authorizations from the FCC. The testing will usually take less than two weeks, but the actual time will depend on the test lab&apos;s backlog and schedule. It is a good idea to contact the lab well in advance to make them aware of your project and secure a spot in their testing schedule." />
                      <outline text="In order to have the best chance at approval it is important to explain the intended function of the product and any special operating characteristics to test lab personnel. If you are using a module that uses a keyed modulation method such as ASK/OOK, be sure your lab remembers to measure or calculate average power, not peak." />
                      <outline text="The test lab will require a number of items to complete the filing. These items will often include:" />
                      <outline text="A letter appointing the test lab as your technical agent for certification. The labs will provide a sample letter.The FCC ID Number of the unit. The first three digits are the grantee code obtained earlier. The last 14 digits are up to the applicant.A sketch of the location of the FCC label on your unit as well as a sketch (with dimensions) of the label itself.A block diagram of the unit showing all clock oscillators and their frequencies of operation. The signal path and frequency should be shown at each block.Full schematic diagram.The user&apos;s manual.A brief, non-technical description of the product and its operation.A product sample for testing and photos.Transmitter testingA product containing a Linx transmitter is considered by the FCC to be an intentional radiator because it intentionally emits RF energy into free space. Thus, it must be tested and certified before it may be marketed." />
                      <outline text="Certified transmitters are required to have two labels attached: an FCC ID label and a compliance label. The FCC ID label identifies the FCC equipment authorization file associated with the transmitter, while the compliance label indicates to the consumer that the transmitter may not cause, nor is it protected from, harmful interference. These labels may be combined for convenience." />
                      <outline text="Receiver declaration of conformity" />
                      <outline text="A receiver is considered an unintentional radiator because, while not specifically designed to radiate RF energy, RF radiation may occur. For this reason the receiver must be tested and authorized by a Declaration of Conformity (DoC). In this simple process an accredited laboratory tests the product to ensure compliance with FCC standards. An FCC filing or submittal is not required unless specifically requested pursuant to Section 2.1076. The test results should be maintained within the applicant&apos;s files." />
                      <outline text="Conforming products are also required to have a compliance label attached to all items subsequently manufactured or marketed by the responsible party." />
                      <outline text="Filing confidentiality" />
                      <outline text="Filing for confidentiality is an important and often overlooked issue. Unless otherwise requested the entire contents of your filing will become public information. You may request confidentiality pursuant to 47 CFR 0.459, which can prevent such proprietary items as schematic diagrams from falling into the hands of competitors. When confidentiality is requested, please label all items that are to be kept confidential from the general public &apos;&apos;CONFIDENTIAL.&apos;&apos; Items that cannot be given confidentiality are: (1) photos of a device (anyone who purchases a device will know what it looks like), (2) test results (the public has a right to review a test report showing compliance with the FCC regulations) and (3) the user&apos;s manual. In general, the only information that is granted confidentiality is patented trade-secret information that if given out could harm a company financially." />
                      <outline text="Step four: The filing process" />
                      <outline text="The FCC greatly streamlined the approval process. Certifications were once issued by the FCC directly, but independent testing laboratories are now allowed to issue certification though the Telecommunication Certification Body (TCB) program. They can also issue certifications for other countries with which the US has a Mutual Recognition Agreement (MRA). TCB&apos;s must be accredited and comply with Section 2.962." />
                      <outline text="The filing process is usually done by the test lab as a part of their service. The lab will compile the test report, photographs, and other items listed above. The TCB will review all application materials and, if the device conforms to the requirements, they will upload this information to the FCC. After the FCC receives the report they will add the product and the ID number to their database and their website and issue a Grant of Certification. At this point, the device can be legally marketed and sold. After certification, the FCC or the TCB may request a sample of the product to confirm ongoing FCC compliance." />
                      <outline text="Consideration for operation within the 260-470 MHz band" />
                      <outline text="Introduction" />
                      <outline text="This section is designed to give the reader a basic understanding of the legal and technical considerations for operation of RF devices in the 260-470 MHz band within the United States. The use of these frequency bands varies considerably worldwide, so it should be recognized that this application note is intended for designers utilizing Linx RF modules and planning to operate in the United States." />
                      <outline text="When working with RF, a clear distinction should always be made between what is technically possible and what is legally acceptable. Achieving a solution that meets technical objectives but cannot be legally sold or operated serves little use. As such, issues of legality should be given high priority." />
                      <outline text="Legal considerations" />
                      <outline text="In the United States, the Federal Communications Commission (FCC) is responsible for the regulation of all RF devices. These regulations are contained in the Code of Federal Regulations (CFR), Title 47. Title 47 is made up of numerous volumes; however, all regulations applicable to operation in the 260-470 MHz band are contained in volume 0-19. It is strongly recommended that a copy be obtained and reviewed in its entirety. You can get a full copy of the code from your local government bookstore, the Government Printing office in Washington, or the FCC website." />
                      <outline text="What is unlicensed operation?" />
                      <outline text="Certain bands within the RF spectrum are available for &apos;&apos;unlicensed&apos;&apos; operation. The term &apos;&apos;unlicensed&apos;&apos; is often misunderstood. The manufacturer of a product designed for &apos;&apos;unlicensed&apos;&apos; operation is not exempt from testing and/or certification. Indeed, both the transmitter and receiver must be tested by a qualified testing laboratory. However, once this has been done and any necessary approvals received, the end user of the product can then operate it without obtaining a license for its use." />
                      <outline text="Receiver procedure" />
                      <outline text="The approval procedures for transmitters and receivers are quite different. The receiver is considered an unintentional radiator and is subject to authorization under the Declaration of Conformity process. This is a simple process in which an accredited laboratory tests the product to ensure that the equipment complies with FCC standards. The test results should be maintained within your files but an FCC filing or submittal is not required unless specifically requested pursuant to Section 2.1076." />
                      <outline text="Following successful completion of this process, the end product should be labeled as prescribed by the FCC." />
                      <outline text="Transmitter procedure" />
                      <outline text="The transmitter is an intentional radiator and subject to certification. Certification testing should be performed by properly approved laboratory. In most cases you do not need to be present for testing and your chosen laboratory will prepare the filing paperwork. Certifications were once issued by the FCC directly, but now independent laboratories are allowed to issue certification though the Telecommunication Certification Body (TCB) program which has streamlined the process." />
                      <outline text="Following successful testing, a report will be produced showing information about the testing and your device. A label displaying your FCC ID number along with FCC prescribed information will need to be placed on your certified product." />
                      <outline text="The rules for transmitters operating in the 260-470 MHz band are governed by Part 15.231. In some bands the FCC specifies only fundamental power, harmonic levels, and allowed bandwidth. However, in the case of the 260-470 MHz band, the FCC also considers factors such as the intended application and transmission duration." />
                      <outline text="You will want to review the text of 15.231 in its entirety. When reviewing this section, it is critical to read paragraphs (A)-(D) as a unit, and recognize that paragraph (E) only applies if the rules of paragraph (A) cannot be met. Given the rules&apos; complexity and application-dependent nature, they are best illustrated in Figure 1." />
                      <outline text="Functional Requirements" />
                      <outline text="Once you are certain your application is allowed in principle, you will want to focus on understanding the specific functional requirements that must be met in order for your product to receive certification." />
                      <outline text="Determine and comply with allowed output power" />
                      <outline text="Figure 2 shows the relationship between the fundamental frequency of operation and the allowed output power. Since the output power is allowed to climb as the frequency increases, it might appear that selecting the highest frequency would give the best range performance. This is not the case, however, since free space attenuation increases proportional to frequency. Thus, the regulations equalize the bands propagation characteristics. Antenna size and efficiency should also be considered. Compact or reduced sized antennas will generally not be as efficient at the lower parts of the band." />
                      <outline text="It is always important to note that the RF level radiated into free space is dependent not only on raw output power, but also factors such as the type of antenna employed, circuit layout and ground plane. Most transmitter modules, including those manufactured by Linx, are capable of producing non-compliant output levels. This extra power helps designers overcome inefficient antenna styles and allows them to take advantage of the FCC&apos;s averaging allowance when modulation techniques such as ASK/OOK are employed. If the module is matched to an efficient antenna, the output power may need to be reduced using the module&apos;s level adjust or an external attenuation pad. For further details, review Linx Application Note #00150." />
                      <outline text="Figure 1: The Part 15 approval process." />
                      <outline text="Figure 2: Frequency of operation versus output power." />
                      <outline text="In addition to fundamental output power restrictions, the FCC also regulates allowed harmonic levels and occupied bandwidth." />
                      <outline text="Since this article is oriented toward users of Linx products, little detail is needed on these points as Linx modules are designed to meet these requirements. It is important, however, to note that there are ways in which a user can adversely affect harmonic content, including the use of a poorly matched or tuned antenna, supply/system noise, or layout or bypass issues." />
                      <outline text="While these considerations of legality may appear formidable, they generally are not. By choosing a correct operational frequency and using a pre-made RF module, a product designer&apos;s burden is greatly reduced. With proper attention to such basics as good layout, clean supply lines, and a properly matched antenna, RF success can be a nearly painless process." />
                      <outline text="Now that your application has hopefully survived the legal considerations outlined above, let&apos;s consider the actual technical issues of operation in these frequencies." />
                      <outline text="Benefits of operation in the 260-470 MHz band" />
                      <outline text="First, it should be recognized that the unusual restrictions placed on the band by the FCC do more than just make a designer&apos;s life miserable. The random periodic nature of transmissions resulting from these restrictions helps to keep this set of frequencies clear of sustained interference. Other Part 15 bands are potentially crowded with continuous transmissions of voice, data, video, and even microwave ovens." />
                      <outline text="Second, longer transmission distances are achieved with less power. The free space propagation of frequencies in this range is significantly better than at higher frequencies such as 900 MHz or 2.4 GHz. Therefore, lower output power is needed to attain any particular distance and power consumption is significantly reduced." />
                      <outline text="Third is cost effectiveness. The components used at these frequencies are lower in cost than those designed for higher frequencies." />
                      <outline text="Fourth is international regulatory compatibility. If your product will be sold abroad, you will want to plan for international compatibility. Band allocation and regulations vary from country to country. For additional information you may wish to refer to Linx Application Note #129." />
                      <outline text="Common frequencies within the band and their uses" />
                      <outline text="As you review Linx product offerings, you will notice three standard frequencies within the 260-470 MHz band. These frequencies are 315, 418, and 433.92 MHz." />
                      <outline text="315 MHz is commonly used for gate/garage door openers, security, and keyless entry systems.418 MHz is a very clean frequency here in the US and also appropriate for operation in Canada.433.92 MHz is used throughout all of Europe. While it is allowable for use here in the US and Canada, interference from amateur radio, the nearby pager band and active RFID tags may sometimes pose a problem.SummaryThe 260-470 MHz band is ideal for transmitting control, command, or status signals. It should also be given consideration for control signals accompanied by data such as time, temperature, or pressure." />
                      <outline text="Considerations for operation within the 902-928 MHz band" />
                      <outline text="Introduction" />
                      <outline text="This section is designed to give the reader a basic understanding of the legal and technical considerations for operation of RF devices in the 902-928 MHz band. The use of these frequency bands varies considerably worldwide, so it should be recognized that this application note is intended for designers utilizing Linx RF modules and planning for operation within the United States." />
                      <outline text="When working with RF, a clear distinction should always be made between what is technically possible and what is legally acceptable. Achieving a solution that meets technical objectives but cannot be legally sold or operated serves little use. As such, issues of legality should be given high priority." />
                      <outline text="Legal considerations" />
                      <outline text="In the United States, the Federal Communications Commission (FCC) is responsible for the regulation of all RF devices. These regulations are contained in the Code of Federal Regulations (CFR), Title 47. Title 47 is made up of numerous volumes; however, all regulations applicable to operation in the 902-928 MHz band are contained in volume 0-19. It is strongly recommended that a full copy of the code be obtained from your local government bookstore, the Government Printing office, or the FCC website." />
                      <outline text="What is unlicensed operation?" />
                      <outline text="Certain bands within the RF spectrum are available for &apos;&apos;unlicensed&apos;&apos; operation. The term &apos;&apos;unlicensed&apos;&apos; is often misunderstood. The manufacturer of a product designed for &apos;&apos;unlicensed&apos;&apos; operation is not exempt from testing and/or certification. Indeed, both the transmitter and receiver must be tested by a qualified testing laboratory. However, once the necessary approvals are received, the end user can then operate the product without further obligation or licensing." />
                      <outline text="The frequencies from 902-928MHz are allocated for a wide variety of unlicensed applications. These include unlicensed products operating under Part 15 as well as Part 18 Industrial/Scientific/Medical (ISM) devices." />
                      <outline text="What must I do to be unlicensed?" />
                      <outline text="Part 15 requirements for many bands are somewhat obscure and difficult to interpret. Thankfully, the regulations of Part 15 for the 902-928 MHz band are very straightforward. There are no restrictions on the application, content or duration of transmissions, only on factors such as power output, bandwidth, harmonic and spurious emissions." />
                      <outline text="While Linx modules are inherently designed to meet these requirements, it is important to note that external factors such as layout, antenna type, and output power can affect both the module&apos;s performance and compliance. While these issues may appear formidable, they are generally not. By choosing the correct operational frequency and using a pre-made RF module, a product designer&apos;s burden is greatly reduced. Since the approval procedures for transmitters and receivers are quite different, let&apos;s look at each separately." />
                      <outline text="Receiver procedure" />
                      <outline text="The receiver is considered an unintentional radiator and is subject to authorization under the Declaration of Conformity process. This is a simple process in which an accredited laboratory tests the product to ensure that the equipment complies with all applicable FCC standards. An FCC filing or submittal is not required unless specifically requested pursuant to Section 2.1076. The test results should be maintained within the applicant&apos;s files." />
                      <outline text="Following successful completion of this process, the end product should be labeled as prescribed by the FCC." />
                      <outline text="Transmitter procedure" />
                      <outline text="The transmitter is an intentional radiator and subject to certification. In most instances, users of modules manufactured by Linx will seek certification under part 15.247 for Spread Spectrum modules or under 15.249 for narrowband modules. An exception to this is RF modules which have been pre-certified by Linx under the modular approval process. In instances where certification is required, testing will need to be performed by a properly approved laboratory. In most cases it is not necessary to be present for testing and the laboratory will prepare the filing paperwork. Certifications were once issued by the FCC directly, but now independent laboratories are allowed to issue certification though the Telecommunication Certification Body (TCB) program which has greatly streamlined the process." />
                      <outline text="Following successful testing, a report will be produced showing information about the testing and the device. A label displaying the applicant&apos;s FCC ID number along with FCC prescribed information will need to be placed on the certified product." />
                      <outline text="Now that a basic overview of legal issues has been covered, it is time to consider the technical issues of operation in these frequencies." />
                      <outline text="Benefits of operation within the 902-928 MHz band" />
                      <outline text="The first benefit of the 902-928 MHz band is freedom from the tight limitations and application restrictions the FCC places on some other bands. In this band virtually any analog or digital signal can be sent without restrictions on content or duration." />
                      <outline text="Second, higher legal output power allows the potential for much longer transmission distances." />
                      <outline text="Third, the propagation of frequencies in the 900 MHz range is better than at higher frequencies such as 2.4 GHz. Therefore, lower output power is needed to attain any particular distance, reducing transmitter power consumption." />
                      <outline text="Fourth is antenna size and compactness. A useful byproduct of higher frequency is shorter wavelength. This allows a 1/4-wave antenna in the 900 MHz range to typically be less than 3.25 inches in length. In fact, Linx&apos;s Antenna Factor division offers tiny surface mount antennas that are less than 0.65 inches in length, allowing for easy concealment in compact portable products." />
                      <outline text="Drawbacks to the 902-928 MHz band" />
                      <outline text="The first drawback is the band&apos;s popularity (good in rock and roll, bad in RF). Products such as cordless phones have migrated to higher frequencies, but the growth of wireless and the benefits of the band make it likely to remain crowded." />
                      <outline text="Second is the potential for higher level interferers. In addition to its allocation for narrow-band devices, the 902-928 MHz frequency range is also allocated for higher power devices. While Linx employs a variety of techniques to minimize the possible impact of such interference, it should be considered." />
                      <outline text="Third is export. Allowed uses of the 900 MHz band vary outside the US and a products operation may not be legally allowable in other areas. Fortunately, nearby frequencies are standardized in the large European market. Linx offers a selection of footprint compatible products which accommodate domestic and export requirements with just a change of modules and antennas. For additional information you may wish to refer to Linx Application Note #129. Check the regulations for each country to which export is desired in order to assure the product will be legal." />
                      <outline text="Summary" />
                      <outline text="The 902-928 MHz band is highly favorable due to minimal legal restrictions and excellent propagation characteristics. It is an ideal choice for analog or digital links, especially those that require reliability over long distances or which might be prohibited in other bands." />
                      <outline text="For additional information on FCC regulations you may wish to contact the FCC directly." />
                      <outline text="Federal Communications CommissionOffice of Engineering and Technology7435 Oakland Mills RoadColumbia, MD 21046Phone: (301) 362-3000Fax: (301) 344-2050E-mail: labhelp@fcc.govYou may also wish to visit the Linx Technologies website at www.linxtechnologies.com. where a list of testing facilities and applicable sections of FCC regulations are available for review and download.Frequently asked questions" />
                      <outline text="How can I obtain more information on the approval process?" />
                      <outline text="You may wish to obtain additional literature and application notes from Linx by visiting our website at www.linxtechnologies.com. You may also visit the FCC&apos;s website at www.fcc.gov, email them at fccinfo@fcc.gov or call them at 1-888-CALL-FCC." />
                      <outline text="Where can I obtain a copy of the FCC Rules and Regulations?" />
                      <outline text="The Rules and Regulations can be found online at:" />
                      <outline text="http://www.fcc.gov/searchtools.html#rulesCFR Title 47, Parts 2 and 15 cover the use of Linx products. Excerpts from these parts are contained in this document. For a paper copy, you should go to the Government Printing Office&apos;s website at:http://bookstore.gpo.gov/" />
                      <outline text="and indicate that you need a copy of Title 47 of the Code of Federal Regulations (47CFR). If your need is for equipment authorization, you will require Volume 1, which contains Parts 0-19. Their telephone number is 866-512-1800 and email is ContactCenter@gpo.gov. You can also contact the Government Printing Office (GPO) in your local area for a copy of the rules. The telephone number for the GPO in your local area can be obtained from your telephone directory or operator, listed under the Federal Government." />
                      <outline text="I wish to locate a test laboratory in my area. Is there a list of laboratories in my area?" />
                      <outline text="The FCC Laboratory makes available such a listing and it is updated monthly. This information is online." />
                      <outline text="How long will it take to receive an approval?" />
                      <outline text="The testing will depend on the current backlog of the test facility that you choose. If your product passes the testing, the TCB will generally issue a Grant of Certification within a few days." />
                      <outline text="What does testing and certification cost?" />
                      <outline text="This depends largely on the test lab and how many of their services you choose to utilize. Full transmitter and receiver testing can cost around $5,000, transmitter only around $3,500, and the receiver about $1,500. The entire process can now be rapidly completed and many labs can perform other testing at the same time." />
                      <outline text="What if my application is denied and I don&apos;t think the FCC correctly understood my product?" />
                      <outline text="The FCC sees thousands of applications a year. Depending on your presentation, an inspector may misinterpret information. It is possible. If you feel you have fairly complied with the regulations, you will want to exercise your rights in accordance with CFR 47 2.923 and petition for reconsideration and review." />
                      <outline text="What happens if I change my design? Like a case, board or antenna?" />
                      <outline text="For certified equipment (generally your transmitter), the holder of the grant of certification, or the holder&apos;s agent, can make minor modifications to the circuitry, appearance, or other design aspects of the transmitter. Minor modifications are divided into two categories: Class I Permissive Changes and Class II Permissive Changes. Major changes are not permitted." />
                      <outline text="Minor changes that do not increase the radio frequency emissions from the transmitter do not require the grantee to file any information with the FCC. These are called Class I Permissive Changes (Note: if a Class I Permissive Change causes your product to look different from the one that was certified, it is strongly suggested that photos of the modified transmitter be filed with the FCC)." />
                      <outline text="Minor changes that increase the radio frequency emissions from the transmitter require the grantee to file complete information about the change along with results of tests showing that the equipment continues to comply with FCC technical standards. In this case, the modified equipment may not be marketed under the existing grant of certification prior to acknowledgement by the Commission that the change is acceptable. These are called Class II Permissive Changes." />
                      <outline text="Major changes require that a new grant be obtained by submitting a new application with complete test results. Some examples of major changes include changes to the basic frequency determining and stabilizing circuitry; changes to the frequency multiplication stages or basic modulator circuit; and major changes to the size, shape, or shielding properties of the case." />
                      <outline text="No changes are permitted to certified equipment by anyone other than the grantee or the grantee&apos;s designated agent except that changes to the FCC ID without any other changes to the equipment may be performed by anyone." />
                      <outline text="The receiver is covered by a Declaration of Conformity (DoC), which states that the product was tested by the Grantee and found to comply with the applicable technical standards. The test data should be kept on file by the responsible party as defined in CFR 47 2.209, but nothing is actually filed with the FCC. This means that you will just need to have data on your product on file that shows that the modified product still complies with the regulations. Nothing needs to be filed with the FCC for changes in products covered by a DoC." />
                      <outline text="Where can I look up information on equipment if I know the FCC ID number?" />
                      <outline text="The FCC maintains a database that can be searched on the Internet. The database contains information on all equipment that was granted through the Equipment Authorization process." />
                      <outline text="What happens if one sells or uses noncompliant low-power transmitters?" />
                      <outline text="Bad idea. The FCC rules are designed to control the marketing of low-power transmitters and, to a lesser extent, their use. The act of selling or leasing, offering to sell or lease, or importing a low-power transmitter that has not gone through the appropriate FCC equipment authorization procedure is a violation of the Commission&apos;s rules and federal law. Violators may be subject to an enforcement action by the Commission&apos;s Field Operations Bureau that could result in:" />
                      <outline text="Forfeiture of all non-compliant equipment.A $100,000/$200,000 criminal penalty for an individual or organization.A criminal fine totaling twice the gross gain obtained from sales of the non-compliant equipment.An administrative fine totaling $10,000/day per violation, up to a maximum of $75,000.What if my intended use or application does not seem to have been clearly addressed by the FCC?Recognizing that new uses of low-power transmitters often generate questions that are not directly addressed in the regulations, the FCC generally welcomes inquiries or requests for specific interpretations. Occasionally, the FCC proposes changes to its regulations, generally to address industry concerns and/or as new uses of low-power transmission equipment appear. Any questions can be directed to the FCC at fccinfo@fcc.gov or 1-888-CALL-FCC." />
                      <outline text="How close to the products tested are production units required to be?" />
                      <outline text="In the FCC&apos;s own word: identical. However, &apos;&apos;identical&apos;&apos; is further defined as identical within the variations that can be expected to arise as a result of quantity-production techniques. One of the advantages of using Linx modules is the tight production control and testing procedures to which the modules are subjected. Similar controls over the rest of your product&apos;s production will make compliance with these requirements straightforward." />
                      <outline text="Does the receiver need to be certified?" />
                      <outline text="The receivers must be issued a Declaration of Conformity (DoC) by an accredited test lab. This is far less complicated and expensive than a transmitter certification. There is not an actual filing with the FCC. Just keep these documents in your company files." />
                      <outline text="This document is not endorsed nor approved by the FCC and no affiliation between Linx and the FCC is meant to be inferred." />
                      <outline text="Powered By" />
                      <outline text="Disclaimer: The opinions, beliefs, and viewpoints expressed by the various authors and/or forum participants on this website do not necessarily reflect the opinions, beliefs, and viewpoints of Digi-Key Corporation or official policies of Digi-Key Corporation.Discover the benefits of becoming a My Digi-Key registered user.  &apos;  Enjoy faster, easier ordering with your information preloaded.  &apos;  View your order status, web order history  &apos;  Use our BOM Manager tool  &apos;  Import a text file into a RoHS query" />
              </outline>

              <outline text="EMC for Product Designers, Fourth Edition:Amazon:Books">
                      <outline text="Link to Article" type="link" url="http://www.amazon.com/gp/aw/d/0750681705/ref=redir_mdp_mobile?tag=stackoverfl08-20" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376617347_d8emknx8.html" />
      <outline text="Fri, 16 Aug 2013 01:42" />
                      <outline text="" />
                      <outline text="EMC for Product Designers, Fourth Edition (Paperback)" />
                      <outline text="Tim Williams" />
                      <outline text="List Price: $79.95Price: $65.64 You Save: $14.31(18%)Only 9 left in stock - order soonFree ShippingShips from and sold by Amazon.comGift-wrap available. Want it delivered by Monday, Aug 19? Order within 41hr 17min, and choose One-Day Shipping at checkout." />
                      <outline text="ShareAverage Customer Rating: 4.8 / 5.0View Customer ReviewsEditorial ReviewsProduct Details" />
                      <outline text="Frequently Bought TogetherBuy this with Electromagnetic Compatibility Engineering (Hardcover) todayBuy Together Today: $176.96Total List Price: $219.95You Save: $42.99 (20%)" />
                      <outline text="Marketplace offersNew from $57.63Used from $54.80" />
                      <outline text="Search" />
                      <outline text="CartYour Account1-Click SettingsWish ListFind a Wish List or RegistrySign OutHelpHomeLegal Terms" />
                      <outline text="v" />
              </outline>

              <outline text="Which products should have FCC certification and about how much does that cost? - Electrical Engineering Stack Exchange">
                      <outline text="Link to Article" type="link" url="http://electronics.stackexchange.com/questions/5196/which-products-should-have-fcc-certification-and-about-how-much-does-that-cost" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1376617315_UUz5tjYN.html" />
      <outline text="Fri, 16 Aug 2013 01:41" />
                      <outline text="" />
                      <outline text="As a rough estimate, the cost is $10k-20k, plus your labor cost." />
                      <outline text="In the US, all products containing electronics that oscillate above 9 kHz must be certified. The law that governs this is FCC Part 15. The lawyers call this &quot;Title 47 CFR Part 15,&quot; meaning that it is the 15th subsection of the 47th section of the Code of Federal Regulations. In Europe, there is a similar regulation called CISPR 22. The requirements are almost the same, but slightly stricter about emissions at certain frequencies." />
                      <outline text="You can read 47 CFR 15 online. It&apos;s not as incomprehensible as you might expect. It seems overwhelming, but if you read the first few PDF&apos;s, you&apos;ll realize that most of it irrelevant for any single product." />
                      <outline text="Within 47 CFR 15, there are two classes of testing: Class A and Class B. Class A is an easier test to pass, intended for devices that are used in industrial settings. Class B is stricter, intended for devices that are targeted at consumers." />
                      <outline text="There is additional testing for &quot;intentional radiators,&quot; meaning radios, Wi-fi, Bluetooth and such. There may be an exception if your device is intended for use as a component in a larger system (like a microprocessor or memory card in a PC), but I&apos;m not sure of the legal details there." />
                      <outline text="The major expense is renting the test chamber. This is what&apos;s called an &quot;anechoic chamber,&quot; instrumented with a pile of sensors for detecting electromagnetic radiation. To my knowledge, these cost around $1000/hour, and each testing session takes 2 or 3 hours. It&apos;s unlikely, but not impossible, that you will pass on the first try." />
                      <outline text="Here&apos;s a decent picture of a test chamber. The one I&apos;ve been in was actually much larger, like a squash court. I think it was an Intertek facility in Menlo Park, CA." />
                      <outline text="Unless you&apos;re experienced with emissions testing, it is worth hiring an expert, which costs around $500/hour. They can tell you things like, &quot;Put a ferrite bead on that power cable, and that will reduce the emissions at this frequency.&quot; The folks I&apos;ve worked with arrive with a bunch of ferrite beads and inductors (and maybe caps?) of various sizes that you can use in the chamber to hack your device into compliance." />
                      <outline text="(Perhaps it goes without saying, but I&apos;m an engineer, not a lawyer. I have taken a few products through Part 15, but not in the last couple of years.)" />
                      <outline text="If you&apos;re thinking about doing this, start by reading EMC for Product Designers by Tim Williams. I&apos;d avoid the books by Mark I. Montrose; I found them less helpful and more expensive." />
              </outline>
      </body>
  </opml>