<?xml version="1.0" encoding="ISO-8859-1"?>
<!-- OPML generated by Freedom Controller v0.5.4 on Sun, 03 Nov 2013 15:39:44 +0000 -->
<opml version="2.0">

      <head>
        <title>What Adam Curry is reading</title>
        <dateCreated>Sun, 03 Nov 2013 14:09:55 +0000</dateCreated>
        <dateModified>Sun, 03 Nov 2013 14:09:55 +0000</dateModified>
        <ownerName>Adam Curry</ownerName>
        <ownerId>669</ownerId>
        <expansionState></expansionState>
        <expansionState></expansionState>
        <vertScrollState>1</vertScrollState>
        <windowTop>146</windowTop>
        <windowLeft>107</windowLeft>
        <windowBottom>468</windowBottom>
        <windowRight>560</windowRight>
      </head>

      <body>
              <outline text="VIDEO-No Morsel Too Minuscule for All-Consuming N.S.A. - NYTimes.com">
                      <outline text="Link to Article" type="link" url="http://mobile.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html?hp&amp;_r=1&amp;pagewanted=all" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383487795_Hc3LbF6r.html" />
      <outline text="Sun, 03 Nov 2013 14:09" />
                      <outline text="" />
                      <outline text="When Ban Ki-moon, the United Nations secretary general, sat down with President Obama at the White House in April to discuss Syrian chemical weapons, Israeli-Palestinian peace talks and climate change, it was a cordial, routine exchange." />
                      <outline text="The National Security Agency nonetheless went to work in advance and intercepted Mr. Ban&apos;s talking points for the meeting, a feat the agency later reported as an &apos;&apos;operational highlight&apos;&apos; in a weekly internal brag sheet. It is hard to imagine what edge this could have given Mr. Obama in a friendly chat, if he even saw the N.S.A.&apos;s modest scoop. (The White House won&apos;t say.)" />
                      <outline text="But it was emblematic of an agency that for decades has operated on the principle that any eavesdropping that can be done on a foreign target of any conceivable interest &apos;-- now or in the future &apos;-- should be done. After all, American intelligence officials reasoned, who&apos;s going to find out?" />
                      <outline text="From thousands of classified documents, the National Security Agency emerges as an electronic omnivore of staggering capabilities, eavesdropping and hacking its way around the world to strip governments and other targets of their secrets, all the while enforcing the utmost secrecy about its own operations. It spies routinely on friends as well as foes, as has become obvious in recent weeks; the agency&apos;s official mission list includes using its surveillance powers to achieve &apos;&apos;diplomatic advantage&apos;&apos; over such allies as France and Germany and &apos;&apos;economic advantage&apos;&apos; over Japan and Brazil, among other countries." />
                      <outline text="ALLIES AND SPY TARGETS President Obama with other G-20 leaders in St. Petersburg, Russia, in early September, standing between President Dilma Rousseff of Brazil, left, and Chancellor Angela Merkel of Germany." />
                      <outline text="Stephen Crowley / The New York Times" />
                      <outline text="Mr. Obama found himself in September standing uncomfortably beside the president of Brazil, Dilma Rousseff, who was furious at being named as a target of N.S.A. eavesdropping. Since then, there has been a parade of such protests, from the European Union, Mexico, France, Germany and Spain. Chagrined American officials joke that soon there will be complaints from foreign leaders feeling slighted because the agency had not targeted them." />
                      <outline text="James R. Clapper Jr., the director of national intelligence, has repeatedly dismissed such objections as brazen hypocrisy from countries that do their own share of spying. But in a recent interview, he acknowledged that the scale of eavesdropping by the N.S.A., with 35,000 workers and $10.8 billion a year, sets it apart. &apos;&apos;There&apos;s no question that from a capability standpoint we probably dwarf everybody on the planet, just about, with perhaps the exception of Russia and China,&apos;&apos; he said." />
                      <outline text="Since Edward J. Snowden began releasing the agency&apos;s documents in June, the unrelenting stream of disclosures has opened the most extended debate on the agency&apos;s mission since its creation in 1952. The scrutiny has ignited a crisis of purpose and legitimacy for the N.S.A., the nation&apos;s largest intelligence agency, and the White House has ordered a review of both its domestic and its foreign intelligence collection. While much of the focus has been on whether the agency violates Americans&apos; privacy, an issue under examination by Congress and two review panels, the anger expressed around the world about American surveillance has prompted far broader questions." />
                      <outline text="If secrecy can no longer be taken for granted, when does the political risk of eavesdropping overseas outweigh its intelligence benefits? Should foreign citizens, many of whom now rely on American companies for email and Internet services, have any privacy protections from the N.S.A.? Will the American Internet giants&apos; collaboration with the agency, voluntary or otherwise, damage them in international markets? And are the agency&apos;s clandestine efforts to weaken encryption making the Internet less secure for everyone?" />
                      <outline text="IN THE MIDEAST Iran&apos;s supreme leader, Ayatollah Ali Khamenei, fourth from left, was tracked in the country&apos;s north by the N.S.A." />
                      <outline text="Ayatollah Khamenei, via Twitter" />
                      <outline text="Matthew M. Aid, an intelligence historian and author of a 2009 book on the N.S.A., said there is no precedent for the hostile questions coming at the agency from all directions." />
                      <outline text="&apos;&apos;From N.S.A.&apos;s point of view, it&apos;s a disaster,&apos;&apos; Mr. Aid said. &apos;&apos;Every new disclosure reinforces the notion that the agency needs to be reined in. There are political consequences, and there will be operational consequences.&apos;&apos;" />
                      <outline text="A review of classified agency documents obtained by Mr. Snowden and shared with The New York Times by The Guardian, offers a rich sampling of the agency&apos;s global operations and culture. (At the agency&apos;s request, The Times is withholding some details that officials said could compromise intelligence operations.) The N.S.A. seems to be listening everywhere in the world, gathering every stray electron that might add, however minutely, to the United States government&apos;s knowledge of the world. To some Americans, that may be a comfort. To others, and to people overseas, that may suggest an agency out of control." />
                      <outline text="The C.I.A. dispatches undercover officers overseas to gather intelligence today roughly the same way spies operated in biblical times. But the N.S.A., born when the long-distance call was a bit exotic, has seen its potential targets explode in number with the advent of personal computers, the Internet and cellphones. Today&apos;s N.S.A. is the Amazon of intelligence agencies, as different from the 1950s agency as that online behemoth is from a mom-and-pop bookstore. It sucks the contents from fiber-optic cables, sits on telephone switches and Internet hubs, digitally burglarizes laptops and plants bugs on smartphones around the globe." />
                      <outline text="SCOLDED John Emerson, left, the American envoy to Germany." />
                      <outline text="Sean Gallup / Getty Images" />
                      <outline text="Mr. Obama and top intelligence officials have defended the agency&apos;s role in preventing terrorist attacks. But as the documents make clear, the focus on counterterrorism is a misleadingly narrow sales pitch for an agency with an almost unlimited agenda. Its scale and aggressiveness are breathtaking." />
                      <outline text="The agency&apos;s Dishfire database &apos;-- nothing happens without a code word at the N.S.A. &apos;-- stores years of text messages from around the world, just in case. Its Tracfin collection accumulates gigabytes of credit card purchases. The fellow pretending to send a text message at an Internet cafe in Jordan may be using an N.S.A. technique code-named Polarbreeze to tap into nearby computers. The Russian businessman who is socially active on the web might just become food for Snacks, the acronym-mad agency&apos;s Social Network Analysis Collaboration Knowledge Services, which figures out the personnel hierarchies of organizations from texts." />
                      <outline text="The spy agency&apos;s station in Texas intercepted 478 emails while helping to foil a jihadist plot to kill a Swedish artist who had drawn pictures of the Prophet Muhammad. N.S.A. analysts delivered to authorities at Kennedy International Airport the names and flight numbers of workers dispatched by a Chinese human smuggling ring." />
                      <outline text="The agency&apos;s eavesdropping gear, aboard a Defense Department plane flying 60,000 feet over Colombia, fed the location and plans of FARC rebels to the Colombian Army. In the Orlandocard operation, N.S.A. technicians set up what they called a &apos;&apos;honeypot&apos;&apos; computer on the web that attracted visits from 77,413 foreign computers and planted spyware on more than 1,000 that the agency deemed of potential future interest." />
                      <outline text="EARS ON THE WORLD The National Security Agency&apos;s complex at Fort Gordon, Ga. Much of the agency&apos;s eavesdropping is run from stations at home and abroad, far beyond its Maryland headquarters." />
                      <outline text="Google Earth" />
                      <outline text="The Global Phone Book" />
                      <outline text="No investment seems too great if it adds to the agency&apos;s global phone book. After mounting a major eavesdropping effort focused on a climate change conference in Bali in 2007, agency analysts stationed in Australia&apos;s outback were especially thrilled by one catch: the cellphone number of Bali&apos;s police chief." />
                      <outline text="&apos;&apos;Our mission,&apos;&apos; says the agency&apos;s current five-year plan, which has not been officially scheduled for declassification until 2032, &apos;&apos;is to answer questions about threatening activities that others mean to keep hidden.&apos;&apos;" />
                      <outline text="The aspirations are grandiose: to &apos;&apos;utterly master&apos;&apos; foreign intelligence carried on communications networks. The language is corporate: &apos;&apos;Our business processes need to promote data-driven decision-making.&apos;&apos; But the tone is also strikingly moralistic for a government bureaucracy. Perhaps to counter any notion that eavesdropping is a shady enterprise, signals intelligence, or Sigint, the term of art for electronic intercepts, is presented as the noblest of callings." />
                      <outline text="SPY CHIEF James R. Clapper Jr., the director of national intelligence, in September. He has strongly defended intelligence gathering practices." />
                      <outline text="Carolyn Kaster / Associated Press" />
                      <outline text="&apos;&apos;Sigint professionals must hold the moral high ground, even as terrorists or dictators seek to exploit our freedoms,&apos;&apos; the plan declares. &apos;&apos;Some of our adversaries will say or do anything to advance their cause; we will not.&apos;&apos;" />
                      <outline text="The N.S.A. documents taken by Mr. Snowden and shared with The Times, numbering in the thousands and mostly dating from 2007 to 2012, are part of a collection of about 50,000 items that focus mainly on its British counterpart, Government Communications Headquarters or G.C.H.Q." />
                      <outline text="While far from comprehensive, the documents give a sense of the agency&apos;s reach and abilities, from the Navy ships snapping up radio transmissions as they cruise off the coast of China, to the satellite dishes at Fort Meade in Maryland ingesting worldwide banking transactions, to the rooftops of 80 American embassies and consulates around the world from which the agency&apos;s Special Collection Service aims its antennas." />
                      <outline text="The agency and its many defenders among senior government officials who have relied on its top secret reports say it is crucial to American security and status in the world, pointing to terrorist plots disrupted, nuclear proliferation tracked and diplomats kept informed." />
                      <outline text="WINDOWS WITH VIEWS ON EVERYTHING Part of the National Security Agency&apos;s campus in Fort Meade, Md." />
                      <outline text="Patrick Semansky / Associated Press" />
                      <outline text="But the documents released by Mr. Snowden sometimes also seem to underscore the limits of what even the most intensive intelligence collection can achieve by itself. Blanket N.S.A. eavesdropping in Afghanistan, described in the documents as covering government offices and the hide-outs of second-tier Taliban militants alike, has failed to produce a clear victory against a low-tech enemy. The agency kept track as Syria amassed its arsenal of chemical weapons &apos;-- but that knowledge did nothing to prevent the gruesome slaughter outside Damascus in August." />
                      <outline text="The documents are skewed toward celebration of the agency&apos;s self-described successes, as underlings brag in PowerPoints to their bosses about their triumphs and the managers lay out grand plans. But they do not entirely omit the agency&apos;s flubs and foibles: flood tides of intelligence gathered at huge cost that goes unexamined; intercepts that cannot be read for lack of language skills; and computers that &apos;-- even at the N.S.A. &apos;-- go haywire in all the usual ways." />
                      <outline text="Mapping Message Trails" />
                      <outline text="In May 2009, analysts at the agency learned that Iran&apos;s supreme leader, Ayatollah Ali Khamenei, was to make a rare trip to Kurdistan Province in the country&apos;s mountainous northwest. The agency immediately organized a high-tech espionage mission, part of a continuing project focused on Ayatollah Khamenei called Operation Dreadnought." />
                      <outline text="Working closely with the National Geospatial-Intelligence Agency, which handles satellite photography, as well as G.C.H.Q., the N.S.A. team studied the Iranian leader&apos;s entourage, its vehicles and its weaponry from satellites, and intercepted air traffic messages as planes and helicopters took off and landed." />
                      <outline text="They heard Ayatollah Khamenei&apos;s aides fretting about finding a crane to load an ambulance and fire truck onto trucks for the journey. They listened as he addressed a crowd, segregated by gender, in a soccer field." />
                      <outline text="They studied Iranian air defense radar stations and recorded the travelers&apos; rich communications trail, including Iranian satellite coordinates collected by an N.S.A. program called Ghosthunter. The point was not so much to catch the Iranian leader&apos;s words, but to gather the data for blanket eavesdropping on Iran in the event of a crisis." />
                      <outline text="This &apos;&apos;communications fingerprinting,&apos;&apos; as a document called it, is the key to what the N.S.A. does. It allows the agency&apos;s computers to scan the stream of international communications and pluck out messages tied to the supreme leader. In a crisis &apos;-- say, a showdown over Iran&apos;s nuclear program &apos;-- the ability to tap into the communications of leaders, generals and scientists might give a crucial advantage." />
                      <outline text="On a more modest scale, the same kind of effort, what N.S.A. calls &apos;&apos;Sigint development,&apos;&apos; was captured in a document the agency obtained in 2009 from Somalia &apos;-- whether from a human source or an electronic break-in was not noted. It contained email addresses and other contact details for 117 selected customers of a Mogadishu Internet service, Globalsom." />
                      <outline text="While most on the list were Somali officials or citizens, presumably including some suspected of militancy, the document also included emails for a United Nations political officer in Mogadishu and a local representative for the charity World Vision, among other international institutions. All, it appeared, were considered fair game for monitoring." />
                      <outline text="This huge investment in collection is driven by pressure from the agency&apos;s &apos;&apos;customers,&apos;&apos; in government jargon, not only at the White House, Pentagon, F.B.I. and C.I.A., but also spread across the Departments of State and Energy, Homeland Security and Commerce, and the United States Trade Representative." />
                      <outline text="By many accounts, the agency provides more than half of the intelligence nuggets delivered to the White House early each morning in the President&apos;s Daily Brief &apos;-- a measure of success for American spies. (One document boasts that listening in on Nigerian State Security had provided items for the briefing &apos;&apos;nearly two dozen&apos;&apos; times.) In every international crisis, American policy makers look to the N.S.A. for inside information." />
                      <outline text="Pressure to Get Everything" />
                      <outline text="That creates intense pressure not to miss anything. When that is combined with an ample budget and near-invisibility to the public, the result is aggressive surveillance of the kind that has sometimes gotten the agency in trouble with the Foreign Intelligence Surveillance Court, a United States federal court that polices its programs for breaches of Americans&apos; privacy." />
                      <outline text="In the funding boom that followed the Sept. 11 attacks, the agency expanded and decentralized far beyond its Fort Meade headquarters in Maryland, building or expanding major facilities in Georgia, Texas, Colorado, Hawaii, Alaska, Washington State and Utah. Its officers also operate out of major overseas stations in England, Australia, South Korea and Japan, at overseas military bases, and from locked rooms housing the Special Collection Service inside American missions abroad." />
                      <outline text="The agency, using a combination of jawboning, stealth and legal force, has turned the nation&apos;s Internet and telecommunications companies into collection partners, installing filters in their facilities, serving them with court orders, building back doors into their software and acquiring keys to break their encryption." />
                      <outline text="But even that vast American-run web is only part of the story. For decades, the N.S.A. has shared eavesdropping duties with the rest of the so-called Five Eyes, the Sigint agencies of Britain, Canada, Australia and New Zealand. More limited cooperation occurs with many more countries, including formal arrangements called Nine Eyes and 14 Eyes and Nacsi, an alliance of the agencies of 26 NATO countries." />
                      <outline text="The extent of Sigint sharing can be surprising: &apos;&apos;N.S.A. may pursue a relationship with Vietnam,&apos;&apos; one 2009 G.C.H.Q. document reported. But a recent G.C.H.Q. training document suggests that not everything is shared, even between the United States and Britain. &apos;&apos;Economic well-being reporting,&apos;&apos; it says, referring to intelligence gathered to aid the British economy, &apos;&apos;cannot be shared with any foreign partner.&apos;&apos;" />
                      <outline text="As at the school lunch table, decisions on who gets left out can cause hurt feelings: &apos;&apos;Germans were a little grumpy at not being invited to join the 9-Eyes group,&apos;&apos; one 2009 document remarks. And in a delicate spy-versus-spy dance, sharing takes place even with governments that are themselves important N.S.A. targets, notably Israel." />
                      <outline text="The documents describe collaboration with the Israel Sigint National Unit, which gets raw N.S.A. eavesdropping material and provides it in return, but they also mention the agency&apos;s tracking of &apos;&apos;high priority Israeli military targets,&apos;&apos; including drone aircraft and the Black Sparrow missile system." />
                      <outline text="The alliances, and the need for stealth, can get complicated. At one highly valued overseas listening post, the very presence of American N.S.A. personnel violates a treaty agreed to by the agency&apos;s foreign host. Even though much of the eavesdropping is run remotely from N.S.A.&apos;s base at Fort Gordon, Ga., Americans who visit the site must pose as contractors, carry fake business cards and are warned: &apos;&apos;Don&apos;t dress as typical Americans.&quot;" />
                      <outline text="&apos;&apos;Know your cover legend,&apos;&apos; a PowerPoint security briefing admonishes the N.S.A. staff members headed to the overseas station, directing them to &apos;&apos;sanitize personal effects,&apos;&apos; send no postcards home and buy no identifiably local souvenirs. (&apos;&apos;An option might be jewelry. Most jewelry does not have any markings&apos;&apos; showing its place of origin.)" />
                      <outline text="Bypassing Security" />
                      <outline text="In the agency&apos;s early years, its brainy staff members &apos;-- it remains the largest employer of mathematicians in the country &apos;-- played an important role in the development of the first computers, then largely a tool for code breaking." />
                      <outline text="Today, with personal computers, laptops, tablets and smartphones in most homes and government offices in the developed world, hacking has become the agency&apos;s growth area." />
                      <outline text="Some of Mr. Snowden&apos;s documents describe the exploits of Tailored Access Operations, the prim name for the N.S.A. division that breaks into computers around the world to steal the data inside, and sometimes to leave spy software behind. T.A.O. is increasingly important in part because it allows the agency to bypass encryption by capturing messages as they are written or read, when they are not encoded." />
                      <outline text="In Baghdad, T.A.O. collected messages left in draft form in email accounts maintained by leaders of the Islamic State of Iraq, a militant group. Under a program called Spinaltap, the division&apos;s hackers identified 24 unique Internet Protocol addresses identifying computers used by the Lebanese militant group Hezbollah, making it possible to snatch Hezbollah messages from the flood of global communications sifted by the agency." />
                      <outline text="The N.S.A.&apos;s elite Transgression Branch, created in 2009 to &apos;&apos;discover, understand, evaluate and exploit&apos;&apos; foreign hackers&apos; work, quietly piggybacks on others&apos; incursions into computers of interest, like thieves who follow other housebreakers around and go through the windows they have left ajar." />
                      <outline text="In one 2010 hacking operation code-named Ironavenger, for instance, the N.S.A. spied simultaneously on an ally and an adversary. Analysts spotted suspicious emails being sent to a government office of great intelligence interest in a hostile country and realized that an American ally was &apos;&apos;spear-phishing&apos;&apos; &apos;-- sending official-looking emails that, when opened, planted malware that let hackers inside." />
                      <outline text="The Americans silently followed the foreign hackers, collecting documents and passwords from computers in the hostile country, an elusive target. They got a look inside that government and simultaneously got a close-up look at the ally&apos;s cyberskills, the kind of intelligence twofer that is the unit&apos;s specialty." />
                      <outline text="In many other ways, advances in computer and communications technology have been a boon for the agency. N.S.A. analysts tracked the electronic trail left by a top leader of Al Qaeda in Africa each time he stopped to use a computer on his travels. They correctly predicted his next stop, and the police were there to arrest him." />
                      <outline text="And at the big N.S.A. station at Fort Gordon, technicians developed an automated service called &apos;&apos;Where&apos;s My Node?&apos;&apos; that sent an email to an analyst every time a target overseas moved from one cell tower to another. Without lifting a finger, an analyst could follow his quarry&apos;s every move." />
                      <outline text="The Limits of Spying" />
                      <outline text="The techniques described in the Snowden documents can make the N.S.A. seem omniscient, and nowhere in the world is that impression stronger than in Afghanistan. But the agency&apos;s capabilities at the tactical level have not been nearly enough to produce clear-cut strategic success there, in the United States&apos; longest war." />
                      <outline text="A single daily report from June 2011 from the N.S.A.&apos;s station in Kandahar, Afghanistan, the heart of Taliban country, illustrates the intensity of eavesdropping coverage, requiring 15 pages to describe a day&apos;s work." />
                      <outline text="The agency listened while insurgents from the Haqqani network mounted an attack on the Hotel Intercontinental in Kabul, overhearing the attackers talking to their bosses in Pakistan&apos;s tribal area and recording events minute by minute. &apos;&apos;Ruhullah claimed he was on the third floor and had already inflicted one casualty,&apos;&apos; the report said in a typical entry. &apos;&apos;He also indicated that Hafiz was located on a different floor.&apos;&apos;" />
                      <outline text="N.S.A. officers listened as two Afghan Foreign Ministry officials prepared for a meeting between President Hamid Karzai of Afghanistan and Iranian officials, assuring them that relations with the United States &apos;&apos;would in no way threaten the interests of Iran,&apos;&apos; which they decided Mr. Karzai should describe as a &apos;&apos;brotherly country.&apos;&apos;" />
                      <outline text="The N.S.A. eavesdropped as the top United Nations official in Afghanistan, Staffan de Mistura, consulted his European Union counterpart, Vygaudas Usackas, about how to respond to an Afghan court&apos;s decision to overturn the election of 62 members of Parliament." />
                      <outline text="And the agency was a fly on the wall for a long-running land dispute between the mayor of Kandahar and a prominent local man known as the Keeper of the Cloak of the Prophet Muhammad, with President Karzai&apos;s late brother, Ahmed Wali Karzai, as a mediator." />
                      <outline text="The agency discovered a Taliban claim to have killed five police officers at a checkpoint by giving them poisoned yogurt, and heard a provincial governor tell an aide that a district police chief was verbally abusing women and clergymen." />
                      <outline text="A Taliban figure, Mullah Rahimullah Akhund, known on the United States military&apos;s kill-or-capture list by the code name Objective Squiz Incinerator, was overheard instructing an associate to buy suicide vests and a Japanese motorbike, according to the documents." />
                      <outline text="And N.S.A. listened in as a Saudi extremist, Abu Mughira, called his mother to report that he and his fellow fighters had entered Afghanistan and &apos;&apos;done victorious operations.&apos;&apos;" />
                      <outline text="Such reports flowed from the agency&apos;s Kandahar station day after day, year after year, and surely strengthened the American campaign against the Taliban. But they also suggest the limits of intelligence against a complex political and military challenge. The N.S.A. recorded the hotel attack, but it had not prevented it. It tracked Mr. Karzai&apos;s government, but he remained a difficult and volatile partner. Its surveillance was crucial in the capture or killing of many enemy fighters, but not nearly enough to remove the Taliban&apos;s ominous shadow from Afghanistan&apos;s future." />
                      <outline text="Mining All the Tidbits" />
                      <outline text="In the Afghan reports and many others, a striking paradox is the odd intimacy of a sprawling, technology-driven agency with its targets. It is the one-way intimacy of the eavesdropper, as N.S.A. employees virtually enter the office cubicles of obscure government officials and the Spartan hide-outs of drug traffickers and militants around the world." />
                      <outline text="Venezuela, for instance, was one of six &apos;&apos;enduring targets&apos;&apos; in N.S.A.&apos;s official mission list from 2007, along with China, North Korea, Iraq, Iran and Russia. The United States viewed itself in a contest for influence in Latin America with Venezuela&apos;s leader then, the leftist firebrand Hugo Chvez, who allied himself with Cuba, and one agency goal was &apos;&apos;preventing Venezuela from achieving its regional leadership objectives and pursuing policies that negatively impact U.S. global interests.&apos;&apos;" />
                      <outline text="A glimpse of what this meant in practice comes in a brief PowerPoint presentation from August 2010 on &apos;&apos;Development of the Venezuelan Economic Mission.&apos;&apos; The N.S.A. was tracking billions of dollars flowing to Caracas in loans from China (radar systems and oil drilling), Russia (MIG fighter planes and shoulder-fired missiles) and Iran (a factory to manufacture drone aircraft)." />
                      <outline text="But it was also getting up-close and personal with Venezuela&apos;s Ministry of Planning and Finance, monitoring the government and personal emails of the top 10 Venezuelan economic officials. An N.S.A. officer in Texas, in other words, was paid each day to peruse the private messages of obscure Venezuelan bureaucrats, hunting for tidbits that might offer some tiny policy edge." />
                      <outline text="In a counterdrug operation in late 2011, the agency&apos;s officers seemed to know more about relations within a sprawling narcotics network than the drug dealers themselves. They listened to &apos;&apos;Ricketts,&apos;&apos; a Jamaican drug supplier based in Ecuador, struggling to keep his cocaine and marijuana smuggling business going after an associate, &apos;&apos;Gordo,&apos;&apos; claimed he had paid $250,000 and received nothing in return." />
                      <outline text="The N.S.A., a report said, was on top of not just their cellphones, but also those of the whole network of &apos;&apos;buyers, transporters, suppliers, and middlemen&apos;&apos; stretching from the Netherlands and Nova Scotia to Panama City and Bogot, Colombia. The documents do not say whether arrests resulted from all that eavesdropping." />
                      <outline text="Even with terrorists, N.S.A. units can form a strangely personal relationship. The N.S.A.-G.C.H.Q. wiki, a top secret group blog that Mr. Snowden downloaded, lists 14 specialists scattered in various stations assigned to Lashkar-e-Taiba, the Pakistani terrorist group that carried out the bloody attack on Mumbai in 2008, with titles including &apos;&apos;Pakistan Access Pursuit Team&apos;&apos; and &apos;&apos;Techniques Discovery Branch.&apos;&apos; Under the code name Treaclebeta, N.S.A.&apos;s hackers at Tailored Access Operations also played a role." />
                      <outline text="In the wiki&apos;s casual atmosphere, American and British eavesdroppers exchange the peculiar shoptalk of the secret world. &apos;&apos;I don&apos;t normally use Heretic to scan the fax traffic, I use Nucleon,&apos;&apos; one user writes, describing technical tools for searching intercepted documents." />
                      <outline text="But most striking are the one-on-one pairings of spies and militants; Bryan is assigned to listen in on a man named Haroon, and Paul keeps an ear on Fazl." />
                      <outline text="A Flood of Details" />
                      <outline text="One N.S.A. officer on the Lashkar-e-Taiba beat let slip that some of his eavesdropping turned out to be largely pointless, perhaps because of the agency&apos;s chronic shortage of skilled linguists. He &apos;&apos;ran some queries&apos;&apos; to read intercepted communications of certain Lashkar-e-Taiba members, he wrote in the wiki, but added: &apos;&apos;Most of it is in Arabic or Farsi, so I can&apos;t make much of it.&apos;&apos;" />
                      <outline text="It is a glimpse of the unsurprising fact that sometimes the agency&apos;s expensive and expansive efforts accomplish little. Despite the agency&apos;s embrace of corporate jargon on goal-setting and evaluation, it operates without public oversight in an arena in which achievements are hard to measure." />
                      <outline text="In a world of ballooning communications, the agency is sometimes simply overwhelmed. In 2008, the N.S.A.&apos;s Middle East and North Africa group set about updating its Sigint collection capabilities. The &apos;&apos;ambitious scrub&apos;&apos; of selectors &apos;-- essentially search terms &apos;-- cut the number of terms automatically searched from 21,177 to 7,795 and the number of messages added to the agency&apos;s Pinwale database from 850,000 a day to 450,000 a day." />
                      <outline text="The reduction in volume was treated as a major achievement, opening the way for new collection on Iranian leadership and Saudi and Syrian diplomats, the report said." />
                      <outline text="And in a note that may comfort computer novices, the N.S.A. Middle East analysts discovered major glitches in their search software: The computer was searching for the names of targets but not their email addresses, a rather fundamental flaw. &apos;&apos;Over 500 messages in one week did not come in,&apos;&apos; the report said about one target." />
                      <outline text="Those are daily course corrections. Whether the Snowden disclosures will result in deeper change is uncertain. Joel F. Brenner, the agency&apos;s former inspector general, says much of the criticism is unfair, reflecting a na&#175;vet(C) about the realpolitik of spying. &apos;&apos;The agency is being browbeaten for doing too well the things it&apos;s supposed to do,&apos;&apos; he said." />
                      <outline text="But Mr. Brenner added that he believes &apos;&apos;technology has outrun policy&apos;&apos; at the N.S.A., and that in an era in which spying may well be exposed, &apos;&apos;routine targeting of close allies is bad politics and is foolish.&apos;&apos;" />
                      <outline text="Another former insider worries less about foreign leaders&apos; sensitivities than the potential danger the sprawling agency poses at home. William E. Binney, a former senior N.S.A. official who has become an outspoken critic, says he has no problem with spying on foreign targets like Brazil&apos;s president or the German chancellor, Angela Merkel. &apos;&apos;That&apos;s pretty much what every government does,&apos;&apos; he said. &apos;&apos;It&apos;s the foundation of diplomacy.&apos;&apos; But Mr. Binney said that without new leadership, new laws and top-to-bottom reform, the agency will represent a threat of &apos;&apos;turnkey totalitarianism&apos;&apos; &apos;-- the capability to turn its awesome power, now directed mainly against other countries, on the American public." />
                      <outline text="&apos;&apos;I think it&apos;s already starting to happen,&apos;&apos; he said. &apos;&apos;That&apos;s what we have to stop.&apos;&apos;" />
                      <outline text="Whatever reforms may come, Bobby R. Inman, who weathered his own turbulent period as N.S.A. director from 1977 to 1981, offers his hyper-secret former agency a radical suggestion for right now. &apos;&apos;My advice would be to take everything you think Snowden has and get it out yourself,&apos;&apos; he said. &apos;&apos;It would certainly be a shock to the agency. But bad news doesn&apos;t get better with age. The sooner they get it out and put it behind them, the faster they can begin to rebuild.&apos;&apos;" />
              </outline>

              <outline text="WikiLeaks: Hillary Clinton ordered U.S. diplomats to spy on UN leaders | Mail Online">
                      <outline text="Link to Article" type="link" url="http://www.dailymail.co.uk/news/article-1333920/WikiLeaks-Hillary-Clinton-ordered-U-S-diplomats-spy-UN-leaders.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383487032_X8TTU96Z.html" />
      <outline text="Sun, 03 Nov 2013 13:57" />
                      <outline text="" />
                      <outline text="By Gerri Peev and Daily Mail ReporterUPDATED: 04:02 EST, 29 November 2010" />
                      <outline text="Hillary Clinton ordered American officials to spy on high ranking UN diplomats, including British representatives." />
                      <outline text="Top secret cables revealed that Mrs Clinton, the Secretary of State, even ordered diplomats to obtain DNA data &apos;&apos; including iris scans and fingerprints - as well as credit card and frequent flier numbers." />
                      <outline text="All permanent members of the security council &apos;&apos; including Russia, China, France and the UK &apos;&apos; were targeted by the secret spying mission, as well as the Secretary General of the UN, Ban Ki-Moon." />
                      <outline text="Secret spy mission: U.S. Secretary of State Hillary Clinton ordered diplomats to spy on UN leaders, including Secretary General Ban Ki-Moon" />
                      <outline text="Work schedules, email addresses, fax numbers, website identifiers and mobile numbers were also demanded by Washington." />
                      <outline text="The U.S. also wanted &apos;biographic and biometric information on UN Security Council permanent representatives&apos;." />
                      <outline text="The secret &apos;national human intelligence collection directive&apos; was sent to embassies and consulates around the world." />
                      <outline text="The request could break international law and threatens to derail any trust between the U.S. and other powerful nations." />
                      <outline text="Requests for IT related information &apos;&apos; such as details of passwords, personal encryption keys and network upgrades - could also raise suspicions that the U.S. was preparing to mount a hacking operation. " />
                      <outline text=" " />
                      <outline text="It is set to lead to international calls for Mrs Clinton to resign." />
                      <outline text="The fishing expedition was ordered by Mrs Clinton in July 2009, but followed similar demands made by her predecessor, Condoleeza Rice. " />
                      <outline text="The secret documents were simply signed &apos;Clinton&apos; and &apos;Rice&apos;." />
                      <outline text="Mrs Clinton called for biometric details &apos;on key UN officials, to include undersecretaries, heads of specialised agencies and their chief advisers, top SYG [secretary general] aides, heads of peace operations and political field missions, including force commanders&apos;." />
                      <outline text="Mrs Clinton&apos;s orders followed on from those given by former U.S. Secretary of State Condoleeza Rice, shown here with former United Nations Secretary-General Kofi Annan in Rome in 2006" />
                      <outline text="She also wanted intelligence on Ban Ki-Moon&apos;s &apos;management and decision-making style and his influence on the secretariat&apos;." />
                      <outline text="Cables were sent to U.S. embassies in the UN, Middle East, Eastern Europe and Latin America." />
                      <outline text="America has always handed over information about top foreign officials to the Central Intelligence Agency (CIA)." />
                      <outline text="But the request by Mrs Clinton paves the way for officials to be more closely spied upon, with even their travel plans tracked by U.S. diplomats." />
                      <outline text="In what could discredit the U.S.&apos;s role in the Middle East peace process, missions in Israel, Jordan, Syria, Saudi Arabia and Egypt were asked to gather biometric information &apos;on key Palestinian Authority and Hamas leaders and representatives, to include the young guard inside Gaza, the West Bank&apos;." />
                      <outline text="Details of the US spying mission were sent to the CIA, the U.S. Secret Service and the FBI under the heading &apos;collection requirements and tasking&apos;." />
                      <outline text="International treaties ban spying at the UN." />
                      <outline text="The 1946 UN convention on privileges and immunities states: &apos;The premises of the United Nations shall be inviolable. The property and assets of the United Nations, wherever located and by whomsoever held, shall be immune from search, requisition, confiscation, expropriation and any other form of interference, whether by executive, administrative, judicial or legislative action.&apos;" />
                      <outline text="The American ambassador to Britain, Louis Susman said he &apos;condemned&apos; the disclosures and that the U.S. government was &apos;taking steps to prevent future security breaches&apos;." />
                      <outline text="He also claimed the disclosures had &apos;the very real potential to harm innocent people&quot; but insisted the cables &apos;should not be seen as representing U.S. policy on their own&apos;." />
                      <outline text="He said the leaks were &apos;harmful to the U.S. and our interests&apos; adding, &apos;However, I am confident that our uniquely productive relationship with the UK will remain close and strong, focused on promoting our shared objectives and values." />
                      <outline text="U.S. State Department spokesman PJ Crowley said Mrs Clinton had warned leaders in Britain, France, Germany, Saudi Arabia, the United Arab Emirates, Afghanistan and China about the cables, revealed by investigators at the Wikileaks website." />
                      <outline text="Canada, Denmark, Norway and Poland had also been warned." />
                      <outline text="Share or comment on this article" />
              </outline>

              <outline text="NATO holds large-scale drills near Russia&apos;s borders &gt;&gt; WTF RLY REPORT">
                      <outline text="Link to Article" type="link" url="http://wtfrly.com/2013/11/03/nato-holds-large-scale-drills-near-russias-borders/#.UnY0mba9LCR" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383478461_CPgkarTq.html" />
      <outline text="Sun, 03 Nov 2013 11:34" />
                      <outline text="" />
                      <outline text="Voice Of Russia" />
                      <outline text="Photo: EPA" />
                      <outline text="Poland and the Baltic states are hosting the largest strategic war games the defense alliance has held in ten years. The drill, code-named Steadfast Jazz 2013, began on Saturday and will wrap up on November 9." />
                      <outline text="The NATO Response Force will practice defending the Baltics from an unidentified foreign invader." />
                      <outline text="The exercise gathers some 6,000 troops from all NATO members as well as non-member states &apos;&apos; Finland, Sweden and Ukraine. Around half of them will participate in live exercise training, which will involve dozens of armor, aircraft and naval vehicles. The other half of the personnel are headquarters staff, who will take part in command and control drills." />
                      <outline text="The week-long war games are designed &apos;&apos;to make sure that our rapid-reaction force, the NATO Response Force (NRF), is ready to defend any ally, deploy anywhere and deal with any threat,&apos;&apos; said NATO Secretary General Anders Fogh Rasmussen." />
                      <outline text="Around 350 vehicles, including armored personnel carriers, infantry fighting vehicles, engineering vehicles, trucks and all-wheel drive vehicles, 1,000 mechanized infantries, a chemical, biological, radiological and nuclear (CBRN) battalion, an airborne anti-tank company, around 11 surface vessels and one submarine as well as 46 fighter jets and 11 helicopters are participating in the war games." />
                      <outline text="Eastern European members of NATO have been seeking to host large-scale alliance drills for years, and &apos;Steadfast Jazz&apos; is the largest since 2006. The scenario of the games involve an unidentified foreign nation invading Estonia over a territorial dispute, and the alliance deploying its rapid-response force to fend off the aggressor." />
                      <outline text="While the name of the invading force is not stated, geography and global politics leave little doubt. For several years there was a rising concern in the three Baltic states over a perceived threat from Russia, which, according to some alarmists, could move its troops and occupy the region, which used to be part of the Soviet Union, in a matter of days or even hours. The big drill is partially meant to reassure the weary NATO members that the alliance is ready to protect them." />
                      <outline text="&apos;&apos;Russia as a country in the last five years has been increasing its assertiveness in the Baltic,&apos;&apos; Latvian defense minister, Artis Pabriks, told Reuters. &apos;&apos;&apos;Steadfast Jazz&apos; is important to us as these are the first exercises where we really train to defend our territory.&apos;&apos;" />
                      <outline text="The latest peak of concern in the Baltic came in September during the Zapad annual joint military exercise held by Russia and Belarus. Prior to the drill, some media in the Baltics claimed that they were training for a potential invasion." />
                      <outline text="Russia and NATO, partners in some areas like counter-terrorism, have their unresolved disputes. Arguably the most painful is the alliance&apos;s plan to deploy an American anti-ballistic missile system in Eastern Europe. Moscow sees the plan as a threat to its national security, since it may undermine Russia&apos;s nuclear deterrence." />
                      <outline text="Despite years of effort to find a compromise, Russia&apos;s concerns over the ABM shield have not been addressed. In the latest anti-missile move, the US and Romania this week have begun revamping a military base in the eastern European country, which will host some elements of the system." />
                      <outline text="Russia&apos;s latest military build-up move is the planned deployment of additional S-300 air defense batteries in Belarus. The two countries have joint integrated strategic air defense system guarding their borders." />
                      <outline text="The tension, however, is far from the antagonism of the Cold War. NATO representatives attended the Zapad drill, while Russia sent its observers for the &apos;Steadfast Jazz&apos; exercise." />
                      <outline text="Last week, Russian Defense Minister Sergey Shoigu announced that his country would dispatch a delegation to Steadfast Jazz 2013 military exercise.Russian President Vladimir Putin has long complained about NATO&apos;s eastward expansion into Moscow&apos;s traditional sphere of influence, particularly the former Soviet Baltic republics of Latvia, Lithuania and Estonia." />
                      <outline text="In late July, Russian Deputy Defense Minister Anatoly Antonov censured what he termed as the &apos;&apos;Cold War&apos;&apos; spirit of the NATO exercise." />
                      <outline text="Voice Of Russia" />
              </outline>

              <outline text="Brick O&apos;Lore: HF-One: HF-One MKII QRP HF Mobile">
                      <outline text="Link to Article" type="link" url="http://www.brickolore.com/2013/10/hf-one-hf-one-mkii-qrp-hf-mobile.html?m=1" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383478217_YBpbxr6B.html" />
      <outline text="Sun, 03 Nov 2013 11:30" />
                      <outline text="" />
                      <outline text="Thanks to Riku for sending me the link to the HF-One MKII 10 W HF radio. Details are limited, but here is what the listing says you get for your $300 (plus shipping):- 100K--30MHz rx and tx in all band amateur radio band under 30MHz.- output max:10W- mode:ssb /CW- with SDR- AUTOKEY build in.- audio REC build in." />
                      <outline text="Here is where it gets interesting for me. These images looks like the SDR could be controlled by your iPhone or iPad.The radio looks very familiar to me. And I&apos;m going to be surprised if there is an app for that - controlling the radio. I&apos;ve e-mailed the seller to see what else I can find out." />
              </outline>

              <outline text="Chris Hedges: Our Invisible Revolution">
                      <outline text="Link to Article" type="link" url="http://www.truthdig.com/report/item/our_invisible_revolution_20131028" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383477012_UmuxjT8p.html" />
        <outline text="Source: bertb news feed" type="link" url="http://s3.amazonaws.com/radio2/bertb/linkblog.xml" />
      <outline text="Sun, 03 Nov 2013 11:10" />
                      <outline text="" />
                      <outline text="Our Invisible RevolutionPosted on Oct 28, 2013By Chris Hedges" />
                      <outline text="&apos;&apos;Did you ever ask yourself how it happens that government and capitalism continue to exist in spite of all the evil and trouble they are causing in the world?&apos;&apos; the anarchist Alexander Berkman wrote in his essay &apos;&apos;The Idea Is the Thing.&apos;&apos; &apos;&apos;If you did, then your answer must have been that it is because the people support those institutions, and that they support them because they believe in them.&apos;&apos;" />
                      <outline text="Berkman was right. As long as most citizens believe in the ideas that justify global capitalism, the private and state institutions that serve our corporate masters are unassailable. When these ideas are shattered, the institutions that buttress the ruling class deflate and collapse. The battle of ideas is percolating below the surface. It is a battle the corporate state is steadily losing. An increasing number of Americans are getting it. They know that we have been stripped of political power. They recognize that we have been shorn of our most basic and cherished civil liberties, and live under the gaze of the most intrusive security and surveillance apparatus in human history. Half the country lives in poverty. Many of the rest of us, if the corporate state is not overthrown, will join them. These truths are no longer hidden." />
                      <outline text="It appears that political ferment is dormant in the United States. This is incorrect. The ideas that sustain the corporate state are swiftly losing their efficacy across the political spectrum. The ideas that are rising to take their place, however, are inchoate. The right has retreated into Christian fascism and a celebration of the gun culture. The left, knocked off balance by decades of fierce state repression in the name of anti-communism, is struggling to rebuild and define itself. Popular revulsion for the ruling elite, however, is nearly universal. It is a question of which ideas will capture the public&apos;s imagination." />
                      <outline text="Revolution usually erupts over events that would, in normal circumstances, be considered meaningless or minor acts of injustice by the state. But once the tinder of revolt has piled up, as it has in the United States, an insignificant spark easily ignites popular rebellion. No person or movement can ignite this tinder. No one knows where or when the eruption will take place. No one knows the form it will take. But it is certain now that a popular revolt is coming. The refusal by the corporate state to address even the minimal grievances of the citizenry, along with the abject failure to remedy the mounting state repression, the chronic unemployment and underemployment, the massive debt peonage that is crippling more than half of Americans, and the loss of hope and widespread despair, means that blowback is inevitable." />
                      <outline text="&apos;&apos;Because revolution is evolution at its boiling point you cannot &apos;make&apos; a real revolution any more than you can hasten the boiling of a tea kettle,&apos;&apos; Berkman wrote. &apos;&apos;It is the fire underneath that makes it boil: how quickly it will come to the boiling point will depend on how strong the fire is.&apos;&apos;" />
                      <outline text="Revolutions, when they erupt, appear to the elites and the establishment to be sudden and unexpected. This is because the real work of revolutionary ferment and consciousness is unseen by the mainstream society, noticed only after it has largely been completed. Throughout history, those who have sought radical change have always had to first discredit the ideas used to prop up ruling elites and construct alternative ideas for society, ideas often embodied in a utopian revolutionary myth. The articulation of a viable socialism as an alternative to corporate tyranny&apos;--as attempted by the book &apos;&apos;Imagine: Living in a Socialist USA&apos;&apos; and the website Popular Resistance&apos;--is, for me, paramount. Once ideas shift for a large portion of a population, once the vision of a new society grips the popular imagination, the old regime is finished.An uprising that is devoid of ideas and vision is never a threat to ruling elites. Social upheaval without clear definition and direction, without ideas behind it, descends into nihilism, random violence and chaos. It consumes itself. This, at its core, is why I disagree with some elements of the Black Bloc anarchists. I believe in strategy. And so did many anarchists, including Berkman, Emma Goldman, Pyotr Kropotkin and Mikhail Bakunin." />
                      <outline text="By the time ruling elites are openly defied, there has already been a nearly total loss of faith in the ideas&apos;--in our case free market capitalism and globalization&apos;--that sustain the structures of the ruling elites. And once enough people get it, a process that can take years, &apos;&apos;the slow, quiet, and peaceful social evolution becomes quick, militant, and violent,&apos;&apos; as Berkman wrote. &apos;&apos;Evolution becomes revolution.&apos;&apos;" />
                      <outline text="This is where we are headed. I do not say this because I am a supporter of revolution. I am not. I prefer the piecemeal and incremental reforms of a functioning democracy. I prefer a system in which our social institutions permit the citizenry to nonviolently dismiss those in authority. I prefer a system in which institutions are independent and not captive to corporate power. But we do not live in such a system. Revolt is the only option left. Ruling elites, once the ideas that justify their existence are dead, resort to force. It is their final clutch at power. If a nonviolent popular movement is able to ideologically disarm the bureaucrats, civil servants and police&apos;--to get them, in essence, to defect&apos;--nonviolent revolution is possible. But if the state can organize effective and prolonged violence against dissent, it spawns reactive revolutionary violence, or what the state calls terrorism. Violent revolutions usually give rise to revolutionaries as ruthless as their adversaries. &apos;&apos;Whoever fights monsters should see to it that in the process he does not become a monster,&apos;&apos; Friedrich Nietzsche wrote. &apos;&apos;And if you gaze long enough into an abyss, the abyss will gaze back into you.&apos;&apos;" />
                      <outline text="New and Improved CommentsIf you have trouble leaving a comment, review this help page. Still having problems? Let us know. If you find yourself moderated, take a moment to review our comment policy." />
                      <outline text="Please enable JavaScript to view the comments powered by Disqus." />
              </outline>

              <outline text="Top doctors warn of &apos;worst winter&apos; in hospitals as A&amp;E crisis grows.">
                      <outline text="Link to Article" type="link" url="http://www.theguardian.com/society/2013/nov/02/winter-hospitals-crisis-nhs-warning" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383476967_w9bPnhxb.html" />
        <outline text="Source: bertb news feed" type="link" url="http://s3.amazonaws.com/radio2/bertb/linkblog.xml" />
      <outline text="Sun, 03 Nov 2013 11:09" />
                      <outline text="" />
                      <outline text="Official data shows a 43% rise in the numbers waiting more than four hours in A&amp;E departments compared with two years ago. Photograph: Graeme Robertson/Getty Images" />
                      <outline text="Leading accident and emergency doctors have warned of a winter crisis in the National Health Service as official data shows a 43% rise in the numbers waiting more than four hours in A&amp;E departments compared with two years ago." />
                      <outline text="The NHS figures also reveal an 89% leap in the number of &quot;trolley waits&quot; of four to 12 hours when data for September is compared with September 2011." />
                      <outline text="Describing the NHS England figures as &quot;a cause for grave concern&quot;, the leader of Britain&apos;s A&amp;E doctors, Cliff Mann, said this winter was shaping up to be the toughest the NHS had ever faced. &quot;All the worrying indicators are up already. And they seem to indicate that this winter will probably be worse than last winter, which was the worst we have ever had, a tipping point for the NHS&apos;s delivery of acute care.&quot;" />
                      <outline text="Mann, who is president of the College of Emergency Medicine (CEM), which represents A&amp;E doctors, added: &quot;It&apos;s not chaos in emergency departments, but it is a crisis. Colleagues at hospitals report that there are almost daily instances in most A&amp;E departments of patients facing extended trolley waits.&quot;" />
                      <outline text="&quot;Exit blocks&quot; &apos;&apos; the inability to move patients elsewhere, even when they have been declared fit to leave hospital &apos;&apos; were a major problem. &quot;That could be the lack of transport to get a patient from an acute hospital to a bed in a community hospital, or the fact that there&apos;s nowhere for the patient to go,&quot; said Mann. &quot;People call it &apos;bed blocking&apos;, but it&apos;s not the patients who are blocking the system; it&apos;s the system blocking the patients&quot;." />
                      <outline text="The most recent data available from NHS England shows that the number waiting over four hours reached levels this summer that are more normal for the winter months:" />
                      <outline text="&apos;&#150;  The number waiting longer than four hours in A&amp;E departments in England rose in September this year to 69,268, compared with 48,283 in September 2011, an increase of 43%." />
                      <outline text="&apos;&#150;  The total waiting more than four hours before admission, transfer or discharge between April and October this year was 513,626, compared with 356,056 in the same period in 2011." />
                      <outline text="&apos;&#150;  The number waiting more than four hours during a single week in mid-August was higher, at 17,037, than the total during a week in mid-January 2011 (16,479)." />
                      <outline text="&apos;&#150;  &quot;Trolley waits&quot; reached 87,186 between April and October, compared with 47,644 over the same period in 2011." />
                      <outline text="&apos;&#150;  Days lost because of delayed discharges or &quot;bed blocking&quot; rose to 75,297 in September this year, against 60,316 in September 2010." />
                      <outline text="A Department of Health spokesman said: &quot;We know the NHS is under increasing pressure, but A&amp;E departments have still been seeing 95% of their patients within four hours since the end of April. This is testament to the hard work of staff. More work needs to be done, so we are investing &#163;500m over the next two years to help A&amp;E departments through winter. Longer term, our &#163;3.8bn integration fund will focus on joining up health and care services, keeping people healthier and treating them closer to home.&quot;" />
                      <outline text="Shadow health secretary Andy Burnham accused ministers of having &quot;left the NHS on the brink of its most dangerous winter in years&quot; and of refusing to heed warnings about the looming crisis. &quot;These worrying new figures expose the intense pressure that England&apos;s A&amp;Es and hospitals are under. Too many are already sailing dangerously close to the wind, and that is before the winter has even started. A&amp;Es suffered their first summer crisis in living memory, with thousands more patients stuck in queueing ambulances and on trolleys in corridors.&quot;" />
                      <outline text="After last winter, when the number of people not seen within four hours in A&amp;E did not fall as usual at the end of February, NHS England chief executive Sir David Nicholson ordered the service to prepare for this coming winter earlier than usual. Professor Sir Bruce Keogh, the NHS&apos;s national medical director, is finalising his eagerly expected report into the future of urgent care services, which could lead to major changes." />
                      <outline text="Mark Porter, the leader of the British Medical Association, called for at least a halt to the fall in NHS bed numbers and, controversially, a rethink of the NHS&apos;s &#163;30bn &quot;efficiency drive&quot;. &quot;We have all the symptoms of a system under pressure; that&apos;s what these new figures show. While we have this, it would be foolish to pursue a policy of still constraining resources in the acute sector. We are in the middle of the third year of huge cuts in acute hospitals&apos; budgets,&quot; said Porter." />
                      <outline text="Last week the official spending watchdog, the National Audit Office, said in a report that there were too many hospital admissions &apos;&apos; the number having risen by 47% over the past 15 years. It argued that, with better care in the community and social care, at least a fifth of cases admitted as emergencies could be managed outside hospital." />
                      <outline text="The report came as ministers announced that A&amp;E services were to end at two London hospitals, with cuts possible at two others." />
              </outline>

              <outline text="More than 10,000 French protesters clash with police over &apos;ecotax&apos; (VIDEO, PHOTOS) &apos;-- RT News">
                      <outline text="Link to Article" type="link" url="http://rt.com/news/france-police-clash-protest-143/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383457929_HP4xpjqu.html" />
      <outline text="Sun, 03 Nov 2013 05:52" />
                      <outline text="" />
                      <outline text="Published time: November 03, 2013 01:01Protesters wearing red caps, the symbol of protest in Brittany, take part in a demonstration to maintain jobs in Quimper, western France, November 2, 2013 (Reuters / Stephane Mahe)" />
                      <outline text="Thousands of people rallied in the town of Quimper in France&apos;s Brittany region on Saturday calling for a complete end to the controversial &apos;&apos;ecotax.&apos;&apos; Police fired tear gas after demonstrators hurled stones and iron bars." />
                      <outline text="Farmers, food sector workers, fishermen, and others attended the protest, voicing concern over continuous layoffs and high taxes in the country. " />
                      <outline text="Some demonstrators reportedly threw stones and iron bars at police as they gathered for speeches before marching into the city. Officers responded by firing tear gas and water cannons. " />
                      <outline text="According to authorities, 10,000 people came out for the event. However, a protest organizer told French media that 30,000 people took part in the rally. " />
                      <outline text="French protesters wore red caps resembling the 17th century revolt against King Louis XIV&apos;s fiscal policies. " />
                      <outline text="Demonstrators came out despite the government&apos;s Tuesday decision to &apos;&apos;indefinitely suspend&apos;&apos; the green tax on heavy goods vehicles transporting over 3.5 tons of commercial goods. The move followed public outrage from farmers and food sector workers in Brittany. Prime Minister Jean-Marc Ayrault stressed that the move was &quot;a suspension, not a cancelation&quot; of the tax." />
                      <outline text="As the northernmost region has less rail infrastructure than the rest of France, local businesses and farmers claim they are being unfairly penalized because most goods there have to be transported by road." />
                      <outline text="Residents of Brittany are angry as layoffs continue in their largely rural region. The majority of cutbacks are focused on the agricultural sector." />
                      <outline text="&apos;&apos;How are we supposed to produce products that are made in France, made in Brittany, with all these taxes? It&apos;s impossible,&apos;&apos; a market gardener told France 24." />
                      <outline text="France is battling high unemployment and increasing taxes. The latest data revealed that at least 3.2 million people are now looking for work in the country. " />
                      <outline text="Meanwhile, Francois Hollande has become the most unpopular French president on record, according to an opinion poll conducted in October. Major complaints against the leader include tax hikes, unemployment, and immigration policy." />
                      <outline text="Hollande&apos;s approval rating dropped to 26 percent among those questioned in the BVA poll &apos;&apos; the lowest level of any French president in the survey&apos;s 32-year history. " />
                      <outline text="The leader has announced a total of around three billion euros (US$4.1 billion) in tax increases for next year, prompting many to protest the measures." />
              </outline>

              <outline text="Obama meditating on drone strikes and telling his aides that he&apos;s &apos;&apos;really good at killing people">
                      <outline text="Link to Article" type="link" url="http://www.washingtonpost.com/opinions/review-double-down-on-the-2012-election-by-mark-halperin-and-john-heilemann/2013/11/01/8bf4f050-3fdd-11e3-a751-f032898f2dbc_story_1.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383457788_DsH92jkV.html" />
      <outline text="Sun, 03 Nov 2013 05:49" />
                      <outline text="" />
                      <outline text="For Halperin and Heilemann (and their publisher), this means one thing: mission accomplished." />
                      <outline text="Coming off the history-making spectacle of the 2008 race, the borderline&#173;nihilistic presidential campaign of 2012 presents a challenge to authors seeking to spin a compelling tale. That may explain why the pair devotes considerable attention to the Republican primary contest, a more topsy-turvy drama than the trench warfare between Obama and Romney." />
                      <outline text="The book lacks the made-for-Hollywood scenes of &apos;&apos;Game Change&apos;&apos;: Elizabeth Edwards ripping off her shirt to reveal her mastectomy scars in an emotional tarmac confrontation with her cheating husband, or anything Palin-related. But there&apos;s still click-bait aplenty: Obama meditating on drone strikes and telling his aides that he&apos;s &apos;&apos;really good at killing people&apos;&apos;; Christie&apos;s raging temper; Romney adviser Stuart Stevens vomiting backstage after Clint Eastwood&apos;s performance art in Tampa; Romney&apos;s fascination with fat people, including his habit of ribbing male campaign staffers about dating overweight women; George W. Bush calling Rick Perry, his gubernatorial successor in Texas, &apos;&apos;a chicken-[expletive] guy&apos;&apos;; Obama&apos;s team secretly polling and focus-grouping the notion of replacing Joe Biden with Hillary Rodham Clinton on the Democratic ticket; and so on. It&apos;s a book that will launch a thousand listicles." />
                      <outline text="Such goodies were mined over three years from deep-background interviews with the candidates, their aides and the small galaxy of Washington fixers who surrounded the campaigns. The authors explain their hazy sourcing in a note at the book&apos;s conclusion; media snobs will have a field day. The Halperin-Heilemann method, a number of those who sat for interviews told me, is to invite a subject to a private room at a restaurant or a plush hotel suite, ply them with booze and let the stories flow. But the alcohol was unnecessary; the wild success of the first volume guaranteed that insiders would talk this time. Indeed, in a summer&apos;s worth of casual conversations with veterans of all the campaigns, it was difficult for me to find anyone who didn&apos;t consent to an interview with the pair." />
                      <outline text="The book&apos;s loose argument is that both Obama and Romney placed their bets about the race early on and &apos;&apos;doubled down&apos;&apos; throughout the contest. It&apos;s an apt take on Obama World. The &apos;&apos;Obamans,&apos;&apos; as the authors call them, set out to annihilate Romney almost two years before the election and executed their plan with brutal efficiency. There were hiccups along the way, specifically Obama&apos;s dreary debate-prep sessions and his cringe-worthy performance in Denver, but his deputies in Chicago rarely deviated from their search-and-destroy mission. Romney&apos;s campaign, though, with its bad habit of reacting to news cycles with snap decisions, always felt more ad hoc, with tactics trumping strategy." />
                      <outline text="Though the gossip merchants of This Town might be disappointed, readers are for the most part spared staff-level infighting and post-campaign score settling. There are exceptions: Former White House chief of staff Bill Daley comes in for rough treatment, depicted as a feckless outsider lost in the youthful, clannish and data-reliant Obama-verse. Although Romney&apos;s chief strategist, Stevens &apos;-- a popular punching bag for know-it-all Republican consultants after the loss &apos;-- emerges mostly unscathed, we witness some flashes of impetuousness. He was frustrated, it seems, to be the lone voice on Team Romney lobbying for Christie to be on the ticket instead of Paul Ryan, who is as much a cipher in the book as he was during the campaign: rarely mentioned and barely consequential." />
              </outline>

              <outline text="Senate committee backs bill that would allow NSA data collection to continue | World news | theguardian.com">
                      <outline text="Link to Article" type="link" url="http://www.theguardian.com/world/2013/oct/31/senate-nsa-oversight-bill-domestic-phone-collection" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383457357_eqpcEuCa.html" />
      <outline text="Sun, 03 Nov 2013 05:42" />
                      <outline text="" />
                      <outline text="The Senate intelligence committee approved a bill on Thursday that would provide for increased transparency of the National Security Agency&apos;s bulk collection of US phone records but allow the controversial practice to continue." />
                      <outline text="Sponsored by chairwoman Dianne Feinstein, the bill lets the NSA continue to collect phone metadata of millions of Americans for renewable 90-day periods, and allows the government to retain it. Some legislators have alternatively proposed letting phone companies hold the metadata. It passed the committee by an 11-4 vote Thursday afternoon, paving the way for a full Senate vote." />
                      <outline text="Further codifying current practice, the bill allows analysts to search through the data when if they suspect there is a &apos;&apos;reasonable articulable suspicion&apos;&apos; that a suspect is associated with international terrorism." />
                      <outline text="Additionally the bill adds new leeway for the NSA to continue surveillance begun on foreigners outside the US if they enter the country &quot;for a transitory period not to exceed 72 hours&quot;." />
                      <outline text="The bill is a direct challenge to one introduced Tuesday by senator Patrick Leahy that would end domestic phone-records collection. It was also opposed by leading intelligence committee member Mark Udall, who said it did not go far enough." />
                      <outline text="&quot;The NSA&apos;s invasive surveillance of Americans&apos; private information does not respect our constitutional values and needs fundamental reform, not incidental changes. Unfortunately, the bill passed by the Senate intelligence committee does not go far enough to address the NSA&apos;s overreaching domestic surveillance programs,&quot; Udall said." />
                      <outline text="Another Democratic member of the committee, Ron Wyden, said the bill maintains &quot;business as usual&quot; and &quot;remains far from anything that could be considered meaningful reform&quot;. " />
                      <outline text="Feinstein defended the NSA bulk collection program, but said there was a need to rebuild public trust. &apos;&apos;The NSA call-records program is legal and subject to extensive congressional and judicial oversight, and I believe it contributes to our national security,&apos;&apos; she said in a statement. &apos;&apos;But more can and should be done to increase transparency and build public support for privacy protections in place.&apos;&apos;" />
                      <outline text="In her statement, Feinstein said the bill would also make a number of improvements to transparency and oversight on the NSA, including:" />
                      <outline text="&apos; Requiring an annual public report of the total number of queries of NSA&apos;s telephone metadata database and the number of times the program leads to an FBI investigation or probable cause order." />
                      <outline text="&apos; Requiring that the foreign intelligence surveillance court impose limits on the number of people at NSA who may authorise or query the call-records database." />
                      <outline text="&apos; Establishing criminal penalties of up to 10 years in prison for intentional unauthorized access to data acquired under the Foreign Intelligence Surveillance Act (Fisa) by the United States." />
                      <outline text="&apos; Mandating the Fisa court impose a limit on the number of contacts (or &apos;&apos;hops&apos;&apos;) an analyst can receive in response to a query of bulk communication records." />
                      <outline text="After the committee&apos;s hearing had ended, Feinstein strongly endorsed the NSA&apos;s main domestic program. &quot;I think there&apos;s huge misunderstanding about this NSA database program, and how vital I think it is to protecting this country,&quot; she told reporters. " />
                      <outline text="Concern over the intelligence committee&apos;s bill was expressed by independent legal experts who said the stage was now set for a showdown with the USA Freedom Act, a bill introduced by Leahy and Jim Sensenbrenner that would prohibit bulk collection of Americans&apos; telephone records." />
                      <outline text="Elizabeth Goitein of the Brennan Center for Justice said: &apos;&apos;The intelligence committee bill and the USA Freedom Act present two opposing visions of the relationship between law-abiding Americans and the national security state. The fundamental question is: should the government have some reason to suspect wrongdoing before sweeping up Americans&apos; most personal information to feed into its databases? Leahy and Sensenbrenner say yes; Feinstein says no.&apos;&apos; " />
                      <outline text="Wyden suggested that recent concern about NSA spying on foreign leaders had distracted from the real focus on mass domestic surveillance in the US. &apos;&apos;The statements that American intelligence officials have made this week about collecting on the intentions of foreign leadership, that&apos;s consistent with the understanding I&apos;ve had for years, as a member of the intelligence committee,&apos;&apos; he said." />
                      <outline text="&apos;&apos;That has implications for foreign policy. My top priority is ending the mass surveillance, digital surveillance, on millions and millions of law-abiding Americans.&apos;&apos;" />
                      <outline text="Feinstein unexpectedly announced on Monday that she was &apos;&apos;totally opposed&apos;&apos; to the foreign leader spying of the sort the NSA conducts of German chancellor Angela Merkel. Feinstein has been a staunch supporter of the NSA&apos;s bulk collection of Americans&apos; phone records." />
                      <outline text="&apos;&apos;Americans are making it clear, that they never &apos;&apos; repeat never &apos;&apos; agreed to give up their constitutional liberties for the appearance of security,&apos;&apos; Wyden said. &apos;&apos;We&apos;re just going to keep fighting this battle. It&apos;s going to be a long one.&apos;&apos;" />
                      <outline text="Separately, Feinstein said that James Clapper, the director of national intelligence, had agreed to provide her in writing with a statement about a Washington Post story that alleged the NSA had intercepted data in transmission between Google and Yahoo data centers. She said she was withholding judgment on the story until she saw Clapper&apos;s rebuttal. " />
                      <outline text="Her strong endorsement of the domestic phone records collection indicates that the powerful Senate Democrat is not yet prepared to expand the criticism of the NSA she launched on Monday, when she &quot;totally opposed&quot; its surveillance of foreign allied leaders &apos;&apos; a more traditional intelligence activity than bulk phone metadata surveillance." />
                      <outline text="Wyden would not comment on the Washington Post report on the Google and Yahoo intercepts. But the senators suggested it had implications for the privacy of Americans&apos; communication." />
                      <outline text="&apos;&apos;Decades ago, countries had their own kinds of communication systems. Now that you&apos;ve had the merger of global communications, I think you&apos;re going to have a lot more challenges spying on foreigners with implications for US citizens,&apos;&apos; Wyden said." />
                      <outline text="Following the markup of the bill, the intelligence panel held a classified hearing. Clapper and his chief counsel, Robert Litt, were seen entering the Hart Senate office building ahead of the markup and the hearing. Clapper refused to comment." />
              </outline>

              <outline text="Obama halted NSA spying on IMF and World Bank headquarters | Reuters">
                      <outline text="Link to Article" type="link" url="http://www.reuters.com/article/2013/10/31/us-usa-security-imf-idUSBRE99U1EQ20131031" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383457107_AwDq4kYF.html" />
      <outline text="Sun, 03 Nov 2013 05:38" />
                      <outline text="" />
                      <outline text="People walk outside the International Monetary Fund headquarters at the start of the annual IMF-World Bank fall meetings in Washington, October 8, 2013." />
                      <outline text="Credit: Reuters/Jonathan Ernst" />
                      <outline text="By Mark Hosenball" />
                      <outline text="WASHINGTON | Thu Oct 31, 2013 6:49pm EDT" />
                      <outline text="WASHINGTON (Reuters) - President Barack Obama has ordered the National Security Agency to stop eavesdropping on the headquarters of the International Monetary Fund and World Bank as part of a review of intelligence gathering activities, according to a U.S. official familiar with the matter." />
                      <outline text="The order is the latest move by the White House to demonstrate that it is willing to curb at least some surveillance in the wake of leaks by former NSA contractor Edward Snowden of programs that collect huge quantities of data on U.S. allies and adversaries, and American citizens." />
                      <outline text="The NSA&apos;s surveillance of the Washington-based IMF and World Bank has not previously been disclosed. Details of such spy programs are usually highly classified." />
                      <outline text="In response to Reuters inquiries, a senior Obama administration official said, &quot;The United States is not conducting electronic surveillance targeting the headquarters of the World Bank or IMF in Washington.&quot;" />
                      <outline text="The Obama administration official, who spoke on condition of anonymity, did not address whether the NSA had eavesdropped on the two entities in the past." />
                      <outline text="The first official said Obama had ordered a halt to such practices within the last few weeks, about the same time he instructed the NSA to curtail eavesdropping on the United Nations headquarters in New York." />
                      <outline text="The IMF and the World Bank both declined to comment." />
                      <outline text="Representatives of the NSA and the Office of Director of National Intelligence had no immediate comment." />
                      <outline text="Loch K. Johnson, a former congressional oversight aide who is now a professor of international relations at the University of Georgia, said Obama made the right decision by curbing eavesdropping on international organizations and friendly foreign leaders such as German Chancellor Angela Merkel." />
                      <outline text="&quot;I think it&apos;s a good idea to cut back on surveillance&quot; of economic-related targets, Johnson said. &quot;The enemy is terrorism and we should focus on that. We have to focus almost all of our resources on Al Qaeda and its affiliates,&quot; he said." />
                      <outline text="Paul Pillar, a former senior analyst for the Central Intelligence Agency, said that U.S. policy makers have to weigh the value of collecting intelligence on an organization like the IMF against the risk it will become public." />
                      <outline text="&quot;In this instance the gain from that information is likely to be minimal,&quot; Pillar said." />
                      <outline text="&quot;Sound analysis on international economic issues of concern to U.S. policymakers is apt to draw more from other sources of information, both secret and public, and from tapping relevant expertise both outside and inside government, than from eavesdropping on conversations at the IMF,&quot; he added." />
                      <outline text="It is no secret that U.S. spy agencies historically have collected and analyzed information related to economic affairs - in public briefings to Congress, top intelligence officials have discussed assessments of economic issues." />
                      <outline text="But a former senior U.S. intelligence official said that the Obama Administration had put greater emphasis and resources than predecessors into collecting and assessing economic information." />
                      <outline text="In February 2009, shortly after Obama entered the White House, the Central Intelligence Agency began producing a new &quot;Economic Intelligence Brief&quot; for him to review along with the regular President&apos;s Daily Brief on international security and threats." />
                      <outline text="Leon Panetta, Obama&apos;s first CIA director, said at the time the change was aimed at understanding the implications of the global economic crisis, and that the agency was considering hiring more economic analysts." />
                      <outline text="The former U.S. intelligence official noted that insider detail on economic policy developments - for example, financial crises affecting the economies of European countries such as Greece, Italy and Spain, and the stability of the Euro - is the type of critical information U.S. policymakers welcome." />
                      <outline text="The desire by U.S. policymakers for such information could help explain why NSA collected information on foreign leaders such as Merkel. Her cellphone number was listed in a NSA targeting document, which German media outlets apparently obtained from Snowden&apos;s cache. U.S. officials have now indicated that much NSA eavesdropping on Merkel and other allied leaders is likely to be curtailed if not halted." />
                      <outline text="(Additional reporting by Warren Strobel; Editing by Tiffany Wu and Grant McCool)" />
                      <outline text="Link thisShare thisDigg thisEmailReprints" />
              </outline>

              <outline text="Lessig Blog, v2">
                      <outline text="Link to Article" type="link" url="http://lessig.tumblr.com/post/65697513808/on-the-pathological-way-apple-deals-with-its-customers" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383456285_MDLh4uqY.html" />
      <outline text="Sun, 03 Nov 2013 05:24" />
                      <outline text="" />
                      <outline text="On the pathological way Apple deals with its customersSo this has been a week from Apple hell. Apple did a major upgrade of its suite of software &apos;-- from the operating system through applications. Stupidly (really, inexcusably stupid), I upgraded immediately. Every Apple-related product I use has been crippled in important ways. " />
                      <outline text="I&apos;m going to describe the crippling I have discovered so far, and some pointers to the work arounds that I&apos;ve found. But that&apos;s not the purpose of my writing. My purpose instead is to say what should be obvious: Apple deals with us in a psychologically pathological way, and if that doesn&apos;t change, it&apos;s time to leave." />
                      <outline text="Many will say, with perfect justification, that it was time to leave long ago. For example, my Free Software friends will say that the failure of Apple to respect Free Software was reason enough to dump them long ago. That&apos;s a fair criticism (of me) and a principled and justified position." />
                      <outline text="But the argument I want to advance here is different. It is that in the &apos;&apos;hybrid economy&quot; that the Internet is, there is an ethical obligation to treat users decently. &quot;Decency&quot; of course is complex, and multi-faceted. But the single dimension I want to talk about here is this: They must learn to talk to us. In the face of the slew of either bugs or &quot;features&quot; (because as you&apos;ll see, it&apos;s unclear in some cases whether Apple considers the change a problem at all), a decent company would at least acknowledge to the public the problems it identifies as problems, and indicate that they are working to fix it. " />
                      <outline text="Why is that what decency requires? And why, then, is the pathologically constipated way in which Apple communicates with its customers indecent? " />
                      <outline text="Because when you see the incredible effort that is being devoted to dealing with these either bugs or features, there is an obvious incredible waste of time and resources that Apple could avoid simply by saying what they know." />
                      <outline text="For example, if the problem I have confronted with Mail.app using Gmail (which I describe more below) is something Apple considers a bug, then I&apos;m willing to live with it for a while till Apple fixes it. If it isn&apos;t a bug, but is a feature (insanely but whatever), then I will spend the time (and incredible bandwidth waste) to deal with the problem in the way the Apple volunteers suggest &apos;-- either by changing the way Gmail works, or getting a new mail application." />
                      <outline text="So in a line, it is indecent for Apple to sit by silently while its customers waste thousands of hours (in the aggregate) trying to deal with the problems its &apos;&apos;upgrades&apos;&apos; create, when the simple act of describing what it intends to fix could save its customers those thousands of hours." />
                      <outline text="And more generally, that at some point &apos;-- and for me, now is this point &apos;-- if Apple can&apos;t think different(ly) about its refusal to talk, then its customers should use the only real power we have: We should leave the Apple platform. " />
                      <outline text="The problems so far" />
                      <outline text="I live on the Apple platform. I have two offices at work, each has a machine which (through Dropbox) is essentially identical. I also have a laptop which I use to make the 70+ presentations I make every year. That machine (again through Dropbox) is essentially identical to the two work machines, except that in addition, that machine has the presentations I make, and the resources I need to make those presentations. I also have an iPhone, as do others in my family. And we have an AppleTV. " />
                      <outline text="The iPhone problems: The first, and most destructive consequence of the recent round of upgrades was to my iPhone. Basically, and as I have described elsewhere on this blog, the upgrade to 7.0.3 disabled my Wifi. Through the Apple support community, I quickly identified that this was a common problem for many (though not all) iPhone users. I spent the time necessary to try to recommended solutions &apos;-- resetting network settings; when that didn&apos;t work, backing up, resetting the machine, setting up the phone as a new phone; still didn&apos;t work. After not seeing any indication by Apple about whether this was a transitory problem (one they were going to fix) or not (indeed, whether or not it was a hardware failure that could not be fixed by software anymore), I called Apple support. Actually, I chatted with them. Very quickly and very very decently, they determined my iPhone needed to be replaced. Because I was within the 1 year limited warranty, that replacement would be for free. Had it been beyond one year, and I didn&apos;t have an AppleCare contract, it would not have been free. So while I didn&apos;t have to confront that issue, I suspect I would have been quite unhappy to have been told that an &apos;&apos;upgrade&apos;&apos; from Apple had broken my iPhone, but that I  had to pay $199 to fix it. But anyway, I expect today I will have my new iPhone and once again have access to Wifi. " />
                      <outline text="The Mail.app/Gmail problem: This problem is also hugely significant for me, and so far, without any obvious remedy." />
                      <outline text="The short form description is this: After the &apos;&apos;upgrade&apos;&apos; of Mail.app, Mail will not let you move a message from the Inbox to a Gmail folder unless you also have the All Mail folder on your machine. If you don&apos;t, then the move won&apos;t stick, and when you leave and return to the Inbox, the messages return. " />
                      <outline text="Why is this a problem? Well I get literally hundreds of emails a day from many different channels &apos;-- from students, from colleagues, from collaborators, from fellow activists, from spammers, from the public, from the haters, from whomever.  Because of all that email, I have to spend endless hours processing those messages. I process them by either deleting them, or responding to them, or marking them for later response, or moving them to a &apos;&apos;if I ever get the time I will respond&apos;&apos; folder (which today has close to 1k messages). But because of this new bug, my processing doesn&apos;t work. And by the end of the week, there were literally thousands of emails in the mix of inboxes that I have. " />
                      <outline text="This problem has been extensively described by the incredibly generous Joe Kissell at Tidbits. As he explains, the obvious solution &apos;-- enable the All Mail folder &apos;-- isn&apos;t a solution. I&apos;m privileged enough as a Harvard professor not to have to worry about the bandwidth required to suck down the gigabytes of data in all my All Mail folders from all my gmail accounts for each of my three machines. But I suspect there are many who live in the bandwidth desert that is the United States who are not happy to have to pay for the totally useless requirement of copying to the local machine the mail that is collected solely for the purpose of improving Google&apos;s ad algorithm. " />
                      <outline text="More importantly, as the many comments to that great Tidbits article describe, it&apos;s not even clear this solution is a solution. Apparently even after running your machine for the literally days necessary to download and reindex the Mail cache, the resulting Mail.app doesn&apos;t actually work very well. Some report that it takes 30 minutes for the Inbox to resync from the iPhone to the desktop. Others report all sorts of flaking with the system. No one I&apos;ve seen reports that this change is good." />
                      <outline text="So why did Apple do it? Well, it turns out iCloud mail accounts work just fine &apos;-- so some suggest just forwarding mail from Gmail to iCloud. Maybe that&apos;s the reason Apple did this. Others say the change was requested by Google. That&apos;s really hard to believe but who knows." />
                      <outline text="The bottom line is that we don&apos;t know. And so literally thousands of hours of users time is being spent to deal with the ambiguous bug/feature of this change, and terabytes of bandwidth wasted, all because Apple can&apos;t learn to speak. " />
                      <outline text="Keynote: As I&apos;ve also described elsewhere, the latest update of Keynote has broken my slide presentations. &apos;&apos;Broken&apos;&apos; in the sense that some of the the functionality that existed in Keynote &apos;09 doesn&apos;t exist in the new version." />
                      <outline text="Here again, there is the question: Why did Apple remove this functionality? Is this the equivalent of the Seinfeld Soup Nazi &apos;-- the iOS-Nazi has struck again? Or is it an oversight (so the removed functionality will be restored)? This difference is significant because if it is the former, then at least this user will leave Keynote. I don&apos;t have the time (or patience) to build for a platform I can&apos;t trust. If it is the latter, then again, it would be enormously beneficial to know whether Apple intends to fix it. " />
                      <outline text="This problem is the least significant, at least for me. The old version of Keynote remains (unlike with Mail.app, and unlike with the iPhone which Apple won&apos;t permit people to downgrade from). It&apos;s a hassle to launch it versus the new version (and you can&apos;t just delete the new version and keep auto-update on), but ok. I like Keynote &apos;09 well enough, and can continue to use it while I scope out alternatives to move to." />
                      <outline text="But I am sorry I won&apos;t see the other new features of Keynote. And am really sorry to have to begin the transition to a new presentation platform." />
                      <outline text="Pages: These other experiences had made me really reluctant to explore Pages, but yesterday, I did. Right away I confronted a truly insane &apos;&apos;upgrade&apos;&apos;: Apple has added an ability to automatically smart-ify quotes &apos;-- as you type them at least. But a functionality that used to exist &apos;-- where you could search and replace single and double quotes and the replaced quote would be a smart quote &apos;-- has been removed. So now, the only way to smartify those quote (which, as one writes with the standard cut-and-paste-a-quote style of today) is to manually search for a single or double quote, and then retype it." />
                      <outline text="I can&apos;t imagine this is a feature, and not a bug. But it means I can&apos;t use the new version of Pages till fixed. " />
                      <outline text="The obvious remedy" />
                      <outline text="Some of the problems I have described are obviously bugs &apos;-- Apple didn&apos;t intend 7.0.3 to break wifi, and I really doubt it meant to stupify Search/Replace." />
                      <outline text="Some may or may not be bugs &apos;-- is Apple trying to nudge me away from Gmail? Is Apple trying to improve (in its view) the quality of my Keynotes by removing a transition it thinks isn&apos;t cool? And is this the future of consumer products? Will my Gap jeans add bellbottoms if that fashion returns (and if it has, because what do I know about fashion, will it remove them?)" />
                      <outline text="But whether or not these changes are bugs, this is my point: it is insane that Apple doesn&apos;t have a policy of explaining this to us. I am sure I am not the only Apple user that doesn&apos;t have time for this absurdity. Days begin for me in the 4am timeframe already, and I am already perpetually behind. So to confront these problems without there being a simple location on the Apple site where Apple explains what it intends to fix is to add the proverbial insult to injury." />
                      <outline text="Apple is already spending the money to scrub the comments it doesn&apos;t like. Apple can afford to spend the money to help its users understand which bugs are features, and which bugs will be repaired." />
                      <outline text="And if Apple doesn&apos;t, then it is a company with an ego that at least I don&apos;t have the time to afford." />
                      <outline text="Anymore." />
                      <outline text="1 November 2013 &#183;" />
              </outline>

              <outline text="The USA FREEDOM Act is Real Spying Reform | American Civil Liberties Union">
                      <outline text="Link to Article" type="link" url="https://www.aclu.org/blog/national-security/usa-freedom-act-real-spying-reform" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383456089_pkYKQ9zV.html" />
      <outline text="Sun, 03 Nov 2013 05:21" />
                      <outline text="" />
                      <outline text="Over the last several months, members of Congress have introduced at least two dozen spying reform and transparency bills. Today, a new proposal called the USA FREEDOM Act from Rep. Jim Sensenbrenner (R-Wis.) and Sen. Patrick Leahy (D-Vt.) was introduced to significantly limit the collection and use of Americans&apos; information under our nation&apos;s spying laws. The ACLU strongly supports the legislation." />
                      <outline text="The bill is notable for its sponsors alone." />
                      <outline text="Rep. Sensenbrenner was the lead author of the Patriot Act and now is the chair of the House&apos;s Subcommittee on Terrorism and Crime. A conservative member of Congress, he has repeatedly supported surveillance laws in the past, but now he&apos;s leading the charge for reform. According to Rep. Sensenbrenner, two consecutive White Houses have wrongly used his Patriot Act to collect the phone records of innocent Americans, and he wants it to stop. &quot;This misinterpretation of the law threatens our First, Second and Fourth Amendment rights,&quot; Rep. Sensenbrenner recently said. &quot;Congress never intended this. I will rein in the abuse of both the Patriot Act and the U.S. Constitution with the support of the American public.&quot;" />
                      <outline text="Sen. Leahy is the chairman of the powerful Senate Judiciary Committee, which also has jurisdiction over the Patriot Act and FISA. He also believes the government&apos;s indiscriminate collection of Americans&apos; records must end, because the &quot;government has not made its case that this is an effective counterterrorism tool, especially in light of the intrusion on Americans&apos; privacy rights.&quot;" />
                      <outline text="The partnership between these two very senior members of the House and Senate, on both the left and the right, gives this bill legitimacy and a real chance at passing. But the bill has more than just names attached to it &apos;&apos; it has substance." />
                      <outline text="It would amend Section 215 of the Patriot Act &apos;&apos; which is used to collect the phone records of almost every American every day &apos;&apos; so that it can no longer be used in such a sweeping fashion. The secret FISA court would still be able to issue subpoenas, but they would be limited to collecting things that directly pertain to a terrorist, his associates, or his activities. The bill would also require this standard for national security letters and pen registers, two other Patriot Act tools used to access Americans&apos; records. The point here is to ensure that bulk collection doesn&apos;t just jump to another secret authority." />
                      <outline text="The bill would also make changes to the FISA Amendments Act (FAA), the sweeping 2008 law that codified the warrantless wiretapping program. It would insert a very important restriction that would prevent the government from searching through FAA-collected data for U.S. person data in the absence of an emergency or a court order. Finally, the bill includes the creation of a special advocate before the FISA court and new transparency requirements." />
                      <outline text="Although the USA FREEDOM Act does not fix every problem with the government&apos;s surveillance authorities and programs, it is an important first step and it deserves broad support. It incorporates the language and principles of past reform leaders like Sens. Ron Wyden (D-Ore.) and Rand Paul (R-Ky.) and Reps. Justin Amash (R-Mich.) and John Conyers (D-Mich.), and it is far superior to the proposal recently described by Senate Intelligence Chairman Dianne Feinstein (D-Calif.), which we expect to see shortly." />
                      <outline text="All members of the House and Senate should co-sponsor the USA FREEDOM Act and fight hard for its passage." />
                      <outline text="Learn more about the NSA and other civil liberty issues: Sign up for breaking news alerts,follow us on Twitter, and like us on Facebook." />
              </outline>

              <outline text="AFP: Big US tech firms calls for reform on snooping">
                      <outline text="Link to Article" type="link" url="http://www.google.com/hostednews/afp/article/ALeqM5ioRYwa1v8lk01L4N2lOFJZJeUYMA?docId=3a5dde73-fd21-4e56-b98b-c7937f9205a4&amp;hl=en" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383454908_5gLhtwqf.html" />
      <outline text="Sun, 03 Nov 2013 05:01" />
                      <outline text="" />
                      <outline text="Big US tech firms calls for reform on snooping" />
                      <outline text="(AFP) &apos;&apos; 1 day ago " />
                      <outline text="Washington &apos;-- Six of the biggest US technology firms are urging Congress to rein in the National Security Agency by requiring more transparency about surveillance and improved privacy protections." />
                      <outline text="In a letter to a Senate committee, the tech giants applauded the introduction of the USA Freedom Act aimed at ending bulk collection of phone records and improve privacy protection in the Foreign Intelligence Surveillance Court." />
                      <outline text="&quot;Recent disclosures regarding surveillance activity raise important concerns both in the United States and abroad,&quot; said the letter signed by Google, Apple, Microsoft, Facebook, Yahoo and AOL." />
                      <outline text="The companies, which have failed to win efforts to disclose details of their cooperation with US surveillance programs, said more transparency would &quot;help to counter erroneous reports that we permit intelligence agencies &apos;direct access&apos; to our companies&apos; servers or that we are participants in a bulk Internet records collection program.&quot;" />
                      <outline text="&quot;Transparency is a critical first step to an informed public debate, but it is clear that more needs to be done. Our companies believe that government surveillance practices should also be reformed to include substantial enhancements to privacy protections and appropriate oversight and accountability mechanisms for those programs.&quot;" />
                      <outline text="The letter dated Thursday and addressed to the Senate Judiciary Committee came days after a news report said the NSA has tapped into key communications links from Yahoo and Google data centers around the world." />
                      <outline text="The Washington Post, citing documents obtained from former NSA contractor Edward Snowden and interviews with officials, said the program can collect data at will from hundreds of millions of user accounts, including from Americans." />
                      <outline text="The report said the program dubbed MUSCULAR, operated jointly with NSA&apos;s British counterpart GCHQ, indicated that the agencies can intercept data flows from the fiber-optic cables used by the US Internet giants." />
                      <outline text="The NSA disputes key details of the report." />
                      <outline text="The bill proposed by Senator Patrick Leahy and Representatives James Sensenbrenner and John Conyers, with other co-sponsors." />
                      <outline text="Leahy and Sensenbrenner said in a joint statement they welcomed the wide support for their bill." />
                      <outline text="&quot;The breadth of support for our bipartisan, bicameral legislation demonstrates that protecting Americans? privacy not only cuts across the party divide, but also addresses concerns raised by the technology industry and other advocates,&quot; Leahy and Sensenbrenner said." />
                      <outline text="&quot;The time is now for serious and meaningful reform. We are committed to working with lawmakers on both sides of the aisle to get this done so we can restore confidence in our intelligence community and protect the privacy rights of our citizens.&quot;" />
                      <outline text="The Center for Democracy and Technology, a digital rights advocacy group, meanwhile urged other companies to speak up." />
                      <outline text="&quot;This is a defining moment and other companies must now step up to support genuine FISA reform or explain to their users why they are not,&quot; said Leslie Harris, president and chief executive of CDT." />
                      <outline text="Copyright (C) 2013 AFP. All rights reserved. More &gt;&gt;" />
              </outline>

              <outline text="VIDEO-Supporter paints picture of Snowden&apos;s life in Moscow &apos;&apos; CNN Security Clearance - CNN.com Blogs">
                      <outline text="Link to Article" type="link" url="http://security.blogs.cnn.com/2013/11/02/supporter-paints-picture-of-snowdens-life-in-moscow/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383454552_Zhfry4PB.html" />
      <outline text="Sun, 03 Nov 2013 04:55" />
                      <outline text="" />
                      <outline text="By CNN&apos;s Greg Clary" />
                      <outline text="National Security Agency leaker Edward Snowden has now been in Moscow for more than five months while Russia considers whether to grant his request for permanent asylum. But his day-to-day activities remain largely a mystery." />
                      <outline text="One person who knows more than most about Snowden&apos;s situation is Jesselyn Radack, who met with him recently in Moscow." />
                      <outline text="Radack is a member of the whistleblower-support organization, Government Accountability Project, and a former ethics adviser to the Justice Department. She became a whistleblower herself after raising concerns about the interrogation of &apos;&apos;American Taliban&apos;&apos; John Walker Lindh." />
                      <outline text="Radack says security is still paramount for Snowden&apos;--she and the other visitors weren&apos;t told the location of their meeting because of security concerns." />
                      <outline text="&apos;&apos;It appeared to be a hotel, somewhere, but I don&apos;t know Moscow, so I didn&apos;t recognize where we were really,&apos;&apos; Radack said." />
                      <outline text="When Snowden first arrived in Russia, he holed up in an airport transit lounge as Russia decided how to handle his case. But today, Radack said Snowden isn&apos;t simply hiding out and awaiting his fate,  he&apos;s trying to adjust to the culture in which he now finds himself." />
                      <outline text="&apos;&apos;He was pretty occupied most of the day with learning Russian and studying Russian history and getting acclimated to his new environment, to his new home as well as trying to follow the debate going on here and around the world,&apos;&apos; Radack said." />
                      <outline text="Specifically, Radack said, he&apos;s reading the books of Russian poet Alexander Pushkin and learning Russian phrases. The New York Times reported Snowden was, ironically, reading Fyodor Dostoyevsky&apos;s &apos;&apos;Crime and Punishment&apos;&apos; although Radack couldn&apos;t confirm that." />
                      <outline text="Radack did say Snowden does make a point of keeping tabs on the buzz surrounding him and what U.S. officials are saying about him." />
                      <outline text="&apos;&apos;He&apos;s very aware. He&apos;s on the Internet so he can see this. He had known that there had been joke about putting him on the assassination list. He also is studying the legislation really carefully and there are certain bills that he liked and didn&apos;t like because they didn&apos;t go far enough in (the) Foreign Intelligence Act or the Surveillance Act,&apos;&apos; Radack said." />
                      <outline text="Radack said she thinks Snowden wants to be part of the discussion about the NSA&apos;s spying practices someday, perhaps even using technology like Skype to testify before Congress." />
                      <outline text="&apos;&apos;If in the near term, if testimonies were to occur, it would have to be through Skype. But Skype is not really safe because it can give away a location,&apos;&apos; Radack said." />
                      <outline text="&apos;&apos;If that can be done in a way that would protect him, he would be glad to do that.&apos;&apos;" />
                      <outline text="Snowden did meet with German Member of Parliament, Hans-Christian Stroebele, Thursday where Snowden delivered a letter addressed to the body." />
                      <outline text="Radack said she can relate to Snowden following her own experience of taking on the government." />
                      <outline text="&apos;&apos;I myself was called a traitor, and a turncoat and a terrorist - which obviously I am not. I am just extremely patriotic and a civically involved American,&apos;&apos; Radack said." />
                      <outline text="Despite all his criticisms of the NSA, Radack said Snowden still sees himself as a patriot, not a traitor as many have made him out to be." />
                      <outline text="&apos;&apos;What he did was in purpose of trying to make the United States a better country and the free and open democratic society it always says it is.&apos;&apos;" />
                      <outline text="&apos;&apos;He loves the U.S. and he misses the United States,&apos;&apos; Radack said." />
              </outline>

              <outline text="Jesselyn Radack - Wikipedia, the free encyclopedia">
                      <outline text="Link to Article" type="link" url="http://en.wikipedia.org/wiki/Jesselyn_Radack" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383454087_dGkLuuTs.html" />
      <outline text="Sun, 03 Nov 2013 04:48" />
                      <outline text="" />
                      <outline text="Jesselyn Radack (born December 12, 1970) is a former ethics adviser to the United States Department of Justice who came to prominence as a whistleblower after she disclosed that the Federal Bureau of Investigation (FBI) committed what she believed to be an ethics violation in their interrogation of John Walker Lindh (the &quot;American Taliban&quot; captured during the 2001 invasion of Afghanistan) without an attorney present, and alleged that the Department of Justice attempted to suppress that information. The Lindh case was the first major terrorism prosecution after 9/11.[5] Her experience is chronicled in her memoir, TRAITOR: The Whistleblower and the &quot;American Taliban&quot;." />
                      <outline text="She is currently the National Security and Human Rights Director of the Government Accountability Project, a whistleblower organization." />
                      <outline text="Early life and education[edit]Radack was born in Washington, D.C., and attended Brown University. She was elected to Phi Beta Kappa in her junior year and graduated magna cum laude in 1992 as a triple major with honors in all three majors. Since 1983 when Brown began tracking such data, only one other student has received honors in three concentrations.[6]" />
                      <outline text="Radack graduated from Yale Law School and joined the Justice Department through the Attorney General Honors Program where she practiced constitutional tort litigation from 1995 to 1999 and then worked in the Department&apos;s newly created Professional Responsibility Advisory Office (PRAO) from 1999 to 2002." />
                      <outline text="John Walker Lindh case[edit]Initial inquiry into Lindh case[edit]On December 7, 2001, Radack received an inquiry from Justice Department counterterrorism prosecutor John DePue regarding the ethical propriety of interrogating Lindh in Afghanistan without a lawyer present. He told her that Lindh&apos;s father had retained counsel for his son. This was not known to Lindh. Radack responded that interrogating him was not authorized by law.[7] The principle at issue was that a person represented by a lawyer cannot be contacted by agents of the Justice Department, including the FBI, without permission of that lawyer.[8] According to Radack, her advice was approved by Claudia Flynn, then head of PRAO, and Joan Goldfrank, a senior PRAO attorney.[9]" />
                      <outline text="The FBI proceeded to question Lindh without a lawyer. DePue informed Radack of the interrogation on the 10th, and she advised him that Lindh&apos;s &quot;interview may have to be sealed or only used for national security purposes; however, I don&apos;t have enough information yet to make that recommendation&quot;.[10]" />
                      <outline text="Radack continued to research the issue until December 20, 2001, when Flynn told her to drop the matter because Lindh had been &quot;Mirandized&quot;. It was later learned that the FBI agent Christopher Reimann who read Lindh the Miranda warning had, when noting the right to counsel, ad-libbed: &quot;Of course, there are no lawyers here&quot;.[11]" />
                      <outline text="U.S. government statements on Lindh&apos;s legal rights[edit]On January 15, 2002, five weeks after the interrogation, Attorney GeneralJohn Ashcroft announced that a criminal complaint was being filed against Lindh. &quot;The subject here is entitled to choose his own lawyer&quot;, Ashcroft said, &quot;and to our knowledge, has not chosen a lawyer at this time&quot;.[7] On February 5, 2002, Ashcroft announced Lindh&apos;s indictment, saying that his rights &quot;have been carefully, scrupulously honored&quot;.[12]" />
                      <outline text="In early 2004 Radack indicated in an interview that she disagreed with Ashcroft&apos;s view but could see its logic, that Lindh had not himself chosen a lawyer, so he was not represented by one. &quot;You can debate it one way or another&apos;&apos;, she said.[6] She was more troubled by the ethical issues,[6] later citing the same ruling the government cites to support its legal position.[13] In Moran v. Burbine (1986), the Supreme Court held that police were within the law in not telling a suspect (who had waived his Miranda rights) that his sister had retained counsel for him,[6] but the Court also granted that the police behavior was unethical and could rise to a violation of legal rights in more egregious circumstances.[14]" />
                      <outline text="In early 2005 Radack recalled her reaction to Ashcroft&apos;s statements more starkly: &quot;I knew that wasn&apos;t true&quot;.[15]" />
                      <outline text="Poor performance review[edit]On February 4, 2002, the day before the Lindh indictment was announced, Flynn gave Radack an unscheduled &quot;blistering&quot; performance evaluation, despite Radack having received a merit raise the year before.[7] It covered December 27, 2001, to September 30, 2002, two months prior to the Lindh inquiry, and did not mention that case, but it criticized her legal judgment in issues related to the case and in other matters.[6][16] Flynn had not yet signed the review. She advised Radack to find another job or the review would be put in Radack&apos;s official personnel file.[7] Radack, who had planned on being a career civil servant, soon found a new job in the private sector.[17][7]" />
                      <outline text="Missing emails[edit]On March 7, 2002, while Radack was still working at PRAO, the lead prosecutor in the Lindh case, Randy Bellows, messaged Radack that there was a court order for all of the Justice Department&apos;s internal correspondence about Lindh&apos;s interrogation.[7] He said that he had two of her messages and wanted to make sure he had everything." />
                      <outline text="Radack immediately became concerned that the court order had been deliberately concealed from her.[5] She had written more than a dozen emails on the subject, and neither of the ones Bellows had received copies of reflected her fear that the FBI&apos;s actions had been unethical and that Lindh&apos;s confession, which was the basis for the criminal case, might have to be sealed.[11] Radack checked the hard-copy file and found that the thick stack of paper had been unstapled and reduced to a few sheets including only three of her emails, along with cover sheets indicating that Flynn had sent copies of those three to the Lindh prosecutors.[11][18] Radack confided in a senior colleague, former U.S. Attorney Donald McKay, who examined the file and told her that it had been &quot;purged&quot;.[19]" />
                      <outline text="With the assistance of technical support, Radack then recovered 14 email messages from her computer archives and gave them to Flynn with a cover memorandum. When Flynn asked Radack why the messages weren&apos;t in the file, Radack said she didn&apos;t know, and her supervisor said &quot;Now I have to explain why PRAO should not look bad for not turning them over&quot;.[20] Radack took home a copy of the recovered emails to ensure they wouldn&apos;t &quot;disappear&quot; again.[21]" />
                      <outline text="Which emails the Department of Justice supplied to the court, and when, cannot be determined directly because the court placed them under seal.[17] In March 2003 investigative journalist Jane Mayer of The New Yorker reported that &quot;[a]n official list compiled by the prosecution confirms that the Justice Department did not hand over Radack&apos;s most critical e-mail in which she questioned the viability of Lindh&apos;s confession until after her confrontation with Flynn&quot;.[11] Radack continues to rely on Mayer&apos;s report.[13]" />
                      <outline text="On December 31, 2003, Radack requested the court appoint a special prosecutor to probe the alleged suppression of the emails.[22] The government responded that it had supplied the emails to the court in its initial response to the court order seeking them, i.e., on March 1, 2002.[23] The description of the 24 documents (probably including duplicates) provided to the court at that time matches Radack&apos;s emails, including the one that states interviewing Lindh is not authorized by law.[24] DePue, the recipient of the emails, also had copies and states that they were submitted to the court.[25] The judge rejected Radack&apos;s request as &quot;impertinent&quot;.[26]" />
                      <outline text="In 2004 Radack filed suit against the government (see below). In 2005, the court found that &quot;[t]hough Flynn informed Radack that she would send the emails to Bellows, Radack maintains that she had a &apos;good faith belief&apos; that this never occurred...Radack was mistaken, for in filings submitted to the Virginia District Court on March 1, 2002, and March 11, 2002, Bellows turned over thirty-three PRAO-related documents, including Radack&apos;s fourteen emails, ex parte and under seal, for in camera review&quot;.[27]" />
                      <outline text="Disclosure to Newsweek of emails believed to have been purged[edit]Radack resigned from the Justice Department on April 5, 2002. In June 2002 she heard a broadcast on NPR stating that the Department claimed they had never taken the position that Lindh was entitled to counsel during his interrogation. She later wrote, &quot;I knew this statement was not true. It also indicated to me that the Justice Department must not have turned over my e-mails to the Lindh court..because I did not believe the Department would have the temerity to make public statements contradicted by its own court filings, even if those filings were in camera.&quot; She reasoned that &apos;&apos;disclosure of my e-mails would advance compliance with the Lindh court&apos;s discovery order while also exposing gross mismanagement and abuse of authority by my superiors at the Justice Department.&quot;[28]" />
                      <outline text="After hearing the broadcast, Radack sent the emails to Michael Isikoff, a Newsweek reporter, who had been interviewed in the NPR story.[6] He wrote an article about the purportedly missing emails[29] that appeared online June 15, 2002.[30] He did not reveal his source for the emails." />
                      <outline text="Radack has said she did not turn the documents over to the court or prosecutors at the time she recovered them because she felt intimidated by Flynn, who had told her to drop the matter.[31] Later, no longer working in government, she reasoned, &quot;I couldn&apos;t go to the court because Justice Department lawyers would argue (as they did when I eventually did try to tell my story to the court) that I had no standing. I couldn&apos;t go to a Member of Congress because, as a resident of the District of Columbia, I didn&apos;t have a voting representative. What I could do is disclose my story to the press--a judicially-sanctioned way of exposing wrongdoing under the Whistleblower Protection Act of 1989, which provides protection to federal government employees who blow the whistle on what they reasonably believe evidences a violation of any law, rule, or regulation; gross mismanagement; or an abuse of authority&quot;.[32]" />
                      <outline text="Radack&apos;s reasoning assumed her emails were the position of the Department of Justice. Representatives of the Department have denied that. Michael Chertoff, then head of the criminal division that was prosecuting Lindh, viewed her emails as only a preliminary step in developing a PRAO position.[6] (Chertoff elaborated that position, and that the advice was not known to him or sought by those responsible for the decision to interview Lindh, in answers to questions from Senator Edward Kennedy, discussed below.)" />
                      <outline text="Radack and some others believe her disclosure of the emails may have contributed to the plea agreement that led to a sentence of 20 years instead of possible multiple life sentences for Lindh.[33] The plea deal was reached on July 15, 2002, a month after the Newsweek article on the emails appeared online and just hours before the hearing to consider the motions to suppress the Lindh interviews was set to begin.[34] According to Lindh defense attorneys, the prosecution first approached them about a plea deal around the beginning of June.[35] On June 14, the day before the emails were disclosed, and June 17, the Lindh defense filed their arguments to suppress all the interviews conducted in Afghanistan, including the ones that Radack had advised might have to be suppressed.[36] The defense reasoning was different than Radack&apos;s; it did not assert that Lindh was represented by a lawyer at the time, which was the basis for Radack&apos;s advice in the emails.[37] Because of the plea deal, the legal questions regarding the interviews were not adjudicated." />
                      <outline text="Justice Department actions against Radack[edit]On June 19, 2002, the Lindh court ordered the Justice Department to file a pleading &quot;addressing whether any documents ordered protected by the Court were disclosed by any person bound by an Order of this court&quot;. The Justice Department launched a criminal investigation of Radack that remained open for 15 months.[38] No potential criminal charge was ever specified, but since leaking is not a crime, the most likely charge would have been theft of government property,[17] as she had taken home copies of her emails before she resigned from the PRAO,[39] and her PRAO supervisor later insinuated she was suspected of having removed other files that had gone missing.[40] Radack says an agent of the Department of Justice&apos;s Office of the Inspector General (OIG) told her new employer and coworkers that she was under criminal investigation[41] and would steal client files.[42][43]" />
                      <outline text="Radack believes the OIG agent pressured her employer to fire her.[43] The firm was initially supportive, but after it obtained phone records of calls between Newsweek writer Isikoff and the firm&apos;s office showing that Radack appeared to be the leaker of government emails, that changed. A partner in the firm, which represented mainly government bond issuers, told her they could not be perceived to have an ex-government lawyer who broke confidence when she thought the client was wrong. When she continued to refuse to sign a statement that she did not leak the emails, she was placed on paid and then unpaid leave.[44]" />
                      <outline text="When Radack was granted unemployment benefits, her now-former employer was assisted by the Justice Department, she says,[43] in challenging the benefits on the grounds of her alleged misconduct and insubordination. She won the appeal.[44]" />
                      <outline text="It is not known how her employer obtained records of phone calls between her and Isikoff. They could have been obtained by the firm from the phone company, since they were records of calls to and from their phones. The firm also had records of calls Isikoff made to the Justice Department, which must have been supplied by the government, who knew because the calls were to them.[45]" />
                      <outline text="The Lindh court issued an order on November 6, 2002, concluding that Radack&apos;s disclosure did not violate any order of the Court, but this order was not made available to Radack until two years later.[46]" />
                      <outline text="The Department of Justice notified Radack that the criminal investigation was closed on September 11, 2003. On October 31, 2003, the Department of Justice&apos;s Office of Professional Responsibility (OPR) sent letters to the bar associations of the two jurisdictions in which she was licensed to practice law referring her for a possible ethics violation. The referrals proposed that in disclosing the emails she may have knowingly revealed information protected by attorney-client privilege.[47] There is disagreement about whether the government or the public is the client of government attorneys.[6] Radack bypassed that issue by invoking the Whistleblower Protection Act (WPA), which she argues provides the legal basis for an exception to attorney-client privilege, i.e., for disclosure when permitted or authorized by law.[48] The Justice Department responded that the WPA may not apply to former employees, and that it does not authorize any disclosure, only prevents retaliatory personnel actions for certain disclosures.[49]" />
                      <outline text="OPR did not follow its own policies in making the referrals, according to Radack, including in not allowing her to formally respond to its findings.[50] She has contrasted the way she was treated by the Department of Justice and the way the department attorneys who authored the memos giving a purported legal basis for waterboarding and other controversial interrogation methods were treated.[51]" />
                      <outline text="There was never any serious investigation of how Radack&apos;s emails disappeared from the PRAO file, she believes, a conclusion reached in part because no investigator questioned her about it. She says the OIG told her attorney they had &quot;looked into&quot; her allegations and they were &quot;not going to pursue it&quot;.[51]" />
                      <outline text="The criminal investigation and subsequent ethics referrals prevented Radack from finding suitable work as an attorney for years, she says.[6][32][52] The Maryland Bar dismissed the referral February 23, 2005.[27] At the District of Columbia Bar the referral is still pending (as of June 1, 2012).[51]" />
                      <outline text="Radack says she was placed on the &quot;No-Fly List&quot;, by which she refers to the Selectee portion of the Terrorist Watchlist.[53] Selectees are submitted to extra security screening before boarding a flight.[54] She reports that for a time she was selected for extra security on each flight, at least 19 flights by her count, and that one airline told her she was on the list.[55] She believes she was eventually removed from the list, after she had complained to the Transportation Security Administration Ombudsman and the ACLU.[32]" />
                      <outline text="Radack claims that one or more anonymous Justice Department officials have &quot;smeared&quot; her in the media as a &quot;traitor&quot;, &quot;turncoat&quot;, and &quot;terrorist sympathizer&quot;[43][51][56] &quot;to alienate me from all my neighbors, all my friends&quot;,[57] sometimes specifying it was in the New York Times.[57][42][55] Google searches of the Times website confirm only that in 2003 Times journalist Eric Lichtblau wrote, &quot;Government officials suspect [Radack] is a turncoat&quot;, without indicating whether the word was his or theirs.[58][59]" />
                      <outline text="She has implied she is under a gag order, saying in the context of general remarks about gag orders, &quot;There are certain things I cannot talk to you about, and I can&apos;t say anything more than that&quot;.[60]" />
                      <outline text="In 2008 Radack said that she had spent hundreds of thousands of dollars fighting the government actions against her.[61] For a time beginning in 2003, noted constitutional scholar and former Associate Deputy Attorney General under Ronald Reagan, Bruce Fein, represented Radack pro bono.[6]" />
                      <outline text="Congressional questions[edit]In March 2003 U.S. Senator Edward M. Kennedy submitted questions about Radack&apos;s allegations to Attorney General John Ashcroft. On May 7, with no answers yet, Kennedy pressed the matter with Michael Chertoff, who oversaw the criminal division that prosecuted Lindh, and who was before the Senate Judiciary Committee as a nominee for a circuit court judgeship.[62][63]" />
                      <outline text="Chertoff said Lindh was deemed not to be represented by a lawyer he had not chosen, and he denied that PRAO was consulted about Lindh. His answers did not satisfy Kennedy, who followed up with written questions. Chertoff qualified his earlier answer by saying &quot;those at the Department responsible for the Lindh matter&quot; did not seek PRAO advice. He added, &quot;I am not aware that PRAO ever took an official position about the Lindh interrogation or that any views expressed by an individual PRAO attorney were documented, factually and legally substantiated, reviewed and authorized, as I would expect before an official opinion was rendered&quot;.[64]" />
                      <outline text="Kennedy described Chertoff&apos;s responses as &quot;non-responsive, evasive, and hyper-technical&quot; and requested and received a week&apos;s delay in the committee&apos;s vote on his nomination. Kennedy was more satisfied, though still troubled, by the responses to a second round of written questions in which Chertoff acknowledged that he learned after the Lindh interviews that a lawyer in his division, DePue, had consulted PRAO. He implied DePue was not acting on behalf of those responsible for decisions in the Lindh case, and that he was peripheral to the decision process.[62][64] (The New York Times reported that DePue has &quot;detailed numerous contacts he had with lawyers inside and outside the [criminal] division on Mr. Lindh&apos;s questioning&quot;. DePue says he was told by a supervisor that the criminal division&apos;s leadership, by which DePue inferred Chertoff, was upset that he contacted PRAO.[58])" />
                      <outline text="Kennedy also questioned Chertoff about how Radack was treated. Chertoff denied any knowledge of that.[62][64] After meeting with Chertoff, Kennedy announced his support for his nomination but said, &quot;I remain very concerned about Ms. Radack&apos;s situation. According to press reports&apos;--and the Department has never issued any statement disputing them&apos;--Ms. Radack was in effect fired for providing legal advice on a matter involving ethical duties and civil liberties that higher-level officials at the Department disagreed with&quot;.[62] (The New York Times reported that Justice Department officials disputed that characterization.[58]) On May 22 several Democrats on the Judiciary Committee said they wanted more time to review Radack&apos;s allegations, but the committee voted 13-0, with six Democrats voting present, to send the nomination on to the full Senate,[65] where it was confirmed 88&apos;&apos;1 on June 9.[66]" />
                      <outline text="Radack suit against the Justice Department[edit]On October 28, 2004, Radack sued the Department of Justice, alleging that its Office of Professional Responsibility violated the Privacy Act of 1974 and the Administrative Procedure Act in connection with its referral of professional misconduct allegations to District of Columbia and Maryland Bar officials.[67] The lawsuit was dismissed in 2006.[68]" />
                      <outline text="After DOJ[edit]Radack served on the D.C. Bar Legal Ethics Committee from 2005 to 2007. From 2006 until 2008, she represented government contractors blowing the whistle on fraud in the reconstruction of Iraq. Since 2008, she has served as the director of National Security &amp; Human Rights at the Government Accountability Project. She was one of the attorneys who represented National Security Agency whistleblower Thomas Andrews Drake, with whom she won the 2011 Sam Adams Award, given annually by the Sam Adams Associates for Integrity in Intelligence.[2][69] They also both won the 2012 Hugh M. Hefner First Amendment Award. Her writing has appeared in the Los Angeles Times, The Washington Post, Salon, Philadelphia Inquirer, Legal Times, National Law Journal, The Nation, and numerous law journals. She maintains a blog at the DailyKos." />
                      <outline text="See also[edit]References[edit]&#094;Huffington Post, &quot;D.C. Lawyer Jesselyn Radack Wins Hugh M. Hefner First Amendment Award For Whistleblower Work&quot;, June 3, 2012&#094; abBlaylock, Dylan (2011-11-17). &quot;Radack, Drake Win Sam Adams Award&quot;. Government Accountability Project. Retrieved 2012-01-05. &#094;http://groups.yahoo.com/group/truthabout911/message/7495&#094;http://dl.lib.brown.edu/dbdh/bdh_render.php?issue=1261009366316461&amp;div=DIVL14&amp;pid=0&#094; abCharlie Savage: Takeover, p.108-109. Little, Brown &amp; Company, 2007.&#094; abcdefghijEmily Gold Boutilier, &quot;The Woman Who Knew Too Much,&quot;Brown Alumni Magazine, March/April 2004, p.35.&#094; abcdefJane Mayer, The Dark Side, pp. 93-97. Doubleday, 2008.&#094;The application of the &quot;no-contact rule&quot; to the Department of Justice is discussed by James S. Montana, Jr., and John A. Galotto &quot;Right to Counsel: Courts Adhere to Bright-line Limits.&quot;Criminal Justice Magazine 16:2 Summer 2001, see section &quot;Ethical rules in lieu of constitutional protections&quot;. Radack has indicated that she was relying on that principle, e.g., in &quot;Whistleblower Charges Justice Dept. with Misconduct in Chertoff&apos;s Prosecution of John Walker Lindh,&quot;Democracy Now, January 13, 2005.&#094;David McGowan, &quot;Politics, Office Politics, and Legal Ethics: A Case Study in the Strategy of Judgment&quot;, University of San Diego School of Law, San Diego Legal Studies Paper No. 07-55, September 7, 2006, p. 7.&#094;Proffer of Facts in Support of Suppression Motion, at 19, United States v. John Philip Walker Lindh, Crim. No. 02-37-A (E.D. VA 2002), cited in McGowan, p. 7.&#094; abcdJane Mayer, &quot;Lost in the Jihad&quot;, The New Yorker, 10 March 2003, p. 57-59&#094;&quot;Transcript of John Ashcroft &apos;&apos; February 5, 2002&quot;. Transcripts.cnn.com. 2002-02-05. Retrieved 2010-03-22. &#094; abJesselyn Radack&apos;s Post at The CenterLine: The Blog of the Center on Law and Security, New York University School of Law, 13 March 2010&#094;Quoted by Radack in Jesselyn Radack&apos;s Post at The CenterLine: The Blog of the Center on Law and Security, New York University School of Law, 13 March 2010&#094;Jesselyn Radack &quot;A Whistle-Blower&apos;s Inside View of the Homeland Security Nominee&quot;, Los Angeles Times, February 4, 2005.&#094;McGowan, p. 8-9.&#094; abcLaurie Abraham, &quot;Anatomy of a Whistleblower&quot;, Mother Jones, January/February 2004 p. 62&#094;Complaint Against United States Department of Justice, Radack v. United States Department of Justice, No. 04-1881 (D.D.C. 2004), &#182;18.&#094;McGowan, p.11.&#094;Complaint Against United States Department of Justice, Radack v. United States Department of Justice, No. 04-1881 (D.D.C. 2004), &#182;22.&#094;Declaration of Jesselyn Radack, Exhibit 1, &#182;18, Response to Defendant&apos;s Motion to Dismiss or, in the Alternative, Response to Defendant&apos;s Motion for Summary Judgment, March 15, 2005, Radack v. United States Department of Justice, No. 04-1881 (D.D.C. 2004).&#094;Boutilier&#094;McGowan, p. 15; a copy of the government&apos;s response is at http://legalethicsforum.typepad.com/blog/files/MoDismissExh8.pdf.&#094;McGowan, p. 13-14, 47; a copy of the government&apos;s motion that includes the description is at http://legalethicsforum.typepad.com/blog/files/ProtectiveOrderMotion.pdf.&#094;McGowan, p. 14; a copy of his statement is at http://legalethicsforum.typepad.com/blog/files/OppDePueDecl.pdf.&#094;McGowan, p 15; a copy of the order is at http://legalethicsforum.typepad.com/blog/files/UnsealingOrder.pdf.&#094; abRadack v. U.S. Dept. of Justice, Memorandum Opinion and Order, August 9, 2005, 402 F. Supp. 99 (U.S. District Court for the District of Columbia 2005).&#094;Declaration of Jesselyn Radack, Exhibit 1, &#182;&#182;20, 23-24, Response to Defendant&apos;s Motion to Dismiss or, in the Alternative, Response to Defendant&apos;s Motion for Summary Judgment, March 15, 2005, Radack v. United States Department of Justice, No. 04-1881 (D.D.C. 2004); quoted by McGowan, p. 12-13.&#094;Michael Isikoff, &quot;The Lindh Case E-Mails,&quot; Newsweek, June 24, 2002, p.8.&#094;Declaration of Jesselyn Radack, Exhibit 1, &#182;31, Response to Defendant&apos;s Motion to Dismiss or, in the Alternative, Response to Defendant&apos;s Motion for Summary Judgment, March 15, 2005, Radack v. United States Department of Justice, No. 04-1881 (D.D.C. 2004).&#094;Emily Gold Boutilier &quot;Mail Room: Senior writer Emily Gold Boutilier replies,&quot;Brown Alumni Magazine May/June 2004.&#094; abcJesselyn Radack &quot;Whistleblowing in Washington,&quot;Reform Judaism Spring 2006.&#094;Radack &quot;Whistleblowing in Washington&quot;; on the sentence: &quot;&apos;I plead guilty,&apos; Taliban American says,&quot; CNN July 17, 2002.&#094;Toni Locy and Kevin Johnson, &quot;Lindh plea removes risks of trial,&quot;USA Today Jul6 16, 2002.&#094;Terry Frieden and Laura Bernardini, &quot;Lindh plea bargain talks began last week,&quot; CNN July 15, 2002.&#094;U.S. District Court Eastern District of Virginia High Profile Cases (Alexandria), Criminal Docket for Case #: 1:02-cr-00037-ALL&#094;The defense arguments are summarized in Tony Locy &quot;Court hearing begins on use of Lindh statements,&quot;USA Today July 15, 2002.&#094;Complaint Against United States Department of Justice, Radack v. United States Department of Justice, No. 04-1881 (D.D.C. 2004), &#182;&#182;34-35, 39.&#094;Declaration of Jesselyn Radack, Exhibit 1, &#182;18, Response to Defendant&apos;s Motion to Dismiss or, in the Alternative, Response to Defendant&apos;s Motion for Summary Judgment, March 15, 2005, Radack v. United States Department of Justice, No. 04-1881 (D.D.C. 2004).&#094;Sworn Statement of Claudia J. Flynn, Exhibit 4, &#182;10, Response to Defendant&apos;s Motion to Dismiss or, in the Alternative, Response to Defendant&apos;s Motion for Summary Judgment, March 15, 2005, Radack v. United States Department of Justice, No. 04-1881 (D.D.C. 2004).&#094;Complaint Against United States Department of Justice, Radack v. United States Department of Justice, No. 04-1881 (D.D.C. 2004), &#182;35.&#094; ab&quot;Jesselyn Radack Was the Justice Department Official Who Knew Too Much -- A BuzzFlash Interview&quot;BuzzFlash (website), February 16, 2007&#094; abcdJesselyn Radack, &quot;When whistle-blowers suffer&quot;, Los Angeles Times, April 27, 2010.&#094; abDouglas McCollam, The Trials of Jesselyn Radack, The American Lawyer, July 2003, p. 19.&#094;Douglas McCollam &quot;Who&apos;s Tracking Your Calls? And how far will the Department of Justice go to burn a leaker?&quot;Columbia Journalism Review March 28, 2004; Jesselyn Radack, &quot;Wake Up Call: U.S. Government Targets Journalists, Happened to Me in 2003, Risen in 2006, AP in 2013&quot;, Daily Kos, May 14, 2013.&#094;Jesselyn Radack: The Canary in the Coalmine, p. 69. Sheridan, 2006; Complaint Against United States Department of Justice, Radack v. United States Department of Justice, No. 04-1881 (D.D.C. 2004), &#182;37.&#094;Complaint Against United States Department of Justice, Radack v. United States Department of Justice, No. 04-1881 (D.D.C. 2004), &#182;&#182;39-40.&#094;Complaint Against United States Department of Justice, Radack v. United States Department of Justice, No. 04-1881 (D.D.C. 2004), &#182;&#182;30-32.&#094;Defendant&apos;s Reply in Support of Motion to Dismiss or, in the Alternative, for Summary Judgment, p. 19 fn. 11-12, April 22, 2005, Radack v. United States Department of Justice, No. 04-1881 (D.D.C. 2004)&#094;Declaration of Jesselyn Radack, Exhibit 1, &#182;40, Response to Defendant&apos;s Motion to Dismiss or, in the Alternative, Response to Defendant&apos;s Motion for Summary Judgment, March 15, 2005, Radack v. United States Department of Justice, No. 04-1881 (D.D.C. 2004).&#094; abcdScott Horton &quot;Traitor: Six Questions for Jesselyn Radack,&quot;Harper&apos;s Magazine June 1, 2012.&#094;&quot;Whistle-Blower: Protection Act Doesn&apos;t Cover Enough People,&quot;All Things Considered, NPR, August 01, 2013&#094;Elaine Cassel, &quot;Broken Wings: The Indignities of Being on the No-Fly List by Jesselyn Radack&quot;, City Pages Blogs, April 15, 2004. (Though the byline is Cassel&apos;s, Radack wrote all but the last sentence.)&#094;&quot;Step 1: Should I Use DHS TRIP?: More About Screening and Watchlists&quot; U.S. Department of Homeland Security.&#094; abReprehensor (pseudonym) &quot;Truthtelling with Rowley, Radack and Wright,&quot; Democratic Underground (discussion board), August 13, 2005. Interview with Radack, August 5, 2005.&#094;Jesselyn Radack Traitor: The Whistleblower and the &quot;American Taliban,&quot; Whistleblower Press (2012), Chapter 1: &quot;Shoot The Messenger&quot;&#094; abJenny Jiang, &quot;Transcript: Panel Q&amp;A on Bradley Manning and the media on June 2, 2013,&quot; All Souls Church Unitarian, Washington, D.C., What The Folly?! (blog), June 17, 2013.&#094; abcEric Lichtblau &quot;Dispute Over Legal Advice Costs a Job and Snarls a Nomination,&quot;New York Times May 22, 2003.&#094;The Google searches used (August 9, 2013) were: site:nytimes.com jesselyn radack &quot;traitor&quot;; site:nytimes.com jesselyn radack &quot;turncoat&quot;; site:nytimes.com jesselyn radack &quot;terrorist sympathizer&quot;.&#094;&quot;Jesselyn Radack at FFF Conference 2008, 5 of 6,&quot; at 5:16. Video of Jesselyn Radack speaking on &quot;Conscience Over Career: The Prosecution of the American Taliban&quot; at the Future of Freedom Foundation&apos;s Restoring the Republic, June 7, 2008. See also part 6 of this series of videos, where she talks about her fear of the consequences of breaking the order.&#094;&quot;Jesselyn Radack at FFF Conference 2008, 6 of 6,&quot; (video) at 1:11.&#094; abcdEdward Kennedy, Sr., &quot;Statement of Senator Edward M. Kennedy Regarding the Nomination of Michael Chertoff to the United States Court of Appeals for the Third Circuit&quot;, May 22, 2003.&#094;Hearings before the Committee on the Judiciary, United States Senate, One Hundred Eight Congress, First Session, April 30, May 7, May 22, June 25, and July 9, 2003, Serial No. J-108-1, Part 3, U.S. Government Printing Office (2003).&#094; abcJesselyn Radack &quot;Giving me Flashbacks: Bush Officials Lying to Congress About Political Justice Department Firing&quot;Daily Kos March 22, 2007.&#094;Eric Lichtblau, &quot;Panel Clears 3 Bush Nominees for Senate Vote&quot;, New York Times May 23, 2003.&#094;U.S. Senate Roll Call Votes 108th Congress - 1st Session, Vote Number 211, June 9, 2003.&#094;Complaint Against United States Department of Justice, Radack v. United States Department of Justice, No. 04-1881 (D.D.C. 2004).&#094;Radack v. U.S. Dept. of Justice, CV 04-01881 (HHK) (U.S. District Court for the District of Columbia 2006).&#094;Radack, Jesselyn (2011-11-21). Attorney Jesslyn Radack: More whistle blowers have been charged during Obama admin. then all other presidents together (Flash). Washington, D.C.: Sam Adams Associates for Integrity in Intelligence. External links[edit]PersondataNameRadack, JesselynAlternative namesShort descriptionAmerican whistleblowerDate of birth12 December 1970Place of birthWashington DCDate of deathPlace of death" />
              </outline>

              <outline text="The Convenience of Commerce | Philip Jacob / Whirlycott">
                      <outline text="Link to Article" type="link" url="http://www.whirlycott.com/phil/2006/01/19/the-convenience-of-commerce/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383452753_6StZwE2T.html" />
      <outline text="Sun, 03 Nov 2013 04:25" />
                      <outline text="" />
                      <outline text="I didn&apos;t know that the federal Department of Transportation was responsible for regulating time zones in the US. Actually, I never knew that they were regulated at all, come to think of it. A few counties in Indiana just switched time zones and I happened to notice this in the news." />
                      <outline text="It&apos;s also interesting to note this:" />
                      <outline text="Under the Uniform Time Act of 1966, the Secretary of Transportation has the authority to set time-zone boundaries and must base decisions on the &apos;&apos;convenience of commerce.&#189;?" />
                      <outline text="It struck me as quite forthright that the decision to change a time zone should be based on commercial needs rather than whatever We The People happen to be thinking at a given point in time." />
                      <outline text=". Bookmark the" />
                      <outline text="." />
              </outline>

              <outline text="snopes.com: Daylight Saving Time Origins">
                      <outline text="Link to Article" type="link" url="http://www.snopes.com/science/daylight.asp" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383452548_rg2y5pmp.html" />
      <outline text="Sun, 03 Nov 2013 04:22" />
                      <outline text="" />
                      <outline text="Even though there&apos;s no particular legend associated with the subject, we often receive inquiries from readers wondering how and when we started the annual practice of fiddling with our clocks twice a year, so we&apos;ve put together a brief history of Daylight Saving Time.Prior to 2007, Daylight Saving Time (the second word is properly singular) began on the first Sunday in April; on that day, clocks were moved forward one hour in each time zone at 2:00 AM local time. Commencing in 2007, DST begins on the second Sunday in March (which in 2013 was March 10). Clocks are again shifted back in the fall; previously this return to &quot;normal&quot; time took place on the last Sunday in October, but since 2007 it occurs on the first Sunday in November (which in 2013 is November 3)." />
                      <outline text="The purpose of the shift is to transfer, in effect, an hour&apos;s worth of daylight from the early morning hours of the day, when only milkmen and chickens are awake to appreciate it, and use it to push back sunset until one hour later in the day. This arrangement is claimed to cut electricity usage in the evening and help reduce traffic accidents." />
                      <outline text="The concept of something much like Daylight Saving Time was referenced by Benjamin Franklin in a satirical 1784 essay titled &quot;An Economical Project.&quot; After several European countries put daylight time into practice during World War I, the United States formally adopted it in 1918, but it proved unpopular and was discontinued in 1919. (The U.S. still had a large agrarian sector back then, and far fewer businesses stayed open into the later evening hours, so most people tended to rise and retire earlier than they do today, negating the practicality of shifting an hour&apos;s worth of daylight away from early morning.)" />
                      <outline text="Although some cities and states opted to continue daylight time after 1919, it did not return on a national level until World War II, when it was referred to as &quot;War Time&quot; and observed year-round between 1942 and 1945. From 1945 through 1966 there was no federal law in effect to establish guidelines for daylight time, leaving states and municipalities to observe it how and when they chose, if at" />
                      <outline text="all.By 1966 the different daylight time practices throughout the country were a source of difficulty for businesses that had to follow strict time schedules, such as television networks and airlines, so that year Congress passed the Uniform Time Act which specified that Daylight Saving Time begin on the last Sunday of April and end on the last Sunday of October. (States were still free to pass laws exempting themselves from the daylight time scheme.) After the &quot;energy crisis&quot; of 1973 precipitated by an Arab oil embargo against the U.S., President Nixon signed the Emergency Daylight Saving Time Conservation Act, which put the United States on Daylight Saving Time for the fifteen-month period between January 1974 and April 1975." />
                      <outline text="In 1986 federal law was amended to start Daylight Saving Time earlier in the year, the change now occurring at 2:00 AM on the first Sunday in April and ending at 2:00 AM on the last Sunday in October. Several states and territories of the U.S. (Arizona, Hawaii, Puerto Rico, the Virgin Islands, American Samoa, Guam, and the Northern Marianas Islands) do not observe daylight time." />
                      <outline text="In August 2005, the United States Congress passed the Energy Policy Act, which changed the dates of both the start and end of daylight saving time (DST). As of 2007, DST now starts three weeks earlier (2:00 AM on the second Sunday in March) and ends one week later (2:00 AM on the first Sunday in November) than before." />
                      <outline text="Our DSTease page describes how a prankish newspaper editor put one over on the national press with his idea for a Daylight Saving Time &quot;contest&quot; in 1984." />
                      <outline text="Last updated:   2 November 2013" />
                      <outline text="Urban Legends Reference Pages (C) 1995-2013 by Barbara and David P. Mikkelson.This material may not be reproduced without permission.snopes and the snopes.com logo are registered service marks of snopes.com." />
              </outline>

              <outline text="TSA Officer Slain in LAX Shooting Was Husband of Warner Bros. Marketing Budget Manager - TheWrap">
                      <outline text="Link to Article" type="link" url="http://www.thewrap.com/slain-tsa-officer-xxxxxxxx/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383451592_6YtG67Vr.html" />
      <outline text="Sun, 03 Nov 2013 04:06" />
                      <outline text="" />
                      <outline text="The victim, 39-year-old Gerardo Hernandez, was married to WB marketing budget manager Ana Machuca" />
                      <outline text="The TSA officer who was shot and killed at Los Angeles International Airport on Friday was the husband of Ana Machuca, a manager of worldwide marketing budgets at Warner Bros., TheWrap has learned." />
                      <outline text="Transportation Safety Administration officials on Friday night identified the shooting victim as Gerardo Hernandez, 39. He was shot around 9:20 a.m. Friday morning by a lone gunman, later identified as 23-year-old Los Angeles resident Paul Ciancia." />
                      <outline text="The suspect approached the security checkpoint at LAX&apos;s Terminal 3 and opened fire, killing Hernandez. Three other people were wounded, one of them also a TSA agent, who was not identified." />
                      <outline text="Also read: LAX Shooter Kills TSA Agent, Prompts Mass Evacuation and Lockdown; Suspect Identified" />
                      <outline text="Ciancia made his way into the airport terminal where he exchanged gunfire with LAX police and LAPD officers; he was taken into custody and was reportedly in critical condition with gunshot wounds to the chest." />
                      <outline text="Hernandez was the first TSA officer to be killed in the line of duty since the administration was formed in the wake of the Sept. 11, 2001 terrorist attacks. An individual familiar with the situation said that Machuca and Hernandez had small children together." />
                      <outline text="Machuca, who has been with Warners for more than eight years, is responsible for managing the studio&apos;s annual advertising and publicity budgets, including forecasting ultimates and other financial analysis. The California State University-Northridge grad was formerly a financial analyst at Disney." />
                      <outline text="&apos;&apos;No words can explain the horror that we experienced today when a shooter took the life of a member of our family and injured two TSA officers at Los Angeles International Airport,&apos;&apos; TSA administrator John Pistole said in a statement." />
                      <outline text="Warner Bros. confirmed that Hernandez was married to Machuca, but had no further comment." />
              </outline>

              <outline text="SPLC EXCLUSIVE: Alleged LAX shooter referenced antigovernment &apos;manifesto&apos; | Southern Poverty Law Center">
                      <outline text="Link to Article" type="link" url="http://www.splcenter.org/get-informed/news/splc-exclusive-alleged-lax-shooter-referenced-antigovernment-manifesto" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383451451_Aen5nzyP.html" />
      <outline text="Sun, 03 Nov 2013 04:04" />
                      <outline text="" />
                      <outline text="The 23-year-old man who allegedly killed a TSA official at Los Angeles International Airport yesterday was carrying a one-page &apos;&apos;manifesto&apos;&apos; that included references to the &apos;&apos;New World Order,&apos;&apos; the Federal Reserve and &apos;&apos;fiat currency,&apos;&apos; according to a knowledgeable source with ranking law enforcement contacts." />
                      <outline text="Paul Anthony Ciancia, who allegedly wounded three other TSA workers before being shot and critically wounded himself, also expressed antagonism toward the Department of Homeland Security (DHS) and its chief until she resigned in August, Janet Napolitano, the source said. Ciancia&apos;s note called former Secretary Napolitano a &apos;&apos;bull dyke&apos;&apos; and contained the phrase &apos;&apos;FU Janet Napolitano,&apos;&apos; the source said." />
                      <outline text="Ciancia&apos;s language and references seemed to put him squarely in the conspiracy-minded world of the antigovernment &apos;&apos;Patriot&apos;&apos; movement. The New World Order refers to a longstanding conspiracy theory that today, in its most popular iteration, claims that global elites are plotting to form a socialistic &apos;&apos;one-world government&apos;&apos; that would crush American freedoms. Often, the root of the alleged conspiracy is traced to the 1913 creation of the Federal Reserve and the adoption of fiat currency &apos;-- paper money that is not backed by gold, as it was once was in the U.S." />
                      <outline text="So-called Patriots also increasingly see the DHS, which produces intelligence assessments of extremists that are distributed to other law enforcement agencies, as an enemy and even a collaborator in the New World Order conspiracy. Many believe DHS has targeted their movement and is somehow connected to the alleged construction of concentration camps by the Federal Emergency Management Agency (FEMA). The purported camps are thought to be meant for those Americans who resist a coming national seizure of all weapons from U.S. citizens.The TSA, short for the Transportation Security Administration, is an agency of the DHS charged with ensuring the security of transportation, most notably air transportation. Although it has not been widely singled out by Patriots, it has been subjected to criticism by far-right homophobes, among others, who have alleged that TSA agents engaging in hand searches are really sexually groping travelers." />
                      <outline text="One witness told MSNBC that Ciancia asked people at the airport if they were TSA and, if they said they were not, moved on without trying to harm them." />
                      <outline text="Yesterday, several news organizations reported that Ciancia was carrying a hand-written document referring to his desire to kill &apos;&apos;TSA and pigs.&apos;&apos; Pete Williams and Andrew Blankstein of NBC News, who first reported that Ciancia had referred to the New World Order, also wrote that a source said his manifesto &apos;&apos;expressed animus toward racial minorities.&apos;&apos; Hatewatch was not able to confirm that allegation." />
                      <outline text="Hatewatch has no records of Ciancia and he is not known to have joined or participated in the activities of any radical groups. Reporters talking to his neighbors have not yet found any evidence of such participation or radical statements." />
                      <outline text="The attack, which Ciancia allegedly carried out using a semi-automatic 223-caliber AR-15, comes at a time when the Patriot movement has been growing by leaps and bounds, from some 149 groups in 2008 to 1,360 last year, according to counts by the Southern Poverty Law Center. That explosive growth seems to have been driven by the election of our first black president and the approaching loss of a white majority in the U.S. that he represents. Another driver is the crash of the economy, which coincided neatly with the rise to national power of President Obama." />
              </outline>

              <outline text="WARNING GRAPHIC CONTENT: First photo of shot TSA killer | New York Post">
                      <outline text="Link to Article" type="link" url="http://nypost.com/2013/11/02/warning-graphic-content-first-photo-of-shot-tsa-killer/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383451390_gsayHLZg.html" />
      <outline text="Sun, 03 Nov 2013 04:03" />
                      <outline text="" />
                      <outline text="This is the face of a madman." />
                      <outline text="A blood-drenched Paul Ciancia lays stunned on the floor at Los Angeles International Airport after brave airport cops shot him four times, including once in the face, to stop his rampage through the crowded terminal that left one TSA agent dead and six other people hurt on Friday." />
                      <outline text="LAX shooter Paul Ciancia on the floor after being shot by police." />
                      <outline text="Ciancia allegedly had a grudge against the Transportation Security Administration and a hatred for former Homeland Security chief Janet Napolitano, according to the Southern Poverty Law Center." />
                      <outline text="&apos;&apos;FU Janet Napolitano,&apos;&apos; he apparently says in the one-page, handwritten screed, in which he proclaims that airport searches violate his rights." />
                      <outline text="In this stunning first image of the alleged shooter, Ciancia is seen with his hands cuffed behind his slim body, surrounded by law enforcement as he stares off into space, next to a thick, bright pool of his own blood on the floor." />
                      <outline text="The shot he took to the mouth knocked out teeth and split his tongue, sources said. Ciancia, a Pennsville, NJ, native, is in critical condition at UCLA Medical Center." />
                      <outline text="He walked into Terminal 3, whipped out a semi-automatic rifle and began firing away at every Transportation Security Administration employees." />
                      <outline text="TSA Agent Gerardo I. Hernandez, 39, was killed and hundreds of terrified air travelers ran for safety as Ciancia stalked his way through the terminal." />
                      <outline text="His handwritten note also said he &apos;&apos;wanted to kill TSA and pigs,&apos;&apos; according to reports." />
              </outline>

              <outline text="VIDEO- LAX SHOOTING DUMMY - CIAnCIA a New World Order Conspiracy Theorist - False Flag! - YouTube">
                      <outline text="Link to Article" type="link" url="http://www.youtube.com/watch?v=lctssQ1tP7w#t=95" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383450992_umw4R9Ge.html" />
      <outline text="Sun, 03 Nov 2013 03:56" />
                      <outline text="" />
              </outline>

              <outline text="Everything You Think You Know About Panhandlers Is Wrong | ThinkProgress">
                      <outline text="Link to Article" type="link" url="http://thinkprogress.org/economy/2013/10/30/2856411/panhandling-stats/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383450583_STSzSfG6.html" />
      <outline text="Sun, 03 Nov 2013 03:49" />
                      <outline text="" />
                      <outline text="A new survey of panhandlers in downtown San Francisco dispels a number of myths that society propagates about homeless people." />
                      <outline text="Conventional wisdom is that those on the sidewalk asking for a dollar are lazy freeloaders who will use the money for alcohol or drugs. Some even think that beggars are living large off of handouts, such as Fox News&apos; John Stossel, who has bravely used his television perch to take on beggars. &apos;&apos;I had heard that some people beg for a living and make big bucks &apos;-- $80,000 a year in some cases,&apos;&apos; Stossel told Fox &amp; Friends. &apos;&apos;You really shouldn&apos;t give to these street people,&apos;&apos; Stossel concluded. &apos;&apos;You are really supporting alcoholism and drug problems.&apos;&apos;" />
                      <outline text="Researchers wanted to test out whether this widely held view of panhandlers as lazy alcoholics getting rich off others was correct. The Union Square Business Improvement District, a collection of 500 property owners in downtown San Francisco, hired GLS Research to survey panhandlers over a two-day period in March." />
                      <outline text="They found that, for the vast majority of beggars, Stossel&apos;s view was simply not true." />
                      <outline text="In San Francisco&apos;s Union Square, the typical panhandler is a disabled middle-aged single male who is a racial minority and makes less than $25 per day despite panhandling seven days a week for more than five years. Though Stossel was insistent that panhandlers just use the money for beer and pot, the majority of those surveyed did not. In fact, 94 percent used the meager funds they raised for food." />
                      <outline text="In addition, some justify doing little to fight homelessness because, in their view, many homeless people don&apos;t want help and prefer living on the streets. However, researchers discovered that, on the contrary, just 3 percent of panhandlers don&apos;t want housing." />
                      <outline text="Among the survey&apos;s findings:" />
                      <outline text="83 percent are men48 percent are African American31 percent are white69 percent are single26 percent served in the military70 percent are 40 to 59 years old58 percent have been panhandling for at least five years53 percent panhandle seven days a week60 percent make $25 a day or less94 percent use the money for food44 percent use it for drugs or alcohol62 percent are disabled25 percent are alcoholics32 percent are addicted to drugs82 percent are homelessIn total, 146 people participated in the survey." />
                      <outline text="Researchers also spoke with 400 people who had given money to panhandlers in the past year. They found that the largest group of people who chose to give were young working-class Bay Area residents. Empathy was a main driver; three in five said the gave &apos;&apos;because they or a family member may be in need someday.&apos;&apos;" />
              </outline>

              <outline text="Hillary Clinton&apos;s Lucrative Goldman Sachs Speaking Gigs | National Review Online">
                      <outline text="Link to Article" type="link" url="http://www.nationalreview.com/corner/362637/hillary-clintons-lucrative-goldman-sachs-speaking-gigs-alec-torres" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383450146_VutbSMGW.html" />
      <outline text="Sun, 03 Nov 2013 03:42" />
                      <outline text="" />
                      <outline text="Hillary Clinton spoke at two separate Goldman Sachs events on the evenings of Thursday, October 24 and Tuesday, October 29. As both Politico and the New York Times report, Clinton&apos;s fee is about $200,000 per speech, meaning she likely netted around $400,000 for her paid gigs at Goldman over the course of six days." />
                      <outline text="Last Thursday, Clinton spoke for the AIMS Alternative Investment Conference hosted by Goldman Sachs, a closed event exclusively for Goldman clients. AIMS is an annual conference that explores the latest strategies and products available to financial advisers. At the event, Clinton offered what one attendee described to me as &apos;&apos;prepared remarks followed by questions.&apos;&apos;" />
                      <outline text="On Tuesday, Clinton spoke at the Builders and Innovators Summit, devoted to discussing entrepreneurship and how to help innovators expand and grow their businesses. According to Politico, Clinton conducted a question-and-answer session with Goldman CEO Lloyd Blankfein. Goldman Sachs declined to comment on the subject of her remarks or why Mrs. Clinton in particular was invited to the events." />
                      <outline text="Keeping close to the investment world, Clinton also made visits to private-equity firms KKR in July and the Carlyle Group in September. At KKR&apos;s annual investor meeting in California, Clinton answered questions from firm co-founder Henry Kravis on the Middle East, Washington, and politics. At Carlyle Group, Clinton made a speech to shareholders moderated by Carlyle founder David Rubenstein." />
                      <outline text="Clinton&apos;s office did not respond to a request for comment." />
              </outline>

              <outline text="DON&apos;T BREW THAT CUPPA! Your kettle could be a SPAMBOT &apos; The Register">
                      <outline text="Link to Article" type="link" url="http://www.theregister.co.uk/2013/10/29/dont_brew_that_cuppa_your_kettle_could_be_a_spambot/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383450050_8j8LJtkN.html" />
      <outline text="Sun, 03 Nov 2013 03:40" />
                      <outline text="" />
                      <outline text="5 ways to reduce advertising network latency" />
                      <outline text="Russian authorities have claimed that household appliances imported from China contain tiny computers that seek out open WiFi networks and then get to work sending spam and distributing malware." />
                      <outline text="St Petersburg news outlet Rosbaltreported last week that local authorities had examined kettles and irons and found &apos;&apos;20 to 30 pieces of Chinese home appliance &apos;spy&apos; microchips&apos;&apos; that &apos;&apos;sends some data to the foreign server&apos;&apos;." />
                      <outline text="Just what data is being sent and to where is not discussed, which had Vulture South thinking the report might be spurious." />
                      <outline text="A bit of digging suggests it is legitimate. One source the story mentions, Gleb Pavlov of customs broker Panimport can be found at the link we&apos;ve popped in on the company&apos;s name. We&apos;ve also been able to find this linkto an appliances company called &apos;&apos;Sable Ltd&apos;&apos;, the very name translation engines say is the employer of one Innokenty Fedorov whose company found the bugged appliances." />
                      <outline text="Next question: could someone build a spambot small enough to hide in a kettle or iron? We see no reason why not: the components are small and cheap enough. One last wrinkle: could one convert Russia&apos;s 220v electricity supply to power a small electronic device without frying it, and without making an iron or kettle look rather odd? The answer is yes: all manner of tiny PCB transformers can be had to do the job." />
                      <outline text="Which leaves just one problem in the story: the fact that the report says the WiFi slurper-equipped kit was detected because the appliances were overweight. Unless the appliances were being air-freighted a handful of grams either way would not raise eyebrows, and it is hard to imagine low-cost items like irons were considered worthy of a plane trip. We surmise that whoever made the killer kettles and infiltrated irons cobbled them together with unlovely components that made their presence obvious. &#174;" />
                      <outline text="Supercharge your infrastructure" />
              </outline>

              <outline text="VIDEO-Rob Reiner aka Meathead: Hillary Would Be &apos;Most Qualified Person Ever to Run for President&apos; | MRCTV">
                      <outline text="Link to Article" type="link" url="http://www.mrctv.org/videos/rob-reiner-aka-meathead-hillary-would-be-most-qualified-person-ever-run-president" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383447238_3N8kAKvp.html" />
      <outline text="Sun, 03 Nov 2013 02:53" />
                      <outline text="" />
                      <outline text="MRC TV is an online platform for people to share and view videos, articles and opinions on topics that are important to them -- from news to political issues and rip-roaring humor." />
                      <outline text="MRC TV is brought to you by the Media Research Center, a 501(c) 3 nonprofit research and education organization. The MRC is located at: 1900 Campus Commons Drive, Reston, VA  20194. For information about the MRC, please visit www.MRC.org." />
                      <outline text="Copyright (C) 2013, Media Research Center. All Rights Reserved." />
              </outline>

              <outline text="VIDEO- Israel Attacks Syria - YouTube">
                      <outline text="Link to Article" type="link" url="https://www.youtube.com/watch?v=7FjN8AIX0ZA" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383446848_nVDDcYAJ.html" />
      <outline text="Sun, 03 Nov 2013 02:47" />
                      <outline text="" />
              </outline>

              <outline text="VIDEO- CNN: LAX SHOOTER LINKED TO NEW WORLD ORDER CONSPIRACY THEORY - YouTube">
                      <outline text="Link to Article" type="link" url="https://www.youtube.com/watch?v=f3Z1JaGNrf8" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383445817_N5xdwYxb.html" />
      <outline text="Sun, 03 Nov 2013 02:30" />
                      <outline text="" />
              </outline>

              <outline text="U.S. military commandos fought in Benghazi - Washington Times">
                      <outline text="Link to Article" type="link" url="http://p.washingtontimes.com/news/2013/oct/30/us-military-commandos-made-it-to-benghazi/?page=1" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383444724_PKzhYRJs.html" />
      <outline text="Sun, 03 Nov 2013 02:12" />
                      <outline text="" />
                      <outline text="EXCLUSIVE:" />
                      <outline text="Masked from public view, two of the U.S. military&apos;s elite special operations commandos have been awarded medals for bravery for a mission that further undercuts the Obama administration&apos;s original story about the Benghazi tragedy." />
                      <outline text="SEE ALSO: No more Obama nominees until White House relents on Benghazi: Graham" />
                      <outline text="For months, administration officials have claimed no special operations forces were dispatched from outside Libya to Benghazi during the Sept. 11, 2012, al Qaeda terrorist attacks on the U.S. diplomatic mission and CIA annex because none was within range." />
                      <outline text="The Pentagon, under intense public criticism for not coming to the aid of besieged Americans, published an official timeline in November that carefully danced around the issue." />
                      <outline text="It said time and distance prevented any commandos outside Libya from reaching a CIA compound under attack. The timeline disclosed that a reinforcement flight 400 miles away in Tripoli contained two &apos;&apos;DoD personnel&apos;&apos; but did not describe who they were. Later, the official State Department report on Benghazi said they were &apos;&apos;two U.S. military personnel&apos;&apos; &apos;-- but provided no other details. It made no mention of special operations forces." />
                      <outline text="But sources directly familiar with the attack tell The Washington Times that a unit of eight special operators &apos;-- mostly Delta Force and Green Beret members &apos;-- were in Tripoli the night of the attack, on a counterterrorism mission that involved capturing weapons and wanted terrorists from the streets and helping train Libyan forces." />
                      <outline text="When word of the Benghazi attack surfaced, two members of that military unit volunteered to be dispatched along with five private security contractors on a hastily arranged flight from Tripoli to rescue Americans in danger, the sources said, speaking only on the condition of anonymity because the special operations forces&apos; existence inside Libya was secret." />
                      <outline text="The two special operations forces arrived in time to engage in the final, ferocious firefight between the terrorists and Americans holed up in the CIA annex near the ill-fated diplomatic mission in Benghazi, the sources added." />
                      <outline text="PHOTOS: Inside the U.S. Navy SEALs: See America&apos;s elite warriors unleashed" />
                      <outline text="The two special operators were awarded medals for valor for helping repel a complex attack that killed Ambassador J. Christopher Stephens, another American diplomat and two former Navy SEALs, but spared many more potential casualties." />
                      <outline text="&apos;&apos;Yes, we had special forces in Tripoli, and two in fact did volunteer and engaged heroically in the efforts to save Americans,&apos;&apos; one source told The Times. &apos;&apos;The others were asked to stay behind to help protect Tripoli in case there was a coordinated attack on our main embassy." />
                      <outline text="&apos;&apos;The remaining [special operations forces] were ready to dispatch the next morning, but by that time American personnel had been evacuated to the airport, local militias had provided additional security and it was determined there was no need for them to be dispatched at that point,&apos;&apos; the source added." />
                      <outline text="Pressed why the Pentagon and administration officials did not publicly acknowledge the special operations forces&apos; contribution that tragic night, the sources said officials decided that their anti-terror work inside Libya was sensitive and closely guarded. In addition, U.S. officials did not have a Status of Forces Agreement in place that would have authorized the troops&apos; presence, the sources said." />
                      <outline text="The history of the Benghazi attack is infamous in part for what the White House and Pentagon did not do: no warplanes and no rescue troops from outside Libya." />
                      <outline text="The revelation that some special operations forces did make it to Benghazi the night of the attack is the latest to undermine a carefully crafted story line put out by the president and his aides in the weeks leading into the 2012 election. The administration has since acknowledged that parts of that story line were misleading." />
                      <outline text="&apos;&apos;On the one hand, it is an indictment of the lack of contingency planning by both CIA and DoD, especially given the rising threat profiles in Libya that were well understood &apos;-- and appropriately reported back to D.C. by agency reps on the ground,&apos;&apos; said retired Army Col. Ken Allard. &apos;&apos;So why weren&apos;t there more than just two Delta Force guys to send? Above all: Where were the air and naval resources that should have routinely been included in any contingency planning worthy of the name?&apos;&apos;" />
              </outline>

              <outline text="Amicus curiae - Wikipedia, the free encyclopedia">
                      <outline text="Link to Article" type="link" url="http://en.wikipedia.org/wiki/Amicus_curiae" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383444344_cwChtQpr.html" />
      <outline text="Sun, 03 Nov 2013 02:05" />
                      <outline text="" />
                      <outline text="An amicus curiae (also amicus curi...; plural amici curiae, literally &quot;friend of the court&quot;) is someone who is not a party to a case who offers information that bears on the case but that has not been solicited by any of the parties to assist a court. This may take the form of legal opinion, testimony or learned treatise (the amicus brief) and is a way to introduce concerns ensuring that the possibly broad legal effects of a court decision will not depend solely on the parties directly involved in the case. The decision on whether to admit the information lies at the discretion of the court. The phrase amicus curiae is legal Latin." />
                      <outline text="History[edit]The amicus curiae figure originates in Roman law.[1] Starting in the 9th century,[citation needed] it was incorporated to English law, and it was later extended to most common law systems. Later, it was also introduced in international law, in particular concerning human rights. From there, it was integrated in some civil law systems (it has recently been integrated into Argentina&apos;s law system and Honduras&apos;s 2010 civil procedures code). Today, it is used by the European Court of Human Rights, the Inter-American Commission on Human Rights, the Inter-American Court of Human Rights, and the Court of Justice of the European Union." />
                      <outline text="Presentation[edit]The role of an amicus is often confused with that of an intervener. The role of an amicus is, as stated by Salmon LJ (as Lord Salmon then was) in Allen v Sir Alfred McAlpine &amp; Sons Ltd [1968] 2 QB 229 at p. 266 F-G:" />
                      <outline text="I had always understood that the role of an amicus curiae was to help the court by expounding the law impartially, or if one of the parties were unrepresented, by advancing the legal arguments on his behalf.The situation most often noted in the press is when an advocacy group files a brief in a case before an appellate court to which it is not a litigant. Appellate cases are normally limited to the factual record and arguments coming from the lower court case under appeal; attorneys focus on the facts and arguments most favorable to their clients. Where a case may have broader implications, amicus curiae briefs are a way to introduce those concerns, so that the possibly broad legal effects of court decisions will not depend solely on the parties directly involved in the case." />
                      <outline text="In prominent cases, amici curiae are generally organizations with sizable legal budgets. In the United States, for example, non-profit legal advocacy organizations, such as the American Civil Liberties Union, the Landmark Legal Foundation, the Pacific Legal Foundation, the Electronic Frontier Foundation, the American Center for Law and Justice or NORML, frequently submit such briefs to advocate for or against a particular legal change or interpretation. If a decision could affect an entire industry, companies other than the litigants may wish to have their concerns heard. In the United States, federal courts often hear cases involving the constitutionality of state laws. Hence states may file briefs as amici curiae when their laws are likely to be affected, as in the Supreme Court case McDonald v. Chicago, when thirty-two states under the aegis of Texas (and California independently) filed such briefs.[2]" />
                      <outline text="Amici curiae who do not file briefs often present an academic perspective on the case. For example, if the law gives deference to a history of legislation of a certain topic, a historian may choose to evaluate the claim from specialized expertise. An economist, statistician, or sociologist may choose to do the same. Newspaper editorials, blogs, and other opinion pieces arguably have the capability to influence Supreme Court decisions as de facto amici curiae.[3][4] They are not, however, technically considered amicus curiae, as they do not submit materials to the Court, do not need to ask for leave, and have no guarantee that they will be read." />
                      <outline text="United States Supreme Court Rules[edit]The Supreme Court of the United States has special rules for amicus curiae briefs sought to be filed in cases pending before it. Supreme Court Rule 37 states, in part, such a brief should cover &quot;relevant matter&quot; not dealt with by the parties which &quot;may be of considerable help&quot;.[5] The cover of an amicus brief must identify which party the brief is supporting, or if the brief supports only affirmance or reversal. Supreme Court Rule 37.3(a). The Court also requires that, inter alia, all non-governmental amici identify those providing a monetary contribution to the preparation or submission of the brief. Supreme Court Rule 37.6. Briefs must be prepared in booklet format, and 40 copies must be served with the Court.[6]" />
                      <outline text="In the United States Supreme Court, unless the amicus brief is being filed by the federal government (or one of its officers or agents) or a U.S. state, permission of the court (by means of motion for leave) or mutual consent of the parties is generally required. Allowing an amicus curiae to present oral argument is considered &quot;extraordinary&quot;.[7]" />
                      <outline text="See also[edit]References[edit]Justice, To Assist the Court: Third Party Interventions in the UK (2009)" />
                      <outline text="&#094;Judithanne Scourfield McLauchlan (2005). &quot;Congressional Participation As Amicus Curiae Before the U.S. Supreme Court&quot;. LFB Scholarly Publishing. p. 266. ISBN 1-59332-088-4. &#094;Gura, Alan (7 July 2009). &quot;Thirty-four states support second amendment incorporation&quot;. ChicagoGunCase. &#094;Lee, Rachel C. (April 2009). &quot;Ex Parte Blogging: The Legal Ethics of Supreme Court Advocacy in the Internet Era&quot;. Stanford Law Review61 (6): 1535&apos;&apos;1571. Archived from the original on 2009-05-21. &#094;Dawson, Keith (8 May 2009). &quot;Bloggers Impacting the World of Litigation&quot;. Slashdot. &#094;Rule 37(1).&#094;United States Supreme Court Rule, 33&#094;FRAP 29.External links[edit]" />
              </outline>

              <outline text="Feinstein debuts NSA &apos;&apos;reform&apos;&apos; bill that&apos;s really about the status quo | Ars Technica">
                      <outline text="Link to Article" type="link" url="http://arstechnica.com/tech-policy/2013/10/feinstein-shows-off-nsa-reform-bill-thats-really-about-the-status-quo/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383444212_XHxM6ej6.html" />
      <outline text="Sun, 03 Nov 2013 02:03" />
                      <outline text="" />
                      <outline text="Sen. Feinstein chairs the Senate Intelligence Committee." />
                      <outline text="View all&apos;...Senator Dianne Feinstein (D-CA) has been one of the most stalwart defenders of widespread NSA surveillance since leaks with information about the programs started seeping out nearly five months ago. Civil libertarians and reformers have been none too pleased with her rhetoric&apos;--and they&apos;re not going to get any happier after reading the bill she introduced today." />
                      <outline text="The FISA Improvements Act has already attracted plenty of critics who view it as no improvement at all. In fact, they say, Feinstein&apos;s bill would make things much worse. It would actually enshrine the NSA &quot;bulk data&quot; collection programs into law and grant official Congressional approval to widespread surveillance programs that haven&apos;t ever received such affirmation before." />
                      <outline text="Her bill comes on the heels of a competing bill introduced earlier this week that reformers say would be a real step in the right direction. It would outright ban some of the programs that Feinstein is vociferously defending. Dozens of politicians have now stated they&apos;re ready to end the controversial &quot;bulk data&quot; programs, including the NSA&apos;s practice of keeping a log of every phone call made in the United States. In the House of Representatives, 70 members signed on to a bill proffered by Rep. Jim Sensenbrenner (R-WI), the sponsor of the original Patriot Act, which would shut the programs down. A companion bill in the Senate has a dozen co-sponsors, as well. " />
                      <outline text="&quot;I&apos;d laugh if I weren&apos;t so offended,&quot; said Jennifer Granick, of Stanford&apos;s Center for Internet and Society, in an e-mailed comment about Feinstein&apos;s bill. &quot;It legalizes the currently illegal bulk collection of phone records and its language&apos;--whether sloppily or intentionally, I don&apos;t know&apos;--encourages the NSA to conduct bulk collection of other kinds of records under 215, as well as content, without even the bill&apos;s purported &apos;safeguards.&apos;&quot;" />
                      <outline text="The &quot;enhanced criminal penalties&quot; for unauthorized access to data actually criminalizes anyone who accesses a computer &quot;without authorization,&quot; noted Ruthann Robson, professor of Law at City University of New York. &quot;While couched in protecting privacy and data, this provision would also further sanction and chill whistleblowers.&quot;" />
                      <outline text="&quot;The modest improvements [the bill] makes are far outweighed by the damage it does to civil liberties,&apos;&apos; said Greg Nojeim, of the Center for Democracy and Technology. " />
                      <outline text="In introducing the bill, Feinstein reiterated there&apos;s essentially nothing wrong with the current situation. &quot;The NSA call-records program is legal and subject to extensive congressional and judicial oversight, and I believe it contributes to our national security,&quot; she said. &quot;But more can and should be done to increase transparency and build public support for privacy protections in place.&quot;" />
                      <outline text="Feinstein&apos;s statements about the bill make it sound reform-ish, but when closely read, it mainly constitutes re-iterations of the status quo. For instance, the bill &quot;prohibits the bulk collection of the content of communications under Section 215 of the USA PATRIOT Act&quot; (no emphasis in original). The NSA and its defenders, including Feinstein and President Barack Obama, have already stated repeatedly that they don&apos;t gather content." />
                      <outline text="The legislation would also &quot;prohibit the collection of bulk communication records under Section 215 of the USA PATRIOT Act except under specific procedures and restrictions set forth in the bill.&quot; In other words, it forbids the collection of data unless it&apos;s collected in a way that the intelligence committee approves of&apos;--essentially the same thing that&apos;s been happening for years." />
                      <outline text="The bill includes other safeguards and reporting requirements, most of which are already in place, such as limiting the number of contacts or &quot;hops&quot; that an analyst can get when querying bulk communications." />
                      <outline text="The Senate Intelligence Committee passed the bill out of committee on an 11-4 vote earlier today&apos;--a vote held in a secret, closed session." />
                      <outline text="There seems to be a showdown brewing between surveillance hawks and reformers in Congress. Both sides cross party lines in unexpected ways, and it isn&apos;t clear which side will prevail. Sensenbrenner&apos;s bill has become quickly popular, yet the Senate Intelligence Committee clearly has a strong majority in favor of these programs. Similarly, when General Keith Alexander and Director of National Intelligence James Clapper came to Congress for a hearing on Tuesday, top members of the House Intelligence Committee mostly showed support for their actions. The recent tone suggests that intelligence committees in both houses may be out of step with the sentiment elsewhere in Congress." />
              </outline>

              <outline text="Patent war goes nuclear: Microsoft, Apple-owned &apos;&apos;Rockstar&apos;&apos; sues Google | Ars Technica">
                      <outline text="Link to Article" type="link" url="http://arstechnica.com/tech-policy/2013/10/patent-war-goes-nuclear-microsoft-apple-owned-rockstar-sues-google/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383443799_HYZXrVgZ.html" />
      <outline text="Sun, 03 Nov 2013 01:56" />
                      <outline text="" />
                      <outline text="Rockstar&apos;s reverse-engineering lab in Ottawa, Canada." />
                      <outline text="Canada-based telecom Nortel went bankrupt in 2009 and sold its biggest asset&apos;--a portfolio of more than 6,000 patents covering 4G wireless innovations and a range of technologies&apos;--at an auction in 2011." />
                      <outline text="Google bid for the patents, but it didn&apos;t get them. Instead, the patents went to a group of competitors&apos;--Microsoft, Apple, RIM, Ericsson, and Sony&apos;--operating under the name &quot;Rockstar Bidco.&quot; The companies together bid the shocking sum of $4.5 billion." />
                      <outline text="Patent insiders knew that the Nortel portfolio was the patent equivalent of a nuclear stockpile: dangerous in the wrong hands, and a bit scary even if held by a &quot;responsible&quot; party." />
                      <outline text="This afternoon, that stockpile was finally used for what pretty much everyone suspected it would be used for&apos;--launching an all-out patent attack on Google and Android. The smartphone patent wars have been underway for a few years now, and the eight lawsuits filed in federal court today by Rockstar Consortium mean that the conflict just hit DEFCON 1. " />
                      <outline text="Google probably knew this was coming. When it lost out in the Nortel auction, the company&apos;s top lawyer, David Drummond, complained that the Microsoft-Apple patent alliance was part of a &quot;hostile, organized campaign against Android.&quot; Google&apos;s failure to get patents in the Nortel auction was seen as one of the driving factors in its $12.5 billion purchase of Motorola in 2011." />
                      <outline text="Rockstar, meanwhile, was pretty unapologetic about embracing the &quot;patent troll&quot; business model. Most trolls, of course, aren&apos;t holding thousands of patents from gigantic technology companies. When Rockstar was profiled by Wired last year, about 25 of its 32 employees were former Nortel employees." />
                      <outline text="The suits filed today are against Google and seven companies that make Android smartphones: Asustek, HTC, Huawei, LG Electronics, Pantech, Samsung, and ZTE. The case was filed in the Eastern District of Texas, long considered a district friendly to patent plaintiffs." />
                      <outline text="The lawsuitsThe complaint against Google involves six patents, all from the same patent &quot;family.&quot; They&apos;re all titled &quot;associative search engine&quot; and list Richard Skillen and Prescott Livermore as inventors. The patents describe &quot;an advertisement machine which provides advertisements to a user searching for desired information within a data network.&quot;" />
                      <outline text="The smartphone patent wars have been underway for a few years now, and the conflict just hit DEFCON 1." />
                      <outline text="The oldest patent in the case is US Patent No. 6,098,065, with a filing date of 1997, one year before Google was founded. The newest patent in the suit was filed in 2007 and granted in 2011." />
                      <outline text="The complaint tries to use the fact that Google bid for the patents as an extra point against the search giant. &quot;Google subsequently increased its bid multiple times, ultimately bidding as high as $4.4 billion,&quot; wrote Rockstar&apos;s lawyers. &quot;That price was insufficient to win the auction, as a group led by the current shareholders of Rockstar purchased the portfolio for $4.5 billion. Despite losing in its attempt to acquire the patents-in-suit at auction, Google has infringed and continues to infringe the patents-in-suit.&quot;" />
                      <outline text="The suits against the six manufacturing companies each assert the same patents&apos;--either six or seven of them, depending on the target. The patents cover a variety of innovations and have different inventors. One patent filed in 1997 for a &quot;navigation tool for graphical user interface&quot; describes a way of navigating through electronic documents. Another describes an &quot;Internet protocol filter,&quot; and a third patent describes an &quot;integrated message center.&quot;" />
                      <outline text="The manufacturer lawsuits name the targets&apos; whole array of smartphones and tablets. The lawsuit against Huawei, for instance, claims the infringing products include &quot;the Huawei M865 MUVE, Huawei Ascend II, and Huawei Premia 4G M931, and Huawei&apos;s family of tablets, including but not limited to the Huawei MediaPad and Huawei IDEOS S7 Slim.&quot;" />
                      <outline text="Rockstar has employed two different law firms to file the suits; both firms have patent experience and experience litigating in the Eastern District of Texas. The Google search suit is being handled by Susman Godfrey, which has taken on other sue-the-world patent cases, like Paul Allen&apos;s lawsuits against Facebook, Google, and others." />
                      <outline text="The manufacturer suits, meanwhile, are being handled by McKool Smith, a formidable Texas law firm that has probably wrung more massive verdicts out of tech companies than any other firm. It scored $368 million from Apple for VirnetX, $290 million from Microsoft over i4i&apos;s XML patent, and most recently notched a $173 million verdict against Qualcomm." />
                      <outline text="The ultimate &apos;&apos;patent privateer&apos;&apos;When Wired visited Rockstar&apos;s Ontario headquarters, it found 10 reverse-engineering experts, working daily to take apart products and find patent infringement. With just a few dozen employees, Rockstar is hoping to convince more than 100 technology companies to pay it patent licensing fees for a huge array of products. &quot;Pretty much anyone out there is infringing,&quot; said Rockstar&apos;s CEO, John Veschi." />
                      <outline text="The Rockstar Consortium may be the ultimate example of patent &quot;privateering&quot;&apos;--when big companies hand off their patents to small shell companies to do the dirty work of suing their competitors. Essentially, it&apos;s patent trolling gone corporate." />
                      <outline text="The &quot;privateering&quot; phenomenon has long irked Google. In February, when Google filed a patent lawsuit against British Telecom, it said one of the reasons for the suit was that BT had not only sued Google directly, but it had also gone around &quot;arming patent trolls.&quot;" />
                      <outline text="Part of Rockstar&apos;s strategy is avoiding a patent countersuit by not having any operating businesses. Essentially, the company wants to enjoy the same advantage patent trolls have, even though it&apos;s owned by direct Google competitors like Apple and Microsoft." />
                      <outline text="&quot;The principals have plausible deniability,&quot; said Thomas Ewing, an IP attorney who spoke to Wired about Rockstar. &quot;They can say with a straight face: &apos;They&apos;re an independent company. We don&apos;t control them.&apos; And there&apos;s some truth to that.&quot;" />
                      <outline text="And Rockstar&apos;s CEO was quite straightforward about his belief that whatever promises Microsoft and Apple might have made about how they&apos;ll use their patents, those promises don&apos;t apply to Rockstar. &apos;&apos;We are separate,&apos;&apos; he says. &apos;&apos;That does not apply to us.&apos;&apos;" />
                      <outline text="Rockstar may want to keep the patent conflict as a kind of &quot;proxy war&quot; between Google and its competitors. But Google has plenty of patents, and this new attack seems assured to bring a counterattack." />
                      <outline text="The smartphone market is more valuable than ever, and the $4.5 billion Rockstar purchase shows that Google&apos;s competitors will spare no expense to put a damper on Android, and they hope to make money while they do it. Patents have become the arena in which tech companies have chosen to do battle. Six years after the iPhone and five years after the launch of Android, the stakes keep getting raised." />
              </outline>

              <outline text="Kraft Agrees to Remove Yellow Dye From Macaroni and Cheese">
                      <outline text="Link to Article" type="link" url="http://gawker.com/kraft-agrees-to-remove-yellow-dye-from-macaroni-and-che-1456579699" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383443141_2RvkXH24.html" />
      <outline text="Sun, 03 Nov 2013 01:45" />
                      <outline text="" />
                      <outline text="In a big win for people who spend their time petitioning mega corporations to make unhealthy foods mildly healthier, Kraft Food Group Inc. announced Thursday that they will begin removing dyes from their famously-bright macaroni and cheese." />
                      <outline text="But you can stop hyperventilating because they will not be removing the fake dye from their &apos;&apos;original flavor&apos;&apos; elbow-shaped macaroni and cheese. In a far emptier gesture, they&apos;ll only be removing Yellow 5 and Yellow 6 from the SpongeBob Squarepants, Halloween, and &apos;&apos;winter shapes&apos;&apos; varieties of macaroni and cheese. According to Kraft, they&apos;ll replace the dye with &quot;spices like paprika.&quot; So instead of looking like neon noodles, the new macaroni and cheese will look like SpongeBob Squarepants drowning in blah speckled with paprika." />
                      <outline text="However, Kraft really wants you to know that in no way did this change result from a Change.org petition with 348,000 signatures asking the company to stop using the dyes. According to the vice president of marketing meals at Kraft, Triona Schmelter, the company is simply &apos;&apos;making improvement where we can,&apos;&apos; not paying attention to widely publicized outrage." />
                      <outline text="This will surely come as good news to the party poopers circulating this Change.org petition asking M&amp;Ms to remove artificial dyes from the candies. The authors of this petition, appearing on the Today show this week, assert that the &quot;petroleum-based&quot; dyes cause hyperactivity in children. Their petition currently has 108,000 signatures." />
                      <outline text="First they came for the macaroni and cheese, then they came for the M&amp;Ms. What bright foods will be next?" />
              </outline>

              <outline text="LA Times - 28 solar flares in the last seven days, and more may be coming">
                      <outline text="Link to Article" type="link" url="http://touch.latimes.com/#section/-1/article/p2p-78004938/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383442953_5anttpHb.html" />
      <outline text="Sun, 03 Nov 2013 01:42" />
                      <outline text="" />
                      <outline text="LA Times  Loading..." />
                      <outline text="The page cannot be loaded because you are currently offline. Please check your internet connection and try again, or go back to the previous page." />
                      <outline text="The page you requested was not found." />
              </outline>

              <outline text="Hillary Clinton Reveals Her 2016 Presidential Campaign Theme">
                      <outline text="Link to Article" type="link" url="http://theulstermanreport.com/2013/11/02/hillary-clinton-reveals-her-2016-presidential-campaign-theme/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383441700_PymzNZ5t.html" />
        <outline text="Source: The Ulsterman Report" type="link" url="http://theulstermanreport.com/feed/" />
      <outline text="Sun, 03 Nov 2013 01:21" />
                      <outline text="" />
                      <outline text="Not including the Benghazi 4" />
                      <outline text="Can all these dead people on the Clinton friends list be coincidences&apos;...or well-planned accidents? Copy the list and protect it for use in Killary&apos;s campaign." />
                      <outline text="1 &apos;&apos; James McDougal &apos;&apos; Clinton&apos;s convicted Whitewater partner died of an apparent heart attack, while in solitary confinement. He was a key witness in Ken Starr&apos;s investigation." />
                      <outline text="2 &apos;&apos; Mary Mahoney &apos;&apos; A former White House intern was murdered July 1997 at a Starbucks Coffee Shop in Georgetown. The murder happened just after she was to go public with her story of sexual harassment in the White House." />
                      <outline text="3 &apos;&apos; Vince Foster &apos;&apos; Former White House councilor, and lover of Hillary Clinton at Little Rock&apos;s Rose Law firm. Died of a gunshot wound to the head, ruled a suicide." />
                      <outline text="4 &apos;&apos; Ron Brown &apos;&apos; Secretary of Commerce and former DNC Chairman. Reported to have died by impact in a plane crash. A pathologist close to the investigation reported that there was a hole in the top of Brown&apos;s skull resembling a gunshot wound. At the time of his death Brown was being investigated, and spoke publicly of his willingness to cut a deal with prosecutors. The rest of the people on the plane also died. A few days later the Air Traffic Controller commited suicide." />
                      <outline text="5 &apos;&apos; C. Victor Raiser II &apos;&apos; Raiser, a major player in the Clinton fund raising organization died in a private plane crash in July 1992." />
                      <outline text="6 &apos;&apos; Paul Tulley &apos;&apos; Democratic National Committee Political Director found dead in a hotel room in Little Rock, September 1992. Described by Clinton as a &apos;&apos;Dear friend and trusted advisor&apos;&apos;." />
                      <outline text="7 &apos;&apos; Ed Willey &apos;&apos; Clinton fund raiser, found dead November 1993 deep in the woods in VA of a gunshot wound to the head. Ruled a suicide. Ed Willey died on the same day his wife Kathleen Willey claimed Bill Clinton groped her inthe oval office in the White House. Ed Willey was involved in several Clinton fund raising events." />
                      <outline text="8 &apos;&apos; Jerry Parks &apos;&apos; Head of Clinton&apos;s gubernatorial security team in Little Rock. Gunned down in his car at a deserted intersection outside Little Rock. Park&apos;s son said his father was building a dossier on Clinton. He allegedly threatened to reveal this information. After he died the files were mysteriously removed from his house." />
                      <outline text="9 &apos;&apos; James Bunch &apos;&apos; Died from a gunshot suicide. It was reported that he had a &apos;&apos;Black Book&apos;&apos; of people which contained names of influential people who visited prostitutes in Texas and Arkansas." />
                      <outline text="10 &apos;&apos; James Wilson &apos;&apos; Was found dead in May 1993 from an apparent hanging suicide. He was reported to have ties to Whitewater." />
                      <outline text="11 &apos;&apos; Kathy Ferguson &apos;&apos; Ex-wife of Arkansas Trooper Danny Ferguson, was found dead in May 1994, in her living room with a gunshot to her head. It was ruled a suicide even though there were several packed suitcases, as if she were going somewhere. Danny Ferguson was a co-defendant along with Bill Clinton in the Paula Jones lawsuit. Kathy Ferguson was a possible corroborating witness for Paula Jones." />
                      <outline text="12 &apos;&apos; Bill Shelton &apos;&apos; Arkansas State Trooper and fiancee of Kathy Ferguson. Critical of the suicide ruling of his fiancee, he was found dead in June, 1994 of a gunshot wound also ruled a suicide at the grave site of his fiancee." />
                      <outline text="13 &apos;&apos; Gandy Baugh &apos;&apos; Attorney for Clinton&apos;s friend Dan Lassater, died by jumping out a window of a tall building January, 1994. His client was a convicted drug distributor." />
                      <outline text="14 &apos;&apos; Florence Martin &apos;&apos; Accountant &amp; sub-contractor for the CIA, was related to the Barry Seal Mena Airport drug smuggling case. He died of three gunshot wounds." />
                      <outline text="15 &apos;&apos; Suzanne Coleman &apos;&apos; Reportedly had an affair with Clinton when he was Arkansas Attorney General. Died of a gunshot wound to the back of the head, ruled a suicide. Was pregnant at the time of her death." />
                      <outline text="16 &apos;&apos; Paula Grober &apos;&apos; Clinton&apos;s speech interpreter for the deaf from 1978 until her death December 9, 1992. She died in a one car accident." />
                      <outline text="17 &apos;&apos; Danny Casolaro &apos;&apos; Investigative reporter. Investigating Mena Airport and Arkansas Development Finance Authority. He slit his wrists, apparently in the middle of his investigation." />
                      <outline text="18 &apos;&apos; Paul Wilcher &apos;&apos; Attorney investigating corruption at Mena Airport with Casolaro and the 1980 &apos;&apos;October Surprise&apos;&apos; was found dead on a toilet June 22, 1993 in his Washington DC apartment. Had delivered a report to Janet Reno 3 weeks before his death." />
                      <outline text="19 &apos;&apos; Jon Parnell Walker &apos;&apos; Whitewater investigator for Resolution Trust Corp. Jumped to his death from his Arlington, Virginia apartment balcony August15, 1993. He was investigating the Morgan Guaranty scandal." />
                      <outline text="20 &apos;&apos; Barbara Wise &apos;&apos; Commerce Department staffer. Worked closely with Ron Brown and John Huang. Cause of death unknown. Died November 29, 1996. Her bruised, nude body was found locked in her office at the Department of Commerce." />
                      <outline text="21 &apos;&apos; Charles Meissner &apos;&apos; Assistant Secretary of Commerce who gave John Huang special security clearance, died shortly thereafter in a small plane crash." />
                      <outline text="22 &apos;&apos; Dr. Stanley Heard &apos;&apos; Chairman of the National Chiropractic Health Care Advisory Committee died with his attorney Steve Dickson in a small plane crash. Dr. Heard, in addition to serving on Clinton&apos;s advisory council personally treated Clinton&apos;s mother, stepfather and brother." />
                      <outline text="23 &apos;&apos; Barry Seal &apos;&apos; Drug running pilot out of Mena Arkansas, death was no accident." />
                      <outline text="24 &apos;&apos; Johnny Lawhorn Jr. &apos;&apos; Mechanic, found a check made out to Bill Clinton in the trunk of a car left at his repair shop. Lawhorn was found dead after his car had hit a utility pole." />
                      <outline text="25 &apos;&apos; Stanley Huggins &apos;&apos; Investigated Madison Guaranty. His death was a purported suicide and his report was never released." />
                      <outline text="26 &apos;&apos; Hershell Friday &apos;&apos; Attorney and Clinton fund raiser died March 1, 1994 when his plane exploded." />
                      <outline text="27 and 28 &apos;&apos; Kevin Ives &amp; Don Henry &apos;&apos; Known as &apos;&apos;The boys on the track&apos;&apos; case. Reports say the boys may have stumbled upon the Mena Arkansas airport drug operation. A controversial case, the initial report of death said, was due to boys falling asleep on railroad tracks. Later reports claim the 2 boys had been slain before being placed on the tracks. Many linked to that case died before their testimony could come before a Grand Jury." />
                      <outline text="THE FOLLOWING PERSONS HAD INFORMATION ON THE IVES/HENRY CASE:" />
                      <outline text="29 &apos;&apos; Keith Coney &apos;&apos; Died when his motorcycle slammed into the back of a truck, 7/88." />
                      <outline text="30 &apos;&apos; Keith McMaskle &apos;&apos; Died, stabbed 113 times, Nov 1988" />
                      <outline text="31 &apos;&apos; Gregory Collins &apos;&apos; Died from a gunshot wound January 1989." />
                      <outline text="32 &apos;&apos; Jeff Rhodes &apos;&apos; He was shot, mutilated and found burned in a trash dump in April 1989." />
                      <outline text="33 &apos;&apos; James Milan &apos;&apos; Found decapitated. However, the Coroner ruled his death was due to &apos;&apos;natural causes&apos;&apos;." />
                      <outline text="34 &apos;&apos; Jordan Kettleson &apos;&apos; Was found shot to death in the front seat of his pickup truck in June 1990." />
                      <outline text="35 &apos;&apos; Richard Winters &apos;&apos; A suspect in the Ives / Henry deaths. He was killed in a set-up robbery July 1989." />
                      <outline text="THE FOLLOWING CLINTON BODYGUARDS ARE DEAD:" />
                      <outline text="36 &apos;&apos; Major William S. Barkley Jr." />
                      <outline text="37 &apos;&apos; Captain Scott J . Reynolds" />
                      <outline text="38 &apos;&apos; Sgt. Brian Hanley" />
                      <outline text="39 &apos;&apos; Sgt. Tim Sabel" />
                      <outline text="40 &apos;&apos; Major General William Robertson" />
                      <outline text="41 &apos;&apos; Col. William Densberger" />
                      <outline text="42 &apos;&apos; Col. Robert Kelly" />
                      <outline text="43 &apos;&apos; Spec. Gary Rhodes" />
                      <outline text="44 &apos;&apos; Steve Willis" />
                      <outline text="45 &apos;&apos; Robert Williams" />
                      <outline text="46 &apos;&apos; Conway LeBleu" />
                      <outline text="47 &apos;&apos; Todd McKeehan" />
              </outline>

              <outline text="Phil Simon: Big Data and Teenage Sex">
                      <outline text="Link to Article" type="link" url="http://www.philsimon.com/blog/featured/big-data-and-teenage-sex/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383441630_CRdZFPfa.html" />
      <outline text="Sun, 03 Nov 2013 01:20" />
                      <outline text="" />
                      <outline text="17 FlaresFilament.io17 Flares&#151;&apos;&apos;Big data is like teenage sex: everyone talks about it, nobody really knows how to do it, everyone thinks everyone else is doing it, so everyone claims they are doing it.&apos;&apos;" />
                      <outline text="&apos;&apos;Dan Ariely" />
                      <outline text="In a word, brilliant. You&apos;ll get no argument from me." />
                      <outline text="I see myriad surveys, polls, and reports that &apos;&apos;most&apos;&apos; organizations are embracing Big Data. For instance, as Matt Asay onReadWriteWeb writes:" />
                      <outline text="According to a recent Gartner report, 64% of enterprises surveyed indicate that they&apos;re deploying or planning Big Data projects (emphasis mine). Yet even more acknowledge that they still don&apos;t know what to do with Big Data. Have the inmates officially taken over the Big Data asylum?" />
                      <outline text="That&apos;s a big jump (64% in 2013 compared to 58% in 2012), and it reflects a growing confidence that Big Data can help to enhance the customer experience (54% cited this as their driving motivation), improve process efficiency (42%) and launch new products or business models (39%)." />
                      <outline text="So, slowly but surely, Big Data is making inroads in the enterprise, right?" />
                      <outline text="Color me a skeptic, but I just don&apos;t buy these statistics. For every Amazon, Apple, Facebook, Google, Netflix, and Twitter, there are thousands of mid-sized and large enterprises doing nothing. Probably more." />
                      <outline text="Is this understandable? Of course. Most organizations do a poor job managing Small Data (read: the transactional, structured, relational data that undergirds their operations.) Tony Fisher covers this in his book The Data Asset (affiliate link)." />
                      <outline text="Simon SaysMaybe in a few years, Ariely&apos;s quote won&apos;t hold water. At this point, though, it&apos;s spot-on." />
                      <outline text="FeedbackWhat say you?" />
                      <outline text="17 Flares1Facebook11LinkedIn0Google+3Buffer2Filament.io17 Flares&#151;Tags: Quotes, Too Big to Ignore" />
              </outline>

              <outline text="LAX shooting: Charges filed against alleged gunman - chicagotribune.com">
                      <outline text="Link to Article" type="link" url="http://www.chicagotribune.com/news/chi-los-angeles-airport-shooting-20131102,0,6773320.story" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383440380_wW2ULknf.html" />
      <outline text="Sun, 03 Nov 2013 00:59" />
                      <outline text="" />
                      <outline text="LOS ANGELES&apos;--" />
                      <outline text="Federal prosecutors on Saturday filed a murder charge against the alleged gunman in the shooting rampage at Los Angeles International Airport in which a Transportation Security Administration screener was killed." />
                      <outline text="Other charges related to firing a weapon inside an international airport were also filed against 23-year-old Paul Anthony Ciancia, who was identified by police as the man who opened fire inside Terminal 3 about 9:20 a.m. Friday. At an FBI news briefing Saturday, officials confirmed that Ciancia used an assault rifle in the attack." />
                      <outline text="If convicted, Ciancia faces life in prison without parole, or possibly the death penalty, authorities said Saturday." />
                      <outline text="At the briefing, FBI officials said Ciancia&apos;s intent was made &quot;very, very clear&quot; in a note in which he &quot;indicated his anger and malice toward TSA officers.&quot;" />
                      <outline text="David Bowdich, FBI special agent in charge, said that in Ciancia&apos;s  handwritten note, his goal was to &quot;instill fear into their traitorous minds.&quot; " />
                      <outline text="Ciancia remained in critical condition Saturday morning after law enforcement sources said he was shot in the leg and head by LAX police. Because of his injuries, federal authorities had not been able to interview Ciancia, Bowdich said." />
                      <outline text="Authorities on Saturday were still trying to learn a motive. But a federal law enforcement official briefed on the investigation told The Times that the note found with Ciancia contained a rant against the government and the words &apos;&apos;kill TSA.&quot;" />
                      <outline text="DISTURBING TEXT MESSAGE" />
                      <outline text="In New Jersey, police and FBI agents descended on Ciancia&apos;s family&apos;s home in Pennsville Township." />
                      <outline text="Pennsville Police Chief Allen Cummings said he had been contacted by Ciancia&apos;s father before the shooting, prompted by a worrisome text message from the young man to his brother." />
                      <outline text="The police chief declined to say more about what was in the text message but said that family members told investigators they had no previous indications that Ciancia, who moved to California about 18 months ago, was troubled." />
                      <outline text="A U.S. official who asked not to be identified said federal investigators were trying to determine if the gunman had been targeting TSA agents in the rampage." />
                      <outline text="Neighbors who live across the street from the Ciancia family said the father, also named Paul, runs an auto body shop in the town." />
                      <outline text="&quot;I believe he worked for his father,&quot; said one neighbor, Jennifer Pagan, of the younger Paul." />
                      <outline text="Her husband, Orlando Pagan, said the elder Ciancia had made several friendly gestures since they had moved into their house 10 years ago. When Hurricane Sandy hit New Jersey last year, &quot;he asked if we wanted to take our personal vehicle and put it on his property.&quot; The Ciancia property is slightly higher." />
                      <outline text="TSA AGENT&apos;S WIDOW &apos;DEVASTATED&apos;" />
                      <outline text="The gunman shot at least two Transportation Security Administration employees, one fatally, said Bowdich. TSA Administrator John S. Pistole traveled to Los Angeles on Saturday to meet with the family of Gerardo I. Hernandez, 39, the screener who was shot and killed on Friday. Pistole also met the two TSA officers who are recovering from gunshot wounds, officials said." />
                      <outline text="Hernandez&apos;s wife, Ana, said Saturday her husband was &quot;always there to help anyone in need.&quot;" />
                      <outline text="&quot;We are hurting,&quot; she said. &quot;I am truly devastated.&quot;" />
                      <outline text="Flanked by TSA Administrator John Pistole, Ana Hernandez said her husband was &quot;always excited to go to work.&quot; The youngest of four siblings, she said, Gerardo moved to the United States from El Salvador at age 15 and graduated from Los Angeles High School." />
                      <outline text="&quot;It&apos;s devastating because he was such a great guy,&quot; one of Hernandez&apos;s friends, Kevin Maxwell, told KNBC. Maxwell said Hernandez was the &quot;very proud&quot; father of a boy and a girl." />
                      <outline text="Hernandez was one of two shooting victims taken to Harbor-UCLA Medical Center. When he arrived, doctors said it was evident there was no chance of survival." />
                      <outline text="A round of shots broke into fragments inside his torso and caused chest injuries and debilitating internal bleeding." />
                      <outline text="&quot;We made every effort to stop the bleeding and get the heart to beat on its own,&quot; Dr. David Plurad told NBC News." />
                      <outline text="TSA Administrator Pistole, who appeared outside the Hernandez home with Ana, called the incident &quot;a senseless tragedy.&quot;" />
                      <outline text="&quot;This is a time of great reflecting for us,&quot; he said." />
                      <outline text="Pistole said officials will be examining their policies and assessing them, though he acknowledged: &quot;We can&apos;t guard against all threats and all risks.&quot;" />
                      <outline text="Los Angeles police officers will be wearing black mourning bands in memory of Hernandez, ChiefCharlie Beck of Los Angeles Police Department said on Twitter." />
                      <outline text="Meanwhile the airport said its 100-foot pylons would light the night blue through Sunday in Hernandez&apos;s honor." />
                      <outline text="Hernandez is the first TSA officer killed in the line of duty since the agency was created 69 days after the Sept. 11, 2001, terror attacks." />
                      <outline text="&apos;&apos;No words can explain the horror that we experienced today when a shooter took the life of a member of our family and injured two TSA officers at Los Angeles International Airport,&apos;&apos; Pistole said in a letter to TSA employees sent on Friday." />
                      <outline text="Authorities said that during the rampage, Ciancia approached several people cowering in the  terminal, pointed the gun at them and asked if they &apos;&apos;were TSA.&apos;&apos; If the answer was no, he moved on without pulling the trigger. A witness told The Los Angeles Times that the gunman cursed the TSA repeatedly as he moved through the terminal." />
                      <outline text="Authorities said Ciancia was shot and wounded by police in an exchange of gunfire at the airport&apos;s busy Terminal 3. He was shot in the leg and head, making it difficult for authorities to gather information, a law enforcement official told The Los Angeles Times." />
                      <outline text="KCAL-TV footage appeared to show the bloodied gunman handcuffed to a gurney as he was wheeled out of the terminal. He remained in critical condition at Ronald Reagan UCLA Medical Center as of Saturday morning." />
                      <outline text="The incident was over in less than 10 minutes but caused chaos at the world&apos;s sixth-busiest airport and disrupted thousands of flights across the nation." />
                      <outline text="Armed with an assault rifle, the shooter touched off panic and chaos at one of the world&apos;s busiest airports. Hundreds of travelers ran for safety or frantically dove for cover behind luggage, and loud alarms blared through the terminal." />
                      <outline text="Traveler Lauren Stephens, 47, said she had just put her luggage on the scale at the ticket counter in Terminal 3 when she heard a series of gunshots. &quot;Somebody just yelled &apos;Run&apos; at the top of their lungs. ... I just left my bag and I just ran like hell. Everybody ran.&quot;" />
                      <outline text="The gunman, a U.S. citizen who appeared to be acting alone, pushed through the screening gates and ran into an area where passengers were boarding flights, before law enforcement officers caught up with him in a food court, Patrick Gannon, chief of the Los Angeles Airport Police, said at a news conference." />
                      <outline text="The officers shot him at least once and took him into custody, he said." />
              </outline>

              <outline text="When Chivalry Became Benevolent Sexism | Stuff.co.nz">
                      <outline text="Link to Article" type="link" url="http://www.stuff.co.nz/national/9356095/When-chivalry-became-the-new-sexism" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383440147_8VUug7uU.html" />
      <outline text="Sun, 03 Nov 2013 00:55" />
                      <outline text="" />
                      <outline text="When a man holds a door open for a woman, is it chivalry or sexism? Or, to be precise, &quot;benevolent sexism&quot;?" />
                      <outline text="Benevolent sexism has been identified as the flip side of the &quot;hostile&quot; sexism that would banish women to the kitchen." />
                      <outline text="It&apos;s a distincition that has been looked at by Auckland University researchers in a survey of the attitudes of more than 6500 New Zealanders." />
                      <outline text="Study author Matthew Hammond said benevolent sexism portrays women as &quot;fragile and delicate and in need of protection&quot; and emphasised their emotional qualities." />
                      <outline text="The study found that many women embraced benevolent sexism. Those women were also more likely to be psychologically &quot;entitled&quot; - a symptom of a narcissistic personality where people feel they are deserving or more special than others." />
                      <outline text="Hammond said it was predicted the two traits would go together as benevolent sexism appeared to &quot;promise&quot; things to women." />
                      <outline text="Television presenter Ali Mau said she believed benevolent sexism was predominantly &quot;an older generation thing&quot; that would probably die out with her parents&apos; generation, or perhaps with her own generation." />
                      <outline text="&quot;These people who protest that it&apos;s chivalrous - I think there&apos;s some deep-seated sexism there.&quot;" />
                      <outline text="From an informal poll of her younger workmates, the custom of a man paying on a first date was still common, she said. &quot;But generally the woman will insist on paying on the second date.&quot;" />
                      <outline text="Auckland University law student Olivia Lubbock, 22, who was part of a feminist parody of the pop song Blurred Lines, said she hadn&apos;t experienced any hostile sexism recently but &quot;I definitely agree there&apos;s a lot of benevolent sexism&quot;." />
                      <outline text="Particularly in the dating world, there was still an expectation that women were supposed to be &quot;demure&quot; and &quot;fit into a certain stereotype&quot; - the &quot;good girl&quot; of the Blurred Lines song, for example." />
                      <outline text="Lubbock said she had noticed benevolent sexism in the workplace where men offered to lift boxes for her when &quot;I like to lift my own boxes&quot;. The old-school staple of opening doors for someone was still gratefully received but &quot;anybody can hold a door open for anyone else&quot;." />
                      <outline text="&quot;That&apos;s where we need to be heading rather than this notion that men need to protect women.&quot;" />
                      <outline text="The link between benevolent sexism and entitlement did not surprise her." />
                      <outline text="&quot;I think there are women whose parents actively encourage them to be entitled. As mature young women we have to be realistic - you can&apos;t expect everything to be given to you on a gold plate.&quot;" />
                      <outline text="Anna Guy, the sister of murdered Feilding farmer Scott Guy, said sexism had got &quot;a lot better than it used to be maybe 10 years ago&quot;." />
                      <outline text="Benevolent sexism was difficult to separate from a new attitude of people looking after each other and gender roles becoming more shared, she said." />
                      <outline text="&quot;It might not be exactly equal but men also look after children and work.&quot;" />
                      <outline text="Is a man opening a door for a woman &quot;benevolent sexism&quot;?" />
                      <outline text="Guy: &quot;It&apos;s definitely impressive. I feel like they don&apos;t have to - if they don&apos;t want to I wouldn&apos;t be offended. It&apos;s a bonus.&quot;" />
                      <outline text="Olivia Lubbock: &quot;Anyone can hold a door open for anyone else.&quot;" />
                      <outline text="Study author Hammond: &quot;I open the door for everyone. I know when I open the door for someone it&apos;s not because they are a man or a woman, it&apos;s because they are behind me . . . but they don&apos;t know that.&quot;" />
                      <outline text="Alison Mau: &quot;I open doors for men and they open doors for me. It&apos;s about who&apos;s better placed to offer the courtesy.&quot;" />
                      <outline text="- (C) Fairfax NZ News" />
              </outline>

              <outline text="VIDEO-October 27: Issa, Shaheen, Shenon, Johnson - CBS News Video">
                      <outline text="Link to Article" type="link" url="http://www.cbsnews.com/video/watch/?id=50157975n" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383436066_W4tv6pKb.html" />
      <outline text="Sat, 02 Nov 2013 23:47" />
                      <outline text="" />
                      <outline text="September 29: Paul, Durbin, Blackburn, Van Hollen" />
                      <outline text="The latest on the possible government shutdown and negotiations with Iran, with Sens. Dick Durbin, D-Ill., and Rand Paul, R-Ky., Reps. Chris Van Hollen, D-Md., and Marsha Blackburn, R-Tenn., Zbigniew Brzezinski, Gerald Seib, David Ignatius, Clarissa Ward, Margaret Brennan and John Dickerson." />
              </outline>

              <outline text="Drug Reduces Gambling Behavior In Slot Machine-Loving Rats | Popular Science">
                      <outline text="Link to Article" type="link" url="http://www.popsci.com/article/science/drug-reduces-gambling-behavior-slot-machine-loving-rats?src=SOC&amp;dom=tw" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383435455_aeCGkykU.html" />
      <outline text="Sat, 02 Nov 2013 23:37" />
                      <outline text="" />
                      <outline text="Scientists have found a way to reduce gambling-type behaviors in rats by blocking a specific dopamine receptor, signaling a potential treatment for pathological gambling. " />
                      <outline text="In a study led by Paul Cocker, a Ph.D. student in psychology at the University of British Columbia, a group of 32 rats compulsively used a slot-machine-like system of three flashing lights that lit up when the rats pushed one of two levers. If all three lights lit up, the rats won 10 sugar pellets, delivered when they hit a &quot;cash out&quot; lever. When any other combination of lights flashed, the rats lost, and if they pushed the lever to cash out, they received a 10-second penalty before they could play again. If they chose a different lever, the &quot;roll again&quot; one, it allowed them to play again without penalty." />
                      <outline text="Like humans, the rats fell prey to the &quot;near miss&quot; effect, where an almost-winning combination feels a little bit like a win in itself&apos;--though there&apos;s no reward. The rats often chose the &quot;cash out&quot; lever instead of the &quot;roll again&quot; lever when two of the three lights flashed. Near misses tend to make peoplekeep playing, and the researchers suggest that slot machines&apos; high rate of near misses make them a particularly addictive form of gambling." />
                      <outline text="To try to reduce the rats&apos; gambling behaviors, the researchers blocked dopamine D4 receptors, which have been linked topathological gambling. Blocking the receptors reduced the rats&apos; tendency to treat near misses as wins, seemingly decreasing the rewarding aspect of those two flashing lights." />
                      <outline text="In human trials, the dopamine blocker used here has proved ineffective as an antipsychotic in schizophrenic patients, so it&apos;s not certain these findings would easily translate to people. &apos;&apos;More work is needed, but these findings offer new hope for the treatment of gambling addiction,&quot; Cocker said. Especially for all those Vegas-going rats." />
                      <outline text="The study is available inBiology Psychiatry." />
              </outline>

              <outline text="VIDEO-LAX eyewitness: &apos;Keep running, keep running&apos; | Fox News Video">
                      <outline text="Link to Article" type="link" url="http://video.foxnews.com/v/2793550749001/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383435204_hLvVY82E.html" />
      <outline text="Sat, 02 Nov 2013 23:33" />
                      <outline text="" />
                      <outline text="This transcript is automatically generated" />
                      <outline text="INTO DROP OFF PASSENGERS TO PUT THEM ON BUSES." />
                      <outline text="WE HAVE A NUMBER OF CORRESPONDENTS ON THE GROUND AND WE ARE GETTING A LOT OF TWEETS IN HERE." />
                      <outline text="YES, WE ARE STANDING NEXT TO TERMINAL TWO." />
                      <outline text="THE AIR TRAFFIC HAS CONTINUED." />
                      <outline text="THAT IS ABOUT IT." />
                      <outline text="NOTHING NORMAL FOR LAX." />
                      <outline text="I WANT TO GET TO THE TWO WITNESSES." />
                      <outline text="IT IS ABOUT A THREE HOUR DRIVE DOWN." />
                      <outline text="IF YOU DON&apos;T KNOW, IT IS UP STAIRS." />
                      <outline text="DOWNSTAIRS IS WHERE PEOPLE ARRIVE." />
                      <outline text="WE WERE PUTTING BELONGINGS ONTO THE BELT TO BE SCREENED AND WE HEARD 8 SHOTS RING OUT." />
                      <outline text="WE HIT THE DECK AND FOR ABOUT I DON&apos;T KNOW 15 SECONDS WE WERE DOWN AND EVERYBODY STARTED RUNNING DOWN INTO THE GATES, THE TERMINAL THERE." />
                      <outline text="TSA WAS RUNNING WITH US." />
                      <outline text="AS WE WERE RUNNING, THERE WERE PROBABLY 15 TO 20 SHOTS THAT WE HEARD BEHIND US." />
                      <outline text="WE RAN OVER TOWARDS TERMINAL TWO UNDER PLANES AND SO ALL OF THE PEOPLE THAT WERE IN LINE TO BE SCREENED, WE STORMED THROUGH THE SECURITY GATES." />
                      <outline text="THAT IS BREACHING SECURITY TOO." />
                      <outline text="WE KEPT RUNNING AWAY FROM THE SHOTS AND WE DUCKED INTO TERMINAL TWO." />
                      <outline text="SCARY MOMENTS HERE FOR SURE AT LAX." />
                      <outline text="&gt;&gt; I HAVE BEEN TALKING TO MARK AND AUDREY WHILE YOU HAVE BEEN ON THE AIR." />
                      <outline text="YOU DON&apos;T HAVE YOUR SHOE." />
                      <outline text="YOU ARE WEARING ONLY ONE SHOE." />
                      <outline text="&gt;&gt; I WAS AT THE SCREENING AREA." />
                      <outline text="I WAS PUTTING MY BELONGINGS IN THE TRAY I HAD ONE BOOT OFF AND I PUT MY BOOT IN THE TRAY AND WE FELL TO THE FLOOR AND ON TOP OF EACH OTHER." />
                      <outline text="IT WAS LIKE A DREAM IT WASN&apos;T REAL IT WAS LIKE A MOVIE." />
                      <outline text="IT WAS SO INTENSE." />
                      <outline text="AND WE PANICKED." />
                      <outline text="AND JUST STARTED FLOODING THROUGH THE SCREENING XRAY MACHINES AND TSA WAS RIGHT THERE WITH US." />
                      <outline text="I&apos;M SHAKING I&apos;M SCARED." />
                      <outline text="THEY SAY THERE COULD BE A GUNMAN ON THE ROOF." />
                      <outline text="I JUST WANT TO GET OUT OF HERE." />
                      <outline text="&gt;&gt; I TALKEDED TO LAW ENFORCEMENT MOMENTS AGO." />
                      <outline text="THEY DON&apos;T BELIEVE THERE IS A SECOND GUNMAN ANY WHERE." />
                      <outline text="PEOPLE LIKE THE HENRY&apos;S LEFT THEIR BAGS." />
                      <outline text="&gt;&gt; MY ID IS IN THERE." />
                      <outline text="EVERYTHING IS BACK AT THE SCREENING." />
                      <outline text="AND WE JUST WANT TO KNOW IF IT IS OKAY." />
                      <outline text="&gt;&gt; ONE OF THE BYPRODUCTS OF YOU LEAVING IT THERE NOW THE BOMB SQUAD HAS TO GO THROUGH THE ENTIRE TERMINAL AND MAKE SURE THOSE BAGS ARE CLEAR." />
                      <outline text="&gt;&gt; YOU SAID YOU WERE HAPPY TO GET OUT ALIVE." />
                      <outline text="&gt;&gt; EVERYTHING THAT IS IN OUR BAGS IS REPLACEABLE." />
                      <outline text="&gt;&gt; LIKE YOU SAID, SCARY MOMENTS." />
                      <outline text="&gt;&gt; HIS DAD AND MOM ARE WITH US." />
                      <outline text="AND WE HAVE BEEN SEPARATED FROM THEM AND HIS DAD HAS HEALTH ISSUES WITH HIS HEART AND WE WERE SCARED FOR HIM BECAUSE WE DON&apos;T WANT ANYTHING TO HAPPEN TO HIM AND WE HAVE BEEN INFORMED THAT THEY ARE SAFELY OUT OF THE AIRPORT AND SAFE AND WE WANT TO RECONNECT WITH THEM." />
                      <outline text="&gt;&gt; YOU MIGHT SEE PEOPLE WALKING BEHIND US." />
                      <outline text="I TALKED TO SOME PEOPLE WHO RAN INTO RESTAURANTS AND I TALKED TO TSA AGENTS." />
                      <outline text="THEY SAID THEY THOUGHT THE SHOTS WERE COMING FROM DOWNSTAIRS." />
                      <outline text="&gt;&gt; THEY WERE LIKE AT THE BASE OF THE ESCALATETERS." />
                      <outline text="SO YES, THERE WERE NO SHOTS." />
                      <outline text="ONCE WE LEFT, THEY MAY HAVE CAME UP THE ESCALATETERS." />
                      <outline text="&gt;&gt; I YOU HAVE TO GO UP THE STAIRS OR UP THE STAIRS TO GET TO WHERE YOU CHECK IN AND GO THROUGH SECURITY." />
                      <outline text="MY QUESTION IS ARE TSA AGENTS ARMED? &gt;&gt; YOU WOULD THINK THAT THEY WOULD BE THERE TO KEEP US SAFE." />
                      <outline text="&gt;&gt; WHEN THEY ARE RUNNING WITH US." />
                      <outline text="&gt;&gt; NO DOWN THE ABOUT THAT." />
              </outline>

              <outline text="VIDEO- Confessions of a RX drug rep, what we all must know. - YouTube">
                      <outline text="Link to Article" type="link" url="http://www.youtube.com/watch?v=MtMmcHEE5bo" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383433393_bPtehu74.html" />
      <outline text="Sat, 02 Nov 2013 23:03" />
                      <outline text="" />
              </outline>

              <outline text="VIDEO- Weekly Address: Passing a Budget that Reflects our Priorities - YouTube">
                      <outline text="Link to Article" type="link" url="http://www.youtube.com/watch?v=8L5n2Mn2zsM" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383425274_qWvAfzDv.html" />
      <outline text="Sat, 02 Nov 2013 20:47" />
                      <outline text="" />
              </outline>

              <outline text="&apos;Mad Men&apos; Was Filming at LAX During Deadly Shooting, Says Crew Member | Variety">
                      <outline text="Link to Article" type="link" url="http://variety.com/2013/tv/news/man-men-was-filming-at-lax-during-deadly-shooting-says-crew-member-1200786046/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383424847_hbXmdBr8.html" />
      <outline text="Sat, 02 Nov 2013 20:40" />
                      <outline text="" />
                      <outline text="&apos;&apos;Mad Men&apos;&apos; was in the process of filming an episode at Los Angeles International Airport Friday morning when a deadly shooting incident occurred at the travel hub, according to tweets from a production staffer." />
                      <outline text="Plenty of other bizzers were caught up in the shooting drama and the traffic snarl that ensued around 9:30 a.m. PT as the airport was evacuated while law enforcement hunted for the shooter." />
                      <outline text="Dustin Woods, a key grip on the AMC&apos;s &apos;&apos;Mad Men,&apos;&apos; tweeted that the series was filming in American Airlines&apos; Terminal 4 at LAX, one terminal away from where shots were fired at approximately 9:20 a.m. PT." />
                      <outline text="Woods tweeted to TV Guide&apos;s Michael Schneider that the show on which he was in production was &apos;&apos;Mad Men,&apos;&apos; noting that it was the program&apos;s first day back lensing." />
                      <outline text="AMC declined to comment." />
                      <outline text="CBS senior exec VP Kelly Kahl was on his way to the airport for a flight when the lockdown occurred. He was unable to get into LAX and wound up re-routing his travel plans through Long Beach Airport. Amid the chaos, Kahl telephoned KCBS-TV Los Angeles to provide an on-the-scene report." />
                      <outline text="Actor James Franco was stuck sitting on the ground in a plane when the shooting took place, which he chronicled via Instagram." />
                      <outline text="Grant Imahara and Tory Belleci, of Discovery Channel&apos;s &apos;&apos;Mythbusters&apos;&apos; series, were in Terminal 3 where the shooting occurred. Both were on their way to Delaware for the filming of Discovery&apos;s popular holiday special &apos;&apos;Punkin Chunkin.&apos;&apos;" />
                      <outline text="PHOTOS: Harrison Ford&apos;s 10 Best Movies of All-Time" />
                      <outline text="&apos;&apos;Grant and Tory are safe and being rerouted. Our thoughts are with all those affected by today&apos;s tragedy and our gratitude goes out to the members of the LAPD, Airport Police, TSA, and Virgin America staff for restoring safety to the scene,&apos;&apos; Discovery and Science Channel said in a statement." />
                      <outline text="Late Friday, the FBI identified the shooter as Paul Ciancia, 23, of Los Angeles." />
                      <outline text="The deadly incident continued to reverberate for thousands of travelers Friday as more than 100 flights were delayed or canceled because of the disruption." />
              </outline>

              <outline text="Germany, Brazil to propose anti-spying resolution at UN | TODAYonline">
                      <outline text="Link to Article" type="link" url="http://www.todayonline.com/world/europe/germany-brazil-propose-anti-spying-resolution-un" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383424113_M5ScchE6.html" />
      <outline text="Sat, 02 Nov 2013 20:28" />
                      <outline text="" />
                      <outline text="Charges that the US&apos; national security agency accessed tens of thousands of French phone records and monitored the German chancellor&apos;s phone cause outrage" />
                      <outline text="UNITED NATIONS &apos;-- Germany and Brazil are drafting a UN General Assembly resolution that would demand an end to excessive spying and invasion of privacy after a former US intelligence contractor revealed massive international surveillance programs, UN diplomats said yesterday (Oct 25)." />
                      <outline text="Brazilian President Dilma Rousseff and German Chancellor Angela Merkel have both condemned the widespread snooping by the US National Security Agency." />
                      <outline text="Charges that the NSA accessed tens of thousands of French phone records and monitored Ms Merkel&apos;s mobile phone have caused outrage in Europe. Germany said on Friday it would send its top intelligence chiefs to Washington next week to seek answers from the White House." />
                      <outline text="In response to the disclosures about US spying, many of which came from fugitive former NSA contractor Edward Snowden, the German and Brazilian UN delegations have begun work on a draft resolution to submit to the 193-nation General Assembly, several UN diplomats told Reuters." />
                      <outline text="&apos;&apos;This resolution will probably have enormous support in the GA (General Assembly), since no one likes the NSA spying on them,&apos;&apos; a Western UN diplomat said on condition of anonymity." />
                      <outline text="General Assembly resolutions are non-binding, unlike resolutions of the 15-nation Security Council. But assembly resolutions that enjoy broad international support can carry significant moral and political weight." />
                      <outline text="Ms Merkel demanded on Thursday that Washington strike a &apos;&apos;no-spying&apos;&apos; agreement with Berlin and Paris by the end of the year, adding she wanted action from President Barack Obama, not just apologetic words." />
                      <outline text="Last month, Ms Rousseff used her position as the opening speaker at the General Assembly&apos;s annual gathering of world leaders to accuse the United States of violating human rights and international law through espionage that included spying on her email." />
                      <outline text="Ms Rousseff also expressed her displeasure by calling off a high-profile state visit to the United States scheduled for this month over reports that the NSA had been spying on Brazil. REUTERS" />
              </outline>

              <outline text="Nasdaq Crashes (Again): Is It The Usual Suspect? HFT">
                      <outline text="Link to Article" type="link" url="http://www.valuewalk.com/2013/11/nasdaq-crashes-usual-suspect-hft/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383423476_3Ng4HRR4.html" />
      <outline text="Sat, 02 Nov 2013 20:17" />
                      <outline text="" />
                      <outline text="This article first appeared on Floating Path." />
                      <outline text="High frequency trading combined with a complex market structure leads to crazy anomalies on an almost daily basis. This past week we saw an entire market shut down as the NASDAQ OMX Group, Inc. (NASDAQ:NDAQ) went offline for more than three hours. This scenario was a bit more complicated than the BATS Global Markets, Inc. Class A Common Stock (BATS:BATS) outage because Nasdaq is responsible for disseminating prices of certain stocks (and their quotes) to all market participants via an information feed known as the Securities Information Processor. The SIP is a critical piece of information for traders. Often referred to as &apos;&apos;the tape&apos;&apos; this is essentially what the majority of regular folks see when looking at prices and quotes for stocks, or what you see on the bottom of the screen on CNBC. The description from the gentlemen at Themis Trading is rather succinct." />
                      <outline text="The SIP is one of the most important and least understood pieces of our equity market. It aggregates all of those fragmented exchanges and distributes the NBBO (national best bid and offer). The NBBO is what all those dark pools use to price their merchandise and also what all those internalizers rely on to give sub penny price improvement. The SIP is the hub and the exchanges are the spokes." />
                      <outline text="What caused the outage?" />
                      <outline text="Thus far there has been much finger-pointing by NASDAQ OMX Group, Inc. (NASDAQ:NDAQ), chiefly in the direction of NYSE-Arca. The blame game is no surprise and there has been no official cause released  just yet. In the meantime, what we do know is that gigantic bursts of quotes occurred just prior to the system breaking. These quote spam methods employed by HFT can be similar to DDoS attacks, as we&apos;ve seen in the past." />
                      <outline text="The charts below illustrate the disproportionate quoting that occurred. The thick red line represents the day of the outage, which officially began at 12:03 when the SIP went down." />
                      <outline text="What was the result?" />
                      <outline text="NASDAQ OMX Group, Inc. (NASDAQ:NDAQ) decide to halt trading entirely on its system and in all &apos;&apos;Tape C&apos;&apos; securities, or those listed on the Nasdaq exchange. As they were unable to provide timely and accurate information to participants, it made sense to stop all trading so as to not officially provide an unfair advantage to any single participant. Because of this, it was literally impossible to trade Nasdaq listed stocks or their options for three hours on Thursday. Popular names like Apple, Amazon, and Microsoft were all halted. Quotes from industry participants obtained by the Wall Street Journal show the confusion during the time." />
                      <outline text="&apos;&apos;It&apos;s really shocking,&apos;&apos; said Ramon Verastegui, head of global engineering and strategy at Soci(C)t(C) G(C)n(C)rale, during the outage. &apos;&apos;If we want to trade Apple, we can&apos;t.&apos;&apos;" />
                      <outline text="&apos;&apos;This takes confidence from the markets,&apos;&apos; said William &apos;&apos;Packy&apos;&apos; Jones, chief executive of JonesTrading Group, which handles trading for hedge funds, mutual funds and other institutional investors. For much of the day, he said, traders were asking, in reference to published prices, &apos;&apos;Are these prints real, or are they not real?&apos;&apos;" />
                      <outline text="As you can see, the NASDAQ Composite (INDEXNASDAQ:.IXIC) flat-lined." />
                      <outline text="The most curious aspect of the outage is that trading continued after the SIP was broken. So while the market was seemingly closed for most traders in a stock like Apple, it continued to trade among some participants as if nothing was wrong. Any firm not relying on the SIP for trade and quote data would have been unaffected by its malfunction." />
                      <outline text="Who doesn&apos;t rely on the SIP? " />
                      <outline text="High frequency trading firms do not. Via co-location and direct data feeds, HFT are plugged directly into the exchange computers allowing them to calculate the data on their own, essentially a synthetic SIP that is faster and more accurate. Nanex calls this discrepancy between direct feeds and the SIP downright illegal." />
                      <outline text="This is because exchanges are providing data to High Frequency Traders via direct feeds ahead of the SIP or consolidated feed. This is a clear violation of Reg  NMS (what the SEC fined the NYSE $5 Million for). In fact, this behavior renders Reg NMS moot." />
                      <outline text="The chart below clearly shows trading in Apple Inc. (NASDAQ:AAPL) beyond the SIP outage and even beyond 12:23 when NASDAQ OMX Group, Inc. (NASDAQ:NDAQ) officially said every single Tape C stock had been halted." />
                      <outline text="The same problem arose in Amazon.com, Inc. (NASDAQ:AMZN)&apos;s stock, where the NBBO was seemingly dead, only this occurred at 11:01, about an hour before the entire SIP crashed. The trades continued unaffected, assumingly by the same directly connected HFT firms." />
                      <outline text="Was this an orchestrated event? " />
                      <outline text="While rumors were abound instantly invoking fears of a hacking or possible terrorist cyber attack, the cause most likely resides on American soil inside a server farm. To illustrate the ability to profit in this scenario, considering the following description." />
                      <outline text="Let&apos;s assume you were at a farmer&apos;s market with various stands selling apples. In the middle of the market was a chalkboard (the SIP) displaying prices and quantities at which apples were just bought and sold, as well as bids and offers for future sales. What if one was able to, in the blink of an eye (or less actually), erase the chalkboard while simultaneously buying a majority of the available apples? One could turn around and sell their apples to other customers at their own price since others would have nothing to base a &apos;&apos;fair&apos;&apos; sale price upon. Or once the purchases were complete, one could allow the chalkboard to be re-written with new prices. Given the sudden drop in apple supply, the price would assumingly be higher, and that individual would be the new owner of an apple cart with a sudden appreciation in value." />
                      <outline text="It is not yet known whether any HFT firm attempted to break the SIP, but it is clear they would be capable of doing so and in a position to benefit from the subsequent darkness in pricing experienced by other market participants. Further, if any HFT is responsible, willfully or otherwise, NASDAQ OMX Group, Inc. (NASDAQ:NDAQ) is unlikely to blame them publicly. HFT is the biggest customer for a for-profit exchange, providing massive trading volumes and purchasing direct data feeds and co-location of their servers. Given this inherent conflict of interest, the argument against the current structure is valid." />
                      <outline text="UPDATE:" />
                      <outline text="It is now apparent to market data experts Nanex, that the gigantic surges of quote information did not come from an HFT algorithm. In fact, the massive traffic came from the Nasdaq itself. A glitch in its software caused 50 minutes worth of quotes to be sent through the SIP in only 3 seconds of time. This massive compression of data reeked havoc on the NBBO and appears to have led to the SIP shutdown. Below is an example from one stock. Note the pattern in quotes are the same, however, the pattern on the right played out much faster." />
                      <outline text="We&apos;ll continue to monitor ongoing research and post any new updates or relevant information." />
              </outline>

              <outline text="Halloween / Harvest Party-Cradlerock ES">
                      <outline text="Link to Article" type="link" url="http://cres.hcpss.org/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383421126_jS3bhHhH.html" />
      <outline text="Sat, 02 Nov 2013 19:38" />
                      <outline text="" />
                      <outline text="WELCOME TO THE 2013-2014 SCHOOL YEAR" />
                      <outline text="Parent/Teacher Conferences" />
                      <outline text="Report cards will be issued on November 8.  Parent /teacher conferences are scheduled for November 25, 26 and 27." />
                      <outline text=" Our teachers would like to meet with a parent/guardian of each of their Language Arts students during Parent/Teacher conferences in November. We will be using PickATime, the on-line internet program again to schedule these conferences. In order to schedule your conference, you will need your child&apos;s student ID number found on their Interim Report and Report Card.  PickATime will open on November 8  and close  on November 18." />
                      <outline text="Halloween / Harvest Party  " />
                      <outline text="This school year, we are having a Costume Parade and Halloween Party. Students who" />
                      <outline text="do not celebrate Halloween will participate in the Harvest Party. These activities will be held" />
                      <outline text="on Thursday, October 31 beginning at 1:45 pm." />
                      <outline text="Costumes for the parade may not be of a gory Halloween nature (ghosts, blood &amp;" />
                      <outline text="guts, masks, skeletons, make-up, etc.) Absolutely no weapons will be allowed. If we feel that" />
                      <outline text="the costume is not appropriate for school, the child will not wear it during the parade." />
                      <outline text="Costumes are not to be worn to school and should not require a lot of preparation or" />
                      <outline text="assistance." />
                      <outline text="Below are suggested costume options:" />
                      <outline text="- Appropriate book characters" />
                      <outline text="- Household items" />
                      <outline text="- Animals" />
                      <outline text="--School supplies" />
                      <outline text="- Careers" />
                      <outline text="- Sports figures" />
                      <outline text="- Nature/Food" />
                      <outline text="- Appropriate cartoon characters/action figures" />
                      <outline text="-Positive role models" />
                      <outline text="If your child does not celebrate Halloween and will instead participate in the Harvest Party" />
                      <outline text="on October 31st, please see the Halloween letter below. If you have any questions," />
                      <outline text="please do not hesitate to call us." />
                      <outline text="STAY CONNECTED" />
                      <outline text="Important school information and our school newsletter,The Cradlerock Chronicle, is sent home electronically via HCPSSNEWS.  Please update or register by logging onto www.hcpssnews.com.  SUPPORT CRADLEROCK ELEMENTARY" />
                      <outline text="Give With Target." />
                      <outline text="The &quot;Give with Target&quot; program is over for this year.  Target gave away 5 million dollars to schools across the country.   Cradlerock Elementary ended with 685 votes!  Thank you for your support!" />
                      <outline text="GIANT A+ BONUS CARDS" />
                      <outline text="Beginning September 1, 2013, register your Giant Card at www.giantfood.com/aplus. Our school ID# is 01019.  You must re-register even if you registered last year.   Starting October 4, 2013 through March 20, 2014 Cradlerock Elementary will have the opportunity to earn cash through Giant A+ School Rewards Program. After you register your card, each shopping trip at Giant earns CASH for our school!" />
              </outline>

              <outline text="UK: Snowden reporter&apos;s partner involved in &apos;espionage&apos; and &apos;terrorism&apos; | Reuters">
                      <outline text="Link to Article" type="link" url="http://www.reuters.com/article/2013/11/01/uk-nsa-idUSL1N0IL26220131101" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383420921_FraQmE7w.html" />
      <outline text="Sat, 02 Nov 2013 19:35" />
                      <outline text="" />
                      <outline text="By Mark Hosenball" />
                      <outline text="WASHINGTON | Fri Nov 1, 2013 7:19pm EDT" />
                      <outline text="WASHINGTON Nov 1 (Reuters) - British authorities claimed the domestic partner of reporter Glenn Greenwald was involved in &quot;terrorism&quot; when he tried to carry documents from former U.S. intelligence contractor Edward Snowden through a London airport in August, according to police and intelligence documents." />
                      <outline text="Greenwald&apos;s partner, David Miranda, was detained and questioned for nine hours by British authorities at Heathrow on Aug. 18, when he landed there from Berlin to change planes for a flight to Rio De Janeiro, Brazil." />
                      <outline text="After his release and return to Rio, Miranda filed a legal action against the British government, seeking the return of materials seized from him by British authorities and a judicial review of the legality of his detention." />
                      <outline text="At a London court hearing this week for Miranda&apos;s lawsuit, a document called a &quot;Ports Circulation Sheet&quot; was read into the record. It was prepared by Scotland Yard - in consultation with the MI5 counterintelligence agency - and circulated to British border posts before Miranda&apos;s arrival. The precise date of the document is unclear." />
                      <outline text="&quot;Intelligence indicates that Miranda is likely to be involved in espionage activity which has the potential to act against the interests of UK national security,&quot; according to the document." />
                      <outline text="&quot;We assess that Miranda is knowingly carrying material the release of which would endanger people&apos;s lives,&quot; the document continued. &quot;Additionally the disclosure, or threat of disclosure, is designed to influence a government and is made for the purpose of promoting a political or ideological cause. This therefore falls within the definition of terrorism...&quot;" />
                      <outline text="Miranda was not charged with any offense, although British authorities said in August they had opened a criminal investigation after initially examining materials they seized from him. They did not spell out the probe&apos;s objectives." />
                      <outline text="A key hearing on Miranda&apos;s legal challenge is scheduled for next week. The new details of how and why British authorities decided to act against him, including extracts from police and MI5 documents, were made public during a preparatory hearing earlier this week." />
                      <outline text="British authorities have said in court that items seized from Miranda included electronic media containing 58,000 documents from the U.S. National Security Agency and its British counterpart, Government Communications Headquarters (GCHQ)." />
                      <outline text="Greenwald, who previously worked for Britain&apos;s Guardian newspaper, has acknowledged that Miranda was carrying material supplied by Snowden when he was detained." />
                      <outline text="In an email to Reuters, Greenwald condemned the British government for labeling his partner&apos;s actions &quot;terrorism.&quot;" />
                      <outline text="&quot;For all the lecturing it doles out to the world about press freedoms, the UK offers virtually none...They are absolutely and explicitly equating terrorism with journalism,&quot; he said." />
                      <outline text="Separately on Friday, media disclosed details of an open letter Snowden issued to Germany from his place of exile in Russia, in which he says his revelations have helped to &quot;address formerly concealed abuses of the public trust&quot; and added that &quot;speaking the truth is not a crime.&quot;" />
                      <outline text="Snowden said he was counting on international support to stop Washington&apos;s &quot;persecution&quot; of him for revealing the scale of its worldwide phone and Internet surveillance." />
                      <outline text="Steven Aftergood, a secrecy expert with the Federation of American Scientists, said that given the nature of the material that Miranda was carrying, a harsh response by British authorities was not unexpected." />
                      <outline text="&quot;It seems that UK authorities were attempting to seize or recover official documents, to which they arguably have a claim,&quot; Aftergood said. &quot;The authorities&apos; action was harsh, but not incomprehensible or obviously contrary to law.&quot;" />
                      <outline text="In a separate document read into the court record, MI5, also known as the Security Service, indicated British authorities&apos; interest in Miranda was spurred by his apparent role as a courier ferrying material from Laura Poitras, a Berlin-based filmmaker, to Greenwald, who lives with Miranda in Brazil." />
                      <outline text="&quot;We strongly assess that Miranda is carrying items which will assist in Greenwald releasing more of the NSA and GCHQ material we judge to be in Greenwald&apos;s possession,&quot; said the document, described as a &quot;National Security Justification&quot; prepared for police." />
                      <outline text="&quot;Our main objectives against David Miranda are to understand the nature of any material he is carrying, mitigate the risks to national security that this material poses,&quot; the document added." />
                      <outline text="A spokesman for the British Embassy in Washington had no comment on the court proceedings or documents." />
                      <outline text="Link thisShare thisDigg thisEmailReprints" />
              </outline>

              <outline text="Traction">
                      <outline text="Link to Article" type="link" url="http://anolen.com/2013/11/01/traction/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383404684_CzyUY4nM.html" />
        <outline text="Source: a.nolen" type="link" url="http://anolen.com/feed/" />
      <outline text="Sat, 02 Nov 2013 15:04" />
                      <outline text="" />
                      <outline text="The dust has settled from the US government shutdown and we can now see the lay of the land with regards to the NSA&apos;s abuses. It seems that Feinstein has drawn up her bill&apos;&apos; &apos;&apos;FISA Improvements Act&apos;&apos;&apos;&apos; in a closed session of the US Senate Intelligence Committee. Feinstein&apos;s bill makes the NSA abuses legal. Read Russia Today&apos;s take on her bill here." />
                      <outline text="The strongest challenge to the status quo has come from Patriot Act author, Rep. Sensenbrenner, and Sen. Leahy. It&apos;s called: &apos;&apos;USA Freedom Act&apos;&apos;, Subheading: Uniting and Strengthening America by Fulfilling Rights and Ending Eavesdropping, Dragnet-Collection, and Online Monitoring Act. Read the ACLU&apos;s take on this bill here, and the text of the bill here. The bill is being introduced simultaneously in the House and Senate." />
                      <outline text="Of course, I would like to see a bill that goes even further than Sensenbrenner&apos;s/Leahy&apos;s, but it&apos;s a good start. Rep. Sensenbrenner has told The Guardian that he&apos;d like &apos;&apos;to put their [the NSA&apos;s] metadata program out of business&apos;&apos;, so please contact your representatives in the Senate and Congress in support of this bill.  Short of that, please ask them NOT to support Feinstein&apos;s." />
                      <outline text="If you&apos;re not from the US and you&apos;d like to tell Sen. Feinstein what you think of her, you can do that here. It probably won&apos;t change her opinions, but it will make her henchmen work for a living. (Los Angeles zip codes run from 90001 to 90099, 90101, 90103, 90189, 90230 and 91331. I&apos;d recommend entering one of these as your address.)" />
                      <outline text="Like this:LikeLoading..." />
              </outline>

              <outline text="LAX shooting: Just the facts">
                      <outline text="Link to Article" type="link" url="http://www.homelandsecurityus.com/archives/9932" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383404584_WTuK3CsC.html" />
        <outline text="Source: Northeast Intelligence Network" type="link" url="http://www.homelandsecurityus.com/feed" />
      <outline text="Sat, 02 Nov 2013 15:03" />
                      <outline text="" />
                      <outline text="UPDATED 1 November 2013; 1700 ET: We&apos;ve received many conflicting reports from individuals on-site at LAX and from open source news agencies. We are indexing each of them. It is our policy to review everything before reporting; instead of being first with the story, we would rather be correct. Additionally, we can then review the original source reports for signs of deliberate misinformation and manipulation of the facts." />
                      <outline text="Confirmed: LAX police, in conjunction with other agencies, conducted a drill for this exact same scenario just two-(2) weeks ago. NOTICE: We will continue to update after we are able to confirm the facts outside of &apos;&apos; and beyond - mainstream news sources." />
                      <outline text="1 November 2013; 1515 ET: A shooting incident took place at the Los Angeles International Airport this morning at 9:20 am PT. According to open source reports, an unidentified male entered terminal three-(3) at the Los Angeles Airport at approximately 0920 am local time. He is described as a male, race/ethnicity undetermined, wearing a cap and sunglasses, while reportedly carrying a long gun and a handgun." />
                      <outline text="Some witnesses report that his attire was similar to that worn by security or TSA agents. The male reportedly began shooting with the long gun at various parties, possibly focusing on TSA agents or airport security.  LAX police pursued the subject, who entered into the restricted area of the terminal, not far from a Burger King restaurant located inside the terminal. There, he was engaged in a gun battle with police, and was struck at last once by an officer from LAX. According to the most recent reports, a total of seven-(7) people were injured by gunfire, with six-(6) &apos;&apos; including the alleged gunman, being transported to hospitals from the scene. Recent unconfirmed reports suggest that two people have succumbed to their injuries, although this remains unconfirmed." />
                      <outline text="Investigators on scene" />
                      <outline text="FBI SAC David Bodich" />
                      <outline text="Chief Patrick Gannon" />
                      <outline text="As most first reports are wildly incorrect, we will provide more information as we get it from our sources at LAX. Tune in to The Hagmann &amp; Hagmann Report tonight for a complete analysis." />
                      <outline text="Click here to save this article in PDF format" />
              </outline>

              <outline text="FUKUSHIMA - DON&apos;T PANIC">
                      <outline text="Link to Article" type="link" url="http://aangirfan.blogspot.com/2013/11/fukushima-dont-panic.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383404539_CEY5sZ3n.html" />
        <outline text="Source: aangirfan" type="link" url="http://aangirfan.blogspot.com/feeds/posts/default?alt=rss" />
      <outline text="Sat, 02 Nov 2013 15:02" />
                      <outline text="" />
                      <outline text="A number of websites WRONGLY stated that the above diagram shows radiation from Fukushima.In reality, this diagram was produced in 2011.It was made by the National Oceanic and Atmospheric Administration (NOAA) to show the tsunami of 11 March 2011, based on data recorded in the Pacific. NOAA websiteThis is explained by Audrey Garricatle monde on 29 Oct 2013 (also Le blog de Wendy)" />
                      <outline text="&quot;The plume of cesium-137 resulting from the disaster is expected to reach the northwest coast of the U.S. early next year, but at levels safe for health.&quot; A powerful current passing near Japan, the Kuroshio has diluted the radioactivity.The Pacific continues this process of dilution.Researchers predict rates of between 10 and 30 becquerels per cubic meter (Bq / m3 ) on the coast of Oregon and Washington between 2014 and 2020, and between 10 and 20 Bq / m 3 in California between 2016 and 2025." />
                      <outline text="This graph shows the concentrations of cesium-137 in the ocean surface (between 0 - 200 meters) in April 2012 (a), April 2014 (b) April 2016 (c) and April 2021 (d).&quot;These rates, which are about ten times higher than before the Fukushima disaster, are still very low. " />
                      <outline text="&quot;They present no danger to wildlife and consumption of seafood&quot;, says Dominique Boust of Laboratory Radioecology Cherbourg at the Institute of Radiation Protection and Nuclear Safety (IRSN). &quot;With an average of 20 Bq  per m 3 of water, we should find two becquerels in each kilogram of fresh fish, which is within the safe limits. The maximum allowable level in Europe is 500 Bq / kg.&quot;le monde / Le blog de Wendy" />
                      <outline text="Timothy1954 comments:" />
                      <outline text="1. That&apos;s one isotope of one element, cesium 137. And levels have been higher than ten times above normal, earlier in this crisis. (much higher)" />
                      <outline text="2. Cesium 137, cesium 134, iodine 129, iodine 131, and tritium, are being produced still by the melted down cores of reactors 1 and 2. And they escape with water vapor or with flowing water." />
                      <outline text="3. These, and strontium 90, accumulate in living creatures.The damage done from INTERNAL radiation is much greater than what you get from external sources." />
                      <outline text="4. The uranium and plutonium that has burned and become dust, is inhaled and is carcinogenic." />
                      <outline text="5. Chernobyl has killed a million people so far, and Fukushima was a hundred times worse, as of October 2011, said a Woods Hole Oceanographic Institution study." />
                      <outline text="6. Fukushima&apos;s reactors one and two, at least, are still fissioning in the ground, still adding to the contamination." />
                      <outline text="CanSpeccy comments:" />
                      <outline text="At present only the Japanese appear to be exposed to a substantial dose of radiation from Fukushima." />
                      <outline text="However, if one of the spent fuel pools overheats and the fuel is vaporized, the hazard will go global. " />
              </outline>

              <outline text="VIDEO- Remarks on National Adoption Month">
                      <outline text="Link to Article" type="link" url="http://m.state.gov/md215052.htm" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383404492_4hgDFhqU.html" />
      <outline text="Sat, 02 Nov 2013 15:01" />
                      <outline text="" />
                      <outline text="I have a niece named Iris, who is one of the most extraordinary young women I&apos;ve ever known. From the day she came into our family, she has filled our lives with love and joy. And every time I&apos;m with her, I am grateful my sister Peggy was able to adopt her from China years ago." />
                      <outline text="Every child needs and deserves to grow up, safe and sound, in a loving home. But sometimes that&apos;s not the kind of environment a child&apos;s biological parents can provide." />
                      <outline text="When parents or relatives aren&apos;t able to care for children, adoption can help give kids the permanent families they deserve. And, when adoptive families are not available in the places where these children live, inter-country adoptions can help find them a loving home abroad." />
                      <outline text="I firmly believe that ethical and transparent inter-country adoption is a critical part of the international children&apos;s welfare system. It helps ensure that kids receive the love and support they need to grow into healthy and productive adults. I&apos;ve seen it firsthand. That&apos;s why I worked hard in the Senate to help families navigate past roadblocks in the international adoption process. It&apos;s also why I was proud to be a member of Senator Landrieu&apos;s caucus on adoption." />
                      <outline text="Today the United States is one of 90 countries that are party to the Hague Adoption Convention &apos;&apos; a set of internationally supported principles aimed at protecting both birth and adoptive parents and, most importantly, adopted children." />
                      <outline text="And thanks to a law President Obama signed this past January, one I co-sponsored when I was a U.S. Senator, today these adoptions are safer than ever. Every U.S.-accredited inter-country adoption provider &apos;&apos; in every country, around the world &apos;&apos; must adhere to a set of strong, universal standards that make the well-being of kids the top priority." />
                      <outline text="The State Department&apos;s adoption website &apos;&apos; adoption.state.gov &apos;&apos; is a great resource for anyone who is interested in learning more. Our Bureau of Consular Affairs keeps this site updated with the latest country information sheets, adoption processes, and developments that may affect inter-country adoption." />
                      <outline text="Over the past decade, more than 200,000 children &apos;&apos; from more than 100 countries &apos;&apos; were adopted by American families. And as we mark National Adoption Month this November, the Department of State commits to doing our part to find loving homes for thousands and thousands more." />
              </outline>

              <outline text="VIDEO-Sources: Alleged LAX gunman had &apos;new world order&apos; conspiracy theory tract - Investigations">
                      <outline text="Link to Article" type="link" url="http://investigations.nbcnews.com/_news/2013/11/01/21279788-sources-alleged-lax-gunman-had-new-world-order-conspiracy-theory-tract?lite" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383403564_XHAqLxHP.html" />
      <outline text="Sat, 02 Nov 2013 14:46" />
                      <outline text="" />
                      <outline text="NBC News" />
                      <outline text="Paul Anthony Ciancia, 23, is shown in a driver&apos;s license photo." />
                      <outline text="By Pete Williams and Andrew Blankstein, NBC News" />
                      <outline text="The man who allegedly killed a TSA worker and wounded three others at Los Angeles International Airport on Friday had anti-government literature in his possession outlining an alleged conspiracy to create a single global government, law enforcement sources tell NBC News." />
                      <outline text="The sources, who spoke on condition of anonymity, said the material recovered from Paul Anthony Ciancia, 23, after the shootout at LAX appeared to have been prepared by a group called &apos;&apos;New World Order.&apos;&apos; One source said it also expressed animus toward racial minorities." />
                      <outline text="There is no record of a radical group by that name and the term &apos;&apos;New World Order&apos;&apos; is often used by conspiracy-minded groups and individuals to describe an alleged secret plot to establish an autonomous world government that would replace sovereign nations and put an end to international power struggles." />
                      <outline text="According to ConspiracyWiki, an Internet site devoted to conspiracy theories, the doctrine was primarily limited to militant anti&apos;&apos;government and radical fundamentalist Christian groups until the early 1990s, but has since been embraced by some left-wing groups." />
                      <outline text="Very little was known about Cianci, who had lived in the Philadelphia area before moving to California." />
                      <outline text="His brother told police in New Jersey he had received a text message from the suspect Friday morning saying he was thinking about taking his life. " />
                      <outline text="Pennsville, N.J., Police Chief Allen J. Cummings then contacted the Los Angeles Police Department to do a well-being check on Ciancia at his apartment in California. He wasn&apos;t there when LAPD officers contacted his roommates about 10 a.m. local time, but they said everything was fine." />
                      <outline text="Ciancia&apos;s father, also named Paul, told NBC station KNBC that he last spoke to his son a week ago, when the son said the economy was depressed. The senior Ciancia said he didn&apos;t know if his son had a job or if he owned any weapons, but confirmed that he was in California." />
                      <outline text="Ciancia was shot by law enforcement and taken into custody after he allegedly began shooting at Transportation Security Administration workers with an assault rifle at about 9:20 a.m. local time." />
                      <outline text="Passengers at LAX describe the moments after the shooting started." />
                      <outline text="Federal officials said it was unclear whether the gunman was targeting TSA workers or was trying to shoot his way through to gain greater access to the airport. But one witness said the shooter, while walking through the terminal with his weapon, approached him with a one-word question." />
                      <outline text="&quot;All he said was, &apos;TSA?&apos; Just like that,&quot; Leon Saryan told MSNBC." />
                      <outline text="The shooting started in Terminal 3, which serves Virgin America and other airlines. Ciancia allegedly took a 223-caliber AR-15 style, semiautomatic rifle out of a duffle bag and fired on TSA officers at a screening checkpoint, authorities said.  He then went farther into the terminal, where he exchanged fire with law enforcement and was shot multiple times in the chest, they said." />
                      <outline text="He was hospitalized in critical condition, authorities said." />
                      <outline text="Police said quick action by airport officers averted a worse tragedy." />
                      <outline text="Los Angeles Mayor Eric Garcetti said at a news conference later Friday that the gunman had with him at least 100 more rounds of ammunition that &apos;&apos;literally would have killed everyone in that terminal.&apos;&apos;" />
                      <outline text="NBC&apos;s Ted Greenberg and Nyree Arabian contributed to this report." />
                      <outline text="More from NBC News Investigations:" />
                      <outline text="Follow NBC News Investigations onTwitterandFacebook" />
                      <outline text="Investigate this!Read and vote on readers&apos; story tips and suggested topics for investigation or submit your own." />
                      <outline text=" " />
                      <outline text=" " />
              </outline>

              <outline text="Google just pulled a &apos;&apos;Facebook Home&apos;&apos;: KitKat&apos;s primary interface is Google Search | Ars Technica">
                      <outline text="Link to Article" type="link" url="http://arstechnica.com/gadgets/2013/11/google-just-pulled-a-facebook-home-kitkats-primary-interface-is-google-search/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383371861_TrysUwCY.html" />
      <outline text="Sat, 02 Nov 2013 05:57" />
                      <outline text="" />
                      <outline text="One of the headline features of Android 4.4 is a revamped home screen and app launcher. The icons are bigger, there is more transparency, and the app drawer makes better use of the screen real estate. It&apos;s also heavily integrated with Google Search and Google Now, although you might not see it at the surface level. Sure, there&apos;s the usual search bar widget and a swipe to the left will open the full Google Search app, but the integration goes much deeper than that. While developing KitKat, Google made a very interesting decision: rather than graft a few new search UI pieces onto the home screen, Google threw the existing home app in the trash and turned all home screen functionality over to the Google Search app." />
                      <outline text="Everything you see here is being drawn by Google Search." />
                      <outline text="That&apos;s right, Google Search isn&apos;t just integrated into the home screen, it is the home screen. Everything you see on the home screen&apos;--the wallpaper, the icons, the widgets, and the app drawer&apos;--are all drawn by the Google Search app. &quot;GoogleHome.apk&quot; still exists, but it is an empty shell that forwards everything to the search app." />
                      <outline text="If you need proof of this, the picture below shows the layout files for the Android 4.3 launcher and the 4.4 Google Search app. Layout files do exactly what you think they do: they determine what goes where in an Android app. As the image shows, the layout files from the 4.3 launcher have all migrated over to the Google Search app. All the necessary assets and image files have made the jump, too. I would show the GoogleHome.apk layout files for comparison, but there aren&apos;t any. The launcher has been gutted and is now just a helper app that registers Google Search as the home screen. In fact, if you install GoogleHome.apk without the 4.4 Search app, it won&apos;t work at all. It just displays a message saying it requires the Google Search app to function." />
                      <outline text="Google has adopted the Facebook Home strategy. Facebook took its normal Android app and grafted an app launcher onto it&apos;--it replaced the Android home screen with something that revolved around Facebook. The wallpaper became images and status updates from your friends, and Facebook notifications were given top billing. Everything was designed to get you to use Facebook as much as possible. With KitKat, Google is working toward a similar idea. Google took its search app and gave it wallpapers, a home screen, and an app drawer, and now it&apos;s the first thing you see when you unlock a Nexus 5." />
                      <outline text="If Google just wanted to include a few new search pieces into the existing standalone home app, it could have easily done that. The search bar has traditionally been a widget, and there is even a widget that displays Google Now information. Both of those could have been expanded and made more configurable with a few tweaks to Android&apos;s widget framework, but instead of doing that, Google chose to make its Search app the primary interface. While Facebook certainly went further down the integration road than Google, the two companies are now clearly headed down the same path. Google Now cards are currently relegated to the left-most home screen, but it&apos;s not hard to imagine a future where particularly relevant cards start popping up on the main screen. After all, since Google Search is the home screen, Google Now cards are constantly in memory." />
                      <outline text="And yes, for those wondering, this means Google Home (more accurately, Google Search Home) will be in the Play Store. Google Home is the Google Search app, which is already in the Play Store, it&apos;s just an old version. Soon, you&apos;ll hit the update button and have 99 percent of the code for Google Home. Google Home doesn&apos;t even require KitKat; I&apos;ve got it running on my Jelly Bean-equipped Nexus 4 right now." />
                      <outline text="Google App Indexing." />
                      <outline text="This isn&apos;t the only in-road Google Search has made into KitKat, either. The dialer and incoming call screen now automatically perform Google searches for phone number information (and will display Google Ads), and Google has just launched &quot;App Indexing,&quot; a way to directly open a search result in the appropriate app from Google Search." />
                      <outline text="[Update: Google has gotten in touch with us, and they say they are not working on ads in the Dialer.]" />
                      <outline text="If Google was going to stop here, there is no way it would need to merge Google Search and the Launcher into a single app. Android has begun a slow, gradual transformation into a Google Now device. Just like Facebook, Google wants to change the way you use your phone from an app-centric device to a device that revolves around its core product, but unlike Facebook, Google has the install base and clout with OEMs to make it happen. Remember, if OEMs want to ship any Google Apps, they need to ship allthe Google apps, so Google Home will most likely be included on every Android device. It won&apos;t necessarily be enabled by default on something like a Samsung device, but that&apos;s nothing some light badgering in the Search app won&apos;t fix (&quot;For a better search experience, enable Google Home!&quot;). Expect to see much more Google Now integration in the future." />
              </outline>

              <outline text="VIDEO- LAX Airport Shooting. LAPD Chief Admits to Training For the Exact Scenario. - YouTube">
                      <outline text="Link to Article" type="link" url="http://www.youtube.com/watch?v=WMQInNmpwTE&amp;feature=youtu.be" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383370882_JAMMNg8M.html" />
      <outline text="Sat, 02 Nov 2013 05:41" />
                      <outline text="" />
              </outline>

              <outline text="How IBM is making computers more like your brain. For real - CNET Mobile">
                      <outline text="Link to Article" type="link" url="http://news.cnet.com/8301-11386_3-57607926-76/how-ibm-is-making-computers-more-like-your-brain-for-real/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383349111_LLrW4UWr.html" />
      <outline text="Fri, 01 Nov 2013 23:38" />
                      <outline text="" />
                      <outline text="Big Blue is using the human brain as a template for breakthrough designs. Brace yourself for a supercomputer that&apos;s cooled and powered by electronic blood and small enough to fit in a backpack." />
                      <outline text="IBM Research is working on &quot;interlayer cooling,&quot; in which water is pumped through tiny tubes penetrating chips are piggypacked using high-speed communication technology called through-silicon vias. IBM&apos;s approach is designed to deal with overheating problems that otherwise severely limit chip stacking. The protruding pipe fittings are for connecting water-cooling tubes." />
                      <outline text="(Credit: Stephen Shankland/CNET)ZURICH, Switzerland -- Despite a strong philosophical connection, computers and brains inhabit separate realms in research. IBM, though, believes the time is ripe to bring them together." />
                      <outline text="Through research projects expected to take a decade, Big Blue is using biological and manufactured forms of computing to learn about the other." />
                      <outline text="On the computing side, IBM is using the brain as a template for breakthrough designs such as the idea of using fluids both to cool the machine and to distribute electrical power. That could enable processing power that&apos;s densely packed into 3D volumes rather than spread out across flat 2D circuit boards with slow communication links." />
                      <outline text="And on the brain side, IBM is supplying computing equipment to a $1.3 billion European effort called the Human Brain Project. It uses computers to simulate the actual workings of an entire brain -- a mouse&apos;s first, then a human&apos;s -- all the way down to the biochemical level of the neuron. Researchers will be able to tweak parameters as the simulation is running to try to figure out core mechanisms for conditions like Alzheimer&apos;s disease, schizophrenia, and autism." />
                      <outline text="It&apos;s all part of what IBM calls the cognitive systems era, in which computers aren&apos;t just programmed, but also perceive what&apos;s going on, make judgments, communicate with natural language, and learn from experience. It&apos;s a close cousin to that decades-old dream of artificial intelligence." />
                      <outline text="&quot;If we want to make an impact in the cognitive systems era, we need to understand how the brain works,&quot; said Matthias Kaiserswerth, a computer scientist who&apos;s director of IBM Research in Zurich, speaking during a media tour of the labs on Wednesday." />
                      <outline text="One key challenge driving IBM&apos;s work is matching the brain&apos;s power consumption. Over millions of years, nature has evolved a remarkably efficient information-processing design, said Alessandro Curioni, manager of IBM Research&apos;s computational sciences department. The ability to process the subtleties of human language helped IBM&apos;s Watson supercomputer win at &quot;Jeopardy.&quot; That was a high-profile step on the road to cognitive computing, but from a practical perspective, it also showed how much farther computing has to go." />
                      <outline text="&quot;Watson used 85 kilowatts,&quot; Kaiserwerth said. &quot;That&apos;s a lot of power. The human brain uses 20 watts.&quot;" />
                      <outline text="Bruno Michel describes Aquasar, an IBM Research prototype high-performance computing machine that uses unusually high-temperature liquid cooling." />
                      <outline text="(Credit: Stephen Shankland/CNET)Dense 3D computingThe shift in IBM&apos;s computing research shows in the units the company uses to measure progress. For decades, the yardstick of choice for gauging computer performance has been operations per second -- the rate at which the machine can perform mathematical calculations, for example." />
                      <outline text="When energy constraints became a problem, meaning that computers required prohibitive amounts of electrical power and threw off problematic amounts of waste heat, a new measurement arrived: operations per joule of energy. That gauges a computer&apos;s energy efficiency." />
                      <outline text="Now IBM has a new yardstick: operations per liter. The company is judging success by how much data-processing ability it can squeeze into a given volume. Today&apos;s computers must be laid out on flat circuit boards that ensure plenty of contact with air that cools the chips." />
                      <outline text="&quot;In a computer, processors occupy one-millionth of the volume. In a brain, it&apos;s 40 percent. Our brain is a volumetric, dense, object,&quot; said Bruno Michel, a researcher in advanced thermal packaging for IBM Research, who got his Ph.D in biophysics." />
                      <outline text="What&apos;s the problem with sprawl? In short, communication links between processing elements can&apos;t keep up with data-transfer demands, and they consume too much power as well, Michel said." />
                      <outline text="The fix is to stack chips into dense 3D configurations, with chips linked using a technology called through-silicon vias (TSVs). That&apos;s impossible today because stacking even two chips means crippling overheating problems. But IBM believes it&apos;s got an answer to the cooling problem: a branching network of liquid cooling channels that funnel fluid into ever-smaller tubes." />
                      <outline text="The liquid passes not next to the chip, but through it, drawing away heat in the thousandth of a second it takes to make the trip, Michel said. The company has demonstrated the approach in an efficient prototype system called Aquasar. (Get ready for another new yardstick: greenhouse gas emissions. Aquasar can perform 7.9 trillion operations per second per gram of carbon dioxide released into the atmosphere.)" />
                      <outline text="IBM can deliver up to 1 watt of power per square centimeter with this technology called a flow battery, which transports electrical power stored chemically. Here, vanadium electrolytes power a microfluidics chip in a lab demonstration. Ultimately IBM hopes to use liquids both to cool and power computers." />
                      <outline text="(Credit: Stephen Shankland/CNET)Liquid-based flow batteryBut that&apos;s not all the liquid will do. IBM also is developing a system called a redox flow battery that also uses it to distribute power instead of using wires. Two liquids called electrolytes, each with oppositely charged electrical ions, circulate through the system to distribute power. Think of it as a liquid battery interlaced through the interstices of the machine." />
                      <outline text="&quot;We are going to provide cooling and power with a fluid,&quot; Michel said. &quot;That&apos;s how our brain does it.&quot;" />
                      <outline text="The electrolytes, vanadium-based at present, travel through ever-smaller tubes, said Patrick Ruch, another IBM researcher working on the effort. At the smallest, they&apos;re about 100 microns wide, about the width of a human hair, at which point they hand off their power to conventional electrical wires. Flow batteries can produce between 0.5 and 3 volts, and that in turn means IBM can use the technology today to supply 1 watt of power for every square centimeter of a computer&apos;s circuit board." />
                      <outline text="Liquid cooling has been around for decades in the computing industry, but most data centers avoid it given its expense and complexity. It&apos;s possible the redox battery could provide a new incentive to embrace it, though." />
                      <outline text="Michel estimates the liquid power technology will take 10 to 15 years to develop, but when it works, it&apos;ll mean supercomputers that fit into something the size of a backpack, not a basketball court." />
                      <outline text="&quot;A 1-petaflop computer in 10 liters -- that&apos;s our goal,&quot; Michel said." />
                      <outline text="Performing at 1 petaflop means a computer can complete a quadrillion floating-point mathematical operations per second. Today&apos;s top supercomputer clocked in at 33.86 petaflops, but it uses 32,000 Xeon processors and 48,000 Xeon Phi accelerator processors." />
                      <outline text="Matthias Kaiserswerth, director of IBM Research in Zurich, is working toward the era of &quot;cognitive computing,&quot; in which machines get attributes of human thinking such as perception, learning, and judgment." />
                      <outline text="(Credit: Stephen Shankland/CNET)How to build a brainMore conventional supercomputers have been used so far for IBM&apos;s collaborations in brain research. The highlight of that work so far has been the Blue Brain project, which is on its third IBM Blue Gene supercomputer at the Ecole Polytechnique Federale de Lausanne, or EPFL, in Lausanne, Switzerland. The Blue Brain and Human Brain Project will take a new step with a Blue Gene/Q augmented by 128 terabytes of flash memory at the Swiss National Supercomputing Center in Lugano, Switzerland. It&apos;ll be used to simulate the formation and inner workings of an entire mouse brain, which has about 70 million neurons." />
                      <outline text="The eventual human brain simulation will take place at the Juelich Supercomputing Center in northern Germany, Curioni said. It&apos;s planned to be an &quot;exascale&quot; machine -- one that performs 1 exaflops, or quintillion floating-point operations per second." />
                      <outline text="The project doesn&apos;t lack for ambition. One of its driving forces is co-director Henry Markram of EPFL, who has worked on the Blue Brain project for years and sees computing as the way to understand the true workings of the human brain." />
                      <outline text="&quot;It&apos;s impossible to experimentally map the brain,&quot; simply because it&apos;s too complicated, Markram said. There are too many neurons overall, 55 different varieties of neuron, and 3,000 ways they can interconnect. That complexity is multiplied by differences that appear with 600 different diseases, genetic variation from one person to the next, and changes that go along with the age and sex of humans." />
                      <outline text="&quot;If you can&apos;t experimentally map the brain, you have to predict it -- the numbers of neurons, the types, where the proteins are located, how they&apos;ll interact,&quot; Markram said. &quot;We have to develop an entirely new science where we predict most of the stuff that cannot be measured.&quot;" />
                      <outline text="Liquid cooling has traditionally meant water traveling near chips, the hottest part of computers, but IBM Research has begun making chips with cooling conduits built directly in." />
                      <outline text="(Credit: Stephen Shankland/CNET)With the Human Brain Project, researchers will use supercomputers to reproduce how brains form -- basically, growing them in an virtual vat -- then seeing how they respond to input signals from simulated senses and nervous system." />
                      <outline text="The idea isn&apos;t to reproduce every last thing about the brain, but rather a model based on the understanding so far. If it works, actual brain behavior should emerge from the fundamental framework inside the computer, and where it doesn&apos;t work, scientists will know where their knowledge falls short." />
                      <outline text="&quot;We take these rules and algorithmically reconstruct a model of the brain,&quot; Markram said. &quot;We&apos;ll say this is biological prediction, then we can go back to the experiments and we can verify if the model is right. We celebrate when the model is wrong, because that&apos;s when it points to where we need more data or we don&apos;t understand the rules.&quot;" />
                      <outline text="The result, if the work is successful, will be not just a better understanding of the brain, but better cooperation among brain researchers and medical experts. That could reverse recent declines in the development of new drugs to treat neural problems, he said." />
                      <outline text="And understanding the brain could usher in the era of &quot;neuromorphic computing.&quot;" />
                      <outline text="&quot;Any new rules, circuits, or understanding of how the brain works will allow us to design neuromorphic machines that are much more powerful in terms of cognitive power, energy efficiency, and packaging,&quot; Curioni said." />
                      <outline text="And that, in turn, could lead to profoundly more capable computers. For starters, IBM has four markets in mind: machines that could find the best places to invest money, bring new depth and accuracy to medical diagnoses, research the appropriate legal precedents in court cases, or give people help when they dial a call center." />
                      <outline text="But it&apos;s not hard to imagine that&apos;s only the beginning. When computers can learn for themselves and program themselves, it&apos;s clear the divide separating biological and artificial computing will be a lot narrower." />
                      <outline text="IBM Research investigates supercomputing, nanotechnology, medicine, and more at its Zurich labs." />
                      <outline text="(Credit: Stephen Shankland/CNET)" />
              </outline>

              <outline text="Infosys Set To Be Slapped With Record Fine Of $35M In US For Visa Abuse: Report">
                      <outline text="Link to Article" type="link" url="http://www.ibtimes.com/infosys-set-be-slapped-record-fine-35m-us-visa-abuse-report-1445016" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383345520_cpS7wpQR.html" />
      <outline text="Fri, 01 Nov 2013 22:38" />
                      <outline text="" />
                      <outline text="Infosys Ltd (NYSE:INFY), one of India&apos;s major software services providers, is likely to be slapped with a record penalty of $35 million by the U.S. federal government for violating visa laws to place its employees that are not American citizens at locations inside the country, the Wall Street Journal reported on Tuesday." />
                      <outline text="The government is expected to announce the fine on Wednesday after a probe by the Department of Homeland Security and the Department of State found that Bangalore-based Infosys misused cheaper B-1 visas, which are meant for short business visits, in place of harder-to-obtain H-1B visas, which allow companies to bring in skilled employees from overseas for long-term projects. " />
                      <outline text="The investigation was carried out in the backdrop of an ongoing immigration overhaul in the U.S., which if adopted by Congress, would double the cost of processing work visas and impact Indian software companies, which rely heavily on short- and long-term work visas for their employees based at client locations in the U.S." />
                      <outline text="&apos;&apos;This complaint and large settlement should be a wake-up call to all employers that the government is serious about enforcing the H-1B visa regulations,&apos;&apos; Stephen Yale-Loehr, a Cornell University immigration-law professor, told the Journal." />
                      <outline text="The comprehensive immigration reform bill will also force Indian firms to downsize their non-American workforce in the U.S. due to new restrictions on the total percentage of foreigners working in the U.S. on the H-1B visa. H-1B visa holders are allowed to stay in the U.S. for up to three years and are paid locally, meaning the pay is included in calculating federal and state income tax in the U.S., while B-1 visa holders are paid from their home country." />
                      <outline text="Infosys currently earns 63 percent of its total revenues from North America, according to a Press Trust of India report. The company provides technology services to several U.S. clients and employs thousands of people in the U.S., including both Americans and non-Americans. Infosys told the Journal that it has earmarked $35 million to settle the case and to cover legal costs." />
                      <outline text="Infosys&apos; visa abuse first came to light when a former employee Jack &apos;&apos;Jay&apos;&apos; Palmer filed a lawsuit in the U.S. accusing the company of harassment and breach of contract after he confronted his managers about the possible violation of immigration laws by the company. The case was dismissed in August 2012, but according to the Journal, Palmer has been assisting in the federal probe against Infosys." />
                      <outline text="Meanwhile, Infosys has introduced a rotation policy for its employees working at client locations overseas, which is seen as an effort to provide more employees with an opportunity to work overseas, the Times of India reported on Monday." />
                      <outline text="The company, which employs about 157,000 people worldwide, also has set 18 months as the maximum period an employee can stay overseas when they travel for client-specific work, the report said." />
              </outline>

              <outline text="NSA chief Keith Alexander blames diplomats for surveillance requests">
                      <outline text="Link to Article" type="link" url="http://www.theguardian.com/world/2013/nov/01/nsa-keith-alexander-blames-diplomats-surveillance-foreign-leaders" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383345199_qdE2RL6n.html" />
      <outline text="Fri, 01 Nov 2013 22:33" />
                      <outline text="" />
                      <outline text="The director of the National Security Agency has blamed US diplomats for requests to place foreign leaders under surveillance, in a surprising intervention that risks a confrontation with the State Department." />
                      <outline text="General Keith Alexander made the remarks during a pointed exchange with a former US ambassador to Romania, lending more evidence to suggestions of a rift over surveillance between the intelligence community and Barack Obama&apos;s administration." />
                      <outline text="The NSA chief was challenged by James Carew Rosapepe, who served as an ambassador under the Clinton administration, over the monitoring of the German chancellor Angela Merkel&apos;s phone." />
                      <outline text="Rosapepe, now a Democratic state senator in Maryland, pressed Alexander to give &quot;a national security justification&quot; for the agency&apos;s use of surveillance tools intended for combating terrorism against &quot;democratically elected leaders and private businesses&quot;." />
                      <outline text="&quot;We all joke that everyone is spying on everyone,&quot; he said. &quot;But that is not a national security justification.&quot;" />
                      <outline text="Alexander replied: &quot;That is a great question, in fact as an ambassador you have part of the answer. Because we the intelligence agencies don&apos;t come up with the requirements. The policymakers come up with the requirements.&quot;" />
                      <outline text="He went on: &quot;One of those groups would have been, let me think, hold on, oh: ambassadors.&quot;" />
                      <outline text="Alexander said the NSA collected information when it was asked by policy officials to discover the &quot;leadership intentions&quot; of foreign countries. &quot;If you want to know leadership intentions, these are the issues,&quot; the NSA director said." />
                      <outline text="The exchange on Thursday night drew laughs from the audience at the Baltimore Council on Foreign Relations, but did not seem to impress the former ambassador, who replied: &quot;We generally don&apos;t do that in democratic societies.&quot;" />
                      <outline text="It also risked deepening the division between the Obama administration and the intelligence community, which have been briefing against one another throughout the week." />
                      <outline text="Alexander had previously insinuated that targets of surveillance emerged from elsewhere in the administration, but this is the first time he is known to have publicly singled out US diplomats." />
                      <outline text="Just hours earlier, secretary of state John Kerry appeared to lay the blame at the door of the NSA, when he said certain practices had occurred &quot;on autopilot&quot; without the knowledge of senior officials in the Obama administration." />
                      <outline text="Alexander was asked by the Guardian how he thought Merkel, who grew up in East Germany when the Stasi secret service was operating, might have felt when she discovered her phone had been monitored by the NSA. &quot;I don&apos;t know, I don&apos;t know the answer,&quot; he said. &quot;You know, I would say &apos;alleged&apos;.&quot;" />
                      <outline text="Asked why he would say &quot;alleged&quot;, given he presumably knows the monitoring occurred, Alexander said: &quot;I say alleged because there are no facts ... that are on the table.&quot;" />
                      <outline text="But Alexander also opened the door to the US halting surveillance of foreign leaders, hinting that it might be in the best interests of the US to suspend some surveillance programs to guarantee support to combat terrorism. " />
                      <outline text="&quot;I think those partnerships have greater value than some of the collection,&quot; he said. &quot;And we ought to look at it like that.&quot;" />
                      <outline text="Alexander, who is soon stepping down from the NSA, spoke after an eight-day period in which his agency has faced a growing chorus of criticism over its activities, particularly in relation to allied nations such as Germany." />
                      <outline text="The NSA may also lose its ability to gather domestic phone data &apos;&apos; a program Alexander has previously sought to guard." />
                      <outline text="In his speech in Baltimore, Alexander adopted a slightly different tone, suggesting he was &quot;not wedded&quot; to the program if a better alternative could be found." />
                      <outline text="Competing legislation has been introduced in the House and Senate this week to reform the NSA and the secret surveillance court that is supposed to hold it to account. One bill, which has growing support on Capitol Hill, would effectively end the routine collection of phone records data." />
                      <outline text="&quot;I am not wedded to these programs,&quot; Alexander said in his opening remarks. &quot;If we can come up with a better way of doing them, we should. Period.&quot; Speaking specifically about the collection of phone records, he compared administering the program to holding a &quot;hornets&apos; nest&quot;." />
                      <outline text="&quot;We&apos;re holding this hornets&apos; nest for the good of the nation. We would love to put it down, we would like to cast it aside, but if we do it is our fear that there will be a gap &apos;&apos; and the potential for another 9/11 &apos;&apos; and we would not have done our duty. So our duty would be: find another way.&quot;" />
                      <outline text="The reference to the September 11, 2001, attacks was consistent with previous remarks. On Wednesday, al-Jazeera published a master list of NSA &quot;talking points&quot;, obtained under the Freedom of Information Act." />
                      <outline text="Under the subheading &apos;&apos;Sound Bites That Resonate&apos;&apos;, the memo encourages references to 9/11 as justification for its mass surveillance." />
                      <outline text="&quot;You know, every one of us remembers 9/11,&quot; Alexander told the audience in Baltimore. &quot;You remember where you were, what was going on, what happened when the first plane hit, what was going on when the second plane hit &apos;&apos; it changed our lives.&quot;" />
                      <outline text="Alexander recalled firefighters killed trying help victims of the attack, and invoked the image of a fireman, during 9/11, &quot;handing the flag&quot; to the military and intelligence community. &quot;We, the military and intelligence community, said &apos;we&apos;ve got it from here&apos;,&quot; he said. &quot;That is etched on our hearts and our minds forever.&quot;" />
              </outline>

              <outline text="Deadline.com &gt;&gt; Blog ArchiveUPDATED: LA Airport Shooting Leaves Cable News Networks Cautious; Celebrities Cub-Reporting - Deadline.com">
                      <outline text="Link to Article" type="link" url="http://m.deadline.com/2013/11/los-angeles-airport-shooting-hollywoo-fox-news/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383343707_r5Zj9Bd4.html" />
      <outline text="Fri, 01 Nov 2013 22:08" />
                      <outline text="" />
                      <outline text="Cable news networks exercised extreme caution covering the shootout at LAX this morning when a gunman dressed in camouflage gear opened fire with a high-powered rifle at a security area and made his way deep into Terminal 3 before being wounded and apprehended &apos;-- a shooting that left at least one TSA agent dead, another wounded, and actors and network execs reporting for news operations." />
                      <outline text="In the cable news First To Bulletin Race: Fox News Channel broke in first, at 12:42:43 PM ET, followed by CNN at 12:44:38 and MSNBC 12:46:34 to cover the shooting that left injured seven &apos;-- six of whom were sent to local hospitals, including the gunman, who was shot multiple times in the chest by an LAPD officer." />
                      <outline text="James Francowas on the scene &apos;-- of course he was &apos;-- though stuck in a plane at LAX. &apos;&apos;At #lax Some S**tbag shot up the place&apos;&apos; he tweeted, also Instagramming a pic of himself stuck on the plane. Tim Daly called in to CNN and delivered one of the most colorful initial reports from the scene. He&apos;d been in a VIP lounge at Terminal 3 when the gunman was wounded and apprehended very nearby, in the vicinity of Gate 35, he said. Very quickly after the shooting &apos;&apos;The LAPD burst into the lounge&apos;...weapons drawn, herding everybody together to make sure there were no bad guys in the lounge,&apos;&apos; he described, noting that &apos;&apos;having a gun pointed at you&apos;&apos; in real life is a harrowing experience. He complimented authorities for doing &apos;&apos;an outstanding job trying to keep people calm&apos;&apos; and said he and others were locked in the lounge for &apos;&apos;almost an hour&apos;&apos; and when they were brought out, he saw a rifle and several clips on the ground about 30 feet away, as well as a blood and broken glass. Authorities told them to be careful not to disturb the blood or glass as they moved to the tunnel. But Discovery Channel&apos;s Mythbusters personality Tory Belleci is credited with breaking the new that something was up at LAX when he tweeted at 9:23 AM:&apos;&apos;Something crazy is doing down at LAX. People running everywhere. We just got evacuated.&apos;&apos; He and Mythbusters colleague Grant Imahara were in Terminal 3 at the time of the shooting, en route to Delaware for the filming of Discovery&apos;s Punkin Chunkin.They&apos;re tentatively booked to tell their stories to CNN&apos;s Anderson Cooper tonight; Belleci was closer to the shooting, while Imahara was also in the Virgin Airlines lounge. &apos;&apos;During evac, I counted officers from Airport Police, LAPD, Homeland Security &amp; other local PDs. All calm, all working together. Thanks guys!&apos;&apos; Imahara tweeted about two hours after the gunfire." />
                      <outline text="&apos;&apos;There are a couple hundred people standing there not knowing what to do. Mostly people exiting the airport on foot, walking down Century (Blvd),&apos;&apos; CBS scheduling chief Kelly Kahl told the local CBS station as he stood outside the terminal. &apos;&apos;Holy crap, @calibadger is live from LAX on KCBS/KCAL right now as an eyewitness of the chaos there,&apos;&apos; tweeted TV Guide Los Angeles bureau chief Michael Schneider. Kahl told Deadline he noticed something was wrong as he approached the airport by car, discovered they could not get the car into the airport and parked at a remote location and walk in. He was stopped by police and sat outside the airport for a while, making alternate travel plans, and talking to the CBS station about what he was observing." />
                      <outline text="It was the first big live breaking news event for Shepard Smith&apos;s new Fox News Deck, which he used to full capacity. The 38-foot video wall showed chopper footage of LAX and interviews with witnesses, as did various other monitors. Smith frequently went to the set&apos;s 55-inch touchscreen monitor to read out emails and statements from officials. Like his competitors, Smith was careful with information. &apos;&apos;I must tell you that there are reports that someone has lost his life. Fox News does not have those confirmed and will wait for authorities to give us an indication of exactly what they can confirmed,&apos;&apos; said Smith at around 11:35 AM PT today; similar comments came from CNN and MSNBC. Networks began reporting sources confirmed to them that one TSA agent had been killed at around 11:38." />
                      <outline text="Related:Fox News Channel Unveils Its New Self On 17th Anniversary" />
                      <outline text="&apos;&apos;These reports are everywhere. Multiple sources have reported to multiple news organizations that he was,&apos;&apos; said Smith after the news conference at LAX, in re why reporters at the news conference were asking if the shooter was also a TSA officer. The FNC anchor cited the LA Times as reporting the story. &apos;&apos;Fox News cannot confirm that and the authorities did not confirm it for us. Quite frankly to get ahead of ourselves on that matter would be a mistake,&apos;&apos; Smith added. (Later, Smith noted the LAT had updated its report to say the shooter was a ticketed passenger.) CNN left it to Rep. Loretta Sanchez (D-Calif) to first report on its air that the gunman was 23 year-old American citizen, and LA area resident, named Paul Ciancia. She did so while being interviewed by Jake Tapper, also revealing that at least two of those injured are TSA employees. Almost immediately after that interview Tapper turned to CNN&apos;s justice correspondent Evan Perez, who said the FBI was still working to confirm motivation, &apos;&apos;as with the name of the suspect, which the congresswoman just said on our air.&apos;&apos; Perez said the FBI had taken some material from the suspect at the scene that described &apos;&apos;anti federal government views&apos;...anti-TSA expression.&apos;&apos;" />
                      <outline text="Fox News was first to return to regularly scheduled programming, Your World With Neil Cavuto, while CNN and MSNBC stuck with the LAX story." />
              </outline>

              <outline text="Kraft removing some dyes from mac and cheese">
                      <outline text="Link to Article" type="link" url="http://www.cnn.com/2013/11/01/health/kraft-macaroni-cheese-dyes/index.html?hpt=hp_t2" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383343605_sxPaaeGC.html" />
      <outline text="Fri, 01 Nov 2013 22:06" />
                      <outline text="" />
                      <outline text="Kraft plans to remove Yellow No. 5 and Yellow No. 6 from some boxes containing cartoon-shaped pasta." />
                      <outline text="STORY HIGHLIGHTS" />
                      <outline text="Kraft will remove artificial food dyes from its new pasta shape varietiesCertain pasta shapes marketed to children will not include Yellow No. 5 and 6Kraft will likely use spices such as paprika, annatto and turmeric in its new products(CNN) -- When SpongeBob SquarePants skips onto shelves in boxes of Kraft Macaroni &amp; Cheese next year, he may be a little less, well, yellow than your kids are used to." />
                      <outline text="Kraft has revamped its character-shaped product line for 2014, according to company spokeswoman Lynne Galia. The new versions will have six additional grams of whole grains, be lower in sodium and saturated fat, and will use spices instead of artificial food dyes to recreate the pasta&apos;s famous yellow-orange color." />
                      <outline text="&quot;Parents have told us that they would like fun Mac &amp; Cheese varieties with the same great taste, but with improved nutrition,&quot; Galia said in an e-mail." />
                      <outline text="The company will remove Yellow No. 5 and Yellow No. 6 from boxes containing pasta shaped like SpongeBob SquarePants and those with Halloween and winter shapes. Two new shapes of the popular pasta -- Nickelodeon&apos;s Teenage Mutant Ninja Turtles and &quot;How to Train Your Dragon 2&quot; from Dreamworks -- will also be free of food coloring, Galia said." />
                      <outline text="Check out Eatocracy&apos;s recipe for homemade Mac &amp; Cheese" />
                      <outline text="The Center for Science in the Public Interest hailed Kraft&apos;s decision on Friday. Michael Jacobson, the center&apos;s executive director, said he is pleased with the announcement but is &quot;puzzled&quot; as to why Kraft would not change its iconic elbow-shaped macaroni product as well." />
                      <outline text="&quot;As Kraft has today shown, it is clearly possible to make macaroni and cheese without these harmful chemicals,&quot; Jacobson said in a statement." />
                      <outline text="The company tries to offer a wide variety of choices to consumers, Galia responded. &quot;Making ingredient changes isn&apos;t as simple as it would seem,&quot; she said. &quot;All of the ingredients must work together to deliver the distinctive taste, appearance and texture consumers expect and love from Original KRAFT Mac &amp; Cheese. Our fans have made it clear they won&apos;t settle for anything less.&quot;" />
                      <outline text="In Europe, foods with Yellow No. 5 are required to include a warning label that says, &quot;This product may have adverse effect on activity and attention in children.&quot; Instead of adding this label on its products, Kraft chose to remove the artificial dyes from its European line, and uses paprika and beta-carotene to add color. The company has not make the same change in the United States." />
                      <outline text="That &quot;double standard&quot; is what convinced Food Babe blogger Vani Hari to start a Change.org petition to convince Kraft to remove these dyes from all of the company&apos;s products." />
                      <outline text="&quot;We recently discovered that several American products are using harmful additives that are not used -- and in some cases banned -- in other countries,&quot; Hari wrote on the petition." />
                      <outline text="Yellow No. 5 has been linked to hyperactivity, asthma, some skin conditions and cancer, but larger scientific studies have proved inconclusive." />
                      <outline text="Could our favorite food flavorings damage our DNA?" />
                      <outline text="The Food and Drug Administration must approve color additives in the United States; Yellow No. 5 and Yellow No. 6 were approved for use in foods in 1969 and 1986, respectively." />
                      <outline text="More than 348,000 people have signed Hari&apos;s petition, and she delivered the electronic signatures to Kraft headquarters in April. She met with a public relations representative, but said she left the meeting feeling unsatisfied. Since then she has dedicated her time to pressuring the company to change." />
                      <outline text="Thousands of parents have sent her letters, she said, talking about the behavioral changes they&apos;ve seen in their kids since they removed artificial dyes from their diets." />
                      <outline text="Hari doesn&apos;t have children herself, but she has two nephews that she worries about. &quot;When I do have kids,&quot; she said, &quot;I want to have a food system that I trust.&quot;" />
                      <outline text="Hooray for healthier mac n&apos; cheese!" />
                      <outline text="Hari is thrilled that Kraft is going to alter its new line, but says there is more work to do. Other companies have removed artificial dyes from their products overseas without doing the same in America, she says. There&apos;s another campaign on Change.org asking Mars Inc. to remove the additives from M&amp;M&apos;s." />
                      <outline text="Jacobson urged parents to continue signing Hari&apos;s petition on Change.org." />
                      <outline text="&quot;As long as the Food and Drug Administration remains perched up in the bleachers and not on the playing field, action on the part of the consumers is the only thing that will get these companies&apos; attention,&quot; he said." />
              </outline>

              <outline text="VIDEO-LAX Gunman Kills TSA Officer Before Taken into Custody - ABC News">
                      <outline text="Link to Article" type="link" url="http://abcnews.go.com/m/story?id=20754881" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383338093_DGbTxx7A.html" />
      <outline text="Fri, 01 Nov 2013 20:34" />
                      <outline text="" />
                      <outline text="A gunman armed with an assault rifle entered a terminal at Los Angeles International Airport today, killed a TSA agent, penetrated deep into the terminal before he was captured by police." />
                      <outline text="Six other people were injured in the incident." />
                      <outline text="Th e shooting sent hundreds of passengers streaming out of the terminal with many fleeing onto the airport runway. Dozens of flights to and from the airport were delayed or cancelled. It also triggered a &quot;tactical alert&quot; for the Los Angeles Police Department." />
                      <outline text="The shooting began around 9:20 a.m. in the usually crowded terminal." />
                      <outline text="Police Chief Patrick Gannon said the shooter was armed with an assault rifle, blasted his way past airport screeners and &quot;got back very far into the terminal.&quot; Gannon said the shooter initially opened fire before &quot;proceeding up into the screening area&quot; where he shot at TSA officers." />
                      <outline text="Police &quot;tracked him through the airport... and engaged him,&quot; Gannon said, eventually taking him into custody." />
                      <outline text="The FBI quickly took a lead role in the invesitgation." />
                      <outline text="Witnesses described the shooter as a short, young, white man, carrying a long-rifle." />
                      <outline text="One of the shooting victims was a TSA officer who died of his wounds. Six others were injured and taken to nearby hospitals." />
                      <outline text="&quot;One arrived in critical condition and two are listed in fair condition,&quot; a spokesman from Ronald Reagan UCLA Medical Center said in a statement." />
                      <outline text="An emergency physician said the patients suffered bullet wounds and other injuries." />
                      <outline text="Three other patients were taken to other hospitals." />
                      <outline text="The LAPD said it was on &quot;tactical alert due to a major incident&quot; at the airport and the fire department said they were assisting at a multi-patient incident." />
                      <outline text="Police said they believe there was only one gunman, but are sweeping the terminal and surrounding areas as a precaution." />
                      <outline text="An eyewitness, Leon Saryan, told ABC News Radio that a &quot;fairly young&quot; gunman with a rifle came down a corridor in Terminal 3 and shot perhaps 20 times." />
                      <outline text="A TSA officer holding Saryan&apos;s shoes was shot and wounded, he told ABC." />
                      <outline text="Saryan said the gunman asked him, &quot;Are you TSA?&quot;" />
                      <outline text="&quot;He saw me. He looked at me with a quizzical look and said, &apos;TSA?&apos; And I just shook my head. So he moved on,&quot; Saryan said." />
                      <outline text="Terry Malloy, who was in the airport at the time of the shooting, told ABC News she heard at least three shots fired." />
                      <outline text="&quot;I was sitting there, and I heard the alarm go off like when the door opens. I saw all these people charging down this ramp going in a million different directions. Everyone started looking at each other (like) what are we going to do, and I saw the ticket agent go behind the counter, and then I heard shots,&quot; Malloy said." />
                      <outline text="&quot;I ran out to one of the piers,&quot; she said. &quot;Someone opened one of the doors, and then we literally ran right onto the runway. We saw airport police charging down the runway with their doors open,&quot; he said." />
              </outline>

              <outline text="Now The NSA And The State Department Are At War | The Cable">
                      <outline text="Link to Article" type="link" url="http://thecable.foreignpolicy.com/posts/2013/11/01/now_the_nsa_and_the_state_department_are_at_war" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1383334795_SuaHBxwF.html" />
      <outline text="Fri, 01 Nov 2013 19:39" />
                      <outline text="" />
                      <outline text="Newrevelations that the U.S. has been eavesdropping on world leaders like GermanChancellor Angela Merkel aren&apos;t simply straining Washington&apos;s relationship withBerlin. They&apos;re also sparking an increasingly public fight between the StateDepartment and the NSA, with the nation&apos;s spies and the nation&apos;s diplomatstrading shots about who&apos;s responsible for the mess.&quot;This is a pretty serious embarrassmentfor the U.S., and as top officials try to protect theiragencies and their reputations, they are notsticking with their talking points,&quot; a former senior U.S. officialtold The Cable." />
                      <outline text="Secretaryof State John Kerry touched off the furor when he saidsome of the NSA&apos;s overseas surveillance efforts -- which also included tappinginto tens of millions of calls in France and Spain -- had been carried outwithout the Obama administration&apos;s knowledge or explicit approval. The remarkshighlighted what appears to the White House&apos;s emerging strategy for dealingwith widespread public fury over the programs: blame it on the NSA. " />
                      <outline text="&quot;Thepresident and I have learned of some things that have been happening in manyways on an automatic pilot, because the technology is there and the ability isthere,&quot; Kerry told a conference in London. &quot;In some cases, some ofthese actions have reached too far and we are going to try to make sure itdoesn&apos;t happen in the future.&quot;" />
                      <outline text="GeneralKeith Alexander, the head of the NSA, responded by putting responsibility forthe spying efforts squarely on the State Department itself. He saiddiplomats around the world were asking for information about the &quot;leadershipintentions&quot; of top foreign officials, and that his agency was simply trying torespond to those intelligence requests." />
                      <outline text="Alexander,according to a report in The Guardian,was responding to a series of sharp-edged questions from James Carew Rosapepe,a former American ambassador to Romania. Rosapepe had asked the general toexplain how U.S. national security interests justified the NSA&apos;s spying effortson &quot;democratically elected leaders and private businesses.&quot;" />
                      <outline text="&quot;Thatis a great question, in fact as an ambassador you have part of the answer.  Because we the intelligence agencies don&apos;tcome up with the requirements. The policymakers come up with the requirements,&quot;Alexander said. &quot;One of those groups would have been, let me think, holdon, oh: ambassadors.&quot;" />
                      <outline text="Thisisn&apos;t the first time that the Obama administration has seen high-leveldisagreements play out in public, of course. In December 2009, President Obamaannounced plans to send tens of thousands of reinforcements to Afghanistan butstressed that they were being sent to carry out a narrow counter-terrorismmission targeting al-Qaeda terrorists, not a broader counter-insurgencymission. Within days, top military officials began to publicly and privatelysay they were going to undertake a counter-insurgency approach anyway. " />
                      <outline text="Theincreasingly-heated NSA debate is different, however, because it risks doinglong-term damage to key White House relationships with foreign leaders likeMerkel as well as long-term damage to the relationship between theadministration and the spies it entrusts with protecting the nation from newterror attacks." />
                      <outline text="Foreign Policyreported earlier this month that senior NSA officials, including Alexander,were angryat the White House for failing to do more to defend the spy agency fromcriticism of its surveillance efforts on Capitol Hill and in foreign capitals.The administration, meanwhile, has seemed blind-sided by the continuingrevelations about secret NSA spying programs at home and abroad." />
                      <outline text="TheWhite House had two basic choices for how to respond: argue that Obama knewabout the programs and approved them, which risked further infuriating keyAmerican allies, or say that he was unaware of the NSA&apos;s efforts, which riskedpainting a picture of a surprisingly out-of-touch commander in chief.  For the moment, the administration seems tohave settled on the latter." />
                      <outline text="P.J.Crowley, a former State Department spokesman, said the administration has had ahard time settling on a PR strategy because it doesn&apos;t know how many moredisclosures are yet to come, or precisely what will be in them." />
                      <outline text="&quot;There&apos;s a drip, drip, drip that makes categorical statements inresponse to the latest news report risky,&quot; he told The Cable.  &quot;At what point do you have a sense that youknow what you&apos;re dealing with so you can start to repair and rebuild? From adiplomatic standpoint, you can only start those repairs when the shovel stopsdigging a deeper hole.&quot; " />
                      <outline text="Crowley helped craft the State Department&apos;s response to theinitial WikiLeaks disclosures, but said that was relatively easy compared tothe ongoing disclosures of once-classified NSA documents by former NSAcontractor Edward Snowden." />
                      <outline text="&quot;During WikiLeaks we had months to assess the damage and seewhat was in the archive,&quot; he said.  &quot;Forthe moment, with Snowden, it&apos;s hard to know if we&apos;re closer to the end or thebeginning.&quot;" />
              </outline>
      </body>
  </opml>