<?xml version="1.0" encoding="ISO-8859-1"?>
<!-- OPML generated by Freedom Controller v0.5.4 on Thu, 26 Dec 2013 15:25:41 +0000 -->
<opml version="2.0">

      <head>
        <title>What Adam Curry is reading</title>
        <dateCreated>Thu, 26 Dec 2013 15:14:20 +0000</dateCreated>
        <dateModified>Thu, 26 Dec 2013 15:14:20 +0000</dateModified>
        <ownerName>Adam Curry</ownerName>
        <ownerId>669</ownerId>
        <expansionState></expansionState>
        <expansionState></expansionState>
        <vertScrollState>1</vertScrollState>
        <windowTop>146</windowTop>
        <windowLeft>107</windowLeft>
        <windowBottom>468</windowBottom>
        <windowRight>560</windowRight>
      </head>

      <body>
              <outline text="US drone strike kills three in North Waziristan - The News International">
                      <outline text="Link to Article" type="link" url="http://www.thenews.com.pk/article-131802-US-drone-strike-kills-three-in-North-Waziristan" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1388070860_HUbC9mhT.html" />
        <outline text="Source: drone killed - Google News" type="link" url="https://news.google.com/news/feeds?q=drone+killed&amp;hl=en&amp;ie=UTF-8&amp;output=rss" />
      <outline text="Thu, 26 Dec 2013 15:14" />
                      <outline text="" />
                      <outline text="December 26, 2013 - Updated 042 PKTFrom Web Edition" />
                      <outline text=" " />
                      <outline text=" " />
                      <outline text="MIRANSHAH: A US drone strike targeting a militant compound killed at least three suspected insurgents in a restive Pakistani tribal region near the Afghan border late Wednesday, officials said." />
                      <outline text=" " />
                      <outline text="The attack took place around midnight in Qutab Khel village, five kilometres (three miles) south of Miranshah, the main town of North Waziristan tribal region." />
                      <outline text=" " />
                      <outline text="&quot;A US drone fired two missiles on a militant compound, killing at least three suspected insurgents,&quot; a senior security official told AFP." />
                      <outline text=" " />
                      <outline text="A security official in Peshawar confirmed the attack and casualties. Another official in Miranshah put the death toll at four and said a fifth militant was seriously injured." />
                      <outline text=" " />
                      <outline text="The identities of those killed in the strike were not immediately known but officials suspect that they were of Afghan origin." />
                      <outline text=" " />
                      <outline text="North Waziristan is one of Pakistan&#180;s seven semi-autonomous tribal regions which Washington considers to be a major hub of Taliban and Al-Qaeda militants plotting attacks on the West and in Afghanistan." />
                      <outline text=" " />
                      <outline text="Pakistani government criticises drone strikes as a violation of sovereignty and counterproductive to anti-terror efforts." />
                      <outline text=" " />
                      <outline text="But ties with Washington have nevertheless improved this year after lurching from crisis to crisis in 2011 and 2012." />
                      <outline text=" " />
                      <outline text="Last month a US drone attack on a seminary linked to the feared Haqqani militant network in Khyber Pakhtunkhwa province in the northwest killed at least six people." />
                      <outline text=" " />
                      <outline text="The attack, which militant sources said killed the Haqqanis&#180; spiritual leader along with five others, was extremely unusual as it was mounted outside Pakistan&#180;s lawless tribal areas on the Afghan border." />
                      <outline text=" " />
                      <outline text=" " />
                      <outline text=" " />
                      <outline text=" " />
                      <outline text="If you are facing problem in submitting your comments, please click here to report your problem." />
              </outline>

              <outline text="IATA - ACI and IATA Collaborate to Deliver Smart Security">
                      <outline text="Link to Article" type="link" url="http://www.iata.org/pressroom/pr/Pages/2013-12-12-02.aspx" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1388070799_hAbGT7ta.html" />
      <outline text="Thu, 26 Dec 2013 15:13" />
                      <outline text="" />
                      <outline text="Press Release No.: 70" />
                      <outline text="Date: 12 December 2013" />
                      <outline text="Geneva/Montreal &apos;&apos; Airports Council International (ACI) and the International Air Transport Association (IATA) have signed a Memorandum of Understanding (MoU) jointly to develop Smart Security (SmartS). With the MoU, ACI and IATA can better align their resources and expertise to improve the journey from curb to boarding. Passengers will be able to proceed through security checkpoints with minimal inconvenience, security resources are allocated based on risk, and airport facilities are optimized. " />
                      <outline text="SmartS replaces the Checkpoint of the Future.  The name change reflects the start of a new phase of pilot testing involving first generation checkpoints.  Since 2012, components of the Checkpoint have been tested individually. Under SmartS, several components will be tested together to see how they interact with one another in an operational environment.  The renaming to Smart Security also signals the stronger ACI-IATA collaboration together with the strong participation of governments and other key industry stakeholders." />
                      <outline text="&apos;&apos;Smart Security is the way forward.  A lot has been learned from the component tests conducted over the last two years. It forms the foundation for us to move confidently into the next phase of the development. The MoU with ACI on Smart Security will deliver synergies by drawing on the collective expertise and knowledge that both organizations have built over the years,&apos;&apos; said Tony Tyler, IATA&apos;s Director General and CEO." />
                      <outline text="&apos;&apos;A touch point in the passenger journey that triggers a sense of dread is the security check. Through Smart Security, ACI and IATA will drive the needed change. Airports, airlines, control authorities and system suppliers all have a role to play in making the process more effective, efficient and pleasant for the passenger. Smart Security brings these stakeholders together with the shared goal of transforming the security checkpoint for the benefit of all the traveling public,&apos;&apos; said Angela Gittens, Director General, ACI World." />
                      <outline text="The Checkpoint of the Future was launched in 2010. In 2012, IATA and ACI, together with several national regulators defined a roadmap for the future of passenger screening with blueprints for 2014, 2017 and 2020. The blueprints detailed proposals that are operationally achievable and technically feasible by that timeframe. This roadmap was adopted by the International Civil Aviation Organization (ICAO) High Level Conference on Aviation Security in September 2012." />
                      <outline text="Between 2012 and 2013, tests were conducted of the individual components in airports to assess how they would work in an operational environment, including Geneva Airport, London Heathrow, London Gatwick and Amsterdam Schiphol. From 2014, SmartS pilots will be conducted at airports to test multiple components working and interacting together. These airports include Amsterdam Schiphol and London Heathrow, and with the support and participation of their respective regulators and home carriers." />
                      <outline text="The focus for 2014 is on optimizing the security screening resources and asset utilization, integrating innovative technology and repurposing existing equipment, and implementing new procedures to facilitate risk-based screening and decision making. " />
                      <outline text="For more information, please contact:" />
                      <outline text="IATA Corporate CommunicationsTel: +41 22 770 2967Email: corpcomms@iata.org" />
                      <outline text="ACI CommunicationsTel: + 1 514 373 1226Email: communications@aci.aero" />
                      <outline text="Notes for Editors:IATA (International Air Transport Association) represents some 240 airlines comprising 84% of global air traffic. ACI is the only global trade representative of the world&apos;s airports. Established in 1991, ACI represents airports&apos; interests with governments and international organizations, develops standards, policies and recommended practices for airports, and provides information and training opportunities to raise standards around the world. " />
                      <outline text="IATAContentBox1" />
                      <outline text="Airports Council International (ACI) and IATA signed MoU to develop Smart Security (SmartS)" />
              </outline>

              <outline text="FBI raid another scandal for charter school company | WBRZ News 2 Louisiana : Baton Rouge, LA |">
                      <outline text="Link to Article" type="link" url="http://www.wbrz.com/news/fbi-raid-another-scandal-for-charter-school-company/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1388069336_9g7cy2rY.html" />
      <outline text="Thu, 26 Dec 2013 14:48" />
                      <outline text="" />
                      <outline text="Posted: Dec 11, 2013 11:20 PM by Trey SchmaltzUpdated: Dec 12, 2013 6:20 AMSource: WBRZ" />
                      <outline text="BATON ROUGE- Wednesday evening&apos;s FBI raid on a charter school in East Baton Rouge is the latest item in a list of scandals involving the organization that holds the charter for the Kenilworth Science and Technology School." />
                      <outline text="Pelican Educational Foundation runs the school and has ties to a family from Turkey. The organization lost its school in New Orleans amid allegations of sexual misconduct among students that prompted a state investigation on campuses in the Crescent City and in Baton Rouge. It has also faced lawsuits and allegations from teachers about bad learning environments." />
                      <outline text="&quot;It was an atmosphere where there was a double standard,&quot; one former teacher told WBRZ News 2 in an investigation into the school in EBR. Former teachers were not happy with how things were handled when they spoke with a station reporter two years ago." />
                      <outline text="No one was ever charged in the sex allegations a school spokesperson pointed out Wednesday as federal investigators moved through the campus collecting items, putting them in boxes and then loading them into a van." />
                      <outline text="&quot;We will continue to cooperate&quot; with the FBI, Mike Lambert, the spokesman said. But, he would not comment further." />
                      <outline text="&quot;We&apos;re simply not in a position to say anything else right now,&quot; he added." />
                      <outline text="The school receives about $5,000,000 in local, state, and federal tax money. In 2012, the Pelican group was accused of improperly handling money by the Legislative Auditor. A report found about $8600 was improperly used to buy gifts for students who scored high on LEAP tests." />
                      <outline text="But, Lambert believes the school is doing its job. He said student performance has increased to a C and that more than half of the students at Kenilworth are at or above grade level. The Board of Elementary and Secondary Education approved Pelican and Kenilworth to continue to operate for about six more years." />
                      <outline text="About the same time as allegations and lawsuits began dealing with Pelican charter schools, a BESE member took an improper trip on behalf of another Turkish organization. Linda Johnson, who is no longer on BESE, was fined for breaking the law by the ethics board. She got an all expenses paid trip to Turkey." />
                      <outline text="Kenilworth Science and Technology School will be open Thursday.**********Follow the publisher of this post on Twitter: @treyschmaltz" />
              </outline>

              <outline text="FBI Raids Gulen School in New Orleans | Asbarez Armenian News">
                      <outline text="Link to Article" type="link" url="http://asbarez.com/117571/fbi-raids-gulen-school-in-new-orleans/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1388069232_AvBcnCGx.html" />
      <outline text="Thu, 26 Dec 2013 14:47" />
                      <outline text="" />
                      <outline text="Kenilworth Science and Technology Charter School in Baton Rouge" />
                      <outline text="Kenilworth charter school, subject of apparent FBI inquiry, has ties to Turkish educationBY DIANA SAMUELSFrom NOLA.com | The Times-Picayune" />
                      <outline text="NEW ORLEANS&apos;--FBI and Kenilworth Science and Technology Charter School officials aren&apos;t saying why the FBI converged on the Baton Rouge school&apos;s campus Wednesday evening, carting off boxes." />
                      <outline text="But the school has ties to a controversial education movement inspired by a Turkish Muslim scholar, Fethullah Gulen. And other schools connected with that movement have reportedly been investigated by the FBI." />
                      <outline text="The Philadelphia Inquirer reported in 2011 that the FBI was investigating whether employees of charter schools affiliated with the Gulen movement were kicking back part of their salaries, funded by taxpayers, to the Turkish Muslim movement of &apos;&apos;Hizmet.&apos;&apos; The Inquirer reported the investigation was &apos;&apos;nationwide,&apos;&apos; but coordinated by prosecutors in Pennsylvania, where Gulen lives." />
                      <outline text="Kenilworth&apos;s ties to the Gulen movement aren&apos;t direct or publicly advertised. Kenilworth Superintendent Tevfik Eski has previously denied to NOLA.com | The Times-Picayune any connection between Gulen and the school." />
                      <outline text="But in 2011, NOLA.com | The Times-Picayune reported that Pelican Educational Foundation, the nonprofit group that runs Kenilworth, does have various connections to the movement." />
                      <outline text="For example, Karen Fontenot, vice president of Pelican&apos;s board, spoke in 2010 at a conference on the Gulen movement and said, &apos;&apos;I&apos;m on the advisory board of the schools &apos;&apos;the Gulen schools in Louisiana.&apos;&apos;" />
                      <outline text="The Pelican Educational Foundation also oversaw Abramson Science and Technology Charter School in New Orleans, which was abruptly shut down by the state Board of Elementary and Secondary Education in 2011. Among other issues at Abramson, the state was investigating a reported bribery attempt where the state&apos;s academic advisor for charter schools was on Abramson&apos;s campus, and was approached by an executive of a construction company, Atlas Texas Construction and Trading. The Atlas executive offered the state official $25,000 to &apos;&apos;help fix this problem,&apos;&apos; potentially referring to complaints made about the school by a group of teachers." />
                      <outline text="Pelican disavowed any association with Atlas. But Atlas had done building work at an Oklahoma charter school that was led by Mustafa Guvercin, who later went on to be principal at Abramson." />
                      <outline text="Atlas is described as affiliated with Gulen in a classified State Department cable that was published by Wikileaks." />
                      <outline text="There is no indication that Gulen schools have been pushing a religious doctrine in the classroom. Gulen also emphasizes the need for peace, distancing himself from any hard-line Muslim sect and terrorism." />
                      <outline text="Pelican has run Kenilworth under a charter with the Recovery School District since 2009, and its contract was just renewed for another five years." />
                      <outline text="FBI officials would only say Wednesday that the issue is not a matter of public safety." />
              </outline>

              <outline text="FBI Raids US Charter School Linked to Turkish Islamic Gulen Movement">
                      <outline text="Link to Article" type="link" url="http://m.ibtimes.co.uk/fbi-raids-us-charter-school-linked-turkish-islamic-gulen-movement-1429343" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1388069127_UTRwjMtj.html" />
      <outline text="Thu, 26 Dec 2013 14:45" />
                      <outline text="" />
                      <outline text="&apos;); document.write(&apos;&apos;);function OAS_AD(pos) {if(OAS_version &gt;= 11) OAS_RICH(pos);else OAS_NORMAL(pos);} //--&gt;" />
                      <outline text="Fethullah Gulen (http://www.fgulen.com/)" />
                      <outline text="The FBI has raided a charter school in Louisiana which allegedly has ties to the controversial movement of Fethullah Gulen, a Turkish cleric living in self-imposed exile in the US." />
                      <outline text="During the visit at the Kenilworth Science and Technology Charter school in Baton Rouge, federal agents seized several boxes from the campus but they refused to reveal the reasons behind the raid." />
                      <outline text="It is not the first time that the FBI has put the spotlight on the charter schools, which are funded by American taxpayers. In 2011, the agency was investigating whether employees of charter schools linked to the movement were kicking back part of the salary to Hizmet, a Muslim movement funded by Gulen in Turkey." />
                      <outline text="Links between the Kenilworth charter school and the Gulen movement are not directly publicised. The local Times-Picayune reported that a nonprofit group that runs the school, called Pelican Educations Foundation, has various connections to the movement." />
                      <outline text="The vice-president of Pelican allegedly admitted to be on the advisory board of the charter schools in Louisiana." />
                      <outline text="Pelican was also linked to another charter school which was shut down in 2011 over a reported bribery attempt." />
                      <outline text="Who is Fethullah Gulen?" />
                      <outline text="Gulen is a charismatic and reclusive man who has lived in self-imposed exile in Pennsylvania since 1999. The official reason for his exile is given as &quot;medical&quot;, but Gulen was actually fleeing charges of plotting to overthrow the government in Turkey." />
                      <outline text="Over the years, he has built an impressive network of more than 1,000 schools in 140 countries, from South Africa to the United States." />
                      <outline text="The Hizmet movement initiated by Gulen proposes a moderate interpretation of Islam and has provided indispensable support for the ruling AKP party of Prime Minister Recep Tayyip Erdogan" />
                      <outline text="In Turkey the movement has the strongest support and affiliations, including in the country&apos;s largest daily newspaper, Zaman, and its English equivalent, Today&apos;s Zaman." />
                      <outline text="Earlier this year, a US woman anonymously told Wired she was targeted in a cyber-attack because of her outspoken criticism of the Gulen movement." />
              </outline>

              <outline text="Probe into Nazis and Jewish art exposes &apos;dealer to the Fuhrer&apos;">
                      <outline text="Link to Article" type="link" url="http://www.ynetnews.com/articles/0,7340,L-4469887,00.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1388068976_ZwY4JRED.html" />
        <outline text="Source: ynet - News" type="link" url="http://www.ynet.co.il/Integration/StoryRss3082.xml" />
      <outline text="Thu, 26 Dec 2013 14:42" />
                      <outline text="" />
                      <outline text="Hildebrand Gurlitt amassed 1,500 pieces worth $1 billion today that he insisted were legally bought from Jews fleeing Holocaust; sold art to finance Hitler&apos;s war effort. His son and heir has collection seized by German authorities Ynet News" />
                      <outline text="A German art collector who came to possess 1,500 masterpieces previously owned by Jews had close ties to the Nazi party and was even known as the &quot;dealer to the Fuhrer&quot;, German newspaper Der Speigel reported this week." />
                      <outline text=" " />
                      <outline text=" " />
                      <outline text="According to the report, Hildebrand Gurlitt, who died in a car accident in 1956, had connections in high-level Nazi circles and was involved in the systematic looting of Jewish property during the Third Reich. Much of the art had been transferred to an Austrian museum in the city of Linz, where Hitler had hoped to amass the largest, most expensive collection in the world." />
                      <outline text=" " />
                      <outline text="Related stories:" />
                      <outline text=" " />
                      <outline text="A recent raid by the German authorities at the Munich apartment of Gurlitt&apos;s son and heir, art collector Cornelius Gurlitt, uncovered the collection, today valued at nearly $1 billion." />
                      <outline text=" " />
                      <outline text="Cornelius has tried to re-claim the artwork, which was seized by the German authorities. He claims the pieces were purchased legally during the 1930s at low prices from Jews who were seeking to cash in on their property before fleeing Germany." />
                      <outline text=" " />
                      <outline text=" " />
                      <outline text=" " />
                      <outline text="Limited information on Hildebrand Cornelius&apos; activities was known in the immediate aftermath of the Holocaust. In 1945, a special unit of the US army in charge of returning to the rightful owners property pillaged by the Nazis arrested Hildebrand and discovered a portion of the enormous collection he assembled.  " />
                      <outline text="According to documents from the American unit cited in the Der Spiegel report, Gurlitt was described as &quot;an art collector from Hamburg with connections within high-level Nazi circles. He acted on behalf of other Nazi officials and made many trips to France, from where he brought home art collections.&quot;  " />
                      <outline text="Gurlitt had been instructed, by Hitler&apos;s command, to sell modern pieces which the Nazis had deemed &quot;degenerate art&quot; to raise funds for the German war effort. The Jews who attempted to escape Germany during this period sold their prized possessions for pennies on the dollar, simply to finance their way out of the country." />
                      <outline text=" " />
                      <outline text=" " />
                      <outline text="It was previously reported by German newspaper Bild that more than 200 pieces from the collection had been sold to Hildebrand for a symbolic price by Joseph Goebbels, Hitler&apos;s propaganda minister." />
                      <outline text=" " />
                      <outline text="Spiegel revealed that at the height of the war, Hildebrand developed a relationship with Cornelius M&#188;ller Hofstede, head of the Silesian Museum in Breslau, who confiscated works of art from Jews and sent them to Hildebrand to sell. Hofstede worked closely with the Gestapo and used his access to walk into Jewish homes and pick out selections for his museum." />
                      <outline text=" " />
                      <outline text="During his three-day interrogation by the Americans in 1945, Gurlitt tried to change his image, telling the Americans he acted out of fear because he had a Jewish grandmother. He said he was scared of being sent to the work camps and thought it better to cooperate with the Nazi authorities." />
                      <outline text=" " />
                      <outline text="Gurlitt was subsequently released by the Americans, and went on to become the director of a Dusseldorf museum, and in 1950 the 140 pieces seized by the US were returned to him, the report said." />
                      <outline text=" " />
                      <outline text="Like his son, Hildebrand Gurlitt also claimed that some of the artwork they discovered in his residence had been bought by his father long before the Nazis&apos; rise to power. But one of the paintings in question was purchased in 1935 from a Jewish journalist for just 600 Reichsmark." />
                      <outline text=" " />
                      <outline text="The Americans eventually returned the painting to Hildebrand, and it was sold in 1972 for almost $40,000 ($223,463 today). According to Spiegel, the journalist who sold Gurlitt the artwork, Julius Ferdinand Wolf, committed suicide along with his wife and brother rather than go to a concentration camp." />
                      <outline text=" " />
                      <outline text="Another seller to Gurlitt, a Jewish doctor from Hamburg, tried to reclaim his property after his release from Sachsenhausen concentration camp, the report said. But Gurlitt refused to pass on any information on the buyer of the art, the paper said." />
                      <outline text=" " />
                      <outline text="Roei Eisenberg contributed to this report" />
                      <outline text=" " />
              </outline>

              <outline text="2013 was a lost year for tech &apos;&apos; Quartz">
                      <outline text="Link to Article" type="link" url="http://qz.com/115831/googles-20-time-which-brought-you-gmail-and-adsense-is-now-as-good-as-dead/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1388068523_TggZS6h4.html" />
      <outline text="Thu, 26 Dec 2013 14:35" />
                      <outline text="" />
                      <outline text="Google&apos;s &apos;&apos;20% time,&apos;&apos; which allows employees to take one day a week to work on side projects, effectively no longer exists. That&apos;s according to former Google employees, one who spoke to Quartz on the condition of anonymity and others who have said it publicly." />
                      <outline text="What happened to the company&apos;s most famous and most imitated perk? For many employees, it has become too difficult to take time off from their day jobs to work on independent projects." />
                      <outline text="This is a strategic shift for Google that has implications for how the company stays competitive, yet there has never been an official acknowledgement by Google management that the policy is moribund. Google didn&apos;t respond to a request for comment from Quartz." />
                      <outline text="Update: Google engineers respond." />
                      <outline text="Update: Google&apos;s official response" />
                      <outline text="Once a pillar of innovation at Google, now verbotenWhen Google went public in 2004, the founders&apos; letter from co-founders Larry Page and Sergey Brin cited 20% time as instrumental to the company&apos;s ability to innovate, leading to &apos;&apos;many of our most significant advances,&apos;&apos; including AdSense, which now accounts for about 25% of the company&apos;s $50+ billion in annual revenue. Google engineers also used 20% time to incubate Gmail, Google Transit, Google Talk, and Google News, among other projects." />
                      <outline text="Here&apos;s how Google has effectively shut down 20% time without actually ending the program, says our source: First, as has been reported previously, Google began to require that engineers get approval from management to take 20% time in order to work on independent projects, a marked departure from the company&apos;s previous policy of making 20% time a right of all Googlers." />
                      <outline text="Recently, however, Google&apos;s upper management has clamped down even further, by strongly discouraging managers from approving any 20% projects at all. Managers are judged on the productivity of their teams&apos;--Google has a highly developed internal analytics team that constantly measures all employees&apos; productivity&apos;--and the level of productivity that teams are expected to deliver assumes that employees are working on their primary responsibilities 100% of the time." />
                      <outline text="Google is still experimenting, but in less democratic fashionThe end of 20% time at Google fits with other moves made by CEO Larry Page since he took over in January 2011. Six months after he took the reins, Page announced that Google would adopt a &apos;&apos;more wood behind fewer arrows&apos;&apos; strategy that would put more of Google&apos;s resources and employees behind a smaller number of projects. This meant killing off Google Labs, which had previously been Google&apos;s showcase for its experimental projects&apos;--many of them products of employees&apos; 20% time." />
                      <outline text="It makes sense that once Page began to eliminate projects that weren&apos;t core to Google&apos;s mission, he would also want to restrict the source of those new projects&apos;--20% time. Google is still innovating, of course, but in a more concerted fashion. The secretive Google X lab is where engineers go to work on new ideas now, everything from self-driving cars to Google Glass." />
                      <outline text="A more focused strategy may be good for Google&apos;s bottom line, and is arguably a necessary step as the company has grown larger and harder to manage. But it&apos;s worth asking: Has the company lost something by making innovation the province of an elite few, rather than a part of every engineer&apos;s weekly routine? And what&apos;s more, if 20% time has been abandoned at Google, are other companies, which reportedly include Apple, LinkedIn, and a host of others, wise to continue trying to copy it?" />
                      <outline text="More on Google:Google engineers insist 20% time is not dead&apos;--it&apos;s just turned into 120% timeGoogle is preparing for screenless computersGoogle is taking a profoundly new direction, says one of its top execsAs if seven screens weren&apos;t enough: Now Wall St traders will be wearing Google Glass" />
              </outline>

              <outline text="Justin Bieber announces &apos;retirement&apos;">
                      <outline text="Link to Article" type="link" url="http://www.bbc.co.uk/newsbeat/25518170#sa-ns_mchannel=rss&amp;ns_source=PublicRSS20-sa" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1388068193_fPy2cSZF.html" />
        <outline text="Source: BBC News - Home" type="link" url="http://feeds.bbci.co.uk/news/rss.xml" />
      <outline text="Thu, 26 Dec 2013 14:29" />
                      <outline text="" />
                      <outline text="For the second time in a week, Justin Bieber has suggested he&apos;s quitting music." />
                      <outline text="The singer tweeted &quot;My beloved beliebers I&apos;m officially retiring&quot; to his 48 million followers." />
                      <outline text="But less than an hour later, he posted further messages: &quot;The media talks a lot about me." />
                      <outline text="&quot;They make a up a lot of lies and want me to fail but I&apos;m never leaving you, being a belieber is a lifestyle." />
                      <outline text="&quot;Be kind loving to each other, forgive each other as god forgave us through Christ Merry Christmas. IM HERE FOREVER.&quot;" />
                      <outline text="The teenager&apos;s new documentary Believe has just been released." />
                      <outline text="Justin Bieber with manager Scooter Braun and Usher at the Believe premiere Last week the singer claimed in an interview he had plans to retire from the music industry." />
                      <outline text="That was later denied by his manager, Scooter Braun, who said the 19-year-old will only be taking a break in 2014." />
                      <outline text="&quot;He said in the interview that he was kidding two seconds later,&quot; said Braun, who discovered Bieber on YouTube." />
                      <outline text="&quot;Next year he is just taking a break to just make music and relax and take time to himself. It&apos;s the first time [he&apos;s had a break] since he was 12.&quot;" />
                      <outline text="Bieber&apos;s manager was speaking at the LA premiere for Believe, and hasn&apos;t responded to the latest tweets." />
                      <outline text="Although the singer himself did not stop to talk to journalists at the premiere, his mentor, the R&amp;B singer Usher, spoke about the 19-year-old&apos;s career." />
                      <outline text="&quot;This was going to be a long-term investment and we are are excited about the entire story,&quot; said Usher. &quot;This is just another chapter.&quot;" />
                      <outline text="The film features interviews with the singer in which he talks about his music, relationships and what is was like to grow up in the spotlight." />
                      <outline text="Earlier this month he was revealed to be the most searched-for person online, according to Microsoft Bing." />
                      <outline text="Follow @BBCNewsbeat on Twitter" />
              </outline>

              <outline text="Jersey&apos;s former health minister, Stuart Syvret, has been sentenced to three months in prison for blogging truth about Jersey pedophiles">
                      <outline text="Link to Article" type="link" url="http://the-tap.blogspot.com/2013/12/jerseys-former-health-minister-stuart.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1388068067_r5rVq8EV.html" />
        <outline text="Source: the tap" type="link" url="http://the-tap.blogspot.com/feeds/posts/default" />
      <outline text="Thu, 26 Dec 2013 14:27" />
                      <outline text="" />
                      <outline text="Jersey&apos;s former health minister, Stuart Syvret, has been sentenced to three months in prison after refusing to take down articles on his blog making serious allegations against a number of people on the island.4 November 2013" />
                      <outline text="Former Channel Islands politician sentenced to three months in prison for refusing to take down &apos;highly defamatory&apos; articlestheguardian.com, Monday 4 November 2013 18.46 GMTJersey&apos;s former health minister has been sentenced to three months in prison after refusing to take down articles on his blog making serious allegations against a number of people on the island.Stuart Syvret, described by one judge as &quot;a thorn in the side of the [Jersey] establishment&quot;, did not attend the court hearing in the royal court in St Helier on Monday but was arrested at his home after locking himself in his flat.According to John Hemming, a Liberal Democrat MP, Syvret has been unfairly prosecuted for revealing information in the public interest, including evidence that a nurse on the island may have killed some of his patients.Hemming accuses the Jersey judiciary of behaving oppressively by misusing the Data Protection Act in order to silence its critics.For a number of years Syvret has written a blog which publicises and examines what he sees as injustice and malpractice in Jersey. As a judge put it a number of years ago, the blog &quot;frequently contains extremely grave allegations against people living in the island, some public figures some not. Many of the allegations, if not capable of justification, are highly defamatory.&quot;From 1990 until 2010, Syvret was an elected politician in Jersey and from 2005 until 2007 served as health minister.In April 2010 he was disqualified from membership of the States of Jersey - the island&apos;s parliament - ostensibly due to his absence from the island. For a period prior to his disqualification he was living in Hemming&apos;s flat in London as he launched and fought a number of legal actions, rallying against what he refers to as the &quot;corrupt nature of Jersey&apos;s judiciary&quot;.In parliament in 2009, Hemming used parliamentary privilege to reveal that Syvret had made murder allegations about a nurse on his blog. Hemming told the Commons: &quot;He [Syvret] was then prosecuted under the Data Protection Act by Jersey. He was not allowed to adduce as evidence the case to which he referred on his web log, which is a public interest defence that he needed to reveal the failures of the judicial system in Jersey.&quot;http://www.theguardian.com/uk-news/2...og-allegations" />
              </outline>

              <outline text="Jennie Garth &apos;Out For Blood!&apos; Planning Tell-All Book That Will Expose Ex Hubby&apos;s Embarrassing Secrets">
                      <outline text="Link to Article" type="link" url="http://radaronline.com/exclusives/2013/12/jennie-garth-revenge-tell-all-book-ex-husband-peter-facinelli/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1388068000_tDMFtNjM.html" />
        <outline text="Source: Radar Online  Radar Online" type="link" url="http://www.radaronline.com/rss" />
      <outline text="Thu, 26 Dec 2013 14:26" />
                      <outline text="" />
                      <outline text="Who is being a vampire now? Jennie Garth plans to get  revenge on ex-husband  Peter Facinelli by ripping him apart in a tell-all book The National Enquirer is reporting and she is &apos;&apos;out for blood.&apos;&apos;" />
                      <outline text="The 90210 beauty will bare intimate and embarrassing secrets in her upcoming memoir, &apos;&apos;Deep Thoughts from a Hollywood Blonde.&apos;&apos;" />
                      <outline text="&apos;&apos;Jennie is out for blood,&apos;&apos; disclosed an insider." />
                      <outline text="PHOTOS: Peter Facinelli Spends $2 Million To Live Down The Street From Ex-Wife " />
                      <outline text="&apos;&apos;She&apos;s telling friends that she&apos;s going to reveal the real story of why her marriage failed , and that Peter is not going to come out looking good.&apos;&apos;" />
                      <outline text="The couple married in 2001, and split in 2012, amid rumors that &apos;&apos;The Twilight Saga actor had cheated on Jennie." />
                      <outline text="&apos;&apos;Peter begged Jennie to leave out any references that made him look like a cad or painted him in a bad light,&apos;&apos; divulged the source." />
                      <outline text="PHOTOS: Jennie Garth Flaunts Her Curves In Low Cut Dress" />
                      <outline text="&apos;&apos;But Jennie told him that he should have thought about that when he was running around on her.&apos;&apos;" />
                      <outline text="For more exclusive details about Jennie&apos;s tell-all book pick up the latest issue of The National Enquirer on newsstands Friday." />
                      <outline text="Share on TumblrPin ItEmail" />
              </outline>

              <outline text="Justin Bieber Security Guard Changes Story About Passed Out Female Partygoer To 911 Operator">
                      <outline text="Link to Article" type="link" url="http://radaronline.com/exclusives/2013/12/justin-bieber-911-party-girl-passed-out-tape-recording-security/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1388067759_CExBp924.html" />
        <outline text="Source: Radar Online  Radar Online" type="link" url="http://www.radaronline.com/rss" />
      <outline text="Thu, 26 Dec 2013 14:22" />
                      <outline text="" />
                      <outline text="Loud parties, screeching wheels, walks of shame and traveling hotboxes have become the norm for Justin Bieber &amp; crew, but the latest tidbit from the pop star&apos;s posse isn&apos;t to be taken lightly." />
                      <outline text="At a Dec. 14 party at around 3 a.m., according to online reports, a member of Justin&apos;s security detail called 911 to report a female partygoer in her early 20s was hyperventilating, while conscious and breathing, while hanging out at the singer&apos;s Calabasas mansion." />
                      <outline text="PHOTOS: 22 Toxic Bachelors &apos;-- Ladies Of Hollywood, Beware Of These Leading Men" />
                      <outline text="&apos;&apos;I think she might have had a seizure,&apos;&apos; the caller said, moments later telling the operator, &apos;&apos;She didn&apos;t have a seizure, she passed out &apos;... she&apos;s coherent how &apos;... she&apos;s breathing properly.&apos;&apos;" />
                      <outline text="The operator reiterated that with the partygoer&apos;s condition, she needed medical treatment, either via paramedics or a trip to the hospital. While the called initially agreed for an ambulance to be sent, he called back moments later saying that the woman was taken to the hospital. But according to online reports, the woman was never actually taken for medical assistance, as Bieber sources said she was just drunk on an empty stomach." />
                      <outline text="As we previously reported, the Biebs&apos; merry men have often been in the eye of controversy for their behavior, as in one instance, one of his bodyguards confiscated an Australian surfer&apos;s cell phone to delete photos of the pop star riding waves on a local beach." />
              </outline>

              <outline text="George Clooney&apos;s &apos;The Monuments Men&apos; Unveils New Campaign To Find Lost Art">
                      <outline text="Link to Article" type="link" url="http://www.huffingtonpost.com/2013/12/23/support-the-monuments-men_n_4490578.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1388066362_kwaLXtrg.html" />
      <outline text="Thu, 26 Dec 2013 13:59" />
                      <outline text="" />
                      <outline text="George Clooney produced, co-wrote, directed, and stars in Sony&apos;s &quot;The Monuments Men,&quot; but there&apos;s one part of the film&apos;s journey to theaters that he can&apos;t do alone: find all the missing artwork stolen or taken during World War II. That&apos;s where the audience comes in: As part of the release of &quot;The Monuments Men,&quot; Sony is partnering with author Robert Edsel for the SupportTheMonumentsMen.com campaign." />
                      <outline text="&quot;This is hugely important to our efforts to complete the mission of the Monuments Men. Between 1945 and 1951 the Monuments Men and Women found and returned almost five million works of art and cultural items, so many of which had been stolen by the Nazis,&quot; Edsel, the author of the book on which &quot;The Monuments Men&quot; is based, wrote in an email to HuffPost Entertainment. &quot;But hundreds of thousands of objects remain missing to this day including works of art and objects taken by soldiers as souvenirs. Our campaign, which George, Grant Heslov [co-writer] and Sony have so enthusiastically supported, marks the first time in history that anyone has sought the public&apos;s help in locating these items.&quot;" />
                      <outline text="Clooney first announced plans to turn Edsel&apos;s book, &quot;The Monuments Men: Allied Heroes, Nazi Thieves and the Greatest Treasure Hunt in History,&quot; into a film in early 2012. &quot;I&apos;m not opposed to doing a commercial film, I&apos;m just opposed to doing a commercial film that doesn&apos;t feel organic to me,&quot; Clooney said to TheWrap on Jan. 8, 2012. &quot;So if we&apos;re going to do a commercial film we thought, &apos;Let&apos;s do something that seems fun and actually have something to say.&apos;&quot; In addition to Clooney, &quot;The Monuments Men&quot; stars Matt Damon, Cate Blanchett, John Goodman, Bill Murray, Jean Dujardin and Bob Balaban." />
                      <outline text="&quot;Working with George and Grant was a wonderfully collaborative process,&quot; Edsel wrote in an email to HuffPost Entertainment. &quot;They were eager to hear to my comments and recommendations throughout the creative process and during filming. We didn&apos;t always agree, but they always heard me out. They welcomed me on set numerous times and afforded me the chance to bring my team of researchers, who have worked tirelessly gathering the history of these men and women. For that I remain extremely grateful. Both George and Grant have worked passionately and diligently to understand this untold part of history, and then find a way to tell this epic story in their own voice on screen. Making this film was an enormous undertaking and, now that it is finished, a great achievement.&quot;" />
                      <outline text="Robert Edsel on the set of &quot;The Monuments Men.&quot;" />
                      <outline text="In addition to audiences enjoying the film, Edsel wrote that he hopes &quot;The Monuments Men&quot; allows viewers to understand the lengths these men and women went to preserve history and protect &quot;civilization&apos;s most important and beautiful treasures from the destruction of war and theft by the Nazis.&quot;" />
                      <outline text="&quot;I imagine audiences everywhere will wonder, as I did some 17 years ago, how these heroes and their epic story were largely lost in the fog of history. Their assignment presented the Monuments Men with a dilemma: &apos;Is art worth a life?&apos; Seventy years later, audiences will have their own opportunity to consider this provocative question,&quot; Edsel wrote. &quot;The looting of the National Museum of Iraq following the U.S.-led invasion in 2003 proved a painful example of what can happen when such a great legacy is forgotten. I hope that moviegoers will be vocal in expressing their belief that Monuments officers should always be an important part of our modern day military forces and that our nation shows the respect for the cultural property of others that the Monuments Men and women did during World War II.&quot;" />
                      <outline text="As Sony noted in its press release, SupportTheMonumentsMen.com will also allow interested parties to sign a &quot;virtual petition supporting the Monuments Men&apos;s efforts to preserve and protect great cultural works of art by encouraging members of Congress to honor the Monuments Men with the Congressional Gold Medal.&quot;" />
                      <outline text="&quot;The Monuments Men have earned the right to be awarded the Congressional Gold Medal, but for that to happen we need the public to encourage their members of Congress to quickly indicate their support for these recently introduced bills,&quot; Edsel wrote. &quot;There will always be conflicts; I hope that our president will state, as did President Roosevelt and General Eisenhower, that the United States will always respect the cultural property of other nations, even in times of conflict. That was good foreign policy then; it will serve us well today and in the future.&quot;" />
                      <outline text="More information on the initiative can be found in the press release provided by Sony below. &quot;The Monuments Men&quot; is out in theaters on Feb. 7, 2014." />
                      <outline text="George Clooney and Matt Damon in &quot;The Monuments Men.&quot;" />
                      <outline text="SUPPORT THE MONUMENTS MEN IN THE SEARCH FOR LOST ART" />
                      <outline text="CULVER CITY, Calif., Dec. 20, 2013 &apos;&apos; In anticipation of the nationwide release of The Monuments Men, the new film from director George Clooney based on the true story of the race to save 1000 years of culture, moviegoers can visit SupportTheMonumentsMen.com, where they will find resources and information about the ways we all can continue the search for landmark works that were stolen or taken as souvenirs during World War II and are still missing today. The film, which is written by George Clooney &amp; Grant Heslov, will be released on February 7, 2014." />
                      <outline text="Robert M. Edsel, who founded and heads the Monuments Men Foundation, added, &apos;&apos;The Monuments Men and women saved almost five million cultural objects, but so much is still missing. They could be anywhere, in your grandfather&apos;s attic, or hiding in plain sight. I&apos;m thrilled that with the release of the movie, there will be a way for the public to help complete these heroes&apos; mission. Call 1-866-WWII-ART and find out how you can help.&apos;&apos;" />
                      <outline text="At SupportTheMonumentsMen.com, moviegoers can sign a virtual petition supporting the Monuments Men&apos;s efforts to preserve and protect great cultural works of art by encouraging members of Congress to honor the Monuments Men with the Congressional Gold Medal." />
                      <outline text="In addition, visitors will find a phone number &apos;&apos; 1-866-WWII-ART &apos;&apos; which will connect callers directly to the Monuments Men Foundation, where they can speak with a Monuments Men Foundation representative regarding the search for lost art." />
                      <outline text="Also as a part of the Support the Monuments Men site, visitors will find an interactive map. On the map, moviegoers can find out local museums that will be featuring their institutions&apos; connection to the Monuments Men &apos;&apos; such as personnel who participated in the campaign or rescued works of art that hang on the museums&apos; walls." />
                      <outline text="On the &apos;&apos;Journey of the Monuments Men&apos;&apos; feature, visitors can read about the history &apos;&apos; from information about the real Monuments Men to the efforts they and others took to save landmark works during the war." />
                      <outline text="Finally, the studio has developed an educational program to engage high school and college students, families and art buffs about the story of the Monuments Men. The educational site, at www.MonumentsMenEducation.com, features downloadable lesson plans that meet common core state standards, an interactive map, and videos to spark discussion and aid educators in building a curriculum. Students are also invited to get involved by uploading photos of local works of art that best represent their communities. The photos can be uploaded by visiting the Tumblr page at www.LocalTreasure.tumblr.com." />
                      <outline text="Based on the true story of the greatest treasure hunt in history, The Monuments Men is an action drama focusing on seven over-the-hill, out-of-shape museum directors, artists, architects, curators, and art historians who went to the front lines of WWII to rescue the world&apos;s artistic masterpieces from Nazi thieves and return them to their rightful owners. With the art hidden behind enemy lines, how could these guys hope to succeed? But as the Monuments Men found themselves in a race against time to avoid the destruction of 1000 years of culture, they would risk their lives to protect and defend mankind&apos;s greatest achievements. From director George Clooney, the film stars George Clooney, Matt Damon, Bill Murray, John Goodman, Jean Dujardin, Bob Balaban, Hugh Bonneville, and Cate Blanchett. The screenplay is by George Clooney &amp; Grant Heslov, based on the book by Robert M. Edsel with Bret Witter. Produced by Grant Heslov and George Clooney." />
                      <outline text="Also on HuffPost:" />
              </outline>

              <outline text="UN Retracts South Sudan Mass Grave Claim | News From Antiwar.com">
                      <outline text="Link to Article" type="link" url="http://news.antiwar.com/2013/12/25/un-retracts-south-sudan-mass-grave-claim/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1388066247_p3mmPMk5.html" />
      <outline text="Thu, 26 Dec 2013 13:57" />
                      <outline text="" />
                      <outline text="The UN continues to backtrack from claims earlier this week of a &apos;&apos;mass grave&apos;&apos; found in South Sudan. Initially reported to contain 75 bodies, it was downgraded to 34 bodies yesterday and has now been retracted outright." />
                      <outline text="The UN Mission now says the claims were related to a &apos;&apos;skirmish&apos;&apos; where 15 people were believed to be killed. The 75 initially reported to be in the non-existent grave are now reported as &apos;&apos;feared missing.&apos;&apos;" />
                      <outline text="Despite retracting the claim, the UN continues to insist it is &apos;&apos;deeply concerned&apos;&apos; about claims of mass extra-judicial executions and is &apos;&apos;investigating&apos;&apos; those allegations." />
                      <outline text="So far unmentioned is if the UN&apos;s claim of a death toll dramatically higher than reported is intact. Claims of 500 killed in a week of fighting were declared to be &apos;&apos;thousands&apos;&apos; in a recent comment, a claim made as the Security Council was debating a massive increase in UN troops in the country." />
                      <outline text="Last 5 posts by Jason Ditz" />
              </outline>

              <outline text="UN in South Sudan denies report of mass grave - Yahoo News">
                      <outline text="Link to Article" type="link" url="http://news.yahoo.com/un-south-sudan-denies-report-mass-grave-110500776.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1388066194_yyTNRduc.html" />
      <outline text="Thu, 26 Dec 2013 13:56" />
                      <outline text="" />
                      <outline text="HomeMailNewsSportsFinanceWeatherGamesGroupsAnswersScreenFlickrMobileMoreomg!ShineMoviesMusicTVHealthShoppingTravelAutosHomesYahoo NewsSearch NewsSearch WebSign InMailHelpAccount InfoHelpSuggestionsYahoo" />
              </outline>

              <outline text="Crowdsourcing Social Problems">
                      <outline text="Link to Article" type="link" url="http://venitism.blogspot.com/2013/12/crowdsourcing-social-problems.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1388040146_ktZCK3M5.html" />
        <outline text="Source: VENITISM" type="link" url="http://venitism.blogspot.com/feeds/posts/default" />
      <outline text="Thu, 26 Dec 2013 06:42" />
                      <outline text="" />
                      <outline text="CAPTCHA is the ingenious online system for verifying that you are a human user of a website and not some crawling bot. (The punny acronym is short for &quot;Completely Automated Public Turing test to tell Computers and Humans Apart.&quot;) Developed more than a dozen years ago at Carnegie Mellon University, CAPTCHA has been a reliable firewall between sensitive databases and virus-like programs designed to pry into them.Four years ago the computer scientist Luis Von Ahn, who helped develop the original technology, extended the same insight to the problem of accurately digitizing print books for online distribution. Ahn&apos;s reCAPTCHA, now owned by Google, uses the CAPTCHA interface to break up digitizing projects into two-word chunks of old scanned texts. Users-an estimated 10 percent of the world&apos;s population-are unknowingly helping to digitize around 100 million words a day, the equivalent of about 2.5 million books a year.Ahn&apos;s latest crowdsourcing project allows people to learn a foreign language while simultaneously translating huge chunks of the Internet. Duolingo, launched in late 2011, teaches six languages (English, Spanish, French, Italian, German, Portuguese) by giving students short translations to complete based on their current language level. Every time one of these translations is completed successfully, a small part of the Web (say, Buzzfeed&apos;s English-language site) gets translated into the language in question." />
                      <outline text="In a TED talk, Ahn explained his approach to crowdsourcing with an historical analogy.&quot;If you look at humanity&apos;s large-scale achievements, these really big things that humanity has gotten together and done historically-like, for example, building the pyramids of Egypt or the Panama Canal or putting a man on the moon-there is a curious fact about them, and it is that they were all done with about the same number of people,&quot; he says. &quot;It&apos;s weird; they were all done with about 100,000 people. And the reason for that is because, before the Internet, coordinating more than 100,000 people, let alone paying them, was essentially impossible. But now with the Internet, I&apos;ve just shown you a project where we&apos;ve gotten 750 million people to help us digitize human knowledge. So the question that motivates my research is, if we can put a man on the moon with 100,000, what can we do with 100 million?&quot;" />
                      <outline text="It doesn&apos;t get much bigger than digitizing human knowledge. Think of it. Technology and a clever business model allowing for the kind of large-scale coordination heretofore impossible in the annals of human history-without force, and much of it for free." />
                      <outline text="reCAPTCHA and Duolingo both represent a distinctly 21st-century form of distributed problem solving. These Internet-enabled approaches tend to be faster, far less expensive, and far more resilient than the heavyweight industrial-age methods of solving big social problems that we&apos;ve grown accustomed to over the past century. They typically involve highly diverse resources-volunteer time, crowdfunding, the capabilities of multinational corporations, entrepreneurial capital, philanthropic funding-aligned around common objectives such as reducing congestion, providing safe drinking water, or promoting healthy living. Crowdsourcing offers not just a better way of doing things, but a radical challenge to the bureaucratic status quo." />
                      <outline text="Here are several ways public, private, and nonprofit organizations can use lightweight, distributed approaches to solve societal problems faster and cheaper than the existing sclerotic models." />
                      <outline text="Chunk the Problem" />
                      <outline text="The genius of reCAPTCHA and Duolingo is that they divide labor into small increments, performed for free, often by people who are unaware of the project they&apos;re helping to complete. This strategy has wide public-policy applications, even in dealing with potholes." />
                      <outline text="In Boston, the city collects data on the driving habits of residents. Specifically, citizens volunteer to passively survey road conditions by opening an app called &quot;Street Bump&quot; during their daily commute. The resulting GPS data, combined with gyroscope readings, identifies potholes in time for intervention." />
                      <outline text="Boston&apos;s pothole problem might previously have required a small army of inspectors, managers, and relayed complaint calls. Now a citizen doesn&apos;t even have to report a problem herself. The local government can thus cheaply perform work that would otherwise rack up payroll. City officials Chris Osgood and Nigel Jacobs, the innovators who created Boston&apos;s Citizens Connect in 2009, call their approach microvolunteerism: empowering citizens to make small commitments to the public good, with a huge aggregate impact." />
                      <outline text="Microvolunteerism has proved effective the world over. The Kenyan slum of Kiberia needed maps. These would help citizens locate water sources and help officials plan future improvements. To map the slum, volunteers carried GPS units through Kiberia and marked landmarks such as water pumps and bathrooms." />
                      <outline text="Meanwhile, Finland&apos;s DigitalKoot project enlisted volunteers to digitize their own libraries by playing a computer game that challenged them to transcribe scans of antique manuscripts." />
                      <outline text="Governments can set up a microtasking platform, not just for citizen engagement but as a way to harness the knowledge and skills of public employees across multiple departments and agencies. If microtasking can work to connect people outside the &quot;four walls&quot; of an organization, think of its potential as a platform to connect people and conduct work inside an organization-even an organization as bureaucratic as government." />
                      <outline text="Wilmington, Delaware, was running out of landfill space. This wasn&apos;t surprising, considering the city&apos;s recycling rate of less than 20 percent. This is a common problem: Despite decades of public service campaigns, American recycling rates have hovered stubbornly around one-third, a far cry from Denmark&apos;s 69 percent.In 2006, instead of continuing to spread its landfill costs among citizens, Wilmington decided to spread its landfill responsibilities. The city contracted with Recyclebank, a company that calculates, via RFID cards in trash bins, the volume that each family recycles. Recycling translated to points that customers could then redeem at local businesses." />
                      <outline text="Within months, Wilmington&apos;s recycling rate jumped to 65 percent, according to the city. The avoided landfill fees meant that Recyclebank was paying for itself. And city retailers churned up new business." />
                      <outline text="Instead of changing the culture, Wilmington simply changed the incentives. This is the premise of economics: In the right system of incentives, individuals shoulder the work of prosperity, be it the long-term prosperity represented by recycling or the short-term prosperity represented by performing better at work." />
                      <outline text="Incentives designed badly can destroy a market, like the once-thick Atlantic Cod populations that desperate fishermen have extracted almost to extinction. Designed well, however, incentives can preserve a resource, as has Alaska&apos;s system of Individual Transferable Quotas for salmon. Since the early 1970s, each licensed crew has been able to sell a quota of tons of fish to other fishermen, allowing some to hedge against the vagaries of bad luck while letting fortunate fishermen buy enough permits to exploit a big haul. The wealth of salmon continues." />
                      <outline text="Economic incentives can encourage people to produce wealth for the whole without using too much individually. The big picture just needs to be considered when setting up the incentive structure itself." />
                      <outline text="Decentralize Service to the Self" />
                      <outline text="A young woman slices her finger on a knife. As she compresses the bleeding with gauze, she needs to know if her wound warrants stitches. So she calls up Blue Cross&apos; 24-hour nurse hotline, where patients call to learn if they should see a doctor. The nurse asks her to describe the depth of the cut." />
                      <outline text="He explains she should compress it with gauze and skip the ER. In aggregate, savings like this amount to millions of dollars of avoided emergency room visits." />
                      <outline text="Since 2003, Blue Cross has been shifting the work of basic triage and risk mitigation to customers. Britain&apos;s National Health Service (NHS) implemented a similar program, NHS Direct, in 1998. NHS estimates that the innovation has saved it &#130;&#163;44 million a year." />
                      <outline text="Mobile technology enables the promising technique of mobile self-monitoring. Tools that help users solve their own problems funnel an expert&apos;s valuable time toward only those cases that require their particular expertise. The burden of basic services gets shifted from credentialed professionals to individuals empowered with technology, whether it&apos;s a new car owner printing out DMV forms at home or parolees checking in via ankle bracelets." />
                      <outline text="Self-guided Internet-based education, such as the Khan Academy, augments an autodidact&apos;s library by assessing student weak spots and confirming progress. A simple monitor, such as Nike&apos;s FuelBand, which tracks and gamifies fitness workouts, can inspire wiser behavior in individuals, for greater public health. Such technologies can place responsibility for our well-being directly into our own hands." />
                      <outline text="Gamify Drudgery" />
                      <outline text="Finland&apos;s national library houses an enormous archive of antique texts, which officials hoped to scan and digitize into ordinary, searchable text documents. Rather than simply hire people for the tedium of correcting garbled OCR scans, the library invited the public to play a game. An online program called DigitalKoot lets people transcribe scanned words, and by typing accurately, usher a series of cartoon moles safely across a bridge." />
                      <outline text="In just a few months, 55,000 people helped digitize historical documents with 99 percent accuracy. A formerly tedious task was now fun enough to attract volunteers, and a library perpetually short of funds was able to achieve its goals for much less money." />
                      <outline text="Gamification-using game mechanics to engage participants in an activity-sets specific goals and rewards them. Platforms such as Rypple and RedCritter&apos;s Tracker encourage employees to post their goals and tasks, track their progress, claim skills, and confer virtual &quot;badges&quot; on coworkers. In 2009, the U.K.&apos;s Department for Work &amp; Pensions (DWP) deployed an &quot;idea management platform&quot; dubbed IdeaStreet that gamified the process of suggesting reforms. Within 18 months, 4,500 employees had generated 1,400 ideas; more than 60 of those evolved into successful implementations. Frontline staffers started solving problems that the DWP&apos;s central control center knew nothing about. DWP expects the savings from the new initiatives to reach &#130;&#163;20 million by fiscal year 2014-15.Gamification also holds the potential to vastly improve work quality. LiveOps, a virtual call center with 20,000 agents across the U.S., uses a gamified leaderboard: After gamification, some agents improved their sales by 8 to 12 percent and cut call times by 15 percent. Imagine such results at the DMV.Gamification is simply a reworked form of performance review. You set goals, measure progress, and reward completion. It distributes the effort of enthusiasm from management to employees, and even to the service recipients themselves." />
                      <outline text="Build a Two-Sided Market" />
                      <outline text="Road infrastructure costs government five cents per driver per mile, according to the Victoria Transport Policy Institute. &quot;That&apos;s a dollar the government paid for the paving of that road and the maintaining of that infrastructure&apos;&#130;&#172;...just for you, not the other 3,000 people that travelled that same segment of highway in that same hour that you did,&quot; says Sean O&apos;Sullivan, founder of Carma, a ridesharing application." />
                      <outline text="Ridesharing companies such as Carma, Lyft, and Zimride are attempting to recruit private cars for the public transit network, by letting riders pay a small fee to carpool. A passenger waits at a designated stop, and the app alerts drivers, who can scan a profile of their potential rider. It&apos;s a prime example of a potent new business model." />
                      <outline text="In two-sided markets, an exchange connects two parties-as an Xbox connects avid gamers with game designers, or AirBnb connects beds with travelers. Unlike a retail middleman, the two-sided market links the creator and consumer directly. It provides protections and standardizes transactions, reducing the cost of structuring a deal each time." />
                      <outline text="Successful two-sided markets tend to subsidize one side, giving the market a money side and a subsidy side. Search engines, for example, charge advertisers but not searchers." />
                      <outline text="With the ubiquity of mobile devices, two-sided ridesharing networks are thriving. Lyft, for example, with around 30,000 rideshares a week, has become a sort of de facto taxi service in cities like San Francisco, while Getaround and Relay Rides allow people to safely rent out their cars to strangers.The beauty of the two-sided market is that customers power it. Where institutions become more unwieldy as they grow, a two-sided market becomes more effective with success." />
                      <outline text="Remove the Middleman" />
                      <outline text="John McNair dropped out of high school at age 16. By his thirties, he became an entrepreneur, producing and selling handmade guitars, but carpentry alone wouldn&apos;t grow his business. So the founder of Red Dog Guitars enrolled in a $20 class on Skillshare.com, taught by the illustrator John Contino, to learn to brand his work with hand lettered product labels. Soon, a fellow businessman was asking McNair for labels to market guitar pickups." />
                      <outline text="Traditionally, the U.S. government might invest in retraining someone like John. Instead, peer-to-peer technology has allowed a community of designers to help John develop his skills. Peer-to-peer strategies enable citizens to meet each other&apos;s needs, cheaply. Peer-to-peer solutions can help fix problems, deliver services, and supplement traditional approaches." />
                      <outline text="Peer-to-peer can lessen our dependence on big finance. Kickstarter lets companies skip the energy of convincing a banker that their product is viable. They just need to convince customers." />
                      <outline text="Peer-to-peer strategies could help to retrain employees, finance new businesses, reduce traffic, or even review patents. In a trial program, the U.S. Patent office offered &quot;peer to patent&quot; services in which each patent application runs past the eyes of several citizens, often with science backgrounds, rather than distracting a lone bureaucrat." />
                      <outline text="The market is already unlocking the potential of peer-to-peer sharing. The question is how fast big institutions follow." />
                      <outline text="Release Your Data" />
                      <outline text="&quot;America is giving you billions and billions of dollars of data for free,&quot; Todd Park says. He means government data, like the kind that launched an estimated $90 billion GPS industry, fueling everything from Google Maps to the local weather report to the Garmin on your dashboard." />
                      <outline text="As chief technology officer of the United States, Park has the responsibility of releasing and publicizing enormous troves of government data-and encouraging private companies to use it." />
                      <outline text="Dozens of health care apps have emerged from the Department of Health and Human Service&apos;s Datapalooza conferences, Health 2.0 Developer Challenges, and other data events. These tools match patients to clinical trials, trace the supply chain of food-borne illnesses, or link GPS data to inhalers to chart asthma triggers. Within a year of its 2011 launch, this drive in health care data innovations helped reduce costly repeat hospital visits by 70,000, according to the Department of Health and Human Services." />
                      <outline text="While big institutions once jealously guarded information, now they&apos;re finding that strategic, targeted release of data lets a jungle of entrepreneurs pick apart datasets and construct valuable services." />
                      <outline text="Open data enables more creative uses and the development of niche markets. Insurance companies have begun sharing data with each other to hunt fraud. Motionloft, in San Francisco, has offered the city its private estimates of hourly foot traffic to better deploy city services." />
                      <outline text="The Department of Energy has partnered with Siemens Corporate Research and more than 50 university geological departments and state geological surveys to share results of old well bores, hopefully identifying new sources of geothermal energy. Microsoft Research is rendering the test results into 3-D maps." />
                      <outline text="Many municipalities have released bus data, which private companies use to produce apps which guide users through public transit, thus reducing congestion." />
                      <outline text="Open data lets information and innovation flourish. It may yet deliver cures for genetic diseases-the Human Genome Project was an early open-data effort-or new sources of clean energy." />
                      <outline text="Make It a Contest" />
                      <outline text="When NASA and the British Royal Astronomical Society wanted to better calculate the 3-D ellipticity of 2-D images of galaxies (a step necessary to detect dark matter), they were constrained by budgetary considerations. So they designed a competition. On the data bounty platform Kaggle, scientists vied to construct the most accurate method of analyzing astronomical data. Early leads emerged from a glaciologist from Cambridge and a signature verification specialist from Qatar University." />
                      <outline text="From radio call-in races to grade school reading challenges, people have long responded to contests. While traditional human resources collect minds with an accomplished record in one discipline, contests discriminate only by results, admitting fresh eyes from unrelated fiefdoms. Where patents incentivize only marketable ideas, contests reward scientific advances with less immediate commercial potential. This shows special promise in medicine, where drug research skews toward the ailments of the wealthy." />
                      <outline text="Sometimes publicity is what a service needs, as when the U.S. Veterans Administration increased access to its Blue Button Initiative that lets patients click a button to see their personal health data and share it with doctors or other health partners. The VA offered a $50,000 prize for the best way to spread the button to other health care providers. The winner, McKesson Corporation&apos;s RelayHealth, succeeded in spreading the Blue Button not to just 25,000 doctors, but to 200,000, while the losing teams also widely disseminated the technology.The federal government has built Challenge.gov, an engine for government agencies to run their own contests. Hundreds of challenges have been posted on the site in the past few years. The competition platform InnoCentive has rewarded inventors for designing a solar-charged flashlight for use in rural Africa and has helped find a theoretical way to simplify the manufacturing of tuberculosis drugs. The $10 million Ansari X Prize spurred 26 teams from seven nations to invest more than $100 million in space flight, investments that may accelerate development in technologies ranging from rocket fuel to seatbelts." />
                      <outline text="X Prize director Erika Wagner emphasizes that prizes are a supplement, not a replacement: &quot;Prizes aren&apos;t good for stimulating basic science, and we need to have a strong science infrastructure in this country,&quot; she told Next Big Future. But prizes expand that infrastructure&apos;s capabilities, distributing a problem across borders and brains." />
                      <outline text="Science-fiction writers used to worry that robots would automate all the work and disemploy everyone but robot owners. Instead, technology is permitting us to coordinate work on a larger scale than ever before. Through microvolunteerism, economic incentives, games, contests, sharing both data and peer-to-peer expertise, and helping people address their own needs, we can distribute the effort of great undertakings." />
                      <outline text="Building the pyramids and harnessing atomic energy required an elaborate structure of human resources. But that was before the Internet. The challenge of organizing talent is no longer the burden of bureaucracies, but a consequence of systems. These systems can divide big problems into digestible chunks, and spread the labor so thin that it doesn&apos;t even feel like work." />
              </outline>

              <outline text="VIDEO- &quot;You&apos;ve Warned Al Qaeda On The Rise Again! And We Know They Have Targeted The Christmas Season... - YouTube">
                      <outline text="Link to Article" type="link" url="https://www.youtube.com/watch?v=G-MP7Ga1OQk" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1388038190_r9Xd84J2.html" />
      <outline text="Thu, 26 Dec 2013 06:09" />
                      <outline text="" />
              </outline>

              <outline text="VIDEO- &quot;Big Data Mining Program Did NOT In FACT Stop ANY Terrorist Attacks The Report Makes That Clear&quot; - YouTube">
                      <outline text="Link to Article" type="link" url="https://www.youtube.com/watch?v=WZ010Qf7vAo" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1388036768_G6MxXy4c.html" />
      <outline text="Thu, 26 Dec 2013 05:46" />
                      <outline text="" />
              </outline>

              <outline text="VIDEO- Obama Tells Congress He May Take Further Action Under The War Powers Act While They&apos;re At Xmas! - YouTube">
                      <outline text="Link to Article" type="link" url="https://www.youtube.com/watch?v=p56TjFD4DMc" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1388035604_U2G7fLCY.html" />
      <outline text="Thu, 26 Dec 2013 05:26" />
                      <outline text="" />
              </outline>

              <outline text="VIDEO-Drug Bust Finds 1200 Packets Of Heroin Labeled &quot;OBAMA CARE&quot; - YouTube">
                      <outline text="Link to Article" type="link" url="https://www.youtube.com/watch?v=lv0cXPy7SVw" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1388035528_khj9cXEF.html" />
      <outline text="Thu, 26 Dec 2013 05:25" />
                      <outline text="" />
              </outline>

              <outline text="VIDEO- Pussy Riot&apos;s Nadya Tolokno Just Released From Russian Prison Calls For Boycott Of Sochi Olympics - YouTube">
                      <outline text="Link to Article" type="link" url="https://www.youtube.com/watch?v=RYIHh4vvObM" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1388035293_dQW3jQHg.html" />
      <outline text="Thu, 26 Dec 2013 05:21" />
                      <outline text="" />
              </outline>

              <outline text="VIDEO- Rocky and Bullwinkle Season 3 Show 8 - YouTube">
                      <outline text="Link to Article" type="link" url="http://www.youtube.com/watch?v=8Yw8RfuMtJk" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1388035156_udEBrK82.html" />
      <outline text="Thu, 26 Dec 2013 05:19" />
                      <outline text="" />
              </outline>

              <outline text="US says Kiir ready for talks but 11 still detained">
                      <outline text="Link to Article" type="link" url="http://mobile.nation.co.ke/news/US-says-Kiir-ready-for-talks-but-11-still-detained/-/1950946/2123786/-/format/xhtml/-/14bvcfgz/-/index.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1388034606_ytXUNYk7.html" />
      <outline text="Thu, 26 Dec 2013 05:10" />
                      <outline text="" />
                      <outline text="South Sudan President Salva Kiir is ready to begin talks with his opponents, but 11 dissidents remain in detention, a special US envoy said following talks on Monday with the South Sudan head of state." />
                      <outline text="Opposition leader Riek Machar has also said he is willing to hold talks, but has set release of the 11 detained opposition figures as a precondition." />
                      <outline text="US Special Envoy for Sudan and South Sudan Donald Booth told reporters in a conference call from Juba that the detainees had informed him of their &apos;&apos;desire and readiness to play a constructive role in ending the crisis.&apos;&apos;" />
                      <outline text="The United States welcomes the efforts of Igad member-countries to broker an end to the violence in South Sudan, Ambassador Booth added." />
                      <outline text="No decision has been made on whether to reduce US assistance to South Sudan in response to the fighting there, a senior Obama administration official said on Monday." />
                      <outline text="Most Popular" />
              </outline>

              <outline text="VIDEO- U.S. Ambassador To U.N. Samantha Powers Press Conference On South Sudan - YouTube">
                      <outline text="Link to Article" type="link" url="https://www.youtube.com/watch?v=mcWTXOH-fso" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1388033921_7gBvbnJH.html" />
      <outline text="Thu, 26 Dec 2013 04:58" />
                      <outline text="" />
              </outline>

              <outline text="VIDEO- Barton Gellman Describes Interviewing Edward Snowden - YouTube">
                      <outline text="Link to Article" type="link" url="https://www.youtube.com/watch?v=nFR8_v1XwgI" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1388033363_N7P8MMZ6.html" />
      <outline text="Thu, 26 Dec 2013 04:49" />
                      <outline text="" />
              </outline>

              <outline text="VIDEO- &quot;I Don&apos;t Know How To Feel About It&quot; Giving Up 100% Of YOUR Children&apos;s Privacy To A Police State Govt - YouTube">
                      <outline text="Link to Article" type="link" url="https://www.youtube.com/watch?v=ezaTzusUaqA" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1388033149_K7WaGPM9.html" />
      <outline text="Thu, 26 Dec 2013 04:45" />
                      <outline text="" />
              </outline>

              <outline text="VIDEO-Alternative Christmas Message - 4oD - Channel 4">
                      <outline text="Link to Article" type="link" url="http://www.channel4.com/programmes/alternative-christmas-message/4od" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1388032771_j5evXenV.html" />
      <outline text="Thu, 26 Dec 2013 04:39" />
                      <outline text="" />
                      <outline text="Parental ControlMy4oD: As viewing video on 4oD requires javascript, related functions such as viewing history, playlist and favourites cannot be used with javascript disabled4.15PMWed25 December 2013Channel 4" />
                      <outline text="Whistleblower Edward Snowden, who revealed the mass surveillance programmes organised by the US and other governments, gives this year&apos;s The Alternative Christmas Message." />
                      <outline text="Six months ago, Snowden, a computer analyst turned whistleblower, brought to global attention top-secret National Security Agency (NSA) documents leading to revelations about widespread United States surveillance on phone and internet communications." />
                      <outline text="Snowden lays out his vision for why privacy matters and why he believes mass indiscriminate surveillance by governments of their people is wrong." />
                      <outline text="Currently displaying allonly audio described episodes+ Display all episodes+ Display only audio described episodes" />
                      <outline text="Advertisement" />
                      <outline text="ABOUT THE PROGRAMMEChannel 4&apos;s alternative to the Queen&apos;s Christmas Day broadcast" />
                      <outline text="{* mergeAccounts {&quot;custom&quot;: true} *}There is already a Channel 4 account registered to {| current_emailAddress |}" />
                      <outline text="{| merge_radio |} Link my accountRegisterSign in with your Channel 4 account" />
                      <outline text="{* #tradAuthenticateMergeForm *} {* signIn_emailAddress *} {* mergeSignIn_password *}{* signIn_signInButton *}" />
                      <outline text="{* /tradAuthenticateMergeForm *}To sign in wiith your Facebook account you need to register with 4" />
                      <outline text="{* #facebookRegistrationForm *} {* tradReg_firstName *} {* tradReg_lastName *} {* facebookReg_emailAddress *} {* tradReg_password *} {* tradReg_passwordConfirm *} {* birthday *} {* tradReg_gender *}{* newsletterOptIn *} I&apos;d like to be told about Channel 4 exclusive previews, programmes and events that might match my interests. Show me an example.{* stayLoggedIn *}Check this box to be remembered on this computer. You accept that this service uses cookies." />
                      <outline text="{* /facebookRegistrationForm *}" />
              </outline>

              <outline text="VIDEO- Sports Fans WARNED Not To Use The Word &quot;Yid&quot; Or Face Police Investigation - YouTube">
                      <outline text="Link to Article" type="link" url="https://www.youtube.com/watch?v=ABBNIIPFogE" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1388032060_PCYpCF4e.html" />
      <outline text="Thu, 26 Dec 2013 04:27" />
                      <outline text="" />
              </outline>

              <outline text="Christmas: What It Means To America By The Numbers">
                      <outline text="Link to Article" type="link" url="http://www.zerohedge.com/news/2013-12-25/christmas-what-it-means-america-numbers" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1388027072_LwTJT2jn.html" />
        <outline text="Source: Zero Hedge" type="link" url="http://feeds.feedburner.com/zerohedge/feed" />
      <outline text="Thu, 26 Dec 2013 03:04" />
                      <outline text="" />
                      <outline text="Christmas: perhaps the most celebrated holiday in the US, regardless of religion, race, creed, ethnicity, gender, or any other background characteristic. At least, that is te case according to a recent Pew study which found that nine-in-ten Americans say they celebrate Christmas, and three-quarters say they believe in the virgin birth of Jesus. But only about half see Christmas mostly as a religious holiday, while one-third view it as more of a cultural holiday. Virtually all Christians (96%) celebrate Christmas, and two-thirds see it as a religious holiday. More surprisingly, fully eight-in-ten non-Christians in America also celebrate Christmas, but most view it as a cultural holiday rather than a religious occasion." />
                      <outline text=" " />
                      <outline text="The findings are less surprising when Pew looked into how Americans celebrate the holiday: 86% of U.S. adults say they intend to gather with family and friends on Christmas this year, and an identical number say they plan to buy gifts for friends and family. Roughly nine-in-ten adults say these activities typically were part of their holiday celebrations when they were growing up." />
                      <outline text=" " />
                      <outline text=" " />
                      <outline text="Something has changed with the passage of time, however: fewer Americans say they will send Christmas or holiday cards this year than say their families typically did this when they were children. The share of people who plan to go caroling this year also is lower than the share who say they typically did so as children. And while about seven-in-ten Americans say they typically attended Christmas Eve or Christmas Day religious services when they were children, 54% say they plan to attend Christmas services this year." />
                      <outline text="There are significant generational differences in the way Americans plan to celebrate Christmas this year, with younger adults less likely than older adults to incorporate religious elements into their holiday celebrations. Adults under age 30 are far less likely than older Americans to say they see Christmas as more of a religious than a cultural holiday. They are also less likely to attend Christmas religious services and to believe in the virgin birth. This is consistent with other research showing that younger Americans are helping to drive the growth of the religiously unaffiliated population within the U.S. But the new survey also shows that even among Christians, young people are more likely than older adults to view Christmas as more of a cultural than a religious holiday." />
                      <outline text="One-in-five adults say they are the parent or guardian of a child in their household who currently believes in Santa Claus. An additional 14% of Americans are parents or guardians of at least one child under the age of 18 but say their children do not believe in Santa Claus. (About two-thirds of Americans are not the parents or guardians of any children in their household.) Nearly six-in-ten Hispanics say they are parenting minor children in their homes, including 38% who have children who believe in Santa Claus. By comparison, fewer blacks and whites say they currently have Santa-believing children (21% and 15%, respectively), in part because blacks and whites are less likely than Hispanics to have minor children in the home." />
                      <outline text="Among those who have a child who believes in Santa Claus, seven-in-ten (69%) say they plan to pretend that Santa visits their house on Christmas Eve this year. But even among U.S. adults without a child who believes in Santa, sizable numbers plan on receiving a visit from Old St. Nick. Roughly one-in-five parents whose children do not believe in Santa (18%) say they will pretend to get a visit from Santa this year, as do 22% of those who are not the parents or guardians of minor children in their household." />
                      <outline text="Other highlights from the survey:" />
                      <outline text="Among the religiously unaffiliated, 87% say they celebrate Christmas, including 68% who view Christmas as more of a cultural holiday.Roughly eight-in-ten Americans (79%) say they plan to put up a Christmas tree this year. By comparison, 92% say they typically put up a Christmas tree when they were children.Nearly six-in-ten Americans say they plan to give homemade gifts this holiday season, such as baked goods or crafts. There is a big gender gap on this question; two-thirds of women (65%) plan to give homemade gifts, compared with 51% of men.Those who celebrate Christmas as more of a religious event are much more apt than those who view it as a cultural occasion to say they will attend religious services this Christmas (73% vs. 30%) and to believe in the virgin birth (91% vs. 50%). But on other measures, the differences in the ways the two groups will mark the holidays are much smaller. Roughly nine-in-ten in both groups will gather with family and friends and buy gifts this Christmas, and identical shares of each group will pretend to get a visit from Santa Claus on Christmas Eve (33% each).And some of the findings in detail:" />
                      <outline text="What do Americans look forward to the most and lest in Christmas:" />
                      <outline text=" " />
                      <outline text="More religious or cultural:" />
                      <outline text=" " />
                      <outline text="Will there be a Christmas tree?" />
                      <outline text=" " />
                      <outline text="Who is buying gifts:" />
                      <outline text=" " />
                      <outline text="Was Jesus born of a virgin?" />
                      <outline text=" " />
                      <outline text=" " />
                      <outline text="Instead of just purchasing gifts, how many actually prepare them:" />
                      <outline text=" " />
                      <outline text=" " />
                      <outline text="How many are gathering with the family?" />
                      <outline text="Source: Pew Research" />
                      <outline text="Average:Your rating: None" />
              </outline>

              <outline text="The Sugar and Alzheimer&apos;s Connection">
                      <outline text="Link to Article" type="link" url="http://m.motherjones.com/tom-philpott/2012/09/sugar-alzheimers" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1388027008_K5yh686V.html" />
        <outline text="Source: Dave says..." type="link" url="http://dave.sobr.org/microblog.rss" />
      <outline text="Thu, 26 Dec 2013 03:03" />
                      <outline text="" />
                      <outline text="By Tom Philpott on Thu. September 13, 2012 9:10 AM PDT" />
                      <outline text="Egged on by massive food-industry marketing budgets, Americans eat a lot of sugary foods. We know the habit is quite probably wrecking our bodies, triggering high rates of overweight and diabetes. Is it also wrecking our brains?" />
                      <outline text="That&apos;s the disturbing conclusion emerging in a body of research linking Alzheimer&apos;s disease to insulin resistance&apos;--which is in turn linked to excess sweetener consumption. A blockbuster story in the Sept. 3 issue of the UK magazine The New Scientist teases out the connections." />
                      <outline text="Scientists have known for a while that insulin regulates blood sugar, &quot;giving the cue for muscles, liver and fat cells to extract sugar from the blood and either use it for energy or store it as fat,&quot; New Scientist reports. Trouble begins when our muscle, fat, and liver cells stop responding properly to insulin&apos;--that is, they stop taking in glucose. This condition, known as insulin resistance and also pre-diabetes, causes the pancreas to produce excess amounts of insulin even as excess glucose builds up in the blood. Type 2 diabetes, in essence, is the chronic condition of excess blood glucose&apos;--its symptoms include frequent bladder, kidney, and skin infections, fatigue, excess hunger, and  erectile dysfunction." />
                      <outline text="Here in the US, Type 2 diabetes rates have tripled since 1980, New Scientist reports." />
                      <outline text="What&apos;s emerging, the magazine shows, is that insulin &quot;also regulates neurotransmitters, like acetylcholine, which are crucial for memory and learning.&quot; That&apos;s not all: &quot;And it is important for the function and growth of blood vessels, which supply the brain with oxygen and glucose. As a result, reducing the level of insulin in the brain can immediately impair cognition.&quot;" />
                      <outline text="So when people develop insulin resistance, New Scientist reports, insulin spikes &quot;begin to overwhelm the brain, which can&apos;t constantly be on high alert,&quot; And then bad things happen: &quot;Either alongside the other changes associated with type 2 diabetes, or separately, the brain may then begin to turn down its insulin signalling, impairing your ability to think and form memories before leading to permanent neural damage&quot;&apos;--and eventually, Alzheimer&apos;s." />
                      <outline text="Chillingly, scientists have been able to induce these conditions in lab animals. At her lab at Brown, scientist Suzanne de la Monte blocked insulin inflow to the brains of mice&apos;--and essentially induced Alzheimer&apos;s. When she examined their brains, here&apos;s what she found, as described by New Scientist:" />
                      <outline text="Areas associated with memory were studded with bright pink plaques, like rocks in a climbing wall, while many neurons, full to bursting point with a toxic protein, were collapsing and crumbling. As they disintegrated, they lost their shape and their connections with other neurons, teetering on the brink of death." />
                      <outline text="For a paper published this year, Rutgers researchers got a similar result on rabbits with induced diabetes." />
                      <outline text="There&apos;s also research tying brain dysfunction directly to excess sugar consumption. In a 2012 study, UCLA scientists fed rats a heavy ration of fructose (which makes up roughly a half of both table sugar and high-fructose corn syrup) and noted both insulin resistance and impaired brain function within six weeks. Interestingly, they found both insulin function and brain performance to improve in the sugar-fed rats when they were also fed omega-3 fatty acids. In other words, another quirk of the American diet, deficiency in omega-3 fatty acids, seems to make us more vulnerable to the onslaught of sweets." />
                      <outline text="Another facet of our diets, lots of cheap added fats, may also trigger insulin problems and brain dysfunction. New Scientist flags yet another recent study, this one from University of Washington researchers, finding that rats fed a high-fat diet for a year lost their ability to regulate insulin, developed diabetes, and showed signs of brain deterioration." />
                      <outline text="Altogether, the New Scientist story makes a powerful case that the standard American diet is as devastating for our brains as it is for our bodies. The situation is tragic:  " />
                      <outline text="In the US alone, 19 million people have now been diagnosed with the condition, while a further 79 million are considered &quot;prediabetic&quot;, showing some of the early signs of insulin resistance. If Alzheimer&apos;s and type 2 diabetes do share a similar mechanism, levels of dementia may follow a similar trajectory as these people age." />
                      <outline text="Yet another reason to load up on fruit and veggies&apos;--and work to wrest federal farm policy (which encourages the production of cheap sweeteners and fats)&apos;--from the grip of agribusiness." />
              </outline>

              <outline text="STREAMING MAKES MORE MONEY! THE DATA IS IN!">
                      <outline text="Link to Article" type="link" url="http://steveleeds.wordpress.com/2013/12/24/streaming-makes-more-money-the-data-is-in/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387992857_rTJhAZAT.html" />
        <outline text="Source: LIVE@LEEDS" type="link" url="http://steveleeds.wordpress.com/feed/" />
      <outline text="Wed, 25 Dec 2013 17:34" />
                      <outline text="" />
                      <outline text="Jay Frank futurehitdna.com 12/24/13" />
                      <outline text="In the great streaming royalty debate, the focus has been on tiny royalty rates per stream. Artists are up in arms, many are opting out of streaming services, and the noise and debate has been growing louder. Lost in that noise is a voice that is seldom heard: that of the record companies. There&apos;s good reason for that: they&apos;re making more money from streaming and the future looks extremely bright for them." />
                      <outline text="Buried in the Christmas Eve edition of the Wall Street Journal (which is itself a day to bury news) is a short column by esteemed writer Ethan Smith. And buried in HIS column (not the lead paragraph, but 8th paragraph) is the vital important nugget that shapes the future music business:" />
                      <outline text="Data reviewed by The Wall Street Journal showed that one major record company makes more per year, on average, from paying customers of streaming services like Spotify or Rdio than it does from the average customer who buys downloads, CDs or both." />
                      <outline text="OK&apos;...let&apos;s quickly digest this. On a per-consumer basis, a major record label makes more money from streaming services than any other format. This might be a figure to look at skeptically if these services barely reached a million people, but worldwide streaming services generated $1.25 billion dollars this year and Spotify alone has over 24 million active users (which jumped massively in the last week with app installs up 4x over the previous week). But how much more is being earned?" />
                      <outline text="The average &apos;&apos;premium&apos;&apos; subscription customer in the U.S. was worth about $16 a year to this company, while the average buyer of digital downloads or physical music was worth about $14." />
                      <outline text="Let&apos;s take a look at that. Year over year, the premium subscriber was worth nearly 15% more than the person who bought music either digitally or physically. So, if there&apos;s more money to be made in the streaming hills, why are so many artists unhappy? Because the artist has to rethink the business on multiple levels." />
                      <outline text="IT TAKES LONGER TO MAKE MORE MONEYAs Ethan points out, it took an &apos;&apos;indie pop/rock group&apos;&apos; 34 months to make more money from streaming than they did from sales. Some artists will do it in less time, and others in more time. Either way, the artist has to take the long view. It&apos;s certainly easier and much better to run a music business with the money coming in quickly with an up-front sale. However, if you believe in your music and have patience, the long run pays off. In this way, the recorded music business will quickly resemble its partners in publishing. In another way, with many artists being financially irresponsible, is it so bad for them to get their money slowly over a prolonged period?" />
                      <outline text="THE MONEY GOES TO MORE ARTISTS THAN EVER BEFOREA person buying $14 worth of CDs a year has the money going to 3 artists at the most (3 CDs x under $5). A person buying $14 worth of downloads a year has the money going to maybe 18 artists at the most (18 downloads x $.79). However, $16 worth of streaming revenue conceivably goes to as many as 3,200 tracks (3,200 streams x $.005). Even if you take an assumption that a person does 100 listens of one artist in a year, that&apos;s still spread out over 32 artists in a year, or nearly double the max average for download sales. As I&apos;ve reiterated before, the real issue facing artists with streaming is that the very access that allows them to make money means the pie gets sliced thinner. There&apos;s more money, but it just goes to more artists." />
                      <outline text="THE SONG HAS TO LAST A LONG TIMEDisposability of a song only works if you work it extra hard while it&apos;s hot. If an artist/song takes 34 months to make more money, then the song needs to be relevant for those 34 months. No longer can you stiff a consumer who buys something and only listens to it a couple of times. Now, those listens need to reoccur and do so over a prolonged period. This also means continually marketing content to ensure it stays relevant." />
                      <outline text="Longtime readers of my book Futurehit.DNA have already been making music that plays into these trends. I&apos;ve been predicting for years that music revenues will be based more on repeatability, and that is now taking firm root. Those who embrace these new realities are more likely than others to rise above the mass volume of music released and are poised to thrive in this new age of the music business." />
                      <outline text="Like this:LikeLoading..." />
                      <outline text="Tags: digital streaming" />
                      <outline text="This entry was posted on December 24, 2013 at 11:46 pm and is filed under Financial. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site." />
              </outline>

              <outline text="VIDEO-Figures. Obama Tried to Sign Up for Obamacare But &apos;&apos;System Couldn&apos;t Verify His Identity&apos;&apos; (Video) | The Gateway Pundit">
                      <outline text="Link to Article" type="link" url="http://www.thegatewaypundit.com/2013/12/figures-obama-tried-to-sign-up-for-obamacare-but-system-couldnt-verify-his-identity-video/?ModPagespeed=noscript" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387920475_KkPBNbZz.html" />
      <outline text="Tue, 24 Dec 2013 21:27" />
                      <outline text="" />
                      <outline text="According to the White House, President Obama tried to symbolically sign up for Obamacare but the system didn&apos;t recognize him.Ed Henry at FOX News reported:" />
                      <outline text="&apos;&apos;We learned today from the White House. Initially, they said he signed up for what they called a bronze plan, paying about four hundred dollars a month in premiums. But, then they came back to us and said &apos;&apos; Wait, he didn&apos;t actually enroll. They said his staff did it and that&apos;s because of his unique circumstance as Commander in Chief. That his personal information is not in particular government data bases. So healthcare.gov could not actually verify his identity, oddly enough&apos;... So his staff did it.&apos;&apos;" />
                      <outline text=" " />
              </outline>

              <outline text="Beyonce vs. Amazon and Target.">
                      <outline text="Link to Article" type="link" url="http://www.slate.com/blogs/business_insider/2013/12/22/beyonce_vs_amazon_and_target.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387899041_yaPfkzwr.html" />
      <outline text="Tue, 24 Dec 2013 15:30" />
                      <outline text="" />
                      <outline text="Beyonc(C) gave 750 Wal-Mart shoppers a pleasant surprise on Friday.YouTube" />
                      <outline text="This post originally appeared in Business Insider." />
                      <outline text="In news that will be sure to make Apple executives jump with joy, Amazon and Target are refusing to stock the CD version of Beyonc(C)&apos;s new album to protest the fact that she released it first on iTunes. So Beyonc(C) went shopping at a Wal-Mart in Tewksbury, Mass., on Friday night. After walking through the store pushing a cart like everyone else, she gave 750 shoppers a $50 gift card&apos;--a giveaway totaling $37,500." />
                      <outline text="Hijinks aside, there is a lot of money at stake here. Beyonce gave iTunes a one-week exclusive to sell the album, &quot;Beyonc(C),&quot; and it shifted 600,000 units during the period at $15.99 each. That&apos;s $9.5 million in total sales." />
                      <outline text="So far, it appears that Amazon and Target may be cutting off their noses to spite their faces. Despite Apple&apos;s head start, Billboard reports that Sony and Columbia still managed to ship more than 500,000 units of the CD before the general release date. (Amazon is selling the MP3 version of the album; Target is selling neither the digital nor CD edition.)" />
                      <outline text="Why would Amazon and Target want to make enemies of Beyonc(C), whose antics in Wal-Mart have made them look petty? They probably have their eye on the long game. This is only $10 million or so in lost sales between the two companies, after all&apos;--not even a rounding error in either company&apos;s revenues. And most artists are not Beyonc(C)&apos;--they need Amazon and Target more than Target and Amazon need them." />
                      <outline text="So even though they know they will lose their fight against Queen Bey&apos;--she&apos;s giving away money in Wal-Mart, haters!&apos;--they&apos;re sending a powerful message to the 99 percent of other record companies and musicians: Do not screw with us by giving preferential treatment to Apple and iTunes, or we will severely curtail your album sales in our stores." />
                      <outline text="Disclosure: Jeff Bezos is an investor in Business Insider through his personal investment company Bezos Expeditions." />
              </outline>

              <outline text="LA Times - Fallout from Target customer data breach shows in sentiment survey">
                      <outline text="Link to Article" type="link" url="http://touch.latimes.com/#section/-1/article/p2p-78665101/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387898623_dASKvDSY.html" />
      <outline text="Tue, 24 Dec 2013 15:23" />
                      <outline text="" />
                      <outline text="LA Times  Loading..." />
                      <outline text="The page cannot be loaded because you are currently offline. Please check your internet connection and try again, or go back to the previous page." />
                      <outline text="The page you requested was not found." />
              </outline>

              <outline text="Target: Justice Dept. Investigates Its Data Breach : NPR">
                      <outline text="Link to Article" type="link" url="http://www.npr.org/2013/12/23/256713973/target-justice-dept-investigates-its-data-breach" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387898286_NrmKV72r.html" />
      <outline text="Tue, 24 Dec 2013 15:18" />
                      <outline text="" />
                      <outline text="hide captionA customer prepares to sign a credit card slip Thursday at a Target store in Miami. The giant retailer says 40 million payment cards nationwide may have been compromised by data theft." />
                      <outline text="Joe Raedle/Getty ImagesA customer prepares to sign a credit card slip Thursday at a Target store in Miami. The giant retailer says 40 million payment cards nationwide may have been compromised by data theft." />
                      <outline text="Joe Raedle/Getty ImagesTarget Corp. said Monday that the Department of Justice is investigating the credit and debit card security breach at the retailer." />
                      <outline text="The investigation comes after Target revealed last week that data connected to about 40 million credit and debit card accounts were stolen between Nov. 27 and Dec. 15. Security experts say it&apos;s the second-largest theft of card accounts in U.S. history, surpassed only by a scam that began in 2005 involving retailer TJX Cos. That affected at least 45.7 million card users." />
                      <outline text="The Department of Justice declined to comment on whether it&apos;s investigating the breach at Target, the nation&apos;s second-largest discounter. But Target said that it&apos;s cooperating with the DOJ&apos;s probe." />
                      <outline text="The news came as Target also said that it is working with the U.S. Secret Service in the retailer&apos;s own investigation and that its general counsel held a conference call on Monday with state attorneys general to bring them up to date on the breach." />
                      <outline text="&quot;Target remains committed to sharing information about the recent data breach with all who are impacted,&quot; Molly Snyder, a Target spokeswoman, said in a statement." />
                      <outline text="Target has been trying to deal with fallout from the breach during what is typically the busiest shopping season of the year. By Monday evening, more than a dozen Target customers had filed federal lawsuits around the country, with some accusing Target of negligence in failing to protect customer data." />
                      <outline text="Target has said that it told authorities and financial institutions once it became aware of the breach on Dec. 15. The company issued an apology to customers and doubled the number of workers taking calls from customers around the clock. It also offered 10 percent off to customers who wanted to shop in its stores on Saturday and Sunday and free credit-monitoring services to those who are affected by the issue." />
                      <outline text="But there are early signs that some shoppers are scared off by the breach. Scotty Haywood, who lives in Smiths Station, Ala., said he plans to stop shopping at the store. He said his debit card number had been stolen after he used it at Target the day after Thanksgiving." />
                      <outline text="He said the card was denied when his wife tried to use it Thursday at a grocery store. He said the couple knew something was wrong because they had $2,200 in the account." />
                      <outline text="&quot;The possible savings of a few dollars (by going to Target) are nothing compared to the money that has been stolen from us,&quot; he said." />
                      <outline text="Overall, Customer Growth Partners LLC, a retail consultancy, estimates that the number of transactions at Target fell 3 percent to 4 percent on Saturday, compared with a year ago. The Saturday before Christmas is usually one of the top busiest days of the season." />
                      <outline text="&quot;Before this incident, Target had a chance of at least a decent Christmas. Now, it will be mediocre at best,&quot; said Craig Johnson, president of Customer Growth Partners, a retail consultancy." />
                      <outline text="Meanwhile, consumer perception about the Target brand has dropped steeply since the news broke Wednesday night, according to YouGov BrandIndex, which surveys 4,300 people daily. The index ranges from 100 to negative 100 and is compiled by subtracting negative customer feedback from positive customer feedback." />
                      <outline text="Before the breach, Target&apos;s index was 26, higher than the rating of 12 of its peer group of retailers that include Wal-Mart. Now, it&apos;s negative 19." />
                      <outline text="Eric Hausman, a Target spokesman, declined to comment specifically on sales or the impact of its 10 percent offer, but said that stores &quot;were busy.&quot;" />
                      <outline text="Target is based in Minneapolis and has nearly 1,800 stores in the U.S. and 124 in Canada." />
              </outline>

              <outline text="There Can Only Be One: Who is Behind the Targeting of Target? | American Everyman">
                      <outline text="Link to Article" type="link" url="http://willyloman.wordpress.com/2013/12/24/there-can-only-be-one-who-is-behind-the-targeting-of-target/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387898152_hxmYfH8C.html" />
      <outline text="Tue, 24 Dec 2013 15:15" />
                      <outline text="" />
                      <outline text="by Scott Creighton" />
                      <outline text="UPDATE:The Huffington Post jumps on the RFID bandwagon along with Fox News." />
                      <outline text="&apos;--&apos;--&apos;--" />
                      <outline text="Ask yourself this question: who benefits?" />
                      <outline text="Target&apos;s recent epic data breach saga is starting to sound mighty suspicious to me as the Obama &apos;&apos;Justice&apos;&apos; Department is being brought it to &apos;&apos;investigate&apos;&apos; and tons of folks are lining up filing lawsuits hoping to get millions in settlements when they haven&apos;t lost a dime as of yet." />
                      <outline text="&apos;&apos;It&apos;s also the first time in more than six years that negative perception of Target has outweighed positive feelings about the brand.&apos;&apos; LA Times Dec. 23" />
                      <outline text="Target is the nation&apos;s #2 discount retailer. Wal-Mart is #1 of course since they jumped in bed with the Clintons all those years ago and road the NAFTA train to full spectrum domination of the market. Hillary was on union-busting Wal-Mart&apos;s board of directors from &apos;86 to &apos;92 &apos;... they made a seat just for her while her husband was governor of the state they are based in (from &apos;83 to &apos;92)." />
                      <outline text="Of course we all know how close the Obama administration is to the Clinton family, don&apos;t we? Not only does Bill give press conferences in the White House, but his wife was Secretary of State for 4 years under Obama." />
                      <outline text="And it&apos;s Obama&apos;s &apos;&apos;Justice&apos;&apos; department that is going to investigate what happened? Rumors of the DoJ&apos;s involvement centering on investigating whether or not Target was guilty of criminal negligence have already begun&apos;..." />
                      <outline text="&apos;&apos;I can&apos;t see another reason that they would be involved at this point,&apos;&apos; Pascual said. &apos;&apos;It&apos;s too early to say it&apos;s criminal negligence on the part of the company.&apos;&apos; Star Tribune Dec. 24th" />
                      <outline text="&apos;&apos;By Monday evening, more than a dozen Target customers had filed federal lawsuits around the country, with some accusing Target of negligence in failing to protect customer data.&apos;&apos; NPR Dec. 23rd" />
                      <outline text="&apos;&apos;In a Sunday letter to the Federal Trade Commission, Sen. Richard Blumenthal (D-Conn.) said the agency should look into Target&apos;s responsibility in the massive hack&apos;.... &apos;&apos;If Target failed to adequately and appropriately protect its customers&apos; data, then the breach we saw &apos;... was not just a breach of security, it was a breach of trust,&apos;&apos; Blumenthal wrote.&apos;&apos; LA Times Dec. 23" />
                      <outline text="yeah&apos;... actually, if the Obama administration is beholding to Wal-Mart like the Clinton administration was before it, then obviously it&apos;s NOT too early to assume their justice department is looking at criminal negligence charges to be leveled at Wal-Mart&apos;s only major competitor." />
                      <outline text="Anyone remember how Wal-Mart and the Department of Homeland Security have &apos;&apos;teamed up&apos;&apos;?" />
                      <outline text="It&apos;s hard to find solid data on the security breach itself. How did they do it?" />
                      <outline text="Supposedly a mal-ware of some kind was used to collect &apos;&apos;metadata&apos;&apos; on some 40 million transactions at the height of the holiday gift buying season. Once Target became aware of the problem, they rightly informed their customers and offered free credit tracking services to make sure their customers weren&apos;t being ripped off." />
                      <outline text="Very few reports have come in of someone claiming that data was used to rip them off though. You see, not only did the data breach not involve the PINs of the customers, but they also didn&apos;t steal the 3 digit CVV codes on the back of the cards which are needed to use the card information online or over the phone along with the PIN." />
                      <outline text="&apos;&apos;The theft involved the CVV security codes embedded in the magnetic stripes on the cards and not the three-digit CVV codes on the back of the cards, as the company initially reported. Target has repeatedly said the security breach did not compromise debit card personal identification numbers (PINs). Still, some banks have decided proactively to issue new debit cards and PINs to affected customers.&apos;&apos; Star Tribune Dec. 24th" />
                      <outline text="Many argue that the information obtained could be used to generate identity theft in the future, but the data doesn&apos;t include crucial information such as Social Security numbers which would be needed to do that." />
                      <outline text="Target is suffering from this publicity as you might expect. Their &apos;&apos;brand index&apos;&apos; has taken quite a hit while Wal-Mart sits back and laughs." />
                      <outline text="The RFID debate will be raised again as influence peddlers for that Orwellian device are already trying to claim this breach would never have happened were it not for those pesky magnetic strips on the backs of our cards." />
                      <outline text="JPMorgan Chase piled on as quickly as they could to add fuel to the &apos;&apos;crisis&apos;&apos; by restricting their own customer&apos;s accounts as per how much cash they could remove from the bank." />
                      <outline text="Thousands of shoppers across North Texas have been stopped at the checkout counter unable to pay for their purchases with no warning at all &apos;-- even though they have plenty of money in their accounts." />
                      <outline text="It is new fallout from that Target security breach." />
                      <outline text="And it wasn&apos;t just people buying holiday presents who found their cards would not be honored. Any kind of shopping &apos;-- including groceries and gas &apos;-- was halted." />
                      <outline text="Some banks put new, very low limits on debit cards during this final weekend before Christmas." />
                      <outline text="Most customers we talked to were angry they hadn&apos;t been told about the crackdown, being blamed on the problems with Target.&apos;&apos; KVUE Dec. 23" />
                      <outline text="JP Morgan certainly knows there isn&apos;t enough data in those files that were lifted for someone to use fake debit cards to rob their customers. That&apos;s not why they shut down their customer&apos;s access to their own money." />
                      <outline text="For every customer separated from his funds, you have a new Wal-Mart shopper since Chase and the press are blaming Target for it and not the banks." />
                      <outline text="Lawsuits, bad press, potential criminal charges and banks keeping folks from buying their groceries in the days leading up to Christmas&apos;... seems like a lot of effort is being put into crushing Target once and for all leaving only one major discount retailer in the country." />
                      <outline text="So how did they get that info? Who was behind it? All this talk about how bad Target is and very little info about who actually took the data and how. I wonder why that is." />
                      <outline text="I&apos;ll just leave this here for your consideration:" />
                      <outline text="&apos;&apos;According to unnamed sources in the Wall Street Journal on Friday, the NSA has been obtaining purchase information from credit card companies. The Journal didn&apos;t specify what type of credit card providers were providing information to the NSA; it could be networks like Visa and MasterCard, third-party processors, or issuing banks like Bank of America and Chase." />
                      <outline text="It&apos;s believed that the NSA can&apos;t tell exactly what you&apos;re buying: paint thinner, Justin Timberlake CDs, baked beans. But they can see a disturbing amount of information. What&apos;s more, the tracking almost certainly involves a continuous stream of data; it&apos;s not a one-off incident." />
                      <outline text="&apos;... Networks are most likely giving the government &apos;&apos;metadata.&apos;&apos; That is, the credit card issuers could provide the NSA details such as an account or card number, where and when a purchase was made, and for how much. Even though the exact items purchased aren&apos;t revealed, Brian Krebs, who blogs at KrebsOnSecurity.com, says &apos;&apos;merchant category codes&apos;&apos; in such data give clues about what was bought.If the NSA is collecting data at the processor level, &apos;&apos;at that point the transaction gets cleared and posts to an account, so, yes, you can track it down to a person,&apos;&apos; Aufsesser says&apos;..." />
                      <outline text="&apos;... Following the leaked Verizon court order, the Obama Administration has defended its actions by pointing to two instances when terrorists were intercepted after their correspondence raised a red flag. Experts say a similar mentality is at work here." />
                      <outline text="&apos;&apos;Based on what we&apos;ve seen so far based on PRISM, that makes me think they&apos;re going to be looking at weapons-making capability,&apos;&apos; Pascual says. As the Boston Marathon bombings illustrate, a tactic today&apos;s terrorists use to stay under the radar is using common purchases (pressure cooker, nails, ball bearings) to create weapons. A red flag may be raised with the NSA if agents detect several of these everyday items being purchased at the same time and/or in unusually large quantities.&apos;&apos; TIME June 13 2013" />
                      <outline text="Oh. The Obama administration&apos;s NSA has REAL TIME access to this point of sale data?  The same Obama administration which is so closely tied to Wal-Mart and the Clinton Royal Family? The same Obama administration that is already looking to bring charges against Target forging the final nail for their coffin?" />
                      <outline text="Ask yourself who benefits from all of this. Will this mark the end of Target and a major economic gain for Wal-Mart? Do the Clinton&apos;s still own stock in Wal-Mart like they used to?" />
                      <outline text="In the interests of full disclosure, I don&apos;t own any stock in Target but I do shop there occasionally, preferring it over Wal-Mart or K-Mart in every conceivable way." />
                      <outline text="If the Obama &apos;&apos;Justice&apos;&apos; department and the SEC go after Target with criminal charges, you can expect the activist federal judges to issue ruling after ruling against Target until they are forced to file Chapter 11 putting tens of thousands of our neighbors out of work and leaving us one less choice when it comes to discount retail shopping." />
                      <outline text="I don&apos;t care what anyone says, this is an obvious example of a fascist state serving the interests of their crony businesses at the expense of the people of this country. It is the exact opposite of what it claims to be, a &apos;&apos;free market&apos;&apos; system." />
                      <outline text="Some dufus &apos;&apos;hacker&apos;&apos; will be rounded up and used as the patsy for this crisis. We have that to look forward to. Someone will claim we need tighter controls on the internet in order to protect America from events like these. You can expect this to be used in any number of ways." />
                      <outline text="But in the end, this is consolidation&apos;... there can be only one. And that is the one with the most access to corrupt actors imbedded in the system at the highest levels." />
                      <outline text="I hope the people of this country can see through this before it&apos;s too late but chances are they won&apos;t. They&apos;ll just regurgitate whatever Fox or CNN spoon feeds them 24/7 while Wal-Mart and the Obama administration laugh all the way to the bank." />
                      <outline text="Like this:LikeLoading..." />
                      <outline text="Filed under: Uncategorized" />
              </outline>

              <outline text="The British soil that built part of the FDR Drive | Ephemeral New York">
                      <outline text="Link to Article" type="link" url="http://ephemeralnewyork.wordpress.com/2011/10/31/the-british-soil-that-built-part-of-the-fdr-drive/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387896947_gZyKcSdw.html" />
      <outline text="Tue, 24 Dec 2013 14:55" />
                      <outline text="" />
                      <outline text="Next time you&apos;re stuck in traffic between 23rd Street and 34th Street on the FDR Drive, take a moment to consider where the land beneath you came from." />
                      <outline text="It wasn&apos;t fill from digging the subways or skyscrapers&apos;--it was actually transported here all the way from England in the 1940s." />
                      <outline text="&apos;&apos;During World War II, the Luftwaffe savagely bombed the city of Bristol, England, a major port for American supply ships,&apos;&apos; wrote Michael Pollack in his FYI column in The New York Times in June 2009." />
                      <outline text="&apos;&apos;After the supplies were unloaded, the American ships had no British goods to replace them on the return trip, and needed ballast for stability. So they loaded up rubble from Bristol&apos;s bombed-out buildings.&apos;&apos;" />
                      <outline text="&apos;&apos;Back in New York, the ships dumped the ballast from 23rd to 34th Street as landfill for what would become the East River Drive, now Franklin D. Roosevelt Drive.&apos;&apos;" />
                      <outline text="Though you won&apos;t find it on any city road maps, the slight curve of the East River between these blocks is known as Bristol Basin (above)." />
                      <outline text="Like this:LikeLoading..." />
                      <outline text="Tags: Bristol Basin, building the FDR Drive, East River Drive, East River history, FDR Drive, Little England NYC, New York City maps, New York during World War II" />
                      <outline text="This entry was posted on October 31, 2011 at 4:43 am and is filed under Beekman/Turtle Bay, Disasters and crimes, Gramercy/Murray Hill, Maps, Transit. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site." />
              </outline>

              <outline text="Reuters Investigates - UNACCOUNTABLE: The Pentagon&apos;s bad bookkeeping">
                      <outline text="Link to Article" type="link" url="http://www.reuters.com/investigates/pentagon/#article/part3" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387896868_HfncWMQu.html" />
      <outline text="Tue, 24 Dec 2013 14:54" />
                      <outline text="" />
                      <outline text="SUCCESS, SORT OF: Workers confer in temporary offices set up in Alexandria, Virginia, for the rollout last year of the Army&apos;s General Fund Enterprise Business System, which, though touted as a success, can&apos;t perform many of the functions is was meant to handle. REUTERS/Jonathan ErnstPart 3: Time and again, programs to modernize Defense Department record-keeping have fallen prey to bureaucratic rivalry, resistance to change and a lack of consequences for failure." />
                      <outline text="ALEXANDRIA, Virginia - The U.S. Air Force had great expectations for the Expeditionary Combat Support System when it launched the project in 2005. This accountants&apos; silver bullet, the Air Force predicted a year later, &apos;&apos;will fundamentally revolutionize the way the Air Force provides logistics support.&apos;&apos;" />
                      <outline text="The new computer-based logistics technology would replace 420 obsolete, inefficient and largely incompatible &apos;&apos;legacy&apos;&apos; systems with a single, unified means of tracking the hardware of warfare. And it would be done for a mere $1.5 billion, combining three off-the-shelf products from Oracle Corp and modifying them only enough so that they could work together." />
                      <outline text="Seven years and $1.03 billion taxpayer dollars later, the Air Force announced in November 2012 that it was killing the project. ECSS had yielded &apos;&apos;negligible&apos;&apos; value and was &apos;&apos;no longer a viable option,&apos;&apos; the Air Force said. It would have taken an estimated $1.1 billion more to turn it into a system that could perform about one-quarter of its originally planned tasks, and couldn&apos;t be fielded until 2020." />
                      <outline text="An August 28, 2013, report on the project, commissioned by an undersecretary of defense, filled in more of the blanks. The original promise of ECSS &apos;&apos;was an exaggeration not founded on any true analysis,&apos;&apos; it said. The plan was &apos;&apos;ambiguous&apos;&apos;; the Air Force failed to determine what ECSS would replace and what it would need to succeed." />
                      <outline text="That seven-year exercise in waste was not an anomaly. It was the norm for the U.S. Defense Department&apos;s effort in recent years to upgrade the way it keeps track of money, supplies and people. Burdened with thousands of old, error-filled record-keeping systems - estimates range from 2,100 to more than 5,000 of them - the Pentagon is unable to account for itself, and thus for roughly half of all congressionally approved annual federal spending." />
                      <outline text="To fix that, the Defense Department has launched 20 or more projects to build modern business-management systems since the late 1990s. At least five were subsequently killed as complete failures after billions of dollars were spent on them. Nine projects now under way or already implemented carry an estimated total cost of $13.9 billion to build and operate, according to the Defense Department comptroller&apos;s office. All of those in use can&apos;t do everything they were supposed to do and are hooked to legacy systems they were supposed to replace." />
                      <outline text="The Defense Department inspector general said in a 2012 report that just six of these so-called Enterprise Resource Planning projects under way had racked up cost overruns of $8 billion and delays ranging from 1.5 to 12.5 years. With each failure, a pattern emerges: An off-the-shelf product with a proven track record in the private sector is chosen and then modified to the point where it doesn&apos;t work properly." />
                      <outline text="&apos;&apos;On every single one of the ERPs, they go out and customize the shit out of it to make it do what the legacy system did the same way the legacy system did it,&apos;&apos; said Mike Young, a former Air Force logistics official and now a consultant on defense logistics and accounting." />
                      <outline text="KEEPING TRACK: The Defense Logistics Agency, which manages supplies for the military at giant warehouses like this one outside Harrisburg, Pennsylvania, has built a $2 billion-plus accounting system that can&apos;t produce standard financial statements, according to the Pentagon&apos;s inspector general. REUTERS/Tim Shaffer" />
                      <outline text="Reuters has found that success is likely to remain elusive unless the Pentagon can change the way it goes about fixing its accounting problems. Interviews with scores of current and former defense officials, contractors and Pentagon watchers, as well as a review of dozens of reports by oversight agencies, show that the Pentagon is continually thwarted by a lack of accountability for failures, rivalry among and within various branches of the department, resistance to change, and an incentive to spend." />
                      <outline text="With its efforts to build reliable accounting systems in disarray, the Pentagon isn&apos;t likely to meet a congressionally mandated 2017 deadline to be audit-ready. All other federal agencies are audited annually, in accordance with a 1990 law, and with rare exceptions, they pass every year. The Pentagon alone has never been audited, leaving roughly $8.5 trillion in taxpayer dollars unaccounted for since 1996, the first year it was supposed to be audited." />
                      <outline text="In previous installments of this series, Reuters has exposed the staggering costs and harmful effects of the Defense Department&apos;s chronic accounting dysfunction. Persistent pay errors hound soldiers, sapping troop morale, while an impenetrable tangle of logistics and personnel systems can hinder commanders&apos; ability to know who and what are available for deployment. And the lack of reliable accounts - Pentagon staff routinely insert billions of dollars a year of false accounting entries to cover missing information - conceals huge sums lost to waste, fraud and mismanagement." />
                      <outline text="In response to questions about the Pentagon&apos;s modernization efforts and the findings of this Reuters investigation, the office of Undersecretary of Defense Robert Hale, the Pentagon&apos;s comptroller, emailed a written statement that said: &apos;&apos;I note with disappointment that these articles misrepresent the efforts of a group of hard-working government workers who, despite furloughs and sequester and turmoil, have successfully provided financial services during two wars.&apos;&apos;" />
                      <outline text="&apos;&apos;WISHFUL THINKING&apos;&apos;" />
                      <outline text="The Pentagon has for years kept lousy books with impunity." />
                      <outline text="The 2009 law requiring the Defense Department to be audit-ready by 2017 provides for no penalties if it misses the deadline. Senators Tom Coburn, an Oklahoma Republican, and Joe Manchin, a West Virginia Democrat, introduced legislation earlier this year that would, among other things, limit new weapons programs, if the Pentagon misses the target. The bill has attracted co-sponsors, but otherwise has gone nowhere in the Senate." />
                      <outline text="From 1995 through 2002, Senator Charles Grassley pushed through an amendment to the annual defense appropriations bill requiring the Pentagon to account for its expenditures by following one seemingly simple procedure: match each payment to the expense it covered. The order was ignored, and Grassley gave up. &apos;&apos;The goal was for the practice to become self-sustaining,&apos;&apos; Grassley said in an email to Reuters. &apos;&apos;It was wishful thinking.&apos;&apos;" />
                      <outline text="Rivalry and turf issues among and within each of the military services also thwart comprehensive fixes to the bookkeeping mess. Each branch has insisted on building from scratch its own systems for basic accounting, logistics and personnel, roughly tripling costs. The Army, Navy and Air Force also routinely disregard department-wide standards and rules imposed by the secretary of defense&apos;s office in order to preserve their own ways of doing things." />
                      <outline text="That&apos;s what happened to the Defense Integrated Human Resource System, which was intended to replace the scores of payroll and personnel systems that cause so many pay errors. Competing demands from military services ultimately rendered the system useless, and it was killed in 2010 after sucking up $1 billion." />
                      <outline text="ON THE LINE: Army personnel provide telephone support for new users of the Army&apos;s General Fund Enterprise Business System. Army staff called their training sessions for the new system &apos;&apos;the valley of despair.&apos;&apos; REUTERS/Jonathan Ernst" />
                      <outline text="High turnover takes a toll, too, as Pentagon personnel are shuffled into new jobs every few years, reinforcing what people involved in many projects said is a lack of personal investment in successful outcomes." />
                      <outline text="In 2009 - when the Air Force was four years into it ill-fated ECSS project - Jamie Morin became Air Force comptroller, succeeding John H. Gibson II, who now is vice president of the defense-support division of aircraft maker Beechcraft Corp. As the service&apos;s top financial official, Morin would have been a primary user of ECSS. Less than a year after the project&apos;s collapse, the Obama administration nominated Morin to head the Pentagon&apos;s Office of Cost Assessment and Program Evaluation." />
                      <outline text="At Morin&apos;s October 2013 confirmation hearing before the Senate Armed Services Committee, none of the members asked him about ECSS or another troubled Air Force modernization project under his watch, the Defense Enterprise Accounting and Management System. In a written response to questions from Reuters, Morin said: &apos;&apos;In testimony and reports, we have indicated that the Air Force is on a well-designed, albeit aggressive path toward meeting &apos;... audit readiness goals.&apos;&apos;" />
                      <outline text="The Air Force replaced a brigadier general and a civilian executive after the ECSS project was killed, an Air Force spokeswoman said, without providing further details. But at the time, it blamed the failure mainly on primary contractor Computer Sciences Corp, saying the Falls Church, Virginia, company lacked the necessary capabilities." />
                      <outline text="David Scott Norton, an accounting systems specialist who worked for Computer Sciences Corp on the project, disputed that, saying the problem was high turnover. Contractor personnel &apos;&apos;who talked to the client [the Air Force] in the beginning didn&apos;t implement the system,&apos;&apos; he said. Air Force personnel, too, were &apos;&apos;always moving in and out. That just doesn&apos;t work. You needed a dedicated team.&apos;&apos;" />
                      <outline text="THREE-PRONGED ATTACK" />
                      <outline text="The Pentagon&apos;s inefficient method of pursuing efficiency has been on full display in the Army, which, among other efforts, has been building three separate new systems to handle accounting." />
                      <outline text="It launched the Logistics Modernization Program, or LMP, in 1998 with Computer Sciences Corp as the primary contractor. The Global Combat Support System - Army, or GCSS-A, began in 1997 and used Northrop Grumman as contractor. And the General Fund Enterprise Business System, meant to be the Army&apos;s new central accounting system, began in 2005, using Accenture as contractor." />
                      <outline text="The three projects, each overseen by different agencies within the Army, with three different primary contractors, at different times bought licenses to use the same off-the-shelf software package, SAP&apos;s Enterprise Resource Planning package. Each team then modified the software to create its own version to fit specific needs without making sure they worked together, people involved in the projects said." />
                      <outline text="In 2008, as work on all three projects was under way, the Army office that oversees acquisition of information systems issued a report, obtained by Reuters, faulting the Army for building a &apos;&apos;fragmented portfolio of ERP systems that have developed along independent paths. ... The Army cannot trace its business processes from factory to foxhole&apos;&apos; without incurring additional &apos;&apos;huge integration and operational costs.&apos;&apos;" />
                      <outline text="The report recommended that the Army halt work and consolidate the three systems. Doing so, it said, would save between 25% and 50% of the estimated $4.7 billion construction and operating costs of the three separate systems." />
                      <outline text="Backers of each project objected, according to people involved, and the report&apos;s recommendations were ignored." />
                      <outline text="TOP GUNS: Defense Department Comptroller Robert Hale (right), here testifying with then-Defense Secretary Robert Gates before the House Appropriations Defense Subcommittee in 2011, is the Pentagon&apos;s chief financial officer, responsible for efforts to modernize the department&apos;s dysfunctional accounting systems. REUTERS/Kevin Lamarque" />
                      <outline text="Kristyn Jones, deputy assistant secretary of the Army for financial information management, said that if the Army were to start over, &apos;&apos;we probably would have chosen a different path.&apos;&apos; She said one of the biggest challenges was getting workers to adapt to it. She and others involved in building GFEBS said many of the thousands of Army workers who would use the new system referred to their required training sessions as entering &apos;&apos;the valley of despair.&apos;&apos;" />
                      <outline text="Gary Winkler, the Army program executive who oversaw acquisition of computer systems for the Army from 2007 through 2011, said developing the three projects separately, without coordination, hurt all of them. They &apos;&apos;all go through these stovepipe approval processes without considering what is going on to the left or the right or behind,&apos;&apos; he said." />
                      <outline text="As a result, the systems had to be linked through a costly network of pipelines - 282 such pipelines among the new and legacy systems, according to the Government Accountability Office, the investigative arm of Congress. &apos;&apos;If you draw all of the connections, it looks like a bowl of spaghetti,&apos;&apos; Winkler said. The systems must be continually tweaked because when one element requires a software update, for example, all the pipelines and other linked systems have to be updated, too." />
                      <outline text="When the Logistics Modernization Program, intended to streamline supply lines and better manage inventory, was eventually fielded in 2010, it was deficient in so many ways that the Army had to add an &apos;&apos;Increment 2,&apos;&apos; which won&apos;t be ready until September 2016. This has increased the projected cost of building and operating the LMP to $4 billion from $2.6 billion, according to Army figures." />
                      <outline text="&apos;&apos;The current system does not support certain critical requirements, including enabling the Army to generate auditable financial statements by fiscal year 2017,&apos;&apos; the GAO said in a November 2013 report." />
                      <outline text="The second Army project, GCSS-A, had an original completion date of late 2015; late 2017 is now the target, for an estimated total building and operating cost of $4.2 billion, compared with the originally projected $3.9 billion." />
                      <outline text="Lastly, GFEBS, after an investment of more than $760 million, was fully fielded around the world in 2012, one year behind schedule. The Army touts it as a success, saying on its website: &apos;&apos;The system is transforming the way the Army does business by enhancing the information available for leaders and managers across the Army.&apos;&apos;" />
                      <outline text="But this success is limited. GFEBS can&apos;t track basic transactions - for example, payment of an electricity bill for an Army installation. To do that, it relies on legacy systems it was meant to replace. And because some legacy systems are unable to communicate with GFEBS, operators of those systems have had to revert to manually preparing spreadsheets to pass on data from thousands of Army posts." />
                      <outline text="NOT EXACTLY SEXY" />
                      <outline text="Bookkeeping has never been a priority for the military. &apos;&apos;They don&apos;t train contracting officers or disbursement officials at West Point,&apos;&apos; said a former senior Pentagon official who was involved in modernization efforts." />
                      <outline text="For years, winning the Cold War was the primary directive, with little consideration for cost. More recently, wars in Iraq and Afghanistan overshadowed concerns about rising defense spending, bad bookkeeping and attendant waste." />
                      <outline text="John Hamre became Defense Department comptroller in 1993, three years after Congress passed the law requiring that the Pentagon be audit-ready by 1996. He didn&apos;t think upgrading accounting systems was vital to the Pentagon&apos;s ability to fulfill its mission. &apos;&apos;Would I like a better accounting system? Absolutely,&apos;&apos; said Hamre, who left his post in 1997 and now is chairman of the Pentagon&apos;s Defense Policy Board and chief executive of the Center for Strategic and International Studies, a bipartisan, nonprofit think tank in Washington, D.C. But, he said, &apos;&apos;we&apos;re getting military missions done every day. We just don&apos;t use accounting for that.&apos;&apos;" />
                      <outline text="Many of the people interviewed for this series involved at all levels of the Pentagon&apos;s accounting modernization program said that until recently, lack of interest or attention from the very top - from secretaries of defense and the civilian secretaries of the individual military services - has meant that no one steps in to impose order and consistency." />
                      <outline text="&apos;&apos;You cannot just throw money at an ERP system and expect it to work unless somebody at the top says &apos;You&apos;re going to work together, and you&apos;re going to get it done,&apos; &apos;&apos; said Norton, the former Computer Sciences Corp employee." />
                      <outline text="WORDS AND ACTIONS: U.S. Secretary of Defense Chuck Hagel has publicly stressed the importance of making the Pentagon audit-ready, even though the Pentagon isn&apos;t likely to meet its 2017 deadline. REUTERS/Yuri Gripas" />
                      <outline text="President Barack Obama&apos;s three defense secretaries to date - Robert Gates, Leon Panetta and, now, Chuck Hagel - have spoken out strongly both publicly and inside the Defense Department about the importance of meeting audit-readiness deadlines. Panetta in 2011 set an even tighter deadline, ordering that a major portion of the department&apos;s books be audit-ready by 2014. Officials have since acknowledged that the deadline won&apos;t be met, and that the department plans to conduct an audit more limited in scope than what Panetta ordered." />
                      <outline text="The secretary of defense is empowered by law to order the military services to clean up their bookkeeping, adhere to Defense Department accounting rules and hew to common standards for building new accounting systems. But he doesn&apos;t control the purse-strings - Congress does - so he &apos;&apos;can&apos;t say to the military services, &apos;You can&apos;t have the money&apos; &apos;&apos; if you don&apos;t make this work, said Richard Loeb, a former Office of Management and Budget official and now an adjunct professor of government contracting and fiscal law at the University of Baltimore law school." />
                      <outline text="Congress has enabled the Pentagon&apos;s institutional bias against change. &apos;&apos;I think we do, all of us, bear some share of responsibility - myself included,&apos;&apos; said Representative Robert E. Andrews, a Democrat from New Jersey on the House Armed Services Committee. &apos;&apos;If I were to go home and start explaining that I was proposing a bill related to getting the Defense Department accounting systems to work right and the importance of accounting, they&apos;d be asleep about half way through the first sentence.&apos;&apos;" />
                      <outline text="NUTS AND BOLTS" />
                      <outline text="The Defense Logistics Agency, which buys, stores and distributes supplies for the U.S. military, has built a $2 billion-plus accounting system to make itself audit-ready." />
                      <outline text="It&apos;s a failure." />
                      <outline text="In a March 2013 report, the Defense Department inspector general said the so-called Enterprise Business System was so compromised by fundamental errors in its construction that its data couldn&apos;t be used to produce the standard financial statements required for an audit. Fixing the system to meet the Pentagon&apos;s basic accounting requirements &apos;&apos;would be cost prohibitive,&apos;&apos; the report said. The DLA is using it anyway." />
                      <outline text="Fixing logistics is important - both to save money and to ensure that supplies are on hand when needed. The private sector realized that a long time ago. In recent decades, companies like Wal-Mart Stores Inc and Best Buy Co have raised supply-chain management to a precision science that saves huge sums." />
                      <outline text="By contrast, the Pentagon&apos;s fragmented logistics systems &apos;&apos;have contributed to longer lead times, excess inventory and stockpiling, duplicative activities and systems, inadequate performance measurements, and increased costs,&apos;&apos; according to a 2011 report by the Defense Business Board, a group of business leaders that advises the secretary of defense&apos;s office." />
                      <outline text="The board found that the department uses more than 1,000 separate logistics systems, and that in 2010, logistics cost $210 billion, or about 30% of that year&apos;s defense budget." />
                      <outline text="Department-wide, duties are shared between the DLA, handling ordering and storage of supplies, and the U.S. Transportation Command, or Transcom, which handles delivery. Each has its own administration and computer systems, and each of the military services operates its own depot maintenance, supply, delivery and logistics accounting systems." />
                      <outline text="The Defense Business Board recommended combining all of the various logistics systems to &apos;&apos;achieve significant budget savings, allowing the Department to preserve funds for force structure and the modernization of military capabilities.&apos;&apos;" />
                      <outline text="No action was taken on the board&apos;s recommendations. &apos;&apos;I have nothing for you on this,&apos;&apos; William Urban, a spokesman for the secretary of defense&apos;s office, said in an email response to questions about why the recommendations were not adopted." />
                      <outline text="BENEFICIAL IGNORANCE" />
                      <outline text="Defense Secretary Hagel and other top Defense Department officials have argued that the impact of the budget sequester - automatic across-the-board spending cuts written into the 2011 congressional budget agreement - would be disastrous for the nation&apos;s defense capabilities if allowed to continue. Congress heard: The latest budget deal would restore a big chunk of the cuts that would have occurred in 2014 and 2015." />
                      <outline text="But lack of reliable numbers on how the Pentagon spends the money it receives undercuts arguments for protecting higher spending levels. &apos;&apos;You have the (military) service chiefs pissing and moaning on the Hill because they have to take the sequester,&apos;&apos; said Franklin Spinney, a former senior analyst in the Pentagon who has written extensively on Pentagon weapons acquisition and spending priorities. But &apos;&apos;they don&apos;t have a clue what that&apos;s going to cost.&apos;&apos;" />
                      <outline text="BLACK BOX: Former Pentagon analyst Franklin Spinney says the Defense Department&apos;s inability to determine how it spends its money undercuts its arguments against budget cuts. REUTERS/Gary Cameron" />
                      <outline text="There is no doubt that bad bookkeeping conceals movements of money that in some instances are illegal. The Antideficiency Act of 1884 forbids anyone to commit U.S. funds to purposes not explicitly approved by Congress - a way to prevent federal officials from writing government checks for anything they want. The law includes civil penalties - officials responsible for violations can be demoted or dismissed - and also provides for criminal prosecution." />
                      <outline text="But because the Pentagon has never been audited, it is impossible to determine the frequency or extent of violations. In its annual Antideficiency Act Report for 2012, the GAO reported that the U.S. Special Operations Command illegally diverted more than $136 million over six years to pay for a helicopter development project. The Special Operations Command concluded that there had been &apos;&apos;no willful or knowing intent on the part of the responsible parties&apos;&apos; to break the law, though it issued a &apos;&apos;letter of admonishment&apos;&apos; to a senior civilian employee." />
                      <outline text="THE RIGHT WAY" />
                      <outline text="The Pentagon isn&apos;t incapable of fixing its broken business operations. For decades, the Mechanization of Contract Administration Services, or MOCAS (pronounced &apos;&apos;moh-KAZZ&apos;&apos;), which handles payment of nearly all of the Defense Department&apos;s most complicated contracts, caused some of the department&apos;s biggest headaches." />
                      <outline text="It made erroneous payments and spewed out inaccurate data. Much of this was because contract data, long strings of alphanumeric code, had to be entered by hand. Typos were rife. As much as 30 percent of the transactions it processed had to be redone, often by hand. The Defense Finance and Accounting Service, which operates MOCAS, said the system currently handles $3.4 trillion in active contracts." />
                      <outline text="In 1994, the Pentagon launched the Standard Procurement System to rationalize procurement by replacing MOCAS and at least 10 other contract payment systems. By 2002, the new system was years behind schedule, and the estimated cost of building and operating it had risen to $3.7 billion from $3 billion. When tested, it crashed. The Pentagon killed it." />
                      <outline text="Faced with having to rely on MOCAS indefinitely, the Defense Finance and Accounting Service decided to tweak it. Funding for an upgrade was limited, so DFAS relied heavily on its own workers, who knew MOCAS inside and out. It also hired as consultants retirees who had spent much of their careers working with the system." />
                      <outline text="MOCAS runs on COBOL, one of the earliest computer languages, and it lacks many of the options and preferences that make modern applications like Microsoft Word so easy to use. The MOCAS update team built an add-on to make MOCAS more user-friendly. It acquired another add-on that allowed electronic invoices and other data from contractors to flow directly into MOCAS. By eliminating paper invoices, they reduced the error rate to a tiny percentage." />
                      <outline text="The fixes worked so well that in 2008, the Defense Contract Management Agency, one of MOCAS&apos;s main users, posted a &apos;&apos;Happy 50th Birthday&apos;&apos; wish to it on the agency&apos;s website." />
                      <outline text="According to users, the 55-year-old system now handles tasks with lightning speed and an extremely low error rate." />
                      <outline text="But that success is hollow. The Pentagon remains saddled with other contract-payment systems. And MOCAS is not an accounting system; it must transmit data back to scores of accounting systems across the department for each transaction to be entered in ledgers. Many of the accounting systems are old and require manual data entry, so entry of transactions may lag behind MOCAS by a month." />
                      <outline text="Piecemeal fixes that don&apos;t address overarching dysfunction reduce even further the chances the Pentagon will be audit-ready by 2017. Worse, said Charlie Murphy, a longtime member of Senator Grassley&apos;s staff, the Defense Department will have added billions of dollars in new technology that failed to deliver. &apos;&apos;Supposedly,&apos;&apos; Murphy said, &apos;&apos;there&apos;s a maestro that&apos;s going to make them all play like a symphony.&apos;&apos;" />
                      <outline text="(Edited by John Blanton)" />
              </outline>

              <outline text="O2 pulls blocked URL checker as wave of new customers activate their phones">
                      <outline text="Link to Article" type="link" url="https://www.openrightsgroup.org/blog/2013/o2-pulls-blocked-url-checker-as-wave-of-new-customers-activate-their-phones" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387895598_8RSGSkmR.html" />
        <outline text="Source: Open Rights Group" type="link" url="http://www.openrightsgroup.org/feed/" />
      <outline text="Tue, 24 Dec 2013 14:33" />
                      <outline text="" />
                      <outline text="December 24, 2013 | Jim Killock" />
                      <outline text="Following complaints, media attention and misunderstandings surrounding O2&apos;s URL checker and categories, O2 have switched it off, with no timescale for reinstatement." />
                      <outline text="While O2 are the only company providing any transparency with their checker, this is a bad move. People need to see how the filters work, and the checker helps them do this. Christmas is a time when huge numbers of people set new phones up." />
                      <outline text="Of course people will suspect that the checker has been &apos;&apos;closed for maintenance&apos;&apos; because it is producing complaints. People are concerned that websites from Childline, the NSPCC, the Police and many others are deemed unsuitable for under 12s. (Childline should now be available following complaints.)" />
                      <outline text="Pink News reports that: &apos;&apos;O2 has labeled Stonewall, BBC News, the Conservative Party and the Number 10 Downing Street website as unsuitable or uninteresting to under 12s.&apos;&apos; O2 provided them with a list of types of sites likely to be allowed, but still refuse to provide a list of actual sites allowed. " />
                      <outline text="What this emphasises is that transparency needs to be of right, and not something that can be withdrawn for commercial or public relations purposes. Websites need to identify that they are blocked, or not. Complaints should not only be dealt with because of Twitter campaigns." />
                      <outline text="If you want to help, we have a project to make filtering and blocking transparent. This isn&apos;t to &quot;improve&quot; inherently flawed filters, but simply to make it clear what is happening. Transparency should help people limit their reliance on filters. It helps us document the harm and argue that filters are not a &apos;good&apos; in themselves but have significant downsides." />
                      <outline text="Our first aim is to make sure that any website can check their status on any UK network. Can you help? Donations, joins and practical help are much appreciated!" />
              </outline>

              <outline text="Gasunie transporteerde record aan gas in 2013">
                      <outline text="Link to Article" type="link" url="http://www.volkskrant.nl/vk/nl/2680/Economie/article/detail/3567593/2013/12/24/Gasunie-transporteerde-record-aan-gas-in-2013.dhtml" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387895531_vbsHTf7f.html" />
        <outline text="Source: VK: Home" type="link" url="http://www.volkskrant.nl/rss.xml" />
      <outline text="Tue, 24 Dec 2013 14:32" />
                      <outline text="" />
                      <outline text="Bewerkt door: redactie &apos;&apos; 24/12/13, 14:01  &apos;&apos; bron: ANP" />
                      <outline text="(C) anp. Het jaar is nog niet helemaal voorbij, maar de Nederlandse Gasunie heeft dit jaar al een recordhoeveelheid van 113 miljard kubieke meter gas getransporteerd." />
                      <outline text="Het jaar is nog niet helemaal voorbij, maar de Nederlandse Gasunie heeft dit jaar al een recordhoeveelheid van 113 miljard kubieke meter gas getransporteerd. Dat is 2 miljard meer dan het oude record van 2010, meldde de netbeheerder vandaag." />
                      <outline text="De recordhoeveelheid is vooral toe te schrijven aan de lange winterse periode in de eerste maanden van 2013. Deze heeft in Nederland en omringende landen tot een grote vraag naar aardgas geleid." />
                      <outline text="Geholpen door een gemiddelde temperatuur van 0,6 graden onder nul in maart, pompte de Gasunie in het eerste kwartaal meer gas door de leidingen dan ooit te voren. De teller eindigde op 36,1 miljard kuub gas, zo&apos;n 0,3 miljard kuub meer dan het vorige kwartaalrecord uit 1996, liet Gasunie eerder dit jaar al weten. Normaal wordt in deze periode slechts zo&apos;n 30 miljard kuub gas vervoerd." />
                      <outline text="Het netwerk van de Gasunie fungeert de laatste jaren ook steeds meer als internationaal knooppunt in de doorvoer van gas. Inmiddels is bijna 60 procent van het getransporteerde gas bestemd voor het buitenland. Tien jaar terug was dat nog geen 50 procent. Ook het aandeel van gas dat afkomstig is van over de grens neemt toe, vanuit bijvoorbeeld Rusland en Noorwegen. In vloeibare vorm (LNG) importeert Nederland via de Gate-terminal op de Maasvlakte bij Rotterdam tegenwoordig ook gas uit andere delen van de wereld." />
                      <outline text="Nederland zelf heeft eveneens een omvangrijke gaswinning. De Nederlandse Aardolie Maatschappij (NAM) schatte vorige maand dat dit jaar zelfs een recordhoeveelheid gas uit het Groningen-veld wordt gehaald. Alleen in de jaren 70 werd er meer gas gewonnen. De verwachting is dat er over heel 2013 meer dan 50 miljard kuub gas wordt gewonnen. Vorig jaar ging het om 48 miljard kuub." />
              </outline>

              <outline text="Ukraine Blacklists Georgia&apos;s Ex-President Saakashvili &apos;&apos; MP">
                      <outline text="Link to Article" type="link" url="http://en.ria.ru/world/20131224/185896229/Ukraine-Blacklists-Georgias-Ex-President-Saakashvili--MP.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387895128_qzNzD3UZ.html" />
        <outline text="Source: RIA Novosti" type="link" url="http://en.rian.ru/export/rss2/index.xml" />
      <outline text="Tue, 24 Dec 2013 14:25" />
                      <outline text="" />
                      <outline text="MOSCOW, December 24 (RIA Novosti) &apos;&apos; Georgia&apos;s former president Mikheil Saakashvili has been declared persona non grata in Ukraine, a member of the Ukrainian parliament told Kommersant Ukraine newspaper Tuesday." />
                      <outline text="Oleh Tsaryov, a lawmaker with the ruling Party of Regions, said that he had asked the Foreign Ministry and the Security Service of Ukraine (SBU) to impose a travel ban on 36 people, including citizens of Georgia, Russia and the United States, on December 8. Saakashvili, who stood down as President of Georgia in October, was included on the list." />
                      <outline text="&apos;&apos;I have not yet received an official response from the SBU, but, according to my information, all of them have been declared persona non grata,&apos;&apos; Tsaryov said." />
                      <outline text="The SBU has made no official comment so far on Tsaryov&apos;s request, copies of which have appeared on social networking sites. It alleges that the civil unrest in Ukraine was &apos;&apos;orchestrated&apos;&apos; and that foreign spin doctors and politicians have flocked to the country with the aim of escalating tensions." />
                      <outline text="The Ukrainian Foreign Ministry said later on Tuesday that it was not authorized to impose travel restrictions and only SBU, Interior Ministry, border guards and migration officials are entitled to bar foreigners from crossing the state border." />
                      <outline text="&apos;&apos;We will consider the request when we see it, but the Foreign Ministry is not entitled to impose these measures,&apos;&apos; Foreign Minister Leonid Kozhara told reporters." />
                      <outline text="Saakashvili became Georgia&apos;s president after leading the peaceful 2003 Rose Revolution against allegedly rigged parliamentary elections. He visited Ukraine in early December to address a huge crowd of protestors in Kiev&apos;s Independence Square who were demanding the resignation of President Viktor Yanukovych and the government for their refusal to sign an association agreement with the European Union," />
                      <outline text="&apos;&apos;Saakashvili doesn&apos;t belong here, he should go to Georgia and meet with Georgian people there,&apos;&apos; Tsaryov told Kommersant Ukraine. &apos;&apos;He arrived together with his team that organized the Rose Revolution. All of them settled in Ukraine and streamlined the attempted revolution here.&apos;&apos;" />
                      <outline text="The deputy head of Georgia&apos;s embassy in Ukraine, Giorgi Zakarashvili, said three Georgians named on Tsaryov&apos;s list have already been denied entry to Ukraine. He said that Georgia would take &apos;&apos;constructive&apos;&apos; measures to resolve the issue." />
              </outline>

              <outline text="Russia, Kazakhstan Sign Deal on Oil Transit to China">
                      <outline text="Link to Article" type="link" url="http://en.ria.ru/russia/20131224/185893080/Russia-Kazakhstan-Sign-Deal-on-Oil-Transit-to-China.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387895100_VghSfPZT.html" />
        <outline text="Source: RIA Novosti" type="link" url="http://en.rian.ru/export/rss2/index.xml" />
      <outline text="Tue, 24 Dec 2013 14:25" />
                      <outline text="" />
                      <outline text="MOSCOW, December 24 (RIA Novosti) &apos;&apos; Russia and Kazakhstan signed an intergovernmental agreement on Tuesday to guaranteeing transit of Russian oil to China." />
                      <outline text="The agreement was signed in the wake of talks between Russian President Vladimir Putin and his Kazakh counterpart Nursultan Nazarbayev." />
                      <outline text="Igor Sechin, the CEO of Russia&apos;s state-run oil company Rosneft, said last week that the company plans to deliver 7 million metric tons of oil to China via Kazakhstan annually starting from 2014." />
                      <outline text="The deal would bring an additional $2.3-2.5 billion to the Russian budget annually." />
                      <outline text="A provisional agreement and oil transit guarantees with Kazakhstan were signed in November." />
              </outline>

              <outline text="Eligibility of the Gulf Cooperation Council To Receive Defense Articles and Defense Services Under the Foreign Assistance Act of 1961 and the Arms Export Control Act">
                      <outline text="Link to Article" type="link" url="https://www.federalregister.gov/articles/2013/12/24/2013-30984/eligibility-of-the-gulf-cooperation-council-to-receive-defense-articles-and-defense-services-under" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387894998_N7ysbXc9.html" />
        <outline text="Source: Federal Register: Executive Office of the President" type="link" url="https://www.federalregister.gov/agencies/executive-office-of-the-president.rss" />
      <outline text="Tue, 24 Dec 2013 12:59" />
                      <outline text="" />
                      <outline text=" " />
                      <outline text="Pursuant to the authority vested in me as President by the Constitution and the laws of the United States, including section 503(a) of the Foreign Assistance Act of 1961 and section 3(a)(1) of the Arms Export Control Act, I hereby find that the furnishing of defense articles and defense services to the Gulf Cooperation Council will strengthen the security of the United States and promote world peace." />
                      <outline text="You are authorized and directed to transmit this determination, and attached memorandum of justification, to the Congress and to arrange for the publication of this determination in the Federal Register." />
                      <outline text="THE WHITE HOUSE,Washington, December 16, 2013." />
                      <outline text="[FR Doc. 2013-30984Filed 12-23-13; 11:15 am]" />
                      <outline text="Billing code 4710-10" />
              </outline>

              <outline text="Edward Snowden, after months of NSA revelations, says his mission&apos;s accomplished - The Washington Post">
                      <outline text="Link to Article" type="link" url="http://m.washingtonpost.com/world/national-security/edward-snowden-after-months-of-nsa-revelations-says-his-missions-accomplished/2013/12/23/49fc36de-6c1c-11e3-a523-fe73f0ff6b8d_story.html?Post%20generic=?tid=sm_twitter_washingtonpost" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387894807_hgS6pT7b.html" />
      <outline text="Tue, 24 Dec 2013 14:20" />
                      <outline text="" />
                      <outline text="By Barton Gellman, Published: MONDAY, DECEMBER 23, 11:02 PM ETE-mail the writer  Aa MOSCOW &apos;-- The familiar voice on the hotel room phone did not waste words." />
                      <outline text="&apos;&apos;What time does your clock say, exactly?&apos;&apos; he asked." />
                      <outline text="He checked the reply against his watch and described a place to meet." />
                      <outline text="&apos;&apos;I&apos;ll see you there,&apos;&apos; he said." />
                      <outline text="Edward Joseph Snowden emerged at the appointed hour, alone, blending into a light crowd of locals and tourists. He cocked his arm for a handshake, then turned his shoulder to indicate a path. Before long he had guided his visitor to a secure space out of public view." />
                      <outline text="During more than 14 hours of interviews, the first he has conducted in person since arriving here in June, Snowden did not part the curtains or step outside. Russia granted him temporary asylum on Aug. 1, but Snowden remains a target of surpassing interest to the intelligence services whose secrets he spilled on an epic scale." />
                      <outline text="Late this spring, Snowden supplied three journalists, including this one, with caches of top-secret documents from the National Security Agency, where he worked as a contractor. Dozens of revelations followed, and then hundreds, as news organizations around the world picked up the story. Congress pressed for explanations, new evidence revived old lawsuits and the Obama administration was obliged to declassify thousands of pages it had fought for years to conceal." />
                      <outline text="Taken together, the revelations have brought to light a global surveillance system that cast off many of its historical restraints after the attacks of Sept. 11, 2001. Secret legal authorities empowered the NSA to sweep in the telephone, Internet and location records of whole populations. One of the leaked presentation slides described the agency&apos;s &apos;&apos;collection philosophy&apos;&apos; as &apos;&apos;Order one of everything off the menu.&apos;&apos;" />
                      <outline text="Six months after the first revelations appeared in The Washington Post and Britain&apos;s Guardian newspaper, Snowden agreed to reflect at length on the roots and repercussions of his choice. He was relaxed and animated over two days of nearly unbroken conversation, fueled by burgers, pasta, ice cream and Russian pastry." />
                      <outline text="Snowden offered vignettes from his intelligence career and from his recent life as &apos;&apos;an indoor cat&apos;&apos; in Russia. But he consistently steered the conversation back to surveillance, democracy and the meaning of the documents he exposed." />
                      <outline text="&apos;&apos;For me, in terms of personal satisfaction, the mission&apos;s already accomplished,&apos;&apos; he said. &apos;&apos;I already won. As soon as the journalists were able to work, everything that I had been trying to do was validated. Because, remember, I didn&apos;t want to change society. I wanted to give society a chance to determine if it should change itself.&apos;&apos;" />
                      <outline text="&apos;&apos;All I wanted was for the public to be able to have a say in how they are governed,&apos;&apos; he said. &apos;&apos;That is a milestone we left a long time ago. Right now, all we are looking at are stretch goals.&apos;&apos;" />
                      <outline text="&apos;Going in blind&apos;" />
                      <outline text="Snowden is an orderly thinker, with an engineer&apos;s approach to problem-solving. He had come to believe that a dangerous machine of mass surveillance was growing unchecked. Closed-door oversight by Congress and the Foreign Intelligence Surveillance Court was a &apos;&apos;graveyard of judgment,&apos;&apos; he said, manipulated by the agency it was supposed to keep in check. Classification rules erected walls to prevent public debate." />
                      <outline text="Toppling those walls would be a spectacular act of transgression against the norms that prevailed inside them. Someone would have to bypass security, extract the secrets, make undetected contact with journalists and provide them with enough proof to tell the stories." />
                      <outline text="The NSA&apos;s business is &apos;&apos;information dominance,&apos;&apos; the use of other people&apos;s secrets to shape events. At 29, Snowden upended the agency on its own turf." />
                      <outline text="&apos;&apos;You recognize that you&apos;re going in blind, that there&apos;s no model,&apos;&apos; Snowden said, acknowledging that he had no way to know whether the public would share his views." />
                      <outline text="&apos;&apos;But when you weigh that against the alternative, which is not to act,&apos;&apos; he said, &apos;&apos;you realize that some analysis is better than no analysis. Because even if your analysis proves to be wrong, the marketplace of ideas will bear that out. If you look at it from an engineering perspective, an iterative perspective, it&apos;s clear that you have to try something rather than do nothing.&apos;&apos;" />
                      <outline text="By his own terms, Snowden succeeded beyond plausible ambition. The NSA, accustomed to watching without being watched, faces scrutiny it has not endured since the 1970s, or perhaps ever." />
                      <outline text="The cascading effects have made themselves felt in Congress, the courts, popular culture, Silicon Valley and world capitals. The basic structure of the Internet itself is now in question, as Brazil and members of the European Union consider measures to keep their data away from U.S. territory and U.S. technology giants including Google, Microsoft and Yahoo take extraordinary steps to block the collection of data by their government." />
                      <outline text="For months, Obama administration officials attacked Snowden&apos;s motives and said the work of the NSA was distorted by selective leaks and misinterpretations." />
                      <outline text="On Dec. 16, in a lawsuit that could not have gone forward without the disclosures made possible by Snowden, U.S. District Judge Richard J. Leon described the NSA&apos;s capabilities as &apos;&apos;almost Orwellian&apos;&apos; and said its bulk collection of U.S. domestic telephone records was probably unconstitutional." />
                      <outline text="The next day, in the Roosevelt Room, an unusual delegation of executives from old telephone companies and young Internet firms told President Obama that the NSA&apos;s intrusion into their networks was a threat to the U.S. information economy. The following day, an advisory panel appointed by Obama recommended substantial new restrictions on the NSA, including an end to the domestic call-records program." />
                      <outline text="&apos;&apos;This week is a turning point,&apos;&apos; said the Government Accountability Project&apos;s Jesselyn Radack, who is one of Snowden&apos;s legal advisers. &apos;&apos;It has been just a cascade.&apos;&apos;" />
                      <outline text="&apos;They elected me&apos;" />
                      <outline text="On June 22, the Justice Department unsealed a criminal complaint charging Snowden with espionage and felony theft of government property. It was a dry enumeration of statutes, without a trace of the anger pulsing through Snowden&apos;s former precincts." />
                      <outline text="In the intelligence and national security establishments, Snowden is widely viewed as a reckless saboteur, and journalists abetting him little less so." />
                      <outline text="At the Aspen Security Forum in July, a four-star military officer known for his even keel seethed through one meeting alongside a reporter he knew to be in contact with Snowden. Before walking away, he turned and pointed a finger." />
                      <outline text="&apos;&apos;We didn&apos;t have another 9/11,&apos;&apos; he said angrily, because intelligence enabled warfighters to find the enemy first. &apos;&apos;Until you&apos;ve got to pull the trigger, until you&apos;ve had to bury your people, you don&apos;t have a clue.&apos;&apos;" />
                      <outline text="It is commonly said of Snowden that he broke an oath of secrecy, a turn of phrase that captures a sense of betrayal. NSA Director Keith B. Alexander and Director of National Intelligence James R. Clapper Jr., among many others, have used that formula." />
                      <outline text="In his interview with The Post, Snowden noted matter-of-factly that Standard Form 312, the &#173;classified-information nondisclosure agreement, is a civil contract. He signed it, but he pledged his fealty elsewhere." />
                      <outline text="&apos;&apos;The oath of allegiance is not an oath of secrecy,&apos;&apos; he said. &apos;&apos;That is an oath to the Constitution. That is the oath that I kept that Keith Alexander and James Clapper did not.&apos;&apos;" />
                      <outline text="People who accuse him of disloyalty, he said, mistake his purpose." />
                      <outline text="&apos;&apos;I am not trying to bring down the NSA, I am working to improve the NSA,&apos;&apos; he said. &apos;&apos;I am still working for the NSA right now. They are the only ones who don&apos;t realize it.&apos;&apos;" />
                      <outline text="What entitled Snowden, now 30, to take on that responsibility?" />
                      <outline text="&apos;&apos;That whole question &apos;-- who elected you? &apos;-- inverts the model,&apos;&apos; he said. &apos;&apos;They elected me. The overseers.&apos;&apos;" />
                      <outline text="He named the chairmen of the Senate and House intelligence committees." />
                      <outline text="&apos;&apos;Dianne Feinstein elected me when she asked softball questions&apos;&apos; in committee hearings, he said. &apos;&apos;Mike Rogers elected me when he kept these programs hidden. .&apos;&#137;.&apos;&#137;. The FISA court elected me when they decided to legislate from the bench on things that were far beyond the mandate of what that court was ever intended to do. The system failed comprehensively, and each level of oversight, each level of responsibility that should have addressed this, abdicated their responsibility.&apos;&apos;" />
                      <outline text="&apos;&apos;It wasn&apos;t that they put it on me as an individual &apos;-- that I&apos;m uniquely qualified, an angel descending from the heavens &apos;-- as that they put it on someone, somewhere,&apos;&apos; he said. &apos;&apos;You have the capability, and you realize every other [person] sitting around the table has the same capability but they don&apos;t do it. So somebody has to be the first.&apos;&apos;" />
                      <outline text="&apos;Front-page test&apos;" />
                      <outline text="Snowden grants that NSA employees by and large believe in their mission and trust the agency to handle the secrets it takes from ordinary people &apos;-- deliberately, in the case of bulk records collection, and &apos;&apos;incidentally,&apos;&apos; when the content of American phone calls and e-mails are swept into NSA systems along with foreign targets." />
                      <outline text="But Snowden also said acceptance of the agency&apos;s operations was not universal. He began to test that proposition more than a year ago, he said, in periodic conversations with co-workers and superiors that foreshadowed his emerging plan." />
                      <outline text="Beginning in October 2012, he said, he brought his misgivings to two superiors in the NSA&apos;s Technology Directorate and two more in the NSA Threat Operations Center&apos;s regional base in Hawaii. For each of them, and 15 other co-workers, Snowden said he opened a data query tool called BOUNDLESSINFORMANT, which used color-coded &apos;&apos;heat maps&apos;&apos; to depict the volume of data ingested by NSA taps." />
                      <outline text="His colleagues were often &apos;&apos;astonished to learn we are collecting more in the United States on Americans than we are on Russians in Russia,&apos;&apos; he said. Many of them were troubled, he said, and several said they did not want to know any more." />
                      <outline text="&apos;&apos;I asked these people, &apos;What do you think the public would do if this was on the front page?&apos;&apos;&#138;&apos;&apos; he said. He noted that critics have accused him of bypassing internal channels of dissent. &apos;&apos;How is that not reporting it? How is that not raising it?&apos;&apos; he said." />
                      <outline text="By last December, Snowden was contacting reporters, although he had not yet passed along any classified information. He continued to give his colleagues the &apos;&apos;front-page test,&apos;&apos; he said, until April." />
                      <outline text="Asked about those conversations, NSA spokeswoman Vanee Vines sent a prepared statement to The Post: &apos;&apos;After extensive investigation, including interviews with his former NSA supervisors and co-workers, we have not found any evidence to support Mr. Snowden&apos;s contention that he brought these matters to anyone&apos;s attention.&apos;&apos;" />
                      <outline text="Snowden recounted another set of conversations that he said took place three years earlier, when he was sent by the NSA&apos;s Technology Directorate to support operations at a listening post in Japan. As a system administrator, he had full access to security and auditing controls. He said he saw serious flaws with information security." />
                      <outline text="&apos;&apos;I actually recommended they move to two-man control for administrative access back in 2009,&apos;&apos; he said, first to his supervisor in Japan and then to the directorate&apos;s chief of operations in the Pacific. &apos;&apos;Sure, a whistleblower could use these things, but so could a spy.&apos;&apos;" />
                      <outline text="That precaution, which requires a second set of credentials to perform risky operations such as copying files onto a removable drive, has been among the principal security responses to the Snowden affair." />
                      <outline text="Vines, the NSA spokeswoman, said there was no record of those conversations, either." />
                      <outline text="U.S. &apos;would cease to exist&apos;" />
                      <outline text="Just before releasing the documents this spring, Snowden made a final review of the risks. He had overcome what he described at the time as a &apos;&apos;selfish fear&apos;&apos; of the consequences for himself." />
                      <outline text="&apos;&apos;I said to you the only fear [left] is apathy &apos;-- that people won&apos;t care, that they won&apos;t want change,&apos;&apos; he recalled this month." />
                      <outline text="The documents leaked by Snowden compelled attention because they revealed to Americans a history they did not know they had." />
                      <outline text="Internal briefing documents reveled in the &apos;&apos;Golden Age of Electronic Surveillance.&apos;&apos; Brawny cover names such as MUSCULAR, TUMULT and TURMOIL boasted of the agency&apos;s prowess." />
                      <outline text="With assistance from private communications firms, the NSA had learned to capture enormous flows of data at the speed of light from fiber-optic cables that carried Internet and telephone traffic over continents and under seas. According to one document in Snowden&apos;s cache, the agency&apos;s Special Source Operations group, which as early as 2006 was said to be ingesting &apos;&apos;one Library of Congress every 14.4 seconds,&apos;&apos; had an official seal that might have been parody: an eagle with all the world&apos;s cables in its grasp." />
                      <outline text="Each year, NSA systems collected hundreds of millions of e-mail address books, hundreds of billions of cellphone location records and trillions of domestic call logs." />
                      <outline text="Most of that data, by definition and intent, belonged to ordinary people suspected of nothing. But vast new storage capacity and processing tools enabled the NSA to use the information to map human relationships on a planetary scale. Only this way, its leadership believed, could the NSA reach beyond its universe of known intelligence targets." />
                      <outline text="In the view of the NSA, signals intelligence, or electronic eavesdropping, was a matter of life and death, &apos;&apos;without which America would cease to exist as we know it,&apos;&apos; according to an internal presentation in the first week of October 2001 as the agency ramped up its response to the al-Qaeda attacks on the World Trade Center and the Pentagon." />
                      <outline text="With stakes such as those, there was no capability the NSA believed it should leave on the table. The agency followed orders from President George W. Bush to begin domestic collection without authority from Congress and the courts. When the NSA won those authorities later, some of them under secret interpretations of laws passed by Congress between 2007 and 2012, the Obama administration went further still." />
                      <outline text="Using PRISM, the cover name for collection of user data from Google, Yahoo, Microsoft, Apple and five other U.S.-based companies, the NSA could obtain all communications to or from any specified target. The companies had no choice but to comply with the government&apos;s request for data." />
                      <outline text="But the NSA could not use PRISM, which was overseen once a year by the surveillance court, for the collection of virtually all data handled by those companies. To widen its access, it teamed up with its British counterpart, Government Communications Headquarters, or GCHQ, to break into the private fiber-optic links that connected Google and Yahoo data centers around the world." />
                      <outline text="That operation, which used the cover name MUSCULAR, tapped into U.S. company data from outside U.S. territory. The NSA, therefore, believed it did not need permission from Congress or judicial oversight. Data from hundreds of millions of U.S. accounts flowed over those Google and Yahoo links, but classified rules allowed the NSA to presume that data ingested overseas belonged to foreigners." />
                      <outline text="&apos;Persistent threat&apos;" />
                      <outline text="Disclosure of the MUSCULAR project enraged and galvanized U.S. technology executives. They believed the NSA had lawful access to their front doors &apos;-- and had broken down the back doors anyway." />
                      <outline text="Microsoft general counsel Brad Smith took to his company&apos;s blog and called the NSA an &apos;&apos;advanced persistent threat&apos;&apos; &apos;-- the worst of all fighting words in U.S. cybersecurity circles, generally reserved for Chinese state-sponsored hackers and sophisticated criminal enterprises." />
                      <outline text="&apos;&apos;For the industry as a whole, it caused everyone to ask whether we knew as much as we thought,&apos;&apos; Smith recalled in an interview. &apos;&apos;It underscored the fact that while people were confident that the U.S. government was complying with U.S. laws for activity within U.S. territory, perhaps there were things going on outside the United States .&apos;&#137;.&apos;&#137;. that made this bigger and more complicated and more disconcerting than we knew.&apos;&apos;" />
                      <outline text="They wondered, he said, whether the NSA was &apos;&apos;collecting proprietary information from the companies themselves.&apos;&apos;" />
                      <outline text="Led by Google and then Yahoo, one company after another announced expensive plans to encrypt its data traffic over tens of thousands of miles of cable. It was a direct &apos;-- in some cases, explicit &apos;-- blow to NSA collection of user data in bulk. If the NSA wanted the information, it would have to request it or circumvent the encryption one target at a time." />
                      <outline text="As these projects are completed, the Internet will become a less friendly place for the NSA to work. The agency can still collect data from virtually anyone, but collecting from everyone will be harder." />
                      <outline text="The industry&apos;s response, Smith acknowledged, was driven by a business threat. U.S. companies could not afford to be seen as candy stores for U.S. intelligence. But the principle of the thing, Smith said, &apos;&apos;is fundamentally about ensuring that customer data is turned over to governments pursuant to valid legal orders and in accordance with constitutional principles.&apos;&apos;" />
                      <outline text="&apos;Warheads on foreheads&apos;" />
                      <outline text="Snowden has focused on much the same point from the beginning: Individual targeting would cure most of what he believes is wrong with the NSA." />
                      <outline text="Six months ago, a reporter asked him by encrypted e-mail why Americans would want the NSA to give up bulk data collection if that would limit a useful intelligence tool." />
                      <outline text="&apos;&apos;I believe the cost of frank public debate about the powers of our government is less than the danger posed by allowing these powers to continue growing in secret,&apos;&apos; he replied, calling them &apos;&apos;a direct threat to democratic governance.&apos;&apos;" />
                      <outline text="In the Moscow interview, Snowden said, &apos;&apos;What the government wants is something they never had before,&apos;&apos; adding: &apos;&apos;They want total awareness. The question is, is that something we should be allowing?&apos;&apos;" />
                      <outline text="Snowden likened the NSA&apos;s powers to those used by British authorities in Colonial America, when &apos;&apos;general warrants&apos;&apos; allowed for anyone to be searched. The FISA court, Snowden said, &apos;&apos;is authorizing general warrants for the entire country&apos;s metadata.&apos;&apos;" />
                      <outline text="&apos;&apos;The last time that happened, we fought a war over it,&apos;&apos; he said." />
                      <outline text="Technology, of course, has enabled a great deal of consumer surveillance by private companies, as well. The difference with the NSA&apos;s possession of the data, Snowden said, is that government has the power to take away life or freedom." />
                      <outline text="At the NSA, he said, &apos;&apos;there are people in the office who joke about, &apos;We put warheads on foreheads.&apos; Twitter doesn&apos;t put warheads on foreheads.&apos;&apos;" />
                      <outline text="Privacy, as Snowden sees it, is a universal right, applicable to American and foreign surveillance alike." />
                      <outline text="&apos;&apos;I don&apos;t care whether you&apos;re the pope or Osama bin Laden,&apos;&apos; he said. &apos;&apos;As long as there&apos;s an individualized, articulable, probable cause for targeting these people as legitimate foreign intelligence, that&apos;s fine. I don&apos;t think it&apos;s imposing a ridiculous burden by asking for probable cause. Because, you have to understand, when you have access to the tools the NSA does, probable cause falls out of trees.&apos;&apos;" />
                      <outline text="&apos;Everybody knows&apos;" />
                      <outline text="On June 29, Gilles de Kerchove, the European Union&apos;s counter&#173;terrorism coordinator, awoke to a report in Der Spiegel that U.S. intelligence had broken into E.U. offices, including his, to implant surveillance devices." />
                      <outline text="The 56-year-old Belgian, whose work is often classified, did not consider himself naive. But he took the news personally, and more so when he heard unofficial explanations from Washington." />
                      <outline text="&apos;&apos;&apos;&#138;&apos;Everybody knows. Everybody does&apos; &apos;-- Keith Alexander said that,&apos;&apos; de Kerchove said in an interview. &apos;&apos;I don&apos;t like the idea that the NSA will put bugs in my office. No. I don&apos;t like it. No. Between allies? No. I&apos;m surprised that people find that noble.&apos;&apos;" />
                      <outline text="Comparable reactions, expressed less politely in private, accompanied revelations that the NSA had tapped the cellphones of German Chancellor Angela Merkel and Brazilian President Dilma Rousseff. The blowback roiled relations with both allies, among others. Rousseff canceled a state dinner with Obama in September." />
                      <outline text="When it comes to spying on allies, by Snowden&apos;s lights, the news is not always about the target." />
                      <outline text="&apos;&apos;It&apos;s the deception of the government that&apos;s revealed,&apos;&apos; Snowden said, noting that the Obama administration offered false public assurances after the initial reports about NSA surveillance in Germany &apos;&apos;The U.S. government said: &apos;We follow German laws in Germany. We never target German citizens.&apos; And then the story comes out and it&apos;s: &apos;What are you talking about? You&apos;re spying on the chancellor.&apos; You just lied to the entire country, in front of Congress.&apos;&apos;" />
                      <outline text="In private, U.S. intelligence officials still maintain that spying among friends is routine for all concerned, but they are giving greater weight to the risk of getting caught." />
                      <outline text="&apos;&apos;There are many things we do in intelligence that, if revealed, would have the potential for all kinds of blowback,&apos;&apos; Clapper told a House panel in October." />
                      <outline text="&apos;They will make mistakes&apos;" />
                      <outline text="U.S. officials say it is obvious that Snowden&apos;s disclosures will do grave harm to intelligence gathering, exposing methods that adversaries will learn to avoid." />
                      <outline text="&apos;&apos;We&apos;re seeing al-Qaeda and related groups start to look for ways to adjust how they communicate,&apos;&apos; said Matthew Olsen, director of the National Counterterrorism Center and a former general counsel at the NSA." />
                      <outline text="Other officials, who declined to speak on the record about particulars, said they had watched some of their surveillance targets, in effect, changing channels. That evidence can be read another way, they acknowledged, given that the NSA managed to monitor the shift." />
                      <outline text="Clapper has said repeatedly in public that the leaks did great damage, but in private he has taken a more nuanced stance. A review of early damage assessments in previous espionage cases, he said in one closed-door briefing this fall, found that dire forecasts of harm were seldom borne out." />
                      <outline text="&apos;&apos;People must communicate,&apos;&apos; he said, according to one participant who described the confidential meeting on the condition of anonymity. &apos;&apos;They will make mistakes, and we will exploit them.&apos;&apos;" />
                      <outline text="According to senior intelligence officials, two uncertainties feed their greatest concerns. One is whether Russia or China managed to take the Snowden archive from his computer, a worst-case assumption for which three officials acknowledged there is no evidence." />
                      <outline text="In a previous assignment, Snowden taught U.S. intelligence personnel how to operate securely in a &apos;&apos;high-threat digital environment,&apos;&apos; using a training scenario in which China was the designated threat. He declined to discuss the whereabouts of the files, but he said that he is confident he did not expose them to Chinese intelligence in Hong Kong. And he said he did not bring them to Russia." />
                      <outline text="&apos;&apos;There&apos;s nothing on it,&apos;&apos; he said, turning his laptop screen toward his visitor. &apos;&apos;My hard drive is completely blank.&apos;&apos;" />
                      <outline text="The other big question is how many documents Snowden took. The NSA&apos;s incoming deputy director, Rick Ledgett, said on CBS&apos;s &apos;&apos;60 Minutes&apos;&apos; recently that the number may approach 1.7 million, a huge and unexplained spike over previous estimates. Ledgett said he would favor trying to negotiate an amnesty with Snowden in exchange for &apos;&apos;assurances that the remainder of the data could be secured.&apos;&apos;" />
                      <outline text="Obama&apos;s national security adviser, Susan E. Rice, later dismissed the possibility." />
                      <outline text="&apos;&apos;The government knows where to find us if they want to have a productive conversation about resolutions that don&apos;t involve Edward Snowden behind bars,&apos;&apos; said the American Civil Liberties Union&apos;s Ben Wizner, the central figure on Snowden&apos;s legal team." />
                      <outline text="Some news accounts have quoted U.S. government officials as saying Snowden has arranged for the automated release of sensitive documents if he is arrested or harmed. There are strong reasons to doubt that, beginning with Snowden&apos;s insistence, to this reporter and others, that he does not want the documents published in bulk." />
                      <outline text="If Snowden were fool enough to rig a &apos;&apos;dead man&apos;s switch,&apos;&apos; confidants said, he would be inviting anyone who wants the documents to kill him." />
                      <outline text="Asked about such a mechanism in the Moscow interview, Snowden made a face and declined to reply. Later, he sent an encrypted message. &apos;&apos;That sounds more like a suicide switch,&apos;&apos; he wrote. &apos;&apos;It wouldn&apos;t make sense.&apos;&apos;" />
                      <outline text="&apos;It&apos;s not about me&apos;" />
                      <outline text="By temperament and circumstance, Snowden is a reticent man, reluctant to discuss details about his personal life." />
                      <outline text="Over two days his guard never dropped, but he allowed a few fragments to emerge. He is an &apos;&apos;ascetic,&apos;&apos; he said. He lives off ramen noodles and chips. He has visitors, and many of them bring books. The books pile up, unread. The Internet is an endless library and a window on the progress of his cause." />
                      <outline text="&apos;&apos;It has always been really difficult to get me to leave the house,&apos;&apos; he said. &apos;&apos;I just don&apos;t have a lot of needs. .&apos;&#137;.&apos;&#137;. Occasionally there&apos;s things to go do, things to go see, people to meet, tasks to accomplish. But it&apos;s really got to be goal-oriented, you know. Otherwise, as long as I can sit down and think and write and talk to somebody, that&apos;s more meaningful to me than going out and looking at landmarks.&apos;&apos;" />
                      <outline text="In hope of keeping focus on the NSA, Snowden has ignored attacks on himself." />
                      <outline text="&apos;&apos;Let them say what they want,&apos;&apos; he said. &apos;&apos;It&apos;s not about me.&apos;&apos;" />
                      <outline text="Former NSA and CIA director Michael V. Hayden predicted that Snowden will waste away in Moscow as an alcoholic, like other &apos;&apos;defectors.&apos;&apos; To this, Snowden shrugged. He does not drink at all. Never has." />
                      <outline text="But Snowden knows his presence here is easy ammunition for critics. He did not choose refuge in Moscow as a final destination. He said that once the U.S. government voided his passport as he tried to change planes en route to Latin America, he had no other choice." />
                      <outline text="It would be odd if Russian authorities did not keep an eye on him, but no retinue accompanied Snowden and his visitor saw no one else nearby. Snowden neither tried to communicate furtively nor asked that his visitor do so. He has had continuous Internet access and has talked to his attorneys and to journalists daily, from his first day in the transit lounge at Sheremetyevo airport." />
                      <outline text="&apos;&apos;There is no evidence at all for the claim that I have loyalties to Russia or China or any country other than the United States,&apos;&apos; he said. &apos;&apos;I have no relationship with the Russian government. I have not entered into any agreements with them.&apos;&apos;" />
                      <outline text="&apos;&apos;If I defected at all,&apos;&apos; Snowden said, &apos;&apos;I defected from the government to the public.&apos;&apos;" />
                      <outline text="Julie Tate contributed to this report." />
                      <outline text="MORE" />
                      <outline text="Contact us" />
                      <outline text="Privacy policy" />
                      <outline text="My Account" />
                      <outline text="Sign InSubscribe(C) Copyright 1996-2013 The Washington Post" />
                      <outline text="View desktop site" />
              </outline>

              <outline text="scottlinux.com | Linux Blog - How To Dual Boot OS X and Linux">
                      <outline text="Link to Article" type="link" url="https://scottlinux.com/2011/06/14/how-to-dual-boot-os-x-and-linux/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387893762_Yxvw2NqJ.html" />
      <outline text="Tue, 24 Dec 2013 14:02" />
                      <outline text="" />
                      <outline text="Note: rEFIt does not work with 10.7 Lion yet (step 4). Wait for an rEFIt update before attempting on a 10.7 machine." />
                      <outline text="Warning: This is scary stuff &apos;&apos; you can really trash your system and data! I am not responsible if any problems occur. Always backup your data!" />
                      <outline text="1. Backup your entire existing OS X hard drive onto an external drive using a utility such as Carbon Copy Cloner. This is a CYA step!" />
                      <outline text="2. Create a Boot Camp partition using the Boot Camp Assistant. I&apos;m creating a 60GB partition for Linux Mint in this example." />
                      <outline text="3. Reboot, make sure all is well with OS X after the Boot Camp partition change.4. Install rEFIt and then reboot twice to make sure it is installed and working ok. (Hold down option at boot to see rEFIt menu if it does not appear automatically.)" />
                      <outline text="5. Boot your desired Linux install CD/DVD by holding down &apos;C&apos;." />
                      <outline text="6. Install Linux as normal to the Boot Camp partition. It is critical to _delete_ the Boot Camp-made Fat32 partition for Windows and replace it by creating a root (/) and swap partition for your Linux install." />
                      <outline text="Another critical step: the bootloader (grub) should be installed to the Linux root partition, and not the MBR/EFI part of your hard drive. You must make this change in your Linux install! In this example, the Linux boot loader is being installed to /dev/sda3." />
                      <outline text="7. After the Linux install completes, fully shutdown the computer. (Apple &apos;reboots&apos; are at times very soft reboots that sometimes do not cut it.)8. Turn the machine back on. From the rEFIt menu, you can now choose and boot into Linux or OS X!" />
                      <outline text="Notes: If Apple complains that it cannot create a boot partition, try booting from an OS X install CD, run Disk Utility, and click Repair Disk. The go back into OS X and try the Boot Camp Assistant again." />
                      <outline text="If you ever want to remove rEFIt, simply go to the OS X Startup Disk Preferences, and choose your OS X Hard Drive as the startup disk. This &apos;click&apos; will overwrite and remove rEFIt." />
                      <outline text="Grub is optional &apos;&apos; you actually can skip installing a bootloader if needed. rEFIt will just dump you right into Linux. However the recovery options that grub provides are worth keeping, IMO." />
                      <outline text="rEFIt has trouble booting to a second internal hard drive. If you are attempting this, be aware of this as an issue in their FAQs." />
                      <outline text="As seen before, Linux beats OS X on the same hardware in identical cross platform benchmarks!" />
              </outline>

              <outline text="Louigi Verona Workshop">
                      <outline text="Link to Article" type="link" url="http://www.louigiverona.ru/?page=projects&amp;s=writings&amp;t=linux&amp;a=linux_livesetup" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387866999_kMPmggMF.html" />
      <outline text="Tue, 24 Dec 2013 06:36" />
                      <outline text="" />
                      <outline text="How the kitchen works" />
                      <outline text="30 March, 02011" />
                      <outline text="This article will discuss my live performance setup on Linux. Apart from a quite detailed desciption of how I approached the problem, I offer links to some of the recordings of improvisational sessions I&apos;ve made to this day. In fact, if you wanna make sure that my setup is worth anything, you might want to listen to those first and see if they are impressing enough, they are at the end of the page." />
                      <outline text="In short, my setup quite reliably allows one to make very detailed music, and not simply ambient, but music with synced basslines and drums and all that other good stuff, as well as volume control of all the channels involved, midi control of effect parameters and the ability to quickly change the chord playing, the melody and even transform one tune into another. Obviously, all of this is possible thanks to the continuing work of the Linux Audio community, which is putting together some serious software. So my task was to connect this software in a certain manner so that I could create music I want to do, in real time, on the fly." />
                      <outline text="So how did it all start?" />
                      <outline text="After finding out about din, I have made up my mind to build a setup for live performances on Linux and although just some time before I gave up on it, this time I had a feeling it would work out." />
                      <outline text="I also decided to explore some of the midi sequencers on Linux, thinking that perhaps I can at least add a bassline or some other structured sounds to my din playing. I looked at seq24, but did not know how to make it show up in Patchage, so discarded it at that time, tried the NON Sequencer, which had sync issues.But then I was introduced to HarmonySEQ, a sequencer that became a game changer for my whole Linux Audio setup." />
                      <outline text="HarmonySEQ is a project that deserves a separate article and the only reason I am not writing it, is that I am waiting for the new version to come out which will have many features added, as well as the revised user interface. But in short, it is very easy to use and allows to create &quot;events&quot;, binded to your computer keys and/or to a midi controller to turn patterns on and off, switch chords, notes and active patterns on the fly. This feature makes it invaluable for live performances, since many of the times you would find it difficult to actually change a chord, along with all the basslines and supporting themes, but this is not a problem for HarmonySEQ." />
                      <outline text="Anyway, once I saw that there is a midi sequencer that can be the core of my system, sequence and sync everything, I decided to figure what the best approach should be.Obviously, having lots and lots of applications and synths available, you could just open it up randomly and start sequencing. However, the ease with which I got quickly confused as to what is channeled through what and the need to constantly route things in Patchage, requiring lots of mouse work, hinted that a different method is prefferable." />
                      <outline text="So I decided to unify things and pick a set of synths and effects I will use. Not only that, but I decided to figure out the best way to route those and keep it fixed for every live performance session, so that I know precisely which synth is routed through what effect and into what mixer channel. At the same time, the setup has to be versatile enough to allow me to make complex music." />
                      <outline text="And this is what I eventually came up with:" />
                      <outline text="Notice that even in Patchage it does not look too complex - I mean, I&apos;ve seen setups that have so many virtual wires, you might mistake it for a maze. At the same time each and every connection here is thought through and the resulting simplicity and yet efficiency comes from practice. Let me now describe in detail how it works and why I set it up the way I did." />
                      <outline text="Overview." />
                      <outline text="Okay, so, first of all, let&apos;s look at what programms we are using and for what.We have HarmonySEQ for sequencing and synchronization of everything, QSynth with three opened engines to play sounds, Hydrogen to play drums, Kluppe to play longer sounds and loops, four Rakarracks which offer effects, and finally Qtractor which plays the role of a midi driven mixer. I use KORG nanoKontrol as my midi controller." />
                      <outline text="Audio routing." />
                      <outline text="Before we go into the specifics of how each app is setup, let&apos;s look at routing.Routing has to be easy to remember and be logical enough, so that in a subconscious situation of a live performance you would be able to instantly recall what goes through what.Because we have several instances of apps open, it is thus a good idea to route apps in accordance with their instance numbering. If you look at the screenshot, you will notice that QSynth1 is routed through rakarrack-01 and that goes into Track 1 in Qtractor. Same goes for QSynth2 - it goes through rakarrack-02 and into Track 2 of the mixer, QSynth3 goes into rakarrack-03 and then into Track 3.There is also just a &quot;rakarrack&quot;. This is actually the first instance of Rakarrack which has no number on initialization, but because QSynth does have numbers, it would not be easy to remember that QSynth1 goes into rakarrack and QSynth2 into rakarrack-01, so just &quot;rakarrack&quot; is considered to be the last and goes into Track 4." />
                      <outline text="Note that the secondary purpose of such audio routing is to also minimize the amount of mouse work in Patchage during the performance. This routing is universal enough and if I need to add additional synths, I don&apos;t have to think where to route them through, I know precisely the options I have: I either switch them into any of the rakarracks or into free tracks of Qtractor, of which we will speak in the next paragraph." />
                      <outline text="Note: on the screenshot you can see that there is really no QSynth1, there is qsynth. For some reason first engine of QSynth does not respond to option changes and always comes out called &quot;qsynth&quot;. On the GUI, however, it is called QSynth1, as you will see on screenshots below, so routing &quot;qsynth&quot; into &quot;rakarrack-01&quot; makes sense." />
                      <outline text="Setting up the mixer." />
                      <outline text="Qtractor has very solid midi learn features and can easily create any amount of audio inputs. This is why I decided to use Qtractor as my mixer. I did not create any individual audio outputs as the whole purpose of having a mixer apart from getting to control volume of separate channels is to also unite all audio tracks into one, for general output and/or recording." />
                      <outline text="The general concept of simplicity and unification is applied to all chains of the system. In case of Qtractor I limited the amount of tracks to 8 and assigned each track a fixed role. Let&apos;s look at those." />
                      <outline text="Tracks 1 through 4 host outputs of the four rakarracks and each carries a CALF Vintage Delay.Tracks 5, 6 and 7 are generally used for clean audio output for apps that require no delay and no effect processing, such as kluppe, which I mostly use to play pads and sounds crafted in advance with all the processing contained in them already. By default I use track 7 for clean audio and connect anything to tracks 5 and 6 only if I need separate volume control.Finally, track 8 is used for unprocessed Hydrogen output. Very often I use Hydrogen as a vocoder carrier or pass it through effects, but if I need drums as they are, I always know they are on track 8." />
                      <outline text="Additionally, I have created a midi channel, called &quot;TB303&quot; on the screenshot, which hosts a Nekobee DSSI plugin and which is controlled by HarmonySEQ." />
                      <outline text="Note: delay plugins are hosted in output buses, but my midi controller controls volume sliders of input buses. This is important, because it allows you to quickly shoot volume up and down and make those bursts echo around and generally gives a more smooth sound when fading in and out. If you host delays in input buses, by pulling sliders down you will silence the delay effect as well, which is not as versatile." />
                      <outline text="KORG nanoKontrol is a great controller for such a setup. It has several &quot;scenes&quot;, each scene having different MIDI CCs on knobs and sliders." />
                      <outline text="&quot;Scene 1&quot; I use for volume and delay control. Sliders 1-8 control volume sliders of tracks 1-8. Knobs above sliders 1-4 control delay amount of the corresponding tracks, knobs above sliders 5-8 control delay feedback of tracks 1-4 (i.e., knob above slider 5 controls delay feedback of delay on track 1, knob above slider 6 controls delay feedback on track 2 and so on). That way I have volume and delay control right before me without the need to switch scenes of the midi controller around.At first I set slider 9 to control Master Out volume, but then decided not to do it, because it is not so much needed and at the same time poses a risk of a mistake, when you want to kill volume on track 8 but instead kill all the mix. At the moment slider 9 does nothing and I advice against putting any function on it for a live performance setup." />
                      <outline text="&quot;Scene 2&quot; is used for Nekobee DSSI control. All Nekobee functions I&apos;ve put on knobs, since it is much more intuitive to work it that way, not to mention it&apos;s more traditional ;) As seen on the screenshot, Nekobee midi track also carries a CALF Vintage delay: a TB-303 is unthinkable without some good echoes. Nekobee delay amount and feedback I put on sliders 1 and 2. It is up to you what controls to choose though since there are enough knobs and sliders here, so just find a setup that works best for you. I do miss the ability to assign same parameter to separate knobs, as I wouldn&apos;t mind having track 8 volume control duplicated in &quot;Scene 2&quot;, for situations when I want to kick in drums along with some cool TB-303 sqeaking, but maybe that feature will be available in the future (or either I&apos;ll find a way to program a particular slider on nanoKontrol to the same CC message)." />
                      <outline text="I have several versions of these session templates, each version being setup for a particular tempo because there is no reliable way that I know of to pass tempo changes to all the delay plugins, so without simply loading a project with the required tempo set in advance, you would have to open all delay plugins and set tempo manually, which is not what you want to do during a performance." />
                      <outline text="This is it for Qtractor. The only thing to mention is that Qtractor thankfully remembers all connections, so you don&apos;t have to worry about connections, related to it. Basically, the only connections you do have to create manually, are those between HarmonySEQ and QSynth instances and between your audio apps and four rakarracks, which is not so much and is done just once." />
                      <outline text="Rakarracks." />
                      <outline text="There are four Rakarracks I use. I do try to differentiate between them, although so far it has been erratic, since during a performance pretty quickly you begin to change effects and load different presets and tweak things. But in general, the really fixed one is the fourth track, the just &quot;rakarrack&quot; one, which I use as a vocoder. My use of a vocoder in music is very vast, I am ready to feed all possible sounds into it." />
                      <outline text="HarmonySEQ" />
                      <outline text="HarmonySEQ is a different story and one can spend a lot of time figuring out the best way to set it up. Because HarmonySEQ allows you to program it to accept events, be it from a computer keyboard or a midi controller, and those events include switching patterns on and off, playing them once, changing chords and even specific notes inside a pattern, there is a lot of thinking and trying out should be done." />
                      <outline text="My initial setup is this. As you see on the picture, first four patterns are called &quot;bass01,02,03,04&quot;. Those four patterns are the ones which are bound to keys on a computer keyboard that change chords. I programmed them for a whole set of chords I typically use, both on a major and minor scale. The efficiency here is that one key changes chords in all four patterns at the same time, so I can have several themes going and they all change at once. Patterns &quot;seq5,6,7&quot; do not change chords and can hold themes which have to stay the same. Pattern 8 I use to control drum soundfonts I have." />
                      <outline text="&quot;hydro_init&quot; and &quot;hydro_stop&quot; are special patterns which control Hydrogen. Hydrogen allows to define midi input in its options and to bind events to that input. I&apos;ve set it up to PLAY on receiving a specific note and to STOP on receiving another specific note. To make sure those notes do not trigger a drum, I have used very high notes.Please note that at the moment of this writing, HarmonySEQ does not very accurately trigger a pattern in &quot;play once&quot; mode, so while playing &quot;hydro_stop&quot; once works fine to stop Hydrogen, in order to sync it perfectly to the rest of the patterns, you have to trigger &quot;hydro_init&quot; in &quot;play looped&quot; mode, by checking the box in front of it or better programming a key to trigger it on and off. Otherwise, Hydrogen will be a little off the rhythm. Hopefully, that bug will be fixed soon and such problem would not exist, but at the moment just use the play looped mode.When Hydrogen starts playing, you can turn the hydro_init pattern off. In fact, if you do not, stopping it with &quot;hydro_stop&quot; will result in it almost instantly starting to play again." />
                      <outline text="QSynth" />
                      <outline text="QSynth, the latest version of which deserves much praise, is a good tool for performing with sf2. And the ability to save presets of chosen sf2 instruments is very helpful. Below on the screenshot you can see a loaded preset with HarmonySEQ sending midi notes to QSynth." />
                      <outline text="Window manager" />
                      <outline text="At the moment I am using Openbox for my audio work. I found it to be very efficient for my needs. Using &quot;obmenu&quot; program, I could edit the standard menus and create a &quot;Linux Audio&quot; section where all of my software is a click away. Additionally, I&apos;ve set up three desktops, all of which, as typical for my live setup, have their fixed roles. Desktop 1 hosts Patchage, which is maximized, so that I can instantly switch over to it and make my connections, Desktop 2 is my main working space and Desktop 3 usually hosts a maximized din. din is a separate topic in itself, but in short, I&apos;ve bought a graphical pad specifically to play din with it and so I need din window to be maximized so that it is more comfortable to play and I do not accientally touch other applications." />
                      <outline text="I did look at some other window managers, but so far this one is my favourite. You should choose yours, but I do recommend using an alternative window manager, which is minimal and uses less memory and allows to launch software you need quickly." />
                      <outline text="Conclusion" />
                      <outline text="What I described above is the basic setup, the skeleton. But what if I want to add some more synths? This I also unified as much as possible and have decided for myself to add additional synths to Track 1. Obviously, if I want to separate them or channel them through effects on Tracks 2, 3 or 4, I can do that, but by default I assume that din, AmSynth or Zyn, which I would want to use sometimes, go through Track 1. With din, I typically channel it through Track 1 and often use it as a modulator in vocoder on Track 4. If I want clean din sound, I channel it into Track 7, the &quot;clean sounds&quot; track, or additional tracks 5 or 6. Below you can see a little more advanced setup and which is in fact a more usual setup I have these days." />
                      <outline text="I am also now setting up Specimen, to be used both with Harmony and also with my Oxygene 8 midi keyboard, so I suspect that in the future my setup would look much more complex, but when you build a setup with a certain logic, chances are that no matter how complex you make it, it can still be simple to work." />
                      <outline text="In general, I am very happy with what Linux Audio gives me in terms of live performance. For the first time since I became unhappy with what Windows can do as a live performance tool, my laptop finally begins to do things I dreamed to do - to be able to just sit there and improvise. But it does require a lot of practice to do things fluently and quickly. Setup is very important. But practice is important also!" />
                      <outline text="Audio examples" />
                      <outline text="Finally, here are some of the recordings I made of my improvised sessions using the setup described above. All of these tunes where created in real time, nothing pre-written." />
                      <outline text="First recorded HarmonySEQ session&quot;Cycles&quot; session extractThese two are basically same tune played differently. I called the tune &quot;Cycles&quot;, thinking about night and day cycle and how our life is a sequence of cycles. These tunes have very slow progression because I was literally figuring out how HarmonySEQ works and connected things in real time. But I still think these are pretty nice for a first try." />
                      <outline text="107 Autumn sessionYet another session, technically similar to my first sessions, but it is at this point that I started to put together a more advanced setup." />
                      <outline text="cosmoportA very oldskool sounding trance, something you could hear in the early 90s." />
                      <outline text="water elementThis is a tune made with the existing setup. It lasts for 15 minutes and I decided to leave everything as it is, so you can even hear me trying out various samples and finally fitting them into the tune. The tune from calm goes into the rhythmic TB-303 sequence, which reminds me of rave music of the early 90s." />
                      <outline text="If you want to comment on this post, please use the textboard." />
              </outline>

              <outline text="South Sudan: Ban Ki-Moon Asks UN for 5,500 More Troops">
                      <outline text="Link to Article" type="link" url="http://allafrica.com/stories/201312240116.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387865857_3UNpgULm.html" />
        <outline text="Source: AllAfrica News: Latest" type="link" url="http://allafrica.com/tools/headlines/rdf/latest/headlines.rdf" />
      <outline text="Tue, 24 Dec 2013 06:17" />
                      <outline text="" />
                      <outline text="The UN Secretary General has called on the Security Council to bolster the number of peacekeeping troops in South Sudan. The urgent request comes as Africa&apos;s youngest country appears ready to enter into a civil war." />
                      <outline text="In a letter to the 15-member states of the UN Security Council, UN Secretary General Ban Ki-moon urged them to authorize a stark increase in the number of troops already deployed in South Sudan." />
                      <outline text="&quot;[The situation] is of mounting urgency,&quot; Ban wrote in his request, which included the addition of 5,500 UN peacekeepers and some 400 police officers to &quot;ensure the protection of civilians and the protection of United Nations personnel and assets.&quot;" />
                      <outline text="According to his draft plan, troops would be transferred from UN missions in Congo, Sudanese Darfur, Abyei, Ivory Coast and Liberia. Ban also requested three attack helicopters, three utility helicopters and a C130 military transport plane." />
                      <outline text="The Security Council plans to vote on the measure on Tuesday, according to France&apos;s UN Ambassador Gerard Araud - as cited by the Associated Press news agency - and British UN Ambassador Mark Lyall Grant." />
                      <outline text="&quot;The situation is obviously urgent and the Security Council will respond urgently. If it&apos;s necessary to take decisions, then we will take decisions by tomorrow,&quot; British U.N. Ambassador Mark Lyall Grant told the news agency Reuters." />
                      <outline text="Tensions have escalated in South Sudan - Africa&apos;s youngest country - since December 15 when South Sudan&apos;s former vice president, Riek Machar, was alleged to have attempted a coup." />
                      <outline text="Machar has denied responsibility, but has still called on current President Salva Kiir resign. The duo are long-time adversaries, belonging to rival tribes and having previously fought on opposing sides." />
                      <outline text="While the capital of Juba, where fighting initially began, has returned to a semblance of calm thanks to the presence of peacekeepers, the fighting has spread." />
                      <outline text="Hundreds of died in subsequent fighting since the alleged coup and up to 100,000 people displaced. Over 40,000 people have sought refuge in United Nations compounds." />
                      <outline text="Kiir plans offensive" />
              </outline>

              <outline text="Louisiana Lt. Governor Offers State Aid to Keep Duck Dynasty On Air">
                      <outline text="Link to Article" type="link" url="http://crooksandliars.com/2013/12/louisiana-lt-governor-offers-state-aid" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387865818_vHNX6RPE.html" />
        <outline text="Source: " type="link" url="http://feeds.feedburner.com/crooksandliars/YaCP" />
      <outline text="Tue, 24 Dec 2013 06:16" />
                      <outline text="" />
                      <outline text="It&apos;s all about the priorities, people:" />
                      <outline text="Jay Dardenne, the lieutenant governor of Louisiana whose responsibilities include promoting tourism, wrote an open letter to cast of Duck Dynasty in which he offered &apos;&apos;to use his influence among Louisiana&apos;s growing motion picture industry to seek out alternative production options&apos;&apos; should A&amp;E decide to cancel the program." />
                      <outline text="Lt. Gov. Dardenne has a long history of encouraging film and television production in the state. As a state senator, he authored the Louisiana Motion Picture Tax Incentive Act, which is credited for making the state&apos;s industry the third most productive in the nation, trailing only California and New York." />
                      <outline text="In his statement, he noted that his offer was not tantamount to an endorsement of Phil Robertson&apos;s positions on homosexuality, same-sex marriage or race. [..]" />
                      <outline text="&apos;&apos;Regardless of one&apos;s views on Phil Robertson&apos;s statements,&apos;&apos; Dardenne wrote, &apos;&apos;Duck Dynasty has been an important representation of the state of Louisiana, inspiring prospective visitors and investors since its debut. Their show draws tens of millions of viewers each year, reaching an audience eager to visit Sportsman&apos;s Paradise.&apos;&apos;" />
                      <outline text="Being a native Californian, I get why states try to entice television/movie productions, because it can bring a big infusion into local economies (although that is arguable), but should we point out to the lieutenant governor that celebrating racism and homophobia isn&apos;t exactly a tourist draw?" />
                      <outline text="Further, I don&apos;t think the Robertson family is hurting financially from this scandal." />
                      <outline text="I&apos;m pretty sure that if Lt. Gov. Dardenne looked hard enough, he could find some local investments that would actually help the state much, much more." />
                      <outline text="Campaign Cash Rules Drown in the Bathtub" />
              </outline>

              <outline text="Lesbian Author Accuses Gay Groups of Bullying Tactics Over Phil Robertson Controversy">
                      <outline text="Link to Article" type="link" url="http://dprogram.net/2013/12/23/lesbian-author-accuses-gay-groups-of-bullying-tactics-over-phil-robertson-controversy/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387865696_j4SYnktU.html" />
        <outline text="Source: Dprogram.net" type="link" url="http://dprogram.net/feed" />
      <outline text="Tue, 24 Dec 2013 06:14" />
                      <outline text="" />
                      <outline text="December 23rd, 2013" />
                      <outline text="Backlash against PC authoritarianism continues" />
                      <outline text="(PaulWatson) - Lesbian author Tammy Bruce has accused gay rights groups of resorting to the same kind of intimidation and bullying tactics they usually oppose in the effort to punish Duck Dynasty star Phil Robertson after his controversial comments." />
                      <outline text="&apos;&apos;What&apos;s especially troubling for minority communities in this country, the civil rights movements, especially the gay civil rights movement, was about asking for people and demanding the right for us to be able to live our lives as we see fit without being punished for being different. It&apos;s ironic also that one of the big campaigns by the gay community is about ending bullying. If this is not a sign of the ultimate of bullying I don&apos;t know what is,&apos;&apos; said Bruce." />
                      <outline text="As we reported on Saturday, not content with their lobbying efforts which helped influence A&amp;E in the decision to suspend the Duck Dynasty star, gay rights group GLAAD are now pushing for Robertson to be re-educated by demanding he meet with gay families in Louisiana, despite the fact that Robertson has refused to back down and has re-affirmed his biblical position on homosexuality." />
                      <outline text="The controversy began when Robertson told GQ Magazine, &apos;&apos;It seems like, to me, a vagina &apos;-- as a man &apos;-- would be more desirable than a man&apos;s anus. That&apos;s just me. I&apos;m just thinking: There&apos;s more there! She&apos;s got more to offer. I mean, come on, dudes! You know what I&apos;m saying? But hey, sin: It&apos;s not logical, my man. It&apos;s just not logical&apos;...Start with homosexual behavior and just morph out from there. Bestiality, sleeping around with this woman and that woman and that woman and those men.&apos;&apos;" />
                      <outline text="Bruce&apos;s remarks echo those made by Camille Paglia &apos;&apos; a professor at the University of the Arts in Philadelphia and a self-described &apos;&apos;openly gay dissident feminist.&apos;&apos;" />
                      <outline text="Paglia described the actions of some in reaction to Robertson&apos;s comments as &apos;&apos;utterly fascist, utterly Stalinist,&apos;&apos; adding that gay groups were displaying intolerance, immaturity and juvenility." />
                      <outline text="&apos;&apos;In a democratic country, people have the right to be homophobic as well as they have the right to support homosexuality &apos;&apos; as I one hundred percent do. If people are basing their views against gays on the Bible, again, they have a right of religious freedom there,&apos;&apos; Paglia told radio host Laura Ingraham." />
                      <outline text="As we have highlighted, given that some leftists are calling for the kind of comments made by Robertson to be banned from the public domain, if that definition of hate speech is applied, both the Bible and the Qu&apos;ran must also be removed from tens of millions of churches worldwide since they both contain far greater condemnation of homosexuality." />
                      <outline text="In a related development, the Sheriff&apos;s department in the Georgia county where Duck Dynasty is filmed has announced that it will no longer offer its assistance to A&amp;E after the network&apos;s &apos;&apos;unreasonable&apos;&apos; punishment of Robertson." />
                      <outline text="Source: Infowars" />
                      <outline text="Tags: bullying tactics, duck dynasty, gay groups, gay rights, lesbian author, phil robertson, tammy bruceThis entry was posted on Monday, December 23rd, 2013 at 9:55 pm and is filed under Dictatorship, Education/Mind Control, Fascism, NWO. You can follow any responses to this entry through the RSS 2.0 feed. You can skip to the end and leave a response. Pinging is currently not allowed." />
              </outline>

              <outline text="Edward Snowden Says His Mission Is Accomplished">
                      <outline text="Link to Article" type="link" url="http://www.economicpolicyjournal.com/2013/12/edward-snowden-says-his-mission-is.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387865572_wrnnchsX.html" />
        <outline text="Source: EconomicPolicyJournal.com" type="link" url="http://www.economicpolicyjournal.com/feeds/posts/default?alt=rss" />
      <outline text="Tue, 24 Dec 2013 06:12" />
                      <outline text="" />
                      <outline text="Six months after exposing the NSA&apos;s secret surveillance program, Edward Snowden sat down with a Washington Post reporter, and over meals of burgers, pasta, ice cream and Russian pastries, explained that his personal mission has already been accomplished, reports Gawker.&apos;&apos;I already won,&quot; he told the Post&apos;s Barton Gellman, one of the reporters he initially approached with the leak. &quot;As soon as the journalists were able to work, everything that I had been trying to do was validated. Because, remember, I didn&apos;t want to change society. I wanted to give society a chance to determine if it should change itself.&apos;&apos;It also appears that Snowden is not anti-NSA, just bulk data collections. From Gawker:Snowden says this blind bulk data collecting is his biggest problem &apos;-- he believes that individual targeting based on probable cause would be more appropriate.&apos;&apos;I don&apos;t care whether you&apos;re the pope or Osama bin Laden... As long as there&apos;s an individualized, articulable, probable cause for targeting these people as legitimate foreign intelligence, that&apos;s fine. I don&apos;t think it&apos;s imposing a ridiculous burden by asking for probable cause. Because, you have to understand, when you have access to the tools the NSA does, probable cause falls out of trees.&apos;&apos;" />
                      <outline text="Allowing individuate targeting is, in my book, just as bad. That will be stretched and stretched---as all government operations are." />
              </outline>

              <outline text="Bookkeeper: A double-entry bookkeeping system for Django">
                      <outline text="Link to Article" type="link" url="https://github.com/SwingTix/bookkeeper" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387865549_nhb6vF9J.html" />
        <outline text="Source: Hacker News" type="link" url="https://news.ycombinator.com/rss" />
      <outline text="Tue, 24 Dec 2013 06:12" />
                      <outline text="" />
                      <outline text="README.rstA double-entry bookkeeping system originally developed for SwingTix." />
                      <outline text="You&apos;ll need a django project. If you don&apos;t have one handy, you can make an empty one following the first steps of the django tutorial. Afterwards, edit /settings.py to add &quot;swingtix.bookkeeper&quot; to INSTALLED_APPS and run:" />
                      <outline text="$ python manage.py syncdbThen you&apos;re ready to start exploring using the shell:" />
                      <outline text="$ python manage.py shellFirst, let&apos;s create a couple of accounts:" />
                      <outline text="&gt;&gt;&gt; from swingtix.bookkeeper.models import BookSet, Account&gt;&gt;&gt; book = BookSet(description=&quot;my book&quot;)&gt;&gt;&gt; book.save()&gt;&gt;&gt; revenue = Account(bookset=book, name=&quot;revenue&quot;, positive_credit=True)&gt;&gt;&gt; revenue.save()&gt;&gt;&gt; bank = Account(bookset=book, name=&quot;bank&quot;, positive_credit=False)&gt;&gt;&gt; bank.save()&gt;&gt;&gt; expense = Account(bookset=book, name=&quot;expense&quot;, positive_credit=False)&gt;&gt;&gt; expense.save()Then you can use them:" />
                      <outline text="&gt;&gt;&gt; book = BookSet.objects.get(description=&quot;my book&quot;)&gt;&gt;&gt; revenue = book.get_account(&quot;revenue&quot;)&gt;&gt;&gt; bank = book.get_account(&quot;bank&quot;)&gt;&gt;&gt; expense = book.get_account(&quot;expense&quot;)#Someone pays you can advance. Yay!&gt;&gt;&gt; bank.debit(120.00, revenue, &quot;our first sale&quot;)(, )#but now you have to do some work. The local coffee shop has free wifi..&gt;&gt;&gt; bank.credit(2.20, expense, &quot;coffee&quot;)(, )&gt;&gt;&gt; bank.balance()Decimal(&apos;117.80&apos;)&gt;&gt;&gt; expense.balance()Decimal(&apos;2.20&apos;)&gt;&gt;&gt; revenue.balance()Decimal(&apos;120.00&apos;)" />
              </outline>

              <outline text="John Prendergast (activist) - Wikipedia, the free encyclopedia">
                      <outline text="Link to Article" type="link" url="http://en.wikipedia.org/wiki/John_Prendergast_(activist)" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387865439_DsfXcGkj.html" />
      <outline text="Tue, 24 Dec 2013 06:10" />
                      <outline text="" />
                      <outline text="John Prendergast (born March 21, 1963) is an American human rights activist, author, and former Director for African Affairs at the National Security Council. He is the co-founder of the Enough Project, a nonprofit human rights organization affiliated with the Center for American Progress. Prendergast is a board member and serves as Strategic Advisor to Not On Our Watch Project.[6] He is also a member of the faculty and Advisory Board of the International Peace and Security Institute (IPSI).[7]" />
                      <outline text="In the latter half of the 1980s and the first half of the 1990s, Prendergast worked for a variety of organizations in the U.S. and Africa,[8][9][10] focusing primarily on peace and human rights. At the end of 1996, he joined the National Security Council as Director for African Affairs[11] and thereafter served as a special adviser to Susan Rice at the United States Department of State.[12] As a special adviser, Prendergast was part of the facilitation team behind the successful two-and-a-half-year U.S. effort to broker an end to the Eritrean&apos;&apos;Ethiopian War.[13] Prendergast left government in 2001 to become Special Adviser to the President of the International Crisis Group on Africa issues,[14] and in 2007, with Gayle Smith, he co-founded the Enough Project, housed at the Center for American Progress." />
                      <outline text="Under the Enough Project umbrella, Prendergast has helped create a number of initiatives and campaigns. With George Clooney, he helped launch the Satellite Sentinel Project, which aims to prevent conflict and human rights abuses through satellite imagery. With Tracy McGrady and other NBA players, Prendergast co-founded the Darfur Dream Team: Sister Schools Initiative to fund schools in Darfurian refugee camps and create partnerships with schools in the United States. He helped launch two campaigns under Enough: the Raise Hope for Congo Campaign, highlighting the issue of conflict minerals, and Sudan Now,[15] focused on bringing peace to that embattled country." />
                      <outline text="Prendergast has written extensively on Africa and is the author or co-author of ten books. His previous two books were co-authored with Don Cheadle: Not On Our Watch, a New York Times bestseller and NAACP non-fiction book of the year,[16] and The Enough Moment: Fighting to End Africa&apos;s Worst Human Rights Crimes. His most recent book, Unlikely Brothers,[17] is a dual memoir co-authored with his first little brother in the Big Brothers program." />
                      <outline text="Prendergast has appeared in four episodes of 60 Minutes,[18][19][20][21] and helped create African characters and stories for two episodes of Law &amp; Order: Special Victims Unit, one focusing on the recruitment of child soldiers[22] and the other on rape as a war strategy.[23] He has also traveled to Africa with Dateline NBC,[24]ABC&apos;s Nightline,[25] The PBS NewsHour with Jim Lehrer[26] and CNN&apos;s Inside Africa." />
                      <outline text="Prendergast has appeared in several documentaries including: Sand and Sorrow, Darfur Now, 3 Points,[27] and War Child.[28] He co-produced Journey Into Sunset,[29] and is Executive Producer of Staging Hope: Acts of Peace in Northern Uganda,[30] both about Northern Uganda, and partnered with Downtown Records and Mercer Street Records to create the compilation album Raise Hope for Congo,[31] combating sexual violence against women and girls in the Democratic Republic of Congo." />
                      <outline text="Prendergast has been a visiting professor at many universities and colleges, including Yale Law School, Stanford University, and Columbia University. He has been awarded six honorary doctorates.[32]" />
                      <outline text="." />
                      <outline text="Unlikely Brothers by John Prendergast and Michael Mattocks, published by Random House, May 17, 2011 ISBN 978-0-307-46484-2The Enough Moment: Fighting to End Africa&apos;s Worst Human Rights Crimes by John Prendergast with Don Cheadle, published by Random House, 2010 ISBN 978-0-307-46482-8Not On Our Watch: The Mission to End Genocide in Darfur and Beyond, by Don Cheadle, John Prendergast, published by Hyperion, 2007 ISBN 978-1-4013-0335-8Crafting Peace: Strategies to Deal with Warlords in Collapsing States, by Sasha Lezhnev, John Prendergast, published by Lexington Books, 2006 ISBN 978-0-7391-1765-1Blood and Soil: Land, Politics and Conflict Prevention in Zimbabwe and South Africa, by John Prendergast, published by International Crisis Group, 2004 ISBN 978-0-9760853-0-0God, Oil &amp; Country: Changing the Logic of War in Sudan, principal author, John Prendergast, published by International Crisis Group, (Africa Report, 39), January 28, 2002 ASIN: B000FPCBPCrisis Response: Humanitarian Band-aids in Sudan and Somalia, principal author, John Prendergast, Inc NetLibrary, NetLibrary, Inc., published by Center of Concern, 1997 ISBN 978-0-585-38030-8Frontline Diplomacy: Humanitarian Aid and Conflict in Africa, by John Prendergast, Center of Concern (Washington, D.C.), published by L. Rienner, 1996 ISBN 978-1-55587-696-8Civilian Devastation: Abuses by All Parties in the War in Southern Sudan, by Jemera Rone, John Prendergast, Karen Sorensen, Human Rights Watch/Africa, Human Rights Watch (Organization), published by Human Rights Watch, 1994 ISBN 978-1-56432-129-9Without Troops &amp; Tanks: The Emergency Relief Desk and the Cross Border Operation into Eritrea and Tigray, by Mark R. Duffield, John Prendergast, published by The Red Sea Press, 1994 ISBN 978-1-56902-003-6Peace, Development, and People of the Horn of Africa, by John Prendergast, Bread for the World (Organization). Institute on Hunger &amp; Development, Center of Concern (Washington, D.C.), published by Center of Concern, 1992 ISBN 978-0-9628058-2-0References[edit]&#094;&quot;Huffington Post 2011 Game Changers&quot;. &#094;&quot;United Nations Correspondents Association Citizen of the World Award&quot;. &#094;&quot;Lyndon Baines Johnson Moral Courage Award&quot;. &#094;&quot;Princeton University Crystal Tiger Award&quot;. &#094;&quot;The Center for African Peace and Conflict Resolution Peace Award&quot;. &#094;&quot;Not On Our Watch Project&quot;. March 17, 2011. &#094;&quot;IPSI&quot;. International Peace and Security Institute. October 3, 2012. &#094;&quot;USIP&quot;. &#094;&quot;UNICEF&quot;. &#094;&quot;Human Rights Watch&quot;. &#094;&quot;Official Delegation Accompanying the President to Africa&quot; (Press release). March 20, 1998. &#094;&quot;Crisis in Darfur&quot;. Mother Jones. December 20, 2000. &#094;&quot;U.S. Leadership in Resolving African Conflict: The Case of Ethiopia-Eritrea&quot;. Not On Our Watch. September 2001. &#094;&quot;Sudan: Now or Never in Darfur&quot;. International Crisis Group. May 23, 2004. &#094;&quot;Sudan Now.&quot;. &#094;&quot;39th NAACP Image Award Winners&quot;. NAACP. &#094;&quot;Redemption through Brotherhood&quot;. Washington Post. May 15, 2011. &#094;&quot;Witnessing Genocide in Sudan&quot;. CBS News. August 28, 2005. &#094;&quot;Searching for Jacob&quot;. CBS News. October 22, 2006. &#094;&quot;Searching for Jacob,&quot;. CBS News. July 16, 2008. &#094;&quot;Congo&apos;s Gold&quot;. CBS News. November 29, 2009. &#094;&quot;Law &amp; Order: Special Victims Unit, &quot;Hell&quot;&quot;. NBC. March 31, 2009. &#094;&quot;Law &amp; Order: Special Victims Unit, &quot;Witness&quot;&quot;. NBC. March 17, 2010. &#094;&quot;Dateline, Winds of War&quot;. NBC News. December 3, 2010. &#094;&quot;A View from the Ground on the Killing in Northeast Africa&quot;. February 9, 2005. &#094;&quot;Crisis in Sudan.&quot;. The PBS NewsHour with Jim Lehrer. October 20, 2004. &#094;&quot;3 Points&quot;. &#094;&quot;War Child&quot;. &#094;&quot;Journey Into Sunset&quot;. &#094;&quot;Staging Hope: Acts of Peace in Northern Uganda&quot;. &#094;&quot;Raise Hope for Congo&quot;. &#094;Enough Project biographyExternal links[edit]PersondataNamePrendergast, JohnAlternative namesShort descriptionAmerican human rights activistDate of birthMarch 21, 1963Place of birthIndianapolis, Indiana, United StatesDate of deathPlace of death" />
              </outline>

              <outline text="Nonprofit Report for NOT ON OUR WATCH INC">
                      <outline text="Link to Article" type="link" url="http://www.guidestar.org/organizations/20-8827879/not-our-watch.aspx" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387863986_H5EjBbLE.html" />
      <outline text="Tue, 24 Dec 2013 05:46" />
                      <outline text="" />
                      <outline text="Basic Organization InformationNOT ON OUR WATCH INC" />
                      <outline text="Physical Address:Encino, CA 91436 EIN:20-8827879Web URL:www.notonourwatchpro... NTEE Category:Q nternational, Foreign Affairs, and National Security Q70 (International Human Rights) Ruling Year:2007 Sign in or create an account to see this organization&apos;s full address, contact information, and more!" />
                      <outline text="Mission StatementTO FOCUS GLOBAL ATTENTION AND RESOURCES TOWARDS PUTTING AN END OF MASS ATROCITIES AROUND THE WORLD. DRAWING ON THE POWERFUL VOICES OF ARTISTS, ACTIVISTS AND CULTURAL LEADERS, NOT ON OUR WATCH GENERATES LIFESAVING HUMANITARIAN ASSISTANCE AND PROTECTION FOR THE VULNERABLE" />
                      <outline text="Expert AssessmentThere are no Expert Reviews for this organization. Learn more about TakeAction@GuideStar.Impact Summary from the NonprofitThis organization has not provided an impact summary." />
                      <outline text="Personal ReviewsThere are no reviews for this organization." />
                      <outline text="A multi-year analysis of key balance sheet, income statement, profitability and liquidity measures is available for this organization. Financial SCAN includes a detailed financial health analysis and peer comparison and benchmarking tool. Learn More" />
                      <outline text="Key Financial SCAN FeaturesFinancial Health Dashboard: Highlights key financial trends and ratios for a selected nonprofit organization over a period of up to five years.Peer Comparison Dashboard: Compares the organization&apos;s financials with up to five peer nonprofits that you select.Graphical Analysis: Provides multi-year graphs and an interpretive guide in a format ready to present to your clients.Printable PDF Report: Provides a complete analysis of the organization for your records. The full report tells you what to look for and why it matters.Advanced Search: Allows you to search by EIN (Employer Identification Number), organization name, city, state, revenue, expenses, and assets.Revenue and ExpensesRevenue and Expense data from Forms 990 for 2011, 2010, 2009, 2008, 2007 are included in the GuideStar Premium Report. Upgrade NowReport Added To Cart" />
                      <outline text="Balance SheetBalance Sheet data from Forms 990 for Year 2011, 2010, 2009, 2008, 2007 are included in the GuideStar Premium Report. Upgrade NowReport Added To Cart" />
                      <outline text="A multi-year analysis of key balance sheet, income statement, profitability and liquidity measures is available for this organization. Financial SCAN includes a detailed financial health analysis and peer comparison and benchmarking tool. Learn More" />
                      <outline text="Key Financial SCAN FeaturesFinancial Health Dashboard: Highlights key financial trends and ratios for a selected nonprofit organization over a period of up to five years.Peer Comparison Dashboard: Compares the organization&apos;s financials with up to five peer nonprofits that you select.Graphical Analysis: Provides multi-year graphs and an interpretive guide in a format ready to present to your clients.Printable PDF Report: Provides a complete analysis of the organization for your records. The full report tells you what to look for and why it matters.Advanced Search: Allows you to search by EIN (Employer Identification Number), organization name, city, state, revenue, expenses, and assets.Forms 990 Provided by the NonprofitFinancial StatementsAudited Financial Statement is not available for this organization." />
                      <outline text="Leadership" />
                      <outline text="Highest Paid Employees &amp; Their CompensationHighest Paid Employee Data for 2011, 2010, 2009, 2008, 2007 are included in the GuideStar Premium Report. Upgrade NowReport Added To Cart" />
                      <outline text="Program:Budget:--Category:Population Served:Program Description:" />
                      <outline text="Program Long-Term Success:" />
                      <outline text="Program Short-Term Success:" />
                      <outline text="Program Success Monitored by:" />
                      <outline text="Program Success Examples:" />
                      <outline text="Evidence of ImpactExpert Comments" />
                      <outline text="There are no comments available for this organization." />
                      <outline text="Organizational StrengthsExpert Comments" />
                      <outline text="There are no comments available for this organization." />
                      <outline text="Areas for ImprovementExpert Comments" />
                      <outline text="There are no comments available for this organization." />
              </outline>

              <outline text="1333 h street ne 10th floor washington dc - Google Search">
                      <outline text="Link to Article" type="link" url="https://www.google.com/search?q=1333+h+street+ne+10th+floor+washington+dc&amp;ie=UTF-8&amp;oe=UTF-8&amp;hl=en&amp;client=safari&amp;gbv=1&amp;sei=Xx25UrelEJDTkQet_IHwCQ" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387863393_gGpAuK2M.html" />
      <outline text="Tue, 24 Dec 2013 05:36" />
                      <outline text="" />
                      <outline text="About 69,700 results" />
                      <outline text="Contact Us - The Century FoundationOne Whitehall Street 15th Floor New York, NY 10004. Phone: 212-452-7700 ...1333 H St NW 10th Floor Washington, DC 20005. Phone: 202-387-0400Contact Us | Center for American ProgressYou can mail or visit us here: Center for American Progress 1333 H Street, NW,10th Floor Washington, DC 20005. View Map ...School of Public Health @ UMD : Department of Family Science ...www.sph.umd.edu/fmsc/centers/other_centers.html- Cached - Similar11 Dupont Circle NW, 2nd Floor, Washington, DC 20036. American Associationfor ...1333 H Street NW, 10th Floor, Washington, DC 20005. Children&apos;s Defense ...1333 H Street - Wikipedia, the free encyclopedia14th and H Streets, NW. ...Floor area, 269,151 sq ft (25,004.9 m2) ...1333 HStreet is a high-rise building in Washington, D.C. The building rises 12 floors and ...H Street Guide | H Street - Washington, DC, H Street Restaurants ...A guide to the H Street Corridor in NE Washington, DC.Search results for &apos;Holiday reception&apos; in entertainment - Political ...politicalpartytime.org/search/.../Holiday%20reception/?page...- Cached... General Contractors (AGC) of America Townhouse, 53 D Street SE,Washington, DC ... 1333 H St. NW, 10th Floor, 1333 H St. NW, 10th Floor,Washington, DC.Search results for &apos;Holiday reception&apos; in entertainment - Political ...politicalpartytime.org/search/.../Holiday%20reception/?sort...- Cached... Reception, Occidental Restaurant, 1475 Pennsylvania Ave NW, Washington,DC ... 1333 H St. NW, 10th Floor, 1333 H St. NW, 10th Floor, Washington, DC.Actions | Generation Progressgenprogress.org/actions/page/41/- CachedOmni Shoreham Hotel, 2500 Calvert St NW, Washington, DC 20008 ... Center forAmerican Progress, 10th Floor, 1333 H Street, NW, Washington, DC, 20005 ...Center for American Progress, 1333 H St NW, 11th Floor, Washington, D.C.Washington, DC - The Pew Charitable Trustswww.pewtrusts.org/events.aspx?location=Washington,%20DC- Cached - SimilarThis event held at Pew&apos;s Washington, D.C. office, focuses on state funding of pre-k education for ... 1025 F Street NW, 9th Floor ....1333 H St. NW, 10th FloorOfficial Congressional Directory, 2005-2006, 109th Congress, ... - Google Books Resultbooks.google.com/books?id=L-_zoKQ-mvQC" />
                      <outline text="(847) 267-7000; 1015 15th Street NW., Suite 1000, Washington DC 20005: John...10th Street NE., Washington DC 20002: Natalie C. Holmes, Erika Fitzpatrick. ...(202) 312-6072; 1333 H Street NW., Washington, DC 20005: Pamela SusanMoore. ... GROUP&apos;-- (410) 244-7101; 729 East Pratt Street, 5th Floor, Baltimore,MD, ..." />
              </outline>

              <outline text="ENOUGH PROJECT FUNDED-Press Room | Satellite Sentinel Project">
                      <outline text="Link to Article" type="link" url="http://satsentinel.org/press-room" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387863194_VkjxpwxF.html" />
      <outline text="Tue, 24 Dec 2013 05:33" />
                      <outline text="" />
                      <outline text="Who We Are and What We DoThe Satellite Sentinel Project, or SSP, a partnership between the Enough Project and DigitalGlobe, conducts monitoring of the border between Sudan and South Sudan to assess the human security situation, identify potential threats to civilians, and detect, deter and document war crimes and crimes against humanity. The Enough Project provides field research, policy context, and communications strategy. DigitalGlobe provides imagery from its constellation of satellites and geospatial analysis from the DigitalGlobe Analysis Center. SSP is funded primarily by Not On Our Watch." />
              </outline>

              <outline text="DEAD CHARITY-Not On Our Watch">
                      <outline text="Link to Article" type="link" url="http://notonourwatchproject.org/press" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387863048_5ZCyS9xM.html" />
      <outline text="Tue, 24 Dec 2013 05:30" />
                      <outline text="" />
                      <outline text="Not On Our Watch continues to press for an end to mass atrocities and gross violations of human rights around the world. For press coverage of our advocacy and aid projects, please click on the links below." />
                      <outline text="April 20th 2010Aid: Not On Our Watch Grant to US Fund for UNICEF/Maternal Mortality in Southern SudanJanuary 15th 2010Aid: Not On Our Watch Grant to Partners In Health/Emergency Medical Efforts for Haiti EarthquakeJune 2nd 2009Aid: Not On Our Watch Grant to UNICEF/Child Refugee Protection ProgramsMay 15th 2009Advocacy: Artists, Politicians Call for Aung San Suu Kyi ReleaseFebruary 19th 2009Aid: Not On Our Watch Grant to UN World Food Programme/Food AssistanceDecember 11th 2008Aid: Not On Our Watch Grant to CARE/Peace-Building and LivelihoodAid: Not On Our Watch Grant to Oxfam/Food Security and Water SanitationAid: Not On Our Watch Grant to IRC/Health ServicesNovember 21st 2008Advocacy: Not On Our Watch Board Op Ed on Darfur in Wall Street JournalJune 2nd 2008Advocacy: Burma&apos;s Broken Promises &apos;-- Statement by Nobel Laureates and Former SE Asian LeadersMay 13th 2008Aid: Not On Our Watch Grant to Save the Children/Emergency Cyclone Nargis ReliefMarch 13th 2008Aid: Not On Our Watch 2nd Grant to UN World Food Programme/Humanitarian Air ServiceJune 27th 2007Aid: Not On Our Watch Grant to Save the Children/Assistance for Women &amp; ChildrenAid: Not On Our Watch Grant to UN World Food Programme/Humanitarian Air ServiceJune 26th 2007Aid: Not On Our Watch Grant to UN World Food Programme/Humanitarian Air ServiceJune 7th 2007Aid: Not On Our Watch Grant to IRC/Emergency &amp; Lifesaving Programs in DarfurAid: Not On Our Watch Grant to Oxfam/LIfesaving &amp; Humanitarian Aid" />
              </outline>

              <outline text="CAF-Enough Project">
                      <outline text="Link to Article" type="link" url="http://enoughproject.org/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387862879_92SMwMDR.html" />
      <outline text="Tue, 24 Dec 2013 05:27" />
                      <outline text="" />
                      <outline text="On sale now! Human rights activist John Prendergast and Oscar-nominated actor Don Cheadle bring us an empowering and hopeful new book, as they reveal the steps being taken by engaged citizens&apos;--&quot;Upstanders&quot;&apos;--famous and unknown, here and abroad, to combat genocide, rape, and child soldierdom in Africa." />
              </outline>

              <outline text="Preventing South Sudan&apos;s Inferno - The Daily Beast">
                      <outline text="Link to Article" type="link" url="http://www.thedailybeast.com/articles/2013/12/20/preventing-south-sudan-s-inferno.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387862544_6SRF4Cd5.html" />
      <outline text="Tue, 24 Dec 2013 05:22" />
                      <outline text="" />
                      <outline text="World NewsAfter suffering so long for independence, South Sudan faces a new civil war. What the country&apos;s leaders and the international community can do to contain the crisis." />
                      <outline text="The world&apos;s youngest country, a mere two and a half years old, now stands on the precipice of a new civil war which threatens to hurl South Sudan back into the violence from which it just emerged. For the South Sudanese who fought and suffered so dearly for their independence, and for those around the world who supported the new state, this development is tragic and disappointing, but it is hardly surprising or without vast precedent." />
                      <outline text="Most African countries that emerged from colonial rule or long periods of dictatorship have experienced rocky transitions marked by violence and coups. Sudan itself, from which South Sudan split in 2011, was born into a civil war and has been rocked by three major coups since independence in 1956. Similar stories have plagued the neighboring states of Uganda, Eritrea, Ethiopia, Chad, and Congo. South Sudan&apos;s own fledgling state has been rendered vulnerable by a major rift in the country&apos;s political leadership, where past unresolved grievances were left to fester." />
                      <outline text="When politicians use ethnic mobilization to promote their agendas, violence can metastasize quickly. The potential for explosion in South Sudan is even worse because of the billions of petro-dollars that have poured into the country, much of which were used to purchase sophisticated weaponry." />
                      <outline text="That there were going to be problems and even eruptions in the early years of this new republic was widely predicted. What is much more unpredictable, however, is how South Sudan&apos;s leaders react to this, the biggest crisis their new country has yet faced. How they respond will dictate South Sudan&apos;s fate for years to come, and decide whether it has a future more like prosperous Botswana or bloody Somalia." />
                      <outline text="What is much more unpredictable, however, is how South Sudan&apos;s leaders react to this, the biggest crisis their new country has yet faced." />
                      <outline text="The worst-case scenario is rapidly unfolding: political and personal disputes are escalating into an all-out civil war in which certain ethnic groups are increasingly targeted by the others&apos; forces and the rebels take over the oilfields. This will inevitably bring opportunistic leaders from neighboring Sudan into the fray, as Khartoum&apos;s government has long exploited divisions within South Sudan and provided support to various armed groups to sow further division and destruction. Certainly the Sudan regime might see the instability in the oilfields as an opportunity to aggressively move into bordering regions, take possession of some of the southern oil areas, and keep the oil flowing northward." />
                      <outline text="There is a real opportunity here for South Sudanese leaders and the broader international community to respond in ways that could prevent the country from plunging into chaos and protracted conflict." />
                      <outline text="President Salva Kiir has an opportunity to demonstrate leadership by following up on his offer of dialogue with his opponents, releasing political prisoners, appealing for calm through television and radio, and pressing those troops that remain loyal to not commit human rights abuses. Should the president indicate a willingness to openly discuss the deep political grievances that are driving the violence, and do so inclusively, that would send a strong signal that peace is possible. The leading rebel, former Vice President Riek Machar, must stop inflaming the situation by calling for the ouster of the current government and indicate his willingness to negotiate with President Kiir and work within the rule of law for the restoration of an inclusive government and elections in 2015." />
                      <outline text="The United Nations could play the most critical role in containing the crisis in South Sudan. There is much international hand-wringing and regret that not much can be done when violence is so quickly escalating. But recent examples in Congo and Ivory Coast demonstrate that when a UN force on the ground is buttressed with a more robust mandate and greater international support, very positive outcomes are possible. And the recent international mobilization to respond to the conflict in the Central African Republic shows that when political will is generated, military assets can be deployed quickly in defense of civilians." />
                      <outline text="Given those models, the UN Security Council can save countless lives by sharpening the civilian protection mandate of the UN force already on the ground, giving it additional resources to do the job, and instructing it to create safe havens in which vulnerable populations can take shelter. The UN mission could also be supported by New York headquarters to be more proactive in ensuring humanitarian aid reaches the neediest, thus preventing the health and nutritional crises that in the past made South Sudan one of the deadliest conflict zones globally since World War II. The Security Council could also authorize a group of experts to begin collecting evidence of war crimes for possible future referral to the International Criminal Court." />
                      <outline text="Finally, the United States should immediately deploy its Special Envoy for the Sudans, Donald Booth, and a team of diplomats who can deliver strong messages to key leaders and to the broader South Sudanese public, as well as support mediation efforts led by neighboring African states as well as South Sudanese church leaders." />
                      <outline text="Two and a half million South Sudanese died for the creation of this new state. With robust international action and statesmanship by South Sudan&apos;s leaders, millions more deaths can be prevented." />
                      <outline text="George Clooney, a co-founder of Not On Our Watch, and John Prendergast, a co-founder of the Enough Project (enoughproject.org), together founded and run the Satellite Sentinel Project (satsentinel.org), an initiative focused on preventing mass atrocities." />
              </outline>

              <outline text="South Sudan Crisis Explained (Like You&apos;re an Idiot) - ABC News">
                      <outline text="Link to Article" type="link" url="http://abcnews.go.com/m/story?id=21314172&amp;ref=https://www.google.com/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387862490_59NBjSLD.html" />
      <outline text="Tue, 24 Dec 2013 05:21" />
                      <outline text="" />
                      <outline text="Helicopters evacuated more than a dozen U.S. citizens from South Sudan Sunday, but thousands of other foreigners will likely spend Christmas in the world&apos;s youngest country as an ethnic conflict there spirals toward civil war." />
                      <outline text="The United Nations estimates that nearly 1,000 people have been killed, and 45,000 displaced, in clashes between the Dinka and Nuer tribes since violence began Dec. 15 amid rumors of a power grab and a failed coup attempt." />
                      <outline text="READ: Trapped U.S. Relief Workers Flown Out of Violence-Torn South Sudan" />
                      <outline text="In a deeply impoverished nation that sits on millions of barrels of untapped oil, the conflict is years in the making. It&apos;s complicated, but we promise to talk really, really slowly." />
                      <outline text="South Sudan? Never heard of it. The only Sudan I care about is the one with George Clooney in it." />
                      <outline text="South Sudan is the world&apos;s newest country. After a referendum in 2011, 98 percent of the East African country&apos;s population voted to declare independence from Sudan. The people of South Sudan are largely black and Christian. For years, they fought a bloody war for independence from Sudan, a nation ruled by Arab Muslims." />
                      <outline text="(The Sudanese government in Karthoum had cracked down on non-Muslim populations for years, including a bloody conflict in the western region of Darfur. That&apos;s where George Clooney focused attention in the early 2000s.)" />
                      <outline text="South Sudan is rich in oil reserves. &quot;Since independence, South Sudan has struggled with good governance and nation building and has attempted to control rebel militia groups operating in its territory. Economic conditions have deteriorated since January 2012 when the government decided to shut down oil production following bilateral disagreements with Sudan,&quot; according to the CIA." />
                      <outline text="Who is in charge over there? It sounds like the Wild West." />
                      <outline text="Funny you should mention the Wild West. South Sudan&apos;s president is Salva Kiir, an ethnic Dinka, who has worn the black cowboy hat given to him as a gift by President George W. Bush every day since receiving it in 2006." />
                      <outline text="Kiir blames the fighting, which began Dec. 15 and has resulted in the deaths of 1,000 people, on a failed coup by former Vice President Riek Machar, an ethnic Nuer. Other officials say the fighting began as a turf war between Dinka and Nuer members of the presidential guard, which spread throughout the country." />
                      <outline text="When members of a Nuer ethnic militia began fighting in Bor, a large city populated mainly by Dinkas, the death toll rapidly rose and foreign governments sought to airlift their citizens." />
                      <outline text="Good thing we&apos;re getting the Americans out of there. Seal Team Six, heck yeah!" />
                      <outline text="The United States has evacuated slightly more than 300 known U.S. citizens from Bor in the past week. Civilian helicopters and those operated by the U.N. airlifted about 15 Americans Sunday, but the operation was far from flawless." />
                      <outline text="Three Navy-operated Osprey aircraft, the ones that fly like planes but land like helicopters, were shot at Saturday while landing in Bor to pick up U.S. citizens. They were special forces operators but not from Seal Team Six. Four service members were injured in the attack before the mission was called off." />
                      <outline text="Thousands of other foreigners, including Britons, Australians, Canadians and South Africans, are expected to remain in the country for at least several more days before their countries can evacuate them." />
                      <outline text="That doesn&apos;t sound like a happy Christmas." />
                      <outline text="U.S. Secretary of State John Kerry and Donald Booth, the U.S. envoy for South Sudan, have pressured President Kiir to call for a Christmas ceasefire. Most observers, however, believe that fighting will continue." />
                      <outline text="Thounsands of internally displaced people have sought protection at U.N .bases in Bor and the country&apos;s capital, Juba." />
                      <outline text="UN Secretary-General Ban Ki-moon has asked the Security Council to send additional troops, police and logistical assets to South Sudan and move U.N. peacekeepers from elsewhere in Africa." />
                      <outline text="&quot;Those responsible at the senior level will be held personally accountable and face the consequences, even if they claim they had no knowledge of the attacks,&quot; Ban said in a statement." />
              </outline>

              <outline text="US Sends Marines to Djibouti, Preparing South Sudan Intervention">
                      <outline text="Link to Article" type="link" url="http://news.antiwar.com/2013/12/23/us-sends-marines-to-djibouti-preparing-south-sudan-intervention/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387862350_urKSrWxB.html" />
        <outline text="Source: News From Antiwar.com" type="link" url="http://news.antiwar.com/feed/" />
      <outline text="Tue, 24 Dec 2013 05:19" />
                      <outline text="" />
                      <outline text="The Obama Administration has deployed some 150 Marines to a military base in Djibouti, with an eye toward intervention in South Sudan&apos;s growing civil war." />
                      <outline text="The Marines were a &apos;&apos;crisis-response team,&apos;&apos; according to officials, and had previously been located in Spain, but were ordered to Djibouti after the wounding of four US troops in weekend evacuations of Americans from South Sudan." />
                      <outline text="South Sudan blamed the rebels for firing on a US warplane involved in the evacuations, and as rebels take control of oil-rich regions of the fledgling nation, the administration is likely to see growing pressure to intervene on behalf of the government to &apos;&apos;protect&apos;&apos; foreign investment in those regions." />
                      <outline text="The conflict follows a failed military coup by troops loyal tol former Vice President Riek Machar, and a split along ethnic lines between the Nuer and the Dinka." />
                      <outline text="Last 5 posts by Jason Ditz" />
              </outline>

              <outline text="Two Years After Death, Wife Gives Wonderful Gift To Her Husband">
                      <outline text="Link to Article" type="link" url="http://crooksandliars.com/2013/12/two-years-after-death-wife-gives-wonderful" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387862245_YcceLBvm.html" />
        <outline text="Source: " type="link" url="http://feeds.feedburner.com/crooksandliars/YaCP" />
      <outline text="Tue, 24 Dec 2013 05:17" />
                      <outline text="" />
                      <outline text="I&apos;ve known people who remarried after losing a spouse, and there&apos;s often a lingering sense of guilt. What a wonderful way to let your loved one move on with your blessing!" />
                      <outline text="David Schmitz knew his wife loved him, but she confirmed the depth of her affection and fondness for him and their children with a surprise gift this Christmas &apos;-- two years after she died from cancer." />
                      <outline text="The Iowa father of four received the gift after being called into a Des Moines radio station, KSTZ, for a popular, decades-old program held every year in which the station grants Christmas wishes to listeners." />
                      <outline text="&apos;&apos;I didn&apos;t have an idea what it was about,&apos;&apos; Schmitz told NBC&apos;s Mike Taibbi." />
                      <outline text="A letter, written two years ago from his wife, had made its way to the radio station and was read on air." />
                      <outline text="&apos;&apos;Hello, my name is Brenda. When you are in receipt of this letter I will have already lost my battle to ovarian cancer,&apos;&apos; the letter started." />
                      <outline text="In the summer of 2011, Brenda had asked a friend to send the letter anonymously to the station once her husband had found a new love, just as she had wished for him. This year, David got engaged to Jayne, who has two children of her own." />
                      <outline text="Brenda had three wishes on her list, including one for her children&apos;s new stepmother." />
                      <outline text="&apos;&apos;First, for David&apos;s new life-long partner, a day or better yet, a weekend, of pampering in all aspects of her life. She deserves it,&apos;&apos; she wrote. &apos;&apos;Make her smile, and know her efforts are truly appreciated from me. Thank you. I love you, whoever you are.&apos;&apos;" />
                      <outline text="Her other wishes were for a night of food, drink and fun for the Mercy Hospital staff that took care of her while she battled ovarian cancer." />
                      <outline text="David told NBC News he was in shock at Brenda&apos;s wishes for his new family." />
                      <outline text="Her third and final wish was for a magical vacation for her husband and his new blended family at a place &quot;where they all can enjoy their company and companionship as a family and create those memories that will be with them forever.&quot;" />
                      <outline text="&apos;&#134;&apos; Story continues below &apos;&#134;&apos;" />
                      <outline text="The radio station granted all three wishes, sending David and his extended crew to Disney World." />
              </outline>

              <outline text="How typical is Phil Robertson&apos;s view of gay sex?">
                      <outline text="Link to Article" type="link" url="http://www.volokh.com/2013/12/23/typical-phil-robertsons-view-gay-sex/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387862114_5D7fMEj8.html" />
        <outline text="Source: The Volokh Conspiracy" type="link" url="http://feeds.feedburner.com/volokh/mainfeed" />
      <outline text="Tue, 24 Dec 2013 05:15" />
                      <outline text="" />
                      <outline text="One question that has come up in the Duck Dynasty dispute is how typical is Phil Roberston&apos;s view that homosexual behavior is a sin." />
                      <outline text="In recent years, the public has been moving from a majority believing that sexual relations between people of the same gender is always wrong to roughly equal numbers believing that it&apos;s always wrong and believing that it&apos;s not wrong at all." />
                      <outline text="Indeed, less than two years ago, our President finally came around to embrace views on gay marriage that I expect a majority of us at the Volokh Conspiracy have long held." />
                      <outline text="In searching through polls archived at the Roper Center, I found these surveys showing the split over gay sex:" />
                      <outline text="May 2013: Do you think it is a sin, or not, to engage in homosexual behavior?(Source: Pew Research Center for the People &amp; the Press Political Survey)" />
                      <outline text="45% Is a sin45% Is not a sin10% Don&apos;t know/Refused" />
                      <outline text="March 2013: Do you personally believe that sex between two adults of the same gender is a sin, or not? (Source: Public Religion Research Institute Religion &amp; Politics Tracking Survey)" />
                      <outline text="44% Yes, is a sin46% No, is not a sin10% Don&apos;t know/Refused" />
                      <outline text="Mar-Aug, 2012: What about sexual relations between two adults of the same sex&apos;&apos;do you think it is always wrong, almost always wrong, wrong only sometimes, or not wrong at all?(Source: 2012 General Social Survey, % of those expressing an opinion, weighted responses)" />
                      <outline text="46% Always wrong3% Almost always wrong8% Wrong only sometimes44% Not wrong at all" />
                      <outline text="July 2011: Do you personally believe that sex between two adults of the same gender is a sin, or not?(Source: Public Religion Research Institute Millennials, Religion &amp; Gay and Lesbian Issues Survey)" />
                      <outline text="50% Yes, is a sin46% No, is not a sin4% Don&apos;t know/Refused" />
                      <outline text="2010 &amp; 2012 GSS: I further analyzed the combined 2010 and 2012 General Social Surveys because they have the highest quality data and in both years the same percentage believed that gay sex was always wrong (45.7%). (I weighted the data for household size and nonresponse error and followed the GSS default of treating nonresponses as missing.)" />
                      <outline text="Most people are in part the products of their own backgrounds, and Phil Robertson&apos;s background would make him more likely than most to believe that gay sex is always wrong." />
                      <outline text="Consider the percentages of the following groups thinking that gay sex is always wrong:" />
                      <outline text="54% of those born in the 1940-1950 period,65% of those from the East South Central region of the country,77% of those believing that the Bible is the literal word of God,72% of protestant fundamentalists, and51% of males." />
                      <outline text="Other groups in which a majority believe that gay sex is always wrong include:" />
                      <outline text="52% of male Democrats,60% of male Republicans, and63% of African Americans, including 58% of African-American females." />
                      <outline text="Categories" />
                      <outline text="Archives" />
              </outline>

              <outline text="Japan&apos;s 7-Eleven kingpin looks to U.S. to inspire online revolution">
                      <outline text="Link to Article" type="link" url="http://www.reuters.com/article/2013/12/24/us-sevenandi-online-stores-idUSBRE9BN03U20131224?feedType=RSS&amp;feedName=technologyNews" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387862021_kcqCZ77H.html" />
        <outline text="Source: Reuters: Technology News" type="link" url="http://feeds.reuters.com/reuters/technologyNews" />
      <outline text="Tue, 24 Dec 2013 05:13" />
                      <outline text="" />
                      <outline text="By Taiga Uranaka and Ritsuko Shimizu" />
                      <outline text="TOKYOMon Dec 23, 2013 10:43pm EST" />
                      <outline text="Toshifumi Suzuki, chairman and CEO of Seven And I Holdings Co Ltd speaks during an intewview with Reuters at its headquarters in Tokyo December, 18 2013." />
                      <outline text="Credit: Reuters/Yuya Shino" />
                      <outline text="TOKYO (Reuters) - The 81-year-old Japanese executive who built 7-Eleven into the world&apos;s biggest convenience store chain has a new mission: turning more than 50,000 bricks and mortar stores in Japan into portals to a new online retail empire." />
                      <outline text="To do it, Toshifumi Suzuki, the chief executive of department store to mail order retailer Seven &amp; I Holdings Co, is once again seeking inspiration in the United States. It&apos;s over 40 years since he kickstarted a revolution in Japanese retail by bringing 7-Eleven stores across the Pacific, eventually buying the U.S. owners after they sought bankruptcy protection." />
                      <outline text="In Suzuki&apos;s future vision, goods ordered online from Seven &amp; I&apos;s department stores and supermarkets, as well as outside partners, will be delivered to and picked up from the thousands of 7-Eleven stores spread across Japan at customers&apos; convenience. Most are open 24 hours a day." />
                      <outline text="&quot;I&apos;ve been talking for a while inside the company about integrating the real (bricks and mortar) side with the Internet, but nobody was taking it seriously,&quot; Suzuki told Reuters. In September, the Japanese retail guru decided to change all that." />
                      <outline text="He dispatched about 50 heads of the group&apos;s companies - his top lieutenants - on a mission to the U.S. He instructed them to visit retailers like Macy&apos;s Inc, shopping malls and Internet companies, examples of what he called &quot;omnichannel&quot; integration that are beginning to yield results - with orders to figure out how to apply it in Japan." />
                      <outline text="&quot;In the U.S. they observed, they listened and they realized that this was possible, and now they&apos;re all motivated,&quot; Suzuki said." />
                      <outline text="SEEKING PARTNERS" />
                      <outline text="Suzuki said the company is already in discussions on point-of-pickup arrangements for Japan with online retailers, including major players." />
                      <outline text="&quot;We&apos;ve had lots of approaches from people wanting to be partners,&quot; Suzuki said, although Amazon.com is not among them." />
                      <outline text="At the moment, 7-Eleven&apos;s stores in Japan don&apos;t offer the range of e-commerce services available at their U.S. counterparts. On the other side of the Pacific, for example, 7-Eleven maintains dedicated lockers for picking up merchandise ordered online from Amazon." />
                      <outline text="Amazon does have point-of-pickup arrangements with 7-Eleven&apos;s chief Japan rivals, FamilyMart Co Ltd and Lawson Inc. But 7-Eleven only offers such services for limited online product offerings, such as upscale cosmetics, purchased from other Seven and I retailers." />
                      <outline text="With no plans to step down any time soon, Suzuki has a reputation for a willingness to innovate and make big plays. In 1991, his company acquired a majority stake in its U.S. mentor and original 7-Eleven Inc owner Southland Corp." />
                      <outline text="The Japanese company then turned its U.S. unit around, transferring sophisticated data systems developed in the U.S. but refined in Japan, to manage inventories and optimize merchandise strategy at individual stores." />
                      <outline text="The company also pioneered many of the services and products - freshly prepared &quot;bento&quot; box meals, 24-hour banking and bill payments, a premium private label brand - that made Japan&apos;s convenience stores and especially 7-Eleven among the most profitable in the world." />
                      <outline text="To bolster its offerings in other retail segments, this month it acquired a 49.9 percent stake in the operator of 10 Barneys New York high-end apparel stores in Japan." />
                      <outline text="(Editing by Edmund Klamann and Kenneth Maxwell)" />
                      <outline text="Link thisShare thisDigg thisEmailPrintReprints" />
              </outline>

              <outline text="Almost Every Passenger On A Flight From Dubai To India Was Found Carrying 1 Kilo Of Gold">
                      <outline text="Link to Article" type="link" url="http://www.zerohedge.com/news/2013-12-23/almost-every-passenger-flight-dubai-india-was-found-carrying-1-kilo-gold" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387861950_TAuhsKPA.html" />
        <outline text="Source: Zero Hedge" type="link" url="http://feeds.feedburner.com/zerohedge/feed" />
      <outline text="Tue, 24 Dec 2013 05:02" />
                      <outline text="" />
                      <outline text="Submitted by Michael Krieger of Liberty Blitzkrieg blog," />
                      <outline text="Watching Indian bureaucrats attempt to halt more than one billion human beings&apos; desire for gold has been one of the more entertaining and pathetic stories of all of 2013. It is one that I have covered on many occasions, the latest being my post from earlier this month:  Gold Smuggling Increases 7x in India and Surpasses Illegal Drug Trade." />
                      <outline text="Well it appears the trend continues, potentially at an accelerated rate, as we just learned that, incredibly, &apos;&apos;almost every passenger on a flight from Dubai to Calicut was found carrying 1kg of gold.&apos;&apos; As I have said many times in the past, if an Indian wants their gold, they will have their gold." />
                      <outline text="CHENNAI: Faced with curbs on gold imports and crash in international prices leaving it cheaper in other countries, gold houses and smugglers are turning to NRIs to bring in the yellow metal legally after paying duty. Any NRI, who has stayed abroad for more than six months, is allowed to bring in 1kg gold." />
                      <outline text=" " />
                      <outline text="It was evident last week when almost every passenger on a flight from Dubai to Calicut was found carrying 1kg of gold, totalling up to 80kg (worth about Rs 24 crore). At Chennai airport, 13 passengers brought the legally permitted quantity of gold in the past one week." />
                      <outline text=" " />
                      <outline text="&apos;&apos;It&apos;s not illegal. But the 80kg gold that landed in Calicut surprised us. We soon got information that two smugglers in Dubai and their links in Calicut were behind this operation, offering free tickets to several passengers,&apos;&apos; said an official. The passengers were mostly Indian labourers in Dubai, used as carriers by people who were otherwise looking at illegal means, he said. &apos;&apos;We have started tracing the origin and route of gold after intelligence pointed to the role of smugglers,&apos;&apos; he said." />
                      <outline text=" " />
                      <outline text="Reports from Kerala said passengers from Dubai have brought more than 1,000kg of gold in the last three weeks. People who pay a duty of Rs 2.7 lakh per kg in Dubai still stand to gain at least Rs 75,000 per kg, owing to the price difference in the two countries. Gold dealers in Kerala say most of this gold goes to jewellery makers in Tamil Nadu and Andhra Pradesh." />
                      <outline text=" " />
                      <outline text="These government measures to control the current account deficit did not reduce the demand for gold in the market. &apos;&apos;RBI tried to discourage gold purchases because it doesn&apos;t have the utility of other commodities like oil or copper. It mostly sits there in lockers. But when the gold imports through proper channels have come down, merchants have started depending on illegal channels to meet the demand from consumers,&apos;&apos; he said." />
                      <outline text="As expected, a gigantic fail, but at least it served to enrich smugglers from across the region." />
                      <outline text="Full article here." />
                      <outline text="Average:Your rating: NoneAverage: 5(4 votes)" />
              </outline>

              <outline text="VIDEO-Transcript: Chief Negotiators, Dan Mullaney and Ignacio Garcia Bercero Hold a Press Conference Following the Third Round of Transatlantic Trade and Investment Partnership (TTIP) Talks | Office of the United States Trade Representative">
                      <outline text="Link to Article" type="link" url="http://www.ustr.gov/about-us/press-office/press-releases/2013/December/TTIP-Third-Round-Press-Conference-transcript" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387861385_9ujrhL72.html" />
      <outline text="Tue, 24 Dec 2013 05:03" />
                      <outline text="" />
                      <outline text="December 20, 2013Department of StateWashington, D.C. " />
                      <outline text="*As Delivered*" />
                      <outline text=" " />
                      <outline text="MODERATOR:  Good morning, everyone.  Thank you for being here.  Sorry to be a few moments late.  We&apos;d like to start this press conference right now.  This is the closing press briefing for the third round of the Transatlantic Trade and Investment Partnership negotiations.  I&apos;d like to introduce Ignacio Garcia Bercero and Dan Mullaney.  They will both make opening statements, and then we&apos;d like to open up to your questions.  " />
                      <outline text="We do ask that you limit your questions to one per outlet so everyone gets a chance to answer &apos;&apos; ask a question.  And we also ask that you limit your follow-up questions.  I will open the floor to Dan Mullaney now." />
                      <outline text=" " />
                      <outline text="MR. MULLANEY:  Thank you very much.  Thank you very much, Anne.  And good morning, everybody, and thank you very much for joining us as we report on the third round of the Transatlantic Trade and Investment Partnership negotiations, or TTIP as we call it.   " />
                      <outline text="As I said, we&apos;re now approaching the end of our third and final round for 2013 in these negotiations, so it&apos;s a good time for us to review where we are.  To recall, we began our negotiations this year in July with a week-long set of negotiations within a few weeks of the Administration&apos;s having completed its consultations with Congress, and within a few weeks of the commission having received its mandate from the Council.  We had a week-long set of negotiations, we had 24 different negotiating groups discussing the wide range of areas that we would anticipate would be part of a comprehensive trade and investment agreement.  " />
                      <outline text=" " />
                      <outline text="Each of the groups compared their approaches to each of the different areas, looked for areas of convergence, identified areas of divergence, and made plans for follow-on work into the second round.  The second round happened in Brussels and in video conferences during the week of November 11th.  And at that stage, the negotiating groups continued discussing their ideas and began to talk about specific negotiating proposals. " />
                      <outline text="So during the third round this week, the negotiating groups have been meeting on, again, virtually all of the areas that we would anticipate would be covered in the TTIP.  And just to recall, these areas include market access for industrial and agricultural products, and of course, the rules of origin for those products; we had the regulatory and standards group which focused on technical regulations; the sanitary and phytosanitary regulations primarily in the area of food safety, regulatory coherence, and particular sectors." />
                      <outline text=" " />
                      <outline text="We also discussed investment and services including in the areas of telecommunications, electronic commerce, cross-border services and financial services, and we covered government procurement, intellectual property, labor, environment, state-owned enterprises &apos;&apos; one of the issues of global concern &apos;&apos; small- and medium-size enterprises, localization barriers to trade, competition, raw materials and energy, and legal and institutional issues such as dispute settlement. " />
                      <outline text="So in each of these areas, the negotiating groups were fleshing out the earlier proposals and discussing new text and other proposals.  In several of the groups, the teams were also continuing their discussions on what we call the architecture of the agreement, that is, how issues we are addressing in each of these negotiating groups would be reflected in the text of an agreement, how they would work together, how these different areas would relate to each other.  In the regulatory area in particular, we are continuing our discussions of the various ways to facilitate the development of regulations on both sides of the Atlantic that both achieve the regulatory objectives &apos;&apos; for instance, our chosen levels of environmental protection, consumer protection, and health &apos;&apos; but also minimize or eliminate the costs and barriers to trade and investment that are caused by unnecessary divergences in these regulations." />
                      <outline text=" " />
                      <outline text="So we are continuing to undertake work, this regulatory work, across several intertwined areas, including horizontal or cross-cutting approaches to a wide range of regulatory and standards-based activities such as mechanisms or procedures that promote transparency, that promote participation, that promote accountability, as well as more specific discussions of the range of tools available to reduce unnecessary cost differences in particular sectors. " />
                      <outline text="A major source of growth of jobs that this agreement introduces will be the elimination of tariff barriers to trade.  Now that the Administration has received its advice from the International Trade Commission on the impact of tariff elimination, we are moving in this third round to discuss tariff elimination.  We do anticipate, however, that this work will need to take place &apos;&apos; to continue to take place in the fourth round after our exchange of tariff offers early next year.  So during this round, we also pursued and we will continue pursuing other important areas of market access, including government procurement and services. " />
                      <outline text=" " />
                      <outline text="Finally, in this third round, as in the previous two rounds, we continue to be guided by the important input that we received from a wide range of stakeholders.  As you know, the United States and European Union summarized their joint objectives in a joint report of the High-Level Working Group for Jobs and Growth in February.  The Administration further described its objectives in a letter that it sent to the U.S. Congress in March.  That letter is, by the way, available on our website.  And then since then, we&apos;ve held in innumerable meetings with a wide range of stakeholders to receive input on those objectives and to exchange views. " />
                      <outline text="Most recently, this past Wednesday during the course of the round, the U.S. and the EU negotiators took time to share information and hear viewpoints from more than 350 different stakeholders, from environmental groups, consumer, other nongovernmental organizations, labor, business, and academia.  This included a three-hour session that consisted of 50 &apos;&apos; more than 50 policy presentations that covered a range of issues, including consumer and food safety, innovation, and agriculture.  These sessions offered the stakeholders an opportunity to provide negotiators valuable feedback on the negotiating objectives for TTIP as we proceed with these talks." />
                      <outline text=" " />
                      <outline text="Following that session, Ignacio and I then conducted a briefing of a large group of stakeholders for about an hour and a half, and briefed on the status of the talks and answered questions.  I think I can speak for negotiators on both sides when I say that we found this exchange with stakeholders, through our ability to receive views and to exchange views with the stakeholders, to be extremely important as we determine the specifics of our way forward in these negotiations.  Because we believe that this agreement has to be one that increases growth, increases jobs, increases our international competitiveness, and that has a solid stakeholder support. " />
                      <outline text="As I said, this is our last round of 2013.  In early 2014, we anticipate taking stock at a political level of what we&apos;ve accomplished so far this year and planning on what we need to do to move this negotiation forward in the year 2014.  The exact timing of this assessment will depend on further discussions in January based on the work this week, which, as I mentioned, is still ongoing until the end of the day today.  So &apos;&apos; and we&apos;re also working on a schedule for several negotiating rounds in 2014." />
                      <outline text=" " />
                      <outline text="So thank you very much for your attention.  I&apos;ll turn the floor over to Ignacio now, and then we&apos;d be happy to answer any questions.  Thank you.  " />
                      <outline text="MR. BERCERO:  Thank you, Dan, and good morning to everyone.  As Dan has said, we can be satisfied about this round of negotiations.  We remain on track to deliver an ambitious trade and investment agreement that should boost our economies, deliver growth, and more importantly jobs, both for Europeans and for Americans.  And I cannot emphasize how important this is at this point in time. " />
                      <outline text=" " />
                      <outline text="We have had the opportunity (inaudible) which each side would like to see covered in this comprehensive trade agreement.  This has been possible because of a very strong mobilization of our teams, including a very active participation of regulators from both sides.  As we move forward towards the next negotiating rounds, I would like to emphasize a few considerations. " />
                      <outline text="On market access, I think it is critical that we maintain, both sides, a high level of ambition on all the three components of the market access agenda; that is to say on tariffs, on procurement, and on services and investment." />
                      <outline text=" " />
                      <outline text="On regulatory issues, progress should be achieved across the board, both on the so-called horizontal issues and on the specific sectors.   " />
                      <outline text="On rules for the next round, we should be able to intensify our work and our discussions on a range of important issues such as competition policy, trade-related aspects of energy and raw materials, sustainable development including labor and environment, and of course, there are others &apos;&apos; trade facilitation, et cetera.  And I would like to highlight that it will be critical that the TTIP achieve real and include benefits for the small and medium enterprises, and that this is reflected throughout the agreement, but also in a specific chapter within SME related issues." />
                      <outline text=" " />
                      <outline text="We anticipate a political (inaudible) early next year that will help in U.S. guidance on the way forward.  It is very clear for us that this is not a routine trade negotiation.  This agreement needs not just strong support from all stakeholders.  It needs &apos;&apos; and in fact, it cannot be done without the direct involvement from stakeholders.  This is because of the nature of what we have set out to do with an ambitious behind-the-border regulatory agenda.  The regulatory component of this negotiation in particular requires us to develop a much more substantial process of a stakeholder consultation. " />
                      <outline text="We have engaged again this week &apos;&apos; and Dan has referred to this &apos;&apos; with a very broad range of stakeholders.  We dedicated the full day of Wednesday to absorbing input from the stakeholder presentations and engaging in a question-and-answer session by them.  And I can relate  to you that also apart from these meetings, I had the opportunity while I was in Washington to have meetings with a broad range of stakeholders representing different interests &apos;&apos; business, environmental groups, consumer organizations, trade unions.  And I found this engagement very productive and very interesting." />
                      <outline text=" " />
                      <outline text="And I would like to also take this opportunity to mention that the 14th of January, the European Commission will be organizing a civil society dialogue which will be open to interested stakeholders.  We would continue to innovate in the area of transparency (inaudible), and we are determined to get these right. " />
                      <outline text="On regulatory issues more generally, I would like to reiterate &apos;&apos; and I think I kind of speak for both sides &apos;&apos; that we are committed for ensuring that these negotiations will not be about lowering or compromising the highest standards of consumer, environment, privacy, health, or other legitimate protections, and that each side will obviously maintain its regulatory autonomy.  The TTIP is not and will not be about the deregulation agenda. " />
                      <outline text=" " />
                      <outline text="Last but not least, as European Union chief negotiators, I&apos;m very pleased to announce that we will be organizing the next negotiating round which will take place in Brussels at a date that we hope to be able to communicate to you very soon.  Thank you.  " />
                      <outline text="MR. MULLANEY:  So we&apos;re happy to answer any of your questions." />
                      <outline text=" " />
                      <outline text="QUESTION:  I&apos;m Brian Beary from Europolitics.  Just a question on the transparency issue:  I know that on the first and the third rounds here in Washington, the USTR had this stakeholders thing where the negotiators were hearing presentations from the stakeholders and there were press, negotiators and they were all mingling together.  But in the second round in Brussels, the commission chose not to do that.  And I&apos;m wondering why the commission is not allowing that model, and if there&apos;s a plan for a change in the fourth round.  And will the commission be doing something similar with the stakeholders? " />
                      <outline text="MR. BERCERO:  Well, as I said, we are always ready to innovate and to improve the practice.  It is true in the second round, which, as you know, was organized in somewhat special circumstances, but the focus is to have as much time for interactive discussion with the two chief negotiators.  And by the way, I&apos;m very pleased that in this round the U.S. has also organized a sufficient time for interactive discussion, because we believe that that is very important.  We are still reflecting about the new modalities for the discussion with the stakeholders, and we will see about what is the best way to organize that in the next negotiating round." />
                      <outline text=" " />
                      <outline text="I can assure you in any case that there&apos;s a continuous process of dialogue with the stakeholders, that we are receiving input from them on all the aspects of the negotiations.  And for us, it&apos;s important not just that we listen, that we hear what they have to say, but that we also have the opportunity to engage in a discussion.  So we will further reflect about the best way to organize this not only during the negotiating round, but also throughout the negotiating process. " />
                      <outline text="MR. MULLANEY:  I should point out that Ignacio and I did have an exchange with approximately 400 stakeholders over the course of two and a half hours or a little after, and I think we pretty much exhausted the number of questions that there were in the room.  So it was a high level of interaction with a large number of stakeholders." />
                      <outline text=" " />
                      <outline text="QUESTION:  Hi.  Ben Hancock from Inside U.S. Trade.  I wanted to touch a little bit on the sectors.  First, for Ignacio, you mentioned the last round and which sectors you all discussed.  Which sectors are part of not horizontal, but in the sectoral annex are you focusing on now, is the EU focusing on now?   " />
                      <outline text="And Dan, if I could ask you:  What sectors is the U.S. prepared to begin negotiating on in the context of a sectoral annex, either now at the end of this round or in the next coming round?" />
                      <outline text=" " />
                      <outline text="MR. BERCERO:  Well, I mean, I think that throughout this negotiating round, but also in the previous round, we have been discussing the number of sectors where both the United States and the European Union have indicated an interest in exploring the possibility of having specific sectoral commitments.  We have had discussions on sectors like automobiles, like pharmaceuticals, medical devices, cosmetics, textiles, chemicals, ICT.  I hope I&apos;m not forgetting any of the sectors, but if I&apos;m forgetting any, I&apos;m sure that Dan would be &apos;&apos; will be able to correct me. " />
                      <outline text="And I wish to emphasize that these are sectors that both sides have indicated an interest in moving forward, interest of exploring specific sectoral commitments.  And they are all sectors in which to a large extent, there have been joint submissions by both European and United States stakeholders.  So I would really think that this is an issue of common interest both for United States and the European Union." />
                      <outline text=" " />
                      <outline text="MR. MULLANEY:  Yeah, thanks, Ben.  When we went out for Federal Register comments, we got about 300 different &apos;&apos; 370 different comments from a lot of different industries and other interested parties suggesting what we should do.  And as Ignacio said, we started to identify some sectors that are &apos;&apos; we think are useful to have discussions on to look for ways that we can reduce costs associated with unnecessary regulatory divergences.  We&apos;re not finished identifying the issues associated with sectors.  We&apos;re still working through those and their interrelationship with some of the horizontal issues. " />
                      <outline text="You mentioned sectoral annexes, and it&apos;s worthwhile emphasizing that some of the discussions that we&apos;ll be having will be, as I mentioned, over the architecture of the agreement and how we actually reflect the work that we do in the sectoral component of &apos;&apos; physically in an ultimate agreement, it&apos;s still to be determined, annex or other.  But where we&apos;re continuing to work forward, there&apos;s not a &apos;&apos; there&apos;s certainly not at this point a closed list of sectors or sectoral issues." />
                      <outline text=" " />
                      <outline text="MR. BERCERO:  Let me emphasize that also from a point of view, in no way we are talking about a closed list.  We are still looking to the possibility of looking into some other sectors where there might also be opportunities to do sectoral work.  So I think as the negotiations progress, we may well decide to look into other areas. " />
                      <outline text="QUESTION:  Len Bracken, Bloomberg BNA.  Aside from the sectors, is the overall architecture decided?  In other words, would it be accurate to report that you have decided on the scope of the agreement aside from the sectors?  And to what extent does that still reflect the High-Level Working Group report?" />
                      <outline text=" " />
                      <outline text="MR. MULLANEY:  I would say that the overall scope and the overall set of objectives remains the same.  As I mentioned this week, we did have virtually all of the negotiating groups meeting on their range of issues.  So I think the scope of what we hope to achieve is reflected in the High-Level Working Group report and in our letter to Congress.  I think we&apos;re still &apos;&apos; remains valid.  Yeah. " />
                      <outline text="MR. BERCERO:  Let me confirm that obviously, everything which is in the High-Level Working Group report is very much a part of our discussions.  Of course, as the discussions progress is when we need to take some decisions about the architecture, where certain issues should be a chapter.  That main issue which is still &apos;&apos; remained open, and I think that is something that as we progress in the negotiation, we will be progressively determining these issues." />
                      <outline text=" " />
                      <outline text="QUESTION:  Hi.  Kristi Ellis with Women&apos;s Wear Daily.  On textiles, I have a two-part question.  What were sort of the nature of the discussions?  At what stage are you in terms of perhaps a rule of origin?  Have you exchanged offers, or is this still early in the process? " />
                      <outline text="And then secondly, at the stakeholder meeting, a trade group, the American Apparel and Footwear Association, raised an ongoing issue.  The EU imposed a 28 percent tariff on U.S. denim exports, and that stems from the Byrd Amendment WTO case.  Are there efforts to address this issue?  And how close to &apos;&apos; are you to resolving it?  Thank you." />
                      <outline text=" " />
                      <outline text="MR. BERCERO:  Well, first, the discussions that have taken place on textiles have been mostly focusing to &apos;&apos; on regulatory issues in the textiles sector.  We haven&apos;t yet got to the stage in which we have exchanged offers.  That&apos;s one of the things that we will be aiming to do &apos;&apos; happen next year on all sectors, of course, not only on textiles.  On rules of origin, the discussion so far is much more on the horizontal aspects of rules of origin.  We haven&apos;t really started to discuss the specific rules of origin which apply in different sectors. " />
                      <outline text="As to the specific measure that you referred to, we have not discussed that issue in this context.  This is not the forum to discuss specific trade concerns.  We have been focusing on what we aim to do in the TTIP.  So no, it&apos;s not an issue that we have discussed in this context.  Thank you." />
                      <outline text=" " />
                      <outline text="MR. MULLANEY:  Yeah.  I think it is fair to say that on textiles, market access, rules of origin, we did have conversations this week.  I think those conversations are &apos;&apos; will be then continuing into 2014 as we move forward to the exchange of offers. " />
                      <outline text="QUESTION:  Krista Hughes from Reuters.  Just a follow-up question to your comments earlier about the specific sectors that you&apos;re focusing on:  Which are the sectors at the moment which are furthest from being included on that short list of sectors where you&apos;re seeking regulatory compatibility? " />
                      <outline text=" " />
                      <outline text="And then what is the current thinking on including energy, specifically U.S. gas exports, in the scope of this negotiation? " />
                      <outline text="MR. BERCERO:  Well, I think it&apos;s important that you bear in mind that on the issue of those sectors, a significant range of issues have been raised where it has been suggested that by fully maintaining the level of protection in the European Union and in the United States, it is possible to achieve significant regulatory cost savings.  And of course, this depends very much on each sector.  In some cases, there&apos;s a question about the possibility of mutual recognition of technical regulations.  That&apos;s an issue that&apos;s being discussed in the (inaudible) sector. " />
                      <outline text=" " />
                      <outline text="In other areas, it is a question of mutual recognition of inspections of manufacturing facilities.  This is being discussed in the pharmaceutical, medical devices, and cosmetic sector.  In other sectors, it&apos;s a question of better coordinating to reach assessments, for instance, in the chemical sector.  So there are different type of tools which depend very much on the specificities of each sector.  But you need to have the regulators looking into these issues thoroughly, looking into all the opportunities, and moving forward on the issues  as we progress in this negotiation to next year. " />
                      <outline text="So I think that at this point in time, what we are doing is, on each of these sectors, analyzing the issues, reviewing the evidence, and engaging in intensive process of discussion amongst regulators together with us, the trade negotiators, to see how we can achieve these goals without in any way compromising the levels of protection. " />
                      <outline text=" " />
                      <outline text="On energy and raw materials, we certainly have an interest and we hope that there will be a clear guarantee of security of access to U.S. resources.  This is something of great importance.  But of course, we are looking into the issue of raw materials not only from this point of view, but also from the broader systemic perspective, because we believe that both the European Union and the United States have a common interest in promoting open, transparent regimes for trade and investment involve materials and energy.  We are still discussing what is the best way in which the TTIP can continue to advance that objective. " />
                      <outline text="MR. MULLANEY:  And on the question of sectors, it&apos;s true that each of the different sectors that we&apos;re looking at present their own issues, their own challenges.  And in a way, they reflect the broad range of tools that we have at our disposal to reduce costs.  In certain areas, it may well be if the two sides have the same level of protection but different regulatory ways of achieving that, that there may well be opportunities for equivalence or mutual recognition.  In other areas, the focus may be more on whether you can have a recognition of conformity assessment results and arrive at a point where a product can be tested just once and not twice before it comes into the markets." />
                      <outline text=" " />
                      <outline text="In other areas it might be a question of sharing information and analyses of products.  So each sector &apos;&apos; sort of the nature of the sector &apos;&apos; each sector can present its own issues that are above and beyond the horizontal issues I identified.  So it&apos;s difficult to say which sector is further along, which sector is further behind.  They&apos;re all &apos;&apos; I think they&apos;re all moving forward, and all the parties are engaged and trying to find solutions to reduce costs due to divergences. " />
                      <outline text="On the gas export issue, in the United States we have a regime where exports of natural gas are deemed in the public interest.  If we&apos;re &apos;&apos; trading partner with whom we have a free trade agreement that provides for national treatment in national gas area.  Other partners, there&apos;s a presumption that exports are in the national interest.  So I think the &apos;&apos; this negotiation can offer opportunities for increased trade, but of course ultimately whether trade actually takes place is going to depend on the customers and the pricing and the private sector actors. " />
                      <outline text=" " />
                      <outline text="QUESTION:  I&apos;m Pat Reber from the German Press Agency.  At the stakeholders meeting on Wednesday, there were issues raised by some of the data, digital democracy groups about whether or not data privacy was going to be part of the TTIP.  Many of the groups opposed any inclusion of data privacy in the final agreement because they felt there were processes on both sides of the Atlantic now to address the issue of data privacy in the wake of the NSA surveillance scandal.  Thank you. " />
                      <outline text="MR. BERCERO:  Well, I think that you know our point of view on this because we have made it clear in many occasions.  Data privacy is not part of the TTIP negotiations.  There are other forum where issues and concerns related to data privacy are being discussed between the United States and the European Union.  But the TTIP is not the right forum for overseeing those issues. " />
                      <outline text=" " />
                      <outline text="This doesn&apos;t mean, of course, that we are not ready to talk in the TTIP on issues like electronic commerce, on issues like data flows.  It&apos;s a very important component of the modern economy.  But for us, any such discussion is based on a very clear premise that whenever it comes to personal data of European citizens, that data can only be transferred abroad in compliance with European Union directives on that matter.  And this a fundamental issue.  You know that for us, it&apos;s an issue of fundamental rights and which, I think, our position is very clear and very well known.   " />
                      <outline text="MR. MULLANEY:  Yeah, and I mean, companies on both sides of the Atlantic have built up one of the most robust data transfer networks in the world, and it&apos;s the network that really forms the backbone of our mutual international competitiveness and helps support the $4 trillion in foreign direct investment that we have in each other&apos;s economies and the $3 billion a day in trade in goods and services that occur every day.  So TTIP should offer opportunities to facilitate and support those flows.  We&apos;re confident, as we work through this process, that we can accomplish that result and do that in a manner that remains respectful of the privacy regimes that exist on both sides of the Atlantic." />
                      <outline text=" " />
                      <outline text="QUESTION:  This is Cole Stangler from In These Times magazine.  You mentioned a lot &apos;&apos; you were talking about the stakeholder meetings on Wednesday, and I spoke to some of the stakeholders there &apos;&apos; mostly from environmentalists, labor groups, consumer advocacy groups &apos;&apos; who mentioned that really the stakeholder meetings are really no substitute for full transparency, which in their eyes is releasing the draft text after each round.  So why not just do that after each round?  Why not release the full text to the public so that stakeholders know, so that the press knows, so that the public can know what&apos;s being negotiated? " />
                      <outline text=" " />
                      <outline text="MR. BERCERO:  You want to take it first? " />
                      <outline text="MR. MULLANEY:  Yeah.  I mean, we&apos;ve been working a lot through these stakeholder engagement sessions and meetings to &apos;&apos; and through our written letter to the Congress and joint reports to maximize the level of transparency, to describe precisely what we&apos;re doing to engage one-on-one in many instances, or one &apos;&apos; with a group of stakeholders in other instances to try to make as clear as possible what it is we&apos;re doing to get their viewpoints.  In our view, the &apos;&apos; so the value of transparency is paramount in our mind." />
                      <outline text=" " />
                      <outline text="We do need, however, to give the negotiators space to have frank conversations, to negotiate in &apos;&apos; in the case of our negotiators, in the U.S. national interest.  And so what we&apos;ve &apos;&apos; I think are achieving is a balance between giving those negotiators the space that they need to be frank, have frank conversations and negotiate, but also communicate as full as we are able the objectives and what we are doing and to receive input from the stakeholders.  Yeah. " />
                      <outline text="MR. BERCERO:  Let me just add that this is an issue where it is very important to strike the balance right.  As Dan has indicated, it is critical in a trade negotiation where each party comes forward with its own textual proposals that you have the space to see how you can accommodate the views of the other party and progressively come into a common text.  This is a complex process; it&apos;s an interactive process that takes place throughout the negotiation until such time as you can say there is a text which represents a common European and American view." />
                      <outline text=" " />
                      <outline text="If you were going to be releasing those texts throughout a process, inevitably the possibility for both sides to work together to compromises would become much more difficult.  And I don&apos;t think that anyone would want that to happen.  At the same time, it&apos;s very important for each of us to communicate as clearly as possible to our citizens, say what is the position that each one is taking in the negotiation, and that&apos;s the reason why the European Union will have made an effort to make as many position papers public, where we indicate in each of the different negotiating areas which are the objectives that we are pursuing in the negotiation and our doors are always open to discuss with any interested stakeholder any issues which are a matter of concern.  And you certainly can see it on certain issue (inaudible) to a lot of discussion even though we have made a particular effort to engage in a discussion to explain the positions and to better understand the views of stakeholders.   " />
                      <outline text="So I think this is a balance which needs to be maintained.  We will continue to reflect as far as the negotiation&apos;s progress is about how to ensure that this element of maintaining these policies respected in a manner which ensures efficiency of the negotiating process, but also the maximum of public accountability.  And of course, once a text has become stable and consolidated, everyone will be able to see the result and there will be time before the final consideration is taken by our legislators to ratify a text, to know what is the content of each of the chapters of this agreement." />
                      <outline text=" " />
                      <outline text="MR. MULLANEY:  I&apos;ll just say we are making a huge effort to implement deep transparency in this negotiation, but of course, we can always improve.  We can always do better.  So we appreciate the views that we hear from stakeholders about what we can do to improve this process. " />
                      <outline text="QUESTION:  Hi, I&apos;m &apos;&apos; sorry.  I&apos;m Jeremy Togman (ph) with AFP Newswire.  There&apos;s a growing concern that disputes of a mechanism could give the companies the power to directly challenge regulation in Europe.  Do you think that those fears are legitimate? " />
                      <outline text="MR. BERCERO:  All views are always legitimate, and I think that all views needs to be respected and need to be discussed.  I&apos;ll refer to just previously that on certain issues where concerns have been expressed by different groups in the European Union, but also in the United States.  We are certainly making a big effort to discuss those concerns and to see what is the best way to move forward. " />
                      <outline text=" " />
                      <outline text="Now, on the substance of what you are saying, I think it&apos;s important to be clear investor state dispute settlement is not something new which is being invented in these negotiations.  There are at this point in time 1,400 bilateral investment treaties which have been concluded by the member states of the European Union, all of which include an investor state dispute settlement mechanism.  And nine of our member states already have those treaties with United States.  Now, that is the current reality.  What we are discussing in the context of this negotiation is whether it is possible to include a regime precisely to ensure that non-discriminatory regulatory measures cannot be successfully challenged under an investor state dispute settlement system.  You need to strike the right balance between the protection of the investor and the need to ensure that there is no threat to the non-discriminatory regulatory measures that both United States and the European Union value. " />
                      <outline text="And by the way, I should note that although the consent is many times expressed because of some cases which have been launched, despite the fact that we have (inaudible) treaties between member states of the European Union and the United States for more than 20 years, there has not been a single case in which the regulatory measure of one of those member states, or indeed of the European Union, has been successfully challenged.  There was only one case that was lost, but it didn&apos;t really relate to something which could be described as a legitimate regulatory measure. " />
                      <outline text=" " />
                      <outline text="In any case, for us we take these concerns seriously.  That&apos;s why we are explaining that what we have been trying to do at the European level, for instance in our negotiations with Canada, is to ensure that the investment protection standards of those agreements are defined in as precise manner as possible, because the greater that there is precision, the less that there is a risk of our arbitrary interpretations by any arbitrators.  So we are looking to more precise definition of investment protection standards, and we are also looking into how to reinforce &apos;&apos; to enforce the procedure guarantees of the process, for instance, to transparency of the arbitration procedure, rules to avoid and deter frivolous claims, also a number of elements which ensure that the procedure respects all the due process guarantees which are fundamental and necessary.   " />
                      <outline text="Again, in our negotiations with Canada, we have made a number of important innovations in this area, which go, by the way, way beyond what is provided in the current investment treaties of our member states.  And we very much hope and expect that in our discussions with United States, we will be able to look into these and perhaps even to do better." />
                      <outline text=" " />
                      <outline text="MR. MULLANEY:  Yeah, I don&apos;t have a lot to add other than to say we do understand the concern and, we do appreciate those concerns having been communicated to us so clearly.  But for us, it is a key goal of our negotiation in this TTIP will be, of course, to protect the right of the governments to regulate in the public interest, a right that we would simply never negotiate away.   " />
                      <outline text="At the same time, we do want in this negotiation to pursue strong investor protections so that, from our perspective, American companies investing abroad have the same access to fair and equitable treatment as they receive in the United States.  I mean, that system for us does include a variety of mechanisms, including state-to-state dispute mechanisms and investor-state dispute mechanisms to ensure fair and equal treatment.  And this is an approach that we have taken in all of our FTAs, and it&apos;s an approach that we have evolved in the course of over a decade of studying our investment provisions, receiving input on those provisions, and striking the right balance to ensure that governments can continue to have the ability to regulate in the public interest." />
                      <outline text=" " />
                      <outline text="QUESTION:  Thank you.  Hi, I&apos;m Hillary (ph) with ARD German Television.  I have a question on the timetable, more for the U.S. side in this case.  What is our &apos;&apos; or the hope for pushing things through in 2014?  We have midterm elections upon us and we need a TPA to be issued to the President.  What are our hopes and concerns there? " />
                      <outline text="MR. MULLANEY:  Yeah, focusing on your last question, we &apos;&apos; it&apos;s very important to us to be able to bring home international agreements that we have, trade promotion authority, or TPA.  And we are working with Congress to get that done, that authority.  It helps define our objectives with Congress.  It lays out the processes and procedures that we need to follow to put one of these agreements in place, so it is very important.  So we&apos;re very hopeful that we will be getting that authority in the near term." />
                      <outline text=" " />
                      <outline text="In terms of the overall timetable, as I suggested in my initial comments, within a couple of weeks of being able to, we began the negotiation.  Pretty much as quickly as one could, we had a second round, and we worked very closely intercessionally between the rounds to make progress, both between the first and second round and the between the second and third round.  So we&apos;re committed to moving very quickly on this.   " />
                      <outline text="But the main important thing for us is to get it right.  So we&apos;re working hard, we&apos;re working quickly, but we don&apos;t want to sacrifice the ultimate quality of the agreement, because at the end of the day, we have to be able to point to an agreement that actually does increase growth, jobs, and international competitiveness.  So we don&apos;t have a timetable, except we have to &apos;&apos; we&apos;re going to move quickly, and we want to get it right. " />
                      <outline text=" " />
                      <outline text="MR. BERCERO:  I agree with Dan on what he has said on the timing. " />
                      <outline text="QUESTION:  Yeah, thanks.  Jim Berger from Washington Trade Daily.  If I can turn this around a little bit and ask you something negative, has there been any discussion between you two or even your bosses on what may not be possible in this agreement, so when you get to the final hurdle it&apos;s not as high as it looks now?  Have you discussed it, or is there an agreement of what&apos;s a bridge too far?" />
                      <outline text=" " />
                      <outline text="MR. BERCERO:  There continues discussions about the different elements of the agreement.  I don&apos;t think that at this stage we are discussing what the final result will be. " />
                      <outline text="MR. MULLANEY:  Yeah.  As I noted, we&apos;re proceeding in this round, as in previous rounds, with the wide range of topics that we would hope to be included in the comprehensive trade and investment agreement. " />
                      <outline text=" " />
                      <outline text="QUESTION:  Hi.  (Inaudible) from (inaudible).  First up, just a quick comment before my question, which is:  I was a little bit confused on Wednesday about why your briefing of stakeholders that followed their briefing of you was closed to the press, if you were trying to increase transparency.   " />
                      <outline text="But my real question is more about the timetable for deciding what you&apos;re going to decide.  That is, when would you expect to decide on the sectors to reach an agreement on what sectors you&apos;re going to do deal with?  And when would you &apos;&apos; from that point, how much longer would you expect to go to reach it?  Are you hoping to reach an agreement this year?  Is it something that&apos;s going to be taking place next year?  Can you give us just sort of the outside and what your timetable is for various elements of this agreement?" />
                      <outline text=" " />
                      <outline text="MR. MULLANEY:  Yeah.  On the latter question, I don&apos;t think &apos;&apos; we don&apos;t have a timetable for making decisions on specific things.  We&apos;re trying to move forward and make progress in all of the areas as much as we can.  There will come a time, I suspect, we&apos;ll be figuring out how we&apos;re going to wrap up the issues, but that time is not yet.   " />
                      <outline text="On your first question, we had the three hour session with all of the stakeholders and the negotiators and lots of members of the press.  So for the &apos;&apos; for that three hour session where there was a direct negotiator-stakeholder interaction, the negotiators were there with members of the press and the stakeholders.  Our feeling was that the briefing that we gave to the stakeholders on Wednesday afternoon was their opportunity to pose questions to us and have an exchange, and that the opportunity for the press, for us to have a briefing and have questions and answers, would come at the end of the round when we had completed the round during this hour. " />
                      <outline text=" " />
                      <outline text="MR. BERCERO:  Can I just say a word on the sectors to clarify?  The sectors which I mentioned in answer to a previous question are those sectors where both sides areexploring the possibility of having a specific regulatory commitment.  We, of course, in these negotiations we are discussing very broadly (inaudible) disciplines which are relevant for all sectors.  We are looking into many other issues, but (inaudible) sectors is sectors where we are looking concretely, where it&apos;s possible to achieve specific regulatory commitments that go beyond and complement, what is being done until it&apos;s on that level.  It is not a closed list.  It is just a list, and we have started to work cooperatively with the involvement of the regulators on both sides.  And within each of the sectors, there&apos;s a list of issues that we are looking into.  As we progress in the discussion, we will see how far it is possible to go under each of the issues, under each of those sectors.  I think that&apos;s important to bear in mind. " />
                      <outline text="QUESTION:  Yeah, this is Adam Behsudi from Politico.  I had a question for Mr. Bercero.  The commission this week released a draft regulation on restricting products from cloned animals, and I&apos;m just &apos;&apos; can you tell us what &apos;&apos; to what extent that issue will find its way into the trade agreement, into the trade negotiations?  And can you elaborate more on some of the food safety issues that you discussed this week?" />
                      <outline text=" " />
                      <outline text="MR. BERCERO:  Well, on the specific proposal that the commission has presented, no, that&apos;s not an issue which we are discussing in these negotiations.  Of course, we are always ready to listen to questions, comments about our initiatives, but it&apos;s not an issue that as such we are discussing in these negotiations.  I mean, on food safety, I think there were good discussions between the two teams.  We are looking to what could be the elements of an ambitious SPS-plus chapter.  We still are looking at these more at the conceptual level, each side explaining to the other what are the objectives that they would wish to achieve within this SPS-plus chapter.  And there are also conversations about how to try to facilitate and to solve specific issues, all in full respect of each side&apos;s legislation* and regulatory framework.   " />
                      <outline text="So I think there were good discussions on these topics, but as I said, the specific issue that you referred to is not an issue that has been discussed." />
                      <outline text=" " />
                      <outline text="MODERATOR:  Last question.  " />
                      <outline text="MR. MULLANEY:  Yeah, I would say kind of &apos;&apos; maybe I&apos;ll just elaborate a bit.  We did undertake, in the high-level working group, to address these sanitary and phytosanitary or SPS measures.  It&apos;s mostly related to food safety.  And what we said we would do would be to explore ways in which we could explore SPS-plus aspects for disciplines that go beyond and elaborate on the current WTO requirement that food safety measures be based on science, be based on risk assessment.  So what we are discussing in this during these rounds is the various ways that we can focus on some of these requirements, focus on some consultative mechanisms that we can put in place to have our regulators work together to achieve, say, SPS-plus disciplines on these food safety measures." />
                      <outline text=" " />
                      <outline text="The United States and Europe have two of the best food safety regimes in the world, and by cooperating together and agreeing on cooperative measures where we can both achieve our appropriate level of protection using appropriate science, using appropriate risk assessment, I think we can both gain on the food safety area. " />
                      <outline text="MODERATOR:  We have time for one more." />
                      <outline text=" " />
                      <outline text="QUESTION:  Panka (ph) from China&apos;s Xinhua News Agency.  I just wanted to follow up with the investor-state dispute settlement issue.  Why is this dispute settlement so important for the TTIP trade agreement?  And (inaudible) &apos;&apos; both the United States and the European Union negotiating with &apos;&apos; negotiating bilateral investment treaty with China.  I&apos;m wondering, do you guys have plans or (inaudible) this investor-state dispute statement &apos;&apos; settlement in the BIT talks with China? " />
                      <outline text="MR. BERCERO:  Well, I mean, certainly I think that the negotiation that we would do with China on investment, one of the issues that would be certainly discussed there is also investor-state dispute settlement, as in it&apos;s a very early stage of that discussion.  But we certainly will be discussing also this issue with our Chinese colleagues." />
                      <outline text=" " />
                      <outline text="MR. MULLANEY:  Yeah.  I mean, and for us, as I said, I mean, we do &apos;&apos; we &apos;&apos; it&apos;s extremely important to maintain the right of governments to regulate in the public interest, but at the same time, it&apos;s a strong objective to make sure that we have in the international system strong investor protections that do include these variety of fora, including, as I mentioned, state-to-state dispute settlement as well as the investor-state dispute settlement. " />
                      <outline text="MODERATOR:  That&apos;s it.  Thank you, everyone." />
                      <outline text=" " />
                      <outline text="MR. MULLANEY:  Thank you.  " />
                      <outline text="MR. BERCERO:  Thank you." />
              </outline>

              <outline text="Statement by Press Secretary Jay Carney on the Ongoing Air Assaults by the Syrian Government">
                      <outline text="Link to Article" type="link" url="http://www.whitehouse.gov/the-press-office/2013/12/23/statement-press-secretary-jay-carney-ongoing-air-assaults-syrian-governm" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387861262_HGEHgAFU.html" />
        <outline text="Source: White House.gov Press Office Feed" type="link" url="http://www.whitehouse.gov/feed/press" />
      <outline text="Tue, 24 Dec 2013 05:01" />
                      <outline text="" />
                      <outline text="The White House" />
                      <outline text="Office of the Press Secretary" />
                      <outline text="For Immediate Release" />
                      <outline text="December 23, 2013" />
                      <outline text="The United States condemns the ongoing air assault by Syrian government forces on civilians, including the indiscriminate use of SCUD missiles and barrel bombs in and around Aleppo over the last week. The attacks over the weekend killed more than 300 people, many of them children. The Syrian government must respect its obligations under international humanitarian law to protect the civilian population. The Syrian government must fulfill its November commitment to do more to facilitate the safe and unhindered delivery of humanitarian assistance, so that millions of Syrian men, women, and children have access to urgently needed services. To bring the suffering of the Syrian people to an end, it is imperative that Syrians reach a comprehensive and durable political solution to end the crisis in Syria. The United States remains committed to advancing a political settlement to help end the bloodshed in Syria." />
                      <outline text="###" />
              </outline>

              <outline text="Next Big Future: Warren Buffet owns railroad and tank car company and is a big Obama supporter. Obama blocks pipeline which boosts oil shipped by rail">
                      <outline text="Link to Article" type="link" url="http://nextbigfuture.com/2013/12/warren-buffet-owns-railroad-and-tank.html?m=1" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387859403_sCg7LTn3.html" />
      <outline text="Tue, 24 Dec 2013 04:30" />
                      <outline text="" />
                      <outline text="The Keystone pipeline expansion is still being stalled. Canadian Ambassador Doer observes that Obama&apos;s &quot;choice is to have it come down by a pipeline that he approves, or without his approval, it comes down on trains.Increased rail capacity is moving more oil from Canada&apos;s oilsands" />
                      <outline text="More oil is moving by rail from North Dakota as well" />
                      <outline text="Warren Buffett has formally endorsed and made campaign contributions to Barack Obama&apos;s presidential campaign. On July 2, 2008, Buffett attended a $28,500 per plate fundraiser for Obama&apos;s campaign in Chicago hosted by Obama&apos;s National Finance Chair, Penny Pritzker and her husband, as well as Obama advisor Valerie Jarret." />
                      <outline text="Warren Buffett&apos;s Berkshire Hathaway (BRK/A) owns Union Tank Car, just one piece of his big bet on rail, which also includes the Burlington Northern Santa Fe railroad." />
                      <outline text="This is all probably just convenient luck for Warren Buffet. The environmental lobby and their money is mainly what is considered to be the reason Obama made the decisions he has on the Keystone pipeline." />
                      <outline text="The Burlington northern railroad is worth about $34 billion now. In 2009, Warren Buffett bought BNSF railroad for $26 billion." />
                      <outline text="In 2008, Buffett&apos;s Berkshire Hathaway bought 60 percent of Marmon Holdings, a private firm owned by trusts associated with Chicago&apos;s Pritzker family, for $4.5 billion." />
                      <outline text="They make train cars specifically to move oil and gasTank cars, those torpedo-shaped rail cars built to carry liquids, anything from milk to industrial chemicals, are increasingly being used to carry shale oil. &apos;&apos;The traffic has grown significantly, from probably 50,000 carloads a year in 2010 to over 700,000 this year,&apos;&apos; says Toby Kolstad, president of the consulting firm Rail Theory Forecasts. &apos;&apos;It probably will rise above a million carloads a year in the next year or two.&apos;&apos;" />
                      <outline text="There are multi-billion dollar backorders for tank cars." />
                      <outline text="Obama&apos;s very richest friend benefits from his policies. How are the other 99.99% doing ?" />
                      <outline text="If you liked this article, please give it a quick review on ycombinator or StumbleUpon. Thanks" />
              </outline>

              <outline text="WHITE HOUSE VIDEO MESSAGE: Congress must act to extend unemployment insurance">
                      <outline text="Link to Article" type="link" url="http://www.whitehouse.gov/the-press-office/2013/12/23/white-house-video-message-congress-must-act-extend-unemployment-insuranc" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387851741_jhsCDLX5.html" />
        <outline text="Source: White House.gov Press Office Feed" type="link" url="http://www.whitehouse.gov/feed/press" />
      <outline text="Tue, 24 Dec 2013 02:22" />
                      <outline text="" />
                      <outline text="THE WHITE HOUSE" />
                      <outline text="Office of the Press Secretary" />
                      <outline text="______________________________________________________________________________" />
                      <outline text="EMBARGOED UNTIL 6:00 AM ET, SATURDAY, December 21, 2013" />
                      <outline text=" WHITE HOUSE VIDEO MESSAGE: Congress must act to extend unemployment insurance" />
                      <outline text="Washington, DC &apos;-- In this week&apos;s message, Secretary of Labor Tom Perez discussed the importance of extending unemployment insurance for a million Americans, including many Latinos, who may lose a vital source of income only a few days after Christmas." />
                      <outline text="The audio of the address and video of the message is available online HERE." />
                      <outline text="Remarks bySecretary of Labor Tom Perez" />
                      <outline text="Spanish Weekly Address" />
                      <outline text="The White House" />
                      <outline text="December 21, 2013" />
                      <outline text="Hi, everybody." />
                      <outline text="This week, Congress finished up some important work before heading home for the holidays." />
                      <outline text="For the first time in years, both parties came together and passed a Budget. It clears the path for critical investments in the things that grow our economy and strengthen our middle class. And it will keep reducing our deficits." />
                      <outline text="There are signs of hope that we put an end to the cycle of short-sighted, crisis-driven decision-making and actually work together to get things done." />
                      <outline text="And that&apos;s important. Because there&apos;s plenty of work to do." />
                      <outline text="Right now, because Congress failed to act before leaving on vacation, more than one million Americans, including many Latinos, may lose a vital source of income only a few days after Christmas. " />
                      <outline text="Instead of punishing these families when they need it the least, Congress should first restore that lifeline immediately, then put their entire focus on creating more good jobs that pay good wages. It is critical not to take unemployment insurance away from hard-working Latinos." />
                      <outline text="That&apos;s what the President and the Administration will be focused on next year. Growing the economy. Expanding opportunity. Building an America that offers everyone who works hard the chance to get ahead, and every child a fair shot at success. And for the passage of immigration reform." />
                      <outline text="Thank you. Have a great weekend and a very Merry Christmas." />
                      <outline text="###" />
              </outline>

              <outline text="Presidential Proclamation -- African Growth and Opportunity Act">
                      <outline text="Link to Article" type="link" url="http://www.whitehouse.gov/the-press-office/2013/12/23/presidential-proclamation-african-growth-and-opportunity-act" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387851697_ees3kn6d.html" />
        <outline text="Source: White House.gov Press Office Feed" type="link" url="http://www.whitehouse.gov/feed/press" />
      <outline text="Tue, 24 Dec 2013 02:21" />
                      <outline text="" />
                      <outline text="The White House" />
                      <outline text="Office of the Press Secretary" />
                      <outline text="For Immediate Release" />
                      <outline text="December 23, 2013" />
                      <outline text="TO TAKE CERTAIN ACTIONS UNDER THE AFRICAN GROWTH AND" />
                      <outline text="OPPORTUNITY ACT AND FOR OTHER PURPOSES" />
                      <outline text="- - - - - - -" />
                      <outline text="BY THE PRESIDENT OF THE UNITED STATES OF AMERICA" />
                      <outline text="A PROCLAMATION" />
                      <outline text=" " />
                      <outline text="1.  In Proclamation 8921 of December 20, 2012, I determined that the Republic of Mali (Mali) was not making continual progress in meeting the requirements described in section 506A(a)(1) of the Trade Act of 1974, as amended (the &quot;1974 Act&quot;), as added by section 111(a) of the African Growth and Opportunity Act (title I of Public Law 106-200) (AGOA).  Thus, pursuant to section 506A(a)(3) of the 1974 Act (19 U.S.C. 2466a(a)(3)), I terminated the designation of Mali as a beneficiary sub-Saharan African country for purposes of section 506A of the 1974 Act." />
                      <outline text="2.  Section 506A(a)(1) of the 1974 Act authorizes the President to designate a country listed in section 107 of the AGOA (19 U.S.C. 3706) as a &quot;beneficiary sub-Saharan African country&quot; if the President determines that the country meets the eligibility requirements set forth in section 104 of the AGOA (19 U.S.C. 3703), as well as the eligibility criteria set forth in section 502 of the 1974 Act (19 U.S.C. 2462)." />
                      <outline text="3.  Based on actions that the Government of Mali has taken over the past year, pursuant to section 506A(a)(1) of the 1974 Act, I have determined that Mali meets the eligibility requirements set forth in section 104 of the AGOA and section 502 of the 1974 Act, and I have decided to designate Mali as a beneficiary sub-Saharan African country." />
                      <outline text="4.  On April 22, 1985, the United States and Israel entered into the Agreement on the Establishment of a Free Trade Area between the Government of the United States of America and the Government of Israel (USIFTA), which the Congress approved in the United States-Israel Free Trade Area Implementation Act of 1985 (the &quot;USIFTA Act&quot;) (19 U.S.C. 2112 note)." />
                      <outline text="5.  Section 4(b) of the USIFTA Act provides that, whenever the President determines that it is necessary to maintain the general level of reciprocal and mutually advantageous concessions with respect to Israel provided for by the USIFTA, the President may proclaim such withdrawal, suspension, modification, or continuance of any duty, or such continuance of existing duty-free or excise treatment, or such additional duties, as the President determines to be required or appropriate to carry out the USIFTA." />
                      <outline text="6.  In order to maintain the general level of reciprocal and mutually advantageous concessions with respect to agricultural trade with Israel, on July 27, 2004, the United States entered into an agreement with Israel concerning certain aspects of trade in agricultural products during the period January 1, 2004, through December 31, 2008 (the &quot;2004 Agreement&quot;)." />
                      <outline text="7.  In Proclamation 7826 of October 4, 2004, consistent with the 2004 Agreement, the President determined, pursuant to section 4(b) of the USIFTA Act, that it was necessary in order to maintain the general level of reciprocal and mutually advantageous concessions with respect to Israel provided for by the USIFTA, to provide duty-free access into the United States through December 31, 2008, for specified quantities of certain agricultural products of Israel." />
                      <outline text="8.  Each year from 2008 through 2012, the United States and Israel entered into agreements to extend the period that the 2004 Agreement was in force for 1-year periods to allow additional time for the two governments to conclude an agreement to replace the 2004 Agreement." />
                      <outline text="9.  To carry out the extension agreements, the President in Proclamation 8334 of December 31, 2008; Proclamation 8467 of December 23, 2009; Proclamation 8618 of December 21, 2010; Proclamation 8770 of December 29, 2011; and Proclamation 8921 of December 20, 2012, modified the Harmonized Tariff Schedule of the United States (HTS) to provide duty-free access into the United States for specified quantities of certain agricultural products of Israel, each time for an additional 1-year period." />
                      <outline text="10.  On November 26, 2013, the United States entered into an agreement with Israel to extend the period that the 2004 Agreement is in force through December 31, 2014, to allow for further negotiations on an agreement to replace the 2004 Agreement." />
                      <outline text="11.  Pursuant to section 4(b) of the USIFTA Act, I have determined that it is necessary, in order to maintain the general level of reciprocal and mutually advantageous concessions with respect to Israel provided for by the USIFTA, to provide duty-free access into the United States through the close of December 31, 2014, for specified quantities of certain agricultural products of Israel." />
                      <outline text="12.  Presidential Proclamation 8783 of March 6, 2012, implemented the United States-Korea Free Trade Agreement (USKFTA) with respect to the United States and, pursuant to the United States-Korea Free Trade Agreement Implementation Act (the &quot;Implementation Act&quot;) (Public Law 112-41, 125 Stat. 428), incorporated into the HTS the schedule of duty reductions and rules of origin necessary or appropriate to carry out the USKFTA." />
                      <outline text="13.  In Presidential Proclamation 8771 of December 29, 2011, pursuant to the authority provided in section 1206(a) of the Omnibus Trade and Competitiveness Act of 1988 (19 U.S.C. 3006(a)), I modified the HTS to reflect amendments to the International Convention on the Harmonized Commodity Description and Coding System (the &quot;Convention&quot;)." />
                      <outline text="14.  Section 202 of the Implementation Act provides rules for determining whether goods imported into the United States originate in the territory of a Party to the USKFTA and thus are eligible for the tariff and other treatment contemplated under the Agreement.  Section 202(o) of the Implementation Act authorizes the President to proclaim, as part of the HTS, the rules of origin set out in the USKFTA and to proclaim any modifications to such previously proclaimed rules of origin, subject to the exceptions stated in section 202(o)(2)(A) of the Implementation Act." />
                      <outline text="15.  Because the USKFTA was negotiated under the 2002 HTS nomenclature, the United States and Korea agreed to modify certain specific rules of origin in the USKFTA to ensure that the tariff and certain other treatment accorded under the Agreement to originating goods will continue to be provided under the tariff categories that were modified in Proclamation 8783." />
                      <outline text="16.  In order to implement the agreed modifications to the rules of origin in the USKFTA and ensure the continuation of such staged reductions in rates of duty for originating goods under tariff categories that have been modified to reflect the amendments to the Convention, I have determined that additional modifications to the HTS are necessary or appropriate to ensure that the duty reductions previously proclaimed are applied." />
                      <outline text="17.  Section 212 of the Caribbean Basin Economic Recovery Act (CBERA) (19 U.S.C. 2702), as amended by the Caribbean Basin Trade Partnership Act (CBTPA) (Public Law 106-200), authorizes the President to designate certain countries, territories, or successor political entities as beneficiary countries for the purposes of the CBERA and CBTPA." />
                      <outline text="18.  Section 211 of the CBTPA provides that certain preferential tariff treatment may be provided to eligible articles that are the product of any country that the President designates as a &quot;CBTPA beneficiary country&quot; pursuant to section 213(b)(5)(B) of the CBERA (19 U.S.C. 2703(b)(5)(B)), provided that the President determines that the country has satisfied the requirements of section 213(b)(4)(A)(ii) (19 U.S.C. 2703(b)(4)(A)(ii)) relating to the implementation of procedures and requirements similar to those in chapter 5 of the North American Free Trade Agreement (NAFTA)." />
                      <outline text="19.  In Proclamation 7351 of October 2, 2000, the President authorized the United States Trade Representative (USTR) to perform the functions specified in section 213(b)(4)(A)(ii) of the CBERA and certain functions under section 604 of the 1974 Act (19 U.S.C. 2483) for each beneficiary country designated in that proclamation pursuant to section 213(b)(5)(B) of the CBERA." />
                      <outline text="20.  Cura&#167;ao is a successor political entity to The Netherlands Antilles and has expressed its desire to be designated as a beneficiary country under the CBERA and CBTPA.  As a successor political entity, Cura&#167;ao was not included in Proclamation 7351." />
                      <outline text="21.  Pursuant to section 212(b) and (c) and 213(b)(5)(B) of the CBERA (19 U.S.C. 2702(b) and (c) and 19 U.S.C. 2703(b)(5)(B)), I have determined that Cura&#167;ao meets the eligibility requirements set forth in those sections.  Accordingly, pursuant to section 212(b) and 213(b) of the CBERA, and after taking into account the factors enumerated in section 212(b) and (c) of the CBERA (19 U.S.C. 2702(b) and (c)), I have decided to designate Cura&#167;ao as a beneficiary country for purposes of the CBERA and CBTPA.  In addition, pursuant to section 212(a)(1)(A) of the CBERA, I am notifying the Congress of my intention to designate Cura&#167;ao as a beneficiary country under the CBERA and CBTPA, and communicating the considerations entering into my decision." />
                      <outline text="22.  The preferential treatment extended pursuant to the Andean Trade Preference Act (ATPA) (19 U.S.C. 3201-3206, as amended) expired on July 31, 2013.  As a result, I have determined that certain modifications to the HTS are required to reflect this status." />
                      <outline text="23.  Presidential Proclamation 7746 of December 30, 2003, implemented the United States-Chile Free Trade Agreement (USCFTA) with respect to the United States and, pursuant to the United States-Chile Free Trade Agreement Implementation Act (19 U.S.C. 3805 note), incorporated in the HTS the schedule of duty reductions and rules of origin necessary or appropriate to carry out the USCFTA.  Those modifications to the HTS were set out in Publication 3652 of the U.S. International Trade Commission, which was incorporated by reference into Proclamation 7746." />
                      <outline text="24.  Annex II of Publication 3652 contained a typographical error that needs to be corrected.  I have determined that a modification to the HTS is necessary to correct this typographical error and to provide the intended tariff treatment." />
                      <outline text="25.  Section 604 of the 1974 Act (19 U.S.C. 2483), authorizes the President to embody in the HTS the substance of the relevant provisions of that Act, and of other acts affecting import treatment, and actions taken thereunder, including the removal, modification, continuance, or imposition of any rate of duty or other import restriction." />
                      <outline text="NOW, THEREFORE, I, BARACK OBAMA, President of the United States of America, by virtue of the authority vested in me by the Constitution and the laws of the United States of America, including but not limited to section 301 of title 3, United States Code, title V and section 604 of the 1974 Act, section 104 of the AGOA, section 4 of the USIFTA Act, section 202 of the Implementation Act, and sections 212 and 213 of the CBERA, do proclaim that:" />
                      <outline text="(1)  Mali is designated as a beneficiary sub-Saharan African country." />
                      <outline text="(2)  In order to reflect this designation in the HTS, general note 16(a) to the HTS is modified by inserting in alphabetical sequence in the list of beneficiary sub-Saharan African countries &quot;Republic of Mali (Mali).&quot;" />
                      <outline text="(3)  In order to implement U.S. tariff commitments under the 2004 Agreement through December 31, 2014, the HTS is modified as provided in Annex I to this proclamation." />
                      <outline text="(4)(a)  The modifications to the HTS set forth in Annex I to this proclamation shall be effective with respect to eligible agricultural products of Israel that are entered, or withdrawn from warehouse for consumption, on or after January 1, 2014." />
                      <outline text="(b)  The provisions of subchapter VIII of chapter 99 of the HTS, as modified by Annex I to this proclamation, shall continue in effect through December 31, 2014." />
                      <outline text="(5)  In order to reflect in the HTS the modifications to the rules of origin under the USKFTA, general note 33 to the HTS is modified as set forth in Annex II to this proclamation." />
                      <outline text="(6)  The modifications to the HTS set forth in Annex II to this proclamation shall be effective with respect to goods that are entered or withdrawn from warehouse for consumption, on or after January 1, 2014." />
                      <outline text="(7)  Cura&#167;ao is designated as an eligible beneficiary country for the purposes of the CBERA and CBTPA." />
                      <outline text="(8)  In order to reflect Cura&#167;ao&apos;s designation as a beneficiary country for the purposes of the CBERA, general note 7(a) to the HTS is modified by inserting in alphabetical sequence &quot;Cura&#167;ao.&quot;" />
                      <outline text="(9)  In order to implement Cura&#167;ao&apos;s designation as a CBTPA beneficiary country, the USTR is authorized to determine whether Cura&#167;ao has satisfied the requirements of section 213(b)(4)(A)(ii) of the CBERA relating to the implementation of procedures and requirements similar in all material respects to those in chapter 5 of the NAFTA.  To implement such determination, the USTR is authorized to exercise the authority provided to the President under section 604 of the 1974 Act to embody modifications and technical and conforming changes in the HTS.  The determination of the USTR under this paragraph shall be set forth in a notice that the USTR shall cause to be published in the Federal Register.  Such notice shall modify general note 17 of the HTS by including Cura&#167;ao in the list of CBTPA beneficiary countries." />
                      <outline text="(10)  In order to reflect the expiration of the ATPA, the HTS is modified as set forth in Annex III to this proclamation." />
                      <outline text="(11)  The modifications to the HTS set forth in Annex III to this proclamation shall be effective with respect to goods that are entered, or withdrawn from warehouse for consumption, on or after July 31, 2013." />
                      <outline text="(12)  In order to provide the intended tariff treatment to goods of Chile under the terms of general note 26, the HTS is modified as set forth in Annex IV to this proclamation." />
                      <outline text="(13)  The modifications to the HTS set forth in Annex IV to this proclamation shall be effective with respect to goods that are entered or withdrawn from warehouse for consumption, on or after January 1, 2004." />
                      <outline text=" (14)  Any provisions of previous proclamations and Executive Orders that are inconsistent with the actions taken in this proclamation are superseded to the extent of such inconsistency." />
                      <outline text="IN WITNESS WHEREOF, I have hereunto set my hand this twenty-third day of December, in the year of our Lord two thousand thirteen, and of the Independence of the United States of America the two hundred and thirty-eighth." />
                      <outline text=" " />
                      <outline text="BARACK OBAMA" />
              </outline>

              <outline text="Executive Order -- Adjustments of Certain Rates of Pay">
                      <outline text="Link to Article" type="link" url="http://www.whitehouse.gov/the-press-office/2013/12/23/executive-order-adjustments-certain-rates-pay" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387851626_8jvCDykt.html" />
        <outline text="Source: White House.gov Press Office Feed" type="link" url="http://www.whitehouse.gov/feed/press" />
      <outline text="Tue, 24 Dec 2013 02:20" />
                      <outline text="" />
                      <outline text="The White House" />
                      <outline text="Office of the Press Secretary" />
                      <outline text="For Immediate Release" />
                      <outline text="December 23, 2013" />
                      <outline text="EXECUTIVE ORDER" />
                      <outline text="- - - - - - -" />
                      <outline text="ADJUSTMENTS OF CERTAIN RATES OF PAY" />
                      <outline text="By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby ordered as follows:" />
                      <outline text="Section 1. Statutory Pay Systems. The rates of basic pay or salaries of the statutory pay systems (as defined in 5 U.S.C. 5302(1)), as adjusted under 5 U.S.C. 5303, are set forth on the schedules attached hereto and made a part hereof:" />
                      <outline text="(a) The General Schedule (5 U.S.C. 5332(a)) at Schedule 1;" />
                      <outline text="(b) The Foreign Service Schedule (22 U.S.C. 3963) at Schedule 2; and" />
                      <outline text="(c) The schedules for the Veterans Health Administration of the Department of Veterans Affairs (38 U.S.C. 7306, 7404; section 301(a) of Public Law 102-40) at Schedule 3." />
                      <outline text="Sec. 2. Senior Executive Service. The ranges of rates of basic pay for senior executives in the Senior Executive Service, as established pursuant to 5 U.S.C. 5382, are set forth on Schedule 4 attached hereto and made a part hereof." />
                      <outline text="Sec. 3. Certain Executive, Legislative, and Judicial Salaries. The rates of basic pay or salaries for the following offices and positions are set forth on the schedules attached hereto and made a part hereof:" />
                      <outline text="(a) The Executive Schedule (5 U.S.C. 5312&apos;&apos;5318) at Schedule 5;" />
                      <outline text="(b) The Vice President (3 U.S.C. 104) and the Congress (2 U.S.C. 31) at Schedule 6; and" />
                      <outline text="(c) Justices and judges (28 U.S.C. 5, 44(d), 135, 252, and 461(a)) at Schedule 7." />
                      <outline text="Sec. 4. Uniformed Services. The rates of monthly basic pay (37 U.S.C. 203(a)) for members of the uniformed services, as adjusted under 37 U.S.C. 1009, and the rate of monthly cadet or midshipman pay (37 U.S.C. 203(c)) are set forth on Schedule 8 attached hereto and made a part hereof." />
                      <outline text="Sec. 5. Locality-Based Comparability Payments. (a) Pursuant to section 5304 of title 5, United States Code, and my authority to implement an alternative level of comparability payments under section 5304a of title 5, United States Code,locality-based comparability payments shall be paid in accordance with Schedule 9 attached hereto and made a part hereof." />
                      <outline text="(b) The Director of the Office of Personnel Management shall take such actions as may be necessary to implement these payments and to publish appropriate notice of such payments in the Federal Register." />
                      <outline text="Sec. 6. Administrative Law Judges. Pursuant to section 5372 of title 5, United States Code, the rates of basic pay for administrative law judges are set forth on Schedule 10 attached hereto and made a part hereof." />
                      <outline text="Sec. 7. Effective Dates. Schedule 8 is effective January 1, 2014. The other schedules contained herein are effective on the first day of the first applicable pay period beginning on or after January 1, 2014." />
                      <outline text="Sec. 8. Prior Order Superseded. Executive Order 13641 of April 5, 2013, is superseded as of the effective dates specified in section 7 of this order." />
                      <outline text="BARACK OBAMA" />
              </outline>

              <outline text="60 Minutes Continues Its Track Record Of Letting US National Security Officials Lie On Camera Without Challenge | Techdirt">
                      <outline text="Link to Article" type="link" url="http://www.techdirt.com/articles/20131223/12414525675/60-minutes-continues-its-track-record-letting-us-national-security-officials-lie-camera-without-challenge.shtml" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387841002_zF8eM8FY.html" />
      <outline text="Mon, 23 Dec 2013 23:23" />
                      <outline text="" />
                      <outline text="Apparently, CBS News&apos; 60 Minutes show is looking to end the year by being the choice of intelligence community propagandists everywhere, rather than listening to their well-respected colleague Morley Safer (still reporting at age 82) who once wrote a column quoting a US official telling him &quot;look, if you think any American official is going to tell you the truth, then you&apos;re stupid.&quot; Safer&apos;s colleagues at 60 Minutes would do well to keep that in mind, but when it comes to national security issues, they seem to prefer, as &quot;reporter&quot; John Miller has admitted, to be there solely to help the NSA get their side of the story out, no matter how bogus it might be.The week after Miller&apos;s big NSA love letter, 60 Minutes followed it up this week by having Lesley Stahl interview national security adviser to the President, Susan Rice. Rice makes a few claims that are just ridiculous. Here&apos;s the most ridiculous:" />
                      <outline text="Lesley Stahl: Officials in the intelligence community have actually been untruthful both to the American public in hearings in Congress and to the FISA Court." />
                      <outline text="Susan Rice: There have been cases where they have inadvertently made false representations. And they themselves have discovered it and corrected it." />
                      <outline text="This is not true. James Clapper flat out lied to Congress, and not inadvertently, either. In fact, the only use of the word &quot;inadvertently&quot; came in the direct lie that Clapper told, when he said that the US may &quot;inadvertently&quot; collect data on millions or hundreds of millions of Americans.Furthermore, the idea that &quot;they themselves have discovered and corrected it&quot; is also completely and totally bogus. As Ron Wyden has noted, he not only sent Clapper that question ahead of time, the very next day, his office contacted Clapper&apos;s office to ask if Clapper wanted to change his answer, and Clapper refused to do so. Then, when the Snowden leaks came out, proving that Clapper had lied, Clapper still tried to deny it. First he lied again, by saying he thought Wyden asked a different question (about email collections), but then Wyden pointed out that this was untrue, since he had sent Clapper the question the day before and the wording of the question was very clear. Next, Clapper claimed that it was impossible to answer the &quot;have you stopped beating your wife&quot; question in a &quot;yes or no&quot; manner -- even though the question was nothing like that. Then he finally said that he gave &quot;the least untruthful&quot; answer, by which he meant he flat out lied." />
                      <outline text="It was only once the public pointed out that he was lying that Clapper was forced to send a letter admitting that he spoke &quot;erroneously.&quot;" />
                      <outline text="So, Rice is either totally misinformed, or she&apos;s lying again to try to play down James Clapper lying to Congress. To claim both that the lies were &quot;inadvertent&quot; and that they were discovered by the intelligence community themselves and corrected is simply, unequivocally, false. Stahl could have called her out on this, but didn&apos;t. Honestly, my guess is that Rice is getting her talking points mixed up. The NSA likes to claim that when the NSA analysts have abused the system to spy on people illegally (such as &quot;love interests&quot;) that they&apos;ve discovered it themselves and reported it. Of course, even that&apos;s untrue. Many of the abuses were discovered years later -- and it&apos;s likely many were never discovered." />
                      <outline text="Meanwhile, as Rice completely brushes off the actual crime committed by Clapper by lying about, she also ratchets up the claims against Snowden... by lying about him as well. As Philip Bump points out, Stahl asks the same ridiculous question that keeps getting asked about will the administration offer Snowden amnesty for no longer releasing any more documents, ignoring that Snowden has already said that he no longer has the documents anyway. There&apos;s also the rotating claims of how many documents Snowden took (as if you can define &quot;document&quot; as a single entity anyway). For a while the claim was tens of thousands -- with most placing it in the 50,000 to 70,000 range. Yet, on last week&apos;s 60 Minutes suddenly it was 1.7 million documents. This past week it was just 1.5 million." />
                      <outline text="60 Minutes had a reputation for holding the government&apos;s feet to the fire on things with tough, knowledgeable questions. Lately, though, it seems to think its role is to act as a PR channel for the NSA." />
              </outline>

              <outline text="VIDEO-Rep. Mike Rogers: I&apos;d Pay For Edward Snowden&apos;s Ticket Back to U.S. to Face Charges - ABC News">
                      <outline text="Link to Article" type="link" url="http://abcnews.go.com/blogs/politics/2013/12/rep-mike-rogers-id-pay-for-edward-snowdens-ticket-back-to-u-s-to-face-charges/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387839411_JdyUFWBT.html" />
      <outline text="Mon, 23 Dec 2013 22:56" />
                      <outline text="" />
                      <outline text="Dec 22, 2013 1:11pm" />
                      <outline text="As the NSA faces new scrutiny over its surveillance activities, House Intelligence Committee Chair Rep. Mike Rogers, R-Mich., said he would &apos;&apos;personally pay&apos;&apos; for former NSA contractor Edward Snowden&apos;s plane ticket back to the U.S. to face charges for stealing agency secrets, adding that Snowden&apos;s writing of an open letter to Brazil asking for asylum in exchange for information amounts to the actions of a traitor." />
                      <outline text="&apos;&apos;I do think he should come home &apos;&apos; I&apos;d personally pay for his plane ticket &apos;&apos; and be held accountable for his actions,&apos;&apos; Rogers told George Stephanopoulos on &apos;&apos;This Week&apos;&apos; Sunday, amid new calls for amnesty for Snowden." />
                      <outline text="&apos;&apos;Here&apos;s where I think he&apos;s crossed the line now, George, he has contacted a foreign country and said, &apos;I will sell you classified information for something of value.&apos; That&apos;s what we call a traitor in this country,&apos;&apos; Rogers said of Snowden&apos;s letter to Brazil last week requesting asylum in exchange for helping the country investigate NSA spying on its soil." />
                      <outline text="Senate Intelligence Committee member Sen. Mark Udall, D-Colo., interviewed on &apos;&apos;This Week&apos;&apos; following Rogers, agreed that Snowden should return to the U.S., saying, &apos;&apos;he broke his oath. He broke the law.&apos;&apos;" />
                      <outline text="&apos;&apos;He ought to stand on his own two feet. He ought to make his case,&apos;&apos; said Udall, who has been a longtime critic of the NSA&apos;s surveillance activities. &apos;&apos;Come home, make the case that somehow there was a higher purpose here, but Edward Snowden ought to come back to the United States.&apos;&apos;" />
                      <outline text="The NSA&apos;s surveillance programs are facing new criticism after a federal judge ruled last week that the agency&apos;s phone data collection program was unconstitutional, while an expert panel commissioned by President Obama released a report Thursday making 46 recommendations to reform the NSA&apos;s surveillance activities, including curbing its collection of telephone metadata." />
                      <outline text="Rogers said he disagreed with those who believe the report was &apos;&apos;devastating&apos;&apos; to the NSA, noting that it found no abuses, and only recommended changing how phone call data was collected and stored." />
                      <outline text="&apos;&apos;They found no violations, no unlawful activity, no scandal, none of that was found in this report, but what they said maybe it shouldn&apos;t be with the government, maybe it should be mandated by the government that it&apos;s held by the private companies. And I think that&apos;s a very different debate and a debate that we should have.&apos;&apos;" />
                      <outline text="&apos;&apos;So I think this is not the &apos;Holy Grail&apos; of reports, but I do think it crossed a very important milestone in saying, hey, no scandal, no law-breaking, now let&apos;s just have an honest debate about where we think we ought to go in trying to stop terrorists from blowing up American citizens here in the United States,&apos;&apos; Rogers added." />
                      <outline text="But Rogers questioned whether having private phone companies or a third party hold phone data instead of the NSA and requiring a court order for access would provide greater privacy for Americans." />
                      <outline text="&apos;&apos;I&apos;m reluctant, because I think it opens it up to more privacy violations when the companies hold it,&apos;&apos; Rogers said. &apos;&apos;They don&apos;t have somebody directly controlling that information.&apos;&apos;" />
                      <outline text="Udall expressed more support for the recommendations by the White House panel, including for ending the NSA&apos;s collection of phone data of Americans." />
                      <outline text="&apos;&apos;The arguments for the status quo, George, fell apart this week in Washington,&apos;&apos; Udall said in response to the panel&apos;s report. &apos;&apos;The NSA has overreached.&apos;&apos;" />
                      <outline text="&apos;&apos;I think we need to look at all 46 [recommendations] &apos;&apos; I&apos;m still studying the report myself. But there are many, many important reforms,&apos;&apos; Udall added. &apos;&apos;It&apos;s time on to have real reform, not a veneer of reform. You know why? Because we have got to rebuild the American people&apos;s trust in our intelligence committee so we can be safe, so we can meet the threats that are all over the world. But we don&apos;t do that by bulk data collection that violates the privacy of Americans, that&apos;s unconstitutional, and has shown to not be effective.&apos;&apos;" />
                      <outline text="When asked if the country would be engaged in a debate over the NSA&apos;s surveillance without Snowden&apos;s revelations, Udall called it a &apos;&apos;conundrum.&apos;&apos;" />
                      <outline text="&apos;&apos;That&apos;s a conundrum. That&apos;s an important question,&apos;&apos; Udall said. &apos;&apos;We have a lot of wilderness here in Colorado. I feel like Senator [Ron] Wyden and I have been shouting from the wilderness for a number of years about the violations of Americans&apos; privacy conducted by the NSA. Finally, our point of view has been affirmed, and it&apos;s now time to really fundamentally reform the way in which the NSA operates. The president&apos;s panel made that very, very clear.&apos;&apos;" />
                      <outline text="Like &apos;&apos;This Week&apos;&apos; on Facebook. You can also follow the show on Twitter." />
                      <outline text="Check out what time &apos;&apos;This Week&apos;&apos; airs in your area." />
              </outline>

              <outline text="VIDEO-Former CIA Deputy Director: NSA &quot;is not spying on Americans&quot; - CBS News">
                      <outline text="Link to Article" type="link" url="http://www.cbsnews.com/news/former-cia-deputy-director-nsa-is-not-spying-on-americans/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387839031_acmM9QzR.html" />
      <outline text="Mon, 23 Dec 2013 22:50" />
                      <outline text="" />
                      <outline text="A former deputy director of the CIA said definitively that the National Security Agency (NSA) &apos;&apos;is not spying on Americans.&apos;&apos;" />
                      <outline text="&apos;&apos;I think that is a perception that&apos;s somehow out there.  It is not focused on any single American.  It is not reading the content of your phone calls or my phone calls or anybody else&apos;s phone calls.  It is focused on this metadata for one purpose only and that is to make sure that foreign terrorists aren&apos;t in contact with anybody in the United States,&apos;&apos; said Michael Morell on CBS&apos; &apos;&apos;Face the Nation.&apos;&apos; " />
                      <outline text="Morell served on the Review Group on Intelligence and Communications Technologies commissioned by President Obama to recommend reforms to surveillance programs after documents leaked by former government contractor Edward Snowden revealed the extent of the NSA&apos;s surveillance." />
                      <outline text="Last week, the review group issued a report outlining dozens of potential changes, including a recommendation that the NSA cede control of the phone-records database to a third party or the telephone companies that originally provided the data." />
                      <outline text="&apos;&apos;The current storage by the government of bulk meta-data creates potential risks to public trust, personal privacy, and civil liberty,&apos;&apos; the report said." />
                      <outline text="Morell expanded on that recommendation on Sunday." />
                      <outline text="&apos;&apos;We believe that the government should not hold this data any longer. We will leave it an open question who should.  But we say the government shouldn&apos;t hold this data, somebody else should,&apos;&apos; Morell said. &apos;&apos;The second thing we say is that NSA should have to get a court order for every individual time they want to query this data, not operate under a blanket court order. We think that better protects privacy and civil liberties, while at the same time allowing the government to do what it needs to protect the country.&apos;&apos;" />
                      <outline text="Turning over the phone data to another party &apos;&apos; his preference would be a private consortia, he said &apos;&apos; would only add two to four days to the process of the NSA being able to obtain the data, and would have an emergency exception for data that was needed very quickly." />
                      <outline text="Morell largely defended the NSA, saying it was merely doing what it was told to by the U.S. government and that it had extensive oversight from congressional committees. " />
                      <outline text="&apos;&apos;There was no abuse here,&apos;&apos; he said. &apos;&apos;They were doing exactly what they were told to do. I think that&apos;s important context for people to know.&apos;&apos;" />
                      <outline text="Regarding the possibility that Snowden might receive amnesty if he returned to the U.S., Morell said he felt strongly that the alleged whistleblower should not." />
                      <outline text="&apos;&apos;He violated the trust put in him by the United States government.  He has committed a crime in my view. You know, a whistleblower doesn&apos;t run. A whistleblower does not disclose information that has nothing to do with what he says his cause is, which is the privacy and civil liberties of Americans,&apos;&apos; he said. &apos;&apos;If you really believe that Americans should be the judge of this program, then you should also believe that the Americans should be the judge of your behavior in this regard.  So if you are the patriot that you say you are, you should come home and be judged.&quot;" />
              </outline>

              <outline text="Lesley Stahl - Wikipedia, the free encyclopedia">
                      <outline text="Link to Article" type="link" url="http://en.wikipedia.org/wiki/Lesley_Stahl" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387838398_ZU9JRB8U.html" />
      <outline text="Mon, 23 Dec 2013 22:39" />
                      <outline text="" />
                      <outline text="Lesley Rene Stahl[1] (born December 16, 1941) is an American television journalist. Since 1991, she has reported for CBS on 60 Minutes." />
                      <outline text="Personal life[edit]Stahl was born in Lynn, Massachusetts and raised in Swampscott, Massachusetts. She is of Jewish heritage, the daughter of Dorothy J. (n(C)e Tishler), and Louis E. Stahl, a food company executive.[1][2][3] In 1977, Stahl married author Aaron Latham. They have one child, Taylor Stahl Latham. The couple currently lives in New York." />
                      <outline text="An honors graduate of Wheaton College who majored in History,[4] Stahl began her television broadcasting career at Boston&apos;s original Channel 5, WHDH-TV as a producer and on-air reporter.[5] She joined CBS News in 1972, and became a correspondent in 1974. &quot;I was born on my 30th birthday,&quot; Stahl would later write about the experience. &quot;Everything up till then was prenatal.&quot;[6] Stahl credits her CBS News hire to the Federal Communication Commission&apos;s 1972 inclusion of women in its affirmation action mandate: &quot;the television networks were scouring the country for women and blacks with any news experience at all. A friend in New York had called to tell me about a memo floating around CBS News mandating that &apos;the next reporter we hire will be a woman.&apos;&quot;[7] According to Stahl, Connie Chung and Bernard Shaw were &quot;the two other &apos;affirmative action babies&apos; in what became known as the Class of &apos;72.&quot;[8]" />
                      <outline text="Stahl&apos;s prominence grew after she covered the Watergate affair.[9] She went on to become White House correspondent during the presidencies of Jimmy Carter, Ronald Reagan and George H. W. Bush. At the Republican Convention of 1980, she broke the news on CBS that Reagan&apos;s negotiations with ex-President Ford had broken down and the answer to the question of who would be vice-presidential nominee was: &quot;It&apos;s Bush! Yes, it&apos;s Bush!&quot; George H. W. Bush had been standing perhaps not far away, largely off by himself, looking discouraged because he was sure he wasn&apos;t going to be chosen." />
                      <outline text="Stahl was the moderator of Face the Nation between September 1983 and May 1991. In addition, from 2002&apos;&apos;2004, she hosted 48 Hours Investigates. In 2002, Stahl made headlines when Al Gore appeared on 60 Minutes and revealed for the first time that he would not run for president again in 2004. When Katie Couric was hired, CBS News asked Stahl to reduce her salary by $500,000 to accommodate Couric&apos;s salary, bringing her salary down to $1.8 million.[10][11] In October 2007, Nicolas Sarkozy, President of France, stood up and walked away from an interview with Stahl, because she asked him about his relationship with his soon-to-be estranged spouse.[12]" />
                      <outline text="In 1998, she appeared in an episode of Frasier, playing herself in the episode &quot;Desperately Seeking Closure&quot;." />
                      <outline text="Stahl has written one book, Reporting Live, which was published in 1999:" />
                      <outline text="I had decided by August 1989, in my 48th year, that I had already had the best day of my life. [. . .] Then we went to Rwanda to see the mountain gorillas, Dian Fossey&apos;s gorillas in the mist. [. . .] After two and a half hours [. . .] there they were: two baby gorillas frolicking like any four-year-olds. We snapped and stared. We were right there, in their lives, in the middle of their open-air house. And then the silverback, the patriarch, seemed to welcome us, as three females kept grooming him. [. . .] We spent one hour in their world, watching them tumble and wrestle, nurse their babies, swing in the trees, forage for food&apos;--vines, leaves, berries&apos;-- [. . .] so close that a female reached out to touch me. When I went to reciprocate, the guide hit my arm with a stick. &quot;Non, madame. C&apos;est inderdit.&quot; [. . .] What I decided that day with the gorillas in Rwanda was that the best day of your life may not have happened yet. No matter what you think.[13]" />
                      <outline text="She received a Doctorate of Humane Letters honoris causa from Colgate University in 2008[14] and a Doctorate of Humane Letters honoris causa from Loyola College in Maryland in 2008." />
                      <outline text="Lesley Stahl is one of the founding members, along with Liz Smith, Mary Wells Lawrence, and Joni Evans, of wowOwow.com, a website for women to talk about culture, politics, and gossip." />
                      <outline text="She is a member of the Council on Foreign Relations.[15]" />
                      <outline text="Stahl is on the Board of Selectors of Jefferson Awards for Public Service.[16]" />
                      <outline text="Career timeline[edit]Bibliography[edit]References[edit]&#094; ab&quot;Lesley Stahl Biography (1941-)&quot;. Filmreference.com. Retrieved 2009-05-01. &#094;Smilgis, Martha (1977-10-31). &quot;CBS Anchor Lesley Stahl and Writer Aaron Latham Have a Mixed-Media Marriage&quot;. People.com. Retrieved 2009-05-01. &#094;&quot;Louis E. Stahl, Executive and Philanthropist, 80 - The&quot;. New York Times. 1994-09-01. Retrieved 2009-05-01. &#094;Donna Lee, &quot;Facts Come First for Lady Reporter,&quot; Boston Herald American, November 26, 1976, p. 14&#094;Anthony LaCamera, &quot;Of People and Programs.&quot; Boston Herald, September 30, 1974, p. 10.&#094;&quot;I was born on my 30th birthday. Everything up till then was prenatal. By 30 I knew two things for sure. One was that I wanted to be a journalist, which would mean, in the environment of the early 1970s, surmounting my femaleness and my blondness.&quot; Stahl, Lesley. Reporting Live, Simon &amp; Schuster, 1999, opening paragraph; citation from the unabridged Large Print edition, G. K. Hall &amp; Co., Thorndike, Maine, 1999, p. 9. ISBN 0-684-82930-4&#094;Stahl, Lesley. Reporting Live, Simon &amp; Schuster, 1999; citation from the unabridged Large Print edition, G. K. Hall &amp; Co., Thorndike, Maine, 1999, p. 10. ISBN 0-684-82930-4&#094;Stahl, Lesley. Reporting Live, Simon &amp; Schuster, 1999; citation from the unabridged Large Print edition, G. K. Hall &amp; Co., Thorndike, Maine, 1999, p. 13. ISBN 0-684-82930-4&#094;&quot;I found an apartment in the Watergate complex, moved all my stuff from Boston, and didn&apos;t miss a day of work. [. . .] June 1972. Most of the reporters in our bureau were on the road, covering the presidential campaign. Thus, I was sent out to cover the arrest of some men who had broken into one of the buildings in the Watergate complex. That CBS let me, the newest hire, hold on to Watergate as an assignment was a measure of how unimportant the story seemed: [. . .] I was the only television reporter covering the early court appearances. When the five Watergate burglars asked for a bail reduction, I got my first scoop. Unlike my competitors, I was able to identify them. The next time the cameraman listened when I said, &apos;Roll! That&apos;s them!&apos; And so CBS was the only network to get pictures of the burglars. I was a hero at the bureau.&quot; Stahl, Lesley. Reporting Live, Simon &amp; Schuster, 1999; citation from the unabridged Large Print edition, G. K. Hall &amp; Co., Thorndike, Maine, 1999, pp. 18-19. ISBN 0-684-82930-4&#094;&quot;Katie Couric Learns What Happens When Great Expectations Go Unmet - New York Magazine&quot;. Nymag.com. 2007-07-16. Retrieved 2009-05-01. &#094;&quot;TV Guide Reports on TV Star Salary Ranges - Today&apos;s News: Our Take&quot;. TVGuide.com. 2007-07-26. Retrieved 2009-05-01. &#094;Sarkozy L&apos;Americain (Sarkozy The American), 60 Minutes, CBS, 10.28.2007&#094;&quot;When we got to the base of the mountain, we were put in a group of eight. &apos;How old are these children?&apos; asked the head of the Mountain Gorilla Project, pointing to 12-year-old Taylor [Stahl&apos;s daughter] and ten-year-old Matthew [Stahl&apos;s nephew]. &apos;Fifteen,&apos; we lied. Anyone younger was barred from contact with the gorillas to protect them from human childhood diseases. Taylor passed, but even though we had put glasses on Matthew and draped our most expensive camera around his neck, they pulled him out of the group. Jeff [Stahl&apos;s brother] stayed behind with him.&quot; Stahl, Lesley. Reporting Live, Simon &amp; Schuster, 1999; citation from the unabridged Large Print edition, G. K. Hall &amp; Co., Thorndike, Maine, 1999, pp. 619-622. ISBN 0-684-82930-4&#094;&quot;Lesley Stahl of CBS to deliver commencement address&quot;. 2008-02-21. Retrieved 2008-05-18. &#094;2009 Annual Report of the Council on Foreign Relations&#094;http://www.jeffersonawards.org/board&#094; abc&quot;Lesley Stahl | September 29, 2005 14:30:28&quot;. CBS News. 1998-07-09. Retrieved 2009-05-01. &#094;Lesley Stahl at the Internet Movie DatabaseExternal links[edit]" />
              </outline>

              <outline text="Ian Cameron to Leave ABC&apos;s &apos;This Week&apos; - TVNewser">
                      <outline text="Link to Article" type="link" url="http://www.mediabistro.com/tvnewser/ian-cameron-to-leave-abcs-this-week_b40619" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387837678_fASFnG5r.html" />
      <outline text="Mon, 23 Dec 2013 22:27" />
                      <outline text="" />
                      <outline text="First on TVNewser:Ian Cameron, the executive producer of ABC&apos;s &apos;&apos;This Week with Christiane Amanpour,&apos;&apos; is leaving the program at the end of the year, people familiar with the decision tell TVNewser." />
                      <outline text="Cameron was named executive producer of &apos;&apos;This Week&apos;&apos; in 2008, and before that served as senior Washington producer for &apos;&apos;ABC World News with Charles Gibson.&apos;&apos; He had been with ABC News since 1998." />
                      <outline text="&apos;&apos;Nightline&apos;&apos; executive producer James Goldston, who added oversight of &apos;&apos;This Week&apos;&apos; in August, will take over day-to-day operations when Cameron departs." />
                      <outline text="Based on a memo sent to employees by ABC News president David Westin, it appears that there may be some consolidation among the &apos;&apos;Nightline&apos;&apos; and &apos;&apos;This Week&apos;&apos; staff once the transition is complete:" />
                      <outline text="Update: It&apos;s official, the letters from Westin and Cameron are after the jump." />
                      <outline text="From: Westin, David L.Sent: Friday, November 19, 2010 10:43 AMTo: #ABCTV News ALLSubject: This Week" />
                      <outline text="As Ian Cameron has written below to his staff, he has decided to step down as executive producer of This Week at the end of the year.  Ian has done an outstanding job at the helm of our Sunday program, first with George Stephanopoulos, and more recently with Christiane Amanpour. But it&apos;s come at the expense of his time with his family on weekends, something he&apos;s made clear for some time could not go on indefinitely. Last spring, he agreed to stay on to help with the introduction of the new version of This Week we began with Christiane. He accomplished what he set out to do, and we are in his debt." />
                      <outline text="We are grateful to Ian as well for his 13 years of excellent work in our Washington Bureau and on World News." />
                      <outline text="James Goldston has been working with Ian and me for several months on This Week, and at the end of the year he will take over day-to-day responsibilities for producing the program, relying on the capable This Week staff in Washington as well as integrating operations where it makes sense with the Nightline team." />
                      <outline text="Please join me in wishing Ian the very best as he moves to the next chapter of his fine career." />
                      <outline text="From: Cameron, Ian O." />
                      <outline text="To the This Week Staff:" />
                      <outline text="Having successfully launched This Week with Christiane Amanpour and with the busy mid-term election behind us, I believe the end of this year is the right time for me to move on from ABC News.  As many of you know working weekends for the past two years has been difficult for my family.  They have been both supportive and enormously patient, but now it&apos;s time for me to return to a more regular schedule." />
                      <outline text="When Christiane Amanpour joined ABC news last spring, she enthusiastically asked me to continue as This Week&apos;s Executive Producer.  I was excited by the opportunity to work with such an accomplished and passionate journalist.  Together, with all of you on the This Week team, we set out to broaden the mission of the program by capitalizing on Christiane&apos;s lifetime experience as a reporter in the field and her passion for international affairs.  Since we began on August 1st, I am proud that This Week with Christiane Amanpour has established itself as a distinct voice on Sunday mornings, going beyond the beltway to explore how policy affects the lives of Americans and beyond our border to explore how the fast-changing global environment shapes America and how US policy impact the world." />
                      <outline text="It&apos;s with a mixture of pride and sadness that I leave ABC News after 13 years.  As Washington Senior Producer for World News Tonight for seven years, I am grateful to Peter Jennings and Charles Gibson for giving me the opportunity to work with the most dedicated and talented team of reporters and producers here in the Washington bureau and across the news division." />
                      <outline text="I also want to thank George Stephanopoulos for inviting me to join This Week.  It has been a privilege to contribute to the national political conversation and to work with ABC&apos;s talented team of anchors and correspondents who hosted This Week during the interim period:  Jake Tapper, Barbara Walters, Jon Karl, Terry Moran and Elizabeth Vargas." />
                      <outline text="Finally, I am deeply grateful to all of you &apos;&apos; my colleagues and friends at This Week.  Our editorial and production team, roundtable contributors and crew at the Newseum have consistently delivered the best program on Sunday mornings.     Together, with Christiane in the anchor chair, I am certain that This Week with Christiane Amanpour will continue to break new ground and distinguish itself." />
                      <outline text="Meanwhile, we have some more broadcasts to do!" />
                      <outline text="Ian" />
              </outline>

              <outline text="VIDEO-Susan Rice on contending with crisis - CBS News">
                      <outline text="Link to Article" type="link" url="http://www.cbsnews.com/news/national-security-advisor-susan-rice/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387836786_GerfnqpR.html" />
      <outline text="Mon, 23 Dec 2013 22:13" />
                      <outline text="" />
                      <outline text="President Obama&apos;s national security advisor answers questions about the NSA leaks, Iran, Syria and the attack in Benghazi" />
                      <outline text="The following script is from &quot;Susan Rice&quot; which aired on Dec. 22, 2013. Lesley Stahl is the correspondent. Rich Bonin, producer." />
                      <outline text="From her first day on the job as President Obama&apos;s national security advisor, Susan Rice has had to contend with one crisis on top of the other: the Edward Snowden leaks, the chemical weapons attack in Syria, Egypt, Iran, China, Russia&apos;...you name it." />
                      <outline text="During her four years as the U.S. ambassador to the UN, she had a reputation, as one magazine put it, for being &quot;whip-smart, energetic, abrasive, charming, funny, combative, and frequently undiplomatic.&quot;" />
                      <outline text="And yet the president wanted to name her to replace Hillary Clinton as secretary of state. But then she walked into the Benghazi buzzsaw. She got swept up in the dispute over who attacked the U.S. diplomatic post in Benghazi, Libya. There was no chance she would be confirmed by the Senate. So last July, she became one of the president&apos;s closest advisors -- both personally, and in terms of proximity." />
                      <outline text=" Lesley Stahl: The Oval Office is right there?Susan Rice: Down, actually, in the corner." />
                      <outline text="Lesley Stahl: Down there?" />
                      <outline text="As the president&apos;s national security advisor, Susan Rice works in what some consider the second best office in the White House.   " />
                      <outline text="Lesley Stahl: This is the office, huh?" />
                      <outline text="Susan Rice: This is Henry&apos;s office, as we call it." />
                      <outline text="Lesley Stahl: Henry&apos;s office, Henry Kissinger&apos;s office." />
                      <outline text="As Kissinger was, Rice is the quarterback of American foreign policy.  She&apos;s the one who wakes up the president when there&apos;s a 3 a.m. international crisis." />
                      <outline text="Susan Rice: My job is to bring the good news and the bad news and often in this business it can be more bad than good." />
                      <outline text="And there&apos;s so much of it that&apos;s bad. Her plate has been full from the day she got the job." />
                      <outline text="Lesley Stahl: I wanna give you a quote that a foreign policy expert gave us. &quot;Syria has been a fiasco. Egypt is a fiasco. Relations with our closest allies in the Middle East are deteriorating. And at this moment in time, the Chinese choose to provoke Japan... And we are leaning back.&apos;&apos;" />
                      <outline text="Susan Rice: I couldn&apos;t disagree with that more. But you wouldn&apos;t be surprised to hear me say that&apos;--" />
                      <outline text="Lesley Stahl: No." />
                      <outline text="Susan Rice: We are very actively engaged in trying to broker a resolution of the Israeli-Palestinian conflict after months, if not years, of stalemate. In Syria chemical weapons are leaving the country for the first time. The situation in the Middle East is complicated. But to paint this with a broad brush and say it&apos;s a disaster, I think, is missing a lot of important data points." />
                      <outline text="Lesley Stahl: But it&apos;s in as much turmoil, I think, you tell me, as it&apos;s ever been." />
                      <outline text="Susan Rice: How about Suez? I mean, let&apos;s study a little history." />
                      <outline text="Lesley Stahl: But that was one place, you know?" />
                      <outline text="Susan Rice: Yeah, but that was almost a global conflict in the Middle East. I think hyperbole is something to be utilized carefully." />
                      <outline text="Lesley Stahl: On both sides?" />
                      <outline text="Susan Rice: Yes." />
                      <outline text="Lesley Stahl: Edward Snowden. You know, Snowden is believed to have a million and a half more documents that have never been released. Given that, would you, would the president, consider granting him amnesty in exchange for him never releasing any more documents?" />
                      <outline text="Susan Rice: Well, Lesley, we don&apos;t think that Snowden deserves amnesty. We believe he should come back, he should be sent back, and he should have his day in court." />
                      <outline text="Lesley Stahl: But if what he&apos;s released so far has been so damaging and he has a million and a half more documents, how important is it that he not release those? And what would we offer him, nothing?" />
                      <outline text="Susan Rice: Lesley, you know I&apos;m not going to get into a negotiation with you on camera about something that sensitive--" />
                      <outline text="Lesley Stahl: You just seemed to suggest no&apos;--" />
                      <outline text="Susan Rice: -- but the position of the United States is that he ought to come back and face justice." />
                      <outline text="Lesley Stahl: Has he either directly, indirectly, in any way proposed such an arrangement?" />
                      <outline text="Susan Rice: Not that I&apos;m aware of." />
                      <outline text="This past week, a federal judge ruled that the NSA&apos;s bulk collection of American phone records, revealed in Snowden&apos;s leaks, &apos;&apos;almost certainly&apos;&apos; violates the Constitution, while a panel of intelligence and legal experts urged the president to impose new restrictions on the NSA." />
                      <outline text="Lesley Stahl: According to an article in the New Yorker, every time there&apos;s been a question about putting restraints on the NSA up to now, the president has sided with the intelligence community." />
                      <outline text="Susan Rice: What the NSA and our intelligence community does as a whole is designed to protect Americans and our allies. And they do a heck of a good job at it." />
                      <outline text="Lesley Stahl: Officials in the intelligence community have actually been untruthful both to the American public in hearings in Congress and to the FISA Court." />
                      <outline text="Susan Rice: There have been cases where they have inadvertently made false representations. And they themselves have discovered it and corrected it. " />
                      <outline text="Lesley Stahl: But when you have so many phone records being held, emails, heads of state&apos;s phone conversations being listened in to, has it been worth our allies being upset? Has it been worth all the tech companies being upset? Has it been worth Americans feeling that their privacy has been invaded?" />
                      <outline text="Susan Rice: Lesley, it&apos;s been worth what we&apos;ve done to protect the United States. And the fact that we have not had a successful attack on our homeland since 9/11 should not be diminished. But that does not mean that everything we&apos;re doing as of the present ought to be done the same way in the future." />
                      <outline text="Susan Rice works 14 to 16-hour days. She&apos;s not the first woman to be national security advisor, or the first African American. But she is the first mother. She has two kids: Jake, 16 and Maris, 11." />
                      <outline text="&quot;Lesley, it&apos;s been worth what we&apos;ve done to protect the United States. And the fact that we have not had a successful attack on our homeland since 9/11 should not be diminished. But that does not mean that everything we&apos;re doing as of the present ought to be done the same way in the future.&quot;Lesley Stahl: See anyone you recognize?" />
                      <outline text="A rare afternoon off is Sunday...when she goes to Maris&apos; soccer game." />
                      <outline text="Susan Rice: Maris is.. she&apos;s got blonde hair pulled back in a ponytail." />
                      <outline text="Lesley Stahl: Oh yeah." />
                      <outline text="Her husband, Ian Cameron, used to be an executive producer at ABC News." />
                      <outline text="Ian Cameron: Hey, how are you? Nice to see you. Thanks for coming out." />
                      <outline text="As the match proceeded, we got a sense of how fiercely competitive Susan Rice is when Maris scored a goal." />
                      <outline text="Susan Rice: Scream! You guys have to come every week &apos;cause you&apos;re good luck." />
                      <outline text="In the middle of everything, her BlackBerry went off and so did she, to confer with Secretary of State Kerry calling from Abu Dhabi.   " />
                      <outline text="Lesley Stahl: How often when you do carve out time for your family, does work impinge?  Intrude?" />
                      <outline text=" Susan Rice: You&apos;re never not working. I mean, you always have your BlackBerry and you have to be accessible. Even if the phone doesn&apos;t ring, you better be checking your email from time to time.Lesley Stahl: Ian, you actually have stopped working." />
                      <outline text="Ian Cameron: Yeah." />
                      <outline text="Lesley Stahl: To take care of the kids?" />
                      <outline text="Ian Cameron: Yeah. Well we were in a situation, you know, financially that one of us could step out of the working world." />
                      <outline text="&quot;You&apos;re never not working. I mean, you always have your BlackBerry and you have to be accessible. Even if the phone doesn&apos;t ring, you better be checking your email from time to time.&quot;Lesley Stahl: What about the racial difference, was that ever an issue, a problem?" />
                      <outline text="Ian Cameron:  It&apos;s interesting how much the country has changed, even in Washington, D.C., I think there were times, you know, 30 years ago where we were self-conscious about holding hands in Washington, D.C., where we worked." />
                      <outline text="Susan Rice: Now, absolutely never occurs to us.  We never hear or even sense anything." />
                      <outline text="Rice, 49, grew up in the national&apos;s capital, on Embassy Row." />
                      <outline text="Lesley Stahl: D.C. girl through and through?" />
                      <outline text="Susan Rice: Born and raised." />
                      <outline text="Her father was a governor of the Federal Reserve Board; her mother, a leading figure in education policy. And Rice herself had a distinguished academic career. Stanford and Rhodes Scholar." />
                      <outline text="Susan Rice: There were those who wanted to suggest as I was growing up, that any success I might have had was because of affirmative action. And that didn&apos;t sit well with me. And so from--" />
                      <outline text="Lesley Stahl: That must&apos;ve hurt." />
                      <outline text="Susan Rice: Well, I resented it. I don&apos;t know if it hurt because I didn&apos;t think it was true." />
                      <outline text="She describes herself not as an idealist, which is her reputation, but as a pragmatist like Henry Kissinger. Most days she&apos;s at her desk dealing with one crisis and hotspot after the next, like overseeing the six-month deal with Iran that freezes their nuclear program in exchange for some modest sanctions relief." />
                      <outline text="Lesley Stahl: Say you get the comprehensive agreement and they get the sanctions lifted. If they cheat, then it&apos;s going to be pretty impossible to get the sanctions back, given Russia, China. And a lot of people think that&apos;s their strategy: Make a deal, get rid of the sanctions, build a bomb." />
                      <outline text="Susan Rice: But Lesley, we will not construct a deal or accept a deal in which we cannot verify exactly what they are doing. And if they&apos;re caught we will insure that the pressure is re-imposed on them because&apos;-- take it from me, I worked on-- I worked on this at the United Nations. I know a little bit somethin&apos; about Security Council resolutions and how to impose sanctions and how to lift sanctions. And there are ways to do that that impose automatic triggers, if possible, on-- for failure to comply. Now, we haven&apos;t designed that resolution yet. But this is something that&apos;s quite doable." />
                      <outline text="Lesley Stahl: You say we&apos;re not willing to allow them to have a nuclear bomb. But what about what they call-- leaving them to be a nuclear threshold power, which means that they can be a power that has the capacity to develop a bomb in several months." />
                      <outline text="Susan Rice: We do not want Iran to be not only to have a bomb, but be in a position to race towards a bomb undetected." />
                      <outline text="Lesley Stahl: Watching their behavior over many, many years, you know, it defies imagination almost that they are going to give this up." />
                      <outline text="Susan Rice: I mean, let&apos;s be clear. There&apos;s no trust. There&apos;s no naivety. The question is if a policy designed to put maximum economic pressure on them actually has come to the point where they are choking. Their currency is down 50 percent. Their oil revenues are down 50 percent. Their inflation is up. They&apos;re hurting. And the question is are they hurting enough so that they are going to be willing to make some very difficult decisions that they&apos;ve resisted making thus far and give up in a verifiable way this nuclear program? The answer is we don&apos;t know. But the other half of the answer is we have every interest in testing that proposition." />
                      <outline text="Over the summer, Rice led a review of U.S. policy in the Middle East resulting in a new direction away from the use of force and a scaling back in the region that has upset our allies there like Saudi Arabia." />
                      <outline text="But it seems there&apos;s no escaping the Middle East. Take the civil war in Syria where President Assad&apos;s forces have gained ground, and among the opposition &apos;&apos; Islamic extremists are gaining over the moderates that are backed by the U.S." />
                      <outline text="Lesley Stahl: So was it a mistake not to train and arm those moderates early on?" />
                      <outline text="Susan Rice: Well, Lesley, I think we&apos;ll have to review that  in the context of history. And I can&apos;t judge that at this point." />
                      <outline text="But what about the humanitarian crisis in Syria? More than 100,000 killed; eight million driven from their homes. After the genocide in Rwanda, when Rice worked on President Clinton&apos;s national security council, she vowed if there ever was another atrocity, she would support dramatic action. So why no dramatic action in Syria?" />
                      <outline text="Susan Rice: It&apos;s not that simple. The international community isn&apos;t unified, there&apos;s no agreement to intervene, there&apos;s no basis in international law to intervene. And yet nobody who works on that problem is at all satisfied with how it&apos;s unfolded." />
                      <outline text="Susan Rice became national security advisor as a consolation prize. She lost her chance to be Secretary of State when she &apos;&apos; then the UN ambassador &apos;&apos; was asked to pinch hit for Hillary Clinton and answer questions about the attack on the U.S. diplomatic post in Benghazi where our ambassador to Libya, Christopher Stevens, and 3 others were killed. " />
                      <outline text="[Susan Rice on &quot;Face the Nation&quot;: What our assessment is as of the present, is in fact what, it began spontaneously in Benghazi&apos;...]" />
                      <outline text="That particular assessment from talking points prepared by the CIA was wrong, and Rice was accused of being deliberately misleading. But a former senior intelligence official told us that the talking point that called the Benghazi attack spontaneous was precisely what classified intelligence reports said at the time." />
                      <outline text="Susan Rice: I don&apos;t have time to think about a false controversy. In the midst of all of the swirl about things like talking points, the administration&apos;s been working very, very hard across the globe to review our security of our embassies and our facilities. That&apos;s what we ought to be focused on." />
                      <outline text="Lesley Stahl: But the questions keep coming. When someone heard that I was going to be talking to you they said, &quot;You have to ask her why Hillary Clinton didn&apos;t do the interview that morning.&quot; Did she, did she smell trouble?" />
                      <outline text="Susan Rice: She had just gone through an incredibly painful and stressful week. Secretary Clinton, as our chief diplomat, had to reach out to the families, had to greet the bodies upon their arrival at Andrews Air Force Base. If I were her, the last thing I would have wanted to do is five Sunday morning talk shows.  So I think it&apos;s perfectly understandable--" />
                      <outline text="Lesley Stahl: So when they asked you &apos;&apos;" />
                      <outline text="Susan Rice: So when the White House asked me, I agreed to do it." />
                      <outline text="Lesley Stahl: Do you ever think, &quot;Gee, I wish I hadn&apos;t done that.&quot; You know, if you hadn&apos;t done that, I&apos;d be calling you Madam Secretary of State maybe." />
                      <outline text="Susan Rice: Well, you can call me Susan." />
                      <outline text="(C) 2013 CBS Interactive Inc. All Rights Reserved." />
              </outline>

              <outline text="VIDEO-Why Does CBS Keep Asking Its Ridiculous Amnesty Question About Snowden? - The Wire">
                      <outline text="Link to Article" type="link" url="http://www.thewire.com/politics/2013/12/why-does-cbs-keep-asking-its-completely-wrong-amnesty-question-about-snowden/356431/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387836512_a26Q3Jdw.html" />
      <outline text="Mon, 23 Dec 2013 22:08" />
                      <outline text="" />
                      <outline text="During an interview with National Security Adviser Susan Rice that aired Sunday, CBS&apos; Lesley Stahl asked Rice if the government was considering offering amnesty to Edward Snowden. Stop asking this, CBS. You&apos;re getting a lot of things wrong &apos;-- and it will never, ever happen." />
                      <outline text="The conversation between Stahl and Rice aired a week after 60 Minutes&apos; now-infamous whitewash of the National Security Agency by reporter John Miller, during which the same question was asked. Rice gave a more forceful answer to the question than did Rick Ledgett, head of the NSA&apos;s internal security review. Ledgett said the idea of amnesty was worth considering. Rice did not." />
                      <outline text="Stahl: You know, Snowden is believed to have a million-and-a-half more documents that have never been released. Would you &apos;-- would the president consider granting him amnesty in exchange for him never releasing any more documents?" />
                      <outline text="Rice: Well Leslie, we don&apos;t think Snowden deserves amnesty. We believe he should come back &apos;-- he should be sent back, and he should have his day in court. ... The position of the United States is that he ought to come back and face justice." />
                      <outline text="The president said as much this week, as CBS itself reported. So why ask again?" />
                      <outline text="But moreover: Of course the government won&apos;t do that! Why would it? This is an administration that has prosecuted more leakers than any administration in a century &apos;-- combined. At The New Yorker, Amy Davidson explained why amnesty might make sense after CBS asked the question last week. That doesn&apos;t mean that the administration &apos;-- which has been adamant in its defense of the NSA and its surveillance &apos;-- would consider actually doing so. It would be a huge de facto admission of error on Obama&apos;s part, an admission that his revelations were important." />
                      <outline text="Davidson also points out some reasons why amnesty wouldn&apos;t be helpful to the government. For example, because Snowden probably doesn&apos;t have any documents at all at this point &apos;-- and members of the media do. It&apos;s baffling that this point is still lost on CBS, even after it was pointed out repeatedly over the past week. Reporters Glenn Greenwald and Laura Poitras apparently have the entire document set, as, it seems, does Greenwald&apos;s former employer, The Guardian. The Washington Post&apos;s Barton Gellman has some number of them. A number of other outlets have been investigating and reporting on documents: ProPublica, The Times, and foreign papers covering per-country leaks." />
                      <outline text="But Snowden &apos;-- according to Snowden &apos;-- has none. In October, he described his efforts to keep the documents out of Chinese and Russian hands, including stashing them on portable hard drives until he could hand them over to Greenwald. How&apos;s Snowden supposed to cut a deal to turn over documents if he doesn&apos;t have them and there are reporters &apos;-- eager for scoops &apos;-- that do? What sense does that make?" />
                      <outline text="Stahl&apos;s 1.5-million document figure doesn&apos;t even match the 1.7 million that Miller asked about last week. How many documents are out there isn&apos;t clear to anyone who isn&apos;t in possession of them, including the government. Earlier this month, The Timesreported that the NSA didn&apos;t know the scale of the leak, but CBS still went with 1.5 million or more in back-to-back weeks. When Ledgett was presented with the 1.7 million figure, he said simply, &quot;I wouldn&apos;t dispute that.&quot; Of course he wouldn&apos;t! The more documents that Snowden is rumored to take, the more his actions seem reckless and inappropriate. What&apos;s a &quot;document,&quot; anyway? A file? A page in a file? It&apos;s so vague a term as to be useless." />
                      <outline text="And then there was the predication for the question of amnesty itself. Miller asked Ledgett, &quot;He&apos;s already said, &apos;If I got amnesty, I would come back.&apos; Given the potential damage to national security, what would your thought on making a deal be?&quot; Um, where&apos;d he say that? The government hasn&apos;t heard it: When Stahl asked Rice on Sunday if Snowden had &quot;proposed such an arrangement&quot; affording him amnesty, Rice replied, &quot;Not that I&apos;m aware of.&quot; Did Miller even ask the administration before making that claim? Did he ask Snowden&apos;s lawyers? In a statement to BuzzFeed today, the leaker&apos;s lawyer, Ben Wizner of the ACLU, was clear: &quot;Edward Snowden would never offer information in exchange for asylum and he has never suggested otherwise. Reports to the contrary are false.&quot;" />
                      <outline text="The idea that the NSA might grant amnesty doesn&apos;t do the agency any harm, of course, at a time when its public relations efforts are faring poorly. There is also at least one good reason amnesty seems like it could be possible. When asked about Director of National Intelligence James Clapper&apos;s flat denial of NSA data collection before a Senate committee earlier this year, Rice waved the incident off as an example of someone &quot;inadvertently [making] a false representation.&quot; In other words: misdeeds don&apos;t always result in people having to &quot;face justice.&quot; So you never know." />
              </outline>

              <outline text="VIDEO-Twitter / CBSNews: &quot;A whistleblower doesn&apos;t run,&quot; ...">
                      <outline text="Link to Article" type="link" url="https://twitter.com/CBSNews/status/415175331801489409" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387836408_SXZZuNne.html" />
      <outline text="Mon, 23 Dec 2013 22:06" />
                      <outline text="" />
                      <outline text="Note: To use these shortcuts, users of screen readers may need to toggle off the virtual navigation." />
                      <outline text="EnterOpen Tweet detailsgfGo to user...?This menujNext TweetkPrevious TweetSpacePage down/Search.Load new Tweets" />
              </outline>

              <outline text="Customer &amp; Analyst Quotes - Panzura">
                      <outline text="Link to Article" type="link" url="http://panzura.com/company/quotes/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387835366_zLRpGVYK.html" />
      <outline text="Mon, 23 Dec 2013 21:49" />
                      <outline text="" />
                      <outline text="Wikibon&apos;&apos;As far as differentiation goes, take a look at Panzura. The Panzura Controllers are very fast, offering line speeds that match those of public cloud storage networks, and are feature heavy&apos;--with built-in support for CIFS, NFS, File Locking, Versioning, Snapshots, Compression, Dedupe, Cache&apos;--and the product supposedly works. It&apos;s not a lab experiment that&apos;s not ready for prime time and it&apos;s not a low-end, scalability-challenged box with little more than a cool name going for it.&apos;&apos;" />
              </outline>

              <outline text="Our Customers | Datatility.com :: Datatility">
                      <outline text="Link to Article" type="link" url="http://www.datatility.com/customers.php" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387835284_sWpWg4FS.html" />
      <outline text="Mon, 23 Dec 2013 21:48" />
                      <outline text="" />
                      <outline text="Case StudiesDiscover how Datatility has help companies improve the scalability, security and reliability of their systems. " />
                      <outline text="Try Hydra Out with No ObligationSee how our groundbreaking data storage solution can improve your business for 30 days at no obligation. " />
              </outline>

              <outline text="Cleversafe Press Releases on Data Storage &amp; Cloud Storage">
                      <outline text="Link to Article" type="link" url="http://www.cleversafe.com/news-reviews/cleversafe-press-releases" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387835268_FqdUGQhG.html" />
      <outline text="Mon, 23 Dec 2013 21:47" />
                      <outline text="" />
                      <outline text="Cleversafe and Brevity Solve Today&apos;s Video Requirements for the Media and Entertainment Industry with Combined Video Transport,  Transcoding and Object-Storage TechnologiesCompanies Will Demonstrate Dynamic Asset Management and Storage Workflow at 2013 NAB ShowCHICAGO, March 28, 2013&apos;&apos;Today&apos;s increasing requirements for timely video asset availability are challenging studios and broadcasters&apos; video production, post-production, and distribution. Traditionally the process of transporting and transcoding video have been done in sequential steps. Maintaining video assets in active archives has become costly, as both the size and volume of video have increased. Cleversafe, Inc., the solution for limitless data storage, and Brevity Ventures, Inc., the next-generation enterprise solution for the transporting and transcoding of video, have solved the challenges of transporting, transcoding, storing, and distributing video by creating a much more efficient workflow, decreasing file size and transport time and ensuring a more reliable repository." />
                      <outline text="..." />
              </outline>

              <outline text="$20B-Chicago boyz-SpyCloud: Intel Agencies Look to Keep Secrets in the Ether | Danger Room | Wired.com">
                      <outline text="Link to Article" type="link" url="http://www.wired.com/dangerroom/2011/06/spycloud-intel-agencies-look-to-keep-secrets-in-the-ether/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387835100_59g73tK8.html" />
      <outline text="Mon, 23 Dec 2013 21:44" />
                      <outline text="" />
                      <outline text="Dropbox for files, Google for mail, iCloud for well, everything. Average citizens have all kinds of options for storing their information in the cloud. Now, spies want in. Soon, our nation&apos;s secrets may take on a slightly more nebulous form." />
                      <outline text="In-Q-Tel, the investment arm of the CIA and U.S. intelligence community, recently sunk money into a cloud-based storage company called Cleversafe. It says the platform is &apos;&apos;ideal for storing mission critical data by addressing the core principles of data confidentiality, integrity and availability.&apos;&apos; (Incidentally, those principles also spell out CIA)." />
                      <outline text="This is only one of a series of new government initiatives to move into the cloud. Since last year, the administration has embraced a &apos;&apos;cloud first&apos;&apos; policy, which encourages cloud-based solutions &apos;&apos;whenever a secure, reliable, cost-effective cloud option exists.&apos;&apos; The Pentagon is already planning its migration, and the 2011 Cloud Computing Act, expected out in a few weeks, may put in place even more incentives for investing in cloud computing options." />
                      <outline text="But the move upwards brings all sorts of security concerns, particularly for the CIA &apos;-- which is still smarting from the recent hack of its public website. While there has been much debate over the safety of the cloud versus more traditional forms of storage, Cleversafe is confident that data will be secure with them. Which is good, because the government would love to prevent another Bradley Manning from spouting off all their secrets to WikiLeaks." />
                      <outline text="Cleversafe CEO Chris Gladwin, a Chicago software designer with a knack for cryptography, says the secure method behind his technology has been known for a long time. Originally put forward in the 1979 paper How to Share a Secret, the idea is simple: Take some data, run it through a few mathematical algorithms, and end up with a bunch of pieces, several of which can re-create the original data but are meaningless on their own." />
                      <outline text="Similarly, using a technology called &apos;&apos;information dispersal,&apos;&apos; Cleversafe takes massive amounts of data, slices it up into pieces and then sends those slices off to various locations, or &apos;&apos;storage nodes.&apos;&apos; Although the data might be in four different data centers across the country, it can be accessed in real time from a &apos;&apos;private cloud.&apos;&apos; And unlike traditional storage methods, there&apos;s no need to make several complete duplicates of the original data, which saves space and money." />
                      <outline text="There are a few other advantages to this type of storage, according to Gladwin. It&apos;s confidential, because individual slices of data can&apos;t be deciphered on their own &apos;-- an unauthorized person would have to obtain several different data slices at once to make sense of anything at all. It&apos;s also more reliable. Even if the disks that hold those slices are corrupted, go offline or get lost, there is enough redundancy to reconstruct the whole file from just pieces. It&apos;s pretty unlikely that ten servers or disks would all fail at the same time." />
                      <outline text="In-Q-Tel is confident that Cleversafe &apos;&apos;will give our customers in the U.S. Intelligence Community a robust distributed-storage solution that provides the levels of unmatched reliability they require.&apos;&apos; Since the government&apos;s proposed IT budget allots as much as $20 billion for cloud technology, we&apos;ll likely to see others follow suit in the search for a cloud of their very own." />
                      <outline text="Photo: mnsc/Flickr; modified by Lena Groeger" />
              </outline>

              <outline text="How Iron Maiden found its worst music pirates - then went and played for them">
                      <outline text="Link to Article" type="link" url="http://www.citeworld.com/consumerization/22803/iron-maiden-musicmetric?page=0" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387832248_6ZMvw8n7.html" />
        <outline text="Source: Hacker News" type="link" url="https://news.ycombinator.com/rss" />
      <outline text="Mon, 23 Dec 2013 20:57" />
                      <outline text="" />
                      <outline text="For more than a decade, musicians have battled rampant music piracy that has put labels and record stores out of business at a rapid pace. Unlike the shift to Amazon that did in the book store chains, record stores are suffering from outright theft, and the migration to iTunes or Spotify streaming isn&apos;t making up the difference." />
                      <outline text="Between 2003 and 2009, about one-third of all independent record shops in the U.S. closed their doors, according to the Almighty Institute of Music Retail, a California-based marketing firm. That translates to 3,700 stores. The one bright spot is that the trend has slowed since 2008." />
                      <outline text="In England, it&apos;s worse, with 70 percent of independent record stores disappearing in the last decade." />
                      <outline text="Microsoft in 2013: Big changes, big surprises, and a unifying vision" />
                      <outline text="But some bands are dealing with the issue in a unique way. A U.K. company called Growth Intelligence aggregates data on U.K. companies to offer them a real time snapshot of how their company is performing. They capture everything from real-world data, like hiring of employees, to online indicators like email to online discussion." />
                      <outline text="Its stats were compiled for the London Stock Exchange &quot;1000 Companies That Inspire Britain&quot; list. On that list were six music firms that outperformed the music sector, one of them being Iron Maiden LLP, the holding company for the venerable heavy metal band. (Another company on the list was Shazam, which we recently profiled.)" />
                      <outline text="Enter another U.K. company called Musicmetric, which specializes in analytics for the music industry by capturing everything from social media discussion to traffic on the BitTorrent network. It then offers this aggregated information to artists to decide how they want to react. Musicmetric noticed Iron Maiden&apos;s placement and ran its own analytics for the band." />
                      <outline text=" " />
                      <outline text="Credit: MusicMetric" />
                      <outline text=" " />
                      <outline text="&quot;Having an accurate real time snapshop of key data streams is all about helping inform people&apos;s decision making. If you know what drives engagement you can maximize the value of your fan base. Artists could say &apos;we&apos;re getting pirated here, let&apos;s do something about it&apos;, or &apos;we&apos;re popular here, let&apos;s play a show&apos;,&quot; said Gregory Mead, CEO and co-founder of the London-based firm." />
                      <outline text="In the case of Iron Maiden, still a top-drawing band in the U.S. and Europe after thirty years, it noted a surge in traffic in South America. Also, it saw that Brazil, Venezuela, Mexico, Columbia, and Chile were among the top 10 countries with the most Iron Maiden Twitter followers. There was also a huge amount of BitTorrent traffic in South America, particularly in Brazil." />
                      <outline text="Rather than send in the lawyers, Maiden sent itself in. The band has focused extensively on South American tours in recent years, one of which was filmed for the documentary &quot;Flight 666.&quot; After all, fans can&apos;t download a concert or t-shirts. The result was massive sellouts. The S&#163;o Paolo show alone grossed &#163;1.58 million (US$2.58 million) alone." />
                      <outline text="And in a positive cycle, Maiden&apos;s online fanbase grew. According to Musicmetric, in the 12 months ending May 31, 2012, the band attracted more than 3.1 million social media fans. After its Maiden England world tour, which ran from June 2012 to October 2013, Maiden&apos;s fan base grew by five million online fans, with a significant increase in popularity in South America." />
              </outline>

              <outline text="VIDEO: Wind and rain disrupt Christmas travel">
                      <outline text="Link to Article" type="link" url="http://www.bbc.co.uk/news/uk-25490316#sa-ns_mchannel=rss&amp;ns_source=PublicRSS20-sa" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387832210_y9V9473h.html" />
        <outline text="Source: BBC News - Home" type="link" url="http://feeds.bbci.co.uk/news/rss.xml" />
      <outline text="Mon, 23 Dec 2013 20:56" />
                      <outline text="" />
                      <outline text="Gale-force winds and heavy rain have disrupted the Christmas getaway for road, rail, air and sea passengers in the UK." />
                      <outline text="Train services have been affected, while ferries and flights have been cancelled. Thousands of homes have also been left without power." />
                      <outline text="Jon Kay reports." />
              </outline>

              <outline text="Peacekeepers open fire on Central African Republic protesters">
                      <outline text="Link to Article" type="link" url="http://www.blacklistednews.com/Peacekeepers_open_fire_on_Central_African_Republic_protesters/31427/0/0/0/Y/M.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387832166_WAx68j8z.html" />
        <outline text="Source: BlackListedNews.com" type="link" url="http://feeds.feedburner.com/blacklistednews/hKxa" />
      <outline text="Mon, 23 Dec 2013 20:56" />
                      <outline text="" />
                      <outline text="Peacekeepers open fire on C.Africa protesters (via AFP)African peacekeepers fired into a crowd of protesters in the capital of the Central African Republic on Monday, killing one person and injuring around 40 more, in a shooting set to escalate tensions in the strife-torn country. The Chadian soldiers,&apos;..." />
              </outline>

              <outline text="AK47 assault rifle inventor Kalashnikov dies at 94">
                      <outline text="Link to Article" type="link" url="http://www.bbc.co.uk/news/world-europe-25497013" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387832020_ZfUZLQEs.html" />
        <outline text="Source: Hacker News" type="link" url="https://news.ycombinator.com/rss" />
      <outline text="Mon, 23 Dec 2013 20:53" />
                      <outline text="" />
                      <outline text="23 December 2013Last updated at 13:41 ET  Please turn on JavaScript. Media requires JavaScript to play." />
                      <outline text="Mikhail Kalashnikov receiving the Hero of Russia award in 2009" />
                      <outline text="The inventor of the Kalashnikov assault rifle, Mikhail Kalashnikov, has died aged 94, Russian officials say." />
                      <outline text="The automatic rifle he designed became one of the world&apos;s most familiar and widely used weapons." />
                      <outline text="Its comparative simplicity made it cheap to manufacture, as well as reliable and easy to maintain." />
                      <outline text="Although honoured by the state, Kalashnikov made little money from his gun. He once said he would have been better off designing a lawn mower." />
                      <outline text="Kalashnikov was admitted to hospital with internal bleeding in November." />
                      <outline text="Continue reading the main storyMikhail Kalashnikov&apos;s 1947 design became the standard equipment of the Soviet and Warsaw pact armies. Versions were manufactured in several other countries, including China." />
                      <outline text="With its distinctive curved magazine, the Kalashnikov became a revolutionary icon in the hands of militants and insurgents around the globe." />
                      <outline text="When I met him in Paris, he proudly wore the insignia of a Hero of Socialist Labour on his jacket. He seemed perplexed at the extraordinary changes that had engulfed his country." />
                      <outline text="He was sensitive to any criticism that his gun had caused countless casualties around the world. He told me he had simply designed the rifle to defend the Soviet Union. The uses to which it had been put elsewhere were nothing to do with him, he said." />
                      <outline text="The Kalashnikov - which is still widely used today - will go down in history. If the name of Samuel Colt and his revolver is associated with the 19th Century, then the gun of the 20th Century is undoubtedly the Kalashnikov." />
                      <outline text="He died on Monday in Izhevsk, the city where he lived 600 miles east of Moscow, an official there said." />
                      <outline text="Matching the GermansMikhail Timofeyevich Kalashnikov was born on 10 November 1919 in western Siberia, one of 18 children." />
                      <outline text="In 1938, he was called up by the Red Army and his design skills were used to improve the effectiveness of weapons and equipment used by Soviet tank regiments." />
                      <outline text="He designed the machine gun after being asked by a fellow soldier why the Russians could not come up with a gun that would match the ones used by the Germans." />
                      <outline text="Work on the AK47 was completed in 1947, and two years later the gun was adopted by the Soviet army." />
                      <outline text="Kalashnikov continued working into his late 80s as chief designer at the Izhevsk firm that first built the AK-47." />
                      <outline text="He received many state honours, including the Order of Lenin and the Hero of Socialist Labour." />
                      <outline text="Kalashnikov refused to accept responsibility for the many people killed by his weapon, blaming the policies of other countries that acquired it." />
                      <outline text="However, pride in his invention was tempered with sadness at its use by criminals and child soldiers." />
                      <outline text="&quot;It is painful for me to see when criminal elements of all kinds fire from my weapon,&quot; Kalashnikov said in 2008." />
              </outline>

              <outline text="Pilot &apos;Deliberately&apos; Crashed Plane, Killing 33">
                      <outline text="Link to Article" type="link" url="http://33worldnews.com/2013/12/23/pilot-deliberately-crashed-plane-killing-33/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387832006_BCtPV5cA.html" />
        <outline text="Source: 33 World News" type="link" url="http://33worldnews.com/?feed=rss2" />
      <outline text="Mon, 23 Dec 2013 20:53" />
                      <outline text="" />
                      <outline text="Leave a Reply Cancel replyYour email address will not be published. Required fields are marked *" />
                      <outline text="Name *" />
                      <outline text="Email *" />
                      <outline text="Website" />
                      <outline text="Comment" />
                      <outline text="You may use these HTML tags and attributes:" />
                      <outline text="Current monthye@rday*" />
                      <outline text="Leave this field empty*" />
              </outline>

              <outline text="Startup Makes Every Employee&apos;s Salary Public">
                      <outline text="Link to Article" type="link" url="http://valleywag.gawker.com/startup-makes-every-employees-salary-public-1488606028" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387831960_PHJU9Bz3.html" />
        <outline text="Source: Valleywag" type="link" url="http://valleywag.gawker.com/rss" />
      <outline text="Mon, 23 Dec 2013 20:52" />
                      <outline text="" />
                      <outline text="S" />
                      <outline text="If there&apos;s anything Silicon Valley enjoys more than money, it&apos;s jargon: Buffer, a company that sells an &quot;efficient solution to handle sharing on social media,&quot; just published its internal formula for who gets how much money. All in the name of &quot;radical transparency.&quot; But is this a &quot;good idea&quot;?" />
                      <outline text="Corporate openness is almost always a good thing, particularly since it&apos;s such a rarity in any sector. But it&apos;s generally frowned upon to discuss how much money you make, unless you are a jerk, and looking up the salaries of others would result in a tempest of resentment and passive aggression, were it widely possible. This isn&apos;t just prudishness: it makes people very uncomfortable to be put next to a friend or colleague, each with price tags over their heads. As long as we all want it, money will always be an uneasy thing to think about someone else having." />
                      <outline text="For the employees at Buffer, it&apos;s all flapping in the wind:" />
                      <outline text="At Buffer, we have the concept of &quot;Open Salaries&quot;. We have a simple formula to calculate salaries and we share this with the whole team." />
                      <outline text="S" />
                      <outline text="Poor &quot;Happiness Engineers,&quot; with both silly titles and the lowest starting salary! Buffer also lists each employee by name and salary:" />
                      <outline text="S" />
                      <outline text="Some of this makes a whole lot of sense, like paying staffers extra if they live in a part of the world that requires more money to house and feed oneself. It also ensures that employees won&apos;t make more or less depending on their age, sex, or other human qualities." />
                      <outline text="But this formula, like so much else in tech, presumes that we are easily quantifiable, and can neatly fit into pre-established categories that can be cleanly pressed into a formula&apos;--that two people doing the same job are exactly as valuable to the company, or to anther company. But who decides what&apos;s considered &quot;junior&quot; level work, as opposed to &quot;intermediate&quot; or &quot;advanced&quot;? These criteria aren&apos;t published, because we&apos;re working with largely arbitrary terms defined by management. This looks and smells like some sort enlightened, objective way of distributing money, but there&apos;s still plenty of room for the bosses to account for taste." />
                      <outline text="You have to wonder who this is designed to help&apos;--the employees, who are potentially put in a very awkward social position, or the startup&apos;s (highest paid) founders, who look like pioneers." />
                      <outline text="And, my God, what happens when someone gets a raise? Radical transparency had better come with some Prozac." />
              </outline>

              <outline text="Ireland leaves the EU/IMF programme">
                      <outline text="Link to Article" type="link" url="http://www.oecdobserver.org" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387831910_A2QBxTMu.html" />
        <outline text="Source: OECD Observer" type="link" url="http://feeds.feedburner.com/OecdObserver" />
      <outline text="Mon, 23 Dec 2013 20:51" />
                      <outline text="" />
                      <outline text="(C)REUTERS/Suzanne Plunkett" />
                      <outline text="Ian Goldin, Professor of Globalisation and Development, and Director, Oxford Martin School, University of Oxford*" />
                      <outline text="President Mandela stands in the pantheon of political leaders. He was blessed with an extraordinary ability, intelligence and memory, but it was his character that sets him head and shoulders above other leaders." />
                      <outline text="(584 words)" />
                      <outline text="Ireland leaves the EU/IMF programmeEamon Gilmore, Tnaiste (Deputy Prime Minister), Minister for Foreign Affairs and Trade, Ireland" />
                      <outline text="Ireland leaves the three-year EU/IMF programme of assistance this December. Our economy is growing, our finances have stabilised and unemployment is coming down. Our strategy is working in Ireland, and our people are getting back to work." />
                      <outline text="We are the first country in the euro area to exit such a programme and it is a significant moment, not just for Ireland, but for Europe. This crisis has been a test of national governments, of European solidarity and of the European project itself.  Our achievement today shows that while Europe needs to find answers to its critics, the critics must in turn recognise the real and substantial signs of progress, hard-won by our people." />
                      <outline text="More..." />
                      <outline text="Click to enlarge" />
                      <outline text="Case studies of specific products, particularly in the electronics industry, show that value creation along a global value chain tends to be unevenly distributed among activities. The highest value creation is found in upstream activities, such as the development of a new concept, research and development (R&amp;D) and the manufacturing of key components. But it is also found in downstream activities, such as marketing, branding and customer service." />
                      <outline text="(257 words)" />
                      <outline text="Headline economic dataData for OECD area. Latest update: 20 Dec 2013" />
                      <outline text="Databank - Latest quarterly data by country" />
                      <outline text="For details on these and other numbers, click titles or visit www.oecd.org/statistics" />
                      <outline text="GDP, output, inflation, current account, unemployment, interest rates for 40 countries plus euro area, as published in OECD Observer. Just print it out and pin it up." />
                      <outline text="(75 words)" />
                      <outline text="(C) Herv(C) Cortinat/OECD" />
                      <outline text="Interview with Vincent Peillon, Minister of Education, France" />
                      <outline text="The results of the 2012 Programme for International Student Assessment (PISA) survey, which assesses competence of 15-years-old students in maths, reading and science in 65 countries, delivered a rather unsatisfactory report card for France. PISA lands at a time when the debate on the future of the French educational system has heated up, with key reforms in the pipeline. Will the 2012 PISA survey help? We asked Education Minister Vincent Peillon to highlight the main lessons." />
                      <outline text="(740 words)" />
                      <outline text="(C) Aly Song/Reuters" />
                      <outline text="Andreas Schleicher, Special Advisor on Education Policy to the Secretary-General and Deputy Director, OECD Directorate for Education and Skills" />
                      <outline text="In a global economy, the benchmark for educational success is no longer improvement by national standards alone, but the best performing school systems internationally. Latest results from the PISA assessment, the world&apos;s metric for evaluating learning outcomes at school, issued 3 December, show striking changes in the world&apos;s talent. " />
                      <outline text="(613 words)" />
                      <outline text="OECD Observer Crossword No.4 2013Click to enlarge" />
                      <outline text="Latin America&apos;s future as a region of innovation will be far from secure if investment in research and development (R&amp;D) continues at current low levels." />
                      <outline text="(237 words)" />
                      <outline text="In 1994, a simple disagreement in a marketplace in Ghana over the price of a guinea fowl turned ugly. The quarrel led to the violent death of one person, which provoked subsequent killings and then escalated into a cycle of revenge attacks. The dispute quickly grew to become what is today known as the Guinea Fowl War. By the time the Ghanaian military restored order, more than 400 villages had been burned and over 15 000 people are thought to have been killed." />
                      <outline text="(348 words)" />
                      <outline text="Major events, like the Great East Japan earthquake or indeed the euro crisis, can have important ripple effects that spread well beyond the areas immediately concerned. More recently, the budget crisis that resulted in the shutdown of large parts of the US government and public services has raised the spectre of a default, the first in the country&apos;s history." />
                      <outline text="(349 words)" />
                      <outline text="Climate change is, to a large extent, water change. Water is the predominant channel through which the impact of climate change will be felt. More torrential rains, floods and droughts can be expected in many parts of the world. Not only that&apos;&apos;climate change is reshaping the future for freshwater on the planet. " />
                      <outline text="(362 words)" />
                      <outline text="The shortfalls of GDP that were already apparent before the crisis but made starker during it have led to a panoply of new initiatives to find metrics that can measure wellbeing rather than just economic growth. But while GDP has stood accused of overlooking the environment and human well-being, it has one advantage which policymakers and analysts appreciate: the methods are objective and clear. Whether measuring output or expenditure in an economy, GDP produces a single number that is easy to adjust and compare." />
                      <outline text="(342 words)" />
              </outline>

              <outline text="Snowden will help Germany investigate NSA spying if granted asylum &apos;&apos; report &apos;-- RT News">
                      <outline text="Link to Article" type="link" url="http://rt.com/news/snowden-germany-investigation-asylum-652/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387830557_tmKkHPpy.html" />
      <outline text="Mon, 23 Dec 2013 20:29" />
                      <outline text="" />
                      <outline text="Published time: December 23, 2013 00:23Edited time: December 23, 2013 03:07Campact activists wear masks of German Chancellor Angela Merkel (R) and the social democratic SPD party&apos;s leader Sigmar Gabriel and hold up a portrait of US whistleblower Edward Snowden in front of the Reichstag building housing the Bundestag (lower house of parliament) in Berlin on November 18, 2013. (AFP Photo)" />
                      <outline text="Edward Snowden is offering Germany his help with investigating NSA spying activities on its soil, if Berlin grants him political asylum, Stern reports, citing correspondence with the whistleblower." />
                      <outline text="&apos;&apos;I have a great respect for Germany,&apos;&apos; Snowden wrote to the German Stern publication. The former NSA contractor also wrote that he would be willing to help German officials investigate alleged NSA spying in Germany, if he is granted asylum." />
                      <outline text="Not fearing possible prosecution and extradition to the US, the whistleblower noted that no one in the German government seriously believes that the US will &apos;&apos;implement sanctions against Germany in response to criticism of illegal surveillance&apos;&apos; because it will cause &apos;&apos;greater harm to the US rather than Germany.&apos;&apos;" />
                      <outline text="Snowden doubts the ability of US Congress to implement any reforms, following a report by an expert panel tasked with reviewing NSA global surveillance activities released by the White House earlier this week. The Secret Service Committee, Snowden wrote, is praising the intelligence services rather than keeping them in check." />
                      <outline text="Last week Snowden sent a similar open letter to Brazil, offering his help with &apos;&apos;investigations into suspected crimes against Brazilian citizens&apos;&apos; but noting that the US government will continue to limit his &apos;&apos;ability to speak out until a country grants me permanent political asylum.&apos;&apos;" />
                      <outline text="Snowden again reiterated the message on Sunday in an email exchange with the Brazilian Globo TV channel, saying that he would like to move to Brazil if he was permitted by its government. The Brazilian foreign ministry said that it can only consider such a request for asylum once it receives an official application." />
                      <outline text="He accused the US presidential panel tasked with reviewing US&apos;s surveillance practices of recommending &apos;&apos;cosmetic changes.&apos;&apos;&apos;&apos;Their job wasn&apos;t to protect privacy or deter abuses, it was to &apos;restore public confidence&apos; in these spying activities. Many of the recommendations they made are cosmetic changes,&apos;&apos; Snowden said, as quoted by Wall Street Journal." />
                      <outline text="Snowden also managed to thank Russia for the asylum opportunity and for the ability to freely speak his mind." />
                      <outline text="&quot;I am grateful for the opportunity to live in freedom and participate in major global debates through the year asylum granted by Russia,&quot; Snowden said in an interview.&apos;&apos;I have a lot of time for reading, I have been closely following the developments in the world,&quot; said Snowden, responding to a question about how he passes his time in Russia." />
                      <outline text="Back in November Snowden handed over another letter addressed &apos;&apos;to whom it may concern&apos;&apos; in German political circles, indicating that he was willing to go to Germany and testify over the US wiretapping of Angela Merkel&apos;s phone on condition of granting him political asylum." />
                      <outline text="In that one-page typed letter, the whistleblower also expressed hope that &apos;&apos;with the support of the international community, the government of the United States will abandon this harmful behaviour [of treating dissent as defection].&apos;&apos;" />
                      <outline text="Without commenting directly on the open petition, the US State Department responded by saying, that Snowden remains a wanted man who &apos;&apos;is accused of leaking classified information, faces felony charges here in the United States and &apos;... should be returned as soon as possible.&apos;&apos;" />
                      <outline text="Following Snowden&apos;s November appeal, more than 50 German public figures asked Berlin to grant Snowden asylum, according to Der Spiegel. For instance, the former general secretary of Angela Merkel&apos;s Christian Democrats, Heiner Geissler, wrote that Snowden has done the western world a &apos;&apos;great service.&apos;&apos;" />
                      <outline text="The German government however refused to consider the request, with Steffen Seibert, official spokesman of the cabinet, saying that the issue is tied to Germany&apos;s security and mutual interests with the US. &apos;&apos;For us Germans, the transatlantic alliance remains of paramount importance,&apos;&apos; he said." />
                      <outline text="In the meantime, Snowden continues to look for a safe harbor, following the offer for a temporary asylum in Russia in August. Before accepting a temporary asylum in Russia on conditions that he would not engage in whistleblowing activities on Russian soil, the whistleblower sought permanent political asylum in over 20 countries, including Germany and Brazil." />
                      <outline text="The two states embarked on a UN quest to curb the NSA&apos;s worldwide spying activity, and introduced a UN resolution against supernormal surveillance of communications, which was adopted by the UN General Assembly unanimously." />
                      <outline text="During this week&apos;s press conference, Russian President Vladimir Putin has once again reiterated that Russian intelligence has never sought to extract any intelligence from Snowden, who in his turn is abiding by the terms of not engaging &apos;&apos;in anti-American propaganda.&apos;&apos;" />
                      <outline text="&apos;&apos;Operationally, we are not working with him and never have done, and are not asking him any questions about how his agency worked on Russia,&apos;&apos; said Putin. &apos;&apos;I won&apos;t hide it, this person is not without interest for me. I think that thanks to Snowden, a lot changed in the minds of millions of people, including in the minds of major political leaders.&apos;&apos;" />
              </outline>

              <outline text="Paul Walker-Radley Studios">
                      <outline text="Link to Article" type="link" url="http://radleystudios.tv/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387829344_cwHYtrav.html" />
      <outline text="Mon, 23 Dec 2013 20:09" />
                      <outline text="" />
                      <outline text="Main menuChopper Wins Promax Silver" />
                      <outline text="Discovery Channel and Radley won Silver at this year&apos;s Promax awards for overall promo campaign for the launch of The Build-Off American Chopper Live. We want to thank Discovery Channel for an amazing..." />
                      <outline text="More...Introducing Radley Design" />
                      <outline text="We are proud to introduce Radleydesign.tv! Radley Design is our team that creates design-driven content for commercials, main titles, branded content and entertainment marketing. This site is all abou..." />
                      <outline text="More...Gold Rush" />
                      <outline text="Radley produced this season&apos;s launch campaign for Discovery&apos;s hit series &quot;Gold Rush.&quot; The Hoffman crew was in search of adventure, independence and the fortune they were convinced was beneath their fe..." />
                      <outline text="More...3780 Wilshire Blvd. | 11th Floor | Los Angeles, CA 90010 (310) 765-2223 (C) 2011 Radley" />
              </outline>

              <outline text="VIDEO-FIGHT FAT TALK">
                      <outline text="Link to Article" type="link" url="http://www.specialk.com/en_us/fightfattalk.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387828700_TGJPZBeF.html" />
      <outline text="Mon, 23 Dec 2013 19:58" />
                      <outline text="" />
                      <outline text="Let&apos;s shhhhut down fat talkFrom &apos;&apos;joking&apos;&apos; about cankles to destructive self-deprecation, fat talk has become part of ordinary conversation, spoken without a second thought." />
                      <outline text="We believe that fat talk is a barrier to managing our weight and, when so many women are doing it, we&apos;re all further from reaching our goals." />
                      <outline text="We&apos;ve proven a positive approach is the key to weight management success. So let&apos;s join together to silence negativity and shout for positivity." />
              </outline>

              <outline text="ROWW: About Us">
                      <outline text="Link to Article" type="link" url="https://www.roww.org/about_us.php" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387827484_E7SGktLW.html" />
      <outline text="Mon, 23 Dec 2013 19:38" />
                      <outline text="" />
                      <outline text="Reach Out WorldWide (ROWW) - consisting of skilled volunteers - is a non-profit registered 501(c)3 organization. While part of a relief team responding to the massive earthquakes that devastated Haiti on January 12, 2010; Actor/Producer Paul Walker saw a gap between the availability of skilled resources and the requirement for such personnel in post-disaster situations. Following the trip he contacted a group of his friends to assist him in forming ROWW with the purpose of filling this unmet need." />
                      <outline text="ROWW is a network of committed professionals with first responder skill-set (including project management, logistics, heavy equipment operation, EMT, paramedic, firefighting, and healthcare, etc). The volunteers provide their expertise when disasters strike and augment local resources with the goal of accelerating relief efforts on a worldwide basis. ROWW has developed Standard Operating Procedures that facilitate arriving quickly, clearing access, providing basic necessities and medical assistance to ease the survivors&apos; pain and bringing hope in the bleakest of circumstances." />
                      <outline text="ROWW operates on the philosophy that by making a difference in just one person&apos;s life, the world has been changed for the better." />
                      <outline text="(C) 2013 Reach Out Worldwide" />
              </outline>

              <outline text="2010 Press Releases">
                      <outline text="Link to Article" type="link" url="http://www.cleversafe.com/news-reviews/cleversafe-press-releases/2010-press-releases" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387827117_Yp7xghHX.html" />
      <outline text="Mon, 23 Dec 2013 19:31" />
                      <outline text="" />
                      <outline text="Offers Highest Level of Data Integrity and Increased Storage Capacity to Cost Effectively Manage Storage in Public or Private Cloud DeploymentsCHICAGO, February 25, 2010 --Cleversafe Inc., the leader in resilient storage solutions ideally suited for storage clouds and massive digital archives, announced the latest versions of its award-winning technology designed to address the ever-growing digital content storage challenge. Cleversafe introduced the dsNet&apos; Cabinet 2200 - its largest scale dispersed storage system to date &apos;&apos; as well as new versions of its Accesser&#174; appliance and Slicestor&#174; Storage Servers. Cleversafe dispersed storage solutions are ideal for customers looking to store a variety of content, from digital, to media, to large data objects, to sensitive information &apos;&apos; in public or private cloud deployments, given its data security, integrity, and protection capabilities and the ability to store and distribute limitless amounts of data." />
                      <outline text="..." />
              </outline>

              <outline text="The Long March">
                      <outline text="Link to Article" type="link" url="http://anolen.com/2013/12/23/the-long-march/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387826093_wAt5AUyg.html" />
        <outline text="Source: a.nolen" type="link" url="http://anolen.com/feed/" />
      <outline text="Mon, 23 Dec 2013 19:14" />
                      <outline text="" />
                      <outline text="&apos;&apos;The jury&apos;s still out on that boy, Nick.&apos;&apos;" />
                      <outline text="Putin may have done Edward Snowden a favor by locking him down in some nameless Moscow suburb. Half a year on from Snowden&apos;s revelations, even Glenn Greenwald appears to be loosing steam; he&apos;s certainly lost his sparkle after teaming with Pierre Omidyar. And of course, more than one NSA shill has burned out, flip-flopped or otherwise made a fool of themselves in a desperate attempt to save their self-esteem employer&apos;s reputation." />
                      <outline text="To those working damage control, the Snowden revelations are like a never-ending carnival ride, with white-knuckled media figures turning green in the face and just wanting off: &apos;&apos;Can I retire to a life of well-paid do-goodery already?&apos;&apos;  Or perhaps,  &apos;&apos;I just want to get back to interrogating teenagers&apos;&apos;." />
                      <outline text="All this time, Snowden has been unable to comment freely because of the provisos attached to his temporary Russian asylum: he can&apos;t say anything to harm Putin&apos;s American buddies." />
                      <outline text="If the US intelligence community was more competent, this would have been a great hindrance to Snowden and Washington would owe Putin big-time. As it stands, those indulgent to US Intel were given months to repeatedly put their collective foot into their collective mouth, and Washington&apos;s best assets, Greenwald and Poitras, have sloppily outed themselves." />
                      <outline text="The people left looking best are, first and foremost, Edward Snowden, with Vladimir Putin at a distant second. Well done, Metroplex! Perhaps this is just Nature&apos;s way of saying, &apos;&apos;It&apos;s time for a long, cold winter.&apos;&apos;" />
                      <outline text="The latest thought for Americans to ponder: Snowden doubts the ability of Congress to implement any intelligence reforms, after the pathetic showing from the Secret Service Committee. Original German from Stern." />
                      <outline text="That means, fellow voters, that the safety valve is no longer working." />
                      <outline text="If you&apos;d like to hear analysis of the President&apos;s Review Group on Intelligence and Communications Technologies and its dubious &apos;recommendations&apos;, check out No Agenda&apos;s &apos;&apos;Bios Brick&apos;&apos; show 12/19/2013. &apos;&apos;Reading the report so you don&apos;t have to! &apos;&apos; You probably won&apos;t be surprised to hear Adam Curry&apos;s conclusions, because they&apos;re pretty much the same as Snowden&apos;s." />
                      <outline text="Merry Christmas! Let&apos;s hope for a few &apos;road to Damascus&apos; conversions along the Beltline next year." />
                      <outline text="Like this:LikeLoading..." />
              </outline>

              <outline text="Cleversafe Board of Directors | Seasoned Team of Directors">
                      <outline text="Link to Article" type="link" url="http://www.cleversafe.com/company/leadership/board-of-directors" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387823733_NQJ69FUz.html" />
      <outline text="Mon, 23 Dec 2013 18:35" />
                      <outline text="" />
                      <outline text="List of DirectorsCleversafe has a seasoned team of directors:" />
                      <outline text="Christopher Galvin, Chairman, CleversafeJohn Morris, President &amp; CEO, CleversafeChris Gladwin, Vice Chairman, CleversafePeter Barris, New Enterprise AssociatesHenry J. Feinberg, Maxim Revenue Management SolutionsMike O&apos;Dell, New Enterprise AssociatesDennis Roberson, Illinois Institute of TechnologyChristopher Galvin, Chairman, CleversafeChristopher Galvin is Chairman, CEO, and Co-Founder of Harrison Street Capital, LLC; Co-Founder and Chairman of Harrison Street Real Estate Capital LLC; Executive Chairman and Co-Founder of UniqueSoft Inc. a real-time software authoring services company; along with being Chairman of Cleversafe Inc." />
                      <outline text="Mr. Galvin is member of the board of MCR-Aerodyne Inc., a Harrison Street Capital LLC financed roll-up in US Department of Defense services; a member the Executive Committee of Northwestern University&apos;s Board of Trustees; the American Enterprise Institute Board, the Legion D&apos;honneur, Tsinghua University School of Management and Economics (Beijing); Business Council (U.S.), the American Society of Corporate Executives; the Board of the Chicago Council of Global Affairs and Chair of the Rhodes Scholars selection committee for Illinois-Michigan." />
                      <outline text="Mr. Galvin&apos;s former relationships include: Chairman of NAVTEQ, the leading supplier of global digital mapping databases; Chairman and CEO of Motorola Inc.; member of the Bechtel Corporation&apos;s Board of Counselors; chairman of the U.S.-China Business Council; director of the Rand Corporation; member of the U.S. Department of Defense Board; member of the U.S. Department of Defense Science Board; advisor to the City of Tianjin, China; advisor to the CEO of Hong Kong; and advisor to the Searle Family Trusts." />
                      <outline text="Mr. Galvin co-founded The Galvin Projects in 2004, a virtual global think tank that published three books (2008-09); Harrison Street Real Estate Capital, LLC in 2005, a private equity company that today hosts $2.0B in assets under management in medical office buildings, storage, student housing, and senior housing represented in 170 properties across 31 states in U.S.; and Gore Creek Asset Management LLC in 2005, a large capital investment company utilizing 90-100 global investment managers diversified across most major asset classes." />
                      <outline text="In 2010 Mr. Galvin was featured in the Andrea Redmond book &apos;&apos;Comebacks: Powerful Lessons from Leaders Who Endured Setbacks and Recaptured Success on Their Terms&apos;&apos; which details his unplanned departure from Motorola, and how he responded." />
                      <outline text="Back to Top" />
                      <outline text="John Morris, President &amp; CEO, CleversafeJohn Morris joined Cleversafe in 2013 after a thirty-year career spent growing enterprise technology businesses. Most recently serving in several roles as a member of the executive committee of Juniper Networks, as EVP of Worldwide Field Operations, he added more than a billion dollars to Juniper&apos;s top line. He also led Pay By Touch, a payments industry startup, to implement its biometric solution in thousands of retail stores and millions of consumers as its President and COO." />
                      <outline text="John started his career at IBM where, over a 23-year career, he held numerous executive general management roles including several with multi-billion dollar revenue responsibilities and various executive roles while spending four years living in the Asia-Pacific region." />
                      <outline text="John served as Chairman of the Field Council for Juniper, and as a member of the Global Marketing Council and Senior Leadership Group for IBM." />
                      <outline text="John serves on the Dean&apos;s Advisory Council for the Kelley School of Business at Indiana University." />
                      <outline text="Back to Top" />
                      <outline text="Chris Gladwin, Vice Chairman, CleversafeChris Gladwin founded Cleversafe in 2004, bringing to the company the same innovative and entrepreneurial approach that has signified his executive leadership throughout his career. Chris, who was previously the creator of the first workgroup storage server at Zenith Data Systems and was a Manager of Corporate Storage Standards at Lockheed Martin, also created and managed a number of successful new technology start-ups, including MusicNow, which was acquired by Circuit City. Chris has been the creative force behind the development of the first Dispersed Storage system to solve the growing global problem of Big Data storage." />
                      <outline text="Years ahead of the market, Chris understood the growing issues surrounding unstructured data and the inability of traditional technology solutions to accommodate the explosive growth of digital assets such as audio, video and imaging. Using advances in dispersed information technology, he applied that to storage to create a reliable, cost effective, secure solution with a limitless ability to scale." />
                      <outline text="Chris Gladwin has created over 300 issued and pending patents related to Dispersed Storage technology. Cleversafe, inspired by Chris, continues to be one of the most patenting U.S. companies per employee." />
                      <outline text="Chris Gladwin holds a degree in Engineering from the Massachusetts Institute of Technology." />
                      <outline text="Back to Top" />
                      <outline text="Peter Barris, New Enterprise AssociatesPeter joined New Enterprise Associates (NEA) in 1992 and was named Managing General Partner in 1999. Since that time NEA&apos;s assets under management have grown from $1B to over $13B and the firm has expanded its operations to India and China. Under Peter&apos;s leadership, NEA has invested in industry-transforming technology companies like CareerBuilder, Data Domain, Diapers.com, Groupon, Juniper Networks, Macromedia, Salesforce.com, TiVo, and Workday. Peter has been named several times to the Forbes Midas List of top technology investors, having personally led investments in over two dozen technology companies that have successfully completed public offerings or mergers. He serves on the board of public company Groupon (GRPN) and is currently a director of several private companies including BenchPrep, Goji Food Solutions, MediaOcean, SnagFilms, and Sprout Social." />
                      <outline text="Prior to joining NEA, Peter was President and Chief Operating Officer of Legent Corporation (LGNT) and Senior Vice President of the Systems Software Division of UCCEL Corporation (UCE). Both companies were ultimately acquired at valuations that were record breaking for their time. Earlier, Peter spent almost a decade at General Electric Company in a variety of management positions, including Vice President and General Manager at GE Information Services. Outside interests include serving on the Northwestern Board of Trustees and the Board of the Tuck School Private Equity and Entrepreneur Center. Peter previously served on the Executive Committee of the Board of the National Venture Capital Association and was also a founding member of Venture Philanthropy Partners, a philanthropic organization in the Washington D.C. area. He has a BS degree in Electrical Engineering from Northwestern and an MBA from Dartmouth." />
                      <outline text="Back to Top" />
                      <outline text="Henry J. Feinberg, Maxim Revenue Management SolutionsHenry J. Feinberg is the Executive Chairman of Maxim Revenue Management Solutions (MaximRMS), the largest independent Revenue Management company serving multiple verticals." />
                      <outline text="Previously, Feinberg was a Partner at Technology Crossover Ventures (TCV), the world&apos;s largest technology oriented Venture Capital firm with over $10B under management.TCV led investments in Expedia, Netflix, Zillow, thinkorswim, and Mattersight among others." />
                      <outline text="Prior to TCV, Feinberg was Chairman and CEO of Rand McNally, the largest global provider of geographic information in print and digital media. Under Feinberg&apos;s leadership Rand McNally transformed from a traditional print publisher to a branded, fully digital, distribution driven multimedia information company." />
                      <outline text="Prior to Rand McNally, Feinberg held Senior Management positions with Galileo International, United Airlines and Lear Siegler as well as serving as a long tenured Board member at Verisk, the largest IPO in the United States in 2009." />
                      <outline text="Feinberg brings 25 years of Fortune 500 operating and transaction experience and has held multiple assignments as Chairman of Audit and Compensation Committees in both private and public companies." />
                      <outline text="Feinberg graduated cum laude from Rutgers University with a BS in Environmental Chemistry." />
                      <outline text="Back to Top" />
                      <outline text="Mike O&apos;Dell, New Enterprise AssociationsMike joined NEA in 2002 as a Venture Partner. His primary interest is the structure and behavioral dynamics of large, complex systems. He works with NEA&apos;s technology team to identify early stage information technology, communications, and energy opportunities. He currently advises NEA portfolio companies Glacier Bay, Neutral Tandem, and Vonage." />
                      <outline text="Mike came to NEA from UUNET Technologies where he was Chief Scientist, responsible for network and product architecture during the emergence of the Commercial Internet. Prior to UUNET, Mike held positions at Bellcore (now Telcordia), a GaAs SPARC supercomputer startup, and a US Government contractor. His first startup created a revolutionary full-text search engine which was 20 years ahead of its time. In the halcyon days of the ARPAnet, he was &quot;Liaison&quot; for IMP-34 at Lawrence Berkeley Laboratory and spearheaded the transition from NCP to TCP/IP at Department of Energy National Laboratories." />
                      <outline text="Mike served for four years as Area Director for Operations and Management in the IETF, authored several IDs and RFCs, and helped birth RADIUS and SNMPv3. He was Founding Editor of Computing Systems, an international refereed scholarly journal. Mike received his BS and MS in Computer Science from the University of Oklahoma." />
                      <outline text="Back to Top" />
                      <outline text="Dennis Roberson, Illinois Institute of TechnologyDennis A. Roberson is Vice Provost, and Research Professor in Computer Science at Illinois Institute of Technology. In this capacity, he has responsibility for IIT&apos;s relationships with its various corporate partners. He also assists with IIT&apos;s technology transfer efforts, the development of new research centers, and technology-based business ventures." />
                      <outline text="Professor Roberson is an active researcher in the wireless networking arena and is a co-founder of IIT&apos;s Wireless Network and Communications Research Center (WiNCom). His specific research focus areas include dynamic spectrum access networks, spectrum occupancy and spectrum management, and wireless interference and its mitigation. He currently serves on the governing or advisory boards of several technology-based companies, including four in the telecommunications industry." />
                      <outline text="Prior to IIT, he was EVP and CTO at Motorola. Professor Roberson has an extensive corporate career including major business and technology responsibilities at IBM, DEC (now part of HP), AT&amp;T, and NCR. He is and has been involved with a wide variety of Technology, Cultural, Educational and Youth organizations currently including the National Advisory Board for the Boy Scouts of America, the International Advisory Panel for the Prime Minister of Malaysia, and the Boards of HCJB Global and FIRST Robotics. He also serves as a consultant for a variety of technology based enterprises through his consulting company Roberson and Associates, LLC. He is a frequent speaker at universities, technical workshops, and conferences around the globe." />
                      <outline text="Professor Roberson has BS degrees in Electrical Engineering and in Physics from Washington State University and a MSEE degree from Stanford." />
                      <outline text="Back to Top" />
                      <outline text="Additional Resources " />
              </outline>

              <outline text="IN-Q-Tel-Cleversafe-Blueprints Of NSA&apos;s Ridiculously Expensive Data Center In Utah Suggest It Holds Less Info Than Thought - Forbes">
                      <outline text="Link to Article" type="link" url="http://www.forbes.com/sites/kashmirhill/2013/07/24/blueprints-of-nsa-data-center-in-utah-suggest-its-storage-capacity-is-less-impressive-than-thought/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387823726_5KrYzNhR.html" />
      <outline text="Mon, 23 Dec 2013 18:35" />
                      <outline text="" />
                      <outline text="Log in with your social account:Or, you can log in or sign up using Forbes.New Posts+17 posts this hourMost PopularYear&apos;s Hottest StartupsListsThe Business Of HockeyVideoTop Charity Exec PaySell Cracker Barrel ... and 6 More Stocks in 2014Help|Connect" />
                      <outline text="|Sign up|Log in" />
              </outline>

              <outline text="Meet the machines that steal your phone&apos;s data | Ars Technica">
                      <outline text="Link to Article" type="link" url="http://arstechnica.com/tech-policy/2013/09/meet-the-machines-that-steal-your-phones-data/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387822710_DhVWAjfY.html" />
      <outline text="Mon, 23 Dec 2013 18:18" />
                      <outline text="" />
                      <outline text="Aurich Lawson / HBO" />
                      <outline text="The National Security Agency&apos;s spying tactics are being intensely scrutinized following the recent leaks of secret documents. However, the NSA isn&apos;t the only US government agency using controversial surveillance methods." />
                      <outline text="Monitoring citizens&apos; cell phones without their knowledge is a booming business. From Arizona to California, Florida to Texas, state and federal authorities have been quietly investing millions of dollars acquiring clandestine mobile phone surveillance equipment in the past decade." />
                      <outline text="Earlier this year, a covert tool called the &apos;&apos;Stingray&apos;&apos; that can gather data from hundreds of phones over targeted areas attracted international attention. Rights groups alleged that its use could be unlawful. But the same company that exclusively manufacturers the Stingray&apos;--Florida-based Harris Corporation&apos;--has for years been selling government agencies an entire range of secretive mobile phone surveillance technologies from a catalogue that it conceals from the public on national security grounds." />
                      <outline text="Details about the devices are not disclosed on the Harris website, and marketing materials come with a warning that anyone distributing them outside law enforcement agencies or telecom firms could be committing a crime punishable by up to five years in jail." />
                      <outline text="These little-known cousins of the Stingray cannot only track movements&apos;--they can also perform denial-of-service attacks on phones and intercept conversations. Since 2004, Harris has earned more than $40 million from spy technology contracts with city, state, and federal authorities in the US, according to procurement records." />
                      <outline text="In an effort to inform the debate around controversial covert government tactics, Ars has compiled a list of this equipment by scrutinizing publicly available purchasing contracts published on government websites and marketing materials obtained through equipment resellers. Disclosed, in some cases for the first time, are photographs of the Harris spy tools, their cost, names, capabilities, and the agencies known to have purchased them." />
                      <outline text="What follows is the most comprehensive picture to date of the mobile phone surveillance technology that has been deployed in the US over the past decade." />
                      <outline text="&apos;&apos;Stingray&apos;&apos;" />
                      <outline text="The Stingray has become the most widely known and contentious spy tool used by government agencies to track mobile phones, in part due to an Arizona court case that called the legality of its use into question. It&apos;s a box-shaped portable device, sometimes described as an &apos;&apos;IMSI catcher,&apos;&apos; that gathers information from phones by sending out a signal that tricks them into connecting to it. The Stingray can be covertly set up virtually anywhere&apos;--in the back of a vehicle, for instance&apos;--and can be used over a targeted radius to collect hundreds of unique phone identifying codes, such as the International Mobile Subscriber Number (IMSI) and the Electronic Serial Number (ESM). The authorities can then hone in on specific phones of interest to monitor the location of the user in real time or use the spy tool to log a record of all phones in a targeted area at a particular time.The FBI uses the Stingray to track suspects and says that it does not use the tool to intercept the content of communications. However, this capability does exist. Procurement documents indicate that the Stingray can also be used with software called &apos;&apos;FishHawk,&apos;&apos; (PDF) which boosts the device&apos;s capabilities by allowing authorities to eavesdrop on conversations. Other similar Harris software includes &apos;&apos;Porpoise,&apos;&apos; which is sold on a USB drive and is designed to be installed on a laptop and used in conjunction with transceivers&apos;--possibly including the Stingray&apos;--for surveillance of text messages." />
                      <outline text="Similar devices are sold by other government spy technology suppliers, but US authorities appear to use Harris equipment exclusively. They&apos;ve awarded the company &apos;&apos;sole source&apos;&apos; contracts because its spy tools provide capabilities that authorities claim other companies do not offer. The Stingray has become so popular, in fact, that &apos;&apos;Stingray&apos;&apos; has become a generic name used informally to describe all kinds of IMSI catcher-style devices." />
                      <outline text="First used: Trademark records show that a registration for the Stingray was first filed in August 2001. Earlier versions of the technology&apos;--sometimes described as &apos;&apos;digital analyzers&apos;&apos; or &apos;&apos;cell site simulators&apos;&apos; by the FBI&apos;--were being deployed in the mid-1990s. An upgraded version of the Stingray, named the &apos;&apos;Stingray II,&apos;&apos; was introduced to the spy tech market by Harris Corp. between 2007 and 2008. Photographs filed with the US Patent and Trademark Office depict the Stingray II as a more sophisticated device, with many additional USB inputs and a switch for a &apos;&apos;GPS antenna,&apos;&apos; which is likely used to assist in location tracking." />
                      <outline text="Cost: $68,479 for the original Stingray; $134,952 for Stingray II." />
                      <outline text="Agencies: Federal authorities have spent more than $30 million on Stingrays and related equipment and training since 2004, according to procurement records. Purchasing agencies include the FBI, DEA, Secret Service, US Immigration and Customs Enforcement, the Internal Revenue Service, the Army, and the Navy. Cops in Arizona, Maryland, Florida, North Carolina, Texas, and California have also either purchased or considered purchasing the devices, according to public records. In one case, procurement records (PDF) show cops in Miami obtained a Stingray to monitor phones at a free trade conference held in Miami in 2003." />
                      <outline text=" " />
                      <outline text="&apos;&apos;Gossamer&apos;&apos;The Gossamer is a small portable device that can be used to secretly gather data on mobile phones operating in a target area. It sends out a covert signal that tricks phones into handing over their unique codes&apos;--such as the IMSI and TMSI&apos;--which can be used to identify users and home in on specific devices of interest. What makes it different from the Stingray? Not only is the Gossamer much smaller, but it can also be used to perform a denial-of-service attack on phone users, blocking targeted people from making or receiving calls, according to marketing materials (PDF) published by a Brazilian reseller of the Harris equipment. The Gossamer has the appearance of a clunky-looking handheld transceiver. One photograph filed with the US Patent and Trademark Office shows it displaying an option for &quot;mobile interrogation&quot; on its small LCD screen, which sits above a telephone-style keypad." />
                      <outline text="First used: Trademark records show that a registration for the Gossamer was first filed in October 2001." />
                      <outline text="Cost: $19,696." />
                      <outline text="Agencies: Between 2005 and 2009, the FBI, Special Operations Command, and Immigration and Customs Enforcement spent more than $1.3 million purchasing Harris&apos; Gossamer technology and upgrading existing Gossamer units, according to procurement records. Most of the $1.3 million was spent by the FBI as part of a large contract in 2005." />
              </outline>

              <outline text="Ray Kelly, commissioner for the New York Police Department, is joining the Council on Foreign Relations as a distinguished visiting fellow - statement - breakingnews.com">
                      <outline text="Link to Article" type="link" url="http://www.breakingnews.com/item/2013/12/23/ray-kelly-commissioner-for-the-new-york-police-de/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387822625_V9XyAQmd.html" />
      <outline text="Mon, 23 Dec 2013 18:17" />
                      <outline text="" />
                      <outline text="Ray Kelly, commissioner for the New York Police Department, is joining the Council on Foreign Relations as a distinguished visiting fellow - statement - breakingnews.compolitics13:25 Dec 23, 2013, 01:25 PM GMTRay Kelly, commissioner for the New York Police Department, is joining the Council on Foreign Relations as a distinguished visiting fellow - statementend of bulletin" />
                      <outline text="3WHOA!" />
              </outline>

              <outline text="Obama Punishes JPMorgan Chase CEO Jamie Dimon for Criticizing Anti-Growth Policies - Deneen Borelli">
                      <outline text="Link to Article" type="link" url="http://deneenborelli.com/2013/10/jpmorgan/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387819345_m7cyLDVq.html" />
      <outline text="Mon, 23 Dec 2013 17:22" />
                      <outline text="" />
                      <outline text="Have you ever wondered why all Democrats seem to speak from the same talking points and rarely criticize President Obama? Do you wonder why business leaders seldomly denounce publicly the regulatory assault coming from the Obama Administration?" />
                      <outline text="The reason is simple. President Obama plays to win and he will use any means necessary including the power of the state to punish those who stray from his progressive herd." />
                      <outline text="Intimidation from the Obama Administration is not reserved to conservative organizations and Republican donors but also includes members of the president&apos;s own liberal team." />
                      <outline text="Mayor Cory Booker of Newark, New Jersey, complained on national TV that he was tired of negative campaigning saying, &apos;&apos;This kind of stuff is nauseating to me on both sides. It&apos;s nauseating to the American public. Enough is enough, stop attacking private equity. Stop attacking Jeremiah Wright.&apos;&apos; Booker&apos;s comments were interpreted as criticism of Obama&apos;s re-election tactics." />
                      <outline text="Booker&apos;s comment on private equity was construed to mean he was referring to the harsh attacks from the Obama campaign on Bain Capital, Mitt Romney&apos;s former firm." />
                      <outline text="Only hours after making those comments on NBC&apos;s Meet the Press, Booker backed away from his statements in a YouTube video, saying it was &apos;&apos;reasonable&apos;&apos; for Obama&apos;s campaign to discuss Romney&apos;s business record." />
                      <outline text="Then there is Obama&apos;s attack on JPMorgan Chase CEO Jamie Dimon because he dared to criticize Obama&apos;s policies." />
                      <outline text="Charles Gaspario&apos;s opinion piece, &apos;&apos;Jamie Dimon&apos;s $13Bil sin: Bashing Obamanomics,&apos;&apos; exposes the mafia like tactics waged by the Obama Administration to punish Dimon." />
                      <outline text="From The Daily News:" />
                      <outline text="Today the JP Morgan chief executive could be putting the final touches on a deal with the Obama Justice Department that would make Don Corleone proud. For various alleged financial &apos;&apos;crimes&apos;&apos; involving the sale of fraudulent mortgages, the nation&apos;s largest bank is slated to fork over $13 billion, admit some culpability and prepare for a barrage of lawsuits from Wall Street ambulance chasers." />
                      <outline text="And&apos;..." />
                      <outline text="No, Dimon&apos;s real sin, as I&apos;ve pointed out on these pages before, was his withering critique of the Obama economic agenda, which he said was holding back the US economy." />
                      <outline text="For a while, Dimon (a longtime Democrat) was a rarity in Corporate America in that he refused to be cowed by the Washington political class and keep his mouth shut in the face of the absurdity this administration was administering to businesses in the form of taxes, regulation and now a new health-care system where even something as vital as designing a workable Web site to sign up new recruits doesn&apos;t work." />
                      <outline text="By speaking out, Dimon became de facto public enemy No. 1." />
                      <outline text="As Gasparino pointed out, most of the legal issues stemmed from companies the bank bought during the stock market meltdown. At the time, it was the government that urged Dimon to buy the financially troubled lending institutions." />
                      <outline text="Obama&apos;s tactics has a chilling effect on free speech. Going forward, CEO&apos;s know they will be relentlessly punished if they dare to criticize Obama&apos;s policies and there is no immunity for doing the government a favor during a crisis." />
                      <outline text="Also keep in mind Dimon is a Democrat so party affiliation has no bearing on Obama&apos;s willingness to use the stick." />
                      <outline text="The same lesson goes for liberal politicians. Who knows what the Obama campaign said to Booker after his Sunday morning interview but it must have been strong for him to go on YouTube to essentially apologize." />
                      <outline text="The overriding message from Obama is sit down and shut up or you will pay a price." />
                      <outline text=" " />
                      <outline text="Tags:Civil Claims, Cory Booker, Jamie Dimon, JPMorgan Chase, Mortgage Bonds" />
              </outline>

              <outline text="Target refuses to stock Beyonce&apos;s new album after digital release | Mail Online">
                      <outline text="Link to Article" type="link" url="http://www.dailymail.co.uk/tvshowbiz/article-2525419/Target-refuses-stock-Beyonces-new-album-digital-release.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387818967_XcX5P4mG.html" />
      <outline text="Mon, 23 Dec 2013 17:16" />
                      <outline text="" />
                      <outline text="By Colette Fahy" />
                      <outline text="PUBLISHED: 14:07 EST, 17 December 2013 | UPDATED: 14:32 EST, 17 December 2013" />
                      <outline text="131shares" />
                      <outline text="52" />
                      <outline text="Viewcomments" />
                      <outline text="Beyonce Knowles&apos; new album has become the fastest-ever seller on iTunes with more than 800,000 downloads in its first three days but Target is refusing to stock it." />
                      <outline text="The self-titled album, the US superstar&apos;s fifth, was released out of the blue on Friday and the retail giant claims its online release will hamper physical CD sales so has taken the decision not to sell it." />
                      <outline text="Target spokesperson Erica Julkowski told Billboard, &apos;At Target we focus on offering our guests a wide assortment of physical CDs, and when a new album is available digitally before it is available physically, it impacts demand and sales projections." />
                      <outline text="Can&apos;t please everyone! US retailer Target is refusing to sell Beyonce Knowles&apos; fifth album after she released it online in a surprise move last Friday" />
                      <outline text="&apos;While there are many aspects that contribute to our approach and we have appreciated partnering with Beyonce in the past, we are primarily focused on offering CDs that will be available in a physical format at the same time as all other formats. At this time, Target will not be carrying Beyonce&apos;s new self-titled album &apos;Beyonce.&apos;" />
                      <outline text=" " />
                      <outline text="However, this doesn&apos;t appear to be impacting Beyonce with an Apple spokeswoman revealing the iTunes Store sold 828,773 albums in just three days." />
                      <outline text="On the day of its release, iTunes - which is Apple&apos;s music download division - said the release was &apos;an unprecedented strategic move by the artist to deliver music and visual content directly to her fans when she wants to and how she wants to, with no filter.&apos;" />
                      <outline text="Who needs Target! This doesn&apos;t appear to be impacting Beyonce with an Apple spokeswoman revealing the iTunes Store sold 828,773 albums in just three days" />
                      <outline text="With no &apos;middle man&apos;, fans are being encouraged to form their own opinions after listening to and watching the tracks." />
                      <outline text="Beyonce added: &apos;I didn&apos;t want to release my music the way I&apos;ve done it. I am bored with that. I feel like I am able to speak directly to my fans. There&apos;s so much that gets between the music, the artist and the fans." />
                      <outline text="Surprise! The self-titled album, the US superstar&apos;s fifth, was released out of the blue on Friday" />
                      <outline text="&apos;I felt like I didn&apos;t want anybody to give the message when my record is coming out. I just want this to come out when it&apos;s ready and from me to my fans.&apos;" />
                      <outline text="The singer&apos;s fifth solo album opted out of the standard three month marathon of promotional stints, reviews, and dropping individual singles." />
                      <outline text="Boycott: US retailer Target is refusing to sell physical copies of Beyonce&apos;s  new album because she released it online first" />
                      <outline text="Instead, the trend setter released the entire album in one fell swoop without any fanfare." />
                      <outline text="The album includes 14 songs, 17 videos, and collaborations with husband Jay Z, Drake and Frank Ocean." />
                      <outline text="Share or comment on this article" />
              </outline>

              <outline text="The Great Big Porn Block is coming">
                      <outline text="Link to Article" type="link" url="http://www.sheeldz.co.uk/2013/12/blocked.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387809261_82a5JfFx.html" />
        <outline text="Source: Hacker News" type="link" url="https://news.ycombinator.com/rss" />
      <outline text="Mon, 23 Dec 2013 14:34" />
                      <outline text="" />
                      <outline text="In January (or this week if you&apos;re on BT) the widely derided &quot;porn block&quot; that the government are shilling will come into force. If you don&apos;t know, it&apos;s basically a opt-out system of blocking of pornography at an ISP level enacted by the government that the main ISPs have all signed up for.What this means is that you&apos;re going to get it no matter if you want it or not. And if you want to be able to access porn you&apos;ll have to sign up for it - opt out of the block. And, at a principle level this is fair enough right? Block access to material not suitable for under 18s at the source, makes sense - I mean we do it for movies, TV, games and print pornography, right?" />
                      <outline text="Well... absolutely not. There are many things wrong with this, and we&apos;ll start at the top." />
                      <outline text="1) This is CensorshipOf course, certain censorship is fine. I don&apos;t mind certain art, like films or computer games being censored, and think that it is key to keeping a powerful art community when protecting those from harmful images or powerful material. For example, I am sure no one is against the idea of keeping something like Last Tango in Paris a film that minors can&apos;t see." />
                      <outline text="However, what this block does is stop consenting adults above the age of consent from watching what they want. Pornography is not illegal (certain types are, of course) and watching porn isn&apos;t either, but blocking it wholesale and having to opt in to have it unblocked is a strange way of dealing with it. I am old enough to direct, film, write and even star in a pornographic film, but then I go home and I have to tell a company I want to watch it? That&apos;s pretty odd." />
                      <outline text="2) It Removes the Responsibility from the ResponsibleThis is something I&apos;ve actually moaned at length about before, but it&apos;s something that this is at the core of - children shouldn&apos;t be seeing porn online. However, blocking it for everyone is not the solution. The key here is that the parents of those who are under age should not be allowing their children to see those things, and those responsible need to step up." />
                      <outline text="There are hundreds of tools allowing you to block sites even without antivirus software. If I wanted to I could easily go into my router and block access to sites for anything using my router. I know how to because in the future I will have to. I see kids playing 18+ games at the age of 12 and wonder what is going on - my parents used to pre-screen London&apos;s Burning for me when I was aged 8 for goodness sake, and all that was was fire!" />
                      <outline text="By taking the responsibility away from parents you are excusing them from getting educated, and then you&apos;re also removing it from those you&apos;re are protecting. It&apos;s similar to banning sex instead of educating about safe sex, and we all know abstinence doesn&apos;t work." />
                      <outline text="3) Why Porn?Ok, say you don&apos;t mind the idea of the government blocking porn, why stop there? Or why just porn? Why not other things that actually do harm to the country, like smoking? Or Drinking? Or... driving? People die when they drive badly." />
                      <outline text="This is the weakest point, but it&apos;s one to consider - why porn? Well, because it carries a stigma - an easy target. And I have watched porn many times in my life and I don&apos;t care who knows it. It&apos;s a normal thing to do as an adult (see Nuts, Zoo, or Playboy&apos;s sales figures). It&apos;s just a tiny bit taboo amongst a certain group of people that the government are pandering to." />
                      <outline text="4) Do You Want to Be On That List?I am going to opt out of the system because... well, for these reasons. And for number 5 below too. But that surely means that I am suddenly on a list somewhere. I mean, Virgin Media (an amusingly apt name) will have to track everyone who says to opt out, and then my name is on a list of people who &quot;want to watch porn&quot;." />
                      <outline text="As we know, lists don&apos;t stay hidden. I would imagine people don&apos;t want to be on a list that is possibly accessible by anyone (Virgin Media or not) that says they&apos;re into porn, right? I can imagine politicians, media personalities, church goers etc don&apos;t want to be on the list, and thusly are blocked because of fear. That&apos;s an insane jump for our government." />
                      <outline text="I already know that Virgin have a list of where I go. That&apos;s fine, I have reconciled with that. As long as I don&apos;t do anything illegal... why should I have to ask again?" />
                      <outline text="5) It&apos;s Using Bad TechImagine it could work, that you could block porn. That&apos;d be great! Then it might work perfectly. But here&apos;s the thing." />
                      <outline text="It won&apos;t. Why do I know this? Well my phone has a block on &quot;18+&quot; sites when on 3G that I&apos;ve never bothered to unlock (see number 7) and it blocks nonsense. Stuff that isn&apos;t even 18+ by their own definition. This is because automatic filters don&apos;t work. No technology will be perfect. In fact, by the definition of the system that the government are rolling out sites about sexuality and sex education will be blocked - blocking information for the most vulnerable of our children and teenagers (and adults, why not), who need access to this information, is borderline insane." />
                      <outline text="So yeah, the tech won&apos;t work. It can&apos;t. Because..." />
                      <outline text="6) What is Porn Anyway?What is porn? Tits? A flash of cock? An ejaculation? Well, if I can&apos;t decide (and society can&apos;t) then how is an automatic filter supposed to? I see sites like Wikipedia with their informative descriptions and pictures being blocked because of language and photos of naked bodies. Nudity is not porn. In fact, that&apos;d mean many publications that the Conservatives endorse would be in deep shit, like The Sun. So here&apos;s the big problem - porn isn&apos;t a thing." />
                      <outline text="It&apos;s not a thing you can block because it doesn&apos;t exist as a steady thing - you could block the word &quot;five&quot; easily enough, because any time it comes up you can block it. Porn is a spectrum, and especially in the form that the filter will take, from nude art to illegal rape-porn." />
                      <outline text="Where is the line drawn then? Well, that&apos;s the thing - if I am in charge of my internet when I have kids I&apos;d block it to a point. I&apos;d block what I want to block. But it&apos;d be me, working at it. I can&apos;t just block everything that might be porn, so why should the government?" />
                      <outline text="7) I Can&apos;t Be Bothered to Change ItSee number 5 - I&apos;ve had a porn block on my phone since I got it in 2007. It works over 3G only, of course, but it requires a credit card to authorise, me spending &#163;1 and them crediting it back to my account. I have never done this because it&apos;s an arse ache! Loads more won&apos;t bother to do it for their service either." />
                      <outline text="8) Who Cares Anyway?And finally, who cares in the end, right? It&apos;s just porn! But that&apos;s the problem - here you are blocking a type of expression. No, come back, let me explain! Porn in certain circumstances (some would argue in all circumstances) is a form of art - admittedly, low art (in my opinion), but some films have money and time spent on them. And... are not real. Fictional events. So there&apos;s an odd leap for the government - suddenly you&apos;re blocking fiction. That&apos;s a very hair-raising idea, the concept of blocking something that doesn&apos;t even exist and isn&apos;t true." />
                      <outline text="The fact that there is a filter at all should alarm some people - imagine it was suddenly blocking certain websites for political reasons? The Internet is the great democratic enabler and has the power to change everything in the world for the better or worse. But if you don&apos;t allow the bad stuff, the good stuff won&apos;t be able to grow either, because what is &quot;good&quot; and &quot;evil&quot; when nothing you&apos;re blocking is necessarily illegal?" />
                      <outline text="The whole thing is a farce. It&apos;s petty, bullshit, disgusting and pandering. It&apos;s a government playing directly to those who don&apos;t understand, don&apos;t grasp the enormity, and don&apos;t appreciate the implications. The same folk who complain about &quot;nanny-state&quot; and &quot;political correctness&quot; as things (which they are both not) are being played by the government as idiots and they are lapping it up. It enrages me that trans or gay children might not get to read about their options because some old twat without any understanding of how information frees people has decided that you can&apos;t see some tits on the internet." />
                      <outline text="And the worst part? I have no representation in government against it. All the parties support it. This is why politics in the UK is so terribly terribly rubbish." />
                      <outline text="A petition, if you think that&apos;ll do anything, is found here." />
              </outline>

              <outline text="Taking a closer look at badBIOS | The Vafaburg Periodical">
                      <outline text="Link to Article" type="link" url="http://vafaburg.com/2013/12/22/taking-a-closer-look-at-badbios/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387809235_rb7D6fwW.html" />
      <outline text="Mon, 23 Dec 2013 14:33" />
                      <outline text="" />
                      <outline text="DISCLAIMER: The contents of this analysis are meant as a critical review of data currently available on badBIOS, and are not intended to disparage in any way, the author of the badBIOS claims." />
                      <outline text="Stuxnet was a game-changer. In the words of one researcher, it marked &apos;&apos;a clear turning point in the history of cyber security and in military history as well.&apos;&apos; Even though some of the propagation methods employed by Stuxnet, taken in isolation, may have been known to be theoretically possible at the time, it was the first public record of an attack of such complexity against a target of substantial value. The version of Stuxnet that gained public exposure &apos;&apos;represents the first of many milestones in malicious code history &apos;&apos; it is the first to exploit four 0-day vulnerabilities, compromise two digital certificates, and inject code into industrial control systems and hide the code from the operator&apos;&apos;" />
                      <outline text="The scope of the Stuxnet development and execution effort also had another, perhaps unintended, consequence: it lowered the bar on what would be considered a plausible cyber attack. If the Stuxnet authors were able to physically break into two companies and steal signing certificates in order to sign the malicious binaries, the reasoning went, or exploit four zero-day vulnerabilities, then what else could they do? Did anything lie outside their reach? After Stuxnet, no idea was too outlandish. Could malware jump over an air gap? Stuxnet did. Can systems infected with a specific strain of malware communicate through a means other than traditional wired or wireless networks? Flame did. What then, is expected behavior? What is the baseline? As Dan Geer recently pointed out, &apos;&apos;everywhere you look, cyber security practitioners are trying to get a handle on &apos;&apos;What is normal?&apos;&apos; so that that which is abnormal can be identified early in the game.&apos;&apos; It is against this backdrop of behavioral uncertainty, that the claims made about the badBIOS malware should be weighed: any unexplained operation or response observed on an isolated or networked group of computers, can be taken to be the workings of malware. Because as Stuxnet, and its cousins Flame and Duqu showed, malware authors are several years ahead of what is commonly believed to be possible." />
                      <outline text="INTRODUCTION" />
                      <outline text="In mid-October of this year, Dragos Ruiu, a security enthusiast well known within the infosec community, used social media channels to make a startling announcement: his home-office systems were infected with an advanced type of malware which appeared to infect the systems at the BIOS level, have the ability to jump air-gaps by communicating over the 35kHz audio range, and infect different operating systems (OSs). Ruiu called the malware badBIOS, and started sharing snippets of information relating to its operation on Twitter, Facebook, and Google+. Due to its advanced nature, Ruiu explained, it was not immediately possible to obtain samples. For the month following the disclosure, the infosec community was abuzz with discussions about badBIOS: was it real, or was it a hoax? Was this the next Stuxnet? As we will see, once the scientific method is applied to Ruiu&apos;s assertions, the answer is self-evident." />
                      <outline text=" " />
                      <outline text="BACKGROUND TO THE PROBLEM" />
                      <outline text="Dragos Ruiu is a familiar name within the infosec community. He is best known for being an organizer of the Pwn2Own security challenge, and the CanSecWest and PacSec security conferences. His resume states that he worked as a C programmer, and later as a VAX administrator, and an Embedded Systems programmer. It also states that he was an original member of the Honeynet Project, and also a founder member of SourceFire, a company best known for its network security software and hardware. He is also listed as one of the Major Contributors to Snort, an open source Network Intrusion Detection system (NIDS). In addition to this, Ruiu authored two books (Testing Digital Video in 1997, and Testing Digital Video-Discover the Latest Techniques and Products for Real-World Video Testing, also in 1997) and also co-authored two books (Broadband Testing Technologies, B-ISDN Primer in 1993, and Deploying Snort 2. 0: Maximizing and Extending Intrusion Detection in 2003). In spite of this, there appears to be no reference to any specific security research conducted by Ruiu, presentation made by him at a security conference, or forensic or malware analysis undertaken by him." />
                      <outline text="When releasing information about badBIOS, Ruiu shared his observations progressively and without much technical detail. A sizable portion of the information available on badBIOS was released by Ruiu on Twitter, 140 characters at a time. What this means is that there is no authoritative analysis of the technical details of badBIOS that may be comparable to Symantec&apos;s W32.Stuxnet Dossier. Graham and Jaenke are the ones that come closest to providing a technical analysis. Analyzing the primary information made available by Ruiu therefore, involves a process of reviewing a large number of sources, each with a small amount of information, and each with little accompanying context." />
                      <outline text="Compiling the data released on Twitter, Facebook, Google+ and on one podcast interview pertaining to badBIOS, it is nevertheless possible to put together a list of forty (40) distinct claims that are made by Ruiu regarding badBIOS. These are listed in their entirety, in Annex B, including reference quotes and links. For the sake of brevity, Table 1 below only includes a subset of ten (10) claims. The same process used to test the validity of these ten claims, can be applied to the remaining thirty.  The numbers in Table 1 correspond to the row number in the complete list in Annex B." />
                      <outline text="INSTINCTIVE THINKING" />
                      <outline text="The method of analysis that accompanies the assertions made by Ruiu are characteristic of instinctive thinking: the claims are unsubstantiated, assumptions and conjecture are combined with facts, and unexplained behavior is taken to be the work of advanced malware. Even though Ruiu notes that settling on the idea that an advanced form of malware was behind the unexplained behavior was &apos;&apos;about the second last theory we tried,&apos;&apos; the primary sources on badBIOS lack alternative hypotheses, and contain several examples of cognitive distortions. Ten assertions are analyzed below. The numbering corresponds to the row in the list of forty assertions presented in Annex B." />
                      <outline text="A common theme that is present throughout the first-hand reports of badBIOS operation, is the assumption that the malware exists. That the unexplained behavior is attributed to an advanced form of malware, is presented to the public as a fact. Ruiu mentions having looked at other alternative explanations early in the discovery of this malware, but does not share those hypotheses or discuss them with his readers. The assertions are presented in rapid succession, and without supporting evidence. This reduces the assertions to a series of anecdotes and eyewitness accounts. Further, Ruiu doesn&apos;t explain why these assertion are taken to be true. These assertions should only be looked at as a list of questions that should characterize the start, not the end, of an investigation." />
                      <outline text="Assertion 1:OpenBSD systems infected with badBIOS can unexpectedly enter single user mode." />
                      <outline text="Reference: &apos;&apos;we saw all kinds of weird effects, and things like OpenBSD boxes in single user mode, changing files while they&apos;re not supposed to be on the network, so there&apos;s all kinds of strange things.&apos;&apos;" />
                      <outline text="Evidence: Ruiu does not provide corroborative evidence to back this claim. No evidence is provided to explain how many OpenBSD systems entered single-user mode, or whether this was a repeatable or one-time occurrence. By making this assertion, Ruiu is making an inference based on very little data." />
                      <outline text="Biases:" />
                      <outline text="Confirmation bias: In making this assertion, Ruiu has concluded that badBIOS is real, and that the OpenBSD systems are infected with it. Unexplained behavior like the system entering single-user mode provides a confirmation to, and in a way proves this conclusion.Observation bias:Although the claim is that the OpenBSD system entered single-user mode on its own accord, there is no contextual information to indicate what other factors may have contributed to it entering single-user mode. Were there any error messages in the system logs? Did any applications enter an error condition? Did any other OpenBSD systems on the network enter single-user mode? What are the differences between the systems that did enter single-user mode and those that didn&apos;t? The available information shows that the observer saw one or more systems in single-user mode, and took that as proof of the existence of badBIOS.Certainty bias: In this case, making the assumption that this behavior is attributable to the badBIOS malware is an indication of the need for a simple explanation to what could be a complex problem. A system rebooting and entering single-user mode can be the result of the malfunction of several components. The analysis of system and application logs is often a starting point, to determine the underlying cause of the anomaly was.   Notes: Unix operating systems like OpenBSD have five stages, or &apos;runlevels&apos; that comprise the bootstrap process. Different tasks or operations are undertaken at each runlevel, and a process or subsystem may start at one runlevel and be shut-down at another. Run-level 1 is referred to as &apos;Single user mode&apos; referring to the fact that this runlevel does not support a multi-user environment. Only the superuser (or administrator) account, referred to as the &apos;root&apos; account in Unix can log on to the system when the machine is in this runlevel. Single- user mode is also a stage where other services or processes have not yet started; it is a stage reserved for troubleshooting and administrative tasks, and since networking services are not active at this runlevel 1, it requires operator interaction at the system console." />
                      <outline text="Observation:" />
                      <outline text="A Unix system entering single-user mode is not unusual. A Google search for &apos;&apos;OpenBSD stuck in single-user mode&apos;&apos; provides a view of the variety of reasons an OpenBSD system can enter single-user mode. The same holds for other flavors of Unix and Linux.The reference does not indicate whether the systemrebootedand entered single-user mode, or whether it entered single-user mode without rebooting. Both are possible, and the root causes of each differ.  The reference also notes that Ruiu observed files changing on the infected machine when it was not connected on the network. From comments made by Ruiu elsewhere, it is likely that this is a reference to files Ruiu and his team observed being written to and read from, by looking at the SysInternals process monitor (procmon) output. This too is not unusual. As a commenter noted on a subsequent Twitter update from Ruiu, &apos;&apos;Asking &apos;&apos;Why does it do X&apos;&apos; is probably an inefficient way to proceed. Uninfected computers do a lot of weird things.&apos;&apos;Assertion 6: Deleting registry keys that badBIOS is using, results in the malware entering an error condition." />
                      <outline text="Reference: &apos;&apos;at one point we saw a whole bunch of registry keys as they&apos;re accessing them, so we deleted them &apos;... And you could see that their stuff sputtered and then I guess that was the point at which it required operator intervention. And we start seeing more intelligent responses from these things.&apos;&apos;" />
                      <outline text="Evidence: Ruiu does not provide evidence to back this claim. What is also absent is detail regarding the exact steps that were followed to generate this outcome. Detailed steps would make it possible for others to try to reproduce the same behavior. In this case, Ruiu is reaching a conclusion based on very little data." />
                      <outline text="Biases:" />
                      <outline text="Self-serving bias: This is an example of seeking supporting evidence for the claim of the existence of badBIOS, as doing so also confirms related assertions.Jumping to conclusions bias: Once the bar for confirmatory evidence has been set low, we can be persuaded to reach a conclusion based on any evidence, irrespective of the strength of its argument. Belief in the evidence and in the conclusion make it difficult to accept that the method in which this assertion was accepted, is wrong.  Framing bias: This can also be an explanation of reaching incorrect conclusions because the problem (or assertion) is not framed correctly or presented accurately. In this case, the assertion is that one or more processes tied to the badBIOS malware &apos;&apos;sputtered&apos;&apos; once a number of registry keys were deleted. Framing this in a technical context &apos;-- stating for example that the process iexplore.exe outputs error messages and terminates once registry keys X, Y, and Z are deleted, would make it easier to disprove. In its current form, the assertion is framed as a general observation.Notes: The Windows registry, according to Russinovich, Solomon, &amp; Ionescu (Windows Internals Part 1) is &apos;&apos;the systemwide database that contains the information required to boot and configure the system, systemwide software settings that control the operation of WIndows, the security database, and per-user configuration settings.&apos;&apos; Attempting to edit Windows registry keys carries with it the caveat that &apos;&apos;you must exercise extreme caution; any changes might adversely affect system performance or, worse, cause the system to boot successfully.&apos;&apos; It appears that Ruiu&apos; intention was to elicit some kind of response by deleting &apos;&apos;a whole bunch&apos;&apos; of registry keys from a running Windows system. This strategy may work in a well controlled setting, where the values being deleted are known, and documented, and where there is a list of likely outcomes. Deleting the registry keys in that scenario could be a method of testing likely outcomes. Indiscriminately deleting registry keys however, and reporting on the outcome does not help strengthen the assertion." />
                      <outline text="Observations: This behavior, as described, should be repeatable. The assertion that deleting registry keys causes the badBIOS malware to &apos;sputter&apos;, implies that the operation being observed &apos;-- the write operations to files on disk, and read and write operations to specific registry keys &apos;-- is being undertaken by the malware. Since there is insufficient evidence to prove the presence of malware, it is unclear what is entering an error condition &apos;-- what is sputtering? What registry keys were being written to? Which were erased?" />
                      <outline text="Assertion 12: An audio recording of badBIOS communication shows a pulse pattern in the 35kHz range; approximating 128 bits per second." />
                      <outline text="Reference: &apos;&apos;So we made some recordings, and a colleague of mine has been looking at it, and he&apos;s found lots of odd spectral artifacts at around 35kHz, and when you zoom it out, it looks like it&apos;s a repeated bit pulse pattern at that rate, something like 128 bits per second, which coincidentally enough seems to match the bit rate of the packets that we&apos;re seeing on the procmon traces, we&apos;re seeing 8-byte payloads, and changing the packets once every one to two seconds, about the same bit-rate.&apos;&apos;" />
                      <outline text="Evidence: Ruiu provided an audio recording which shows a signal in the 35kHz range, and noise around the 40kHz range." />
                      <outline text="Biases:" />
                      <outline text="Confirmation bias: In this case, the signal at 35kHz is taken as confirmation of the existence of badBIOS malware, instead of triggering a need for an alternate explanation. This new information is also interpreted in a way that confirms Ruiu&apos;s formerly stated conclusions.Illusory Correlation bias: This is an example of believing in one&apos;s ability to find causal explanations based on visual clues, and in identifying patterns that support stated beliefs. Notes: The range of human hearing is 20Hz &apos;&apos; 20,000Hz. The image depicted on the cover page of this report is that of the signal alluded to be Ruiu, which can be observed at the 35,000Hz mark. The signal was further analyzed and &apos;&apos;slowed down 20x&apos;&apos; to produce the image below. The pulse pattern Ruiu refers to, is the pulse that can be observed in this image." />
                      <outline text="Observations: A signal can indeed be observed at the 35kHz mark, however there is no evidence to suggest what could be generating it, and one cannot rely on a visual analysis of the waveform to conclude what it could represent. A Twitter user following the discussion for example, suggested that the signal can be generated by an electronic component present in Ruiu&apos;s system, similar to a NCP1729, a Switched Capacitor Voltage Inverter that operates at 35kHz. In a related tweet, Ruiu expressed a sentiment that becomes characteristic of the claims made of badBIOS, he notes &apos;&apos;slowed down it sounds like a modem. As I said I&apos;m not doing analysis, looking at results. But it&apos;s looking pretty viable.&apos;&apos;" />
                      <outline text="Assertion 16: The badBIOS audio link is encrypted." />
                      <outline text="Reference 12: &apos;&apos;We haven&apos;t captured the downloads, or gotten any of these modules, it&apos;s all-encrypted&apos;&apos; and &apos;&apos;nope it probably wasn&apos;t ipv6 over audio, it was seemingly 12byte packets, 8bytes encrypted payload.&apos;&apos;" />
                      <outline text="Evidence: Ruiu provides no evidence for this assertion." />
                      <outline text="Biases:" />
                      <outline text="Assertion bias: This is a prime example of making an assertion to imply analysis. Ruiu asserts that the link is encrypted, and that assertion is taken as fact.Self-serving bias: In this case, an explanation is provided in support of (and in line with) other badBIOS claims, in the clear absence of evidence. Not only is there no evidence of the audio link being encrypted, there is also no evidence of the existence of the audio link. Making this assertion simply helps strengthen the case for the existence of badBIOS.Evidence bias: This is also an example of accepting confirmatory evidence with little assessment &apos;-- critical or otherwise.  Notes: Ruiu takes the signal at 35kHz to denote data communications between systems infected with badBIOS, and then asserts that the signal is encrypted &apos;-- and offers detail of the packet format: it contains a 4-byte header and an 8-byte encrypted payload." />
                      <outline text="Observations: As noted by the reference, Ruiu explains that the his team has not captured data showing what badBIOS is downloading onto the system, nor obtained the modules that badBIOS has pulled as part of its exploit kit; and in the same sentence makes the claim the communication is encrypted." />
                      <outline text="Assertion 21:A USB disk that has been inserted into a machine infected with badBIOS, can cause a clean system to reboot." />
                      <outline text="Reference: &apos;&apos;So we left it in there for a little bit, and looked at the files, and pulled it out, and reinserted it into one of the forensic systems. The message came up in the console, and then in about a minute or so the system just rebooted itself spontaneously, after plugging this thing in.&apos;&apos;" />
                      <outline text="Evidence: Ruiu provides no evidence for this assertion." />
                      <outline text="Biases:" />
                      <outline text="Confirmation bias: In this case, the observed behavior is taken as proof or confirmation of the presence of badBIOS, instead of looking for clues that would invalidate this assumption and ensure it stands up to scrutiny.   Closure bias: This is an example of the case whereanyexplanation is preferable tonoexplanation. It is more comfortable to reach closure by attributing an explanation to this observed behavior, instead of dealing with the uncertainty of not knowing the root cause &apos;-- or having to spend time and resources finding it out.Notes: What Ruiu is depicting is a correlation between two events: plugging-in the USB disk into an uninfected system, and that system rebooting. However correlation does not imply causation: that the uninfected system rebooted a minute after the USB stick was plugged into it, does not mean that one event caused the other." />
                      <outline text="Observations: Although at first glance this assertion may appear alarming, it is provided without any context, making an accurate analysis difficult. An indication that the behavior was reproducible would help in this event. Since Ruiu refers to more than one forensic system (implying that there are at least two), the next question to ask would be: was the USB disk plugged into any of the other forensic systems, and did any of them reboot as a result?" />
                      <outline text="Assertion 25: badBIOS is able to block access to internet sites, notably sites that contain technical information that pertain to badBIOS method of operation, infection. or propagation." />
                      <outline text="Reference: &apos;&apos;and there was some blocking going on. One of the sites that we were trying to get to, and I don&apos;t know if this was conscious on their part, but this is what triggered the thought chain from me, was a site called flashboot.ru.&apos;&apos; Coincidentally Russian flash controller reflashing software sites are blocked on infected systems, and laptop bios downloads 404 #badBIOS&apos;&apos;" />
                      <outline text="Evidence: Ruiu does not provide any evidence to support this assertion." />
                      <outline text="Biases:" />
                      <outline text="Observation bias: This is an example of reaching a conclusion based on a mis-interpreted observation &apos;-- instead of subjecting the observation to critical analysis.Freezing bias: In this case, Ruiu has reached a conclusion that provides an explanation which is in line with his assertion of the existence of badBIOS. No further explanation is sought. If badBIOS was blocking access to specific internet sites, or proxying their internet-bound traffic, there would be a noticeable change in speed, as traffic would have to be inspected by or filtered through an additional hop. A next question to ask would be: has there been a noticeable and measurable decrease in their internet browsing speed? Notes: As per RFC 2616, error code 404 (Not Found) should be used by the server when it is unable to fulfill a request by the client, but does not wish to make known the reason for the refusal." />
                      <outline text="Observations: Little context is provided with this assertion, and troubleshooting steps are absent. Connecting a switch to the network and capturing the client-server communication would determine whether the traffic is being sent out to the internet, or proxied by an infected machine. Trying to access the site from another device &apos;-- such as a mobile phone&apos;-- would indicate whether the problem is local to the network on which badBIOS systems reside, or whether the problem lies with the flashboot.ru site. Attempting the connection over an extended period could determine whether the site was undergoing maintenance, experienced an outage, or if a flashboot.ru site administrator inadvertently broke the link Ruiu was attempting to access." />
                      <outline text="Assertion 26: badBIOS operators removed the malware from some infected boxes once there was public conversation regarding its method of operation, infection, and propagation." />
                      <outline text="Reference: &apos;&apos;when we start talking about the USB and the ultrasound thing, it&apos;s the first time we&apos;ve ever seen them back off, so they actually pulled out of a bunch of boxes as soon as we started sniffing down that road, and so that&apos;s been a really positive thing.&apos;&apos;" />
                      <outline text="Evidence: Ruiu does not provide any evidence to support this assertion. One could also ask the question: What evidence could Ruiu provide to back this claim? Since no evidence of the existence of badBIOS has been provided, it is difficult to prove the absence of that evidence." />
                      <outline text="Biases:" />
                      <outline text="Confirmation bias: In this case, Ruiu has observed unexplained behavior in some of his systems, and then stopped observing the unexplained behavior after going public with the assertions of the existence of badBIOS. Instead of seeking to find explanations for the unexpected behavior, he is identifying a causal relationship while confirming by implication, his belief in the existence of badBIOS. Evidence bias: This is an example of having a low threshold for what constitutes evidence. It is an unfounded assertion that results in a self-fulfilling prophecy. Assertion bias: This is an example of how something is taken to be a fact, simply because it has been asserted: analysis by assertion. Notes: Proving this assertion, would be akin to trying to prove a double negative while implicitly assuming the positive: first trying to prove the absence of badBIOS from previously-infected systems &apos;-- on which the presence of badBIOS has not yet been confirmed, and then trying to prove a causal relationship for its absence." />
                      <outline text="Observations: At this point, not enough information has been provided to prove the presence of badBIOS. Trying to prove its absence, or establish a causal relationship, would require proof its presence as a prerequisite." />
                      <outline text="Assertion 34: badBIOS uses TTF font files on Windows as part of its attack kit. In infected Windows systems, additional .ttf and .fon files can be observed &apos;&apos; three of them (meiryo, meiryob, and malgunnb) have a size that is bigger than expected." />
                      <outline text="Reference: &apos;&apos;Now suspect font files as a part of the infection vector. Found 246 extra ttf files, 150 fon files in addition to unusual DLLs #badBIOS&apos;&apos;" />
                      <outline text="Evidence: Ruiu made available an archive containing what appear to be the file contents of a Windows system. Included in this archive are the font files that he refers to in his assertion. In addition to this, Ruiu shared a link to the output of a utility that dumps the contents of TTF files (True Type Font File Dumper), with the caption &apos;&apos;is this an TTF attack vector? table 63 of meiro.ttc.&apos;&apos;" />
                      <outline text="Biases:" />
                      <outline text="Observation bias: In this case, Ruiu has observed a file size for one font that is inconsistent with the file size of other font files on the system. A subsequent observation is that the a number of font files are not digitally signed. These observations are taken to be corroborative evidence of the existence of badBIOS.  Notes: 0xebfe.net. ran the sigcheck utility that is part of the SysInternals suite and found that 22 files out of 255 were not signed. Manually uploading a selection of these files to online antivirus resource VirusTotal.com, did not find known malware in any of them. The output referred to by Ruiu does show that the font meiro.ttc has a length several times that of all other fonts listed." />
                      <outline text="Observations: This finding can be characterized as inconclusive. It would however be grounds for a further review of the font files that failed the signature check, and specific analysis of the meiro.ttc file." />
                      <outline text="Assertion 36: badBIOS can disable the Windows registry editor." />
                      <outline text="Reference: &apos;&apos;We had an air-gapped computer that just had its [firmware] BIOS reflashed, a fresh disk drive installed, and zero data on it, installed from a Windows system CD, &apos;... At one point, we were editing some of the components and our registry editor got disabled.&apos;&apos;" />
                      <outline text="Evidence: Ruiu provides no evidence for this assertion." />
                      <outline text="Biases:" />
                      <outline text="Confirmation bias: This is an example of discarding information that dismisses, invalidates, or contradicts the belief in the advanced capabilities of badBIOS. Instead of the well-known and well-documented warning and caveats that accompany editing the Windows registry, Ruiu is taking an error condition in the registry editor to confirm evidence of badBIOS.    Closure bias: In this example the simple explanation that unexpected behavior is attributable to badBIOS brings closure to the problem. There is no need to spend more time on it: the answer is known, and it is in line with other assertions.Notes: This assertion comes with very little accompanying detail. The behavior described however, is not necessarily anomalous. The registry hive is a database file, which can be left in an inconsistent state by an ungraceful shutdown, or corrupted by faulty hardware." />
                      <outline text="Observations: The assertion does not make clear what registry keys were being edited, what other changes were being made to the registry, or what characterized the registry editor&apos;s disabled status. Did the registry editor enter an error condition and halt? Was it still functional but disallowed changes to keys? Was it functional but disallowed changes to the keys that Ruiu and his team had been writing to?  A number of troubleshooting steps could help provide clarity with respect to this claim. Since the registry keys are stored in a hive, which is a file that resides on disk (some hives reside in memory), a first step to determine the validity of this assertion, would be to check the permissions on the corresponding hive when the &apos;&apos;registry editor got disabled.&apos;&apos; Did the permissions change? Other troubleshooting steps could involve trying alternate registry editing tools to determine whether they exhibit the same behavior, or trying to edit the same keys via the Windows command line utility reg (reg add KeyName Value)." />
                      <outline text="Assertion 38: badBIOS reflashes the system BIOS and is able to persist after the machine has been re-flashed with legitimate firmware." />
                      <outline text="Reference: &apos;&apos;We&apos;ve already found some persistent BIOS malware that survives re-flashing with it.&apos;&apos;" />
                      <outline text="Evidence: Ruiu does not provide evidence for this assertion." />
                      <outline text="Biases:" />
                      <outline text="Wishful thinking bias: This can be an example of interpreting a behavior in a certain way, because one has been primed to want it to be true &apos;-- and the more one wants it to be true, the more confidence one has in the correctness of the assertion.  Notes: In his detailed rebuttal of Ruiu&apos;s claims, Jaenke refutes the idea of a portable hardware- independent BIOS, and explains that BIOS firmware is very hardware-specifc. He explains for example, that the same BIOS could not be burned (or &apos;flashed&apos;) on two motherboards from the same vendor, that do not share the same model number. He also goes on to state that modern BIOSes have very limited space (in the order of 6KB) of available space for a malicious payload." />
                      <outline text="Observations: Jaenke makes a strong case against this assertion, focusing on the difficulty associated with creating a &apos;portable&apos; BIOS, as well as the justification provided by Ruiu for not having an infected BIOS dump to share. He writes, &apos;&apos;If you are MISSING a block, you will fail checksum and fail a basic differential. If you have AN EXTRA block, you will fail checksum and fail basic differential. There is no &apos;maybe&apos; no &apos;if&apos; no &apos;but.&apos; If it&apos;s in the BIOS, it&apos;s in a dump. If it&apos;s in a dump, it&apos;s detectable and extractable&apos;&apos; (Jaenke, comment on Nov 1st, 2013 at 9:18 pm)." />
                      <outline text="CRITICAL THINKING" />
                      <outline text="In order to analyze the claims presented by Ruiu, we can formulate alternative hypotheses, and test them against each of the claims made regarding behavior attributable to badBIOS. The process to follow is depicted in Figure 2." />
                      <outline text="The hypotheses against which each of the assertions can be tested, are:" />
                      <outline text="H0: It is possible to rationally explain the behavior observed by Ruiu.H1: The behavior observed by Ruiu is benign, the result of chance phenomena.H2: The behavior observed by Ruiu is anomalous, the result of chance phenomena.H3: The behavior observed by Ruiu is anomalous, the result of ordinary malware.H4: The behavior observed by Ruiu is anomalous, the product of advanced state-sponsored malware.In the interest of brevity, only two hypotheses (H0 and H4) will be tested against the first five assertions." />
                      <outline text="Assertion 1: OpenBSD systems infected with badBIOS can unexpectedly enter single user mode." />
                      <outline text="Alternative Hypotheses H0:It is possible to rationally explain the behavior observed by Ruiu. In this case, the rational explanation is that a hardware or software component in the system entered an error condition due to faulty hardware or faulty software." />
                      <outline text="Likely Outcomes:" />
                      <outline text="If this is hypothesis is correct, there will be evidence in the system logs and application error logs indicating the reason why the system entered single-user mode.If this hypothesis is correct, the behavior should be reproducible on the same system, once the initial circumstances leading to the error condition are reproduced.If this hypothesis is correct, the behavior should be reproducible on other OpenBSD systems configured with the same hardware and software. Test:" />
                      <outline text="Review system logs and application error logs, and look for entries occurring before and during the time that the system entered single-user mode.Take careful stock of external factors that preceded the event, and reproduce them. For example, in Assertion 21, Ruiu indicates that connecting a USB disk into one of their forensic systems triggers a reboot. Was a disk also inserted intothissystem before it entered single-user mode? Was a software package being installed or updated on this system immediately prior to it entering single-user mode? Conduct a system audit and record the modification, access, and change times (collectively referred to as MAC times) for all files on the affected system, and review files with MAC times immediately preceding the run-level change into single-user mode.Alternative Hypotheses H4:The behavior observed by Ruiu is anomalous, caused by advanced malware. An example of the behavior expected by advanced malware is the stealth near-undetectable operation characterized by Stuxnet." />
                      <outline text="Likely Outcomes:" />
                      <outline text="If this hypothesis is correct, then badBIOS operation should be covert. It should limit overt action or noticeable behavior, in order to remain undetected.If this hypothesis is correct, then there should be a benefit that badBIOS operators can derive from entering single-user mode; for example being able to carry out an operation that cannot be undertaken at run-levels 2-5. If this hypothesis is correct, then entering single-user mode should aid badBIOS operators in accessing the target machine remotely, not impede them from doing so.Test:" />
                      <outline text="A system that has entered single-user mode is noticeable: once in single-user mode, the system remains there until operator input at the system console changes the runlevel. This fails the stealth/covert operation test. If the system entered single-user mode as a result of malware malfunction, this should be evident by the log analysis covered by H0.Single-user mode is a runlevel at which certain core system services are disabled. If one requires to run commands at a runlevel where those services have been disabled, the requirement can be met by modifying run command scripts (rc scripts) that have been scheduled to run at the desired runlevel; it is not necessary to enter single-user mode. Networking services are disabled in single-user mode, meaning that a remote attacker would lose access to the target machine, failing the remote access test. If the networking services have been enabled (therefore leaving the machine in a state no longertechnicallyrunlevel 1), then this would be identified by looking at the running services on the systems, which would fail the stealth/covert operation test.   Assertion 6: Deleting registry keys that badBIOS is using, results in the malware entering an error condition." />
                      <outline text="Alternative Hypotheses H0:It is possible to rationally explain the behavior observed by Ruiu. In this case, the rational explanation can derive from an understanding of what the Windows registry represents, and caveats that accompany modifying its contents. As mentioned in the Notes section of the Instictive Analysis of Assertion 6 above, Russinovich, Solomon, and Ionescu (2012) characterize the Windows registry as a &apos;&apos;the systemwide database that contains the information required to boot and configure the system, systemwide software settings that control the operation of Windows, the security database, and per-user configuration settings&apos;&apos; and urge &apos;&apos;extreme caution&apos;&apos; when making changes to it." />
                      <outline text="Likely Outcomes:" />
                      <outline text="If this hypothesis is correct, then deleting a collection of registry keys corresponding to a Windows program, should result in the program entering an error condition on the target system.If this hypothesis is correct, then deleting a collection of registry keys corresponding to a Windows program, should result in the program entering an error condition onothersimilarly-configured Windows systems.Test:Although the name of the specific keys that Ruiu and team deleted is not made available, this outcome can be tested by:" />
                      <outline text="Running procmon and observing the registry keys being written to or accessed by any one programFinding the those keys under HKEY_LOCAL_MACHINE, HKEY_CURRENT_CONFIG, or HKEY_CURRENT_USER Deleting the keys.Alternative Hypotheses H4:The behavior observed by Ruiu is anomalous, the product of advanced state-sponsored malware." />
                      <outline text="Likely Outcomes:" />
                      <outline text="If this hypothesis is correct, then deleting registry keys corresponding to the malware should not result in malware malfunction, because the malware would have several watchdog processes that would re- insert the deleted registry keys or files, and ensure continued operation of the malware.If this hypothesis is correct, then disabling one component of the malware by deleting registry keys in use by it, should not result in an error condition for the malware, but rather only for the specific module using those registry keys. Advanced malware should be able to recover and bring the disabled component back to operation.   Test:" />
                      <outline text="This hypothesis can be tested by trying to identify the watchdog process that re-inserts registry keys when they are deleted. The watchdog process can be short-lived, but it can be captured by a program that generates a process history, like procmon. This behavior was not reported by Ruiu.This hypothesis can also be tested by obtaining a memory dump of the infected system, and looking for the presence of short-lived processes that would not be present on a clean/uninfected system, using a tool like volatility. Short-lived processes that would fulfill this function, were not reported by Ruiu.Assertion 12: An audio recording of badBIOS communication shows a pulse pattern in the 35kHz range; approximating 128 bits per second." />
                      <outline text="Alternative Hypotheses H0:It is possible to rationally explain the behavior observed by Ruiu. The rational explanation is the presence of electronic components that operate at the 35kHz range." />
                      <outline text="Likely Outcomes:" />
                      <outline text="If this hypothesis is correct, then one component present within the range of the measuring instrument (like the NCP1729 Switched Capacitor Voltage Inverter that operates at 35kHz) would be able to produce the same pulse pattern at the same frequency.If this hypothesis is correct, then the signal should attenuate if there are obstacles in the signal path.Test:" />
                      <outline text="This can be tested by conducting the measurement in an isolated environment, and accounting for the operating range of every electronic component within the range of the measuring instrument.This can be tested by moving the infected systems away from each other, placing physical obstacles (drywall) between them, and determining whether a signal attenuation is observed.Alternative Hypotheses H4:The behavior observed by Ruiu is anomalous, the product of advanced state-sponsored malware." />
                      <outline text="Likely Outcomes:" />
                      <outline text="If this hypothesis is correct, then a radio frequency (RF) engineer should be able to positively identify the pattern as a communications link.If this hypothesis is correct, then the an RF engineer should be able to identify the emitter&apos;s radiation pattern and match it to what would be expected for that emitter.Test:Both (1) and (2) can be tested by designing a double-blind test, where two independent RF engineers are asked to separately measure and analyze the 35kHz signal, without being told what it is suspected of being. If both conclude that the 35kHz signal is consistent with that of a communications pattern, that would prove this hypothesis." />
                      <outline text="Assertion 16: The badBIOS audio link is encrypted." />
                      <outline text="Alternative Hypotheses H0:It is possible to rationally explain the behavior observed by Ruiu. The rational explanation is that (a) the observed signal is not an audio link, and that it is therefore (b) not encrypted. The signal at 35kHz does not represent an &apos;audio link&apos; between two devices, but rather an audio signal generated by an electronic component operating at that frequency." />
                      <outline text="Likely Outcomes:" />
                      <outline text="If this is hypothesis is correct, then analysis of the waveform should show no difference at the start of the signal, as throughout its lifetime.Since there is no audio input at the BIOS level (Jaenke), if this hypothesis is correct, then there should not be a delay between the time that the system starts up (thus powering the electronic component that transmits at 35kHz), and the time that the signal is observed. That is: the 35kHz signal should be observed immediately at system power-up. If there is a delay, other than what is specified by the electronic component&apos;s technical specifications, then this hypothesis would fail.    Test:" />
                      <outline text="Use a spectrum analyzer, power the infected system up, capture the audio signal for 5 minutes, then power the system down.Use a spectrum analyzer as in (a), and record the time that the signal appears. Contrast it with the time that the infected system was powered up, and entered the different phases of the boot-up process. Alternative Hypotheses H4: The behavior observed by Ruiu is anomalous, the product of advanced state-sponsored malware." />
                      <outline text="Likely Outcomes:" />
                      <outline text="If this hypothesis is correct, then the following stages should be observable by analyzing the signal produced by the infected machines from startup:i.   No link present.ii.  Link negotiation underway.iii. Link established.iv. Link teardown underwayIf this hypothesis is correct, then powering up other infected systems should introduce a variation in the audio signal, as the badBIOS audio protocol handles link negotiation with a new device while maintaining an existing audio link. This new-link negotiation should be observable in the audio signal every time a new infected device is introduced.  Test:" />
                      <outline text="Use a spectrum analyzer, power the infected system up, capture the audio signal for 5 minutes, then power the system down. Periods of transmission and pause, would indicate link negotiation.Use a spectrum analyzer as in (a), and capture the audio signal for a minute, introduce a second infected device (take a note of the time), continue capturing the signal for another minute, then introduce a third infected system (and take a note of the time). Then power-down one system (take a note of the time), wait 30 seconds and power-down a second system (and make a note of the time). Analysis of the audio signal should show consistent changes every time that a new infected system was introduced (to account for a new link negotiation) and every time an infected device was removed (to account for link tear-down or retransmission to a dead peer, and eventual timeout). The presence of these changes would prove this hypothesis.Assertion 21: A USB disk that has been inserted into a machine infected with badBIOS, can cause a clean system to reboot." />
                      <outline text="Alternative Hypotheses H0:It is possible to rationally explain the behavior observed by Ruiu. The rational explanation is that the system rebooted due to a system failure, related to either hardware or software." />
                      <outline text="Likely Outcomes:" />
                      <outline text="If this hypothesis is correct, then the system and application logs should contain a record of the error condition encountered by the system, which led to the reboot.If this hypothesis is correct, then the experiment should be repeatable: inserting the infected badBIOS USB disk into a similar system as the one that rebooted, should produce comparable results.Test:" />
                      <outline text="In order to test this hypothesis, review the system logs, error logs, and application logs, and identify the operations that took place between the time that the USB stick was inserted into the machine, and the time that the reboot was observed. The presence of error logs identifying the cause of the reboot would prove this hypothesis.In order to test this hypothesis, insert the infected USB stick into two other clean systems, and note the outcome. In order to be better prepared, make use of dtrace on Linux or OpenBSD systems, and procmon on Windows systems, filtering forwriteevents.i. If the neither the second or third system reboots, then the first reboot can be attributed to chance.ii. If only one of the two systems (the second or the third) reboot, then identify commonalities between the systems that rebooted (for example: same motherboards, same OS, etc).iii. If both systems (the second and the third) reboot, then identify commonalities between them: if the only commonality is the infected USB stick &apos;-- and it is seen to consistently reboot dissimilar hardware and software platforms, that would cause this hypothesis to fail. Alternative Hypotheses H4:The behavior observed by Ruiu is anomalous, the product of advanced state-sponsored malware." />
                      <outline text="Likely Outcomes:" />
                      <outline text="If this hypothesis is correct, then the infected USB stick should cause other systems to reboot.If this hypothesis is correct, then connecting the USB stick to the target system through a USB protocol analyzer, should show traffic that is not observed when a clean/benign USB stick is connected.Test:" />
                      <outline text="In order to test this hypothesis, plug the USB stick into to two dissimilar systems. If it successfully reboots these systems, or causes them to enter into an error state, then that would prove this hypothesis.In order to test this hypothesis, connect the USB stick to the target systems, via a USB protocol analyzer, and analyze the instructions that are passed on the USB bus. The presence of messages that are a clear violation of the USB spec, or are corner-case implementations not found on on clean/ uninfected USB disk firmware, would prove this hypothesis. DISCUSSION" />
                      <outline text="The claims presented by Dragos Ruiu were picked up by several online security news publications:ThreatPost.com,ErrataSec.com,ArsTechnica.com,PCWorld.com, and even antivirus vendor Sophos published an article which in response to the question &apos;What we can predict&apos; noted &apos;&apos;So the short answer to the question of what we have to say about BadBIOS is, &apos;&apos;We can&apos;t yet say.&apos;&apos; An analysis however, of the forty claims put forth by Ruiu, shows that the answer to this question is self-evident: there in no substantive proof to back the claims that Ruiu has made &apos;-- except for the notable exception of Assertion 34: the TTF font files missing a digital signature. What seems to have contributed to this story receiving attention that it did, is that the claims that Ruiu makes, are independently plausible, and have been so, in some cases, for years. Malware can jump airgaps using audio (Hanspach, Goetz, &amp; Fraunhofer, 2013). It can hide in hardware (Stewin &amp; Bystrov, 2013), even in BIOS. Malware infection via USB sticks is the norm more than the exception. Perhaps more importantly however, Stuxnet, Duqu, and Flame, have raised our expectations of what new infection and propagation methods well-funded malware writers will employ.  A side-effect of this increased expectation, appears to have been our acceptance of claims without critical review. Grimes sums up what is wrong with the badBIOS story in 4 points:" />
                      <outline text="There is no &apos;smoking gun&apos;Ruiu makes errors in causation (he doesn&apos;t exhibit scientific skepticism)The scenarios although plausible, are highly unlikely No other antivirus vendor anywhere in the world has found samples of this malware in the wild. He goes on to draw an insightful parallel to Stuxnet, worth quoting in full:" />
                      <outline text="&apos;&apos;When Stuxnet was discovered, multiple antimalware companies around the world were finding copies. It started with one, then quickly spread to the others &apos;-- not so with BadBIOS. Somehow the most sophisticated superbug on the planet was released three years ago &apos;-- and only Ruiu has found it. What would be the spreader&apos;s motivation for infecting Ruiu? With Stuxnet, the motivation was to stop World War III. Does Ruiu or his lab have something on the same order that needs to be found out or stopped?&apos;&apos;" />
                      <outline text="It is a fair point to ask, and one that remains unanswered: Why has nobody else observed samples of this malware?" />
                      <outline text="It may be the case, that Ruiu&apos;s intention was to engage the infosec community in the process of understanding the odd behavior he observed on his home-office systems, rather than to assert that it was conclusively the work of a new breed of state-sponsored malware, but that Twitter, Google+, and Facebook did not provide an adequate means of doing so. As it stands however, the assertions made by Ruiu provide a good starting point: an interesting set of observations to guide data gathering and investigation." />
                      <outline text="CONCLUSIONS" />
                      <outline text="This study has covered the weakness present in the badBIOS analysis as done by Ruiu, and provided suggestions for how it can be improved. The main failing was that it was not undertaken in a critical manner. Not enough questions were asked, there was a seeming abundance of confirmation bias, there were no alternate hypotheses, and yet there was no effort to disprove any of the assertions. Most troublesome for the researchers who wanted to help in this analysis however, was the fact that there was a lack of evidence. Ruiu&apos;s social media posts are replete with offers to help in the analysis. As it stands now, a critical analysis of the data provided by Ruiu, and of the method of examination he employed, indicates that badBIOS is not real. Whereas it is possible that a couple of Ruiu&apos;s systems were infected with some form of malware &apos;-- which would account for some of the behavior he observed: such as the failure to boot from CD, or the font files with no signature; none of the assertions he provided indicate that the malware is of the technical complexity attributed to badBIOS.    " />
                      <outline text="It is not all doom and gloom however. The strength of Ruiu&apos;s approach was to think outside the boundary of what was considered plausible. As a colleague of mine put it, referring to badBIOS, &apos;&apos;if it didn&apos;t exist before, it does now.&apos;&apos;" />
                      <outline text="This analysis is available as a PDF or an ePUB." />
              </outline>

              <outline text="South Sudan: injured civilians and non-essential staff evacuated from deadly clashes">
                      <outline text="Link to Article" type="link" url="http://www.euronews.com/2013/12/23/south-sudan-injured-civilians-and-non-essential-staff-evacuated-from-deadly-/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387808998_sL3sBsfr.html" />
        <outline text="Source: euronews" type="link" url="http://feeds.feedburner.com/euronews/en/news?format=xml" />
      <outline text="Mon, 23 Dec 2013 14:29" />
                      <outline text="" />
                      <outline text="The United Nations Mission in South Sudan (UNMISS) has evacuated injured civilians and non-essential staff from Bor to the nation&apos;s capital, Juba, which is mostly peaceful." />
                      <outline text="UNMISS says there are about 15,000 people in Bor sheltering from deadly violence between groups loyal to the president, Salva Kiir, and groups loyal to the vice-president, Riek Machar, who was sacked in July following a power struggle." />
                      <outline text="Toby Lanzer, Deputy Special Representative to the Secretary-General (UNMISS) explained more about the situation: &apos;&apos;The thing that we need most is that we need the people who are causing all of this to get everybody under control. There was a lot of looting, a lot of gunshots, a lot of dead bodies and very, very out of control youth. Heavily armed and that needs to be brought under control,&apos;&apos; he said." />
                      <outline text="Bor, the capital of Jonglei, is said to be the scene of some of the fiercest clashes between factions." />
                      <outline text="Hundreds have been killed in the fighting. World leaders are concerned about all-out civil war in South Sudan, which has a history of ethnic violence and divided military loyalties." />
              </outline>

              <outline text="&apos;Linda wordt ernstig bedreigd&apos;">
                      <outline text="Link to Article" type="link" url="http://da.feedsportal.com/c/585/f/413795/s/3521beb6/l/0L0Stelegraaf0Bnl0Cprive0C221627290C0I0I0ILinda0Iwordt0Iernstig0Ibedreigd0I0I0I0Bhtml0Dcid0Frss/ia1.htm" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387808848_GvC5UYSc.html" />
        <outline text="Source: Telegraaf.nl - prive" type="link" url="http://www.telegraaf.nl/rss/prive.xml" />
      <outline text="Mon, 23 Dec 2013 14:27" />
                      <outline text="" />
                      <outline text="click here to continue to articlecliquez ici pour lire l&apos;articleweiter zum Artikelclicca qui per visualizzare l&apos;articoloweiter zum Artikelir a la noticiaklik hier om door te gaan naar het artikelYaz&#196;&#177;ya devam etmek i&#167;in t&#196;&#177;klay&#196;&#177;n&gt;&gt;&#208;&#159;&#208;&#181;&#209;&#208;&#181;&#208;&#185;&#209;&#130;&#208;&#184; &#208;&#186; &#209;&#129;&#209;&#130;&#208;&#176;&#209;&#130;&#209;&#140;&#208;&#181;&gt;&gt;&#231;&gt;&gt;&#167;&#231;&gt;&gt;&#173;&#233;&#133;&#232;&#175;&gt;&gt;&#230;&#150;&#135;&#231; &#188;&#140;&#232;&#175;&#183;&#231;&#130;&#185;&#229;&#135;&gt;&gt;&#232;&#233;&#135;&#140;Tovbb a cikkre" />
              </outline>

              <outline text="BBC News - German &apos;streamed porn&apos; case reviewed">
                      <outline text="Link to Article" type="link" url="http://www.bbc.co.uk/news/technology-25492267" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387808813_MUm7d4Zz.html" />
      <outline text="Mon, 23 Dec 2013 14:26" />
                      <outline text="" />
                      <outline text="23 December 2013Last updated at 07:29 ET A German court that told an ISP to hand over details of users who had allegedly been illegally streaming porn online is reviewing its decision." />
                      <outline text="The names and addresses of those identified were used by a law firm to send letters asking for a one-off fee." />
                      <outline text="The firm, Urmann, acting on behalf of Swiss copyright company Archive, targeted users it said had viewed content on porn-streaming site Redtube." />
                      <outline text="More than 10,000 people are thought to have been affected." />
                      <outline text="It was one of the first cases to target people accused of streaming rather than downloading pornography." />
                      <outline text="Now, the court in Cologne says it has examined complaints from dozens of people who received the copyright infringement warning letters, which demanded a 250 euro (&#163;210) payment." />
                      <outline text="&apos;Victory for users&apos;In a statement the court said the complaints had raised &quot;considerable&quot; doubts about the legal procedure." />
                      <outline text="It also said the laws on &quot;streaming&quot; were not clear enough." />
                      <outline text="Urmann issued a strongly worded statement defending itself against claims it had issued a false affidavit to the court. The firm called on the court to withdraw the allegation." />
                      <outline text="A final decision on the case is not expected until January." />
                      <outline text="In a separate court in Hamburg, a temporary injunction has been issued against Urmann and Archive preventing them from sending warning letters to Redtube users alleging copyright infringement." />
                      <outline text="In a statement Redtube said that the allegations that its site broke copyright laws were &quot;a thinly disguised attempt to extort money from its users&quot;." />
                      <outline text="Commenting on the injunction Alex Taylor, vice president of Redtube, said: &quot;This ruling is a victory not just for Redtube users, but for anyone who accesses a streaming website." />
                      <outline text="&quot;It sends a clear message that the exploitation of personal information and the violation of privacy for financial gain will not be tolerated,&quot; he said." />
                      <outline text="Redtube also stressed that it had not passed on users information to third parties." />
              </outline>

              <outline text="Text Of A Letter From The President To The Speaker Of The House Of Representatives And The President Pro Tempore Of The Senate">
                      <outline text="Link to Article" type="link" url="http://www.whitehouse.gov/the-press-office/2013/12/22/text-letter-president-speaker-house-representatives-and-president-pro-te" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387806039_JUQFCn5e.html" />
        <outline text="Source: White House.gov Press Office Feed" type="link" url="http://www.whitehouse.gov/feed/press" />
      <outline text="Mon, 23 Dec 2013 13:40" />
                      <outline text="" />
                      <outline text="The White House" />
                      <outline text="Office of the Press Secretary" />
                      <outline text="For Immediate Release" />
                      <outline text="December 22, 2013" />
                      <outline text="December 22, 2013" />
                      <outline text="Dear Mr. Speaker: (Dear Mr. President:)In my report to the Congress of December 19, 2013, I provided information on the deployment of U.S. forces to support the security of U.S. personnel and our Embassy in South Sudan. I am providing this additional report, consistent with the War Powers Resolution (Public Law 93-148), to help ensure that the Congress is kept fully informed on U.S. military activities in South Sudan." />
                      <outline text="On December 21, 2013, approximately 46 additional U.S. military personnel deployed by military aircraft to the area of Bor, South Sudan, to conduct an operation to evacuate U.S. citizens and personnel. After the aircraft came under fire as they approached Bor, the operation was curtailed due to security considerations, and the aircraft and all military personnel onboard departed South Sudan without completing the evacuation.The purpose of this operation was to protect U.S. citizens, personnel, and property. As I monitor the situation in South Sudan, I may take further action to support the security of U.S. citizens, personnel, and property, including our Embassy, in South Sudan." />
                      <outline text="This action has been directed consistent with my responsibility to protect U.S. citizens both at home and abroad, and in furtherance of U.S. national security and foreign policy interests, pursuant to my constitutional authority to conduct U.S. foreign relations and as Commander in Chief and Chief Executive.I appreciate the support of the Congress in these actions." />
                      <outline text="Sincerely,BARACK OBAMA" />
              </outline>

              <outline text="Glenn Greenwald to deliver keynote at 30C3 hacker conference | ZDNet">
                      <outline text="Link to Article" type="link" url="http://www.zdnet.com/glenn-greenwald-to-deliver-keynote-at-30c3-hacker-conference-7000024580/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387803104_RRY3Z3Nn.html" />
      <outline text="Mon, 23 Dec 2013 12:51" />
                      <outline text="" />
                      <outline text="Summary: The world&apos;s longest-running hacker conference Chaos Communication Congress opens its 30th year with a keynote from Glenn Greenwald this week in Hamburg, Germany. 30C3 has this, and so much more in store." />
                      <outline text="The world&apos;s oldest and largest global hacker organization The Chaos Computer Club (CCC) has announced it will open next week&apos;s conference, the 30th Chaos Communication Congress (30c3), with a December 27 opening keynote by Glenn Greenwald." />
                      <outline text="Glenn Greenwald&apos;s keynote tops our list of must-see talks at the legendary event. 30C3&apos;s schedule shows that the compelling keynote won&apos;t be the only explosive presentation at 30C3." />
                      <outline text="Mr. Greenwald&apos;s keynote will be webcast live on this page. If you miss it, all of 30C3&apos;s talks will be archived on the offical CCC media website. CCC&apos;s archives go online astonishingly fast." />
                      <outline text="30C3 is the 30th Chaos Communication Congress, brought to us by the Chaos Computer Club. The conference and all of its hands-on events run from December 27th to 30th, 2013 at the CCH Congress Center in Hamburg, Germany." />
                      <outline text="The conference program boasts over 130 talks from a diverse range of the world&apos;s top hackers in five tracks: Hardware and Making, Art and Beauty, Science and Engineering, Security, Safety and Politics, and Ethics and Society." />
                      <outline text="CCC explains, &quot;The lecture programme will be augmented by numerous workshops and offerings for young hackers.&quot;" />
                      <outline text="Competition to speak at this year&apos;s Congress was serious. In its blog post announcing the keynote, CCC explained that the talk lineup was whittled down from more than 360 submissions by teams of experts specific to each subject." />
                      <outline text="If you&apos;re interested, follow CCC on Twitter or the Twitter list of 30c3 speakers. Here&apos;s the index for the entire 30C3 talk shedule." />
                      <outline text=" " />
                      <outline text="Day 1, select highlights " />
                      <outline text="On the evening of December 27th, the 30C3 keynote will be delivered by Glenn Greenwald, the journalist whose work this year with the Snowden documents has changed the world&apos;s understanding of surveillance, security and the actions of the United States in spying and surveillance matters worldwide." />
                      <outline text="More interesting December 27 talks: Dispatches from Fort Meade (reporting on the secret trial of Chelsea Manning), Electronic Bank Robberies (stealing money from ATMs with malware), Hardening hardware and choosing a #goodBIOS (rejecting persistence of malicious software and tripping up the evil maid)." />
                      <outline text=" " />
                      <outline text="Day 2, select highlights " />
                      <outline text="December 28: SCADA StrangeLove 2, [Google] Glass Hacks,, Hardware Attacks, Advanced ARM Exploitation, and Android Hacking, Hillbilly Tracking of Low Earth Orbit (repurposing an Inmarsat Dish with Travis Goodspeed), Extracting keys from FPGAs, OTP Tokens and Door Locks (side-channel and other attacks in practice), Disclosure DOs and DONT&apos;s from the EFF, and Jahresr&#188;ckblick des CCC (the annual review of the CCC)." />
                      <outline text=" " />
                      <outline text="Day 3, select highlights " />
                      <outline text="December 29: CounterStrike (implementation of lawful interception), RFID Treehouse of Horror (hacking city-wide access control systems), Even More Tamagotchis Were Harmed in the Making of this Presentation, Europe, the USA and Identity Ecosystems, ID Cards in China: Your Worst Nightmare, The Exploration and Exploitation of an SD Memory Card (&quot;This talk demonstrates a method for reverse engineering and loading code into the microcontroller within a SD memory card&quot;), Persistent, Stealthy, Remote-controlled Dedicated Hardware Malware." />
                      <outline text=" " />
                      <outline text="Day 4, select highlights " />
                      <outline text="December 30: To Protect And Infect (targeted and untargeted surveillance research by Claudio Guarnieri and Morgan Marquis-Boire), Thwarting Evil Maid Attacks (physically unclonable functions for hardware tamper detection), Attacking HomeMatic (live hacking), Through a PRISM, Darkly (everything we know about NSA spying with the EFF), and the CCC Closing Event." />
                      <outline text=" " />
                      <outline text="Ongoing: " />
                      <outline text="Lightning Talks, December 28-30 - short lectures any congress participant can present (though the slots are filling up fast)." />
                      <outline text="Self-organized hands-on workshops, meetups and more, all four days. Includes everything! Soldering for Kids, the 30c3 queer meetup, SCADA pentesting workshops, Hammer and Tongs, copyright debates, digital cooking, cocktails, geeks and BDSM meetup, a workshop on Amending the European Parliament draft report on mass surveillance, board game geek meetup, NymRights, Publeaks.nl meetup, knitting, tea, whistleblowing, Chaoswelle Ham Radio Operators, Arduino hacking all day every day, Chaos VPN, Debugging Your Depression, and much more." />
                      <outline text="---" />
                      <outline text="30C3 is a noncommercial event with a low entrance fee, and is made possible thanks to an army of CCC volunteers (even ones that hack Apple&apos;s Touch ID). According to CCC, 30C3&apos;s internet connectivity will be a record-breaking 100GB link made possible by donations from ISPs and network equipment vendors." />
                      <outline text="We can&apos;t wait. ZDNet will be attending talks and reporting events live from Hamburg as they happen." />
              </outline>

              <outline text="VIDEO-Fantstico - Edward Snowden fala com exclusividade para o Fantstico">
                      <outline text="Link to Article" type="link" url="http://m.g1.globo.com/fantastico/noticia/2013/12/edward-snowden-fala-com-exclusividade-para-o-fantastico.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387802496_Qn9jEjLv.html" />
      <outline text="Mon, 23 Dec 2013 12:41" />
                      <outline text="" />
                      <outline text="A entrevista   rep&quot;rter S&#180;nia Bridi foi por email, atrav(C)s do advogado de Edward Snowden - medida de seguran&#167;a para evitar que a intercepta&#167;&#163;o de mensagens levasse   localiza&#167;&#163;o exata dele." />
                      <outline text="Snowden diz que &quot;nunca vai trocar informa&#167;&#181;es por asilo&quot;, mas afirma que, se o governo oferecer, vem morar no Brasil:  &quot;Claro! Se o governo brasileiro quiser defender os  direitos humanos, ser uma honra para mim fazer parte disso&quot;." />
                      <outline text="Snowden diz que da R&#186;ssia acompanha diariamente as not&#173;cias ao redor do mundo e que a repercuss&#163;o das revela&#167;&#181;es feitas a partir dos documentos da NSA que ele tornou p&#186;blicos (C) um fato &quot;encorajador&quot; e que, mesmo longe de casa e da fam&#173;lia,  n&#163;o tem arrependimentos." />
                      <outline text="Confira, ao lado, trechos in(C)ditos da entrevista." />
              </outline>

              <outline text="Books and movies about Edward Snowden: Coming soon &apos;-- RT USA">
                      <outline text="Link to Article" type="link" url="http://rt.com/usa/edward-snowden-books-movies-396/" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387802139_8W6eTWXm.html" />
      <outline text="Mon, 23 Dec 2013 12:35" />
                      <outline text="" />
                      <outline text="Published time: December 17, 2013 21:59Edward Snowden (AFP Photo / Wikileaks)" />
                      <outline text="Dust off your eyeglasses, actors, and get ready to show talent scouts your best stoic, anti-surveillance state stare: at least three books about National Security Agency leaker Edward Snowden are currently in the works, and a movie could come soon after." />
                      <outline text="Seven months ago, intelligence contractor Edward Snowden was barely known outside of the walls of his Hawaii office. Half a year later, however, his decision to leak top-secret NSA documents to the international media has transformed him into one of the biggest names in the world: Just this month he&apos;s been both the subject of a 60 Minutes report and announced as a runner-up for the 2013 TIME Person of the Year award." />
                      <outline text="But while Snowden has lived a life largely in secret since identifying himself in June as the source of those NSA leaks, his story is expected to soon be told nevertheless." />
                      <outline text="No fewer than three writers are currently working on books about Snowden and his NSA revelations, Reuters reported on Monday, and just as many major studios have said they&apos;re considering on-screen projects as well." />
                      <outline text="All three of the books reported to be on the way will come courtesy of writers who&apos;ve worked with the cache of leaked documents during the last several months, including one from the legal blogger-turned-Guardian columnist who met with Snowden in Hong Kong earlier this year and was among the first to write about the top-secret NSA files." />
                      <outline text="Former Guardian journalist Glenn Greenwald announced previously that he is planning a book working with Snowden on one of the biggest scoops in modern journalism, and Reuters now says that two other reporters &apos;-- Barton Gellman and Luke Harding &apos;-- have similar projects on the way too." />
                      <outline text="Greenwald told Reuters in an email this week that his book is &quot;about my time with Snowden in Hong Kong and reporting the story, but mostly about the surveillance state based on the documents I have (that The Guardian doesn&apos;t) and my reasons why the surveillance state is menacing.&apos;&apos; He announced in October that he was walking away from his job at the Guardian to take on what he called an &apos;&apos;once-in-a-career dream journalistic opportunity that no journalist could possibly decline&apos;&apos; that has since been revealed to be a project spearheaded by eBay founder Pierre Omidyar that will also employ journalists Jeremy Scahill and Laura Poitras." />
                      <outline text="But unlike Greenwald, Harding does still have an active role with the Guardian, and according to Reuters he is working on a separate project that could be published at the same time as his former colleague&apos;s endeavor." />
                      <outline text="&apos;&apos;A person familiar with the Guardian project, who asked to remain anonymous, said that at the time Greenwald left the newspaper, the two parties tentatively agreed that to ensure neither party would have a marketing advantage the books would be published simultaneously,&apos;&apos; Mark Hosenball wrote for the newswire." />
                      <outline text="Gellman, 53, has worked closely with several of the Snowden documents while at the Washington Post, but has walked away from his job at that outlet in the months since the first leaked NSA file was published in early June. Even before the world knew who Edward Snowden was, however, Gellman was working on a book aimed more broadly at the NSA and will reportedly parlay his newfound experiences into that effort." />
                      <outline text="&quot;I had already started work on a book about the surveillance industrial society when Edward Snowden came my way. He has certainly enriched my reporting, but I am not racing anyone to do a quick hit on current events. My narrative will cover a broader landscape and a wider cast of characters,&quot; Gellman told Reuters." />
                      <outline text="The New York Times reported in October with news of Greenwald&apos;s project that 20th Century Fox , Sony Pictures Entertainment and cable TV network HBO had all expressed interest in taking a Snowden project from script to on-screen. As of this week, however, Greenwald says he has yet to strike a deal." />
              </outline>

              <outline text="John Miller to ditch CBS for NYPD - POLITICO.com">
                      <outline text="Link to Article" type="link" url="http://www.politico.com/blogs/media/2013/12/john-miller-to-ditch-cbs-for-nypd-179756.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387801442_dc29hUjU.html" />
      <outline text="Mon, 23 Dec 2013 12:24" />
                      <outline text="" />
                      <outline text="Via Mike Allen: &quot;John Miller, a CBS News senior correspondent, is expected to make a deal this week to get out of his contract and take a top job with his former boss, incoming NYPD Commissioner Bill Bratton. Miller, who held top jobs under Bratton at the NYPD and LAPD, has also worked for the FBI, the Director of National Intelligence and ABC News. A network source said CBS would welcome [Miller] back after his service: &apos;He loves what he&apos;s doing here, but he loves being a cop. He knows everybody, which is part of why he&apos;s so good at his job.&apos;&quot;" />
                      <outline text="You read that right: That&apos;s John Miller, the correspondent from Sunday&apos;s widely criticized package on the National Security Agency. Miller had been under consideration for the post ever since incoming New York Mayor Bill de Blasio tapped Bratton for commissioner, but the rumors became a near-certainty late last week. Miller formerly worked in the office of the Director of National Intelligence and as a chief spokesperson for the FBI." />
                      <outline text="Which is the real problem with &quot;60 Minutes&quot; decision to let Miller lead its NSA exclusive: It&apos;s not that he&apos;s a former insider, it&apos;s that he&apos;s a future insider, and that those considerations may have factored into how he handled Sunday&apos;s interviews." />
              </outline>

              <outline text="And now it&apos;s global COOLING! Return of Arctic ice cap as it grows by 29% in a year | Mail Online">
                      <outline text="Link to Article" type="link" url="http://www.dailymail.co.uk/news/article-2415191/And-global-COOLING-Return-Arctic-ice-cap-grows-29-year.html" />        <outline text="Archived Version" type="link" url="http://adam.curry.com/art/1387800866_KEpdrEtg.html" />
      <outline text="Mon, 23 Dec 2013 12:14" />
                      <outline text="" />
                      <outline text="533,000 more square miles of ocean covered with ice than in 2012BBC reported in 2007 global warming would leave Arctic ice-free in summer by 2013Publication of UN climate change report suggesting global warming caused by humans pushed back to later this monthBy David Rose" />
                      <outline text="PUBLISHED: 18:37 EST, 7 September 2013 | UPDATED: 13:45 EST, 28 September 2013" />
                      <outline text="A chilly Arctic summer has left 533,000 more square miles of ocean covered with ice than at the same time last year &apos;&apos; an increase of 29 per cent." />
                      <outline text="The rebound from 2012&apos;s record low comes six years after the BBC reported that global warming would leave the Arctic ice-free in summer by 2013." />
                      <outline text="Instead, days before the annual autumn re-freeze is due to begin, an unbroken ice sheet more than half the size of Europe already stretches from the Canadian islands to Russia&apos;s northern shores." />
                      <outline text="HOW NSIDC GOT ITS FIGURES WRONG AND THEN KEPT QUIET Since publication of the original version of this article, the US source of the figures &apos;&apos; the NASA-funded National Snow and Ice Data Centre (NSIDC) - was discovered to have made a huge error and then quietly corrected the figure without mentioning it." />
                      <outline text="On September 4, NSIDC, based at the University of Colorado, stated on its website that in August 2013 the Arctic ice cover recovered by a record 2.38&apos;&#137;million sq km &apos;&apos; 919,000 sq miles &apos;&apos; from its 2012 low." />
                      <outline text="News of this figure was widely reported &apos;&apos; including by Mailonline - on September 8. But on September 10, the NSIDC quietly changed it to 1.38&apos;&#137;million sq km (533,000 sq miles) &apos;&apos; and replaced the original document so the old figure no longer shows up on a main Google search. It can now only be found on an old &apos;cached&apos; page." />
                      <outline text="The figures in this article have now been corrected." />
                      <outline text="Prompted by an inquiry from &apos;green&apos; blogger Bob Ward, the NSIDC&apos;s spokeswoman Natasha Vizcarra said the mistake was a &apos;typographical error&apos;, telling him: &apos;There are no plans to make a statement on the change because it was not an error in the data.&apos;" />
                      <outline text="The Northwest Passage from the Atlantic to the Pacific has remained blocked by pack-ice all year. More than 20 yachts that had planned to sail it have been left ice-bound and a cruise ship attempting the route was forced to turn back." />
                      <outline text="Some eminent scientists now believe the world is heading for a period of cooling that will not end until the middle of this century &apos;&apos; a process that would expose computer forecasts of imminent catastrophic warming as dangerously misleading." />
                      <outline text="The disclosure comes 11 months after The Mail on Sunday triggered intense political and scientific debate by revealing that global warming has &apos;paused&apos; since the beginning of 1997 &apos;&apos; an event that the computer models used by climate experts failed to predict." />
                      <outline text="In March, this newspaper further revealed that temperatures are about to drop below the level that the models forecast with &apos;90 per cent certainty&apos;." />
                      <outline text="The pause &apos;&apos; which has now been accepted as real by every major climate research centre &apos;&apos; is important, because the models&apos; predictions of ever-increasing global temperatures have made many of the world&apos;s economies divert billions of pounds into &apos;green&apos; measures to counter  climate change." />
                      <outline text="Those predictions now appear gravely flawed." />
                      <outline text="The continuing furore caused by The Mail on Sunday&apos;s revelations &apos;&apos; which will now be amplified by the return of the Arctic ice sheet &apos;&apos; has forced the UN&apos;s climate change body to reconsider its position." />
                      <outline text="The UN Intergovernmental Panel on Climate Change (IPCC) was due in October to start publishing its Fifth Assessment Report &apos;&apos; a huge three-volume study issued every six or seven years. It will hold a pre-summit in Stockholm later this month." />
                      <outline text="THERE WON&apos;T BE ANY ICE AT ALL! HOW THE BBC PREDICTED CHAOS IN 2007Only six years ago, the BBC reported that the Arctic would be ice-free in summer by 2013, citing a scientist in the US who claimed this was a &apos;conservative&apos; forecast. Perhaps it was their confidence that led more than 20 yachts to try to sail the Northwest Passage from the Atlantic to  the Pacific this summer. As of last week, all these vessels were stuck in the ice, some at the eastern end of the passage in Prince Regent Inlet, others further west at Cape Bathurst." />
                      <outline text="Shipping experts said the only way these vessels were likely to be freed was by the icebreakers of the Canadian coastguard. According to the official Canadian government website, the Northwest Passage has remained ice-bound and impassable  all summer." />
                      <outline text="The BBC&apos;s 2007 report quoted scientist  Professor Wieslaw Maslowski, who based his views on super-computer models and the fact that &apos;we use a high-resolution regional model for the Arctic Ocean and sea ice&apos;." />
                      <outline text="He was confident his results were &apos;much more realistic&apos; than other projections, which &apos;underestimate the amount of heat delivered to the sea ice&apos;. Also quoted was Cambridge University expert" />
                      <outline text="Professor Peter Wadhams. He backed Professor Maslowski, saying his model was &apos;more efficient&apos; than others because it &apos;takes account of processes that happen internally in the ice&apos;." />
                      <outline text="He added: &apos;This is not a cycle; not just a fluctuation. In the end, it will all just melt away quite suddenly.&apos;" />
                      <outline text="Leaked documents show that governments which support and finance the IPCC are demanding more than 1,500 changes to the report&apos;s &apos;summary for policymakers&apos;. They say its current draft does not properly explain the pause." />
                      <outline text="At the heart of the row lie two questions: the extent to which temperatures will rise with carbon dioxide levels, as well as how much of the warming over the past 150 years &apos;&apos; so far, just 0.8C &apos;&apos; is down to human greenhouse gas emissions and how much is due to natural variability." />
                      <outline text=" " />
                      <outline text="In its draft report, the IPCC says it is &apos;95 per cent confident&apos; that global warming has been caused by humans &apos;&apos; up from 90 per cent in 2007." />
                      <outline text="This claim is already hotly disputed. US climate expert Professor Judith Curry said last night: &apos;In fact, the uncertainty is getting bigger. It&apos;s now clear the models are way too sensitive to carbon dioxide. I cannot see any basis for the IPCC increasing its confidence level.&apos;" />
                      <outline text="She pointed to long-term cycles  in ocean temperature, which have a huge influence on climate and  suggest the world may be approaching a period similar to that from 1965 to 1975, when there was a clear cooling trend. This led some scientists at the time to forecast an imminent ice age." />
                      <outline text="Professor Anastasios Tsonis, of the University of Wisconsin, was one of the first to investigate the ocean cycles. He said: &apos;We are already in a cooling trend, which I think will continue for the next 15 years at least. There is no doubt the warming of the 1980s and 1990s has stopped." />
                      <outline text="Then... NASA satellite images showing the spread of Arctic sea ice 27th August 2012" />
                      <outline text="...And now, much bigger: The same Nasa image taken in 2013" />
                      <outline text="&apos;The IPCC claims its models show a pause of 15 years can be expected. But that means that after only a very few years more, they will have to admit they are wrong.&apos;" />
                      <outline text="Others are more cautious. Dr Ed Hawkins, of Reading University, drew the graph published by The Mail on Sunday in March showing how far world temperatures have diverged from computer predictions. He admitted the cycles may have caused some of the recorded warming, but insisted that natural variability alone could not explain all of the temperature rise over the past 150 years." />
                      <outline text="Nonetheless, the belief that summer Arctic ice is about to disappear remains an IPCC tenet, frequently flung in the face of critics who point to the pause." />
                      <outline text="Yet there is mounting evidence that Arctic ice levels are cyclical. Data uncovered by climate historians show that there was a massive melt in the 1920s and 1930s, followed by intense re-freezes that ended only in 1979 &apos;&apos; the year the IPCC says that shrinking began." />
                      <outline text="Professor Curry said the ice&apos;s behaviour over the next five years would be crucial, both for understanding the climate and for future policy. &apos;Arctic sea ice is the indicator to watch,&apos; she said." />
                      <outline text=" " />
                      <outline text="Share or comment on this article" />
              </outline>
      </body>
  </opml>