New method of displaying time patented

Saturday, October 14, 2006

An American inventor has patented a pair of new time formats with a footprint less than 50% of that of conventional four-digit time. The more unusual of the two new formats, called “TWELV”, dispenses with numerals altogether. In place of clock hands or digits, the new clock uses color to convey the hour and a moon image to convey the minute, which moon slowly grows throughout the course of an hour from a narrow crescent to a full-fledged circle.

The second and more approachable of the new formats retains numerical digits to indicate the minute but uses colors to convey the hour.

Early critics question whether the aesthetic benefits of the moon-clock will be sufficient to encourage users to learn the color-based time-telling system. However, the size advantages of the new system may make it particularly suitable for mobile applications, particularly cell phones, wearable computers, and head-mounted displays.

Categories Uncategorized

ACLU, EFF challenging US ‘secret’ court orders seeking Twitter data

Thursday, April 7, 2011

Late last month, the American Civil Liberties Union (ACLU) and Electronic Frontier Foundation (EFF) filed objections to the United States Government’s ‘secret’ attempts to obtain Twitter account information relating to WikiLeaks. The ACLU and EFF cite First and Fourth amendment issues as overriding reasons to overturn government attempts to keep their investigation secret; and, that with Birgitta Jonsdottir being an Icelandic Parliamentarian, the issue has serious international implications.

The case, titled “In the Matter of the 2703(d) Order Relating to Twitter Accounts: Wikileaks, Rop_G, IOERROR; and BirgittaJ“, has been in the EFF’s sights since late last year when they became aware of the US government’s attempts to investigate WikiLeaks-related communications using the popular microblogging service.

The key objective of this US government investigation is to obtain data for the prosecution of Bradley Manning, alleged to have supplied classified data to WikiLeaks. In addition to Manning’s Twitter account, and that of WikiLeaks (@wikileaks), the following three accounts are subject to the order: @ioerror, @birgittaj, and @rop_g. These, respectively, belong to Jacob Apelbaum, Birgitta Jonsdottir, and Rop Gonggrijp.

Birgitta is not the only non-US citizen with their Twitter account targeted by the US Government; Gonggrijp, a Dutch ‘ex-hacker’-turned-security-expert, was one of the founders of XS4ALL – the first Internet Service Provider in the Netherlands available to the public. He has worked on a mobile phone that can encrypt conversations, and proven that electronic voting systems can readily be hacked.

In early March, a Virginia magistrate judge ruled that the government could have the sought records, and neither the targeted users, or the public, could see documents submitted to justify data being passed to the government. The data sought is as follows:

  1. Personal contact information, including addresses
  2. Financial data, including credit card or bank account numbers
  3. Twitter account activity information, including the “date, time, length, and method of connections” plus the “source and destination Internet Protocol address(es)”
  4. Direct Message (DM) information, including the email addresses and IP addresses of everyone with whom the Parties have exchanged DMs

The order demands disclosure of absolutely all such data from November 1, 2009 for the targeted accounts.

The ACLU and EFF are not only challenging this, but demanding that all submissions made by the US government to justify the Twitter disclosure are made public, plus details of any other such cases which have been processed in secret.

Bradley Manning, at the time a specialist from Maryland enlisted with the United States Army’s 2nd Brigade, 10th Mountain Division, was arrested in June last year in connection with the leaking of classified combat video to WikiLeaks.

The leaked video footage, taken from a US helicopter gunship, showed the deaths of Reuters staff Saeed Chmagh and Namir Noor-Eldeen during a U.S. assault in Baghdad, Iraq. The wire agency unsuccessfully attempted to get the footage released via a Freedom of Information Act request in 2007.

When WikiLeaks released the video footage it directly contradicted the official line taken by the U.S. Army asserting that the deaths of the two Reuters staff were “collateral damage” in an attack on Iraqi insurgents. The radio chatter associated with the AH-64 Apache video indicated the helicopter crews had mistakenly identified the journalists’ equipment as weaponry.

The US government also claims Manning is linked to CableGate; the passing of around a quarter of a million classified diplomatic cables to WikiLeaks. Manning has been in detention since July last year; in December allegations of torture were made to the United Nations High Commissioner for Human Rights regarding the conditions under which he was and is being detained.

Reports last month that he must now sleep naked and attend role call at the U.S. Marine facility in Quantico in the same state, raised further concern over his detention conditions. Philip J. Crowley, at-the-time a State Department spokesman, remarked on this whilst speaking at Massachusetts Institute of Technology; describing the current treatment of Manning as “ridiculous and counterproductive and stupid”, Crowley was, as a consequence, put in the position of having to tender his resignation to Secretary of State Hillary Clinton.

Despite his native Australia finding, in December last year, that Assange’s WikiLeaks had not committed any criminal offences in their jurisdiction, the U.S. government has continued to make ongoing operations very difficult for the whistleblower website.

The result of the Australian Federal Police investigation left the country’s Prime Minister, Julia Gillard, having to retract a statement that WikiLeaks had acted “illegally”; instead, she characterised the site’s actions as “grossly irresponsible”.

Even with Australia finding no illegal activity on the part of WikiLeaks, and with founder Julian Assange facing extradition to Sweden, U.S. pressure sought to hobble WikiLeaks financially.

Based on a State Department letter, online payments site PayPal suspended WikiLeaks account in December. Their action was swiftly followed by Visa Europe and Mastercard ceasing to handle payments for WikiLeaks.

The online processing company, Datacell, threatened the two credit card giants with legal action over this. However, avenues of funding for the site were further curtailed when both Amazon.com and Swiss bank PostFinance joined the financial boycott of WikiLeaks.

Assange continues, to this day, to argue that his extradition to Sweden for questioning on alleged sexual offences is being orchestrated by the U.S. in an effort to discredit him, and thus WikiLeaks.

Wikinews consulted an IT and cryptography expert from the Belgian university which developed the current Advanced Encryption Standard; explaining modern communications, he stated: “Cryptography has developed to such a level that intercepting communications is no longer cost effective. That is, if any user uses the correct default settings, and makes sure that he/she is really connecting to Twitter it is highly unlikely that even the NSA can break the cryptography for a protocol such as SSL/TLS (used for https).”

Qualifying this, he commented that “the vulnerable parts of the communication are the end points.” To make his point, he cited the following quote from Gene Spafford: “Using encryption on the Internet is the equivalent of arranging an armored car to deliver credit card information from someone living in a cardboard box to someone living on a park bench.

Continuing, the Katholieke Universiteit Leuven (KUL) expert explained:

In the first place, the weak point is Twitter itself; the US government can go and ask for the data; companies such as Twitter and Google will typically store quite some information on their users, including IP addresses (it is known that Google deletes the last byte of the IP address after a few weeks, but it is not too hard for a motivated opponent to find out what this byte was).
In the second place, this is the computer of the user: by exploiting system weaknesses (with viruses, Trojan horses or backdoors in the operating system) a highly motivated opponent can enter your machine and record your keystrokes plus everything that is happening (e.g. the FBI is known to do this with the so-called Magic Lantern software). Such software is also commercially available, e.g. for a company to monitor its employees.
It would also be possible for a higly motivated opponent to play “man-in-the-middle”; that means that instead of having a secure connection to Twitter.com, you have a secure connection to the attacker’s server, who impersonates Twitter’s and then relays your information to Twitter. This requires tricks such as spoofing DNS (this is getting harder with DNSsec), or misleading the user (e.g. the user clicks on a link and connects to tw!tter.com or Twitter.c0m, which look very similar in a URL window as Twitter.com). It is clear that the US government is capable of using these kind of tricks; e.g., a company has been linked to the US government that was recognized as legitimate signer in the major browsers, so it would not be too large for them to sign a legitimate certificate for such a spoofing webserver; this means that the probability that a user would detect a problem would be very low.
As for traffic analysis (finding out who you are talking to rather than finding out what you are telling to whom), NSA and GCHQ are known to have access to lots of traffic (part of this is obtained via the UK-USA agreement). Even if one uses strong encryption, it is feasible for them to log the IP addresses and email addresses of all the parties you are connecting to. If necessary, they can even make routers re-route your traffic to their servers. In addition, the European Data Retention directive forces all operators to store such traffic data.
Whether other companies would have complied with such requests: this is very hard to tell. I believe however that it is very plausible that companies such as Google, Skype or Facebook would comply with such requests if they came from a government.
In summary: unless you go through great lengths to log through to several computers in multiple countries, you work in a clean virtual machine, you use private browser settings (don’t accept cookies, no plugins for Firefox, etc.) and use tools such as Tor, it is rather easy for any service provider to identify you.
Finally: I prefer not to be quoted on any sentences in which I make statements on the capabilities or actions of any particular government.

Wikinews also consulted French IT security researcher Stevens Le Blond on the issues surrounding the case, and the state-of-the-art in monitoring, and analysing, communications online. Le Blond, currently presenting a research paper on attacks on Tor to USENIX audiences in North America, responded via email:

Were the US Government to obtain the sought data, it would seem reasonable the NSA would handle further investigation. How would you expect them to exploit the data and expand on what they receive from Twitter?

  • Le Blond: My understanding is that the DOJ is requesting the following information: 1) Connection records and session times 2) IP addresses 3) e-mail addresses 4) banking info
By requesting 1) and 2) for Birgitta and other people involved with WikiLeaks (WL) since 2009, one could derive 2 main [pieces of] information.
First, he could tell the mobility of these people. Recent research in networking shows that you can map an IP address into a geographic location with a median error of 600 meters. So by looking at changes of IP addresses in time for a Twitter user, one could tell (or at least speculate about) where that person has been.
Second, by correlating locations of different people involved with WL in time, one could possibly derive their interactions and maybe even their level of involvement with WL. Whether it is possible to derive this information from 1) and 2) depends on how this people use Twitter. For example, do they log on Twitter often enough, long enough, and from enough places?
My research indicates that this is the case for other Internet services but I cannot tell whether it is the case for Twitter.
Note that even though IP logging, as done by Twitter, is similar to the logging done by GSM [mobile phone] operators, the major difference seems to be that Twitter is subject to US regulation, no matter the citizenship of its users. I find this rather disturbing.
Using 3), one could search for Birgitta on other Internet services, such as social networks, to find more information on her (e.g., hidden accounts). Recent research on privacy shows that people tend to use the same e-mail address to register an account on different social networks (even when they don’t want these accounts to be linked together). Obviously, one could then issue subpoenas for these accounts as well.
I do not have the expertise to comment on what could be done with 4).
((WN)) As I believe Jonsdottir to be involved in the Icelandic Modern Media Initiative (IMMI), what are the wider implications beyond the “WikiLeaks witchhunt”?
  • Le Blond: Personal data can be used to discredit, especially if the data is not public.

Having been alerted to the ongoing case through a joint press release by the ACLU and EFF, Wikinews sought clarification on the primary issues which the two non-profits saw as particularly important in challenging the U.S. Government over the ‘secret’ court orders. Rebecca Jeschke, Media Relations Director for the EFF, explained in more detail the points crucial to them, responding to a few questions from Wikinews on the case:

((WN)) As a worse-case, what precedents would be considered if this went to the Supreme Court?
  • Rebecca Jeschke: It’s extremely hard to know at this stage if this would go to the Supreme Court, and if it did, what would be at issue. However, some of the interesting questions about this case center on the rights of people around the world when they use US Internet services. This case questions the limits of US law enforcement, which may turn out to be very different from the limits in other countries.
((WN)) Since this is clearly a politicised attack on free speech with most chilling potential repercussions for the press, whistleblowers, and by-and-large anyone the relevant U.S. Government departments objects to the actions of, what action do you believe should be taken to protect free speech rights?
  • Jeschke: We believe that, except in very rare circumstances, the government should not be permitted to obtain information about individuals’ private Internet communications in secret. We also believe that Internet companies should, whenever possible, take steps to ensure their customers are notified about requests for information and have the opportunity to respond.
((WN)) Twitter via the web, in my experience, tends to use https:// connections. Are you aware of any possibility of the government cracking such connections? (I’m not up to date on the crypto arms race).
  • Jeschke: You don’t need to crack https, per se, to compromise its security. See this piece about fraudulent https certificates:
Iranian hackers obtain fraudulent httpsEFF website.
((WN)) And, do you believe that far, far more websites should – by default – employ https:// connections to protect people’s privacy?
  • Jeschke: We absolutely think that more websites should employ https! Here is a guide for site operators: (See external links, Ed.)

Finally, Wikinews approached the Icelandic politician, and WikiLeaks supporter, who has made this specific case a landmark in how the U.S. Government handles dealings with – supposedly – friendly governments and their elected representatives. A number of questions were posed, seeking the Icelandic Parliamentarian’s views:

((WN)) How did you feel when you were notified the US Government wanted your Twitter account, and message, details? Were you shocked?
  • Birgitta Jonsdottir: I felt angry but not shocked. I was expecting something like this to happen because of my involvement with WikiLeaks. My first reaction was to tweet about it.
((WN)) What do you believe is their reasoning in selecting you as a ‘target’?
  • Jonsdottir: It is quite clear to me that USA authorities are after Julian Assange and will use any means possible to get even with him. I think I am simply a pawn in a much larger context. I did of course both act as a spokesperson for WikiLeaks in relation to the Apache video and briefly for WikiLeaks, and I put my name to the video as a co-producer. I have not participated in any illegal activity and thus being a target doesn’t make me lose any sleep.
((WN)) Are you concerned that, as a Member of Parliament involved in the Icelandic Modern Media Initiative (IMMI), the US attempt to obtain your Twitter data is interfering with planned Icelandic government policy?
  • Jonsdottir: No
((WN)) In an earlier New York Times (NYT) article, you’re indicating there is nothing they can obtain about you that bothers you; but, how do you react to them wanting to know everyone you talk to?
  • Jonsdottir: It bothers me and according to top computer scientists the government should be required to obtain a search warrant to get our IP addresses from Twitter. I am, though, happy I am among the people DOJ is casting their nets around because of my parliamentary immunity; I have a greater protection then many other users and can use that immunity to raise the issue of lack of rights for those that use social media.
HAVE YOUR SAY
Do you believe the U.S. government should have the right to access data on foreign nationals using services such as Twitter?
Add or view comments
((WN)) The same NYT article describes you as a WikiLeaks supporter; is this still the case? What attracts you to their ‘radical transparency’?
  • Jonsdottir: I support the concept of WikiLeaks. While we don’t have a culture of protection for sources and whistleblowers we need sites like WikiLeaks. Plus, I think it is important to give WikiLeaks credit for raising awareness about in how bad shape freedom of information and expression is in our world and it is eroding at an alarming rate because of the fact that legal firms for corporations and corrupt politicians have understood the borderless nature of the legalities of the information flow online – we who feel it is important that people have access to information that should remain in the public domain need to step up our fight for those rights. WikiLeaks has played an important role in that context.I don’t support radical transparency – I understand that some things need to remain secret. It is the process of making things secret that needs to be both more transparent and in better consensus with nations.
((WN)) How do you think the Icelandic government would have reacted if it were tens of thousands of their diplomatic communications being leaked?
  • Jonsdottir: I am not sure – A lot of our dirty laundry has been aired via the USA cables – our diplomatic communications with USA were leaked in those cables, so far they have not stirred much debate nor shock. It is unlikely for tens of thousands of cables to leak from Iceland since we dont have the same influence or size as the USA, nor do we have a military.
((WN)) Your ambassador in the US has spoken to the Obama administration. Can you discuss any feedback from that? Do you have your party’s, and government’s, backing in challenging the ordered Twitter data release?
  • Jonsdottir: I have not had any feedback from that meeting, I did however receive a message from the DOJ via the USA ambassador in Iceland. The message stated three things: 1. I am free to travel to the USA. 2. If I would do so, I would not be a subject of involuntary interrogation. 3. I am not under criminal investigation. If this is indeed the reality I wonder why they are insisting on getting my personal details from Twitter. I want to stress that I understand the reasoning of trying to get to Assange through me, but I find it unacceptable since there is no foundation for criminal investigation against him. If WikiLeaks goes down, all the other media partners should go down at the same time. They all served similar roles. The way I see it is that WikiLeaks acted as the senior editor of material leaked to them. They could not by any means be considered a source. The source is the person that leaks the material to WikiLeaks. I am not sure if the media in our world understands how much is at stake for already shaky industry if WikiLeaks will carry on carrying the brunt of the attacks. I think it would be powerful if all the medias that have had access to WikiLeaks material would band together for their defence.
((WN)) Wikinews consulted a Belgian IT security expert who said it was most likely companies such as Facebook, Microsoft, and Google, would have complied with similar court orders *without advising the ‘targets*’. Does that disturb you?
  • Jonsdottir: This does disturb me for various reasons. The most obvious is that my emails are hosted at google/gmail and my search profile. I dont have anything to hide but it is important to note that many of the people that interact with me as a MP via both facebook and my various email accounts don’t always realize that there is no protection for them if they do so via those channels. I often get sensitive personal letters sent to me at facebook and gmail. In general most people are not aware of how little rights they have as users of social media. It is those of uttermost importance that those sites will create the legal disclaimers and agreements that state the most obvious rights we lose when we sign up to their services.
This exclusive interview features first-hand journalism by a Wikinews reporter. See the collaboration page for more details.
((WN)) Has there been any backlash within Iceland against US-based internet services in light of this? Do you expect such, or any increase in anti-American sentiments?
  • Jonsdottir: No, none what so ever. I dont think there is much anti-American sentiments in Iceland and I dont think this case will increase it. However I think it is important for everyone who does not live in the USA and uses social services to note that according to the ruling in my case, they dont have any protection of the 1st and 4th amendment, that only apply to USA citizens. Perhaps the legalities in relation to the borderless reality we live in online need to be upgraded in order for people to feel safe with using social media if it is hosted in the USA. Market tends to bend to simple rules.
((WN)) Does this make you more, or less, determined to see the IMMI succeed?
  • Jonsdottir: More. People have to realize that if we dont have freedom of information online we won’t have it offline. We have to wake up to the fact that our rights to access information that should be in the public domain is eroding while at the same time our rights as citizens online have now been undermined and we are only seen as consumers with consumers rights and in some cases our rights are less than of a product. This development needs to change and change fast before it is too late.

The U.S. Government continues to have issues internationally as a result of material passed to WikiLeaks, and subsequently published.

Within the past week, Ecuador has effectively declared the U.S. ambassador Heather Hodges persona-non-grata over corruption allegations brought to light in leaked cables. Asking the veteran diplomat to leave “as soon as possible”, the country may become the third in South America with no ambassadorial presence. Both Venezuela and Bolivia have no resident U.S. ambassador due to the two left-wing administrations believing the ejected diplomats were working with the opposition.

The U.S. State Department has cautioned Ecuador that a failure to speedily normalise diplomatic relations may jeapordise ongoing trade talks.

The United Kingdom is expected to press the Obama administration over the continuing detention of 23-year-old Manning, who also holds UK citizenship. British lawmakers are to discuss his ongoing detention conditions before again approaching the U.S. with their concerns that his solitary confinement, and treatment therein, is not acceptable.

The 22 charges brought against Manning are currently on hold whilst his fitness to stand trial is assessed.

Categories Uncategorized

Experts: obesity is a bigger threat than AIDS or bird flu

Friday, September 8, 2006

From September 3 to 8, experts gathered at the 10th International Congress on Obesity in Sydney, Australia, to discuss what they call the worldwide “obesity epidemic”. According to the World Health Organization (WHO), 1 billion people in the world today are overweight, and 300 million of those are obese. “Obesity and overweight pose a major risk for serious diet-related chronic diseases, including type 2 diabetes, cardiovascular disease, hypertension and stroke, and certain forms of cancer“, a WHO fact sheet states. According to AP, experts at the conference “have warned that obesity is a bigger threat than AIDS or bird flu, and will easily overwhelm the world’s health care systems if urgent action is not taken”.

Of particular concern is the large number of overweight children. Dr. Stephan Rossner from Sweden’s Karolinska University Hospital, a leading obesity expert who was present at the conference, has warned that as a result of the increasing number of overweight children, “we will have, within a decade or two, a number of young people who are on kidney dialysis. There will not be organs for everybody”. UK-based International Obesity Task Force has said that junk food manufacturers target children, for example, through Internet advertising, chat rooms, text messages, and “advergames” on websites. Politicians are not doing enough to address the problem of obesity, including childhood obesity, the experts said.

According to Wikipedia, examples of junk food include, but are not limited to: hamburgers, pizza, candy, soda, and salty foods like potato chips and french fries. A well-known piece of junk food is the Big Mac. The US version of just one Big Mac burger contains 48% of calories from fat, 47% US Recommended Dietary Allowance (RDA) of fat, 52% RDA of saturated fat, 26% RDA of cholesterol, 42% RDA of sodium, and little nutritional value. It also has 18% of calories from protein. According to WHO, most people need only about 5% calories from protein. Staples such as rice, corn, baked potatoes, pinto beans, as well as fruits and vegetables such as broccoli, cauliflower, zucchini, oranges, and strawberries, provide more than this required amount of protein without the unhealthy amounts of fats or sodium, without cholesterol, and with plenty of fiber, vitamins, and minerals.

Both WHO and the American Centers for Disease Control and Prevention (CDC) define overweight in adults as a Body Mass Index (BMI) of 25 or above, and obese as a BMI of 30 or above. To combat overweight and obesity, WHO recommends that, among other things, people should be taking the following steps

  • eating more fruit and vegetables, as well as nuts and whole grains;
  • engaging in daily moderate physical activity for at least 30 minutes;
  • cutting the amount of fatty, sugary foods in the diet;
  • moving from saturated animal-based fats to unsaturated vegetable-oil based fats.
Categories Uncategorized

Andrea Muizelaar on fashion, anorexia, and life after ‘Top Model’

Monday, November 26, 2007

In the 18 months since Andrea Muizelaar was crowned winner of the reality TV series Canada’s Next Top Model, her life has been a complete whirlwind. From working in a dollar store in her hometown of Whitby, Ontario, to modeling haute couture in Toronto, she had reached her dream of becoming a true Top Model.

But at what cost? Unknown to casual television viewers, Muizelaar had been enveloped in the eating disorder anorexia nervosa, which inevitably became too much for her to bear. She gave up modeling and moved back to Whitby, where she sought treatment for her disorder, re-entered college, and now works at a bank. Where is she now? Happy and healthy, she says.

Recently Andrea Muizelaar sat down with Wikinews reporter Mike Halterman in a candid interview that stretched to nearly two hours, as she told all about her hopes and aspirations, her battle with anorexia, and just what really happened on Canada’s Next Top Model.

Contents

  • 1 Andrea’s beginnings
  • 2 Andrea on her road to modeling, and America’s Next Top Model
  • 3 Experience on Canada’s Next Top Model
  • 4 The message she wrote to her fans on her facebook group
  • 5 Her brief modeling career
  • 6 “Happy and healthy”
  • 7 Source
Categories Uncategorized

Indigenous Brazilians asserting their land claims

Saturday, February 4, 2006

The last few months have seen the number of land conflicts involving indigenous people increase rapidly. Brazil has 400,000 “first people”, many of whom express that they need more respect.

Hundreds of Indians occupied eight plots of land last week in an attempt to reclaim what they claim is their property. They were calling themselves victims and they threatened to destroy power lines.

In the southern region of Brazil, around a dozen Indians were injured in a police operation which apparently led to the destruction of two villages on land which is the focus of a legal dispute with the Aracruz Cellulose company.

There have been incidents throughout Brazil. The Amazon jungle in the north, and in the southern state of Catarina where eight Indians were arrested for property invasion and aggression.

The indigenous people have organized themselves over the past three decades. They have become a “political force”, said Rubem de Almeida a local anthropologist.

The government of Brazil have been somewhat successful in bringing about improvements which improve the reality for the indigenous communities.

Some of the indigenous people say they can’t simply wait for the mainstream; so in April of this year there are major demonstrations planned.

Categories Uncategorized

Canada’s Parkdale—High Park (Ward 13) city council candidates speak

This exclusive interview features first-hand journalism by a Wikinews reporter. See the collaboration page for more details.

Monday, October 30, 2006

On November 13, Torontoians will be heading to the polls to vote for their ward’s councillor and for mayor. Among Toronto’s ridings is Parkdale—High Park (Ward 13). Two candidates responded to Wikinews’ requests for an interview. This ward’s candidates include Linda Coltman, David Garrick, Greg Hamara, Aleksander Oniszczak, Bill Saundercook (incumbent), and Frances Wdowczyk.

For more information on the election, read Toronto municipal election, 2006.

Categories Uncategorized

Polish exercise book advertisement copies Wikipedia content, violates copyright

This article mentions the Wikimedia Foundation, one of its projects, or people related to it. Wikinews is a project of the Wikimedia Foundation.

Friday, October 24, 2008

On August 21, the Polish weekly Przekrój published an advertisement for Dan-Mark exercise books, bearing the logo of 4fun.tv, a Polish music/interactive TV station. Part of the advertisement contained a definition of the word “exercise book”. The wording looked familiar, and Wikinews consulted Wikipedia, the collaborative online encyclopedia.

Upon seeing the Wikipedia definition, it appeared that the entry quoted in the promotional material was identical to the initial two paragraphs of the relevant Wikipedia entry.

Freelance reporters for the Polish Wikinews decided to find out the reason for such a similarity and whether either of the texts (the advertisement’s or Wikipedia’s) might be a case of copyright violation.

The reporters contacted a Jaros?aw Janas, Creative Director of 4fun.tv., where the ad appeared. His reply included the following claim:

The text of the definition has been taken from an encyclopedic publication which is older than 50 years and therefore not subject to copyright protection. The fact of coincidental similarity cannot be considered equal to plagiarism, because as we all know Wikipedia is a place which publishes texts and definitions that have already existed in different forms in other publications released before.

Copyright on text does not last for fifty years as claimed by Janas, but for 70 years after the death of the author.

To investigate the authenticity of the above claims, Wikinews asked the main author of the two paragraphs in question, Wikipedian Julo, about the sources used to write the entry. He confirmed that he had written the text in question, and not copied it from an encyclopedic publication as claimed by Jana.

It is therefore impossible that both Julo and the people responsible for the exercise book advertisement have used the same uncopyrighted encyclopedia, thus coincidentally creating identical texts. The reporters also noted that the first draft of the introduction to the article was written by WaldemarWolskiHuta (February 2006). Afterward the text had undergone some modifications by Julo (September 2006), as well as Picus viridis and Beno (March 2008). However, the text presented in the press promotional material, which – according to 4fun.tv – came from an old-print encyclopedia is identical to the Wikipedia entry after the changes mentioned above had been made. Julo added that he was still alive, together with the other authors of the article in question who constituted the group of the copyright co-holders. This naturally led to a conclusion that neither 50 nor 70 years could have passed since their death. He left 4fun.tv’s actions with a comment that although the contents he and the other Wikimedians had made public and free, they are far from making them available in any “free style”, but under a specified license.

In follow up messages to Jaros?aw Janas, Wikinews reporters confronted the creative director over his seemingly inaccurate claims.

Wikinews was told in a reply that 4fun.tv would ignore the claims unless they see permission from the author of the original content to investigate this story. They were also informed that further e-mails without any specifics sent by the reporter would be qualified as spam. 4fun.tv’s creative director further added that he found the reporter’s picture on the Internet and asked how the person would feel if this picture was to appear on billboards or press releases that advertised the TV station.

Wikipedia does allow copying of its content under certain conditions. The encyclopedia’s content is released under the GNU Free Documentation License, which means that it can be copied, modified, and used commercially and non-commercially – under the conditions that the license’s text is included with the copied content and the five main authors are mentioned. If a part of the article is used, like in the example quoted in this news story, a “right to quote”, recognized by Polish law, may be used. In such a case it suffices to mention the source of the text (Polish Wikipedia) and the author of the excerpt. 4fun.tv met none of these conditions, meaning that copyright has been violated.

Over a year ago Polish Wikinews reported on a similar problem, regarding the use of free-licensed photographs. Since that time such “borrowings” have become less frequent, however photos are still being used in discordance with the license. Journalists have gotten used to citing sources, e.g. Wikipedia, although licensing conditions require attributing the actual author, not the source. So instead of attributing John Doe for his contribution, agencies like Polska Agencja Prasowa (Polish Press Agency) are attributing the source, Wikipedia.

In early September 2008 a similar situation occurred in relation to the Polish edition of Wiktionary. Gazeta Wyborcza, a Polish daily, published an IKEA advertisement, on the opening page of which an almost word-for-word Wiktionary entry was placed; additionally the advertisement used the characteristic MediaWiki layout. The reference to the external source used was missing.

In April 2008, an example of an Australian professor was cited; the scientist, in a reply to a news story, quoted a Wikipedia definition almost word-for-word. The same professor condemned the use of Wikipedia in his previous press appearances.

In 2005 Wikipedia material was discovered in the German weekly magazine Der Spiegel, which acknowledged its fault and published appropriate apologies in place of the article in the online edition.

Frontline magazine in 2007 was found using an image from Wikipedia without proper credit. When pointed out the magazine acknowledged the failing and a correction was promptly given in the subsequent issue.

Categories Uncategorized

Tips For Performing Cardio Without Running}

Click Here For More Specific Information On:

Submitted by: Emily Taggart

There are many different reasons why you may be interested in performing cardio workouts that do not include running, with joint pain and a general hate for cardio topping the list for most people. Whether you physically can’t withstand the pressure that running places on your body or have a real dislike for running in general, you have tons of options for burning calories that don’t include lacing up the sneakers and pounding pavement.

Low-Tension Machinery

Your first option would be to purchase or otherwise gain access to some variety of workout machinery. Many people who can’t stand running can get into a walk on the treadmill or a ride on a spin bike, especially when it is done in their own home with the distraction of some good music or a television.

If your biggest concern with running is the stress on your joints, then consider low-tension machinery such as an elliptical or recumbent bike. If your pain is more severe, you would likely be better off with a recumbent bike, but you can do arm lifts with dumbbells to make the workout more intense. You may also be able to do adjust the tension on the bike to create a more demanding yet completely joint safe workout.

Dancing

[youtube]http://www.youtube.com/watch?v=slOcjlB6Y4U[/youtube]

This has to be at the top of the list for cardio alternatives whether you love to run or not. You can dance anywhere, anytime and can make it as intense or gentle as you want it to be. Your movements can be wild and intense so you burn hundreds of calories per session or you can dance around in a calmer manner that delivers a more conservative calorie burn.

Dancing will also help relieve stress and leave you in a much happier mood!

Swimming

Many people who hate exercise in general can deal with swimming laps or taking a water aerobics class. If you have severe lower body pain or problems with bending your leg joints you can swim with your legs out behind you, pulling your lower body through the pool with your upper body.

If you have limitations of movement with your upper body, you can prop your chest and upper body on the side wall and kick your legs out behind you to get in some form of a workout.

For those with more severe pain or physical limitations, just getting in the pool and keeping your body moving can be a form of cardio that helps keep you healthy and helps control weight.

Interval Training

If your problem is just that you hate running or have a general distaste for cardio workouts, consider doing a variety of strength movements mixed with some non-running cardio bursts. You will virtually be performing strength building movements with 30-60 seconds of cardio movement thrown in to elevate your heart rate and burn more calories.

Some non-running cardio movements that can be added include:

* Step-ups on a small platform or exercise step.

* Knee lifts.

* Jumping jacks (if necessary, step legs out and in rather than jumping)

* Fast punches (squat down, punch out in front of you with control)

Whatever your reasons are for not wanting to run, it is no excuse to become sedentary or continue to live a sedentary lifestyle! Just find a way to get your body moving, even if it’s just strapping on a $5 pedometer and vowing to walk 5,000 steps a day.

About the Author: http://www.irebounder.com/rebounders/ http://www.irebounder.com/rebounders/needakrebounders

Source:

isnare.com

Permanent Link:

isnare.com/?aid=508753&ca=Wellness%2C+Fitness+and+Diet}

Two-time Eurovision entrant Edsilia Rombley discusses music, love, and her contrasting Contest experiences

Tuesday, March 3, 2009

When she was barely 20 years old, Dutch singer Edsilia Rombley got her first large taste of international acclaim. Already a winner of the smaller imitation contest Soundmix Show, she decided to shoot higher. With a great deal of determination, she performed in front of hundreds of millions of television viewers at the 1998 Eurovision Song Contest in Birmingham, United Kingdom. Her song, the R&B flavored “Hemel en aarde” (Heaven and earth), placed fourth and gave her country their highest placing at Eurovision since their last win in 1975. No Dutch contestant after her has been able to place similarly.

After the accolades died down, Rombley set her sights on promoting her vision and passion through her music. Partnering with producer Tjeerd Oosterhuis became a double blessing; eventually they became husband and wife. Even a return to Eurovision at the 2007 Contest, with less than favorable results, didn’t keep her discouraged for long. Today she has finished recording a live CD of her favorite English songs, and a live DVD of selections in Dutch, and is currently touring in singing engagements this spring in theaters across the Netherlands.

Edsilia Rombley granted Wikinews’ Mike Halterman an interview; she reflected on her career, her inspirations, what a day is like in her life, and what she would love to do in the future. This is the third in a series of interviews with past Eurovision contestants, which will be published sporadically in the lead-up to mid-May’s next contest in Moscow.

Categories Uncategorized