On the campaign trail in the USA, June 2016

Sunday, July 17, 2016

The following is the second edition of a monthly series chronicling the U.S. 2016 presidential election. It features original material compiled throughout the previous month after an overview of the month’s biggest stories.

In this month’s edition on the campaign trail: the effect of the Brexit vote on the US presidential election is examined; a well known businessman and sports team owner pitches his candidacy for vice president; and Wikinews interviews the winner of the American Independent Party California primary.

Contents

  • 1 Summary
  • 2 Brexit’s impact on the US presidential election
  • 3 Cuban makes vice presidential pitch
  • 4 California American Independent Party primary winner speaks to Wikinews
  • 5 Related articles
  • 6 Sources
Categories Uncategorized

New South Wales road safety campaign begins

Friday, December 23, 2005

New South Wales Police have begun their holiday Operation Safe Arrival holiday road safety campaign overnight. The campaign runs from 12:01AM December 23, 2005 until 11:59PM January 2, 2006.

In an attempt to keep the number of deaths on NSW roads at a minimum police will target speeding, seatbelt, helmet and drunk driving offences. According to the New South Wales Roads and Traffic Authority, 495 people have died on NSW roads between January 1 and December 11. This figure will surely climb over the holiday period.

The RTA has also begun double demerit points for speeding, seatbelt and helmet offences. The double demerit points will run for the same 11 day period as Operation Safe Arrival. The minimum penalty for any double demerit offence is 6 points. Provisional drivers need to be particularly mindful of these as P1 license holders (those who have had a license 12 months or less) can only incur 3 points. P2 license holders (those who have held a license for 12 to 36 months) have 6 and unrestricted license holders have 12.

According to the RTA, 23,624 drivers in the 2003/4 holiday season were issued with fines carrying double demerits and 2,150 motorists had their licenses suspended due to speeding or exceeding their demerit point limit.

The RTA introduced double demerits in 1997 in an attempt to force drivers to be more mindful of speeding, wearing seatbelts and motorcycle helmets. Double demerit points are now introduced over each major holiday period when a large proportion of road-related deaths occur.

Other jurisdictions in Australia which have double demerit points over holiday periods are South Australia, Western Australia, and the Australian Capital Territory.

Categories Uncategorized

Eurovision ’73 winner Anne Marie David discusses her four-decade career and the Contest, past and present

Monday, February 16, 2009

In the 1970s, she was one of the most popular female vocalists in France, and became well-known internationally. Anne Marie David, from Arles in the south of France, parlayed her initial success from playing Mary Magdalene in the French production of Jesus Christ Superstar into taking home the “grand prix” at the Eurovision Song Contest in 1973. Her winning song, “Tu te reconnaîtras” (You will recognize yourself), became a Europe-wide hit that spring.

At the height of her popularity, David perfomed world tours, and even lived abroad in Turkey for a time. In 1979, she tried once again to win the Eurovision, and placed a respectable third. Her song “Je suis l’enfant soleil” (I’m a child of the sun) became similarly popular across France and in the Francophone nations.

As time went on, however, her place in the French music scene became less certain. Touring the world had taken a personal toll, and David decided to retire from music completely in 1987. However, with the help of her fan base, she was coaxed out of retirement in 2003 and is returning to a part of her life that she tried to leave, but never left her. Celebrating four decades in the music scene, David is looking forward to adventurous new projects and a newfound zest for life.

Anne Marie David corresponded with Wikinews’ Mike Halterman about her eventful career, her personal anecdotes regarding living abroad, her successes in past Eurovision contests and her grievances with the way the show is produced today. This is the second in a series of interviews with past Eurovision contestants, which will be published sporadically in the lead-up to mid-May’s next contest in Moscow.

Categories Uncategorized

Historic Florida attraction, Gatorland, partly destroyed by fire

Monday, November 6, 2006

Gatorland, an Orlando, Florida tourist attraction known for its gator wrestling shows and its conservation programs for alligators, crocodiles, and other reptiles and birds, was heavily damaged by fire on Monday morning, November 6, 2006.

The four-alarm fire was reported at 5:55am EST. The entrance building, which contains the administration offices and the gift shop, was destroyed. The only thing left standing of it was its iconic gator head front gate, whose upper jaw was almost completely charred.

At least four animals — two gators and two snakes, which were being kept near the gift shop — were feared dead. No humans were hurt. The other gators in the public display took refuge in the central pools, and were okay. The birds were in the aviary in the back, and were in no danger.

None of the attraction venues beyond the gift shop, however, were damaged. Gatorland hopes to reopen for tourists in a week, using a temporary entrance.

Orange County Fire Rescue is investigating the cause of the fire.

Categories Uncategorized

Buffalo, N.Y. hotel proposal delayed further

Buffalo, N.Y. Hotel Proposal Controversy
Recent Developments
  • “120 year-old documents threaten development on site of Buffalo, N.Y. hotel proposal” — Wikinews, November 21, 2006
  • “Proposal for Buffalo, N.Y. hotel reportedly dead: parcels for sale “by owner”” — Wikinews, November 16, 2006
  • “Contract to buy properties on site of Buffalo, N.Y. hotel proposal extended” — Wikinews, October 2, 2006
  • “Court date “as needed” for lawsuit against Buffalo, N.Y. hotel proposal” — Wikinews, August 14, 2006
  • “Preliminary hearing for lawsuit against Buffalo, N.Y. hotel proposal rescheduled” — Wikinews, July 26, 2006
  • “Elmwood Village Hotel proposal in Buffalo, N.Y. withdrawn” — Wikinews, July 13, 2006
  • “Preliminary hearing against Buffalo, N.Y. hotel proposal delayed” — Wikinews, June 2, 2006
Original Story
  • “Hotel development proposal could displace Buffalo, NY business owners” — Wikinews, February 17, 2006

Friday, March 10, 2006

Buffalo, New York —The Common Council of Buffalo voted on Tuesday to send the Elmwood Village Hotel proposal “to committee for further discussion”, after citing the need for more public involvement.

The Elmwood Village Hotel is a development proposal by the Savarino Construction Services Corporation, a project designed by the architect Karl Frizlen of The Frizlen Group. The hotel would be placed on the southeast corner of Elmwood and Forest Avenues in Buffalo.

To make way for the project, at least five buildings located at 1109 to 1121 Elmwood Ave would be demolished. At least two properties on Forest Avenue could also be demolished. The Elmwood properties, according to Eva Hassett, Vice President of Savarion Construction, are “under contract”, but it is unclear if Savarino Construction actually owns the Elmwood properties. Hans Mobius, a former mayorial candidate, is still believed to be the current owner the properties. Mobius also owns 607 Forest Avenue.

The properties 605 and 607 Forest Avenue could also be included in the proposal according to Hassett.

“We would use a Special Development Plan to rezone 1119-1121 Elmwood and 605 Forest to a C-2 zoning category,” stated Hassett. It is possible that Savarino Construction may try to obtain a variance for 605 Forest, which would allow them to enforce eminent domain, should the hotel be allowed to go forward.

The building at 607 Forest was also discussed to be rezoned, but it is unclear what the plans would be for that property. During the February 28 Common Council meeting, Hassett stated that the properties 605 and 607 were “now off the agenda”.

Pano Georgiadis, owner of Pano’s Restaurant at 1081 Elmwood, owns the property at 605 Forest and attended Tuesday’s Common Council meeting.

“Having a hotel is a bright idea. We all love the idea of a hotel, but the way that it is presented, is wishful thinking. This hotel does not fit. It’s like putting two gallons of water in a gallon jug, it does not fit. At the last meeting, the architect admitted that they are planning to put the undergound parking lot and the hotel, right at the property line. If I open my window, I will be able to touch the wall, that goes fifty feet high”, said Georgiadis.

“There is a problem having a seventy-two room hotel and fifty-five parking spaces. That means that all the other cars will spill all over the neighborhood. The footprint is simply too small. If you have a bigger [parking] lot, and a smaller hotel, I will welcome a hotel. I have a parking lot at my own business, and I am chasing people all day long. Remember, the city says it has ‘zero tolerance [for illegal parking]’. Try telling that to the guy from Albany who came to see his kids, that are going to Buffalo State, who would get tickets totaling over a hundred dollars”, added Georgiadis.

The city’s Planning Board is scheduled to meet on March 14, 2006 at 9:00 a.m. about the proposal. Although a discussion will take place, no vote is expected to be taken.

At the moment, none of the properties are zoned for a hotel. Savarino Construction plans on asking for a C2 zoning permit. If that does not work, they plan to implement a new zoning plan called a “special development plan” which would allow for only a hotel on the site. That zone would not be able to be changed.

“This [project] justifies Mobius’s refusal to invest in any maitenance[sic] or improvements”, on the properties said Clarence Carnahan, a local resident. “Where were the Council persons over the years? Where were the city inspectors over the years, to make sure that he maintained and improved his properties? The government was supposed to be protecting, not being preditorial. I see a predatorial issue here when it comes to this hotel. Over the years: Why has the local government been disfunctional when it came to Mobius’s properties? Refusal to invest in improvements, doesn’t that sound like a slumlord? Maybe I am missing a point here, but what kind of messages does this send to other slumlords that havn’t[sic] been jailed or fined? It’s [the hotel] trying to be pushed through.”

Carnahan also presented signs for residents and or business owners who are opposed to the hotel, that could be placed in windows or on stakes in the yard. Some of the signs said, ‘No tell hotel’, ‘Hans off, no hotel’, ‘It takes more than a hotel to make a village’. and ‘Keep Elmwood free, no hotel’. Carnahan plans on making more signs for a protest to be held on Saturday March 18, at 2:00 p.m. (EST) on Elmwood and Forest. Some signs were given to individuals after the meeting.

“First things first, Hans is the problem, and I don’t think it has been addressed. Let’s roll back the clock on this project. What can we do with Hans? There is such thing as eminent domain, which could be of greater interest to the community, to seize the property at its lowest assessed value”, said Nancy Pollina, co-owner of Don Apparel with Patty Morris at 1119 Elmwood. “There are so many ideas that have not been explored and we are about to give this parcel away, to a big developer.”

Mobius has not returned any calls by Wikinews regarding the situation.

A freelance journalist writing for Wikinews has obtained a letter, exclusively, addressed to one of the five business owners from Hans Mobius stating:

There is a proposal to develop my property which you are currently renting. Because of opposition to this development, it does not look like it will happen. I will let you know if there any changes.

Despite the letter, there have been no plans or decisions made to end the proposal.

To date, none of the business owners or residents of 1119-1121 Elmwood have received an eviction notice.

Business owners and residents gave an indication of what they would like to see happen at the corner; a project similar to one done locally last year. There, developers renovated two buildings on Auburn and Elmwood Avenues, merging the buildings into one thus allowing for more shop space. Among some of the shops to move in after the development were Cone Five Pottery, The Ruby Slipper, and Abraham’s Jewelers. Prior to the renovation work, the left building in the picture was boarded up for several years. Many of the concerned locals would like to see a similar development on Forest and Elmwood.

Rocco Termini, a developer in Buffalo, proposed a similar design at the February 28 community meeting

In an interview after the February 28 meeting, Termini stated, “I will be willing to take a look at this myself, or I would be more than happy to be partners with Sam, Sam Savarino”, who is President and Chief Executive Officer of Savarino Construction Services Corp.

So far Savarino Construction has no plans to team up with Termini.

Categories Uncategorized

U.S. wants to impose its “no-fly” list on most Canadian domestic flights

Sunday, June 5, 2005

The government of Canada is fighting to keep Washington from having access to passenger lists for Canada’s domestic flights. The Canadian transport minister Jean Lapierre said two-thirds of Canada’s domestic flights at some point cross through American air space. The Minister said he may have to re-route them (around U.S. airspace) rather than breach the privacy rights of domestic Canadian passengers.

In plans which are not yet finalized, Washington recently warned Canada (and other countries) the U.S. intends to require that its no-fly list procedures apply to all foreign airlines which pass through U.S. airspace. After 9/11, a watch list of suspected terrorists was created by the U.S. that bars those on the list from air travel within its borders.

On Wednesday, Lapierre said it’s a “very hot issue,” and that he’s working to protect the privacy of Canadians.

“I’m very worried about it. We don’t think it’s a good idea that Canadians travelling from one (Canadian) city to another would have to be checked under the American no-fly list.” Lapierre said. He estimates that nearly two-thirds of the 278,000 yearly flights between Canadian cities cross over the U.S. border. Most major flight zones from urban centers in Canada are in its southern portion, close to the U.S. where even winds might push a plane across the border.

If the matter can not be resolved, Lapierre said, “We would have to take a northern route, which would be much more expensive.” Yahoo! News Canada reports that Lapierre intends to lobby U.S. Transportation Secretary Norman Mineta against the changes.

Last year, the Canadian province of British Columbia put controls on firms that handle an individual’s personal data that prevents them from sharing private information on Canadians with U.S. authorities. The issue goes to Canada’s sovereignty of its citizens and the U.S. sovereignty of its airspace.

The historically close relations between Canada and the U.S. was evident during the recent Virgin Atlantic incident, where a flight was intercepted by 2 Canadian CF-18 jet fighters. They were scrambled from Quebec to escort the inter-continental flight originating from London to the Halifax International Airport after a hijacking signal, an apparent accident, was sent from the plane. The plane was detained in Halifax on Friday for approximately four hours. Ultimately it was cleared, and landed safely at its original destination in John F. Kennedy International Airport in New York City.

Both the ACLU and the Electronic Privacy Information Center are involved in lawsuits against the U.S. government relating to no-fly lists. EPIC has received documents under the U.S. Freedom of Information Act which it says “establish that the TSA administers two lists: a “no-fly” list and a “selectee” list, which requires the passenger to go through additional security measures. The names are provided to air carriers through Security Directives or Emergency Amendments and are stored in their computer systems so that an individual with a name that matches the list can be flagged when getting a boarding pass. A “no-fly” match requires the agent to call a law enforcement officer to detain and question the passenger. In the case of a Selectee, an “S” or special mark is printed on their boarding pass and the person receives additional screening at security.”

Categories Uncategorized

Thought-controlled cybernetic arms demonstrated

Friday, September 15, 2006

Jesse Sullivan has two cybernetic arms, after electrical burns suffered while working as an electrical utility lineman resulted in amputation of both his arms at the shoulder. Claudia Mitchell has a similar cybernetic left arm, after a motorcycle accident resulted in amputation. Sullivan and Mitchell shook hands with these thought-controlled prosthetic arms at an event staged Thursday in Washington, D.C. by the Defense Advanced Research Projects Agency (DARPA) and Center for Artificial Limbs at the Rehabilitation Institute of Chicago.

Unlike traditional prosthetic limbs, these are actuated through muscle reinnervation; nerves are grafted onto specific muscles, controlling their contraction, which are then detected by electrode sensors and control the prosthetic limb. “Basically it is connecting the dots. Finding the nerves. We have to free the nerves and see how far they reach,” says Dr. Todd Kuiken, developer of the prostheses and director of neuroengineering at the Rehabilitation Institute. By this chain of communication the prostheses utilize thought-controlled biomechanics. According to Sullivan, “When I use the new prosthesis I just do things. I don’t have to think about it … I do all the yard work. I take out the garbage.”

DARPA, as an agency of the United States Department of Defense, seeks to eventually provide such prostheses for soldiers losing their organic limbs in combat. “We’re excited about collaborating with the military,” said Kuiken. 411 U.S. troops in Iraq and 37 in Afghanistan have had wounds that cost them at least one limb according to the Army Medical Command.

Categories Uncategorized

Australian House of Representatives acknowledges Cyclone Larry efforts

Wednesday, March 29, 2006The Australian House of Representatives today acknowledged the impact of the recent devastating Cyclone Larry and the efforts of the support given to the residents and communities of north Queensland in order to restore normal life.

Phillip Ruddock (Liberal, Berowra) moved a motion expressing this after Question Time today, which included a description of the devastation wrought on the area, the response by the Australian Government and the Australian Defence Force, and thanked the efforts of people for their “willingness to roll up their sleeves and get on with the job of cleaning up and rebuilding their towns and centres.”

The Leader of the Opposition, Kim Beazley (Labor, Brand) supported the motion, and congratulated the move to put General Peter Cosgrove in charge of operations, stating that soldiers “know how to work through logistics issues…how to work around officialdom or blockages”, praised both local federal and state members of Parliament, and especially the Labor Queensland state premier, Peter Beattie.

Bob Katter (Independent, Kennedy) was more critical in his speech. Katter thanked Beattie for his immediate response, but also described his confrontation with him and said how first responses were “simply not working”, but also praised Beattie’s decision on Cosgrove. Katter also described how the incident was “the worst natural disaster inAustralian history” and how the banana industry in north Queensland was decimated. Katter went on to describe the financial problems of the people in the region, the “huge gap” between the cost of rebuilding and insurance payouts, also asking “Are we going to pay people virtually nothing to sit on their backsides to do nothing or are we going to pay them a decent wage and have them rebuilding our communities for us?”

The debate is set to continue in the Main Committee, as an opportunity for many more members of the House of Representatives to speak to the motion, without taking up further time in the Chamber.

Categories Uncategorized

ACLU, EFF challenging US ‘secret’ court orders seeking Twitter data

Thursday, April 7, 2011

Late last month, the American Civil Liberties Union (ACLU) and Electronic Frontier Foundation (EFF) filed objections to the United States Government’s ‘secret’ attempts to obtain Twitter account information relating to WikiLeaks. The ACLU and EFF cite First and Fourth amendment issues as overriding reasons to overturn government attempts to keep their investigation secret; and, that with Birgitta Jonsdottir being an Icelandic Parliamentarian, the issue has serious international implications.

The case, titled “In the Matter of the 2703(d) Order Relating to Twitter Accounts: Wikileaks, Rop_G, IOERROR; and BirgittaJ“, has been in the EFF’s sights since late last year when they became aware of the US government’s attempts to investigate WikiLeaks-related communications using the popular microblogging service.

The key objective of this US government investigation is to obtain data for the prosecution of Bradley Manning, alleged to have supplied classified data to WikiLeaks. In addition to Manning’s Twitter account, and that of WikiLeaks (@wikileaks), the following three accounts are subject to the order: @ioerror, @birgittaj, and @rop_g. These, respectively, belong to Jacob Apelbaum, Birgitta Jonsdottir, and Rop Gonggrijp.

Birgitta is not the only non-US citizen with their Twitter account targeted by the US Government; Gonggrijp, a Dutch ‘ex-hacker’-turned-security-expert, was one of the founders of XS4ALL – the first Internet Service Provider in the Netherlands available to the public. He has worked on a mobile phone that can encrypt conversations, and proven that electronic voting systems can readily be hacked.

In early March, a Virginia magistrate judge ruled that the government could have the sought records, and neither the targeted users, or the public, could see documents submitted to justify data being passed to the government. The data sought is as follows:

  1. Personal contact information, including addresses
  2. Financial data, including credit card or bank account numbers
  3. Twitter account activity information, including the “date, time, length, and method of connections” plus the “source and destination Internet Protocol address(es)”
  4. Direct Message (DM) information, including the email addresses and IP addresses of everyone with whom the Parties have exchanged DMs

The order demands disclosure of absolutely all such data from November 1, 2009 for the targeted accounts.

The ACLU and EFF are not only challenging this, but demanding that all submissions made by the US government to justify the Twitter disclosure are made public, plus details of any other such cases which have been processed in secret.

Bradley Manning, at the time a specialist from Maryland enlisted with the United States Army’s 2nd Brigade, 10th Mountain Division, was arrested in June last year in connection with the leaking of classified combat video to WikiLeaks.

The leaked video footage, taken from a US helicopter gunship, showed the deaths of Reuters staff Saeed Chmagh and Namir Noor-Eldeen during a U.S. assault in Baghdad, Iraq. The wire agency unsuccessfully attempted to get the footage released via a Freedom of Information Act request in 2007.

When WikiLeaks released the video footage it directly contradicted the official line taken by the U.S. Army asserting that the deaths of the two Reuters staff were “collateral damage” in an attack on Iraqi insurgents. The radio chatter associated with the AH-64 Apache video indicated the helicopter crews had mistakenly identified the journalists’ equipment as weaponry.

The US government also claims Manning is linked to CableGate; the passing of around a quarter of a million classified diplomatic cables to WikiLeaks. Manning has been in detention since July last year; in December allegations of torture were made to the United Nations High Commissioner for Human Rights regarding the conditions under which he was and is being detained.

Reports last month that he must now sleep naked and attend role call at the U.S. Marine facility in Quantico in the same state, raised further concern over his detention conditions. Philip J. Crowley, at-the-time a State Department spokesman, remarked on this whilst speaking at Massachusetts Institute of Technology; describing the current treatment of Manning as “ridiculous and counterproductive and stupid”, Crowley was, as a consequence, put in the position of having to tender his resignation to Secretary of State Hillary Clinton.

Despite his native Australia finding, in December last year, that Assange’s WikiLeaks had not committed any criminal offences in their jurisdiction, the U.S. government has continued to make ongoing operations very difficult for the whistleblower website.

The result of the Australian Federal Police investigation left the country’s Prime Minister, Julia Gillard, having to retract a statement that WikiLeaks had acted “illegally”; instead, she characterised the site’s actions as “grossly irresponsible”.

Even with Australia finding no illegal activity on the part of WikiLeaks, and with founder Julian Assange facing extradition to Sweden, U.S. pressure sought to hobble WikiLeaks financially.

Based on a State Department letter, online payments site PayPal suspended WikiLeaks account in December. Their action was swiftly followed by Visa Europe and Mastercard ceasing to handle payments for WikiLeaks.

The online processing company, Datacell, threatened the two credit card giants with legal action over this. However, avenues of funding for the site were further curtailed when both Amazon.com and Swiss bank PostFinance joined the financial boycott of WikiLeaks.

Assange continues, to this day, to argue that his extradition to Sweden for questioning on alleged sexual offences is being orchestrated by the U.S. in an effort to discredit him, and thus WikiLeaks.

Wikinews consulted an IT and cryptography expert from the Belgian university which developed the current Advanced Encryption Standard; explaining modern communications, he stated: “Cryptography has developed to such a level that intercepting communications is no longer cost effective. That is, if any user uses the correct default settings, and makes sure that he/she is really connecting to Twitter it is highly unlikely that even the NSA can break the cryptography for a protocol such as SSL/TLS (used for https).”

Qualifying this, he commented that “the vulnerable parts of the communication are the end points.” To make his point, he cited the following quote from Gene Spafford: “Using encryption on the Internet is the equivalent of arranging an armored car to deliver credit card information from someone living in a cardboard box to someone living on a park bench.

Continuing, the Katholieke Universiteit Leuven (KUL) expert explained:

In the first place, the weak point is Twitter itself; the US government can go and ask for the data; companies such as Twitter and Google will typically store quite some information on their users, including IP addresses (it is known that Google deletes the last byte of the IP address after a few weeks, but it is not too hard for a motivated opponent to find out what this byte was).
In the second place, this is the computer of the user: by exploiting system weaknesses (with viruses, Trojan horses or backdoors in the operating system) a highly motivated opponent can enter your machine and record your keystrokes plus everything that is happening (e.g. the FBI is known to do this with the so-called Magic Lantern software). Such software is also commercially available, e.g. for a company to monitor its employees.
It would also be possible for a higly motivated opponent to play “man-in-the-middle”; that means that instead of having a secure connection to Twitter.com, you have a secure connection to the attacker’s server, who impersonates Twitter’s and then relays your information to Twitter. This requires tricks such as spoofing DNS (this is getting harder with DNSsec), or misleading the user (e.g. the user clicks on a link and connects to tw!tter.com or Twitter.c0m, which look very similar in a URL window as Twitter.com). It is clear that the US government is capable of using these kind of tricks; e.g., a company has been linked to the US government that was recognized as legitimate signer in the major browsers, so it would not be too large for them to sign a legitimate certificate for such a spoofing webserver; this means that the probability that a user would detect a problem would be very low.
As for traffic analysis (finding out who you are talking to rather than finding out what you are telling to whom), NSA and GCHQ are known to have access to lots of traffic (part of this is obtained via the UK-USA agreement). Even if one uses strong encryption, it is feasible for them to log the IP addresses and email addresses of all the parties you are connecting to. If necessary, they can even make routers re-route your traffic to their servers. In addition, the European Data Retention directive forces all operators to store such traffic data.
Whether other companies would have complied with such requests: this is very hard to tell. I believe however that it is very plausible that companies such as Google, Skype or Facebook would comply with such requests if they came from a government.
In summary: unless you go through great lengths to log through to several computers in multiple countries, you work in a clean virtual machine, you use private browser settings (don’t accept cookies, no plugins for Firefox, etc.) and use tools such as Tor, it is rather easy for any service provider to identify you.
Finally: I prefer not to be quoted on any sentences in which I make statements on the capabilities or actions of any particular government.

Wikinews also consulted French IT security researcher Stevens Le Blond on the issues surrounding the case, and the state-of-the-art in monitoring, and analysing, communications online. Le Blond, currently presenting a research paper on attacks on Tor to USENIX audiences in North America, responded via email:

Were the US Government to obtain the sought data, it would seem reasonable the NSA would handle further investigation. How would you expect them to exploit the data and expand on what they receive from Twitter?

  • Le Blond: My understanding is that the DOJ is requesting the following information: 1) Connection records and session times 2) IP addresses 3) e-mail addresses 4) banking info
By requesting 1) and 2) for Birgitta and other people involved with WikiLeaks (WL) since 2009, one could derive 2 main [pieces of] information.
First, he could tell the mobility of these people. Recent research in networking shows that you can map an IP address into a geographic location with a median error of 600 meters. So by looking at changes of IP addresses in time for a Twitter user, one could tell (or at least speculate about) where that person has been.
Second, by correlating locations of different people involved with WL in time, one could possibly derive their interactions and maybe even their level of involvement with WL. Whether it is possible to derive this information from 1) and 2) depends on how this people use Twitter. For example, do they log on Twitter often enough, long enough, and from enough places?
My research indicates that this is the case for other Internet services but I cannot tell whether it is the case for Twitter.
Note that even though IP logging, as done by Twitter, is similar to the logging done by GSM [mobile phone] operators, the major difference seems to be that Twitter is subject to US regulation, no matter the citizenship of its users. I find this rather disturbing.
Using 3), one could search for Birgitta on other Internet services, such as social networks, to find more information on her (e.g., hidden accounts). Recent research on privacy shows that people tend to use the same e-mail address to register an account on different social networks (even when they don’t want these accounts to be linked together). Obviously, one could then issue subpoenas for these accounts as well.
I do not have the expertise to comment on what could be done with 4).
((WN)) As I believe Jonsdottir to be involved in the Icelandic Modern Media Initiative (IMMI), what are the wider implications beyond the “WikiLeaks witchhunt”?
  • Le Blond: Personal data can be used to discredit, especially if the data is not public.

Having been alerted to the ongoing case through a joint press release by the ACLU and EFF, Wikinews sought clarification on the primary issues which the two non-profits saw as particularly important in challenging the U.S. Government over the ‘secret’ court orders. Rebecca Jeschke, Media Relations Director for the EFF, explained in more detail the points crucial to them, responding to a few questions from Wikinews on the case:

((WN)) As a worse-case, what precedents would be considered if this went to the Supreme Court?
  • Rebecca Jeschke: It’s extremely hard to know at this stage if this would go to the Supreme Court, and if it did, what would be at issue. However, some of the interesting questions about this case center on the rights of people around the world when they use US Internet services. This case questions the limits of US law enforcement, which may turn out to be very different from the limits in other countries.
((WN)) Since this is clearly a politicised attack on free speech with most chilling potential repercussions for the press, whistleblowers, and by-and-large anyone the relevant U.S. Government departments objects to the actions of, what action do you believe should be taken to protect free speech rights?
  • Jeschke: We believe that, except in very rare circumstances, the government should not be permitted to obtain information about individuals’ private Internet communications in secret. We also believe that Internet companies should, whenever possible, take steps to ensure their customers are notified about requests for information and have the opportunity to respond.
((WN)) Twitter via the web, in my experience, tends to use https:// connections. Are you aware of any possibility of the government cracking such connections? (I’m not up to date on the crypto arms race).
  • Jeschke: You don’t need to crack https, per se, to compromise its security. See this piece about fraudulent https certificates:
Iranian hackers obtain fraudulent httpsEFF website.
((WN)) And, do you believe that far, far more websites should – by default – employ https:// connections to protect people’s privacy?
  • Jeschke: We absolutely think that more websites should employ https! Here is a guide for site operators: (See external links, Ed.)

Finally, Wikinews approached the Icelandic politician, and WikiLeaks supporter, who has made this specific case a landmark in how the U.S. Government handles dealings with – supposedly – friendly governments and their elected representatives. A number of questions were posed, seeking the Icelandic Parliamentarian’s views:

((WN)) How did you feel when you were notified the US Government wanted your Twitter account, and message, details? Were you shocked?
  • Birgitta Jonsdottir: I felt angry but not shocked. I was expecting something like this to happen because of my involvement with WikiLeaks. My first reaction was to tweet about it.
((WN)) What do you believe is their reasoning in selecting you as a ‘target’?
  • Jonsdottir: It is quite clear to me that USA authorities are after Julian Assange and will use any means possible to get even with him. I think I am simply a pawn in a much larger context. I did of course both act as a spokesperson for WikiLeaks in relation to the Apache video and briefly for WikiLeaks, and I put my name to the video as a co-producer. I have not participated in any illegal activity and thus being a target doesn’t make me lose any sleep.
((WN)) Are you concerned that, as a Member of Parliament involved in the Icelandic Modern Media Initiative (IMMI), the US attempt to obtain your Twitter data is interfering with planned Icelandic government policy?
  • Jonsdottir: No
((WN)) In an earlier New York Times (NYT) article, you’re indicating there is nothing they can obtain about you that bothers you; but, how do you react to them wanting to know everyone you talk to?
  • Jonsdottir: It bothers me and according to top computer scientists the government should be required to obtain a search warrant to get our IP addresses from Twitter. I am, though, happy I am among the people DOJ is casting their nets around because of my parliamentary immunity; I have a greater protection then many other users and can use that immunity to raise the issue of lack of rights for those that use social media.
HAVE YOUR SAY
Do you believe the U.S. government should have the right to access data on foreign nationals using services such as Twitter?
Add or view comments
((WN)) The same NYT article describes you as a WikiLeaks supporter; is this still the case? What attracts you to their ‘radical transparency’?
  • Jonsdottir: I support the concept of WikiLeaks. While we don’t have a culture of protection for sources and whistleblowers we need sites like WikiLeaks. Plus, I think it is important to give WikiLeaks credit for raising awareness about in how bad shape freedom of information and expression is in our world and it is eroding at an alarming rate because of the fact that legal firms for corporations and corrupt politicians have understood the borderless nature of the legalities of the information flow online – we who feel it is important that people have access to information that should remain in the public domain need to step up our fight for those rights. WikiLeaks has played an important role in that context.I don’t support radical transparency – I understand that some things need to remain secret. It is the process of making things secret that needs to be both more transparent and in better consensus with nations.
((WN)) How do you think the Icelandic government would have reacted if it were tens of thousands of their diplomatic communications being leaked?
  • Jonsdottir: I am not sure – A lot of our dirty laundry has been aired via the USA cables – our diplomatic communications with USA were leaked in those cables, so far they have not stirred much debate nor shock. It is unlikely for tens of thousands of cables to leak from Iceland since we dont have the same influence or size as the USA, nor do we have a military.
((WN)) Your ambassador in the US has spoken to the Obama administration. Can you discuss any feedback from that? Do you have your party’s, and government’s, backing in challenging the ordered Twitter data release?
  • Jonsdottir: I have not had any feedback from that meeting, I did however receive a message from the DOJ via the USA ambassador in Iceland. The message stated three things: 1. I am free to travel to the USA. 2. If I would do so, I would not be a subject of involuntary interrogation. 3. I am not under criminal investigation. If this is indeed the reality I wonder why they are insisting on getting my personal details from Twitter. I want to stress that I understand the reasoning of trying to get to Assange through me, but I find it unacceptable since there is no foundation for criminal investigation against him. If WikiLeaks goes down, all the other media partners should go down at the same time. They all served similar roles. The way I see it is that WikiLeaks acted as the senior editor of material leaked to them. They could not by any means be considered a source. The source is the person that leaks the material to WikiLeaks. I am not sure if the media in our world understands how much is at stake for already shaky industry if WikiLeaks will carry on carrying the brunt of the attacks. I think it would be powerful if all the medias that have had access to WikiLeaks material would band together for their defence.
((WN)) Wikinews consulted a Belgian IT security expert who said it was most likely companies such as Facebook, Microsoft, and Google, would have complied with similar court orders *without advising the ‘targets*’. Does that disturb you?
  • Jonsdottir: This does disturb me for various reasons. The most obvious is that my emails are hosted at google/gmail and my search profile. I dont have anything to hide but it is important to note that many of the people that interact with me as a MP via both facebook and my various email accounts don’t always realize that there is no protection for them if they do so via those channels. I often get sensitive personal letters sent to me at facebook and gmail. In general most people are not aware of how little rights they have as users of social media. It is those of uttermost importance that those sites will create the legal disclaimers and agreements that state the most obvious rights we lose when we sign up to their services.
This exclusive interview features first-hand journalism by a Wikinews reporter. See the collaboration page for more details.
((WN)) Has there been any backlash within Iceland against US-based internet services in light of this? Do you expect such, or any increase in anti-American sentiments?
  • Jonsdottir: No, none what so ever. I dont think there is much anti-American sentiments in Iceland and I dont think this case will increase it. However I think it is important for everyone who does not live in the USA and uses social services to note that according to the ruling in my case, they dont have any protection of the 1st and 4th amendment, that only apply to USA citizens. Perhaps the legalities in relation to the borderless reality we live in online need to be upgraded in order for people to feel safe with using social media if it is hosted in the USA. Market tends to bend to simple rules.
((WN)) Does this make you more, or less, determined to see the IMMI succeed?
  • Jonsdottir: More. People have to realize that if we dont have freedom of information online we won’t have it offline. We have to wake up to the fact that our rights to access information that should be in the public domain is eroding while at the same time our rights as citizens online have now been undermined and we are only seen as consumers with consumers rights and in some cases our rights are less than of a product. This development needs to change and change fast before it is too late.

The U.S. Government continues to have issues internationally as a result of material passed to WikiLeaks, and subsequently published.

Within the past week, Ecuador has effectively declared the U.S. ambassador Heather Hodges persona-non-grata over corruption allegations brought to light in leaked cables. Asking the veteran diplomat to leave “as soon as possible”, the country may become the third in South America with no ambassadorial presence. Both Venezuela and Bolivia have no resident U.S. ambassador due to the two left-wing administrations believing the ejected diplomats were working with the opposition.

The U.S. State Department has cautioned Ecuador that a failure to speedily normalise diplomatic relations may jeapordise ongoing trade talks.

The United Kingdom is expected to press the Obama administration over the continuing detention of 23-year-old Manning, who also holds UK citizenship. British lawmakers are to discuss his ongoing detention conditions before again approaching the U.S. with their concerns that his solitary confinement, and treatment therein, is not acceptable.

The 22 charges brought against Manning are currently on hold whilst his fitness to stand trial is assessed.

Categories Uncategorized

Jewel in King Tut’s necklace created by possible asteroid impact

Tuesday, July 25, 2006

A jewel that once belonged to King Tutankhamen of ancient Egypt is believed to have been created by an exploding meteorite entering Earth’s atmosphere “hugely bigger in energy than the atomic [bomb] tests,” said geophysicist John Wasson. The explosion was “Ten thousand times more powerful,” added Wasson.

The Egyptian Mineral Resources Authority says the jewel is composed of 98% silica or glass, making it the purest jewel of its kind on the planet and can only be found in a certain area of the Sahara Desert.

Wasson also says the impact that created the jewel can be compared to the “Tunguska event” that occurred in Tunguska, Siberia in 1908 causing at least 80 million trees to be flattened, but left no visible impact crater.

“When the thought came to me that it required a hot sky, I thought immediately of the Tunguska event,” said Wasson.

The event was recreated by a computer simulation. The results of the simulation reveal that the impact of a meteorite or an event similar to Tunguska could have been the cause of theformation and heating the ground up to nearly 1,800 degrees Celsius causing a thin layer of glass to form on the Earth’s surface at the site of an impact.

Researchers also added that events like this are likely to happen at least every 100 years or so. Wasson says there are likely to be more impacts; it’s “just a matter of when.”

Categories Uncategorized