Historic Florida attraction, Gatorland, partly destroyed by fire

Monday, November 6, 2006

Gatorland, an Orlando, Florida tourist attraction known for its gator wrestling shows and its conservation programs for alligators, crocodiles, and other reptiles and birds, was heavily damaged by fire on Monday morning, November 6, 2006.

The four-alarm fire was reported at 5:55am EST. The entrance building, which contains the administration offices and the gift shop, was destroyed. The only thing left standing of it was its iconic gator head front gate, whose upper jaw was almost completely charred.

At least four animals — two gators and two snakes, which were being kept near the gift shop — were feared dead. No humans were hurt. The other gators in the public display took refuge in the central pools, and were okay. The birds were in the aviary in the back, and were in no danger.

None of the attraction venues beyond the gift shop, however, were damaged. Gatorland hopes to reopen for tourists in a week, using a temporary entrance.

Orange County Fire Rescue is investigating the cause of the fire.

Categories Uncategorized

Buffalo, N.Y. hotel proposal delayed further

Buffalo, N.Y. Hotel Proposal Controversy
Recent Developments
  • “120 year-old documents threaten development on site of Buffalo, N.Y. hotel proposal” — Wikinews, November 21, 2006
  • “Proposal for Buffalo, N.Y. hotel reportedly dead: parcels for sale “by owner”” — Wikinews, November 16, 2006
  • “Contract to buy properties on site of Buffalo, N.Y. hotel proposal extended” — Wikinews, October 2, 2006
  • “Court date “as needed” for lawsuit against Buffalo, N.Y. hotel proposal” — Wikinews, August 14, 2006
  • “Preliminary hearing for lawsuit against Buffalo, N.Y. hotel proposal rescheduled” — Wikinews, July 26, 2006
  • “Elmwood Village Hotel proposal in Buffalo, N.Y. withdrawn” — Wikinews, July 13, 2006
  • “Preliminary hearing against Buffalo, N.Y. hotel proposal delayed” — Wikinews, June 2, 2006
Original Story
  • “Hotel development proposal could displace Buffalo, NY business owners” — Wikinews, February 17, 2006

Friday, March 10, 2006

Buffalo, New York —The Common Council of Buffalo voted on Tuesday to send the Elmwood Village Hotel proposal “to committee for further discussion”, after citing the need for more public involvement.

The Elmwood Village Hotel is a development proposal by the Savarino Construction Services Corporation, a project designed by the architect Karl Frizlen of The Frizlen Group. The hotel would be placed on the southeast corner of Elmwood and Forest Avenues in Buffalo.

To make way for the project, at least five buildings located at 1109 to 1121 Elmwood Ave would be demolished. At least two properties on Forest Avenue could also be demolished. The Elmwood properties, according to Eva Hassett, Vice President of Savarion Construction, are “under contract”, but it is unclear if Savarino Construction actually owns the Elmwood properties. Hans Mobius, a former mayorial candidate, is still believed to be the current owner the properties. Mobius also owns 607 Forest Avenue.

The properties 605 and 607 Forest Avenue could also be included in the proposal according to Hassett.

“We would use a Special Development Plan to rezone 1119-1121 Elmwood and 605 Forest to a C-2 zoning category,” stated Hassett. It is possible that Savarino Construction may try to obtain a variance for 605 Forest, which would allow them to enforce eminent domain, should the hotel be allowed to go forward.

The building at 607 Forest was also discussed to be rezoned, but it is unclear what the plans would be for that property. During the February 28 Common Council meeting, Hassett stated that the properties 605 and 607 were “now off the agenda”.

Pano Georgiadis, owner of Pano’s Restaurant at 1081 Elmwood, owns the property at 605 Forest and attended Tuesday’s Common Council meeting.

“Having a hotel is a bright idea. We all love the idea of a hotel, but the way that it is presented, is wishful thinking. This hotel does not fit. It’s like putting two gallons of water in a gallon jug, it does not fit. At the last meeting, the architect admitted that they are planning to put the undergound parking lot and the hotel, right at the property line. If I open my window, I will be able to touch the wall, that goes fifty feet high”, said Georgiadis.

“There is a problem having a seventy-two room hotel and fifty-five parking spaces. That means that all the other cars will spill all over the neighborhood. The footprint is simply too small. If you have a bigger [parking] lot, and a smaller hotel, I will welcome a hotel. I have a parking lot at my own business, and I am chasing people all day long. Remember, the city says it has ‘zero tolerance [for illegal parking]’. Try telling that to the guy from Albany who came to see his kids, that are going to Buffalo State, who would get tickets totaling over a hundred dollars”, added Georgiadis.

The city’s Planning Board is scheduled to meet on March 14, 2006 at 9:00 a.m. about the proposal. Although a discussion will take place, no vote is expected to be taken.

At the moment, none of the properties are zoned for a hotel. Savarino Construction plans on asking for a C2 zoning permit. If that does not work, they plan to implement a new zoning plan called a “special development plan” which would allow for only a hotel on the site. That zone would not be able to be changed.

“This [project] justifies Mobius’s refusal to invest in any maitenance[sic] or improvements”, on the properties said Clarence Carnahan, a local resident. “Where were the Council persons over the years? Where were the city inspectors over the years, to make sure that he maintained and improved his properties? The government was supposed to be protecting, not being preditorial. I see a predatorial issue here when it comes to this hotel. Over the years: Why has the local government been disfunctional when it came to Mobius’s properties? Refusal to invest in improvements, doesn’t that sound like a slumlord? Maybe I am missing a point here, but what kind of messages does this send to other slumlords that havn’t[sic] been jailed or fined? It’s [the hotel] trying to be pushed through.”

Carnahan also presented signs for residents and or business owners who are opposed to the hotel, that could be placed in windows or on stakes in the yard. Some of the signs said, ‘No tell hotel’, ‘Hans off, no hotel’, ‘It takes more than a hotel to make a village’. and ‘Keep Elmwood free, no hotel’. Carnahan plans on making more signs for a protest to be held on Saturday March 18, at 2:00 p.m. (EST) on Elmwood and Forest. Some signs were given to individuals after the meeting.

“First things first, Hans is the problem, and I don’t think it has been addressed. Let’s roll back the clock on this project. What can we do with Hans? There is such thing as eminent domain, which could be of greater interest to the community, to seize the property at its lowest assessed value”, said Nancy Pollina, co-owner of Don Apparel with Patty Morris at 1119 Elmwood. “There are so many ideas that have not been explored and we are about to give this parcel away, to a big developer.”

Mobius has not returned any calls by Wikinews regarding the situation.

A freelance journalist writing for Wikinews has obtained a letter, exclusively, addressed to one of the five business owners from Hans Mobius stating:

There is a proposal to develop my property which you are currently renting. Because of opposition to this development, it does not look like it will happen. I will let you know if there any changes.

Despite the letter, there have been no plans or decisions made to end the proposal.

To date, none of the business owners or residents of 1119-1121 Elmwood have received an eviction notice.

Business owners and residents gave an indication of what they would like to see happen at the corner; a project similar to one done locally last year. There, developers renovated two buildings on Auburn and Elmwood Avenues, merging the buildings into one thus allowing for more shop space. Among some of the shops to move in after the development were Cone Five Pottery, The Ruby Slipper, and Abraham’s Jewelers. Prior to the renovation work, the left building in the picture was boarded up for several years. Many of the concerned locals would like to see a similar development on Forest and Elmwood.

Rocco Termini, a developer in Buffalo, proposed a similar design at the February 28 community meeting

In an interview after the February 28 meeting, Termini stated, “I will be willing to take a look at this myself, or I would be more than happy to be partners with Sam, Sam Savarino”, who is President and Chief Executive Officer of Savarino Construction Services Corp.

So far Savarino Construction has no plans to team up with Termini.

Categories Uncategorized

U.S. wants to impose its “no-fly” list on most Canadian domestic flights

Sunday, June 5, 2005

The government of Canada is fighting to keep Washington from having access to passenger lists for Canada’s domestic flights. The Canadian transport minister Jean Lapierre said two-thirds of Canada’s domestic flights at some point cross through American air space. The Minister said he may have to re-route them (around U.S. airspace) rather than breach the privacy rights of domestic Canadian passengers.

In plans which are not yet finalized, Washington recently warned Canada (and other countries) the U.S. intends to require that its no-fly list procedures apply to all foreign airlines which pass through U.S. airspace. After 9/11, a watch list of suspected terrorists was created by the U.S. that bars those on the list from air travel within its borders.

On Wednesday, Lapierre said it’s a “very hot issue,” and that he’s working to protect the privacy of Canadians.

“I’m very worried about it. We don’t think it’s a good idea that Canadians travelling from one (Canadian) city to another would have to be checked under the American no-fly list.” Lapierre said. He estimates that nearly two-thirds of the 278,000 yearly flights between Canadian cities cross over the U.S. border. Most major flight zones from urban centers in Canada are in its southern portion, close to the U.S. where even winds might push a plane across the border.

If the matter can not be resolved, Lapierre said, “We would have to take a northern route, which would be much more expensive.” Yahoo! News Canada reports that Lapierre intends to lobby U.S. Transportation Secretary Norman Mineta against the changes.

Last year, the Canadian province of British Columbia put controls on firms that handle an individual’s personal data that prevents them from sharing private information on Canadians with U.S. authorities. The issue goes to Canada’s sovereignty of its citizens and the U.S. sovereignty of its airspace.

The historically close relations between Canada and the U.S. was evident during the recent Virgin Atlantic incident, where a flight was intercepted by 2 Canadian CF-18 jet fighters. They were scrambled from Quebec to escort the inter-continental flight originating from London to the Halifax International Airport after a hijacking signal, an apparent accident, was sent from the plane. The plane was detained in Halifax on Friday for approximately four hours. Ultimately it was cleared, and landed safely at its original destination in John F. Kennedy International Airport in New York City.

Both the ACLU and the Electronic Privacy Information Center are involved in lawsuits against the U.S. government relating to no-fly lists. EPIC has received documents under the U.S. Freedom of Information Act which it says “establish that the TSA administers two lists: a “no-fly” list and a “selectee” list, which requires the passenger to go through additional security measures. The names are provided to air carriers through Security Directives or Emergency Amendments and are stored in their computer systems so that an individual with a name that matches the list can be flagged when getting a boarding pass. A “no-fly” match requires the agent to call a law enforcement officer to detain and question the passenger. In the case of a Selectee, an “S” or special mark is printed on their boarding pass and the person receives additional screening at security.”

Categories Uncategorized

Thought-controlled cybernetic arms demonstrated

Friday, September 15, 2006

Jesse Sullivan has two cybernetic arms, after electrical burns suffered while working as an electrical utility lineman resulted in amputation of both his arms at the shoulder. Claudia Mitchell has a similar cybernetic left arm, after a motorcycle accident resulted in amputation. Sullivan and Mitchell shook hands with these thought-controlled prosthetic arms at an event staged Thursday in Washington, D.C. by the Defense Advanced Research Projects Agency (DARPA) and Center for Artificial Limbs at the Rehabilitation Institute of Chicago.

Unlike traditional prosthetic limbs, these are actuated through muscle reinnervation; nerves are grafted onto specific muscles, controlling their contraction, which are then detected by electrode sensors and control the prosthetic limb. “Basically it is connecting the dots. Finding the nerves. We have to free the nerves and see how far they reach,” says Dr. Todd Kuiken, developer of the prostheses and director of neuroengineering at the Rehabilitation Institute. By this chain of communication the prostheses utilize thought-controlled biomechanics. According to Sullivan, “When I use the new prosthesis I just do things. I don’t have to think about it … I do all the yard work. I take out the garbage.”

DARPA, as an agency of the United States Department of Defense, seeks to eventually provide such prostheses for soldiers losing their organic limbs in combat. “We’re excited about collaborating with the military,” said Kuiken. 411 U.S. troops in Iraq and 37 in Afghanistan have had wounds that cost them at least one limb according to the Army Medical Command.

Categories Uncategorized

Australian House of Representatives acknowledges Cyclone Larry efforts

Wednesday, March 29, 2006The Australian House of Representatives today acknowledged the impact of the recent devastating Cyclone Larry and the efforts of the support given to the residents and communities of north Queensland in order to restore normal life.

Phillip Ruddock (Liberal, Berowra) moved a motion expressing this after Question Time today, which included a description of the devastation wrought on the area, the response by the Australian Government and the Australian Defence Force, and thanked the efforts of people for their “willingness to roll up their sleeves and get on with the job of cleaning up and rebuilding their towns and centres.”

The Leader of the Opposition, Kim Beazley (Labor, Brand) supported the motion, and congratulated the move to put General Peter Cosgrove in charge of operations, stating that soldiers “know how to work through logistics issues…how to work around officialdom or blockages”, praised both local federal and state members of Parliament, and especially the Labor Queensland state premier, Peter Beattie.

Bob Katter (Independent, Kennedy) was more critical in his speech. Katter thanked Beattie for his immediate response, but also described his confrontation with him and said how first responses were “simply not working”, but also praised Beattie’s decision on Cosgrove. Katter also described how the incident was “the worst natural disaster inAustralian history” and how the banana industry in north Queensland was decimated. Katter went on to describe the financial problems of the people in the region, the “huge gap” between the cost of rebuilding and insurance payouts, also asking “Are we going to pay people virtually nothing to sit on their backsides to do nothing or are we going to pay them a decent wage and have them rebuilding our communities for us?”

The debate is set to continue in the Main Committee, as an opportunity for many more members of the House of Representatives to speak to the motion, without taking up further time in the Chamber.

Categories Uncategorized

ACLU, EFF challenging US ‘secret’ court orders seeking Twitter data

Thursday, April 7, 2011

Late last month, the American Civil Liberties Union (ACLU) and Electronic Frontier Foundation (EFF) filed objections to the United States Government’s ‘secret’ attempts to obtain Twitter account information relating to WikiLeaks. The ACLU and EFF cite First and Fourth amendment issues as overriding reasons to overturn government attempts to keep their investigation secret; and, that with Birgitta Jonsdottir being an Icelandic Parliamentarian, the issue has serious international implications.

The case, titled “In the Matter of the 2703(d) Order Relating to Twitter Accounts: Wikileaks, Rop_G, IOERROR; and BirgittaJ“, has been in the EFF’s sights since late last year when they became aware of the US government’s attempts to investigate WikiLeaks-related communications using the popular microblogging service.

The key objective of this US government investigation is to obtain data for the prosecution of Bradley Manning, alleged to have supplied classified data to WikiLeaks. In addition to Manning’s Twitter account, and that of WikiLeaks (@wikileaks), the following three accounts are subject to the order: @ioerror, @birgittaj, and @rop_g. These, respectively, belong to Jacob Apelbaum, Birgitta Jonsdottir, and Rop Gonggrijp.

Birgitta is not the only non-US citizen with their Twitter account targeted by the US Government; Gonggrijp, a Dutch ‘ex-hacker’-turned-security-expert, was one of the founders of XS4ALL – the first Internet Service Provider in the Netherlands available to the public. He has worked on a mobile phone that can encrypt conversations, and proven that electronic voting systems can readily be hacked.

In early March, a Virginia magistrate judge ruled that the government could have the sought records, and neither the targeted users, or the public, could see documents submitted to justify data being passed to the government. The data sought is as follows:

  1. Personal contact information, including addresses
  2. Financial data, including credit card or bank account numbers
  3. Twitter account activity information, including the “date, time, length, and method of connections” plus the “source and destination Internet Protocol address(es)”
  4. Direct Message (DM) information, including the email addresses and IP addresses of everyone with whom the Parties have exchanged DMs

The order demands disclosure of absolutely all such data from November 1, 2009 for the targeted accounts.

The ACLU and EFF are not only challenging this, but demanding that all submissions made by the US government to justify the Twitter disclosure are made public, plus details of any other such cases which have been processed in secret.

Bradley Manning, at the time a specialist from Maryland enlisted with the United States Army’s 2nd Brigade, 10th Mountain Division, was arrested in June last year in connection with the leaking of classified combat video to WikiLeaks.

The leaked video footage, taken from a US helicopter gunship, showed the deaths of Reuters staff Saeed Chmagh and Namir Noor-Eldeen during a U.S. assault in Baghdad, Iraq. The wire agency unsuccessfully attempted to get the footage released via a Freedom of Information Act request in 2007.

When WikiLeaks released the video footage it directly contradicted the official line taken by the U.S. Army asserting that the deaths of the two Reuters staff were “collateral damage” in an attack on Iraqi insurgents. The radio chatter associated with the AH-64 Apache video indicated the helicopter crews had mistakenly identified the journalists’ equipment as weaponry.

The US government also claims Manning is linked to CableGate; the passing of around a quarter of a million classified diplomatic cables to WikiLeaks. Manning has been in detention since July last year; in December allegations of torture were made to the United Nations High Commissioner for Human Rights regarding the conditions under which he was and is being detained.

Reports last month that he must now sleep naked and attend role call at the U.S. Marine facility in Quantico in the same state, raised further concern over his detention conditions. Philip J. Crowley, at-the-time a State Department spokesman, remarked on this whilst speaking at Massachusetts Institute of Technology; describing the current treatment of Manning as “ridiculous and counterproductive and stupid”, Crowley was, as a consequence, put in the position of having to tender his resignation to Secretary of State Hillary Clinton.

Despite his native Australia finding, in December last year, that Assange’s WikiLeaks had not committed any criminal offences in their jurisdiction, the U.S. government has continued to make ongoing operations very difficult for the whistleblower website.

The result of the Australian Federal Police investigation left the country’s Prime Minister, Julia Gillard, having to retract a statement that WikiLeaks had acted “illegally”; instead, she characterised the site’s actions as “grossly irresponsible”.

Even with Australia finding no illegal activity on the part of WikiLeaks, and with founder Julian Assange facing extradition to Sweden, U.S. pressure sought to hobble WikiLeaks financially.

Based on a State Department letter, online payments site PayPal suspended WikiLeaks account in December. Their action was swiftly followed by Visa Europe and Mastercard ceasing to handle payments for WikiLeaks.

The online processing company, Datacell, threatened the two credit card giants with legal action over this. However, avenues of funding for the site were further curtailed when both Amazon.com and Swiss bank PostFinance joined the financial boycott of WikiLeaks.

Assange continues, to this day, to argue that his extradition to Sweden for questioning on alleged sexual offences is being orchestrated by the U.S. in an effort to discredit him, and thus WikiLeaks.

Wikinews consulted an IT and cryptography expert from the Belgian university which developed the current Advanced Encryption Standard; explaining modern communications, he stated: “Cryptography has developed to such a level that intercepting communications is no longer cost effective. That is, if any user uses the correct default settings, and makes sure that he/she is really connecting to Twitter it is highly unlikely that even the NSA can break the cryptography for a protocol such as SSL/TLS (used for https).”

Qualifying this, he commented that “the vulnerable parts of the communication are the end points.” To make his point, he cited the following quote from Gene Spafford: “Using encryption on the Internet is the equivalent of arranging an armored car to deliver credit card information from someone living in a cardboard box to someone living on a park bench.

Continuing, the Katholieke Universiteit Leuven (KUL) expert explained:

In the first place, the weak point is Twitter itself; the US government can go and ask for the data; companies such as Twitter and Google will typically store quite some information on their users, including IP addresses (it is known that Google deletes the last byte of the IP address after a few weeks, but it is not too hard for a motivated opponent to find out what this byte was).
In the second place, this is the computer of the user: by exploiting system weaknesses (with viruses, Trojan horses or backdoors in the operating system) a highly motivated opponent can enter your machine and record your keystrokes plus everything that is happening (e.g. the FBI is known to do this with the so-called Magic Lantern software). Such software is also commercially available, e.g. for a company to monitor its employees.
It would also be possible for a higly motivated opponent to play “man-in-the-middle”; that means that instead of having a secure connection to Twitter.com, you have a secure connection to the attacker’s server, who impersonates Twitter’s and then relays your information to Twitter. This requires tricks such as spoofing DNS (this is getting harder with DNSsec), or misleading the user (e.g. the user clicks on a link and connects to tw!tter.com or Twitter.c0m, which look very similar in a URL window as Twitter.com). It is clear that the US government is capable of using these kind of tricks; e.g., a company has been linked to the US government that was recognized as legitimate signer in the major browsers, so it would not be too large for them to sign a legitimate certificate for such a spoofing webserver; this means that the probability that a user would detect a problem would be very low.
As for traffic analysis (finding out who you are talking to rather than finding out what you are telling to whom), NSA and GCHQ are known to have access to lots of traffic (part of this is obtained via the UK-USA agreement). Even if one uses strong encryption, it is feasible for them to log the IP addresses and email addresses of all the parties you are connecting to. If necessary, they can even make routers re-route your traffic to their servers. In addition, the European Data Retention directive forces all operators to store such traffic data.
Whether other companies would have complied with such requests: this is very hard to tell. I believe however that it is very plausible that companies such as Google, Skype or Facebook would comply with such requests if they came from a government.
In summary: unless you go through great lengths to log through to several computers in multiple countries, you work in a clean virtual machine, you use private browser settings (don’t accept cookies, no plugins for Firefox, etc.) and use tools such as Tor, it is rather easy for any service provider to identify you.
Finally: I prefer not to be quoted on any sentences in which I make statements on the capabilities or actions of any particular government.

Wikinews also consulted French IT security researcher Stevens Le Blond on the issues surrounding the case, and the state-of-the-art in monitoring, and analysing, communications online. Le Blond, currently presenting a research paper on attacks on Tor to USENIX audiences in North America, responded via email:

Were the US Government to obtain the sought data, it would seem reasonable the NSA would handle further investigation. How would you expect them to exploit the data and expand on what they receive from Twitter?

  • Le Blond: My understanding is that the DOJ is requesting the following information: 1) Connection records and session times 2) IP addresses 3) e-mail addresses 4) banking info
By requesting 1) and 2) for Birgitta and other people involved with WikiLeaks (WL) since 2009, one could derive 2 main [pieces of] information.
First, he could tell the mobility of these people. Recent research in networking shows that you can map an IP address into a geographic location with a median error of 600 meters. So by looking at changes of IP addresses in time for a Twitter user, one could tell (or at least speculate about) where that person has been.
Second, by correlating locations of different people involved with WL in time, one could possibly derive their interactions and maybe even their level of involvement with WL. Whether it is possible to derive this information from 1) and 2) depends on how this people use Twitter. For example, do they log on Twitter often enough, long enough, and from enough places?
My research indicates that this is the case for other Internet services but I cannot tell whether it is the case for Twitter.
Note that even though IP logging, as done by Twitter, is similar to the logging done by GSM [mobile phone] operators, the major difference seems to be that Twitter is subject to US regulation, no matter the citizenship of its users. I find this rather disturbing.
Using 3), one could search for Birgitta on other Internet services, such as social networks, to find more information on her (e.g., hidden accounts). Recent research on privacy shows that people tend to use the same e-mail address to register an account on different social networks (even when they don’t want these accounts to be linked together). Obviously, one could then issue subpoenas for these accounts as well.
I do not have the expertise to comment on what could be done with 4).
((WN)) As I believe Jonsdottir to be involved in the Icelandic Modern Media Initiative (IMMI), what are the wider implications beyond the “WikiLeaks witchhunt”?
  • Le Blond: Personal data can be used to discredit, especially if the data is not public.

Having been alerted to the ongoing case through a joint press release by the ACLU and EFF, Wikinews sought clarification on the primary issues which the two non-profits saw as particularly important in challenging the U.S. Government over the ‘secret’ court orders. Rebecca Jeschke, Media Relations Director for the EFF, explained in more detail the points crucial to them, responding to a few questions from Wikinews on the case:

((WN)) As a worse-case, what precedents would be considered if this went to the Supreme Court?
  • Rebecca Jeschke: It’s extremely hard to know at this stage if this would go to the Supreme Court, and if it did, what would be at issue. However, some of the interesting questions about this case center on the rights of people around the world when they use US Internet services. This case questions the limits of US law enforcement, which may turn out to be very different from the limits in other countries.
((WN)) Since this is clearly a politicised attack on free speech with most chilling potential repercussions for the press, whistleblowers, and by-and-large anyone the relevant U.S. Government departments objects to the actions of, what action do you believe should be taken to protect free speech rights?
  • Jeschke: We believe that, except in very rare circumstances, the government should not be permitted to obtain information about individuals’ private Internet communications in secret. We also believe that Internet companies should, whenever possible, take steps to ensure their customers are notified about requests for information and have the opportunity to respond.
((WN)) Twitter via the web, in my experience, tends to use https:// connections. Are you aware of any possibility of the government cracking such connections? (I’m not up to date on the crypto arms race).
  • Jeschke: You don’t need to crack https, per se, to compromise its security. See this piece about fraudulent https certificates:
Iranian hackers obtain fraudulent httpsEFF website.
((WN)) And, do you believe that far, far more websites should – by default – employ https:// connections to protect people’s privacy?
  • Jeschke: We absolutely think that more websites should employ https! Here is a guide for site operators: (See external links, Ed.)

Finally, Wikinews approached the Icelandic politician, and WikiLeaks supporter, who has made this specific case a landmark in how the U.S. Government handles dealings with – supposedly – friendly governments and their elected representatives. A number of questions were posed, seeking the Icelandic Parliamentarian’s views:

((WN)) How did you feel when you were notified the US Government wanted your Twitter account, and message, details? Were you shocked?
  • Birgitta Jonsdottir: I felt angry but not shocked. I was expecting something like this to happen because of my involvement with WikiLeaks. My first reaction was to tweet about it.
((WN)) What do you believe is their reasoning in selecting you as a ‘target’?
  • Jonsdottir: It is quite clear to me that USA authorities are after Julian Assange and will use any means possible to get even with him. I think I am simply a pawn in a much larger context. I did of course both act as a spokesperson for WikiLeaks in relation to the Apache video and briefly for WikiLeaks, and I put my name to the video as a co-producer. I have not participated in any illegal activity and thus being a target doesn’t make me lose any sleep.
((WN)) Are you concerned that, as a Member of Parliament involved in the Icelandic Modern Media Initiative (IMMI), the US attempt to obtain your Twitter data is interfering with planned Icelandic government policy?
  • Jonsdottir: No
((WN)) In an earlier New York Times (NYT) article, you’re indicating there is nothing they can obtain about you that bothers you; but, how do you react to them wanting to know everyone you talk to?
  • Jonsdottir: It bothers me and according to top computer scientists the government should be required to obtain a search warrant to get our IP addresses from Twitter. I am, though, happy I am among the people DOJ is casting their nets around because of my parliamentary immunity; I have a greater protection then many other users and can use that immunity to raise the issue of lack of rights for those that use social media.
HAVE YOUR SAY
Do you believe the U.S. government should have the right to access data on foreign nationals using services such as Twitter?
Add or view comments
((WN)) The same NYT article describes you as a WikiLeaks supporter; is this still the case? What attracts you to their ‘radical transparency’?
  • Jonsdottir: I support the concept of WikiLeaks. While we don’t have a culture of protection for sources and whistleblowers we need sites like WikiLeaks. Plus, I think it is important to give WikiLeaks credit for raising awareness about in how bad shape freedom of information and expression is in our world and it is eroding at an alarming rate because of the fact that legal firms for corporations and corrupt politicians have understood the borderless nature of the legalities of the information flow online – we who feel it is important that people have access to information that should remain in the public domain need to step up our fight for those rights. WikiLeaks has played an important role in that context.I don’t support radical transparency – I understand that some things need to remain secret. It is the process of making things secret that needs to be both more transparent and in better consensus with nations.
((WN)) How do you think the Icelandic government would have reacted if it were tens of thousands of their diplomatic communications being leaked?
  • Jonsdottir: I am not sure – A lot of our dirty laundry has been aired via the USA cables – our diplomatic communications with USA were leaked in those cables, so far they have not stirred much debate nor shock. It is unlikely for tens of thousands of cables to leak from Iceland since we dont have the same influence or size as the USA, nor do we have a military.
((WN)) Your ambassador in the US has spoken to the Obama administration. Can you discuss any feedback from that? Do you have your party’s, and government’s, backing in challenging the ordered Twitter data release?
  • Jonsdottir: I have not had any feedback from that meeting, I did however receive a message from the DOJ via the USA ambassador in Iceland. The message stated three things: 1. I am free to travel to the USA. 2. If I would do so, I would not be a subject of involuntary interrogation. 3. I am not under criminal investigation. If this is indeed the reality I wonder why they are insisting on getting my personal details from Twitter. I want to stress that I understand the reasoning of trying to get to Assange through me, but I find it unacceptable since there is no foundation for criminal investigation against him. If WikiLeaks goes down, all the other media partners should go down at the same time. They all served similar roles. The way I see it is that WikiLeaks acted as the senior editor of material leaked to them. They could not by any means be considered a source. The source is the person that leaks the material to WikiLeaks. I am not sure if the media in our world understands how much is at stake for already shaky industry if WikiLeaks will carry on carrying the brunt of the attacks. I think it would be powerful if all the medias that have had access to WikiLeaks material would band together for their defence.
((WN)) Wikinews consulted a Belgian IT security expert who said it was most likely companies such as Facebook, Microsoft, and Google, would have complied with similar court orders *without advising the ‘targets*’. Does that disturb you?
  • Jonsdottir: This does disturb me for various reasons. The most obvious is that my emails are hosted at google/gmail and my search profile. I dont have anything to hide but it is important to note that many of the people that interact with me as a MP via both facebook and my various email accounts don’t always realize that there is no protection for them if they do so via those channels. I often get sensitive personal letters sent to me at facebook and gmail. In general most people are not aware of how little rights they have as users of social media. It is those of uttermost importance that those sites will create the legal disclaimers and agreements that state the most obvious rights we lose when we sign up to their services.
This exclusive interview features first-hand journalism by a Wikinews reporter. See the collaboration page for more details.
((WN)) Has there been any backlash within Iceland against US-based internet services in light of this? Do you expect such, or any increase in anti-American sentiments?
  • Jonsdottir: No, none what so ever. I dont think there is much anti-American sentiments in Iceland and I dont think this case will increase it. However I think it is important for everyone who does not live in the USA and uses social services to note that according to the ruling in my case, they dont have any protection of the 1st and 4th amendment, that only apply to USA citizens. Perhaps the legalities in relation to the borderless reality we live in online need to be upgraded in order for people to feel safe with using social media if it is hosted in the USA. Market tends to bend to simple rules.
((WN)) Does this make you more, or less, determined to see the IMMI succeed?
  • Jonsdottir: More. People have to realize that if we dont have freedom of information online we won’t have it offline. We have to wake up to the fact that our rights to access information that should be in the public domain is eroding while at the same time our rights as citizens online have now been undermined and we are only seen as consumers with consumers rights and in some cases our rights are less than of a product. This development needs to change and change fast before it is too late.

The U.S. Government continues to have issues internationally as a result of material passed to WikiLeaks, and subsequently published.

Within the past week, Ecuador has effectively declared the U.S. ambassador Heather Hodges persona-non-grata over corruption allegations brought to light in leaked cables. Asking the veteran diplomat to leave “as soon as possible”, the country may become the third in South America with no ambassadorial presence. Both Venezuela and Bolivia have no resident U.S. ambassador due to the two left-wing administrations believing the ejected diplomats were working with the opposition.

The U.S. State Department has cautioned Ecuador that a failure to speedily normalise diplomatic relations may jeapordise ongoing trade talks.

The United Kingdom is expected to press the Obama administration over the continuing detention of 23-year-old Manning, who also holds UK citizenship. British lawmakers are to discuss his ongoing detention conditions before again approaching the U.S. with their concerns that his solitary confinement, and treatment therein, is not acceptable.

The 22 charges brought against Manning are currently on hold whilst his fitness to stand trial is assessed.

Categories Uncategorized

Jewel in King Tut’s necklace created by possible asteroid impact

Tuesday, July 25, 2006

A jewel that once belonged to King Tutankhamen of ancient Egypt is believed to have been created by an exploding meteorite entering Earth’s atmosphere “hugely bigger in energy than the atomic [bomb] tests,” said geophysicist John Wasson. The explosion was “Ten thousand times more powerful,” added Wasson.

The Egyptian Mineral Resources Authority says the jewel is composed of 98% silica or glass, making it the purest jewel of its kind on the planet and can only be found in a certain area of the Sahara Desert.

Wasson also says the impact that created the jewel can be compared to the “Tunguska event” that occurred in Tunguska, Siberia in 1908 causing at least 80 million trees to be flattened, but left no visible impact crater.

“When the thought came to me that it required a hot sky, I thought immediately of the Tunguska event,” said Wasson.

The event was recreated by a computer simulation. The results of the simulation reveal that the impact of a meteorite or an event similar to Tunguska could have been the cause of theformation and heating the ground up to nearly 1,800 degrees Celsius causing a thin layer of glass to form on the Earth’s surface at the site of an impact.

Researchers also added that events like this are likely to happen at least every 100 years or so. Wasson says there are likely to be more impacts; it’s “just a matter of when.”

Categories Uncategorized

Prohibition Party holds convention; nominates Jack Fellure for U.S. President

Thursday, June 23, 2011

Retired West Virginia engineer Lowell Jackson “Jack” Fellure won the presidential nomination of the Prohibition Party yesterday at the party’s National Convention in Cullman, Alabama. He won on the second ballot, defeating Thompson Township tax accessor James Hedges of Pennsylvania, who initially ran unopposed. Party Chairman Toby Davis of Mississippi received the vice presidential nomination.

The Prohibition Party is the third oldest existing political party in the United States, having been established in 1869. It reached its height of popularity during the late 19th century. As its name suggests, the party heavily supported the Eighteenth Amendment to the United States Constitution, which banned the sale of alcohol, and resulted in the US period known as Prohibition (1919–33). The party has declined since the repeal of Prohibition in 1933, but has continued to nominate candidates for the presidential election.

Fellure, 79, has run for president in every election since 1988, though usually as a Republican. This run marks his first as a member of the Prohibition Party. On his campaign website, he cites the Authorized 1611 King James Bible as his presidential platform, and calls for the teaching of the Bible in public schools, criminalization of homosexuality, and the elimination of abortion, the liquor industry and pornography. On economics, he supports reducing taxes and balancing the federal budget.

While Jim [Hedges] has contributed valuable resources to this Party…his positions regarding Environmentalism and passivity toward war forced me to vote for Jack Fellure.

Hedges, the first Prohibition Party member elected to public office since 1959, announced his campaign in February 2010, and was the only candidate until last month. According to Vice Chairman June Griffin: “While Jim has contributed valuable resources to this Party…his positions regarding Environmentalism and passivity toward war forced me to vote for Jack Fellure. As well, his insistence on a moratorium on the building of nuclear plants caused much unrest among the membership. Yet he prevailed to install this plank.”

The ten voting Prohibition Party convention delegates and a few guests met for the National Convention, which began on Monday at the Holiday Inn Express in Cullman. Tuesday featured a short greeting from Cullman Mayor Max Townson, followed by addresses from Libertarian consultant Stephen P. Gordon, Ballot Access News publisher Richard Winger, and Eunie Smith of the Eagle Forum.

Gordon, who previously worked as the e-Campaign manager for the 2008 Bob Barr presidential campaign, jokingly commented that his speech “stunk”. He opened his address with the joke that “the way to pick out the libertarian at a Prohibition Party function is that I’m the one wearing the Jerry Garcia tie.” He discussed how third party candidates could utilize new media to their advantage, but avoided any ideological topics.

Winger, an expert on election law, discussed ballot access and the history of the Prohibition Party. He notably explained how the party had cost the Republicans presidential victories in the elections of 1884 and 1916, which forestalled the passage of the Eighteenth Amendment by Republicans, who wanted to do away with the alcohol issue. Gordon later commented that Winger’s speech was well-received by the audience.

After Winger’s speech, the convention broke for lunch. Afterwards, Smith, the widow of former Congressman Albert L. Smith, Jr., focused on immigration and education in her address. When asked about the Eagle Forum’s participation in the fight against alcohol, she commented that the group was focused on more pressing issues such as gambling.

After the nomination, some party members traveled to the grave of Sidney Catts in Florida. Catts, who died in 1936, was the first and only state governor elected from the Prohibition Party.

The party will now begin ballot access drives in Louisiana, Mississippi, Florida, New Jersey, Utah, Colorado, Tennessee and Arkansas. In 2008, the late Gene Amondson appeared on the ballot in Colorado, Florida and Louisiana and picked up a total of 653 votes.

Categories Uncategorized

Chinese Foreign Ministry confirms arrest of bookseller Gui Minhai

Thursday, February 8, 2018

On Tuesday, the Chinese Foreign Ministry confirmed they had detained Hong Kong-based bookseller Gui Minhai. Ministry spokesperson Geng Shuang said, “Gui Minhai broke Chinese law and has already been subjected to criminal coercive measures in accordance with the law by relevant Chinese authorities”.

According to Minhai’s daughter, Chinese police arrested Gui in Beijing in January. 53-year-old Minhai, who was diagnosed with a progressive neurodegenerative disease, was travelling to the Chinese capital to see a Swedish doctor. Minhai holds dual citizenship of Sweden and China, and has written about the Chinese Communist Party leaders of China, amongst them Xi Jinping, the president of China. Geng Shuang in his statement said, “I want to once again stress that China opposes any form of speech or actions that ignore China’s legal sovereignty.”

On Monday, Swedish Foreign Minister Margot Wallstrom stated, “Chinese action was contrary to basic international rules on consular support.” “The current situation also raises questions about the application of the rule of law, including the prohibition of arbitrary deprivation of liberty. We demand that our citizen be given the opportunity to meet Swedish diplomatic and medical staff, and that he be released so that he can be reunited with his daughter and family”, Wallstorm added.

In October 2015, Gui disappeared in Thailand, and months later, he was found in China and stated he had surrendered for a 2003 case of driving under the influence of alcohol, in which reportedly a student died. He was imprisoned for two years, and was released in October, last year. He was not permitted to leave China.

Geng Shuang said, “Although Gui Minhai is a Swedish citizen, the case he is involved in must be handled in accordance with Chinese law. China and Sweden are maintaining open communication channels on this case.”

Categories Uncategorized

What A Town Car Service Has To Offer

Submitted by: Eliz Guide

Some people would ask why they would want to use a town car service over a limousine service. Is there really a difference after all? To answer it simply, yes, there is a difference.

What those differences are may seem elementary, but they are good to review especially considering budget as well as luxury. A town car service offers both luxury and a little help with the budget.

Having a town car service can still give you the same professional appearance as a limousine company, just on a smaller scale. Now, there are some things to consider if you want to use this type of vehicle for transportation. The first thing to consider when booking one of these is, of course, space.

Luxury sedans are not as spacious as limousines. However, if there are only one to three people traveling, then should not be an issue. and as long as there is not an inordinate number of bags or oversized luggage, that should be fine as well.

[youtube]http://www.youtube.com/watch?v=V-Q2_iwCTW4[/youtube]

A town car and a limo have the same amount of luggage space in the trunk. If the luggage includes oversized items, it may be necessary to use a delivery service instead of the trunk.

Another difference between a town car service and a limo service is the price. First and foremost, they are smaller vehicles and cost less to fill up at the gas pump and less to insure.

This will help with the bottom line of your budget, but using a one of these vehicles certainly does not mean skimping on luxury. Fully equipped luxury sedans are often just as luxurious as their oversized relatives.

A couple of reasons to choose a smaller vehicle over a limo include size and affordability, but there are more benefits. If transportation for a wedding party is needed, it may be possible for the bridal party to travel together in a limousine, while the bride and groom go solo in a smaller, more intimate vehicle.

That not only saves on money, but also gives the newlyweds a few moments to themselves between the ceremony and the reception site. A romantic night on the town for two is equally romantic without the higher price tag of a limo.

Luxury sedans are often chosen for airport transportation whenever the wow power of a limo is not necessary to close a deal. Again, the affordability, and you also get the same door to door reliable service as well as the experienced drivers.

Many transportation companies offer both luxury sedans and limousines. Others are now only offering town car services. Why? Well, in these economic times, everyone is a bit more budget conscience and transportation companies are eager to oblige.

Though the luxury and freedom of a great looking car and professional driver is still desired, income may not be as easily come by, or company policy may demand a smaller carbon footprint when using corporate transportation. Using this type of service is a great option to fit your needs when it comes to luxury transportation at a great price, not to mention less ostentatious.

About the Author: Greater Houston Limo is an expert in

limousine rental

,

limousine service

and

airport transportation

Source:

isnare.com

Permanent Link:

isnare.com/?aid=895562&ca=Business