HR Intranet can prove to be a Boon to your HR departmentHR Intranet ~ As the professional world has switched from being in the office to be in front of their laptop screens,Human Resource: The Unsung Hero ~HR Intranetas the Saviour

HR – one of the most essential yet underrated departments in every organization. The department that maintains the internal work environment as well as brings in the best talent from various sources to enhance it!The department that keeps upwith all the small and bigintra-organizationalresponsibilities,such asemployee wellness,payroll management,grievanceredressal, employee engagement, workplace-policyenforcement, day to day operational management and of course, recruitment and onboardingin order to deliver the best workplace experience to each and every employee in an organization.

What poses the greater challenge is the popular belief that an HR cannot function properly unless they are directly incontactwith all the employeesbut the present scenario keeps all thepossibilitiesof suchreal-lifeencounters at bay andthe HR department too needs to find a digital way out to keep up their usual productivity and more during these conditions as well. Here’s where an Intranet can truly proclaim itself to be a Savior.

How an HR Intranet can Benefit your HR department

Building a sense of trust and security within the organization isn’t a task as easy as it seems. Instilling belongingness and loyalty in every employees’ mind is quite a tricky task and requires crucially extra efforts when it needs to be done remotely without having the scope for organizational intermingling for months. Here’s when harnessing the collaborative powers of an intranet comes to the rescue.

As the HR department is expected to be involved with a huge amount of data and information that needs to organized as well as be passed on to the concerned employee, department or the organization as a whole, utilizing a well-designed modern SharePoint intranet can do wonders for them.

Get to know how your HR Department can benefit from an HR Intranet

[youtube]http://www.youtube.com/watch?v=HG6T2wFqC3o[/youtube]

1. Information Management

The HRs can use the intranet as the one-stop-solution to all the information that might be required to be stored, searched or circulated. A number of widgets such as Announcements, Birthdays, Work Anniversaries, Leave stats, Team information,Employee Directory,Organization Chartcan be put to work to keep everyone updated and acknowledged alike. Quick navigation and search features of the intranet will ensure easy access to those information which otherwise would have consumed a huge amount of time, if provided on demand-basis, thus saving the precious time of both the employees and the HRs.

2. Suggestion Corner

An HR department that aligns well with the needs and expectations of the employees it the one considered to be asuccessfulone. An HR should regularly gather feedback and suggestions from the employees onvariousorganizational issues be itas simple asa celebration plan, an online get together, the menu preference at the office party, etc.or as formal as thepreferredemployee benefitspolicy,leave policies, travel policies etc.

An intranet can be used to gather such feedbacks across the organizationwithjust afewclickswith a number of interactive features like forms and polls. This will not only let the HR department take up thedecisions accepted and supported by the majority of the workforce but also help them make the employees enjoy a sense of ownership over the organizational decisions.

3. Community and Network Management

Be it your personal life or professional, relationships play a crucial role in our survival and successbe it the relationship between a manager and an employee, between twocolleagues, between board members, with investors, clients and so on. An intranet provides a great platform to nurture these relationships with better and enhanced communication.

Human Resource is the sole in chargeof enhancing the organizational community, workplace cultureand formal as well as informal employee networking.

An intranet can be used tomaintain a proper record ofbirthdays, workanniversaries,eventcalendars,personal feats of employees, and much more. Posting event announcements, fun office jokes and jargon, event photos and videos,or organizing fun polls on the intranetcanbe a great help in keeping the employees engages and building up their rapport with each other.

4. Performance Management

Intranet readily can act as a quite effective as well as transparent platform for performance management.

This particular personalized section can be added to the dashboard of each employee to include documents such as JD, KRAs,etc.that canbe backed up with business apps and utilities such asIdea Board,Kanban App,Project Tracker,Timesheetsetc.

This section can be accessible to the employee and their reporting manager to allow them tocontinuously evaluate and review the performance of the employee, leading to better productivity. Appraisals can take place on the same platform as well.

5. Recruitment

An HR intranet can be a great resource to the recruiters. It can easily be used to facilitatethe internal recruitment, departmental switchesandreferral systemby making theexternal as well as internalvacancies known to all on the hr intranet dashboard, thus making the recruitment process quick and transparent.Employee directoryembedded in the intranet itself canestablisha clear departmental clarity and connectivityamong the employees.

Additionally, dedicated intranet sections within the HR intranet portal can be created for each recruitment drive to connect all the interview panelists to ease the process of centralized discussions and shortlisting.

6. Training and Feedback

The pre-joining courses that the interns and trainees might need to go through before joining or in their very initial days before starting their work under someone’s mentorship can be managed and the performance evaluation can be done on the intranet by the recruiters. It can be a very convenient platform to track and monitor their learning speed and course completion accompanied by frequent feedback from the new joineeas well.

7.OnboardingandOffboarding

Theonboardingprocessbecomes extensively easy if the HR chooses to introduce the new employees to the organization with a catchy and innovative widget on the intranet, be it a flashcard, a textual welcome, an introduction video, and so on.All thecompanypolicies can be stored in a dedicated HR portal in the intranet that can be shared with the newemployeeson joiningand can be ever accessibleto every employee while keeping the accessibility permissions intact for each job profile.

Offboarding, though underrated, is a very important step to maintain a healthy relationship with the ex-employees and should be carried out with utmost care so thatthose biddingadieuto the organization take only the positives to their next company.Along with the usual farewell, a virtual farewell on the company intranet portal can be a great idea to make their last moments in the organization absolutely awesome.

SHAREPOINT INTRANET SUITE

Thursday, April 7, 2011

Late last month, the American Civil Liberties Union (ACLU) and Electronic Frontier Foundation (EFF) filed objections to the United States Government’s ‘secret’ attempts to obtain Twitter account information relating to WikiLeaks. The ACLU and EFF cite First and Fourth amendment issues as overriding reasons to overturn government attempts to keep their investigation secret; and, that with Birgitta Jonsdottir being an Icelandic Parliamentarian, the issue has serious international implications.

The case, titled “In the Matter of the 2703(d) Order Relating to Twitter Accounts: Wikileaks, Rop_G, IOERROR; and BirgittaJ“, has been in the EFF’s sights since late last year when they became aware of the US government’s attempts to investigate WikiLeaks-related communications using the popular microblogging service.

The key objective of this US government investigation is to obtain data for the prosecution of Bradley Manning, alleged to have supplied classified data to WikiLeaks. In addition to Manning’s Twitter account, and that of WikiLeaks (@wikileaks), the following three accounts are subject to the order: @ioerror, @birgittaj, and @rop_g. These, respectively, belong to Jacob Apelbaum, Birgitta Jonsdottir, and Rop Gonggrijp.

Birgitta is not the only non-US citizen with their Twitter account targeted by the US Government; Gonggrijp, a Dutch ‘ex-hacker’-turned-security-expert, was one of the founders of XS4ALL – the first Internet Service Provider in the Netherlands available to the public. He has worked on a mobile phone that can encrypt conversations, and proven that electronic voting systems can readily be hacked.

In early March, a Virginia magistrate judge ruled that the government could have the sought records, and neither the targeted users, or the public, could see documents submitted to justify data being passed to the government. The data sought is as follows:

  1. Personal contact information, including addresses
  2. Financial data, including credit card or bank account numbers
  3. Twitter account activity information, including the “date, time, length, and method of connections” plus the “source and destination Internet Protocol address(es)”
  4. Direct Message (DM) information, including the email addresses and IP addresses of everyone with whom the Parties have exchanged DMs

The order demands disclosure of absolutely all such data from November 1, 2009 for the targeted accounts.

The ACLU and EFF are not only challenging this, but demanding that all submissions made by the US government to justify the Twitter disclosure are made public, plus details of any other such cases which have been processed in secret.

Bradley Manning, at the time a specialist from Maryland enlisted with the United States Army’s 2nd Brigade, 10th Mountain Division, was arrested in June last year in connection with the leaking of classified combat video to WikiLeaks.

The leaked video footage, taken from a US helicopter gunship, showed the deaths of Reuters staff Saeed Chmagh and Namir Noor-Eldeen during a U.S. assault in Baghdad, Iraq. The wire agency unsuccessfully attempted to get the footage released via a Freedom of Information Act request in 2007.

When WikiLeaks released the video footage it directly contradicted the official line taken by the U.S. Army asserting that the deaths of the two Reuters staff were “collateral damage” in an attack on Iraqi insurgents. The radio chatter associated with the AH-64 Apache video indicated the helicopter crews had mistakenly identified the journalists’ equipment as weaponry.

The US government also claims Manning is linked to CableGate; the passing of around a quarter of a million classified diplomatic cables to WikiLeaks. Manning has been in detention since July last year; in December allegations of torture were made to the United Nations High Commissioner for Human Rights regarding the conditions under which he was and is being detained.

Reports last month that he must now sleep naked and attend role call at the U.S. Marine facility in Quantico in the same state, raised further concern over his detention conditions. Philip J. Crowley, at-the-time a State Department spokesman, remarked on this whilst speaking at Massachusetts Institute of Technology; describing the current treatment of Manning as “ridiculous and counterproductive and stupid”, Crowley was, as a consequence, put in the position of having to tender his resignation to Secretary of State Hillary Clinton.

Despite his native Australia finding, in December last year, that Assange’s WikiLeaks had not committed any criminal offences in their jurisdiction, the U.S. government has continued to make ongoing operations very difficult for the whistleblower website.

The result of the Australian Federal Police investigation left the country’s Prime Minister, Julia Gillard, having to retract a statement that WikiLeaks had acted “illegally”; instead, she characterised the site’s actions as “grossly irresponsible”.

Even with Australia finding no illegal activity on the part of WikiLeaks, and with founder Julian Assange facing extradition to Sweden, U.S. pressure sought to hobble WikiLeaks financially.

Based on a State Department letter, online payments site PayPal suspended WikiLeaks account in December. Their action was swiftly followed by Visa Europe and Mastercard ceasing to handle payments for WikiLeaks.

The online processing company, Datacell, threatened the two credit card giants with legal action over this. However, avenues of funding for the site were further curtailed when both Amazon.com and Swiss bank PostFinance joined the financial boycott of WikiLeaks.

Assange continues, to this day, to argue that his extradition to Sweden for questioning on alleged sexual offences is being orchestrated by the U.S. in an effort to discredit him, and thus WikiLeaks.

Wikinews consulted an IT and cryptography expert from the Belgian university which developed the current Advanced Encryption Standard; explaining modern communications, he stated: “Cryptography has developed to such a level that intercepting communications is no longer cost effective. That is, if any user uses the correct default settings, and makes sure that he/she is really connecting to Twitter it is highly unlikely that even the NSA can break the cryptography for a protocol such as SSL/TLS (used for https).”

Qualifying this, he commented that “the vulnerable parts of the communication are the end points.” To make his point, he cited the following quote from Gene Spafford: “Using encryption on the Internet is the equivalent of arranging an armored car to deliver credit card information from someone living in a cardboard box to someone living on a park bench.

Continuing, the Katholieke Universiteit Leuven (KUL) expert explained:

In the first place, the weak point is Twitter itself; the US government can go and ask for the data; companies such as Twitter and Google will typically store quite some information on their users, including IP addresses (it is known that Google deletes the last byte of the IP address after a few weeks, but it is not too hard for a motivated opponent to find out what this byte was).
In the second place, this is the computer of the user: by exploiting system weaknesses (with viruses, Trojan horses or backdoors in the operating system) a highly motivated opponent can enter your machine and record your keystrokes plus everything that is happening (e.g. the FBI is known to do this with the so-called Magic Lantern software). Such software is also commercially available, e.g. for a company to monitor its employees.
It would also be possible for a higly motivated opponent to play “man-in-the-middle”; that means that instead of having a secure connection to Twitter.com, you have a secure connection to the attacker’s server, who impersonates Twitter’s and then relays your information to Twitter. This requires tricks such as spoofing DNS (this is getting harder with DNSsec), or misleading the user (e.g. the user clicks on a link and connects to tw!tter.com or Twitter.c0m, which look very similar in a URL window as Twitter.com). It is clear that the US government is capable of using these kind of tricks; e.g., a company has been linked to the US government that was recognized as legitimate signer in the major browsers, so it would not be too large for them to sign a legitimate certificate for such a spoofing webserver; this means that the probability that a user would detect a problem would be very low.
As for traffic analysis (finding out who you are talking to rather than finding out what you are telling to whom), NSA and GCHQ are known to have access to lots of traffic (part of this is obtained via the UK-USA agreement). Even if one uses strong encryption, it is feasible for them to log the IP addresses and email addresses of all the parties you are connecting to. If necessary, they can even make routers re-route your traffic to their servers. In addition, the European Data Retention directive forces all operators to store such traffic data.
Whether other companies would have complied with such requests: this is very hard to tell. I believe however that it is very plausible that companies such as Google, Skype or Facebook would comply with such requests if they came from a government.
In summary: unless you go through great lengths to log through to several computers in multiple countries, you work in a clean virtual machine, you use private browser settings (don’t accept cookies, no plugins for Firefox, etc.) and use tools such as Tor, it is rather easy for any service provider to identify you.
Finally: I prefer not to be quoted on any sentences in which I make statements on the capabilities or actions of any particular government.

Wikinews also consulted French IT security researcher Stevens Le Blond on the issues surrounding the case, and the state-of-the-art in monitoring, and analysing, communications online. Le Blond, currently presenting a research paper on attacks on Tor to USENIX audiences in North America, responded via email:

Were the US Government to obtain the sought data, it would seem reasonable the NSA would handle further investigation. How would you expect them to exploit the data and expand on what they receive from Twitter?

  • Le Blond: My understanding is that the DOJ is requesting the following information: 1) Connection records and session times 2) IP addresses 3) e-mail addresses 4) banking info
By requesting 1) and 2) for Birgitta and other people involved with WikiLeaks (WL) since 2009, one could derive 2 main [pieces of] information.
First, he could tell the mobility of these people. Recent research in networking shows that you can map an IP address into a geographic location with a median error of 600 meters. So by looking at changes of IP addresses in time for a Twitter user, one could tell (or at least speculate about) where that person has been.
Second, by correlating locations of different people involved with WL in time, one could possibly derive their interactions and maybe even their level of involvement with WL. Whether it is possible to derive this information from 1) and 2) depends on how this people use Twitter. For example, do they log on Twitter often enough, long enough, and from enough places?
My research indicates that this is the case for other Internet services but I cannot tell whether it is the case for Twitter.
Note that even though IP logging, as done by Twitter, is similar to the logging done by GSM [mobile phone] operators, the major difference seems to be that Twitter is subject to US regulation, no matter the citizenship of its users. I find this rather disturbing.
Using 3), one could search for Birgitta on other Internet services, such as social networks, to find more information on her (e.g., hidden accounts). Recent research on privacy shows that people tend to use the same e-mail address to register an account on different social networks (even when they don’t want these accounts to be linked together). Obviously, one could then issue subpoenas for these accounts as well.
I do not have the expertise to comment on what could be done with 4).
((WN)) As I believe Jonsdottir to be involved in the Icelandic Modern Media Initiative (IMMI), what are the wider implications beyond the “WikiLeaks witchhunt”?
  • Le Blond: Personal data can be used to discredit, especially if the data is not public.

Having been alerted to the ongoing case through a joint press release by the ACLU and EFF, Wikinews sought clarification on the primary issues which the two non-profits saw as particularly important in challenging the U.S. Government over the ‘secret’ court orders. Rebecca Jeschke, Media Relations Director for the EFF, explained in more detail the points crucial to them, responding to a few questions from Wikinews on the case:

((WN)) As a worse-case, what precedents would be considered if this went to the Supreme Court?
  • Rebecca Jeschke: It’s extremely hard to know at this stage if this would go to the Supreme Court, and if it did, what would be at issue. However, some of the interesting questions about this case center on the rights of people around the world when they use US Internet services. This case questions the limits of US law enforcement, which may turn out to be very different from the limits in other countries.
((WN)) Since this is clearly a politicised attack on free speech with most chilling potential repercussions for the press, whistleblowers, and by-and-large anyone the relevant U.S. Government departments objects to the actions of, what action do you believe should be taken to protect free speech rights?
  • Jeschke: We believe that, except in very rare circumstances, the government should not be permitted to obtain information about individuals’ private Internet communications in secret. We also believe that Internet companies should, whenever possible, take steps to ensure their customers are notified about requests for information and have the opportunity to respond.
((WN)) Twitter via the web, in my experience, tends to use https:// connections. Are you aware of any possibility of the government cracking such connections? (I’m not up to date on the crypto arms race).
  • Jeschke: You don’t need to crack https, per se, to compromise its security. See this piece about fraudulent https certificates:
Iranian hackers obtain fraudulent httpsEFF website.
((WN)) And, do you believe that far, far more websites should – by default – employ https:// connections to protect people’s privacy?
  • Jeschke: We absolutely think that more websites should employ https! Here is a guide for site operators: (See external links, Ed.)

Finally, Wikinews approached the Icelandic politician, and WikiLeaks supporter, who has made this specific case a landmark in how the U.S. Government handles dealings with – supposedly – friendly governments and their elected representatives. A number of questions were posed, seeking the Icelandic Parliamentarian’s views:

((WN)) How did you feel when you were notified the US Government wanted your Twitter account, and message, details? Were you shocked?
  • Birgitta Jonsdottir: I felt angry but not shocked. I was expecting something like this to happen because of my involvement with WikiLeaks. My first reaction was to tweet about it.
((WN)) What do you believe is their reasoning in selecting you as a ‘target’?
  • Jonsdottir: It is quite clear to me that USA authorities are after Julian Assange and will use any means possible to get even with him. I think I am simply a pawn in a much larger context. I did of course both act as a spokesperson for WikiLeaks in relation to the Apache video and briefly for WikiLeaks, and I put my name to the video as a co-producer. I have not participated in any illegal activity and thus being a target doesn’t make me lose any sleep.
((WN)) Are you concerned that, as a Member of Parliament involved in the Icelandic Modern Media Initiative (IMMI), the US attempt to obtain your Twitter data is interfering with planned Icelandic government policy?
  • Jonsdottir: No
((WN)) In an earlier New York Times (NYT) article, you’re indicating there is nothing they can obtain about you that bothers you; but, how do you react to them wanting to know everyone you talk to?
  • Jonsdottir: It bothers me and according to top computer scientists the government should be required to obtain a search warrant to get our IP addresses from Twitter. I am, though, happy I am among the people DOJ is casting their nets around because of my parliamentary immunity; I have a greater protection then many other users and can use that immunity to raise the issue of lack of rights for those that use social media.
HAVE YOUR SAY
Do you believe the U.S. government should have the right to access data on foreign nationals using services such as Twitter?
Add or view comments
((WN)) The same NYT article describes you as a WikiLeaks supporter; is this still the case? What attracts you to their ‘radical transparency’?
  • Jonsdottir: I support the concept of WikiLeaks. While we don’t have a culture of protection for sources and whistleblowers we need sites like WikiLeaks. Plus, I think it is important to give WikiLeaks credit for raising awareness about in how bad shape freedom of information and expression is in our world and it is eroding at an alarming rate because of the fact that legal firms for corporations and corrupt politicians have understood the borderless nature of the legalities of the information flow online – we who feel it is important that people have access to information that should remain in the public domain need to step up our fight for those rights. WikiLeaks has played an important role in that context.I don’t support radical transparency – I understand that some things need to remain secret. It is the process of making things secret that needs to be both more transparent and in better consensus with nations.
((WN)) How do you think the Icelandic government would have reacted if it were tens of thousands of their diplomatic communications being leaked?
  • Jonsdottir: I am not sure – A lot of our dirty laundry has been aired via the USA cables – our diplomatic communications with USA were leaked in those cables, so far they have not stirred much debate nor shock. It is unlikely for tens of thousands of cables to leak from Iceland since we dont have the same influence or size as the USA, nor do we have a military.
((WN)) Your ambassador in the US has spoken to the Obama administration. Can you discuss any feedback from that? Do you have your party’s, and government’s, backing in challenging the ordered Twitter data release?
  • Jonsdottir: I have not had any feedback from that meeting, I did however receive a message from the DOJ via the USA ambassador in Iceland. The message stated three things: 1. I am free to travel to the USA. 2. If I would do so, I would not be a subject of involuntary interrogation. 3. I am not under criminal investigation. If this is indeed the reality I wonder why they are insisting on getting my personal details from Twitter. I want to stress that I understand the reasoning of trying to get to Assange through me, but I find it unacceptable since there is no foundation for criminal investigation against him. If WikiLeaks goes down, all the other media partners should go down at the same time. They all served similar roles. The way I see it is that WikiLeaks acted as the senior editor of material leaked to them. They could not by any means be considered a source. The source is the person that leaks the material to WikiLeaks. I am not sure if the media in our world understands how much is at stake for already shaky industry if WikiLeaks will carry on carrying the brunt of the attacks. I think it would be powerful if all the medias that have had access to WikiLeaks material would band together for their defence.
((WN)) Wikinews consulted a Belgian IT security expert who said it was most likely companies such as Facebook, Microsoft, and Google, would have complied with similar court orders *without advising the ‘targets*’. Does that disturb you?
  • Jonsdottir: This does disturb me for various reasons. The most obvious is that my emails are hosted at google/gmail and my search profile. I dont have anything to hide but it is important to note that many of the people that interact with me as a MP via both facebook and my various email accounts don’t always realize that there is no protection for them if they do so via those channels. I often get sensitive personal letters sent to me at facebook and gmail. In general most people are not aware of how little rights they have as users of social media. It is those of uttermost importance that those sites will create the legal disclaimers and agreements that state the most obvious rights we lose when we sign up to their services.
This exclusive interview features first-hand journalism by a Wikinews reporter. See the collaboration page for more details.
((WN)) Has there been any backlash within Iceland against US-based internet services in light of this? Do you expect such, or any increase in anti-American sentiments?
  • Jonsdottir: No, none what so ever. I dont think there is much anti-American sentiments in Iceland and I dont think this case will increase it. However I think it is important for everyone who does not live in the USA and uses social services to note that according to the ruling in my case, they dont have any protection of the 1st and 4th amendment, that only apply to USA citizens. Perhaps the legalities in relation to the borderless reality we live in online need to be upgraded in order for people to feel safe with using social media if it is hosted in the USA. Market tends to bend to simple rules.
((WN)) Does this make you more, or less, determined to see the IMMI succeed?
  • Jonsdottir: More. People have to realize that if we dont have freedom of information online we won’t have it offline. We have to wake up to the fact that our rights to access information that should be in the public domain is eroding while at the same time our rights as citizens online have now been undermined and we are only seen as consumers with consumers rights and in some cases our rights are less than of a product. This development needs to change and change fast before it is too late.

The U.S. Government continues to have issues internationally as a result of material passed to WikiLeaks, and subsequently published.

Within the past week, Ecuador has effectively declared the U.S. ambassador Heather Hodges persona-non-grata over corruption allegations brought to light in leaked cables. Asking the veteran diplomat to leave “as soon as possible”, the country may become the third in South America with no ambassadorial presence. Both Venezuela and Bolivia have no resident U.S. ambassador due to the two left-wing administrations believing the ejected diplomats were working with the opposition.

The U.S. State Department has cautioned Ecuador that a failure to speedily normalise diplomatic relations may jeapordise ongoing trade talks.

The United Kingdom is expected to press the Obama administration over the continuing detention of 23-year-old Manning, who also holds UK citizenship. British lawmakers are to discuss his ongoing detention conditions before again approaching the U.S. with their concerns that his solitary confinement, and treatment therein, is not acceptable.

The 22 charges brought against Manning are currently on hold whilst his fitness to stand trial is assessed.

Retrieved from “https://en.wikinews.org/w/index.php?title=ACLU,_EFF_challenging_US_%27secret%27_court_orders_seeking_Twitter_data&oldid=4515305”

Vegetarian Diet Vs. Cancer}

Posted by: Adminin Nutrition
25
Aug

Submitted by: Anne-Marie Ronsen

You might have a general idea that eating a vegetarian diet is more healthy for you. But do you really know how much less the incidence is of certain types of cancers among vegetarians?

Vegetarian dietsnaturally low in saturated fat, high in fiber, and replete with cancer-protective phytochemicalshelp to prevent cancer. Large studies in England and Germany have shown that vegetarians are about 40 percent less likely to develop cancer compared to meat-eaters.

In the U.S., studies of Seventh-Day Adventists, who are largely lacto-ovo vegetarians, have shown significant reductions in cancer risk among those who avoided meat. Similarly, breast cancer rates are dramatically lower in nations, such as China, that follow plant-based diets. Interestingly, Japanese women who follow Western-style, meat-based diets are eight times more likely to develop breast cancer than women who follow a more traditional plant-based diet. Meat and dairy products contribute to many forms of cancer, including cancer of the colon, breast, ovaries, and prostate.

Harvard studies that included tens of thousands of women and men have shown that regular meat consumption increases colon cancer risk by roughly 300 percent. High-fat diets also encourage the bodys production of estrogens. Increased levels of this sex hormone have been linked to breast cancer.

A recent report noted that the rate of breast cancer among pre-menopausal women who ate the most animal (but not vegetable) fat was one-third higher than that of women who ate the least animal fat. A separate study from Cambridge University also linked diets high in saturated fat to breast cancer.

One study linked dairy products to an increased risk of ovarian cancer. The process of breaking down the lactose (milk sugar) evidently damages the ovaries. Daily meat consumption triples the risk of prostate enlargement. Regular milk consumption doubles the risk and failure to consume vegetables regularly nearly quadruples the risk.

Vegetarians avoid the animal fat linked to cancer and get abundant fiber, vitamins, and phytochemicals that help to prevent cancer. In addition, blood analysis of vegetarians reveals a higher level of natural killer cells, specialized white blood cells that attack cancer cells.

When you eat a diet thats higher in dietary fiber, thats primarily if not totally vegetarian, youre naturally healthier. Youre feeding your body and getting it the nutrition it needs to run efficiently.

You have more energy and stamina; you wake up more easily and more refreshed. Its easier to exercise, because youre not so weighed down by digesting the high fat and excessive protein that comes from eating a carnivorous diet.

Try eating vegetarian for a week or a month. See if you dont feel different, more mentally acute and more physically fit and energized. At least reverse the portion sizes youve been eating, and make meat more of a side dish, if you cant stop eating meat altogether. Even that change can make a big difference in your overall health and well-being.

Get This Massive Collection Of SELF-IMPROVEMENT products that show you a better understanding of people, now: http://www.e-bestsellers.com/page33.html or, Learn how you can improve your health, feel better and enjoy life with this Lifestyle Complete Collection: http://www.e-bestsellers.com/page34.html This article is presented with the sole purpose to inform the reader of the vegetarian (vegan) lifestyle and of dietary choices that the reader may wish to make. Copyright Anne-Marie RonsenPublishers are free to use this article on an ezine or website, provided the article is reprinted in its entirety, including copyright and disclaimer, and ALL links remain intact and active.

About the Author: Anne-Marie Ronsen is the author of many wealth and self development books. Download FREE e-books from

e-bestsellers.com

,

plrbestsellers.com

or

universalpublishingltd.com

…You will learn about the best tips and recommendations to improve your health, weight and wealth. You’ll also discover FREE Premium content at

ibestof.com/

and Manual Submission Directory at:

webdirectorybank.com

Source:

isnare.com

Permanent Link:

isnare.com/?aid=341006&ca=Wellness%2C+Fitness+and+Diet}

Pigs fed contaminated pet food; meat sold to consumers

Posted by: Adminin Uncategorized
25
Feb

Saturday, April 21, 2007

The contaminated pet food that was recalled after it was found to contain a harmful industrial chemical called melamine, has been used as pig feed at a hog farm in Ceres, California, located in the United States.

At least seven urine samples taken from pigs at the American Hog Farm, were tested and the results came back positive for the chemical melamine. At least three samples from the feed used to feed the pigs were tested and those results also came back positive for melamine.

Reports say that at least 100 pigs from the farm were slaughtered and sold from the “custom slaughterhouse” that is operated on the farms site. The meat is then sold to different places as “individual orders” and is not sold commercially for supermarkets. The affected meat goes as far back as April 3 and the company is asking anyone who bought it to return the product or throw it out.

Despite the sale, California State Veterinarian Dr. Richard Breitmeyer says that no evidence has turned up to suggest that the meat that was sold entered the human consumption chain.

“There is no evidence that any products from this farm have entered the food supply. The risk to people right now is minimal,” said Breitmeyer who also said that pet food from bags or boxes that have been torn or ripped, is sometimes reused as feed for small farms.

California’s Department of Food and Agriculture investigated the company and found that it had received the contaminated pet food from Diamond Pet Foods, which supplies retailers with the pet food Natural Balance, one of the over 100 recalled brands of pet food. Authorities then quarantined the farm to further investigate the situation.

At least 1,500 pigs are on the farm.

As of the moment, no other farms are being investigated, but officials say that other farms may also be affected.

“In the course of our investigation, we may find similar situations in other parts of the country,” said head of the Center for Veterinary Medicine at the U.S. Food and Drug Administration, Stephen Sundlof.

The FDA is continuing to investigate and Sundlof says that there is a possibility that the contamination of the pet food may be intentional.

“It would certainly lend credibility to the theory that it may be intentional. That will be one of the theories we will pursue when we get into the plants in China,” said Sundlof.

Last month, Menu Foods was the first to recall all of its 60 million products of dry and wet dog and cat food after pets began to fall ill and in some cases died of kidney failure. The FDA found melamine in samples of Menu Foods pet food and in samples of wheat gluten, imported from China, which was used as an ingredient.

Retrieved from “https://en.wikinews.org/w/index.php?title=Pigs_fed_contaminated_pet_food;_meat_sold_to_consumers&oldid=1982810”

Submitted by: Nil Basak

Greetings!

Wishing you all the happiness and warmth of the holiday season! Christmas is already knocking at our doors and tis the season to be jolly and send warm wishes and loving gifts to all our loved ones. The Christmas Season is right around the corner and it is, along with being the season of joy, warmth, thanksgiving and love, the time of the year that is a peak period for online sales. It is the best time to set up a web store if you re looking to make some good money right from the comfort of your home and according to your convenience! So are you ready to use this great opportunity that the holiday season brings to you?

[youtube]http://www.youtube.com/watch?v=g83WWa_qpOY[/youtube]

Online sales at Christmas always show a steep climb and preparation should begin right now. Setting up a web store is simple and uncomplicated and we are here to help you every step of the way. We are IQ E-Commerce and we will help you to set up your very own web store and make the best of the holiday season. With swift and easy setup options and affordable plans and prices we offer you all the finest tools to help you reap the greatest profits from your web store.

The shopping cart software we offer is user-friendly and is a fully manages ecommerce software that lets you sell products online to thousands of customers and does not require you to download or install any software. You can choose the store template of your choice from a large variety of ecommerce templates without having to shell out large sums of money on a custom design. Our e-commerce software is SEO-friendly and we offer you an array of shopping cart tools to help you rank better in various search engines. There are also many effective promotional tools we give you for guaranteed success of your online store.

In case you have a doubt or problem, we shall be right by your side to provide you all the assistance you require with clock free customer support through phones, email, live chat or the support desk provided by a dedicated team of e-commerce personnel who respond promptly to any issue that you have with the store software. Our hosted e-commerce solutions are totally secure and reliable and valuable information is always transferred over a secure layer. With us around, there are no technical headaches that you have to suffer!

A flexible store image manager, one click packing and labeling software, sitemap and Google product feeds and one click inventory update- we offer you all this and more along with multiple shipping and payment methods, IQ E-Commerce offers you the best service at the most affordable prices. Our experienced and efficient team will help you create a great web store and offer you quality e-commerce software without burning a hole in your pockets! What s more? If you are not satisfied with our services and software we provide you 100% money back guarantee till 30 days from the date of purchase. No questions asked! We also give a fully featured 30 days free trial! So what are you waiting for? Get started today! And have a very merry Christmas!

IQ E-Commerce

About the Author: IQecomerce Hosted ecommerce solutions will enable sales channel for the business owner. Manage your online business with the ecommerce software. For more information visit:

iqecommerce.com/

Source:

isnare.com

Permanent Link:

isnare.com/?aid=655041&ca=Computers+and+Technology

More dog and cat food recalled in the United States

Posted by: Adminin Uncategorized
6
Dec

Wednesday, April 18, 2007

Natural Balance Pet Foods has recalled some of its wet and dry food for cats and dogs after several owners said that their pets were becoming sick. The company urges owners to stop feeding their pets the food immediately.

The brands recalled include Venison & Brown Rice Dry Dog Food and Venison & Green Pea Dry Cat Food.

Last month, Menu Foods recalled all of its 60 million products of dry and wet dog and cat food after pets began to fall ill and in some cases died of kidney failure.

“Natural Balance, Pacoima, CA, is issuing a voluntary nationwide recall for all of its Venison dog products and the dry Venison cat food only, regardless of date codes. The recalled products include Venison and Brown Rice canned and bagged dog foods, Venison and Brown Rice dog treats, and Venison and Green Pea dry cat food. Recent laboratory results show that the products contain melamine. We believe the source of the melamine is a rice protein concentrate. Natural Balance has confirmed this morning that some production batches of these products may contain melamine,” said a press released issued by Natural Balance.

The FDA states that the “investigation remains open and active, and the agency continues to follow leads to get closer to the root cause of the problem and to ensure that all contaminated product is removed from the market.”

“The source of the melamine appears to be a rice protein concentrate, which was recently added to the dry venison formulas. Natural Balance does not use wheat gluten, which was associated with the previous melamine contamination,” said the press release.

Bags, cans and zip lock bags of the food are expected to be the most affected.

“The products are packaged in bags, cans and zip lock treat bags and sold in pet specialty stores and PetCo nationally. No other Natural Balance products are involved in this voluntary recall as none of our other formulas include the rice protein concentrate,” added the press release.

The company states that the food, Venison & Brown Rice Dry Dog Food and Venison & Green Pea Dry Cat Food, are the only brands affected by the recall.

Retrieved from “https://en.wikinews.org/w/index.php?title=More_dog_and_cat_food_recalled_in_the_United_States&oldid=1982832”

byadmin

Coaxial cable is the most common type of antenna feeder in use today. Often referred to a RF (radio frequency) cable, it is used in a wide number of applications wherever the transfer of radio frequency energy is required.

Although one of the most common applications is for television down-leads in domestic applications, RF cable is used in any application where high frequency signals need to be carried over a distance. These applications include:

* Commercial and industrial transmission lines* Ethernet local area networks* Wi-Fi networks* Mobile phones* Terrestrial microwave* Air traffic control* Military* Medical* RFID antennas

How Do They Work?RF cables are designed to prevent any potential interference. To achieve this, they are constructed of four circular layers – the signal-carrying wire, insulating material (usually solid plastic), a metal shield and a final plastic protective casing.

An RF or coaxial cable carries equal and opposite current in both the outer and inner conductors. This effectively confines all the fields within the cable, so it neither transmits nor receives signals.

The cable operates by broadcasting an electromagnetic wave inside itself. It is not affected by nearby objects, making it ideal for any applications where it has to be routed around or through buildings, or close to other objects. This gives it a huge advantage over other feeder cables, such as open wire or twin.

Types of RF CableThere are many different types of RF cables:

* Coaxial (coax) cable – this is the most common and is used primary to connect your TV to other appliances.* Twinaxial (twinax) cable – this has two central conductors, and is commonly used to connect data hubs.* Heliaxial (heliax) cable – often used to connect a radio transmitter and an antenna.

LimitationsRF cables do have a couple of disadvantages in some applications, when compared to “newer” types of cables. These include:* Sound can only be carried between two devices in mono, not stereo.* If the cables are not properly manufactured, they may pick up interference from power cables or magnetic sources.

AdvantagesRF cables are the best option for connecting a TV aerial to TV equipment. They:

* Exhibit low losses* Provide stable performance* Are very flexible* Have fast transmission speed

Delaire USA specializes in manufacturing custom fiber optic and RF cables and assemblies for military and telecommunication applications. Visit www.delaireusa.com for more information.

Submitted by: James Meyer

While many individuals in the past concentrate only in performing Website SEO, currently everyone considers Social Media Marketing or SMM to be one of the best methods for getting web traffic via website views and visits. Considering that a lot of people like to use social media sites like YouTube, Facebook, Twitter, and all the other popular social sites to get in touch with people or simply to enjoy the pleasure in watching totally free online videos, online marketers alternatively, are taking benefit from the said fad. Online marketers are generally using these options for marketing their businesses online to keep up with the fast-paced world and also to get hold of prospective buyers through the said websites. If you heard about Pimp my Views, undoubtedly you will switch from simple Search Engine Marketing to combining both SEM and SMM. This Pimp my Views review will give you a concise walk through of the software as well as how it can be very helpful especially in your video marketing.

Video clips are among the most effective tools in accomplishing SMM. Nobody would likely ever hate looking at videos especially when they find something that catches their awareness and boils up their interest. The most recognized and leading video site worldwide, YouTube, has a large number of filed videos inside their database. Likely, lots of people each day from different countries throughout the world, either create an account, or upload a video, or watch videos, or just simply scan videos in their website. Basically, the majority of the kinds of videos that you may want can be found in YouTube – all posted by diverse individuals from several locations. In case you are into Social media, it is advisable that you apply YouTube as part of your strategies or include it in your own tools.

[youtube]http://www.youtube.com/watch?v=2zw3Pie_bYc[/youtube]

Nonetheless, it is really not so easy to get maximum visitors to watch or like your videos. It could take some time and some effort and hard work in advertising and marketing your YouTube video to other individuals so they can find it. It will of course require perseverance, effort, and money, but when done right it could be all worth the effort! Pimp my Views, an amazing video service dedicated to boost your YouTube video likes, comments, and views, is definitely worth a try. Actually, it truly is more than worth the price you’re going to pay them because they sometimes go beyond to your desired volume of likes, views or comments. They also have good, quick, and reliable consumer support which merely takes about 1-3 hours to take care of your concerns or inquiries regarding their entirely thrilling program. Moreover, the service is a hundred percent (100%) spam-free, that ensures you of internationally live website visitors and feedback only. Once you get their great service, you will notice an seemingly rising daily views and may also be visible several hours after your purchase.

Well, you might have read or heard of reviews about pretty much identical service but failed to work out well with you and would possibly think by now that this is all scam. Does it work? Gladly, it’s not at all a scam and it certainly works! Pimp my Views will reduce your entire doubts once you try their services. And you really are guaranteed with this analysis that this extraordinary YouTube optimization service is real and efficient! No frauds, 100% working!

About the Author: James Meyer is an affiliate marketer that merges social media marketing to his techniques to sell out his products. If you want to experience such an amazing result, Buy YouTube Videos or bring your own videos at the top of search engines today!

pimpmyviews.com/

Source:

isnare.com

Permanent Link:

isnare.com/?aid=1170841&ca=Internet

Thursday, April 7, 2011

Late last month, the American Civil Liberties Union (ACLU) and Electronic Frontier Foundation (EFF) filed objections to the United States Government’s ‘secret’ attempts to obtain Twitter account information relating to WikiLeaks. The ACLU and EFF cite First and Fourth amendment issues as overriding reasons to overturn government attempts to keep their investigation secret; and, that with Birgitta Jonsdottir being an Icelandic Parliamentarian, the issue has serious international implications.

The case, titled “In the Matter of the 2703(d) Order Relating to Twitter Accounts: Wikileaks, Rop_G, IOERROR; and BirgittaJ“, has been in the EFF’s sights since late last year when they became aware of the US government’s attempts to investigate WikiLeaks-related communications using the popular microblogging service.

The key objective of this US government investigation is to obtain data for the prosecution of Bradley Manning, alleged to have supplied classified data to WikiLeaks. In addition to Manning’s Twitter account, and that of WikiLeaks (@wikileaks), the following three accounts are subject to the order: @ioerror, @birgittaj, and @rop_g. These, respectively, belong to Jacob Apelbaum, Birgitta Jonsdottir, and Rop Gonggrijp.

Birgitta is not the only non-US citizen with their Twitter account targeted by the US Government; Gonggrijp, a Dutch ‘ex-hacker’-turned-security-expert, was one of the founders of XS4ALL – the first Internet Service Provider in the Netherlands available to the public. He has worked on a mobile phone that can encrypt conversations, and proven that electronic voting systems can readily be hacked.

In early March, a Virginia magistrate judge ruled that the government could have the sought records, and neither the targeted users, or the public, could see documents submitted to justify data being passed to the government. The data sought is as follows:

  1. Personal contact information, including addresses
  2. Financial data, including credit card or bank account numbers
  3. Twitter account activity information, including the “date, time, length, and method of connections” plus the “source and destination Internet Protocol address(es)”
  4. Direct Message (DM) information, including the email addresses and IP addresses of everyone with whom the Parties have exchanged DMs

The order demands disclosure of absolutely all such data from November 1, 2009 for the targeted accounts.

The ACLU and EFF are not only challenging this, but demanding that all submissions made by the US government to justify the Twitter disclosure are made public, plus details of any other such cases which have been processed in secret.

Bradley Manning, at the time a specialist from Maryland enlisted with the United States Army’s 2nd Brigade, 10th Mountain Division, was arrested in June last year in connection with the leaking of classified combat video to WikiLeaks.

The leaked video footage, taken from a US helicopter gunship, showed the deaths of Reuters staff Saeed Chmagh and Namir Noor-Eldeen during a U.S. assault in Baghdad, Iraq. The wire agency unsuccessfully attempted to get the footage released via a Freedom of Information Act request in 2007.

When WikiLeaks released the video footage it directly contradicted the official line taken by the U.S. Army asserting that the deaths of the two Reuters staff were “collateral damage” in an attack on Iraqi insurgents. The radio chatter associated with the AH-64 Apache video indicated the helicopter crews had mistakenly identified the journalists’ equipment as weaponry.

The US government also claims Manning is linked to CableGate; the passing of around a quarter of a million classified diplomatic cables to WikiLeaks. Manning has been in detention since July last year; in December allegations of torture were made to the United Nations High Commissioner for Human Rights regarding the conditions under which he was and is being detained.

Reports last month that he must now sleep naked and attend role call at the U.S. Marine facility in Quantico in the same state, raised further concern over his detention conditions. Philip J. Crowley, at-the-time a State Department spokesman, remarked on this whilst speaking at Massachusetts Institute of Technology; describing the current treatment of Manning as “ridiculous and counterproductive and stupid”, Crowley was, as a consequence, put in the position of having to tender his resignation to Secretary of State Hillary Clinton.

Despite his native Australia finding, in December last year, that Assange’s WikiLeaks had not committed any criminal offences in their jurisdiction, the U.S. government has continued to make ongoing operations very difficult for the whistleblower website.

The result of the Australian Federal Police investigation left the country’s Prime Minister, Julia Gillard, having to retract a statement that WikiLeaks had acted “illegally”; instead, she characterised the site’s actions as “grossly irresponsible”.

Even with Australia finding no illegal activity on the part of WikiLeaks, and with founder Julian Assange facing extradition to Sweden, U.S. pressure sought to hobble WikiLeaks financially.

Based on a State Department letter, online payments site PayPal suspended WikiLeaks account in December. Their action was swiftly followed by Visa Europe and Mastercard ceasing to handle payments for WikiLeaks.

The online processing company, Datacell, threatened the two credit card giants with legal action over this. However, avenues of funding for the site were further curtailed when both Amazon.com and Swiss bank PostFinance joined the financial boycott of WikiLeaks.

Assange continues, to this day, to argue that his extradition to Sweden for questioning on alleged sexual offences is being orchestrated by the U.S. in an effort to discredit him, and thus WikiLeaks.

Wikinews consulted an IT and cryptography expert from the Belgian university which developed the current Advanced Encryption Standard; explaining modern communications, he stated: “Cryptography has developed to such a level that intercepting communications is no longer cost effective. That is, if any user uses the correct default settings, and makes sure that he/she is really connecting to Twitter it is highly unlikely that even the NSA can break the cryptography for a protocol such as SSL/TLS (used for https).”

Qualifying this, he commented that “the vulnerable parts of the communication are the end points.” To make his point, he cited the following quote from Gene Spafford: “Using encryption on the Internet is the equivalent of arranging an armored car to deliver credit card information from someone living in a cardboard box to someone living on a park bench.

Continuing, the Katholieke Universiteit Leuven (KUL) expert explained:

In the first place, the weak point is Twitter itself; the US government can go and ask for the data; companies such as Twitter and Google will typically store quite some information on their users, including IP addresses (it is known that Google deletes the last byte of the IP address after a few weeks, but it is not too hard for a motivated opponent to find out what this byte was).
In the second place, this is the computer of the user: by exploiting system weaknesses (with viruses, Trojan horses or backdoors in the operating system) a highly motivated opponent can enter your machine and record your keystrokes plus everything that is happening (e.g. the FBI is known to do this with the so-called Magic Lantern software). Such software is also commercially available, e.g. for a company to monitor its employees.
It would also be possible for a higly motivated opponent to play “man-in-the-middle”; that means that instead of having a secure connection to Twitter.com, you have a secure connection to the attacker’s server, who impersonates Twitter’s and then relays your information to Twitter. This requires tricks such as spoofing DNS (this is getting harder with DNSsec), or misleading the user (e.g. the user clicks on a link and connects to tw!tter.com or Twitter.c0m, which look very similar in a URL window as Twitter.com). It is clear that the US government is capable of using these kind of tricks; e.g., a company has been linked to the US government that was recognized as legitimate signer in the major browsers, so it would not be too large for them to sign a legitimate certificate for such a spoofing webserver; this means that the probability that a user would detect a problem would be very low.
As for traffic analysis (finding out who you are talking to rather than finding out what you are telling to whom), NSA and GCHQ are known to have access to lots of traffic (part of this is obtained via the UK-USA agreement). Even if one uses strong encryption, it is feasible for them to log the IP addresses and email addresses of all the parties you are connecting to. If necessary, they can even make routers re-route your traffic to their servers. In addition, the European Data Retention directive forces all operators to store such traffic data.
Whether other companies would have complied with such requests: this is very hard to tell. I believe however that it is very plausible that companies such as Google, Skype or Facebook would comply with such requests if they came from a government.
In summary: unless you go through great lengths to log through to several computers in multiple countries, you work in a clean virtual machine, you use private browser settings (don’t accept cookies, no plugins for Firefox, etc.) and use tools such as Tor, it is rather easy for any service provider to identify you.
Finally: I prefer not to be quoted on any sentences in which I make statements on the capabilities or actions of any particular government.

Wikinews also consulted French IT security researcher Stevens Le Blond on the issues surrounding the case, and the state-of-the-art in monitoring, and analysing, communications online. Le Blond, currently presenting a research paper on attacks on Tor to USENIX audiences in North America, responded via email:

Were the US Government to obtain the sought data, it would seem reasonable the NSA would handle further investigation. How would you expect them to exploit the data and expand on what they receive from Twitter?

  • Le Blond: My understanding is that the DOJ is requesting the following information: 1) Connection records and session times 2) IP addresses 3) e-mail addresses 4) banking info
By requesting 1) and 2) for Birgitta and other people involved with WikiLeaks (WL) since 2009, one could derive 2 main [pieces of] information.
First, he could tell the mobility of these people. Recent research in networking shows that you can map an IP address into a geographic location with a median error of 600 meters. So by looking at changes of IP addresses in time for a Twitter user, one could tell (or at least speculate about) where that person has been.
Second, by correlating locations of different people involved with WL in time, one could possibly derive their interactions and maybe even their level of involvement with WL. Whether it is possible to derive this information from 1) and 2) depends on how this people use Twitter. For example, do they log on Twitter often enough, long enough, and from enough places?
My research indicates that this is the case for other Internet services but I cannot tell whether it is the case for Twitter.
Note that even though IP logging, as done by Twitter, is similar to the logging done by GSM [mobile phone] operators, the major difference seems to be that Twitter is subject to US regulation, no matter the citizenship of its users. I find this rather disturbing.
Using 3), one could search for Birgitta on other Internet services, such as social networks, to find more information on her (e.g., hidden accounts). Recent research on privacy shows that people tend to use the same e-mail address to register an account on different social networks (even when they don’t want these accounts to be linked together). Obviously, one could then issue subpoenas for these accounts as well.
I do not have the expertise to comment on what could be done with 4).
((WN)) As I believe Jonsdottir to be involved in the Icelandic Modern Media Initiative (IMMI), what are the wider implications beyond the “WikiLeaks witchhunt”?
  • Le Blond: Personal data can be used to discredit, especially if the data is not public.

Having been alerted to the ongoing case through a joint press release by the ACLU and EFF, Wikinews sought clarification on the primary issues which the two non-profits saw as particularly important in challenging the U.S. Government over the ‘secret’ court orders. Rebecca Jeschke, Media Relations Director for the EFF, explained in more detail the points crucial to them, responding to a few questions from Wikinews on the case:

((WN)) As a worse-case, what precedents would be considered if this went to the Supreme Court?
  • Rebecca Jeschke: It’s extremely hard to know at this stage if this would go to the Supreme Court, and if it did, what would be at issue. However, some of the interesting questions about this case center on the rights of people around the world when they use US Internet services. This case questions the limits of US law enforcement, which may turn out to be very different from the limits in other countries.
((WN)) Since this is clearly a politicised attack on free speech with most chilling potential repercussions for the press, whistleblowers, and by-and-large anyone the relevant U.S. Government departments objects to the actions of, what action do you believe should be taken to protect free speech rights?
  • Jeschke: We believe that, except in very rare circumstances, the government should not be permitted to obtain information about individuals’ private Internet communications in secret. We also believe that Internet companies should, whenever possible, take steps to ensure their customers are notified about requests for information and have the opportunity to respond.
((WN)) Twitter via the web, in my experience, tends to use https:// connections. Are you aware of any possibility of the government cracking such connections? (I’m not up to date on the crypto arms race).
  • Jeschke: You don’t need to crack https, per se, to compromise its security. See this piece about fraudulent https certificates:
Iranian hackers obtain fraudulent httpsEFF website.
((WN)) And, do you believe that far, far more websites should – by default – employ https:// connections to protect people’s privacy?
  • Jeschke: We absolutely think that more websites should employ https! Here is a guide for site operators: (See external links, Ed.)

Finally, Wikinews approached the Icelandic politician, and WikiLeaks supporter, who has made this specific case a landmark in how the U.S. Government handles dealings with – supposedly – friendly governments and their elected representatives. A number of questions were posed, seeking the Icelandic Parliamentarian’s views:

((WN)) How did you feel when you were notified the US Government wanted your Twitter account, and message, details? Were you shocked?
  • Birgitta Jonsdottir: I felt angry but not shocked. I was expecting something like this to happen because of my involvement with WikiLeaks. My first reaction was to tweet about it.
((WN)) What do you believe is their reasoning in selecting you as a ‘target’?
  • Jonsdottir: It is quite clear to me that USA authorities are after Julian Assange and will use any means possible to get even with him. I think I am simply a pawn in a much larger context. I did of course both act as a spokesperson for WikiLeaks in relation to the Apache video and briefly for WikiLeaks, and I put my name to the video as a co-producer. I have not participated in any illegal activity and thus being a target doesn’t make me lose any sleep.
((WN)) Are you concerned that, as a Member of Parliament involved in the Icelandic Modern Media Initiative (IMMI), the US attempt to obtain your Twitter data is interfering with planned Icelandic government policy?
  • Jonsdottir: No
((WN)) In an earlier New York Times (NYT) article, you’re indicating there is nothing they can obtain about you that bothers you; but, how do you react to them wanting to know everyone you talk to?
  • Jonsdottir: It bothers me and according to top computer scientists the government should be required to obtain a search warrant to get our IP addresses from Twitter. I am, though, happy I am among the people DOJ is casting their nets around because of my parliamentary immunity; I have a greater protection then many other users and can use that immunity to raise the issue of lack of rights for those that use social media.
HAVE YOUR SAY
Do you believe the U.S. government should have the right to access data on foreign nationals using services such as Twitter?
Add or view comments
((WN)) The same NYT article describes you as a WikiLeaks supporter; is this still the case? What attracts you to their ‘radical transparency’?
  • Jonsdottir: I support the concept of WikiLeaks. While we don’t have a culture of protection for sources and whistleblowers we need sites like WikiLeaks. Plus, I think it is important to give WikiLeaks credit for raising awareness about in how bad shape freedom of information and expression is in our world and it is eroding at an alarming rate because of the fact that legal firms for corporations and corrupt politicians have understood the borderless nature of the legalities of the information flow online – we who feel it is important that people have access to information that should remain in the public domain need to step up our fight for those rights. WikiLeaks has played an important role in that context.I don’t support radical transparency – I understand that some things need to remain secret. It is the process of making things secret that needs to be both more transparent and in better consensus with nations.
((WN)) How do you think the Icelandic government would have reacted if it were tens of thousands of their diplomatic communications being leaked?
  • Jonsdottir: I am not sure – A lot of our dirty laundry has been aired via the USA cables – our diplomatic communications with USA were leaked in those cables, so far they have not stirred much debate nor shock. It is unlikely for tens of thousands of cables to leak from Iceland since we dont have the same influence or size as the USA, nor do we have a military.
((WN)) Your ambassador in the US has spoken to the Obama administration. Can you discuss any feedback from that? Do you have your party’s, and government’s, backing in challenging the ordered Twitter data release?
  • Jonsdottir: I have not had any feedback from that meeting, I did however receive a message from the DOJ via the USA ambassador in Iceland. The message stated three things: 1. I am free to travel to the USA. 2. If I would do so, I would not be a subject of involuntary interrogation. 3. I am not under criminal investigation. If this is indeed the reality I wonder why they are insisting on getting my personal details from Twitter. I want to stress that I understand the reasoning of trying to get to Assange through me, but I find it unacceptable since there is no foundation for criminal investigation against him. If WikiLeaks goes down, all the other media partners should go down at the same time. They all served similar roles. The way I see it is that WikiLeaks acted as the senior editor of material leaked to them. They could not by any means be considered a source. The source is the person that leaks the material to WikiLeaks. I am not sure if the media in our world understands how much is at stake for already shaky industry if WikiLeaks will carry on carrying the brunt of the attacks. I think it would be powerful if all the medias that have had access to WikiLeaks material would band together for their defence.
((WN)) Wikinews consulted a Belgian IT security expert who said it was most likely companies such as Facebook, Microsoft, and Google, would have complied with similar court orders *without advising the ‘targets*’. Does that disturb you?
  • Jonsdottir: This does disturb me for various reasons. The most obvious is that my emails are hosted at google/gmail and my search profile. I dont have anything to hide but it is important to note that many of the people that interact with me as a MP via both facebook and my various email accounts don’t always realize that there is no protection for them if they do so via those channels. I often get sensitive personal letters sent to me at facebook and gmail. In general most people are not aware of how little rights they have as users of social media. It is those of uttermost importance that those sites will create the legal disclaimers and agreements that state the most obvious rights we lose when we sign up to their services.
This exclusive interview features first-hand journalism by a Wikinews reporter. See the collaboration page for more details.
((WN)) Has there been any backlash within Iceland against US-based internet services in light of this? Do you expect such, or any increase in anti-American sentiments?
  • Jonsdottir: No, none what so ever. I dont think there is much anti-American sentiments in Iceland and I dont think this case will increase it. However I think it is important for everyone who does not live in the USA and uses social services to note that according to the ruling in my case, they dont have any protection of the 1st and 4th amendment, that only apply to USA citizens. Perhaps the legalities in relation to the borderless reality we live in online need to be upgraded in order for people to feel safe with using social media if it is hosted in the USA. Market tends to bend to simple rules.
((WN)) Does this make you more, or less, determined to see the IMMI succeed?
  • Jonsdottir: More. People have to realize that if we dont have freedom of information online we won’t have it offline. We have to wake up to the fact that our rights to access information that should be in the public domain is eroding while at the same time our rights as citizens online have now been undermined and we are only seen as consumers with consumers rights and in some cases our rights are less than of a product. This development needs to change and change fast before it is too late.

The U.S. Government continues to have issues internationally as a result of material passed to WikiLeaks, and subsequently published.

Within the past week, Ecuador has effectively declared the U.S. ambassador Heather Hodges persona-non-grata over corruption allegations brought to light in leaked cables. Asking the veteran diplomat to leave “as soon as possible”, the country may become the third in South America with no ambassadorial presence. Both Venezuela and Bolivia have no resident U.S. ambassador due to the two left-wing administrations believing the ejected diplomats were working with the opposition.

The U.S. State Department has cautioned Ecuador that a failure to speedily normalise diplomatic relations may jeapordise ongoing trade talks.

The United Kingdom is expected to press the Obama administration over the continuing detention of 23-year-old Manning, who also holds UK citizenship. British lawmakers are to discuss his ongoing detention conditions before again approaching the U.S. with their concerns that his solitary confinement, and treatment therein, is not acceptable.

The 22 charges brought against Manning are currently on hold whilst his fitness to stand trial is assessed.

Retrieved from “https://en.wikinews.org/w/index.php?title=ACLU,_EFF_challenging_US_%27secret%27_court_orders_seeking_Twitter_data&oldid=4515305”

Man auctions his life on eBay, is disappointed at sale price

Posted by: Adminin Uncategorized
15
Aug

Monday, June 30, 2008

After auctioning off his entire life on eBay for A$399,300 (244 912.148) Ian Usher says he is “a little bit disappointed” at the final selling price.

The 44-year-old British immigrant living in Perth, Australia, put all of his worldly belongings up for sale on the popular auction website, including his three-bedroom house and all its contents, his car, motorcycle, jetski, skydiving gear, and his job at a rug store, for which he offered a two week trial period. He even offered introductions to his friends living in Perth.

Usher made the decision to sell his life after his five-year marriage suddenly ended. On his website, alife4sale.com, he explains that “despite my life being busy and fulfilled, I still miss my wife so much. Everything in my home is a reminder of the wonderful past we shared. So, after a year in this house I decided that it is time to sell it and move on.”

It was as much about moving on as it was about selling it for as much as I could get.

During the 7 day auction, which ended on Sunday, there were several bogus bids which brought the sale price as high as A$2.2 million, but the final price ended up at A$399,300, which was around A$100,000 less than Usher had hoped for. “I’m a little bit disappointed, but I’m still excited. It’s still enough to move forward and do what I said I was going to do, which is move on to the next part of my life,” Usher said. “It was as much about moving on as it was about selling it for as much as I could get.”

According to Reuters, the winning bidder, whose username is “mslmcc”, also lives in Australia, and has a 100 percent feedback rating. Usher says he hasn’t yet been able to figure out who the buyer is, because of the TV crews lined up in front of his home. “I’m trying to find some time to get on the computer and check it out … I haven’t looked (up) anything about them yet,” he said.

Usher now plans to go off in search of a new life. His initial plan, as he describes on his website, was to just walk out his front door with just his wallet and a passport and board a train, with no idea of where to go. He has since launched 100goals100weeks.com, which will document his attempt to complete 100 of his life goals in a span of 100 weeks. Some of these goals include getting a pilot’s license, climbing the Eiffel Tower, learning to play the didgeridoo, and shaking hands with billionaire Richard Branson.

“I was pretty aimless when I started this, and I had a vague notion of adventure, but I’ve come up with a much more solid plan, which is still very adventurous,” Usher says. He invites anyone who is interested to join him on his adventures.

Retrieved from “https://en.wikinews.org/w/index.php?title=Man_auctions_his_life_on_eBay,_is_disappointed_at_sale_price&oldid=2606849”