Bambi Note: One of CNI Radio's long time listeners and supporters has his birthday today. Happy Birthday Kurt!
Of course we have an article about the event with Apollo 11 Program, but it is amazing that there are several very cool things and some not so cool that happened on July 20 in History. As well as an amazing number of musician's birthdays including our Kurt (he is a keyboard player); the Wikipedia list includes songwriters, guitarists, composers, drummers, keyboard players. etc.
Just a few of the notable items:
- 1903 – The Ford Motor Company ships its first car.
- 1932 – In Washington, D.C., police fire tear gas on World War I veterans, part of the Bonus Expeditionary Force, who attempt to march to the White House.
- 1934 – Labor unrest in the U.S.: as police in Minneapolis fire upon striking truck drivers, during the Minneapolis Teamsters Strike of 1934, killing two and wounding sixty-seven.
- 1934 – 1934 West Coast waterfront strike: In Seattle, Washington, police fire tear gas on and club 2,000 striking longshoremen. The governor of Oregon calls out the National Guard to break a strike on the Portland docks.
- 1938 – The United States Department of Justice files suit in New York, New York against the motion picture industry charging violations of the Sherman Antitrust Act in regards to the studio system. The case would eventually result in a break-up of the industry in 1948.
- 1940 – California opens its first freeway, the Arroyo Seco Parkway.
- 1968 – The first International Special Olympics Summer Games are held at Soldier Field in Chicago, Ill, with about 1,000 athletes with intellectual disabilities.
- 1969 – Apollo program: Apollo 11 successfully makes the first manned landing on the Moon in the Sea of Tranquility. Americans Neil Armstrong and Buzz Aldrin become the first humans to walk on the Moon almost 7 hours later. (US Time)
- 1977 – Johnstown, Pennsylvania is hit by a flash flood that kills eighty and causes $350 million in damage.
- 1977 – The Central Intelligence Agency releases documents under the Freedom of Information Act revealing it had engaged in mind control experiments.
- 1997 – The fully restored USS Constitution (aka Old Ironsides) celebrates its 200th birthday by setting sail for the first time in 116 years.
- 2012 – During a midnight showing of The Dark Knight Rises, a gunman (later known to be revealed as James Eagan Holmes) opens fire at a movie theater in Aurora, Colorado, killing 12 people and injuring 58
I just took a sampling across the board on this, there were war items from the World Wars, and others, explorers making it to new areas like the western shore of Lake Michigan and so much more in the list. Excellent reading.
It is awesome that Wikipedia has pages for each day of the year including events, births, deaths.
Legendary musician and future R&B Hall of Fame inductee Lester Chambers suffered injuries Saturday after he was attacked on stage for dedicating a song to Trayvon Martin.
According to police, the Civil-Rights-era leader of soul rock group The Chambers Brothers was performing at the Hayward-Russell City Blues Festival in downtown Hayward, California, when he was suddenly rushed by a woman identified as 43-year-old Dinalynn Andrews Potter after he dedicated Curtis Mayfield's "People Get Ready" to Trayvon Martin shortly following George Zimmerman's acquittal.
Chambers' wife Lola said the 73-year-old musician told audience members that Mayfield would have changed the lyric "there's a train a comin" to "there's a change a comin" were he alive today.
Bambi Note: More about the Demonstrations, the woman who attacked Lester Chambers, etc.
Demonstrations Across the Country Commemorate Trayvon Martin - NYTimes
Hayward: Woman allegedly attacks 73-year-old musician on stage after song dedicated to Trayvon Martin - Mercury News
July 20, 1969. On this date, Apollo 11 astronauts Buzz Aldrin and Neil Armstrong landed their moon module on a broad dark lunar lava flow, called the Sea of Tranquility. Six hours later, Neil Armstrong became the first human being to walk on the moon.
Don’t believe it? Try this video: Why the Apollo moon landings could not have been faked.
Start Page, Press Release
First search engines to offer TLS 1.1 and 1.2 as well as "Perfect Forward Secrecy"
July 19, 2013
NEW YORK & AMSTERDAM: In the wake of the US PRISM Internet surveillance scandal, companies are revisiting how they do business online and beefing up their privacy practices to protect their users.
Private search engines StartPage and Ixquick have pioneered a new advance in encryption security this week, becoming the first search engines in the world to enable "Perfect Forward Secrecy" or PFS in combination with a more secure version of SSL encryption known as TLS 1.1. and 1.2 , which works by setting up a secure "tunnel" through which users' search traffic cannot be intercepted.
This is the latest in a series of security firsts by StartPage and Ixquick, which pioneered the field of private search in 2006. Combined, StartPage/Ixquick is the largest private search engine, serving well over 4 million searches daily.
Harvard-trained privacy expert Dr. Katherine Albrecht, who helped develop StartPage, says, "We take encryption very seriously, and we've always led the way when it comes to security. We were first to adopt default SSL encryption in 2011, and now we're setting the standard for encryption in the post-PRISM world."
SSL encryption has been proven to be an effective tool for protecting sensitive online traffic from eavesdropping and surveillance. However, security researchers now worry that SSL encryption may not provide adequate protection if Government agencies are scooping up large amounts of encrypted traffic and storing it for later decryption.
With SSL alone, if a target website's "private key" can be obtained once in the future - perhaps through court order, social engineering, attack against the website, or cryptanalysis - that same key can then be used to unlock all other historical traffic of the affected website. For larger Internet services, that could expose the private data of millions of people.
StartPage and Ixquick have now deployed a defense against this known as "Perfect Forward Secrecy," or PFS.
PFS uses a different "per-session" key for each data transfer, so even if a site's private SSL key is compromised, data that was previously transmitted is still safe. Those who want to decrypt large quantities of data sent using PFS face the daunting task of individually decrypting each separate file, as opposed to obtaining a single key to unlock them all.
This can be likened to replacing the master "skeleton key" that unlocks every room in a building with a tight security system that puts a new lock on each door and then creates a unique key for each lock.
In addition to its pioneering use of PFS, earlier this month StartPage and Ixquick deployed Transport Layer Security, or TLS, encryption versions TLS 1.1 and 1.2 on all of its servers. TLS is an upgraded form of SSL encryption, which sets up a secure "tunnel" that protects users' search information.
In independent evaluation, StartPage and Ixquick outscore their competitors on encryption standards. (See Qualys' SSL Labs evaluation of StartPage's encryption features:
CEO Robert Beens urges other companies to upgrade to these new technologies. "With Perfect Forward Secrecy and TLS 1.1 and 1.2 combined, we are once again leading the privacy industry forward. For the sake of their users' privacy, we strongly recommend other search engines follow our lead."
U.S. Press Contact:
(877) 434-3100 ext. 2
E.U. Press Contact:
Alex van Eesteren
Bambi Note: ixquick has been around since 1998, but started their secure search in 2006 on their startpage.com location. Now they use startpage.com and ixquick.com the same way as far as I can see. Can find out more about ixquick and startpage at wikipedia here. More information about the updated version of secure surfing known as TLS 1.1 and 1.2. Wikipedia on Transport Layer Security:
Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide communication security over the Internet. They use asymmetric cryptography forauthentication of key exchange, symmetric encryption for confidentiality and message authentication codes for message integrity. Several versions of the protocols are in widespread use in applications such as web browsing, electronic mail, Internet faxing, instant messaging and voice-over-IP (VoIP).
In the TCP/IP model view, TLS and SSL encrypt the data of network connections at a lower sublayer of itsapplication layer. In OSI model equivalences, TLS/SSL is initialized at layer 5 (the session layer) then works at layer 6 (the presentation layer): first the session layer has a handshake using an asymmetric cipher in order to establish cipher settings and a shared key for that session; then the presentation layer encrypts the rest of the communication using a symmetric cipher and that session key. In both models, TLS and SSL work on behalf of the underlying transport layer, whose segments carry encrypted data.
TLS is an IETF standards track protocol, first defined in 1999 and last updated in RFC 5246 (August 2008) and RFC 6176 (March 2011). It is based on the earlier SSL specifications (1994, 1995, 1996) developed by Netscape Communications for adding the HTTPS protocol to their Navigator web browser.
New submitter robp writes
"After a link to VLC showed up in one of HBO's DMCA takedown requests, I recalled how often I've linked to VLC in my own copy, and how often I've seen that app noted across traditional-media outlets — even though you could make the same arguments against linking to it that Judge Kaplan bought in 2000. Now, though, even the House's own IT department not only links to this CSS-circumventing app but endorses it. Question is, what led to this enlightenment?"
Bambi Note: Thankfully, Google was wise enough not to do that HBO's DMCA takedown said as it was a mistake, and did not block links to the open source software, vlc as of this morning.
Shares suffer biggest one-day percentage sell-off since 2000 as investors fret over weak demand for Microsoft's latest Windows operating system and Surface tablet.
Bambi Note: Sheesh. It wasn't as if they didn't know this would happen. Technicians from around the globe have been saying it since the Beta. Microsoft just wasn't listening.
A report examining securities cybercrime has found that half of the world's critical financial exchanges suffered cyberattacks in the past year.
The International Organization of Securities Commissions (IOSCO) said in a staff working paper [PDF] that attacks against such trading, stock and financial institutions are increasing in volume. And, despite the apparent temptation to attack these targets for financial gain, the motivations appear to be aimed at destabilizing the markets over stealing money.
iOS apps are just as invasive and curious about user data as Android apps are, BitDefender researchers found after analyzing more than half a million mobile apps.
BitDefender analyzed more than 522,000 apps over the past year and focused on the "intrusive behaviors" the app developer may have included in the product, such as tracking location, reading contact lists, and leaking your email address or device ID, said Catalin Cosi, chief security strategist at BitDefender. The team also looked at activities which may be considered unnecessary or negligent.
One of the biggest issues about mobile security is the fact that users are frequently unaware what their apps on their devices are doing. Whether that's because they don't read the permissions or because the apps themselves are being sneaky, the end result is the same: users, and the organizations they work for, are less secure.
Staking out new ground in the noisy debate about technology and privacy in law enforcement, the New Jersey Supreme Court on Thursday ordered that the police will now have to get a search warrant before obtaining tracking information from cellphone providers.
The ruling puts the state at the forefront of efforts to define the boundaries around a law enforcement practice that a national survey last year showed was routine, and typically done without court oversight or public awareness. With lower courts divided on the use of cellphone tracking data, legal experts say, the issue is likely to end up before the United States Supreme Court.
The New Jersey decision also underscores the extent of the battles over government intrusion into personal data in a quickly advancing digital age, from small town police departments to the National Security Agency’s surveillance of e-mail and cellphone conversations.
Several states and Congress are considering legislation to require that warrants based on probable cause be obtained before investigators can get cellphone data. Montana recently became the first state to pass such a measure into law. The California Legislature approved a similar bill in 2012, but Gov. Jerry Brown vetoed it, saying it did not “strike the right balance” between the needs of law enforcement and the rights of citizens.
Lawyers representing MIT are filing a motion to intervene in my FOIA lawsuit over thousands of pages of Secret Service documents about the late activist and coder Aaron Swartz.
I am the plaintiff in this lawsuit. In February, the Secret Service denied in full my request for any files it held on Swartz, citing a FOIA exemption that covers sensitive law enforcement records that are part of an ongoing proceeding. Other requestors reported receiving the same response.
When the agency ignored my administrative appeal, I enlisted David Sobel, a top DC-based FOIA litigator, and we filed suit. Two weeks ago U.S. District Judge Colleen Kollar-Kotelly ordered the government to “promptly” begin releasing Swartz’ records. The government told my lawyer that it would release the first batch tomorrow. But minutes ago, Kollar-Kotelly suspended that order at MIT’s urging, to give the university time to make an argument against the release of some of the material.
Based upon an off-the-record conference call with the parties’ counsel and counsel for non-party Massachusetts Institute of Technology (“MIT”), the Court understands that MIT intends to file a motion to intervene later today, which will include a request for relief relating to the Government’s production of certain documents to Plaintiff. In view of the impending motion, the Court hereby STAYS the obligation of the Government to promptly release to Plaintiff all responsive documents that it has located on a rolling basis, see Min. Order (July 5, 2013), until further order of the Court. Once the Court has had the opportunity to review MIT’s motion to intervene, and has considered the positions of the Plaintiff and the Government as to the motion, it shall order a schedule for further proceedings.
MIT claims it’s afraid the release of Swartz’s file will identify the names of MIT people who helped the Secret Service and federal prosecutors pursue felony charges against Swartz for his bulk downloading of academic articles from MIT’s network in 2011.
A woman attempting to deploy nearly two dozen bug bombs inside her small New York City apartment caused a "partial collapse" of the five-story building, injuring 14 people, the fire department said on Saturday.
Fire marshals said the woman told them she set off 20 bug bombs, also known as foggers, without incident on Wednesday inside her Chinatown apartment.
But as she set about repeating that exercise on Thursday, the highly flammable cloud of insecticide was ignited, likely by the pilot light in her oven or some other kitchen appliance, said Jim Long, a fire department spokesman.
Nineteen organizations including Unitarian church groups, gun ownership advocates, and a broad coalition of membership and political advocacy organizations filed suit against the National Security Agency today for violating their First Amendment right of association by illegally collecting their call records. The coalition is represented by EFF.
At the heart of First Unitarian Church of Los Angeles v. NSA is the bulk telephone records collection program that was confirmed by the publication of an order from the Foreign Intelligence Surveillance Court (FISC) in June of 2013. The Director of National Intelligence (DNI) further confirmed that this formerly secret document was authentic, and part of a broader program to collect all major telecommunications customers’ call history. The order demands wholesale collection of every call made, the location of the phone, the time of the call, the duration of the call, and other “identifying information” for every phone and call for all customers of Verizon for a period of three months. Government officials further confirmed that this was just one of series of orders issued on a rolling basis since at least 2006. First Unitarian v. NSA argues that this spying violates the First Amendment, which protects the freedom to associate and express political views as a group.
Frequently Asked Questions About First Unitarian v. NSA:
Why the focus on associations?
Our goal is to highlight one of the most important ways that the government collection of telephone records is unconstitutional: it violates the First Amendment right of association. When the government gets access to the phone records of political and activist organizations and their members, it knows who is talking to whom, when, and for how long. This so-called “metadata,” especially when collected in bulk and aggregated, tracks the associations of these organizations. After all, if the government knows that you call the Unitarian Church or Calguns or People for the American Way or Students for Sensible Drug Policy regularly, it has a very good indication that you are a member and it certainly knows that you associate regularly. The law has long recognized that government access to associations can create a chilling effect—people are less likely to associate with organizations when they know the government is watching and when the government can track their associations.
What is the factual basis for the case?
The case challenges the mass telephone records collection that was confirmed by the FISA Order that was published on June 5, 2013 and confirmed by the Director of National Intelligence (DNI) on June 6, 2013. The DNI confirmed that the collection was “broad in scope” and conducted under the “business records” provision of the Foreign Intelligence Surveillance Act, also known as section 215 of the Patriot Act and 50 U.S.C. section 1861.
The facts have long been part of EFF’s Jewel v. NSA case.
The case does not include section 702 programs, which includes the recently made public and called the PRISM program or the fiber optic splitter program that is included (along with the telephone records program) in the Jewel v. NSA case.
Background: First Amendment right of association
The First Amendment right of association is a well established doctrine that prevents the government “interfering with the right to peaceably assemble or prohibit the petition for a governmental redress of grievances.” The most famous case embracing it is a 1958 Supreme Court Case from the Civil Rights era called NAACP v. Alabama. In that case the Supreme Court held that it would violate the First Amendment for the NAACP to have to turn over its membership lists in litigation.
The right stems from the simple fact that the First Amendment protects the freedom to associate and express political views as a group. This constitutional protection is critical because, as the court noted “[e]ffective advocacy of both public and private points of view, particularly controversial ones, is undeniably enhanced by group association[.]” NAACP v. Alabama, 357 U.S. at 460. As another court noted: the Constitution protects freedom of association to encourage the “advancing ideas and airing grievances” Bates v. City of Little Rock, 361 U.S. 516, 522-23 (1960).
What harm does the First Amendment right of association seek to protect against?
The collection and analysis of telephone records give the government a broad window into our associations. The First Amendment protects against this because, as the Supreme Court has recognized, “it may induce members to withdraw from the association and dissuade others from joining it because of fear of exposure of their beliefs shown through their associations and of the consequences of their exposure.” NAACP v. Alabama, 357 U.S. at 462-63. See also Bates, 361 U.S. at 523; Gibson v. Florida Legislative Investigation Comm., 372 U.S. 539 (1963).
Privacy in one’s associational ties is also closely linked to freedom of association: “Inviolability of privacy in group association may in many circumstances be indispensible to preservation of freedom of association, particularly where a group espouses dissident beliefs.” NAACP v. Alabama, 357 U.S. at 462.
What legal tests apply when the First Amendment is at issue?
The Supreme Court has made clear that infringements on freedom of association may survive constitutional scrutiny only when they “serve compelling state interests, unrelated to the suppression of ideas, that cannot be achieved through means significantly less restrictive of associational freedoms.”Roberts v. United States Jaycees, 468 U.S. 609, 623 (1984); see also NAACP v. Button, 371 U.S. at 341; Knox v. SEIU, Local 1000, 132 S. Ct. 2277, 2291 (2012)
Here, the wholesale collection of telephone records of millions of innocent Americans’ communications records, and thereby collection of their associations, is massively overbroad, regardless of the government’s interest. Thus, the NSA spying program fails under the basic First Amendment tests that have been in place for over fifty years.
Is that all you’re arguing?
No. The new case will also argue the basic First and Fourth Amendment arguments that we’re also raising on behalf of individual AT&T customers in Jewel v. NSA. It will also raise a claim under section 215 of the PATRIOT Act since we believe the government is misinterpreting the statute—it does not allow bulk collection and searching without individual judicial approval. We also raise a Fifth Amendment claim for informational privacy and for vagueness, since the secret court rulings by the court overseeing the spying, the Foreign Intelligence Surveillance Court, give neither the public nor law enforcement clear rules and limits on their ability to surveil Americans.
What are the specific legal claims?
- First Amendment
- Fourth Amendment
- Fifth Amendment right to informational privacy and vagueness
- 50 U.S.C 1861 (also known as Patriot Act section 215)
- Return of property
There may also be other legal claims added later.
Where is the case being filed?
The case is filed in the Northern District of California federal court and will likely be related to the Jewel v. NSA case and the Shubert v. Obama case currently pending there.
How does this case compare to Jewel v. NSA?
This case is a companion case to our long pending one, Jewel v. NSA, where the court—in July 2013—rejected the government’s claim of state secrets privilege. The Jewel case also addresses the phone records collection, but on behalf of individual AT&T customers in a class action. It also includes the claims of direct access by the NSA to the Internet content and records of our communications carried on the fiberoptic cables of AT&T. Those were first revealed by Mark Klein and recently confirmed in the secret NSA slides released by the Guardian and the Washington Post.
Why such strange bedfellows?
The First Amendment especially is designed to protect people in their associations without regard to what those associations are doing, so it’s not surprising that groups from across the political spectrum and whose focus is on a range of issues, some of which may conflict, all agree on the need for the protections of the First Amendment against government access to the records of who they associate with, when, for how long and at what frequency.
A suspected lightning strike sparked a small fire on Tuesday in the central dome of one of Pittsburgh's most iconic churches.
It was one of a number of reported lightning strikes during a fast-moving storm that downed power lines and left a number of streets flooded.
Emergency dispatchers were called about 5:30 p.m. by someone who said lightning struck the steeple at the Immaculate Heart of Mary Church on Brereton Street in Polish Hill. Firefighters were several blocks away when they reported seeing smoke coming from the dome.
City firefighters hauled more than 400 feet of hose up a ladder and through rafters to douse the fire, said Deputy Chief Harry Scherer.
“Father Joe (Swierczynski) and the church secretary are looking pretty panicked,” said Leslie Calgue, an employee at the Polish Hill Civic Association, next door to the historic church.
“This building is treasured by people here. It's traumatic to see it like this,” Calgue said.
Bambi Note: This happened in Pittsburgh, PA. It was a copper topped church too. The domes atop Immaculate Heart of Mary Church in Polish Hill Tuesday, July 16, 2013 and were smoking. See pictures in the article.
Now that you've written your eulogies for Google Reader, it's a good time to remember that Google has an abundance of other resources that may not be as popular but still deserve a spotlight.
We rounded up some lesser-known Google tools and applications that could help you cope with the loss of Reader and rekindle your love for Google.
As the fallout from the revelations of Prism continues, Yahoo is gaining ground in its efforts to prove it resisted government efforts to access its users' data.
According to The Daily Dot, the internet firm won a Foreign Intelligence Surveillance Act court order today that will require the U.S. Department of Justice to reveal classified court documents from 2008.
The documents, Yahoo claims, prove it resisted another FISA court order to turn over user data to begin with.
Yahoo said it was "very pleased with the decision" in statement picked up by The Next Web, noting that as the documents are made public, "we believe they will contribute constructively to the ongoing public discussion around online privacy."
Thousands of innocent holidaymakers and travellers are having their phones seized and personal data downloaded and stored by the police, The Telegraph can disclose.
Officers use counter-terrorism laws to remove a mobile phone from any passenger they wish coming through UK air, sea and international rail ports and then scour their data.
The blanket power is so broad they do not even have to show reasonable suspicion for seizing the device and can retain the information for “as long as is necessary”.
Data can include call history, contact books, photos and who the person is texting or emailing, although not the contents of messages.
Hoping to save money on labor, China's Foxconn Technology Group could also be ushering in a new era of manufacturing as it sets its sites on putting 1 million robots to work.
The world's largest contract electronics maker already has 20,000 robotic machines on the job in its factories, and it's on track to hit its goal of creating a "million-robot army," CEO Terry Gou said recently.
With wages on the rise in China, robots will help Foxconn save money, Gou said at the company's annual shareholder's meeting in Taipei. "We have over 1 million workers," he said. "In the future, we will add 1 million robotic workers" and the humans will become technicians and engineers.
Apple Inc. said Monday that it is investigating a case in which the family of a 23-year-old woman alleges that she was electrocuted by her iPhone.
Though details about the case remain sketchy, it has caught the imagination of social media users in China, who have been spreading word about the case and warning not to use devices while they are charging.
A judge ruled Detroit's bankruptcy filing violates the Michigan Constitution, though the state attorney general said he will appeal the decision.
Detroit became the biggest American city to file for bankruptcy after its emergency manager filed for Chapter 9 protection on Thursday with more than $18 billion in accrued obligations. In the filing with the U.S. Bankruptcy Court in the Eastern District of Michigan, state-appointed emergency manager Kevyn Orr indicated that the city's estimated number of creditors was "over 100,000."
David Duffus, a partner with ParenteBeard, said there is a precedent for an attempted municipal bankruptcy to be derailed, as shown in the example ofHarrisburg, Pa., which declared bankruptcy in 2011.
When the Harrisburg City Council attempted to file for bankruptcy, the petition was denied by Judge Mary D. France on the basis that the filing was illegal because Pennsylvania state law prohibited the city from filing, Duffus said. That council needed the mayor to back its filing. The issue was appealed to the Third Circuit, where the appeals court confirmed Judge France's decision. That ruling then cleared the way for the state takeover of Harrisburg.
Orr, who was hired in March to assist with the city's budget, had tried to convince creditors to accept pennies on the dollar to deal with its financial problems.
Included in the bankruptcy filing is a four-page letter signed by Michigan Gov. Snyder and dated July 18 in which he wrote that a "vital point" made by Orr was that, "Detroit tax rates are at their current legal limits, and that even if the city was legally able to raise taxes, its residents cannot afford to pay additional taxes."
Jefferson County, Ala., previously held the title of largest municipal bankruptcy. Attorneys for Jefferson County have submitted plans to exit its historic $4.23 billion bankruptcy.
Bambi Note: ParenteBeard (Pennsylvania, New Jersey, New York, Maryland and Delaware firm provides professional accounting, tax, and consulting services.)
I get so tired of going to sites like Detroit Free Press, USA Today, The Telegraph, etc. that have their website pages set to AUTO RUN videos. Not everyone wants to watch the video right away, or at all. Not everyone can afford the bandwidth to even watch videos. Some people don't have wired broadband options in their areas and are stuck on limited mobile Internet. These mass media outlets really need to wake up and think about their visitors more. It is not a big thing to allow the visitor to click the video to watch it and give the visitor control over when or if they watch the video.