Reflections, Lichtenstein, two new exhibitions at Edinburgh’s Modern One

Saturday, March 14, 2015

This weekend saw the opening of two new exhibitions at Edinburgh’s National Gallery of Modern Art. Wikinews attended Thursday’s press preview for the event where a full contingent of the capital’s press turned out to see the striking collection of paintings, photographs, and other works. Presented below are a selection of images captured at the preview.

REFLECTIONS: A Series of Changing Displays of Contemporary Art, billed as a showcase of a “diverse range of internationally-renowned contemporary and modern artists” is to display major works from the Gallery’s permanent collection, alongside important loans. Alongside this broad range of works, a three-room display of pieces on-loan from the Roy Lichtenstein Foundation — with a dramatic painted steel relief, ‘borrowed’ from the Tate in London — runs from March 14 through to January 10 next year.

Admission to both exhibitions is free; being located in Dean, to the north-west of Edinburgh’s city centre, a free Gallery bus service is available.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26

UK Wikinews Shorts: December 23, 2009

A compilation of brief news reports for Wednesday, December 23, 2009.

Contents

  • 1 Two-year-old child in Northern Ireland dies of H1N1 swine flu virus
  • 2 Woman killed in collision with ambulance in Staffordshire, England
  • 3 90-year-old man dies after car crash in Northern Ireland
  • 4 Man dies while carrying child in railway station in Edinburgh, Scotland
 Contribute to Wikinews by expanding these briefs or add a new one.

Fires at Baxter Immigration Detention Centre in South Australia

Saturday, November 12, 2005

34 accommodation units have been destroyed by fire at the Baxter Detention Centre near Pt Augusta in South Australia today. The blaze also gutted a kitchen, laundry, recreational area and officers’ station. The original blaze broke out around 4am ACST in the kitchen of the “White One” compound which houses single men. Fire units took almost three hours to put them out.

Fifty-eight detainees were evacuated from Baxter IDC. Six have been treated for smoke inhalation.

Immigration minister Amanda Vanstone says about 17 rooms have been ruined and others damaged. She says deliberate property damage will not be tolerated and the Australian Federal Police are questioning four detainees over the blazes and anyone found responsible will be charged.

“Anyone with no lawful right to be in Australia should leave irrespective of the behaviour that they’ve undertaken, but if someone with a visa or without a visa to be in Australia engages in criminal conduct that would be taken into account in terms of cancelling a visa,” she said.

The Metropolitan Fire Service (MFS) said four fires appeared to have been deliberately lit. “The first fire in the kitchen area was followed by three other separate fires within the complex,” an MFS spokesman said.

Refugee rights advocate Pamela Curr said she had concerns about the safety of detainees in the event of a fire because of the electronic doors. She said detainees at a detention centre at Amsterdam’s Schiphol airport had been killed during a fire last month because authorities had been unable to manually open the electronic doors. “Thank heavens nobody seems to have been hurt today,” she said. “We’re always on the alert that Baxter is not a safe detention centre”.

Bernadette Wauchope from Rural Australians for Refugees says the destruction will continue until something is done. “They become so desperate that they attempt self-harm or attempt suicide or maybe resort to lighting fires,” she said. “After being locked up for years and years the feeling that they’re isolated and that nobody’s listening to what their stories are, often that, well it does contribute to these kinds of acts,” she said.

Mumbai officials demolish 39K shanties; 200K homeless

December 25, 2004

Officials in Mumbai, India, demolished over 6,000 shanties today in a push to eradicate the capital city’s slums. In total, 39,000 shanties have been flattened, displacing over 200,000 people, in the city’s biggest-ever demolition drive, which began in early December.

When complete, over 2 million people are expected to be displaced. After wiping out the least desirable shanties, next in line for demolition are the illegal ‘well-off’ shanties and neighborhoods, according to the legal and bureaucratic motions that have been executed toward cleaning up Mumbai’s appearance by lowering the dominance of shanties, which make up 62 percent of Mumbai’s housing.

“As far as eye can see, there are mounds of wood, tin and tarpaulin, the remains of 6,200 illegal homes, flattened by a heavy excavator running on tank-like tracks and giant motorised claws,” the Indian Express reported about today’s destruction. [1]

Chief Minister Vilasrao Deshmukh said that citizens would see a change within six months. “Every chief minister likes to be remembered, and I’m no exception,” said Deshmukh, who despite having an empty exchequer, also announced that Rs 31,000 crore will be spent on new roads, sea links and rail lines. [2]

2006 U.S. Congressional Elections

Wednesday, November 8, 2006

Contents

  • 1 Issues
  • 2 Campaigns turn nasty
  • 3 Polling Problems
  • 4 Summaries by state
  • 5 Alabama
  • 6 Alaska
  • 7 Arizona
  • 8 Arkansas
  • 9 California
  • 10 Colorado
  • 11 Connecticut
  • 12 Delaware
  • 13 Florida
  • 14 Georgia
  • 15 Hawaii
  • 16 Idaho
  • 17 Illinois
  • 18 Indiana
  • 19 Iowa
  • 20 Kansas
  • 21 Kentucky
  • 22 Louisiana
  • 23 Maine
  • 24 Maryland
  • 25 Massachusetts
  • 26 Michigan
  • 27 Minnesota
  • 28 Mississippi
  • 29 Missouri
  • 30 Montana
  • 31 Nebraska
  • 32 Nevada
  • 33 New Hampshire
  • 34 New Jersey
  • 35 New Mexico
  • 36 New York
  • 37 North Carolina
  • 38 North Dakota
  • 39 Ohio
  • 40 Oklahoma
  • 41 Oregon
  • 42 Pennsylvania
  • 43 Rhode Island
  • 44 South Carolina
  • 45 South Dakota
  • 46 Tennessee
  • 47 Texas
  • 48 Utah
  • 49 Vermont
  • 50 Virginia
  • 51 Washington
  • 52 West Virginia
  • 53 Wisconsin
  • 54 Wyoming
  • 55 American Samoa
  • 56 District of Columbia
  • 57 Guam
  • 58 Virgin Islands
  • 59 Sources

As of 10:00 p.m EST November 8, 2006, the Democratic Party is projected to have gained control of both the United States House of Representatives and the United States Senate in the 2006 United States general elections. MSNBC projects that the Democrats now control 234 seats in the House of Representatives, 16 more seats than the 218 needed to control the House of Representatives as all 435 seats were up for election. In the Senate, where the balance of power is closer, one-third of all seats were up for grab. As of 10:00 p.m. EST, AP and Reuters were projecting that the Democrats had picked up all six seats they needed to retake the Senate, including the seats of incumbents Rick Santorum (Penn.), Lincoln Chafee (R.I.), Jim Talent (Missouri), Mike DeWine (Ohio), John Tester (Montana), and Jim Webb (VA). The Tester victory by less than 3,000 votes was projected at approximately 2 p.m. EST after the State of Montana announced the results of overnight recounts. Democrat Jim Webb has prevailed in that race by slightly more than 7,000 votes, though his opponent has not conceded and a recount may still occur.

Released video: Israeli soldier shoot bound man at short range

Sunday, July 20, 2008

B’Tselem, an Israeli organization purporting to be seeking the improvement of human rights in the West Bank, released a short video, showing a soldier shooting from close range at the feet of a blindfolded Palestinian protester. The Israel Defense Forces soldier used a rubber coated or plastic bullet. The Palestinian man, Ashraf Abu Rahman 27, says he was lightly wounded at his toe due to the shooting. He also claims to have been beaten up earlier during the protest.

B’Tselem says a lieutenant colonel was at the scene, responsible for tying the man before the shot was taken and demands an investigation. Later, Israel authorities announced that they arrested the Israeli soldier whose picture was on the video for investigation.

The shooting which took place on July 7 in Nilin, West Bank. Was taken slightly after a violent protest against the construction of Israel’s separation barrier. Some Palestinian rescue organizations claimed that ten Palestinians were shot by the rubber bullets during this protest.

The separation barrier, which was decided upon following a wave of Palestinian suicide bombings in Israel during the Second Intifada, has been a source for contention due to what the Palestinian claim to be land grabbing by the Israeli government.

Students from Liceo María Luisa Bombal of Rancagua, Chile detained after taking control of school

Tuesday, August 14, 2012

San Fernando, Chile — Ten students from the Liceo María Luisa Bombal of Rancagua, O’Higgins Region were detained by the local police yesterday. Following their release, the students told the media they were required to remove their clothes at the police station.

The students, seven men and three women, took control of the building of the school early yesterday morning in response to the long delay in re-construction of the liceo, following the earthquake of 2010. At around 08:00 local time (1200 UTC), Leonardo Fuentes, general secretary of the Municipal Educational Corporation of Rancagua, authorized the police to clear out the students.

Student leader Jennifer Olivares told Diario VI Región the police “stripped off [their] clothes” ((es))Spanish language: ?Al llegar a la comisaría nos desnudaron. upon their arrival at the police station, Comisaría de Rancagua, something which Lieutenant Colonel of Carabineros Iván Guajardo did not deny. However, police stated the students will be charged by the public prosecutor with robbing food from the school. “It’s a bit illogical that they stripped off our clothes, with the knowledge that there were minors and without [us] being delinquents, but students who took the school peacefully” ((es))Spanish language: ?Es un poco ilógico que nos desnuden habiendo menores de edad y no siendo delincuentes, sino estudiantes que estábamos en una toma que había sido pacífica, said Olivares. Ignacio Muñoz, former leader of the occupation of the Liceo María Luisa Bombal, told El Rancahuaso “the Mayor [Eduardo Soto] promised to begin the reconstruction works last summer, and it’s August already and they don’t even begin to take the debris outside” ((es))Spanish language: ?El alcalde se comprometió a comenzar los trabajos de reconstrucción durante el verano de este año, y ya estamos en agosto y aún no comienzan ni moviendo los escombros del interior. Education Regional Secretary (Seremi de Educación) Pedro Larraín said the government “does not share” ((es))Spanish language: ?No compartimos las tomas such actions, “because they harm education” ((es))Spanish language: ?porque perjudican a la educación.

The Region of Libertador General Bernardo O’Higgins was one of the first in 2012 to resuscitate the previous year’s student protests, more specifically at the Liceo Industrial de San Fernando, which was taken control by the students in late July, and which as of yesterday was still taken. The students of the Liceo Industrial were particularly affected, after the president of the school’s centro de alumnos Guillermo Horta Farías was stabbed outside the educational establishment on July 31; his fellow schoolmates subsequently organized a march in his honour in Rancagua, on August 8. As of August 11, eight high schools have been taken control of by students, in response to the government’s failure to satisfy the secondary and university students’ requests.

ACLU, EFF challenging US ‘secret’ court orders seeking Twitter data

Thursday, April 7, 2011

Late last month, the American Civil Liberties Union (ACLU) and Electronic Frontier Foundation (EFF) filed objections to the United States Government’s ‘secret’ attempts to obtain Twitter account information relating to WikiLeaks. The ACLU and EFF cite First and Fourth amendment issues as overriding reasons to overturn government attempts to keep their investigation secret; and, that with Birgitta Jonsdottir being an Icelandic Parliamentarian, the issue has serious international implications.

The case, titled “In the Matter of the 2703(d) Order Relating to Twitter Accounts: Wikileaks, Rop_G, IOERROR; and BirgittaJ“, has been in the EFF’s sights since late last year when they became aware of the US government’s attempts to investigate WikiLeaks-related communications using the popular microblogging service.

The key objective of this US government investigation is to obtain data for the prosecution of Bradley Manning, alleged to have supplied classified data to WikiLeaks. In addition to Manning’s Twitter account, and that of WikiLeaks (@wikileaks), the following three accounts are subject to the order: @ioerror, @birgittaj, and @rop_g. These, respectively, belong to Jacob Apelbaum, Birgitta Jonsdottir, and Rop Gonggrijp.

Birgitta is not the only non-US citizen with their Twitter account targeted by the US Government; Gonggrijp, a Dutch ‘ex-hacker’-turned-security-expert, was one of the founders of XS4ALL – the first Internet Service Provider in the Netherlands available to the public. He has worked on a mobile phone that can encrypt conversations, and proven that electronic voting systems can readily be hacked.

In early March, a Virginia magistrate judge ruled that the government could have the sought records, and neither the targeted users, or the public, could see documents submitted to justify data being passed to the government. The data sought is as follows:

  1. Personal contact information, including addresses
  2. Financial data, including credit card or bank account numbers
  3. Twitter account activity information, including the “date, time, length, and method of connections” plus the “source and destination Internet Protocol address(es)”
  4. Direct Message (DM) information, including the email addresses and IP addresses of everyone with whom the Parties have exchanged DMs

The order demands disclosure of absolutely all such data from November 1, 2009 for the targeted accounts.

The ACLU and EFF are not only challenging this, but demanding that all submissions made by the US government to justify the Twitter disclosure are made public, plus details of any other such cases which have been processed in secret.

Bradley Manning, at the time a specialist from Maryland enlisted with the United States Army’s 2nd Brigade, 10th Mountain Division, was arrested in June last year in connection with the leaking of classified combat video to WikiLeaks.

The leaked video footage, taken from a US helicopter gunship, showed the deaths of Reuters staff Saeed Chmagh and Namir Noor-Eldeen during a U.S. assault in Baghdad, Iraq. The wire agency unsuccessfully attempted to get the footage released via a Freedom of Information Act request in 2007.

When WikiLeaks released the video footage it directly contradicted the official line taken by the U.S. Army asserting that the deaths of the two Reuters staff were “collateral damage” in an attack on Iraqi insurgents. The radio chatter associated with the AH-64 Apache video indicated the helicopter crews had mistakenly identified the journalists’ equipment as weaponry.

The US government also claims Manning is linked to CableGate; the passing of around a quarter of a million classified diplomatic cables to WikiLeaks. Manning has been in detention since July last year; in December allegations of torture were made to the United Nations High Commissioner for Human Rights regarding the conditions under which he was and is being detained.

Reports last month that he must now sleep naked and attend role call at the U.S. Marine facility in Quantico in the same state, raised further concern over his detention conditions. Philip J. Crowley, at-the-time a State Department spokesman, remarked on this whilst speaking at Massachusetts Institute of Technology; describing the current treatment of Manning as “ridiculous and counterproductive and stupid”, Crowley was, as a consequence, put in the position of having to tender his resignation to Secretary of State Hillary Clinton.

Despite his native Australia finding, in December last year, that Assange’s WikiLeaks had not committed any criminal offences in their jurisdiction, the U.S. government has continued to make ongoing operations very difficult for the whistleblower website.

The result of the Australian Federal Police investigation left the country’s Prime Minister, Julia Gillard, having to retract a statement that WikiLeaks had acted “illegally”; instead, she characterised the site’s actions as “grossly irresponsible”.

Even with Australia finding no illegal activity on the part of WikiLeaks, and with founder Julian Assange facing extradition to Sweden, U.S. pressure sought to hobble WikiLeaks financially.

Based on a State Department letter, online payments site PayPal suspended WikiLeaks account in December. Their action was swiftly followed by Visa Europe and Mastercard ceasing to handle payments for WikiLeaks.

The online processing company, Datacell, threatened the two credit card giants with legal action over this. However, avenues of funding for the site were further curtailed when both Amazon.com and Swiss bank PostFinance joined the financial boycott of WikiLeaks.

Assange continues, to this day, to argue that his extradition to Sweden for questioning on alleged sexual offences is being orchestrated by the U.S. in an effort to discredit him, and thus WikiLeaks.

Wikinews consulted an IT and cryptography expert from the Belgian university which developed the current Advanced Encryption Standard; explaining modern communications, he stated: “Cryptography has developed to such a level that intercepting communications is no longer cost effective. That is, if any user uses the correct default settings, and makes sure that he/she is really connecting to Twitter it is highly unlikely that even the NSA can break the cryptography for a protocol such as SSL/TLS (used for https).”

Qualifying this, he commented that “the vulnerable parts of the communication are the end points.” To make his point, he cited the following quote from Gene Spafford: “Using encryption on the Internet is the equivalent of arranging an armored car to deliver credit card information from someone living in a cardboard box to someone living on a park bench.

Continuing, the Katholieke Universiteit Leuven (KUL) expert explained:

In the first place, the weak point is Twitter itself; the US government can go and ask for the data; companies such as Twitter and Google will typically store quite some information on their users, including IP addresses (it is known that Google deletes the last byte of the IP address after a few weeks, but it is not too hard for a motivated opponent to find out what this byte was).
In the second place, this is the computer of the user: by exploiting system weaknesses (with viruses, Trojan horses or backdoors in the operating system) a highly motivated opponent can enter your machine and record your keystrokes plus everything that is happening (e.g. the FBI is known to do this with the so-called Magic Lantern software). Such software is also commercially available, e.g. for a company to monitor its employees.
It would also be possible for a higly motivated opponent to play “man-in-the-middle”; that means that instead of having a secure connection to Twitter.com, you have a secure connection to the attacker’s server, who impersonates Twitter’s and then relays your information to Twitter. This requires tricks such as spoofing DNS (this is getting harder with DNSsec), or misleading the user (e.g. the user clicks on a link and connects to tw!tter.com or Twitter.c0m, which look very similar in a URL window as Twitter.com). It is clear that the US government is capable of using these kind of tricks; e.g., a company has been linked to the US government that was recognized as legitimate signer in the major browsers, so it would not be too large for them to sign a legitimate certificate for such a spoofing webserver; this means that the probability that a user would detect a problem would be very low.
As for traffic analysis (finding out who you are talking to rather than finding out what you are telling to whom), NSA and GCHQ are known to have access to lots of traffic (part of this is obtained via the UK-USA agreement). Even if one uses strong encryption, it is feasible for them to log the IP addresses and email addresses of all the parties you are connecting to. If necessary, they can even make routers re-route your traffic to their servers. In addition, the European Data Retention directive forces all operators to store such traffic data.
Whether other companies would have complied with such requests: this is very hard to tell. I believe however that it is very plausible that companies such as Google, Skype or Facebook would comply with such requests if they came from a government.
In summary: unless you go through great lengths to log through to several computers in multiple countries, you work in a clean virtual machine, you use private browser settings (don’t accept cookies, no plugins for Firefox, etc.) and use tools such as Tor, it is rather easy for any service provider to identify you.
Finally: I prefer not to be quoted on any sentences in which I make statements on the capabilities or actions of any particular government.

Wikinews also consulted French IT security researcher Stevens Le Blond on the issues surrounding the case, and the state-of-the-art in monitoring, and analysing, communications online. Le Blond, currently presenting a research paper on attacks on Tor to USENIX audiences in North America, responded via email:

Were the US Government to obtain the sought data, it would seem reasonable the NSA would handle further investigation. How would you expect them to exploit the data and expand on what they receive from Twitter?

  • Le Blond: My understanding is that the DOJ is requesting the following information: 1) Connection records and session times 2) IP addresses 3) e-mail addresses 4) banking info
By requesting 1) and 2) for Birgitta and other people involved with WikiLeaks (WL) since 2009, one could derive 2 main [pieces of] information.
First, he could tell the mobility of these people. Recent research in networking shows that you can map an IP address into a geographic location with a median error of 600 meters. So by looking at changes of IP addresses in time for a Twitter user, one could tell (or at least speculate about) where that person has been.
Second, by correlating locations of different people involved with WL in time, one could possibly derive their interactions and maybe even their level of involvement with WL. Whether it is possible to derive this information from 1) and 2) depends on how this people use Twitter. For example, do they log on Twitter often enough, long enough, and from enough places?
My research indicates that this is the case for other Internet services but I cannot tell whether it is the case for Twitter.
Note that even though IP logging, as done by Twitter, is similar to the logging done by GSM [mobile phone] operators, the major difference seems to be that Twitter is subject to US regulation, no matter the citizenship of its users. I find this rather disturbing.
Using 3), one could search for Birgitta on other Internet services, such as social networks, to find more information on her (e.g., hidden accounts). Recent research on privacy shows that people tend to use the same e-mail address to register an account on different social networks (even when they don’t want these accounts to be linked together). Obviously, one could then issue subpoenas for these accounts as well.
I do not have the expertise to comment on what could be done with 4).
((WN)) As I believe Jonsdottir to be involved in the Icelandic Modern Media Initiative (IMMI), what are the wider implications beyond the “WikiLeaks witchhunt”?
  • Le Blond: Personal data can be used to discredit, especially if the data is not public.

Having been alerted to the ongoing case through a joint press release by the ACLU and EFF, Wikinews sought clarification on the primary issues which the two non-profits saw as particularly important in challenging the U.S. Government over the ‘secret’ court orders. Rebecca Jeschke, Media Relations Director for the EFF, explained in more detail the points crucial to them, responding to a few questions from Wikinews on the case:

((WN)) As a worse-case, what precedents would be considered if this went to the Supreme Court?
  • Rebecca Jeschke: It’s extremely hard to know at this stage if this would go to the Supreme Court, and if it did, what would be at issue. However, some of the interesting questions about this case center on the rights of people around the world when they use US Internet services. This case questions the limits of US law enforcement, which may turn out to be very different from the limits in other countries.
((WN)) Since this is clearly a politicised attack on free speech with most chilling potential repercussions for the press, whistleblowers, and by-and-large anyone the relevant U.S. Government departments objects to the actions of, what action do you believe should be taken to protect free speech rights?
  • Jeschke: We believe that, except in very rare circumstances, the government should not be permitted to obtain information about individuals’ private Internet communications in secret. We also believe that Internet companies should, whenever possible, take steps to ensure their customers are notified about requests for information and have the opportunity to respond.
((WN)) Twitter via the web, in my experience, tends to use https:// connections. Are you aware of any possibility of the government cracking such connections? (I’m not up to date on the crypto arms race).
  • Jeschke: You don’t need to crack https, per se, to compromise its security. See this piece about fraudulent https certificates:
Iranian hackers obtain fraudulent httpsEFF website.
((WN)) And, do you believe that far, far more websites should – by default – employ https:// connections to protect people’s privacy?
  • Jeschke: We absolutely think that more websites should employ https! Here is a guide for site operators: (See external links, Ed.)

Finally, Wikinews approached the Icelandic politician, and WikiLeaks supporter, who has made this specific case a landmark in how the U.S. Government handles dealings with – supposedly – friendly governments and their elected representatives. A number of questions were posed, seeking the Icelandic Parliamentarian’s views:

((WN)) How did you feel when you were notified the US Government wanted your Twitter account, and message, details? Were you shocked?
  • Birgitta Jonsdottir: I felt angry but not shocked. I was expecting something like this to happen because of my involvement with WikiLeaks. My first reaction was to tweet about it.
((WN)) What do you believe is their reasoning in selecting you as a ‘target’?
  • Jonsdottir: It is quite clear to me that USA authorities are after Julian Assange and will use any means possible to get even with him. I think I am simply a pawn in a much larger context. I did of course both act as a spokesperson for WikiLeaks in relation to the Apache video and briefly for WikiLeaks, and I put my name to the video as a co-producer. I have not participated in any illegal activity and thus being a target doesn’t make me lose any sleep.
((WN)) Are you concerned that, as a Member of Parliament involved in the Icelandic Modern Media Initiative (IMMI), the US attempt to obtain your Twitter data is interfering with planned Icelandic government policy?
  • Jonsdottir: No
((WN)) In an earlier New York Times (NYT) article, you’re indicating there is nothing they can obtain about you that bothers you; but, how do you react to them wanting to know everyone you talk to?
  • Jonsdottir: It bothers me and according to top computer scientists the government should be required to obtain a search warrant to get our IP addresses from Twitter. I am, though, happy I am among the people DOJ is casting their nets around because of my parliamentary immunity; I have a greater protection then many other users and can use that immunity to raise the issue of lack of rights for those that use social media.
HAVE YOUR SAY
Do you believe the U.S. government should have the right to access data on foreign nationals using services such as Twitter?
Add or view comments
((WN)) The same NYT article describes you as a WikiLeaks supporter; is this still the case? What attracts you to their ‘radical transparency’?
  • Jonsdottir: I support the concept of WikiLeaks. While we don’t have a culture of protection for sources and whistleblowers we need sites like WikiLeaks. Plus, I think it is important to give WikiLeaks credit for raising awareness about in how bad shape freedom of information and expression is in our world and it is eroding at an alarming rate because of the fact that legal firms for corporations and corrupt politicians have understood the borderless nature of the legalities of the information flow online – we who feel it is important that people have access to information that should remain in the public domain need to step up our fight for those rights. WikiLeaks has played an important role in that context.I don’t support radical transparency – I understand that some things need to remain secret. It is the process of making things secret that needs to be both more transparent and in better consensus with nations.
((WN)) How do you think the Icelandic government would have reacted if it were tens of thousands of their diplomatic communications being leaked?
  • Jonsdottir: I am not sure – A lot of our dirty laundry has been aired via the USA cables – our diplomatic communications with USA were leaked in those cables, so far they have not stirred much debate nor shock. It is unlikely for tens of thousands of cables to leak from Iceland since we dont have the same influence or size as the USA, nor do we have a military.
((WN)) Your ambassador in the US has spoken to the Obama administration. Can you discuss any feedback from that? Do you have your party’s, and government’s, backing in challenging the ordered Twitter data release?
  • Jonsdottir: I have not had any feedback from that meeting, I did however receive a message from the DOJ via the USA ambassador in Iceland. The message stated three things: 1. I am free to travel to the USA. 2. If I would do so, I would not be a subject of involuntary interrogation. 3. I am not under criminal investigation. If this is indeed the reality I wonder why they are insisting on getting my personal details from Twitter. I want to stress that I understand the reasoning of trying to get to Assange through me, but I find it unacceptable since there is no foundation for criminal investigation against him. If WikiLeaks goes down, all the other media partners should go down at the same time. They all served similar roles. The way I see it is that WikiLeaks acted as the senior editor of material leaked to them. They could not by any means be considered a source. The source is the person that leaks the material to WikiLeaks. I am not sure if the media in our world understands how much is at stake for already shaky industry if WikiLeaks will carry on carrying the brunt of the attacks. I think it would be powerful if all the medias that have had access to WikiLeaks material would band together for their defence.
((WN)) Wikinews consulted a Belgian IT security expert who said it was most likely companies such as Facebook, Microsoft, and Google, would have complied with similar court orders *without advising the ‘targets*’. Does that disturb you?
  • Jonsdottir: This does disturb me for various reasons. The most obvious is that my emails are hosted at google/gmail and my search profile. I dont have anything to hide but it is important to note that many of the people that interact with me as a MP via both facebook and my various email accounts don’t always realize that there is no protection for them if they do so via those channels. I often get sensitive personal letters sent to me at facebook and gmail. In general most people are not aware of how little rights they have as users of social media. It is those of uttermost importance that those sites will create the legal disclaimers and agreements that state the most obvious rights we lose when we sign up to their services.
This exclusive interview features first-hand journalism by a Wikinews reporter. See the collaboration page for more details.
((WN)) Has there been any backlash within Iceland against US-based internet services in light of this? Do you expect such, or any increase in anti-American sentiments?
  • Jonsdottir: No, none what so ever. I dont think there is much anti-American sentiments in Iceland and I dont think this case will increase it. However I think it is important for everyone who does not live in the USA and uses social services to note that according to the ruling in my case, they dont have any protection of the 1st and 4th amendment, that only apply to USA citizens. Perhaps the legalities in relation to the borderless reality we live in online need to be upgraded in order for people to feel safe with using social media if it is hosted in the USA. Market tends to bend to simple rules.
((WN)) Does this make you more, or less, determined to see the IMMI succeed?
  • Jonsdottir: More. People have to realize that if we dont have freedom of information online we won’t have it offline. We have to wake up to the fact that our rights to access information that should be in the public domain is eroding while at the same time our rights as citizens online have now been undermined and we are only seen as consumers with consumers rights and in some cases our rights are less than of a product. This development needs to change and change fast before it is too late.

The U.S. Government continues to have issues internationally as a result of material passed to WikiLeaks, and subsequently published.

Within the past week, Ecuador has effectively declared the U.S. ambassador Heather Hodges persona-non-grata over corruption allegations brought to light in leaked cables. Asking the veteran diplomat to leave “as soon as possible”, the country may become the third in South America with no ambassadorial presence. Both Venezuela and Bolivia have no resident U.S. ambassador due to the two left-wing administrations believing the ejected diplomats were working with the opposition.

The U.S. State Department has cautioned Ecuador that a failure to speedily normalise diplomatic relations may jeapordise ongoing trade talks.

The United Kingdom is expected to press the Obama administration over the continuing detention of 23-year-old Manning, who also holds UK citizenship. British lawmakers are to discuss his ongoing detention conditions before again approaching the U.S. with their concerns that his solitary confinement, and treatment therein, is not acceptable.

The 22 charges brought against Manning are currently on hold whilst his fitness to stand trial is assessed.

How To Install Cepek Wheels

How to Install Cepek Wheels

by

Judy Mboroki

Cepek Wheels make your car look stylish while at the same time giving it a personal touch. The Cepek Wheels come in different designs and types depending on your car and taste. You will need a mechanic to install the wheels but you can also do it yourself at the comfort of your home. You just need a few basic tools and some simple instructions.

You will need the following tools: a flat screw driver, a jack, jack stands, thread tap or wire brush, a lug wrench and a torque wrench.

1.Use a flat screw driver to remove the hub cap. Store it safely to prevent it from getting scratches.

2.In a triangular pattern, loosen the lug nuts. Do not remove them completely. Use a jack to raise your vehicle and mount it on jack stands. Remove the loosened lug nuts completely and remove the tire and wheel. Next to the exposed hub with lug studs, place the Cepek Wheel.

[youtube]http://www.youtube.com/watch?v=26dvI_fnaAk[/youtube]

3.If working with threaded lug bolts and they are burred, rusty or dirty, clean them using a thread tap. Avoid using oils or thread sealants. Ensure you use the correct tap for your threads to avoid ruining the lug bolts. In case you do not have a tap, use a wire brush.

4.Lift the Cepek wheel over all the studs at the same time after lining up a hole in it. Slide the wheel into place.

5.Use your foot to hold the bottom of the tire against the wheel hub. Your toe should be under the tire to help hold it up. There is a threaded stud sticking through the wheel. This is where you place the first lug nut. Use your hand to turn the lug nut down as tightly as you can. If the Cepek wheel is too heavy for your foot, use a jack by lowering it and leaning the wheel beside the studs.

6.Do the same for the other lug nuts, in no particular order. Make sure to tighten them as hard as you can by use of your hand.

7.Use a lug wrench to tighten the lug nuts as tightly as you can. The size of the wrench depends on the car specifics. Turn the lug nuts one at a time, making sure not to over tighten. Over tightening the lug nuts causes the threads to stretch and weakens the studs. Premature failure could occur due to over tightening of the lug nuts.

8.Work in a star pattern. Tighten the nut directly across the first one, followed by the one across the second one till you do all the nuts. The star pattern prevents the car from wobbling and loosening while driving.

9.Remove the jack stands from the vehicle. Tighten the bolts in a star pattern using a torque wrench. Confirm the rating for the recommended torque on your cars manual. After driving for 50 to 100 miles re- torque the lug nuts. Always use the star pattern while doing the torque, this will help in case of loosening.

10.Replace the hubcap making sure it s secure and even. The

Dick Cepek Wheels

are now ready for a drive.

Judy Mboroki is an online article writer. She writes informational articles on wheels, tires, and related wheel accessories. You can find more of her work on 4wheelonline page at

Dick Cepek Wheels

.

Article Source:

ArticleRich.com

John Reed on Orwell, God, self-destruction and the future of writing

Thursday, October 18, 2007

It can be difficult to be John Reed.

Christopher Hitchens called him a “Bin Ladenist” and Cathy Young editorialized in The Boston Globe that he “blames the victims of terrorism” when he puts out a novel like Snowball’s Chance, a biting send-up of George Orwell‘s Animal Farm which he was inspired to write after the terrorist attacks on September 11. “The clear references to 9/11 in the apocalyptic ending can only bring Orwell’s name into disrepute in the U.S.,” wrote William Hamilton, the British literary executor of the Orwell estate. That process had already begun: it was revealed Orwell gave the British Foreign Office a list of people he suspected of being “crypto-Communists and fellow travelers,” labeling some of them as Jews and homosexuals. “I really wanted to explode that book,” Reed told The New York Times. “I wanted to completely undermine it.”

Is this man who wants to blow up the classic literary canon taught to children in schools a menace, or a messiah? David Shankbone went to interview him for Wikinews and found that, as often is the case, the answer lies somewhere in the middle.

Reed is electrified by the changes that surround him that channel through a lens of inspiration wrought by his children. “The kids have made me a better writer,” Reed said. In his new untitled work, which he calls a “new play by William Shakespeare,” he takes lines from The Bard‘s classics to form an original tragedy. He began it in 2003, but only with the birth of his children could he finish it. “I didn’t understand the characters who had children. I didn’t really understand them. And once I had had kids, I could approach them differently.”

Taking the old to make it new is a theme in his work and in his world view. Reed foresees new narrative forms being born, Biblical epics that will be played out across print and electronic mediums. He is pulled forward by revolutions of the past, a search for a spiritual sensibility, and a desire to locate himself in the process.

Below is David Shankbone’s conversation with novelist John Reed.

Contents

  • 1 On the alternative media and independent publishing
  • 2 On Christopher Hitchens, Orwell and 9/11 as inspiration
  • 3 On the future of the narrative
  • 4 On changing the literary canon
  • 5 On belief in a higher power
  • 6 On politics
  • 7 On self-destruction and survival
  • 8 On raising children
  • 9 On paedophilia and the death penalty
  • 10 On personal relationships
  • 11 Sources
  • 12 External links