AltBib.Com - Documentation For The War On Your Mind!
a project by WikiWorldOrder.org
Please consider donating to independent media like Wiki World Order
Wiki World Order's Art Store on Zazzle.com
All content created by Wiki World Order is liscenced under Creative Commons
6,690 Reference Links                14,782 Tags/Keywords                82,068 Taggings                10,172,648 Database Loads               since May 2009
Total Link Matches Found: 4,572       Showing Links #1,401 - 1,450   +more
Tag(s) Selected:  United States (USA)
                   + Advanced Options                    + Search Tips
1/1/2010  Corexit 9500
In response to public pressure, the EPA and Nalco released the list of the six ingredients in Corexit 9500, revealing constituents including sorbitan, butanedioic acid, and petroleum distillates. Corexit EC9500A is made mainly of hydrotreated light petroleum distillates, propylene glycol and a proprietary organic sulfonate. Environmentalists also pressured Nalco to reveal to the public what concentrations of each chemical are in the product; Nalco considers that information to be a trade secret, but has shared it with the EPA. Propylene glycol is a chemical commonly used as a solvent or moisturizer in pharmaceuticals and cosmetics, and is of relatively low toxicity. An organic sulfonate (or organic sulfonic acid salt) is a synthetic chemical detergent, that acts as a surfactant to emulsify oil and allow its dispersion into water. The identity of the sulfonate used in both forms of Corexit was disclosed to the EPA in June 2010, as dioctyl sodium sulfosuccinate. - Toxicity The relative toxicity of Corexit and other dispersants are difficult to determine due to a scarcity of scientific data. The manufacturer's safety data sheet states "No toxicity studies have been conducted on this product," and later concludes "The potential human hazard is: Low."
(Wikipedia)
posted: 9/23/10                   0       2
#2801 



1/1/2010  Feds: Second Person Handcuffed After Airline Terror Attack
Nothing was found during the search and Smith said the man was given an explanation for why he was searched and then allowed to leave the facility with other passengers from flight 253.
(WWJ)
posted: 1/30/10                   0       14
#2802 



1/1/2010  Greenhouse gases
...are gases in an atmosphere that absorb and emit radiation within the thermal infrared range. This process is the fundamental cause of the greenhouse effect. The main greenhouse gases in the Earth's atmosphere are water vapor, carbon dioxide, methane, nitrous oxide, and ozone. In our solar system, the atmospheres of Venus, Mars and Titan also contain gases that cause greenhouse effects. Greenhouse gases greatly affect the temperature of the Earth; without them, Earth's surface would be on average about 33 °C (59 °F) colder than at present. The burning of fossil fuels since the beginning of the Industrial revolution has substantially increased the levels of carbon dioxide in the atmosphere.
(Wikipedia)
posted: 7/5/10                   0       7
#2803 



1/1/2010  Hide The Decline
The indespensible A-Z in the climate debate
(HideTheDecline.eu)
posted: 2/16/10                   0       8
#2804 



1/1/2010  History of the Income Tax in the United States
The nation had few taxes in its early history. From 1791 to 1802, the United States government was supported by internal taxes on distilled spirits, carriages, refined sugar, tobacco and snuff, property sold at auction, corporate bonds, and slaves. The high cost of the War of 1812 brought about the nation's first sales taxes on gold, silverware, jewelry, and watches. In 1817, however, Congress did away with all internal taxes, relying on tariffs on imported goods to provide sufficient funds for running the government.
(Tax Foundation)
posted: 11/28/10                   0       3
#2805 



1/1/2010  History of the Internet
The concept of data communication - transmitting data between two different places, connected via some kind of electromagnetic medium, such as radio or an electrical wire - actually predates the introduction of the first computers. Such communication systems were typically limited to point to point communication between two end devices. Telegraph systems and telex machines can be considered early precursors of this kind of communication. The earlier computers used the technology available at the time to allow communication between the central processing unit and remote terminals. As the technology evolved new systems were devised to allow communication over longer distances (for terminals) or with higher speed (for interconnection of local devices) that were necessary for the mainframe computer model. Using these technologies it was possible to exchange data (such as files) between remote computers. However, the point to point communication model was limited, as it did not allow for direct communication between any two arbitrary systems; a physical link was necessary. The technology was also deemed as inherently unsafe for strategic and military use, because there were no alternative paths for the communication in case of an enemy attack. As a response, several research programs started to explore and articulate principles of communications between physically separate systems, leading to the development of the packet switching model of digital networking. These research efforts included those of the laboratories of Vinton G. Cerf at Stanford University, Donald Davies (NPL), Paul Baran (RAND Corporation), and Leonard Kleinrock at MIT and at UCLA. The research led to the development of several packet-switched networking solutions in the late 1960s and 1970s, including ARPANET, Telenet, and the X.25 protocols. Additionally, public access and hobbyist networking systems grew in popularity, including unix-to-unix copy (UUCP) and FidoNet. They were however still disjointed separate networks, served only by limited gateways between networks. This led to the application of packet switching to develop a protocol for internetworking, where multiple different networks could be joined together into a super-framework of networks. By defining a simple common network system, the Internet Protocol Suite, the concept of the network could be separated from its physical implementation. This spread of internetworking began to form into the idea of a global network that would be called the Internet, based on standardized protocols officially implemented in 1982. Adoption and interconnection occurred quickly across the advanced telecommunication networks of the western world, and then began to penetrate into the rest of the world as it became the de-facto international standard for the global network. However, the disparity of growth between advanced nations and the third-world countries led to a digital divide that is still a concern today. Following commercialization and introduction of privately run Internet service providers in the 1980s, and the Internet's expansion for popular use in the 1990s, the Internet has had a drastic impact on culture and commerce. This includes the rise of near instant communication by electronic mail (e-mail), text based discussion forums, and the World Wide Web. Investor speculation in new markets provided by these innovations would also lead to the inflation and subsequent collapse of the Dot-com bubble. But despite this, the Internet continues to grow, driven by commerce, greater amounts of online information and knowledge and social networking known as Web 2.0.
(Wikipedia)
posted: 11/3/10                   0       4
#2806 



1/1/2010  Internet2
is an advanced not-for-profit networking consortium led by members from the research and education communities, industry, and government. In 2009, Internet2 member rolls included over 200 higher education institutions, over 40 members from industry, over 30 research and education network and connector organizations, and over 50 affiliate members. Internet2 operates the Internet2 Network, a next-generation Internet Protocol and optical network that delivers production network services to meet the high-performance demands of research and education, and provides a secure network testing and research environment. In late 2007, Internet2 began operating its newest dynamic circuit network, the Internet2 DCN, an advanced technology that allows user-based allocation of high-capacity data circuits over the fiber-optic network. The Internet2 Network, through its regional network and connector members, connects over 60,000 U.S. educational, research, government and "community anchor" institutions, from primary and secondary schools to community colleges and universities, public libraries and museums to health care organizations. The Internet2 community is actively engaged in developing and deploying emerging network technologies beyond the scope of single institutions and critical to the future of the Internet. These technologies include large-scale network performance measurement and management tools, simple and secure identity and access management tools and advanced capabilities such as the on-demand creation and scheduling of high-bandwidth, high-performance circuits. Internet2 is member led and member focused, with an open governance structure and process. Members serve on several advisory councils, collaborate in a variety of working groups and special interest groups gather at spring and fall member meetings, and are encouraged to participate in the strategic planning process.
(Wikipedia)
posted: 11/21/10                   0       4
#2807 



1/1/2010  Internet2 home page
About: Internet2 is the foremost U.S. advanced networking consortium. Led by the research and education community since 1996, Internet2 promotes the missions of its members by providing both leading-edge network capabilities and unique partnership opportunities that together facilitate the development, deployment and use of revolutionary Internet technologies. By bringing research and academia together with technology leaders from industry, government and the international community, Internet2 promotes collaboration and innovation that has a fundamental impact on the future of the Internet.
(Internet2)
posted: 10/5/10                   0       3
#2808 



1/1/2010  North American Union Claim: The leaders of Canada, the United States, and Mexico agreed in 2005 to subsume their countries into a greater "North American Union" by the year 2010; Status: False.
None of this is to say that the three North American countries might not someday decide to form closer ties along the lines of the European Union, perhaps with a common currency and more fluid borders. But there is currently no official governmental plan underway to make all that happen by 2010.
(Snopes.com)
posted: 11/6/10                   0       3
#2809 



1/1/2010  Now UK to have body scanners at airports: It will mean longer queues for flights... but you will be safer
Experts say at least 25 would be needed just to cover transatlantic flights from Heathrow, but a Government source said last night: 'Cost is not an issue'.
(UK Daily Mail)
posted: 1/23/10                   0       17
#2810 



1/1/2010  Open Source Ecology home page (Open Source Ecology)
posted: 10/3/10                   0       2
#2811 



1/1/2010  Open Source Intelligence (OSINT)
is a form of intelligence collection management that involves finding, selecting, and acquiring information from publicly available sources and analyzing it to produce actionable intelligence. In the intelligence community (IC), the term "open" refers to overt, publicly available sources (as opposed to covert or classified sources); it is not related to open-source software or public intelligence.
(Wikipedia)
posted: 9/23/10                   0       2
#2812 



1/1/2010  Ownership Chart: The Big Six
The U.S. media landscape is dominated by massive corporations that, through a history of mergers and acquisitions, have concentrated their control over what we see, hear and read. In many cases, these giant companies are vertically integrated, controlling everything from initial production to final distribution. Here is information about the largest U.S. media firms.
(FreePress.net)
posted: 12/18/10                   0       4
#2813 



1/1/2010  Project Gulf Impact home page (Project Gulf Impact)
posted: 10/6/10                   0       4
#2814 



1/1/2010  Protecting Cyberspace as a National Asset Act
of 2010 (S. 3480) is a bill introduced in the United States Senate by Joe Lieberman (Independent Democrat, Connecticut), Susan Collins (Republican Party, Maine), and Tom Carper (Democratic Party, Delaware) on June 10, 2010. The purpose of the bill is to increase security in cyberspace and prevent attacks which could disable infrastructure such as telecommunications or disrupt the nation's economy. Collins has stated that "we cannot afford to wait for a 'cyber 9/11'. The legislation would create an Office of Cyberspace Policy and a National Center for Cybersecurity and Communications. ". "Kill switch" Controversy Senator Lieberman has been criticized for giving the President the power to use a "kill switch" which would shut off the Internet. He has called these accusations "total misinformation" and said that "the government should never take over the Internet". Lieberman further inflamed skeptics when he cited China's similar policy in a backfired attempt to show the policy's normalcy. However, the bill would allow the President to enact "emergency measures" in the case of a large scale cyber attack. The original bill granted the US President the authority to shut down part of the internet indefinitely, but in a later amendment the maximum time for which the President could control the network was reduced to 120 days. After this period, the networks will have to be brought up, unless Congress approves an extension.
(Wikipedia)
posted: 11/21/10                   0       4
#2815 



1/1/2010  PROTECTING CYBERSPACE AS A NATIONAL ASSET ACT OF 2010
Homeland Security and Governmental Affairs Committee, Chairman Joe Lieberman, Ranking Member Susan Collins, Senator Carper - Section 101: This section establishes an Office of Cyberspace Policy within the Executive Office of the President (EOP). The Office will be responsible for developing a national strategy to increase the security and resiliency of cyberspace as well as oversee, coordinate, and integrate all policies and activities of the federal government related to ensuring the security and resiliency of cyberspace. - Section 242: This section establishes a National Center for Cybersecurity and Communications (NCCC or the Center) within the Department of Homeland Security. The Center will be headed by a Director appointed by the President and confirmed by the Senate. The Director will report directly to the Secretary of Homeland Security and serve as the principal advisor to the Secretary on cybersecurity and communications matters. The Director will regularly advise the President on the enforcement of policies pertaining to the security of federal government networks. The Center will have at least two Deputy Directors: one responsible for coordination with the Office of Infrastructure Protection and one responsible for coordination with the Intelligence Community. The Center will also have detailees from the Departments of Defense, Justice, and Commerce as well as the intelligence community and the National Institute of Standards and Technology (NIST). The Center will also benefit from a full-time Chief Privacy Officer who will report to the Director.
(US Congress)
posted: 9/27/10                   0       4
#2816 



1/1/2010  Responses to Littlefield: The Wizard of Oz
Since Littlefield's article first appeared in American Quarterly in 1964, many history teachers have no doubt used his observations to help their students learn about Populism. Oddly enough, however, Littlefield's article generated little journalistic or scholarly interest in the years following its initial publication. Littlefield was not, by the way, the first analyst to suggest that Baum may have been commenting on contemporary politics in his Oz stories. In 1957, Russell B. Nye made mention of the satire in Baum's Oz books. He emphasized, however, that Baum's intention was to amuse his readers and not to criticize. Still, Nye suggested that in Baum's sequel The Marvelous Land of Oz, "General Jinjur's army of girls armed with hatpins, satirizes the suffragette movement, a reference too sophisticated for his child readers to identify." Rather than a political allegory, Nye regarded Oz as Baum's utopian vision of America, a land free from disease and poverty, and where selfless people live not only in harmony with nature, but with technology as well. In his 1971 book The Winning of the Midwest, Richard Jensen outlined Littlefield's interpretation of The Wizard of Oz and he added a couple of refinements to it. Surprisingly, Littlefield had not considered what Toto symbolized. Jensen asserted that, "Dorothy's frisky dog Toto represents the teetotaling Prohibitionists in the silverite coalition." Jensen also pointed out that "Oz" is the abbreviation for ounce, which is the standard unit of measure for both silver and gold. Gore Vidal mentioned Littlefield's article as an aside in his essay "The Oz Books," which appeared in The New York Review of Books in 1977. He called Littlefield's interpretation "elaborate" and questioned whether Baum had intended to write a political allegory. Despite his public support for Bryan in the 1896 and 1900 elections, Vidal regarded Baum as an apolitical writer. Vidal did point out, however, that Baum had "very definite ideas about the way the world should be."
(Turn On Me, Dead Man)
posted: 11/28/10                   0       3
#2817 
keywords: Alternative Media, Chicago, David Parker, Gene Clanton, Gold, Gore Vidal, Gretchen Ritter, Henry Littlefield, Hugh Rockoff, John Geer, Lawrence Swaim, Los Angeles Times, Michael Dregni, Michael Genovese, Michael Patrick Hearn, Ranjit Dighe, Richard Jensen, Ronald Reagan, Russell Nye, Silver, Thomas Rochon, United States, William Jennings Bryan, William Leach, Wizard Of Oz Add New Keyword To Link



1/1/2010  Robert Rubin
Economic record and the 2008 global financial crisis - Rubin's assistance to Citigroup's lobbying efforts were successful in getting the Glass-Steagall Act repealed in October 1999.
(Wikipedia)
posted: 5/26/10                   0       11
#2818 



1/1/2010  Saint John Hunt
The true story of notorious American spy and Watergate Conspirator E. Howard Hunt and his son, Saint John Hunt. Including startling new information about Watergate and the J.F.K. assassination with photos, documents and the handwritten memos by E. Howard Hunt from his famous death bed "last confession."
(Saint John Hunt)
posted: 11/28/10                   0       4
#2819 



1/1/2010  Snap Scouts: Crowd Sourcing Crime Prevention
Want to earn tons of cool badges and prizes while competing with you friends to see who can be the best American? Download the SnapScouts app for your Android phone (iPhone app coming soon) and get started patrolling your neighborhood. It's up to you to keep America safe! If you see something suspicious, Snap it! If you see someone who doesn't belong, Snap it! Not sure if someone or something is suspicious? Snap it anyway! Play with your friends and family to see who can get the best prizes. Join the SnapScouts today! - SnapScout Features: * Colorful interface and sounds makes reporting a potential crime fun and easy! * Submit reports anonymously to stay safe and secure! * Help law enforcement collect evidence in real-time! * Collect a variety of awards and badges to compare with friends! * Makes civic duty and community fun! * Coming soon: Multi-crime tagging to catch more crimes at once!
(Snap Scouts)
posted: 10/5/10                   0       2
#2820 



1/1/2010  Stop the Internet Blacklist! (Petition)
Just the other day, President Obama urged other countries to stop censoring the Internet. But now the United States Congress is trying to censor the Internet here at home. A new bill being debated this week would have the Attorney General create an Internet blacklist of sites that US Internet providers would be required to block. (The first vote is scheduled Thursday, November 18!) This is the kind of heavy-handed censorship you'd expect from a dictatorship, where one man can decide what web sites you're not allowed to visit. But the Senate Judiciary Committee is expected to pass the bill quickly -- and Senators say they haven't heard much in the way of objections! That's why we need you to sign our urgent petition to Congress demanding they oppose the Internet blacklist.
(Demand Progress)
posted: 11/21/10                   0       4
#2821 



1/1/2010  Suspicious Activity & Behaviors Indicators: Homeland Security
It is important to the Dallas Police Department that citizens are alert, vigilant and report suspicious activity. The importance is as critical today as it was immediately after the attacks of September 11, 2001 on the United States. We ask citizens to be aware of their surroundings and report suspicious activity. A quick accurate description of events can make a big difference in both Criminal and Terrorism related investigations. Possible Indicators of Suspicious behavior or Terrorist Activities: * Unusual or extended interest in public utilities, large public gatherings, transportation centers, government buildings and other possible terrorist targets. * Unusual requests for information, particularly about security or procedures for at-risk buildings. * May try to have a “cover story” or appear ‘normal’ in their behavior such as portraying a student or tourist * Identity Documents may be in various names * May carry and use large amounts of cash * Unusual rentals, purchases, deliveries, or thefts, particularly of poisonous or flammable chemicals, explosives, weapons or vehicles (including planes or boats). * Multiple sightings of the same suspicious person, vehicle, or activity.
(Dallas Police Department)
posted: 10/4/10                   0       3
#2822 



1/1/2010  Taylor lawyer suspects a cover-up
Sandra Berchtold, an FBI spokeswoman in Detroit, and a Department of Justice representative in Washington, D.C., both declined to comment. Haskell is the only known passenger to provide an account of Abdulmutallab being helped by a second man. Haskell's wife, Lori Haskell, said she was distracted by the couple's card game.
(Free Press)
posted: 4/28/10                   0       4
#2823 



1/1/2010  The Wizard of Oz: Parable on Populism
by Henry M. Littlefield - On the deserts of North Africa in 1941 two tough Australian brigades went into battle singing: Have you heard of the wonderful wizard, The wonderful Wizard of Oz, And he is a wonderful wizard, If ever a wizard there was. - It was a song they had brought with them from Australia and would soon spread to England. Forever afterward it reminded Winston Churchill of those "buoyant days."[1] Churchill's nostalgia is only one symptom of the world-wide delight found in an American fairy tale about a little girl and her odyssey in the strange land of Oz. The song he reflects upon came from a classic 1939 Hollywood production of the story, which introduced millions of people not only to the land of Oz, but to a talented young lady named Judy Garland as well. Ever since its publication in 1900 Lyman Frank Baum's The Wonderful Wizard of Oz has been immensely popular, providing the basis for a profitable musical comedy, three movies, and a number of plays. It is an indigenous creation, curiously warm and touching, although no one really knows why. For despite wholehearted acceptance by generations of readers, Baum's tale has been accorded neither critical acclaim, nor extended critical examination. Interested scholars, such as Russel B. Nye and Martin Gardiner, look upon The Wizard of Oz as the first in a long and delightful series of Oz stories, and understandably base their appreciation of Baum's talent on the totality of his works[2]. The Wizard of Oz is an entity unto itself, however, and was not originally written with a sequel in mind. Baum informed his readers in 1904 that he has produced The Marvelous Land of Oz reluctantly and only in answer to well over a thousand letters demanding that he creation another Oz tale[3]. His original effort remains unique and to some degree separate from the books which follow. But its uniqueness does not rest alone on its peculiar and transcendent popularity.
(Henry M. Littlefield)
posted: 11/28/10                   0       4
#2824 



1/1/2010  TipSoft SMS
TipSoft SMS is a Text-a-Tip application which allows tipsters to anonymously submit information to our participating law enforcement agencies, schools, universities and corporations. Many of these agencies are utilizing this application through their Crime Stoppers Program which is an excellent deployment choice, although not required. This secure application allows the tipster and the investigator to have two-way dialog while keeping the tipster's identity completely anonymous. Short Message Service (SMS), often called text messaging, is a means of sending short messages to and from mobile phones. Want tipsters to send tips to you as text messages from their cell phones? If so, contact us. TipSoft SMS is seamlessly integrated within our TipSoft Online web application and as a mobile application that runs securely on many PDA devices. All modules allow for the simple and secure reception and response to tips via text message.
(TipSoft)
posted: 10/4/10                   0       4
#2825 



1/1/2010  Two Million Strong for Net Neutrality (Petition)
This is a crucial time in the fight for Net Neutrality. The FCC is pursuing new Net Neutrality rules; Congress is weighing legislation; and President Obama wants Net Neutrality to become the law of the land. More than 1.9 million people have already urged Congress and the FCC to stand with the public and pass strong Net Neutrality protections. If we can reach 2 million people, we will send a resounding message that Washington can't ignore. Urge Congress and the FCC to support Net Neutrality.
(SaveTheInternet.com)
posted: 11/21/10                   0       4
#2826 



1/1/2010  Whole Body Imaging Technology and Body Scanners ("Backscatter" X-Ray and Millimeter Wave Screening)
Top News
(Electronic Privacy Information Center)
posted: 1/25/10                   0       16
#2827 



12/31/2009  Body scans stir up debate Device that sees through clothing may become widespread
Ten to 15 seconds in a full-body scanner could have kept Nigerian Umar Farouk Abdulmutallab off Flight 253 on Christmas Day. But the controversial machines aren't standard equipment in airports here and around the world. Suspected terrorist Abdulmutallab's failed attack could change that.
(The Detroit News)
posted: 1/23/10                   0       16
#2828 



12/31/2009  Brown promises quick action over UK airport security
In an article on the Downing Street website he said the use of full-body ADVERTISEMENT scanners would be among measures to be discussed with the United States aimed at preventing a repeat of the attempted atrocity.
(Yorkshire Post)
posted: 1/23/10                   0       17
#2829 



12/31/2009  Flight 253 passenger Kurt Haskell: 'I was visited by the FBI'
Haskell and his wife, Lori, were aboard Flight 253 when Umar Farouk Abdulmutallab allegedly tried to destroy the plane. They say another man tried to help Abdulmutallab board the plane in Amsterdam.
(Mlive)
posted: 4/24/10                   0       3
#2830 



12/31/2009  Ministers 'put lives at risk' by delaying introduction of full body scanners at airports as bomber warns of more attacks
Following the attempted bombing on Christmas Day, the Netherlands and Nigeria yesterday announced they too will be introducing the scanners, which have been available since 1995
(UK Daily Mail)
posted: 1/23/10                   0       14
#2831 



12/31/2009  True sustainability needs an ethical revolution
Obsessed with technology, we have overlooked something critical that lurks in our institutionalised notion of sustainability - Technology increases our ability to exploit the environment and the efficiency of exploitation. But it does not determine how we ought to exercise that ability and efficiency. In the 1970s, technology and economic incentives led to more efficient home heating and insulation in America. What did we do with that ability? Use less energy? No. We built bigger houses, because we could heat bigger houses more affordably. Rudderless Society is a ship whose engine is technology and rudder is ethics; history bears plenty of witness to the wrecks caused by technologies that developed ahead of ethics. There is no reason to think sustainability is any different. Technology is important, but not as important as understanding how sustainability is first and foremost a relationship: a relationship with the environment; a relationship where ethics (or a lack of attention to ethics) is the predominant influence on how we exploit nature.
(The Ecologist)
posted: 7/2/10                   0       4
#2832 
keywords: Africa, Alternative Energy, Climate Change, Michigan State University, Michigan Technological University, United Nations, United States Add New Keyword To Link



12/30/2009  Airline industry trapped in nosedive
Does The Threat Of Terrorism Affect Your Plans? - Federal Transport Minister Anthony Albanese told the 7.30 Report this week the scanner trials had been "somewhat successful" and the Government was open to introducing them.
(Adelaide Now)
posted: 1/23/10                   0       14
#2833 
keywords: 9/11, Amsterdam, Au Bureau Of Infrastructure, Australia, Detroit MI, Giovanni Bisignani, International Air Transport Association, Nigeria, Transport And Regional Economics, United Kingdom, United States Add New Keyword To Link



12/30/2009  Airports face mounting pressure to introduce hi-tech scanners
The Home Secretary, Alan Johnson, has suggested that Britain should be prepared to place the scanners at all of its airports. But after a four-year trial of the machines at Heathrow between April 2004 and July 2008, the airport decided not to install the machines.
(The Independent)
posted: 1/24/10                   0       15
#2834 



12/30/2009  Detroit flight plot may prove boon for security firms
"It might put some pressure to buy more full-body scanners... The US Congress will probably do something to increase the funding," Michael Boyd, an aviation consultant, told AFP.
(Agence France-Presse)
posted: 1/24/10                   0       14
#2835 



12/30/2009  Is security worth a revealing look?
"I'm on an airplane every three or four days; I want that plane to be as safe and secure as possible," Chaffetz said. However, he added, "I don't think anybody needs to see my 8-year-old naked in order to secure that airplane."
(Star Tribune)
posted: 1/23/10                   0       15
#2836 



12/30/2009  Obama could expedite full body scans in U.S.
Investors bid up the stocks of imaging companies like American Science and Engineering, OSI Systems, and ICx Technologies Inc between 10 percent and 26 percent on Monday and Tuesday, the first two trading days after the incident.
(National Post)
posted: 1/24/10                   0       17
#2837 



12/30/2009  Point-Counterpoint: Full-Body Scans at Airport Security
Stop the X-Ray Madness Before It Begins VS We Must Have Naked Screening ASAP
(New York (magazine))
posted: 1/23/10                   0       15
#2838 



12/30/2009  Scanner debate follows terror attack
The possibility of increased use as the terror threat continues has affected the stocks of the companies who make the devices. Some smaller companies such as ICX Technologies and OSI Systems, worth only a few hundred million dollars to begin with, rose 10 percent or more on Monday. Larger players like Smiths Group and L-3 Communications have also benefited, with their machinery already in trials in airports around the world.
(Xinhuanet)
posted: 1/24/10                   0       16
#2839 



12/30/2009  Second airport arrest unrelated to attack
Federal officials did take a second person into custody at Detroit Metropolitan Airport shortly after an attempted bombing incident on Northwest Airlines Flight 253, but the passenger who got handcuffed was off a different flight, and the incident was not related, a U.S. Customs and Border Protection official said today.
(The Detroit News)
posted: 2/23/10                   1       5
#2840 



12/30/2009  Why Is Michael Chertoff So Excited About Full-Body Scanners?
Heading up the renewed push for those controversial, clothes-penetrating scanners at airports is former homeland security secretary Michael Chertoff. His consulting firm represents companies who make the scanners, but you wouldn't know it from reading the papers.
(Gawker)
posted: 2/23/10                   0       7
#2841 



12/29/2009  After foiled US plane attack, scanners revisited
But security experts believe that the scanners could have detected the explosives that Umar Farouk Abdulmutallab was hiding as he boarded a Northwest Airlines plane in Amsterdam last week.
(Agence France-Presse)
posted: 1/23/10                   0       15
#2842 



12/29/2009  Airliner attack re-ignites scanner debate
"We cannot labor under the illusion that security is free. Saving money here just tears holes in our security."
(United Press International)
posted: 1/23/10                   0       16
#2843 



12/29/2009  Christmas Day Attack Shows Holes In Airline Security
And a lot of people are saying, well, if we had a full body scan we would've discovered the device in the suspect's underwear. But those machines are also very, very expensive.
(National Public Radio)
posted: 1/23/10                   0       17
#2844 



12/29/2009  Debate Over Full-Body Scans vs. Invasion of Privacy Flares Anew After Incident
“If they’d been deployed, this would pick up this kind of device,” Michael Chertoff, the former homeland security secretary, said in an interview, referring to the packet of chemicals hidden in the underwear of the Nigerian man who federal officials say tried to blow up the Northwest Airlines flight.
(New York Times)
posted: 1/23/10                   0       21
#2845 



12/29/2009  Detroit scare sparks debate on full-body scanners
Technology exists that might have detected explosives hidden in the underwear of a Nigerian man accused of trying to blow up a plane over Detroit, but cost and privacy worries have until now prevented its widespread use.
(Reuters)
posted: 1/24/10                   0       16
#2846 



12/29/2009  Heightened Airport Security Is Lifting Many Companies
Many companies could benefit from any requirement that airports get more security equipment. While Lockheed Martin (LMT), Northrop Grumman (NOC), Raytheon (RTN) and General Dynamics (GD) also operate in the market, passenger-screening devices make up a small fraction of their revenues, according to analysts, and will more orders won't have a great impact on them. But several smaller companies are worth watching: OSI Systems, ICx Technologies, L-3 Communications, American Science and Engineering, L-1 Identity Solutions, Analogic
(Daily Finance)
posted: 1/24/10                   0       15
#2847 



12/29/2009  Hoekstra cites Christmas Day terror attack in a fundraising letter
"If you agree that we need a governor who will stand up the Obama/Pelosi efforts to weaken our security, please make a most generous contribution of $25, $50, $100 or even $250 to my campaign."
(Los Angeles Times)
posted: 2/4/10                   0       11
#2848 



12/29/2009  Videos: Kurt and Lori Haskell talk Flight 253, passport 'accomplice' and FBI questioning
This week, he and his wife shared their story with several national media outlets.
(Mlive)
posted: 4/27/10                   0       3
#2849 



12/28/2009  Attempted Airline Attack Raises New Security Concerns
There are 40 millimeter wave machines at 19 airports, and the TSA is buying 150 new X-ray units, the agency said on its Web site.
(Bloomberg)
posted: 1/23/10                   0       16
#2850 




Total Link Matches Found: 4,572       Showing Links #1,401 - 1,450
Result Pages: 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92



FAIR USE NOTICE: This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of criminal justice, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond 'fair use', you must obtain permission from the copyright owner.

A bibliography for the alternative media. This site is a completely free research tool used to collect and organize as much important documentation as possible, largely mainstream sources referenced by alternative media and interesting films. Please collaborate by suggesting related document links here...
Article/Video/Document URL:


 Legend:
 Interesting   112,493
 Not Interesting   8,126
  Add Another Tag/Keyword To Link
 Report Broken Link, See Backup Copy
 Test AltBib.Com Backup Copy

click a button below to slide out lists
Top 50 Tags: Organizations
  US Congress   983
  Federal Bureau Of Investigation   698
  Central Intelligence Agency   686
  Al-qaeda   618
  White House   499
  Pentagon   384
  United Nations   370
  US Department Of Homeland Security   323
  Federal Reserve   291
  US Department Of Justice   276
  9/11 Commission   266
  US Department Of Defense   242
  US Constitution   209
  US Department Of The Treasury   193
  US Department Of State   171
  US Supreme Court   157
  American Civil Liberties Union   152
  Transportation Security Administration   143
  US Army   139
  National Security Agency   126
  Bilderberg Group   123
  Federal Emergency Management Agency   123
  Taliban   119
  UN World Health Organization   113
  Boston Marathon   109
  Environmental Protection Agency   108
  Nazi   101
  Intergovernmental Panel On Climate Change   97
  Google   96
  Centers For Disease Control   94
  Goldman Sachs   94
  British Petroleum   90
  Fox   90
  International Monetary Fund   87
  Citigroup   80
  World Bank   80
  North Atlantic Treaty Organization   79
  UK Home Office   79
  US National Guard   78
  Council On Foreign Relations   77
  US Air Force   75
  Facebook   74
  Food And Drug Administration   74
  US Customs And Border Protection   74
  CNN   72
  New World Order   72
  North American Free Trade Agreement   72
  US Navy   71
  Harvard University   69
  Securities And Exchange Commission   67
Top 50 Tags: People Top 50 Tags: Locations Top 50 Tags: Other Keywords Top 25 Sources Cataloged

Kind Communication
Flash Gordon
Corbett Report
Media Monarchy
Peace Revolution Podcast
Tragedy and Hope
We Are Change
Click Here For More Interesting Links