Search & Filter Tips: Typing an exact match of Tag/Keywords into the Search bar will automatically
add the filter. Also, when looking for an exact headline, try "wrapping it with double-quotes."
Removing double-quotes and all words with any special characters might help too.
General Motors EV1 was an electric car produced and leased by the General Motors Corporation from 1996 to 1999. It was the first mass-produced and purpose-designed electric vehicle of the modern era from a major automaker, and the first GM car designed to be an electric vehicle from the outset. The decision to mass-produce an electric car came after GM received a favorable reception for its 1990 Impact electric concept car, upon which the design of the EV1 drew heavily. Inspired partly by the Impact's perceived potential for success, the California Air Resources Board (CARB) subsequently passed a mandate that made the production and sale of zero-emission vehicles a requirement for the seven major automakers selling cars in the United States to continue to market their vehicles in California. The EV1 was made available through limited lease-only agreements, initially to residents of the cities of Los Angeles, California and Phoenix and Tucson, Arizona. EV1 lessees were officially participants in a "real-world engineering evaluation" and market study into the feasibility of producing and marketing a commuter electric vehicle in select U.S. markets undertaken by GM's Advanced Technology Vehicles group. The cars were not available for purchase, and could be serviced only at designated Saturn dealerships. Within a year of the EV1's release, leasing programs were also launched in San Francisco and Sacramento, California, along with a limited program in the state of Georgia.
While customer reaction to the EV1 was positive, GM believed that electric cars occupied an unprofitable niche of the automobile market as they were only able to lease 800 units in face of production costs of US$1 billion over four years. An alliance of the major automakers litigated the CARB regulation in court, resulting in a slackening of the ZEV stipulation, permitting the companies to produce super-low-emissions vehicles, natural gas vehicles, and hybrid cars in place of pure electrics. The EV1 program was subsequently discontinued in 2002, and all cars on the road were repossessed. Lessees were not given the option to purchase their cars from GM, which cited parts, service, and liability regulations. The majority of the repossessed EV1s were crushed, and the rest delivered to museums and educational institutes with their electric powertrains deactivated, under the agreement that the cars were not to be reactivated and driven on the road.
The EV1's discontinuation remains controversial, with electric car enthusiasts, environmental interest groups and former EV1 lessees accusing GM of self-sabotaging its electric car program to avoid potential losses in spare parts sales (sales forced by government regulations), while also blaming the oil industry for conspiring to keep electric cars off the road. (Wikipedia)
The California Zero-Emission Vehicle Mandate: A Study of the Policy Process, 1990-2004 The Zero-Emission Vehicle (ZEV) mandate, one of the most daring environmental policies related to transportation, was implemented in September, 1990, by the California Air Resources Board (CARB). It originally required that, starting in 1998, 2% of the in- state new light duty vehicle sales of major automakers had no emissions of criteria pollutants. The required ZEV percentage would be increased to 5% in 2001 and to 10% in 2003. CARB organized biennial reviews of the programs, to elicit stakeholder participation and monitor the evolution of the program. Through this review schedule, the program underwent several revisions resulting from intense policy debates.
This dissertation research is concerned with the study of the policy process over the ZEV mandate, from its conception, through its inception, and the biennial reviews, until 2004. The study is structured as three core chapters. The first chapter studies the origin of the ZEV mandate, trying to understand the conditions that favored and the factors that resulted in its implementation. To guide the study in this chapter, I use the Multiple Streams theoretical framework. The second chapter presents an empirical study of the policy process during the biennial reviews. This study aims at understanding the dynamics of policy change and coalition stability, identifying the policy dimensions that dominated the debate over time. I use the Advocacy Coalition Framework to frame the study in this chapter theoretically. The third core chapter presents a theoretical study of the strategic policy behavior of the main actors in the policy process. I develop a game- theoretical model of an environmental regulator (CARB) that needs to set emission standards in the presence of multiple industry players (automakers), who in turn need to
decide on their level of compliance in the presence of a competitor. The model presented improves over previous published work in the subject.
The results of these studies yield numerous conclusions with both theoretical and practical implications. I find that Multiple Streams is useful to understand the origin of the ZEV mandate, while I identify and/or confirm arguments by other scholars about significant limitations in the framework. Through the analysis of the public testimonies given by stakeholders at the biennial reviews, I identify the policy areas of major concern at different points in time along the policy process. I also identify the policy positions of each stakeholder and obtain estimates of the groups of stakeholders with similar policy beliefs (belief coalitions.) I find that these belief coalitions show some stability over time, though less than what was found by previous studies. One of the major conclusions from the model of strategic behavior is that the competitiveness of the auto industry tends to preclude collusion. The regulator may use this industry competitiveness to its advantage and achieve higher social benefits. (University of California)
Smog Season Ends With 41 Stage 1 Alerts--a Low Total
Environment: Mild summer contributes to cleaner air. Numbers have dropped 47% since 1988. - Tying 1990 for the cleanest skies on record, Southern California's smog season ends today with 41 smog alerts--continuing a decade-long trend of slow, steady improvement in the nation's most polluted area.
Much of the decline in 1992 is a testimonial to the summer's mild weather, especially in June and early July. Many of the Stage 1 health alerts for ozone in the Los Angeles Basin were congregated during an unusual bout of summery conditions in late April. (Los Angeles Times)
Electric Car 1890s to 1900s: Early history Before the pre-eminence of internal combustion engines, electric automobiles held many speed and distance records. Among the most notable of these records was the breaking of the 100 km/h (62 mph) speed barrier, by Camille Jenatzy on April 29, 1899 in his 'rocket-shaped' vehicle Jamais Contente, which reached a top speed of 105.88 km/h (65.79 mph). Before the 1920s, electric automobiles were competing with petroleum-fueled cars for urban use of a quality service car.
In 1897, electric vehicles found their first commercial application in the U.S. as a fleet of electrical New York City taxis, built by the Electric Carriage and Wagon Company of Philadelphia. Electric cars were produced in the US by Anthony Electric, Baker, Columbia, Anderson, Edison [disambiguation needed], Studebaker, Riker, Milburn, and others during the early 20th century.
The low range of electric cars meant they could not make use of the new highways to travel between cities
Despite their relatively slow speed, electric vehicles had a number of advantages over their early-1900s competitors. They did not have the vibration, smell, and noise associated with gasoline cars. They did not require gear changes, which for gasoline cars was the most difficult part of driving. Electric cars found popularity among well-heeled customers who used them as city cars, where their limited range proved to be even less of a disadvantage. The cars were also preferred because they did not require a manual effort to start, as did gasoline cars which featured a hand crank to start the engine. Electric cars were often marketed as suitable vehicles for women drivers due to this ease of operation.
In 1911, the New York Times stated that the electric car has long been recognized as "ideal" because it was cleaner, quieter and much more economical than gasoline-powered cars. Reporting this in 2010, the Washington Post commented that "the same unreliability of electric car batteries that flummoxed Thomas Edison persists today."
Acceptance of electric cars was initially hampered by a lack of power infrastructure, but by 1912, many homes were wired for electricity, enabling a surge in the popularity of the cars. At the turn of the century, 40 percent of American automobiles were powered by steam, 38 percent by electricity, and 22 percent by gasoline. 33,842 electric cars were registered in the United States, and the United States of America became the country where electric cars had gained the most acceptance. Sales of electric cars peaked in 1912.
Proposed as early as 1896 in order to overcome the lack of recharging infrastructure, a exchangeable battery service was first put into practice by Hartford Electric Light Company for electric trucks. The vehicle owner purchased the vehicle from General Electric Company (GVC) without a battery and the electricity was purchased from Hartford Electric through an exchangeable battery. The owner paid a variable per-mile charge and a monthly service fee to cover maintenance and storage of the truck. The service was provided between 1910 to 1924 and during that period covered more than 6 million miles. Beginning in 1917 a similar service was operated in Chicago for owners of Milburn Light Electric cars who also could buy the vehicle without the batteries. (Wikipedia)
Random Pat-Downs Turn PATCO Into Police State: Commuters' clothing, pockets, bags and vehicles to be randomly searched Commuters who ride PATCO trains between southern New Jersey and Philadelphia should expect random searches of their clothing, pockets, bags and vehicles on their morning trip to work.
Twelve Transportation Security Administration screeners, armed with an explosive-sniffing K-9, checked 663 commuter bags randomly selected from the morning rush at the Lindenwold station Tuesday.
"It was chaotic," Kevin Greczyn, an accountant from Magnolia who commutes to Philadelphia daily, told the Courier Post. "Nobody was sure what was happening, whether it was safe to get on the train, or whether we were carrying something we shouldn't be.” (NBC)
Homeland Security to test iris scanners The Homeland Security Department plans to test futuristic iris scan technology that stores digital images of people's eyes in a database and is considered a quicker alternative to fingerprints.
The department will run a two-week test in October of commercially sold iris scanners at a Border Patrol station in McAllen, Texas, where they will be used on illegal immigrants, said Arun Vemury, program manager at the department's Science and Technology branch.
"The test will help us determine how viable this is for potential (department) use in the future," Vemury said.
Iris scanners are little used, but a new generation of cameras that capture images from 6 feet away instead of a few inches has sparked interest from government agencies and financial firms, said Patrick Grother, a National Institute of Standards and Technology computer scientist. The technology also has sparked objections from the American Civil Liberties Union. (USA Today)
CDC allegedly falsifies reports--ignoring up to 3,587 Miscarriages from H1N1 Vaccine A shocking report from the National Coalition of Organized Women (NCOW) presented data from two different sources demonstrating that the 2009/10 H1N1 vaccines contributed to an estimated 1,588 miscarriages and stillbirths. A corrected estimate may be as high as 3,587 cases. NCOW also highlights the disturbing fact that the CDC failed to inform their vaccine providers of the incoming data of the reports of suspected H1N1 vaccine related fetal demise.
NCOW collected the data from pregnant women (age 17-45 years) that occurred after they were administered a 2009 A-H1N1 flu vaccine. The raw data is available on the website.
Using the Vaccine Adverse Event Reporting System (VAERS), including updates through July 11, 2010 as a second ascertainment source, capture-recapture statistical methods* were used to estimate the true number of miscarriages and stillbirths following A-H1N1 flu vaccination in the U.S. Typically, even so-called "complete" studies conducted by the CDC have been shown to miss from 10% to 90% of the actual cases because of under-reporting. (National Coalition of Organized Women)
Al-Qaeda likely to try small-scale attacks on U.S., officials say Al-Qaeda and its allies are likely to attempt small-scale, less sophisticated terrorist attacks in the United States, senior Obama administration officials said Wednesday, noting that it's extremely difficult to detect such threats in advance.
"Unlike large-scale, coordinated, catastrophic attacks, executing smaller-scale attacks requires less planning and fewer pre-operational steps," said Homeland Security Secretary Janet Napolitano, testifying before the Senate Homeland Security and Governmental Affairs Committee. "Accordingly, there are fewer opportunities to detect such an attack before it occurs." (Washington Post)
Extremist Web Sites Are Using U.S. Hosts: Ease and Anonymity Draw Taliban, al-Qaeda On March 25, a Taliban Web site claiming to be the voice of the "Islamic Emirate of Afghanistan" boasted of a deadly new attack on coalition forces in that country. Four soldiers were killed in an ambush, the site claimed, and the "mujahideen took the weapons and ammunition as booty."
Most remarkable about the message was how it was delivered. The words were the Taliban's, but they were flashed around the globe by an American-owned firm located in a leafy corner of downtown Houston.
The Texas company, a Web-hosting outfit called ThePlanet, says it simply rented cyberspace to the group and had no clue about its Taliban connections. For more than a year, the militant group used the site to rally its followers and keep a running tally of suicide bombings, rocket attacks and raids against U.S. and allied troops. The cost of the service: roughly $70 a month, payable by credit card. (Washington Post)
Al-Qaida Web site was hosted in Phoenix A Web site used by al-Qaida to recruit car bombers, encourage war on the West and provide a forum for Islamic militants went online from Phoenix this week.
The site, a well-known and popular forum for Islamic terrorists and their sympathizers, was the first to report the death of senior al-Qaida leader Abu Laith al-Libi in Pakistan this week.
The north Phoenix company hosting the site took it down Wednesday, just hours after being contacted by The Arizona Republic.
The Web site, www.ek-is.org, facilitates discussions on weapons, explosives and propaganda and often serves as a question-and-answer center for terrorists, a review of the Web site shows.
Bob Cichon, president of Phoenix-based CrystalTech Web Hosting Inc., said he was unaware of the site's content when his company posted it earlier this week. He said his company, which hosts thousands of Web sites, has no association with extremists or terrorists.
(The Arizona Republic)
Al Qaeda websites present growing threat, FBI's Mueller warns Al Qaeda, once limited to areas surrounding Afghanistan, may be using the Internet to recruit and radicalize, FBI Director Robert Mueller testified Wednesday before a House Appropriations subcommittee. - The United States faces an expanding array of Al Qaeda-related threats that extend far beyond the lawless regions of southwest Asia and into the US itself via radical Islamist websites, FBI Director Robert Mueller told a House Appropriations subcommittee on Wednesday.
“For those in the intelligence community there has been a shift in the degree of concern about affiliates of Al Qaeda growing in strength and presenting a much enhanced threat to the United States,” the Federal Bureau of Investigation director said. (Christian Science Monitor)
Bomb-making tips, hit list behind Blogetery closure More details are surfacing about why Blogetery.com, a blogging platform that claimed to service more than 70,000 blogs, was mysteriously booted from the Internet by its Web-hosting company.
The site was shut down after FBI agents informed executives of Burst.net, Blogetery's Web host, late on July 9 that links to al-Qaeda materials were found on Blogetery's servers, Joe Marr, chief technology officer for Burst.net, told CNET. Sources close to the investigation say that included in those materials were the names of American citizens targeted for assassination by al-Qaeda. Messages from Osama bin Laden and other leaders of the terrorist organization, as well as bomb-making tips, were also allegedly found on the server.
But Marr said a Burst.net employee erred in telling Blogetery's operator and members of the media that the FBI had ordered it to terminate Blogetery's service. He said Burst.net did that on its own. (CNet News)
Bill Would Give Justice Department Power to Shutter Piracy Sites Worldwide Lawmakers introduced legislation Monday that would let the Justice Department seek U.S. court orders against piracy websites anywhere in the world, and shut them down through the sites’ domain registration.
The bipartisan legislation, dubbed the Combating Online Infringement and Counterfeits Act, (.pdf) amounts to the Holy Grail of intellectual-property enforcement. The recording industry and movie studios have been clamoring for such a capability since the George W. Bush administration. If passed, the Justice Department could ask a federal court for an injunction that would order a U.S. domain registrar or registry to stop resolving an infringing site’s domain name, so that visitors to PirateBay.org, for example, would get an error message.
“In today’s global economy the internet has become the glue of international commerce –- connecting consumers with a wide array of products and services worldwide,” said Sen. Orin Hatch (R-Utah) in a statement announcing the bill. “But it’s also become a tool for online thieves to sell counterfeit and pirated goods, making hundreds of millions of dollars off of stolen American intellectual property.” (Wired)
Colbert Grills Eric Schmidt On Privacy, 'Don't Be Evil' Motto (VIDEO) Google CEO Eric Schmidt went head-to-head with Stephen Colbert yesterday evening to discuss everything from data-mining to China to Schmidt's "joke" about privacy.
Colbert grilled Schmidt about Google's search algorithm, and what information the company collects about its users.
"It's true that we see your searches, but then we forget them after while," Schmidt explained (he later told Colbert he would "encourage" him to erase his browser history).
"And I'm supposed to trust you on that?" Colbert probed, asking later, "You wouldn't call that data mining?" Not surprisingly, Schmidt answered with firm, "We actually don't do data mining." (Huffington Post)
Pentagon says military response to cyber attack possible The Pentagon would consider a military response in the case of a cyber attack against the United States, a US defense official said on Wednesday.
Asked about the possibility of using military force after a cyber assault, James Miller, undersecretary of defense for policy, said: "Yes, we need to think about the potential for responses that are not limited to the cyber domain."
But he said it remained unclear what constituted an act of war in cyberspace.
"Those are legal questions that we are attempting to address," Miller said at a conference in Washington, adding that "there are certainly a lot of grey areas in this field." (Agence France-Presse)
Cyber Attacks Test Pentagon, Allies and Foes Cyber espionage has surged against governments and companies around the world in the past year, and cyber attacks have become a staple of conflict among states.
U.S. military and civilian networks are probed thousands of times a day, and the systems of the North Atlantic Treaty Organization headquarters are attacked at least 100 times a day, according to Anders Fogh Rasmussen, NATO's secretary-general. "It's no exaggeration to say that cyber attacks have become a new form of permanent, low-level warfare," he said.
More than 100 countries are currently trying to break into U.S. networks, defense officials say. China and Russia are home to the greatest concentration of attacks.
The Pentagon's Cyber Command is scheduled to be up and running next month, but much of the rest of the U.S. government is lagging behind, debating the responsibilities of different agencies, cyber-security experts say. The White House is considering whether the Pentagon needs more authority to help fend off cyber attacks within the U.S. (Wall Street Journal)
Obama 'Internet kill switch' plan approved by US Senate panel: President could get power to turn off Internet A US Senate committee has approved a wide-ranging cybersecurity bill that some critics have suggested would give the US president the authority to shut down parts of the Internet during a cyberattack.
Senator Joe Lieberman and other bill sponsors have refuted the charges that the Protecting Cyberspace as a National Asset Act gives the president an Internet "kill switch." Instead, the bill puts limits on the powers the president already has to cause "the closing of any facility or stations for wire communication" in a time of war, as described in the Communications Act of 1934, they said in a breakdown of the bill published on the Senate Homeland Security and Governmental Affairs Committee website. (Tech World)
Carper: 2008 Cyber Attack Underscores U.S. Vulnerabilities A key member of the Senate Homeland Security and Governmental Affairs Committee said Thursday that the recent revelation that the U.S. military was the victim of a major cyber attack in 2008 underscores the need to better secure all federal government and civilian computer systems.
The comments from Sen. Tom Carper, D-Del., a senior member of the Homeland Security and Governmental Affairs Committee, comes a day after Deputy Defense Secretary William Lynn III revealed details from the 2008 attack in an article published online Wednesday in Foreign Affairs magazine. In the article, Lynn confirmed that the U.S. military was the victim of "the most significant breach of U.S. military computers ever" in 2008 when an infected USB drive was inserted into a U.S. military laptop at a Middle East base.
"This latest revelation underscores the scary reality of how vulnerable we really are to cyber criminals, terrorists, and nation-states seeking to use technology to steal from us or do us harm," Carper said. (National Journal)
Internet2 home page About: Internet2 is the foremost U.S. advanced networking consortium. Led by the research and education community since 1996, Internet2 promotes the missions of its members by providing both leading-edge network capabilities and unique partnership opportunities that together facilitate the development, deployment and use of revolutionary Internet technologies.
By bringing research and academia together with technology leaders from industry, government and the international community, Internet2 promotes collaboration and innovation that has a fundamental impact on the future of the Internet. (Internet2)
Beware of Governments Trumpeting Terror Threats Fans of the movie Men in Black will be smirking quietly at the European terror plot story currently circulating.
According to reports attributed to security forces, al Qaeda affiliated groups have been planning Mumbai-style commando attacks in western Europe - and only strikes using unmanned U.S. drones in the lawless tribal areas of Pakistan have derailed those attacks by targeting the terror cells which have been planning them. The Mumbai attacks, organized by a terror group in Pakistan, killed more than 170 people in 2008. (CBS)
Hacking the Electric Grid? You and What Army? Grid-hacking is back in the news, with the unveiling of “Perfect Citizen,” the National Security Agency’s creepily named effort to protect the networks of electrical companies and nuclear power plants.
People have claimed in the past to be able to turn off the internet, there are reports of foreign penetrations into government systems, “proof” of foreign interest in attacking U.S. critical infrastructure based on studies, and concerns about adversary capabilities based on allegations of successful critical infrastructure attacks. Which begs the question: If it’s so easy to turn off the lights using your laptop, how come it doesn’t happen more often?
The fact of the matter is that it isn’t easy to do any of these things. Your average power grid or drinking-water system isn’t analogous to a PC or even to a corporate network. The complexity of such systems, and the use of proprietary operating systems and applications that are not readily available for study by your average hacker, make the development of exploits for any uncovered vulnerabilities much more difficult than using Metasploit.
To start, these systems are rarely connected directly to the public internet. And that makes gaining access to grid-controlling networks a challenge for all but the most dedicated, motivated and skilled — nation-states, in other words. - The fact of the matter is that it isn’t easy to do any of these things. Your average power grid or drinking-water system isn’t analogous to a PC or even to a corporate network. The complexity of such systems, and the use of proprietary operating systems and applications that are not readily available for study by your average hacker, make the development of exploits for any uncovered vulnerabilities much more difficult than using Metasploit.
To start, these systems are rarely connected directly to the public internet. And that makes gaining access to grid-controlling networks a challenge for all but the most dedicated, motivated and skilled — nation-states, in other words. (Wired)
Google's Deep CIA Connections The western media is currently full of articles on Google's 'threat to quit China' over internet censorship issues, and the company's 'suspicion' that the Chinese government was behind attempts to 'break-in' to several Google email accounts used by 'Chinese dissidents'.
However, the media has almost completely failed to report that Google's surface concern over 'human rights' in China is belied by its their deep involvement with some of the worst human rights abuses on the planet:
Google is, in fact, is a key participant in U.S. military and CIA intelligence operations involving torture; subversion of foreign governments; illegal wars of aggression; and military occupations of countries which have never attacked the U.S. and which have cost hundreds of thousands of lives in Afghanistan, Iraq, Pakistan, and elsewhere. (Pravda)
Watchdog group wants federal investigation of Google Street View flap A prominent civil liberties watchdog has added its voice to those calling for a federal investigation of Google following the company's recent admission of privacy violations related to its "Street View" product.
The nonprofit Electronic Privacy Information Center (EPIC) sent a letter to Federal Communications Commission chairman Julius Genachowski last week requesting an investigation of privacy issues arising from "Street View," which provides "360 degree street level imagery" of U.S. cities.
"The company routinely and secretly downloaded user communications data and the company routinely and secretly mapped private communication hotspots. Moreover, they said not a word about the Wi-Fi data collection during the three-year privacy debate over Street View," wrote Marc Rotenberg, executive director of EPIC. "This is why the FCC must undertake an investigation." (The Hill)
Gwyneth Paltrow, Elisabeth Murdoch heart Barack Another name on the host committee? Former Washingtonian Julia Moffett. Moffett, daugther of former congressman Toby Moffett, rings a bell to D.C.'ers as remember the NYT story from 2002 about the Markle Foundation, where she used to work? (Politico)
Rupert Murdoch Loves Hillary Clinton: Conservative Media Mogul To Host Fundraiser For Liberal N.Y. Senator To call them a political odd couple would be a rash understatement.
Conservative media mogul Rupert Murdoch will host a fundraiser for liberal New York Sen. Hillary Clinton, the Financial Times reports.
The mating ritual of the unlikely allies has been under way for months. Clinton set political tongues to wagging last month by attending a Washington party celebrating the 10th anniversary of Fox News, the cable news channel owned by Murdoch.
The Financial Times quoted one unnamed source as describing the Clinton-Murdoch connection in this way: "They have a respectful and cordial relationship. He has respect for the work she has done on behalf of New York. I wouldn't say it was illustrative of a close ongoing relationship. It is not like they are dining out together." (CBS)
Murdoch fund-raiser for Clinton creates buzz: Outrage, confusion in political circles over media mogul’s decision Media mogul Rupert Murdoch, whose Fox News Channel and other conservative news outlets have been skewering Hillary Rodham Clinton for years, will host a summer fund-raiser for the senator, mystifying some observers and enraging others.
Especially incensed are liberal activists, who for months have decried what they see as a shift to a right on Clinton’s part as the Democrat contemplates a run for president in 2008. They are stunned that she is associating with a man viewed as a cornerstone of the “vast right-wing conspiracy,” a term Clinton herself employed. (Associated Press)
EcoSnoop A Mission for Change -
EcoSnoop's mission is to help our communities heighten awareness of opportunities to be more green, save energy, eco hypocrisy, and even fill pot holes. Leveraging the power of the community, EcoSnoops use their an iPhone to capture clear pictures of a problem and post these pictures on a community website so that building owners and others can take action. Have you ever.....
Seen lights left on in a building, late at night, for no good purpose?
Noticed a door that never closes properly, wasting heat or air conditioning?
Observed a truck unnecessarily idling at a loading dock?
Been bothered by a broken sprinkler in a city park running non stop?
Complained about street lights left on all day?
Wanted a pot hole filled?
EcoSnoop lets you help solve these problems. EcoSnoop is a photo driven "Trouble Ticket" system, letting you identify a problem while leveraging the community to find a fix. The EcoSnoop website is a tool for awareness and understanding efficency. By using the EcoSnoop iPhone application, the user becomes an important link in the chain of many helping to discover and mediate waste (energy, pollution, etc.) in government buildings and our community.
EcoSnoop is Not Big Brother -
EcoSnoop is not about picking sides in the environmental or climate change debate. EcoSnoop frankely has no idea if man made CO2 is the source of climate change. EcoSnoop helps identify opportunities for making improvements that help companies and communities reduce cost, waste and inefficiency. McKinsey Consulting has identified Energy Efficiency as the best and cheapest form of energy. Energy Efficiency often pays back quickly, putting cash into our pockets. Just as many people did not know what to use a personal computer for in the early 80's, so to do many people not realize how much energy can be saved in their daily life.
For those that fell strongly that climate change is man made, EcoSnoop offers the least costly method for reducing carbon emission - Energy Efficiency. For those that believe dependence on foreign sources of energy puts a nations security at risk, EcoSnoop offers the least costly method for reducing dependency on foreign sources - Energy Efficiency.
Don't use EcoSnoop to tattle on your neighbor, thats a dumb and offensive idea. We will remove any EcoSnoop content that appears to personally address an individuals behavior or focuses explicitly on a residence. (EcoSnoop)
Snap Scouts: Crowd Sourcing Crime Prevention
Want to earn tons of cool badges and prizes while competing with you friends to see who can be the best American? Download the SnapScouts app for your Android phone (iPhone app coming soon) and get started patrolling your neighborhood.
It's up to you to keep America safe! If you see something suspicious, Snap it! If you see someone who doesn't belong, Snap it! Not sure if someone or something is suspicious? Snap it anyway!
Play with your friends and family to see who can get the best prizes. Join the SnapScouts today! - SnapScout Features:
* Colorful interface and sounds makes reporting a potential crime fun and easy!
* Submit reports anonymously to stay safe and secure!
* Help law enforcement collect evidence in real-time!
* Collect a variety of awards and badges to compare with friends!
* Makes civic duty and community fun!
* Coming soon: Multi-crime tagging to catch more crimes at once!
Third Party Rising by Thomas Friedman - A friend in the U.S. military sent me an e-mail last week with a quote from the historian Lewis Mumford’s book, “The Condition of Man,” about the development of civilization. Mumford was describing Rome’s decline: “Everyone aimed at security: no one accepted responsibility. What was plainly lacking, long before the barbarian invasions had done their work, long before economic dislocations became serious, was an inner go. Rome’s life was now an imitation of life: a mere holding on. Security was the watchword — as if life knew any other stability than through constant change, or any form of security except through a constant willingness to take risks.”
It was one of those history passages that echo so loudly in the present that it sends a shiver down my spine — way, way too close for comfort.
I’ve just spent a week in Silicon Valley, talking with technologists from Apple, Twitter, LinkedIn, Intel, Cisco and SRI and can definitively report that this region has not lost its “inner go.” But in talks here and elsewhere I continue to be astounded by the level of disgust with Washington, D.C., and our two-party system — so much so that I am ready to hazard a prediction: Barring a transformation of the Democratic and Republican Parties, there is going to be a serious third party candidate in 2012, with a serious political movement behind him or her — one definitely big enough to impact the election’s outcome. (New York Times)
Nine Years After 9/11, Few See Terrorism as Top U.S. Problem: One percent see it as the top problem today, down from 46% in 2001 Nine years after the terrorist attacks of Sept. 11, 2001, 1% of Americans mention terrorism as the most important problem facing the country, down from 46% just after the attacks.Just before the attacks, in a Gallup poll conducted Sept. 7-10, 2001, less than one-half of 1% of Americans mentioned terrorism as the nation's most important problem. One month later, in October 2001, 46% named terrorism, the highest in Gallup's history.
From that point on, terrorism slowly faded as a response to this question. At the one-year anniversary of the attacks, in September 2002, 19% of Americans mentioned terrorism as the country's top problem, already eclipsed by the economy at the top of the list. By the five-year anniversary of the attacks in September 2006, 11% of Americans mentioned terrorism. Terrorism continued to drop from that point, albeit with an uptick to 8% mentions in January of this year, reflecting the widespread news coverage of the "Christmas Day bomber" who allegedly attempted to detonate explosives on a Northwest Airlines plane headed for Detroit. - Despite the drop in top-of-mind mentions of terrorism, Americans still say it is an important issue when they are reminded of it. Gallup recently asked Americans to rate the importance of a number of issues to their vote in this year's midterm elections, and 75% rated terrorism as an extremely or very important issue. Still, Americans rated economic issues such as the economy, jobs, and federal spending, as well as corruption in government and healthcare, even higher. They rated terrorism as more important than immigration, Afghanistan, and the environment.
The Sept. 11 attacks took place during the Republican Bush administration, which soon thereafter launched a "war on terrorism." Republicans have consistently been given more credit than Democrats for handling terrorism over the years since; in an August USA Today/Gallup poll, 55% of Americans say the Republicans in Congress are better able to handle the issue of terrorism, while 31% choose the Democrats. (Gallup)
Military-Grade Malware Spurs Theories on New Cyberwar Threat Cybersecurity officials have discovered a widely disseminated piece of malicious software called Stuxnet, which they say establishes a new precedent in the sophistication and threat of cyberwarfare. It's unclear exactly what Stuxnet was designed to do, but officials say the software had embedded itself across computer systems at a number of power facilities and factories over the past year. It appeared to have the ability, if activated, to briefly wrest control of industrial components away from human operators. Analysts say it's possible this could destroy the targeted facility by causing explosions and fires. Wired's Kim Zetter explores the technical analysis and processes in-depth. It's unknown who created it, to what end, and what exactly Stuxnet would have done if it had not been discovered. But here's what we know and the implications. (The Atlantic)
State-backed cyber attack targets Iran A COMPUTER worm that targets industrial and factory systems is almost certainly the work of a national government agency, say security experts who warn it could be near-impossible to identify the culprit.
There has been speculation that the target of the virus was Iran's controversial Bushehr nuclear power plant and that it was created by Israeli hackers.
The Stuxnet computer worm, which has been described as one of the ''most refined pieces of malware ever discovered'', has been most active in Iran according to security firm Symantec.
Security experts say that Stuxnet is a targeted attack on industrial locations in specific countries, and its sophistication takes it above previous attacks of a similar nature.
Latest Symantec figures from August show 60 per cent of the computers infected by Stuxnet are located in Iran, up from 25 per cent in July. - The worm then takes over the computer running a factory process and ''blocks'' it for up to a tenth of a second. For high-speed systems, such as the centrifuges used for nuclear fuel processing in Iran, this could be disastrous, experts suggested.
Mr Clulely said the worm clearly had been designed with a specific target in mind.
''Combine this with the fact that the worm was identified by a Belarusian security firm working for an Iranian client and the fact that the nuclear power plant was not working properly for months, it is understandable that speculation points towards Iran as the target.''
Mr Clulely said the world was moving into a ''third age'' of cyber crime, where the intention is not to make money but to bring down critical infrastructure.
''There are political, economic and military ways in which the internet can be exploited, and malware can be used to gain advantage by foreign states.'' (The Age)
Stuxnet Introduces the First Known Rootkit for Industrial Control Systems As we’ve explained in our recent W32.Stuxnet blog series, Stuxnet infects Windows systems in its search for industrial control systems, often generically (but incorrectly) known as SCADA systems. Industrial control systems consist of Programmable Logic Controllers (PLCs), which can be thought of as mini-computers that can be programmed from a Windows system. These PLCs contain special code that controls the automation of industrial processes—for instance, to control machinery in a plant or a factory. Programmers use software (e.g., on a Windows PC) to create code and then upload their code to the PLCs. (Symantec)
Iran confirms "cyberterrorism," computers infected by Stuxnet Iran on Saturday confirmed that its industrial computer system
has become a victim of 'cyberterrorism' and that numerous computers were infected by the malicious Stuxnet software.
An IT official of Iran's mines and metals ministry told the Mehr news agency that 30,000 computers belonging to industrial units have already been infected by the virus.
Mahmoud Alyaie told Mehr that the Iranian industrial control systems are made by Siemens and the Stuxnet is designed to attack exactly these systems and transfer classified data abroad. (Monsters & Critics)
Details of “Einstein” Cyber Shield Disclosed by White House The Obama administration lifted the veil Tuesday on a highly-secretive set of policies to defend the U.S. from cyber attacks.
It was an open secret that the National Security Agency was bolstering a Homeland Security program to detect and respond to cyber attacks on government systems, but a summary of that program declassified Tuesday provides more details of NSA’s role in a Homeland program known as Einstein.
The current version of the program is widely seen as providing meager protection against attack, but a new version being built will be more robust–largely because it’s rooted in NSA technology. The program is designed to look for indicators of cyber attacks by digging into all Internet communications, including the contents of emails, according to the declassified summary.
Homeland Security will then strip out identifying information and pass along data on new threats to NSA. It will also use threat information from NSA to better identify emerging cyber attacks. (Wall Street Journal)
Judges challenge Internet wiretap rules: 'Your argument makes no sense,' appeals judge tells FCC lawyer A U.S. appeals panel sharply challenged the Bush administration Friday over new rules making it easier for police and the FBI to wiretap Internet phone calls. A judge said the government’s courtroom arguments were “gobbledygook.”
The skepticism expressed so openly toward the administration’s case encouraged civil liberties and education groups that argued that the U.S. is improperly applying telephone-era rules to a new generation of Internet services.
“Your argument makes no sense,” U.S. Circuit Judge Harry T. Edwards told the lawyer for the Federal Communications Commission, Jacob Lewis. “When you go back to the office, have a big chuckle. I’m not missing this. This is ridiculous. Counsel!” (Associated Press)
TipSoft SMS TipSoft SMS is a Text-a-Tip application which allows tipsters to anonymously submit information to our participating law enforcement agencies, schools, universities and corporations. Many of these agencies are utilizing this application through their Crime Stoppers Program which is an excellent deployment choice, although not required. This secure application allows the tipster and the investigator to have two-way dialog while keeping the tipster's identity completely anonymous.
Short Message Service (SMS), often called text messaging, is a means of sending short messages to and from mobile phones. Want tipsters to send tips to you as text messages from their cell phones? If so, contact us.
TipSoft SMS is seamlessly integrated within our TipSoft Online web application and as a mobile application that runs securely on many PDA devices. All modules allow for the simple and secure reception and response to tips via text message. (TipSoft)
Terrorism, Crime Often Linked, Says Report: United States builds new partnerships to confront terrorism-crime nexus While recent years have seen a decrease in terrorist activity in the Western Hemisphere, a U.S. government report highlights a growing link between terrorists and transnational organized crime.
“Terrorist activities and support for terrorist infrastructure are funded by contributions from individuals, false charities and front organizations, but also, increasingly, through other illicit activities such as trafficking in persons, smuggling and narcotrafficking,” says the State Department’s 2007 Country Reports on Terrorism, released April 30.
Many of the 42 groups recognized as foreign terrorist organizations by the United States have criminal ties, says David Johnson, the top U.S. envoy specializing in confronting illegal drugs and organized crime. The most notable of these groups is the Revolutionary Armed Forces of Colombia (FARC), which has raised an estimated $60 million a year from narcotics trafficking, in addition to an active campaign of kidnappings for ransom. (America.gov)
Suspicious Activity & Behaviors Indicators: Homeland Security
It is important to the Dallas Police Department that citizens are alert, vigilant and report suspicious activity. The importance is as critical today as it was immediately after the attacks of September 11, 2001 on the United States. We ask citizens to be aware of their surroundings and report suspicious activity. A quick accurate description of events can make a big difference in both Criminal and Terrorism related investigations.
Possible Indicators of Suspicious behavior or Terrorist Activities:
* Unusual or extended interest in public utilities, large public gatherings, transportation centers, government buildings and other possible terrorist targets.
* Unusual requests for information, particularly about security or procedures for at-risk buildings.
* May try to have a “cover story” or appear ‘normal’ in their behavior such as portraying a student or tourist
* Identity Documents may be in various names
* May carry and use large amounts of cash
* Unusual rentals, purchases, deliveries, or thefts, particularly of poisonous or flammable chemicals, explosives, weapons or vehicles (including planes or boats).
* Multiple sightings of the same suspicious person, vehicle, or activity. (Dallas Police Department)
Google CEO: "We Know Where You Are. We Know Where You've Been. We Can More Or Less Know What You're Thinking About." Google CEO Eric Schmidt really has a knack for expressing relatively benign ideas in a way that makes him and his company look incredibly creepy.
The Atlantic has posted video of the full interview in which Eric talked about 'the creepy line', and it is chock full of unsettling sound bytes. In particular, he had the following to say on privacy: "With your permission, you give us more information about you, about your friends, and we can improve the quality of our searches. We don't need you to type at all. We know where you are. We know where you've been. We can more or less know what you're thinking about." (Business Insider)
Anti-Net Neutrality Bill Gets Leaked From Waxman’s Office Rep. Henry Waxman, Chairman of the House Committee on Energy and Commerce, the committe that oversees telecommunications was leaked on yesterday. Now we have a copy of Waxman’s plan to subvert Net Neutrality. Copy of the leaked Bill (in legalese) not yet submitted to congress. Leak Source is techdailydose.nationaljournal.com
Let’s say the internet is made of tubes. This bill gives the tube companies license to start selling premium tubes. Big shiny tubes. However anyone with the misfortune not to partner with the tube company will find themselves stuck in the smaller, collapsing tube system.
For example, Google partnered with the Verizon tube company to use it’s new tubes. Anyone trying to compete with Google, simply won’t be able to.
Waxman, is teaching Republicans a thing or two about whoring for Telecom money. Waxman’s bill would prevent the FCC from enforcing the most important part of net neutrality, that is, standard tube size. The corporate johns, pumping Waxman up with corporate cash, know that there is money to be made here. (Fire Dog Lake)
Sen. Inhofe: Basis for Senate's Ban on Drudge Report Was Bogus, We Encourage People to Visit Drudge Sen. Jim Inhofe (R.-Okla.) said there was no evidence that the Drudge Report had been responsible for viruses appearing on Senate computers and said he was encouraging people to read the Drudge Report. - “We would encourage people to continue to use Drudge. That’s a great source,” Sen. Jim Inhofe (R.-Okla.) told CNSNews.com Tuesday after his staff on the Environment and Public Works Committee received an email informing them that the Senate Sergeant at Arms believed the Drudge Report and whitepages.com had been responsible for infecting Senate computers with viruses and advising Senate personnel not to visit the Web sites.
When CNSNews.com asked Inhofe if there was any evidence that a virus had gotten into Senate computers as a result of people visiting Drudge, Inhofe said: “None, whatsoever.” Inhofe is the ranking Republican member of the Environment and Public Works Committee. (CNS News)
EXCLUSIVE-Cyber bill would give U.S. emergency powers * Tech companies skeptical of costs, requirements
* Senate majority leader pushing cybersecurity proposal
* Cybersecurity expert says bill is "pretty vanilla stuff" - Proposed cybersecurity legislation circulating on Capitol Hill would give the president the power to declare an emergency in the case of big online attacks and force some businesses to beef up their cyber defenses and submit to scrutiny.
The draft bill, a copy of which was obtained by Reuters, allows the president to declare an emergency if there is an imminent threat to the U.S. electrical grid or other critical infrastructure such as the water supply or financial network because of a cyber attack.
Industries, companies or portions of companies could be temporarily shut down, or be required to take other steps to address threats.
The emergency declaration would last for 30 days, unless the president renews it. It cannot last more than 90 days without action from Congress.
The draft is a combination of two cybersecurity bills which were merged into one at the urging of Senate Majority Leader Harry Reid. "It (the draft bill) is something that we hope to be able to pass before the end of the year, if we can," Reid spokeswoman Regan Lachapelle told Reuters. (Reuters)
FAIR USE NOTICE:
This site contains copyrighted material the use of which has not always been specifically
authorized by the copyright owner. We are making such material available in our efforts to advance
understanding of criminal justice, political, human rights, economic, democracy, scientific, and
social justice issues, etc. We believe this constitutes a 'fair use' of any such copyrighted material
as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107,
the material on this site is distributed without profit to those who have expressed a prior interest in
receiving the included information for research and educational purposes. For more information go to:
If you wish to use copyrighted material from this site for purposes of your own
that go beyond 'fair use', you must obtain permission from the copyright owner.
A bibliography for the alternative media. This site is a completely free research tool used to collect and organize as much important documentation as possible,
largely mainstream sources referenced by alternative media and interesting films.
Please collaborate by suggesting related document links here...
Legend: Interesting 112,279 Not Interesting 8,126 Add Another Tag/Keyword To Link Report Broken Link, See Backup Copy Test AltBib.Com Backup Copy