ACLU, EFF challenging US ‘secret’ court orders seeking Twitter data

Thursday, April 7, 2011

Late last month, the American Civil Liberties Union (ACLU) and Electronic Frontier Foundation (EFF) filed objections to the United States Government’s ‘secret’ attempts to obtain Twitter account information relating to WikiLeaks. The ACLU and EFF cite First and Fourth amendment issues as overriding reasons to overturn government attempts to keep their investigation secret; and, that with Birgitta Jonsdottir being an Icelandic Parliamentarian, the issue has serious international implications.

The case, titled “In the Matter of the 2703(d) Order Relating to Twitter Accounts: Wikileaks, Rop_G, IOERROR; and BirgittaJ“, has been in the EFF’s sights since late last year when they became aware of the US government’s attempts to investigate WikiLeaks-related communications using the popular microblogging service.

The key objective of this US government investigation is to obtain data for the prosecution of Bradley Manning, alleged to have supplied classified data to WikiLeaks. In addition to Manning’s Twitter account, and that of WikiLeaks (@wikileaks), the following three accounts are subject to the order: @ioerror, @birgittaj, and @rop_g. These, respectively, belong to Jacob Apelbaum, Birgitta Jonsdottir, and Rop Gonggrijp.

Birgitta is not the only non-US citizen with their Twitter account targeted by the US Government; Gonggrijp, a Dutch ‘ex-hacker’-turned-security-expert, was one of the founders of XS4ALL – the first Internet Service Provider in the Netherlands available to the public. He has worked on a mobile phone that can encrypt conversations, and proven that electronic voting systems can readily be hacked.

In early March, a Virginia magistrate judge ruled that the government could have the sought records, and neither the targeted users, or the public, could see documents submitted to justify data being passed to the government. The data sought is as follows:

  1. Personal contact information, including addresses
  2. Financial data, including credit card or bank account numbers
  3. Twitter account activity information, including the “date, time, length, and method of connections” plus the “source and destination Internet Protocol address(es)”
  4. Direct Message (DM) information, including the email addresses and IP addresses of everyone with whom the Parties have exchanged DMs

The order demands disclosure of absolutely all such data from November 1, 2009 for the targeted accounts.

The ACLU and EFF are not only challenging this, but demanding that all submissions made by the US government to justify the Twitter disclosure are made public, plus details of any other such cases which have been processed in secret.

Bradley Manning, at the time a specialist from Maryland enlisted with the United States Army’s 2nd Brigade, 10th Mountain Division, was arrested in June last year in connection with the leaking of classified combat video to WikiLeaks.

The leaked video footage, taken from a US helicopter gunship, showed the deaths of Reuters staff Saeed Chmagh and Namir Noor-Eldeen during a U.S. assault in Baghdad, Iraq. The wire agency unsuccessfully attempted to get the footage released via a Freedom of Information Act request in 2007.

When WikiLeaks released the video footage it directly contradicted the official line taken by the U.S. Army asserting that the deaths of the two Reuters staff were “collateral damage” in an attack on Iraqi insurgents. The radio chatter associated with the AH-64 Apache video indicated the helicopter crews had mistakenly identified the journalists’ equipment as weaponry.

The US government also claims Manning is linked to CableGate; the passing of around a quarter of a million classified diplomatic cables to WikiLeaks. Manning has been in detention since July last year; in December allegations of torture were made to the United Nations High Commissioner for Human Rights regarding the conditions under which he was and is being detained.

Reports last month that he must now sleep naked and attend role call at the U.S. Marine facility in Quantico in the same state, raised further concern over his detention conditions. Philip J. Crowley, at-the-time a State Department spokesman, remarked on this whilst speaking at Massachusetts Institute of Technology; describing the current treatment of Manning as “ridiculous and counterproductive and stupid”, Crowley was, as a consequence, put in the position of having to tender his resignation to Secretary of State Hillary Clinton.

Despite his native Australia finding, in December last year, that Assange’s WikiLeaks had not committed any criminal offences in their jurisdiction, the U.S. government has continued to make ongoing operations very difficult for the whistleblower website.

The result of the Australian Federal Police investigation left the country’s Prime Minister, Julia Gillard, having to retract a statement that WikiLeaks had acted “illegally”; instead, she characterised the site’s actions as “grossly irresponsible”.

Even with Australia finding no illegal activity on the part of WikiLeaks, and with founder Julian Assange facing extradition to Sweden, U.S. pressure sought to hobble WikiLeaks financially.

Based on a State Department letter, online payments site PayPal suspended WikiLeaks account in December. Their action was swiftly followed by Visa Europe and Mastercard ceasing to handle payments for WikiLeaks.

The online processing company, Datacell, threatened the two credit card giants with legal action over this. However, avenues of funding for the site were further curtailed when both Amazon.com and Swiss bank PostFinance joined the financial boycott of WikiLeaks.

Assange continues, to this day, to argue that his extradition to Sweden for questioning on alleged sexual offences is being orchestrated by the U.S. in an effort to discredit him, and thus WikiLeaks.

Wikinews consulted an IT and cryptography expert from the Belgian university which developed the current Advanced Encryption Standard; explaining modern communications, he stated: “Cryptography has developed to such a level that intercepting communications is no longer cost effective. That is, if any user uses the correct default settings, and makes sure that he/she is really connecting to Twitter it is highly unlikely that even the NSA can break the cryptography for a protocol such as SSL/TLS (used for https).”

Qualifying this, he commented that “the vulnerable parts of the communication are the end points.” To make his point, he cited the following quote from Gene Spafford: “Using encryption on the Internet is the equivalent of arranging an armored car to deliver credit card information from someone living in a cardboard box to someone living on a park bench.

Continuing, the Katholieke Universiteit Leuven (KUL) expert explained:

In the first place, the weak point is Twitter itself; the US government can go and ask for the data; companies such as Twitter and Google will typically store quite some information on their users, including IP addresses (it is known that Google deletes the last byte of the IP address after a few weeks, but it is not too hard for a motivated opponent to find out what this byte was).
In the second place, this is the computer of the user: by exploiting system weaknesses (with viruses, Trojan horses or backdoors in the operating system) a highly motivated opponent can enter your machine and record your keystrokes plus everything that is happening (e.g. the FBI is known to do this with the so-called Magic Lantern software). Such software is also commercially available, e.g. for a company to monitor its employees.
It would also be possible for a higly motivated opponent to play “man-in-the-middle”; that means that instead of having a secure connection to Twitter.com, you have a secure connection to the attacker’s server, who impersonates Twitter’s and then relays your information to Twitter. This requires tricks such as spoofing DNS (this is getting harder with DNSsec), or misleading the user (e.g. the user clicks on a link and connects to tw!tter.com or Twitter.c0m, which look very similar in a URL window as Twitter.com). It is clear that the US government is capable of using these kind of tricks; e.g., a company has been linked to the US government that was recognized as legitimate signer in the major browsers, so it would not be too large for them to sign a legitimate certificate for such a spoofing webserver; this means that the probability that a user would detect a problem would be very low.
As for traffic analysis (finding out who you are talking to rather than finding out what you are telling to whom), NSA and GCHQ are known to have access to lots of traffic (part of this is obtained via the UK-USA agreement). Even if one uses strong encryption, it is feasible for them to log the IP addresses and email addresses of all the parties you are connecting to. If necessary, they can even make routers re-route your traffic to their servers. In addition, the European Data Retention directive forces all operators to store such traffic data.
Whether other companies would have complied with such requests: this is very hard to tell. I believe however that it is very plausible that companies such as Google, Skype or Facebook would comply with such requests if they came from a government.
In summary: unless you go through great lengths to log through to several computers in multiple countries, you work in a clean virtual machine, you use private browser settings (don’t accept cookies, no plugins for Firefox, etc.) and use tools such as Tor, it is rather easy for any service provider to identify you.
Finally: I prefer not to be quoted on any sentences in which I make statements on the capabilities or actions of any particular government.

Wikinews also consulted French IT security researcher Stevens Le Blond on the issues surrounding the case, and the state-of-the-art in monitoring, and analysing, communications online. Le Blond, currently presenting a research paper on attacks on Tor to USENIX audiences in North America, responded via email:

Were the US Government to obtain the sought data, it would seem reasonable the NSA would handle further investigation. How would you expect them to exploit the data and expand on what they receive from Twitter?

  • Le Blond: My understanding is that the DOJ is requesting the following information: 1) Connection records and session times 2) IP addresses 3) e-mail addresses 4) banking info
By requesting 1) and 2) for Birgitta and other people involved with WikiLeaks (WL) since 2009, one could derive 2 main [pieces of] information.
First, he could tell the mobility of these people. Recent research in networking shows that you can map an IP address into a geographic location with a median error of 600 meters. So by looking at changes of IP addresses in time for a Twitter user, one could tell (or at least speculate about) where that person has been.
Second, by correlating locations of different people involved with WL in time, one could possibly derive their interactions and maybe even their level of involvement with WL. Whether it is possible to derive this information from 1) and 2) depends on how this people use Twitter. For example, do they log on Twitter often enough, long enough, and from enough places?
My research indicates that this is the case for other Internet services but I cannot tell whether it is the case for Twitter.
Note that even though IP logging, as done by Twitter, is similar to the logging done by GSM [mobile phone] operators, the major difference seems to be that Twitter is subject to US regulation, no matter the citizenship of its users. I find this rather disturbing.
Using 3), one could search for Birgitta on other Internet services, such as social networks, to find more information on her (e.g., hidden accounts). Recent research on privacy shows that people tend to use the same e-mail address to register an account on different social networks (even when they don’t want these accounts to be linked together). Obviously, one could then issue subpoenas for these accounts as well.
I do not have the expertise to comment on what could be done with 4).
((WN)) As I believe Jonsdottir to be involved in the Icelandic Modern Media Initiative (IMMI), what are the wider implications beyond the “WikiLeaks witchhunt”?
  • Le Blond: Personal data can be used to discredit, especially if the data is not public.

Having been alerted to the ongoing case through a joint press release by the ACLU and EFF, Wikinews sought clarification on the primary issues which the two non-profits saw as particularly important in challenging the U.S. Government over the ‘secret’ court orders. Rebecca Jeschke, Media Relations Director for the EFF, explained in more detail the points crucial to them, responding to a few questions from Wikinews on the case:

((WN)) As a worse-case, what precedents would be considered if this went to the Supreme Court?
  • Rebecca Jeschke: It’s extremely hard to know at this stage if this would go to the Supreme Court, and if it did, what would be at issue. However, some of the interesting questions about this case center on the rights of people around the world when they use US Internet services. This case questions the limits of US law enforcement, which may turn out to be very different from the limits in other countries.
((WN)) Since this is clearly a politicised attack on free speech with most chilling potential repercussions for the press, whistleblowers, and by-and-large anyone the relevant U.S. Government departments objects to the actions of, what action do you believe should be taken to protect free speech rights?
  • Jeschke: We believe that, except in very rare circumstances, the government should not be permitted to obtain information about individuals’ private Internet communications in secret. We also believe that Internet companies should, whenever possible, take steps to ensure their customers are notified about requests for information and have the opportunity to respond.
((WN)) Twitter via the web, in my experience, tends to use https:// connections. Are you aware of any possibility of the government cracking such connections? (I’m not up to date on the crypto arms race).
  • Jeschke: You don’t need to crack https, per se, to compromise its security. See this piece about fraudulent https certificates:
Iranian hackers obtain fraudulent httpsEFF website.
((WN)) And, do you believe that far, far more websites should – by default – employ https:// connections to protect people’s privacy?
  • Jeschke: We absolutely think that more websites should employ https! Here is a guide for site operators: (See external links, Ed.)

Finally, Wikinews approached the Icelandic politician, and WikiLeaks supporter, who has made this specific case a landmark in how the U.S. Government handles dealings with – supposedly – friendly governments and their elected representatives. A number of questions were posed, seeking the Icelandic Parliamentarian’s views:

((WN)) How did you feel when you were notified the US Government wanted your Twitter account, and message, details? Were you shocked?
  • Birgitta Jonsdottir: I felt angry but not shocked. I was expecting something like this to happen because of my involvement with WikiLeaks. My first reaction was to tweet about it.
((WN)) What do you believe is their reasoning in selecting you as a ‘target’?
  • Jonsdottir: It is quite clear to me that USA authorities are after Julian Assange and will use any means possible to get even with him. I think I am simply a pawn in a much larger context. I did of course both act as a spokesperson for WikiLeaks in relation to the Apache video and briefly for WikiLeaks, and I put my name to the video as a co-producer. I have not participated in any illegal activity and thus being a target doesn’t make me lose any sleep.
((WN)) Are you concerned that, as a Member of Parliament involved in the Icelandic Modern Media Initiative (IMMI), the US attempt to obtain your Twitter data is interfering with planned Icelandic government policy?
  • Jonsdottir: No
((WN)) In an earlier New York Times (NYT) article, you’re indicating there is nothing they can obtain about you that bothers you; but, how do you react to them wanting to know everyone you talk to?
  • Jonsdottir: It bothers me and according to top computer scientists the government should be required to obtain a search warrant to get our IP addresses from Twitter. I am, though, happy I am among the people DOJ is casting their nets around because of my parliamentary immunity; I have a greater protection then many other users and can use that immunity to raise the issue of lack of rights for those that use social media.
HAVE YOUR SAY
Do you believe the U.S. government should have the right to access data on foreign nationals using services such as Twitter?
Add or view comments
((WN)) The same NYT article describes you as a WikiLeaks supporter; is this still the case? What attracts you to their ‘radical transparency’?
  • Jonsdottir: I support the concept of WikiLeaks. While we don’t have a culture of protection for sources and whistleblowers we need sites like WikiLeaks. Plus, I think it is important to give WikiLeaks credit for raising awareness about in how bad shape freedom of information and expression is in our world and it is eroding at an alarming rate because of the fact that legal firms for corporations and corrupt politicians have understood the borderless nature of the legalities of the information flow online – we who feel it is important that people have access to information that should remain in the public domain need to step up our fight for those rights. WikiLeaks has played an important role in that context.I don’t support radical transparency – I understand that some things need to remain secret. It is the process of making things secret that needs to be both more transparent and in better consensus with nations.
((WN)) How do you think the Icelandic government would have reacted if it were tens of thousands of their diplomatic communications being leaked?
  • Jonsdottir: I am not sure – A lot of our dirty laundry has been aired via the USA cables – our diplomatic communications with USA were leaked in those cables, so far they have not stirred much debate nor shock. It is unlikely for tens of thousands of cables to leak from Iceland since we dont have the same influence or size as the USA, nor do we have a military.
((WN)) Your ambassador in the US has spoken to the Obama administration. Can you discuss any feedback from that? Do you have your party’s, and government’s, backing in challenging the ordered Twitter data release?
  • Jonsdottir: I have not had any feedback from that meeting, I did however receive a message from the DOJ via the USA ambassador in Iceland. The message stated three things: 1. I am free to travel to the USA. 2. If I would do so, I would not be a subject of involuntary interrogation. 3. I am not under criminal investigation. If this is indeed the reality I wonder why they are insisting on getting my personal details from Twitter. I want to stress that I understand the reasoning of trying to get to Assange through me, but I find it unacceptable since there is no foundation for criminal investigation against him. If WikiLeaks goes down, all the other media partners should go down at the same time. They all served similar roles. The way I see it is that WikiLeaks acted as the senior editor of material leaked to them. They could not by any means be considered a source. The source is the person that leaks the material to WikiLeaks. I am not sure if the media in our world understands how much is at stake for already shaky industry if WikiLeaks will carry on carrying the brunt of the attacks. I think it would be powerful if all the medias that have had access to WikiLeaks material would band together for their defence.
((WN)) Wikinews consulted a Belgian IT security expert who said it was most likely companies such as Facebook, Microsoft, and Google, would have complied with similar court orders *without advising the ‘targets*’. Does that disturb you?
  • Jonsdottir: This does disturb me for various reasons. The most obvious is that my emails are hosted at google/gmail and my search profile. I dont have anything to hide but it is important to note that many of the people that interact with me as a MP via both facebook and my various email accounts don’t always realize that there is no protection for them if they do so via those channels. I often get sensitive personal letters sent to me at facebook and gmail. In general most people are not aware of how little rights they have as users of social media. It is those of uttermost importance that those sites will create the legal disclaimers and agreements that state the most obvious rights we lose when we sign up to their services.
This exclusive interview features first-hand journalism by a Wikinews reporter. See the collaboration page for more details.
((WN)) Has there been any backlash within Iceland against US-based internet services in light of this? Do you expect such, or any increase in anti-American sentiments?
  • Jonsdottir: No, none what so ever. I dont think there is much anti-American sentiments in Iceland and I dont think this case will increase it. However I think it is important for everyone who does not live in the USA and uses social services to note that according to the ruling in my case, they dont have any protection of the 1st and 4th amendment, that only apply to USA citizens. Perhaps the legalities in relation to the borderless reality we live in online need to be upgraded in order for people to feel safe with using social media if it is hosted in the USA. Market tends to bend to simple rules.
((WN)) Does this make you more, or less, determined to see the IMMI succeed?
  • Jonsdottir: More. People have to realize that if we dont have freedom of information online we won’t have it offline. We have to wake up to the fact that our rights to access information that should be in the public domain is eroding while at the same time our rights as citizens online have now been undermined and we are only seen as consumers with consumers rights and in some cases our rights are less than of a product. This development needs to change and change fast before it is too late.

The U.S. Government continues to have issues internationally as a result of material passed to WikiLeaks, and subsequently published.

Within the past week, Ecuador has effectively declared the U.S. ambassador Heather Hodges persona-non-grata over corruption allegations brought to light in leaked cables. Asking the veteran diplomat to leave “as soon as possible”, the country may become the third in South America with no ambassadorial presence. Both Venezuela and Bolivia have no resident U.S. ambassador due to the two left-wing administrations believing the ejected diplomats were working with the opposition.

The U.S. State Department has cautioned Ecuador that a failure to speedily normalise diplomatic relations may jeapordise ongoing trade talks.

The United Kingdom is expected to press the Obama administration over the continuing detention of 23-year-old Manning, who also holds UK citizenship. British lawmakers are to discuss his ongoing detention conditions before again approaching the U.S. with their concerns that his solitary confinement, and treatment therein, is not acceptable.

The 22 charges brought against Manning are currently on hold whilst his fitness to stand trial is assessed.

Retrieved from “https://en.wikinews.org/w/index.php?title=ACLU,_EFF_challenging_US_%27secret%27_court_orders_seeking_Twitter_data&oldid=4515305”

Posted on June 2nd, 2021 by  |  No Comments »

I Want Hot Water And I Want It Now!

By Rick Chappo

Give me convenience or give me death. When this clich is applied to water in a home, we are talking about water heaters that produce hot water immediately.

There are certain types of water heaters that provide hot water only as it is needed. They dont have tanks holding and continually reheating water. This, of course, saves tons of money on utilities because the heating mechanism isnt going on and off all day while you arent even home. These masterful heaters are known as Demand Heaters, an appropriate name in our instant gratification society.

Demand water heaters do the job on the fly. When you turn on the tap for a hot bath, cold water travels into the heater, is instantly heated and then transferred to your tub. They run on either gas or electricity and are all the rage at the moment.

[youtube]http://www.youtube.com/watch?v=FktZEtC_NeM[/youtube]

As with anything so righteous as immediate hot water, there are some limitations. Demand heaters can only instantaneously heat and crank out so much water. If two tubs are being filled at the same time, you may have problems. Depending on the system, most of these heaters will kick out between two and five gallons a minute. That may sound like a lot, but it really isnt. A full bathtub can require as much as 35 gallons of water.

An easy way around the limitation problem is to install multiple heaters. You can buy relatively small units and put them in each bathroom as well as one for the kitchen. This should get around the limited water flow issue.

These water heaters are going to cost more to buy and install than typical heaters. The cost is more than offset, however, when you consider that you will save 30 to 50 percent on your water heating costs. Since these systems last for 20 years, you should more than recoup your purchase and installation costs.

In these modern times, we expect things to occur immediately. With a shower or bath, now we can get hot water on the fly.

About the Author: Rick Chapo is with

solarcompanies.com

a directory of solar energy companies. Visit

solarcompanies.com/articles

to read more solar power articles.

Source:

isnare.com

Permanent Link:

isnare.com/?aid=43476&ca=Home+Management

Posted on June 2nd, 2021 by  |  No Comments »

40 alleged drunken Santas accused of running amok

Monday, December 19, 2005File:Santarchy new zealand.jpg

The conduct by a group of ‘Santas’ making an unclear statement last Saturday is not appreciated in the business district of Auckland, New Zealand. The event, organized in the discussion forum of an online skateboard magazine, caused big media publicity.

Alex Dyer, spokesman for the group, stated that Santarchy in Auckland is part of a worldwide phenomenon. It is disputed if Santarchy is a protest against the commercialization of Christmas or not.

Auckland Central Police spokesperson Noreen Hegarty said to the press that the rampage began in the early part of the afternoon when men wearing ill-fitting Santa costumes threw beer bottles and urinated on cars from an overpass, then rushed through a central city park, overturning garbage bins, throwing bottles at passing cars and spraying graffiti on office buildings.

“They came in, said ‘Merry Christmas’ and then helped themselves,” said a convenience store staff member Changa Manakynda, according to local newspapers.

One writer using the pseudonym ‘Le_SigNagE’ on the Santarchy! (or also known as the Santacon) website commented, “… after all, this is what Christmas is really about… mindless vandalism and petty theft.”

Another writer who posted under the pseudonym Santy Claus said of the media coverage,”There was some major misreporting and Chinese whispers. Breaking bottles and urinating under a bridge, became throwing rocks at buses and urinating on cars from an overpass. The ‘organisers’ as they were, saw little in the way of crime other than one santa attempting to board a foreign vessel by scaling 20 metres along a rope 60 feet in the air. The difficulty and motor skills involved in this task alone should be a defense in itself of being ‘drunk’ and ‘disorderly’.”

Due to Santa’s reputation for integrity and his strict media policy, his sparse communication is mostly one-way: receiving lists from children with wishes for Christmas. It is difficult to get his comment about New Zealands skateboard interested ‘Santas’.

In 1994, the Cacophony Society staged the world’s very first SantaCon in San Francisco. Influenced by the surrealist movement Discordianism, and other subversive art currents.

Retrieved from “https://en.wikinews.org/w/index.php?title=40_alleged_drunken_Santas_accused_of_running_amok&oldid=3888395”

Posted on June 1st, 2021 by  |  No Comments »

Blizzard Entertainment’s victory over bnetd sealed in Appeals Court

Saturday, September 3, 2005

Blizzard Entertainment has won a federal ruling in the U.S. Court of Appeals against the programmers of bnetd, a software package that emulates Blizzard’s Battle.net service. The court reaffirmed the original judgement, given in October, that the Digital Millennium Copyright Act and click-through EULA’s prohibited the reverse engineering of Blizzard’s software in order to improve their playability. This was the first real test of the DMCA’s applicability.

Bnetd, released under the GNU General Public License, was created to enable users to play multiplayer games, bypassing Blizzard’s freely accessible Battle.net servers, which have sometimes been unreliable or slow for gamers. The software also disabled the CD-Key check which is present in Battle.net to prevent users of pirated copies from being able to connect to Blizzard’s servers. Offers by bnetd developers to incorporate Blizzard’s CD-Check system were declined.

The CD-Check system itself has faced controversy, with some users complaining it borders on breaching privacy in the same way as adware and other malevolent software. This is not confined to Blizzard: controversy occurred when Sony Online Entertainment’s EverQuest had a similar system which was later disabled due to complaints. Other games designed for network play are also known to have similar systems in place, the most prominent perhaps being Valve Software’s Steam system developed for Half-Life 2.

Blizzard has produced many popular titles such as Starcraft, World of Warcraft and the Diablo series.

Retrieved from “https://en.wikinews.org/w/index.php?title=Blizzard_Entertainment%27s_victory_over_bnetd_sealed_in_Appeals_Court&oldid=4592914”

Posted on June 1st, 2021 by  |  No Comments »

9/11 health care bill passed in US House of Representatives

Thursday, September 30, 2010

The United States House of Representatives on Wednesday approved US$7.4 billion to pay for the medical bills of workers sickened or injured by the September 11, 2001 attacks (9/11 attacks) on the World Trade Center in New York City, New York. The bill was passed by a vote of 268–160. Thirteen Republicans joined the Democrats in supporting the bill, while three Democrats opposed the measure. Similar legislation is pending in the US Senate.

“Let’s not have any more people die because of the attacks of 9/11,” said Representative Anthony Weiner, a Democrat from New York.

The bill, which will provide free health care to 9/11 workers, will be paid for by ending tax breaks for foreign corporations, was fiercely debated on the House floor, with Democratic backers of the bill proclaiming that they stood for 9/11 heroes and victims. Republicans against the bill argued that it was an entitlement program for New Yorkers and that it was another example of bloated government. “There is no excuse for this kind of legislation,” argued Texan Republican representative Lamar Smith.

The Republicans offered an alternative that would reduce funding for 9/11 workers and pay for the remainder by cutting parts of a major health care bill passed earlier this year. This measure failed 185–244.

Retrieved from “https://en.wikinews.org/w/index.php?title=9/11_health_care_bill_passed_in_US_House_of_Representatives&oldid=4512481”

Posted on June 1st, 2021 by  |  No Comments »

A Review Of Timothy Sykes’ Penny Stock Millionaire

A Review of Timothy Sykes’ Penny Stock Millionaire

by

Tom Kelm

Timothy Sykes is a name that may glean a myriad of reactions from many people. He is often a well known expect on penny stocks. He first captured the attention of the financial world way back in the late 1990s when he astounded everyone by turning $12,000 to an astounding $1.65 million. By 2003, he created a fund management which dramatically failed after which in a while was linked with numerous successful developments.

[youtube]http://www.youtube.com/watch?v=vVaSRwaqfwE[/youtube]

Today he has an investment website where he discusses penny stocks and trading. His name and his obvious expertise on the subject is what individuals are depending on. It is usually a fact that he has successfully helped out a whole lot of people whose referrals have helped spud the word how the penny stock millionaire program actually works very well. The Penny Stock Millionaire is simple enough to understand by beginners who’ve no prior background in investing. This is the best way for them to learn how to generate good investments. The program is incredibly helpful to many, beginners or experienced traders, as a result of two things: 1. The chance to undertake exactly as Sykes did when he turned the $12,000 into $1.65 million in just a little over four years simply by trading in the penny stocks; plus 2. That Sykes has proven beyond a reasonable doubt that his techniques work and is recognized by media like CNN, Business Week, The New York Times and Marketwatch. Those who register in the program of Timothy Sykes will soon see how to simply get the information needed and how to make use of the knowledge correctly which can give them the appropriate guidance on making a trade. There are five winning formulas in the program that will be thoroughly discussed and demonstrated with the intention that it could be applied to real trading experience, something the members are happy to say all worked for them. Some initially thought how the Penny Stocks Millionaire program sounded much like a scam, but after all the years that it could have been praised and plenty more trying to get into the program just shows everyone that it isn’t a scam. Maybe you’re thinking of investing and stocks and know you would need to remember of everything there is to know concerning the subject, then the best site to go to can be the web site of Timothy Sykes, considered as one of the best out there. There are numerous penny stock millionaire reviews online which should be read to find out more in regards to the person behind it and why he is the most recommended.

Millionaire penny stock trader Tim Sykes has just released a FREE new video revealing exactly how he repeatedly picks tiny stocks that return fast double digit gains and

Penny Stock Millionaire Review

. Timothy Sykes has used the penny stock trading formula and

Penny Stock Millionaire Bonus

revealed on this video to make millions of dollars for himself and his subscribers.

Article Source:

A Review of Timothy Sykes’ Penny Stock Millionaire

Posted on June 1st, 2021 by  |  No Comments »

Canada to legalise marijuana to ‘make it more difficult for kids to access’

Sunday, April 16, 2017

In order to put the cannabis drug (marijuana) out of reach of minors, the Canadian federal government announced a bill to legalise cannabis for the age group of eighteen and above, on Thursday. The bill would allow adults to possess cannabis publicly, previously a criminal offence.

Canada’s health minister Jane Philpott tweeted, “Today we tabled new legislation to legalise, strictly regulate, and restrict access to cannabis. Our goal: keep it out of the hands of youth, and profits out of the hands of criminals.” ((fr))French language: ?Ajd nous avons déposé un nouveau projet de loi pour légaliser le cannabis, le réglementer de manière stricte et en restreindre l’accès. Notre objectif: garder le cannabis hors de la portée des jeunes, & les profits hors des mains des criminels. The Canadian government, via their official website, explained cannabis is available illegally, and their measures to stop it did not work. Criminal organisations are making money selling cannabis. Under-aged people can obtain the drug easily; they said, “it is easier for our kids to buy cannabis than cigarettes.”

The bill allows provinces and territories to set the age limit above eighteen. In order to prevent criminal gangs from making a profit, selling the drug needs a license permitting its sale. Adults can purchase the drug online from a licensed producer if a retail shop is not available in the province.

Adults can carry up to 30 g (slightly over an ounce) of cannabis and grow at most four cannabis plants at home, for personal use. The plants should be no taller than a metre, the bill proposed. Selling cannabis to minors would be a specific criminal offence.

The legislation requires parliamentary approval and royal assent. If passed, the bill would be under effect by July 2018, the government said. Health and safety experts and law enforcement were consulted before proposing the legislation. Except for medical purposes, possession of the drug remains illegal until the bill is passed. Regardless of the status of the bill, import and export of the drug would be illegal.

Previously when the government increased the taxes on cigarettes to discourage citizens from smoking, a black market for cigarettes developed.

Along with legalising cannabis, the bill would also permit the police officials to use tools like oral fluid drug screeners to detect if drivers are under the influence of the drug. Zero tolerance against drivers under influence of drugs is proposed. The government would also implement a public awareness campaign on the perils of driving under the influence of drugs.

The government still working on the restrictions. Lawmaker and former police chief Bill Blair said, “We do accept that more important work remains to be done.” If the bill is passed, Canada would be the second country to legalise cannabis completely. Uruguay is the first. Some countries, such as Germany, allow medical use of cannabis, but recreational use is prohibited.

Retrieved from “https://en.wikinews.org/w/index.php?title=Canada_to_legalise_marijuana_to_%27make_it_more_difficult_for_kids_to_access%27&oldid=4608651”

Posted on May 31st, 2021 by  |  No Comments »

Indian Railway: all-women crew steers Tippu Express ahead of International Women’s Day

Friday, March 6, 2020

Yesterday, an all-women crew ran the Mysuru–Bengaluru Tippu Express in the Indian state of Karnataka. The state-run Indian Railways launched this event ahead of International Women’s Day, for promoting gender equality at work places.

B Shiva Parvathi was running the train as loco pilot (locomotive pilot), and 22-year-old Rangoli Patil was her loco co-pilot. The train left Mysore Junction railway station at 11:30 am IST (0600 UTC), covering a distance of 139km to reach KSR Bangalore station. The train had banners on it which mentioned “International Women’s Day Celebration”.

Speaking to newspaper Star of Mysore, B Shiva Parvathi said, “It is a proud moment for me to be steering this train today along with my Loco Pilot Rangoli and the all-women staff”. Mysore Divisional Railway Manager Aparna Garg told Wikinews only 10% of the employees in the Mysore Division were women, which constitutes about 650 female employees.

Mysore district comes under the South West Railway (SWR) branch of the Indian Railway. Mysore Division of the SWR celebration of the Women’s day started on March 1, and is planned till March 10. Various activities are being conducted in this period, including health check-ups, yoga, sports competition and trekking, newspaper The Hindu reported.

“The theme ‘Equal for All’ is an effort of the Railways to promote more women workforce and empower them. Women of today are no less to any men, be it in any field. I hope through such initiatives, more number of women are motivated to take up jobs in their respective fields of interest”, Garg told Star of Mysore.

  • 1
  • 2
  • 3

Retrieved from “https://en.wikinews.org/w/index.php?title=Indian_Railway:_all-women_crew_steers_Tippu_Express_ahead_of_International_Women%27s_Day&oldid=4552911”

Posted on May 31st, 2021 by  |  No Comments »

Grace Bowman withdraws from 2012 Paralympic Dressage Individual Championship Test – Grade II event

Saturday, September 1, 2012

London, England — Earlier today at the Greenwich Park, riding third in the Paralympic Dressage Individual Championship Test – Grade II, Grace Bowman withdrew mid-ride after a series of low scores during the event. Bowman was Australia’s only rider in this event.

Prior to entering the competition ring, Bowman’s horse Kirby Park Joy was in poor form, with Bowman unable to get control of her, showing little harmony between horse and rider. With a score of 70% or better expected for the best competitors, Bowman started with 48.0% on the halt salute, 44% on the half circle and 48.7% on the medium trot. Things did not get better as the ride continued, with Bowman earning a 45.8% in the reinback, 39.8% for the circle R 8m and 37.3% for the circle L 8m. Shortly after this, Bowman signaled to the judges her desire to withdraw from the ride. In the competition ring, she was frequently pulling on the reins as Kirby Park Joy was frequently tossing her head. According to a Dutch equestrian journalist, her horse was not agreeing with her from the start. Bowman left the field of play in tears.

Bowman had said this event was her favorite, telling the media Thursday following her ride in the team competition, “I enjoy the individual test best of all, but don’t like the freestyle — it’s my least favourite.”

Kirby Park Joy has had problems in London, with Bowman telling the media, “She was a bit tense and didn’t like the big scoreboard ahead of us, so our score was much lower than usual.” Australian Team Manager Sally Francis confirmed this, saying in a media release, “Grace’s horse has had some issues with the sight screen in the arena. […] Grace did well to control her during the team test and finish [Thursday]. We’ve been working very closely with her horse since to try to alleviate any stress it might be under.”

It isn’t the first time Bowman has had horse problems at the Paralympics; her horse at the 2008 Summer Paralympics had similar issues.

Bowman’s London Paralympic campaign has come to an end without a medal, after having finished 21st Thursday in the Team Test – Grade II event.

Retrieved from “https://en.wikinews.org/w/index.php?title=Grace_Bowman_withdraws_from_2012_Paralympic_Dressage_Individual_Championship_Test_-_Grade_II_event&oldid=1616465”

Posted on May 30th, 2021 by  |  No Comments »

What Is Mobile Storage?}

What Is Mobile Storage?

by

Lee Dobbins –

Mobile Storage is a new and innovative way instead of using traditional self storage. What happens is a mobile storage company (just do a search of the internet by keying in mobile storage company) and they will deliver a storage container directly to your location.

Once the container has been delivered you then load it up and lock the container once completely loaded. You then contact the company who delivered the container in the first place and they will arrange to have it collected and delivered to their secure, climate controlled warehouse for safekeeping.

However, if you need to have access to the container at any time then all you need do is visit the warehouse or arrange for the container to be delivered back to your location.

Many people who use self storage want the convenience and accessibility as well as a reasonable price for using the facilities. With this type of storage no longer does the customer have to rent a truck, pack it and drive it across town to a self storage facility and then have to unload the truck before returning it to the rental company. All a customer needs to do using mobile storage is make a call to the company they want to use and

arrange for one of their containers to be delivered directly to their location.

This type of mobile storage seems to becoming more popular with people who are looking for ways to store items that they no longer want at home and thus make more space. We live in a world today where more and more people like to live more ordered and less cluttered lives and using a mobile storage container can help us achieve this.

Although mobile storage containers come in a variety of sizes the most common one that seems to be used by the mobile storage industry is 5 ft x 8ft x 7ft model which has a door at the front. This seems the ideal size container as it gives people enough space to store a couch inside if they wish and they can be stacked 4 high in the warehouse. A container this size is big enough to hold the contents of 1 room of furniture of 50 boxes of files.

The cost of these containers depends on where you are located and the cost of a mobile storage container can range from between $50 to $85 per month to rent. Although these prices may seem a bit excessive many people opt for this type of storage as one of it biggest benefits is not having to load and unload everything as well as not having to pay truck rental charges as well.

So when you are thinking about having a clear out of your home and want to keep items but dont want to take up essential space in your house then think about giving mobile storage a go.

Lee Dobbins writes for

moving-and-more.com

where you can learn more about moving as well as other household topics such as

household storage and moving storage

.

Article Source:

What Is Mobile Storage?}

Posted on May 30th, 2021 by  |  No Comments »