No Agenda Episode 611 - "Let's Get Social!"
by Adam Curry
- Direct [link] to the mp3 file
- New: Directory Archive of Shownotes (includes all audio and video assets used) nashownotes.com
- Executive Producers Shows 610/611: Sir Arthur Kesler, Sir Michael of Hemlock, Black Knight and Baron Barry Hanna, Ryan Beck, Nick Eizmendi, Riley Kimball, Sir Anonymous of the ADF, Stephen Marsh-Moscow,
- Associate Executive Producers Shows 610/611: Geisha Licker, Paul Tittel, Sir Hank Baron of Kew Gardens & Forrest Hills, Andrew Kirby
- Become a member of the 612 Club, support the show here
- Knighthoods: Arthur Kesler, Michael Leary, Andrew Holcomb, Anonymous from Aurora CO
- Titles: Sir Hank -> Baron of Kew Gardens & Forrest Hills, Dame Sam Menner -> Baronette
- New: Directory Archive of Shownotes (includes all audio and video assets used) nashownotes.com
-
- TODAY
-
- Cancun Travel
-
- Arrival at Cancun:
- > Customs agent spoke dutch
-
- > Joked about learning from pornographoc movies
- >> Maybe he thought we were Boobi Eden and husband?
-
- Departure
- > Please keep your shoes on!
-
- Arrival Houston
- > Why keep your maiden name? Your culture?
- > Fat fuck > "I have a connecting flight"
- > "As of right now, you have nothing"
- > Making rude comments about women in Spanish
- >> 2 flight attendants: "which ine will you take?"
-
- Right into the rude TSA line for internal flight
- > everything out of your pockets
-
- Presidential Proclamation -- National Park Week, 2014
- Office of the Press Secretary
- BY THE PRESIDENT OF THE UNITED STATES OF AMERICA
- To honor America's natural beauty and cultural heritage, the National Park Service will offer free admission this weekend. This celebration opens opportunities to take in the majesty of canyons, redwoods, and geysers -- to learn the history of Civil War battles and Civil Rights marches. During National Park Week, I encourage Americans to take advantage of the chance to rediscover the great outdoors and reconnect with the American story.
- This year marks a significant milestone in America's drive to preserve precious historic sites -- the 30th anniversary of the first National Heritage Area. For decades, the National Heritage Areas Program has enabled our Nation to set aside places that define our shared history and that will help future generations understand what it means to be American.
- During my time as President, I have been proud to build on this tradition by establishing 10 new National Monuments. These sites honor American heroes from Harriet Tubman to Cesar Chavez. They conserve the diverse wildlife and rugged landscapes that reflect our character as a people. And just as our parks nourish our spirits, they bolster our livelihoods, attracting tourists to communities across our country and bringing customers to local businesses. For every dollar we invest in our National Parks, America generates 10 dollars in economic value.
- This week, as we recommit to conserving these cherished lands, let us build new memories, take on new adventures, and experience all they have to offer. To find a National Park in your area, visit www.NPS.gov.
- NOW, THEREFORE, I, BARACK OBAMA, President of the United States of America, by virtue of the authority vested in me by the Constitution and the laws of the United States, do hereby proclaim April 19 through April 27, 2014, as National Park Week. I encourage all Americans to visit their National Parks and be reminded of these unique blessings we share as a Nation.
- IN WITNESS WHEREOF, I have hereunto set my hand this eighteenth day of April, in the year of our Lord two thousand fourteen, and of the Independence of the United States of America the two hundred and thirty-eighth.
-
- Presidential Proclamation -- Earth Day, 2014
- Office of the Press Secretary
- BY THE PRESIDENT OF THE UNITED STATES OF AMERICA
- Over four decades ago, Americans from all walks of life came together to tackle a shared challenge. Pollution damaged our health and livelihoods -- from children swimming in contaminated streams to workers exposed to dangerous chemicals to city residents living under a thick haze of smog. The first Earth Day was a call to action for every citizen, every family, and every public official. It gave voice to the conservation movement, led to the creation of the Environmental Protection Agency, and pushed our Nation to adopt landmark laws on clean air and water. This Earth Day, we remember that when Americans unite in common purpose, we can overcome any obstacle.
- Today, we face another problem that threatens us all. The overwhelming judgment of science tells us that climate change is altering our planet in ways that will have profound impacts on all of humankind. Already, longer wildfire seasons put first responders at greater risk. Farmers must cope with increased soil erosion following heavy downpours and greater stresses from weeds, plant diseases, and insect pests. Increasingly severe weather patterns strain infrastructure and damage our communities, especially low-income communities, which are disproportionately vulnerable and have few resources to prepare. The consequences of climate change will only grow more dire in the years to come.
- That is why, last year, I took executive action to prepare our Nation for the impacts of climate change. As my Administration works to build a more resilient country, we also remain committed to averting the most catastrophic effects. Since I took office, America has increased the electricity it produces from solar energy by more than tenfold, tripled the electricity it generates from wind energy, and brought carbon pollution to its lowest levels in nearly two decades. In the international community, we are working with our partners to reduce greenhouse gas emissions around the globe. Along with States, utilities, health groups, and advocates, we will develop commonsense and achievable carbon pollution standards for our biggest pollution source -- power plants.
- We are also taking on environmental challenges by increasing fuel efficiency, restoring public lands, and curbing emissions of mercury and other toxic chemicals. We are safeguarding the water our families drink and the waterways and oceans that sustain our livelihoods. This February, we proposed new standards to protect farm workers from dangerous pesticides. And because caring for our planet requires commitment from all of us, we are engaging organizations, businesses, and individuals in these efforts.
- As we mark this observance, let us reflect on the mission of the first Earth Day and recall our power to forge a cleaner, healthier future. Let us accept our responsibilities to future generations and meet today's tests with the same energy, passion, and sense of purpose.
- NOW, THEREFORE, I, BARACK OBAMA, President of the United States of America, by virtue of the authority vested in me by the Constitution and the laws of the United States, do hereby proclaim April 22, 2014, as Earth Day. I encourage all Americans to participate in programs and activities that will protect our environment and contribute to a healthy, sustainable future.
- IN WITNESS WHEREOF, I have hereunto set my hand this twenty-first day of April, in the year of our Lord two thousand fourteen, and of the Independence of the United States of America the two hundred and thirty-eighth.
-
- Obama signs Ted Cruz bill into law, but says he won't enforce it | Mobile Washington Examiner
- President Obama on Friday signed into law a bill authored by Texas Republican Sen. Ted Cruz that would bar an Iranian diplomat from entering the United States, but immediately issued a statement saying he won't enforce it. (AP Photo)
- President Obama on Friday signed into law a bill authored by Texas Republican Sen. Ted Cruz that would bar an Iranian diplomat from entering the United States, but immediately issued a statement saying he won't enforce it.
- Obama decided to treat the law as mere advice. "Acts of espionage and terrorism against the United States and our allies are unquestionably problems of the utmost gravity, and I share the Congress's concern that individuals who have engaged in such activity may use the cover of diplomacy to gain access to our Nation," Obama said in his signing statement.
- "Nevertheless, as President [George H.W.] Bush also observed, "curtailing by statute my constitutional discretion to receive or reject ambassadors is neither a permissible nor a practical solution." I shall therefore continue to treat section 407, as originally enacted and as amended by S. 2195, as advisory in circumstances in which it would interfere with the exercise of this discretion."
- Obama frequently criticized President George W. Bush for such signing statements during his 2008 campaign. ''Congress's job is to pass legislation," he said, as The Daily Beast recalled. "The president can veto it or he can sign it.''
- ''It is unconscionable that, in the name of international diplomatic protocol, the United States would be forced to host a foreign national who showed a brutal disregard for the status of our diplomats when they were stationed in his country,'' Cruz said when he introduced the bill.
- The legislation was directed at Hamid Abutalebi, whom Iranian President Hassan Rouhani tapped as U.N. ambassador, because of his alleged role in the 1979 student takeover of the U.S. Embassy in Tehran, in which 52 Americans were held hostage for 444 days. Abutalebi insists his role was limited to translation and negotiation.
- Iran has said it will not withdraw his name, and has asked the U.N. to investigate the U.S. visa denial.
-
- 16-year-old stowaway survives in wheel well of Hawaiian Airlines flight | KHON2
- Related ContentAviation experts call it a miracle.
- The FBI says a 16-year-old boy stowed away in the wheel well of a flight from California to Hawaii, and survived. The boy is expected to fully recover.
- Photo: Chris Sugidono, The Maui News
- Hawaiian Airlines Flight 45 left San Jose at 7:50 a.m. this morning, and arrived on Maui at 10:31 p.m. five-and-a-half hours later.
- The FBI says security video verifies the teen hopped a fence at the Norman Y. Mineta San Jose International Airport to get to the Hawaiian Airlines Boeing 767 aircraft this morning.
- The teen, who is from Santa Clara, had run away from his family.
- Aviation experts say the teen put himself at great risk.
- Airlines analyst Peter Forman:
- ''The odds of a person surviving that long of a flight at that altitude are very remote, actually. I mean, you are talking about altitudes that are well above the altitude of Mt. Everest. And temperatures that can reach 40 degrees below zero. A lot of people would only have useful consciousness for a minute or two at that altitude. For somebody to survive multiple hours with that lack of oxygen and that cold is just miraculous. I've never heard of anything like that before.''
- The boy told authorities he passed out as the plane ascended, then regained consciousness about an hour before landing.
- Hawaiian Airlines says their workers at Kahului Airport noticed the teen on the ramp after the flight arrived and immediately notified airport security.
- The FBI says he was dazed and confused, with no identification on him.
- Hawaiian Airlines said in a statement:
- ''Our primary concern now is for the wellbeing of the boy, who is exceptionally lucky to have survived. Hawaiian and its contractors responsible for handling our aircraft in San Jose are ready to assist various government agencies in their investigation of this incident.''
- The FBI says no federal charges will be filed against the teen.
- He was taken to Maui Memorial Medical Center to get checked out, and he has been turned over to Child Protective Services.
- Authorities are not releasing his name because he is a minor.
- Wheel well is roomier than coach
-
- John's email aliases and PORN filters.
-
- Replied to email with Your word FUCK in it
- Message contains blacklisted
- porn string 550-((?i)\bfuck\b) - X=pascal H=apollo.curry.com
-
- From producer about Dr Oz bullcrap setup on sunbirned nipples
- Thought you might get amusement out of this. The message I just sent you
- and John regarding the Dr. Oz show was rejected because of a blacklisted
- porn string. Guess the word "nipples" is now porn and no longer a medical
-
- We MUST stop what is happening - Isolation of Russia
- Have we not learned from Iraq?
-
- Police State
-
- WH Counterterror Chief: Parents Need to Watch for 'Sudden Personality Changes in Their Children' | CNS News
- White House Homeland Security and Counterterrorism Adviser Lisa Monaco with President Barack Obama in the Oval Office. (White House photo/Pete Souza)
- (CNSNews.com) - In a speech delivered at Harvard University's John F. Kennedy School of Government on Tuesday evening, White House Homeland Security and Counterterrorism Adviser Lisa Monaco said it could help prevent terrorism if parents watched for ''sudden personality changes in their children at home.''
- ''President Obama has been laser-focused on making sure we use all the elements of our national power to protect Americans, including developing the first government-wide strategy to prevent violent extremism in the United States,'' said Monaco, in a transcription posted by the White House.
- ''At the same time, we recognize that there are limits to what the federal government can do,'' said Monaco. ''So we must rely on the partnership of those who are most familiar with the local risks, those who are in the best position to take action'--local communities.
- ''Local communities are the most powerful asset we have in the struggle against violence and violent extremism,'' she said. ''We've crunched the data on this. In the more than 80 percent of cases involving homegrown violent extremists, people in the community'--whether peers or family members or authority figures or even strangers'--had observed warning signs a person was becoming radicalized to violence. But more than half of those community members downplayed or dismissed their observations without intervening.
- ''So it's not that the clues weren't there, it's that they weren't understood well enough to be seen as the indicators of a serious problem,'' said Monaco.
- ''What kinds of behaviors are we talking about?'' she said. ''For the most part, they're not related directly to plotting attacks. They're more subtle. For instance, parents might see sudden personality changes in their children at home'--becoming confrontational. Religious leaders might notice unexpected clashes over ideological differences. Teachers might hear a student expressing an interest in traveling to a conflict zone overseas. Or friends might notice a new interest in watching or sharing violent material.
- ''The government is rarely in a position to observe these early signals, so we need to do more to help communities understand the warning signs, and then work together to intervene before an incident can occur, while always respecting our core commitment to protecting privacy and civil liberties,'' said Monaco. ''During the past several years, that's what we've attempted to do."
-
- Lisa Monaco - Wikipedia, the free encyclopedia
- Lisa Oudens Monaco (born February 25, 1968) is an American federal prosecutor who currently serves as the Assistant to the President for Homeland Security and Counterterrorism to PresidentBarack Obama; the chief counterterrorism advisor to the President, and a statutory member of the United States Homeland Security Council.
- Monaco previously served as the Assistant Attorney General for National Security from 2011 to 2013, and as the Principal Deputy Assistant Attorney General in the Justice Department.
- Early life, education, and career[edit]Born in Boston, Massachusetts, to parents Anthony and Mary Lou Monaco, she was raised in Newton, Massachusetts, and graduated from The Winsor School in 1987.[1][2][3]
- Monaco attended Harvard University, graduating with her Bachelor of Artsmagna cum laude in American History and Literature, in 1990.[4] After graduating, she worked as a research associate for The Wilson Quarterly at the Woodrow Wilson International Center for Scholars from 1990 to 1991, and as a senior associate for the Health Care Advisory Board, a healthcare advisory group, from 1991 to 1992.[5] She worked for as a research coordinator for the United States Senate Committee on the Judiciary from 1992 to 1994 under then chairman Joe Biden, where she worked on the Violence Against Women Act;[6] before enrolling into the University of Chicago Law School where she was the Editor-in-Chief of the University of Chicago Law School Roundtable.[7] During her time at the University of Chicago, she briefly worked as an intern for District Court Judge Wendell P. Gardner, Jr., on the D.C. Superior Court and as an intern for the United States Department of Justice in 1995.[8] She worked as an intern for the White House Office of Legislative Affairs in 1996, and entered private practice as a summer associate for the law firm Hogan and Hartson, LLP, before receiving her Juris Doctor in 1997.[9] She was admitted to the New York City Bar Association in 1998.
- United States Department of Justice[edit]From 1997 to 1998, Monaco worked as a law clerk for the Honorable Jane Richards Roth on the United States Court of Appeals for the Third Circuit, and as the Counsel to then Attorney GeneralJanet Reno from 1998 to 2001.[10] From 2001 to 2007, she worked in the United States Attorney's office for the District of Columbia, where she was as an assistant prosecuting attorney, and was appointed as a special prosecutor, co-leading the trail counsel for the Justice Department's Enron Task Force, from 2004 to 2006.[11] Monaco received Department of Justice Awards for Special Achievement in 2002, 2003 and 2005.[12] After the end of the Enron trial and the Justice Department's disbandment of the special task force, Monaco worked as a special counselor to FBI DirectorRobert Mueller. She was later chosen by Mueller to work as a full-time counselor and as his Deputy Chief of Staff from May to September 2007,[13] when she was appointed by Muller as his Chief of Staff; a position she held until January 2009.[7]
- In 2009, Monaco was appointed by United States Deputy Attorney GeneralDavid W. Ogden to serve as Principal Associate Deputy Attorney General; the top aide to the Deputy Attorney General.[14] After Ogden left in February 2010, Monaco was appointed by PresidentBarack Obama to be the Assistant Attorney General for National Security; leading the Justice Department division which oversees major counterterrorism and espionage cases, and authorizes the use of FISA warrants.[15] Monaco has been involved in meetings and the failed attempts to close down the Guantanamo Bay detention camp.[16][17]
- Counterterrorism advisor[edit]On January 25, 2013, President Barack Obama announced he would name Monaco to be his Assistant to the President for Homeland Security and Counterterrorism, the chief counterterrorism advisor to the President.[18] Monaco succeeded John Brennan, who was nominated by Obama to become the Director of the Central Intelligence Agency.[19] Monaco took office on March 8, 2013, and became a statutory member of the United States Homeland Security Council.
- On May 23, 2013, Daniel Klaidman, writing for the Daily Beast reported a "White House official" confirmed Monaco would "handle day-to-day responsibilities for Guantanamo."[20]
- References[edit]^United States Senate Select Committee on Intelligence (May 17, 2011). "NOMINATION OF LISA O. MONACO TO BE ASSISTANT ATTORNEY GENERAL FOR NATIONAL SECURITY, DEPARTMENT OF JUSTICE". intelligence.senate.gov. ^The Winsor School (March 8, 2013). "Alumna Selected for Top White House Counterterrorism Post". winsor.edu. ^Matt Viser (2013-04-19). "Newton native in key counterterrorism job". Boston Globe. Archived from the original on 2013-05-25. "Monaco's parents, Mary Lou and Anthony Monaco, still live in Newton. She attended Winsor School, a prestigious all-girls prep school in Boston known for its ''Ivy pipeline.''" ^Practising Law Institute. "Lisa O. Monaco U.S. Department of Justice". pli.edu. Retrieved March 9, 2013. ^Andrew Ramonas (May 5, 2011). "Meet Lisa Monaco". mainjustice.com. ^University of Maryland (May 1993). "VIOLENCE AGAINST WOMEN THE RESPONSE TO RAPE: DETOURS ON THE ROAD TO EQUAL JUSTICE Prepared by the Majority Staff of the Senate Judiciary Committee". mith.umd.edu. Retrieved March 9, 2013. ^ ab"Lisa Monaco Deputy National Security Advisor for Homeland Security and Counterterrorism (upon John Brennan's confirmation as CIA director)". washingtonpost.com. Retrieved March 9, 2013. ^"Posts Tagged 'National Security Division'Meet Lisa Monaco". mainjustice.com. May 5, 2011. Retrieved March 9, 2013. ^"Lisa Monaco '97 Nominated Deputy National Security Advisor for Homeland Security and Counterterrorism". law.uchicago.edu. January 28, 2013. ^Department of Justice Office of Public Affairs (June 28, 2011). "Attorney General Eric Holder Welcomes Confirmation of James Cole, Lisa Monaco and Virginia Seitz". justice.gov. ^"BIOGRAPHICAL INFORMATION ON 2 TOP OBAMA AIDES". bigstory.ap.org. ^"Nomination of James Cole to be Deputy Attorney General". fas.org. June 28, 2011. ^Federal Bureau of Investigation (March 20, 2007). "Lisa O. Monaco Named Deputy Chief of Staff and Counselor to FBI Director Mueller". fbi.gov. Retrieved March 9, 2013. ^Charlie Savage (March 17, 2011). "Obama Acts on a Key Vacancy at Justice". nytimes.com. Retrieved March 9, 2013. ^Evan Perez (March 17, 2011). "Obama Nominates New National Security Prosecutor". Wall Street Journal. Retrieved March 9, 2013. ^Frank James (January 3, 2009). "Congress' Dems Still Irked By Obama On Gitmo, Tribunals". npr.org. Retrieved March 9, 2013. ^Dina Temple-Raston (February 3, 2012). "Justice Department Lawyers Play Role In Guantanamo". npr.org. Retrieved March 9, 2013. ^Carrie Johnson, Mark Memmott (January 25, 2013). "Obama Names New Chief Of Staff, New Counterterrorism Adviser". npr.org. Retrieved March 9, 2013. ^Adam Aigner-Treworgy (January 25, 2013). "Big shoes to fill: Replacing John Brennan". cnn.com. Retrieved March 9, 2013. ^Daniel Klaidman (2013-05-23). "All In on Gitmo: Obama Returns to Fight for a Shutdown". Daily Beast. Archived from the original on 2013-05-25. "Wilner and his allies may soon get some good news. A White House official confirmed to The Daily Beast that Obama has asked his chief counterterrorism adviser, Lisa Monaco, to handle the day-to-day responsibilities for Guantanamo. Monaco has daily access to the president and clout within the national-security bureaucracy. She also has deep experience dealing with the Guantanamo conundrum. When she first joined the administration in 2009 as a senior Justice Department official, she worked on Gitmo." External links[edit]PersondataNameMonaco, LisaAlternative namesShort descriptionDate of birthFebruary 25, 1968Place of birthBoston, MassachusettsDate of deathPlace of death
-
- Remarks by Assistant to the President for Homeland Security and Counterterrorism Lisa O. Monaco | The White House
- Office of the Press Secretary
- As Prepared for Delivery''Countering Violent Extremism and the Power of Community''
- Harvard Kennedy School ForumTuesday, April 15, 2014
- Thank you so much, Farah [Pandith], for your kind introduction, and for your service to our country as the first Special Representative to Muslim communities during your time at the State Department, and as a leading advocate for a community of voices to counter extremism.
- I want to thank everyone at the Harvard Kennedy School for doing so much to develop our future public servants and political leaders, and I'm honored to be with you today. It's an honor to be part of the great Forum tradition. I'd like to thank my colleague Deputy Secretary Alejandro Mayorkas, as well as Jeffery Brown from the Ten Point Coalition and Haris Tarin from the Muslim Public Affairs Council for joining me for what I am sure will be an excellent discussion.
- Of course, we're here today because of a tragedy. This morning I joined Vice President Biden at the memorial service marking the anniversary of the Boston Marathon bombings '' marking one year since we were shocked by those awful images at the finish line; one year since we lost Krystle Campbell, Lingzi Lu, eight-year-old Martin Richard and Officer Sean Collier '' all innocent lives and all lost far too soon. It's been one year since we saw how Boston responds in the face of terrorism'--with resilience and resolve and unbending strength.
- When the bombs went off, I had been President Obama's chief advisor on homeland security and counterterrorism for just a few weeks. It was a deeply personal introduction to the demands of this job. I was raised a few miles from here'--in Newton. I went to high school in the shadow of Fenway Park and then made the long trek down Storrow Drive to come here for college. Growing up, I spent every Patriot's Day lining that marathon route '' usually at the crest of Heartbreak Hill '' cheering on the runners and taking part in a great Boston tradition. And last year, my twin brother was there in the crowd, alongside thousands of other Bostonians. It was not only an attack on the homeland; it was an attack on my hometown.
- We've faced violent expressions of extremism throughout our history, including 19 years ago this week in Oklahoma City. And, sadly, we continue to face it, as we saw just two days ago in Overland Park, Kansas, when a gunman'--allegedly a white supremacist with a long history of racist and anti-Semitic behavior'--opened fire at a Jewish community center and retirement home, killing three. And, while the American people continue to stand united against hatred and violence, the unfortunate truth is that extremist groups will continue targeting vulnerable populations in an effort to promote their murderous ideology.
- That's why stemming domestic radicalization to violence has been a key element of our counterterrorism strategy from day one. President Obama has been laser-focused on making sure we use all the elements of our national power to protect Americans, including developing the first government-wide strategy to prevent violent extremism in the United States. At the same time, we recognize that there are limits to what the federal government can do. So we must rely on the partnership of those who are most familiar with the local risks, those who are in the best position to take action'--local communities.
- Local communities are the most powerful asset we have in the struggle against violence and violent extremism. We've crunched the data on this. In the more than 80 percent of cases involving homegrown violent extremists, people in the community'--whether peers or family members or authority figures or even strangers'--had observed warning signs a person was becoming radicalized to violence. But more than half of those community members downplayed or dismissed their observations without intervening. So it's not that the clues weren't there, it's that they weren't understood well enough to be seen as the indicators of a serious problem.
- What kinds of behaviors are we talking about? For the most part, they're not related directly to plotting attacks. They're more subtle. For instance, parents might see sudden personality changes in their children at home'--becoming confrontational. Religious leaders might notice unexpected clashes over ideological differences. Teachers might hear a student expressing an interest in traveling to a conflict zone overseas. Or friends might notice a new interest in watching or sharing violent material.
- The government is rarely in a position to observe these early signals, so we need to do more to help communities understand the warning signs, and then work together to intervene before an incident can occur, while always respecting our core commitment to protecting privacy and civil liberties. During the past several years, that's what we've attempted to do.
- We've built partnerships and expanded our engagement with communities across the nation, especially those that may be targeted by extremist groups. We are working to improve our understanding of how and why people are drawn to violence. And we have made it a priority to uphold and defend the qualities from which we draw strength'--our openness, our diversity, and our respect for the equal rights of all Americans.
- We know all too well that Muslim-American, Sikh-American, Arab-American communities and others, including Jewish-Americans, have been victimized by violence that is rooted in ignorance and prejudice, in suspicion and fear. American Muslims and Americans of all faiths have enriched our way of life '' contributing to our safety and security as patriotic service members, police, firefighters, first responders. Violent extremism is not unique to any one faith. And, as Americans, we reject violence regardless of our faith.
- Here in Massachusetts, over the past decade, government and law enforcement officials have built a dialogue to reinforce that shared commitment to non-violence and to build trust with a range of Boston-area communities. The local U.S. Attorney's office brings together representatives from federal agencies with community leaders, some of whom I just had the opportunity to meet. I can tell you, the benefits go both ways. Law enforcement is better able to understand the specific challenges these communities face, and community participants can bring their concerns directly to the government. We all care about keeping our families and neighborhoods safe.
- These connections were critical in the chaotic days after the bombing '' helping to minimize the potential for backlash against Muslim and Sikh communities. In Malden, after a local Muslim woman was assaulted, purportedly in retribution for the bombings, the Department of Justice Community Relations Service worked with local officials to request additional security for the local mosque. The Malden Chief of Police personally stood watch the first night.
- Still, despite the broader security improvements we've put in place since 9/11, despite our outreach to reduce the risk of radicalization to violence, more work remains. We need a comprehensive prevention model that allows us to work with communities and intervene with at-risk individuals before violent extremism takes root. And we need to meet the evolving challenge, including terrorists' use of the internet to recruit those who are most vulnerable to violent extremist ideologies, whether it be from neo-Nazis or groups like al-Qaeda.
- So today, as we honor the memory of all those who were killed and injured one year ago, we recommit ourselves to building greater resilience into our communities to resist the pull of violent extremism. We will continue to work closely with community leaders, local law enforcement and partners outside government who work with at-risk populations every day. Faith leaders, school teachers, police chiefs '' and especially mothers and fathers and families '' will always be the best positioned to identify individuals in a community who might be susceptible to radical messages and violence'--and to help them resist hateful ideologies. So we must do more to connect those leaders to resources they need to be part of a comprehensive approach. Let me just briefly describe a few of the steps we're taking along those lines.
- First, the Department of Homeland Security is building partnerships with key cities across the country to establish a locally-based envoy dedicated to coordinating government engagement on the threat of homegrown violent extremism. Piloted in Los Angeles, this effort has already helped focus our resources and strategic efforts by streamlining federal, state, and local outreach. And tonight I'm proud to announce that the next such DHS envoy will be based in Boston.
- Second, DHS is also going to make more resources available to officials countering violent extremism in their communities. Every year, DHS offers hundreds of millions of dollars in grant money to local law enforcement to bolster homeland security at the municipal and county level. Now, in addition to preparing to respond to an attack once it's happened, state and local officials can apply for these grants to explicitly develop models for preventing violent extremism in their communities, drawing on the expertise of social service providers, education administrators, mental health professionals, and religious leaders.
- Finally, I want to mention the expertise developing right in your backyard. With support from the Department of Justice, the Children's Hospital of Boston is studying why some Somali refugees embrace violent extremism, while others move towards gangs and crime and still others channel their energies into non-violent activism. The answers to these kinds of questions will be essential to developing more effective models of intervention.
- And here at Harvard, the Berkman Center is establishing a new research network dedicated to understanding and ultimately preventing radicalization to violence on the internet. Hate speech and extremism take on complex new dimensions and dangers when conducted online, and this will be a valuable asset as we strive to identify more effective ways to intervene and to address violent extremism in the internet age.
- During the past year, Boston has been a crucible for our nation-wide efforts to counter violent extremism and enhance our focus on resilience. The bombings brought into sharp relief what we have been doing well and where we still need to hone our efforts. The programs that are operating here set the example for cities across the nations. And'--as a Boston-girl, I say this with absolutely no surprise'--the strength of the people of Boston made it wicked clear that this city and this country cannot be intimidated by the ideologies of hatred and violence that poison the hearts of a few disturbed individuals. We reject that thinking. And when people gather next Monday'--in numbers as great and as proud as ever'--to celebrate the running of the 118th Boston Marathon, it will also show that we reject the fear terrorism seeks to breed. It will show the true depth of what it means to be Boston Strong. Thank you.
-
- Twitter campaign backfires on New York Police Department - World Socialist Web Site
- By Sandy English24 April 2014On Tuesday, the New York City Police Department (NYPD) attempted a public relations campaign on the popular microblogging platform, Twitter. @NYPDNews, the Twitter account of the department, asked its followers, ''Do you have a photo w/ a member of the NYPD? Tweet us & tag it #myNYPD.''
- Users, presumably New Yorkers, could show their support for and friendly interactions with ''New York's Finest.''
- The PR effort proved a catastrophic failure. Within an hour of the first postings'--by the police themselves'--hundreds of people had uploaded photographs of police brutality: women whose hair was being pulled by cops, demonstrators brutalized and a suspect pressed to the hood of a car by a mob of officers.
- Later in the day, the number of negative tweets and images about the department topped 10,000 an hour.
- Many users memorialized those unarmed men and women shot and killed by the NYPD in recent years.
- One remarked, ''When I saw #myNYPD on my feed I immediately thought of #RamarleyGraham #KimaniGray #SeanBell and many who died thanks to the actions of NYPD.''
- Another user tweeted, ''#NYPD cops found not guilty after firing 50 shots at groom Sean Bell killing him on his wedding day #myNYPD #SeanBell''.
- Sean Bell was killed in 2006 when NYPD officers let off a fuselage of 50 bullets on the unarmed worker on his wedding night as he was sitting in his car near a club in the borough of Queens. The plainclothes cops had never identified themselves and no officers were convicted in the shooting.
- The less deadly, but routine, acts of police violence featured as well:
- ''myNYPD cares about noise control so they'll shoot a homeless man's dog while he's having a seizure,'' one person tweeted, along with a post of an officer kneeling and pointing his gun at a dog while a man lay on the sidewalk. Other users posted images of the dog's corpse. Users also mentioned the case of Kang Chun Wong, the 84-year-old who was beaten and arrested by the NYPD for jaywalking in January, posting pictures of Wong's bruised face.
- Later in the day, users created similar hashtags to express their outrage at the behavior of other police departments around the US. On #myAPD (the acronym of Albuquerque Police Department in New Mexico), one user commented, ''#myAPD = Another Person Dead.''
- The episode reveals a number of striking facts about life in New York City and America generally.
- In the first place, the twitter storm showed that there is a deep and widespread hatred of the police by New York City's population. The NYPD is commonly regarded as a group of thugs and murderers, protectors of the privileged and the enemies of the poor. The ratio of favorable to unfavorable remarks about the NYPD figured in the hundreds to one.
- Hatred of the police in the city has been common for decades, but particularly increased over the last 12 years during the heyday of Mayor Michael Bloomberg's notorious stop-and-frisk policy, in which millions of predominantly minority youth were stopped and searched, even though, by the NYPD's own admission, nearly 90 percent of them had committed no crime. While the recently elected Democratic mayor, Bill de Blasio has promised to curtail stop-and-frisk (in fact there was a decline in the practice that began in Bloomberg's last year in office), his new Police Commissioner, William Bratton, was the architect of the policy under Mayor Rudolph Giuliani in 1990.
- While there has been a drop in the number of youth harassed, the practice remains an essential part of NYPD policy.
- Stop-and-frisk policing has also accompanied a staggering rise in police violence, including the murder of unarmed workers and young people, including Sean Bell, Amadou Diallo (killed in 1999) and Ramarley Graham (killed in 2012).
- Less deadly violence was the standard response of the NYPD to the Occupy Wall Street (OWS) protests against social inequality in 2011-12, in which police beat, pepper sprayed and arrested en masse thousands of peaceful protestors. Twenty-five-year-old OWS organizer Cecily McMillan is currently on trial for allegedly assaulting a police offer who has a documented history of violence. Film footage shows McMillan being brutalized by police during her arrest at an OWS demonstration on March 17, 2012.
- The NYPD also inspires hatred for its role in the mass surveillance of the protesters during OWS and other actions, and for its infiltration of Mosques, Muslim-owned restaurants and gathering places throughout New York and New Jersey by its notorious Demographics Unit, which was recently disbanded (or, more precisely, reconfigured).
- Moreover, such an outpouring of contempt and ridicule shows that the official media are sealed off from the sentiments of millions of working people. There is no major newspaper, radio or television station that can reflect, even in a distorted way, what New Yorkers think of social life in their city. Only a glimpse of these feelings can be given on social media but it is all the more startling for its complete absence from the major corporate-controlled media.
- Finally, it is noteworthy that the NYPD was clearly taken off guard by the response. While the military-intelligence-police complex prepares for the social explosion that increasing poverty and inequality must bring, it is evident that it and the political establishment as a whole are completely oblivious to the feelings and basic outlook of millions of Americans.
- There was no social explosion on Tuesday, but there was an indication, filtered through social media, of the mass anger and discontent coursing through the American population against official society and its potential for a sudden and explosive manifestation.
- Please enable JavaScript to view the comments powered by Disqus.
-
- UK: HMRC to sell taxpayers' financial data
- The new legislation would allow HMRC to release anonymised tax data to third parties including companies, researchers and public bodies where there is a public benefit. Photograph: Michael Kemp/Alamy
- The personal financial data of millions of taxpayers could be sold to private firms under laws being drawn up by HM Revenue & Customs in a move branded "dangerous" by tax professionals and "borderline insane" by a senior Conservative MP.
- Despite fears that it could jeopardise the principle of taxpayer confidentiality, the legislation would allow HMRC to release anonymised tax data to third parties including companies, researchers and public bodies where there is a public benefit. According to HMRC documents, officials are examining "charging options".
- The government insists that there will be suitable safeguards on personal data. But the plans, being overseen by the Treasury minister David Gauke, are likely to provoke serious worries among privacy campaigners and MPs in the wake of public concern about the government's Care.data scheme '' a plan to share "anonymised" medical records with third parties.
- The Care.data initiative has now been suspended for six months over fears that people could be identified from the supposedly anonymous data, which turned out to contain postcodes, dates of birth, NHS numbers, ethnicity and gender.
- HMRC's chequered record on data is likely to come under scrutiny given historical scandals involving the loss of personal information about 25 million child benefit claimants and 15,000 bank customers.
- Critics fear the data could include details about income, tax arrangements and payment history and would carry a risk that people could be identified. Even the perception that this could happen may lead to a breakdown in trust between HMRC and taxpayers, the Chartered Institute of Taxation warned.
- Ross Anderson, a professor of security engineering at Cambridge University, said the information could be highly useful to credit rating agencies, advertisers, and retailers wanting to practise price discrimination.
- He also raised concerns about any government claims to have made data fully anonymous.
- "This is going to be a big battleground," he said. "If they were to make HMRC information more available, there's an awful lot of people who would like to get their hands on it. Anonymisation is something about which they lied to us over medical data '... If the same thing is about to be done by HMRC, there should be a much greater public debate about this."
- The Tory MP David Davis, a former minister and shadow home secretary, described the proposal as "borderline insane", adding: "The Treasury lists no credible benefits and offers a justification based on an international agreement that does not lead other governments to open up their tax database," he said. "The officials who drew this up clearly have no idea of the risks to data in an electronic age. Our forefathers put these checks and balances in place when the information was kept in cardboard files, and data was therefore difficult to appropriate and misuse.
- "It defies logic that we would remove those restraints at a time when data can be collected by the gigabyte, processed in milliseconds and transported around the world almost instantaneously."
- HMRC has not made clear exactly what bits of data it would share and with whom, but it has a wealth of information about people living in Britain. Its director of risk and intelligence said in 2012: "We have more data than the British Library."
- The government has strict rules about what can be released outside HMRC, with a near total ban on data sharing unless it is beneficial for the organisation's internal work. But despite the restrictions, HMRC has quietly launched a pilot programme that has released data about VAT registration for research purposes to three private credit ratings agencies: Experian, Equifax and Dun & Bradstreet.
- To comply with the law, the private ratings agencies, which determine credit scores for millions of people and businesses, have been contracted to act on behalf of HMRC and are "therefore treated as part of the department" '' giving them access to tax data about businesses that would otherwise be confidential.
- The government's plans to change the law to allow the sale of anonymised individual tax data and release of the VAT register were buried in documents as part of the autumn statement and recent budget.
- Emma Carr, of Big Brother Watch, said the government should not try to sneak the plans through without a public debate. She said: "The ongoing claims about anonymous data overlook the serious risks to privacy of individual level data being vulnerable to reidentification."
- During the consultation process officials acknowledged there were "concerns around the dangers of individual identities being disclosed inadvertently" but they believe the data can be appropriately protected.
- Stephen Coleclough, president of the Chartered Institute of Taxation, said HMRC had failed to grasp the "worrying and dangerous" implications of what would be made into law.
- "We are concerned that even the strictest safeguards and deterrents may not prevent misuse of the data, or identification of the underlying taxpayer," he said. "There are already examples of aggregate data being provided at such a granular level which would enable identification of the relevant individuals, and we are anxious that any broadening of HMRC's powers of disclosure will inevitably lead to the identification of individuals, and a consequential breakdown in trust between HMRC and taxpayers, not to mention contravention of legislation such as the Human Rights Act."
- The Treasury confirmed it was proceeding with plans to legislate to make aggregated and anonymised data more widely available, as set out in an HMRC document that said: "The government has decided to proceed with the proposal to remove the legal restrictions that currently limit HMRC's ability to share anonymised individual level data for the purpose of research and analysis and deliver public benefits wider than HMRC's own functions, but they accept that this must be done only where there are sufficient safeguards in place to protect taxpayer confidentiality.
- "HMRC is committed to protecting its customers' information. We shall be consulting further on implementing the proposals for sharing anonymised data, and would only take forward specific measures where there was a clear public benefit and subject to suitable safeguards."
- ' This article was amended on 19 April 2014. In the original, an error in the editing process resulted in comments by Stephen Coleclough being mistakenly attributed to Ross Anderson
-
- The Great Cattle Collective | philosophyofmetrics
- WARNING TO THE READER. THIS POST CONTAINS EMOTIONALLY DISTURBING IMAGES.
- ''The Earth is a farm. We are someone else's property.''- Charles Fort
- It is common knowledge amongst researchers of the logical history, as opposed to the propagated and accepted history, that countries and groupings of countries will manufacture an external enemy.
- The purpose of this externalization of internal fears is to rally the citizenry around a common goal or collective purpose. Then the people become distracted from the true intention and design of the sociological engineering which defines their religious, economic, and ideological prison.
- Man's triune nature consists of the physical, spiritual, and mental.
- The corresponding relationship to sociological engineering is as follows:
- From this triune pairing comes the mass manipulation which has directed mankind from virtually the beginning of consciousness. As some of my readers know, it is my contention that this dialectic begins within the human mind and is externalized. Same as countries externalize manufactured enemies to control internal division. Also the same as the human mind externalizing manufactured enemies for similar purposes.
- More of the micro and macro patterns which we so often discuss.
- So the question arises when thinking on a multilateral financial system, if all countries are a part of the same structured process of economic engineering, who will be the external enemy from which the people can be rallied around?
- At this point we will safely assume a mirror process of consolidation and centralization within the other two triune categories, ideological and religious. One only need study the practices and speeches of the new pope and other religious leaders, as well as the international collective laws which emerge from the global institutions promoting a one world, to recognized the forest from the trees.
- The obvious answer to the above question is that we will define and partition enemies from within the collective instead of outside the collective.
- Already we can see a consolidation of social thought and association. Slogans and memes litter the manufactured media which is blasted from the virtual village loud speakers.
- Our social media, such as Facebook, Twitter, etc.., are all uniquely designed to rob us of our natural social order and isolate us from one another. As is usually the case in our modern world, what is advertised is the opposite in realization upon the human mind. Social media promises grand socialization but in essence feeds on our internal selfish divisions to provide us with real world isolation and loneliness.
- The language being promoted by social media is ensuring a level of decreased communication and intelligence. The modern smart phone jargon and jingles have left us stupefied. George Orwell explained the effect best in his novel 1984:
- ''It's a beautiful thing, the destruction of words. Of course the great wastage is in the verbs and adjectives, but there are hundreds of nouns that can be got rid of as well. It isn't only the synonyms; there are also the antonyms. After all, what justification is there for a word which is simply the opposite of some other word? A word contains its opposite in itself. Take ''good'', for instance. If you have a word like ''good'', what need is there for a word like ''bad''? ''Ungood'' will do just as well '-- better, because it's an exact opposite, which the other is not. Or again, if you want a stronger version of ''good'', what sense is there in having a whole string of vague useless words like ''excellent'' and ''splendid'' and all the rest of them? ''Plusgood'' covers the meaning, or ''doubleplusgood'' if you want something stronger still. Of course we use those forms already. but in the final version of Newspeak there'll be nothing else. In the end the whole notion of goodness and badness will be covered by only six words '-- in reality, only one word. Don't you see the beauty of that, Winston?''
- Now of course George Orwell could never have predicted the usage of words and phrases which pepper our everyday lives, but the intended expression of a process where a reduction in language will lead to lower intelligence is obvious. More from 1984:
- ''Don't you see that the whole aim of Newspeak is to narrow the range of thought? In the end we shall make thought-crime literally impossible, because there will be no words in which to express it. Every concept that can ever be needed will be expressed by exactly one word, with its meaning rigidly defined and all its subsidiary meanings rubbed out and forgotten. . . . The process will still be continuing long after you and I are dead. Every year fewer and fewer words, and the range of consciousness always a little smaller. Even now, of course, there's no reason or excuse for committing thought-crime. It's merely a question of self-discipline, reality-control. But in the end there won't be any need even for that. . . . Has it ever occurred to you, Winston, that by the year 2050, at the very latest, not a single human being will be alive who could understand such a conversation as we are having now?''
- This is exactly what has been happening. People are refusing to read books because the pain of attempting to focus and comprehend what is on the page is becoming more difficult with each passing generation. But our social acronyms and emoticons are creating a verbal wasteland of dullness and drudgery.
- Such a disillusioned mass of people can be easily herded one way or the other at the direction of the manufactured media propaganda. As such, defining and expanding awareness of an internal enemy can be accomplished with frightening speed.
- But we have already progressed past the point where home grown terrorists blow up federal buildings. We are now foraging in the thick weeds of self doubt and subconscious damnation. The sociological engineering across all three triune categories now have us questioning our own motives and incriminating ourselves internally.
- The police state which is being established in all countries around the world has shocking patterns of familiarity to one another. Can we not see the emerging sameness in the systems of population control and incarceration?
- Police forces around the world are becoming more militarized with many of the industry products being provided by the same manufacturing companies.
- This week we had the so-called whistleblower Edward Snowden on Russian television asking Putin questions. The obvious design of this production is evident.
- The world is being conditioned and prepared for a full on surveillance police state to ensure the global centrifugal center mass is never set of balance. Any wobble will be eliminated before it has chance to rise to the surface of the sphere and escape.
- Snowden has made ''revelations'' which weren't really anything new to the logical thinker. Everything he told the world was old information and you can be assured that the methods of surveillance which are being utilized today are well advanced from the archaic methods promoted by this psychological operation.
- People are being prepared in small increments by a revelation of the method. This is how social acceptance is attained. If you're not doing anything wrong than you have nothing to hide or worry about.
- Thus we turn the corner on social conditioning and herd mentality.
- Distracted driving laws are emerging in all developed countries from the US and Canada, to Europe and Australia. This is not a coincidence as it is a product of the centralized sociological engineering which will accompany the emerging centralized and multilateral financial system.
- The enemy will be all of us, questioning each other and questioning ourselves, always wondering if we will be the next threat.
- Facial recognition technology is already being utilized around the world. We can already see the emergence of this herd tool in the tag feature on Facebook. Further signs of consolidation between the triune categories.
- Let's revisit some of the fundamental components of the financial system. The US dollar was the worlds reserve currency since the end of WW2. It was imperative that all countries use dollars for the balance of international trade accounts.
- There are two important factors which took place before the events of 911. One was that Iraq priced its oil in gold and other currencies. This was a huge threat to the petrodollar scheme and needed to be corrected. With 911 as the pretext, the dollar system invaded Iraq and took control of its oil resources.
- The Taliban in Afghanistan, who after the failure of the pipeline deal with Unicol Corporation out of Texas, burned all the opium fields in the country. They were the first target after 911 since the world opium trade was of vital importance and also helped to support the dollar debt based system.
- So the US military was sent into Afghanistan to overthrow their once potential business partners and replant the opium fields. One of the major responsibilities of both the Canadian and US militaries was to protect the opium fields. A picture speaks a thousand words.
- Sticking with the cattle theme of this post, the US military used depleted uranium shells on both Iraq and Afghanistan. These shells were developed with depleted uranium for the purpose of hardening the shells to penetrate armor and bunkers. The radioactive dust which was dispersed settled in the ground and water and has lead to major birth defects.
- The following pictures are graphic and emotionally disturbing. It is a shock to the western mind to see what has been done in the name of maintaining dollar hegemony.
- What horrors can manifest from the minds of man.
- With the police forces of the world becoming militarized and surveillance state technology being implemented, how long will it be until all populations are subjected to the same level of dehumanization.
- With the great consolidation and centralization of all aspects of the human triune, physical, mental, and spiritual, being the economic, ideological, and religious engineering of civilization, it is becoming more important for humanity to wake from its self induced conflicts of divisionary distractions.
- The self-limiting of the rent seeking elite must be effected by an inner awareness by the individual. We are cattle because we enslave our own minds first before externalizing that inner conflict. Our own subconscious damnation will ensure the cattle collective. '' JC
-
- Nevada Assemblywoman Exposes the Truth About the Bundy/BLM Showdown |
- I know Vietnam veteran, fellow contributor and friend Darwin Rockantansky will appreciate this post. It's a recount of events that took place during the time of Nevada Assemblywoman Michele Fiore's visit to the Bundy Ranch. On Monday, Fiore documented what she witnessed, and in a very non-politically correct fashion gives her perspective on what took place. Without further ado, here's Ms. Fiore's post.
- I had the privilege and opportunity to learn to make a calf suck a bottle to save her life. It's going to take a lot to revive the calves that were nearly dead when they were returned to the Bundy Ranch because they had been separated from their mothers during the roundup, and a few most likely won't make it.
- I'm headed back to the Bundy's today at 1:00pm. I hope you'll meet me up there. Take I-15 North towards Mesquite, get off at exit 112, and I'll be on the left-hand side of the road, about 2.5 miles down. Give yourself about an hour and a half for traffic.
- This isn't my normal, nice, politically correct email, so hang on to your seats. I can tell you that after everything I've seen, this roundup was not about grazing fees.
- First and foremost, like all Nevadans, I love my country and support my government. I proudly support Nevada being home to military installations needed to defend our nation, the federal government test site to develop the equipment necessary for that defense, and any of the other federal lands and facilities needed to conduct the true business of our federal government. That said, I struggle to see the compelling federal issue of where cows eat.
- I spent a majority of my time in Bunkerville over the last week with the Bundy family and their supporters. During my time in Bunkerville, I couldn't help but think about Nevada's upcoming 150th birthday and that the federal government continues to patronize our state by trying to overstep and police our Nevada citizens. I wonder when the federal government will think Nevada is mature enough to set our own grazing rules or enforce our own laws.
- I didn't meet one Nevadan supporting the BLM or their removal of the cows. If Nevadans don't care about which land is used for grazing, why should a bureaucrat who works for the federal government get to trump that?
- I had the opportunity to meet the American-minded Bundy supporters from all over our country. They were peacefully protesting the BLM's actions, and I'm excited to report the Bundy family was successful in keeping the peace until the BLM stopped their roundup and returned the Bundy's cattle.
- I'll also report the actions of some spineless, poor-excuses of BLM staffers. An armed BLM officer picked up Mr. Bundy's elderly sister from behind, a total sneak attack, and body slammed her to the ground; there is video footage. This woman is the mother of 11 and just survived cancer. Following that brutal incident, another BLM officer ordered his dog to attack Mr. Bundy's son, Ammon, and as Ammon Bundy was trying to get the dog off his leg, the Nazi-minded bully tazed him twice, once in the neck and the second one right above the heart. As if that wasn't enough, the brutal BLM thugs beat up Dave Bundy, a pilot out of Las Vegas, detained him, stole his iPad because it contained the brutal footage, confiscated many other items out of his car, transported him to Henderson where he was further detained, then released him in the middle of street. They didn't stop there. No, they detained two more young guys while they were hearding some more cattle in Overton.
- These men and woman are Americans attacking Americans. I'm speechless. If you saw the number of police agencies united, I'd hope you'd be curious. We are talking about dozens of our finest SWAT members from Metro, Metro black & white cars, EMT, fire rescue trucks, detention buses (a.k.a. Paddy wagons), over 50 Ranger and BLM vehicles, numerous highway patrol vehicles, and a Black Hawk Helicopter on the Moapa airfield, just to name a few. We watched the Waco Massacre and Ruby Ridge; was the BLM preparing for a ''Bunkerville Slaughter''? I believe in my heart because of these last two disasters, Americans from all over our country traveled from afar to stand with the Bundys and let our government know enough is enough. I'm proud to stand with my fellow Americans.
- The numbers do not calculate. The federal government had the authority and an open checkbook to spend 10 million dollars or more for a maximum return of $200,000. Here's how I calculate that number: the BLM might collect maybe 400 heads of cattle, taking into account the number of cattle they would kill while rounding them up. From the round up, the cattle would go to auction. How much do you think you'll pay for a half-dead, beat up cow? Let's say they were able to successful auction off 400 cows for $500.00 each (I'm being very very generous). The brainiac head of BLM authorized 10 million dollars or more to maybe recoup $200,000. Really? As a CEO I'd fire that decision-maker immediately. In their minds, maybe it's worth getting rid of the cows, or just killing them, so the cows won't destroy equipment for a project they might want to implement.
- The BLM tried to paint their actions as enforcing the law; however, there are several other reasons why the BLM chose to pick this fight. It cannot be a coincidence that the place where the Bundy's have grazed their cattle for hundreds of years would suddenly become an animal refuge for desert tortoises; is it really desert tortoises? If so, why would the BLM be euthanizing them? That's right, BLM has EUTHANIZED 700-800 desert tortoises. Trust but verify. Click here to read one of many stories about it.
- We're also seeing reports that the BLM land in Gold Butte is very desirable for energy projects, which may have prompted this sudden strong-arm tactic. Don't trust me, verify it. Click here to read the BLM's own report on the project.
- A major concern in all of this was how the BLM treated the cattle. It is completely irresponsible that after years of conversations, the Feds would begin their roundup during the season when calves are being born. In this mess, newborn calves were separated from their mothers; some were trampled in their holding pens and left for dead. A helicopter acted as a cowboy to heard the cows, causing a few to have heart attacks and die. The conditions of the holding pens where they kept the cows for days were heartless and cruel. Where was PETA?
- I do want to comment about the upstanding citizens who came to show their support, including the Oath Keepers, a non-partisan association of current and formerly serving military, police, and first responders who are committed to defending the Constitution. They are honorable men and women who acted professionally and respectfully. There were many groups of freedom fighters who traveled from all over our country to stand together. I have a very serious request to all agency officers and that request is, ''not to obey your superiors when given a direct order to attack your fellow Americans fighting for the freedoms granted to us by our Constitution''. Take a sick day or a vacation.
- I didn't become an elected official to join an elite club; I ran for office to protect the people and be a true voice for the people. I take my oath seriously. It's time for Nevada to stand up to the federal government and demand the return of the BLM lands to the people of Nevada. BLM has shown their true colors and agenda. As elected officials in Nevada, it is our responsibility to be leaders on this issue and work together, Republicans and Democrats, to make sure this doesn't happen ever again. Together we need to write legislation to protect our state's rights from the Feds.
- Never forget, ''This land is your land, this land is my land'''...
- UPDATE: Fiore took on MSNBC host Chris Hayes and pulled the rug out from under him in a recent interview. Hayes asked Fiore if she recognized the authority of the federal government.
- ''Oh, I recognize the authority that they believe they have, I just question it,'' she said.
- ''So you agree with Cliven Bundy, you agree that the federal government does not have authority over the land?'' Hayes asked.
- ''Nope, I'm not saying I agree,'' Fiore countered. ''No '-- Chris, don't put words in my mouth! I'm not saying I agree with Cliven Bundy. What I'm saying is the way this was handled is really suspicious. When in the heck do we send our federal government with arms to collect a bill? When do we do that? When have we ever done that?''
- Tim Brown is the Editor of Freedom Outpost.
- Don't forget to follow the D.C. Clothesline on Facebook and Twitter. PLEASE help spread the word by sharing our articles on your favorite social networks.
-
- Autopsy: Carey shot five times from behind
- In October, Miriam Carey was chased by authorities after an incident at a White House gateShe was stopped by police, backed away and was shot at as she fledCarey died later; a 1-year-old in her car was unharmedFamily is suing government, saying officers should have held their fire(CNN) -- An autopsy report, made public six months after Miriam Carey was shot dead after leading Washington police on a car chase from the White House to the Capitol, revealed that the 34-year-old woman was struck by five bullets from behind.
- Attorney Eric Sanders, who is representing members of Carey's family in a wrongful death lawsuit against the government, said the autopsy proves the shooting was unjustified.
- Lt. Kimberly Schneider, a spokeswoman for the U.S. Capitol Police, one of the agencies involved in the incident, said the department would not comment on the pending litigation and while an investigation is ongoing.
- Schneider said the officers involved are on administrative leave.
- Sanders released the report on the six-month anniversary of the shooting, which captured national attention as the chase unfolded on cable networks and in the following hours when it was revealed the suspect was an unarmed dental hygienist from Connecticut with a 1-year-old in the backseat.
- Chase began at the White House
- On October 3, Carey approached a White House checkpoint and was approached by Secret Service officers. She made a three-point turn, striking an officer who was trying to move a barricade into her path, before driving away, according to an affidavit filed in support of a search warrant.
- Police said the car sped down Pennsylvania Avenue toward the Capitol, where security vehicles stopped it at Garfield Circle. Carey put the car in reverse, hit a police car and drove away as officers fired at her.
- Dramatic video footage by a videographer for Alhurra TV, a Middle Eastern news outlet financed by the U.S. government, showed the black vehicle then speeding around a nearby traffic circle with a police car in close pursuit and then heading away. The car crashed into more security barriers a few blocks later, witnesses said.
- More shots were fired after the vehicle stopped, and the woman was hit several times, said Metropolitan Police Department Chief Cathy Lanier. The child was unharmed.
- One shot hit her in the head
- The office of the District of Columbia medical examiner said in the autopsy that one round struck Carey in the left side of the back of her head, and she was also hit three times in the back and once in her left arm. The report didn't determine in what sequence Carey was hit.
- Toxicology tests determined Carey didn't have alcohol or drugs in her blood.
- Her family has questioned since the day of the incident whether shooting Carey was the only way to end the chase, which went through the heart of the nation's capital.
- Sanders said on Tuesday that Carey's family members still feel police should have considered other options. The autopsy only "confirms what we said. It was unjustified."
- The family is suing the Department of Justice, the Secret Service and U.S. Capitol Police for $75 million.
- The lawsuit says Carey was unfamiliar with the area and mistakenly drove past the first guard post. When she tried to make a U-turn and drive away, a uniformed Secret Service officer threw a bicycle rack at her car, the lawsuit claims.
- Carey panicked when she was stopped near the traffic circle and surrounded by officers with their weapons drawn, the suit alleges.
- The family contends in the document there was no legal justification for officers to shoot her and doing so went against their training.
- Carey had passport, foreign currency in her car
- Police likely feared terrorism
- Law enforcement analysts said in the days after the shooting that officers were right to shoot.
- "You don't know if she has a bomb," CNN's Mike Brooks said in October. "You don't know if it's a terrorist attack. The officers just don't know."
- He dismissed suggestions that police could have defused the situation simply by shooting out the car's tires. "If you are using deadly force, you are there to try to incapacitate the driver of that car -- of that weapon," he said. "If they did shoot the tires out, the car can keep moving."
- Maki Haberfeld, chairwoman of the Department of Law, Police Science and Criminal Justice Administration at John Jay College of Criminal Justice in New York, added that police would have had no way of knowing whether Carey posed a threat as she got out of the car, and therefore the shooting was justified.
- "We live in times of heightened alert as far as terrorist activities are concerned," she said. "The fact that she was not displaying a gun doesn't mean anything, because bombers don't necessarily display anything. They have the explosives around their waist, usually.
- "It's a matter of a split-second decision that the police officer needs to take before someone explodes himself. It's all about the larger context. They just push the button, or it could be activated from a remote location."
- Sister: Carey diagnosed with postpartum depression
- There were also questions about Carey's mental state.
- A few months after her daughter was born, Miriam Carey was diagnosed with postpartum depression with psychosis, her sister told CNN's "AC360" in October.
- Postpartum psychosis can cause delusions and paranoia, according to medical experts.
- "There wasn't a pattern. It was something that occurred suddenly," Amy Carey-Jones said. "She seemed overwhelmed. There was a lot of stress.
- "There were not moments of her walking around with delusions. That was not what was going on."
- She said her sister had been making progress with the help of counseling and medications.
- Carey-Jones said her sister relayed to her that doctors told her she didn't need the medication anymore. "They tapered her off the medications, and she said she felt fine," Carey-Jones said.
- She declined to discuss what medication Miriam Carey had taken.
- 'My sister didn't deserve this'
- CNN's Shimon Prokupecz, Jonathan Auerbach and Haimy Assefa contributed to this story.
-
- The TSA Blog: TSA Travel Tips: TSA Pre '''' Lanes Open to U.S. Armed Forces as well as DoD and Coast Guard Civilians
- TSA offers expedited airport security screening, TSA Pre'''', to all members of the U.S. military, including reservists and National Guard members, as well as DoD and Coast Guard civilians.
- TSA Pre'''' allows participants to keep their shoes, belt and light jacket on and leave laptops and 3-1-1 compliant liquids in their carry-on bags when going through airport security.
- Locate your DoD ID number (10-digit number found on the back of your Common Access Card). If you do not have a DoD ID number listed on your CAC, you can locate it by logging into MilConnect and clicking on the ''My Profile'' tab. Civilians must opt-in to the program by logging into the MilConnect, click on the ''My Profile'' tab and then click on the ''CIV'' tab. In the Personnel Status information box, click on the ''TSA Pre'''' Program'' checkbox, complete other required information and scroll to the bottom of the page and click ''submit''.Enter your DoD ID number into the ''Known Traveler Number'' field when booking leisure flight reservations or when updating your Defense Travel System profile for official travel. To ensure your future airline reservations automatically include your DoD ID number, save it in your profile.Click hereto learn more about TSA Pre''''. Follow @TSABlogTeam onTwitterandInstagram!
- If you have a travel related issue or question that needs an immediate answer, you can contact us byclicking here.
-
- Los Angeles cops already using spy drones for 'predictive policing'
- (Image credit: screenshot from Center for Investigative Journalism video)
- The Los Angeles County Sheriff's Department secretly used a civilian aircraft to monitor the 10-square-mile area of Compton in 2012, recording high-resolution video of all that happened n the region.
- Read our latest: ''At least 10 suspected al-Qaeda militants, three civilians killed in US drone attack in Yemen'' and ''Pro-Russian militants in eastern Ukraine refuse to disarm, leave government buildings''
- ''We literally watched all of Compton during the times that we were flying, so we could zoom in anywhere within the city of Compton and follow cars and see people,'' said Ross McNutt of Persistent Surveillance Systems, according toThe Atlantic.
- This type of surveillance, which was used to find suspected bombers in Iraq and Afghanistan, allows police to zoom into recordings Google Earth-style.
- The technology can stay in the air for six hours and is being marketed to police departments across the United States, allowing police to rewind recordings to watch areas they couldn't monitor in real time.
- Sgt. Douglas Iketani of the L.A. County Sheriff's Department openly compared the secret test to Big Brother, though apparently it didn't make him stop short of using it.
- ''This system was kind of kept confidential from everybody in the public,'' Iketani said to the Center for Investigative Reporting. ''A lot of people do have a problem with the eye in the sky, the Big Brother, so to mitigate those kinds of complaints we basically kept it pretty hush hush.''
- The price point is also apparently quite attractive to police departments.
- McNutt notes that the ''whole system costs less than the price of a single police helicopter and costs less for an hour to operate than a police helicopter.''
- It is also capable of monitoring 10,000 times the area of a police helicopter.
- ''Our first initial thought was, oh, Big Brother, we're going to have a camera flying over us,'' Iketani said. ''But with the wide area surveillance you would have the ability to solve a lot of the unsolvable crimes with no witnesses, no videotape surveillance, no fingerprints.''
- Conor Friedersdorf of The Atlantic notes that Iketani didn't conclude that the technology would not be like Big Brother, but instead that the privacy problems would be outweighed by its law enforcement capabilities.
- ''I'm sure that once people find out this experiment went on they might be a little upset,'' Iketani said. ''But knowing that we can't see into their bedroom windows, we can't see into their pools, we can't see into their showers. You know, I'm sure they'll be okay with it.''
- Ultimately, Iketani argues that the public has become accustomed to ubiquitous surveillance.
- ''With the amount of technology out in today's age, with cameras in ATMs, at every 7/11, at every supermarket, pretty much every light poll, all the license plate cameras, the red light cameras, people have just gotten used to being watched,'' he said.
- While no police department has purchased the equipment yet, according to the CIR report, it is not due to the privacy problems inherent in such technology.
- Instead, the problem is that the cameras currently can't identify the faces of individuals, a barrier which Friedersdorf says will likely be broken soon.
-
- Net Neutrality BullCrap
- NYTimes: F.C.C., in a Shift, Backs Fast Lanes for Web Traffic
- The 'lanes' analogy MUST stop. It is NOT a technical analysis
-
- Its a GOOD thimg!
- The rules are also likely to eventually raise prices as the likes of Disney
- and Netflix pass on to customers whatever they pay for the speedier
- lanes, which are the digital equivalent of an uncongested car pool lane
- Consumer groups immediately attacked the proposal, saying that not only would
- costs rise, but also that big, rich companies with the money to pay
- large fees to Internet service providers would be favored over small
- start-ups with innovative business models — stifling the birth of the
- next Facebook or Twitter.
-
- Drone Nation
- You think you can parade around on YouTube?
- Are there 50 high value targets on the website?
- NPR buzzfeed Micharl Hastings fellow WTF?
-
- US appeals court orders release of legal memo on drone killings
- By Patrick Martin22 April 2014A three-judge appeals court panel in New York City ordered the Obama administration to release the redacted text of the legal analysis prepared by the Justice Department purporting to demonstrate the president's authority to order drone-missile assassination of US citizens.
- The unanimous ruling, issued Monday by judges Jon O. Newman, Jose A. Cabranes and Rosemary S. Pooler, partially reversed a January 2013 decision by federal district court judge Colleen McMahon. That decision had allowed the Justice Department to withhold the legal memorandum and dismissed the lawsuit, brought under the Freedom of Information Act by the New York Times and the American Civil Liberties Union.
- The appeals court decision, written by Newman, found that the government had effectively waived its right to keep the legal analysis secret by releasing a 16-page ''white paper'' reviewing the legal arguments in favor of a presidential power to order assassinations as part of the ''war on terror,'' and by issuing public statements detailing its legal reasoning, including speeches by Attorney General Eric Holder and then-White House counterterrorism chief John Brennan, now the director of the CIA.
- One month after the lower-court judge issued her ruling that the government was not obliged to release the memorandum, the Justice Department declassified and released the ''white paper,'' whose text had already been made public in a leak to NBC News. The plaintiffs cited the ''white paper,'' as well as the Holder and Brennan speeches and other statements by Obama administration officials, in their appeal to the 2nd Circuit Court of Appeals.
- The original document was drafted by the Office of Legal Counsel (OLC), the in-house attorney for the Justice Department, at the request of the White House. This is the same agency that drafted the notorious ''torture memos'' during the Bush administration, asserting that CIA interrogators could employ methods of torture like waterboarding without violating international law or the Geneva Conventions.
- The Obama appointees in the OLC drafted memos in 2010, asserting that the president had the power as commander-in-chief to order the killing of anyone, American citizen or not, designated by US intelligence agencies as a ''terrorist.''
- The White House sought the legal ruling in order to justify in advance its decision to assassinate Anwar al-Awlaki, a US citizen, Muslim preacher and former religious adviser to the Pentagon, who became radicalized after the 9/11 attacks, went to Yemen, where his parents were born, and became a well-known advocate and spokesman for Islamic fundamentalism.
- Al-Awlaki was targeted for his alleged connection to individuals like Major Nidal Hassan, the military psychiatrist who killed 14 people at Ft. Hood, Texas, in the fall of 2009, and the ''underwear bomber,'' Umar Farouk Abdulmutallab, who tried to blow up a Detroit-bound jetliner the same year. Both men allegedly watched al-Awlaki sermons on the Internet and communicated with him via e-mail.
- The Obama administration has presented no evidence that al-Awlaki did anything more than express his opinions on religious and political issues and offer moral justification for attacks against US targets.
- In the course of its drone warfare in Yemen, the CIA killed two other American citizens: Samir Khan, who died in the September 2011 attack that killed Anwar al-Awlaki; and Abdulrahman al-Awlaki, the Islamic preacher's 16-year-old son, who was ''collateral damage'' in another drone missile strike in Yemen one month after his father's death.
- The appeals court panel rebuffed a series of Department of Justice attempts to withhold the legal memorandum: the agency first refused to acknowledge the memo's existence; then, it acknowledged its existence but refused any information, such as the document number and description; and finally, the DOJ released the document number and description but declared the entire text secret as a matter of national security.
- While the panel's decision was a setback for the Obama administration, the three judges were careful to bow before the military-intelligence apparatus. Their decision is itself redacted (partially secret) in the sections where it identifies portions of the legal memorandum that the government wants withheld, in case the Justice Department decides to appeal.
- The Obama administration can appeal the decision of the three-judge panel either to the full circuit court, or directly to the Supreme Court.
- Circuit Judge Newman did not override the claims of national security, but rather pointed out the contradiction in the administration's position that it could discuss the issues substantively in public without releasing the document itself.
- ''Whatever protection the legal analysis might once have had has been lost by virtue of public statements of public officials at the highest levels and official disclosure of the DOJ White Paper,'' he wrote.
- The court ruling comes on the third day of the bloodiest US missile strikes in Yemen. Beginning Saturday, CIA-fired drone missiles have killed between 50 and 100 people in southern Yemen, hitting at least five separate target areas in the remote and mountainous region.
- Please enable JavaScript to view the comments powered by Disqus.
-
- US unleashes three days of drone strikes on Yemen, 55 killed '-- RT USA
- Published time: April 21, 2014 17:49Edited time: April 21, 2014 20:30People inspect the wreckage of a car hit by an air strike in the central Yemeni province of al-Bayda April 19, 2014. (Reuters)
- Dozens are reportedly dead in Yemen, including at least three civilians, as the result of a series of drone strikes that started in the southern part of the country on Saturday and is alleged to still be occurring two days later.
- By noontime in Washington, DC on Monday, the Associated Press reported that 55 Al-Qaeda militants were among those that had been killed in an hours-long series of strikes that targeted a training camp operated by the group, according to Yemen's interior ministry. The United States is alleged to have carried out the strikes using unmanned aerial vehicles, or drones, but does not legally have to acknowledge any operations conducted by its Central Intelligence Agency and has not commented.
- Among the 55 believed to be killed in that series of strikes, the AP reported, were three senior but unnamed Al-Qaeda leaders. The AFP also corroborated that claim by reporting that witnesses on the scene in Shabwa province early Monday said three alleged militants were indeed killed when a missile struck the car the men were traveling in that morning.
- At the same time on Monday, an anonymous Yemeni government official briefed on the strikes told CNN that the strikes had yet to cease and that at, by his count, at least 30 alleged militants had been killed. Statistics regarding the death toll remain fluid, but preliminary reports concerning the strikes suggest that the number of those killed since Saturday is in the dozen.
- Yemen's Saba news agency reported that a drone strike in the central province of Bayda on Saturday killed 10 suspected militants and three civilians. A Yemeni military officials added to the AP that a car carrying the alleged militants was struck by a missile as it drove by a vehicle carrying civilians, and an eyewitness who survived the attack said a second strike occurred soon after. Three civilians were injured in addition to those slain in that attack, the AP reported.
- "Minutes after the first attack, a second attack took place, killing three of my friends," eyewitness Salem al-Kashm told CNN after. "The drone then kept going in circles after the attack to ensure that none of the militants were able to escape."
- On Sunday, US drones reportedly targeted an Al-Qaeda training camp in the nearby province of Abyan and killed another 30.
-
- F-Russia / Ukraine
-
- The Geneva Agreement - Analysis
- Russian Foreign Minister Lavrov gave an interview to Russian state TV channel RT. He accused the US of
- reneging on the 17 April Geneva document which calls for reciprocal actions to stabilize the situation in
- Ukraine. In every case the US has dictated what Russia must do and what eastern Ukrainians must do without
- taking reciprocal action in Kiev.
- Lavrov noted that illegal armed bands are to be disarmed by both sides, but no group is attempting to
- disarm Right Sector, the Ukrainian ultra-nationalists. He said that groups are to vacate buildings but
- apparently not in Kiev and other cities. Lavrov opined that the US is "running the show" in Kiev, citing
- reports of CIA agents at national security headquarters in Kiev.
- Lavrov noted the first operation by the Kiev regime against the eastern Ukrainians began the afternoon of
- 17 April. As for the operation ordered yesterday, Lavrov said it was "quite telling" that Kiev had
- re-launched its "anti-terrorist" operation in the east on Tuesday during a visit by "Joe Biden." He
- referred to the US Vice President repeatedly, but only as "Joe Biden."
- Lavrov's most important statements came in response to a question about Russian troops. The question posed
- by interviewer Shevardnadze and Lavrov's reply are reproduced below.
- "Sophie Shevardnadze: You've also said many times that Russia has no intention of moving its troops inside
- Ukraine, and just recently, Dmitry Peskov, the Russian president's press-secretary confirmed that there is
- a military contingent that is reinforced on the Russian-Ukrainian border; There must be a worst-case
- scenario in which this contingent will be used?"
- "Sergey Lavrov: If we are attacked, we would certainly respond. If our interests, our legitimate interests,
- the interests of Russians have been attacked directly, like they were in South Ossetia for example, I do
- not see any other way but to respond in full accordance with international law. Russian citizens being
- attacked is an attack against the Russian Federation."
-
- NYTimes on 'photo-gate'
- In fact, the Times’ claim that the “group photograph” was
- “taken in Russia” was a lie. “It was taken in Slovyansk,” the
- photographer who took the picture, freelancer Maxim Dondyuk, told the Times. “Nobody asked my permission to use this photograph.” - FROM HIS INSTAGRAM
- The Times article shows that the “newspaper of record” did
- not engage in the most elementary fact-checking of material it was
- handed by the Kiev regime and the US State Department, before plastering
- the alleged “evidence” on its front page.
- This raises the question of how the Times’ photo report was published in the first place. Either the Times
- editors rammed through the piece and its blurry photos without any
- independent examination, or the editors did check the story, saw it was a
- grotesque falsification, and published it anyway.
- Army is retreating or defecting.
- Russians wanted ant-semetic clause in Geneva documents to combat right sector AMD other Kiev neo Nazis
- Hence the letter Kerry had to come up with
- Think progress says its a fake
- Donetsk give coal mines to Germany's Ruhr Steel
-
- Leaflet tells Jews to register in East Ukraine
- A leaflet distributed in Donetsk, Ukraine, calls for all Jewish people over age 16 to register as Jews. The leaflet demanded the city's Jews supply a detailed list of all the property they own or else have their citizenship revoked.(Photo: The Coordination Forum for Countering Antisemitism)
- SHARE11815CONNECTEMAILMOREWorld leaders and Jewish groups condemned a leaflet handed out in the eastern Ukrainian city of Donetsk in which Jews were told to "register" with the pro-Russian militants who have taken over a government office in an attempt to make Ukraine part of Russia, according to Ukrainian and Israeli media.
- Jews emerging from a synagogue say they were handed leaflets that ordered the city's Jews to provide a list of property they own and pay a registration fee "or else have their citizenship revoked, face deportation and see their assets confiscated," reported Ynet News, Israel's largest news website, and Ukraine's Donbass news agency.
- Secretary of State John Kerry said the language of the leaflets "is beyond unacceptable" and condemned whomever is responsible.
- "In the year 2014, after all of the miles traveled and all of the journey of history, this is not just intolerable '-- it's grotesque," he said. "And any of the people who engage in these kinds of activities '-- from whatever party or whatever ideology or whatever place they crawl out of '-- there is no place for that."
- U.S. Ambassador to Ukraine Geoffrey Pyatt called the leaflets "the real deal." But the man whose name appears on the leaflets, Denis Pushilin, identified as chairman of "Donetsk's temporary government," said he was not responsible.
- Pushilin, who is a leader of the pro-Russian movement in Donetsk, acknowledged that leaflets were distributed under his organization's name but denied any connection to them, Ynet reported.
- Donetsk is the site of an "anti-terrorist" operation by the Ukraine government, which has moved military columns into the region to force out militants who are demanding a referendum be held to join Russia.
- Emanuel Shechter, in Israel, told Ynet his friends in Donetsk sent him a copy of the leaflet through social media.
- "They told me that masked men were waiting for Jewish people after the Passover eve prayer, handed them the flier and told them to obey its instructions," he said.
- The leaflet begins "Dear Ukraine citizens of Jewish nationality" and states that all people of Jewish descent over 16 years old must report to the Commissioner for Nationalities in the Donetsk Regional Administration building and "register."
- It says the reason is because the leaders of the Jewish community of Ukraine supported Bendery Junta, a reference to Stepan Bandera, the leader of the Ukrainian nationalist movement that fought for Ukrainian independence at the end of World War II, "and oppose the pro-Slavic People's Republic of Donetsk," a name adopted by the militant leadership.
- The leaflet then described which documents Jews should provide: "ID and passport are required to register your Jewish religion, religious documents of family members, as well as documents establishing the rights to all real estate property that belongs to you, including vehicles."
- Consequences for non-compliance will result in citizenship being revoked "and you will be forced outside the country with a confiscation of property," it said. A registration fee of $50 would be required, it said.
- 'SMELLS LIKE PROVOCATION'
- Olga Reznikova, 32, a Jewish resident of Donetsk, told Ynet she never experienced anti-Semitism in the city until she saw this leaflet.
- "We don't know if these notifications were distributed by pro-Russian activists or someone else, but it's serious that it exists," she said. "The text reminds me of the fascists in 1941," she said referring to the Nazis who occupied Ukraine during World War II.
- The Jewish community in Donetsk issued a statement saying the leaflet distribution "smells like a provocation." Morton Klein, president of the Zionist Organization of America, the oldest pro-Israel group in the USA, said the leaflets should be seen in the context of a rising tide of anti-Semitism across Europe.
- "This is a frightening new development in the anti-Jewish movement that is gaining traction around the world," Klein said.
- Michael Salberg, director of the international affairs at the New York City-based Anti-Defamation League, said it's unclear whether the leaflets were issued by the pro-Russian leadership or a splinter group operating within the pro-Russian camp.
- But he said the Russian side has used the specter of anti-Semitism in a cynical manner. Russia and its allies in Ukraine have issued multiple stories about the threat posed to Jews by Ukraine's new pro-Western government in Kiev, Salberg said.
- "The message is a message to all the people that is we're going to exert our power over you," he said. "Jews are the default scapegoat throughout history for despots to send a message to the general public: Don't step out of line."
- SHARE11815CONNECTEMAILMORE
-
- IMF Board to Consider $17 Billion Ukraine Bailout April 30 - WSJ.com
- April 23, 2014 3:23 p.m. ET
- WASHINGTON'--The International Monetary Fund's executive board is tentatively scheduled to consider a $17 billion bailout for Ukraine on April 30, two people familiar with the matter said Wednesday.
- IMF staff are currently verifying Kiev's interim government has met the fund's preconditions for the emergency loan. The expected IMF approval next week would unlock another $10 billion in aid promised by the U.S. and Europe for the...
-
- BBC News - Ukraine: Photos 'show Russian troops' in east
- 21 April 2014Last updated at 17:48 ET The US State Department has released photos of soldiers in eastern Ukraine, which it says show that some of the fighters are Russian special forces.
- The BBC is unable to verify the pictures, which were provided by Ukrainian diplomats.
- The photos appeared to identify Russian soldiers, and show similarly equipped and armed fighters in different cities in eastern Ukraine.
- There was no immediate response to the pictures from the Russian government.
- Pro-Russian militants are holding official buildings in towns and cities in the east. However, Russia has denied it has any soldiers in Ukraine.
- The photos, provided to the Organization for Security and Co-operation in Europe, appeared to show the same man taking part in operations in Kramatorsk and Sloviansk in eastern Ukraine, and in operations in Georgia in 2008.
- Another group of photos appeared to link a gunman seen in photos in Kramatorsk and Sloviansk to a team in the Russian special forces.
- Ukraine's permanent representative to the International Organizations in Vienna said the photos provided "growing evidence of Russia's involvement in instigating and co-ordinating the separatist actions that destabilise the situation in the east of Ukraine".
- US State Department spokeswoman Jen Psaki said there was "broad unity in the international community about the connection between Russia and some of the armed militants in eastern Ukraine".
- "The photos presented by the Ukrainians last week only further confirm this," she said, adding that it was a "pivotal period" for Russia to "use their influence to de-escalate the situation in Eastern Ukraine".
- Russia has previously denied it is destabilising Ukraine, and warned the authorities in Kiev against any use of force against pro-Russian demonstrators.
- "There are no Russian units, special services or instructors in the east of Ukraine," President Vladimir Putin said on Thursday.
-
- The New York Times finds Russian spies in eastern Ukraine
- By Alex Lantier22 April 2014The New York Times has run a relentless campaign of lies and distortions backing US policy in Ukraine. This has included portraying the opposition in eastern Ukraine to the pro-Western regime in Kiev as proof of an aggressive Russian intervention threatening Ukraine, Eastern Europe and the world.
- The newspaper's article Monday, ''Photos Link Masked Men in Eastern Ukraine to Russia,'' purports to provide definitive proof that Russian spies are active in eastern Ukraine and manipulating events there.
- The article begins: ''For two weeks, the mysteriously well-armed, professional gunmen known as 'green men' have seized Ukrainian government sites in town after town, igniting a brush fire of separatist unrest across eastern Ukraine. Strenuous denials from the Kremlin have closely followed each accusation by Ukrainian officials that the world was witnessing a stealthy invasion by Russian forces.
- ''Now, photographs and descriptions from eastern Ukraine endorsed by the Obama administration on Sunday suggest that many of the green men are indeed Russian military and intelligence forces'--equipped in the same fashion as Russian special operations troops involved in annexing the Crimea region in February.''
- There may or may not be Russian agents in Ukraine, a question the World Socialist Web Site is not in a position to answer. However, even if the Times article proved its charge that Russian spies are active in Ukraine'--which, as we will see, it does not'--the reader would have a right to ask: So what?
- CIA Director John Brennan went to Kiev a week ago, though he sought to hide his visit from the public, as the Western-backed regime in Kiev prepared its crackdown on the eastern Ukraine protests. British intelligence has admitted that its agents are combing east Ukraine. Why is the dispatching of spies to Ukraine by Russia more threatening than the appearance of MI6 or of Brennan, who has played a leading role in running a global network of torture camps and a program of drone murder?
- Leaving these questions unasked and unanswered, the Times can write a fear-mongering piece covering up both the imperialist interests driving US policy and the hypocrisy of the American position. Washington and its European allies installed an unelected, anti-Russian government in Kiev by backing a putsch in February spearheaded by the fascist Right Sector militia. During the protests leading up to the putsch, US officials boasted that they had spent $5 billion on building up Ukrainian opposition groups.
- Unsurprisingly, given that the protests were led by fascist groups based in western Ukraine against pro-Russian President Viktor Yanukovych, whose political base was in the east, this led to opposition to the new regime in eastern Ukraine.
- The US regime-change plan in Ukraine was part of a broader policy decision to isolate Russia and treat it as a ''pariah state,'' as the Times reported on Sunday'--a designation previously reserved for countries targeted for US subversion or military attack such as Iraq, Libya, North Korea and Iran. This information is critical to enable the reader decide for himself whether it is Moscow or Washington, abetted by the New York Times, that is driving the Ukraine crisis.
- The Times ignores all of these issues, focusing obsessively on the threat it claims Russian spies pose to Ukraine. Its approach to presenting the issue is indistinguishable from that of a state propaganda agency. It uncritically repeats, as ''news,'' talking points from the military and the Obama administration, largely gleaned from Kiev's intelligence agencies, providing none of the political context necessary for readers to independently evaluate the claims of the generals and spies it quotes.
- The Times extensively quotes General Philip M. Breedlove, the top military commander of NATO, who has pushed for a hard line against Russia in the crisis.
- Breedlove argues that pro-Russian forces in eastern Ukraine ''exhibit telltale military training and equipment,'' including Russian Army issue, which is not gear ''that civilians would be likely to be able to get their hands on in large numbers.'' The Times writes that ''General Breedlove conceded that such points, taken alone, might not prove much, 'but taken in the aggregate, the story is clear.'''
- Breedlove's most significant comment is his admission that his own arguments do not prove anything. It is, of course, conceivable that the protests are driven by Russian army units that have infiltrated east Ukraine, even after Kiev sealed its border with Russia, somehow escaping detection by US spy satellites and electronic monitoring. The Russian army is hardly the only possible source of militarily trained manpower in east Ukraine, however. Units of Ukraine's Berkut riot police and elements of its army, which has Russian-issue gear, have defected to the protesters.
- Breedlove adds, ''It's hard to fathom that groups of armed men in masks suddenly sprang forward from the population in eastern Ukraine and systematically began to occupy government facilities.''
- This comment unintentionally underscores the Times' boundless hypocrisy and the absurdity of its own presentation of the US-backed protests in Kiev that led up to the putsch. Only a few months ago, the newspaper depicted the groups of masked and armed fascist goons from Right Sector who stormed state buildings as the spearhead of a spontaneous popular uprising for democracy.
- The heart of the Times' article is its presentation of photos and transcripts of audio recordings collected by Ukrainian intelligence that supposedly show the role of Russian forces in eastern Ukraine. What rapidly becomes clear, examining the paltry materials presented by the Times, is that they provide no hard proof of any of the newspaper's claims.
- The dossier of photos, the Times writes, ''features pictures taken in eastern Ukraine of unidentified gunmen and an earlier photograph of what looks like the same men, appearing in a group shot of a Russian military unit in Russia.''
- Examining the grainy, low-resolution photos published by the Times, one can only conclude that eastern Ukrainian protesters wear similar helmets, ski masks, and'--occasionally'--beards as do Russian soldiers. Like Breedlove's arguments, the photos prove nothing to anyone who approaches the far-right Kiev regime's claims with an ounce of skepticism. A Reddit user who examined the pictures released by the Ukrainian regime and the lower-resolution versions used by the New York Times concluded that the men in the Russian and east Ukrainian units are in fact different people (click here for the Reddit thread). This further raises the question of whether the Times was a party to a falsification of data, in order to prove a claim for which it has no evidence. It published images without doing the same level of fact-checking that was able to be carried out by someone with a few google searches.
- In a comment posted to the paper's site, one of the many disgruntled readers of the Times article wrote: ''These photos look as convincing as the satellite footage of Iraq's WMD [weapons of mass destruction] that CIA presented just before the invasion.''
- This footage, of course, proved nothing, as Iraq had no WMD. The Iraq war was then launched based on lies which the Times aggressively promoted.
- Finally, the Times presents a YouTube clip of a cell phone call between ''Strelok'' (whom Ukrainian intelligence claims is an alias for an ethnic Russian active in the protests, Igor Strelkov) and his anonymous Russian superior. The two reportedly discuss how to hold territory and how to discuss the armed protesters' political positions with Russian media.
- Since the release of this YouTube clip several days ago, a political analyst named Alexander Boroday has come forward and identified himself as the person on the phone with Strelok. He says he is a counselor for the pro-Russian government in Crimea and denies working for Russian intelligence. The Times, remarkably, does not report these developments to its readers.
- It is conceivable that the Kremlin is running through Boroday a major operation on the scale of the US-backed Right Sector operation in Kiev. However, the Times offers no proof whatsoever to support such speculation.
- One final point regarding the Times' alleged evidence. The Russian government and media have intercepted and published damning material on the role of US and European imperialism in Ukraine, involving publicly known, high-level officials.
- During the Kiev protests, they recorded US State Department official Victoria Nuland and US Ambassador to Ukraine Geoffrey Pyatt plotting to install now-Prime Minister Arseniy Yatseniuk in power in Kiev. They later intercepted communications between EU foreign policy chief Catherine Ashton and Latvian officials, discussing the fact that protesters in Kiev were shot not by Yanukovych's forces, but by pro-Western forces.
- Notwithstanding the massive electronic surveillance program it runs through the National Security Agency, the US government has manifestly been unable to discover material of even vaguely comparable significance.
- The Times' supposed proof of Russian intervention in eastern Ukraine is a red herring. Its immediate political purpose is indicated in the article itself. The Times writes: ''The question of Russia's role in eastern Ukraine has a critical bearing on the agreement reached Thursday in Geneva among Russian, Ukrainian, American and European diplomats to ease the crisis. American officials have said that Russia would be held responsible for ensuring that the Ukrainian government buildings were vacated, and that it could face new sanctions if the terms were not met.''
- Washington has no interest in defusing the crisis. It entered into the Geneva agreement in bad faith, intending to use Russia's supposed violation of the agreement to justify further sanctions and stepped up military provocations. By supposedly publishing ''proof'' that the protests in the east are manipulated by Russia, the Times is supplying the US government with propaganda to claim that the failure of the protesters to disband is Moscow's doing, which is to become the pretext for further escalating the crisis.
- Please enable JavaScript to view the comments powered by Disqus.
-
- US: Pictures indicate Russian troops in Ukraine
- WASHINGTON (AP) '-- The State Department has released images of soldiers in eastern Ukraine that it says are Russian forces, showing militants wearing similar uniforms and brandishing Russian weapons.
- The pictures mark the latest effort by the West to prove that Moscow is using its military to stir unrest in Ukraine.
- A copy of the 11-page State Department document was given to reporters.
- It includes pictures captioned as "concerned citizens" in Crimea and the city of Slovyansk who are dressed the same and carrying the same kind of RPG-26 rocket launchers that are issued to Russian troops.
- There was no way to immediately verify the photographs, which were either taken from the Internet or were given to the Organization for Security and Cooperation in Europe last week by Ukraine diplomats.
-
- Bank for International Settlements - Wikipedia, the free encyclopedia
- The Bank for International Settlements (BIS) (in French, Banque des r¨glements internationaux (BRI)) is an international organization of central banks which "fosters international monetary and financial cooperation and serves as a bank for central banks".[2]
- The BIS carries out its work through subcommittees, the secretariats it hosts and through an annual general meeting of all member banks. It also provides banking services, but only to central banks and other international organizations. It is based in Basel, Switzerland, with representative offices in Hong Kong and Mexico City.
- History[edit]The BIS was established on May 17, 1930 by an intergovernmental agreement by Germany, Belgium, France, United Kingdom and Northern Ireland, Italy, Japan, United States and Switzerland.[3][4]
- The BIS was originally intended to facilitate reparations imposed on Germany by the Treaty of Versailles after World War I.[5] The need to establish a dedicated institution for this purpose was suggested in 1929 by the Young Committee, and was agreed to in August of that year at a conference at The Hague. A charter for the bank was drafted at the International Bankers Conference at Baden Baden in November, and its charter was adopted at a second Hague Conference on January 20, 1930. According to the charter, shares in the bank could be held by individuals and non-governmental entities. The BIS was constituted as having corporate existence in Switzerland on the basis of an agreement with Switzerland acting as headquarters state for the bank. It also enjoyed immunity in all the contracting states.
- Between 1933 and 1945 the BIS board of directors included Walther Funk, a prominent Nazi official, and Emil Puhl, who were both convicted of war crimes at the Nuremberg trials after World War II, as well as Hermann Schmitz, the director of IG Farben, and Baron von Schroeder, the owner of the J.H.Stein Bank, which held the deposits of the Gestapo. There were allegations that the BIS had helped the Germans loot assets from occupied countries during World War II.
- As a result of these allegations, at the Bretton Woods Conference held in July 1944, Norway proposed the "liquidation of the Bank for International Settlements at the earliest possible moment". This resulted in the BIS being the subject of a disagreement between the American and British delegations. The liquidation of the bank was supported by other European delegates, as well as the United States (including Harry Dexter White, Secretary of the Treasury, and Henry Morgenthau),[6] but opposed by John Maynard Keynes, head of the British delegation.
- Fearing that the BIS would be dissolved by President Franklin Delano Roosevelt, Keynes went to Morgenthau hoping to prevent the dissolution, or have it postponed, but the next day the dissolution of the BIS was approved. However, the liquidation of the bank was never actually undertaken.[7] In April 1945, the new U.S. president Harry S. Truman and the British government suspended the dissolution, and the decision to liquidate the BIS was officially reversed in 1948.[8]
- The BIS was originally owned by both governments and private individuals, since the United States and France had decided to sell some of their shares to private investors. BIS shares traded on stock markets, which made the bank an unusual organization: an international organization (in the technical sense of public international law), yet allowed for private shareholders. Many central banks had similarly started as such private institutions; for example, the Bank of England was privately owned until 1946. In more recent years the BIS has bought back its once publicly traded shares.[9] It is now wholly owned by BIS members (central banks) but still operates in the private market as a counterparty, asset manager and lender for central banks and international financial institutions.[10] Profits from its transactions are used, among other things, to fund the bank's other international activities.
- Organization of central banks[edit]As an organization of central banks, the BIS seeks to make monetary policy more predictable and transparent among its 58 member central banks. While monetary policy is determined by each sovereign nation, it is subject to central and private banking scrutiny and potentially to speculation that affects foreign exchange rates and especially the fate of export economies. Failures to keep monetary policy in line with reality and make monetary reforms in time, preferably as a simultaneous policy among all 58 member banks and also involving the International Monetary Fund, have historically led to losses in the billions as banks try to maintain a policy using open market methods that have proven to be based on unrealistic assumptions.
- Central banks do not unilaterally "set" rates, rather they set goals and intervene using their massive financial resources and regulatory powers to achieve monetary targets they set. One reason to coordinate policy closely is to ensure that this does not become too expensive and that opportunities for private arbitrage exploiting shifts in policy or difference in policy, are rare and quickly removed.
- Two aspects of monetary policy have proven to be particularly sensitive, and the BIS therefore has two specific goals: to regulate capital adequacy and make reserve requirements transparent.
- Regulates capital adequacy[edit]Capital adequacy policy applies to equity and capital assets. These can be overvalued in many circumstances because they do not always reflect current market conditions or adequately assess the risk of every trading position. Accordingly the BIS requires the capital/asset ratio of central banks to be above a prescribed minimum international standard, for the protection of all central banks involved.
- The BIS's main role is in setting capital adequacy requirements. From an international point of view, ensuring capital adequacy is the most important problem between central banks, as speculative lending based on inadequate underlying capital and widely varying liability rules causes economic crises as "bad money drives out good" (Gresham's Law).
- Encourages reserve transparency[edit]Reserve policy is also important, especially to consumers and the domestic economy. To ensure liquidity and limit liability to the larger economy, banks cannot create money in specific industries or regions without limit. To make bank depositing and borrowing safer for customers and reduce risk of bank runs, banks are required to set aside or "reserve".
- Reserve policy is harder to standardize as it depends on local conditions and is often fine-tuned to make industry-specific or region-specific changes, especially within large developing nations. For instance, the People's Bank of China requires urban banks to hold 7% reserves while letting rural banks continue to hold only 6%, and simultaneously telling all banks that reserve requirements on certain overheated industries would rise sharply or penalties would be laid if investments in them did not stop completely. The PBoC is thus unusual in acting as a national bank, focused on the country not on the currency, but its desire to control asset inflation is increasingly shared among BIS members who fear "bubbles", and among exporting countries that find it difficult to manage the diverse requirements of the domestic economy, especially rural agriculture, and an export economy, especially in manufactured goods.
- Effectively, the PBoC sets different reserve levels for domestic and export styles of development. Historically, the United States also did this, by dividing federal monetary management into nine regions, in which the less-developed western United States had looser policies.
- For various reasons it has become quite difficult to accurately assess reserves on more than simple loan instruments, and this plus the regional differences has tended to discourage standardizing any reserve rules at the global BIS scale. Historically, the BIS did set some standards which favoured lending money to private landowners (at about 5 to 1) and for-profit corporations (at about 2 to 1) over loans to individuals. These distinctions reflecting classical economics were superseded by policies relying on undifferentiated market values'--more in line with neoclassical economics.
- Tier 1 versus total capital[edit]The BIS sets "requirements on two categories of capital, tier 1 capital and total capital. Tier 1 capital is the book value of its stock plus retained earnings. Tier 2 capital is loan-loss reserves plus subordinated debt. Total capital is the sum of Tier 1 and Tier 2 capital. Tier 1 capital must be at least 4% of total risk-weighted assets. Total capital must be at least 8% of total risk-weighted assets. When a bank creates a deposit to fund a loan, its assets and liabilities increase equally, with no increase in equity. That causes its capital ratio to drop. Thus the capital requirement limits the total amount of credit that a bank may issue. It is important to note that the capital requirement applies to assets while the bank reserve requirement applies to liabilities."[11]
- Goal: a financial safety net[edit]The relatively narrow role the BIS plays today does not reflect its ambitions or historical role.
- A "well-designed financial safety net, supported by strong prudential regulation and supervision, effective laws that are enforced, and sound accounting and disclosure regimes", are among the Bank's goals. In fact they have been in its mandate since its founding in 1930 as a means to enforce the Treaty of Versailles.
- The BIS has historically had less power to enforce this "safety net" than it deems necessary. Recent head Andrew Crockett has bemoaned its inability to "hardwire the credit culture", despite many specific attempts to address specific concerns such as the growth of offshore financial centres (OFCs), highly leveraged institutions (HLIs), large and complex financial institutions (LCFIs), deposit insurance, and especially the spread of money laundering and accounting scandals.
- Role in banking supervision[edit]The BIS provides the Basel Committee on Banking Supervision with its 17-member secretariat, and with it has played a central role in establishing the Basel Capital Accords of 1988 and 2004. There remain significant differences between United States, European Union, and United Nations officials regarding the degree of capital adequacy and reserve controls that global banking now requires. Put extremely simply, the United States, as of 2006, favoured strong strict central controls in the spirit of the original 1988 accords, while the EU was more inclined to a distributed system managed collectively with a committee able to approve some exceptions.
- The UN agencies, especially ICLEI, are firmly committed to fundamental risk measures: the so-called triple bottom line and were becoming critical of central banking as an institutional structure for ignoring fundamental risks in favour of technical risk management.
- Accounting and use of SDRs[edit]Since 2004, the BIS has published its accounts in terms of special drawing rights (SDRs). As of 3/31/2013, the Fiscal Year Report of the bank had total assets of SDR 211,952.4 million. One SDR is equivalent to the sum of USD 0.660, EUR 0.423, JPY 12.1 and GBP 0.111. Included in that total is 404 tonnes (890,658 pounds) of fine gold. Until 2003, the Bank for International Settlements used as currency Gold Franc.
- Members[edit]60 member central banks or monetary authorities of these countries:
- General managers[edit]Board of directors[edit]Christian Noyer, Paris (Chairman of the Board of Directors)Masaaki Shirakawa, TokyoJanet Yellen, Washington, D.C.Stephen S Poloz, OttawaAgustn Carstens, Mexico CityLuc Coene, BrusselsAndreas Dombret, Frankfurt am MainMario Draghi, Frankfurt am MainWilliam Dudley, New YorkStefan Ingves, StockholmThomas Jordan, ZurichMark Carney, LondonKlaas Knot, AmsterdamAnne Le Lorier, ParisGuy Quaden, BrusselsFabrizio Saccomanni, RomeIgnazio Visco, RomeJens Weidmann, Frankfurt am MainZhou Xiaochuan, BeijingSee also[edit]References[edit]Further reading[edit]External links[edit]Coordinates: 47°32'²53'"N7°35'²31'"E>> / >>47.54806°N 7.59194°E>> / 47.54806; 7.59194
-
- New York Times tries to whitewash publication of faked Ukraine photos - World Socialist Web Site
- By Alex Lantier24 April 2014The New York Times responded yesterday to the exposure of its fabricated report alleging that Russian Special Forces are stirring up protests in east Ukraine against the pro-Western regime in Kiev.
- An article Tuesday, titled ''Scrutiny over Photos Said to Tie Russia Units to Ukraine,'' is a clumsy attempt at damage control. Buried in the paper's inside pages, the article begins: ''A collection of photographs that Ukraine says shows the presence of Russian forces in the eastern part of the country, and which the United States has cited as evidence of Russian involvement, has come under scrutiny.'' The Times also noted that ''US officials'' provided some of the pictures to US Secretary of State John Kerry before his talks with Russian, European and Ukrainian officials last Thursday in Geneva.
- The Times does not bother to mention that it featured these faked images in a front-page article and photo spread. It was the Times that used its influence to declare ''the presence of Russian forces in the eastern part of the country'' as part of a propaganda campaign against Russia. Even its own attempt to explain the ''scrutiny'' the photos came under shows, however, that the Times was a party to a grotesque falsification.
- One set of photographs, the Times writes, ''shows a uniformed man with a long beard who was photographed this year in Slovyansk and Kramatorsk and who, the Ukrainians assert, was also photographed during Russian combat operations in Georgia in 2008, wearing a Special Forces patch'... Some observers have asked whether the man photographed in Georgia is the same person photographed in eastern Ukraine.''
- If ''observers'' have questioned the images, it is because higher-resolution versions of the Times' photos available online show quite clearly that the two are different people. The alleged Russian soldier in Georgia is thinner and has a reddish beard, while the bearded man photographed in eastern Ukraine is stouter and has a greying black beard. (Click here for full resolution)
- The two men looked similar only because the Times published only low-resolution, black and white versions of the images available online.
- The Times also admitted there was a ''question'' over a ''group photograph taken in Russia'' that featured prominently in its report. The Times used the photo to claim that the men in the photo were Russian soldiers, and that other pictures of the men, taken in Slovyansk, were proof that the Russian soldiers were infiltrating Ukraine.
- In fact, the Times' claim that the ''group photograph'' was ''taken in Russia'' was a lie. ''It was taken in Slovyansk,'' the photographer who took the picture, freelancer Maxim Dondyuk, told the Times. ''Nobody asked my permission to use this photograph.''
- The Times article shows that the ''newspaper of record'' did not engage in the most elementary fact-checking of material it was handed by the Kiev regime and the US State Department, before plastering the alleged ''evidence'' on its front page.
- This raises the question of how the Times' photo report was published in the first place. Either the Times editors rammed through the piece and its blurry photos without any independent examination, or the editors did check the story, saw it was a grotesque falsification, and published it anyway.
- In either case, the Times functioned not as a legitimate journalistic outlet, but as a propaganda agency of the state.
- Several additional questions are raised:
- · How was the decision to publish the fabricated photo report taken, and by whom?
- · What was the Times' role in the fraud? Did it doctor the photos, or did it uncritically publish photos doctored by as-yet-unnamed operatives in Kiev or in Washington?
- · Do Times staff subject information they receive from the state to any critical review?
- The Times' publication of the photos is not an innocent act. It provided political ammunition for US officials to press the puppet regime in Kiev to crack down on protests in Eastern Ukraine. The photo report appeared as US Vice President Joe Biden left for Kiev to ramp up tensions with Russia.
- Russian Foreign Minister Sergey Lavrov indicated yesterday that Moscow intends to respond to any crackdown on ethnic Russians in east Ukraine by mounting a real intervention. This poses the direct threat of military conflict between Russia and Ukraine, potentially sparking a global war involving nuclear-armed powers.
- The fraudulent photo report and the subsequent attempt at a cover-up is part of a long history of state propaganda masquerading as journalism at the Times. Most infamously, in the lead-up to the US invasion of Iraq in 2003, Times journalist Judith Miller published articles based on false intelligence provided by the Bush administration that Iraq had weapons of mass destruction (WMD). The Times played a leading role in spreading these lies.
- During the Syrian war scare last year, the Times published an article purporting to show that a chemical weapons attack in Ghouta, Syria could only have been launched from government positions, which would cross ''red line'' and provoke a US war in Syria.
- Ultimately, however, the war did not take place, and the Times' article proved to be based on a lie. As was documented by Seymour Hersh, the attack was launched by allies of the United States, including Turkey and Syrian opposition forces, in a criminal attempt to stoke war. Hersh's report was systematically ignored by the US media, including the Times .
- In addition to publishing lies to railroad the public into interventions in Iraq, Syria and now Russia, the Times also suppresses revelations that might embarrass the ruling elite. In 2004, for example, the Times delayed publication of stories on mass NSA wiretapping until after the 2004 presidential elections, at the request of the Bush administration.
- In 2010, then Times editor Bill Keller laid out his paper's position in his response to the revelations of WikiLeaks. Stressing that he was in constant discussion with American officials over whether to publish different stories, Keller wrote: ''We agree wholeheartedly that transparency is not an absolute good. Freedom of the press includes freedom not to publish, and that is a freedom we exercise with some regularity.''
- For the Times, freedom of the press is not a matter of the public's right to know what the state is doing, but the right of the state to suppress information or, as the case of Ukraine shows, to deliberately poison public opinion with outright fabrications.
- Please enable JavaScript to view the comments powered by Disqus.
-
- Poland Pushes Coal on Europe as Putin Wields Gas Weapon - Bloomberg
- By Ladka BauerovaApril 24, 2014 7:33 AM EDTDigging Operations At Belchatow
- Polish Prime Minister Donald Tusk says the country's giant coal fields should become a cornerstone in Europe's defense against a newly aggressive Russia.
- Because the fossil fuel supplies 90 percent of Poland's power it has less need of Russian natural gas than other Eastern European nations, burning half as much per capita as the neighboring Czech Republic, for example. As politicians wrestle with how to respond to the crisis in Ukraine, Tusk argues Europe needs to ''rehabilitate'' coal's dirty image and use it to break Russia's grip on energy supply.
- ''In the context of the Russian-Ukrainian conflict, the overriding objective is to lessen the dependence on Russia,'' said Mujtaba Rahman, an analyst at Eurasia Group in London. ''Climate objectives will be absolutely secondary to that.''
- Coal, a cheaper source of power than gas, nuclear, wind or solar at today's prices, is already a key part of Poland's economy, keeping factories competitive and guaranteeing hundreds of thousands of manufacturing jobs. It's even a tourist attraction.
- At Belchatow in central Poland, where Europe's largest mine produces more than twice as much coal as the whole of the U.K., visitors stand on an observation platform looking into a 310 meter-deep pit that supplies the giant power station visible on the horizon. On a recent April afternoon, the entire junior Polish national soccer team arrived for a look.
- Soviet TroopsPoland burns over 50 million tons of coal a year, more than any European nation other than Germany, while having the lowest reliance on natural gas among the EU's 10 largest economies, according to International Energy Agency data. That's a popular position in a nation where Soviet troops were stationed for four decades until the early 1990s.
- ''Poland should definitely continue using its coal to benefit from its own resources rather than increase the country's dependency on external energy supplies,'' said Lukasz Chodkowski, 33, a Warsaw resident who works as a project co-ordinator in the capital city.
- That doesn't mean Poland is completely independent of Russia. While less vulnerable than some of its neighbors, it remains a gas importer and any disruption in supply would raise energy costs by forcing it to seek more expensive imports from elsewhere.
- President Vladimir Putin said last week that unless Ukraine pays for gas it's already bought, Russia may have to stop shipments, threatening supplies across Europe. OAO Gazprom, Russia's gas export monopoly, said today Ukraine owes $11.4 billion for shipments already received.
- Guarantee Security''We want the whole of Europe to acknowledge coal as a legitimate energy source,'' Prime Minister Tusk said on TV on March 29. ''Poland has been consistently proving that it can guarantee energy security.''
- Tusk's office didn't respond to an e-mail comment seeking further comments.
- In boosting coal, Poland has the backing of other post-Communist EU members such as the Czech Republic and Slovakia, which also have large deposits and a high concentration of heavy industry that depends on the fuel.
- ''Poland's industry relies on lower energy costs to remain competitive,'' said Pawel Swieboda, president of the Warsaw-based Center for European Strategy. ''It's our main strength.''
- Polish industry paid 23 percent less for power than competitors in Germany in 2012 and 21 percent less than in the Czech Republic, according to data compiled by the U.K. government.
- Unified StrategyGovernment support for coal in eastern Europe has prevented the EU from coming up with a unified strategy to meet its climate goals. The 28-nation bloc failed to reach a consensus on climate and energy strategy for 2030 in March and postponed the decision on emissions targets until the end of the year.
- Even Germany, which is driving the continent's switch to clean energy, has found it hard to give up on coal. Utilities like RWE AG (RWE) are turning back to the fuel as the most economical commodity for power production. The combination of record-low electricity prices, generation overcapacity and low prices of carbon credits have made coal more profitable than gas.
- In Poland, the coal industry is a sensitive topic for the government because it provides jobs for over 100,000 people. About a fifth of Belchatow's wage-earning population works in the mine, according to Iwona Paziak, a spokeswoman for Poland's largest utility, state-controlled PGE SA, which operates the Belchatow mine and power plant.
- Wind CapacityPoland has made an effort to diversify its energy industry: the country's wind-power capacity almost doubled in the last two years. But the government is preparing a new law on renewables that will cut subsidies for new projects in order to protect the economy and taxpayers, Prime Minister Tusk said.
- To limit carbon-dioxide emissions, Polish government plans instead to build at least 1,000 megawatts of nuclear capacity in the next 10 years and have as much as 6,000 megawatts by 2035, it said in January. That, again, is pitting it against Germany, which decided to shutter all 17 of its nuclear power stations by 2022.
- The trouble is nuclear construction presents a huge expense the government can hardly afford, especially as the power prices hover near record low. Coal therefore remains the country's most affordable source of energy that also provides relative independence from Russia.
- To contact the reporter on this story: Ladka Bauerova in Prague at lbauerova@bloomberg.net
- To contact the editors responsible for this story: Will Kennedy at wkennedy3@bloomberg.netTodd White
-
- Putin claims Obama 'would for sure save me' if he was drowning in bizarre TV show - People - News - The Independent
- The bizarre remarks came at the end of a four-hour marathon Russian Television special, aptly named Ask Putin Things, where the Russian leader responded to questions from the audience and viewers.
- Reading the question asking if Obama would save him aloud, the self-styled Russian strongman commented: ''In addition to intergovernmental relations there are some personal relations.''
- "I don't think I have close personal relationship with Obama,'' Putin admitted, before saying: ''I think Obama is a courageous and good person and he would for sure save me."
- His confidence doesn't quite match the state of international relations between the two powers as the situation in Ukraine continues to deteriorate.
- Earlier in the week the White House released a statement following a phone call between the two leaders, implying Mr Obama had warned Mr Putin over further troop movements near the Ukrainian border.
- However, as tensions in the country continue to rise, and with the recent deaths of three pro-Russian supporters in Mariupol, Putin and Obama's shaky personal relationship may be under increasing strain.
- Nonetheless, Putin's response was met with applause and laughter, before he quickly moved on.
- Questions varied from Putin's favourite film (Chapayev, in case you're interested) to the economic situation in Crimea and Ukraine.
- The question and answer session wrapped up shortly afterwards '' but it remains to be seen if Putin would save Obama if the situation was reversed.
-
- American journalist held by pro-Russian insurgents in Ukraine | Fox News
- April 13, 2014: A reporter Simon Ostrovsky, right, stands next to a Pro-Russian gunman at a seized police station in the eastern Ukraine town of Slovyansk.AP
- DONETSK, Ukraine '' Pro-Russian gunmen in eastern Ukraine admitted on Wednesday that they are holding an American journalist who has not been since early Tuesday.
- Simon Ostrovsky, a journalist for Vice News, has been covering the crisis in Ukraine for weeks and was reporting about groups of masked gunmen seizing government buildings in one eastern Ukrainian city after another.
- Pro-Russia insurgents who have been occupying police stations and other public buildings in eastern Ukraine for more than a week are defying the accords that Russia and Ukraine signed last week, urging on all parties in Ukraine to lay down the arms and vacate the public offices.
- Members of the nationalist Right Sector movement have also been occupying two buildings in the capital Kiev for months, but authorities have said the priority is to get the gunmen in eastern Ukraine to vacate the buildings they hold.
- Stella Khorosheva, a spokeswoman for the pro-Russian insurgents in the eastern city of Slovyansk, confirmed Wednesday that Ostrovsky was being held at the local branch of the Ukrainian security service that they seized more than a week ago.
- "He's with us. He's fine," Khorosheva told The Associated Press. When asked why Ostrovsky was held captive, Khorosheva said he is "suspected of bad activities" which she refused to explain. She says the insurgents are holding Ostrovsky pending their own investigation.
- In a statement, Vice News said it "is in contact with the U.S. State Department and other appropriate government authorities to secure the safety and security of our friend and colleague, Simon Ostrovsky."
- Ukraine has been engulfed in its biggest political crisis since the fall of the Soviet Union. Months-long anti-government protests in the capital of Kiev culminated in President Viktor Yanukovych fleeing to Russia late February.
- The acting government has accused Russia of orchestrating the unrest in eastern Ukraine which it fears Moscow could use as a pretext for an invasion. Last month, Russia annexed Crimea weeks after seizing control of the peninsula.
- On Tuesday, Ukraine's acting President Oleksandr Turchynov ordered security forces to resume operations in the country's east on Tuesday after the bodies of two people allegedly abducted by pro-Russia insurgents were found. There were no reports of any such operations by midday Wednesday.
-
- knightwatch report ukraine
- For the night of 17 April 2014
- Russia: President Putin emphasized on Thursday that the upper chamber of Parliament had authorized him to use military force if necessary in eastern Ukraine, and he asserted Russia's historical claim to the territory in language not often used before. Mr. Putin repeatedly referred to eastern Ukraine as 'New Russia' - as the area north of the Black Sea was known after it was conquered by the Russian Empire in the late 1700s.
- Comment: Putin's timing relative to the Geneva negotiations is exquisite. His statement serves as the backdrop to the Russian negotiating position. He made it clear that nothing done in Geneva restricts his right and responsibility to protect Russians in eastern Ukraine.
- Ukraine: Kiev regime President Oleksandr Turchynov directed the Defense Ministry to disestablish the 25th Airborne Brigade. He accused its personnel of showing cowardice and of surrendering their weapons, according to the Ukrainian News Agency.
- Comment: The 25th Airborne surrendered its armored vehicles and weapons because it's colonel would not direct the unit to fire on Ukrainian civilians. He said he was told the unit's mission was to fight terrorists.Turchynov has invited a revolt by the Ukrainian army.
- The regime in Kiev also issued orders to its border guards that all Russian men between 16 and 60 were banned from entering Ukraine. A letter to this effect was also sent to the Russian airline Aeroflot. All Crimeans also are banned from entering Ukraine. The justification is that the Kiev regime wants to keep out "undesirable individuals" and to reduce the risk of terrorist acts.
- Russia has called the policy racist and discriminatory.
- Comment: This is the latest manifestation of the Kiev regime's compulsion to annoy the Russians and shorten its time in office by its own hands.
- Russia-US-Ukraine-European Union (EU):SpecialComment. International media proclaimed the news that the United States, Russia, Ukraine and the European Union reached an agreement in Geneva on Thursday evening. Russian Foreign Minister Lavrov called it the 17 April statement which he described as a compromise of sorts.
- A comparison of official statements, official remarks at press conferences and six mainstream news service accounts shows that the diplomats agreed that the situation needs to be defused and buildings needed to be vacated. Beyond that, it seems the diplomats agreed on a number of vague actions that only the Kiev regime, the weakest party, has the authority to execute.
- Most accounts state that illegal armed bands must give up their weapons. It is not clear which groups are illegal. Presumably the Kieve regime is supposed to disarm them, whomever they are. For example, the pro-Russia activists identify themselves as self-defense forces, not illegal armed bands. Russia judges that the entire regime in Kiev is illegal.
- In Kiev, Right Sector is armed; is prominent in the security apparatus, and is supposed to be an unarmed political movement. No one in Kiev can disarm them. They are among the ultra-nationalists who rejected the 21 February agreement reached by the same set of diplomats. They show no disposition to surrender their power in Kiev. If anything, the regime might need to call on them to try to disarm the militias in the east.
- The US position apparently is that all armed people occupying buildings are illegal armed bands. That is not the position of Russia or the eastern Ukrainians who set up their own regime, they say, just like the people in Kiev did.
- As for vacating buildings, the Russians apparently approve the language that buildings illegally occupied need to be vacated. That is not the language the US Secretary of State used. It is unclear the two men meant the same thing. Other accounts state that those who occupied buildings must vacate the buildings and surrender their weapons. That is not what Lavrov said.
- Some news services have reported that the document requires the Kiev regime to consider granting amnesty to pro-Russian activists. The Kiev regime also supposedly will consider giving greater autonomy to eastern Ukrainian oblasts.
- The US President indicated he had reservations that Russia will live up to its commitments, but the actions reported in the press are the responsibility of the regime in Kiev. That is what Lavrov meant when he said that this problem must be solved by the Ukrainians. He also made it clear that the Russians only agreed on the need for steps to be taken.
- The terms that have been released to the media require nothing from Russia, the US or the European Union. The West is not listening to Lavrov and apparently does not appreciate that the Russians have trapped the west and the Kiev regime again.
- First, this document is even less binding than the 21 February agreement by the same diplomats that the Ukrainian regime and the West failed to implement. Secondly, the Kiev regime showed this week that it has no ability to do the things agreed in the document. It has no power to compel the eastern Ukrainians to disarm or to abide by the document.
- Just as Right Sector in Kiev rejected the 21 February agreement for a national unity government and the West did nothing about it, there is every reason to expect the regime in Donetsk will reject this document and Russia will do nothing about it. Thus, the tables are turned once again.
- Russian Foreign Minister Sergei Lavrov said. "We have approved the document - this is the Geneva statement of April 17, in which we agree with the necessity to take initial, certain steps to de-escalate tension and have security for all Ukrainian citizens."
- Lavrov chose his words carefully. Apparently he did not take this to be a substantive negotiation. The absence of mention of Russian as a second language and of greater autonomy for the eastern Ukraine means the Russians considered today's talks preliminary and about the need to take action. The US has portrayed it as an action plan.
- In his press conference, Lavrov pointed out that Ukraine must be neutral. It passed a law to that effect some years ago. It cannot join NATO according to Ukrainian law. Lavrov said the US did not agree to that.
- In sum, the major parties once again used the same words, but meant entirely different things. There is no agreement because there was no meeting of the minds. As Lavrov said, he approved a document, words on paper.
- End ofNightWatch for17 April.
- NightWatch is brought to you by Kforce Government Solutions, Inc. (KGS), a leader in government problem-solving, Data Confidence® and intelligence. Views and opinions expressed in NightWatch are solely those of the author, and do not necessarily represent those of KGS, its management, or affiliates.
- A Member of AFCEA International
-
- Canada joins NATO build-up against Russia
- By Keith Jones19 April 2014Canada is deploying six F-16 fighter jets to Eastern Europe in support of the war threats against Russia made by the US, Germany and NATO, Canadian Prime Minister Stephen Harper announced Thursday.
- Harper also said that Canada and the Canadian Armed Forces (CAF) will strengthen their participation in NATO's command structure by sending a score of additional CAF officers to work at NATO's European headquarters in Mons, Belgium.
- And he suggested that further CAF deployments may be announced in the near future and additional sanctions imposed on Russian businesses and officials in coordination with the US and the European Union.
- Harper and his Conservative government, to enthusiastic applause from the opposition parties and Canada's corporate media, have been making bellicose anti-Russian statements for weeks.
- Turning reality on its head, they have lauded the US- and German-instigated, fascist-spearheaded coup that overthrew Ukraine's elected president as a ''democratic revolution,'' and they have accused Russia of ''aggression'' and ''imperialism,'' when it is the western powers that have aggressively intervened in the Ukraine to install a pro-western client regime, knowing full that the Ukraine's subordination to US and German imperialism constitutes an existential threat to Russia.
- The CAF fighters, pilots and support staff will be based in Lask, Poland. They will participate in the stepped-up NATO patrols over the Baltic Sea and Eastern Europe that were a key element in the expanded NATO presence in Eastern Europe announced Wednesday by NATO Secretary-General Anders Fogh Rasmussen.
- Dressed up as a ''reassurance package'' for the states bordering Russia that have been incorporated into NATO over the past two decades, the NATO deployment to Eastern Europe is an act of aggression, meant to shore up the coup-installed ultra-rightwing government in Kyiv and threaten and prepare for war with Russia.
- Flanked by CAF head General Tom Lawson, Harper indicated the deployment is open ended and is only the first salvo in a major shift in Canada's military-strategic posture
- Russian ''expansionism ''and ''militarism'' are, claimed Harper, ''a long-term, serious threat to global peace and security.''
- Media reports indicate that the Harper government is now considering overturning the 2005 decision of its Liberal predecessor not to participate in the US's anti-ballistic missile shield. While presented as a defensive measure, the US's anti-ballistic missile defence program is aimed at enabling Washington to wage ''winnable'' nuclear war.
- Canada's government may also now give a green light to an increased NATO presence in the Arctic.
- Within the G-7 and NATO, Harper and his Conservative government have been working side-by-side with the US in pressing the European powers to take an even more aggressive stance against Russia.
- Last Monday, Harper appeared alongside the ambassadors to Canada of the Ukraine, Poland, Latvia, Estonia, Georgia and the Czech Republic to promote fresh lies about the events in the Ukraine. He denounced the opposition in the majority Russian-speaking eastern Ukraine to the coup-installed, ultra-nationalist government in Kyiv as ''strictly the work of Russian provocateurs sent by the Putin regime.''
- He then cynically and hypocritically invoked international law. ''It should be a great concern to all of us,'' declared Harper, ''when a major power acts in a way that is so clearly aggressive, militaristic and imperialistic.''
- This from a prime minister who pressed for Canada to participate in the illegal 2003 US invasion of Iraq on trumped-up claims of weapons of mass destruction, has boasted that Canada is Israel's staunchest ally and will ''go through fire and water'' to support the Zionist state, has deployed the CAF in support of US wars of aggression in Afghanistan and Libya, and has vehemently defended the Communications Security Establishment Canada's (CSEC) leading role in the US National Security Agency's global spying operations.
- At his Monday press conference, Harper announced that Foreign Minister John Baird will visit the Czech Republic, Slovakia, Poland, Latvia and Estonia next week. While in Warsaw, Baird and his Polish interlocutors are to announce further steps in support of Ukraine's pro-western government. Canada is strongly supportive of an IMF restructuring program that will further impoverish the Ukraine population, shut down large parts of the country's Russian-oriented manufacturing and heavy industry sectors, and pave the way for Germany and its EU partners to profitably exploit Ukraine's plentiful natural resources and large low-wage workforce.
- On Tuesday, Ottawa further announced that Canada would boycott this week's Arctic Council meeting in Moscow. This action was of more than symbolic significance. Canada and Russia have competing territorial claims over the resource-rich Arctic seabed'--claims Harper has aggressively asserted. Last year, he rejected the Arctic seabed claim that Canadian diplomats and scientific experts had drafted for submission to the UN as too modest and ordered it be rewritten.
- The Canadian media explains the Harper government's obtrusive intervention in the Ukraine crisis by referring to the large Ukrainian-Canadian population.
- To be sure, over the past two decades Canada's government, under the Liberals and Conservatives alike, has sought to leverage the Ukrainian Canadian Congress and its large network of ultranationalist organizations'--many of them open admirers of Nazi collaborator Stepan Bandera and his Organization of Ukrainian Nationalists. Canada has lavished aid on pro-western ''civil society groups'' in the Ukraine with the aim of detaching it from Russian economic and geopolitical influence'--long a key strategic objective of US imperialism.
- Driving Ottawa's intervention in the Ukraine and aggressive anti-Russian stance are the predatory interests of Canada's ruling elite.
- Fearing both its own relative economic decline'--Canada's share of world trade has fallen to some 2.5 percent'--and that of its longtime strategic partner to the south, the Canadian bourgeoisie calculates that it can best assert its global interests by tightening its partnership with Washington and Wall Street. This includes Canadian imperialism supporting and participating in the US's attempt to use its military might as a means of offsetting its loss of economic dominance.
- Since 1999, when Canada played a leading role in the US-led NATO war on Yugoslavia, the Canadian Armed Forces have participated in a series of US-led wars and regime-change operations. These include the twelve-year-long invasion and counterinsurgency mission in Afghanistan, during the course of which 40,000 Canadian troops were deployed to Afghanistan, the 2004 ouster of Haiti's elected president, and the 2011 war on Libya.
- By the beginning of this decade, Canada's military spending in real, not just nominal, terms was higher than at any time since the end of the Second World War.
- And last week the Ottawa Citizen reported that the Canadian military has developed multiple scenarios for military operations in Syria.
- Canada has also signaled its strong support for the US ''pivot to Asia,'' Washington's drive to isolate and militarily encircle China. Like the US-German intervention in the Ukraine, the ''pivot to Asia'' is a highly destabilizing campaign of aggression that threatens to trigger a military conflagration with incalculable consequences for humanity.
- Please enable JavaScript to view the comments powered by Disqus.
-
- US prepares to send troops to Poland
- As eastern Ukrainian protesters dismiss calls to end occupationsBy Johannes Stern19 April 2014The Washington Post reported Friday that Poland and the United States would announce next week the deployment of US ground troops to Poland as part of an expansion of NATO military forces in Central and Eastern Europe, in response to the crisis in Ukraine.
- According to the Post, Polish Defense Minister Tomasz Siemoniak, visiting the newspaper after meeting with US Secretary of Defense Chuck Hagel at the Pentagon, said, ''the decision has been made on a political level and that military planners are working out details.'' The article continued: ''There will also be intensified cooperation in air defense, special forces, cyberdefense and other areas. Poland will play a leading regional role, 'under US patronage,' he said.''
- The report makes clear that the US entered into the Geneva agreement with Russia, purportedly to ''deescalate tensions'' in Ukraine, in bad faith, intending to use Russia's supposed breach of the deal as justification for expanded sanctions and a further aggressive buildup of US and NATO forces in Eastern Europe aimed at encircling and strangling Russia.
- The dispatch of US troops to Poland is a reckless and provocative move that heightens the very real danger not only of civil war in Ukraine, but of war by the US, Germany and NATO against Russia, a nuclear power. It underscores the fact that the crisis in Ukraine was deliberately provoked by Washington to create the pretext for a political, economic, diplomatic and military offensive against Russia that had long been in the planning.
- There is no sign that the Geneva agreement will have any impact on antigovernment demonstrators in eastern Ukraine who have seized buildings and declared vehement opposition to the right-wing, ultranationalist regime in Kiev. That government was installed last February in a putsch orchestrated by Washington and Berlin.
- The demonstrators in the east of Ukraine have dismissed the joint statement issued Thursday by the United States, the European Union, Ukraine and Russia calling for an end to protests and occupations.
- On Friday, demonstrations continued in eastern Ukrainian cities where activists have seized buildings. In the far eastern city of Lugansk, a militia member named Andrei declared that his group had no plans to give up, declaring, ''Everything on the ground is the same as it was yesterday and the day before and the day before that. We're not leaving.''
- In Donetsk, the region's industrial center, with a population of nearly 1 million, a sign on the barricades summed up the mood amongst broad layers of the residents who are deeply hostile to imperialist meddling in Ukraine. It read: ''Bloodthirsty America. Despicable Europe. Leave Ukraine alone.''
- Some protesters denounced Russia's decision to sign a document with the Western powers calling for an end to the antigovernment actions. Activists stressed that they would not leave seized government buildings or disarm until the interim government in Kiev resigned and fascistic groups such as Right Sector, which played a key role in the February 22 putsch against the democratically elected president, Viktor Yanukovych, gave up their weapons and ended their own occupations in the west of the country.
- Denis Pushilin, the leader of the self-proclaimed ''Donetsk People's Republic,'' declared that Russian Foreign Minister Sergei Lavrov, who attended the Geneva talks, ''did not sign anything for us, he signed on behalf of the Russian Federation.'' Alexei, a protester in Slavyansk, told Reuters that Russian President Vladimir Putin was losing support. Referring to Putin as ''Vova,'' he said, ''It turns out Vova doesn't love us as much as we thought.''
- These comments underscore the lying character of the propaganda pumped out by Western governments and media claiming that the protesters in eastern Ukraine are Russian soldiers or agents whose actions are dictated by Moscow. It is increasingly clear that the protests are an expression of popular opposition to the Western-backed regime in Kiev, which includes open fascists, anti-Semites and anti-Russian chauvinists and has pledged to impose brutal austerity measures against the working class.
- While Russia is seeking to strike a deal with Washington and the EU, the regime in Kiev and its imperialist backers are seizing on the Geneva talks to provide a further pretext for mobilizing military forces against antigovernment protesters in eastern Ukraine and expanding NATO's militarily presence in Eastern Europe to threaten Russia itself.
- The ink on the joint statement'--declaring that ''all sides must refrain from any violence, intimidation, or provocative actions'''--was not yet dry when Ukrainian Foreign Minister Andrii Deshchytsia said the government's so-called ''antiterrorist operation'' against pro-Russian protesters would continue. He cynically added that its intensity would ''depend on the practical implementation'' of the agreement.
- The spokeswoman of the Ukrainian Secret Service (SBU), Marina Ostapenko, said the ''antiterror operation'' would continue ''as long as terrorists remain in our country.'' She added: ''In line with the Easter holidays and the Geneva agreements, operations are now in an inactive phase. Headquarters is working and re-planning is underway.''
- The Ukrainian government and its allies in Washington and Berlin see the Geneva agreement as providing a brief pause during which they can reorganize and intensify the military operation that was planned last weekend, when CIA Director John Brennan stole into Kiev for talks with the regime. The operation began Tuesday with the assault on the Kramatorsk military airfield, but came to a halt when the Ukrainian army confronted popular resistance and soldiers refused to attack and some went over to the side of the demonstrators.
- The Pentagon provocatively announced plans to send more aid to the Ukrainian army. ''This will be items like water purification, uniforms, medical supplies and the kinds of things that can help them sustain themselves in the field,'' Rear Admiral John Kirby, the Pentagon press secretary, told CNN.
- Washington's increased military support for Kiev is part of a NATO buildup in Eastern Europe aimed at encircling Russia. On Wednesday, the German government announced plans to send at least one warship and six Eurofighter combat planes to Eastern Europe. A flotilla of five mine detectors headed by the German ship ''Elbe'' is due to depart to the Baltic Sea.
- Also on Wednesday, NATO Secretary-General Anders Fogh Rasmussen announced a massive NATO escalation in Eastern Europe.
- Washington plans to cite the continuation of the protests in eastern Ukraine to claim that Moscow has violated the Geneva agreement, supposedly justifying the imposition of harsher economic sanctions against Russia and an even aggressive deployment of military forces. US Secretary of State John Kerry said, ''the responsibility will lie with those who have organized'' the groups protesting in the east of the country'--a reference to Russia. He added: ''If there is not progress over the course of these next days and we don't see a movement in the right direction, then there will be additional sanctions, additional costs as a consequence.''
- President Barack Obama took the same line at a news conference on Thursday. ''I don't think we can be sure of anything at this point,'' he said, and added that the US and its allies had to ''be prepared to potentially respond to what continues to be efforts of interference by the Russians in eastern and southern Ukraine.''
- Echoing Washington's position, Right Sector spokesman Artem Skoropadsky declared that he saw the Geneva agreement as being directed only at pro-Russian protesters in the east. He claimed that Right Sector did not ''have any illegal weapons, and so the call to disarm will not apply to us.'' He added that ''the vanguard of the Ukrainian revolution should not be compared to outright gangsters.''
- Please enable JavaScript to view the comments powered by Disqus.
-
- Russia's South Stream pipeline splits EU energy policy - baltimoresun.com
- LONDON (Reuters) - Russia's South Stream gas pipeline is splitting European Union energy policy as EU leaders look to block the project while some member states see it as a solution to supply disruptions via Ukraine.The EU has sought for years to reduce its reliance on Russian gas imports, and Moscow's annexation of Ukraine's Crimea region has focused minds further.
- Yet some within the bloc argue that Russia has been a reliable energy provider and blame its decision to cut off supplies in 2006 and 2009 on Ukraine, through which almost half of Russia's gas for Europe passes.President Vladimir Putin has warned Russia could again cut off supplies to Ukraine over what exporter Gazprom says is more than $2 billion in unpaid gas bills.
- The two sides have clashed for years over payments, prompting Moscow to look for routes which bypass Ukraine.
- It completed the Nord Stream pipeline to Germany in 2011 and has mapped out plans for the 2,400-kilometre-long (1,500-mile-long) South Stream which would cross the Black Sea to reach Bulgaria and other EU members beyond.
- In Brussels, there are concerns about relying on Russia for a third of the EU's gas, however, and opposition to a project that would further cement that dominant role.
- "We are serious about reducing our energy dependency ... We need a new way to do energy business," said European Council President Herman Van Rompuy, who represents EU governments in Brussels.
- South Stream would require numerous regulatory approvals from the EU as well as the individual member states it would pass through.
- In the wake of the Ukraine crisis, the EU has announced it has placed its approvals process on hold and earlier flagged other concerns.
- The European Commission has said South Stream does not comply with EU regulations on ownership or third-party pipeline access, for example, and that it could take years for it to do so.
- EU members such as Germany, Italy and Bulgaria continue to back the project, however.
- "We have to say that Russia has been, at least for western Europe, an absolutely reliable supplier," Sigmar Gabriel, Germany's energy and economy minister, said last month.
- Some European countries also have a business interest in seeing the project proceed as the South Stream consortium in addition to Gazprom includes Germany's Wintershall, Italy's ENI and France's EDF.
- Chemical maker BASF, which owns Wintershall, said this month it remained committed to Russian gas and South Stream despite a deepening crisis over Ukraine.
- "We are aware of discussions that people in the Commission argue this investment (South Stream) should be reconsidered," said Wolfgang Weber, head of BASF's Brussels office.
- "At the same time, we believe on the basis of our experience of more than 30 years with Gazprom that this is probably not a good idea. Every single day, the Russians have lived up to their contractual requirements."
- Some diplomats also argue that Nord Stream has provided the biggest improvement in EU gas supply security since the 2009 pricing dispute between Gazprom and Ukraine cut gas supplies to Europe.
- "The importance of South Stream is that it removes southeastern Europe's vulnerability to Ukrainian problems and interruptions, something which is currently a very real threat," said Jonathan Stern, chairman of the Natural Gas Research Programme at the Oxford Institute for Energy Studies.
- "Once built (it) will mean that Gazprom can fulfill all its European contractual commitments without using the Ukrainian network."
- South Stream would be able to supply over 60 billion cubic meters (bcm) of gas to Europe later this decade, meeting up to 15 percent of demand.
- While South Stream consortium member ENI has called the outlook "somewhat gloomy" citing "the many authorizations that European countries must give to complete the project", Bulgaria's energy minister has said work will proceed this year.
- "Bulgaria is part of the European family, meaning that we must comply with European policies. But solidarity is one of the key principles on which the European Union was set up. The European Commission should take into account the negative effects for each member state of its future actions," Energy Minister Dragomir Stoynev said on Thursday.
- Sofia's stance has angered Brussels, which says that member states cannot make such decisions alone without the approval of the European Commission.
- Yet Bulgaria relies entirely on Russia for its gas imports and suffered during the previous cut-offs to supply via Ukraine during cold winters.
- Companies that have secured deals to build South Stream, such as Italy's Saipem and Germany's Europipe, have also said they plan to go ahead as scheduled.
- Should South Stream fail to secure all the required EU regulatory approvals, Turkey has said it would consider having the pipeline run through its territory.
- Turkish gas demand is rising and it could overtake Italy as Russia's second-biggest European market after Germany within a decade.
- (Additional reporting by Barbara Lewis and Luke Baker in Brussels, Tsvetelia Tsolova in Sofia, Christoph Steitz in Frankfurt, Stephen Jewkes in Milan, and Nina Chestney in London; editing by Jason Neely)
-
- US imperialism and the anti-Semitic leaflet in Donetsk
- By Alex Lantier19 April 2014US outrage at a vile anti-Semitic leaflet circulating in the eastern Ukrainian city of Donetsk, demanding that all Jews register with local pro-Russian authorities, is a hypocritical fraud. US officials have seized on the leaflet, whose authorship is totally unclear and which stinks of a provocation to smear protesters hostile to the US-backed Ukrainian regime in Kiev, to denounce protesters and posture as opponents of anti-Semitism.
- At talks between US, European, Ukrainian and Russian officials in Geneva, US Secretary of State John Kerry said: ''In the year 2014, after all the miles traveled in the journey of history, this is not just intolerable, it's grotesque '... beyond unacceptable.''
- What hypocrisy! In the February putsch that toppled Ukraine's government, Washington and its European allies worked directly with fascists, including the Right Sector militia and the Svoboda party. These forces'--which hail the World War II-era Ukrainian fascists led by Stepan Bandera, who collaborated with the Nazis as they carried out the mass murder of Jews in Ukraine'--now occupy top positions in the unelected, pro-Western puppet regime in Kiev.
- Kerry was cynically seizing upon the leaflet to improve the US position in talks with Russia, by distracting from popular anger with the Kiev puppet regime's ties to fascism and providing ammunition for hysterical attacks on Moscow.
- US officials ignored the multiple signs that the document is a crude forgery. The leaflet'--bearing the name of the pro-Russian Donetsk People's Republic, which is occupying local government buildings in Donetsk, and signed by its leader, Denis Pushilin'--was reported on Wednesday in Israeli media.
- It begins, ''Dear Ukrainian citizens of Jewish nationality, due to the fact that the leaders of the Jewish community support the Bandera junta and oppose the pro-Slavic People's Republic of Donetsk, [we have] decided that all citizens of Jewish descent, over 16 years of age and residing within the republic's territory are required to report to the Commissioner for Nationalities in the Donetsk Regional Administration building and register.''
- It demands that Jewish citizens provide extensive documentation as to their property holdings and religion and pay a $50 fee to officials in Room 514 of the local government building occupied by the pro-Russian protesters. Otherwise, the leaflet said, they would face deportation.
- The initial Israeli media reports made clear the highly dubious character of the leaflet. They cited Pushilin's denials that his group had issued it, as well as broader doubts as to its authenticity. Alex Tenzer, a director of the National Association of Immigrants from the Former USSR in Israel, said: ''It's hard to tell whether the leaflet is valid or simply a provocation.''
- Olga Reznikova, who sent YNet a copy of the document from Donetsk, said: ''I do not intend to register. I am 32, I have lived in Donetsk my entire life, and have never had to deal with anti-Semitism until I laid eyes on this piece of paper. Though I take it very seriously, I am uncertain of its authenticity.''
- Reporters for the New York Times who visited Room 514 of the Donetsk local government building on Thursday found it empty. They spoke to protesters who said the leaflet was a trick of the Kiev regime to discredit them. ''We are laughing; this is propaganda,'' one said.
- As Western officials and media prepared for the Geneva talks, however, they baldly attributed the leaflet to pro-Russian groups. Ignoring continuing reports from Donetsk challenging the authenticity of the leaflet, they speculated that it could harm the pro-Russian forces and ''change the narrative'' about Ukraine'--that is, undermine the credibility of anti-Kiev protesters.
- Britain's Daily Telegraph wrote: ''A shocking story coming out of Ukraine: pro-Russian separatists in the eastern part of the country are accused of asking Jewish citizens to register their identity or face deportation '... It could change the narrative of the conflict yet again: the Russian separatism becomes a call not for self-determination, but outright bigotry informed by a desire for racial purity and Orthodox chauvinism.''
- Kerry's denunciations of the Donetsk protesters over the leaflet were echoed by other US diplomats. ''Everything we're hearing suggests this is the real deal, and that it is coming from someone on the ground there among these radical groups,'' US Ambassador to Ukraine Geoffrey Pyatt told CNN, ''either to stir fear or to create provocation justifying further violence.''
- Reporting from Donetsk, however, CNN's Nick Paton Walsh called the leaflet ''by all accounts an isolated incident.'' Referring to protesters and the Jewish community in Donetsk, he added, ''All sides are really trying to calm this down. Bizarrely, really, it's the US State Department focusing specifically on this allegation.''
- This comment from CNN, which can hardly be accused of having a critical attitude towards US foreign policy, gives a far better idea than Kerry's hypocritical statements about the political origins of the anti-Semitic leaflet. The US State Department, Kiev, and their collaborators in Europe know more about it, one may safely assume, than Moscow or the protesters in Donetsk.
- Please enable JavaScript to view the comments powered by Disqus.
-
- German media demand a NATO war against Russia
- By Johannes Stern19 April 2014Leading German journalists, who have been agitating for weeks for a war against Russia, intensified their propaganda after Tuesday's announcement that NATO was stepping up its intervention in Eastern Europe. Even after the experiences of the First and Second World Wars, some clearly can't wait for a re-run of the Eastern Front.
- In the lead editorial of Wednesday's Frankfurter Allgemeine Zeitung (FAZ), entitled ''Flying the flag'', Berthold Kohler expresses delight that NATO has finally awakened from its ''hibernation'' and is flying ''the flag on its eastern edge''. In his view, the massive military presence of NATO in Eastern Europe, announced by NATO Secretary General Anders Fogh Rasmussen in Brussels on Tuesday, supported by Germany with at least one battleship and six fighter aircraft, is not nearly enough.
- Kohler declares: ''the deployment of a few aircraft, ships and soldiers ... [was] the very least ... the Alliance must do to remain credible at home and abroad. Less than that would be seen by the Kremlin as a sign of weakness and indecision, because of which it already despises the West.''
- Kohler then allows his war fantasies against Russia to run wild. Set on full war mode, he complains that NATO currently wanted to do no more than ''not provide Moscow with a pretext to cancel the tediously agreed talks.''
- It is clear that the planned four-way talks between the US, the EU, the pro-Western government in Kiev and Russia alluded to by Kohler are only the background music for the intensification of Western aggression against Russia. Nevertheless, they are a thorn in the eye for Kohler. He does not want dialogue, but war! Venomously, he complains, ''Not only the EU but also NATO prefers talking a thousand times, than shooting once.''
- Such blatant calls for a war by the EU and NATO against Russia are now almost de rigueur in the out of control bourgeois editorial offices. Also on Thursday, the editor of Die Zeit, Joseph Joffe, who for weeks has been agitating against Russia, sings the same tune in his op-ed piece ''The war of the little green men.''
- First, Joffe tries to portray the protests in eastern Ukraine as a criminal conspiracy funded by Russia. He writes, ''The Ukrainians call them the 'little green men'. They are the leadership and the advance guard in eastern Ukraine, just as in March in Crimea. They do not come from Mars, but from Russia ... At the weekend, the Wall Street Journal reports from Kiev, they began to organize local followers (the paper speaks of 'criminal gangs'). For a signing bonus equivalent to 40 to 500 dollars, it says, they have attacked police stations and government buildings.''
- Joffe provides no proof for his allegations. Everything he writes is propaganda. In reality, the resistance in eastern Ukraine is not a Russian conspiracy, but a reaction by the majority of the Russian-speaking population to the putsch regime in Kiev supported by the West and imposed by fascists. As if to underline which political and social interests he articulates when he scribbles his lies and calls for violence and war with the keyboard of his laptop, Joffe cites his source as the Wall Street Journal '--the mouthpiece of international finance capital.
- With satisfaction, he notes that the Ukrainian government, ''in contrast to Crimea'', was ready to ''fight'' this time. On Tuesday, ''the first shots [were] fired'' when ''soldiers drove an armed mob from a Ukrainian base''. Even the Obama administration was now showing ''somewhat sharper teeth'' and talked about ''a 'menu' of retribution''. On ''the menu'' stood ''tougher economic sanctions'', ''the deployment of a 'small' American troop contingent to eastern NATO member countries'' and ''the mobilization of larger units in the event that Moscow openly intervenes''.
- But for Joffe all this is not nearly enough! ''Above all, caution reigns,'' he complains. ''Military movements would have to be approved by the NATO Alliance,'' and considering ''wavering EU capitals'' this was ''not guaranteed''. The aim of the ''troop deployment'' was not ''to deter the Russians, but to strengthen the trust of Eastern NATO members.'' Also, America did not want to ''supply Ukraine with 'lethal' equipment''; the Ukrainian army was receiving ''only field rations''.
- Joffe's conclusion: The US would indeed ''show determination, but not take risks.'' Everything was a ''test of will'', but ''not a test of strength''. The Americans did not want to describe ''a bigger hammer'', ''let alone swing it themselves.''
- Writers such as Joffe and Kohler should be subjects for prosecution by the state attorney. If the standards of the German constitution, the Penal Code or even the Nuremberg war crimes trials were applied to their fascist views to ''shoot'' at last, or to ''swing the hammer'', they would be sentenced in court.
- Article 26 of the German Constitution states that ''Acts tending to and undertaken with intent to disturb the peaceful relations between nations, especially to prepare for a war of aggression, shall be unconstitutional. They shall be made a criminal offence''. Paragraph 80a of the Penal Code states that whoever ''publicly incites to a war of aggression in a meeting or through the dissemination of written materials within the Federal Republic of Germany shall be liable to imprisonment from three months to five years.'' In the Nuremberg war crimes trials, one of the main charges was of committing ''crimes against peace.''
- The fact that leading German daily and weekly newspapers violate these elementary principles, which Germany imposed after the heinous crimes of the Second World War and no one in politics and the media protests, is a warning to the working class. Exactly one hundred years after the outbreak of World War I, the same ruling elite that unleashed two world wars and committed heinous crimes has again discovered the positive sides of war.
- One example of this is an article by the editor of Die Welt, Ulrich Schmid, who writes of the First World War: ''This war, which divided the peoples and posed them against each other in the literal sense, was also an experience that united the people of Europe. As cynical as it may sound, this war created, with martial violence, a common European horizon. In the trenches, the soldiers on both sides of the barbed wire made the same experiences.''
- The Partei f¼r Soziale Gleichheit (PSG, Socialist Equality Party) will not let a criminal ruling class again transform Europe into an imperialist slaughter house because it will not begrudge millions of workers the common experience of being torn apart by bombs! We are standing in the European elections in order to ''make it a plebiscite against the warmongers and their accomplices in the media'', and to build an international anti-war movement that links the resistance to war with the struggle for socialist revolution. Study and disseminate our election manifesto and join in this struggle. It is high time to stop the warmongers!
- Please enable JavaScript to view the comments powered by Disqus.
-
- Are Oil Companies Cutting Deals With Putin To Undermine US Sanctions?
- Rachel Maddow's feature piece Friday night is quite long, but worth watching end-to-end. If you don't have time for the whole thing, leap to around 16 minutes in and watch from there.
- She begins by discussing the International Space Station payments the US still has to make to Russia -- at least, for the mission that's underway right now -- and ends by revealing the wanton ways of oil companies.
- Long story short: While President Obama was crafting a new set of sanctions for Russia if Putin fails to keep his end of the Geneva agreement, Shell Oil's CEO was sitting in Putin's house, cutting a deal for expanded activity in Russia. BP is getting in on the action too, along with ExxonMobil.
- Maddow's question: Can any government tell these multinational companies what to do? And, by Russia's creating a huge national oil company and a huge natural gas company, is Russia now too big to fail, in diplomatic terms?
- Shell Oil is glad to continue doing business with Russia.
- Shell Chief Executive Officer Ben van Beurden won a promise of support for the plan from President Vladimir Putin today at a meeting at the Russian leader's residence near Moscow.
- Putin is pushing to add oil and gas routes for Russia to supply Asia, to tap growing demand and ease the country's reliance on Europe. Shell and state-run OAO Gazprom, its partner in the Sakhalin venture, are looking at expanding capacity by 50 percent before a new wave of supply reaches markets.
- Western sanctions over Russia's actions in Ukraine have not impacted BP's (BP.L) business in Russia, chief executive Bob Dudley said on Tuesday, reiterating the oil major stands by its Russian investments.
- Dudley came under pressure at a BP shareholder meeting last week when some questioned the oil's major investments in Russia at a time of the most serious East-West rift since the end of the Cold War due to Russia's annexation of Crimea.
- Dudley is in Moscow to take part in a meeting of the Russian Geographical Society, where President Vladimir Putin heads the Board of Trustees. Dudley is a member of the board.
- "We are rock solid with our investments in Rosneft and (we) will stand by our investments. For us it's business as usual," he told reporters before the meeting.
- '' Story continues below ''
- ExxonMobil and Russia:Targeting Mr. Sechin would aim directly at Mr. Putin's inner circle. Rosneft, Mr. Sechin's oil company, is deeply involved with Western firms. BP owns nearly 20 percent of the company, and ExxonMobil has multiple projects with Rosneft in Siberia, the Arctic, the Black Sea, Canada, Alaska and Texas.
- Lawyers at ExxonMobil are researching the impact of sanctions against Mr. Sechin. Given that they would apply to Mr. Sechin personally and not his company, some specialists said it might mean little more than a logistical hassle because he could not travel to the United States to meet with his ExxonMobil partners.
- It always comes back to the oil, doesn't it?
-
- Istanbul to seek discount in Russian gas price
- ISTANBUL: Turkey will seek a discount in the price of gas it buys from Russia in talks with the deputy head of state-controlled Gazprom next week when he visits Ankara, Turkey's energy minister said on Friday.
- ''The contract we have with Russia gives us the right for a price revision. We will convey our demands about this to the Russian and Gazprom officials,'' Taner Yildiz told reporters.
- Turkey depends on imports for almost all of its energy needs, and Russia is its biggest gas supplier.
- ''Right now, we are selling below cost, and we are making serious efforts not to pass (higher costs) on to our citizens and industries,'' Yildiz said.
- Turkey's $60 billion annual energy bill is the major driver of its ballooning current account deficit, the main vulnerability of its economy.
- Russia and Turkey are set to discuss a series of energy issues including gas supply, gas price revisions and nuclear power, in the talks with Gazprom's Alexander Medvedev.
- Officials said Russia's recent annexation of Crimea had created a risk for Turkey, noting that 12.5 per cent of its gas supplies pass through Ukraine. Yildiz said steps to prevent a supply problem will be high on his agenda next week.
- To meet rising demand in Turkey, Ankara also wants an increase in the capacity of the Blue Stream pipeline, which carries Russian gas to Turkey under the Black Sea, by around 3.5 billion cubic meters annually from 16bcm currently.
- A potential re-routing of Russia's South Stream pipeline will also be discussed after Turkey said it was open to the possibility of letting the controversial conduit pass through its territory if Moscow made such a request.
-
- Russia writes off 90 percent of North Korea debt, eyes gas pipeline
- MOSCOWSat Apr 19, 2014 4:03pm IST
- Deputies attend a session of the Duma, Russia's lower house of Parliament, in Moscow January 25, 2013.
- Credit: Reuters/Sergei Karpukhin/Files
- More than 814 million are eligible to vote in the world's biggest democratic exercise. Full Coverage
- MOSCOW (Reuters) - Russia's parliament has agreed to write off almost $10 billion of North Korea's Soviet-era debt, in a deal expected to facilitate the building of a gas pipeline to South Korea across the reclusive state.
- Russia has written off debts to a number of impoverished Soviet-era allies, including Cuba. North Korea's struggling communist economy is just 2 percent of the size of neighbouring South Korea's.
- The State Duma lower house on Friday ratified a 2012 agreement to write off the bulk of North Korea's debt. It said the total debt stood at $10.96 billion as of Sept. 17, 2012.
- The rest of the debt, $1.09 billion, would be redeemed during the next 20 years, to be paid in equal instalments every six months. The outstanding debt owed by North Korea will be managed by Russia's state development bank, Vnesheconombank.
- Russia's Deputy Finance Minister Sergei Storchak told Russian media that the money could be used to fund mutual projects in North Korea, including a proposed gas pipeline and a railway to South Korea.
- The two Koreas remain technically at war and are separated by one of the world's most militarised frontiers. Parts of the international community have been seeking to re-engage with North Korea amid hopes that the reclusive state's government would seek ways to end years of isolation and poverty.
- Russia's state-owned top natural producer Gazprom, has long planned to build a gas pipeline via North Korea to South Korea with a view to shipping 10 billion cubic metres of gas annually.
- Moscow has been trying to diversify its energy sales to Asia away from Europe, which, in its turn, wants to cut its dependence on oil and gas from the erstwhile Cold War foe. Moscow aims to reach a deal to supply gas to China, after a decade of talks, this May.
- (Reporting by Vladimir Soldatkin; Editing by Peter Graff)
- Tweet thisLink thisShare thisDigg thisEmailPrintReprintsComments (0)
- Be the first to comment on reuters.com.
- Add yours using the box above.
-
- Donetsk "Letter To Jews" Found To Be A Forgery
- In the days before the Geneva "de-escalation" conference (and coincidentally, days after the secret visit of CIA director Brennan to Kiev), the top story across western media was the "undisputed" proof that east-Ukraine, populated by "terrorist separatists", is preparing to unleash a neo-nazi wave against local jews, when a leaflet was unveiled, beckoning the Jewish population to register and declare their assets.
- The USA Today promptly reported (joined by CBS and CNN): "Jews emerging from a synagogue say they were handed leaflets that ordered the city's Jews to provide a list of property they own and pay a registration fee "or else have their citizenship revoked, face deportation and see their assets confiscated," reported Ynet News, Israel's largest news website, and Ukraine's Donbass news agency."
- Consequences for non-compliance will result in citizenship being revoked "and you will be forced outside the country with a confiscation of property," it said. A registration fee of $50 would be required, it said.
- Odd because as the same USA Today further reported, "Olga Reznikova, 32, a Jewish resident of Donetsk, told Ynet she never experienced anti-Semitism in the city until she saw this leaflet."
- Perversely, even the local Jewish community issued a statement saying the leaflet distribution "smells like a provocation." The chief rabbi of nearby Dnipropetrovsk, Shmuel Kaminezki said, "Everything must be done to catch them."
- So the bottom line, namely that this was merely a provocation designed to generate a kneejerk emotional response from the west and paint the pro-Russia militia as neo-nazis and generally, as fascists (even though it was the ultra nationalist Right Sector that was instrumental in the overthrow of the Yanukovich government) was clear to most - even the population that was seemingly being targeted.
- But not to John Kerry. "Secretary of State John Kerry said the language of the leaflets "is beyond unacceptable" and condemned whomever is responsible."
- "In the year 2014, after all of the miles traveled and all of the journey of history, this is not just intolerable '-- it's grotesque," he said. "And any of the people who engage in these kinds of activities '-- from whatever party or whatever ideology or whatever place they crawl out of '-- there is no place for that."
- U.S. Ambassador to Ukraine Geoffrey Pyatt called the leaflets "the real deal." But the man whose name appears on the leaflets, Denis Pushilin, identified as chairman of "Donetsk's temporary government," said he was not responsible.
- "The real deal"... with the small exception that they were forged, in everything from the photoshopped stamp, to the fact that the person who allegedly signed the leaflets, Denis Pushilin - the Chair of the recently created Donetsk republic - explicitly stated he had nothing to do with this attempt to rile up anti-semitic sentiment in Donetsk.
- Of course, with the CIA operating freely in Kiev, and having been rather instrumental in the establishment of the current political regime (as it did in the US-foreign policy "success stories" of Libya and Egypt), one can be sure that the provocations will only gets more grotesque, surreal and most likely, violent from this point onward.
- More details on the forgery in the clip below:
- Average:Your rating: NoneAverage: 5(6 votes)
-
- David Ignatius: Putin steals from the CIA's playbook with anti-Soviet covert operations - The Washington Post
- The West has made NATO's military alliance the heart of its response to Russia's power grab in Ukraine. But we may be fighting the wrong battle: The weapons Russian President Vladimir Putin has used in Crimea and eastern Ukraine look more like paramilitary ''covert action'' than conventional military force.
- Putin, the former KGB officer, may in fact be taking a page out of the United States' playbook during the Ronald Reagan presidency, when the Soviet empire began to unravel thanks to a relentless U.S. covert-action campaign. Rather than confront Moscow head-on, Reagan nibbled at the edges, by supporting movements that destabilized Russian power in Afghanistan, Nicaragua, Angola and, finally, Poland and eastern Europe.
- It was a clever American strategy back then, pushing a wounded Soviet Union and opportunistically exploiting local grievances wherever possible. And it's an equally clever Russian approach now, offering maximum gain at minimum potential cost.
- The parallel was drawn for me this week by John Maguire, a former CIA paramilitary covert-action officer, who served in the contras program in Nicaragua and later in the Middle East. ''At the end of the day, Putin is a case officer,'' says Maguire. ''He watched what we did in the 1980s, and now he's playing it back against us.''
- From the beginning in Crimea, Putin ran the campaign there as a ''black'' operation. Russian troops wore no insignia, to preserve a fig leaf of deniability. Russian officials, from Putin on down, insisted they weren't seizing Crimea even as their forces consolidated positions. They controlled information flows and coordinated their messaging.
- Putin's destabilization campaign in eastern Ukraine is riskier than the Crimean operation was because the Ukrainian government has warned it will fight back if Russian troops invade. But while the world was distracted by 50,000 Russian troops conducting maneuvers just across the border, the real action was the covert destabilization of major cities in eastern Ukraine. Since these cities are largely Russian-speaking, Putin could count on a base of local popular support.
- On Sunday, pro-Russian ''demonstrators'' seized buildings in Donetsk, Kharkiv and Luhansk. Some demonstrators said they wanted to conduct referendums on joining Russia, just as Crimea did prior to its annexation. It was a clever exploitation of local cultural and religious bias '-- the sort of ''divide and rule'' move favored by intelligence agencies for centuries.
- Secretary of State John Kerry tried to blow the whistle Tuesday on the Russian covert operators. ''It is clear that Russian special forces and agents have been the catalyst behind the chaos of the last 24 hours,'' Kerry told a Senate committee. He said the Russians might use the unrest as a pretext for military intervention, but I'd guess they would stick to their tradecraft. It's safer, and it achieves the same results with what Moscow can claim is legitimacy.
- If you look back at the way the United States worked with Solidarity in Poland in the 1980s, you can see why this form of clandestine activity is so powerful. The CIA's primary ally was the Catholic Church, headed by a Polish pope, John Paul II, who believed as a matter of religious conviction that Soviet communism should be rolled back. To work with the church, the agency needed a waiver from rules that banned operations with religious organizations.
- One thing Putin learned from watching the Soviet empire fall is that the most potent weapons are those that go under the radar '-- and are nominally legal in the countries where operations are taking place. All the nuclear might of the Soviet Union was useless against striking workers in Poland or hit-and-run guerrillas in Nicaragua or mujahideen fighters in Afghanistan. The Soviet Union was a giant beast felled by a hundred small pricks of the lance.
- How can the United States and the West fight back effectively against Putin's tactics? The real answer must come from Ukrainians, who will have to mobilize to protect their country from foreign meddling. Kiev made a start Tuesday, sending police to clear demonstrators from buildings in Kharkhiv but failing to oust them from government offices in Donetsk. The trick for the interim government in Kiev is to fight a nonviolent counterinsurgency '-- keeping a unified Ukrainian population on its side as much as possible.
- The Ukrainian struggle tells us that this is a different kind of war. Putin has learned the lessons of Iraq and Afghanistan, yes, but also those of Poland and East Germany. An ex-spy is calling the shots in Moscow, using a dirty-tricks manual he knows all too well.
- Read more from David Ignatius's archive, follow him on Twitter or subscribe to his updates on Facebook.
-
- The Man Without a Face: The Unlikely Rise of Vladimir Putin and Mr. Putin: Operative in the Kremlin '-- Central Intelligence Agency
- The Man Without a Face: The Unlikely Rise of Vladimir PutinMasha Gessen (Riverhead, 2012), 314 pp.
- Mr. Putin: Operative in the KremlinFiona Hill and Clifford Gaddy (Brookings Institution Press, 2012), 390 pp.
- Late in the administration of George W. Bush, a senior policymaker concerned with developments in Russia sent a query through his intelligence briefer to CIA's analysts. Did we know of any case, he asked, in which a country's intelligence services had taken over the government? A small group of us convened to consider an answer and, momentarily setting aside the question of whether this had happened in Russia under President Vladimir Putin, found no such case.
- There are good reasons for this. Intelligence services generally are led by career bureaucrats rather than ambitious politicians and, in any case, are too small and lacking in weapons to carry out a coup. In countries with large, powerful services'--China, Cuba, North Korea, and the former Soviet Union'--the political leadership watches the organizations closely or pits them against one another to prevent plotting. However, when we began to discuss the situation in Russia'--where former intelligence officers, including Putin himself, filled a large number of senior government positions and the services appeared to hold a great deal of power'--a lively debate ensued as to whether the services actually had taken over.
- Reading Russian journalist Masha Gessen's The Man Without a Face reminded me of that debate, now some six or seven years past. The book actually is two'--a biography of Putin and a memoir of the closing of public life in Russia since Putin first came to national power in 1999. As a biography it is satisfactory, but no more than that. Gessen goes over well-worn ground, recounting Putin's background as a poor and poorly educated young tough in Leningrad and then as a KGB officer whose career could be described, at best, as mediocre. She then sketches his meteoric rise from city politics in St. Petersburg to national power. This is useful but does not tell readers anything about Putin that most do not already know.[1]
- Gessen does somewhat better in her recounting of the collapse of Russia's civic life. She reviews the best-known episodes of the Putin years'--the bombings of apartment buildings in Buynaksk, Moscow, and Volgodonsk in 1999, quite possibly by the FSB itself; the sinking of the submarine Kursk in 2000; the hideously botched responses to the Moscow theater and Beslan school terrorist attacks in 2002 and 2004, respectively; and the murders of prominent Putin critics, like journalist Anna Politkovskaya'--as well as Putin and his cronies' use of trumped-up criminal charges to destroy political opponents and seize the country's wealth. As with the biographical portion of this book, journalists and scholars already have gone over this material, and little of what Gessen has to say is new. Her lively and passionate prose, however, gives a sense of the combination of disappointment and rage that must be simmering among politically engaged Russian liberals and intellectuals.[2]
- The core of what Gessen has to say about Putin and his impact on Russia comes in two passages. In the first, she notes that the young Putin had ''loved the Soviet Union, and he loved its KGB, and when he had power of his own, effectively running [St. Petersburg] he wanted to build a system just like them. It would be a closed system, a system built on total control'--especially control over the flow of information and the flow of money.'' (134) In the second, near the end of the book, Gessen describes the nature and power of Putin's astonishing corruption and concludes that he has ''claimed his place as the godfather of a mafia clan ruling the country. Like all mafia bosses, Putin barely distinguished between his personal property, the property of his clan, and the property of those beholden to his clan'...he amassed wealth'...by placing his cronies wherever there was money or assets to be siphoned off.'' (254) In other words, Gessen argues, Putin has established himself as the chieftain of what is, literally, a gangster state. In this system, any independent actors who refuse to knuckle under become targets and, indeed, many of Putin's opponents have had their careers ruined, had assets seized, or been forced into exile.
- Gessen's analysis of Putin certainly has its attraction. It supports the consensus in academic and popular media analyses that, after 13 years, Putin's chief accomplishment has been to create a privileged elite that has systematically enriched itself by stripping Russia of just about any asset that can be stolen. While Gessen's metaphor oversimplifies'--a Mafia don, after all, does not have to oversee the administration of a country or deal with the intricacies of international politics'--it is easy to grasp and enables her readers to understand her point in an instant. The image of Putin making offers no Russian can refuse is exactly what Gessen wants us to see and is effective as anti-Putin propaganda.
- In contrast to Gessen's passion and simplification, Fiona Hill and Clifford Gaddy in Mr. Putin use cool, analytical, and heavily footnoted prose to examine the subtleties of Putin's background and behavior. This befits their backgrounds'--Hill was formerly a National Intelligence Officer for Russia, and both she and Gaddy are scholars at the Brookings Institution. Their book provides a sophisticated analysis and, even though it reaches essentially the same conclusions as The Man Without a Face'--Hill and Gaddy also use the mafia model to describe Putin's style of governing'--it is the more satisfying work.
- Hill and Gaddy explain Putin by looking at him through six different identities, divided into two groups. The first basket includes identities they label ''Statist,'' ''History Man,'' and ''Survivalist.'' These are labels that Hill and Gaddy believe reflect the views and values of many ordinary Russians. Putin's statist persona, for example, appeals to the Russian political tradition of the strong state and allows Putin to portray himself as a figure above the political fray, ''selected'...to serve the country on a permanent basis and [believing] only in the state itself.'' (36) Similarly, Putin in his history man identity makes appeals to Russia's heritage and Russians' sense of the country's greatness to build support for his policies. In his Survivalist mode, he reminds the country that ''Russia constantly battles for survival against a hostile outside world'...Russia is always put to the test by God, fate, or history'' and so must always be prepared for the worst. (79) In Russian political culture, each of these identities reinforces the others. Putin draws on them as needed to gain the support of various constituencies for his centralized and authoritarian economic and sociopolitical domestic policies, and his neo-imperialist, strong anti-American positions abroad. In this analysis, Hill and Gaddy show Putin to be a very clever politician, indeed.
- In their second set of identities, Hill and Gaddy examine Putin as an ''outsider,'' ''Free Marketer,'' and ''Case Officer.'' The idea of Putin as an outsider may be their most intriguing. In Hill's and Gaddy's view, Putin has been an outsider during every phase of his life'--as a native Leningrader in a country run from Moscow, as a KGB officer assigned to East Germany and Leningrad rather than outside the Bloc or at Moscow Center, and then as the man who came from the provinces to Moscow. Even after 14 years in power, Putin still manages to use populist language and cultural references to portray himself as apart from Russia's corrupt elites.
- It is an image Putin cultivates with care and, as when he promised to pursue terrorists into their outhouses, combines effectively with his survivalist persona. In contrast, Hill and Gaddy use their free marketer analysis to show that Putin is a dismally ignorant student of economics. Even though Putin has not reversed the basic market reforms of the early post-Soviet years, they note that he received his formal education in economics during the Soviet era and learned practical business methods in the corrupt, lawless environment of the early 1990s. Consequently, Putin has no true conception of how modern economies and businesses operate. ''Capitalism, in Putin's understanding, is not production, management, and marketing. It is wheeling and dealing'...personal connections with regulators'...finding and using loopholes in the law, or creating loopholes.'' (163-64) In other words, his view of capitalism is simply that it provides an excuse for looting the country. Whatever prosperity Russia has enjoyed in the 2000s, Hill and Gaddy note, is almost entirely the happy result of high global oil prices, not smart or effective policymaking.
- Hill and Gaddy's chapter on Putin's case officer identity is the longest and richest in the book. Here they place Putin in context as part of the so-called Andropov levy, a generation of KGB officers recruited during the long (1967''82) chairmanship of Yuriy Andropov. According to Hill and Gaddy, Andropov saw himself as an enlightened, liberal secret policeman who emphasized the need to ''work with people'''--that is, to try persuade dissidents to change their minds and support the Soviet regime, but with obvious coercive threats looming in the background. They see Putin as adapting this approach to Russian politics today, trying to win through persuasion, but always ready to bring the full force of the state to bear on any opponent who does not see the wisdom of agreeing.
- Most notably, Putin used this method to bring the oligarchs to heel. Putin made it clear they would be allowed to make their fortunes but had to become apolitical, pay their taxes, and follow Putin's policy line. He made it clear that their ''property rights were ultimately dependent on the good will of the Kremlin,'' with former oligarch Mikhail Khodorkhovskiy's fate'--a long jail term and seizure of his assets'--serving as an example of what would happen to anyone who stepped out of line. It is the same method that Andropov used with dissidents, who knew that psychiatric hospitals and labor camps awaited anyone who failed to be persuaded by the KGB's arguments.
- Hill and Gaddy wrap up their analysis of Putin with chapters describing how he has structured the Russian political system and the challenges he now faces. Having cowed all meaningful opposition, Putin now sits at the center of Russian politics. He maintains a fine balance of forces by, on the one hand, protecting oligarchs and elites from having their properties confiscated by the state or one another, and on the other hand, enforcing loyalty to him by overlooking corruption among politicians while maintaining enormous files of compromising information (kompromat) that could be used for legal blackmail. While this is fine for controlling Russia, Hill and Gaddy point out the obvious truth'--it is not a system for governing a country. ''It is piecemeal and ad hoc'' as well as personalized, they note, and relies completely on Putin, not any coherent structure or ideology. (213) Under this ramshackle system, they conclude with great understatement, ''Russia cannot make the transition to a modern, economically competitive, democratic society without large disruptions.'' (272)
- Hill and Gaddy, therefore, arrive at the same point as Gessen, albeit by a different road. Both books describe how Putin's rule has been disastrous for Russia and, in a sense, for the rest of the world. They show Putin to be a narrow-minded man schooled mainly in the ways of the thug, lacking any concept of how to run a 21st century country. At home, he sees politics not as a contest for influence, but rather as a primeval struggle for survival in which the threat of force is all that matters. With Putin preoccupied with continuing the balancing act that maintains his personal power and wealth, Russia drifts along without coherent social or economic policies, plundered by its elites, and its political and governmental institutions hollowed out. Given that Putin's only significant experience abroad was as a KGB officer in East Germany'--hardly the place to develop an understanding of international politics'--it is not surprising that his foreign policies are driven by an urge to maintain the status quo rather than by a willingness to accommodate or take advantage of change.
- Indeed, this fear of change leads Putin to react to events rather than to shape them. Abroad, he works to preserve the Syrian regime and, closer to home, his government publicly threatens the use of oil and gas exports as weapons to cow other states rather than to strengthen Russia's economy and alliances. These policies have hardly proven to be prescriptions for helping Russia to recover from the catastrophes of the Soviet period; the costs of the lost opportunities of the Putin years can be seen, however, through simple comparisons with what Poland or the Czech Republic have achieved since 1989.
- As valuable as The Man Without a Face and Mr. Putin are in incorporating Putin's intelligence background into analyses of his political performance, both books underestimate the continuing influence of his KGB service on his performance as president and prime minister. Becoming rich and powerful were the result of opportunities that came to Putin in middle age. From childhood, however, Putin wanted to be an intelligence officer, and it was this ambition that did the most to shape his adult outlook.[3]
- That Putin wanted to work for the KGB is, in a sense, no surprise. The Soviet regime in the 1960s tried to make popular culture more appealing to young people and, as part of this effort, sought to make the KGB an attractive career option. Beyond the effort to emphasize persuasion over naked coercion, Moscow copied the West by glamorizing espionage work in films, television, and novels. The vision of glory and adventure no doubt appealed to a young man growing up poor in postwar Leningrad. As Gessen reminds us, moreover, Putin was a street tough'--a young man who never walked away from a fight or allowed himself to show any weakness'--which must have increased the KGB's allure. Fighting the enemies of the socialist state provided an acceptable outlet for what Putin liked to do best.[4]
- The KGB that Putin joined, however, was not necessarily the organization he thought he was joining. There were, in fact, several KGBs by the late 1970s. One was the mythic KGB'--the brave Chekist defenders of the revolution'--that Putin may have told himself he was entering. This was the brutal internal security service, which monitored the population and squashed dissent. The internal service coexisted with another side of the KGB, the foreign intelligence service, which had declined from its glory days in the 1930s and 1940s into a poorly performing organization whose ideological rigidity left it unable to provide political leaders with accurate information about events abroad. Uniting them was the third KGB, a sclerotic and corrupt bureaucracy that was typical of state agencies during the late Soviet period.
- Putin, as Gessen notes, turned in an entirely undistinguished performance in foreign intelligence. Trained in German, he was assigned to Directorate S, which was responsible for the illegals program, and sent to Dresden, which was as much of a backwater as the KGB had. There Putin's job was to find candidates to become illegals, but serving the KGB had no attraction to the foreign students he tried to recruit, and by all accounts, including Gessen's, he accomplished nothing in East Germany. On his return to the Soviet Union, Putin's performance earned him an assignment to Leningrad, rather than Moscow Center, and Putin seemed destined to be a second-rate KGB officer stuck in second-rate postings.
- One thing about Putin that has become clear is that, despite experiences that might have caused others to question their choice of profession or service, he absorbed the ethos of Soviet intelligence without question. He has made no secret of his nostalgia for the Soviet Union. Not surprisingly, Putin's longing for the good old days extends to the KGB'--Putin made it a priority, as Andrei Soldatov and Irina Borogan have ably described, to restore the roles and powers of the security services, and many of his appointees to high positions have KGB or post-Soviet security service backgrounds. Given this, it is not surprising that Putin has done much to recreate the Soviet counterintelligence state. Such a state, as John Dziak pointed out 25 years ago in his history of the KGB, is marked by an ''overarching concern with 'enemies,' both internal and external,'' and creates a security service that ''penetrates and permeates all societal institutions'' and is preoccupied with conspiracies. The growth of the FSB's power during the Putin years, as described by Soldatov and Borogan, along with new laws expanding the definition of treason and reining in the so-perceived threatening activities of foreign nongovernmental organizations, provides ample evidence of Putin's internalization of the KGB way.[5]
- As these accounts indicate, moreover, when Putin adopted the political methods that the KGB and its predecessors employed, he did not limit himself only to the Andropov-era tactics that Hill and Gaddy describe. Rather, he uses methods that harken to the Cheka and, in fact, to the Tsarist Okhrana. These include assassinating opponents at home and abroad and'--if Gessen's and Soldatov and Borogan's analyses are correct'--staging provocations such as the apartment bombings to provide a pretext for renewing the war in Chechnya and solidifying his grip on power, much as Stalin had Kirov killed so he could begin the Terror. Political and public trials reminiscent of Soviet ''era show trials come at regular intervals, against targets as diverse as Khodorkovskiy, blogger Aleksey Navalny, and the young women of Pussy Riot. Putin also made clear his continuing view of himself as a KGB officer when he greeted the returning illegals after the spy swap in July 2010. In so doing, he showed that he still identified as a Directorate S officer and, in praising the heroism of the illegals, no doubt hoped that some of their glory would rub off on himself as well.
- While Gessen sees Putin as driven primarily by a hunger for power and wealth, and Hill and Gaddy view him as a vestige of Andropov's half-hearted liberalism, the truth is more disturbing. Putin remains a Soviet intelligence officer, proud of his Chekist heritage and all that goes with it. Had the USSR not collapsed, he would have continued to serve it loyally. It disappeared, however, and now this cunning and ruthless man dominates Russia, ruling with the ethos he absorbed in the KGB.
- We ultimately ended our Bush-era debate by concluding that the intelligence services had not taken over Russia. To be sure, a former intelligence officer was'--and again is'--ruling Russia, and had staffed the top levels of the government with men sharing his background. Still, even without the benefits of having read The Man Without a Face and Mr. Putin, we decided that the services answered to Putin rather than the other way around. This conclusion seems as correct today as it did then, especially as Mr. Putin has expanded our insight into how he uses the skills he learned as a KGB officer. Still, as these books demonstrate without any doubt, no one controls Putin. Whatever Russia's fate in the years ahead, he will be the man who is responsible.
- All statements of fact, opinion, or analysis expressed in this journal are those of the authors. Nothing in any of the articles should be construed as asserting or implying US government endorsement of their factual statements and interpretations. Articles by non-US government employees are copyrighted.
-
- This Means War: US To Target Putin's Personal $40 Billion Stash | Zero Hedge
- While the White House has continually threatened further sanctions against Russia for non-de-escalation (even as it un-de-escalates itself), the specifics of the additional sanctions have been sparse. German CEO warnings over blowback from economic sanctions... the "nonsense" of replacing Russian gas with US gas... the Russian warnings of "interdependence" and "boomerangs"... all reduce the West's arsenal of financial sanctions. But, as The Times of London reports, perhaps the US has found a crucial pain point for Putin - a sanctions regime that would target Putin's personal wealth, which includes a reported $40 billion stashed in Swiss bank accounts.
- The White House on Friday refused to comment on reports that Russian President Vladimir Putin's personal wealth could be targeted if the West were to move ahead with additional sanctions over Ukraine.
- "I'm not going to get into foreshadowing particular individuals or entities that the United States may target," national security adviser Susan Rice told reporters at the White House. "But let me just say we've been clear that there are additional individuals, officials, close associates of senior leadership, oligarchs and those entities that they are associated with that remain very much potential targets of additional sanctions."
- TheTimes of London reported Friday that the U.S. was preparing a sanctions regime that would target Putin's personal wealth, which includes a reported $40 billion stashed in Swiss bank accounts.
- Putin's actual holdings are a tightly held secret, and the extent of his holdings are difficult to estimate. But a threat of trying to freeze the Russian president's personal assets could have played a role in a deal brokered Thursday by foreign ministers from the U.S., Ukraine, Russia and European Union.
- Perhaps it is worth remembering Putin's response from last week's Q&A...
- Putin was asked why the US can do whatever it wants and no one punishes them, while attempts are being made to punish Russia.
- ''The US is certainly one of the world's leaders. At some point it seemed that it was the only leader and a uni-polar system was in place. Today it appears that is not the case. Everything in the world is interdependent and once you try to punish someone, in the end you will cut off your nose to spite your face,'' he said.
- Though we are sure Obama and his team have considered all the intended and unintended consequences of any such actions.
- Average:Your rating: NoneAverage: 4.4(35 votes)
-
- Ukraine's Anti-Semitism Media War
- By James Kirchick | April 18, 2014 | New York Daily News
- In the struggle over Ukraine, it's not just territory that's at stake, but the allegiance of the country's Jews.
- Earlier this week, Jewish residents in the contested eastern city of Donetsk reported that they had been handed fliers ordering them to "register" with local pro-Russian separatists, pay a fee of "50 American dollars," and hand over proof of any property they owned. Immediately, the story went viral.
- That's because Jews have become pawns in the media war over Ukraine. Soon after corrupt former President Viktor Yanukovych was overthrown by pro-Western protestors and fled to Russia in February, Moscow's propaganda machine went into high gear. President Vladimir Putin accused the revolutionaries of being "anti-Semites" and "fascists," a line that has since been taken up ad infinitum by the Kremlin's Western stooges to discredit the country's new government.
- Yet when I visited Kyiv last month and interviewed members of the Jewish community, I discovered scant concern about rising fascism. While it's true that the post-Yanukovych government includes some members from a nationalist party that traces its origins to World War II-era Nazi collaborators, to categorize the new government tout court as being composed of Nazis is a reckless smear. Ukrainian Jewish leaders have said so themselves, publishing an open letter to Putin last month in major newspapers stating that his claim of rampant anti-Semitism in Ukraine, "does not correspond to the actual facts."
- The fliers, which bore the signature of a separatist leader, are clearly meant to impugn those ethnic Russians seeking annexation by Moscow. Whoever printed them knows that allegations of anti-Semitism will raise eyebrows in the West, especially among political leaders in influential countries like the United States and Germany.
- Yet not only is there no evidence whatsoever that Donetsk's Jews are being made to "register" (as reporters on the ground soon discovered for themselves), the flyers are most likely not what they seem. According to TIME's Simon Shuster, currently reporting from Donetsk, they were most likely printed either by Ukrainians loyal to the central government hoping to shame the rebels, or rival separatists looking to make an easy buck. "It's quite possible that some of the more entrepreneurial goons among them just felt like making a bit of extortion money on the side," he writes.
- Such tactics - known as "provocations" - are par for the course in the former Soviet Union; think Nixonian dirty tricks but on a far more combustible scale. Anyone remotely familiar with that part of the world should have suspected this gambit to be such a ploy; the language in the flyers is too incendiary and crude, too evocative of the Nuremburg Laws, to be genuine. Which is why it is so alarming that America's top diplomat took them at face value.
- "In the year 2014, after all of the miles traveled and all of the journey of history, this is not just intolerable, it's grotesque. It is beyond unacceptable," intoned Secretary of State John Kerry in Geneva, where he was meeting his Russian, Ukrainian and European counterparts to hammer out an agreement on resolving the crisis in the country's east. Ben Rhodes, Deputy National Security Advisor for Strategic Communications, tweeted, "reports of Jews being forced to register by pro-Russian forces in Eastern Ukraine are chilling, outrageous and must be universally condemned."
- Rhodes might consider altering his job title to Advisor for Strategic Miscommunication, so hasty was this righteous pronouncement.
- The administration's injudicious response needs to be understood within the broader context of Russian black PR. Moscow lies about practically everything when it comes to Ukraine and does so with an impressive degree of effortlessness. For instance, on Thursday, Vladimir Putin finally acknowledged that the "little green men" who had invaded the Crimean peninsula last month were indeed Russian soldiers, not indigenous "self-defense units," as he and other Russian officials had implausibly claimed they were for weeks on end.
- Given the relentless and cynical propaganda offensive by the Russians, it is understandable how the administration would eagerly seize upon news of pro-Russian elements demanding the "registration" of Jews, so desperate is Washington to win quick public relations points. But this quickness to accept dubious information as authentic will merely make it easier for the Russians to claim that, no matter how skeptical one may be of Moscow's motives, Washington is equally untrustworthy.
- When it comes to Ukraine and Russia's blatant violation of its sovereignty, America and its western allies have the truth on their side. They should stick to telling it.
-
- Renovation of Sevastopol School #5, Ukraine - Federal Business Opportunities: Opportunities
- Combined Synopsis/Solicitation / Cancelled
- Contracting Office Address:
- PSC 817 Box 51FPO AENaples, 09622-0051United States
- Primary Point of Contact.:
-
- SnowJob
- NYTimes: F.B.I. Informant Is Tied to Cyberattacks Abroad
-
- Snowden Self-Incriminates
- Edward Snowden cleared up a lot when he appeared on Vladimir Putin's ''town hall'' video program. https://www.youtube.com/watch?v=w1yH554emkY
- His question for Putin was familiar to anyone who's followed Snowden's remarks in recent months: spying isn't bad, Snowden suggests, but ''the mass surveillance of online communications and the bulk collection of private records '' is evil. He trashes the US for programs that ''unreasonably intrude on the private lives of ordinary citizen''' and asks, ''Does Russia intercept, store or analyse in any way the communications of millions of individuals?'' I've prepared and answered a lot of questions at hearings, and a compound question like that is almost always a setup: It begs for a categorical ''No.'' And that's what it got. It sure looks as though Snowden is playing the Kremlin's game here, serving up a pre-arranged softball on demand.
- Equally interesting is the Russian government's implicit endorsement of the Snowden ''mass surveillance'' talking point. This television program is tightly scripted, and Snowden's question must have been approved at the highest levels of the Russian government to get past the screeners. So this is clearly a message that the Russian government wants to promote.
- I've suspected for a while that Snowden's objection to mass surveillance point was a phony. It doesn't explain most of the stories Snowden has fathered or most of the documents that Snowden has compromised. Is it mass surveillance '-- is it even remotely a scandal '-- for NSA to monitor the communications of the Syrian military or to join with Norway in scrutinizing Russia's activities in the Arctic or to modify a USB cable so it can extract the secrets of a single computer '' to name just three programs that the Snowdenistas have disclosed?
- Now we can see not just that the ''mass surveillance'' justification is false but where the falsehood came from: it was almost certainly manufactured by the same Russian government that has now embraced it.
- Why does Russia want this particular lie in circulation? Putin's answer tells us that too. After making the laughable claim that Russian surveillance is controlled by Russian law and Russian courts, Putin lets his mask slip just a bit: ''there is no mass scale '.... We do not have as much money and as many devices as the US to do that.''
- Exactly. The Russians can't match NSA in money or technology (or in allies, he might have added). So Russia wants to drastically erode the American advantage in these things. And that, of course, is exactly the effect that Snowden's disclosures have had. If he persuades Americans to turn against NSA's foreign intelligence methods, if convinces our allies to trim NSA's wings, or if he gets American technology companies to refuse to help their country, well, then Russia's lack of money, allies, and technology won't matter anywhere near as much.
- To sum up, for the last several months, while living in Russia, Snowden has been putting forward a justification for his acts (a) that he knows is not true, since it doesn't explain his actions, (b) that is approved at the highest levels by the Russian government and (c) that gravely harms the US and helps Russia in its confrontations with the US around the world.
- I've said for a while that I thought the jury was out on whether Snowden is a traitor.
- Now I think I hear it filing in.
- Who says you can't learn anything watching Russia's propaganda channels?
- Also on The Volokh ConspiracySpeed limits, immigration, and the duty to obey the law
-
- Edward Snowden defends decision to question Vladimir Putin on surveillance | World | The Guardian
- Edward Snowden has defended his decision to appear on live Russian television, insisting his question to Vladimir Putin on mass surveillance was designed to hold the Russian president accountable and not, as critics have suggested, an act of compliant propaganda.
- Writing for the Guardian, the whistleblower behind the National Security Agency leaks suggests he carefully framed the question to Putin, which he asked via video link in an annual televised call-in with the president on Thursday. Putin, Snowden writes, ''denied the first part of the question and dodged on the latter''.
- In the phone-in, Snowden asked Putin: "Does Russia intercept, store or analyse, in any way, the communications of millions of individuals?"
- Putin replied: "Our intelligence efforts are strictly regulated by our law... We don't have a mass system of such interception and '' according with our law ''it cannot exist."
- Snowden quizzes Putin on Russian TVThe wording was deliberately modelled, Snowden says, on the query of US senator Ron Wyden to the director of national intelligence, James Clapper, in March last year '' almost three months before the NSA disclosures began '' to which Clapper blatantly and inaccurately denied that the US government collected data on millions on Americans.
- ''The question was intended to mirror the now infamous exchange between Senator Ron Wyden and DNI James Clapper'... and to invite either an important concession or a clear evasion'' from Putin, Snowden writes.
- Snowden's decision to take part in Putin's annual live session, which traditionally features softball questions, prompted an outpouring of criticism against the former NSA contractor. He is in exile in Russia having been charged with three felonies by the US government in relation to the leak, including one count under the Espionage Act.
- Stewart Baker, the NSA's former general counsel, attacked Snowden in a post for Volokh Conspiracy blog on the Washington Post headlined ''Snowden self-incriminates''. Baker wrote: ''It sure looks as though Snowden is playing the Kremlin's game here, serving up a pre-arranged softball on demand.''
- Edward Lucas, a senior editor at the Economist who has attacked the leaker in an e-book called The Snowden Operation, told the Wall Street Journal the appearance had made him ''look like a propaganda patsy of the Kremlin''. Lucas added that given how careful Snowden had been on this question, ''it seems almost reckless. This raises all sorts of questions about the real conditions of his stay in Russia and his relationship with the Kremlin.''
- Even some Snowden supporters voiced unease at his participation in the event. Jillian York, the director of international free expression at the Electronic Frontier Foundation, who has previously given numerous public talks in support of Snowden and the NSA revelations, tweeted: ''Snowden's question WAS softball. If he knows as much as he claims, he would've known that the wording gave Putin an easy out.''
- But in his article, which was given to the Guardian via the Freedom of the Press Foundation, on whose board Snowden sits, Snowden says such criticism was a simple misinterpretation of what he had been trying to do. He emphasises that he has sworn no allegiance to Russia and has no ulterior motive.
- ''I expected that some would object to my participation in an annual forum that is largely comprised of softball questions to a leader unaccustomed to being challenged. But to me, the rare opportunity to lift a taboo on discussion of state surveillance before an audience that primarily views state media outweighed that risk.''
- Snowden says that before state officials in any country can be held accountable, ''we must first give them an opportunity to make those claims''. He said he was motivated by a belief that mass surveillance was a threat to people everywhere, not just in the US.
- ''Last year, I risked family, life, and freedom to help initiate a global debate that even [Barack] Obama himself conceded 'will make our nation stronger'. I am no more willing to trade my principles for privilege today than I was then.''
-
- Vladimir Putin must be called to account on surveillance just like Obama | Edward Snowden | Comment | The Guardian
- On Thursday, I questioned Russia's involvement in mass surveillance on live television. I asked Russia's president, Vladimir Putin, a question that cannot credibly be answered in the negative by any leader who runs a modern, intrusive surveillance program: "Does [your country] intercept, analyse or store millions of individuals' communications?"
- I went on to challenge whether, even if such a mass surveillance program were effective and technically legal, it could ever be morally justified.
- The question was intended to mirror the now infamous exchange in US Senate intelligence committee hearings between senator Ron Wyden and the director of national intelligence, James Clapper, about whether the NSA collected records on millions of Americans, and to invite either an important concession or a clear evasion. (See a side-by-side comparison of Wyden's question and mine here.)
- Clapper's lie '' to the Senate and to the public '' was a major motivating force behind my decision to go public, and a historic example of the importance of official accountability.
- In his response, Putin denied the first part of the question and dodged on the latter. There are serious inconsistencies in his denial '' and we'll get to them soon '' but it was not the president's suspiciously narrow answer that was criticised by many pundits. It was that I had chosen to ask a question at all.
- I was surprised that people who witnessed me risk my life to expose the surveillance practices of my own country could not believe that I might also criticise the surveillance policies of Russia, a country to which I have sworn no allegiance, without ulterior motive. I regret that my question could be misinterpreted, and that it enabled many to ignore the substance of the question '' and Putin's evasive response '' in order to speculate, wildly and incorrectly, about my motives for asking it.
- The investigative journalist Andrei Soldatov, perhaps the single most prominent critic of Russia's surveillance apparatus (and someone who has repeatedly criticised me in the past year), described my question as "extremely important for Russia". According to the Daily Beast, Soldatov said it could lift a de facto ban on public conversations about state eavesdropping.
- Others have pointed out that Putin's response appears to be the strongest denial of involvement in mass surveillance ever given by a Russian leader '' a denial that is, generously speaking, likely to be revisited by journalists.
- In fact, Putin's response was remarkably similar to Barack Obama's initial, sweeping denials of the scope of the NSA's domestic surveillance programs, before that position was later shown to be both untrue and indefensible.
- Snowden quizzes Putin on Russian TVSo why all the criticism? I expected that some would object to my participation in an annual forum that is largely comprised of softball questions to a leader unaccustomed to being challenged. But to me, the rare opportunity to lift a taboo on discussion of state surveillance before an audience that primarily views state media outweighed that risk. Moreover, I hoped that Putin's answer '' whatever it was '' would provide opportunities for serious journalists and civil society to push the discussion further.
- When this event comes around next year, I hope we'll see more questions on surveillance programs and other controversial policies. But we don't have to wait until then. For example, journalists might ask for clarification as to how millions of individuals' communications are not being intercepted, analysed or stored, when, at least on a technical level, the systems that are in place must do precisely that in order to function. They might ask whether the social media companies reporting that they have received bulk collection requests from the Russian government are telling the truth.
- I blew the whistle on the NSA's surveillance practices not because I believed that the United States was uniquely at fault, but because I believe that mass surveillance of innocents '' the construction of enormous, state-run surveillance time machines that can turn back the clock on the most intimate details of our lives '' is a threat to all people, everywhere, no matter who runs them.
- Last year, I risked family, life, and freedom to help initiate a global debate that even Obama himself conceded "will make our nation stronger". I am no more willing to trade my principles for privilege today than I was then.
- I understand the concerns of critics, but there is a more obvious explanation for my question than a secret desire to defend the kind of policies I sacrificed a comfortable life to challenge: if we are to test the truth of officials' claims, we must first give them an opportunity to make those claims.
- ' Edward Snowden wrote for the Guardian through the Freedom of the Press Foundation
- ' This article was amended on 18 April to correct the attribution of comments from Andrei Soldatov to the Daily Beast
-
- Snowden's Camp: Staged Putin Q&A Was a Screw-Up - The Daily Beast
- Even the NSA leaker's closest advisers now say his appearance on a Kremlin call-in show, which touched off yet another international firestorm, was a mistake.
- NSA leaker Edward Snowden instantly regretted asking Russian President Vladimir Putin a softball question on live television about the Kremlin's mass surveillance effort, two sources close to the leaker tell The Daily Beast.
- ''It certainly didn't go as he would've hoped,'' one of these sources said. ''I don't think there's any shame in saying that he made an error in judgment.''
- ''He basically viewed the question as his first foray into criticizing Russia. He was genuinely surprised that in reasonable corridors it was seen as the opposite,'' added Ben Wizner, the American Civil Liberties Union attorney who serves as one of Snowden's closest advisers.
- According to Wizner and others, Snowden hadn't realized how much last week's Q&A'--with Putin blithely assuring Snowden that Moscow had no such eavesdropping programs'--would appear to be a Kremlin propaganda victory to Western eyes. And so the leaker quickly decided to write an op-ed for the Guardian to explain his actions and to all but label Putin a liar for his televised response.
- Ever since Snowden landed in Moscow under the watchful eye of the Russian surveillance state, he's been represented in Russia by a man deeply connected to the Kremlin in addition to his American counsel. It's one of many reasons why critics have accused the leaker of being a Putin patsy. That criticism has been accompanied by a whisper campaign from both the American and Russian governments alleging that Snowden was under the thumb of Putin's intelligence services, a claim Snowden and his camp have strongly denied.
- The talk rubbed Snowden the wrong way, his associates say. For months, he had been ''looking for a situation to prove his critics wrong,'' said one of his confidants'--a chance to ''convey to the public that he feels the same way about mass surveillance in Russia as he did about mass surveillance in the U.S.''
- But it wasn't easy in Russia, where the press is controlled so tightly by the regime. Last month, the Kremlin silenced many of the last remaining critical news outlets in the country. ''In Russia, you just can't'--obviously, there's not as much dissent as in the U.S.,'' a source close to Snowden said. The Putin television program seemed to be ''a high-profile opportunity'' to correct the record.
- Snowden's camp wouldn't get into the specifics of how his question made it onto the live broadcast on Russian state television. But it is worth noting that Anatoly Kucherena, Snowden's Russian lawyer, has deep Kremlin ties and sits on the board that oversees the FSB, the successor to the KGB. Getting on state television wouldn't have been much trouble.
- With several of his key advisers offline, Snowden crafted his question for Putin. The leaker was aware that a frontal assault on the Russian leader likely wouldn't make it past the Kremlin's publicists. (''How do you succeed in lifting the taboo on state surveillance without being censored by state screeners?'' Wizner asked.) So Snowden spent the first half of his pre-taped question talking about the ills of American surveillance. Then he said:
- ''Does Russia intercept, store, or analyze in any way the communications of millions of individuals? And do you believe that simply increasing the effectiveness of intelligence or law enforcement agencies can justify placing societies, rather than subjects, under surveillance? Thank you.''
- ''It was the strongest possible question that could possibly get through [Putin's propagandists],'' one source close to Snowden said. Which is to say: not very strong at all.
- Snowden may have thought he could catch Putin in a lie; Russia, in fact, has one of the world's most pervasive systems for state surveillance. Snowden may have crafted the question to mirror Sen. Ron Wyden's questioning under oath of Director of National Intelligence James Clapper, as Snowden later claimed in his Guardian op-ed. (Clapper wound up spouting, as he later put it, the ''least untruthful'' statement he could about the NSA's domestic spying.) But that assumes Putin'--or Russia'--cares about such untruths in the same way America or its leaders do. ''Trapping Putin in a lie is not the same as trapping Obama or Clapper,'' one of Snowden's advisers sighed.
- ''I know this is hard to believe. I know if I was just watching from afar, I'd think, 'Wow, the Kremlin forced him [Snowden] to do this.' But it's not true. He just fucking did it.''
- Putin's answer was predictable. ''Of course, we know that criminals and terrorists use technology for their criminal acts and of course the special services have to use technical means to respond to their crimes,'' he said. ''But we don't have a mass-scale, uncontrollable efforts like that'...Our special services'...are strictly controlled by the society and the law, and are regulated by the law.''
- The response in the West was immediate, and overwhelmingly negative. ''Snowden's appearance on Russian television yesterday in a highly scripted propaganda stunt for Vladimir Putin does not settle the question of whether he was originally an FSB tool. But it sure does settle the question'--at least in my mind'--of his role now,'' wrote Benjamin Wittes, a defender of the NSA and a senior fellow at the Brookings Institution. (Full disclosure: I'm a non-resident fellow there, as well.)
- ''The best you can say about this is he may have thought he was trying to broaden the conversation to talk about Russian surveillance. If that is the case, this is probably a na¯ve way to go about it,'' Julian Sanchez, a research fellow at the libertarian Cato Institute and a major NSA critic, told The Daily Beast.
- Some in Snowden's corner mocked the criticism. (''Snowden should storm the Kremlin,'' tweeted Glenn Greenwald, the recipient of many a Snowden leak.) But even Jesselyn Radack, one of Snowden's American lawyers, instantly acknowledged that the interchange was a misstep. ''Unfortunately, it can play into the incorrect meme that he is somehow being controlled by Russia,'' she said to The Daily Beast.
- Wizner said he understood the revulsion: The interchange looked like cheap agitprop. ''I know this is hard to believe. I know if I was just watching from afar, I'd think, 'Wow, they forced him [Snowden] to do this,''' the ACLU attorney added. ''But it's not true. He just fucking did it.''
- Snowden was mortified by the reaction, said Wizner and others. Within hours, the leaker decided to write an op-ed to clarify his position. Snowden decided to run it with the Guardian because of his long-standing relationship with the paper'--which ran his first leak'--and because he knew it would publish the piece instantly.
- ''Putin's response appears to be the strongest denial of involvement in mass surveillance ever given by a Russian leader'--a denial that is, generously speaking, likely to be revisited by journalists,'' Snowden wrote. ''I understand the concerns of critics, but there is a more obvious explanation for my question than a secret desire to defend the kind of policies I sacrificed a comfortable life to challenge: if we are to test the truth of officials' claims, we must first give them an opportunity to make those claims.''
- After nearly 10 months as a guest of the Kremlin, it was the closest Snowden had come to directly criticizing his hosts in Moscow. Some in his circle are concerned about what might happen next. ''I'm worried about his safety now,'' one adviser said. Such a frontal attack seems unlikely; even before last week's interchange, Snowden had proved to be an invaluable, if perhaps unintentional, weapon in the Kremlin's propaganda war with the West. But it is worth noting that Snowden's temporary asylum expires in August, and he has few places he can go without risking arrest.
- Wizner said he hopes that the Guardian op-ed silences those ''Snowden-Putin truthers'' who are convinced that the Russian security services are behind the leaker's every move. But Wizner isn't holding his breath. ''If Snowden demanded Putin's resignation, they'd see it as another piece of evidence that he's Putin's pawn,'' the lawyer added.
- The bigger question, however, is whether Snowden can restore his reputation among the much larger group of people who viewed his initial leaks as admirable, and his appearance with Putin as risible. The answer to that question is, at this point, unknown.
-
- David Ignatius: Putin steals from the CIA's playbook with anti-Soviet covert operations - The Washington Post
- The West has made NATO's military alliance the heart of its response to Russia's power grab in Ukraine. But we may be fighting the wrong battle: The weapons Russian President Vladimir Putin has used in Crimea and eastern Ukraine look more like paramilitary ''covert action'' than conventional military force.
- Putin, the former KGB officer, may in fact be taking a page out of the United States' playbook during the Ronald Reagan presidency, when the Soviet empire began to unravel thanks to a relentless U.S. covert-action campaign. Rather than confront Moscow head-on, Reagan nibbled at the edges, by supporting movements that destabilized Russian power in Afghanistan, Nicaragua, Angola and, finally, Poland and eastern Europe.
- It was a clever American strategy back then, pushing a wounded Soviet Union and opportunistically exploiting local grievances wherever possible. And it's an equally clever Russian approach now, offering maximum gain at minimum potential cost.
- The parallel was drawn for me this week by John Maguire, a former CIA paramilitary covert-action officer, who served in the contras program in Nicaragua and later in the Middle East. ''At the end of the day, Putin is a case officer,'' says Maguire. ''He watched what we did in the 1980s, and now he's playing it back against us.''
- From the beginning in Crimea, Putin ran the campaign there as a ''black'' operation. Russian troops wore no insignia, to preserve a fig leaf of deniability. Russian officials, from Putin on down, insisted they weren't seizing Crimea even as their forces consolidated positions. They controlled information flows and coordinated their messaging.
- Putin's destabilization campaign in eastern Ukraine is riskier than the Crimean operation was because the Ukrainian government has warned it will fight back if Russian troops invade. But while the world was distracted by 50,000 Russian troops conducting maneuvers just across the border, the real action was the covert destabilization of major cities in eastern Ukraine. Since these cities are largely Russian-speaking, Putin could count on a base of local popular support.
- On Sunday, pro-Russian ''demonstrators'' seized buildings in Donetsk, Kharkiv and Luhansk. Some demonstrators said they wanted to conduct referendums on joining Russia, just as Crimea did prior to its annexation. It was a clever exploitation of local cultural and religious bias '-- the sort of ''divide and rule'' move favored by intelligence agencies for centuries.
- Secretary of State John Kerry tried to blow the whistle Tuesday on the Russian covert operators. ''It is clear that Russian special forces and agents have been the catalyst behind the chaos of the last 24 hours,'' Kerry told a Senate committee. He said the Russians might use the unrest as a pretext for military intervention, but I'd guess they would stick to their tradecraft. It's safer, and it achieves the same results with what Moscow can claim is legitimacy.
- If you look back at the way the United States worked with Solidarity in Poland in the 1980s, you can see why this form of clandestine activity is so powerful. The CIA's primary ally was the Catholic Church, headed by a Polish pope, John Paul II, who believed as a matter of religious conviction that Soviet communism should be rolled back. To work with the church, the agency needed a waiver from rules that banned operations with religious organizations.
- One thing Putin learned from watching the Soviet empire fall is that the most potent weapons are those that go under the radar '-- and are nominally legal in the countries where operations are taking place. All the nuclear might of the Soviet Union was useless against striking workers in Poland or hit-and-run guerrillas in Nicaragua or mujahideen fighters in Afghanistan. The Soviet Union was a giant beast felled by a hundred small pricks of the lance.
- How can the United States and the West fight back effectively against Putin's tactics? The real answer must come from Ukrainians, who will have to mobilize to protect their country from foreign meddling. Kiev made a start Tuesday, sending police to clear demonstrators from buildings in Kharkhiv but failing to oust them from government offices in Donetsk. The trick for the interim government in Kiev is to fight a nonviolent counterinsurgency '-- keeping a unified Ukrainian population on its side as much as possible.
- The Ukrainian struggle tells us that this is a different kind of war. Putin has learned the lessons of Iraq and Afghanistan, yes, but also those of Poland and East Germany. An ex-spy is calling the shots in Moscow, using a dirty-tricks manual he knows all too well.
- Read more from David Ignatius's archive, follow him on Twitter or subscribe to his updates on Facebook.
-
- Who Does Putin Work For? |
- Being a former college basketball coach, I marvel at the skill of a good strategist who can carry out a game plan. Vladimir Putin would have been a great college basketball coach, a masterful poker player, a top used car salesman and he is an excellent leader of his country when it comes to foreign policy. Putin has made the Federal Reserve, Wall Street and our government look amateurish.
- If it wasn't for the fact that Putin has the potential to be one of the most despotic figures in all of history, I would be a fan of his cunning and his ability to carry out an agenda on multiple fronts with precision and skill.
- However, there is one group that Putin does not outfox, out-strategize and out maneuver; that would be the forces controlling the Bank of International Settlement (BIS).
- Putin is developing almost a cult following among some people in the alternative media. To them, he represents a man with the force of conviction to tell international banking to go to hell. To these well-intentioned, but misguided analysts, Putin has succeeded where other world leaders have lost their lives (e.g. JFK, Hussein, etc.). As romantic and appealing as a superhero may be who will ride in and save the world from the evil bankers, nothing could be further from the truth when it comes to Putin. Whether Putin realizes it or not, he is doing the complete bidding of the big boys at the BIS and everything is moving right along according to plan.
- This article explores the fact that Putin, although he may be, on the surface, resisting international banking on one level, he is very much under their control on another level. This article will also explore the implications for these events upon the American people.
- The Starting PointIn the alternative media, many make the mistake of speaking about the ''banksters'' as if they were one entity all working towards the same goal which is the establishment of a singular economic system which controls the planet through rabid debt management. Generally, this is true. However, the process of international banking is compartmentalized and when goals are not met, we see divisions emerging and this is exactly what we are witnessing at the present moment.
- Before we can effectively analyze how Putin is in the process of putting himself in charge of the world's chessboard, we need to first take a very brief look at how international banking is organized.
- Level One: The Bank of International SettlementInternational banking has three major levels. The executive directors of this grand economic scheme, the Bank of International Settlement, from Basel, sit at the head of the table. The BIS sets global economic policy by manipulating currency exchange rates (e.g. IMF), establish lending rates, picking national winners and losers, etc. The singular mission of the BIS is to march the world's central banks into the NWO that they control.
- It can be said that the forces, both known and unknown, are the rulers of the planet.
- Level Two: The Central BanksThe second level of power consists of the global central banks including the Federal Reserve which is an unelected cabal of private bankers who have wrestled the financial power of this country away from Congress and control the nation's money. It is the same in every country. And of course, if an entity controls the money of a nation, they also control those who use their money through the establishment of a predatory debt enslavement system. You learned this principle of finance as a teenager when your parents told you, ''For as long as you live under this house, you will do what I say.'' The power of the purse determines who controls behavior. The world's central banks take their marching orders from the Bank of International Settlement because the monetization of the fiat currency that each central bank controls is determined by the BIS.
- It can be accurately stated that the central banks are rulers of nations and represent mid-level management in the hierarchy of the process.
- Level Three: The National Banking IndustryThe third level of power in this unholy system are the financial institutions of a nation. In our case, this would be institutions such as Goldman Sachs, other lesser Wall Street investment houses as well as the megabanks (e.g. Bank of America, Chase, Wells Fargo, etc.). Policies that are developed in Basel are implemented by these institutions.
- The investment houses conduct the day to day management of the polices which flow downhill from the BIS.
- Finally, there is everybody else and that would be the sheep of this country who know nothing of how any of this works. Don't hold your breath on a sudden level of developing awareness, most of us are all too brainwashed by the system to achieve this level of awareness.
- The Game Plan for Building a New World OrderSince the 1944 Bretton Woods Agreement which established the dollar as the world's reserve currency and the US was made the de facto world policeman as a result, Americans have enjoyed economic dominance because in order to buy energy, the world needed to purchase dollars from our Federal Reserve. After the world departed from the gold standard for the fiat currency standard, the US is the only country that truly enjoyed a solvent currency and our standard of living has reflected this status.
- Americans have been allowed to enjoy this most favored status because it became our task, on behalf of the BIS, to put together coalitions of central banks to force unwilling nations into this system. And when a nation, such as Libya and Iraq, attempted to swim upstream against the debt enslavement policies of these banks, the leaders were murdered and the people become indentured debt slaves. The cost to America is endless war, massive debt and a reputation for being the ''Great Satan''.
- Virtually, all nations have succumbed to this tyranny, with two notable exceptions, Russia and China. To a lesser extent, India has also become problematic for the BIS since they have joined Russia and China in using national currency and/or gold to conduct trade among each other rather than using the ''required'' dollar.
- If the BIS is going to realize its dream of New World Order, Russia, China and the United States economies must all be crushed. For when the world lies in ruin, out of chaos will come order. Putin is the main driving force in making this a reality.
- Putin Has Checkmated the Central Banks At Level TwoPutin is defeating the world's central banks at two levels. One, he is spearheading an effort to move the world away from the dollar as the world's reserve currency. This is what the Syrian and Iranian crisis was all about (e.g. selling oil for gold rather than the Petrodollar) and Putin exposed Obama's false flag event (i.e. gassing the Syrian rebels) for what it really was. Further, Putin now has the power to refuse to accept the dollar as payment for his gas flowing into Europe. If the Petrodollar dies, what will happen to the US economy? If this does happen, we will find out very quickly why DHS purchased 2.2 billion rounds of ammunition to go with its 2700 armored personnel carriers.
- Second, Putin is threatening to become the main supplier of energy on the planet. With the consummation a recent gas deal between the Russians and the Chinese, Putin is undermining the control of energy that the central banks have enjoyed since the early days of the creation of Saudi Arabia to oversee oil production.
- Putin is spitting in the face of the Federal Reserve and the other G7 central banks by encouraging Iran to sell its oil for gold. This is turning international finance on its head. Putin also has enough of a military presence, along with nuclear weapons, to stave a direct conventional invasion of his country. Putin has positioned himself to control the energy needs of Europe as the Europeans will be forced to choose between heating their homes or remaining a military ally of the US. This will eventually lead to a disintegration of NATO, thus enhancing Putin's military power by comparison.
- Has Putin Really Killed the New World Order?The march of the G7 toward consolidating national power under the central banks has stopped dead in its tracks. Russia, China, India and to a lesser extent, Brazil and South Africa are now charting their own independent economic course. When Libya refused to regionalize and weaken its currency and they were adamant about avoiding the debt slavery, their leaders were murdered and their country was conquered by al-Qaeda proxy forces supported by the funds of the G7.
- However, Russia and China are not Libya and Iraq. Both nations possess nuclear weapons and sizeable armies. For the moment, the dream of a New World Order appears to be dead. Or is it?
- The BIS Employs the Sun Tzu Strategy of ''Death's Ground''The G7 central banks are impotent against Putin as he has outmaneuvered them at every turn. But for the big boys at Basel, things are proceeding according to plan. If the BIS has to sacrifice some of its central banks to get what it wants, so be it. The BIS will also think nothing of fermenting the conditions for the next world war.
- Over 2,000 years ago, Chinese military strategist, Sun Tzu, imparted a knowledge of military strategy which is still being taught in our service academies and in our war colleges. One of the primary principles of Sun Tzu consists of the concept of placing one's soldiers on ''death's ground'' if you want them to fight hard and achieve victory against all odds. The best military example that comes to mind is what happened to the WWII Normandy invasion force at Omaha Beach on June 6, 1944. These men were thrown onto a beach where there was no retreat and they were only going to leave the beach dead or victorious. The BIS has employed a Sun Tzu strategy of placing its second level of power, the central banks, on death's ground. The G7 central banks will conquer Putin, or they will die. However, before rigor mortis sets in, the G7 nations will commence a world war based on economic survival. Again, out of chaos will come order.
- World War III Is InevitableThe failure of the central banks to corral and control Putin has made World War III a likely scenario. As Putin continues on the path of destroying the dollar as the world's reserve currency, what will the Federal Reserve do? There will be a war to preserve the status quo. As China, Russia and the United States are drawn into a confrontation, the world's economy will be obliterated along with billions of lives. In the aftermath of the coming global holocaust, the supreme financial rulers of the planet will be waiting to create order, the New World Order, out of chaos.
- A willing pawn of the NWO, or not, Putin is no hero. He is doing exactly what is expected. Make no mistake about, the BIS controls the central banks, world finance and Putin. The New World Order is very much alive.
- Dave Hodges is the Editor and Host of The Common Sense Show.
- Don't forget to follow the D.C. Clothesline on Facebook and Twitter. PLEASE help spread the word by sharing our articles on your favorite social networks.
-
- Vladimir Putin 'targeted by German spy agency' during his KGB days | intelNews.org
- November 9, 2011by Joseph Fitsanakis
- By JOSEPH FITSANAKIS | intelNews.org |A German researcher claims that Russian Prime Minister Vladimir Putin was targeted by West German intelligence in the 1980s when he was a KGB operative in East Germany. In the Cold War's closing stages, Putin and his wife, Ludmila Putina, who were then in their thirties, spent five years in Dresden, German Democratic Republic. As one of four KGB officers in Dresden, Putin was tasked with infiltrating the local university and monitoring the on-campus activities of the children of Soviet and East German notables. But according to new research published last week, an undercover agent of the BND, West Germany's external intelligence agency, was able to infiltrate the Putin household in Dresden, and pass private information about the couple's personal life to her spymasters in Bonn and in NATO. The agent, codenamed LENCHEN, a native German, worked as a translator at the KGB station in Dresden. She reportedly befriended Ludmila Putina, eventually becoming her ''shoulder to cry on'', according to Erich Schmidt-Eenboom, director of the Weilheim-based Institute for Peace Studies, who has published several books on the history of the BND. Schmidt-Eenboom claims that LENCHEN became Ludmila Putina's closest confidante in Dresden. The latter told her that Vladimir Putin had been involved in numerous infidelities over the years and that he often beat his wife. LENCHEN reported to her handlers that life in the Putin household was highly dysfunctional, despite an outward appearance of happiness and normality. Schmidt-Eenboom claims he confirmed the report with at least two unconnected sources with knowledge of BND operations during the Cold War. If the story is historically accurate, it will signify only the second known penetration of KGB structures in Europe by the BND. The only other such example, says Schmidt-Eenboom, involved an agent named COLONEL VIKTOR, who also worked as an agent for the BND in the 1980s. Eventually, claims the researcher, LENCHEN became pregnant during an affair with a KGB colonel, and, in 1989, managed to convince her West German handlers that she needed to be exfiltrated to West Germany in order to undergo an abortion. Once there, she successfully made a case for retiring from her espionage post in the East, and settling down in West Germany. Her request was granted, and today she lives in Germany under a new identity, claims Schmidt-Eenboom. Reporters contacted BND spokesman Dieter Arndt about the story, but were simply told that the spy agency does ''not discuss our methods or our investigations''.
-
- Either Putin and the Whole Russian Military Don't Use Electronics, or the CIA Messed Up - The Wire
- A possible excuse has emerged for why the intelligence community failed to predict the Russian push into Crimea '-- although it requires assuming that Vladimir Putin's opposition to using electronics is the standard for the country.
- Putin doesn't use cell phones. He doesn't text. He rarely ventures "into that place where you apparently live, that Internet," according to Time's Simon Shuster. And that means that he is "a very hard target for foreign spies." Sound crazy? Well, you didn't build your career working for the KGB in a country that was unabashed about spying on its citizens.
- "Putin's technophobia is part of a Russian tradition older than the telephone itself: an aversion to blabbering that has been hardwired into the national psyche after a century of life in an industrial police state," Shuster writes. "'This is not a telephone conversation,' Russians like to say in the middle of a telephone conversation, reminding each other that only the most innocent chatter is safe to transmit over an insecure line." Working for the very agency responsible for listening in on those calls almost certainly gave Putin a heightened sense of their risk.
- Could this be why the CIA and NSA were unable to figure out that a Crimean invasion was imminent? It was a failure of intelligence that earned the agencies a front-page Wall Street Journal article on Monday in which they pointed all 10 fingers, including one or two at Edward Snowden. If, as Shuster writes, Putin relies on hand-written intelligence assessments, no wonder the CIA couldn't predict what was happening!
- The problem with the theory is that it assumes that once Putin hands off an instruction to his senior staff, they take the piece of paper / verbal instruction and give it to their subordinates. And then those subordinates hand paper / speak to their subordinates, and so on down the line until it gets to the guys driving the tanks and putting on unmarked military uniforms. This is how things were done in the Russian (and every other military) for centuries, so it's possible. But it seems unlikely in the year 2014.
- Obviously, that's not the case. The blog English Russia only recently posted photos from inside a factory producing electronic communications systems for the Russian Military. And Shuster himself points out that the Kremlin has very robust encryption tools, noting a Snowden leak that indicated that American and British spies were unable to crack communication collected from then-president Dmitri Medvedev in 2009.
- So we probably can't blame Putin's aversion to cell phones for missing the Crimea call. As we noted earlier this week, it's probably not fair to blame the Snowden leaks. As that Journal article suggested, the United States moved intelligence resources away from Russia and the former Soviet Bloc over the last 15 years or so, focusing instead on the threats posed by terrorism. The problem might not have been that Putin wasn't calling his forces to get them ready. It just might have been that we weren't listening '-- or couldn't crack the call.
-
- Putin, earlier accused of being a CIA agent, demands from Mr. Snowden to stop exposing CIA crimes - Kavkazcenter.com
- According to the KGB media in Russia, Putin said on July 1 that "if he [Snowden] wants to remain here there is one condition - he should stop his work aimed at inflicting damage on our American partners".
- It is to be recalled that the Putin's gang of the KGG-FSB forcedly holds the American dissident Snowden in Russia without giving him an opportunity to travel to Cuba, Ecuador or Venezuela. Currently, the Russian FSB and American CIA are in secret talks about what to do with Mr. Snowden, media reported.
- "This a treacherous statement by Putin", commented the statement of Russian leader an American citizen, The Hammer, in the Twitter of the Moscow correspondent of The Guardian Miriam Elder.
- Moscow correspondent of The Daily Telegraph, Tom Parfitt, is perplexed: "What do Putin's words mean, "if he wants to stay here". Does Putin mean at the airport or in Russia proper?"
- Elder says that most likely the airport since Putin said earlier that Snowden had not crossed the Russian border.
- Later, Elder said that a consular officer at the Moscow airport confirmed a report by the New York Times that Snowden had applied for political asylum in Russia.
- Elder commented: "Russian wires, after engaging in weeklong campaign of misinformation in this case, saying Snowden didn't apply for asylum. Kind of amazing how much the Russian wires (Interfax, ITAR-Tass, RIA) discredited themselves over the past two weeks. They provided so much bad info, based on unclear sourcing, that when they denied asylum report today, no one believed them".
- It is to be noted that in early 2000, influential Western mainstream media reported that Putin was recruited in 1980's by the West Germany foreign spy agency of the BND when he served in the Soviet zone of occupation in Germany and regularly traveled the west. BND, in turn, handed the valuable agent Vladimir Putin to the CIA.
- While working for the KGB in Germany, Putin underpaid Russian agents, recruited by him in the west. He forced them to sign receipts for the full amount of their salaries allocated to them by the Moscow KGB, while putting the difference in his own pocket.
- A large number of detailed articles on Putin's secret work for the KGB and the CIA was published, in particular, in Austrian political magazine NEWS (in German). Putin often traveled to the country from East Germany where he was stationed.
- Department of MonitoringKavkaz Center
-
- The revolving door between Google and the Department of Defense | PandoDaily
- By Yasha LevineOn April 23, 2014
- So, Google continues to try to distance itself from the military-industrial complex.
- Last month, the company made a big stink about refusing a tiny bit of DARPA funding for two robotics companies it purchased, hoping that people already forgot that the companies had been financed by the Department of Defense. And a few weeks ago, Google's PR team insisted the company had nothing to do with the U.S. Air Force testing out Google Glass for battlefield use:
- ''The Glass Explorer program includes people from all walks of life, including doctors, firefighters, and parents. Anyone can apply to become a Glass Explorer, provided he or she is a U.S. resident and over the age of 18.''
- Right. While this generic statement might be be reassuring to some, Google's supposed hands-off approach to the intensely lucrative military and intel market is a bit hard to believe.
- As I continue to poke around under the hood of Google Federal '-- as the company's DC operation is called '-- I'm surprised by the number of former spooks, high-level intelligence officials and revolving door military contractors running Google's public sector division.
- Many of Google Federal's top managers come from the biggest and baddest military and intel outfits: US Army, Air Force Intelligence, Central Intelligence Agency, National Geospatial-Intelligence Agency, Director of National Intelligence, USAID, SAIC, Lockheed'... the list keeps going on and on.
- Take Michele R. Weslander Quaid, Google's Chief Technology Officer of Public Sector and ''Innovation Evangelist.''
- Chances are you've never heard of her. Neither had I. But Weslander Quaid took the top spot in Entrepreneur Magazine's list of the seven most powerful women to watch in 2014.
- She helped bring the Google mindset to federal intelligence agencies.
- After 9/11, Weslander Quaid felt a patriotic duty to help fight the War on Terror. So she quit her private sector job at a CIA contractor called Scitor Corporation and joined the official world of US government intelligence. She quickly rose through the ranks, serving in executive positions at the National Geospatial-Intelligence Agency (sister agency to the NSA), National Reconnaissance Office and at the Office of the Director of National Intelligence. She toured combat zones in both Iraq and Afghanistan in order to see the tech needs of the military first-hand. All throughout her intel career, she championed a ''startup'' mentality and the benefits of cloud-based services.
- Here's how Entrepreneur Magazine described her mission:
- The U.S. government isn't exactly known for its efficiency or speed. But during her nine years at various national security agencies, including working with the director of national intelligence and the secretary of defense, Michele Weslander Quaid acted like an entrepreneur. She shook things up by dropping archaic software and hardware and convincing teams to collaborate via web tools. Basically, she treated each agency like a startup to transform the sclerotic federal agencies for which she worked.
- It could have been easy for Weslander Quaid simply to accept that federal agencies don't share information or collaborate on decisions, but she wouldn't. She started by convincing higher-ups at the National Geospatial-Intelligence Agency, which provides maps and pictures for military intelligence, as well as execs at the National Security Agency, which collects audio feeds, to collaborate on combined reports so that military decision-makers could better understand the data. Her efforts paid off, and she became one of the youngest people appointed a senior government executive. ''I call it a wartime promotion,'' she says.
- In her later roles, Weslander Quaid pushed for an early version of cloud-based software that people could access from outside their D.C. offices. She standardized platforms across agencies and streamlined a technology-testing and procurement process that reduced time and costs''all cutting-edge ideas among the closed fiefdoms of Washington.
- Getting intel agencies to go cloud? That's the kind of government innovation that Sergey Brin and Larry Page can appreciate!
- The US government spends somewhere around $80 billion a year on info technology. No wonder they made Weslander Quaid a Google ''evangelist'' on par with Internet inventor Vint Cerf.
- Weslander Quaid told Entrepreneur Mag that a big part of her job at Google entails meeting with intelligence agency directors to discuss technology they want and/or need. She also spends quite a bit of time teaching rank-and-file Google employees on how to hard-sell government clients. ''I act as a bridge between the two cultures.''
- As I've written before, Google has aggressively intensified its campaign to carve out a bigger slice of the lucrative military-intelligence contracting market. It's been targeting big federal agencies, and pushing its intel technology onto local and state government structures as well. In some cases, Google sells its wares to government intel agencies directly '-- like it did with the NSA and NGA. It's also been taking the role of subcontractor: selling its tech by partnering with established military contractors and privatized surveillance firms like SAIC, Lockheed and smaller boutique outfits like the Blackwater-connected merc outfit called Blackbird.
- In short: Google's showing itself willing to do just about anything it can to more effectively hitch itself to America's military-intelligence-industrial complex. So it's not surprising that its top brass installed someone like Weslander Quaid as a company evangelist.
- What is slightly surprising '-- and a bit disturbing '-- is that Weslander Quaid, Google's liaison with the military, is now using Google's big data knowhow to help the Republican Party win elections.
- Google executive chairman Eric Schmidt may have helped Barack Obama build a political technology juggernaut, but now another top Google executive is trying to help Republicans catch up.
- Michele Weslander Quaid, who serves as the company's ''Innovation Evangelist'' and chief technology officer for its public-sector division, is joining the board of directors of Voter Gravity, a campaign technology company that serves GOP candidates and conservative groups.
- It's a bit of a political coming-out for Weslander Quaid, who joined Google in 2011 and had not previously been active in partisan politics.
- Voter Gravity isn't just some neutral campaign tech company. It was set up by Ned Ryun, a rightwing Christian and an anti-union activist. In 2011, he came to Wisconsin to support Governor Scott Walker's jihad on public sector workers:
- ''I applaud what Scott Walker is doing in Wisconsin, but I actually feel he didn't go far enough . . . at the end of the day, the public sector unions are not collectively bargaining for a greater share of earnings, as do the private sector unions. They are bargaining to get a bigger slice of the pie of tax dollars, which the government has taken from the American taxpayer.''
- As much as Ryun cares about protecting the taxpaying public from greedy government workers, I have a feeling that he doesn't mind that his partner Weslander Quaid's main job function at Google is to siphon as many taxpayer tech contract dollars for the benefit of her company's shareholder and executive class'...
- And Weslander Quaid is not the only military-surveillance insider at Google Federal. Let's take a look at two other senior executives'...
- First up: Shannon Sullivan, ''Head of Defense & Intelligence, Google Enterprise.''
- Sullivan graduated from the US Air Force Air University's School of Advanced Air and Space Studies '-- which produces ''warrior-scholars.'' He then served in various signals intelligence capacities in the US Air Force: as a ''Senior Military Advisor'' and in an unspecified role inside USAF's ''C4ISR Acquisition and Test; Space Operations, Foreign Military Sales'' unit. What is C4ISR? Apparently it stands for'... ''Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance.''
- Sullivan then took the revolving door, getting a job as a ''defense director'' at BEA Systems. He then moved to Oracle, where he was the company's ''COCOMs Director'' for the Army and Air Force. He is now involved in rolling out Google services for the DoD. His last project: setting up a Google Apps ''transformational'' test program to supply 50,000 soldiers in the US Army and DoD with a customized Google App Universe.
- Then there's Jim Young, Google's DoD Sales Manager.
- His job at Google is all about ''[t]ransforming organizations by empowering their employees with the best cloud computing platforms in the world.''
- But Young used to work as a CIA analyst at the Directorate of Science and Technology, a CIA R&D outfit that used to be called the Office of Scientific Intelligence. And as all CIA buffs know, OSI/DST is responsible for churning out Cold War-era spook technology, as well as some of the weirdest and darkest CIA schemes we know of: spy satellites, MKULTRA/ARTICHOKE Manchurian candidate mind control programs, remote viewing, surgically modified spy cats and a bunch of scarier things we'll only find out about in 100 years. OSI/DST also funded In-Q-Tel'... Come to think of it, In-Q-Tel helped fund Google Earth '-- which is a big part of Google's military offering.
- There are plenty of other people with similar backgrounds working for Google Federal '-- account managers, sales and marketing people, heads of engineering '-- but listing them and their intel/DoD work experience would only turn our brains to alphabet soup.
- The Washington Post recently exposed Google's increasing role in DC's influence-peddling machine '-- from partnering with Koch thinktanks to beefing up its rightwing lobby power. Staffing Google's public-sector division with connected intel and military insiders is just another component of the this larger effort to grab the levers of power. How else can you expect Google to stave off anti-trust investigations and avoid paying for its massive privacy violations '-- all while expanding its business into the bottomless pit of federal government contracting?
- Pando contacted Google for comment on this article [12+ hours before publication] but we have not yet had a response. We will update this story if the company responds.
- Want to know more? Read Pando's surveillance valley coverage'...
- [Image credit: Brad Jonas for Pando]
-
- Termination of Defense Intelligence Agency Advisory Board
- Termination Of Federal Advisory Committee.
- The Department of Defense is publishing this notice to announce that it is terminating the Defense Intelligence Agency Advisory Board, effective February 26, 2014.
- Jim Freeman, Advisory Committee Management Officer for the Department of Defense, 703-692-5952.
- This committee is being terminated under the provisions of the Federal Advisory Committee Act of 1972 (5 U.S.C. Appendix), 41 CFR 102-3.55, and the Government in the Sunshine Act of 1976 (5 U.S.C. 552b), effective February 26, 2014.
- Alternate OSD Federal Register Liaison Officer, Department of Defense.
- [FR Doc. 2014-08763 Filed 4-16-14; 8:45 am]
-
- Executive Order -- Expanding Eligibility for the Defense Meritorious Service Medal
- Office of the Press Secretary
- By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby ordered as follows:
- Executive Order 12019 of November 3, 1977 (Establishing the Defense Meritorious Service Medal), is amended by inserting ", or to any member of the armed forces of a friendly foreign nation," after "any member of the Armed Forces of the United States".
- THE WHITE HOUSE,April 18, 2014.
-
- IRS Among Agencies Using License Plate-Tracking Vendor - Bloomberg
- By Kathleen MillerApril 17, 2014 12:00 AM EDTThe Internal Revenue Service and other U.S. agencies awarded about $415,000 in contracts to a license plate-tracking company before Homeland Security leaders dropped a plan for similar work amid privacy complaints.
- Federal offices such as the Forest Service and the U.S. Air Force's Air Combat Command chose Livermore, California-based Vigilant Solutions to provide access to license plate databases or tools used to collect plate information, according to government procurement records compiled by Bloomberg.
- Vigilant, a closely held company, has received such work since 2009. In February, Jeh Johnson, secretary of the Department of Homeland Security, ordered the cancelation of an immigration agency plan to buy access to national license plate data. While the technology can help solve crimes, the American Civil Liberties Union and other groups have said the mass collection of data infringes the privacy of innocent people.
- ''Especially with the IRS, I don't know why these agencies are getting access to this kind of information,'' said Jennifer Lynch, a senior staff attorney with the Electronic Frontier Foundation, a San Francisco-based privacy-rights group. ''These systems treat every single person in an area as if they're under investigation for a crime -- that is not the way our criminal justice system was set up or the way things work in a democratic society.''
- IRS officials awarded the company a $1,188 contract for ''access to nationwide data'' in June 2012, according to records available online. That contract ended in May 2013, according to federal procurement records.
- Agencies Involved''The IRS uses a variety of investigative tools similar to other law-enforcement agencies to assist with criminal cases,'' Eric Smith, an agency spokesman, said in an e-mail. He declined to say how the IRS used the records in its investigations.
- The Forest Service, part of the Department of Agriculture, awarded Vigilant a contract valued at as much as $47,019 for its ''CarDetector'' system in August 2009, records show. The product scans and captures license plate numbers, compares the data to law enforcement lists of wanted vehicles and sends alerts when such vehicles are detected, according to the company's website.
- Forestry officials also awarded the company a contract valued at about $7,500 in August for a subscription to its license plate database and other services, according to contracting records.
- ''License plate readers are helpful to our law enforcement officers with illegal activities on national forest system lands in California,'' Tiffany Holloway, a spokeswoman for the agency, said in an e-mail. She declined to comment about what types of crimes the tools are used to investigate or provide examples of how the technology has helped law enforcement.
- Vigilant's WorkVigilant provides some data for free to federal and state law enforcement agencies, Brian Shockley, the company's vice president of marketing, said in an e-mailed statement. The information has been used to ''solve crimes and save lives,'' he said.
- The company has local, state and federal agency customers, he said, declining to comment about its work for the federal government and how it may have supported national security.
- Most of the federal contracts were awarded years before former contractor Edward Snowden last year exposed vast U.S. surveillance programs that intercepted the phone records of many Americans. In the aftermath, lawmakers in more than a dozen states weighed legislation this year to limit license-plate tracking, according to the Denver-based National Conference of State Legislatures.
- ACLU ComplaintsThe ACLU, which also has pushed for state measures limiting use of the technology, criticized the Homeland Security Department for a February solicitation seeking to buy access to the data. The department's Immigrations and Customs Enforcement agency had planned to use the records to help locate and arrest ''absconders and criminal aliens,'' according to a federal document seeking companies' proposals.
- The agency halted the solicitation, saying immigration officials weren't aware it had been posted.
- Federal procurement records show it has awarded contracts valued at as much as $175,000 to Vigilant since 2011. Most are now expired. The other contracts with Vigilant are separate from the February solicitation, Barbara Gonzalez, press secretary for the immigration agency, said in an e-mail.
- They provide ''limited access to an already-existing database for a defined amount of time and only in conjunction with ongoing criminal investigations and to locate wanted individuals,'' Gonzalez said.
- Privacy ConcernsEven so, concerns about the government's use of the data remain, said Kade Crockford, a project director with the ACLU of Massachusetts.
- ''The American public deserves to know the degree to which the Department of Homeland Security and other agencies are already tapping into these databases,'' Crockford said in a phone interview. ''The cancellation of the solicitation itself has no measurable impact on the existing reality, which is that we are all being tracked right now.''
- Other federal offices, including the Justice Department's Drug Enforcement Administration, Federal Bureau of Investigation and U.S. Marshals Service, have awarded contracts to Vigilant for access to its records or tracking tools.
- The Air Force's Air Combat Command awarded Vigilant a contract for license plate readers valued at as much as $114,000 in September 2011, according to online federal data. The license plate readers are a ''valuable tool'' that help make base access ''easier and more secure,'' said Benjamin Newell, a spokesman for the Air Combat Command.
- 'Stopping Crime'''The more aware we are of who is entering a military facility, the better we are able to protect the lives and equipment on that base,'' Newell said in a phone interview.
- NetChoice, a Washington-based trade association that represents e-commerce businesses, is concerned that groups opposing the tools offer ''no recognition at all of the benefits of license plate recognition in stopping crime or saving lives,'' said Steve DelBianco, its executive director.
- Companies that collect the data or sell the technology have strict guidelines about who can obtain records, he said.
- ''Our governments require us to display a plate on our cars, visible on the front and back in public, for a reason,'' DelBianco said in a phone interview. ''A lot of the concern is a knee-jerk reaction to Snowden revelations.''
- To contact the reporter on this story: Kathleen Miller in Washington at kmiller01@bloomberg.net
- To contact the editors responsible for this story: Stephanie Stoughton at sstoughton@bloomberg.net Mark Silva, Michael Shepard
-
- The mentality of J Edgar Hoover's FBI undergirds today's surveillance state | Trevor Timm | Comment | The Guardian
- The new documentary 1971, about the formerly anonymous FBI burglars who exposed the crimes of former FBI director J. Edgar Hoover, debuted to a rapt audience at the Tribeca film festival last night. As the filmmakers noted in an interview with the AP, the parallels between Nixon-era FBI whistleblowers and Edward Snowden's NSA revelations are almost eerie in their similarity.
- But while the NSA connection seems obvious, the movie will actually shed light on the domestic intelligence agency with far more power over ordinary Americans: the modern FBI.
- Everyone seems to forget that the FBI is the NSA's primary partner in the latter's domestic spying operations and that, in fact, the NSA's job would be impossible without them. Whenever you see a company deny giving any data to the NSA remember: It's because it's not the NSA asking (or demanding) the information of them, it's the FBI. They use the same Patriot Act authorities that the NSA does, and yet we have almost no idea what they do with it.
- In fact, the FBI has gone to extreme lengths to just keep their surveillance methods a secret from the public, just like the NSA. And the more we learn, the scarier it gets.
- On Monday, the EFF revealed through its Freedom of Information Act lawsuit that the FBI's "next generation" facial recognition program will have as many as 52m photographs in it next year '' including millions that were taken for "non-criminal purposes." It's massive biometric database already ''may hold records on as much as one third of the U.S. population,'' EFF found.
- Lavabit, the email provider once allegedly used by Edward Snowden, also lost an appeal this week, leaving its founder Ladar Levinson in contempt of court for failing to hand over Lavabit's encryption keys to the FBI that would have exposed all 400,000 users of Lavabit. The court failed to rule on the larger issue '' leaving the door open for the FBI to try it again.
- And we know they want to. Foreign Policy's Shane Harris reported last year, the FBI "carries out its own signals intelligence operations and is trying to collect huge amounts of email and Internet data from U.S. companies '' an operation that the NSA once conducted, was reprimanded for, and says it abandoned." The FBI's activities include trying to convince "telecom carriers and Internet service providers to install [port readers] on their networks so that the government can collect large volumes of data about emails and Internet traffic."
- We also know they routinely get cell phone location information without a warrant. (If you want to see how your cell phone location information reveals almost every detail of your life, watch this amazing ACLU video.) We also know they're using Stingray devices, which are fake cell phone towers that vacuum up all cell phone activity in a particular area.
- We know that the FBI is still issuing thousands of oversight-free National Security Letters a year, despite multiplegovernmentreports detailing systematic abuse, and a federal court ruling that they are unconstitutional last year. (The ruling was put on hold pending appeal.)
- The FBI has pushed Congress and the White House '' and reportedly quietly lobbied the tech companies '' to support a dangerous overhaul to wiretapping laws that would require Internet companies like Google and Facebook to create a backdoor into their services, giving the FBI direct access if they get the requisite legal authorities. And, at the same time, the FBI also wants to be able to expand their ability to hack suspects' computers.
- (At least some judges have been pushing back, noting that the trove of information that the FBI can get from hacking suspects is often far beyond what the agency's investigation requires.)
- Worse, Wired discovered FBI training materials in 2012 that told agents they had the "ability to bend or suspend the law and impinge on freedoms of others," in national security cases. The materials were quickly withdrawn when they became public.
- All of this leads to why a comprehensive report released by ACLU late in 2013 called the FBI a "secret domestic intelligence agency" that "regularly overstepped the law, infringing on Americans' constitutional rights while overzealously pursuing its domestic security mission."
- After watching 1971, or reading Betty Medsger's corresponding book The Burglary, it should be a scandal to everyone that the FBI building is still named after J. Edgar Hoover. Unfortunately, his ghost also still seems to permeate in much of what they do.
-
- Liberal Reporter Barton Gellman Ready to Accept Award at ACLU Fundraiser...Until a Blogger Called | NewsBusters
- ''Washington Gadfly'' blogger Evan Gahr caught Washington Post reporter Barton Gellman in an ethical dance over accepting a ''civil liberties'' award from the ACLU at their ''Bill of Rights Award Dinner.'' Gellman recently shared the Pulitzer Prize with Glenn Greenwald and Laura Poitras for revealing Edward Snowden's leaks about U.S. anti-terrorist surveillance programs. Four years ago, TIME sent Gellman on the road for six months to report a cover story on the "Secret World of Extreme Militias" a month before the midterm elections.
- Should a journalist accept an award from an advocacy group he covers? Gellman was listed as attending the fundraiser for the ACLU of the National Capital Area....until Gahr started asking questions.
- In an April 4 email blast to supporters the ACLU of the Nation's Capital said Gellman along with Glenn Greenwald and film maker Laura Poitras, co-author of Gellman's story that divulged the NSA's internet data mining program would get an award named for the late Henry Edgerton, a liberal federal appeals court judge.
- In one of his best known decisions Edgerton joined a Washington, DC appellate court ruling that upheld the decision by a district court judge to dismiss the perjury conviction of China ''scholar'' Owen Lattimore, a notorious Communist propagandist.
- ''The program for our dinner includes videotaped remarks from Rio de Janeiro by courageous journalist Glenn Greenwald, who will be accepting our Henry W. Edgerton Civil Liberties Award on behalf of Barton Gellman, Laura Poitras and himself,'' the ACLU announced triumphantly....
- As for Gellman, when contacted for this article he steadfastly denied any sort of ethical problem. Curiously, just hours after the ACLU had announced it was giving him an award Gellman insisted he was not really getting an award from the ACLU.
- ''I don't go around accepting or rejecting awards,'' Gellman contended. ''I'm not in the business of denouncing people.''
- Gellman claimed that ''nothing says I'm accepting the award.'' Reminded that the ACLU email, which Gellman said he had read, declared that Greenwald would accept the award for him and Poitras the investigative journalist insisted that was a ''mistake.''
- Pressed further Gellman ended the phone call. ''I think we're done,'' he said. ''Goodbye.''
- Gellman then emailed a few minutes later to say he just told the ACLU to correct its supposed error about Greenwald accepting the award for him.
- The Washington Post veteran, who wrote an entire book complaining that Dick Cheney is overly secretive, refused to answer follow-up questions.
- But Art Spitzer, legal director of the ACLU of the Nation's Capital, told this reporter that Gellman knew full well he was getting the award. Gellman ''initially agreed to be one of the recipients of our award, and we included his name on the invitations'' to its shindig at the National Press Club,'' Spitzer explained.
- The day after Gellman bagged on them the ACLU sheepishly announced that although they ''wanted to give the Henry W. Edgerton Civil Liberties Award to courageous journalist Bart Gellman, he stated that he wants to maintain his professional distance from organizations he covers. He respectfully declines to accept the award.''
- Spitzer said for this article that Gellman ''had second thoughts about accepting an award from an organization that's an advocate on many of the issues he covers. We respect his decision.''
- Should these ''second thoughts'' have been first thoughts?
- Asked about the matter Washington Post executive editor Marty Baron tried to pretend that Gellman never agreed to receive the award. Baron said that ''Bart didn't seek the award and is not accepting it.'' Uh, actually, ''Bart'' was prepared to accept it until I raised the issue. Saying Gellman ''didn't seek the award'' is a distinction without a difference.
- Baron sounded like someone caught with his hand in the cookie jar who sheepishly says, ''I didn't seek these cookies and am not taking them.''
- Other reporters have been less skittish about associating with the ACLU. See NPR's Dina Temple-Raston, who co-wrote a book with ACLU executive director Anthony Romero on "the dangerous erosion of the Bill of Rights in the age of terror."
- Gahr also asked some media ethics experts about accepting an ACLU award:
- Former New York Times public editor Arthur Brisbane said that it would be foolhardy for a journalist to accept an award from an advocacy group he covers. ''If the award is coming from an organization you are covering it's a mistake to accept it. You're not demonstrating sufficient independence.''
- Like a polished diplomat Brisbane emphasized that he was talking about the issue in general and did not know the specifics of the Gellman matter. Was his reticence due to the fact that Brisbane had worked at the Washington Post with Gellman?
- Left-leaning NYU journalism professor Jay Rosen also closed ranks behind Gellman. Rosen, who worked briefly as a journalist in 1978 but has spent the ensuing decades explaining to reporters how they can be as morally upright as him, declined comment.
- Before abruptly hanging up, however, Rosen explained that he would not talk to me because I write for conservative publications.
- Three cheers for guilt by association.
- But Dick Wald, who was in charge of broadcast standards for ABC News, told this reporter that he saw nothing wrong with journalists getting awards from advocacy organizations. "All organizations are advocacy organizations," he said.
- Asked if that included the Pulitzer Prize Committee he said emphatically, "Yes."
-
- Syria
-
- Email from Mouhannad
- I'm Mouhannad from Syria, long time boner :) although tried and always
- trying to figure out how to donate but it's impossible to donate from Syria
- cuz we're under US and EUROLand sanctions and our financial system is
- completely on another planet.
- here is an article about Father Frans van der Lugt who was killed in "Homs
- I found it confusing reading this article and reading his opinions in his
- Dutch letters, his letters describe the truth, or at least the most of it
- which I'm daily witnessing and living through.
- it's confusing because when he was being interviewed by Arabic speaking TV
- stations like Aljazeera from Qatar, Alarabiya from Saudi Arabia or France
- 24 in its arabic edition, he was in Arabic always blaming the government
- hope you will find his dutch letters helpful to understand the whole
- thank you and J. C. D. for your courage and the beautiful podcast.
-
- Common Core
-
- Scrap Paper - scrap.noagendanotes.com
- My students began their second round of State Testing today. This is a
- PARCC computer based test that is developed and sold by Pearson. I have
- attatched a piece of "scrap" paper that Pearson provides for the test.
- Each piece has a barcode on it and we need to count out the number of
- sheets we hand out to ensure that we get the same number back. If a
- student writes anything on the sheet, even a couple scratch lines, we need
- to mail it back to Pearson (we pay the postage outsevles of course) so they
- can properly dispose of it.
- The big joke at my school among the teachers is how much our district
- probably paid for this scratch paper. The test itself has good questions
- that focus on specific skills we have been working on this year, but it is
- administered in such a cold, sterile way that I fear it just turns kids off
- to the idea of reading material to gain deeper understanding. It breaks my
- heart when I see kids struggle through questions on these tests and still
- pick the worng answer because I know I am not allowed to stop them,
- question their thinking, and help guide them to a correct answer.
-
- Pearson pays $7.7 million in Common Core settlement - The Washington Post
- By Lyndsey Layton, Published: DECEMBER 13, 1:48 PM ETE-mail the writer Aa Pearson Charitable Foundation, the nonprofit arm of educational publishing giant Pearson Inc., has agreed to pay a $7.7 million settlement to New York Attorney General Eric T. Schneiderman after he determined that the foundation had created Common Core products to generate ''tens of millions of dollars'' for its corporate sister.
- ''The law on this is clear: non-profit foundations cannot misuse charitable assets to benefit their affiliated for-profit corporations,'' Schneiderman said in a statement Thursday.
- The investigation by the attorney general examined Pearson's efforts since 2010 to develop a line of classroom materials and tests built around the Common Core, new K-12 academic standards in reading and math that have been fully adopted by 45 states and the District of Columbia.
- Pearson, the largest educational publisher in the world, sells instructional content, tests, systems and technology for profit to states, school districts and individual schools in the United States and across the globe.
- The adoption of the Common Core has created a lucrative opportunity for educational publishers, as states and schools rush to buy products ''aligned'' to the new standards.
- According to the settlement, Pearson used its nonprofit foundation to develop Common Core products in order to win an endorsement from a ''prominent foundation.''
- The latter entity is the Bill and Melinda Gates Foundation, which helped fund the creation of the Common Core standards and announced in 2011 that it would work with the Pearson Foundation to create reading and math courses aligned with the new standards. Four of those courses would be offered to the public free of charge, it said.
- Pearson Inc. executives ''believed that developing the courses within the Foundation would enhance innovation, that the other foundation's support would potentially enhance Pearson's reputation with policymakers, the education community and potential customers and that the other foundation would be more comfortable working with the Foundation rather than one of Pearson's for-profit entities,'' the settlement said.
- According to Schneiderman, Pearson executives believed the Common Core work performed by their nonprofit arm could later be sold by the for-profit organization and generate ''tens of millions of dollars'' for the company.
- Once the attorney general began investigating, the Pearson Foundation sold the courses to its corporate sister for $15.1 million.
- The attorney general also investigated international educational conferences sponsored by the Pearson Foundation, which flew U.S. state school officials from jurisdictions where Pearson Inc. did business, or sought to do business, to destinations such as Singapore. Executives from Pearson Inc. attended these conferences, and would report to the for-profit company about the purchasing needs of some of the attendees, according to the settlement.
- In a statement, the Pearson Foundation denied any legal wrongdoing.
- ''We have always acted with the best intentions and complied with the law,'' the foundation said. ''However, we recognize there were times when the governance of the Foundation and its relationship with Pearson could have been clearer and more transparent.''
- The foundation said it has added ''independent directors'' to its board who will review any foundation transactions that could benefit Pearson Inc. It said it has also adopted ''stronger operational systems.''
- In addition, it agreed to pay $7.5 million into a fund managed by the New York attorney general to support the work of 100Kin10, an organization committed to placing 100,000 science and math teachers in U.S. schools in the next ten years. Pearson will also pay $200,000 to cover the costs of the investigation.
- Pearson's commercial products may no longer be featured or sold at any events funded by the foundation, and Pearson's corporate employees may no longer attend foundation-funded events, according to the settlement.
- Sign InSubscribe(C) Copyright 1996-2013 The Washington Post
-
- Brand names in NY standardized tests vex parents
- NEW YORK (AP) '-- "Just Do It" has been a familiar Nike slogan for years, but some parents are wondering what it was doing on some of New York's Common Core standardized English tests.
- Brands including Barbie, iPod, Mug Root Beer and Life Savers showed up on the tests more than a million students in grades 3 through 8 took this month, leading to speculation it was some form of product placement advertising.
- New York state education officials and the test publisher say the brand references were not paid product placement but just happened to be contained in previously published passages selected for the tests.
- Some critics aren't so sure and questioned why specific brand names would be mentioned at all.
- "It just seems so unnecessary," said Josh Golin, associate director of the Campaign for a Commercial-Free Childhood, which monitors marketing directed at children.
- "It would be horrible if they were getting paid for it," he said. "But even if they're not, it's taking something that should not be a commercial experience and commercializing it."
- The test questions have not been made public, and teachers and principals are barred from discussing them. But teachers posting anonymously on education blogs have complained that students were confused by the brand names, which were accompanied by trademark symbols.
- The Nike question was about being a risk taker and included the line, "'Just Do It' is a registered trademark of Nike," according to students who took the test.
- Sam Pirozzolo, of Staten Island, whose fifth-grader encountered the Nike question, said there was apparently no reason for such a specific brand.
- "I'm sure they could have used a historical figure who took risks and invented things," Pirozzolo said. "I'm sure they could have found something other than Nike to express their point."
- Deborah Poppe, of West Hempstead, Long Island, said her eighth-grade son was similarly puzzled by a question, which drew complaints for a second straight year, about a busboy who failed to clean some spilled root beer '-- Mug Root Beer, to be exact, a registered trademark of PepsiCo.
- '"Why are they trying to sell me something during the test?'" she quoted her son as saying. "He's bright enough to realize that it was almost like a commercial."
- The use of brand names was one of several complaints raised by some educators and parents about the statewide tests, aligned to the Common Core standards intended to increase academic rigor. Some contend they are too difficult and don't measure what students are actually learning.
- While such general complaints about Common Core tests have arisen elsewhere, advocates said the prevalence of brand names appears to be specific to New York.
- Representatives of the New York State Education Department and Pearson, the education publishing giant with a $32 million five-year contract to develop New York's tests, said the companies did not pay for the exposure.
- "There are no product placement deals between us, Pearson or anyone else," said Tom Dunn, an Education Department spokesman. "No deals. No money. We use authentic texts. If the author chose to use a brand name in the original, we don't edit."
- Pearson spokeswoman Stacy Skelly said neither the company nor the education department received any compensation for the mentions. And if any brand comes up in a passage, she said, "the trademark symbol is included in order to follow rights and permission laws and procedures."
- Nike and Wrigley, the maker of Life Savers, said they were unaware they were mentioned on the tests. Other companies declined to comment or did not return messages.
- Some advertising experts said the idea of product placement on a test is inappropriate and fraught with peril.
- "If any brand did try to place there, what they would lose from the outrage would surely trump any exposure they got," said Michal Ann Strahilevitz, a marketing professor at Golden Gate University.
- Kelly O'Keefe, a marketing professor at Virginia Commonwealth University, said he is a fan of brands, but there are places where they don't belong.
- "Education, religion and civic life are places where brands are unwelcome," O'Keefe said. "It would be wise for Pearson to avoid using brands in their testing even if they're not paid for by the brand itself."
- Others endorsed the position of New York state educators '-- that brand names belong on the tests because they are part of the world students inhabit.
- "Brands are part of our lives," said Allen Adamson, managing director of the New York brand consulting firm Landor Associates. "To say they don't belong in academia is unrealistic."
-
- Haiti
-
- Wyclef's Haiti Charity Defunct After Mishandling $16M In Donations
- Wyclef's Y(C)le charity is no longer.
- Wyclef Jean's Y(C)le Haiti charity, once what the singer said was the country's "greatest asset and ally" is now defunct and in debt.The charity's collapse comes after years of accusations of mishandled funds, which amounted to a reported $16 million following the 2010 earthquake in Haiti.
- "Y(C)le was small before the earthquake, with only $37,000 in assets," reports The New York Times. "Immediately afterward, money started pouring in. Mr. Jean said he raised $1 million in 24 hours when he urged his Twitter followers to text donations."
- Instead of funds going directly to the cause, The Times reports that the organization spent much of its money on "offices, salaries, consultants' fees and travel," as well as pay for Jean's family, friends and defense attorneys.
- ''If I had depended on Y(C)le,'' said Diaoly Estim(C), whose orphanage features a wall painting of Mr. Jean and his wife, ''these kids would all be dead by now.''
- Between 2005-2009, the charity spent "$256,580 in illegitimate benefits to Mr. Jean and other Y(C)le board and staff members as well as improper or potentially improper transactions."
- One "improper" use of funds included doling out $30,763 to fly Lindsay Lohan to a fundraiser that raised $66,000 and spending $57,927 on private jets to fly Matt Damon and other celebs to Haiti.
- Following the earthquake in 2010, Y(C)le spent $9 million of their $16 million in donations on office space and salaries.
- Jean himself took $100,000 to perform a charity concert and has given his relatives paychecks of over half a million dollars for unspecified work.
- Not to mention, The Smoking Gun posted documents showing that the group made payments of over $100,000 to Jean's alleged mistress.
- At the end of August, Derek Q. Johnson, Y(C)le's chief executive, announced his resignation to supporters, saying ''As the foundation's sole remaining employee, my decision implies the closure of the organization as a whole.'' (Jean disaffiliated with the charity to run for president of Haiti in 2010--which he was later disqualified from because he lives in New Jersey.)
- According to The Times, Johnson, a former Time Warner exec, resigned "after Jean declined to accept a settlement proposed by the attorney general covering the charity's pre-earthquake activities ...The settlement would have required Mr. Jean and the two other Y(C)le founders to pay $600,000 in restitution 'to remedy the waste of the foundation's assets.'"
- SEE ALSO: Steven Tyler's former manager is suing his current lawyer for $8M over botched 'American Idol' negotiations >
-
- MH370
-
- Could Malaysia Air Flight 370 have been hacked?
- The disappearance of Malaysia Airlines Flight 370 has become a modern Mary Celeste mystery, and it's a guarantee the embellishments and inaccuracies will expand over time.
- As the telemetry data from the aircraft and ground radar logs have emerged, it has become increasingly certain that the plane was deliberately diverted from its course. There are three possibilities:
- The plane was diverted by the pilots.The plane was diverted after some form of forcible takeover.The plane was diverted by another party not on the plane at all.At this point, most attention is focused on the first two possibilities, with diversion by one or both pilots the most likely explanation. Whoever diverted the plane certainly knew a lot about flying one.
- But unlikely as it may sound, the third option '-- that someone not even on the plane is responsible '-- is actually a possibility. And so the term ''SCADA'' is likely to be heard in the coming days.
- What is SCADA?SCADA comes from the process control industry, and refers to one particular configuration of a digital control system. In a chemical plants there is typically a master computer receiving data from, and sending instructions to, a network of local control systems. Since I left that industry thirty years ago, the master computer has come to be called the Supervisory Control And Data Acquisition (SCADA) system.
- When security vendors started to look for ways to sell product to the process control industry, the SCADA system was the only machine in a typical process control system that looked sufficiently like a PC to be able to run the existing products. This is of course nonsense, from a security point of view '-- every 'local controller' is also a computer, and vulnerable to attack, just as a printer or a telephone exchange is also a computer from a security point of view. But even if a billion dollars of marketing money is completely wrong, it can establish a name in a vocabulary. So now the term 'SCADA security' means security of an embedded control system, regardless of whether it is a SCADA architecture or not.
- Private HackersThe 777 is a fly-by-wire aircraft. Every signal from the flight deck makes its way to the control surfaces through a communications network that runs the length of the plane. From time to time, security researchers have demonstrated, or at least claimed to demonstrate, that these networks '-- the planes engines and controls '-- are vulnerable to hackers.
- When seat back entertainment systems were introduced, many airlines wanted to show passengers a 'moving map' of the position of the aircraft. The simplest way to provide a moving map is to read the position information passing over the communications network. In effect bridging the air-gap between the control and entertainment networks. This has led to claims that the system can be hacked 'from an Android phone in the passenger cabin'.
- The last claim has since been debunked. Or at least the purported demonstration has been shown to have been made on a system designed to simulate the control system rather than the flight certified system. But there are other ways in which an airplane control system might conceivably be compromised. The control systems software could conceivably be replaced by ground maintenance crews, effectively giving an attacker the ability to divert the plane on a pre-programmed course.
- According to our current understanding of hacker capabilities, such an attack would be beyond the known capabilities of any private hacker group. SCADA attacks are still comparatively rare. It would be rather surprising if a group of criminals working on SCADA systems would choose to make a mult-systems attack on a civil aircraft potentially causing hundreds of deaths. But unpleasant surprises have occurred before.
- Government-sponsored HackersAnother possibility is that an attack might originate from a government cyber-engagement program.
- In 2010, the US launched the STUXNET attack on an Iranian civil nuclear facility. In the years since the discovery of STUXNET, other governments have been scrambling to establish similar capabilities. Unlike weapons for conventional warfare, cyberweapons are easily pilfered by the designers. In some programs this type of pilfering is even encouraged.
- Cyber-PiratesIn the past, Hollywood movies used to explore scenarios in which mad government scientists researching germ warfare use the bugs for their own evil purposes. Such a scenario might even have occurred. In cyber, this type of scenario is played out every day: Criminals pay money for cyber attacks.
- Just as the optimistic scenario has become plausible, due to the lack of candor from the Malaysian authorities, a variant of the SCADA attack has become plausible, although unlikely. In this scenario, the motive for the attack is extortion, and a group of cyber-pirates are threatening to pull another plane out of the air unless their financial demands are met.
- Whether this scenario turns out to be accurate or not, it is another reminder that the security of SCADA systems requires urgent attention. In particular, aircraft control systems will need to be designed so that they are 'tamper evident,' and future telemetry systems will be designed so that they continue to provide position updates and cannot be disabled.
- With modern encryption and communication systems a plane could report telemetry and cockpit voice conversations on a continuous basis. We could have known that the plane had been diverted, and why, immediately, rather than having speculation continue over a week later.
-
- Missing plane mystery solved? | Veterans Today
- Two former high-level insiders may have solved two of the mysteries surrounding the disappearance of Malaysian Flight 370:
- What caused the plane to suddenly fly off-course? And why are all of the governments involved covering up the truth?
- Had MH 370 crashed in the ocean, it would have left a huge, easily-visible debris field. Countries with satellite surveillance systems, and their partners, know exactly where the plane went. Boeing and its engine-manufacturer Rolls Royce also know, since planes and engines have GPS systems. (You can buy a GPS system for a little over $50 in the US; it would be naive to think a $320 million aircraft doesn't have one.) Even the INMARSAT satellite ''pings'' that we have been told can only sweep a broad arc of possible locations could in reality be used to locate the aircraft with some precision, due to the fact that radio transmissions vary in signatures according to time of day, sunspots, and so on. The ''hunt for the airliner'' peddled to the mainstream media is clearly a charade.
- So what are all of the major players '' both in governments and the aircraft industry '' working so hard to hide?
- Matthias Chang, a barrister who served as Political Secretary to Malaysian Prime Minister Dr. Mahathir Mohamad, explained during an exclusive Truth Jihad Radio interview that only a remote-hijacking fly-by-wire scenario can explain the plane's disappearance. Chang's views were confirmed by Gene ''Chip'' Tatum, a former Special Forces Air Combat Controller and US Army special operations pilot who has carried out ultra-sensitive missions at the direct orders of US Presidents.
- Chang says the Malaysian government has been given sealed evidence by one or more foreign governments concerning the fate of MH-370. As a condition of receiving that evidence, Malaysia is not allowed to divulge it.
- Matthias Chang is familiar with the highest levels of power in Malaysia. He presumably has some idea of what is in the sealed evidence. But if he did know, he could not say it directly.
- Maybe that is why Matthias Chang recently sent an email to MH-370 investigators in the alternative media with a ''hint'':
- ''WHAT IF THE DISAPPEARANCE OF MH 370 IS SUCH THAT IF THE TRUTH BE KNOWN AS TO HOW IT HAPPENED IT WOULD NOT ONLY BE A SECURITY ISSUE, IT WOULD ALSO HAVE A GLOBAL IMPACT ON THE WORLD'S ECONOMY. 'THINGS' (USED IN A BROAD SENSE, AND SO YOU HAVE TO THINK WHAT 'THINGS' THAT) WOULD COME TO A COMPLETE HALT, ALMOST A COMPLETE SHUT DOWN.''
- What ''things'' would ''come to a complete halt'' and badly damage the world economy if the truth about MH-370 were told?
- Chip Tatum thinks those ''things'' are commercial airplanes. In our interview Friday night, Tatum suggested that the current generation of airliners' fly-by-wire systems are extremely vulnerable to catastrophic sabotage, including electronic hijacking.
- Tatum called the alleged search for the aircraft ''a smokescreen'... They're keeping the media busy in the South Indian Ocean while things are being done in other areas. I think the government doesn't want us to know what they know because they don't think we can handle the truth.''
- But what could that truth possibly be? Tatum explains: ''If it were known that something is that easily hijacked by remote control, people would stop flying. And then you're talking about a huge impact on business and everything else.''
- So when Matthias Chang says that the truth about MH-370 would cause ''things'' to come to a complete halt, he is presumably referring to commercial air traffic. I asked Chang point blank if this was true. He did not deny it. But rather than confirm this hypothesis '' which may be off-limits to direct discussion due to its inclusion in the sealed evidence Malaysia has been given '' Chang directed me to his most recent article at FutureFastForward.com citing evidence that new technology allows planes to be flown from the ground.
- Chip Tatum speculates that a bright teenager with a laptop and a cell phone could hack into commercial aircraft fly-by-wire systems. He explains that in newer aircraft, cables driven by pilot controls have been replaced by computers sending electronic signals. While technologies have been patented for protecting these fly-by-wire systems '' notably US Patent #8,391,493, which the US government immediately ''disappeared'' from Patent Office records by invoking the Invention Secrecy Act '' they apparently have not yet been implemented. If Tatum is right, commercial aircraft currently flying are wide-open for remote hijacking.
- The scenario outlined by Chang and Tatum explains how MH370 was hijacked, and why all the major players are covering up the truth. But it does not explain who remote-hijacked MH370 and why.
- One clue: Tatum provides evidence for the possible involvement of the CIA-based Bush crime family in the cover-up. The fake satellite trail to the remote and dangerous Southern Indian Ocean, a gigantic red herring, was fabricated by INMARSAT '' whose largest owner, Harbinger Capital, is the new name for George H.W. Bush's notorious Zapata Corporation.
- Tatum has first-hand knowledge of the depravity and corruption of the Bush mob. While working in Special Operations for the CIA and US military in 1992, Tatum was personally ordered by then-President George H.W. Bush to ''neutralize'' Bush's political opponent Ross Perot. Based on his past missions for Bush, Tatum understood those orders meant that Bush wanted him to force Perot out of the presidential race by any means necessary, including murder. (Tatum refused Bush's orders '' the beginning of the end of his career in Special Ops.)
- Tatum has also revealed his knowledge of Bush-related CIA drug smuggling and mind control operations. He survived as a whistleblower due to the extremely sensitive documents and recordings he set up to be released in the event of his death or incapacitation-by-torture.
- Tatum has released many other documents corroborating his stories of Bush's corruption, CIA assassinations and mind-control. But despite his credibility, the mainstream media refuses to report such information.
- If the Bush crime family is deceiving the world about an operation involving remote-hijacked airliners, it wouldn't be the first time. On September 11th, 2001, fly-by-wire systems appear to have been used in the false flag attacks on New York and Washington. Bush loyalists and Israeli Mossad assets are the two main groups of suspects in those attacks. Could the same forces be involved in the theft of MH370 '' perhaps as part of a plan to stage another plane-into-building false flag, as Christopher Bollyn has suggested?
- Related Posts:Short URL: http://www.veteranstoday.com/?p=299088
- The views expressed herein are the views of the author exclusively and not necessarily the views of VT or any other VT authors, affiliates, advertisers, sponsors or partners. Legal NoticePosted by Kevin Barrett on Apr 24 2014, With 0 Reads, Filed under 9/11, Editor. You can follow any responses to this entry through the RSS 2.0. You can skip to the end and leave a response. Pinging is currently not allowed.
- To post, we ask that you login using Facebook, Yahoo, AOL, or Hotmail in the box below.Don't have a social network account? Register and Login direct with VT and post.Before you post, read our Comment Policy - Feedback
-
- Malaysia Airlines MH370: Australia, Malaysia work on deal over recovery of missing plane - ABC News (Australian Broadcasting Corporation)
- Malaysia and Australia will sign a deal that specifies who will handle any wreckage from missing flight MH370 that may be recovered, including the crucial black box flight data recorders, according to Malaysian media reports.
- Officials in Malaysia are drafting the agreement "to safeguard both nations from any legal pitfalls that may surface during that (recovery) phase," the government-controlled New Straits Times says.
- The Malaysian government hopes the deal can be finalised soon and endorsed in a cabinet meeting next week.
- Australian officials are studying the memorandum of understanding (MoU), the newspaper says.
- "The MoU spells out exactly who does what and the areas of responsibility," civil aviation chief Azharuddin Abdul Rahman was quoted as saying.
- MH370's black box isn't black, and time is running out to find it. Find out why.Mr Azharuddin said Malaysia would lead most of the investigation, with Australia and others helping. Details of the memorandum will not be made public, the report said.
- Mr Azharuddin and other officials could not immediately be reached by news agency AFP.
- The Malaysia Airlines flight carrying 239 people, including six Australians, inexplicably veered off course en route from Kuala Lumpur to Beijing on March 8 and is believed to have crashed into the southern Indian Ocean, off the West Australian coast.
- But a massive international search - led by Australian authorities - has failed to turn up any wreckage.
- A Bluefin-21 unmanned submarine is being deployed in the search for the missing plane but data from its dives has failed to reveal any trace of the aircraft.
- Procedures for passenger remains to be governed by dealThe New Straits Times quoted a source with "intimate knowledge" of the deal saying it also specified where any passenger remains would be brought and who would carry out autopsies.
- The crisis has brought intense international scrutiny on the Malaysian government, which has been accused by anguished Chinese families and other critics of hiding information and possibly trying to cover up its handling of the situation.
- It is hoped any data contained within will indicate what caused the plane to divert.
- Malaysia's scandal-prone regime, which has a poor record on transparency, has pledged to reveal the contents of the data recorders if they are found.
- A range of theories including hijacking, rogue pilot activity and aircraft malfunctions have been speculated upon.
- Malaysia's government has rejected such claims, saying it is passing on all it knows promptly. Two-thirds of the passengers were Chinese.
- A survey by Malaysia's leading independent polling firm released earlier this week found that only 26 per cent of Malaysians believed the government was being transparent about MH370.
-
- U.S. agencies back DigitalGlobe bid to sell sharper images
- U.S. agencies back DigitalGlobe bid to sell sharper imagesTop News
- U.S. agencies back DigitalGlobe bid to sell sharper images
- By Warren Strobel and Andrea Shalal
- TAMPA/WASHINGTON (Reuters) - The U.S. intelligence community has thrown its support behind a bid by commercial space imagery provider DigitalGlobe Inc to sell higher resolution images from its satellites, the leading U.S. intelligence official said Tuesday.
- DigitalGlobe has pressed the government for years to allow it to sell such imagery but U.S. government agencies worried that giving public access to them could undermine the intelligence advantage they have from even higher resolution satellite images.
- The green light from the U.S. intelligence community follows rapid advances by non-U.S. space imagery companies that have raised concerns DigitalGlobe could lose market share if it is not allowed to compete on high resolution images.
- Director of National Intelligence James Clapper told an industry conference that U.S. intelligence agencies had agreed to allow commercial providers to sell higher resolution imagery but that the decision still needed approval by other agencies.
- Clapper said the recommendation "certainly bodes well for the industry."
- DigitalGlobe applied nearly one year ago for a license to increase the resolution of its imagery from 50 cm to 25 cm. It welcomed Clapper's remarks and said it hoped the U.S. government would act quickly to finalize the decision.
- The difference would allow observers to discern not just a car seen by a satellite, but also the make of the car.
- Clapper did not specify what exact resolution the intelligence agencies had approved, but two sources familiar with the process said they expected him to approve a phased implementation over the course of this year.
- Letitia Long, director of the U.S. government's National Geospatial-Intelligence Agency, told reporters that American spy agencies have "essentially endorsed that request" by DigitalGlobe to sell 25-cm imagery.
- The Colorado-based company is preparing to launch its new WorldView 3 satellite in August, which would allow the company to sell imagery accurate to 31 cm, a company spokesman said.
- "DigitalGlobe appreciates the intelligence community's support for reforms to the current U.S. regulations," said Walter Scott, founder and chief technical officer of DigitalGlobe.
- "We are hopeful that the administration will act promptly on this issue to advance the nation's commanding lead in this strategically important industry," he added.
- Jeffrey Harris, a former director of the U.S. National Reconnaissance Office and industry expert, said the decision to allow sales of higher resolution commercial imagery would help industry and the U.S. government by increasing transparency.
- Allowing commercial providers to sell more accurate imagery at an affordable price would allow the U.S. government to spend its money and energy on higher-end government-owned capabilities, said Harris, who was elected Tuesday as president of the U.S. Geospatial Intelligence Foundation.
- Long said the advances by non-U.S. companies were a significant factor in the intelligence community decision to endorse DigitalGlobe's request.
- "If you survey the world and what is going on in the international arena, many countries are making progress," she said. "We want our U.S. companies to be able to compete."
- Long would not predict how long the White House review of the matter would take.
- A second source familiar with the imagery market said officials from the Defense and Commerce departments, intelligence agencies and the White House met to discuss the matter on Friday.
- More senior officials must still approve the move, said the source, who was not authorized to speak publicly, but it was not immediately clear when that could occur.
- (Reporting by Warren Strobel in Tampa and Andrea Shalal in Washington; editing by Andrew Hay)
- U.S. agencies back DigitalGlobe bid to sell sharper imagesTop News
- U.S. agencies back DigitalGlobe bid to sell sharper images
- By Warren Strobel and Andrea Shalal
- TAMPA/WASHINGTON (Reuters) - The U.S. intelligence community has thrown its support behind a bid by commercial space imagery provider DigitalGlobe Inc to sell higher resolution images from its satellites, the leading U.S. intelligence official said Tuesday.
- DigitalGlobe has pressed the government for years to allow it to sell such imagery but U.S. government agencies worried that giving public access to them could undermine the intelligence advantage they have from even higher resolution satellite images.
- The green light from the U.S. intelligence community follows rapid advances by non-U.S. space imagery companies that have raised concerns DigitalGlobe could lose market share if it is not allowed to compete on high resolution images.
- Director of National Intelligence James Clapper told an industry conference that U.S. intelligence agencies had agreed to allow commercial providers to sell higher resolution imagery but that the decision still needed approval by other agencies.
- Clapper said the recommendation "certainly bodes well for the industry."
- DigitalGlobe applied nearly one year ago for a license to increase the resolution of its imagery from 50 cm to 25 cm. It welcomed Clapper's remarks and said it hoped the U.S. government would act quickly to finalize the decision.
- The difference would allow observers to discern not just a car seen by a satellite, but also the make of the car.
- Clapper did not specify what exact resolution the intelligence agencies had approved, but two sources familiar with the process said they expected him to approve a phased implementation over the course of this year.
- Letitia Long, director of the U.S. government's National Geospatial-Intelligence Agency, told reporters that American spy agencies have "essentially endorsed that request" by DigitalGlobe to sell 25-cm imagery.
- The Colorado-based company is preparing to launch its new WorldView 3 satellite in August, which would allow the company to sell imagery accurate to 31 cm, a company spokesman said.
- "DigitalGlobe appreciates the intelligence community's support for reforms to the current U.S. regulations," said Walter Scott, founder and chief technical officer of DigitalGlobe.
- "We are hopeful that the administration will act promptly on this issue to advance the nation's commanding lead in this strategically important industry," he added.
- Jeffrey Harris, a former director of the U.S. National Reconnaissance Office and industry expert, said the decision to allow sales of higher resolution commercial imagery would help industry and the U.S. government by increasing transparency.
- Allowing commercial providers to sell more accurate imagery at an affordable price would allow the U.S. government to spend its money and energy on higher-end government-owned capabilities, said Harris, who was elected Tuesday as president of the U.S. Geospatial Intelligence Foundation.
- Long said the advances by non-U.S. companies were a significant factor in the intelligence community decision to endorse DigitalGlobe's request.
- "If you survey the world and what is going on in the international arena, many countries are making progress," she said. "We want our U.S. companies to be able to compete."
- Long would not predict how long the White House review of the matter would take.
- A second source familiar with the imagery market said officials from the Defense and Commerce departments, intelligence agencies and the White House met to discuss the matter on Friday.
- More senior officials must still approve the move, said the source, who was not authorized to speak publicly, but it was not immediately clear when that could occur.
- (Reporting by Warren Strobel in Tampa and Andrea Shalal in Washington; editing by Andrew Hay)
-
- Obama Sets Date for Visit to Tarnished Malaysia | Asia Sentinel
- Maybe he'll wear this shirt to meet Najib
- US President set to arrive April 27 as KL faces increasing international criticism
- US President Barack Obama is expected to visit Japan, South Korea, the Philippines and Malaysia this month as part of his push to increase US diplomatic, economic and security engagement with countries in the Asia-Pacific region. But despite the relative size and strategic importance of the other countries, it is his April 27 trip to Malaysia that arguably gives the president his biggest problems.
- Given the events of the past few months, Obama will visit a country that has earned some of the worst press in Asia, not only for its fumbling response to the loss of its jetliner, MH370, with 239 people aboard, but to revelations of growing racial and religious intolerance, blatant attempts to silence the opposition through spurious legal action and bizarre charges by Prime Minister Najib Tun Razak's own newspaper that the Central Intelligence Agency kidnapped the plane to foment trouble with China, 152 of whose citizens were aboard the missing craft. The same newspaper, Utusan Malaysia, also repeated as a real possibility speculation by former Prime Minister Mahathir Mohamad that the CIA brought down the World Trade Towers in 2001as a plot to blame Muslims for the destruction.
- In recent weeks, an appeals court has reversed a lower court decision against opposition leader Anwar Ibrahim, declaring him guilty of what were clearly trumped up charges of sodomy. The decision, apparently rushed forward, was designed to deny Anwar an almost certain win in a Kuala Lumpur suburban by-election that would have paved his way to becoming chief minister of the country's most populous and prosperous state and would have given him a potent rhetorical platform to challenge the government. In an equally dubious decision, Karpal Singh, chairman of the Democratic Party, the biggest in the troika of opposition parties, was declared guilty of sedition for saying a decision by the Sultan of Perak could be questioned in court.
- The international press that showed up in Kuala Lumpur after the disappearance of the airliner began asking questions that exposed an authoritarian regime unaccustomed to facing independent scrutiny '' questions that a kept mainstream media, all of which are owned by the political parties in power, have ignored for decades. While a vibrant opposition press exists on the Internet, the government simply ignores it or tries to neutralize its reports. Those questions include crony capitalism, gerrymandering and political repression. CNN, the major US and British newspaper s and other media assailed the government as authoritarian, corrupt and befuddled.
- The feeling in Washington, however, is that the cost of cancellation to the strategic relationship between the two countries would be too high. Obama reportedly is being urged to visit a Christian church while in the country to show US commitment to human and religious rights. Advocates say the President should make at least some gesture of recognition of the fact that a 50.87 percent majority of Malaysians voted against the ruling coalition in 2013 general elections at 47.38 percent but still hold only 89 of the 222 seats in parliament because of gerrymandering. It's unsure if he will do so. There is speculation that he may just opt for a ''meet and greet'' and get out of town as quickly as possible to avoid international criticism for propping up a regime that is starting to assume Zimbabwean characteristics of repression and kleptocracy.
- ''I don't have any problem with Obama visiting Malaysia, provided he reaches out to Malaysians on both sides of the aisle and all sectors of society, including the Christian community, whose rights are being trampled on by their government,'' said John Malott, a former career foreign service officer who served as ambassador to Malaysia from 1996 to 1998 and who has emerged as Malaysian government's severest western critic. ''But this has to be a visit that is based on the reality of what kind of country Malaysia really is today '' and not to believe the talking points that Malaysia is still a tolerant multi-racial, multi-religious, harmonious, moderate Islamic nation, an economic success story, and a role model for others. It no longer is.''
- Najib visited the White House in 2011 and was given a wholehearted endorsement by the President, who said Najib has ''showed great leadership, I think, not only in continuing to show great leadership not only in Malaysia's economy but on showing leadership on a wide range of multilateral issues.''
- The president is said to like Najib personally despite the fact that a wide range of issues have never been cleared up, going back to allegations of Najib's personal involvement in the US$1 billion purchase of French submarines that according to French prosecutors was said to have netted US$114 million in bribes and kickbacks to the United Malays National Organization. The case is still making its way through French courts.
- There is also the matter of the still controversial 2006 murder by two of Najib's bodyguards of Mongolian translator and party girl Altantuya Shaariibuu, who according to a now-dead private detective had been Najib's girlfriend before she was said to have been passed on to his best friend, Abdul Razak Baginda, a key figure in the purchase of the submarines. The bodyguards were acquitted on appeal despite overwhelming evidence of their guilt, raising questions about Malaysia's legal system as well.
- There have been some rude shocks. Six months ago, in the run-up to his previous failed visit to the region, the US president hailed Malaysia as an ''an example of a dynamic economy" and praised its multi-ethnic, moderate Muslim-dominated society only to see just three days later a court decision ordering Christians not to use the word ''Allah'' when referring to God, making it the only Islamic country in the world to do so.
- After that, the government ordered the confiscation of Malay-language Bibles containing the word '' but only in Peninsular Malaysia. Christians using Malay-language Bibles in East Malaysia were allowed to keep them. That is because most of the Christians are tribes indigenous to Borneo that are aligned with the ruling party. In Peninsular Malaysia, they form the bulk of the opposition.
- ''So the issue is -- how can you talk about establishing a 'strategic partnership' with such a government?'' Malott asked. ''Maybe that is what will have to be downplayed or even canned for this visit. To me, the idea of a declaring a strategic partnership with a government whose faults have now been revealed to the world, day after day, seems politically unwise.''
- Malott also questioned what strategic benefits the US can obtain from Malaysia.
- ''What strategic value does Malaysia have that it warrants America to hold its nose and ignore the trampling of democracy and political freedom, not to mention the corruption and cronyism that hurt American business interests there?'' he asked. ''And with Mahathir, the great anti-American, increasingly calling the political shots and Najib's popularity the lowest of any Prime Minister in polling history, will a 'strategic partnership' with the US survive Najib's departure?''
-
- Syria
-
- US sends small number of advanced weapons to Syrian rebels
- April 9, 2014: Rebel fighters carry their weapons as they walk along a street in the town of Morek in Hama province.REUTERS
- The U.S. and Saudi Arabia have supplied Syrian rebel groups with a small number of advanced American antitank missiles for the first time in a pilot program that could lead to larger flows of sophisticated weaponry, people briefed on the effort said.
- The new willingness to arm these rebels comes after the failure of U.S.-backed peace talks in January and recent regime gains on the battlefield. It also follows a reorganization of Western-backed fighters aimed at creating a more effective military force and increasing protection for Christian and other religious minorities'--something of particular importance to Washington.
- This shift is seen as a test of whether the U.S. can find a trustworthy rebel partner able to keep sophisticated weapons out of the hands of extremists, Saudi and Syrian opposition figures said. The U.S. has long feared that if it does supply advanced arms, the weapons will wind up with radical groups'--some tied to al Qaeda'--which have set up bases in opposition-held territory.
- The White House would neither confirm nor deny it had provided the TOW armor-piercing antitank systems, the first significant supply of sophisticated U.S. weapons systems to rebels. But U.S. officials did say they are working to bolster the rebels' ability to fight the regime.
- Rebels and their Saudi backers hope the Obama administration will be persuaded to ease its long-standing resistance to supplying advanced weaponry that could tip the balance in the grinding civil war'--especially shoulder-fired missiles capable of bringing down planes.
- Some of the TOWs provided to rebels since March are equipped with a complex, fingerprint-keyed security device that controls who can fire it, said Mustafa Alani, a senior security analyst at the Geneva-based Gulf Research Center who is regularly briefed by Saudi officials on security matters.
- Click for more from The Wall Street Journal.
-
- An Eyewitness to the Syrian Rebellion: Father Frans in His Own Words | The BRICS Post
- By John RosenthalSpecial to The BRICS Post
- The Syrian Civil War has devastated entire cities and towns as fighting between the rebels and Syrian Army spreads from neighborhood to neighborhood [Xinhua]
- An examination of texts published by Father Frans van der Lugt in 2011 and 2012 shows that the late Dutch Jesuit priest had a dim view of the Syrian rebellion, which he held to be the work of a violent minority, and favored a process of political reform in Syria to be implemented by the current government under President Bashar Al-Assad.
- Father Frans was murdered under still unclarified circumstances in the embattled Syrian city of Homs earlier this month.
- Opposition sources have blamed the Syrian government for his death. But it is widely believed that Father Frans was killed by hard-line Islamist members of one of the rebel factions that have taken control of his Bustan al-Diwan neighborhood in Homs.
- The texts of Father Frans, who had lived in Syria since 1966, provide an eyewitness account of the origins of the anti-Assad rebellion and the gradual hardening of the front between opposing rebel and government forces in Homs.
- In many respects, the Father's observations contrast sharply with what has become the standard view of the rebellion in Western media.
- Perhaps most notably, whereas the rebellion is typically held to have been sparked by the violent repression of peaceful protests, according to Father Frans, the ''protest movement'' contained an armed and violent element ''from the start'' and the violent opposition quickly gained the ascendancy over the peaceful opposition.
- Thus, in a letter published in January 2012 on the Dutch-Flemish Mediawerkgroep Syri website, Father Frans wrote:
- From the start, the protest movements were not purely peaceful. From the start I saw armed demonstrators marching along in the protests, who began to shoot at the police first. Very often the violence of the security forces has been a reaction to the brutal violence of the armed rebels.
- In the same letter, Father Frans insisted that what was occurring in Syria could not be described as a ''popular uprising,'' since the majority of Syrians do not support the opposition and ''certainly not'' its armed component.
- Already in September 2011, Father Frans had made similar observations in a guest post on a Belgian blog, going so far as to accuse armed opposition groups of blaming the regime for their own acts of violence.
- Having noted the splintering of the opposition among Islamists, ''liberals and democrats'', communists and so on, Father Frans continued:
- Moreover, from the start there has been the problem of the armed groups, which are also part of the opposition'....The opposition of the street is much stronger than any other opposition. And this opposition is armed and frequently employs brutality and violence, only in order then to blame the government. Many representatives of the government [regeringsmensen '' Father Frans might also be referring to supporters of the government] have been tortured and shot dead by them.
- ''Personally,'' Father Frans concluded, ''I expect little good to come from the opposition, which, moreover, has been instigated and paid by foreign interests.''
- Favoring political reform
- The Syrian Army was the only force preventing an all-out civil war between Sunnis and Alawites in Homs, says Father Frans [Xinhua]
- Faced with a choice between an opposition as so described and the current Syrian government, Father Frans clearly favored a process of political reform undertaken by the latter and not the ''regime change'' that has been favored by the West.
- ''Personally,'' he wrote in September 2011, ''I think this government has to stay, despite all difficulties, and proceed along the path of reforms.''
- In his January 2012 letter, he outlined a similar course of action, noting that the current government is ''perhaps more democratic than possible replacements.''
- In particular, he regarded the current regime as the best guarantee against the spread of sectarian violence in Syria.
- Whereas Western press reports have emphasized his efforts to promote understanding among Christians and Muslims, Father Frans identified the main sectarian fault-line in Syria as that running between two Muslim communities: Sunnis, who make up the majority of the population, and the Alawite minority, which is not only associated with the current regime but whose members are regarded as apostates by radical Sunni currents.
- In January 2012, Father Frans warned that the Syrian army was the only thing standing in the way of a full-fledged civil war between Sunnis and Alawites in Homs.
- In the same letter, he noted that most Christian leaders in Syria support Assad, ''because they are convinced that they would be worse off with another solution.''
- In his critical observations on the Syrian crisis, Father Frans did not spare the Western media, which he accused of distortion and bias.
- In September 2011 he wrote that he was disturbed by Western coverage of the Syrian crisis because there was ''never a good word'' published about the current government.
- He said that Western media blamed the Syrian government ''for things that it had not done''. He went on:
- Our experience with the government has not been so negative. In my case, they always helped my projects and supported my idea of being of service to Sunnis and Alawites. They wanted an ever greater separation of church and state and were enthusiastic about projects that were non-denominational.
- According to the Dutch daily de Volkskrant, the help provided by the Syrian government to Father Frans included a grant of over 100 acres of land for the Father's agricultural projects.
- Father Frans said that the rebels (seen here in the city of Idlib) were better equipped and organized by March 2012 [Xinhua]
- Ironically, by March 2012, Father Frans found himself living under siege by the forces of the very Syrian government he supported. In the meanwhile, rebel forces, which had briefly taken control of Bustan al-Diwan in September 2011, were back again and this time they were there for the long-term.
- Now, as Father Frans noted in an eyewitness report for the Flemish monthly Streven, the rebel forces were ''much better organized'' and ''called themselves 'the Free Syrian Army.'''
- ''They had an abundance of food,'' he continued, ''and they also distributed it to poor people. They are financially and militarily supported by foreign interests.''
- ''For now,'' Father Frans concluded, referring to both the Bustan al-Diwan and Hamidiyeh neighborhoods of Homs, ''the Free [Syrian] Army is lord and master of our Christian neighborhoods'....''
- In late March, Father Frans's own car was destroyed by a missile or mortar fired into Bustan al-Diwan by the Syrian army. ''The army was aiming for a restaurant not far from us where the FSA has its headquarters,'' he explained to the Swiss Catholic new agency APIC.
- ''There is a Greek Orthodox church right next door, which was also damaged.''
- Father Frans told APIC that ninety percent of the Christian population of Homs had already fled the city, because of the fighting.
- ''They were not chased out by the Sunni militias,'' Father Frans took care to add, ''This needs to be emphasized! The Syrian army was first driven from the neighborhood by the FSA and now it's the FSA that is being bombed.''
- In his contribution to Streven, Father Frans wrote about the futility of the army's bombing campaign and its disastrous effects upon the remaining Christian population:
- '...[T]he only result is that many Christian homes and also churches'...have been bombed and partially or wholly destroyed, while the soldiers of the Free [Syrian] Army remain unharmed. The latter hide in the cellars of the Christian homes to protect themselves from the bombing.
- Nonetheless, Father Frans remained clear about where he believed the ultimate responsibility for the disaster lay. ''There is no excusing the fact,'' he wrote, ''that the Free Syrian Army has taken the Christian neighborhoods in order to use them as a battlefield for combating the government army.''
- But not even the experience of siege and bombardment by government forces could shake Father Frans's conviction that distorted, one-sided coverage of the Syrian crisis in the media was itself a major obstacle to peace.
- Reflecting on the way forward in the conclusion to his contribution to Streven, Father Frans warned:
- In the first place, it has to be said that it is very difficult to provide a nuanced and objective account of what is happening. Many journalists fall into describing matters in black and white. For them, good and evil are not interwoven, but are clearly separated. They demonize the one side and glorify the other. Thus, for example, it is not true that our [the Syrian] government has only bad sides and the opposition only good ones. But because the US, Europe and certain Arab countries support the opposition, they endeavor, whether consciously or unconsciously, to idealize it as much as possible, without engaging in any careful analysis of the real situation. Certain interests are obscuring our view of the real situation and contaminating the description of it.
- The author of this article John Rosenthal is a European-based journalist and political analyst who writes on European politics and transatlantic issues. His articles have appeared in such publications as Al-Monitor, World Affairs, The Wall Street Journal Europe, Les Temps Modernes, and Die Weltwoche. He is the author of the recent book The Jihadist Plot: The Untold Story of Al-Qaeda and the Libyan Rebellion. You can follow his work at www.trans-int.com or on Facebook.
-
- Bij defaitisme is niemand gebaat | Mediawerkgroep Syri
- MEDIAWERKGROEP SYRIE '' 13 januari 2012
- De aanval tegen een school en buitenlandse journalisten in de Syrische stad Homs op 11 januari 2012.
- Verslag door Pater van der Lugt over de situatie in Homs
- We zijn het de burgers in Syri verplicht genuanceerd te zijn. Anders is hun strijd verloren.
- Er zijn hier veel mensen die echt geloven dat we met deze regering verder kunnen komen, dat ze in staat is hervormingen aan te brengen (zie de laatste toespraak van de president) en dat ze wellicht democratischer zal zijn dan eventuele plaatsvervangers.
- De meeste burgers in Syri staan niet achter de oppositie. Dit beweert zelfs een land als Qatar na een meningspeiling. Daarom kan je ook niet zeggen dat het hier om een volksopstand gaat. Het merendeel van het volk is niet in opstand en zeker niet in gewapende opstand. Het gaat vooral om een strijd tussen het leger en gewapende soennitische groeperingen, die de val van het alawitisch regime beogen en de overname van de macht.
- Vanaf het begin zijn de protestbewegingen niet louter vreedzaam geweest. Ik heb vanaf het begin gewapende demonstranten in die betogingen mee zien lopen, die als eersten op de politie begonnen te schieten. Heel vaak is het geweld van de veiligheidsdiensten een reactie op het wrede geweld van de gewapende opstandelingen.
- Het is niet zeker dat de regering de twee groeperingen (soennieten en alawieten) tegenover elkaar uitspeelt. In Homs ligt het juist andersom. Het leger zorgt ervoor dat de twee groeperingen niet met elkaar in bloedige strijd gaan. Vertrekt het leger, dan hebben we hier in Homs een burgeroorlog.
- Bachar al-Assad heeft nooit de steun van de christelijke leiders geeist. De meesten staan achter hem omdat ze ervan overtuigd zijn dat ze met een andere oplossing slechter zijn.
- Pater Frans van der Lugt vanuit Homs.13 januari 2012.
- Vind ik leuk:LikeLaden'...
-
- Ministry of Truth
-
- The US State Department is funding mesh networks in Tunisia and Cuba | The Verge
- The Tunisian city of Sayada now has an innovative new mesh network, thanks to a $2.3 million grant from the US State Department. Launched in December, the network uses a series of rooftop routers to offer a decentralized alternative to the larger internet, a way for computers to connect locally without reaching the wider web. In the case of severe web blocking, like Tunisians faced in 2011, mesh networks could be the citizens' only means of digital communications.
- The networks offer little protection against surveillance '-- any would-be spies could simply reprogram a router to grab the network's traffic in-transit '-- but the local nature of the network makes it less susceptible to the NSA's broader traffic-sniffing efforts. Anyone listening in would have to target the network specifically. Still, the promise of open communications has led the State Department to invest heavily in the networks, also funding pilot projects in Detroit and New York. The government has also funded a $4.7 million push for mesh networks in Cuba through its USAID program, the same organization that funded the controversial Cuban Twitter project made public earlier this year.
-
- Nonprofit Report for NEW AMERICA FOUNDATION
- Basic Organization InformationNEW AMERICA FOUNDATION
- Physical Address:Washington, DC 20036 EIN:52-2096845Web URL:www.newamerica.net NTEE Category:V Social Science Research Institutes V05 Research Institutes and/or Public Policy Analysis Ruling Year:1998 Sign in or create an account to see this organization's full address, contact information, and more!
- Mission StatementTo bring exceptionally promising new voices and new ideas to the fore of our nation's public discourse through Fellowships and issue-specific programs and sponsoring a wide range of research, writing, conferences, and events on the most important issues of our time
- A multi-year analysis of key balance sheet, income statement, profitability and liquidity measures is available for this organization. Financial SCAN includes a detailed financial health analysis and peer comparison and benchmarking tool. Learn More
- Key Financial SCAN FeaturesFinancial Health Dashboard: Highlights key financial trends and ratios for a selected nonprofit organization over a period of up to five years.Peer Comparison Dashboard: Compares the organization's financials with up to five peer nonprofits that you select.Graphical Analysis: Provides multi-year graphs and an interpretive guide in a format ready to present to your clients.Printable PDF Report: Provides a complete analysis of the organization for your records. The full report tells you what to look for and why it matters.Advanced Search: Allows you to search by EIN (Employer Identification Number), organization name, city, state, revenue, expenses, and assets.Revenue and ExpensesRevenue and Expense data from Forms 990 for 2011, 2010, 2009, 2008, 2007 are included in the GuideStar Premium Report. Upgrade NowReport Added To Cart
- Balance SheetBalance Sheet data from Forms 990 for Year 2011, 2010, 2009, 2008, 2007 are included in the GuideStar Premium Report. Upgrade NowReport Added To Cart
- A multi-year analysis of key balance sheet, income statement, profitability and liquidity measures is available for this organization. Financial SCAN includes a detailed financial health analysis and peer comparison and benchmarking tool. Learn More
- Key Financial SCAN FeaturesFinancial Health Dashboard: Highlights key financial trends and ratios for a selected nonprofit organization over a period of up to five years.Peer Comparison Dashboard: Compares the organization's financials with up to five peer nonprofits that you select.Graphical Analysis: Provides multi-year graphs and an interpretive guide in a format ready to present to your clients.Printable PDF Report: Provides a complete analysis of the organization for your records. The full report tells you what to look for and why it matters.Advanced Search: Allows you to search by EIN (Employer Identification Number), organization name, city, state, revenue, expenses, and assets.Officers for Fiscal Year (IRS Form 990)Report Added To Cart Officers for 2011, 2010, 2009, 2008, 2007 are included in the GuideStar Premium Report. Upgrade Now
- Highest Paid Employees & Their Compensation (IRS Form 990)Highest Paid Employee Data for 2011, 2010, 2009, 2008, 2007 are included in the GuideStar Premium Report. Upgrade NowReport Added To Cart
- Program: Fellows ProgramsBudget:$1,808,000Category:Social Science ResearchPopulation Served:AdultsChildren and Youth (infants - 19 years.)Program Description:
- Each year, New America awards up to 35 fellowships to individuals who have powerful ideas for moving public thinking into new terrain. The program supports both established policy thinkers, and those who have exceptional potential but are not yet well established. All come to New America to pursue solutions-oriented research and writing projects of their own design.
- Program Long-Term Success:
- Program Short-Term Success:
- Program Success Monitored by:
- Program Success Examples:
- Program: American Strategy ProgramBudget:$2,390,000Category:International, Foreign Affairs & National SecurityPopulation Served:AdultsProgram Description:
- The purpose of the American Strategy Program is to promote a new internationalism that adapts our best foreign policy traditions to the 21st century, combining tough-minded realism about America's interests in the world with pragmatic idealism about the kind of world order best suited to America's democratic way of life.
- Program Long-Term Success:
- Program Short-Term Success:
- Program Success Monitored by:
- Program Success Examples:
- Program: Domestic Policy ProgramsBudget:$9,250,000Category:Social Science ResearchPopulation Served:AdultsChildren and Youth (infants - 19 years.)Program Description:
- New America Foundation has numerous domestic policy programs targeted toward the most pressing needs of our time including asset building, health policy, education, economic growth and fiscal policy.
- Program Long-Term Success:
- Program Short-Term Success:
- Program Success Monitored by:
- Program Success Examples:
- Contractor data is available for this organization!
- Independent Contractor information for 2011, 2010, 2009, 2008, 2007 is available for this organization with a subscription to GuideStar Premium Pro.
- GuideStar Premium Pro also includes:
- Comprehensive financial data, including functional expense detail, for every digitized fiscal year in GuideStar's databaseAbility to download up to 55 fields of data for up to 1,000 organizations at a time and up to five years' worth of Income Statement and Balance Sheet data for individual organizationsComprehensive advanced search capabilities, including criteria for functional expenses, investible assets, investment income and audit & 990T filing requirementsAbility to save organizations and searches for quick referencePeople search with salary range dataAccess to all available Forms 990More information
- Impact Summary from the NonprofitThis organization has not provided an impact summary.
-
- About New America | NewAmerica.org
- The New America Foundation is a nonprofit, nonpartisan public policy institute that invests in new thinkers and new ideas to address the next generation of challenges facing the United States.
- New America emphasizes work that is responsive to the changing conditions and problems of our 21st Century information-age economy -- an era shaped by transforming innovation and wealth creation, but also by shortened job tenures, longer life spans, mobile capital, financial imbalances and rising inequality.
- The foundation's mission is animated by the American ideal that each generation will live better than the last. That ideal is today under strain. Our education and health care systems are struggling with problems of quality, cost and access. The country requires creative means to address its fiscal challenges and pay for needed public, social and environmental investments. Abroad, the United States has yet to fashion sustainable foreign and defense policies that will protect its citizens and interests in a rapidly integrating world.
- Too often, these challenges have proven impervious to conventional party politics and incremental proposals. With an emphasis on big ideas, impartial analysis and pragmatic solutions, New America invests in outstanding individuals whose ability to communicate to wide and influential audiences can change the country's policy discourse in critical areas, bringing promising new ideas and debates to the fore.
- Launched in 1999, the foundation was guided through a period of rapid growth by founding president Ted Halstead. The institute is now led by President Anne-Marie Slaughter and an outstanding Board of Directors, chaired by Eric Schmidt.
-
- NBC Orders Psychological Testing for David Gregory
- NyPo has the dirt:NBC's ''Meet The Press'' has fallen to such ratings lows that network brass ordered psychological research of the host David Gregory and his family, in a bid to make him more likable.
- Friends of Gregory and even his wife were interviewed by a psychologist commissioned by NBC to find out how the host of the flagship Sunday morning show might relate to audiences better.
- The Washington Post reported, ''Last year, the network undertook an unusual assessment of the 43-year-old journalist, commissioning a psychological consultant to interview his friends and even his wife.
- ''The idea, according to a network spokeswoman, Meghan Pianta, was 'to get perspective and insight from people who know him best.' But the research project struck some at NBC as odd, given that Gregory has been employed there for nearly 20 years.''
- Note to NBC: Mainstream shills are never likable. Put a truth speaker like Judge Napolitano in his spot and watch ratings soar.
-
- U.S. intelligence chief bars unauthorized contacts with reporters on all intel-related matters | DC Declassified | McClatchy DC
- Employees of U.S. intelligence agencies have been barred from discussing any intelligence-related matter - even if it isn't classified - with journalists, under a new directive issued by Director of National Security James Clapper.
- Intelligence agency employees who violate the policy could suffer career-ending losses of their security clearances or out-right termination, and those who disclose classified information could face criminal prosecution, according to the directive signed by Clapper on March 20.
- Under the order, only the director or deputy head of an intelligence agency, public affairs officials and those authorized by a public affairs official may have contact with journalists on intelligence-related matters.
- The order, which was made public on Monday by Steven Aftergood, who runs the Federation of American Scientists' Project on Government Secrecy, is sweeping in its definition of intelligence-related matters.
- ''The directive is limited to contact with the media about intelligence related-information, including intelligence sources, methods, activities and judgments,'' says the order, which doesn't distinguish between classified and unclassified matters.
- It also includes a sweeping definition of who is a journalist, which it asserts is ''any person . . . engaged in the collection, production, or dissemination to the public of information in any form related to topics of national security.''
- The order represents the latest move by the Obama administration to stifle leaks. It bolsters another administration initiative, called the Insider Threat Program, which requires federal employees to report co-workers who show any of a broad variety of ''high risk'' behaviors that could indicate that they could be sources of unauthorized releases of classified or unclassified material.
- President Barack Obama launched the Insider Threat Program in October 2011 after Army Pfc. Chelsea Manning downloaded hundreds of thousands of documents from a classified computer network and sent them to WikiLeaks, the anti-government secrecy group.
- The administration redoubled its crackdown after the leaks to news media of classified information on the National Security Agency's top-secret communications data collection operations by former NSA contractor Edward Snowden.
- Clapper's new directive ''is a response to the same basic anxiety: that intelligence employees might be talking out of school,'' said Aftergood. ''It's what I think is a rather heavy handed attempt to crack down on unauthorized communications. It doesn't specify that it's limited to classified information and indeed, disclosures of classified information are already prohibited if unauthorized.''
- ''IC employees . . . must obtain authorization for contacts with the media'' when it comes to intelligence-related matters, and they ''must also report . . . unplanned or unintentional contact with the media on covered matters,'' the directive says.
- Clapper's order, he said, could end up hurting the credibility of the U.S. intelligence community. U.S. intelligence agencies will issue information that only is approved by his office, and alternate voices that could call attention to inaccurate or incomplete statements will be smothered or dissuaded from speaking out.
- ''Ultimately, it (the new directive) is going to be self-defeating because it's going to undermine the credibility of the news emanating from the intelligence community,'' said Aftergood. ''Whether because of deception or error or whatever it might be, the authorized official view is not always the right one and it is usually incomplete.''
- From exaggerated and bogus information on Iraqi weapons of mass destruction to Clapper's own misleading statement on the collection of Americans' private communications data, the U.S. intelligence community already has a substantial record of issuing inaccurate or abbreviated information to the public.
-
- Cyber risks can cause disruption on scale of 2008 crisis, study says
- Cyber risks can cause disruption on scale of 2008 crisis, study says14 minutes agoOrganisations must dramatically improve their response to cyber risks to avoid a new global shock on the scale of the financial crisis that rocked the world in 2008, a study showed Tuesday.
- Zurich Insurance said in a statement that even cyber security professionals did not have a clear overview of all the interconnected risks organisations can face.
- The Swiss insurance group, which has produced a report on cyber risks in cooperation with the Atlantic Council think tank, warned that "a build-up in these risks could create a failure on a similar scale to the 2008 financial crisis".
- Subprime mortgages were at the root of that crisis which began when the US housing market collapsed, dragging down major banks, and causing panic on world financial markets.
- The Zurich Cyber Risk Report said IT risks could pose a threat of a similar scale.
- "Few people truly understand their own computers or the Internet, or the cloud to which they connect, just a few truly understood the financial system as a whole or the parts to which they are most directly exposed," said Zurich risk chief Axel Lehmann.
- Outsourcing of server management for example or creating direct connections between organisations for things like corporate joint ventures makes it more difficult to get an overview of the risks involved, Zurich said.
- The risk of disruption in the Internet infrastructure itself, malware attacks and major international conflicts can also create system-wide risk, it added.
- "The Internet is the most complex system humanity has ever devised. Although it has been incredibly resilient for the past few decades, the risk is that the complexity which has made cyberspace relatively risk-free can, and likely will, backfire," Lehmann said.
- Explore further:European insurers discover cyber protection market
- More from Physics Forums - General Physics
- Related StoriesGrowing cyber threat to US infrastructure: spy chief Mar 12, 2013
- The United States faces a mounting danger from cyber attacks on its infrastructure while digital espionage threatens to undercut the military's technological edge, the intelligence chief said Tuesday.
- European insurers discover cyber protection market Sep 22, 2013
- It's already a booming market in the United States, but in Europe, companies are also waking up to the idea of cyber insurance to protect themselves against Internet attack.
- US banking sector too vulnerable to hackers, report says Apr 26, 2013
- US authorities charged with overseeing the financial sector are worried about its vulnerability to cyberattacks, they said in a report published Thursday.
- London-based banks simulate giant cyber-attack Nov 12, 2013
- Dozens of London-based banks joined other financial institutions in the capital on Tuesday for a giant exercise to test their defences against a cyber-attack, officials said.
- UK government report shows local police are not ready to fight cyber-crime Apr 10, 2014
- (Phys.org) '--Britain's Her Majesty's Inspectorate of Constabulary (HMIC) has issued a report critiquing the state of local police readiness regarding cyber-crime in England and Wales. Workers with HMIC have ...
- Cyber resilience metrics needed to meet increased threats Nov 25, 2013
- Cyber threats are rapidly emerging as one of the primary security concerns for the nation and global community as targeted cyber attacks can cause severe consequences to critical infrastructure and sectors of the economy. ...
- Recommended for youTo prevent data theft, businesses race to adopt new technology Apr 20, 2014
- Recent high-profile data breaches at Target and Neiman Marcus have accelerated plans by banks and retailers to implement technologies they say will prevent hackers from stealing consumers' account information.
- Hackers of Oman news agency target Bouteflika Apr 20, 2014
- Hackers on Sunday targeted the website of Oman's official news agency, singling out and mocking Algeria's newly re-elected president Abdelaziz Bouteflika as a handicapped "dictator".
- Health care site flagged in Heartbleed review Apr 19, 2014
- People with accounts on the enrollment website for President Barack Obama's signature health care law are being told to change their passwords following an administration-wide review of the government's vulnerability to the ...
- Computer users circumvent password security with workarounds, according to study Apr 18, 2014
- (Phys.org) '--When workers and organizations circumvent computer passwords and security rules, they unwittingly open the door to hackers, according to a study co-authored by Ross Koppel, an adjunct professor ...
- Satellite telecom vulnerable to hackers, researchers find Apr 17, 2014
- Security flaws in many satellite telecommunications systems leave them open to hackers, raising potential risks for aviation, shipping, military and other sectors, security researchers said Thursday.
- Researcher finds flaw in Samsung fingerprint check Apr 17, 2014
- A Berlin-based researcher says he has managed to fool the fingerprint-based security system on Samsung's new Galaxy S5 smartphone using wood glue and a picture of the original print.
- User comments : 0More news stories
- Research shows impact of Facebook unfriendingTwo studies from the University of Colorado Denver are shedding new light on the most common type of `friend' to be unfriended on Facebook and their emotional responses to it.
- Full power: Alternative energy partnerships flourish in AsiaAs President Barack Obama begins a trip to Asia to coordinate with allies and reconfirm America's strategic pivot to the Pacific, officials at the Office of Naval Research (ONR) emphasized today the Asia-Pacific ...
- 'Russian Facebook' founder flees country after being pushed out (Update)The maverick founder of Russia's top social network, Pavel Durov, said Tuesday he had fled the country after selling his share in the company under pressure from the security services.
- Engineering students invent virtual fitting room for online shoppers (w/ video)(Phys.org) '--One blessing of the Internet: shopping conveniently online for clothes. One curse of the Internet: shopping conveniently online for clothes.
- Carnegie Mellon system lets iPad users explore data with their fingersSpreadsheets may have been the original killer app for personal computers, but data tables don't play to the strengths of multi-touch devices such as tablets. So researchers at Carnegie Mellon University ...
- Mantis shrimp stronger than airplanes(Phys.org) '--Inspired by the fist-like club of a mantis shrimp, a team of researchers led by University of California, Riverside, in collaboration with University of Southern California and Purdue University, ...
- Neuroimaging: Live from inside the cellA novel imaging technique provides insights into the role of redox signaling and reactive oxygen species in living neurons, in real time. Scientists of the Technische Universit¤t M¼nchen and the Ludwig-Maximilians-Universit¤t ...
- People pay more attention to the upper half of field of vision, study finds(Medical Xpress)'--A new study from North Carolina State University and the University of Toronto finds that people pay more attention to the upper half of their field of vision '' a finding which could ...
- Vacuum ultraviolet lamp of the future created in JapanA team of researchers in Japan has developed a solid-state lamp that emits high-energy ultraviolet (UV) light at the shortest wavelengths ever recorded for such a device, from 140 to 220 nanometers. This ...
- New patenting guidelines are needed for biotechnologyBiotechnology scientists must be aware of the broad patent landscape and push for new patent and licensing guidelines, according to a new paper from Rice University's Baker Institute for Public Policy.
- Javascript is currently disabled in your web browser. For full site functionality, it is necessary to enable Javascript. In order to enable it, please see these instructions.(C) Phys.org' 2003-2013, Science X network
- Cyber risks can cause disruption on scale of 2008 crisis, study says14 minutes agoOrganisations must dramatically improve their response to cyber risks to avoid a new global shock on the scale of the financial crisis that rocked the world in 2008, a study showed Tuesday.
- Zurich Insurance said in a statement that even cyber security professionals did not have a clear overview of all the interconnected risks organisations can face.
- The Swiss insurance group, which has produced a report on cyber risks in cooperation with the Atlantic Council think tank, warned that "a build-up in these risks could create a failure on a similar scale to the 2008 financial crisis".
- Subprime mortgages were at the root of that crisis which began when the US housing market collapsed, dragging down major banks, and causing panic on world financial markets.
- The Zurich Cyber Risk Report said IT risks could pose a threat of a similar scale.
- "Few people truly understand their own computers or the Internet, or the cloud to which they connect, just a few truly understood the financial system as a whole or the parts to which they are most directly exposed," said Zurich risk chief Axel Lehmann.
- Outsourcing of server management for example or creating direct connections between organisations for things like corporate joint ventures makes it more difficult to get an overview of the risks involved, Zurich said.
- The risk of disruption in the Internet infrastructure itself, malware attacks and major international conflicts can also create system-wide risk, it added.
- "The Internet is the most complex system humanity has ever devised. Although it has been incredibly resilient for the past few decades, the risk is that the complexity which has made cyberspace relatively risk-free can, and likely will, backfire," Lehmann said.
- Explore further:European insurers discover cyber protection market
- More from Physics Forums - General Physics
- Related StoriesGrowing cyber threat to US infrastructure: spy chief Mar 12, 2013
- The United States faces a mounting danger from cyber attacks on its infrastructure while digital espionage threatens to undercut the military's technological edge, the intelligence chief said Tuesday.
- European insurers discover cyber protection market Sep 22, 2013
- It's already a booming market in the United States, but in Europe, companies are also waking up to the idea of cyber insurance to protect themselves against Internet attack.
- US banking sector too vulnerable to hackers, report says Apr 26, 2013
- US authorities charged with overseeing the financial sector are worried about its vulnerability to cyberattacks, they said in a report published Thursday.
- London-based banks simulate giant cyber-attack Nov 12, 2013
- Dozens of London-based banks joined other financial institutions in the capital on Tuesday for a giant exercise to test their defences against a cyber-attack, officials said.
- UK government report shows local police are not ready to fight cyber-crime Apr 10, 2014
- (Phys.org) '--Britain's Her Majesty's Inspectorate of Constabulary (HMIC) has issued a report critiquing the state of local police readiness regarding cyber-crime in England and Wales. Workers with HMIC have ...
- Cyber resilience metrics needed to meet increased threats Nov 25, 2013
- Cyber threats are rapidly emerging as one of the primary security concerns for the nation and global community as targeted cyber attacks can cause severe consequences to critical infrastructure and sectors of the economy. ...
- Recommended for youTo prevent data theft, businesses race to adopt new technology Apr 20, 2014
- Recent high-profile data breaches at Target and Neiman Marcus have accelerated plans by banks and retailers to implement technologies they say will prevent hackers from stealing consumers' account information.
- Hackers of Oman news agency target Bouteflika Apr 20, 2014
- Hackers on Sunday targeted the website of Oman's official news agency, singling out and mocking Algeria's newly re-elected president Abdelaziz Bouteflika as a handicapped "dictator".
- Health care site flagged in Heartbleed review Apr 19, 2014
- People with accounts on the enrollment website for President Barack Obama's signature health care law are being told to change their passwords following an administration-wide review of the government's vulnerability to the ...
- Computer users circumvent password security with workarounds, according to study Apr 18, 2014
- (Phys.org) '--When workers and organizations circumvent computer passwords and security rules, they unwittingly open the door to hackers, according to a study co-authored by Ross Koppel, an adjunct professor ...
- Satellite telecom vulnerable to hackers, researchers find Apr 17, 2014
- Security flaws in many satellite telecommunications systems leave them open to hackers, raising potential risks for aviation, shipping, military and other sectors, security researchers said Thursday.
- Researcher finds flaw in Samsung fingerprint check Apr 17, 2014
- A Berlin-based researcher says he has managed to fool the fingerprint-based security system on Samsung's new Galaxy S5 smartphone using wood glue and a picture of the original print.
- User comments : 0More news stories
- Research shows impact of Facebook unfriendingTwo studies from the University of Colorado Denver are shedding new light on the most common type of `friend' to be unfriended on Facebook and their emotional responses to it.
- Full power: Alternative energy partnerships flourish in AsiaAs President Barack Obama begins a trip to Asia to coordinate with allies and reconfirm America's strategic pivot to the Pacific, officials at the Office of Naval Research (ONR) emphasized today the Asia-Pacific ...
- 'Russian Facebook' founder flees country after being pushed out (Update)The maverick founder of Russia's top social network, Pavel Durov, said Tuesday he had fled the country after selling his share in the company under pressure from the security services.
- Engineering students invent virtual fitting room for online shoppers (w/ video)(Phys.org) '--One blessing of the Internet: shopping conveniently online for clothes. One curse of the Internet: shopping conveniently online for clothes.
- Carnegie Mellon system lets iPad users explore data with their fingersSpreadsheets may have been the original killer app for personal computers, but data tables don't play to the strengths of multi-touch devices such as tablets. So researchers at Carnegie Mellon University ...
- Mantis shrimp stronger than airplanes(Phys.org) '--Inspired by the fist-like club of a mantis shrimp, a team of researchers led by University of California, Riverside, in collaboration with University of Southern California and Purdue University, ...
- Neuroimaging: Live from inside the cellA novel imaging technique provides insights into the role of redox signaling and reactive oxygen species in living neurons, in real time. Scientists of the Technische Universit¤t M¼nchen and the Ludwig-Maximilians-Universit¤t ...
- People pay more attention to the upper half of field of vision, study finds(Medical Xpress)'--A new study from North Carolina State University and the University of Toronto finds that people pay more attention to the upper half of their field of vision '' a finding which could ...
- Vacuum ultraviolet lamp of the future created in JapanA team of researchers in Japan has developed a solid-state lamp that emits high-energy ultraviolet (UV) light at the shortest wavelengths ever recorded for such a device, from 140 to 220 nanometers. This ...
- New patenting guidelines are needed for biotechnologyBiotechnology scientists must be aware of the broad patent landscape and push for new patent and licensing guidelines, according to a new paper from Rice University's Baker Institute for Public Policy.
- Javascript is currently disabled in your web browser. For full site functionality, it is necessary to enable Javascript. In order to enable it, please see these instructions.(C) Phys.org' 2003-2013, Science X network
-
- Transhumanism
-
- IBM's Watson May Soon Be The Best Doctor In The World
- Most people know Watson as IBM's answer to Jeopardy star Ken Jennings. But IBM's aspirations for its artificially intelligent supercomputer are now less quiz show champion and more medical genius."Watson, the supercomputer that is now the world Jeopardy champion, basically went to med school after it won Jeopardy," MIT's Andrew McAfee, coauthor of The Second Machine Age, said recently in an interview with Smart Planet. "I'm convinced that if it's not already the world's best diagnostician, it will be soon."
- Watson is already capable of storing far more medical information than doctors, and unlike humans, its decisions are all evidence-based and free of cognitive biases and overconfidence. It's also capable of understanding natural language, generating hypotheses, evaluating the strength of those hypotheses, and learning '-- not just storing data, but finding meaning in it.
- As IBM scientists continue to train Watson to apply its vast stores of knowledge to actual medical decision-making, it's likely just a matter of time before its diagnostic performance surpasses that of even the sharpest doctors.
- Back in 2011, McAfee wrote on his blog about why a diagnosis from "Dr. Watson" would be a gamechanger:
- It's based on all available medical knowledge. Human doctors can't possibly hold this much information in their heads, or keep up it as it changes over time. Dr. Watson knows it all and never overlooks or forgets anything.
- It's accurate. If Dr. Watson is as good at medical questions as the current Watson is at game show questions, it will be an excellent diagnostician indeed.
- It's consistent. Given the same inputs, Dr. Watson will always output the same diagnosis. Inconsistency is a surprisingly large and common flaw among human medical professionals, even experienced ones. And Dr. Watson is always available and never annoyed, sick, nervous, hungover, upset, in the middle of a divorce, sleep-deprived, and so on.
- It has very low marginal cost. It'll be very expensive to build and train Dr. Watson, but once it's up and running the cost of doing one more diagnosis with it is essentially zero, unless it orders tests.
- It can be offered anywhere in the world. If a person has access to a computer or mobile phone, Dr. Watson is on call for them.
- An April study estimated that as many as 1 in 20 U.S. adults are misdiagnosed by their human doctors each year, so it's an area ripe for improvement and competition.
- That's one reason IBM has been pumping Watson full of medical knowledge '-- a subject area that's actually significantly more contained than "all the world's general knowledge," which is what Watson tried to learn for Jeopardy.
- Watson has "read" dozens of textbooks, all of PubMed and Medline (two massive databases of medical journals), and thousands of patient records from Memorial Sloan Kettering. All together, "Watson has analyzed 605,000 pieces of medical evidence, 2 million pages of text, 25,000 training cases and had the assist of 14,700 clinician hours fine-tuning its decision accuracy," Forbes reported in 2013.
- And it's getting "smarter" every year. So how would Dr. Watson work in practice? Here's how IBM describes the process:
- First, the physician might describe symptoms and other related factors to the system. Watson can then identify the key pieces of information and mine the patient's data to find relevant facts about family history, current medications and other existing conditions. It combines this information with current findings from tests, and then forms and tests hypotheses by examining a variety of data sources'--treatment guidelines, electronic medical record data and doctors' and nurses' notes, as well as peer-reviewed research and clinical studies. From here, Watson can provide potential treatment options and its confidence rating for each suggestion.
- The supercomputer's potential is huge, but '-- as The Wall Street Journal reported earlier this year '-- currently "just a handful of customers are using Watson in their daily business," and it's far from performing at the level and in the range of domains that should be possible in the future.
- So far, IBM's most high-profile AI partnerships are with MD Anderson Cancer Center, where Watson helps recommend leukemia treatments, and WellPoint, where Watson helps the insurer evaluate doctors' treatment plans.
- Wellpoint, currently the exclusive reseller for Dr. Watson, has claimed that the system is already significantly better than human doctors at diagnosing lung cancer.
- Watson is not yet able to leverage all the information it has absorbed, so it still has a ways to go before it catches up with our best human diagnosticians, whose versatility and agility is difficult to match. But Watson's ability to learn, analyze, and apply knowledge suggests that it will get there '-- eventually.
- "If and when Dr. Watson gets as good at diagnosis as Watson is at Jeopardy! I want it as my primary care physician," McAfee wrote, back in 2011.
- That day may come sooner than we imagined.
-
- NA-Tech
-
- Google to Netflix Pay-for-Access Deals Said to Be Review by FCC - Businessweek
- Google to Netflix Pay-for-Access Deals Said to Be Review by FCC
- By Todd ShieldsApril 24, 2014 12:00 AM EDT
- A U.S. regulator is considering letting Internet-service providers negotiate payments from companies including Amazon.com Inc. (AMZN) and Google Inc. (GOOG) for access to subscribers, according to an official briefed on the plan.
- The proposal from Federal Communications Commission Chairman Tom Wheeler would mark a new phase in a struggle over fair Internet practices in which the agency has insisted on equal treatment of online traffic from large and small providers of video and other Web content.
- After a court defeat in January, Wheeler is proposing to judge the handling of Web media by service providers led by AT&T Inc. (T) and Verizon Communications Inc. (VZ) on a case-by-case basis, said the official, who asked for anonymity to discuss the plan, which hasn't been released. The FCC wants to know whether it should allow fee-for-access arrangements for the final connection to subscribers, the official said.
- The FCC has been seeking to replace a rule voided in January by a U.S. court that has come to be commonly known as ''net neutrality.'' The regulation required companies that provide businesses and consumers high-speed Internet service over wires, or broadband, to treat all Web traffic the same and didn't let them charge for faster or more-reliable access.
- Companies pushing for open-Internet protections have included largest search-engine provider Google, largest Internet retailer Amazon and biggest online-subscription video provider Netflix Inc. (NFLX) They are part of the Internet Association, which in an April 3 filing told the FCC the agency should adopt enforceable rules so their services won't be unfairly blocked, ''explicitly or implicitly.''
- 'Unnecessary Tolls'Wheeler will send his proposal to the five-member agency for a preliminary vote next month, he said at a news conference yesterday in Washington without providing details. In a e-mailed statement last night, he insisted that the move wasn't a ''turnaround'' in FCC policy.
- ''The same rules will apply to all Internet content,'' Wheeler said. ''As with the original open Internet rules, and consistent with the court's decision, behavior that harms consumers or competition will not be permitted.''
- Policy groups that have supported rules to prevent Internet-service providers from unfairly blocking or slowing Web traffic began voicing objections to the Wheeler's plan as elements of it became public yesterday.
- Michael Weinberg, vice president of the policy group Public Knowledge, said Wheeler's proposal ''is not net neutrality.'' The FCC is inviting service providers ''to pick winners and losers,'' Weinberg said in an e-mailed statement.
- Flexibility SoughtAT&T in a March 21 filing said the FCC should give Internet-service providers the flexibility to negotiate with companies that provide video and other content over the Web, provided the result isn't commercially unreasonable. Verizon in a filing March 21 said the agency shouldn't write prescriptive rules and should instead intervene as needed to address practices that ''demonstrably harm'' consumers and competition.
- Proponents of rules, including Web companies, have said regulations are needed to keep Internet-service providers from interfering with rival video and other services.
- Niki Christoff, a Google spokeswoman, declined to comment and Mary Osako, a spokeswoman for Amazon, didn't immediately provide a comment.
- Netflix on March 20 used its blog to call for ''strong net neutrality'' to prevent service providers from charging a toll to reach offerings such as its movie catalog, Google's YouTube, or Microsoft Corp.'s Skype calling and video-chat service.
- White House''Pay-for-priority schemes will be a disaster for startups, non-profits and everyday Internet users who cannot afford these unnecessary tolls,'' Craig Aaron, president of the group Free Press, said in an e-mailed statement. He called the proposal ''a convoluted path that won't protect Internet users.''
- President Barack Obama's administration in February backed an online petition asking the FCC to regulate service providers to promote open Internet provisions.
- ''Absent net neutrality, the Internet could turn into a high-priced private toll road that would be inaccessible to the next generation of visionaries,'' Gene Sperling, then-director of the National Economic Council, and Todd Park, U.S. chief technology officer, said in a Feb. 18 blog post.
- Bulk or wholesale connection agreements like one Netflix struck with leading cable provider Comcast Corp. (CMCSA) in February aren't considered to be among issues to be addressed by open-Internet rules, Wheeler said at a March 31 news conference. Netflix agreed to pay Comcast millions of dollars annually to ensure improved speed and reliability for its video service.
- As it acquired NBCUniversal in 2011, Comcast agreed to abide by the FCC's net-neutrality rules until 2018. The agreement remains in force, and Comcast has said it will be extended to subscribers brought to it as part of its proposed purchase of second-largest U.S. cable provider Time Warner Cable Inc. (TWC) The combined company will have about 30 million subscribers, according to Comcast.
- To contact the reporter on this story: Todd Shields in Washington at tshields3@bloomberg.net
- To contact the editors responsible for this story: Bernard Kohn at bkohn2@bloomberg.net Michael Shepard, Elizabeth Wasserman
-
- Proposes Creation of New Citizens Broadband Radio Service in 3.5 GHz | FCC.gov
- Federal Communications Commission
- Federal Communications Commission
- In the Matter of))Amendment of the Commission's Rules with)GN Docket No. 12-354Regard to Commercial Operations in the 3550-)3650 MHz Band)FURTHER NOTICE OF PROPOSED RULEMAKING
- Comment Date: 40 days after publication in the Federal RegisterReply Comment Date: 60 days after publication in the Federal RegisterBy the Commission: Chairman Wheeler and Commissioners Clyburn, Rosenworcel and O'Rielly issuingseparate statements; Commissioner Pai concurring and issuing a statement.TABLE OF CONTENTS
- HeadingParagraph #I. INTRODUCTION.................................................................................................................................. 1II. BACKGROUND.................................................................................................................................... 9III. DISCUSSION ...................................................................................................................................... 17A. Proposed Regulatory Framework .................................................................................................. 181. Proposed Part 96 Rule Part...................................................................................................... 19a. Subpart A '' GENERAL RULES...................................................................................... 19(i) Scope (§ 96.1) ............................................................................................................ 19(ii) Definitions (§ 96.3) .................................................................................................... 23(iii) Eligibility (§ 96.5) ...................................................................................................... 24(iv) Authorization Required (§ 96.7) ................................................................................ 25(v) Regulatory Status (§ 96.9).......................................................................................... 26(vi) Frequencies (§ 96.11)................................................................................................. 27(vii) Frequency Assignments (§ 96.13)............................................................................. 28b. Subpart B '' INCUMBENT PROTECTIONS................................................................... 38(i) Protection of Federal Incumbents (§ 96.15)............................................................... 38(ii) Protection of Existing Fixed Satellite Service Earth Stations in the 3550-3650MHz Band (§ 96.17)................................................................................................... 39(iii) Operation near Canadian and Mexican Borders (§ 96.19) ......................................... 40c. Subpart C '' PRIORITY ACCESS.................................................................................... 41(i) Authorization (§ 96.21) .............................................................................................. 42(ii) Priority Access Licenses (§ 96.23)............................................................................. 43(iii) Application Window (§ 96.25)................................................................................... 53(iv) Assignment of Licenses (§ 96.27).............................................................................. 54(v) Aggregation of Priority Access Licenses (§ 96.29).................................................... 55d. Subpart D '' GENERAL AUTHORIZED ACCESS......................................................... 56Federal Communications Commission
- (i) Authorization and General Authorized Access Use (§ 96.31 and § 96.33)................ 56(ii) Contained Access Facilities (§ 96.35)........................................................................ 58e. Subpart E '' TECHNICAL RULES .................................................................................. 62(i) Citizens Broadband Radio Service Devices General Requirements (§ 96.36)........... 62(ii) End User Devices General Requirements (§ 96.37)................................................... 68(iii) General Radio Requirements (§ 96.38)...................................................................... 69f. Subpart F '' SPECTRUM ACCESS SYSTEM................................................................. 90(i) Spectrum Access System Purposes and Functionality (§ 96.43) ............................... 93(ii) Information Gathering and Retention (§ 96.44) ......................................................... 99(iii) Registration and Authorization of Citizens Broadband Radio Service Devices(§ 96.45) ................................................................................................................... 102(iv) Frequency Assignment (§ 96.46) ............................................................................. 103(v) Security (§ 96.47)..................................................................................................... 104(vi) Spectrum Access System Administrators (§ 96.48)................................................. 105(vii) Spectrum Access System Administrator Fees (§ 96.47) ......................................... 1092. Modifications to Existing Rule Parts..................................................................................... 110a. Table of Frequency Allocations (§ 2.106) ...................................................................... 111b. Procedures for Priority Access Licenses Subject to Assignment by CompetitiveBidding (§ 1.2101 et seq.)............................................................................................... 118(i) Application of Part 1 Competitive Bidding Rules (§ 1.2101 et seq.)....................... 119(ii) Applications Subject to Competitive Bidding.......................................................... 120(iii) Bidding Process Options .......................................................................................... 122c. Secondary Markets ......................................................................................................... 135B. Other Issues.................................................................................................................................. 1361. Protections for Federal Incumbent Access Tier Users .......................................................... 1372. Protections for Citizens Broadband Radio Service Devices from Federal RadarSystems.................................................................................................................................. 1433. Protections for Fixed Satellite Service Earth stations ........................................................... 145a. Earth Stations in the 3.5 GHz Band ................................................................................ 145b. Earth Stations in the C-Band........................................................................................... 1524. Enforcement Issues................................................................................................................ 1625. Extension of Part 96 Rules to 3650-3700 MHz Band ........................................................... 163IV. PROCEDURAL MATTERS.............................................................................................................. 170A. Ex Parte Rules ............................................................................................................................. 170B. Filing Requirements..................................................................................................................... 172C. Initial Regulatory Flexibility Analysis......................................................................................... 176D. Initial Paperwork Reduction Act Analysis................................................................................... 179V. ORDERING CLAUSES..................................................................................................................... 180APPENDIX A '' Proposed RulesAPPENDIX B '' Supplemental Proposed Rules for the 3650-3700 MHz bandI.
- 1.We are in the midst of a communications revolution that has connected us to each other asnever before through an ever increasing number of wireless devices. As a result of the continuingproliferation of connected devices, demand for wireless broadband capacity is growing rapidly. New,more efficient wireless network architectures and innovative approaches to spectrum management aretools that can help maximize the utility of existing spectrum resources and make new spectrum bandsavailable for broadband access. As we previously discussed,1 our proposals for the 3550-3650 MHz band1 See Amendment of the Commission's Rules with Regard to Commercial Operations in the 3550-3650 MHz Band,GN Docket No. 12-354, Notice of Proposed Rulemaking, 27 FCC Rcd 15594, 15595, ¶ 1 (2012) (3.5 GHz NPRM).2
- Federal Communications Commission
- (3.5 GHz Band) focus on two components of the Commission's ongoing efforts to address wirelesscoverage and capacity issues: small cells and spectrum sharing'--both of which were addressed in areport issued by the President's Council of Advisors on Science and Technology (PCAST).22.With this Further Notice of Proposed Rulemaking (FNPRM or Further Notice), wepropose specific rules for a new Citizens Broadband Radio Service in the 3.5 GHz Band that would makethe 3.5 GHz sharing regime originally described by PCAST a reality. The 3.5 GHz Band could be an''innovation band,'' where we can explore new methods of spectrum sharing and promote a diverse arrayof network technologies, with a focus on relatively low-powered applications. If successful, the spectrumsharing model proposed for this band could ultimately be expanded to other spectrum bands and''transform the availability of a precious national resource '--spectrum'--from scarcity to abundance.''33.The proposed rules set forth herein build upon the record developed in response to aseries of prior proposals and workshops over the past sixteen months. These detailed proposals will allowfor more focused comment prior to establishing rules governing the proposed Citizens Broadband RadioService in a new Part 96 of the Commission's rules.4 Specifically, the proposed rules would implementan innovative and comprehensive framework to authorize a variety of small cell and other broadband usesof the 3.5 GHz Band on a shared basis with incumbent federal and non-federal users of the band, withoversight and enforcement through a Spectrum Access System (SAS). The proposed rules reflect ourbelief that the 3.5 GHz Band could be an ideal ''innovation band,'' well suited to exploring the nextgeneration of shared spectrum technologies, to drive greater productivity and efficiency in spectrum use.4.The creation of the Citizens Broadband Radio Service was originally proposed in aNotice of Proposed Rulemaking (3.5 GHz NPRM or NPRM) released in December 2012.5 Afterreviewing the record generated by the 3.5 GHz NPRM, we released a Public Notice to supplement therecord with focused comment on specific concepts for the 3.5 GHz Band (Licensing PN).6 The LicensingPN described a ''Revised Framework'' that elaborated on some of the alternative licensing andauthorization concepts set forth in the NPRM. 7 With this FNPRM we fulfill a commitment made inissuing the Licensing PN that we would seek comment on specific detailed rules before publishing a FirstReport and Order in this proceeding.85.As set forth in more detail below, we propose to establish a three-tiered authorizationframework '' Incumbent Access, Priority Access, and General Authorized Access (GAA) tiers - based onthe recommendations of PCAST and originally proposed in the NPRM. 9 Under this framework, existingprimary operations '' including authorized federal users and grandfathered Fixed Satellite Service (FSS)earth stations - would compose the Incumbent Access tier and would receive protection from harmfulinterference from Citizens Broadband Radio Service users. At this time, we propose to establish2 See PCAST, Report to the President: Realizing the Full Potential of Government-Held Spectrum to Spur EconomicGrowth (rel. July 20, 2012) (PCAST Report), available athttp://www.whitehouse.gov/sites/default/files/microsites/ostp/pcast_spectrum_report_final_july_20_2012.pdf(PCAST Report) at vi and 17-20.3 See PCAST Report at vi.4 See Appendix A.5 See 3.5 GHz NPRM.6 Commission Seeks Comment on Licensing Models and Technical Requirements in the 3550-3650 MHz Band, GNDocket No. 12-354, Public Notice, 28 FCC Rcd 15300 (2013) (Licensing PN).7 See Licensing PN, 28 FCC Rcd at 15301, ¶ 2.8 See id. at 15301, ¶ 3.9 See PCAST Report at 16-21, 82-84; 3.5 GHz NPRM, 27 FCC Rcd at 15612-22, ¶¶ 53-82.3
- Federal Communications Commission
- geographic Exclusion Zones10 based on the models suggested in the National Telecommunications andInformation Administration's (NTIA) Fast Track Report to protect federal Incumbent Access tieroperations.11 We plan to work with NTIA in coming months to reassess these Exclusion Zones in light ofnew technologies envisioned in this FNPRM and new data from technical studies evaluating thecoexistence of radars and wireless broadband services. If there are further developments that wouldenable a reduction in the size of the Exclusion Zones, we encourage participants to file in the record toensure that there is sufficient opportunity for public comment prior to issuance of a Report and Order inthis proceeding.6.Interference management with respect to the three tiers of service, including adherence todesignated Exclusion Zones, would be managed by a dynamic SAS, conceptually similar to, but moreadvanced than the databases used to manage Television White Spaces (TVWS) devices. Consistent withthe Revised Framework, we propose to define each Priority Access License (PAL) as an authorization touse for one-year a 10 megahertz channel in a single census tract. PALs would be open to any prospectivelicensee that meets basic FCC qualifications and mutually exclusive applications for PALs would besubject to competitive bidding. PAL channels would be dynamically coordinated by the SAS and theexact spectral location of a given PAL authorization could shift from time to time as directed by the SASduring its license term.12 The GAA tier would be licensed-by-rule to permit open, flexible access to theband to the widest possible group of potential users. We propose to reserve at all times for GAA use, aminimum of 50 percent of the band that is not encumbered by Incumbent Access tier users in any givenlocation.7.We propose baseline technical standards for the operation of Citizens Broadband RadioService Devices (CBSDs) and End User Devices in the 3.5 GHz Band as well as general rules for theoperation of the SAS and approval of SAS Administrators. Many of these concepts were originally raisedin the NPRM and Licensing PN. We also seek further comment on other important issues raised in thisproceeding, including: (1) protection criteria for Incumbent Users; (2) potential protection of FSS earthstations in the 3700-4200 MHz band (C-Band); (3) competitive bidding procedures for resolving mutuallyexclusive applications for PALs; and (4) the possible extension of the proposed rules to include the 3650-3700 MHz band. Some of these issues, particularly those dealing with protection criteria for IncumbentAccess tier users, may require additional focused input from government and private industrystakeholders.8.Our goal in this FNPRM is to generate focused comment on specific proposed rule text asa penultimate step before the establishment of a new rule part '' Part 96 '' authorizing fixed and mobilewireless use of the 3.5 GHz Band.13 Our goal is to adopt rules that promote efficient and widespread useof the 3.5 GHz Band for a variety of potential users. We emphasize that this is an iterative process andthat, while some issues remain open, the proposed rules set forth herein provide a clear framework thatwould allow users to begin operations in the Citizens Broadband Radio Service in designated geographicareas.10 Unless otherwise noted, capitalized terms in this FNPRM are defined as set forth in section 96.3 of the ProposedRules. See Appendix A, § 96.3.11 See NTIA, An Assessment of the Near-Term Viability of Accommodating Wireless Broadband Systems in the1675-1710 MHz, 1755-1780 MHz, 3500-3650 MHz, 4200-4220 MHz, and 4380-4400 MHz Bands (rel. October2010) (Fast Track Report), available athttp://www.ntia.doc.gov/files/ntia/publications/fasttrackevaluation_11152010.pdf.12 We do not propose to create a fixed bandplan (i.e., 10x10 megahertz channels). See infra section III (A)(1)(a)(vii).13 See Licensing PN, 28 FCC Rcd at 15301, ¶ 3.4
- Federal Communications Commission
- 9.The Fast Track Report first identified the 3.5 GHz Band as potentially suitable forcommercial broadband use.14 NTIA recommended that this band could be made available for commercialwireless broadband by 2015 based on the conditions outlined in the Fast Track Report.15 NTIA'srecommendation included significant geographic restrictions to protect existing Department of Defense(DoD) radar and FSS operations and to protect new commercial systems from co-channel interferencefrom high-powered military in-band shipborne and adjacent band DoD ground-based radar systems.16The radar systems that operate in the 3.5 GHz Band overcome the inherent propagation limitations of thisfrequency range by employing high transmitter power levels and high-gain antennas.17 Thesecharacteristics of the radar systems were a contributing factor to the size of the exclusion zones in the FastTrack evaluation.10.In July 2012, PCAST recommended that the Federal Government identify 1,000megahertz of federal spectrum for shared use to create ''the first shared use spectrum superhighways.''18PCAST recommends that shared spectrum be organized into three tiers. To ensure interferenceprotection, all users would be required to register in a database modeled on the TVWS database.19 Thefirst tier would consist of incumbent federal users.20 These users would be entitled to full protection fortheir operations within their deployed areas, consistent with the terms of their assignments.21 The secondtier would consist of users that would receive short-term priority authorizations to operate withindesignated geographic areas.22 Secondary users would receive protection from interference from third tierusers but would be required to avoid interference with and accept interference from Federal Primaryusers.23 Third tier users (GAA) would be entitled to use the spectrum on an opportunistic basis and wouldnot be entitled to interference protection. PCAST recommends that the Commission, in conjunction withNTIA, work expeditiously to implement its recommendations in the 3.5 GHz Band.2411.The Commission's December 2012 NPRM proposed a three-tier, license-by-ruleauthorization framework, based on concepts described in the PCAST Report that are intended to facilitaterapid broadband deployment while protecting existing incumbent users of the 3.5 GHz Band.25 TheNPRM solicited comment on all aspects of this proposal, including the appropriate licensing frameworkand the potential uses of each service tier. The Commission received extensive comment from a widerange of stakeholders in response.26 The NPRM also included a supplemental proposal to expand the14 See Fast Track Report, at 1-6 '' 1-7 and Appendix D.15 Id. at 1-8.16 Id. at 1-6 to 1-7, figures D-45 to D-55, and Appendix B.17 Id. at 3-30 to 3-33.18 PCAST Report at 50-52.19 See 47 C.F.R. §§ 15.713-15.20 See PCAST Report at 23-24.21 Id.22 Id. PCAST refers to the second tier as ''Secondary Access."23 Id.24 Id. at 82-83.25 See 3.5 GHz NPRM, 27 FCC Rcd at 15612-21, ¶¶ 53-77, PCAST Report at 16-21, 82-84.26 See generally comments filed in Docket No. 12-354.5
- Federal Communications Commission
- proposed licensing and authorization model to an additional adjacent 50 megahertz of spectrum in the3650-3700 MHz band, making up to 150 megahertz available for shared wireless broadband access.2712.As we noted in the NPRM, the technical characteristics of the 3.5 GHz Band and theexistence of important incumbent operations in the band in many areas of the country contribute to makethe band an ideal platform to explore innovative approaches to shared spectrum use and small celltechnology.28 NTIA's Fast Track Report recommended, based on technical assumptions typical oftraditional macrocell deployments of commercial wireless broadband technology, that new commercialuses of the band occur outside of large ''exclusion zones'' to protect Federal government operations.29Given that the exclusion zones would cover approximately 60 percent of the U.S. population30 andbecause of limited signal propagation in the band, the band did not appear to be well-suited for macrocelldeployment. However, as noted in the NPRM, these very disadvantages could be turned into advantagesif the band were used to explore spectrum sharing and small cell innovation.31 This proposal was basedon recommendations put forth by the FCC's Technology Advisory Council (TAC), which has advocatedfor the increased use of small cell devices in spectrum constrained areas and supported dedicating aspectrum band to small cell uses.32 The combination of small cells and spectrum sharing technologiescould vastly increase the usability of the 3.5 GHz Band for wireless broadband and serve as a model forfuture coexistence among services in other spectrum bands.13.In November 2013, in response to record comments received up to that point, we releasedthe Licensing PN, which described a Revised Framework that elaborated upon some of the licensingconcepts and alternatives set forth in the NPRM.33 The Revised Framework retains the three-tier modelproposed in the NPRM but expands eligibility to apply for PALs, and explores innovative means ofassigning authorizations within that tier.34 Like the NPRM's main proposal, the Revised Frameworkwould leverage the unique capabilities of small cell and SAS technologies to enable sharing among usersin the Priority Access and GAA tiers. Specifically, the Revised Framework contains the following coreconcepts:· An SAS to dynamically manage frequency assignments and automatically enforce accessto the Priority Access and GAA tiers;· Expansive eligibility for Priority Access tier use;· Granular, but administratively-streamlined licensing of the Priority Access tier;· Exclusive spectrum rights for Priority Access subject to licensing by auction in the eventof mutually exclusive applications;· A defined ''floor'' of GAA spectrum availability, to ensure that GAA access is availablenationwide (subject to Incumbent Access tier use);27 See 3.5 GHz NPRM, 27 FCC Rcd at 15620-23, ¶¶ 77-86.28 Id. 27 FCC Rcd at 15601-03, ¶¶ 17-25.29 See Fast Track Report at 1-6 '' 1-7 and Appendix D.30 See Fast Track Report at 1-6 '' 1-7 and Appendix D and 3.5 GHz NPRM, 27 FCC Rcd at 15597 and 15601, ¶¶ 6and 17-18.31 See 3.5 GHz NPRM at 15630-35, ¶¶ 113-2332 See Technical Advisory Council, Chairman's Report, (rel. April 22, 2011) at 3, available athttp://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-306065A1.pdf.33 See Licensing PN, 28 FCC Rcd at 15301, ¶ 2.34 Id. at 15305-10, ¶¶ 10-27.6
- Federal Communications Commission
- · Additional GAA access to unused Priority Access bandwidth, as identified and managedby the SAS, to maximize dynamic use of the unutilized portion of the band and ensureproductive use of the spectrum;· Opportunities for Contained Access Users to obtain targeted priority spectrum use withinspecific facilities (such as buildings) that meet certain requirements to mitigate thepotential for interference to and from Incumbent Users and other Citizens BroadbandRadio Service users; and· A set of baseline technical standards to prevent harmful interference and ensure productiveuse of the spectrum.3514.The Licensing PN generated a robust supplementary record, eliciting comments from awide range of stakeholders. While most commenters support expanding Priority Access tier eligibilityfrom ''critical access'' users to all qualified applicants,36 opinions were split on other specific aspects ofthe Revised Framework. Notably, commenters diverged greatly on the band plan, PAL specifications,authorization methodology, and technical specifications of CBSDs. These submissions are addressed ingreater detail on an issue-by-issue basis in Section III.15.In addition, we have convened two workshops to discuss technical issues related to thisproceeding.37 The first workshop explored broad issues that emanated from the original NPRM.38 Morerecently, on January 14, 2014, the Bureau and OET hosted a workshop to further explore the technicalrequirements, operational parameters, and architecture of the proposed SAS (SAS Workshop).39 Adiverse group of engineers representing industry stakeholders, trade associations, and academia submitted35 See Licensing PN.36 See e.g., Reply Comments of CTIA in Response to Licensing PN in GN Docket No. 12-354 (filed December 20,2013) (CTIA Licensing PN Reply Comments) at 3; Comments of Alcatel-Lucent in Response to Licensing PN inGN Docket No. 12-354 (filed December 5, 2013) (Alcatel-Lucent Licensing PN Comments) at 1-2; Comments ofNokia Solutions and Networks US LLC in Response to Licensing PN in GN Docket No. 12-354 (filed December 5,2013) (NSN Licensing PN Comments) at 4-8; Comments of Google, Inc. in Response to Licensing PN in GNDocket No. 12-354 (filed December 5, 2013) (Google Licensing PN Comments) at 5; and Comments of theConsumer Electronics Association in Response to Licensing PN in GN Docket No. 12-354 (filed December 5, 2013)(CEA Licensing PN Comments) at 2-3; but see Comments of Utilities Telecom Council in Response to LicensingPN in GN Docket No. 12-354 (filed December 5, 2013) (UTC Licensing PN Comments) at 3-4; Reply Comments ofthe American Petroleum Institute in Response to Licensing PN in GN Docket No. 12-354 (filed December 5, 2013)(API Licensing PN Reply Comments) at 2-4.37 FCC Wireless Telecommunications Bureau and Office of Engineering and Technology Announce Agenda forWorkshop on the 3.5 GHz Notice of Proposed Rulemaking, GN Docket No. 12-354, Public Notice, DA 13-367(2013) (First 3.5 GHz Workshop PN); FCC Wireless Telecommunications Bureau and Office of Engineering andTechnology Announce Agenda for Workshop to Discuss the Creation of a Spectrum Access System in the 3.5 GHzBand, GN Docket No. 12-354, Public Notice, 29 FCC Rcd 174 (rel. January 9, 2014) (SAS Workshop Agenda PN);Workshop video and presentation materials available at: http://www.fcc.gov/events/35-ghz-spectrum-access-system-workshop and http://www.fcc.gov/events/35-ghz-workshop.38 See First 3.5 GHz Workshop PN; Video and presentation materials available at: http://www.fcc.gov/events/35-ghz-workshop.39 See Wireless Telecommunications Bureau and Office of Engineering and Technology Call for Papers on theProposed Spectrum Access System for the 3.5 GHz Band, GN Docket No. 12-354, Public Notice, 28 FCC Rcd15843 (rel. November 18, 2013) (SAS Papers PN); SAS Workshop Agenda PN; Workshop video and presentationmaterials available at: http://www.fcc.gov/events/35-ghz-spectrum-access-system-workshop. The Commission alsoannounced a two week online discussion to further explore topics addressed in the workshop. The results of thatdiscussion were added to the record. See Wireless Telecommunications Bureau and Office of Engineering andTechnology Submission for the Record in GN Docket No. 12-354 (filed March 31, 2014).7
- Federal Communications Commission
- technical papers in advance of the workshop and participated in panels throughout the day.40 We addressmany of these submissions in greater detail below.4116.The purpose of this FNPRM is to solicit focused comment on specific proposed rules andother specifically identified open issues. To the extent that parties require additional background on anyof the proposals we describe in this FNPRM, we encourage them to review prior releases in this docket,including the NPRM, the Licensing PN, and the recorded footage of the two workshops.III.
- 17.With this FNPRM, we seek comment on proposed rules for the Citizens Broadband RadioService.42 These proposed rules build upon the concepts and proposals set forth in the NPRM and theLicensing PN, in light of the record created in this proceeding. Notably, the proposed rules would:· Implement the three-tier model proposed in the NPRM;· Establish Exclusion Zones to ensure compatibility between incumbent federal operationsand Citizens Broadband Radio Service users;· Create an open eligibility authorization system for Priority Access and GAA operations;· Establish granular, exclusive spectrum rights for the Priority Access tier, consistent withparameters discussed in the Licensing PN;· Set a defined ''floor'' for GAA spectrum availability, to ensure that GAA access isavailable nationwide (subject to Incumbent Access tier use);· Set guidelines to allow Contained Access Users to request up to 20 megahertz of reservedfrequencies from the GAA pool for use within their facilities;· Establish baseline technical rules for fixed or nomadic base stations operating in the 3.5GHz Band;· Set guidelines for the operation and certification of SASs in the band.We seek detailed comment on these proposals, as well as viable alternative or supplemental ruleprovisions that could help to achieve our stated objectives. We encourage commenters to focus theirsubmissions on the specific proposed rule text and structure. We further encourage commenters toidentify the specific costs and benefits associated with any proposal. To the extent possible, commentersshould provide specific data and information, such as actual or estimated dollar figures for each specificcost or benefit addressed, including a description of how the data or information was calculated orobtained, and any supporting documentation or other evidentiary support.A.
- Proposed Regulatory Framework
- 18.Below we discuss the proposed Part 96 and its component subsections, as well asproposed modifications to our existing rules designed to accommodate the new proposed CitizensBroadband Radio Service. The discussion parallels the proposed structure of Part 96, as detailed inAppendix A.4340 See SAS Workshop Agenda PN; See generally, SAS workshop submissions in GN Docket No. 12-354.41 See infra section III (A)(1)(e)-(f).42 See Appendix A.43 Where rule sections are mentioned in this FNPRM (e.g., § 96.1), these refer to sections of the proposed rules setforth in Appendix A, unless otherwise noted.8
- Federal Communications Commission
- 1.Proposed Part 96 Rule Part
- a.Subpart A '' GENERAL RULES
- 19.We propose to implement the three-tier authorization framework originally described inthe NPRM and further discussed in the Licensing PN.44 This proposal is consistent with the frameworkfor the 3.5 GHz Band originally described in the PCAST Report.45 Under this framework, existingprimary operations '' including authorized federal users and grandfathered FSS earth stations - wouldmake up the Incumbent Access tier and would receive protection from harmful interference consistentwith the proposed rules.46 The Citizens Broadband Radio Service would be divided into Priority Accessand GAA tiers of service, each of which would be required to operate on a non-interference basis with theIncumbent Access tier.47 We also propose that any party that meets basic eligibility requirements underthe Communications Act be eligible to hold a PAL or, when authorized, operate a CBSD on a GAA basisin the Citizens Broadband Radio Service.20.The proposed three-tier framework enjoys significant support from a diverse group ofcommenters, including AT&T, Google, Public Knowledge, and the Open Technology Institute at the NewAmerica Foundation.48 Others, including CTIA '' The Wireless Association (CTIA), NSN, andQualcomm have argued that a two-tier framework that would prohibit or segregate GAA users would be amore efficient way to manage the 3.5 GHz Band.4921.Some commenters, including some who have also expressed support for the three-tieredmodel, argue that the 3.5 GHz Band should be divided between two and three-tiered authorizationschemes, at least on a transitional basis.50 Under this concept, as originally described by VerizonCommunications Inc. and Verizon Wireless Inc. (Verizon), a portion of the band would be set aside for a''transitional framework'' sub-band which would be licensed on a more traditional, exclusive-use basisand would not include GAA users.51 The remainder of the band could be split between GAA-only use44 See 3.5 GHz NPRM, 27 FCC Rcd at 15612-14, ¶¶ 53-60; Licensing PN, 28 FCC Rcd at 15304-13, ¶¶ 10-40.45 See PCAST Report at 23-24.46 See infra sections III(A)(1)(b) and (B)(1); Appendix A, § 96.15.47 GAA users must also operate on a non-interference basis with respect to Priority Access Licensees. See AppendixA, § 96.33.48 See Google Licensing PN Comments at 1-2; Comments of AT&T Services Inc. in Response to Licensing PN inGN Docket No. 12-354 (filed December 5, 2013) (AT&T Licensing PN Comments) at 3-6; Comments of the OpenTechnology Institute at the New America Foundation and Public Knowledge in Response to Licensing PN in GNDocket No. 12-354 (filed December 5, 2013) (OTI/PK Licensing PN Comments) at 3-4; See also Letter fromAmplex Electric, Inc. Aristotle Inc., Cambium Networks Ltd., CompTIA , Consumer Federation of America, FreePress, Google, Highspeedlink, JAB Wireless, Inc. , Microsoft, New America Foundation , Public Knowledge,Shelby Broadband, Texas Instruments, Ubiquiti Networks, Inc., and Wireless Internet Service Providers Associationto Marlene H. Dortch in GN Docket No. 12-354 (filed March 24, 2014) (Coalition Letter).49 See Comments of Qualcomm Incorporated in Response to Licensing PN in GN Docket No. 12-354 (filedDecember 5, 2013) (Qualcomm Licensing PN Comments) at 4-5; CTIA Licensing PN Reply Comments at 3; NSNLicensing PN Comments at 8-15 (Proposing that the Commission assign the 3.5 GHz Band exclusively for PriorityAccess and the 3650-3700 MHz band for GAA use).50 See Comments of Verizon and Verizon Wireless in response to Licensing PN in GN Docket No. 12-354 (filedDecember 5, 2013) (Verizon Licensing PN Comments); Reply Comments of AT&T Services Inc., in Response toLicensing PN in GN Docket No. 12-354 (filed December 20, 2013) (AT&T Licensing PN Reply Comments) at 3.51 See Verizon Licensing PN Comments at 10-11 (arguing that the geographic area, terms, and administration oflicenses in the ''transitional framework'' sub-band should approximate existing exclusive-use licensing models).9
- Federal Communications Commission
- and the proposed three-tiered sharing framework. The ''transitional framework'' sub-band could then bephased out after the three-tier framework is proven to be workable in practice.5222.The specific Part 96 rules we propose today would apply the three-tier authorizationmodel across the entire 3.5 GHz Band, based, at least in part, on concerns about the impact thatBalkanization of this spectrum may have in terms of limiting the development of a robust and variedshared spectrum ecosystem in the band. We seek comment on the proposed section 96.1 and encouragecommenters to consider the costs and benefits of any alternate proposals that they may put forward inlight of the recommendations of PCAST and the Commission's goals for this band.(ii)Definitions (§ 96.3)
- 23.Section 96.3 of the proposed rules sets forth definitions for various terms included in theproposed Part 96. We seek comment on these definitions and any additional terms that may need to bedefined.(iii)Eligibility (§ 96.5)
- 24.We propose that any entity, other than those precluded by section 310 of theCommunications Act be eligible to operate a CBSD on a Priority Access or GAA basis.53 Issues relatedto qualifications for Priority Access, GAA, and Contained Access Users are explored in greater detailbelow.54(iv)Authorization Required (§ 96.7)
- 25.We propose that operators be authorized consistent with this part prior to operatingCBSDs in the Citizens Broadband Radio Service. The proposed rules governing authorizations forPriority Access, GAA, and Contained Access Users are discussed in greater detail below.55 We seekcomment on this proposed rule and on the proposed changes to Part 1 of the Commission's rules. Wealso seek comment on whether the licensing and authorization methods described herein would requirethe Commission to alter its existing rules governing filing, retention, and public access for licenses andapplications in the Wireless Radio Services.56(v)Regulatory Status (§ 96.9)
- 26.We propose to allow Citizens Broadband Radio Service users to select whether toprovide service on a common carrier or non-common carrier basis, regardless of whether they operate inthe Priority Access tier, GAA tier, or both. Users that choose to offer services on a common carrier basiswould be required to comply with all of the Commission's rules applicable to common carriers. This isconsistent with our approach in other licensed services.57 We seek comment on this proposal.Specifically, should GAA users be permitted to provide common carrier services? Could the SASeffectively coordinate and enforce these individual service selections, subject to appropriate Commissionoversight?52 Verizon Licensing PN Comments at 3.53 See 47 U.S.C. § 310; We note, however, that only qualified Contained Access Users operating in ContainedAccess Facilities (CAFs) will be able to take advantage of the provisions of the proposed Section 96.35. See Appendix A, § 96.35.54 See infra section III(A)(1)(c)-(d).55 See id.56 See 47 C.F.R. §§ 1.901, et seq.57 See e.g. 47 C.F.R. § 90.1309 (3650-3700 MHz Service) and 47 C.F.R. § 27.10 (Miscellaneous WirelessCommunications Services).10
- Federal Communications Commission
- (vi)Frequencies (§ 96.11)
- 27.We propose to include the 3550-3650 MHz band in Part 96. These proposed rules couldbe expanded to include the 3650-3700 MHz band or other encumbered spectrum bands in the future. Wediscuss our supplementary proposal to include the 3650-3700 MHz band in greater detail below.58 Weseek comment on the proposed section 96.11.(vii)Frequency Assignments (§ 96.13)
- 28.Consistent with the concepts set forth in the Licensing PN, we propose to adopt rulesgoverning frequency assignments that would balance the needs of Priority Access Licensees and GAAusers. To foster a robust GAA ecosystem, a meaningful amount of the 3.5 GHz Band must be reservedfor GAA use in any given geographic area. To that end, we propose to reserve for GAA use a minimumof 50 percent of the 3.5 GHz Band in any given census tract '' after accounting for any frequenciesreserved for Incumbent Access tier use in the area - with the remainder to be assigned as PALs. We donot propose to assign GAA users and Priority Access Licensees to fixed spectral locations (e.g., GAAfrom 3550-3600 MHz and Priority Access from 3600-3650 MHz). Rather, under our proposal, the SASwould dynamically assign PAL channels and GAA bandwidth in real time to promote efficient spectrumuse.29.Under this proposal, PALs would be assigned in 10 megahertz channels, consistent withthe processes described in section III(A)(1)(c) below, but we do not propose to establish a fixed channelsize for GAA users. Rather, GAA users would be permitted to operate on a range of frequencies withinthe GAA pool, as determined by the SAS. In addition, in areas in which bandwidth has not yet beenassigned to PALs or where assigned bandwidth is not in actual use by Priority Access Licensees, suchbandwidth would be made available for additional GAA operations on an opportunistic basis. The SASwould coordinate Priority Access and GAA operations consistent with its responsibilities under theproposed rules.5930.Proportional Assignment of GAA and Priority Access Frequencies. In response to theLicensing PN, commenters supported a wide range of potential frequency assignment models for the 3.5GHz Band, ranging from rejection of a GAA Tier60 to fully dynamic assignment of GAA and PriorityAccess rights based on demand and network needs.61 Of those commenters that supported the proposedthree-tier model, AT&T, T-Mobile, and Google argued that a higher, fixed quantity of spectrum should beassigned for Priority Access use.62 Microsoft argued that a minimum of 50 megahertz of spectrum shouldbe retained for GAA use while Public Knowledge argued that no less than 50 percent of available58 See infra section III(B)(4).59 See Appendix A, §§ 96.43-48.60 See e.g., Qualcomm Licensing PN Comments at 4-5; CTIA Licensing PN Reply Comments at 3.61 See Comments of Federated Wireless LLC in Response to Licensing PN in GN Docket No. 12-354 (filedDecember 5, 2013) (Federated Licensing PN Comments) at 32-33.62 See AT&T Licensing PN Comments at 6 (Arguing that 70 megahertz of the band should be reserved for PriorityAccess or 100 megahertz if the 3650-3700 MHz band is included); Comments of T-Mobile USA, Inc. in Responseto Licensing PN in GN Docket No. 12-354 (filed December 5, 2013) (T-Mobile Licensing PN Comments) at 3 (60megahertz of the band should be reserved for Priority Access use if the Commission adopts a three-tier licensingmodel); Google Licensing PN Comments at 15 (Commission should reserve 100 megahertz of spectrum for PriorityAccess and 50 megahertz for GAA).11
- Federal Communications Commission
- spectrum should be reserved for GAA.63 WISPA argued that, in rural areas, 70 megahertz of the bandshould be available for GAA use while in non-rural areas only 50 megahertz should be reserved.6431.We seek comment on whether the proposed rule appropriately balances public interestconsiderations raised by commenters on this matter. Does the proposed 50 percent floor for GAAbandwidth provide sufficient spectrum to foster a robust user ecosystem while ensuring that enoughspectrum is made available for multiple Priority Access Licensees? We seek comment on the proposedrule, including any costs and benefits of the proposed approach. We also seek comment on alternativeapproaches to the apportioning of available spectrum between the PAL and GAA tiers.32.Dynamic Frequency Assignment. Commenters differed as to whether frequencyassignments should be fixed or dynamically assigned by the SAS. Notably, Google and WISPAsupported dynamic assignment of Priority Access and GAA frequencies and argued that the SAS wouldbe able to efficiently and dynamically assign frequencies to appropriate parties.65 Commenters includingAT&T, T-Mobile, CTIA, and Ericsson argued for designated, fixed channel assignments, claiming thatdynamic frequency assignments would interfere with network planning and channel aggregation.6633.Under our proposal, in place of fixed channel assignments, the SAS would dynamicallyassign bandwidth within given geographic areas to Priority Access Licensees and GAA users inaccordance with the procedures set forth in the proposed rules.67 The SAS would ensure that PriorityAccess Licensees have access to allotted 10 megahertz channels and that GAA users are provided accessto at least 50 percent of the band. However, the exact spectral location of any given authorization,whether Priority Access or GAA, would not be fixed. For example, a licensee might have Priority Accessrights for a single PAL, but the specific channel location assigned to that user would be managed by theSAS and could be reassigned from time to time (e.g., from 3550-3560 MHz to 3630-3640 MHz).Individual GAA users would be assigned available bandwidth of a size and spectral location determinedby the SAS (e.g., from 3550-3556 MHz or 3662-3673 MHz). The SAS would assign and maintainappropriate frequency assignments and ensure that lower tier users do not interfere with higher tier users.To the extent that some level of regional or national consistency of assignment facilitates the provision ofservice, SAS providers would be free to agree upon a common assignment convention. However, such aconvention would not be specified in the rules, in order to allow the greatest degree of operationalflexibility.34.We seek comment on the proposed rule, including the capabilities that the SAS wouldhave to incorporate to manage operations in the band consistent with this proposal.68 Alternately, shouldwe adopt a more traditional model with static frequency assignments for GAA users and Priority AccessLicensees? What advantages and disadvantages would a fixed channel assignment model provide ascompared to the dynamic system set forth in the proposed rules?35.We also seek comment on our proposal to allow the SAS to assign a flexible amount ofbandwidth to individual GAA users. Should GAA users instead be assigned a consistent amount of63 See Comments of Microsoft, Inc. in Response to Licensing PN in GN Docket No. 12-354 (filed December 5,2013) (Microsoft Licensing PN Comments) at 4; OTI/PK Licensing PN Comments at 9-11.64 See Comments of the Wireless Internet Service Providers Association in Response to Licensing PN in GN DocketNo. 12-354 (filed December 5, 2013) (WISPA Licensing PN Comments) at 14.65 See WISPA Licensing PN Comments at 19; Google Licensing PN Comments at 10-13.66 See AT&T Licensing PN Comments at 5-6; T-Mobile Licensing PN Comments at 10-12; Comments of Ericssonin Response to Licensing PN in GN Docket No. 12-354 (filed December 5, 2013) (Ericsson Licensing PNComments) at 7; CTIA Licensing PN Reply Comments at 7-8.67 See infra section III(A)(1)(f); Appendix A, §§ 96.23, 96.33, and 96.46.68 SAS capabilities are addressed in greater detail in section III(A)(1)(f).12
- Federal Communications Commission
- bandwidth (e.g., 10 megahertz) like Priority Access Licensees? What would be the costs and benefits ofsuch an approach?36.GAA Access to Unused Priority Access Channels. The Revised Framework discussedallowing GAA users to access unused Priority Access channels on an opportunistic basis. AT&T and T-Mobile supported the concept of allowing GAA users to make use of unused Priority Access tier channelsso long as use was limited to unassigned and undeployed channels. Under their proposal, a channelwould be unavailable for GAA once it is assigned to a Priority Access Licensee. 69 Public Knowledge,The New America Institute, Federated Wireless, and Google as well as a broad coalition of broadbandservice providers, manufacturers, trade associations, and technology companies (Coalition) argued for amore flexible model that would allow GAA use over Priority Access channels that are not in actual use.70The rule we propose here would allow GAA use on unused PAL channels to promote efficient andconsistent use of spectrum.37.We seek comment on the proposed rule, including any costs and benefits of the proposedapproach. How should ''use'' be practically and consistently determined in this context? How should thedetermination be made in the context of our dynamic frequency assignment proposal? If an assigned butpreviously unused PAL channel is later determined to be ''in use,'' how long should a GAA user be givento vacate the Priority Access channel? What should be the triggering event that reserves assignment of achannel for PAL use? Should the event be based on action by a Priority Access Licensee (e.g., initiatingservice in a portion of the PAL) or by the SAS (e.g., assigning a channel to the PAL in response to arequest from a Priority Access licensee)?b.Subpart B '' INCUMBENT PROTECTIONS
- (i)Protection of Federal Incumbents (§ 96.15)
- 38.Consistent with the three-tier construct, we propose in Section 96.15 to require thatCBSDs71 may not cause harmful interference to and must accept interference from authorized federalusers in the 3.5 GHz Band. As an initial matter, we also propose at this time that CBSDs comply with thegeographic Exclusion Zones based on the parameters set forth in the Fast Track Report to ensurecompatibility with federal operations, and that the SAS ensure that CBSDs do not operate withinExclusion Zones.72 We discuss issues related to these requirements in more detail, including the size ofExclusion Zones and our intention to revisit the appropriate incumbent protection criteria, in sectionIII(B)(1) below. We seek comment on these proposed rules.(ii)Protection of Existing Fixed Satellite Service Earth Stationsin the 3550-3650 MHz Band (§ 96.17)
- 39.We also propose to protect existing FSS earth stations in the 3.5 GHz Band by requiringthat CBSDs not cause harmful interference to these sites. We discuss broader issues related to theserequirements in more detail in Section III(B)(3)(a) below and seek comment on the issue of protection for''out-of-band'' FSS earth stations in section III(B)(3)(b). We seek comment on these proposed rules.69 See AT&T Licensing PN Comments at 6, note 12; T-Mobile Licensing PN Comments at 9-10.70 See OTI/PK Licensing PN Comments at 11-12; Google Licensing PN Comments at 15-16; Reply comments ofFederated Wireless LLC in Response to Licensing PN in GN Docket No. 12-354 (filed December 20, 2013)(Federated Licensing PN Reply Comments) at 6-10; Coalition Letter at 1.71 Defined as ''[f]ixed or Portable Base stations, or networks of such base stations, that operate on a Priority Accessor General Authorized Access basis in the Citizens Broadband Radio Service consistent with this rule part. Does notinclude End User Devices.'' See Appendix A.72 See Fast Track Report at 1-6 to 1-7, figures D-45 to D-55, and Appendix B.13
- Federal Communications Commission
- (iii)Operation near Canadian and Mexican Borders (§ 96.19)
- 40.Our proposed rules note that Citizens Broadband Radio Service operations along theCanadian and Mexican borders would be subject to international agreements with Mexico and Canada.The SAS would be required to enforce these requirements. We seek comment on these proposed rules.c.Subpart C '' PRIORITY ACCESS
- 41.We propose not to limit eligibility for the Priority Access tier, to assign rights based upontargeted PAL parameters, resolve mutually exclusive license applications via competitive bidding, and torequire access coordination through an SAS. These proposals are generally consistent with the RevisedFramework described in the Licensing PN.(i)Authorization (§ 96.21)
- 42.Under our proposed rules, any entity eligible to hold an FCC license would be eligible toapply for, and hold, a PAL.73 Commenters generally support expanding eligibility to the Priority Accesstier to a broader class of users than we proposed in the NPRM.74 Expanded access to the Priority Accesstier would promote more intensive use of the 3.5 GHz Band and would promote investment in new smallcell technologies. We propose to require all applicants for PALs to demonstrate their qualification to holdan authorization and demonstrate how a grant of authorization would serve the public interest.75Qualifications would include those under Section 310 of the Act regarding foreign ownership. TheCommission has broad authority to prescribe ''citizenship, character, and financial, technical, and otherqualifications'' for its licensees.76 We seek comment on how to apply this authority with respect to the 3.5GHz Band, and whether to adopt the same policies in this respect that the Commission has established forother services. We also propose that certain of the processes and requirements may be reasonablyautomated by SAS Administrators, in accordance with the Commission's rules. We seek comment onthese proposed rules, including on any limitations posed by our Title III obligations on the scope ofauthority that may be delegated to such SAS Administrators.(ii)Priority Access Licenses (§ 96.23)
- 43.Our proposed rules stipulate that Priority Access Licensees would receive interferenceprotection from GAA users but would operate on a non-interfering basis with respect to IncumbentUsers.77 Conceptually, the proposed PALs would be ''building blocks'' that an eligible licensee couldaggregate over frequency, time, and geography to meet diverse spectrum needs.78 The use of PALs - andinteractions between and among tiers - would be managed by the SAS. This licensing and access model isconsistent with the recommendations of PCAST and would effectively serve the public interest. We seekcomment on these proposed rules as described in more detail below.44.Geography. We propose to authorize PALs at the census tract level and to permitgeographic aggregation across license areas. As explained in the Licensing PN, census tracts offer avariety of benefits, including geographic sizes varying by population density, nesting into other political73 See Appendix A, § 96.5.74 See e.g., AT&T Licensing PN Comments at 3; T-Mobile Licensing PN Comments at 4; Alcatel Lucent LicensingPN Comments at 2; Comments of Spectrum Bridge in response to Licensing PN in GN Docket No. 12-354 (filedDecember 5, 2013) (Spectrum Bridge Licensing PN Comments) at 2; NSN Licensing PN Comments at 2; GoogleLicensing PN Comments at 5; OTI/PK Licensing PN Comments at 16-17; Coalition Letter at 1.75 See 47 U.S.C. §§ 303, 307, 309, 310.76 47 U.S.C. § 308(b).77 See Appendix A, § 96.23.78 See Licensing PN, 28 FCC Rcd at 15305, ¶ 12.14
- Federal Communications Commission
- subdivisions including city lines, and aligning with other natural features that track population density.79Under our proposal, PAL applicants could target specific geographic areas in which they need additionalcoverage and avoid applying for areas that they do not intend to serve. Our proposal reflects the uniquetechnical characteristics of small cells to promote a high degree of spectral and spatial reuse whilefacilitating flexible, targeted deployment of CBSDs.45.We received a diverse record in response to our proposal to use census tracts as alicensing area. Some commenters agreed with our proposal.80 Others argued that census tracts wereinappropriate geographic license areas because the borders of census tracts frequently divide streets andtheir relatively small size would make co-channel coordination between Priority Access Licensees moredifficult.81 Other commenters suggest that even smaller geographic areas, such as census block groupswould allow for granular and demand-focused assignments.82 Others proposed larger, more traditionallicense areas such as counties, EAs, or CMAs.83 Google suggests license boundaries be based onproposed network parameters and actual contours, as determined and enforced by the SAS.8446.Our census tract proposal occupies a middle ground among these diverserecommendations, and is designed as an equitable means of achieving the Commission's public interestgoals. Census tracts are sufficiently granular to promote intensive use of the band and are large enough,either on their own or in aggregate, to support a variety of use cases, including small cell base stations andbackhaul. We seek comment on the proposed rule including any potential costs or benefits. Wouldadopting alternative geographic license sizes further the public interest given the Commission's goals andcontemplated use cases for the band? We also seek comment on whether PALs could be deployed on aneven more focused basis, employing a fine grained grid of ''pixels'' (i.e., small, regular geographic regionsthat can be combined to approximate, with high resolution, the operational and protection contours ofvarious system deployments) to promote more targeted and customizable network deployment. If theCommission adopts census tracts, or something smaller, as the appropriate geographic license area,should package bidding or another mechanism that would allow applicants to bid on larger geographicareas be adopted? To the extent that commenters believe that the use of census tracts would foreclose aparticular use case for the band, we encourage them to provide detailed technical analyses to support theirclaims.47.Channels. As described in the Revised Framework and section III (A)(1)(a)(vii) above,we propose to authorize PALs to operate over 10 megahertz unpaired channels.85 While a fewcommenters argued for larger or smaller channels,86 the record generally supports our proposal to utilize79 See id., 28 FCC Rcd at 15305-06, ¶ 15.80 See WISPA Licensing PN Comments at 7; Spectrum Bridge Licensing PN Comments at 2-3 (Supporting censustracts but arguing that a smaller grid may be preferable).81 See AT&T Licensing PN Reply Comments at 6-7; Verizon Licensing PN Comments at 6-7; Reply Comments ofT-Mobile USA, Inc. in response to Licensing PN in GN Docket No. 12-354 (filed December 20, 2013) at 7-8;Google Licensing PN Comments at 5-8.82 See OTI/PK Licensing PN Comments at 19 (suggesting census block groups); Comments of Motorola Solutions inin Response to Licensing PN GN Docket No. 12-354 (filed December 5, 2013) (Motorola Solutions Licensing PNComments) at 8-9 (suggesting 100 meter x 100 meter grid spaces); Microsoft Licensing PN Comments at 6-7(suggesting census block groups).83 See Qualcomm Licensing PN Comments at 3-4; Ericsson Licensing PN Comments at 7-8; NSN Licensing PNComments at 5; T-Mobile Licensing PN Comments at 6-7.84 Google Licensing PN Comments at 5-8.85 See Licensing PN, 28 FCC Rcd at 15307, ¶ 17.86 See Federated Licensing PN Comments at 20-25 (Advocating the highest possible degree of granularity) andEricsson Licensing PN Comments at 8 (Advocating for an interim assignment of 60-80 megahertz spectrum blocks).15
- Federal Communications Commission
- 10 megahertz channels for PALs with the ability to aggregate multiple channels.87 Ten megahertzchannels provide a flexible, scalable, practically deployable bandwidth for high data rate technologies thatwould permit multiple Priority Access Licensees to operate effectively in a given geographic area. Weseek comment on the proposed rule.48.In addition, consistent with the Revised Framework, we propose that once theCommission has assigned PAL rights to a user, the specific channels would be dynamically assigned tothe PALs by the SAS.88 As discussed previously, some commenters argue for fixed channelassignments.89 Others, like Google and WISPA support the dynamic assignment model outlined in theRevised Framework.90 We should maximize flexibility in the band to allow the SAS to use channelassignments as a tool in maximizing efficiency and minimizing interference scenarios. However, wepropose that the SAS be permitted to assign specific frequencies to Priority Access Licensees upon theirrequest, when available and on a dynamic basis. To the extent a licensee has PALs in adjacent censustracts, we propose that the SAS should endeavor to assign contiguous frequencies across geographicboundaries. In addition, consistent with the dynamic nature of the proposed channel assignments, weencourage SAS Administrators to make reasonable efforts to assign adjacent frequencies to licensees withaccess rights to multiple channels in a single census tract. Dynamically assigning spectrum based uponthe demand within a geographic area at a given time would promote efficient use of the band across widergeographic areas without compromising flexibility. We seek comment on this proposal. What effectwould such assignment have on spectrum efficiency as opposed to the use of channel bonding techniquesacross non-contiguous spectrum? Would such a rule simplify or complicate the SAS's ability to managethe spectrum within any given census tract? What effect would such a rule have on the ability to predictand take measures to prevent harmful interference among users within the same census tract and users innearby census tracts?49.Term. We propose to limit license terms to one-year with no renewal, but allow entitiesto aggregate up to five consecutive years of licenses, through competitive bidding.91 PALs wouldautomatically terminate at the end of each year. As explained in the Licensing PN, we believe that thisapproach would promote flexibility, simplify administration, and promote fungibility and liquidity in thesecondary market.92 Allowing applications for multiple years of PALs would provide Priority AccessLicensees with the certainty they may need to make capital investments in any PAL.50.The record related to these licensing concepts was also mixed. Some commenters agreedwith our proposal of one-year terms with the option to aggregate multiple years.93 Others argued for87 See e.g., AT&T Licensing PN Comments at 3-5; Google Licensing PN Comments at 10-13; Motorola SolutionsLicensing PN Comments at 4; NSN Licensing PN Comments at 5-8 (Stating a preference for larger blocks butagreeing that 10 megahertz blocks have some advantage); OTI/PK Licensing PN Comments at 20; QualcommLicensing PN Comments (Supporting 10 megahertz or 20 megahertz unpaired channels); T-Mobile Licensing PNComments at 7.88 See Licensing PN, 28 FCC Rcd at 15310-15311, ¶ ¶ 30-32.89 See AT&T Licensing PN Comments at 5-6; T-Mobile Licensing PN Comments at 10-12; Ericsson Licensing PNComments at 7; See supra section III(A)(1)(a)(vii).90 See WISPA Licensing PN Comments at 19; Google Licensing PN Comments at 10-13; See supra sectionIII(A)(1)(a)(vii).91 See infra section III(A)(2)(b)(1).92 Licensing PN, 28 FCC Rcd at 15306, ¶ 13.93 See WISPA Licensing PN Comments at 14-15 (one-year terms with a four-year aggregation limit); OTI/PKLicensing PN Comments at 16-18 (one-year terms with a three-year aggregation cap); Spectrum Bridge LicensingPN Comments at 2-3 (supporting one year ''leases'' but advocating a mix of fixed and variable length lease times);See also AT&T Licensing PN Comments at 3-5 (supporting one-year terms but arguing for a ''keep what you use''(continued'....)16
- Federal Communications Commission
- license terms shorter than one year94 while Microsoft agreed with the one-year proposal but argued for aprohibition on term aggregation.95 On the other hand, several commenters including Ericsson, NSN, andQualcomm supported a more traditional licensing model with longer (e.g. 10-year) license terms.9651.Under this proposal, licensees would be able to hold up to five-years of PALs in a givengeographic area at any given time. Licensees holding less than five-years of PALs in a geographic areamay apply for additional PALs in the same geographic area, up to a total (including their existing PALs)of five-years. For example, a licensee awarded five-years of PALs through the annual applicationwindow in one year would be allowed to apply for a one year PAL through the annual applicationwindow in the subsequent year.9752.We note that in response to the Licensing PN, several commenters argued for a shortertemporal aggregation limit than we propose here. For example, WISPA suggests a four-year aggregationcap, Public Knowledge and the New America Foundation suggest a three-year cap, Motorola Solutionssuggests only two years, and Microsoft suggests we not permit term aggregation (effectively a one-yearavailability in the licensing window).98 AT&T, by contrast, suggests that licensees be permitted to retaintheir authorizations indefinitely for areas in which they have deployed equipment and provided servicewithin one year.99 By combining short-term licenses with a multi-year application window, our proposalfor one-year licenses with term aggregation balances the competing public interest concerns expressed inthe record. We seek comment on the proposed one-year, non-renewable license terms and aggregationlimit, including any costs and benefits.(iii)Application Window (§ 96.25)
- 53.We propose to accept applications for PALs annually and to make up to five consecutiveyears of PALs available in any given application window. We seek comment on the proposed ruleincluding any potential costs or benefits.(iv)Assignment of Licenses (§ 96.27)54.We propose to adopt a geographic area license scheme for the Priority Access tier, whichpermits the filing and acceptance of mutually exclusive applications. Section 309(j) of theCommunications Act requires that the Commission assign initial licenses through the use of competitivebidding when mutually exclusive applications for such licenses are accepted for filing, except in the caseof certain specific statutory exemptions. Although the NPRM asked whether a licensing scheme for PALsshould include a ''mission critical'' eligibility criterion that might involve such exemptions,100 under ourcurrent eligibility proposal such exemptions would not appear applicable here.101 Consistent with the(Continued from previous page)approach to renewals); Federated Licensing PN Comments at 17-25 (supporting one-year terms as a nominal levelbut advocating for finer temporal granularity with usage fees).94 See Motorola Solutions Licensing PN Comments at 7-8 (quarterly terms with a two-year aggregation cap).95 Microsoft Licensing PN Comments at 6.96 See Ericsson Licensing PN Comments at 7-8; NSN Licensing PN Comments at 4-5; Qualcomm Licensing PNComments at 7-8.97 Stated differently, a licensee that successfully acquires rights to a PAL for years X through X+4 (e.g., years 1, 2,3, 4, 5) during the year X (e.g., year 1) application window would be eligible to apply for, and acquire, rights to aPAL in year X+5 (e.g., year 6) during the year X+1 (e.g., year 2) application window.98 See OTI/PK Licensing PN Comments at 16-18; WISPA Licensing PN Comments at 15; Motorola SolutionsLicensing PN Comments at 7-9; Microsoft Licensing PN Comments at 6.99 AT&T Licensing PN Comments at 5.100 See 3.5 GHz NPRM, 27 FCC Rcd at 15618-19 and 22-23, ¶¶ 70-73, 85.101 See 47 U.S.C. § 309(j)(1), (2).17Federal Communications Commission
- Commission's policy that competitive bidding places licenses in the hands of those that value thespectrum most highly, we believe that it would be in the public interest to adopt a licensing scheme forPALs which allows the filing of mutually exclusive applications that, if accepted, would be resolvedthrough competitive bidding. Accordingly, in section III(A)(2)(b) below, we seek comment on a numberof proposals regarding competitive bidding rules that would apply to resolve any mutually exclusiveapplications accepted for PALs in the Citizens Broadband Radio Service.(v)Aggregation of Priority Access Licenses (§ 96.29)
- 55.OTI, New America Foundation, and Public Knowledge argue that when mutualexclusivity exists no licensee should hold more than 20 megahertz of spectrum in a given license area.102They argue that the limitation would allow future entrants and new competitors to enter the market.103 Wepropose to allow licensees to hold up to three PALs in one census tract at one time (i.e., 30 megahertz inone census tract at any time). Given the unique circumstances of this band and the proposed rules, itwould be difficult to apply the Commission's traditional competitive review process with respect toproposed transfers of licenses in the band. In this specific instance, a clear aggregation limit, applicableto all PAL licensees in the band, could promote competitive access to the band while avoiding the needfor case-by-case review of license transfers. This approach should facilitate a liquid ''spot market'' inPALs, as described further in section III(A)(2)(c), below. We seek comment on the proposed rule.Should we set a higher or lower allowance? Should aggregation allowances only apply when mutualexclusivity exists? Is an aggregation limit necessary when interested parties also have access to GAAspectrum, along with other bands that can be used for Wi-Fi and other similar services? Shouldaggregation limits change if the band is partially encumbered by Incumbent Users? What are the costsand benefits of higher or lower allowances? Are there other methods to promote competition, incentivizeinvestment and innovation, and ensure spectrum availability for diverse uses?d.Subpart D '' GENERAL AUTHORIZED ACCESS
- (i)Authorization and General Authorized Access Use (§ 96.31and § 96.33)
- 56.As explained above, we propose to reserve a floor of at least 50 percent of availablebandwidth in the 3.5 GHz Band in each census tract for GAA use, with additional frequencies to be madeavailable on an opportunistic basis when not in use by Priority Access Licensees.104 As described in theNPRM and Licensing PN, GAA devices would be licensed-by-rule as under Section 307 of theCommunications Act105 to promote rapid deployment by a wide range of users at low cost and withminimal barriers to entry.106 GAA users would be required to use only certified, Commission-approvedCBSDs and register with the SAS.107 Consistent with the proposed rules governing CBSDs, devicesoperating on a GAA basis would be required to provide the SAS with all information required by therules '' including operator identification, device identification, and geo-location information '' upon initialregistration and as required by the SAS.108 GAA users would also be required to comply with theinstructions of the SAS and avoid causing harmful interference to Priority Access Licensees andIncumbent Access tier users. Similar to unlicensed operations, GAA users would have no expectation of102 OTI/PK Licensing PN Comments at 20.103 OTI/PK Licensing PN Comments at 20.104 See supra section III (A)(1)(a)(vii).105 See 47 U.S.C. § 307(e)(1); Appendix A §§ 95.401 and 96.31.106 See Licensing PN, 28 FCC Rcd at 15309, ¶ 23; 3.5 GHz NPRM, 27 FCC Rcd at 15616-17 and 15620, ¶¶ 61-63and 75-76.107 See Appendix A, § 96.36 and 96.39.108 See Appendix A, § 96.36.18
- Federal Communications Commission
- interference protection from other Citizens Broadband Radio Service users.109 Are there other licensingparadigms that the Commission should consider? If so, commenters are requested to provide a detailedanalysis of the pros and cons of the approach.57.As discussed previously, commenters took a variety of positions with regard to theportion of the band that should be used for GAA as well as our proposals to allow dynamic andopportunistic use of unused Priority Access channels.110 Some commenters also objected to our proposalto authorize the GAA tier on a license-by-rule basis.111 These positions are discussed in greater detail insections III(A)(1)(a)(vii) and III(A)(2)(a). Our proposals would ensure widespread availability of GAAfrequencies for the broadest possible class of users and applications. We seek comment on the proposedrules including potential costs and benefits.(ii)Contained Access Facilities (§ 96.35)
- 58.As we noted in the NPRM and Licensing PN, a wide variety of critical services in theUnited States have current and future spectrum needs and there is currently insufficient spectrum toallocate exclusive bandwidth to all such services.112 While we believe that broad eligibility for use of the3.5 GHz Band will produce significant public interest benefits, we continue to believe that ''the highspatial reuse characteristics of low-power 3.5 GHz transmissions, combined with access managementfacilitated by the SAS, should allow the 3.5 GHz Band to be utilized on a shared, licensed basis by avariety of critical users to provide high quality services to localized facilities.''113 To that end, theLicensing PN sought comment on whether it would be in the public interest to allow critical users toreceive interference protections, akin to Priority Access users, within a limited portion (e.g., 20megahertz) of the GAA pool inside the confines of their facilities.59.Commenters responding the Licensing PN diverged as to how the Commission shouldtreat critical facilities. Commenters including T-Mobile and Spectrum Bridge support allowing criticalaccess users to reserve spectrum on a highly localized basis.114 Motorola Solutions argues that criticalfacilities should be assigned 20 to 30 megahertz of the 3.5 GHz Band and be permitted to utilize thatspectrum for indoor or outdoor applications, while UTC asserts that the entire Priority Access Tier shouldbe reserved for critical access facilities.115 Google argues that preferential treatment for critical facilitiesshould be limited to ''available spectrum'' and that such users should not be able to evict users that havealready deployed network facilities.116 In addition, PCIA argues that the Commission should provide forthe deployment of both critical and non-critical localized indoor networks.11760.We propose to allow Contained Access Users, such as hospitals, public safetyorganizations, and local governments to request up to 20 megahertz of reserved frequencies from theGAA pool for indoor use within their facilities in furtherance of the public interest. These frequenciesmay be used only for private internal radio services and may not be made available to the general public.Other GAA users would not be permitted to utilize the reserved frequencies within designated Contained109 See 47 C.F.R. §15.5.110 See supra section III(A)(1)(a)(vii).111 See infra section III(A)(2)(a).112 See 3.5 GHz NPRM, 27 FCC Rcd at 15618, ¶ 70; Licensing PN, 28 FCC Rcd at 15311-12, ¶ 36.113 3.5 GHz NPRM, 27 FCC Rcd at 15619, ¶ 73.114 See T-Mobile Licensing PN Comments at 12-13; Spectrum Bridge Licensing PN Comments at 6.115 See Motorola Solutions Licensing PN Comments at 2-5; UTC Licensing PN Comments at 4-6.116 See Google Licensing PN Comments at 19.117 See Comments of PCIA in Response to Licensing PN in GN Docket No. 12-354 (filed December 5, 2013) (PCIALicensing PN Comments) at 5-6.19
- Federal Communications Commission
- Access Facilities (CAFs). Except for the ability to prohibit third-party use in CAFs, Contained AccessUsers availing themselves of the reserved channels would still operate on a GAA basis and would have nospecial rights with respect to interference from Incumbent Users and other Citizens Broadband RadioService users. We also propose that Contained Access Users must undertake reasonable efforts tosafeguard against harmful interference from GAA transmissions originating outside the CAF. The''reasonable efforts'' requirement would therefore ensure that Contained Access Users take advantage ofRF isolation intrinsic to the CAF, along with any other potential interference ''self-help'' measures, toprotect the RF environment within the CAF.118 Potential Contained Access Users would be required toreceive approval from the Commission to be eligible to utilize reserved frequencies. The public interestwould be served by giving designated Contained Access Users the ability to utilize reserved frequenciesindoors, within CAFs in this fashion. Moreover, the limited geographic and spectral impact of thisproposal will allow for the effective coexistence of Contained Access Users, Incumbent Users, and otherCitizens Broadband Radio Service operators.61.We seek comment on the proposed rule including any costs or benefits. Specifically,what types of entities should be considered qualified Contained Access Users? Does this proposaladequately address the spectrum needs of Contained Access Users? Would this proposal effectivelyaddress a demonstrated spectrum need for certain users that would not otherwise be addressed by theproposals in this FNPRM? Should this proposed framework be limited to Contained Access Users orexpanded to include other types of facilities, including outdoor facilities? Would the SAS be able toeffectively manage spectrum use by a large number of facilities? How would the SAS limit the operationof other GAA users within CAF premises? Would this plan unacceptably encumber GAA spectrum? Weask that commenters provide detailed technical and/or economic analysis to support their arguments.e.Subpart E '' TECHNICAL RULES
- (i)Citizens Broadband Radio Service Devices GeneralRequirements (§ 96.36)
- 62.To enable the SAS to authorize and effectively coordinate the use of shared spectrum inthe 3.5 GHz Band, CBSDs must transmit certain operational and identification information to the SAS.In the NPRM, Licensing PN, and SAS Papers PN we sought comment on the types of information thatCBSDs should be required to transmit.119 Commenters took a wide range of positions with regard toinformation transmission requirements for CBSDs.120 Elements of these proposals have beenincorporated into proposed rule 96.36. Specifically, we propose that CBSDs must provide the SAS withthe following information: (1) geographic location (within ±50 meters horizontal and ±3 meters vertical);(2) antenna height above ground level (meters); (3) requested authorization status (Priority Access orGeneral Authorized Access); (4) unique FCC identification number; (5) user contact information; and (6)unique serial number. This information must be communicated when the CBSD initially registers at theSAS and at regular intervals thereafter. We also propose that CBSDs must follow directions and updatessent by SAS in a timely manner. For managed networks, while it is likely that information exchanges118 We note that Contained Access Users requiring stronger interference protections, or protections that extendbeyond the perimeter of a CAF, could also apply for PALs using the same procedures as other potential CitizensBroadband Radio Service operators.119 See SAS Papers PN, 28 FCC Rcd at 15845-46.120 See e.g., WISPA Response to FCC Call for Papers on Proposed 3.5 GHz Spectrum Access System in GN DocketNo. 12-354 (filed January 3, 2014) (WISPA SAS Paper) at 3-4; InterDigital, Inc. Response to FCC Call for Paperson Proposed 3.5 GHz Spectrum Access System in GN Docket No. 12-354 (filed January 3, 2014) (InterDigital SASPaper) at 11-13; Google, Inc. Response to FCC Call for Papers on Proposed 3.5 GHz Spectrum Access System inGN Docket No. 12-354 (filed January 3, 2014) (Google SAS Paper) at 4; and Nokia Siemens Networks Response toFCC Call for Papers on Proposed 3.5 GHz Spectrum Access System in GN Docket No. 12-354 (filed January 3,2014) (NSN SAS Paper) at 6.20
- Federal Communications Commission
- between CBSDs and the SAS would be aggregated through a proxy such as a network access manager,121the proposed requirements would still be applicable to all CBSDs operating in the band.63.Geo-location and Reporting Capability. For the SAS to predict and evaluate potentialinterference and spectrum availability accurately it must have accurate location information for allCBSDs. We propose that all CBSDs must accurately report the location of each of their antennas towithin ±50 meters (horizontal) and ±3 meters (vertical). The proposed horizontal geo-locationrequirement is consistent with a similar requirement in the TVWS rules.122 We also propose that CBSDsreport their location to the SAS within 60 seconds of a change in location exceeding the accuracyrequirement. We seek comment on these proposals, including potential costs and benefits. Is this degreeof accuracy feasible with current technology? Should we require greater accuracy? What effect do theaccuracy requirements have on actual spectrum efficiency and the SASs ability to manage interferencepotential among different users? Would the proposed geo-location requirement place undue burden onequipment manufacturers or SAS operators? Is such a requirement reasonable to control the interferenceenvironment among users? Is there a different timeframe for reporting that should be used?64.Interoperability. To facilitate our proposed dynamic approach to frequencyassignment,123 we propose to require CBSDs to be interoperable across all frequencies from 3550-3700MHz. This would ensure that all CBSDS and End User Devices certified to operate in the band would becapable of sending and receiving information regardless of the frequencies assigned by the SAS. It alsoanticipates the possible inclusion of the 3650-3700 MHz band. Several commenters also supported band-wide device interoperability.124 We seek comment on this proposal including any potential costs andbenefits. What effects would such a requirement have on equipment cost and design? What are theimplications of equipment that may only work over a portion of the band and may not be able to tune tochannels as assigned by the SAS? To what extent would an interoperability requirement promoteconsumer choice, given the characteristics of this service? To what extent should we seek to align theproposed interoperability requirement with existing international harmonization efforts for the 3.5 GHzBand (e.g., 3GPP Bands 42 and 43)? Similarly, how are current coexistence efforts among productsconforming to multiple industry standards (e.g., 3GPP, IEEE 802.11 series) affected by the proposedinteroperability requirement?12565.Registration with SAS. As set forth in greater detail below,126 we also propose thatCBSDs be permitted to operate only if authorized by the SAS and if they follow frequency assignmentsand power limitations set by SAS. We propose that CBSDs must move their transmission to anotherchannel or stop operation in the band as directed by SAS within a reasonable time. We seek comment onthe appropriate time for CBSDs to respond to instructions from the SAS. Is sixty seconds a reasonableresponse timeframe or could a shorter response period be imposed? How does the timeframe affect the121 See NSN SAS Paper at 6; Alcatel Lucent Inc. Response to FCC Call for Papers on Proposed 3.5 GHz SpectrumAccess System in GN Docket No. 12-354 (filed January 3, 2014) (Alcatel Lucent SAS Paper) at 4; T-Mobile USA,Inc. Response to FCC Call for Papers on Proposed 3.5 GHz Spectrum Access System in GN Docket No. 12-354(filed January 3, 2014) (T-Mobile SAS Paper) at 8; Ericsson and iconectiv Response to FCC Call for Papers onProposed 3.5 GHz Spectrum Access System in GN Docket No. 12-354 (filed January 3, 2014) (Ericsson SAS Paper)at 6.122 See 47 C.F.R. § 15.711(b).123 See supra section III(A)(1)(a)(vii).124 See Comments of Motorola Mobility LLC in response to Licensing PN in GN Docket No. 12-354 (filedDecember 5, 2013) at 3-4; Reply Comments of Google Inc. in response to Licensing PN in GN Docket No. 12-354(filed December 20, 2013) (Google Licensing PN Reply Comments) at 9-10.125 See Letter from Jessica de Simone, Telecommunications Law Professionals PLLC on behalf of MotorolaMobility, Inc. in GN Docket No. 12-354, Ex Parte (filed April 15, 2014).126 See infra section III(A)(1)(f); Appendix A, §§ 96.43-48.21
- Federal Communications Commission
- overall spectrum efficiency within the band? What effect would this timeframe have on the ability of theSAS to manage potential interference?66.Interference Reporting. Some commenters suggested that, to enable the SAS to tune orupdate its predictive models and also address real time interference issues, CBSDs should be required toprovide the SAS with signal level measurements in their band or other adjacent frequency channels asrequested by SAS.127 Many technologies already support this capability to allow radio resourcemanagement within a network.128 This capability could be a valuable tool for managing interference andpromoting productive coexistence between multiple operators in the 3.5 GHz Band. We propose torequire CBSDs to measure and report on their local signal level environment as set forth in the proposedrules.129 We seek comment on this proposal. What effect would the incorporation of such capability haveon the cost of equipment? How should such a requirement be structured? Over what bandwidth or overhow many channels should such measurements be reported? Does the Commission need to adoptmeasurement guidelines or procedures specifying how such measurements should be taken to ensureconsistency in reporting among users?67.Security. During the SAS Workshop many commenters also emphasized the importanceof end-to-end security for communications among CBSDs, End User Devices, and the SAS. 130 We aremindful of the need to provide robust security for Federal information, personally identifiableinformation, and sensitive business information that may be transmitted between these devices and theSAS. To that end, we propose a security requirement for all communications between authorized SASsand CBSDs. We also propose to adopt comprehensive procedures to test and certify CBSDs andassociated end user devices for operation in this band and to require the SAS to disconnect any devicewhose proper operation has been compromised. We seek comment on these proposed security measures.We ask commenters to suggest appropriate security protocols and discuss how these protocols wouldeffectively safeguard sensitive information transmitted among the SAS, CBSDs, and End User Devices.If not, what additional measures should we adopt? Are there other enforcement mechanisms that can beput in place to ensure proper security of devices?(ii)End User Devices General Requirements (§ 96.37)
- 68.We propose that mobile, portable, or fixed End User Devices may operate only if theycan positively receive and decode an authorization signal transmitted by a CBSD, including thefrequencies and power limits for their operation.131 This requirement would effectively prevent End UserDevices from unauthorized operation in the 3.5 GHz Band and ensure that such devices operate onlyaccording to the instructions transmitted from the SAS to the CBSD. We seek comment on this proposedrule.(iii)General Radio Requirements (§ 96.38)
- 69.Digital Modulation. We propose that systems operating in the Citizens Broadband RadioService use digital modulation techniques. We seek comment on this proposed rule.127 See Google SAS Paper at 4.128 See Third Generation Partnership Project (3GPP), Technical Specification Group Radio Access Network,Evolved Universal Terrestrial Radio Access, Radio Resource Control (RRC), Protocol specification (Release 12),3GPP TS 36.331 v. 11.7.0 (2014-03), available at: http://www.3gpp.org/DynaReport/36331.htm.129 See Appendix A, § 96.36.130See Google SAS Paper at 4-6; InterDigital SAS Paper at 16-17; Federated Wireless, LLC Response to FCC Callfor Papers on Proposed 3.5 GHz Spectrum Access System in GN Docket No. 12-354 (filed January 3, 2014)(Federated SAS Paper) at 5-6.131 See Appendix A, § 96.37.22
- Federal Communications Commission
- 70.Conducted and Emitted Power Limits. To prevent harmful interference among users ofthe 3.5 GHz Band, we propose to establish appropriate and flexible power limits for CBSDs and End UserDevices when operating in this band. In the Licensing PN, we sought comment on limiting CBSDemitted power to 24 dBm.132 We also sought comment on a 6 dBi antenna gain for installations requiringan external antenna.133 With negligible cable and insertion loss, this makes the maximum effectiveisotropically radiated power (EIRP) 1W or 30 dBm.134 We noted that these are consistent with the valuescommonly assumed in various studies for small cell base stations.135 We also indicated that the maximumoperational EIRP of individual base stations might be reduced by the SAS to prevent interference andpromote efficient network operation.136 In addition, we assume that End User Devices would haveconfigurable maximum power levels below typical 24 dBm values and support for some form of powercontrol.13771.Commenters diverged greatly with regard to the maximum allowable power for devicesoperating in the band, with many supporting variable power limits for different use cases. For instance,CommScope supported a 24 dBm maximum transmit power for base stations with low gain antennas.138T-Mobile supported a maximum transmit power of 24 dBm for GAA users and 37 dBm for PriorityAccess devices.139 Verizon advocated a maximum transmit power of 30 dBm for outdoor Priority Accessbase stations, while noting that 24 dBm might be appropriate for GAA indoor uses.140 Similarly,Motorola Solutions, BliNQ, and Qualcomm supported maximum transmit power of 30 dBm for at leastsome use cases.141 WISPA encouraged the Commission to allow higher power operations in rural areas ofthe country.14272.Commenters also supported a wide range of allowable antenna gains for base stations -from 6 dBi through 29 dBi - and maximum allowable power levels for different transmitters within thatrange.143 For the combination of transmit power and antenna gain, commenters proposed a range of EIRPfrom low 30 dBm to high 47 dBm for different use cases. Motorola Solutions, Qualcomm, andCommScope (for lower than 12 dBi antenna gain) suggested a maximum EIRP of 30 dBm.144 Some,132 See Licensing PN, 28 FCC Rcd 15314 at ¶¶ 45-46.133 Id.134 Id.135 Id.136 Id.137 Id.138 See Comments of CommScope in response to Licensing PN in GN Docket No. 12-354 (filed December 5, 2013)(Commscope Licensing PN Comments) at 5-6 (recommending maximum transmit power of 24 dBM and maximumEIRP of 30 dBM for devices with low gain antennas); See also T-Mobile SAS Paper at 13-14 (recommendingmaximum transmit power of 24 dBm for GAA users).139 See T-Mobile Licensing PN Comments at 13-14.140 See Verizon Licensing PN Comments at 12.141 See Motorola Solutions Licensing PN Comments at 6; Comments of BLiNQ Networks, Inc. in Response toLicensing PN in GN Docket No. 12-354 (filed December 5, 2013) (BLiNQ Licensing PN Comments) at 7;Qualcomm Licensing PN Comments at 4.142 WISPA Licensing PN Comments at 8-12.143 See CommScope Licensing PN Comments at 5-6; Verizon Licensing PN Comments at 12; BLiNQ Licensing PNComments at 7.144 See Commscope Licensing PN Comments at 5; Motorola Solutions Licensing PN Comments at 6; QualcommLicensing PN Comments at 4.23
- Federal Communications Commission
- including Google (36 dBm), CommScope (37 dBm for equal or higher than 12 dBi antenna gain), andVerizon (47 dBm) argued for higher maximum EIRP figures.14573.We also received transmit power recommendations from parties who would like to utilizethe 3.5 GHz Band for point-to-point and backhaul service. BLiNQ argued that a maximum EIRPallowance of 43 dBm would help enable non-line-of-sight (NLOS) backhaul applications as well as otherimportant services, such as rural point-to-point communications.146 CommScope also recommended 54dBm EIRP for point-to-point backhaul and Verizon suggested that 53 dBm EIRP would be appropriatefor outdoor point-to-point service.14774.It is important to establish flexible rules that would allow for a wide variety of innovativeservices to be deployed in the 3.5 GHz Band and we are encouraged that many commenters share thisview. Ensuring that the band is available for multiple use cases should encourage rapid networkdeployment, promote the development of a robust device ecosystem, and help to ensure the long-termviability of the band. Therefore, we propose to adopt different transmit power levels to accommodate arange of Citizens Broadband Radio Service use cases. Except for fixed point-to-point radio systemsaddressed below, we propose to adopt a 24 dBm (per 10 megahertz) peak transmit power for CBSDs thatare not operating in rural areas. For devices with a 6 dBi antenna gain, we propose a maximum aggregateEIRP of 30 dBm for CBSDs located in non-rural areas. The power spectral density for such transmitpower would be 14 dBm/MHz. We also propose to adopt 30 dBm (per 10 megahertz) peak transmitpower for CBSDs that operate in rural areas.148 With 17 dBi antenna gain, we propose a maximumaggregate EIRP of 47 dBm for CBSDs located in rural environments. The power spectral density for suchtransmit power would be 20 dBm/MHz. These proposed transmit power limits are generally consistentwith recommendations in the record. These proposed maximum transmit power levels would helppromote productive use of the band.75.For fixed point-to-point radio systems, we propose a 30 dBm (per 10 megahertz) peaktransmit power limit for CBSDs. With a 23 dBi antenna gain, we propose a maximum aggregate EIRP of53 dBm for CBSDs. We propose that the maximum allowable peak transmit power in this paragraph bereduced by 1 dB for every 1 dB that the directional gain of the antenna exceeds 23 dBi. The powerspectral density for such transmit power would be 20 dBm/MHz.76.We also propose that maximum EIRP for End User Devices not exceed 23 dBm in 10megahertz bandwidth. We also propose that CBSDs and End User Devices limit their operating power tothe minimum necessary for successful operation.77.We note that NTIA did not consider these proposed use cases or technical criteria incalculating the Fast Track Exclusion Zones. What effects would these additional use cases have on thesize of the Exclusion Zones?78.We seek comment on these proposed rules. Are the proposals in this section appropriatefor the variety of use cases possible in the 3.5 GHz Band? Would these proposals further the publicinterest by promoting efficient and innovative use of spectrum resources? Should the proposed definitionof ''rural environments'' be altered due to the use of small cells and in light of the fact that these systemsare proposed to be deployed in areas smaller than counties? In light of the flexible approach to EIRPlimits proposed herein, should we consider allowing higher power operations in the 3.5 GHz Band? We145 See CommScope Licensing PN Comments at 5-6; Verizon Licensing PN Comments at 12; Google Licensing PNComments at 20.146 See BLiNQ Licensing PN Comments at 7-8.147 See CommScope Licensing PN Comments at 6; Verizon Licensing PN Comments at 12.148 For purposes of the proposed Part 96, a rural area would be defined as a county (or equivalent) with a populationdensity of 100 persons per square mile or less, based upon the most recently available Census data. See AppendixA.24
- Federal Communications Commission
- encourage commenters to support their positions with detailed technical and cost benefit analyses takinginto account the various interference scenarios that may exist in this band among different CBSDs andamong CBSDs and Incumbent Users.79.Received Signal Strength Limits. To perform proper frequency assignments andinterference management, it is important for the SAS to have a baseline threshold for the maximum signallevel from CBSDs at the border of their service area. Therefore, Citizens Broadband Radio Service usersshould ensure that the aggregate signal level from their CBSDs as well as transmissions from theirassociated End User Devices at the edge of their authorized service areas remain at levels that would notharm other CBSDs in the same or higher tiers. For small cell networks, the industry standards and studieshave shown 20 dB and 55 dB of interference rise over noise to be acceptable for picocells and femtocellsrespectively.149 Based on these industry standards, and taking into account reasonable distance betweenauthorized use operations, we propose a signal level threshold of - 80 dBm measured by a 0 dBi isotropicantenna in a 10 megahertz bandwidth anywhere along PAL service area boundaries between differentCitizens Broadband Radio Service users.150 We also propose to allow neighboring users to coordinate ahigher signal level threshold. We seek comment on this proposed rule. How should this signal level bedetermined? Over what bandwidth should the signal threshold be measured? The proposal implies thatthis signal level would need to be met at all points along the PAL service boundary at ground level and allheights above ground level. Is such a requirement feasible? Should there be a single point at which thissignal level should be enforced? What is the effect of this proposal on operation of CBSDs and on theinterference potential within the band? How feasible would it be for the SAS to calculate and enforcesuch a limit?80.Emission Limits. In the NPRM we sought comment on whether to adopt out-of-bandemission (OOBE) limits or other requirements to protect services in adjacent bands from harmfulinterference. We also asked for comment on the appropriate OOBE limits for small cells in the 3.5 GHzBand and the interference protection threshold limits of relevant services.151 Several commentershighlighted the importance of protecting incumbent and adjacent band services but differed as to thespecific protection criteria.152 Some commenters presented co-existence analysis and protection distances149 See 3GPP,Technical Specification Group Radio Access Network, Evolved Universal Terrestrial Radio Access(E-UTRA), Radio Frequency (RF) requirements for LTE Pico Node B (release 11), 3GPP TR 36.931 version 11.0.0(2012-09), available at: http://www.3gpp.org/DynaReport/36931.htm atsection 6.1.2.3.1; and 3GPP, TechnicalSpecification Group Radio Access Network, Evolved Universal Terrestrial Radio Access (E-UTRA), TDD HomeeNode B (HeNB) Radio Frequency (RF) requirements analysis (release 11), 3GPP TR 36.922 v11.0.0 (2012-09),available at: http://www.3gpp.org/DynaReport/36922.htm.150 Under our proposal, PAL boundaries within a single Priority Access Licensee's service area would not be subjectto the -80 dBm threshold.151 See 3.5 GHz NPRM, 27 FCC Rcd at 15637-15638, ¶¶ 136-138.152 See e.g., Reply Comments of Baron Services, Inc. in response to NPRM in GN Docket No. 12-354 (filed April 5,2013, corrected April 10, 2013) (Baron NPRM Reply Comments) at 6-8; Comments of Spectrum Bridge in responseto NPRM in GN Docket No. 12-354 (filed February 20, 2013) (Spectrum Bridge NPRM Comments) at 13-16;Comments of WiMax Forum in response to NPRM in GN Docket No. 12-354 (filed February 20, 2013) (WiMaxForum NPRM Comments) at 8; Comments of National Association of Broadcasters in response to NPRM in GNDocket No. 12-354 (filed February 20, 2013) at 2-3; Comments of Pierre De Vries, Senior Fellow, Silicon FlatironsCenter for Law, Technology, and Entrepreneurship in response to NPRM in GN Docket No. 12-354 (filed February20, 2013) at 6-14; Comments of the Satellite Industry Association in GN Docket No. 12-354 (filed February 20,2013) (SIA NPRM Comments)at 18-20; Harris Corporation Reply Comments in response to NPRM in GN DocketNo. 12-354 (filed April 5, 2013) at 5-6; Letter from Aparna Sridhar, Telecom Policy Counsel, Google Inc. to JuliusKnapp and Ruth Milkman, ex parte, GN Docket No. 12-354 (filed September 3, 2013) (Google Letter); andDeclaration of Dr. Preston Marshall, Principal Systems Architect, Google Services, ex parte, GN Docket No. 12-354(filed September 3, 2013) (Marshall Declaration).25
- Federal Communications Commission
- based on long-standing 43 + 10 log (P) dB OOBE limits.153 Issues specifically related to OOBE thatcould affect the operations of earth stations in the C-Band are addressed in detail in section III(B)(3)(b).We also seek comment on whether to specify particular OOBE limits.81.The Commission's rules generally limit the amount of radio frequency (RF) power thatmay be emitted outside of, or in a range of frequencies outside of, the assigned frequencies/channel(s) ofan RF transmission. Moreover, the Commission has previously concluded that in certain circumstances,attenuating transmitter OOBEs to at least 43 + 10 log (P) dB is appropriate to minimize harmfulelectromagnetic interference between operators.154 This limit has served well as a basis for developmentof industry standards which may impose tighter limits in certain cases. For Priority Access and GAAoperations in the 3.5 GHz Band, we propose to apply the limit of 43 + 10 log (P), which is equivalent to ''13 dBm / MHz, to all emissions outside of channel assignments and frequency authorizations by SAS inthe 3.5 GHz Band. We seek comment on this limit and whether it should be more stringent (i.e., at alower power spectral density) given the state-of-the art of modern radio technologies, and the potentialgains in spectral efficiency and minimizing interference coupling distance between neighboring radiosoperating in the 3.5 GHz Band.82.Notwithstanding the foregoing paragraph, we recognize the need for Citizens BroadbandRadio Service operations to protect incumbent and dissimilar radio services with sensitive weak signalreceivers such as in-band and out-of-band FSS earth stations and DoD radar systems.155 These incumbentradio service operations may be within and adjacent to the 3.5 GHz Band. Protection thresholds for weaksignal receivers and minimizing the interference coupling distance to these receivers from new 3.5 GHzBand transmitters may require greater out-of-band attenuation (lower than -13 dBm / MHz) than can beachieved within the RF filter pass-band of 3.5 GHz Band radios. Striking the proper balance between theemission limits of CBSDs and End User Devices, along with the protection thresholds of incumbentreceivers, may require more stringent OOBE limits in certain circumstances.156 We also recognize thatthere has been considerable technological advancement in transmitter and receiver device technologiesdeployed in the mobile broadband industry over recent years, such that more stringent OOBE limits maybe practical without undue burden to manufacturers and operators.83.For example, the current LTE standards for the use in PCS requires mobiles in 1850 ''1915 MHz to meet a limit of -50 dBm/MHz in 1930-1995 MHz.157 The current capabilities for mobilebroadband manufacturers will support this level of tolerance for interference. Given that other mobilebroadband service operations may already be imposing OOBE at the -40 dBm/MHz level, we propose thislimit specifically for CBSD emissions above 3680 MHz and below 3520 MHz. We recognize that a morestringent limit would enable closer proximity of neighboring service operations. We seek comment as towhether this limit should be more stringent at -50 dBm/MHz.153 See Comments of Redline Communications Inc. in response to NPRM in GN Docket No. 12-354 (filed February20, 2013) at 4; Comments of Tarana Wireless in response to NPRM in GN Docket No. 12-354 (filed February 20,2013) at 4; Comments of the Utilities Telecom Council, Edison Electric Institute, and National RuralTelecommunications Cooperative in response to NPRM in GN Docket No. 12-354 (filed February 20, 2013)(UTC/EEI/NRTC NPRM Comments) at 23-24.154 See e.g., 47 C.F.R. § 24.238(a); 27.53(h) (for PCS and AWS, respectively).155 See infra section III(B)(1) and (3).156 See infra section III(B)(3).157 This applies to both LTE band 2, supporting PCS blocks A through F, and LTE band 25, supporting PCS blocksA through G. See 3GPP,Technical Specification Group Radio Access Network, Evolved Universal Terrestrial RadioAccess (E-UTRA), User Equipment (UE) radio transmission and reception (release 12), 3GPP TS 36.101 V12.2.0(2013-12), available at: http://www.3gpp.org/DynaReport/36101.htm (3GPP TS 36.101 rel. 12) at Table 6.6.3.2-1.26
- Federal Communications Commission
- 84.In general, while OOBE limits to -40 dBm/MHz are reasonable and not burdensome, aspectral transition gap immediately above and below the edges of the 3.5 GHz Band may be necessarygiven the limitations of RF/radio filter technology, in stepping down from an in-band limit of -13dBm/MHz to an out-of-band emission limit of -40 dBm/MHz. Some current research indicates that atransition gap of approximately 1 percent of the band edge frequency may be within the state-of-the-art ofexisting radio/filter technologies.158 Therefore, we propose a transition gap of 30 MHz above 3650 MHzand 30 MHz below 3550 MHz, for setting the OOBE attenuation levels to -40 dBm/MHz. We seekcomment on the size of this transition gap, whether it is in the range of existing RF filter technology, andwhether the gap could be smaller through the use of more narrow RF filters in CBSD and user devices(e.g., two RF filters over 3550 '' 3650 MHz, one covering the lower 50 MHz and the other covering theupper 50 MHz).85.Reception Limits. Priority Access Licensees may be authorized for operation in the samegeographic area, with other Priority Access Licensees authorized to operate in adjacent or near-adjacentchannels. The potential for interference between two or more Priority Access Licensees depends on boththe transmitter and receiver performance of the respective radio systems, because unwanted RF energyreceived by a CBSD can be caused by both the emissions from an adjacent licensee spilling into thedesired frequencies of operation, as well as the imperfections of radio receivers. Establishing an RF fieldstrength/power spectral density that PAL receivers would need to accept from nearby licensedtransmitters, would effectively define the spectrum rights between PALs,159 and enable the SAS to assignthese rights with clear obligations between respective licensees. We seek comment on this approach.86.While the Commission's rules in this regard are technology neutral, we note the signalstrength levels of undesired interfering signals in widely adopted industry standards for receiverperformance (e.g., 3GPP LTE).160 We recognize the in-band and out-of-band blocking characteristics andadjacent channel selectivity of modern radio receivers that must perform over a high dynamic range of RFpower levels. We note that the interfering signal mean power, for acceptable Home Base Station (HeNB;Femtocell) adjacent channel selectivity and blocking, ranges in the relevant 3GPP standards between -28dBm161 and -15 dBm162 (in all LTE channel bandwidths) with moderately high wanted signal power. The3GPP interfering signal power for acceptable LTE User Equipment adjacent channel selectivity andblocking performance, in many cases is -30 dBm or above.163 Therefore, we propose a power spectraldensity limit of -30 dBm / 10 megahertz as the interference limit that CBSDs operating on a PriorityAccess basis must accept, not to be exceeded with greater than 99 percent probability, unless the affecteduser agrees to a higher or lower limit and communicates such agreement to the SAS. Establishing aprobability threshold is important because worst-case conditions for highly transient and unlikely RFinterference events would otherwise establish an excessive constraint on neighboring radio service158 See International Wireless Industry Consortium, Mobile RF Filter Group, Ex Parte presentation in WT DocketNo. 12-268 (2012).159See FCC Technological Advisory Council, Receivers and Spectrum Working Group, Interference Limits Policy -The Use of Harm Claim Thresholds to Improve the Interference Tolerance of Wireless Systems, White Paper(February 6, 2013) (TAC White Paper), available at:http://transition.fcc.gov/bureaus/oet/tac/tacdocs/WhitePaperTACInterferenceLimitsv1.0.pdf (Last visited August 30,2013); Licensing PN, 28 FCC Rcd 15315.160 See 3GPP TS 36.101 rel. 12; and 3GPP, Technical Specification Group Radio Access Network, EvolvedUniversal Terrestrial Radio Access, Base Station Radio Transmission and Reception (release 12), 3GPP TS 36.104V12.2.0, available at: http://www.3gpp.org/DynaReport/36104.htm (3GPP TS 36.104 rel. 12).161 See 3GPP TS 36.104 rel. 12 at Table 7.5.1-5.162 See id. at Table 7.6.1.1-1b (at frequencies further than 20 MHz from band edge).163 See 3GPP TS 36.101 rel. 12 at Table 7.6.2.1-2 (frequency range categories 2, 3 and 4).27
- Federal Communications Commission
- operations.164 Would such a scheme be feasible for the SAS to administer? That is, how difficult would itbe for the SAS to track, manage and enforce agreements between different users? What mechanismwould be used to communicate such agreements to the SAS? How would an SAS be assured that allaffected users are in agreement?87.As described previously, GAA users must not cause harmful interference to and mustaccept harmful interference from Incumbent Users and Priority Access Licensees. Therefore, we proposethat a GAA CBSD be required to change its operational frequencies, lower its transmit power, or ceasetransmitting in accordance with instructions from the SAS if its operations are causing harmfulinterference to higher tier users. We seek comment on this proposal and any operational details necessaryto ensure that the requirement is complied with. What is an acceptable response time for GAA CBSDs tocomply with instructions from the SAS? How frequently should CBSDs be required to query the SASregarding the status of their operations or should CBSDs only query the SAS when they change locationin excess of the accuracy requirements and otherwise adjust operations only when receiving instructionsfrom the SAS? What are the implications for spectrum efficiency and network traffic for variouscommunication requirements between CBSDs and the SAS?88.We seek comment on these proposed rules. We also seek comment on methods andprocedures that may be employed by Priority Access Licensees or the SAS to enforce these thresholds.We encourage commenters to provide detailed technical and cost benefit analyses analyses to supporttheir proposals.89.In addition, as we noted in the Licensing PN, the TAC has been studying spectruminterference policy and receiver standards in general, and it recommends that the Commission considerforming one or more multi-stakeholder groups to study such standards and interference limits policy atsuitable service boundaries, such as those related to the 3.5 GHz Band.165 The Wireless InnovationForum, in its comments to the Licensing PN, recommended that the FCC encourage the formation ofindustry led multi-stakeholder groups, proposed key characteristics of such a process, and committed toestablishing such a multi-stakeholder process to develop recommendations for the 3.5 GHz Band andother band opportunities.166 Consistent with the recommendations of the TAC, we encourage and suggestindustry action to charter a technical group of stakeholders to develop industry coordination agreementsand protocols, including technical options and methods for managing spectrum access that would improveaccess to and make efficient use of the 3.5 GHz Band. What should the scope and charter be of such amulti-stakeholder group? What should be the governance structure of such a group?f.Subpart F '' SPECTRUM ACCESS SYSTEM
- 90.The overall effectiveness of our proposals depends largely on the development andimplementation of a robust SAS. We therefore propose to codify several high-level SAS requirements inthe Part 96 rules. Following the TVWS database model, we expect that industry participants will take itupon themselves to develop technical implementations of these requirements and, where applicable, todevelop industry-wide standards.91.Our proposed rules also assume that multiple SAS Administrators and, consequently,multiple SASs would be authorized to operate in the 3.5 GHz Band, much as multiple databases have164 See 3GPP, Technical Specification Group Radio Access Network, Evolved Universal Terrestrial Radio Access,TDD Home eNode B Radio Frequency requirements analysis (release 11), 3GPP TR 36.922 V11.0.0 (2012-09)available at: http://www.3gpp.org/DynaReport/36922.htmat (3GPP TR 36.922 rel. 11) at Figure 6.2.2.2-2 (IoT levelof HeNB, note the worst case (i.e., highest level of IoT) in contrast to IoT with relatively high probability (e.g.,99%)).165 See TAC White Paper at ¶ 50.166 See Wireless Innovation Forum Licensing PN Comments.28
- Federal Communications Commission
- been authorized in the TVWS context,167 to ensure that consumers are provided with a robust set ofchoices in the marketplace. We seek comment on what techniques could be used to effectively coordinatemultiple SASs in the band. What other implementation challenges arise from the possibility of multipleSAS providers? Are they solvable? We seek comment on the proposal to authorize multiple SASproviders. In responding to the questions and proposed rules in this section, we ask commenters toconsider the implications of multiple authorized SASs and to address these issues in their filings.92.We also intend to institute a comprehensive approval process for SASs and SASAdministrators that closely follows the multi-step process used to test, certify, and approve TVWSdatabases and administrators. In the TVWS context, prospective database administrators were invited tosubmit proposals outlining how their systems would meet the Commission's requirements for databaseoperators and provide information sufficient to show that they have the technical expertise to administer adatabase and a viable business plan for operating a database for a five-year term.168 OET then reviewedthese proposals and approved the proposals of those operators that met the requirements.169 Approvedoperators were then required to attend mandatory workshops to ensure compliance with the rules, meetmilestone dates set by OET for reporting and compliance, and submit to rigorous real-world testing of alldatabase elements prior to making their services available to the public.170 By following the precedent setin the TVWS proceeding, we can ensure that the technical solutions and developed by prospective SASAdministrators are consistent with the letter and spirit of our high-level rules, especially with regard to theprotection of Incumbent Access tier users.171(i)Spectrum Access System Purposes and Functionality (§96.43)
- 93.We sought comment on the essential high level requirements of the SAS in both theLicensing PN and the NPRM.172 In addition, in recognition of the complexity of the proposed SASframework, OET and the Bureau held a workshop to discuss the operational and functional parameters ofthe SAS.173 The workshop and associated technical papers were organized according to the followingfocus areas: (1) General Responsibilities and Composition of the SAS; (2) SAS Functional Requirements;(3) SAS Monitoring and Management of Spectrum Use; and (4) Issues related to the Initial Launch andEvolution of the SAS and Band Plan.17494.While commenters and workshop presenters submitted a diverse set of positionsregarding the necessary features of the SAS, most agreed that an effective SAS would need to be more167 See FCC, ''Whitespace Database Administrator Guide,'' available at: http://www.fcc.gov/encyclopedia/white-space-database-administrators-guide (last visited February 20, 2014).168 See Office of Engineering and Technology Invites Proposals from Entities Seeking to be Designated TV BandDevice Database Managers, ET Docket No. 04-186, Public Notice, 24 FCC Rcd 14136 (OET 2009). Theinformation requested in the Public Notice was based on rules for TVWS databases and administrators adopted inUnlicensed Operation in the TV Broadcast Bands Additional Spectrum for Unlicensed Devices Below 900 MHz andin the 3 GHz Band, ET Docket No. 04-186, ET Docket No. 02-380, Second Report and Order and MemorandumOpinion and Order, 23 FCC Rcd 16807 (2008).169 See Unlicensed Operation in the TV Broadcast Bands Additional Spectrum for Unlicensed Devices Below 900MHz and in the 3 GHz Band, ET Docket No. 04-186, ET Docket No. 02-380, Order, 26 FCC Rcd 554 (OET 2011).170 See id. at 556-57 and 559-60, ¶¶ 9-10 and 15-19.171 See supra section III(A)(1)(f)(vi).172 See 3.5 GHz NPRM 27 FCC Rcd at 15625-28, ¶¶ 95-108; Licensing PN, 28 FCC Rcd at 15313, ¶¶ 41-43.173 See SAS Workshop Agenda PN.174 See id. SAS Papers PN.29
- Federal Communications Commission
- dynamic and responsive than the current TVWS database.175 Moreover, many commenters agreed that theFCC should set only baseline parameters and guidelines for the SAS and should allow industrystakeholders to develop detailed policies and standards to facilitate operation consistent with theCommission's rules.176 Some commenters that supported a two-tiered licensing model also advocated asimplified, ''binary'' SAS that would only inform Priority Access Licensees whether or not they couldoperate in a given area or frequency range without causing harmful interference to incumbents.177 Othercommenters opposed giving the SAS the ability to dynamically assign channels or modify the maximumallowable transmit power for CBSDs.17895.After thorough review of the record and using the TVWS rules as a guide, we proposethat authorized SASs would perform the following core functions:· Determine the available frequencies at a given geographic location and assign them to CBSDs;· Determine the maximum permissible radiated transmission power level for CBSDs at a givenlocation and communicate that information to the CBSDs;· Register and authenticate the identification information and location of CBSDs;· Enforce Exclusion Zones to ensure compatibility between Citizens Broadband Radio Serviceusers and incumbent federal operations;· Protect Priority Access Licensees from harmful interference from General Authorized AccessUsers;· Reserve the use of GAA channels for use in a CAF;· Ensure secure transmission of information between the SAS and CBSDs.17996.Under our proposal, each SAS would provide nationwide service. Each SAS would alsocollect and retain all information provided by CBSDs and Incumbent Users according to the proposedrules and enforce robust security protocols to protect such information.180 If multiple SASs areauthorized, each SAS would be responsible for sharing this information with other authorized SASs toensure effective coordination of operations within the band. The proposed rules outline the essentialrequirements for a successful SAS and would promote innovation and productive use of the 3.5 GHzBand. Further, these rules represent the lightest regulatory approach possible to accomplish the coreobjectives of the SAS.97.We seek comment on these proposed rules. Specifically, do the proposed rulesaccurately describe the necessary functions of an SAS? What additional elements, if any, should beincluded in the SAS? What responsibilities should SASs (and SAS Administrators) have to maximize useby and minimize interference among GAA users, notwithstanding any absence of interference protectionrights that may be extended to such users under our rules? How should the Commission mostappropriately discharge its Title III responsibilities in supervising these and other functions that may be175 See e.g., BLiNQ Licensing PN Comments at 14-16; WISPA Licensing PN Comments at 18-19; Google SASPaper.176 See Spectrum Bridge Response to FCC Call for Papers on Proposed 3.5 GHz Spectrum Access System in GNDocket No. 12-354 (filed December 20, 2013) (Spectrum Bridge SAS Paper); Google SAS Paper at 2-3.177 See Qualcomm Response to FCC Call for Papers on Proposed 3.5 GHz Spectrum Access System in GN DocketNo. 12-354 (filed January 3, 2014) (Qualcomm SAS Paper); NSN SAS Paper.178 See AT&T Licensing PN Reply Comments at 4-5 (Supporting fixed channel assignments for PALs); T-MobileSAS Paper.179 See Appendix A, §§ 96.43 '' 96.48.180 See id., §§ 96.44 and 96.47 - 96.48.30
- Federal Communications Commission
- delegated to the SASs and SAS Administrators? Are the proposed rules unduly burdensome for potentialSAS Administrators? Could a compliant SAS be built and operated using existing or ''in development''technology?98.In addition, under this proposal multiple SASs could be authorized, much as multipledatabases have been authorized in the TVWS context,181 to ensure that consumers are provided with arobust set of choices in the marketplace. We seek comment on what techniques could be used toeffectively coordinate multiple SASs in the band? What other implementation challenges could arisefrom the possibility of multiple SAS providers? Are they solvable? We seek general comment on theproposal to authorize multiple SAS providers.(ii)Information Gathering and Retention (§ 96.44)
- 99.To protect Incumbent Users and effectively coordinate Citizens Broadband Radio Serviceusers, we propose that the SAS retain information on all operations within the 3.5 GHz Band. ForCBSDs, such information would include all data that they are required to transmit to the SAS pursuant tothe proposed section 96.36.182 For incumbent FSS operators, the SAS would maintain a record of thelocation of protected earth stations as well as the direction and look angle of all earth station receivers andany other information needed to perform its functions. For incumbent federal users, the SAS wouldinclude only the geographic coordinates of the Exclusion Zones.183 We seek comment on these proposedrules and alternative approaches.100.With regard to federal operations, if Exclusion Zones are altered or other incumbentprotection criteria implemented in future phases of this proceeding, the SAS may eventually need togather and manage a significant amount of data on federal operations. Much of this information is likelyto be sensitive or classified and would require additional safeguards that may not be necessary to protectnon-federal information. Some commenters raised the possibility of establishing a separate database tostore sensitive federal information and instruct registered SASs on the required protection contours forfederal operations.184 We seek comment on whether a separate database should be established for federalinformation. Would such a database be more efficient and secure than entrusting federal information toeach registered SAS? What additional security measures should be required for a database holdingsensitive federal information? Who should maintain such a database? We will continue to work withNTIA and incumbent federal users to develop this aspect of the SAS requirements.101.Some commenters have argued that the SAS should be required to incorporate spectrumsensing information from CBSDs or other remote beaconing and sensing sites to accurately detectincumbent usage models and respond to the interference environment.185 We seek comment on whethersuch capabilities would be helpful for the operation of the SAS.(iii)Registration and Authorization of Citizens Broadband RadioService Devices (§ 96.45)
- 102.In addition to gathering required information from CBSDs, the SAS would confirm andverify the identity of any CBSD seeking to use the 3.5 GHz Band prior to authorizing its operation. TheSAS would also prevent CBSDs from operating within any Exclusion Zones. We seek comment on theseproposed rules.181 See FCC, ''Whitespace Database Administrator Guide,'' available at: http://www.fcc.gov/encyclopedia/white-space-database-administrators-guide (last visited February 20, 2014).182 See Appendix A, § 96.36.183 See id, § 96.44 and 96.48.184 See Ericsson SAS Paper at 4-5.185 See Federated SAS Paper at 3-4; Comments of Shared Spectrum Company in Response to Licensing PN in GNDocket No. 12-354 (filed December 5, 2013) (Shared Spectrum Licensing PN Comments).31
- Federal Communications Commission
- (iv)Frequency Assignment (§ 96.46)
- 103.As discussed in section III(A)(1)(a)(7) above, under our proposal, assignment of PALchannels and GAA frequencies in the 3.5 GHz Band would be a dynamic process. The SAS would beresponsible for determining the available and appropriate frequencies at a location using the locationinformation supplied by CBSDs, compliance with Exclusion Zones, the authorization status and operatingparameters of CBSDs in the surrounding area, and such other information necessary to ensure effectiveoperations of CBSDs. The SAS would also take into consideration any channel requests submitted byCBSDs as well as geographic and spectral efficiency considerations. We also propose that the SAS beable to provide a list of available frequencies in a given area and confirm that any CBSDs causingharmful interference to an Incumbent User have been deactivated or reassigned upon request. We seekcomment on these proposed rules.(v)Security (§ 96.47)
- 104.We propose to require that the SAS employ protocols and procedures to ensure that allcommunications and interactions between the SAS and CBSDs are accurate and secure and thatunauthorized parties cannot access or alter the SAS or the list of frequencies sent to a CBSD. Theseprotocols and procedures would be reviewed and approved by the Commission before the SASAdministrator could be certified.186 We seek comment on these proposed rules and on any additionalsafeguards needed to protect sensitive federal information.(vi)Spectrum Access System Administrators (§ 96.48)
- 105.Drawing on our experience with the TVWS, we propose that SASs be operated only bydesignated SAS Administrators that have been approved by the Commission. As noted above, thisapproval process will be essential to determining that the SAS can meet the regulatory requirements,without having to provide overly prescriptive and detailed rules about its implementation.187106.To this end, we propose that SAS Administrators be required to:· maintain a regularly updated database that contains the information described in theproposed rules;· establish a process for acquiring and storing in the database necessary and appropriateinformation from the Commission's databases;· establish and follow a process for ensuring compatibility between Citizens BroadbandRadio Service users and Incumbent Users, including enforcement of Exclusion Zones;· establish and follow processes for registering and coordinating Priority AccessLicensees and GAA users;· establish and follow protocols and procedures to ensure that Incumbent Users areprotected from harmful interference from Citizens Broadband Radio Serviceoperators;· establish and follow protocols and procedures to ensure that Priority Access Licenseesare protected from harmful interference from Priority Access and GAA users;· establish and follow protocols and procedures to ensure that all communications andinteractions between the SAS and CBSDs are accurate and secure;· make its services available on a non-discriminatory basis;186 See supra section III(A)(1)(f)(vi).187 See supra section III(A)(1)(f).32
- Federal Communications Commission
- · respond in a timely manner to verify, correct or remove, as appropriate, data in theevent that the Commission or a party brings claim of inaccuracies in the SAS to itsattention;· securely transfer the information in the SAS to another designated entity in the event itdoes not continue as the SAS administrator at the end of its term;· cooperate with other SAS Administrators to develop a standardized process forcoordinating and exchanging required information;· provide a means to make public information available to the public in an accessiblemanner;· establish protocols to maintain appropriate security clearances and other securitymeasures as may be determined by the Commission for access to and storage ofrequired federal incumbent information if required in future phases of thisproceeding.188107.Under our proposed rules, SAS Administrators would be authorized to provide servicefor a five-year term, which could be renewed at the Commission's discretion. We further propose that theBureau review applications for certification and establish procedures for reviewing the qualifications ofprospective SAS Administrators. What conflict of interest requirements, competitive or other selectionprocess, technical qualifications, or other standards should govern this process? Do other modelsinvolving Commission selection of third-party assistance provide useful insights into these questions?108.We seek comment on this proposal. Do the proposed rules establish appropriatequalifications for SAS Administrators? What procedures should the Bureau adopt to select SASAdministrators, ensure that they are qualified to perform their duties, and ensure that SASs are able toperform the functions required by the proposed rules. What steps should the Commission take to ensurethat SAS Administrators are properly supervised and operating within the bounds of the law?Commenters should provide a detailed analysis, including economic costs and benefits, of any alternate orsupplemental approach they propose.(vii)Spectrum Access System Administrator Fees (§ 96.47)
- 109.We propose to allow SAS Administrators to collect reasonable fees from Priority AccessLicensees and General Authorized Access users for use of the SAS and associated services. We basedthis proposal on a similar rule adopted for TVWS database administrators.189 We seek comment on thisproposed rule. We also seek comment on whether SAS Administrators should be permitted to collect feesfrom all Citizens Broadband Radio Service users. Specifically, should SAS Administrators be permittedto collect fees from GAA users? Or should fees be collected only from Priority Access Licensees?Would limiting fees to Priority Access Licensees effectively promote diverse and innovative use of theGAA service tier? What role, if any, should the Commission play in resolving any disputes or otherissues regarding the collection of any such fees by the SAS Administrators?2.Modifications to Existing Rule Parts
- 110.In addition to the proposed new Part 96, we also seek comment on any necessaryamendments to existing rule parts, as discussed below.188 See Appendix A, § 96.48.189 See 47 C.F.R. § 47.1515.33
- Federal Communications Commission
- a.Table of Frequency Allocations (§ 2.106)
- 111.In the NPRM, the Commission requested comment on the allocation structure that shouldbe used to accommodate the Citizens Broadband Radio Service.190 The NPRM proposed to retain theprimary allocation for existing federal radar systems in the 3.5 GHz Band, while also proposing toallocate that band for non-federal fixed and mobile use. The NPRM observed that this proposed structureis consistent with international allocations for use of the 3.5 GHz Band, and also appears consistent withrequirements for the allocation of flexible use spectrum under Section 303(y) of the CommunicationsAct.191 However, the NPRM sought comment on what allocation scheme would best accomplish the goalsset forth in that NPRM, and also inquired how that scheme should account for potential Federal fixed andmobile use of the band.192112.The NPRM also proposed to restrict primary non-federal FSS earth station use in the3600-3650 MHz band to the FSS earth stations licensed or applied for as of the effective date of theReport and Order in this proceeding.193 Additionally, the NPRM noted the existence in the 3.5 GHz Bandof federal allocations for Aeronautical Radio Navigation Service and mobile ground-based radars, andstated that the Commission would work with NTIA regarding the continued need for those allocations.194Moreover, the NPRM noted the existence of a non-Federal secondary allocation for radiolocationservices, and requested comment on what existing 3.5 GHz band allocations should be maintained.195Finally, the NPRM sought comment on the potential for interference to and from existing and futureinternational operations in the 3.5 GHz Band.196113.There was limited comment on the allocation proposals per se, although the greatmajority of commenting parties support shared federal/non-federal use of the 3.5 GHz Band for newbroadband technologies.197 This suggests implicit support for adopting an allocation structure that will190 3.5 GHz NPRM, 27 FCC Rcd at 15623-25, ¶¶ 87-94.191 Id. at 15624-25, ¶ 91.192 Id. at 15624, ¶ 90.193 Id. at 15625, ¶ 92. In connection with the NPRM, the Commission also issued an order freezing applications fornew FSS earth stations more than 10 statute miles from a license earth station's coordinates. Id. at 15642-45, ¶¶154-55.194 Id. at 15625, ¶ 93.195 Id.196 Id. at 15625, ¶ 94.197 See, e.g., Comments of Microsoft Corporation in response to NPRM in GN Docket No. 12-354 (filed February20, 2013) at 2 (Microsoft NPRM Comments); Comments of Motorola Solutions, Inc. in response to NPRM in GNDocket No. 12-354 (filed February 20, 2013) (Motorola Solutions NPRM Comments) at 1-2; Comments of NokiaSiemens Networks US LLC in response to NPRM in GN Docket No. 12-354 (filed February 20, 2013) (NSN NPRM Comments) at 23; Comments of PCIA '' The Wireless Infrastructure Association and the DAS Forum, aMembership Section of PCIA in response to NPRM in GN Docket No. 12-354 (filed February 20, 2013,) at 2;Comments of Qualcomm Incorporated in response to NPRM in GN Docket No. 12-354 (filed February 20, 2013)(Qualcomm NPRM Comments)at ii; Comments of Shared Spectrum Company in response to NPRM in GN DocketNo. 12-354 (filed February 20, 2013) (Shared Spectrum NPRM Comments)at ii; Comments of T-Mobile USA, Inc.in response to NPRM in GN Docket No. 12-354 (filed February 20, 2013) at 2-3; Comments of Wi-Fi Alliance inresponse to NPRM in GN Docket No. 12-354 (filed February 20, 2013) at 2; WiMax Forum NPRM Comments at 8;Reply Comments of AT&T Services, Inc. in response to NPRM in GN Docket No. 12-354 (filed April 5, 2013) at 2;Reply Comments of Exelon Corporation in response to NPRM in GN Docket No. 12-354 (filed April 5, 2013) at 2;Reply Comments of Spectrum Bridge, Inc. in response to NPRM in GN Docket No. 12-354 (filed April 5, 2013) at1; Reply Comments of Verizon and Verizon Wireless in response to NPRM in GN Docket No. 12-354 (filed April 8,2013) at 1; Reply Comments of Wireless Internet Service Providers Association in response to NPRM in GN DocketNo. 12-354 (filed April 5, 2013) at 2.34
- Federal Communications Commission
- allow for this type of use.198 Of the commenters that explicitly discuss the allocation proposals, theUtilities Telecom Council, Edison Electric Institute, and National Rural Electric Cooperative Associationcontend that a non-federal fixed and mobile allocation of the 3.5 GHz Band would spur innovation andinvestment in new wireless technologies with little or no impact on incumbent uses, including federalradar systems, and support the proposal to restrict FSS earth station use of the 3600-3650 MHz band tothe FSS earth stations licensed or applied-for as of the effective date of the Report and Order in thisproceeding.199 SIA, however, expresses concern about the impact on FSS earth stations and contends that,if there are any small cell operations in allowed in the 3.5 GHz Band, they should be permitted only on asecondary basis.200114.We propose to add new primary fixed and land mobile allocations to the 3.5 GHz Band topermit commercial use of the band consistent with our accompanying licensing and service ruleproposals.201 The adoption of a United States allocation structure that permits that band to be used forfixed and land mobile services on a primary basis is also consistent with the approach the Commissionhas previously taken when it has determined that uses of other bands for new broadband purposes was inthe public interest.202 Moreover, the proposed allocation is consistent with the Region 2 Internationalallocation for the band.203 We do not think it serves the public interest to pursue a secondary fixed andmobile allocation, as suggested by SIA, and we will continue to propose that FSS earth stations berestricted to those that were licensed or applied for as of the effective date of the Report and Order in thisproceeding. As we observed in the NPRM, our proposed treatment of FSS earth stations is the same aswhat has previously been implemented in the 3650-3700 MHz band.204 Additionally, we note that FSSearth stations are authorized to use other nearby spectrum at 3.7-4.2 GHz on a primary basis.205 For these198 See 47 C.F.R. § 2.102(a) (stating that '''...the assignment of frequencies '... and the actual use of such frequencies'... shall be in accordance with the Table of Frequency Allocations.'').199 See UTC/EEI/NRTC NPRM Comments at 19.200 See SIA NPRM Comments at 10-12 and 21.201 We note that, while the NPRM proposed to include all mobile services in the new 3.5 GHz Band allocation, thelow-power nature of the proposed Citizens Broadband Radio Service makes it inconsistent with higher-poweraeronautical and maritime mobile uses. The United States falls under Region 2 in the International Table ofFrequency Allocations, and the Region 2 allocation for the 3.5 GHz Band is ''Mobile except aeronautical mobile.''See 47 CFR § 2.106. Thus, our proposal would be somewhat more restrictive than the Region 2 allocation, but in noway would constrain the Citizens Broadband Radio Service. In particular, we note that our proposal would notpreclude Citizens Broadband Radio Service use on-board a vessel, as such use would fall under the definition of aland mobile service rather than a maritime mobile service, provided that the subscriber was communicating througha base station '' rather than a coast station '' within the geographical limits of the United States. The two services aredefined in our rules as follows: Land Mobile Service. ''A mobile service between base stations and land mobilestations, or between land mobile stations.'' Maritime Mobile Service. ''A mobile service between coast stations andship stations, or between ship stations, or between associated on-board communication stations; survival craftstations and emergency position-indicating radiobeacon stations may also participate in this service.'' See 47 C.F.R.§ 2.1.202 For example, when the Commission found that it was in the public interest to transfer TV Channels 52-69(698-806 MHz) from broadcast use to new wireless and public safety uses, it added primary fixed and mobileallocations to the 698-806 MHz band. See Reallocation of Television Channels 60-69, the 746-806 MHz Band,ET Docket No. 97-157, Report and Order, 12 FCC Rcd 22953 (1998); and Reallocation and Service Rules for the698-746 MHz Spectrum Band (Television Channels 52-59), GN Docket No. 01-74, Report and Order, 17 FCC Rcd1022 (2002).203 The 3.5 GHz band is already allocated on a primary basis in Region 2 for fixed and mobile except aeronauticalmobile services, but in the United States it is not allocated to those services. See 47 C.F.R. § 2.106.204 See 3.5 GHz NPRM, 27 FCC Rcd at 15625, ¶ 92.205 See 47 C.F.R. § 2.106.35
- Federal Communications Commission
- reasons, providing the Citizens Broadband Radio Service a primary allocation offers important newopportunities to make robust use of our spectrum resources, and we propose appropriate technical rules toprotect existing incumbent FSS operations.115.We further observe that, with respect to the GAA tier, some commenting parties expressa preference for an unlicensed (Part 15) framework, rather than the NPRM's proposed licensed-by-ruleframework.206 We nevertheless propose to adopt a primary fixed and land mobile allocation across theentire band. Doing so could afford us the flexibility to adopt a licensing framework for all CitizensBroadband Radio Service tiers that will ensure that these operations are prioritized over existingsecondary users in the band. This could also help ensure that quality spectrum is available for GAAusers. We seek comment on this proposal and other licensing frameworks.116.In addition to proposing to add fixed and land mobile allocations to the 3.5 GHz Band inthe non-Federal Table, we propose to remove the secondary radiolocation service allocation from thatband in the non-Federal Table and to add three US footnotes (US106, US107, and US433, respectively)to: (1) permit 3.5 GHz Band non-federal stations in the radiolocation service that were licensed orapplied for prior to the effective date of any Report and Order we adopt in this proceeding to continue tooperate on a secondary basis until the end of the equipment's useful lifetime; (2) limit primary FSS use ofthe 3600-3650 MHz band to earth stations authorized prior to, or granted as a result of an application filedprior to, the effective date of any Report and Order we adopt in this proceeding, and constructed within 12months of initial authorization; and specify that FSS use of that band for all other earth stations will be ona secondary basis to non-federal stations in the fixed and land mobile services; (3) both specifyprovisions for 3.5 GHz Band federal use of the aeronautical radionavigation (ground-based) andradiolocation services, and provide for continued federal use in light of new non-federal fixed and mobileoperations in the band; and (4) prohibit federal use of airborne radar systems in the 3.5 GHz Band. Weseek comment on these proposals, including whether the potential effects on federal incumbents wouldserve the public interest.117.We also note that the NPRM sought comment on allowing federal fixed and mobile use inthe band. Should we consider permitting federal fixed and mobile operations in the 3.5 GHz Band? If so,how should such uses be effectively implemented and managed? What, if any, implications wouldfederal fixed and mobile use have for non-federal use of the band?b.Procedures for Priority Access Licenses Subject to Assignment byCompetitive Bidding (§ 1.2101 et seq
- .)118.If we adopt our proposed geographic area licensing approach for PALs that would permitthe filing and acceptance of mutually exclusive applications, we will be required to resolve suchapplications through competitive bidding consistent with the mandate of Section 309(j) of theCommunications Act.207 Accordingly, we seek comment on a number of proposals relating tocompetitive bidding for PALs in the 3.5 GHz Band.(i)Application of Part 1 Competitive Bidding Rules (§ 1.2101 etseq.
- )119.We consider here changes to the Commission's general competitive bidding rules setforth in Part 1, Subpart Q, of the Commission's rules that may be necessary or desirable to conduct anauction of initial PALs in the 3.5 GHz Band. We propose to employ the general competitive biddingrules set forth in Part 1, Subpart Q to resolve any mutually exclusive applications received for initial206 See, e.g., AT&T Licensing PN Comments at 2; Microsoft Licensing PN Comments at 5; Google Licensing PNReply Comments at 3-5; Reply Comments of Open Technology Institute of the New America Forum and PublicKnowledge in response to Licensing PN in GN Docket No. 12-354 (filed December 20, 2013) (OTI/PK LicensingPN Reply Comments) at 3.207 47 U.S.C. § 309(j)(1).36
- Federal Communications Commission
- PALs. The Commission's competitive bidding rules provide a framework from which the Commissiondevelops final procedures'--through a series of public notices with opportunities for comment'--for theparticular competitive bidding processes that it conducts. The public notice process allows both theCommission and interested parties to focus and provide input on certain details of the auction design andthe auction procedures after the rules have been established and the remaining procedural issues are betterdefined. Our experience with spectrum license auctions demonstrates the value of this approach andtherefore, we anticipate following a similar approach here. Under this proposal, any modifications thatthe Commission may adopt for its Part 1 general competitive bidding rules in the future would apply to anauction of PALs in the 3.5 GHz Band. In addition, consistent with our long-standing approach, auction-specific matters such as the competitive bidding design and mechanisms, as well as minimum openingbids and/or reserve prices, would be determined through these public notices. We seek comment on thisapproach, including the costs and benefits of this approach. We also seek comment on whether any of ourPart 1 rules would be inappropriate or should be modified for an auction for licenses in the 3.5GHz Band.(ii)Applications Subject to Competitive Bidding
- 120.To date, the Commission has considered two or more parties seeking to bid for aparticular license to present mutually exclusive applications for the license, irrespective of whether eachparty subsequently bids for the license. Where only one party seeks a particular license offered incompetitive bidding, that license will be removed from the competitive bidding process and theCommission will consider that party's non-mutually exclusive application for the license through aprocess separate from the competitive bidding.208 This has worked well with respect to defined licensesthat have parameters such as frequency and geography defined apart from and in advance of competitivebidding.121.Here we have proposed that the Commission, on an annual basis, would open windowsfor applications for available PALs. To accommodate the ability of licensees to aggregate consecutiveone-year terms, the Commission may offer multiple consecutive years of PAL rights simultaneously. Atthe close of such a window, the Commission would hold an auction to assign PALs where there aremutually exclusive applications pending. Consistent with the Commission's approach in other spectrumauctions, mutual exclusivity would be triggered when more applications are submitted than can beaccommodated geographically, temporally, and spectrally. Under our proposed licensing framework inwhich we assign PALs in an auction that offers generic (non-frequency-specific) blocks, we propose todetermine that mutual exclusivity exists when the total number of applicants for a PAL in a specificgeographic area for a given year exceeds the total number of PALs available in that geographic area forthat year. We seek comment on this proposal.(iii)Bidding Process Options
- 122.Competitive Bidding Design Options. The Commission's current rules list types ofauction designs from which the Commission may choose when conducting competitive bidding forspectrum licenses.209 These options include sequential and simultaneous auctions, single and multipleround auctions, and auctions with combinatorial bidding.210 Since the Commission's Part 1 competitivebidding rules were originally adopted, auction design has evolved and continues to evolve in newdirections, sometimes combining several of these listed auction design elements and sometimes utilizingdifferent elements.208 47 C.F.R. § 1.2102(a); see Implementation of Section 309(j) of the Communications Act - Competitive Bidding,PP Docket No. 93-253, Second Report and Order, 9 FCC Rcd 2348 at 2376, ¶ 165 (1994).209 See 47 C.F.R. § 1.2103.210 47 C.F.R. § 1.2103(a).37
- Federal Communications Commission
- 123.In the Broadcast Incentive Auction Notice of Proposed Rulemaking, the Commissionproposed to revise the current list of auction design options set forth in section 1.2103 of the rules.211 Inparticular, the Commission proposed a rule that provides for the establishment of specific auctionprocedures governing bid collection, assignment of winning bids, and the determination of paymentamounts in spectrum license auctions.212 Such auctions may use one or more rounds of bidding and/orcontingent stages of bidding; and may incorporate bids or offers that simply specify a price for an item,that indicate demand for an item at a specified price, or that are more complex. We anticipate thatprocedures established to implement these broad auction design elements would take into account soundeconomic principles and practice and the needs of the Commission and the bidders. We seek comment onwhether, in light of the licensing proposals set forth in this FNPRM, we should adopt any other oradditional revisions to section 1.2103 in addition to those proposed in the Broadcast Incentive Auctionproceeding. Given the large number of license areas and relatively short license terms envisioned forPALs, are there any auction mechanisms that would enhance the Commission's ability to effectivelymanage the use of the Priority Access tier?124.Section 1.2104 of the Commission's current rules sets forth various mechanisms that canbe used in connection with any system of competitive bidding for Commission licenses.213 For example,the rules enable the Commission to determine how to sequence or group the licenses offered;214 whetherto utilize reserve prices,215 minimum opening bids and minimum or maximum bid increments;216 whetherto establish stopping or activity rules;217 and how to determine payments required in the event of bidwithdrawal, default, or disqualification.218 We note, however, that section 1.2104 does not attempt to listexhaustively all potential aspects of the Commission's procedures for competitive bidding.125.The Commission recently proposed to amend the current stopping rule contained insection 1.2104 to permit the Commission to establish stopping rules before or during multiple roundauctions in order to terminate the auctions not only within a reasonable time, but also in accordance withthe goals, statutory requirements, and rules for the auction, including the reserve price or prices.219 Therevised stopping rule would thereby allow us to adopt criteria to determine, prior to terminating theauction, whether such requirements have been met. We seek comment on whether we should adopt anyother revisions to section 1.2104, in addition to those proposed in the Broadcast Incentive Auctionproceeding?126.Payment Rules. Our existing competitive bidding rules also establish additionalprocedures regarding the competitive bidding process. More specifically, our existing rules addressapplications to participate in competitive bidding,220 communications among applicants to participate,221211 See 47 C.F.R. § 1.2103; Expanding the Economic and Innovation Opportunities of Spectrum Through IncentiveAuctions, Docket No. 12-2678, Notice of Proposed Rulemaking, 27 FCC Rcd 12357 (BIA NPRM) at 12456, ¶¶ 298-99 (2012).212 See BIA NPRM, 27 FCC Rcd at 12456, ¶¶ 298-99.213 47 C.F.R. § 1.2104.214 47 C.F.R. § 1.2104(a)-(b).215 47 C.F.R. § 1.2104(c).216 47 C.F.R. § 1.2104(d).217 47 C.F.R. § 1.2104(e)-(f).218 47 C.F.R. § 1.2104(g). A bidder assumes a binding obligation to pay its full bid amount upon acceptance of thewinning bid at the close of an auction. 47 C.F.R. § 1.2104(g)(2).219 See 47 C.F.R. § 1.2104(e); BIA NPRM, 27 FCC Rcd at 12457, ¶¶ 300-02.220 See 47 C.F.R. § 1.2105.221 See 47 C.F.R. § 1.2105(c).38
- Federal Communications Commission
- reporting requirements, upfront payments from competitive bidding participants,222 down and finalpayments by winning bidders,223 and applications for licenses by winning bidders,224 as well as theprocessing of such applications and default by and disqualification of winning bidders.225 We seekcomment on whether these existing rules require any revisions in connection with the conduct of anauction of PALs.127.Specifically, we seek comment on whether we should revise any of our payment rules totake into consideration the proposed short license term for PALs, and the potential for applicants tobecome winning bidders for licenses that do not become effective until a year or more after the initialPAL? For instance, should we revise our upfront payment requirement to better safeguard theCommission against defaults by a winning bidder on consecutive years of a PAL? Should we require awinning bidder for consecutive years of a PAL to make a larger down payment to better safeguard theCommission from defaults in subsequent years? Currently, unless otherwise noted by public notice, theCommission's rules require that within 10 business days after being notified that it is a high bidder on aparticular license the winning bidder must submit its down payment necessary to bring its total depositsup to twenty (20) percent of its winning bid(s) or it will be deemed to have defaulted.226 Should weincrease the down payment percentage here to be forty (40) percent of the winning bid(s)? Similarly,unless otherwise specified by public notice, auction winners are required to pay the balance of theirwinning bids in a lump sum within ten (10) business days following the release of a public noticeestablishing the payment deadline.227 Here, we could collect the down payment required for each PAL atthe close of the auction, including PALs for consecutive years, but final payment(s) would not be dueuntil we are ready to grant a particular PAL at the beginning of the subsequent license term.Alternatively, in order to provide further incentives for the productive use of spectrum, could the furtherpayment be required upon initiation of service in specific PAL? Will retaining down payments on depositfor consecutive PALs, particularly if the down payment obligation for such PALs is increased, help theCommission safeguard against the potential of default in subsequent years? Are there any statutory orother legal considerations that the Commission should consider in designing payment rules toaccommodate these proposals?128.We also seek comment on whether we should revise our default rule to ensure that if awinning bidder wins PALs in a licensing area for consecutive years and defaults on a payment obligationfor a PAL in that area, it loses its ability to be granted a license for any winning bids for PALs in that areain any subsequent year, and is considered to be in default on those winning bids? Would such a defaultprovision ensure that a winning bidder could not game the results of an auction by bidding uponconsecutive year PALs only to seek to selectively pay for some but not others of those bids at a later date?In situations where the Commission has determined that a bidder's default might have a greater potentialto detrimentally impact the integrity of an auction, it has adopted a higher default percentage to serve asdeterrent against such an outcome. 228 If we hold an auction that offers individual PALs for severalconsecutive years, should we hold a winning bidder for such licenses who defaults on its winning bidsresponsible for a larger default payment? What percentage of the defaulted bid should be assessed as theadditional payment portion of the default payment obligation? Should the amount of the additionalpayment be greater than the percentage prescribed in our rules for defaults on combinatorial bids?222 See 47 C.F.R. § 1.2106.223 See 47 C.F.R. § 1.2107.224 See id.225 See 47 C.F.R. § § 1.2107; 1.2109.22647 C.F.R. § 1.2107.227 47 C.F.R. § 1.2109.228 See 47 C.F.R. § 1.2104(g)(2)(ii).39
- Federal Communications Commission
- 129.Would such a default rule adequately safeguard the Commission should a winning bidderfile bankruptcy between the close of an auction and the date of a future payment obligation? Commentersshould address in particular the application of the Bankruptcy Code's requirement that an agency ''maynot deny, revoke, suspend, or refuse to renew a license . . . or other similar grant to,'' or ''discriminatewith respect to such a grant against,'' a debtor or a bankrupt ''solely because'' it ''has not paid a debt that isdischargeable'' in bankruptcy.229 In other contexts, the Commission has addressed its potential financialrisks arising out of the bankruptcy of a winning bidder by requiring appropriate letters of credit for eachwinning bid.230 However, these bids were for Mobility Fund Phase I financial support rather than forspectrum licenses, and thus did not pose the risk of being unable to re-auction and put to more efficientuse the spectrum licensed to an entity that later files for bankruptcy. Would the Commission be restrictedby the bankruptcy laws in its efforts to recover and re-auction spectrum won by a defaulting bidder thathad filed for bankruptcy? Would the costs of obtaining a letter of credit be reasonable in light of theexpected value of the spectrum? Would a payment bond be equally effective in giving financial securityto the Commission and protecting the Commission from a winning bidder's bankruptcy? Could bids beaggregated for purposes of issuing a letter of credit, without jeopardizing the Commission's ability torecover the auction amounts and any reasonable penalty associated from default? Would the benefits ofour proposed annual payment mechanism outweigh the risks in bankruptcy and the associated costs?130.Further, we seek comment regarding whether we should amend any of our other Part 1rules to accommodate our proposals for assigning PALs and facilitate more frequent auctions and thedynamic auction mechanisms that may be required? For example, are there any changes that we shouldmake to the auction application process or the information that we collect from applicants to participate inan auction of PALs? Do we need to amend any of our rules regarding prohibited communications for anauction that offers generic spectrum blocks? In considering our proposed licensing model, are there anyparticular aspects of the administration of auctions of PALs with which SAS Administrators or anotherthird party could be effective in assisting the Commission, consistent with its statutory responsibilities? 231131.Bidding Credits. In authorizing the Commission to use competitive bidding, Congressmandated that the Commission ''ensure that small businesses, rural telephone companies, and businessesowned by members of minority groups and women are given the opportunity to participate in theprovision of spectrum-based services.''232 One of the principal means by which the Commission furthersthese statutory goals is the award of bidding credits to small businesses. To award these bidding credits,the Commission defines eligibility requirements for small businesses on a service-specific basis, takinginto account the capital requirements and other characteristics of each particular service in establishing229 See 11 U.S.C. § 525(a).230 See 47 C.F.R. § 54.1007; GCI Communication Corp. Waiver of Section 54.1007(a) of the Commission's Rules,Order, 28 FCC Rcd 15874 (WTB Nov. 21, 2013); See also Connect America Fund; A National Broadband Plan forOur Future; Establishing Just and Reasonable Rates for Local Exchange Carriers; High-Cost Universal ServiceSupport; Developing an Unified Intercarrier Compensation Regime; Federal-State Joint Board, WC Docket No. 10-90, GN Docket No. 09-5, WC Docket No. 07-135, WC Docket No. 05-337, CC Docket No. 01-92, CC Docket No.96-45, WC Docket No. 03-109, WT Docket No. 10-208, Report and Order and Further Notice of ProposedRulemaking, 26 FCC Rcd 17663, 17812 ¶ 449 (2011) (''It is well established that an LOC and the proceedsthereunder are not property of a debtor's estate under section 541 of Title 11 of the [Bankruptcy Code].'').231 See Licensing PN, 28 FCC Rcd at 15309, ¶ 25.232 See 47 U.S.C. § 309(j)(4)(D). Such entities are collectively described as ''designated entities.'' See 47 C.F.R.§ 1.2110(a). In addition, section 309(j)(3)(B) of the Act provides that in establishing eligibility criteria and biddingmethodologies, the Commission shall promote ''economic opportunity and competition . . . by avoiding excessiveconcentration of licenses and by disseminating licenses among a wide variety of applicants, including smallbusinesses, rural telephone companies, and businesses owned by members of minority groups and women.'' 47U.S.C. § 309(j)(3)(B).40
- Federal Communications Commission
- the appropriate threshold.233 Bidding credits have proven an effective means to allow small businesses tocompete with larger, more well-established companies. However, we also note that in deciding whetherto offer bidding credits, the Commission takes into account both the nature of the service and the natureof the parties most likely to be interested in using the spectrum.132.Many of our proposals for PALs envision more flexible and dynamic auction andlicensing mechanisms for effective and administratively streamlined management of the Priority Accesstier. We anticipate that the robust licensing and spectrum access models we propose could serve to ensurethat small businesses are given the opportunity to participate in the provision of the Citizens BroadbandRadio Service. We therefore seek comment on whether awarding bidding credits in the CitizensBroadband Radio Service would be necessary to ensure the participation of small businesses incompetitive bidding.234 Would our proposals to offer numerous licenses within relatively smallgeographic licensing areas, and our proposals to cap the number of licenses any particular entity may holdin a license area adequately promote the dissemination of licenses among a wide variety of applicants,including small businesses and rural telephone companies?235 Likewise, will the one-year license termand the size of the license area we propose make it more likely that small businesses will be able toeffectively compete for a PAL and the opportunity to participate in the provision of Priority Accessservice? Do the unique characteristics of this service reduce the likelihood that small businesses will facebarriers in gaining accessing to capital? We request that commenters address the expected capitalrequirements for service in this band and other characteristics of the service. We invite commenters touse comparisons with other services for which the FCC has already established auction procedures as abasis for their comments regarding whether we should adopt small business size standards and biddingcredits for PALs and if so, the appropriate small business size standards. Moreover, to the extent thatcommenters propose provisions to ensure participation by minority-owned or women-owned businesses,they should address how such provisions should be crafted to meet the relevant standards of judicialreview.236133.We note that under our existing Part 1 rules, a winning bidder for a PAL will be eligibleto receive a bidding credit for serving a qualifying tribal land within that market, provided that it complieswith the applicable competitive bidding rules.237 We seek comment on whether any revisions to our rulesgoverning eligibility for or implementation of Tribal land bidding credits are necessary for PALs. Inaddition, the Commission currently has under consideration various provisions and policies intended topromote greater use of spectrum over tribal lands.238 We seek comment regarding whether any rules andpolicies adopted in that proceeding should apply to any licenses that may be issued through competitivebidding in a PAL auction. We also note that the award of bidding credits can be an administrativelyintensive process, requiring verification of eligibility and other aspects of the application. We seekcomment on whether the relative costs of this process are greater in the context of highly granular PALs233 See 47 C.F.R. § 1.2110(c)(1); Implementation of Section 309(j) of the Communications Act'--CompetitiveBidding, PP Docket No. 93-253, Second Memorandum Opinion and Order, 9 FCC Rcd 7245 at 7269, ¶ 145 (1994).See also Amendment of Part 1 of the Commission's Rules '' Competitive Bidding Procedures, WT Docket No. 97-82, ET Docket No. 94-32, Third Report and Order and Second Further Notice of Proposed Rulemaking, 13 FCCRcd 374 at 388, ¶ 18 (1997).234 See 47 U.S.C. §309(j)(4)(B).235 Id.236 Adarand Constructors Inc. v. Pena, Secretary of Transportation, 515 U.S. 200 (1995) (requiring a strict scrutinystandard of review for Congressionally mandated race-conscious measures); United States v. Virginia, 518 U.S. 515(1996) (applying an intermediate standard of review to a state program based on gender classification).237 See 47 C.F.R. §1.2110(f)(3).238 Improving Communications Services for Native Nations by Promoting Greater Utilization of Spectrum overTribal Lands, WT Docket 11-40, Notice of Proposed Rulemaking, 26 FCC Rcd 2623 (2011) (Tribal Lands NPRM).41
- Federal Communications Commission
- as compared to more traditional FCC licenses for large geographic areas and license terms. We also seekcomment on the degree to which the administrative process for bidding credits might be reasonablyautomated to reduce transaction costs.134.Commission Notices. Upon the conclusion of spectrum license auctions, the Commissiontypically issues a public notice declaring the bidding closed and identifying the winning bidders. Wepropose to do so for the PAL auction. We invite comment on this proposal and ask commenters toaddress whether there are any other issues we should consider with respect to notifying auctionparticipants and the public of the auction results.c.Secondary Markets
- 135.We seek comment on the extent to which our existing secondary market rules (both forlicense transfers and for leases) might be appropriately modified with respect to the secondary market forPALs in the 3.5 GHz Band. Commenters had varied opinions about the frequency with which we shouldconduct auctions for PALs. Some commenters argued for more frequent auctions so as to accommodatechanges in market demand for PALs.239 Others noted that the development of a robust secondary marketin the 3.5 GHz Band would be beneficial for potential Priority Access Licensees.240 We emphasize that,while auctions are a mode of initial assignment, the secondary market could provide a viable means ofmatching supply and demand in units more granular than our proposed PAL structure. Indeed, we areinterested in the possibility that one or more spectrum exchanges, operating pursuant to our secondarymarket rules, could facilitate a vibrant and deep market for PAL rights.241 Such an exchange couldimprove the ability of individual licensees to obtain micro-targeted (in geography, time, and bandwidth)access to priority spectrum rights narrowly tailored to their needs on a highly customizable, fluid basis.We note that any spectrum exchange would be subject to the requirements of Section 310(d) of theCommunications Act and other relevant statutory provisions.242 To the extent that commenters agree withthis concept, we request specific and focused comment on any necessary changes to our Part 1 rules tofacilitate the secondary market for PALs in the 3.5 GHz Band. We are particularly interested inmodifications that could reduce transaction costs and allow increased automation of transfer and leaseapplications. What would such a spectrum exchange entail? What legal, technical, or logistical issuescould be raised by this proposal?B.
- 136.In addition to the proposed rules described above, several other issues implicated by thisproceeding would benefit from additional, focused comment. We seek further, focused comment on thefollowing issues, and request that commenters provide suggested rules or other specific approaches toimplement any proposals they put forward:· Interference protection for federal incumbents;· Interference protection for CBSDs from federal radar transmissions;· Interference protection for in-band FSS operations;· Interference protection for FSS earth stations in the C-Band; and239 Google Licensing PN Comments at 19-20; Reply Comments of Google, Inc. in response to NPRM (filed April 5,2013) at 12; Federated Licensing PN Comments at 11-12; Comments of Telecommunications Industry Associationin response to NPRM in GN Docket No. 12-354 (filed February 20, 2013) (TIA NPRM Comments) at 5.240 See Alcatel Lucent Licensing PN Comments at 6-7; TIA NPRM Comments at 5; Cantor Fitzgerald TelecomServices, LLC, GN Docket No. 12-354, ex parte (filed July 31, 2013) (Cantor Ex Parte).241 See Cantor Ex Parte.242 47 U.S.C. § 310(d).42
- Federal Communications Commission
- · The potential integration of the 3650-3700 MHz band into the Citizens Broadband RadioService.1.Protections for Federal Incumbent Access Tier Users
- 137.In the NPRM, the Commission requested comment on measures that would optimize theuse of spectrum while protecting both incumbent operations and prospective users of the band.Incumbent operations of this band include high-powered DoD radar systems using ground-based,shipboard, and airborne platforms, as well as non-Federal FSS earth stations used for receive-only, space-to-earth operations and feeder links.243138.In its Fast Track Report, NTIA concluded that geographic separation and frequencyoffsets could be used to minimize interference between commercial networks and ground-based, airborne,and shipborne radar systems currently operating in the 3.5 GHz Band. However, NTIA's analysisindicated that it would be necessary to put in place extensive exclusion zones to prevent incumbentoperations and broadband wireless systems from causing interference to each other. NTIA concluded thateffective exclusion zone distances around ground-based and airborne radar systems would extendapproximately one to 60 kilometers, coupled with frequency offsets of 40 or 50 megahertz,244 whileexclusion zones around certain high-power shipborne Naval radars would require over-land separationdistances of several hundred kilometers.245 NTIA acknowledged, however, that its analysis assumeddeployment of high power, macrocell networks, and stated that its conclusions would require revision tothe extent the Commission proposes to implement systems with different technical characteristics.246139.In the NPRM, the Commission noted that the large exclusion zones and limited signalpropagation in the 3.5 GHz Band weighed against the use of macrocell deployment in the band. Instead,the Commission stated that the use of the 3.5 GHz Band could be significantly increased throughspectrum sharing and application of small cell technology. The Commission therefore proposed thecreation of the Citizens Broadband Radio Service premised on 1) technical rules that focused on the useof low-powered small cells, and 2) the use of a dynamic SAS to manage users of the band. In light of thesmall cell deployment model, the Commission noted that some of the assumptions made in the Fast TrackReport's analysis regarding the requisite exclusion zone distances would not apply and would need to berevisited.247 The Commission indicated that it may be possible to reduce any exclusion zones throughtechnical and operational parameters for small cells in combination with an effective SAS and otherinterference mitigation techniques. The Notice therefore requested technical analysis as to howapplication of small cell and access management technologies may impact interference to and fromincumbent 3.5 GHz Band users as well as the size of exclusion zones necessary to ensure compatibilitywith incumbent and prospective users of the band.248140.Many of the comments filed in response to the Notice supported the tentative conclusionthat the size of Exclusion Zones as estimated by NTIA should be re-evaluated given the proposal to applythe small cell model.249 We note that the Exclusion Zones were a condition for the Executive Branch243 See Fast Track Report at 3-30 '' 3-33. See also 3.5 GHz NPRM, 27 FCC Rcd at 15602-15605, ¶¶ 22-28(discussion of entities operating in the 3.5 GHz and adjacent bands).244 Id. at 5-3 '' 5-4.245 Id. at 5-6, Table 5-4. See also 3.5 GHz NPRM, 27 FCC Rcd at 15633 ¶ 118.246 Fast Track Report at 1-7.247 3.5 GHz NPRM, 27 FCC Rcd at 15633, ¶ 118.248 Id. at 15618, ¶ 68.249 See e.g., Comments of AT&T Services, Inc. in response to NPRM in GN Docket No. 12-354 (filed February 20,2013) at 12; Comments of the Consumer Electronics Association in response to NPRM in GN Docket No. 12-354(filed February 20, 2013) at 8; Comments of InterDigital in response to NPRM in GN Docket No. 12-354 (filed(continued'....)43
- Federal Communications Commission
- agreeing to provide access to this spectrum for non-federal use.250 As a starting point for continuedanalysis and discussion, we propose to implement the geographic Exclusion Zones proposed in the FastTrack Report.251 Nevertheless, preliminary studies have been performed on the potential effects of smallcells on radar operations, with additional studies planned, that could lead to a reduction in ExclusionZones in the near future.252 We also note that the rules proposed in this FNPRM contemplate additionaluses other than small cells, with varying maximum transmit power levels and antenna gains, which mustfactor into the consideration of Exclusion Zones.141.We are continuing our dialogue with NTIA and the federal agencies on this matter and, ifpossible, plan to reduce the Exclusion Zone distances from the instant proposal based on the Fast TrackReport, which distances, we emphasize, we propose as a starting point for further analysis. We intend towork collaboratively and expeditiously with NTIA and other relevant federal agencies on this project.We emphasize that important technical studies involving federal agencies, industry, and academia areunderway and will likely provide data that will be informative in determining whether and to what extentthe size of the Exclusion Zones can be reduced. If there are further developments that would enable areduction in the size of the Exclusion Zones, we encourage participants to file them in the record toensure that there is sufficient opportunity for public comment prior to issuance of a Report & Order inthis proceeding. We will also consider any data and studies submitted in this proceeding in our ongoingdiscussions with NTIA and other federal agencies on this topic.142.Additionally, in the NPRM, the Commission stated that GAA use could be allowed inareas where small cell operations would not cause harmful interference to Incumbent Access tier users butwhere signals from incumbent users could possibly interfere with GAA uses.253 However, the NPRMnoted that Priority Access users, which have quality-of-service expectations, would only be permittedwhere CBSD operations would not interfere with incumbent operations, and where harmful interferencewould not be reasonably expected from Incumbent Access tier operations.254 It may eventually bepracticable to authorize coordinated operations for GAA '' and possibly Priority Access - tier users insidethe proposed Exclusion Zones. We anticipate such use would involve a level of dynamic access to thespectrum and would be authorized through the SAS. However, adding this kind of dynamic element tothe SAS raises many technical and operational questions that are not ripe for resolution at this time.Accordingly, we will explore the topic of dynamic coordinated access within the Exclusion Zones (i.e.,converting Exclusion Zones to protection zones) in future phases of this proceeding.255 We seek commenton allowing Citizens Broadband Radio Service operations within currently designated Exclusion Zonesand encourage commenters to submit technical analyses to support their positions.(Continued from previous page)February 20, 2013) at 3-4; Motorola Solutions NPRM Comments at 7; NSN NPRM Comments at 22-23; QualcommNPRM Comments at 16-17; Shared Spectrum NPRM Comments at 3-4; TIA NPRM Comments at 3; Comments ofthe National Cable and Telecommunications Association in response to NPRM in GN Docket No. 12-354 (filedFebruary 20, 2013) at 10.250 See Fast Track Report 1-6 '' 1-7 and 5-3 '' 5-8.251 See Fast Track Report at 5-6, Table 5-4; See also 3.5 GHz NPRM, 27 FCC Rcd at 15633 ¶ 118.252 See Qualcomm NPRM Comments at 16-18; Jeffrey H. Reed, Charles Clancy, Virginia Tech (sponsored byNSWC Dahlgren Division), Measurement Results for Radar and Wireless System Coexistence at 3.5 GHz,(presented January 14, 2014), available at: http://wireless.fcc.gov/workshops/sas_01-14-2014/end/Reed-VA_TECH.pdf; Frank Sanders, Robert Sole, and John Carroll, NTIA, Effects of Pulsed Radar Waveforms on LTE(TDD) Receiver Performance (presented January 14, 2014), available at: http://wireless.fcc.gov/workshops/sas_01-14-2014/end/Sanders-NTIA.pdf.253 3.5 GHz NPRM, 27 FCC Rcd at 15614, ¶ 59.254 Id. at 15618, ¶ 70.255 See Appendix A.44Federal Communications Commission
- 2.Protections for Citizens Broadband Radio Service Devices from FederalRadar Systems
- 143.While the proposed Exclusion Zones will prevent interference from radar systems intoCBSDs, the possibility of future CBSD operations in close proximity to high power federal radar systemsmay require that Priority Access Licensees and GAA users take reasonable measures to protect theirCBSDs from these high powered operations. Radar systems operating at the power levels described inthe NTIA Fast Track Report256 could lead to peak field strengths in excess of 180 dBuV/m (~33 dBm) atline of sight distances of approximately 1 km.257 We also recognize that modern receiver technologiesincorporate Surface Acoustic Wave / Bulk Acoustic Wave filters that may have peak input power limits inthe range of 10 dBm to 33 dBm. To ensure that end users are not adversely affected by the hard failure ofreceiver components due to interference from such radars, we propose that CBSDs must be capableaccept interference in authorized areas of operation up to a peak field strength level of 180 dBuV/m. Weseek comment on these proposals and ask that commenters support their proposals with detailed technicalanalyses. How would such a requirement impact the design and cost of equipment for this band?Alternatively, are there measures that licensees can take to minimize the potential of receivinginterference from federal incumbent operations?144.In addition to the high-power interference effects discussed in the previous paragraph,pulsed radar signals can also cause degradation of CBSD receiver performance. NTIA recentlyperformed measurements to examine the impact of pulsed radar signals on digital receiver performance.258Three receiver parameters were examined: (1) data throughput rates; (2) block error rates; and (3) internalnoise level. These performance parameters were measured as a function of radar pulse parameters andthe incident power level of radar pulses. We seek comments on how the NTIA report can be used todevelop thresholds for CBSD receivers to be used in assessing potential interference from federalincumbent operations.3.Protections for Fixed Satellite Service Earth stations
- a.Earth Stations in the 3.5 GHz Band
- 145.As noted in the NPRM, the Commission has licensed primary FSS earth stations toreceive on frequencies in the 3600-3650 MHz band in 37 locations.259 Currently, FSS earth stationfacilities in 32 cities are authorized to receive in the 3625-3650 MHz sub-band, and Vizada, Inc. operatestwo gateway earth stations (located northeast of Los Angeles and New York City) that provide feederlinks for Inmarsat's L-band mobile-satellite service system.260 While the Commission directed theInternational Bureau to cease accepting applications for new earth stations in the 3.5 GHz Band in anorder accompanying the NPRM, these existing stations would be included in the Incumbent Use tier andafforded protection from lower-tier operations in the proposed Citizen's Broadband Radio Service.261256 See Fast Track Report at 4-59 to 4-69, ship radars #1 - #5. Peak radar transmit power levels vary depending onthe type of radars, up to 98 dBm for ship radar #3, main beam antenna gain 41.8 dB, with 3.4 dB transmit antennainsertion loss.257 Id. at 4-63, Ship radar #3, Peak transmit EIRP = 98 dBm '' 3.4 + 41.8 dBi = 136.4 dBm. Free space path loss at 1km (in dB, = 20 log (4/ ) '
103.6 dB at 3600 MHz), resulting in peak power at 1km = 136.4 dBm '' 103.6 =32.8 dBm, approximately 1 watt. 1 km is chosen in this calculation as an approximation of a minimum coupling lossdistance. 180 dBuV/m at 3600 MHz '
31.7 dBm.258 Department of Commerce, National Telecommunications and Information Administration, NTIA Report 13-499,Effects of Radar Interference on LTE Base Station Receiver Performance (Dec. 2013).259 See 3.5 GHz NPRM, 27 FCC Rcd at 15642-43and 15647-48, ¶¶ 154-55 and Appendix A.260 See id. at 15647-48, Appendix A for a complete list of these FSS earth stations.261 See id. at 15642-43, ¶¶ 154-55.45
- Federal Communications Commission
- 146.The NPRM also sought extensive comment on appropriate interference protection andmitigation strategies for incumbent FSS earth stations.262 Specifically, the NPRM sought comment onwhether geographic protection zones would be necessary to protect existing FSS earth stations fromharmful interference.263 Commenters offered a variety of perspectives on these questions in the record.147.Notably, SIA filed several comments and letters arguing that the Commission shouldallow small cell operations in the 3.5 GHz Band only if it can show that in-band and C-Band satelliteservices will be protected from interference and asking the Commission to lift the freeze on earth stationapplications in the band.264 SIA also submitted a technical analysis that indicated that in-band FSS earthstations would require protection distances of up to 107.4 km to mitigate long-term interference and 487km to mitigate short-term interference.265148.On September 3, 2013, Google made an ex parte submission addressing potentialinterference from proposed Citizens Broadband operations into existing in-band and out-of-band satelliteearth stations.266 With regard to grandfathered FSS earth stations in the 3.5 GHz Band, Google assertsthat these earth stations can be protected by the SAS through a combination of coordination, spectralseparation, and protection zones.267 Google also asserts that SIA's submission overstates the potential forinterference from CBSDs into in-band FSS earth stations.268 According to Google, these overstatementsare largely due to inappropriate assumptions about terrain, small cell emissions output, and typical smallcell power levels as well as a reliance on an ITU interference protection standard that was not intended toapply in this context.269149.Harris Corporation filed comments encouraging the Commission to extend the IncumbentAccess tier to include satellite earth stations and incumbent teleport stations in the adjacent 3650-3700MHz band and limit mobile and itinerant commercial use of the 3.5 GHz Band.270 Baron Services, Inc.(Baron) also filed comments encouraging the Commission to adopt rules that would protect S-bandweather radar systems with equipment authorizations in the 3.5 GHz Band.271 To accomplish this, Baronsuggests that the Commission enforce substantial exclusion zones around S-band radar installations andimpose strict OOBE limits on Citizens Broadband Radio Service base stations and handsets.272 As statedabove, the proposed Citizens Broadband Radio Service would be co-primary with existing incumbent262 See id. at 15635-36, ¶¶ 124-127.263 Id.264 See SIA NPRM Comments; Reply Comments of Satellite Industry Association in response to NPRM in GNDocket No. 12-354 (SIA NPRM Reply Comments); Comments of Satellite Industry Association in response toLicensing PN in GN Docket No. 12-354 (filed December 5, 2013) (SIA Licensing PN Comments); Reply Commentsof Satellite Industry Association in response to Licensing PN in GN Docket No. 12-354 (filed December 20, 2013)(SIA Licensing PN Reply Comments); Letter from Patricia Cooper, President, Satellite Industry Association toMarlene Dortch in GN Docket No. 12-354, Ex Parte (filed February 3, 2014) (SIA February 2014 Letter).265 See Letter from Satellite Industry Association to Marlene Dortch, ex parte, GN Docket No. 12-354 (filed August20, 2013) (SIA August 2013 Letter); Satellite Industry Association, Sharing Considerations Between Small Cellsand Geostationary Satellite Networks in the Fixed-Satellite Service in the 3.4-4.2 GHz Frequency Band, ex parte,GN Docket No. 12-354 (filed August 20, 2013) (SIA Earth Station Interference Study) at 4.266 See Google Letter and Marshall Declaration.267 See Google Letter at 7.268 Id. at 8.269 Id. SIA responded to Google's assertions in its February 2014 letter. See SIA February 2014 Letter.270 See Harris NPRM Comments at 3-7.271 See Baron NPRM Comments.272 See id. at 4-8.46
- Federal Communications Commission
- operations and would supersede existing secondary uses of the band in the table of allocations.273 At thistime, as stated above, we do not believe that it would be in the public interest to grant Incumbent Accesstier status to current or planned non-federal secondary radiolocation operations in the band.150.We propose to require CBSDs to avoid causing harmful interference to currentlyoperational grandfathered FSS earth stations. It may be possible to minimize or eliminate geographicprotection areas around FSS earth stations by incorporating detailed information on the ''look angles'' ofFSS earth stations, the emissions characteristics of CBSDs and End User Devices, detailed regionaltopographical information, and other relevant variables into the SAS. An analytic model of expectedaggregate power-flux density could be used by the SAS to authorize operations to ensure that aggregatepower-flux density interference limits are not exceeded, over a specified probabilistic function. Can aComplementary Cumulative Distribution Function (CCDF) of the aggregate power flux density be usedfor this purpose? We seek comment on the necessity of geographic protection areas and, if necessary, thesize of such areas. We also seek comment on additional or alternative mitigation strategies that could beemployed to prevent harmful interference to FSS earth stations from CBSDs. What criteria should theSAS incorporate to ensure that FSS earth stations are protected while maximizing the areas available forCitizens Broadband Radio Service operations? How would the SAS manage this data?151.We also seek comment on protection approaches other than protection areas. Forexample, we are interested in whether field strength, power-flux density, or some other technical metric,measured in relation to the earth station's technical configuration (antenna characteristics, etc.) mightprovide FSS earth stations with adequate protections while maximizing the available geographic area andbandwidth for Citizens Broadband Radio Service Users. To the extent such an approach is dependentupon operation of the SAS, we seek comment on what functionalities would need to be required by ruleand what functionalities could be specified through other means (e.g., industry standards, multi-stakeholder groups, etc.). Again, we request that parties provide specific and actionable suggestions inproviding comments on this issue, including the potential costs and benefits of these approaches.b.Earth Stations in the C-Band
- 152.In addition to protections for FSS earth stations in the 3.5 GHz Band, we soughtcomment on the degree to which the performance of FSS receivers in the C-Band could be affected byCitizens Broadband Radio Service users. 274 We also sought comment on methods for mitigating potentialharmful interference from Citizens Broadband Radio Service operations into these receivers. Partiessubmitted multiple comments, presentations, and technical analyses related to this issue. Thesesubmissions relied on very different assumptions about CBSDs, the capabilities of the SAS, receiverperformance, and other technical criteria and, as a result, commenters reached very different conclusionsregarding the need for protection for C-Band earth stations.153.Notably, a coalition of media companies and trade organizations, including FoxEntertainment Group, Inc., Time Warner Inc., Viacom Inc., the Walt Disney Company, CBS Corporation,and the National Association of Broadcasters (NAB) (jointly, Content Interests) filed jointly to encouragethe Commission to study the potential for interference into C-Band satellite operations before consideringcommercial operations in the 3.5 GHz Band.275 Their filings included technical reports from Comsearch273 See supra section III(A)(2)(a).274 See 3.5 GHz NPRM, 27 FCC Rcd at 15635-36, ¶¶ 124-127.275 See National Association of Broadcasters, News Corporation, Time Warner Inc., Viacom Inc., CBS Corporation,and The Walt Disney Company, ex parte, GN Docket No. 12-354 (Content Interests Letter) and Attachment A,Comsearch, ''Estimating the Required Separation Distances to Avoid Interference from Citizens Broadband RadioService Transmitters into C-Band Earth Stations'' (Comsearch Report) (filed May 8, 2013); Reply Comments ofCBS Corporation, the National Association of Broadcasters, Fox Entertainment Group Inc., Time Warner Inc.,Viacom Inc., and The Walt Disney Company response to NPRM in GN Docket No. 12-354 (Content Interests(continued'....)47
- Federal Communications Commission
- and Alion Science and Technology (Alion) that concluded that C-Band earth stations would requiresignificant geographic protection from CBSDs.276 Alion asserts that separation distances ranging from600 meters to 9 Km277 would be required to protect C-Band earth station locations with appropriate filtersinstalled while unfiltered sites would require 19 to 33 Km separation distances.278 The separationdistances would increase to 14 to 28 Km for filtered sites if the full 3550-3700 MHz band is utilized.279154.The Comsearch Report largely comports with Alion's findings. Comsearch noted thatthe 43+10 log (P) dB OOBE limit proposed in the NPRM is equivalent to OOBE of -13 dBm/MHz (-43dBW/MHz), the same as the International Telecommunication Union (ITU) and LTE-Advanced (LTE-A)baseline ''Category A'' limits.280 Comsearch suggests that adopting the ITU's more stringent ''CategoryB'' limit for OOBE would significantly reduce required protection zones around C-Band earth stations.281According to Comsearch, interference could occur at a range of up to 47.6 km from C-Band receiverswith typical separation distances of 5.1 km if Category A devices are authorized by the Commission.282The typical separation distance would be reduced to 0.7 km if devices are limited to Category B emissionlimits.283155.SIA's comments also addressed protection criteria for C-Band earth stations.284 SIA'stechnical analysis indicated that C-Band earth stations would require protection zones of up to 36.4 km toprotect them from OOBE in the 3.5 GHz Band.285 SIA also asserts that simply determining the size ofthese protection zones is insufficient to ensure protection of existing FSS operations and that theCommission must ensure that these protection zones are effectively enforced.286156.Google also made multiple submissions, including a detailed technical analysis,addressing potential interference from proposed Citizens Broadband operations into C-Band earthstations.287 Google asserts that emissions from small cells in the 3.5 GHz Band would cause minimalinterference issues to C-Band receivers and that any potential interference would come from operations inclose spatial and spectral proximity to those earth stations.288 Moreover, Google claims that the lookangle of C-Band earth stations can have a significant effect on potential interference from OOBE and that(Continued from previous page)NPRM Reply Comments) and Attachment A, Alion Science and Technology, ''Effects of the Proposed CitizensBroadband Radio Service to C-Band Domsat Earth Stations'' (Alion Report) (filed April 5, 2013).276 See Alion Report and Comsearch Report.277 All interference calculations assume that commercial operations in the 3.5 GHz Band utilize 10 megahertzbandwidth channels. See Alion Report at 2-3.278 The specific distance varies depending on the elevation angle and interference to noise (I/N) ratio of each C-Bandearth station. See id.279 Detailed charts showing proposed separation distances under different circumstances can be found at pages 13-18of the Alion Report. See id. at 3, 13-18.280 See id. at 6.281 See Comsearch Report at 6.282 Id. at 10.283 Id.284 See SIA NPRM Comments at 18-20; SIA NPRM Reply Comments at 22-24; SIA August 2013 Letter; SIA EarthStation Interference Study; SIA February 2014 Letter.285 See SIA Earth Station Interference Study at 6.286 See SIA August 2013 Letter at 2-3.287 See Google Letter and Marshall Declaration.288 See Google Letter at 4-7.48Federal Communications Commission
- protection zones can be significantly reduced by including the positions of these receivers in the SAS.289While SIA disagrees with many of Google's conclusions, they agree that relevant data related to CBSDsand earth stations could be programmed into the SAS to allow for real-time calculation of requiredprotection distances.290157.According to Google's studies, accounting for the elevation angle of C-Band dishescoupled with appropriate placement of Citizens Broadband devices can further reduce the requiredseparation distances and areas around C-Band earth stations.291 Using Google's assumptions,292 themaximum required protection distance for any C-Band earth station would be 1.67 km (with an excludedarea of only .55 km) for an earth station with a 5 degree elevation.293 The average protection area for atypical earth station would be approximately 0.285 km.294 Google asserts that these shaped exclusionzones could be managed and enforced by the SAS and that the same techniques could be applied tograndfathered earth stations in the 3600-3650 MHz band.295158.Google also asserts that, due to differences in international C-Band allocations, many C-Band earth stations in the U.S. ''listen'' to transmissions well outside of their authorized spectrumallocations.296 Indeed, Google claims that many such earth stations ''listen'' for transmissions as low as3400 MHz, a full 300 megahertz below their authorized allocation.297 The ITU studies cited by SIAconsider these equipment specifications in reaching their conclusions about harmful interference fromcommercial operations in the 3.5 GHz Band.298 Google asserts that existing C-Band operators should notbe afforded special protections for equipment that listens well beyond their licensed allocation.299Moreover, according to Google, many C-Band earth stations can effectively mitigate interference fromcommercial operations in the 3.5 GHz Band by utilizing readily available, low-cost filters.300 Indeed,Google asserts that C-Band operators already utilize similar filters to protect themselves from Federalradar operations on the 3500-3700 MHz band.301159.While the proposed Part 96 rules do not necessarily address all concerns about potentialinterference into C-Band earth stations raised in the record, they do include stricter-than-normal out ofband emission limits for CBSDs/user devices, and a spectrum access framework utilizing a dynamic SAS.The SAS can calculate the expected aggregate power flux density at in-band station locations attributableto authorized CBSDs and End User Devices, and authorize operations to ensure that interferenceprotection criteria are not exceeded. We propose an equivalent power flux density (EPFD), which would289 See id. at 6-7 and Marshall Declaration at 7-17.290 See SIA February 2014 Letter at 5-6.291 Id. at 5-8.292 See Marshall Declaration.293 See id. at 13.294 See id. at 13-14.295 See id. at 14-17.296 See Google Letter at 2.297 See id.298 See id.299 See id.300 See id. at 1-3 and Marshall Declaration at 4-7. In their Reply Comments, the Content Interests asserted that,while RF front end filters may work in some circumstances, they are not a ''panacea.'' See Content Interests NPRM Reply Comments at 3.301 See Google Letter at 2-3.49
- Federal Communications Commission
- be the sum of the power flux densities produced at a geostationary satellite system receive Earth station,by CBSD and End User Devices in the area of that earth station. The EPFD would be calculated to takeinto account the off-axis discrimination of the Earth station receiving antenna assumed to be pointing inits nominal direction. We seek comment as to whether CBSD and End User Device emission limits basedon EPFD and SAS authorization controls would adequately address concerns over potential interferencewith C-Band earth stations, or whether additional protections are necessary.160.The ''look angle'' of FSS earth stations would have a significant impact on the potentialfor interference from CBSDs, particularly those located at moderate angles (e.g., > 15°) from the axis ofthe FSS earth station main lobe. We seek comment on the effect of the ''look angles'' of FSS earthstations for potential interference from CBSDs, including any potential costs and benefits. Would theSAS be able to effectively monitor and manage information on FSS earth station ''look angles'' tocalculate EPFD interference limits, and dynamically adjust any potential protection areas around theseearth stations accordingly?161.We also seek comment on additional mitigation strategies that could be employed toprevent harmful interference to earth stations and reduce or eliminate the need for geographic separationbetween CBSDs and C-Band earth stations. Specifically, to what degree could filters be utilized to reduceor eliminate harmful interference? Are current commercially available filters sufficient? What would bethe likely cost of installing filters in C-Band and 3.5 GHz Band FSS earth stations?4.Enforcement Issues
- 162.We acknowledge that the proposals in this FNPRM may raise unique enforcement issuesfor the Commission. Managing real time interactions between a large number of potential Priority AccessLicensees and GAA Users while ensuring that Incumbent Users are protected from harmful interferencecould present novel enforcement challenges for the Commission to address. Our proposals, includingSAS specifications, CBSD technical requirements, and security protocols would help address some ofthese issues and facilitate secure and consistent access to the 3.5 GHz Band for all authorized users.Regardless of the degree of automation incorporated into the SAS, the Commission retains ultimateresponsibility for ensuring that its rules are enforced. We seek comment on additional enforcementtechniques and protocols that could be implemented, inside or outside the SAS, to address the uniqueenforcement concerns raised by the proposals set forth in this FNPRM.5.Extension of Part 96 Rules to 3650-3700 MHz Band
- 163.In the NPRM, the Commission sought comment on a supplemental proposal to includethe adjacent 3650-3700 MHz band in the proposed regulatory regime.302 As noted in the NPRM,incorporating this additional 50 megahertz would create a 150 megahertz contiguous block of spectrumthat could be used by existing licensees in the 3650-3700 MHz band '' as well as new licensees '' toexpand the services that they are already providing. Subsequently in the Licensing PN the Commissionsought comment on extending the Revised Framework to the 3650-3700 MHz band, and asked whatprovisions would need to be made for existing operators and how much transition time would berequired.303164.Commenters generally support the proposal to create a 150 megahertz contiguous blockof spectrum,304 while a few commenters oppose changing the existing framework for the 3650-3700 MHz302 3.5 GHz NPRM, 27 FCC Rcd at 15620-22, ¶¶ 77-82.303 Licensing PN, 28 FCC Rcd at 15315-16, ¶ 51.304 See e.g., Google Licensing PN Comments at 13-16; NSN Licensing PN Comments at 8-15; T-Mobile LicensingPN Comments at 14; Verizon Licensing PN Comments at 4-5; Qualcomm NPRM Comments at 19.50
- Federal Communications Commission
- band.305 In addition, WISPA believes that existing 3650''3700 MHz users should get priority accessprotection and have five years to transition to the new framework.306165.There could be long term gains and significant public interest benefits to extending therules proposed here to the 3650-3700 MHz band, both in terms of terms of spectrum efficiency andavailability, and economies of scale for equipment across the full 150 megahertz. However, we recognizethe significant investment that incumbent 3650-3700 MHz licensees have made. Should we incorporate3650-3700 MHz into the regulatory scheme proposed in this FNPRM, we would seek to do so in a waythat would maximize the benefits to all potential licensees, while minimizing the costs to incumbentlicensees. Below we set forth proposed rules in the event that we opt to incorporate the 3650-3700 MHzband into our proposed regulatory framework.307166.If we extend these proposed rules, we propose to grandfather existing 3650-3700 MHzoperations for a period of five years after the effective date of the proposed rules. More specifically, wewould treat each incumbent 3650-3700 MHz nationwide licensee (Grandfathered Wireless BroadbandProvider) as an Incumbent User within the service contours of its registered base stations or fixed accesspoints during the transition period. During the transition period, existing licensees would be permitted tooperate stations in accordance with the technical rules in Part 90, Subpart Z, if any have been authorized,and would have priority over GAA and Priority Access users in the 3650-3700 MHz band. During thisperiod, Grandfathered Wireless Broadband Providers would be required to avoid causing harmfulinterference to federal users and grandfathered FSS earth stations, in accordance with existing Part 90rules.308 After the transition period, Grandfathered Wireless Broadband Providers would be required toprotect incumbent operations in the 3650-3700 MHz band consistent with any applicable protectioncriteria the Commission develops in conjunction with NTIA, DoD, and other stakeholders. Because theGrandfathered Wireless Broadband Provider would continue to operate under Part 90 rules and would notoperate equipment that is authorized by the SAS, GAA use would not be permitted to interfere with theservice contour of Grandfathered Wireless Broadband Providers during the transition period.167.At the end of the transition period Grandfathered Wireless Broadband Providers wouldhave the option, available to all eligible 3.5 GHz Band users, to apply for PALs or to operate on a GAAbasis consistent with Part 96 rules. During the transition period, Grandfathered Wireless BroadbandProvider with overlapping service contours would be required to coordinate with one another as currentlyrequired by Part 90, Subpart Z.309168.We seek comment on this proposed approach to incorporating the 3650-3700 MHz bandinto the regulatory scheme described in this FNPRM. In particular, we seek comment on whether the fiveyear transition period proposed is appropriate. What are current equipment upgrade cycles for fixed andmobile equipment in the 3650-3700 MHz band? Given upgrade cycles, what is the incremental cost of305 See Comments of Neptuno Media, Inc. d/b/a Neptuno Networks in response to Licensing PN in GN Docket No.12-354 (filed December 5, 2013) at 8-9; UTC Licensing PN Comments at 6 (The Commission should only extendthe Citizens Broadband Radio Service to the 3650-3700 MHz band if it adopts the licensing proposals set forth inthe NPRM); Reply Comments of KanOkla Communications, Inc. in response to Licensing PN in GN Docket No. 12-354 (filed December 20, 2013) at 1-2 (Arguing that the Commission should maintain the status quo in the 3650-3700 MHz band).306 WISPA Licensing PN Comments at 19.307 See Appendix B.308 We note that operators in the 3650-3700 MHz band currently operate without restriction within the ExclusionZones we propose. As such, we do not propose to exclude Citizens Broadband Radio Service operations from theseareas. However, operators in the 3650-3700 MHz band t would be required to continue to protect grandfathered FSSearth stations and the grandfathered federal radiolocation facilities listed in Section 90.1331 of the Commission'sRules. 47 C.F.R. § 90.1331.309 47 C.F.R. § 90.1319.51
- Federal Communications Commission
- upgrading a 3650-3700 MHz system to one that can operate consistent with the proposed Part 96 rulesover a five year period? How do these costs weigh against the possibility of upgrading to equipment thatcould access a full 150 megahertz on a PAL or GAA basis? We seek comment on our proposal to protectthe service contour of existing licensees. More specifically what criteria should be used to define theexisting service contour? What criteria should be used to define interference to the existing contour fromGAA users? We also seek comment on whether there are other grandfathering and transition mechanismsthat we should consider.169.We also seek comment on how the band should be assigned to GAA and Priority Accesstier users after the transition period. Under the proposed rules, a minimum of 50 percent of availablebandwidth would be made available for GAA use at any given time in any given geographic area. Wouldthis formulation still be in the public interest if the supplemental proposal is adopted? Notably, Microsoftsuggested that a minimum of 50 megahertz of spectrum should be reserved for GAA uses at all times.310If we adopt the supplemental proposal, should we guarantee a fixed spectrum floor for GAA (i.e., 50megahertz) and make the remainder of the spectrum available as PALs? We encourage commenters toconsider the costs and benefits of any proposals they put forth.IV.
- 170.This proceeding shall continue to be treated as a ''permit-but-disclose'' proceeding inaccordance with the Commission's ex parte rules.311 Persons making ex parte presentations must file acopy of any written presentation or a memorandum summarizing any oral presentation within twobusiness days after the presentation (unless a different deadline applicable to the Sunshine period applies).Persons making oral ex parte presentations are reminded that memoranda summarizing the presentationmust (1) list all persons attending or otherwise participating in the meeting at which the ex parte presentation was made, and (2) summarize all data presented and arguments made during thepresentation. If the presentation consisted in whole or in part of the presentation of data or argumentsalready reflected in the presenter's written comments, memoranda or other filings in the proceeding, thepresenter may provide citations to such data or arguments in his or her prior comments, memoranda, orother filings (specifying the relevant page and/or paragraph numbers where such data or arguments can befound) in lieu of summarizing them in the memorandum. Documents shown or given to Commissionstaff during ex parte meetings are deemed to be written ex parte presentations and must be filedconsistent with section 1.1206(b).312 In proceedings governed by section 1.49(f)313 or for which theCommission has made available a method of electronic filing, written ex parte presentations andmemoranda summarizing oral ex parte presentations, and all attachments thereto, must be filed throughthe electronic comment filing system available for that proceeding, and must be filed in their nativeformat (e.g., .doc, .xml, .ppt, searchable .pdf). Participants in this proceeding should familiarizethemselves with the Commission's ex parte rules.171.We note that our ex parte rules provide for a conditional exception for all ex partepresentations made by NTIA or Department of Defense representatives.314 This FNPRM raisessignificant technical issues implicating federal and non-federal spectrum allocations and users. Staff fromNTIA, DoD, and the FCC have engaged in technical discussions in the development of this FNPRM, andwe anticipate these discussions will continue after this FNPRM is released. These discussions will benefit310 See Microsoft Licensing PN Comments at 4.311 47 C.F.R. § 1.1200 et seq.312 47 C.F.R. § 1.1206(b).313 47 C.F.R. § 1.49(f).314 See 47 C.F.R. §1.120452
- Federal Communications Commission
- from an open exchange of information between agencies, and may involve sensitive informationregarding the strategic federal use of the 3.5 GHz Band. Recognizing the value of federal agencycollaboration on the technical issues raised in this FNPRM, NTIA's shared jurisdiction over the 3.5 GHzBand, the importance of protecting federal users in the 3.5 GHz Band from interference, and the goal ofenabling spectrum sharing to help address the ongoing spectrum capacity crunch, we find that thisexemption serves the public interest.B.
- 172.Pursuant to Sections 1.415 and 1.419 of the Commission's rules,315 interested parties mayfile comments and reply comments on or before the dates indicated on the first page of this document.Comments may be filed using: (1) the Commission's Electronic Comment Filing System (ECFS), (2) theFederal Government's eRulemaking Portal, or (3) by filing paper copies.316· Electronic Filers: Comments may be filed electronically using the Internet by accessing theECFS: http://www.fcc.gov/cgb/ecfs/ or the Federal eRulemaking Portal:http://www.regulations.gov.· Paper Filers: Parties who choose to file by paper must file an original and one copy of eachfiling. If more than one docket or rulemaking number appears in the caption of thisproceeding, filers must submit two additional copies for each additional docket or rulemakingnumber.Filings can be sent by hand or messenger delivery, by commercial overnight courier, or byfirst-class or overnight U.S. Postal Service mail. All filings must be addressed to theCommission's Secretary, Office of the Secretary, Federal Communications Commission.o All hand-delivered or messenger-delivered paper filings for the Commission'sSecretary must be delivered to FCC Headquarters at 445 12th St., SW, Room TW-A325, Washington, DC 20554. All hand deliveries must be held together with rubberbands or fasteners. Any envelopes must be disposed of before entering the building.The filing hours are 8:00 a.m. to 7:00 p.m.o Commercial overnight mail (other than U.S. Postal Service Express Mail and PriorityMail) must be sent to 9300 East Hampton Drive, Capitol Heights, MD 20743.o U.S. Postal Service first-class, Express, and Priority mail must be addressed to 44512th Street, SW, Washington DC 20554.173.Comments, reply comments, and ex parte submissions will be available for publicinspection during regular business hours in the FCC Reference Center, Federal CommunicationsCommission, 445 12th Street, S.W., CY-A257, Washington, D.C., 20554. These documents will also beavailable via ECFS. Documents will be available electronically in ASCII, Microsoft Word, and/or AdobeAcrobat.174.To request information in accessible formats (Braille, large print, electronic files, audioformat), send an e-mail to fcc504@fcc.gov or call the FCC's Consumer and Governmental AffairsBureau at (202) 418-0530 (voice), (202) 418-0432 (TTY). This document can also be downloaded inWord and Portable Document Format (PDF) at: http://www.fcc.gov.175.For additional information on this proceeding, please contact Paul Powell of the WirelessTelecommunications Bureau at (202) 418-1613 or Paul.Powell@fcc.gov.315 See id. §§ 1.415, 1.419.316 See Electronic Filing of Documents in Rulemaking Proceedings, GC Docket No. 97-113, Report and Order, 13FCC Rcd 11322 (1998).53
- Federal Communications Commission
- Initial Regulatory Flexibility Analysis
- 176.As required by the Regulatory Flexibility Act of 1980 (RFA),317 the Commissionprepared an Initial Regulatory Flexibility Analysis (IRFA) relating to the NPRM. No parties filedcomments responding to that IRFA. We seek comment on how the proposed rules set forth herein couldaffect the IRFA. These comments must be filed in accordance with the same filing deadlines ascomments filed in response to this FNPRM as set forth on the first page of this document and have aseparate and distinct heading designating them as responses to the IRFA.177.Our previous IRFA set forth the need for and objectives of our proposed rules;318 the legalbasis for the proposed action;319 a description and estimate of the number of small entities to which theproposed rules would apply;320 a description of projected reporting, recordkeeping, and other compliancerequirements for small entities;321 steps taken to minimize the significant economic impact on smallentities and significant alternatives considered;322 and a statement that there are no federal rules that mayduplicate, overlap, or conflict with the proposed rules.323 Those descriptions remain unchanged by ourFNPRM, except that we now propose unrestricted eligibility for Priority Access use of the 3.5 GHz Band.178.Our FNPRM does, however, provide greater detail on some of the specific reporting,recordkeeping, and other compliance requirements on which we are now seeking comment. For example,it proposes qualifications requirements, and requirements to designate whether users have selectedcommon carrier status. It proposes specific requirements for interactions with the SAS. It would requiredevices to be interoperable across all frequencies from 3550 MHz to 3700 MHz. It proposes ExclusionZones to ensure compatibility between incumbent federal operations and Citizens Broadband RadioService users, application window procedures for PALs, and limits on the geographic areas, time periods,and numbers of PALs that may be acquired, as well as auction procedures that would govern mutuallyexclusive applications therefor. It proposes a 24 dBm (per 10 megahertz) peak transmit power limit forCBSDs in non-rural areas, and 30 dBm (per 10 megahertz) for rural areas. For fixed point-to-point radiosystems, it proposes a 30 dBm (per 10 megahertz) peak transmit power limit. It proposes a maximumEIRP for End User Devices of 23 dBm (per 10 megahertz), and a -80 dBm signal level threshold asmeasured by a 0 dBi isotropic antenna in 10 megahertz anywhere along any PAL service area boundaries.It proposes OOBE of 43 + 10 log (P) dB, and 70 + 10 log (P) dB for emissions below 3520 MHz andabove 3680 MHz. In the 3.5 GHz NPRM, the Commission also asked for comment on other alternatives,such as utilizing a two-tiered authorization framework, establishing a license-by-rule approach to PriorityAccess, and utilizing an alternative ''licensed light'' framework akin to the authorization model currentlyused for the 3650-3700 MHz band. This FNPRM also seeks comment on alternatives, including staticrather than dynamic frequency assignments and prescribed GAA bandwidths.D.
- Initial Paperwork Reduction Act Analysis
- 179.This FNPRM contains proposed new and modified information collection requirements.The Commission, as part of its continuing effort to reduce paperwork burdens, invites the general publicand the Office of Management and Budget (OMB) to comment on the information collection317 See 5 U.S.C. § 603. The RFA, see 5 U.S.C. § 601 et seq., has been amended by the Small Business RegulatoryEnforcement Fairness Act of 1996 (SBREFA), Pub. L. No. 104-121, Title II, 110 Stat. 857 (1996). The SBREFAwas enacted as Title II of the Contract with America Advancement Act of 1996 (CWAAA).318 3.5 GHz NPRM, 27 FCC Rcd at 15649, App. B ¶¶ 2-5.319 Id., 27 FCC Rcd at 15650, App. B ¶ 6.320 Id., 27 FCC Rcd at 15650-51, App. B ¶¶ 7-12.321 Id., 27 FCC Rcd at 15651, App. B ¶¶ 13-15.322 Id., 27 FCC Rcd at 15652, App. B ¶¶ 16-18.323 Id., 27 FCC Rcd at 15652, App. B ¶ 19.54
- Federal Communications Commission
- requirements contained in this FNPRM, as required by the Paperwork Reduction Act of 1995, Public Law104-13. In addition, pursuant to the Small Business Paperwork Relief Act of 2002, Public Law 107-198,324 we seek specific comment on how we might ''further reduce the information collection burden forsmall business concerns with fewer than 25 employees.''V.
- 180.Accordingly, IT IS ORDERED, pursuant to Sections 1, 2, 4(i), 4(j), 7, 301, 302(a), 303,307(e), and 316 of the Communications Act of 1934, as amended, 47 U.S.C. §§ 151, 152, 154(i), 154(j),157, 301, 302(a), 303, 307(e), and 316, that this Further Notice of Proposed Rulemaking in GN DocketNo. 12-354 IS ADOPTED.FEDERAL COMMUNICATIONS COMMISSIONMarlene H. DortchSecretary324 See 44 U.S.C. § 3506(c)(4).55
- Federal Communications Commission
- The Federal Communications Commission (FCC or Commission) proposes to amend parts 1, 2, 90, and95 and add a new Part 96 to Part 47 of the Code of Federal Regulations (CFR) as set forth below:Part 1 '' Practice and Procedure
- 1. The authority citation for Part 1 continues to read as follows:AUTHORITY: 15 U.S.C. 79 et seq.; 47 U.S.C. 151, 154(i), 154(j), 155, 157, 225, 227, 303(r),309, 1403, 1404, and 1451.2. Section 1.901 is amended to read as follows:§1.901 Basis and purposeThese rules are issued pursuant to the Communications Act of 1934, as amended, 47 U.S.C. 151 etseq. The purpose of these rules is to establish the requirements and conditions under which entities maybe licensed in the Wireless Radio Services as described in this part and in parts 13, 20, 22, 24, 26, 27, 74,80, 87, 90, 95, 96, 97 and 101 of this chapter.3. Section 1.902 is amended to read as follows:§1.902 ScopeIn case of any conflict between the rules set forth in this subpart and the rules set forth in Parts 13, 20, 22,24, 26, 27, 74, 80, 87, 90, 95, 96, 97, and 101 of title 47, chapter I of the Code of Federal Regulations, therules in part 1 shall govern.4. Section 1.907 is amended to read as follows:§ 1.907 Definitions****Private Wireless Services. Wireless Radio Services authorized by parts 80, 87, 90, 95, 96, 97, and 101that are not Wireless Telecommunications Services, as defined in this part.****Wireless Radio Services. All radio services authorized in parts 13, 20, 22, 24, 26, 27, 74, 80, 87, 90, 95,96, 97 and 101 of this chapter, whether commercial or private in nature.Wireless Telecommunications Services. Wireless Radio Services, whether fixed or mobile, that meet thedefinition of ''telecommunications service'' as defined by 47 U.S.C. 153, as amended, and are thereforesubject to regulation on a common carrier basis. Wireless Telecommunications Services include all radioservices authorized by parts 20, 22, 24, 26, and 27 of this chapter. In addition, WirelessTelecommunications Services include Public Coast Stations authorized by part 80 of this chapter,Commercial Mobile Radio Services authorized by part 90 of this chapter, and common carrier fixedmicrowave services, Local Television Transmission Service (LTTS), Local Multipoint DistributionFederal Communications Commission
- Service (LMDS), and Digital Electronic Message Service (DEMS), authorized by part 101 of this chapter,and Citizens Broadband Radio Services authorized by part 96 of this chapter.5. Section 1.1307 is amended to read as follows:§ 1.1307 - Actions that may have a significant environmental effect, for which EnvironmentalAssessments (EAs) must be prepared.* * * *(b) * * * *(2)(i) Mobile and portable transmitting devices that operate in the Commercial Mobile Radio Servicespursuant to part 20 of this chapter; the Cellular Radiotelephone Service pursuant to part 22 of this chapter;the Personal Communications Services (PCS) pursuant to part 24 of this chapter; the SatelliteCommunications Services pursuant to part 25 of this chapter; the Miscellaneous WirelessCommunications Services pursuant to part 27 of this chapter; the Maritime Services (ship earth stationsonly) pursuant to part 80 of this chapter; the Specialized Mobile Radio Service, the 4.9 GHz BandService, or the 3650 MHz Wireless Broadband Service pursuant to part 90 of this chapter; the WirelessMedical Telemetry Service (WMTS), or the Medical Device Radiocommunication Service (MedRadio)pursuant to part 95 of this chapter; or the Citizens Broadband Radio Service pursuant to part 96 of thischapter are subject to routine environmental evaluation for RF exposure prior to equipment authorizationor use, as specified in §§ 2.1091 and 2.1093 of this chapter.* * * * *Part 2 '' Frequency Allocations and Radio Treaty Matters; General Rules and Regulations
- 6. The authority citation for Part 2 continues to read as follows:AUTHORITY: 47 U.S.C. 154, 302a, 303, and 336, unless otherwise noted.7. Section 2.106, the Table of Frequency Allocations, is amended as follows:a. Revise pages 39-40.b. In the list of United States (US) Footnotes, add footnotes US106, US107, and US433.§ 2.106 Table of Frequency Allocations.The revisions and additions read as follows:* * * * *57Federal Communications Commission
- Table of Frequency Allocations 2655-4990 MHz (UHF/SHF)Page39International TableUnited States TableFCC Rule Part(s)Region 1 TableRegion 2 TableRegion 3 TableFederal TableNon-Federal Table2655-26702655-26702655-26702655-26902655-2690FIXED 5.410FIXED 5.410FIXED 5.410Earth exploration-FIXED US205WirelessMOBILE exceptFIXED-SATELLITEFIXED-SATELLITE (Earth- satellite (passive)MOBILE exceptaeronautical(Earth-to-space)to-space)Radio astronomyaeronautical mobileCommunicationsmobile 5.384A(space-to-Earth) 5.415 5.415US385Earth exploration-satellite (27)BROADCASTING-MOBILE exceptMOBILE exceptSpace research(passive)SATELLITEaeronautical mobileaeronautical mobile(passive)Radio astronomy5.208B 5.413 5.4165.384A5.384ASpace research (passive)Earth exploration-satellite BROADCASTING-BROADCASTING-(passive)SATELLITESATELLITERadio astronomy5.413 5.4165.413 5.416Space research (passive) Earth exploration-satellite Earth exploration-satellite(passive)(passive)Radio astronomyRadio astronomy5.149 5.412Space research (passive) Space research (passive)5.149 5.208B5.149 5.208B 5.4202670-26902670-26902670-2690FIXED 5.410FIXED 5.410FIXED 5.410MOBILE exceptFIXED-SATELLITEFIXED-SATELLITE (Earth-aeronautical mobile(Earth-to-space)to-space)5.384A(space-to-Earth)5.415Earth exploration-satellite 5.208B 5.415MOBILE except(passive)MOBILE exceptaeronautical mobileRadio astronomyaeronautical mobile5.384ASpace research (passive) 5.384AMOBILE-SATELLITEEarth exploration-satellite (Earth-to-(passive)space) 5.351A 5.419Radio astronomyEarth exploration-satelliteSpace research (passive) (passive)5.149 5.412Radio astronomySpace research (passive)5.1495.149US205US3852690-27002690-2700EARTH EXPLORATION-SATELLITE (passive)EARTH EXPLORATION-SATELLITE (passive)RADIO ASTRONOMYRADIO ASTRONOMY US74SPACE RESEARCH (passive)SPACE RESEARCH (passive)5.340 5.422US2462700-29002700-29002700-2900AERONAUTICAL RADIONAVIGATION 5.337METEOROLOGICALAviation (87)RadiolocationAIDSAERONAUTICALRADIONAVI-5.423 5.424GATION 5.337 US18 5.423 US18Radiolocation G25.423 G152900-31002900-31002900-3100RADIOLOCATION 5.424ARADIOLOCATIONMARITIMEMaritime (80)RADIONAVIGATION 5.4265.424A G56RADIONAVIGATIONPrivate Land5.425 5.427MARITIMERadiolocation US44Mobile (90)RADIONAVIGATION5.427 US3165.427 US44 US3163100-33003100-33003100-3300RADIOLOCATIONRADIOLOCATION G59 Earth exploration-satellite Private LandEarth exploration-satellite (active)Earth exploration-(active)Mobile (90)Space research (active)satellite (active)Space research (active)5.149 5.428Space research (active) RadiolocationUS342US3423300-34003300-34003300-34003300-35003300-3500RADIOLOCATIONRADIOLOCATIONRADIOLOCATIONRADIOLOCATIONAmateurPrivate LandAmateurAmateurUS108 G2Radiolocation US108Mobile (90)FixedAmateur RadioMobile(97)5.149 5.429 5.4305.1495.149 5.429US3425.282 US34258
- Federal Communications Commission
- 3400-36003400-35003400-3500FIXEDFIXEDFIXEDFIXED-SATELLITEFIXED-SATELLITEFIXED-SATELLITE(space-to-Earth)(space-to-Earth)(space-to-Earth)Mobile 5.430AAmateurAmateurRadiolocationMobile 5.431AMobile 5.432BRadiolocation 5.433Radiolocation 5.4335.2825.282 5.432 5.432A3500-37003500-36003500-35503500-3550FIXEDFIXEDRADIOLOCATION G59 RadiolocationPrivate LandFIXED-SATELLITEFIXED-SATELLITEAERONAUTICALMobile (90)(space-to-Earth)(space-to-Earth)RADIONAVI-MOBILE exceptMOBILE exceptGATION (ground-aeronautical mobileaeronautical mobilebased) G110Radiolocation 5.4335.433A3550-36503550-3600Radiolocation 5.433RADIOLOCATION G59 FIXEDAERONAUTICALLAND MOBILE5.431RADIONAVI-US106 US433GATION (ground-3600-42003600-37003600-3650based) G110FIXEDFIXEDFIXEDSatelliteFIXED-SATELLITEFIXED-SATELLITEFIXED-SATELLITE(space-to-Earth)(space-to-Earth)(space-to-Earth)CommunicationsMobileMOBILE exceptUS107 US245(25)aeronautical mobileLAND MOBILEPrivate LandRadiolocation 5.433Mobile (90)US106 US433US106 US107 US245US4333650-37003650-3700FIXEDFIXED-SATELLITE(space-to-Earth)5.435NG169 NG185US109 US349MOBILE exceptaeronautical mobileUS109 US3493700-42003700-42003700-4200FIXEDFIXEDSatelliteFIXED-SATELLITE (space-to-Earth)FIXED-SATELLITE
- MOBILE except aeronautical mobile(space-to-Earth)CommunicationsNG180(25)Fixed Microwave(101)4200-44004200-4400AERONAUTICAL RADIONAVIGATION 5.438AERONAUTICAL RADIONAVIGATIONAviation (87)5.439 5.4405.440 US2614400-45004400-45004400-4500FIXEDFIXEDMOBILE 5.440AMOBILE4500-48004500-48004500-4800FIXEDFIXEDFIXED-SATELLITEFIXED-SATELLITE (space-to-Earth) 5.441MOBILE(space-to-Earth)MOBILE 5.440AUS2455.441 US2454800-49904800-49404800-4940FIXEDFIXEDMOBILE 5.440A 5.442MOBILERadio astronomyUS203 US342US203 US3424940-49904940-4990FIXEDPublic SafetyMOBILE exceptLand Mobile5.339 US342 US385aeronautical mobile(90Y)G1225.339 US342 US385
- 5.149 5.339 5.443Page 4059
- Federal Communications Commission
- * * * * *UNITED STATES (US) FOOTNOTES
- * * * * *US106 In the band 3550-3650 MHz, non-Federal stations in the radiolocation service that werelicensed or applied for prior to [effective date of Report and Order] may continue to operate on asecondary basis until the end of the equipment's useful lifetime.US107 In the band 3600-3650 MHz, the following provisions shall apply to earth stations in thefixed-satellite service (space-to-Earth):(a) Earth stations authorized prior to, or granted as a result of an application filed prior to, [effectivedate of Report and Order], and constructed within 12 months of initial authorization may operateindefinitely on a primary basis. Applications for new earth stations or modifications to earth stationfacilities shall not be accepted, except for changes in polarization, antenna orientation or ownership.(b) The assignment of frequencies to new earth stations shall be authorized on secondary basis tonon-Federal stations in the fixed and land mobile services.* * * * *US433 In the band 3550-3650 MHz, the following provisions shall apply to Federal use of theaeronautical radionavigation (ground-based) and radiolocation services and to non-Federal use of thefixed and land mobile services:(a) Airborne radar systems shall not be authorized.(b) Non-Federal stations in the fixed and land mobile services shall not be authorized within [XXXkm] of the territorial sea baseline.(c) Ground-based radar systems operate at the following fixed sites: [RESERVED]. Non-federaloperations shall not be permitted within [XX km] of these fixed sites.* * * * *60Federal Communications Commission
- § 2.1091 Radiofrequency radiation exposure evaluation: mobile devices* * * * *(c)(1) Mobile devices that operate in the Commercial Mobile Radio Services pursuant to part 20 of thischapter; the Cellular Radiotelephone Service pursuant to part 22 of this chapter; the PersonalCommunications Services pursuant to part 24 of this chapter; the Satellite Communications Servicespursuant to part 25 of this chapter; the Miscellaneous Wireless Communications Services pursuant to part27 of this chapter; the Maritime Services (ship earth station devices only) pursuant to part 80 of thischapter; the Specialized Mobile Radio Service, and the 3650 MHz Wireless Broadband Service pursuantto part 90 of this chapter; and the Citizens Broadband Radio Service pursuant to part 96 of thischapter are subject to routine environmental evaluation for RF exposure prior to equipment authorizationor use if:* * * * *§ 2.1093 Radiofrequency radiation exposure evaluation: portable devices* * * * *(c)(1) Portable devices that operate in the Cellular Radiotelephone Service pursuant to part 22 of thischapter; the Personal Communications Service (PCS) pursuant to part 24 of this chapter; the SatelliteCommunications Services pursuant to part 25 of this chapter; the Miscellaneous WirelessCommunications Services pursuant to part 27 of this chapter; the Maritime Services (ship earth stationdevices only) pursuant to part 80 of this chapter; the Specialized Mobile Radio Service, the 4.9 GHz BandService, and the 3650 MHz Wireless Broadband Service pursuant to part 90 of this chapter; the WirelessMedical Telemetry Service (WMTS) and the Medical Device Radiocommunication Service (MedRadio),pursuant to subparts H and I of part 95 of this chapter, respectively, unlicensed personal communicationservice, unlicensed NII devices and millimeter wave devices authorized under §§15.253(f), 15.255(g),15.257(g), 15.319(i), and 15.407(f) of this chapter; and the Citizens Broadband Radio Service pursuant topart 96 of this chapter are subject to routine environmental evaluation for RF exposure prior to equipmentauthorization or use.* * * * *Part 90 '' Private Land Mobile Radio Services
- 8. The authority citation for Part 90 continues to read as follows:AUTHORITY: Sections 4(i), 11, 303(g), 303(r), and 332(c)(7) of the Communications Act of1934, as amended, 47 U.S.C. 154(i), 161, 303(g), 303(r), 332(c)(7).9. Section 90.103 is amended by revising the ''3500 to 3650'' entry in the Megahertz portion of theRadiolocation Service Frequency Table in paragraph (b) to read as follows:§ 90.103 Radiolocation Service.* * * * *61Federal Communications Commission
- RADIOLOCATION SERVICE FREQUENCY TABLEFrequency or bandClass of station(s)LimitationKilohertz* ** **Megahertz420 to 450 '...'...'....'....'...'..........do212450 to 2500 '...'...'....'...'..........do9, 22, 232900 to 3100 '...'....'....'...'..........do10, 113100 to 3300 '...'...'...'...'............do123300 to 3500 '...'...'...'...'............do12, 133500 to 3550 '...'...'...'...'............do12* ** **Part 95 '' Personal Radio Services
- 10. The authority citation for Part 95 continues to read as follows:AUTHORITY: Secs. 4, 303, 48 Stat. 1066, 1082, as amended; 47 U.S.C. 154, 303.11. Section 95.401 is amended to read as follows:§ 95.401 (CB Rule 1) What are Citizens Band Radio Services?*****(h) Citizens Broadband Radio Service '' The rules for this service, including technical rules, arecontained in Part 96 of the Commission's rules. Only Citizens Broadband Radio Service Devicesauthorized on a General Authorized Access basis, as those terms are defined in section 96.3, areconsidered part of the Citizens Band Radio Services.12. Section 95.601 is amended to read as follows:§95.601 Basis and purposeThis section provides the technical standards to which each transmitter (apparatus that convertselectrical energy received from a source into RF (radio frequency) energy capable of being radiated)used or intended to be used in a station authorized in any of the Personal Radio Services listed belowmust comply. This section also provides requirements for obtaining certification for such transmitters.The Personal Radio Services to which these rules apply are the GMRS (General Mobile RadioService)'--subpart A, the Family Radio Service (FRS)'--subpart B, the R/C (Radio Control Radio62Federal Communications Commission
- Service)'--subpart C, the CB (Citizens Band Radio Service)'--subpart D, the Low Power RadioService (LPRS)'--subpart G, the Wireless Medical Telemetry Service (WMTS)'--subpart H, theMedical Device Radiocommunication Service (MedRadio)'--subpart I, the Multi-Use Radio Service(MURS)'--subpart J, and Dedicated Short-Range Communications Service On-Board Units (DSRCS-OBUs)'--subpart L.A new Part 96 is added to read as follows:13. The authority citation for Part 96 reads as follows:AUTHORITY: Sections 4(i), 303, and 307 of the Communications Act of 1934, as amended, 47U.S.C. 154(i), 303, and 307.Part 96 '' Citizens Broadband Radio Service
- Subpart A '' GENERAL RULES§ 96.1 '' Scope§ 96.3 '' Definitions§ 96.5 '' Eligibility§ 96.7 '' Authorization Required§ 96.9 '' Regulatory Status§ 96.11 '' Frequencies§ 96.13 '' Frequency AssignmentsSubpart B '' INCUMBENT PROTECTION§ 96.15 '' Protection of Federal Incumbents§ 96.17 '' Protection of Existing Fixed Satellite Service (FSS) Earth Stations in the 3550-3650 MHz Band§ 96.19 '' Operation Near Canadian and Mexican BordersSubpart C '' PRIORITY ACCESS§ 96.21 '' Authorization§ 96.23 '' Priority Access Licenses§ 96.25 '' Application Window§ 96.27 '' Competitive Bidding Procedures§ 96.29 '' Aggregation of Priority Access LicensesSubpart D '' GENERAL AUTHORIZED ACCESS§ 96.31 '' Authorization§ 96.33 '' General Authorized Access Use63Federal Communications Commission
- § 96.35 '' Contained Access Facilities (CAFs)Subpart E '' TECHNICAL RULES§ 96.36 '' Citizens Broadband Radio Service Device (CBSD) General Requirements§ 96.37 '' End User General Requirements§ 96.38 '' General Radio Requirements§ 96.39 '' Equipment Authorization§ 96.41 '' RF SafetySubpart F '' SPECTRUM ACCESS SYSTEM§ 96.43 '' Spectrum Access System Purposes and Functionality§ 96.44 '' Information Gathering and Retention§ 96.45 '' Registration and Authorization of Citizens Broadband Radio Service Devices§ 96.46 '' Frequency Assignment§ 96.47 '' Security§ 96.48 '' Spectrum Access System Administrators§ 96.49 '' Spectrum Access System Administrator FeesSubpart A - GENERAL RULES
- 96.1 '' Scope(a) This section sets forth the regulations governing use of devices in the Citizens BroadbandRadio Service. Citizens Broadband Radio Service Devices (CBSDs) may be used in the frequency bandslisted in section 96.11. The operation of all CBSDs shall be coordinated by one or more authorizedSpectrum Access Systems (SASs).(b) The Citizens Broadband Radio Service includes Priority Access and General AuthorizedAccess tiers of service. Priority Access Licensees and General Authorized Access Users shall beauthorized to operate only outside of the Exclusion Zones detailed in section 96.15 and must not causeharmful interference to Incumbent Users, including authorized federal users and the fixed satellite service(FSS) sites set forth in sections 96.15 and 96.17. General Authorized Access Users must not causeharmful interference to Priority Access Licensees and must accept interference from Priority AccessLicensees, consistent with section 96.33.96.3 '' DefinitionsCensus Tract: Census tracts are relatively permanent statistical subdivisions of a county orequivalent entity that are updated by local participants prior to each decennial census as part of theCensus Bureau's Participant Statistical Areas Program. Census tracts are defined by the United StatesCensus Bureau and current census tract maps can be found at https://www.census.gov/geo/maps-data/maps/2010tract.html.64Federal Communications Commission
- Citizens Broadband Radio Service Device (CBSD): Fixed or Portable Base stations, or networksof such base stations, that operate on a Priority Access or General Authorized Access basis in the CitizensBroadband Radio Service consistent with this rule part. Does not include End User Devices.Contained Access Facility (CAF): An indoor or otherwise physically contained location used byContained Access Users for the express purpose of performing core mission operations.Contained Access Use: Private internal radio services, not made commercially available to thepublic, employed by Contained Access Users.Contained Access User: Qualified government and non-government entities entitled to protectionwithin CAFs in furtherance of a mission that supports the public interest.End User Device: A fixed, portable, or mobile device authorized and controlled by an authorizedCBSD. These devices may not be used as intermediate service links or to provide service to other EndUser Devices.Exclusion Zone: A geographic area wherein no CBSD shall operate. Exclusion Zones shall beenforced and maintained by the SAS.Fast Track Report: National Telecommunications and Information Administration, ''AnAssessment of the Near-Term Viability of Accommodating Wireless Broadband Systems in the 1675-1710 MHz, 1755-1780 MHz, 3500-3650 MHz, 4200-4220 MHz, and 4380-4400 MHz Bands'' (October2010).Geo-Location Capability: The capability of a CBSD to determine its geographic coordinateswithin the level of accuracy specified in section 96.36 (i.e., 50 meters horizontally and 3 metersvertically). This capability is used by a SAS to determine frequency availability and maximum powerlimits for CBSDs.General Authorized Access User: An authorized user of CBSDs operating on a GeneralAuthorized Access basis, as set forth in this part.Incumbent User: A federal entity or fixed satellite service operator authorized to operate on aprimary basis on frequencies designated in section 96.11.Priority Access License (PAL): A license to operate on a Priority Access basis, consistent withsection 96.21, et seq.Priority Access Licensee: A holder of one or more PALs. Priority Access Licensees shall beentitled to protection from harmful interference from General Authorized Access Users and other PriorityAccess Licensees within the defined limits of their PAL, consistent with the rules set forth in this part.Rural Area. For purposes of this part, a Rural Area is defined as a county (or equivalent) with apopulation density of 100 persons per square mile or less, based upon the most recently available Censusdata.Spectrum Access System (SAS): A system that maintains records of all authorized services anddevices in the Citizens Broadband Radio Service frequency bands, is capable of determining the availablechannels at a specific geographic location, provides information on available channels to CBSDs thathave been certified under the Commission's equipment authorization procedures, determines and enforcesmaximum power levels for CBSDs, and enforces protection criteria for Incumbent Users and PriorityAccess Licensees, and performs other functions as set forth in section 96.43, et seq. Spectrum AccessSystem shall also refer to multiple Spectrum Access Systems operating in coordination and in accordancewith this rule part.65Federal Communications Commission
- SAS Administrator: An entity authorized by the Commission to operate an SAS in accordancewith the rules and procedures set forth in section 96.48.96.5 '' EligibilityAny entity, other than those precluded by section 310 of the Communications Act of 1934, asamended, 47 U.S.C. 310, is eligible to be a Priority Access Licensee or General Authorized Access Userunder this part, except as set forth in section 96.35.96.7 '' Authorization Required(a) CBSDs must be used and operated consistent with the rules in this part.(b) Authorizations for PALs may be granted upon proper application, provided that the applicantis qualified in regard to citizenship, character, financial, technical and other criteria established by theCommission, and that the public interest, convenience and necessity will be served. See 47 U.S.C. 301,308, 309, and 310. The holding of an authorization does not create any rights beyond the terms,conditions, and period specified in the authorization and shall be subject to the provisions of theCommunications Act of 1934, as amended.96.9 '' Regulatory Status(a) Priority Access Licensees and General Authorized Access Users are permitted to provideservices on a non-common carrier and/or on a common carrier basis. An authorized Citizens BroadbandRadio Service user may render any kind of communications service consistent with the regulatory statusin its authorization and with the Commission's rules applicable to that service.96.11 '' Frequencies(a) The Citizens Broadband Radio Service shall be authorized in the 3550-3650 MHz frequencyband.96.13 '' Frequency Assignments(a) A minimum of fifty percent of the bandwidth, rounded to the nearest 10 megahertz, availablefor Citizens Broadband Radio Service users in a given census tract must be reserved for GeneralAuthorized Access use. The remaining bandwidth shall be made available to Priority Access Licensees,consistent with the procedures in subpart C of this rule part.(b) Each PAL shall be authorized to use a 10 megahertz channel as set forth in section 96.23.(c) Any frequencies designated for Priority Access that are not in use by a Priority AccessLicensee may be utilized by General Authorized Access Users.(d) The SAS shall assign particular authorized users to specific frequencies, which may bereassigned by the SAS.Subpart B - INCUMBENT PROTECTION
- 96.15 '' Protection of Federal Incumbents(a) CBSDs must not cause harmful interference to and must accept harmful interference fromfederal users authorized to operate on frequencies set forth in section 96.11.(1) To ensure compatibility between incumbent federal operations and Citizens Broadband RadioService user, an Exclusion Zone consistent with the recommendations of the Fast Track Report shall be66Federal Communications Commission
- maintained around terrestrial federal radiolocation sites and the coastline. This Exclusion Zone shall beenforced by the SAS.(3) The SAS must immediately suspend operation of any CBSDs found to be causing harmfulinterference to Incumbent Users until such harmful interference can be resolved.96.17 - Protection of Existing FSS Earth Stations in the 3550-3650 MHz Band(a) CBSDs shall not cause harmful interference to the FSS earth stations listed in the chart below:Earth Station
- 1CALivermoreKA23237° 45' 40.0" N, 121° 47' 53.0" W2CAMalibuE98006634° 04' 52.6" N, 118° 53' 52.9" WKA27334° 04' 50.3" N, 118° 53' 46.4" WKA9134° 04' 49.7" N, 118° 53' 43.9" WKB3234° 04' 51.0" N, 118° 53' 44.0" W3CAMountain HomeKA8637° 45' 01.7" N, 121° 35' 38.8" W4CANapaE95030738° 14' 43.7" N, 122° 16' 50.9" W5CANuevoE01020633° 47' 46.1" N, 117° 05' 15.1" WE02016933° 47' 46.5" N, 117° 05' 15.0" WE02031433° 47' 46.0" N, 117° 05' 14.0" WE02031533° 47' 45.0" N, 117° 05' 15.0" W6CASalt CreekKA37138° 56' 20.2" N, 122° 08' 48.0" WKA37238° 56' 21.0" N, 122° 08' 49.2" WKA37338° 56' 22.3" N, 122° 08' 49.6" W7CASan RamonE624137° 45' 39.7" N, 121° 47' 56.8" W8CASanta PaulaKA3134° 24' 05.0" N, 119° 04' 26.0" WKB3434° 24' 05.0" N, 119° 04' 29.4" WKA24934° 24' 05.0" N, 119° 04' 29.4" WE98013634° 24' 06.0" N, 119° 04' 21.8" W9CASomisKA31834° 19' 31.0" N, 118° 59' 41.0" W10CASylmarKA27434° 19' 04.0" N, 118° 29' 00.0" WE614834° 18' 55.0" N, 118° 29' 12.0" W11CTSouthburyKA31241° 27' 06.3" N, 073° 17' 21.4" WKA31341° 27' 06.3" N, 073° 17' 16.4" WWA2841° 27' 05.0" N, 073° 17' 21.0" WWB3641° 27' 05.3" N, 073° 17' 19.4" WWB3641° 27' 05.1" N, 073° 17' 19.0" W12FLMedleyE96006825° 51' 19.0" N, 080° 19' 52.0" W13MiamiKA40725° 48' 35.0" N, 080° 21' 10.0" WKA41225° 48' 35.0" N, 080° 21' 11.0" W14GUMPulantatKA2813° 25' 00.0" N, 144° 44' 57.0" E15GUMYonaguKA32613° 25' 05.2" N, 144° 45' 05.7" E16HIHaleiwaE08005921° 40' 10.4" N, 158° 01' 59.4" WKA2521° 40' 14.6" N, 158° 02' 03.1" W17HIKapoleiE01001621° 20' 08.0" N, 158° 05' 25.0" WE98025021° 20' 12.6" N, 158° 05' 21.1" WE10009121° 20' 10.2" N, 158° 05' 18.0" W67Federal Communications Commission
- E03008721° 20' 09.0" N, 158° 05' 25.0" W18HIPaumaluKA26521° 40' 27.0" N, 158° 02' 16.0" WKA26621° 40' 15.5" N, 158° 02' 06.1" WKA26721° 40' 14.1" N, 158° 02' 06.1" WKA27021° 40' 24.0" N, 158° 02' 16.0" W19MDClarksburgKA26039° 13' 05.0" N, 077° 16' 12.0" WKA27539° 13' 07.0" N, 077° 16' 12.0" WKA25939° 13' 05.6" N, 077° 16' 12.4" WKA26339° 13' 04.4" N, 077° 16' 13.9" WKA26439° 13' 05.2" N, 077° 16' 13.9" W20MDHagerstownKA26239° 35' 57.0" N, 077° 45' 23.0" WE03007139° 35' 57.9" N, 077° 45' 17.3" WE03008239° 35' 57.9" N, 077° 45' 21.4" WE03010039° 35' 59.6" N, 077° 45' 21.4" WE03010139° 35' 59.6" N, 077° 45' 17.4" WE03010339° 35' 59.1" N, 077° 45' 18.4" WE00029639° 35' 54.0" N, 077° 45' 35.0" WKA26139° 35' 57.0" N, 077° 45' 22.0" WE10011839° 35' 55.0" N, 077° 45' 22.0" W21MEAndoverE00070044° 38' 01.2" N, 070° 41' 51.3" WKA38644° 37' 58.2" N, 070° 41' 55.3" WKA34944° 37' 58.2" N, 070° 41' 54.0" W22NJFranklinE677741° 07' 04.0" N, 074° 34' 33.0" W23NYHauppaugeE95043640° 49' 15.4" N, 073° 15' 48.4" W24PACatawissaE98049340° 53' 39.3" N, 076° 26' 19.8" W25PARoaring CreekKA44440° 53' 35.9" N, 076° 26' 22.6" WWA3340° 53' 37.5" N, 076° 26' 21.8" W26PRHumacaoE87264718° 09' 05.0" N, 065° 47' 20.0" W27PRSan JuanE05031418° 24' 23.9" N, 066° 01' 46.6" W28TNNashvilleE96005036° 14' 05.7" N, 086° 45' 21.4" WE96007336° 14' 05.7" N, 086° 45' 19.4" WE97001036° 14' 06.2" N, 086° 45' 20.4" W29VAAlexandriaKA8138° 47' 36.0" N, 077° 09' 59.0" WE97026738° 47' 38.0" N, 077° 09' 46.0" W30VABristowE00069638° 47' 02.4" N, 077° 34' 21.9" WE00015238° 47' 01.6" N, 077° 34' 24.3" WE000726various31VASterlingE03033638° 59' 07.0" N, 077° 26' 45.0" W32VAQuicksburgE00058938° 43' 45.4" N, 078° 39' 25.1" WE99017538° 43' 45.4" N, 078° 39' 24.2" W33WABrewsterKA29448° 08' 50.5" N, 119° 41' 33.2" WE96022248° 08' 51.0" N, 119° 41' 29.0" WE12012848° 08' 50.0" N, 119° 41' 28.0" W34WAYacoltKA22145° 51' 46.4" N, 122° 23' 44.3" WKA32345° 51' 45.5" N, 122° 23' 43.8" W35WVAlbrightKA41339° 34' 07.0" N, 079° 34' 45.0" W68Federal Communications Commission
- 36WVEtamKA37839° 16' 50.0" N, 079° 44' 13.0" WWA2139° 16' 48.0" N, 079° 44' 14.0" W37WVRowlesburgKA35139° 16' 52.1" N, 079° 44' 10.7" WThese operational restrictions shall be enforced by the Spectrum Access System authorized pursuant tosection 96.48 below.(1) These protection criteria shall only apply to FSS earth stations that are in actual use. FSSearth station licensees must inform SAS Administrators of their operational status annually, no later than30 days before the end of the preceding calendar year.(2) CBSDs may operate within areas that may cause harmful interference to FSS earth stationslisted in this section provided that the licensee of the FSS earth station and an SAS Administratormutually agree on such operation and the terms of any such agreement are provided to SAS and can beenforced by the SAS.96.19 '' Operation Near Canadian and Mexican BordersCitizens Broadband Radio Service operation in the 3550-3650 MHz band is subject to current andfuture international agreements with Mexico and Canada. The terms of these agreements shall beenforced by the SAS.Subpart C - PRIORITY ACCESS
- 96.21 '' Authorization(a) In general, applications for PALs must:(1) Demonstrate the applicant's qualifications to hold an authorization;(2) State how a grant would serve the public interest, convenience, and necessity;(3) Contain all information required by FCC rules and application forms;(4) Propose operation of a facility or facilities in compliance with all rules governing the CitizensBroadband Radio Service; and(5) Be amended as necessary to remain substantially accurate and complete in all significantrespects, in accordance with the provisions of §1.65 of this chapter.(b) Authorization processes and requirements may be reasonably automated by SASAdministrators approved by the Commission in accordance with section 96.48. The Commission shalloversee these processes consistent with its responsibilities under the Communications Act of 1934, asamended.(c) CBSDs used for Priority Access must register with the SAS and comply with its instructionsconsistent with section 96.36.96.23 '' Priority Access Licenses(a) Frequencies shall be made available for Priority Access use, consistent with section 96.13.69Federal Communications Commission
- (b) Priority Access Licensees shall be protected from harmful interference from CBSDs operatedby other Priority Access Licensees and General Authorized Access Users, consistent with the technicalrules and interference avoidance criteria set forth in sections 96.36 and 96.38. Priority Access Licenseesmust protect Incumbent Users from harmful interference, consistent with sections 96.15 and 96.17.(c) PALs shall have the following parameters:(1) Geography: Each PAL shall consist of a single census tract, as defined in the 2010 census.(i) Contiguous Geographic Areas: The SAS shall make reasonable efforts to assigngeographically contiguous PALs held by the same licensee to the same frequencies.(2) Channels: Each PAL shall consist of a 10 megahertz channel within the frequency range setforth in section 96.13. Channels shall be assigned by the SAS and the exact frequencies of specificassigned channels may be changed at the SAS Administrator's discretion, in coordination with other SASAdministrators. Priority Access Licensees may request a particular channel or frequency range but willnot be guaranteed a particular assignment.(i) Contiguous Channel Frequencies: The SAS shall make reasonable efforts to assign multiplechannels held by the same Priority Access Licensee to contiguous frequencies.(3) License Term: Each PAL shall be issued for one-year. Each PAL shall automaticallyterminate at the end of its one-year term and may not be renewed. However, Priority Access Licenseesmay reapply for subsequent authorizations in the same census tract, subject to the limitations set forth insection 96.25. Priority Access Licensees may hold consecutive PALs up to the maximum established in96.25.(d) CBSDs operating under a PAL authorization must register with an SAS and comply with itsinstructions in accordance with sections 96.36, 96.45, and 96.46.(e) Unused PAL channels shall be made available for assignment by the SAS for GeneralAuthorized Access use provided:(1) General Authorized Access operation on unused PAL channels must obey the same fieldstrength limits established in section 96.38 with respect to any operational areas within the PALassignment; and(2) Generally Authorized Access Users shall have no expectation of interference protection fromany other users and shall operate on a non-interfering basis with respect to Priority Access Licensees andIncumbent Users, consistent with sections 96.15, 96.17, and 96.23.96.25 '' Application Window(a) Applications for PALs will be accepted annually. The annual application window andapplication process will be announced by the Wireless Telecommunications Bureau via Public Notice.(b) The Wireless Telecommunications Bureau may make up to five consecutive years of any PALavailable through the same application window. Applicants may apply for PALs up to five years inadvance of the effective license date.96.27 '' Competitive Bidding Procedures(a) Mutually exclusive initial applications for PALs are subject to competitive bidding. Thegeneral competitive bidding procedures set forth in part 1, subpart Q of this chapter will apply unlessotherwise provided in this subpart.70Federal Communications Commission
- 96.29 '' Aggregation of Priority Access Licenses(a) Priority Access Licensees may aggregate up to three channels in any single census tract.Subpart D - GENERAL AUTHORIZED ACCESS
- 96.31 '' Authorization(a) Any party meeting the eligibility requirements set forth in section 96.5 is authorized to operatea CBSD on a General Authorized Access basis by this rule without an individual station license.(b) CBSDs used for General Authorized Access must register with the SAS and comply with itsinstructions consistent with sections 96.36, 96.45, and 96.46.96.33 '' General Authorized Access Use(a) Frequencies shall be made available for General Authorized Access use consistent with thesection 96.13.(b) General Authorized Access Users shall be permitted to utilize frequencies assigned to PALswhen such frequencies are not in use, as determined by the SAS.(c) Frequencies that are available for General Authorized Access Use shall be made available ona shared basis and shall not be assigned for the exclusive use of any party.(d) General Authorized Access Users shall have no expectation of interference protection fromother General Authorized Access Users and shall avoid causing harmful interference to Priority AccessLicensees and Incumbent Users, consistent with sections 96.15, 96.17, and 96.23.96.35 ''Contained Access Facilities (CAFs)(a) Commission approved Contained Access Users may request an assignment of up to 20megahertz of frequencies reserved for GAA use from the SAS to be reserved for Contained Access Useinside a CAF.(1) The requestor must certify to the SAS that it will use the reserved frequencies for ContainedAccess Use within each specifically requested location.(b) Such reserved frequencies shall not be available for use by other General Authorized AccessUsers within the physical confines of the CAF, provided:(1) The requestor undertakes reasonable efforts to safeguard against harmful interference fromGeneral Authorized Access transmissions originating outside the CAF;(2) All other rules applicable to General Authorized Access Users apply to CAF use of thereserved frequencies, including, but not limited to the requirements that that there shall be no expectationof interference protection from other General Authorized Access Users and that CAF users shall not causeharmful interference to Priority Access Licensees and Incumbent Users, consistent with sections 96.15,96.17, and 96.23.Subpart E - TECHNICAL RULES
- 96.36 Citizens Broadband Radio Service Device (CBSD) General Requirements(a) Geo-location and Reporting Capability:71Federal Communications Commission
- (1) The CBSD shall be able to determine its geographic coordinates (referenced to the NorthAmerican Datum of 1983 (NAD83)) to an accuracy of ±50 meters horizontal and ±3 meters elevation.Such geographic coordinates shall be reported to SAS at the time of first activation from a power-offcondition.(2) A CBSD must re-establish its position and report that position within 60 seconds to the SASeach time it is activated from a power-off condition.(3) A CBSD must check its location at least once every 60 seconds while in operation and reportto SAS any location changes exceeding ±50 meters horizontal and ±3 meters elevation within 60 secondsof such location change.(b) Interoperability: All CBSDs must be capable of operating on any frequency from 3550-3700MHz as instructed by the SAS.(c) Registration with SAS: A CBSD must register with and be authorized by an SAS prior to itsinitial service transmission. The CBSD shall provide the SAS with its geographic location, antennaheight above ground level (meters), requested authorization status (Priority Access or General AuthorizedAccess), unique FCC identification number, and unique serial number. If any of this informationchanges, the CBSD shall update the SAS within 60 seconds. A CBSD shall only operate at or below themaximum power level and within locations/areas permitted by the SAS on the frequencies authorized bythe SAS.(1) A CBSD must query the SAS regarding frequency availability at 10 minute intervals and itmust also receive any incoming commands from the SAS about any changes to power limits andfrequency availabilities. CBSD operation must cease within 60 seconds if the SAS indicates that anassigned frequency is no longer available or as otherwise instructed by the SAS.(d) Interference Reporting: CBSDs shall report to an SAS if they experience interference inexceeding a threshold as set by an SAS. Such interference reporting may be based on receivedinterference signal strength in the same and adjacent channels, packet error rates or other commonstandard metrics as set by SAS.(e) Security: CBSDs shall incorporate adequate security measures sufficient to ensure that theyare capable of communicating with respect to lists of available frequencies only with SASs operated byapproved SAS Administrators, and that communications between CBSDs and SASs, between individualCBSDs, and between CBSDs and mobile devices are secure to prevent corruption or unauthorizedinterception of data.(1) For purposes of obtaining operational limits and availabilities and their updates, CBSDs shallonly contact SASs operated by SAS Administrators approved by the Commission in accordance withsection 96.48.(2) All communications between CBSDs and SASs are to be transmitted using secure methodsthat protect the systems from corruption or unauthorized modification of the data.(3) Communications between a CBSD and all End User Devices for purposes of obtainingoperational power and frequency assignments shall employ secure methods that protect the system fromcorruption or unauthorized modification of the data.(4) An SAS shall be protected from unauthorized data input or alteration of stored data. Toprovide this protection, the SAS Administrator shall establish communications authentication proceduressufficient to ensure that the data that the CBSDs receive is from an authorized source.72Federal Communications Commission
- (f) Device Security: All CBSDs and End User Devices must contain security features sufficient toprotect against modification of software by unauthorized parties. Applications for certification of CBSDsand End User Devices must include an operational description of the technologies and measures that areincorporated in the device to comply with the security requirements of this section. In addition,applications for certification of CBSDs and End User Devices must identify at least one of the SASdatabases operated by a designated SAS database administrator that the device will access forchannel/frequency availability and affirm that the device will conform to the communications securitymethods used by such databases.(g) Airborne operations by CBSDS and End User Devices are prohibited.96.37 - End User Devices General RequirementsMobile, portable or fixed End User Devices may operate only if they can positively receive anddecode an authorization signal transmitted by a CBSD, including the frequency channels and power limitsfor their operation.96.38 '' General Radio RequirementsThe requirements in this section apply to CBSDs and their associated End User Devices, unless otherwisespecified.(a) Digital Modulation: Systems operating in the Citizens Broadband Radio Service must usedigital modulation techniques.(b) Conducted and Emitted Power Limits: Unless otherwise specified in this subsection, themaximum conducted output power, maximum transmit antenna gain, maximum Equivalent IsotropicallyRadiated Power (EIRP), and maximum Power Spectral Density (PSD) of any CBSD and End UserDevice must comply with the limits shown in the table below:Maximum
- megahertz)**megahertz)(dBm/MHz)End User Device
- 304720Fixed Point toPoint System
- (PTP)3053201.*Baseline is all cases not qualified under rural or fixed PTP.2.** Maximum Conducted Output Power (as defined in paragraph (4) of thissection)(1) For fixed point-to-point radio systems, the maximum conducted output power in paragraph (b)must be reduced by 1 dB for every 1 dB that the directional gain of the antenna exceeds 23dBi.73Federal Communications Commission
- (2) CBSDs shall limit their operating power to the minimum necessary for successful operations.(3) CBSDs shall include transmit power control capability and the capability to adjust maximumEIRP in response to instructions from an SAS (either directly or through an intermediary system).Applicants for PAL or General Authorized Access use of the band must include a description of these twofunctionalities for all CBSDs and End User Devices.(4) Maximum Conducted Output Power is defined as the total transmit power delivered to allantennas and antenna elements averaged across all symbols in the signaling alphabet when the transmitteris operating at its maximum power control level. Power must be summed across all antennas and antennaelements. The average must not include any time intervals during which the transmitter is off or istransmitting at a reduced power level. If multiple modes of operation are possible (e.g., alternativemodulation methods), the maximum conducted output power is the highest total transmit power occurringin any mode.(c) Received Signal Strength Limits: CBSD transmissions shall be managed such that the mediansignal strength at any location on the boundary of a co-channel PAL shall not exceed -80 dbm asmeasured by a 0 dBi isotropic antenna in 10 megahertz unless the affected licensees or incumbents agreeto a different field strength and communicate that to SAS.(d) 3.5 GHz Emissions and Interference Limits:(1) General protection levels. Except as otherwise specified below, for channel and frequencyassignments made by the SAS to CBSDs operating in the 3550 -3650 MHz band, the power of anyemission outside the fundamental emission (whether in or outside of the authorized band) shall beattenuated below the transmitter power (P) by at least 43 + 10 log10(P) dB.(2) Additional protection levels. Notwithstanding the foregoing paragraph (d)(1) of this section, thepower of any emissions below 3520 MHz and above 3680 MHz shall be attenuated below the transmitterpower (P) in watts by at least 70 + 10 log10(P) dB.(3) Measurement procedure:(i) Compliance with this provision is based on the use of measurement instrumentation employing aresolution bandwidth of 1 megahertz or greater. However, in the 1 megahertz bands immediately outsideand adjacent to the licensee's authorized frequency channel, a resolution bandwidth of no less than onepercent of the fundamental emission bandwidth may be employed. A narrower resolution bandwidth ispermitted in all cases to improve measurement accuracy provided the measured power is integrated overthe full reference bandwidth (i.e., 1 MHz or 1 percent of emission bandwidth, as specified). The emissionbandwidth is defined as the width of the signal between two points, one below the carrier centerfrequency and one above the carrier center frequency, outside of which all emissions are attenuated atleast 26 dB below the transmitter power.(ii) When measuring unwanted emissions to demonstrate compliance with the limits, the CBSD andEnd User Device nominal carrier frequency/channel shall be adjusted as close to the licensee's authorizedfrequency block edges, both upper and lower, as the design permits.(iii) Emission power measurements shall be performed with a peak detector in maximum hold.(4) When an emission outside of the authorized bandwidth causes harmful interference, theCommission may, at its discretion, require greater attenuation than specified in this section.74Federal Communications Commission
- (e) Reception Limits:(1) Priority Access Licensees must accept adjacent channel and in-band blocking interference(emissions from other Priority Access users transmitting between 3550 and 3650 MHz) up to a powerspectral density level not to exceed -30dBm/10 megahertz with greater than 99% probability, unless theaffected licensees agree to a higher or lower power spectral density limit and communicate with the termsof such agreement to the SAS.(2) General Authorized Access operations are subject to the conditions that they cause no harmfulinterference to Incumbent Users or Priority Access Licensees and they can claim no protection frominterference received from Incumbent Users or Priority Access Licensees. The operator of a GeneralAuthorized Access CBSD shall be required to cease operating the device upon notification by a SAS thatthe device is causing harmful interference. Operation shall not resume until the condition causing theharmful interference has been corrected.(3) PA and GAA Licensees must accept interference in authorized areas of operation from federalradar systems up to a peak field strength level of 180 dBuV/m.96.39 '' Equipment Authorization(a) Each CBSD or End User Device utilized for operation under this part and each transmittermarketed as set forth in §2.803 of this chapter must be of a type which has been certificated for use underthis part.(b) Any manufacturer of radio transmitting equipment to be used in these services must requestequipment authorization following the procedures set forth in subpart J of part 2 of this chapter.Equipment authorization for an individual transmitter may be requested by an applicant for a stationauthorization by following the procedures set forth in part 2 of this chapter.96.41 '' RF safetyLicensees and manufacturers are subject to the radio frequency radiation exposure requirementsspecified in § 1.1307(b), 1.1310, 2.1091, and 2.1093 of this chapter, as appropriate. Applications forequipment authorization of mobile or portable devices operating under this section must contain astatement confirming compliance with these requirements for both fundamental emissions and unwantedemissions. Technical information showing the basis for this statement must be submitted to theCommission upon request.Subpart F '' SPECTRUM ACCESS SYSTEM
- 96.43 '' Spectrum Access System Purposes and FunctionalityThe SAS serves the following purposes:(a) To determine and provide to CBSDs the available channels/frequencies at their location.(b) To determine the maximum permissible transmission power level available to CBSDs at agiven location and communicate that information to the CBSDs.(c) To register the identification information and location of CBSDs.(d) To retain information on and enforce Exclusion Zones in accordance with sections 96.15 and96.17.75Federal Communications Commission
- (e) To protect Priority Access Licensees from harmful interference from General AuthorizedAccess Users consistent with 96.23.(f) To reserve the use of GAA channels for use in a CAF consistent with 96.35.(g) To ensure secure transmission of information between the SAS and CBSDs.96.44 - Information Gathering and Retention(a) The SAS shall maintain information on registered CBSDs, FSS locations listed in section96.17, and Exclusion Zones(1) For CBSDs, such information shall include all information required by section 96.36.(2) For incumbent FSS operators, the SAS shall maintain a record of the location of protectedearth stations as well as the direction and look angle of all earth station receivers and any otherinformation reasonable necessary to perform its functions under this part.96.45 - Registration and Authorization of Citizens Broadband Radio Service Devices(a) An SAS must collect required information from CBSDs in accordance with the provisions ofthis part. CBSDs composed of a network of base and fixed stations may employ a subsystem foraggregating and communicating all required information with the SAS.(1) The SAS must also verify that the FCC identifier (FCC ID) of a device seeking access to itsservices is valid. A list of devices with valid FCC IDs and the FCC IDs of those devices is to be obtainedfrom the Commission's Equipment Authorization System.(2) The SAS shall not permit CBSDs within Exclusion Zones to register or operate within theCitizens Broadband Radio Service.96.46 - Frequency Assignment(a) The SAS will determine the available and appropriate channels/frequencies at a given locationusing the geographic information supplied by CBSDs, the frequency assignment data for IncumbentUsers in the SAS, the authorization status and operating parameters of CBSDs in the surrounding area,and such other information necessary to ensure effective operations of CBSDs consistent with this part.(1) Upon request from the Commission or a CBSD, the SAS shall confirm whether frequenciesare available in a given geographic area.(2) Upon request from the Commission, the SAS shall confirm that CBSDs in a given geographicarea and frequency band have been shut down in response to a request from an Incumbent User.96.47 '' Security(a) The SAS shall employ protocols and procedures to ensure that all communications andinteractions between the SAS and CBSDs are accurate and secure and that unauthorized parties cannotaccess or alter the SAS or the list of frequencies sent to a CBSD.(b) Communications between CBSDs and the SAS, between individual CBSDs, and betweendifferent SASs, shall be secure to prevent corruption or unauthorized interception of data. An SAS shallbe protected from unauthorized data input or alteration of stored data.76Federal Communications Commission
- (c) An SAS shall verify that the FCC identification number supplied by a CBSD is for a certifieddevice and may not provide service to an uncertified device.96.48 '' Spectrum Access System AdministratorsThe Commission will designate one or more entities to administer the SAS. The Commissionmay, at its discretion, permit the functions of an SAS, such as a data repository, federal informationdatabase, registration, and query services, to be divided among multiple entities; however, it shalldesignate one or more specific entities to be an SAS Administrator responsible for coordination of theoverall functioning of an SAS and providing services to operators in the Citizens Broadband RadioService. Each SAS Administrator designated by the Commission shall:(a) Maintain a regularly updated database that contains the information described in section96.44.(b) Establish a process for acquiring and storing in the database necessary and appropriateinformation from the Commission's databases and synchronizing the database with the currentCommission databases at least once a day to include newly licensed facilities or any changes to licensedfacilities.(c) Establish and follow a process for registering and protecting the Incumbent Users andenforcing the protection criteria set forth in sections 96.15 and 96.17.(d) Establish and follow a process for registering and coordinating Priority Access Licensees.(e) Establish and follow a process for registering and coordinating General Authorized AccessUsers.(g) Establish and follow protocols and procedures sufficient to ensure that Incumbent Users areprotected from harmful interference from Priority Access Licensees and General Authorized AccessUsers consistent with sections 96.15 and 96.17.(h) Establish and follow protocols and procedures sufficient to ensure that Priority AccessLicensees are protected from harmful interference from spectrally or geographically adjacent PriorityAccess Licensees and from General Authorized Access Users.(i) Establish and follow protocols and procedures sufficient to ensure that all communications andinteractions between the SAS and CBSDs are accurate and secure and that unauthorized parties cannotaccess or alter the SAS or the information transmitted from the SAS to CBSDs.(j) Make its services available to Priority Access Licensees and General Authorized Access Userson a non-discriminatory basis.(k) Provide service for a five-year term. This term can be renewed at the Commission's discretion.(l) Respond in a timely manner to verify, correct or remove, as appropriate, data in the event thatthe Commission or a party brings claim of inaccuracies in the SAS to its attention. This requirementapplies only to information that the Commission requires to be stored in the SAS.(m) Secure transfer the information in the SAS, along with the IP addresses and URLs used toaccess the system, and a list of registered CBSDs, to another designated entity in the event it does notcontinue as the SAS administrator at the end of its term. It may charge a reasonable price for suchconveyance.77Federal Communications Commission
- (p) If more than one SAS is developed, the administrators shall cooperate to develop astandardized process for providing on a daily basis or more often, as appropriate, the data collectedpursuant to section 96.44.(q) Provide a means to make all information that the rules require the SAS to collect available tothe public in a reasonably accessible fashion.(r) Coordinate with other SAS Administrators including, to the extent possible, sharinginformation, facilitating non-interfering use by CBSDs connected to other SASs, maximizing availableGeneral Authorized Access frequencies by assigning PALs to similar channels in the same geographicregions, and other functions necessary to ensure that available spectrum is used efficiently consistent withthis part.96.49 '' Spectrum Access System Administrator Fees(a) An SAS Administrator may charge Citizens Broadband Radio Service users a reasonable feefor provision of the services set forth in section 96.43, et seq.(b) The Commission, upon request, will review the fees and can require changes in those fees ifthey are found to be excessive.78Federal Communications Commission
- '...3650 AddendumIn this Appendix, proposed additions to existing and proposed rules are underlined and proposed deletionsare noted in strike through text,Part 2 '' Frequency Allocations and Radio Treaty Matters; General Rules and Regulations
- 2.106 '' Table of Frequency Allocations.Part 90 '' Private Land Mobile Radio Services
- 90.1303 '' Eligibility(a) Any entity, other than those precluded by section 310 of the Communications Act of 1934, asamended, 47 U.S.C. 310, is eligible to hold a license under this part.(a) Eligibility under this part is limited to entities authorized under this Part as of [adoption date].(b) Eligibility for all authorized users under this Part terminates 5 years after [adoption date].90.1307 '' Licensing(a) The 3650-3700 MHz band is licensed on the basis of non-exclusive nationwide licenses. Non-exclusive nationwide licenses will serve as a prerequisite for registering individual fixed and basestations. A licensee cannot operate a fixed or base station before registering it under its license andlicensees must delete registrations for unused fixed and base stations.(a) The Commission shall issue no new non-exclusive nationwide licenses for this band after[adoption date],90.1311 '' License Term(a) The license term is ten years, beginning on the date of the initial authorization (non-exclusivenationwide license) grant. Registering fixed and base stations will not change the overall renewal periodof the license.(a) All licenses will terminate in accordance with the procedures set forth in Part [x referencingrelevant Part 96 rules] 5 year after [adoption date].90.1338 '' Grandfathered Operation and Transition to Citizens Broadband Radio Service(a) Existing licenses as of [adoption date] may continue to operate fixed or base stations that wereregistered prior to [adoption date] in a manner consistent with the rules in this Part for a period of 5 yearsafter [adoption date].(1) Fixed and Base station registrations (for access points) filed prior to [adoption date] will beafforded protection from interference caused by GAA users for 5 years from [adoption date]79Federal Communications Commission
- (b) Existing licensees as of [adoption date] may register new fixed and base stations under theirexisting non-exclusive nationwide license until 5years after [adoption date]. Registrations filed after[adoption date] will not be afforded protection from harmful interference unless the licensee appliesseparately under the provisions in section 96.23.(c) Existing licensees as of [adoption date] may add new mobile or portable stations (as defined in90.1333) and/or add new subscriber units that operate above the power limit defined in 90.1333, butotherwise comply with the requirement to operate only if they can positively receive and decode anenabling signal from a base station. Such mobile/portable/subscriber units may operate until 5 years after[adoption date].(d) After 5 years from [adoption date], licensees that wish to continue operation must either applyfor a PAL license and operate consistent with the rules set forth in Part 96, subpart C or operate as aGAA user consistent with the Rules in Part 96, subpart D .Part 96 '' Citizens Broadband Radio Service
- Subpart A - GENERAL RULES
- 96.3 '' DefinitionsGrandfathered Wireless Broadband Licensee: A licensee authorized to operate in the 3650-3700MHz band under the rules in Part 90 subpart Z as of date of [adoption].96.7 '' Authorization Required(c) (c) Grandfathered Wireless Broadband Licensees are authorized as to operate their fixed basestation access points that were registered as of [adoption date], for a period of 5 years [from the date ofadoption].Subpart [X] - INCUMBENT PROTECTION
- 96.20 '' Protection of Existing Operators in the 3650-3700 MHz Band(a) Grandfathered Wireless Broadband Licensees shall be granted Incumbent User status for thearea of operation and frequencies of their fixed base station access points that were registered prior to[adoption date] for 5 years from [adoption date]. Notwithstanding this status, Grandfathered WirelessBroadband Licensees shall avoid harmful interference to authorized federal users and grandfathered FSSearth stations consistent with the rules governing Citizens Broadband Radio Service operators in this part.(1) The area of operation for Grandfathered Wireless Broadband Licensees will be defined as theservice contour of an existing registered base or fixed access point. Registered subscriber units(subscriber units that were registered because they operate above the mobile power limit listed in90.1333) will not be included in these service contour calculations. These contours will be included inthe SAS.(2) Grandfathered Wireless Broadband Licensees may operate within their service contoursconsistent with the technical rules in Part 90, subpart Z until 5 years from [adoption date].(3) Where the service contours of Grandfathered Wireless Broadband Licensees overlap, thelicensees will be required to share the spectrum as previously required under the technical rules in Part 90,subpart Z. After 5 years from [adoption date] licensees that wish to continue operation after that datemust apply for PALs consistent with the rules set forth in Part 96 subpart C or operate as a GAA user80Federal Communications Commission
- consistent with the Rules in Part 96, subpart D . Mutually exclusive applications for PALs in the initialwindow after these grandfathering provisions sunset will be resolved as set forth in section 96.27.(a) To protect authorized federal operations in the 3650-3700 MHz band, an Exclusion Zone of[XX] kilometers from the following locations shall be maintained.St. Inigoes, MD'--38° 10² N., 76°, 23² W.Pascagoula, MS'--30° 22² N., 88°, 29² W.Pensacola, FL'--30° 21² 28" N., 87°, 16² 26"W.This Exclusion Zones shall be enforced by the SAS.(b) To protect grandfathered FSS earth stations in the 3650-3700 MHz band a protection zone of150 kilometers from the locations of grandfathered FSS earth stations shall be maintained for 5 yearsfrom [adoption date] for Citizens Broadband Radio Services operating in the 3650 -3700 MHz band.Thereafter, such FSS earth stations shall be protected from harmful interference consistent with theprotections afforded other FSS earth stations pursuant to section 96.17.Subpart [X] '' SPECTRUM ACCESS SYSTEM
- 96.43 '' Spectrum Access System(a) . . .(b) . . .. . .(3) For incumbent federal users, the SAS shall maintain a record of any information submitted byfederal users necessary to protect their operations in the 3550-3650 3700 MHz band.81Federal Communications Commission
- Re:Amendment of the Commission's Rules with Regard to Commercial Operations in the3550-3650 MHz Band, Further Notice of Proposed Rulemaking, GN Docket No. 12-354Today we take an important step towards a new spectrum future. Not only are we proposing toopen up the 3.5 GHz band, but we are also enabling the powerful new concept of spectrum sharing amongmultiple users on an hierarchical basis.In July 2012, the President's Council of Advisors on Science and Technology (PCAST) issued alandmark report on maximizing the potential of wireless spectrum to grow our economy and enable otherbenefits for the American people. The PCAST report highlighted spectrum sharing as a next-generationpolicy innovation that holds the potential to revolutionize the way we manage our airwaves. With thisitem, the Commission takes another significant step to turning this concept into reality.Both the PCAST and the FCC's Technological Advisory Council, which I was honored to lead,recommended that the Commission target the 3.5 GHz as an ''innovation band.'' Building on what theCommission has already done under the leadership of Chairman Genachowski and Chairwoman Clyburn,that's exactly what we're doing in this item.This Notice proposes a three-tiered spectrum access model, which includes federal and non-federal incumbents, priority access licensees, and general authorized access users. The three-tieredconstruct was a key aspect of the PCAST report, and is necessary to realizing the full potential ofspectrum sharing.Second, it proposes a single, highly flexible band plan, avoiding the analog trap of Balkanizingspectrum into sub-bands, each with its own sets of rules.Third, the Notice anticipates a wide range of flexible uses. Small cells will undoubtedly be a coreuse case, but we would not limit the band to such use.Finally, the Notice reflects economic incentives. Even with the most efficient technology, therewill always be places and times where there is rivalry for spectrum access. To that end, the Noticeproposes a flexible auction and licensing scheme that leverages the technical capabilities of a SpectrumAccess System (SAS) database. Think of the SAS as a traffic cop for spectrum in that it can assess whatspectrum is available so that it can be accessed by prioritized users.I know that the three-tier construct and non-traditional licensing scheme is a bit nouveau. That'sby design; if we are going to have sufficient spectrum for the needs of the 21st century, we are going tohave to think anew. This proposal could unlock vast new opportunities for wireless '' in huge verticalslike energy, healthcare, and financial services. We also see the 3.5 GHz band as a potential home for newtechnologies like LTE-Unlicensed, which could inhabit the General Authorized Access tier. Or it couldallow for new flavors of Wi-Fi. There is huge upside within this proceeding. We should not flinch fromthe opportunity simply because it is not standard operating procedure.Thank you to the Wireless Telecommunications Bureau, the Office of Engineering andTechnology, the International Bureau, and the Office of the General Counsel for their outstanding, out-of-the-box work on this issue.82Federal Communications Commission
- COMMISSIONER MIGNON L. CLYBURN
- Re:Amendment of the Commission's Rules with Regard to Commercial Operations in the3550-3650 MHz Band, Further Notice of Proposed Rulemaking, GN Docket No. 12-354There are some who say that '' like oil and water '' regulation and innovation just don't mix. Alltoo often, they contend, regulation effectively protects incumbents and stifles innovation by creatingbarriers to entry for new entrants and disruptive technologies.This proceeding, which builds upon recommendations in the July 2012 PCAST Report, offers apossible rebuttal to that position. It clearly shows the federal government understands that technologicaladvances can enable us to depart from traditional regulatory models and adopt new approaches, withlower administrative costs, which could spur even greater innovation from incumbent carriers, and newentrants. Because repurposing federal spectrum for commercial use can take years, and the country'sdemand for mobile broadband services will not wait that long, the PCAST Report recommended thatcommercial services share underutilized federal spectrum to the maximum extent possible. The advancesin small cell networks and the concepts in the successful TV White Space databases, make that degree ofspectrum sharing possible.So, in 2012, we adopted an NPRM that proposed new spectrum management concepts with alicense by rule framework which would provide for Incumbent Access, Priority Access, and GeneralAuthorized Access tiers. We proposed a highly flexible band plan to facilitate rapid broadbanddeployment while protecting existing federal and commercial incumbent users in the 3.5 Gigahertz band.That NPRM also improved on the PCAST recommendation by including the 3650 to 3700 megahertzband. This band is used extensively by wireless Internet service providers, or WISPs, to providebroadband in rural and other underserved areas.This Further Notice brings even more creativity to the proceeding, by revising the licensingframework, in order to incentivize more efficient use of the Priority Access tier. Instead of licensing thattier to only certain institutions by rule, we propose to expand the eligibility to all entities and establishgranular flexible Priority Access Licenses that would amount to a 10 megahertz license, for one censustract, for one year that can be aggregated. If more than one entity wants the same license for the sameyear, there will be an auction. Although these licenses would have some of the key features of traditionalFCC licenses, such as exclusive spectrum rights, because they are shorter in duration, they would nothave other features, such as performance requirements. The goal is to establish a license, with loweradministrative costs, that would allow for micro-targeted network deployments; and easy aggregation, toserve a larger footprint for a longer period of time.By enabling aggregation, this framework would allow for the type of predictability that wouldattract larger carriers, to invest in equipment for the band. Because we also propose to requireinteroperability across all three tiers throughout the 150 megahertz in the band, this approach has theadded benefit of bringing greater spectrum availability and equipment scale economies to WISPs, newentrants, and small businesses who want to provide service in the band.I want to thank Roger Sherman, Julie Knapp, and the staffs of the Wireless Bureau, OET andInternational Bureau, and my legal advisor, Louis Peraertz, for their hard work on this item and theircontributions throughout this proceeding.83Federal Communications Commission
- COMMISSIONER JESSICA ROSENWORCEL
- Re:Amendment of the Commission's Rules with Regard to Commercial Operations in the3550-3650 MHz Band, Further Notice of Proposed Rulemaking, GN Docket No. 12-354If you want to get a glimpse into the future of spectrum policy, take a look at the 3.5 GHz band.What we are poised to do with this band is creative, innovative, and could serve as the blueprint formaking smarter use of our airwaves going forward.But before looking ahead, it is helpful to look back at how we got here. Four years ago, theNational Telecommunications and Information Administration (NTIA) identified the 3.5 GHz band asone of the spectrum bands most suitable for shared use between government and commercial interests.But the response to the NTIA proposal was muted, interest was limited, and enthusiasm was hard to find.Because it was apparent to everyone that protecting existing users in the band'--from Department ofDefense radars to commercial fixed satellite services'--would mean significant geographic limitations fornew services. As a result, the ability to make use of this spectrum was limited in the most populous areasof the country. Moreover, because the band is above 3 GHz, it did not hold much appeal for mobilebroadband. After all, signals at high frequency like this can fade too quickly.So the outlook for commercial opportunity in the 3.5 GHz band was not good. But now, based onrecommendations from the President's Council of Advisors on Science and Technology, rather thandiscarding this band as junk, we are staring at new opportunities. These opportunities will be built on acreative three-tiered approach to spectrum access. This proposal simultaneously protects existing users,creates new spectrum licenses custom-built for small cell deployments, and opens up more spectrum forunlicensed services'--the jet fuel of wireless innovation. This is very cool'--and very smart, too.But setting aside history and the here and now, I want to talk about what our proposals mean forthe future.First, with our work on the 3.5 GHz band we demonstrate that we are leaving behind the tirednotion that we face a choice between licensed and unlicensed airwaves. This kind of division is asimplistic relic from the spectrum past. We cannot let it haunt us in the future. Because there is no doubtthat good spectrum policy requires both licensed and unlicensed services. Moreover, the next generationof wireless devices and the coming Internet of Things will not rely on a single spectrum band to function.Instead, services will overcome spectral and physical challenges by moving from frequency tofrequency'--sometimes on spectrum that is licensed and sometimes on spectrum that is unlicensed.Second, with our work on the 3.5 GHz band we make clear that small cells have a big future.They can expand connectivity and facilitate more efficient use of existing frequencies. They can coverareas that cannot be reached using macro cell services'--and at the same time they can limit interferencerisk. In fact through small cell use, what was once considered a weakness of higher spectrum bands'--namely short propagation distance'--can be turned into a strength.Third, if we can manage the exclusion zones that have previously limited interest in the 3.5 GHzband, we may have also discovered the key to unlocking use of another 120 megahertz in the 5 GHz band.That's because the same kinds of federal radar systems that use the 3.5 GHz band also operate in the5350-5470 MHz band. If this band sounds familiar, that's because it was a band identified by Congressin the Middle Class Tax Relief and Job Creation Act as a potential new home for unlicensed services. Butour efforts to realize this potential have been frustrated by the usual and familiar'--the needs of existingusers in the band, including federal radar systems.84Federal Communications Commission
- However, as we move closer to solutions for the 3.5 GHz band, we just might have blueprint forfreeing more spectrum for unlicensed services in the 5350-5470 MHz band. In other words, what welearn from managing exclusion zones in the 3.5 GHz band could yield possibilities for commercialservices in the 5 GHz band. That would be a good way to honor our directive from Congress, a good wayto reduce congestion on licensed service networks, and a good way to increase unlicensed spectrumopportunities. These are all good things that can lead to more spectral support for the Internet of Things.So thank you to the Wireless Telecommunications Bureau and Office of Engineering andTechnology for your creative work on the 3.5 GHz band and for your continuing work on moreinnovative spectrum possibilities in the future.85Federal Communications Commission
- Re:Amendment of the Commission's Rules with Regard to Commercial Operations in the3550-3650 MHz Band, Further Notice of Proposed Rulemaking, GN Docket No. 12-354To those familiar with spectrum policy, it should be no surprise that federal incumbents aren't themost efficient users. The 3.5 GHz band is a case in point'--relatively minor use of that band along thenation's coasts has left the majority of this spectrum under-utilized for decades. Now it's time to put it towork for consumers. As I observed when we launched this proceeding,1 a simple test must guide ourapproach: What works? Can our proposals for the 3.5 GHz band be implemented in the real world? Canconsumer products be brought to market in a timely manner? We must approach the 3.5 GHz band froma practical perspective, not merely a theoretical one.When viewed through this lens, today's item is a mixed bag, and I therefore will be voting toconcur. I am pleased that our proposals have improved in some respects over the course of the lastsixteen months. For example, while the 2012 NPRM proposed that the Commission set aside the entirecategory of tier two priority access authorizations for a small and defined set of preferred users, today'sitem moves in a different direction. It liberalizes access to the band and proposes that any entity shouldbe eligible to hold a priority access authorization. The item finds that open eligibility will promote moreintensive use of the band and promote investment in new small cell technologies that could make 3.5 GHza success. That's the right approach.Unfortunately, much of this item is ''d(C)j vu all over again'' as Yogi Berra once put it, andrepresents a disappointing lack of progress. The foremost problem involves exclusion zones. Back in2010, when the National Telecommunications and Information Administration (NTIA) first identified the3.5 GHz band for possible commercial use, the agency drew enormously large protection zones aroundthe federal incumbent users. It developed these zones based on its analysis and modeling of a specifictype of commercial use'--one that involved high-power, high-site, macro-cell deployments.In light of NTIA's determination, our 2012 NPRM declined to pursue a macro-cell approach forthe 3.5 GHz band. Instead, we sought comment on low-power, small cell deployments.2 Because thiskind of network architecture is vastly different from traditional deployments, we noted that some keyNTIA assumptions would ''not apply and would need to be revisited.''3 We indicated our view that those2010 exclusion zones could be reduced significantly in light of our small cell proposal. And we askedcommenters to perform and provide the technical analyses that would be necessary to do so.4They did. The private sector took up the Commission's call and supplied us with detailed andunchallenged technical analyses showing that NTIA's 2010 exclusion zones can be dramatically reducedfor small cell deployments.5 The calculations performed by Qualcomm have been particularly helpful.1 See Amendment of the Commission's Rules with Regard to Commercial Operations in the 3550''3650 MHz Band,GN Docket No. 12-354, Notice of Proposed Rulemaking, 27 FCC Rcd 15594, 15658 (2012) (Statement ofCommissioner Ajit Pai).2 See, e.g., id. at 15597, para. 6.3 Id. at 15633, para. 118.4 See, e.g., id. at 15629''34, paras. 109''18.5 See, e.g., Letter from John W. Kuzin, Senior Director of Government Affairs '' Regulatory, Qualcomm, to MarleneH. Dortch, Secretary, FCC, GN Docket No. 12-354 (Apr. 15, 2014) (Qualcomm Ex Parte Letter); see alsoQualcomm Comments at iii, 17 (Feb. 20, 2013).86
- Federal Communications Commission
- They show that NTIA's exclusion zones, which reached a maximum of 346 miles, can be reduced to lessthan 10 miles for small cell deployments.6But unfortunately, the FCC has not done its part. Today's item does not incorporate theunrebutted technical evidence showing that the 2010 exclusion zones can be dramatically reduced whilestill protecting incumbent federal users'--evidence we asked parties to submit. In fact, the Commissionrefuses even to seek comment on that analysis and simply proposes to codify the 2010 exclusion zones.Instead of going where the facts take us, the Commission double downs on where they don't. To be clear,the Commission does not simply seek comment on this issue. It proposes to adopt those zones as rules.This is surprising for two basic reasons. First, I have yet to hear from anyone who believesNTIA's 2010 exclusion zones are appropriate for the type of small cell uses we're proposing for thisband. Indeed, even NTIA did not propose that the Commission adopt those zones for small cell use cases.Its Fast Track Report included the express caveat that NTIA would ''need to revise the analysis'' for anyuse case other than the high-power one it studied.7 Similarly, the 2012 PCAST Report explained thatthose zones would be necessary for high-power, wide-area uses but concluded that low-power usesgreatly minimize the need for exclusion zones and could even eliminate them entirely.8Second, I have serious concerns about what the item's proposed exclusion zones mean for thesuccess of the 3.5 GHz band. I noted at the outset of this proceeding that a decision to adopt those zoneswould mean that 60 percent of the U.S. population would be prohibited from using 3.5 GHz devices. Iexplained that this was particularly troublesome because the substantial majority of spectrum-limitedmarkets in the U.S. would fall within those zones. And now the record indicates that the band simply''would not be commercially viable'' were the 3.5 GHz band only available for consumer use outside ofthose 2010 zones.9So, to summarize: The entity that drew the 2010 exclusion zones did not recommend that theyapply here; PCAST found that they are not needed for small cell deployments; the unchallenged recordevidence shows that they're unnecessary to protect federal incumbents; and no one that I'm aware ofbelieves that they make sense for the use cases we're considering. Nonetheless, we once again propose tocodify them.Going forward, the success of the 3.5 GHz band depends on shrinking the proposed exclusionzones. I hope interested parties take advantage of the Commission's characterization of this proposal as a''starting point'' and, once again, share their ideas and analysis on how to accomplish that goal.Beyond the exclusion zones, I have additional concerns regarding some of today's proposals. Forinstance, I question the proposal to impose a hard, 30 MHz cap on the amount of priority access spectrumthat any one entity can hold. Similarly, I question the item's proposal to carve out 20 MHz of spectrumas a set aside for certain groups of preferred users. I am skeptical that these attempts to pick winners andlosers will serve the public interest.Notwithstanding these concerns, I look forward to learning from the record that will be compiledas a result of today's item. And I hope we meaningfully improve our proposals so that Americanconsumers will be able to benefit from the 3.5 GHz band. In this sentiment, I take inspiration fromanother of Yogi Berra's wise aphorisms, ''It ain't over 'til it's over.''6 See Qualcomm Comments at 17 (Feb. 20, 2013).7 See NTIA, An Assessment of the Near-Term Viability of Accommodating Wireless Broadband Systems in the1675''1710 MHz, 1755''1780 MHz, 3500''3650 MHz, 4200''4220 MHz, and 4380''4400 MHz Bands at 1''7 (2010).8 See President's Council of Advisors on Science and Technology, Report to the President: Realizing the FullPotential of Government-Held Spectrum to Spur Economic Growth at 7 n.33 (July 20, 2012); see id. at 51.9 See, e.g., Qualcomm Ex Parte Letter at 1.87
- Federal Communications Commission
- COMMISSIONER MICHAEL O'RIELLY
- Re:Amendment of the Commission's Rules with Regard to Commercial Operations in the3550-3650 MHz Band, Further Notice of Proposed Rulemaking, GN Docket No. 12-354Today, we take another step towards allocating the 3.5 GHz Band for additional wireless uses.Currently, this valuable spectrum is used for federal and non-federal services, such as radar systems andsatellite earth stations. In the future, it could be opened up for use by small cell systems, wirelessbackhaul, or the next innovative wireless technology. But, we are faced with balancing the introductionof new wireless services with the challenging task of protecting incumbents from harmful interference.That is why I strongly prefer clearing federal government users and reallocating over sharing. Inthis unique case, however, it may be worthwhile to pursue sharing to move forward quickly instead ofwaiting for a better solution or for clearing to be completed. To this end, the 3.5 GHz Band will be onebig experiment in terms of the proposed sharing design and licensing scheme. We place a lot of trust thatthis novel effort will be successful. But, if it does not meet expectations, we are not precluded fromaltering it in the future. Accordingly, I will vote in favor today's further notice that seeks to askquestions, acquire additional information, and obtain necessary data on how this experiment should bestproceed. While I will keep an open mind as the record develops, I have several concerns that I would liketo see addressed before any final rulemaking.First, I worry that the proposed exclusion zones are too large to attract adequate interest andinvestment in this band. Despite evidence in the record showing that low-power small cell systems willnot require such large exclusion zones, there has been no progress in reducing their size, even for thislimited purpose. Today's further notice walls off the same 60 percent of the United States population asintroduced by NTIA in 2010 and put forth in the Commission's original notice in December 2012.1 The3.5 GHz Band would be largely unusable on the east and west coasts and along the Gulf. As you can seefrom the slide, New England, Florida, South Carolina, Louisiana; almost all of New York, Virginia,California; and half of Texas are in exclusion zones.2 I hope and trust that they can be substantiallyreduced and that there will be opportunities for the new wireless operators and federal incumbents tocoordinate in these areas.Second, I am concerned that the proposed term and geographic size of the Priority AccessLicenses, or ''PALs,'' may also hinder investment and innovation. For example, the PALs may belicensed for one year terms that may be aggregated up to five years. There is no certainty that, aftermaking the capital expenditure during that time, a licensee would be able to continue its priority access.Additionally, the item proposes to license PALs by census tracts, which means there would beapproximately 74,000 licenses.3 As a result, applicants could face the difficulty of bidding on thousandsof licenses in order to cover any one metropolitan area.1 U.S. Department of Commerce, National Telecommunications and Information Administration, An Assessment ofthe Near-Term Viability of Accommodating Wireless Broadband Systems in the 1675-1710 MHz, 1755-1780 MHz,3500-3650 MHz, 4200-4220 MHz, and 4380-4400 MHz Bands (rel. Oct. 2010) (NTIA Fast Track Report), availableathttp://www.ntia.doc.gov/files/ntia/publications/fasttrackevaluation_11152010.pdf; Amendment of theCommission's Rules with Regard to Commercial Operations in the 3550-3650 MHz Band, GN Docket No. 12-354,Notice of Proposed Rulemaking and Order, 27 FCC Rcd 15594 (2012).2 NTIA Fast Track Report at 5-7, Fig. 5-3.3 U.S. Department of Commerce, Census Bureau, 2010 Census Tallies of Census Tracts, Block Groups & Blocks,https://www.census.gov/geo/maps-data/data/tallies/tractblock.html (last visited Apr. 22, 2014).88
- Federal Communications Commission
- Third, this further notice supports a three-tiered use system that includes incumbents, PALs, andGeneral Authorized Access (GAA) users. If this is not complicated enough, the Commission proposes toreserve up to 20 megahertz of spectrum for critical users within indoor facilities and may expand thispreferential treatment to certain outdoor facilities. This could reduce available spectrum for GAA users.And, although we have not fully defined this class of users at this stage, it does not appear that manyhospitals, public safety entities or local governments are actively seeking this spectrum. Why noteliminate Contained Access User set-asides and allow GAA or PAL providers to offer services to theseusers? Similarly, if critical users have a need, why can't they apply for GAA spectrum or PALs?Further, this item proposes spectrum aggregation limits for PALs in the 3.5 GHz Band which Ibelieve to be completely unnecessary. Given the propagation characteristics of this spectrum and its easeof reuse, there will be plenty of opportunity for operators to deploy any number of devices and services inthis spectrum.Finally, the 3.5 GHz Band is ideal for placement of small cells which are helping carriers managenetwork congestion as data use increases exponentially every year. We need to do all we can to enablemore efficient small cell deployment to bring better wireless broadband service to Americans. Therefore,I hope that the Commission will expeditiously conclude this proceeding to make the additional spectrumavailable for this purpose. At the same time, we should work to finalize the proceeding to implementsection 6409 of the Middle Class Tax Relief and Job Creation Act, or separate off for its own proceedingconsideration of just small cells, whichever can be done faster. If we want the 3.5 GHz experiment towork, we need to move on small cell siting.I thank the dedicated staff from the Wireless Telecommunications Bureau, the Office ofEngineering and Technology and the International Bureau for all of their efforts so far, including sensitiveand complicated negotiations with NTIA and other federal agencies, and for all the work that lies ahead toget this rulemaking across the finish line.89Federal Communications Commission
- Composite Depiction of Exclusion Zone Distances,Shipborne Radar SystemsSource: NTIA Fast Track Report at 5-7, Fig. 5-3.90Note: We are currently transitioning our documents into web compatible formats for easier reading. We have done our best to supply this content to you in a presentable form, but there may be some formatting issues while we improve the technology. The original version of the document is available as a PDF, Word Document, or as plain text.
-
- FCC: 3.5 GHz will become the small cell band - FierceWirelessTech
- Hoping to jumpstart a U.S.-led spectrum-sharing and small cell revolution, the FCC moved to open up the 3.5 GHz band for use by entities deploying small cells, which will share the spectrum with incumbents.
- The commission issued a Notice of Proposed Rulemaking (NPRM) that, among other things, will allow small cell devices to deliver wireless broadband service in the 3550-3650 MHz band via a shared-access scheme.The band is currently used for U.S. Navy radar operations and covers 60 percent of the U.S. population.
- The proposed 3.5 GHz Citizens Broadband Service will be covered by a three-tier authorization mechanism and managed by a geolocation-enabled dynamic spectrum access database that is modeled on the existing TV white spaces database. The three proposed tiers of operation are: incumbent access (federal and grandfathered licensed FSS 3.5 GHz Band users), priority access (hospitals, utilities and public-safety entities) and general authorized access (the general public).
- "GAA users could include a wide range of residential, business, and others, including wireless telephone and Internet service providers," said the FCC.
- The incumbent tier would be guaranteed protection from harmful interference caused by all other users in the band, while priority-access users would have a measure of interference protection in portions of the 3.5 GHz band at specific locations. The general public would be allowed access to the band on an "opportunistic basis" within designated geographic areas, but they would have to live with the interference caused by other users.
- "Under our main proposal, users in the Priority Access and GAA tiers would be licensed by rule as Citizens Broadband Service users under Part 95 of the Commission's rules. A license-by-rule approach would provide individuals, organizations, and service providers with 'automatic' authorization to deploy small cell systems, in much the same way that our Part 15 unlicensed rules have allowed widespread deployment of Wi-Fi access points," said the FCC.
- The draft NPRM also includes a supplemental proposal to expand the proposed licensing and authorization model to the 3650-3700 MHz band, which would be included in the Citizens Broadband Service licensing framework. Current users in that band would be reclassified as general authorized access users.
- The FCC's plan for the Citizens Broadband Service reflects recommendations included in a report issued in July by the President's Council of Advisors on Policy and Technology (PCAST).
- "This proceeding represents two distinct policy and technology innovations that have tremendous promise," said Chairman Julius Genachowski.
- The first innovation is spectrum-sharing, which maximizes the use of spectrum, though Genachowski said the first choice is always to clear and reallocate government spectrum for commercial uses, but that is not always possible.
- The second innovation is small cells. "It's a very important technology revolution, and one of the things that is exciting about his proceeding is that having a band that is essentially a small cell band may be more likely to drive innovation business models around small cells than otherwise," Genachowski said.
- He added that the 3.5 GHz proceeding should ensure the United States gains global leadership in both spectrum sharing and small cell deployments. Regarding the former, "the U.S. will benefit if we are the country that sorts through all the challenges of that first because we know every country is looking at this," he said.
- Genachowski said the U.S. also has a chance to lead the world in putting the 3.5 GHz spectrum to use. "This is spectrum that generally is available around the world, but with this proceeding, we are becoming the first country of scale to be moving forcefully to put this spectrum to work in the marketplace," he said.
- Observers say the rulemaking proceeding is a crucial step in opening up spectrum for additional data capacity. "The 3550 MHz proceeding can produce a win-win outcome, where the Navy uses a portion of the total capacity of the band exclusively and unlicensed and lightly-licensed users use another portion on a low-power, small-cell basis that will protect existing military uses and thereby expand access to wireless broadband nationwide," said a statement from the Wireless Innovation Alliance, whose membership includes Google (NASDAQ:GOOG), Microsoft (NASDAQ:MSFT), Spectrum Bridge and Dell.
- FCC Commissioner Ajit Pai said he is interested in examining whether 3.5 GHz exclusion zones can be kept small because 50-60 percent of the U.S. population will not be able to use the 3.5 GHz band under the proposed exclusion zones, which prohibit commercial use along coasts and near certain inland Department of Defense training sites.
- "This is especially troubling because the substantial majority of the spectrum-limited markets [are] found within these zones, from New York to Los Angles and Seattle to Miami," said Pai.
- He also said he hopes the commission will soon take action to exempt small cells from environmental processing requirements. "We shouldn't impede their deployment in the 3.5 GHz band or any other band with unnecessary red tape," said Pai.
- Qualcomm applauded the FCC's move to open up the 3.5 GHz band. "Small cells, when deployed in conjunction with macro cells using smart network technology, will expand capacity substantially, enhance network coverage and reliability and even improve position location accuracy. Small cells will require a predictable quality of service, and, therefore, the spectrum must be shared on an authorized basis," said Dean Brenner, senior vice president of government affairs for Qualcomm (NASDAQ:QCOM).
- Qualcomm is part of the High Tech Spectrum Coalition, which also includes Apple (NASDAQ:AAPL), Alcatel-Lucent (NASDAQ: ALU), Cisco, Ericsson (NASDAQ:ERIC), Intel, Nokia (NYSE:NOK), Research in Motion (NASDAQ:RIMM) and Samsung. The HTC sent a letter to top federal lawmakers this week in which it asked Congress to expand the upcoming incentive auction to include spectrum that can be reallocated from federal users for commercial uses. The group recommended that incentives could induce federal users to "become more efficient, share with one another, vacate or to lease their spectrum," according to The Hill.
- The Wireless Internet Service Providers Association (WISPA) heralded the FCC's move on 3.5 GHz, which could provide additional spectrum to its members. "The proximity of this band makes it a natural extension to existing spectrum in the 3650-3700 MHz band. Wireless Internet service providers use this band every day to provide fixed broadband services to rural areas around the country. Access to an additional 100 megahertz of spectrum will vastly improve our members' ability to expand service to the millions of Americans who have little or no choice in broadband access," said Elizabeth Bowles, WISPA president.
- Another band being eyed for sharing between government users and commercial interests is the 4.9 GHz band, which consists of a contiguous block of 50 MHz located at 4940-4990 MHz and is currently designated for public-safety fixed and mobile uses.
- In addition, T-Mobile USA is involved in a joint industry-government effort to test spectrum sharing in the 1755-1780 MHz band, which the operator contends will open up the frequencies for pairing with the existing AWS-3 band for eventual auction, long before all government entities are cleared from the spectrum.
- For more:- see this FCC Web page- see this MIT Technology Reviewarticle- see this The Hillarticle
- Related articles:WISPA pushes testing to validate 4.9 GHz spectrum sharingRysavy: Spectrum sharing with LTE is conceivable but not trivialMaking the most of today's spectrum resources3.5 GHz spectrum sharing effort could take years to produce resultsT-Mobile: We'll prove shared 1755-1780 MHz band can be auctionedSpalter: Spectrum sharing and the elusive silver bulletAT&T raises red flag over shared spectrum plan4.9 GHz band could open up for limited commercial use
- Article updated Dec. 12, 2012, to include additional information from the FCC's Notice of Proposed Rulemaking and Order.
-
- We're approaching the post-Internet age. You need to learn about mesh networks | VentureBeat | Dev | by Barry Levine
- Once, the Internet was the paradigm of decentralized, anonymous, citizen-based, secure communication. Now, mesh networks are being touted for that role.
- Mesh networks are small, standalone communications exchanges that rely on phones (or other devices) talking directly to each other, with their range sometimes amplified through line-of-sight routers or other extenders. These hyper-local area networks can have a link to the outside Internet, but they don't always need it to accomplish their central aims: local communications in spite of natural disaster or political suppression.
- The Serval project in Australia, for instance, was launched after the devastating 2010 earthquake in Haiti to provide emergency communications even when the larger cellular and Wi-Fi networks are down. Android phones running a Serval app can communicate directly with each other, a Wi-Fi-based peer-to-peer structure that uses other phones to hop between distances.
- Tests by the Serval project indicate that two phones can communicate directly through a Wi-Fi mesh over 100 meters if they have a clear line of sight. A new device has been developed by the Serval project to extend that link further, and the project is currently in the midst of a crowdfunding campaign.
- The Commotion Wireless project of the New America Foundation's Open Technology Institute is another such effort, designed to keep a local network going among protestors when regimes have cut off Net access, which has been a favored first step to quell protests in Egypt and elsewhere.
- As a standalone and largely peer-to-peer network, mesh networks are potentially more secure against surveillance by governmental agencies. A spy agency could, of course, set up shop within the mesh network. To prevent that, the Commotion project has developed an encrypted program that allows communication to be routed only among trusted devices.
- The technology is still developing, with reports of latency, range, stability and other technical issues hampering its utility. But, in an appropriate irony, the U.S. State Department has become a major driver and funder of mesh networks because of their usefulness for democratic movements in other countries '' even as adoption of mesh networks in the U.S. is being driven in part by a desire to avoid the peeping eyes of another part of the U.S. government, the National Security Agency.
-
- The Raspberry Eye Sees All
- [Roman Rolinsky] wanted to try to do something interesting with his Raspberry Pi and a 2.8'" LCD he had laying about'... So he made a rather bulky version of Google Glass.
- We've seen a few examples of home brew Google Glass before, or even real-life subtitle glasses used for translation on the fly, but what we really like about [Roman's] project (besides the fact he hosted it on our very own awesome project hosting site) is that he's put together the projection system himself out of basic components.
- To create the HUD, he's using a semi-transparent mirror which he took out of an Eye of Horus Beamsplitter game '' which is a really cool real-life puzzle board game like those games where you have to reflect the laser to solve a puzzle. He's then using a 3x Fresnel magnification lens which is placed over top of his 2.8'" LCD in a 3D printed enclosure. This magnifies and reflects the image onto the mirror which is placed directly over his eye, allowing for a see through display.
- We've asked for a demonstration video, so if you follow his project you'll get all the future updates of his Raspberry Eye.
-
- The Internet of Things Will Make Millions Selling Your Personal Data
- Tech companies that make connected devices like FitBits and Nest thermostats are in an plum position. They rake in revenue every time someone buys their product, leaving the freeloaders to Facebook and Twitter. But the real prize isn't the cost of the device, it's your personal data.
- What's more, taxpayers are indirectly footing the bill because government agencies are investing millions in using that data to (1) help utility companies manage the demand for energy and (2) help employers promote wellness through their healthcare plans.
- Forbes reports that both FitBit and Nest Labs are both taking advantage of that side hustle:
- Smart-thermostat maker Nest Labs (which is being acquired by Google for $3.2 billion) has quietly built a side business managing the energy consumption of a slice of its customers on behalf of electric companies. In wearables, health tracker Fitbit is selling companies the tracking bracelets and analytics services to better manage their health care budgets, and its rival Jawbone may be preparing to do the same.
- Nest Labs founder Tony Fadell told Forbes that income from the terabytes of data being sent from your living room will eventually outpace the money Nest makes from selling devices:
- "We'll get more and more services revenue because the hardware sits on the wall for a decade," he said during an interview in December in Nest's Palo Alto office.
- Nest already has relationships with about a dozen utility companies. Activity trackers like Fitbit aren't as far along selling data, but insurers are already thinking about how that information might help them adjust prices:
- For privacy reasons both self-insured employers and those with group insurance have to bring on a population-management firm such as StayWell or Welltok to manage the data as a neutral third party. Amy McDonough, who oversees Fitbit's employer program, wouldn't comment on how Fitbit data would affect pricing negotiations between employers and health care providers, though health insurer Cigna said fitness trackers "may" have an impact on future group insurance pricing . The data are still being tested.
- Nest's thermostat uses multiple sensors to detect temperature and movement to learn a household's activity. Cofounder Matt Rogers told Forbes that Nest automatically adjusts the temperature, studying the data itself rather than selling it directly to utilities. But it's still a lucrative arrangement:
- Nest's deals with utilities also vary. In some cases the utility reimburses customers $30-to-$50 a year per thermostat for the right to turn the air conditioner down on hot days to ease the load on the grid. In other deals Nest splits cost savings with the utility. Demand response programs are worth an estimated $80 per thermostat, so 1% of U.S. households potentially spells a $100 million pie that Nest, utilities and customers can split each year.
- Multiply that by a decade of continued data collection. In the promotional video above Nest Lab promises: "It never stops learning."
- To contact the author of this post, please email nitasha@gawker.com.
-
- Donald Kaufman: Hacker 'Weev' Is Out of Jail, But His 'Fight for Freedom' Isn't Over Yet - Truthdig
- Hacker 'Weev' Is Out of Jail, But His 'Fight for Freedom' Isn't Over YetPosted on Apr 21, 2014By Donald Kaufman
- Andrew ''Weev'' Auernheimer walked out of the Federal Correctional Institution Allenwood in White Deer, Pa., on April 11 after spending over a year there when a federal appeals court vacated his conviction on hacking charges.
- Auernheimer had been found guilty on Nov. 20, 2012, of conspiracy to gain unauthorized access to AT&T servers under the Computer Fraud and Abuse Act and for identity theft in New Jersey (although he was never in New Jersey, nor were the servers he accessed in that state). He and another man, Daniel Spitler, were charged with fraud under the CFAA for finding a loophole on AT&T's website in June 2010 that allowed them to gain access to thousands of emails of iPad owners'--after which Auernheimer shared his findings with a reporter from Gawker who wrote a story and notified AT&T. The list of emails was never released to the public. Spitler pleaded guilty and was given probation but Auernheimer decided to fight the charges.
- The trial was set in motion by the U.S. government with the help of AT&T. According to Auernheimer and his lawyer, Tor Ekeland, the FBI was at the center of Auernheimer's conviction. None of the email addresses that Auernheimer found on AT&T's public website were password protected. In addition to Ekeland, Auernheimer's legal team included Orin Kerr, a former prosecutor and now a professor at George Washington University Law School, and digital rights organization Electronic Frontier Foundation.
- Although Auernheimer was released April 11, he may be retried and even if he isn't, this case presents grave implications. One issue that has been noted in the press is trial through personality. According to some people familiar with the case'--including Auernheimer's legal team and net neutrality lawyer Marvin Ammori writing in Wired'--it was that kind of personal attack that led to his conviction. Auernheimer has been portrayed by some as amoral, juvenile and narcissistic. Indeed, judging by his interviews with The Huffington Post, he presents himself as a martyr with a grandiose sense of his own intellect, which can challenge his ability to elicit empathy from the public (not to mention his opponents).
- Auernheimer surfaced on the public stage in 2008 when The New York Times did an expos(C) on ''trolls'' that included some of his controversial commentary, such as: ''The question we have to answer is: How do we kill four of the world's six billion people in the most just way possible?'' Aside from such philosophical statements, Auernheimer also gained a reputation for humiliating people through online public forums, a habit that was cataloged in the Times piece. Since then he has been widely known by his online name ''Weev'' and tends to refer to himself as such.Although Auernheimer is far from a sympathetic character, these are clearly not reasons in themselves to throw someone in prison. During his trial, the prosecutor went after Auernheimer's personality and political views, and the District Court sentenced him to a 41-month term. According to Ekeland and Ammori, this was an attack on Auernheimer as a person, rather than on his alleged crime, and was the focus of the government's prosecution. In court prosecutors revealed personal messages Auernheimer had sent, quoted the New York Times article and used Internet data that some would consider private as evidence that he needed to be locked away.
- The strategy of using personal data and conversations submitted online is not unique to Auernheimer's case. It's the same tactic that has been used against Edward Snowden, albeit in the media rather than in a courtroom, with pundits like CNN's Jeffrey Toobin quoting the NSA whistle-blower's chat logs from years ago as a way to define his actions and call him a ''traitor.'' It was also a method used to discredit and attack Pfc. Chelsea Manning. As Ammori pointed out in Wired, ''[W]e should all be worried when the government digs up our past and puts us on trial for who we are and what we stand for by using an expansive interpretation of what has been called 'the worst law in technology' to make criminals out of millions.''
- Another issue this case raises relates to the Computer Fraud and Abuse Act. As Wired and other outlets noted, the CFAA was the same law that the government had used to charge Aaron Swartz after he downloaded academic journals from MIT, a prosecution that many people believe contributed to his decision to kill himself. The CFAA states that online users can't have unauthorized access to public servers and to do so is a felony. However, CFAA's critics argue that the law, created in 1986 under very different technological circumstances, is outdated and can allow for dangerously ambiguous applications. For example, the CFAA stipulates broadly that it is a crime to obtain information ''without authorization,'' but in cases like Auernheimer's, exactly what constitutes ''authorization'' is up for interpretation. Auernheimer has also noted that Hypertext Transfer Protocol (HTTP) had not been created yet at the time of the CFAA's enactment, let alone Wi-Fi, which allows people to constantly roam public servers. That renders the CFAA obsolete today, he has argued.
- According to The Guardian, this is one of the reasons a group of security researchers, computer scientists and Internet freedom advocates had filed an amicus brief asking the appeals court to overturn Auernheimer's conviction. One of the parties that signed the brief is the Mozilla Foundation, creator of the Firefox Web browser. The brief signers ''argue there are 'striking similarities' between research tools used by experts to benefit privacy and security and those employed by Auernheimer, and that they have a vital interest in arguing why individuals must be deemed authorized under the CFAA when they access unsecured data on websites,'' the paper noted.
- In the Auernheimer case, the CFAA was interpreted to consider publicly available data strictly under the purview of AT&T, thus allowing the company to dictate what is or isn't criminal behavior. According to the Wired piece, there is nothing to stop the CFAA from being used against people, for example, who lie about their identities on online platforms such as Myspace or Facebook. Taking this logic a step further then, it's possible to see how information generated by average online users, not just provocateurs like Auernheimer, might be used against them.
- According to Auernheimer, the ways in which the CFAA was mobilized against him could theoretically be emulated by companies like Google. He told The Huffington Post that Google doesn't actually give its users permission to access its services and could use the CFAA to urge that people be tried and put in prison for a simple search query the company did not like.
- The other troubling precedent this case almost set involved trying Auernheimer in a state different from where the alleged crime was committed. Prosecutors had brought charges against Auernheimer in U.S. District Court in New Jersey even though he and Spitler operated out of Arkansas and California, respectively, and the servers they accessed were in Texas and Georgia. Improper venue was the reason given for the vacating of Auernheimer's conviction by a unanimous three-judge panel of the 3rd U.S. Circuit Court of Appeals. In the April 11 decision, U.S. Circuit Judge Michael Chagares wrote that:
- ''The Supreme Court has repeatedly made clear that the constitutional limitations on venue are extraordinarily important. ''[Q]uestions of venue are more than matters of mere procedure. They raise deep issues of public policy in the light of which legislation must be construed. '... [T]he ever-increasing ubiquity of the Internet only amplifies this concern. As we progress technologically, we must remain mindful that cybercrimes do not happen in some metaphysical location that justifies disregarding constitutional limits on venue. People and computers still exist in identifiable places in the physical world. When people commit crimes, we have the ability and obligation to ensure that they do not stand to account for those crimes in forums in which they performed no 'essential conduct element' of the crimes charged.''
- In our security state, the FBI seems to be taking more liberties in its pursuit against activists. As you can read here, some in the U.S. government have tried to paint certain peace activists as terrorists, and when figures like Auernheimer end up in prison, our civil liberties are threatened. While Auernheimer was in prison, Ekeland had claimed that only one out of every 10 to 20 letters his client sent him actually reached him. According to Auernheimer and his legal team, he was also denied the attorney room his whole stay and prison officials isolated him in solitary confinement for about half the time he was incarcerated. At one point they even denied him the food he needed (he cannot eat gluten), Auernheimer and his team allege, which led him to stage a three-day hunger strike.
- The U.S. government is threatening to retry Auernheimer in another jurisdiction. His case is not over by any means, and critics of his prosecution hope Auernheimer's plight will underscore the need to put an end to the CFAA.
- Get truth delivered toyour inbox every week.
- Previous item: We're Running Out of Ways to Kill People'--Legally
- New and Improved CommentsIf you have trouble leaving a comment, review this help page. Still having problems? Let us know. If you find yourself moderated, take a moment to review our comment policy.
- Please enable JavaScript to view the comments powered by Disqus.
-
- AOL, Microsoft lure advertisers with TV-style shows | Reuters
- By Jennifer Saba and Lisa Richwine
- NEW YORK/LOS ANGELESWed Apr 23, 2014 3:54pm EDT
- The Microsoft logo is seen at their offices in Bucharest March 20, 2013.
- Credit: Reuters/Bogdan Cristel
- NEW YORK/LOS ANGELES (Reuters) - Technology powerhouses like Microsoft Corp and AOL Inc are flexing their muscles as storytellers, parading TV network-style shows before advertisers at an annual digital content showcase in New York next week.
- With an eye on the big bucks such shows can command, Microsoft will trot out a soccer reality show called "Every Street United." Sony Corp's digital network Crackle will serve up Jerry Seinfeld's "Comedians in Cars Getting Coffee" and AOL is presenting a documentary drama about five New Yorkers called "Connected."
- This is a big shift from the short Web episodes many tech companies have presented for the last two years at the week-long "NewFronts" event - modeled after the annual "upfronts" where broadcast and cable TV channels show their wares to Madison Avenue.
- Yahoo Inc is also looking for longer original programming it can unveil at the showcase, three people familiar with those efforts said on condition on of anonymity because the deals have yet to be finalized.
- Yahoo Chief Executive Marissa Mayer said on Yahoo's earnings call last week that the company plans to make fewer, more focused investments in original content.
- "We are going to see more original content overall and no doubt everyone is working to package their offerings like TV because they have their eyes on TV dollars," said Kris Magel, chief investment officer at Initiative, the media buying division of Interpublic Group of Cos.
- But TV-scaled ad spending is unlikely to flow to online video commercials that usually run before and during a program, advertisers and analysts said.
- "Online video just doesn't offer nearly the reach that broadcast does," said David Bank, an analyst with RBC Capital Markets.
- AOL has spent about half a billion dollars over the last three years on shorter content. On Wednesday, it also inked a deal with Miramax to stream the independent studio's films on the AOL network for free, but with ads.
- "Internet companies are bucketed into the snackable short form space," Ran Harnevo, president of AOL Video, said. "But we are seeing the growth in the consumption of content on big screens."
- At the NewFronts, which starts on April 28, Microsoft will show longer original shows produced by the company's Xbox Entertainment Studios that exploit the Internet's strengths.
- "The challenge TV has is it's not very effective in being able to reach a very discrete target audience and measure it and have more interactive components," said Scott Ferris, general manager of TV and video advertising for Microsoft. "We have very engaged, high-quality audiences."
- Online series can get messages in front of people who watch little TV, said Peter Naylor, senior vice president of sales for Hulu.com. The website, owned by Walt Disney Co, Comcast Corp and 21st Century Fox, will also pitch shows to advertisers next week.
- "There is a segment of the video universe that is very, very hard to reach through traditional television," Naylor said. "Online video is a way to reach those light TV viewers."
- But because online viewers have to search for content, advertisers may end up paying more to reach them than on TV.
- The cost per thousand (CPM) for a commercial on a cable network, for example, might be between $10 to $30, depending on the show and the demographic, estimates Brian Wieser, a senior research analyst at Pivotal Research Group. For online video, a CPM for a comparable demographic could be in the range of $20 to
- "There is a lot of aspiration in the NewFronts initiatives," said Wieser. "The reality is traditional TV budgets are intended for content vehicles that are TV-like. (Content) with short term, low budgets with unknown or even known talent is unlikely to capture anything resembling a meaningful TV budget."
- Another hurdle is that the money that presenters make from the NewFronts is not tracked by the Internet Advertising Bureau which hosts the event.
- Ari Bluman, chief digital investment officer of GroupM, the media buying arm of WPP, notes the TV industry's annual showcase for advertisers exists because they can only buy so many commercial spots on TV, whereas this is not an issue online.
- However, it may take some time before online shows become mainstream enough to draw big ad dollars.
- Until then, the NewFronts "is more of a showcase for what's new and exciting," Bluman said.
- (Editing by Ronald Grover and Richard Chang)
- Link thisShare thisDigg thisEmailPrintReprints
-
- Nest Uses Its Data To Turn Electric Utilities Into Cash Cows | TechCrunch
- When Google acquired smart thermostat maker Nest for $3.2 billion, the startup quickly stated that it would never share its user data with other Google services and outside companies. But according to a recent report by Forbes, the company is taking advantage of its data to create a lucrative revenue stream from electric utilities.
- ''Our privacy policy clearly limits the use of customer information to providing and improving Nest's products and services. We've always taken privacy seriously and this will not change,'' Nest wrote in the Q&A post following the acquisition.
- Similarly, Nest co-founder Matt Rogers declared to Forbes that it doesn't share actual data with the utility. But it doesn't mean that the company shouldn't take advantage of its customer information without sharing hard numbers.
- The company has negotiated deals with multiple energy partners in the U.S. Some utility partners are willing to spend $30 to $50 per year and per thermostat to be able to turn the air conditioner up when it's a hot day. This way, the utility can levels load on the grid. Partners don't have direct access to the thermostats, they just sign a deal with Nest, and then Nest has access to the thermostats.
- More importantly, in other cases, Nest splits cost savings with the utility. As a reminder, Nest's main product is a smarter thermostat that should allow you to cut your energy bill. It seems counterintuitive as utilities have foster energy wasting.
- But these providers have to spend a lot of money to fight congestion when they bring more expensive power plants online. Nest reduces these infrastructure costs. It's unclear whether the startup is the one who shares an estimate of how much the utility saved or if the utility figures this number out by itself.
- According to Forbes, revenue from utilities will outweigh direct revenue from thermostat sales '-- we're talking about tens of millions or even hundreds of millions of dollars per year. The company's execution is very smart as electric utilities seem to have very limited, or even no access to actual data. Nest refuses to work with utilities who don't agree with that.
- Moreover, it's a recurring revenue stream. Even though you don't buy a thermostat every year, Nest will generate revenue from utilities '-- or, at least, that's how it's supposed to happen if Google lets Nest follow this strategy.
- Update: Here's a relevant abstract of Nest's privacy policy.
- We may share your aggregated and anonymous information in a variety of ways, including to publish trends about energy use and conservation, to help utilities provide demand-response services and to generally improve our system. We've taken steps to ensure that the information cannot be linked back to you and we require our partners to keep all information in its anonymous form.
-
- What is Rush Hour Rewards?
- Rush Hour Rewards is currently available to Nest Learning Thermostat owners with air conditioners who sign up with Nest's energy company partners.
- See participating partners and to sign up
- Nest needed to partner with utilities in order to receive information about upcoming energy rush hours. This information allows Rush Hour Rewards to effectively anticipate rush hours and help maximize your rewards.
- What are energy rush hours?
- Energy rush hours are like traffic rush hours. Just as traffic clogs up roads when everyone drives home at the same time, energy rush hours occur when everyone in a particular area turns on air conditioning (AC) at once.
- Energy rush hours typically happen on very hot summer days - usually about 8-12 times a year. Because there's only so much electricity to go around, these rush hours can lead to brownouts, or even outages. To keep up with demand, utilities need to bring additional power plants online that sometimes use dirtier energy. If things get really bad, they may even start building new power plants.
- So it's actually better for the utilities to pay their customers to use less energy during rush hours. Rush Hour Rewards automatically helps you earn the biggest payments while still keeping you comfortable.
- What does Rush Hour Rewards do?
- Rush Hour Rewards automatically tweaks temperatures around upcoming rush hours so you earn the biggest rewards. You don't have to worry about when the next rush hour is coming or remember to adjust the temperature. Rush Hour Rewards does it for you.
- Rush Hour Rewards can save energy in a few different ways, depending on what it's learned from you and your home: for example, it might raise or lower the temperature in your home by a few degrees during the rush hour and/or pre-cool your home before the rush hour begins, in order to make sure you are reasonably comfortable while using less energy.
- In the example below, you've set your Nest Learning Thermostat to cool to 78ºF (26ºC). Without Rush Hour Rewards, you end up using air conditioning throughout the rush hour to keep your home cool as the day heats up.
- With Rush Hour Rewards, your Nest Thermostat knows the rush hour will start at 2pm, so it starts pre-cooling around 1pm. Using a little more energy before the rush hour helps the Nest Thermostat use less during the critical period between 2-6pm. During the rush hour, your Nest Thermostat will turn the air conditioner on and off as needed to balance your comfort and how much you earn back from your energy company. In this example, the combination of pre-cooling and short periods of cooling during the rush hour means you use 40% less AC when it matters most.
- Rush Hour Rewards will make larger adjustments to the temperature when you're away and subtler adjustments if you're home. Regardless, it will only change the temperature a few degrees at most, always keeping your comfort in mind.
- You are in control, even when Rush Hour Rewards is working - simply change the temperature during a rush hour. Your Nest Thermostat will keep the temperatures you set, then return to your regular schedule.
- You'll never get more than one rush hour in a day or rush hours for more than three days in a row. Rush hours usually take place in the afternoons. There are rarely more than a dozen rush hour days per summer, however the number you experience depends on the weather and where you live.
- You'll get a notification on your Nest Thermostat, the Nest app and the Web the night before that tells you what time the rush hour will start and end. You can turn notifications on or off in SETTINGS > UTILITY on the Nest app. Very rarely, your energy company may have an emergency rush hour with little to no warning. These rush hours are a last resort to avoid rolling blackouts, but will otherwise work exactly the same way as regular rush hours.If you have more than one thermostat, you'll get a notification for each thermostat that qualifies for Rush Hour Rewards (to qualify, a thermostat must control cooling). Note that if your energy company rewards you per rush hour, that reward is based on how much you save overall, not per thermostat.Before the rush hour begins, you may see a gold gear and the words PRE-COOLING on your Nest Thermostat as it starts cooling down your home. Pre-cooling is like leaving early before traffic starts - using a little more energy before a rush hour helps your Nest Learning Thermostat use less energy during one.During the rush hour:
- How much will I get paid?
- How much you earn depends on your energy provider:
- Some energy companies will pay you a flat fee for the season.For some energy companies, your payment will be bundled into the service or included in a rebate.Some will pay you per rush hour. These energy companies calculate how much to pay you by comparing your energy use during a rush hour to the amount of energy you normally use. If you have multiple thermostats, you'll get paid for your aggregate savings from all the Nest Thermostats in your home.If you're paid by the rush hour, each energy company has its own way of calculating what your ''normal energy use'' is and how to compare it to energy use during a rush hour. For example, say there's a rush hour from 3-6pm on Tuesday - an energy company may compare how much energy you use during the rush hour to how much energy you used from 3-6pm in three out of the past five business days (usually the three days that you used the most energy). They'll factor in all energy use in the house, including your lights, fridge and washing machine. Then you'll be paid the difference.
- Keep in mind that the energy company will measure the total amount of energy you use during the rush hour, so if you use energy in other ways - like running the washer or dryer or the pool pump - you may not get your full rewards.
- Want to know exactly how much you'll get paid, when you'll be notified and other details? Learn more about a specific Nest energy partner plan
- How do I turn off Rush Hour Rewards?
- You're always in control. You can override Rush Hour Rewards at any time by simply changing the temperature on your Nest Thermostat. Then, confirm that you want Rush Hour Rewards to stop. The gold gear will disappear and won't appear again until the next rush hour.
- Learn more about how to cancel Rush Hour Rewards
- How is Rush Hour Rewards different than Demand Response programs?
- Demand Response programs (sometimes called direct load control programs) are offered by energy companies to encourage their customers to use less energy during energy rush hours. In this they have the same goal as Rush Hour Rewards. The difference is that Rush Hour Rewards takes your preferences and what your Nest Thermostat has learned from you into account to ensure you're comfortable. It lets you take control and change the temperature at any time, while other programs either cut your power off entirely or leave it up to you to remember.
- Demand Response plans are often designed in one of two ways:
- Your energy company cuts off power during a rush hour. This means customers can't turn on the AC even if they need it. While this option earns you maximum incentives, it requires that you give up all control of your comfort in your home for a few hours.Your energy company asks that you adjust the temperature on your own. With this option, the energy company might send an email or call the day before to let you know about a rush hour the next day. Trouble is, when it's time to change the temperature, customers often forget or are away from home, forfeiting their incentives. Even if they are at home, it can be confusing how much to change the temperature to get the most rewards while remaining comfortable.Rush Hour Rewards is different because it:
- Notifies you the night before that a rush hour is coming, right on the thermostat as well as on your phone, tablet or laptop.Adjusts the temperature for you during a rush hour, rather than just shutting off your AC.Makes sure you're comfortable throughout the rush hour. It uses everything your Nest Thermostat has learned about you to ensure that temperatures always stay within a reasonable range.Gives you control. You can always change the temperature during a rush hour.What technology powers Rush Hour Rewards?
- Rush Hour Rewards is powered by Auto-Tune, the new Nest technology designed to help you save money.
- Learn more about Auto-Tune
-
- Supreme Court Justices Criticize Aereo, But Worry About Overbroad Ruling - TheWrap
- Judges don't want decision to overreach into cloud
- Several of the Supreme Court justices who heard arguments in the broadcast networks' case against the online TV site Aereo criticized the company's business model but worried about passing down a ruling that could affect other technology.
- Broadcasters contend that Aereo '-- a New York based company with less than a million subscribers '-- is stealing their signals. The company uses millions of small antenna to relay broadcast signals to subscribers' laptops, tablets and other devices, collecting a small fee.
- Also read:Why Aereo's Supreme Court Case Matters
- While the justices expressed skepticism that Aereo's technology violates copyrights, they also questioned whether the company was trying to take advantage of legal loopholes.
- ''If your model is correct, can't you just put your antenna up and then do it? I mean, there's no technological reason for you to have 10,000 dime-sized antenna, other than to get around the copyright laws,'' said Chief Justice John Roberts.
- Chief Justice John Roberts questioned why Aereo used the antennas, if not to skirt copyright laws. Justice Ruth Bader Ginsburg noted that Aereo pays networks nothing to pass their signals on to consumers.
- Also read:Aereo CEO 'Hoping for a Clear Decision' From Supreme Court
- But the justices worried that any decision could have a much larger reach than intended, affecting consumers' ability to remotely store content like TV shows and songs. (Apple's iCloud is one of the best-known cloud computing services.)
- It's always difficult to say if justices' questions indicate which way they're leaning, because they often play devil's advocate while looking for holes in litigants' arguments.
- Also read:Barry Diller: Aereo 'Finished' If It Loses Supreme Court Case (Video)
- ''I have to understand the effect it will have on other technologies,'' said Roberts, who repeatedly questioned how the court could write an opinion that would affect only Aereo, and not companies like Apple.
- ''I don't know how to get out of it,'' added Justice Stephen Breyer.
- Justices Elena Kagan and Sonia Sotomayor also expressed concerns about the impact on the cloud. They asked more questions of the networks' attorney, Paul D. Clement, than they did of Aereo's attorney, David C. Frederick.
- ''They've thrown up a series of problems this would create for the cloud,'' Breyer told Clement, referring to Aereo's legal team.
- Kagan questioned the difference between using an antenna or DVR in a home, versus placing those devices elsewhere. That got to the heart of Aereo's contention that it is merely expanding on existing technology like antennas, DVR, and VCRs.
- Networks contend that Aereo is more like a cable or satellite company than a lone viewer, watching free TV with an antenna and recording it with a VCR. Cable and satellite companies spend billions in retransmission fees to air broadcasters' shows, and pass those costs on to their subscribers.
- Aereo, meanwhile, charges subscribers $8 to $12 a month '-- and pays nothing to the broadcasters.
- Several past precedents will came into play Tuesday: In 1984, the high court ruled 5-4 that the sale of Betamax machines did not constitute contributory copyright infringement.
- In the 2008 Cablevision decision, the U.S. Court of Appeals for the Second Circuit found that DVR recordings don't infringe on copyright holders' protections against their works being publicly performed without compensation. (Bars, for example, are supposed to pay to air a show.)
- The court ruled that watching shows on DVR is not a public performance because the person who makes the recording is also the one who watches it. The right of individual customers to play their own songs and shows has become a cornerstone of cloud computing.
-
- Shut Up Slave!
-
- Ft. Lauderdale Making It Illegal for Homeless People to Have Possessions in Public | I Acknowledge
- Homeless people by definition don't have a home to store their stuff. What little they own usually accompanies them as they live on the streets. A city in Florida is about to make that illegal.
- Ft. Lauderdale, Florida's politicians are pushing a bill that will make it illegal for anyone to store their personal things on public property. This means that anything left in the open for over 24 hours could be confiscated and a fine incurred on the person responsible for leaving it there. The main culprits? The homeless who set their things down on sidewalks and alleyways as they try to eek out a living. In other wrods, the people most unable to pay a fine or adjust their behavior to avoid breaking the law. They don't choose to keep their private property out in the open, they have literally no other choice.
- Despite opposition from homeless advocates and from local residents who rightly testified that this ordinance would be ludicrous, last week the City Commission gave unanimous approval to the measure.
- Citizens are fighting out back. According to ThinkProgress:
- One woman, Gazol Tajalli, told Commissioners that is ''insanity that we are even here discussing whether an individual can put on the ground the few objects that they own.'' Another citizen, Rev. Gail Tapscott of the Unitarian Universalist Church of Ft. Lauderdale, criticized some of the Commissioners for ''demoniz[ing]'' the homeless.
- But the city responded that it was in the right to pass this measure.
- The ordinance was lobbied for by the city's business owners who have long-complained that the homeless are driving away customers and making it harder to attract good workers.
- ''We're losing customers and we're losing staff as well, because it's getting out of control,'' said restaurateur Tim Petrillo, who's also on the board of the Downtown Development Authority. [source]
- Homeless advocates say that this is a half-cooked measure which doesn't address the underlying problem of homelessness. If you want homeless people's things off the streets, the most obvious and compassionate way to do it would be to prevent homelessness head on. Rather than criminalize the act of being homeless, lawmakers should work on procuring better public storage options and offering more affordable housing for residents so that they aren't forced to live on the streets.
- One city in North Carolina has been experimenting with offering free housing to homeless people. They found that it's actually cheaper to give them houses than to deal with them on the streets. In large part this is because many of the activities the homeless engage in have been criminalized by cities and states that view the destitute, not as people, but as eyesores and a nuisance. Because of that stigma, the homeless are incarcerated at absurdly high rates, sometimes for crimes as little as ''sleeping in stairwells.''
- Yet, in Ft. Lauderdale, the politicians have so far refused to listen to outside advice. Along with the criminalization of having possessions in public, they are currently drafting ordinances that would prohibit panhandling and other solicitations by the homeless, another that would prohibit sleeping in public, and finally another that would restrict how often groups could set up sites to feed the homeless. It won't solve the problem, but it will make the already-suffering people more miserable.
- We should hold ourselves to a higher standard than this.
- floridahomelessnessprovertywar on the homelesswealth inequality
-
- Congress to Give Private Debt Collection Another Try
- Congress to Give Private Debt Collection Another TryApril 18, 2014
- If at first you don't succeed, try, try again.
- That mindset is on display in Congress right now as both chambers are considering bills that would require the Internal Revenue Service (IRS) to hire private contractors to help collect millions of dollars in delinquent federal taxes. With the IRS forced to cut its in-house collection staff over the last few years due to budget constraints, the delinquent tax total is growing and so is pressure on the IRS to turn to the private sector for help.
- But we've been down this road before, and the results were less than encouraging. The Project On Government Oversight documented the recent history of private debt collection in our Bad Business report. While tax collection is considered an inherently governmental function (see ''Appendix A. Examples of inherently governmental functions'....20. The collection, control, and disbursement of fees, royalties, duties, fines, taxes and other public funds'....'' Emphasis added), staffing shortages in the 1990s compelled the IRS to hire private companies to assist the agency in recovering unpaid taxes in relatively simple collection cases.
- The IRS conducted a pilot private debt collection program in 1996 but canceled it after one year due to disappointing recovery totals by the contractors and larger than expected costs (see page 6). Ten years later, a second experiment with private collection of delinquent taxes was also scrapped after a brief run. In addition to cost-ineffectiveness'--the cost per delinquent tax dollar collected was more than three times greater for contractor employees than for IRS employees'--there were also complaints of threats, misinformation, and other underhanded tactics by the collection companies.
- Nonetheless, private debt collection forges ahead in Congress. The Senate Finance Committee recently approved an amendment requiring the IRS to revive the program. The Senate estimates that it will raise $2.4 billion over 10 years. The proposal's sponsors do not provide an estimate of how much this program will cost. The House introduced similar legislation (see section 6304, ''Reform of rules related to qualified tax collection contracts,'' on page 176). But it will be an uphill battle. Several Members of Congress, most notably House Minority Whip Steny Hoyer (D-MD), are longstanding opponents of private debt collection.
- In our opinion, private debt collection will never work. Government tax collectors have an inherent advantage over private collectors. As government employees, IRS collectors can exercise discretion when working with delinquent taxpayers. They can postpone collection, establish payment schedules, settle debts for less than the full amount owed, and waive penalties. Private collection agencies, on the other hand, are not allowed to exercise discretion (by definition, an inherently governmental function is one that involves discretion). They can only demand payment. If the case develops an unexpected complication, the contractor must refer it to an IRS employee. That one critical difference'--discretion'--is the reason private debt collection programs have failed in the past.
- Neil Gordon is an investigator for the Project On Government Oversight. Neil investigates and maintains POGO's Federal Contractor Misconduct Database.
- Topics:Contract Oversight
- Related Content:Government Privatization
- Latest PodcastPodcast: Exploring Transparency for Oil and Gas ExtractionMia Steinle talks about POGO's involvement in the Extractive Industries Transparency Initiative (EITI) and the hurdles to increased transparency for oil, gas and hard rock minerals here in the U.S.
-
- Politieke debatten verbieden op school: hoe wereldvreemd kan je zijn? - Belgi - Knack.be
- Het departement Onderwijs van de Vlaamse overheid wil niet dat de scholen nog politieke debatten organiseren de komende weken. Debatten mogen niet binnen en buiten de schoolmuren, noch voor leerlingen of een ander publiek. Want dit kan begrepen worden als een aangelegenheid voor het voeren van politieke propaganda op school.
- Hoe wereldvreemd kan je zijn?
- Zowel het katholiek onderwijs als het gemeenschapsonderwijs vinden de maatregel absurd. En met reden.
- Er is niet alleen meer nood aan politieke vorming, maar ook aan meer debat, meer kritisch denken en meer tegensprekelijkheid in het onderwijs. Leerlingen informeren over, confronteren met en leren nadenken over de instellingen die ons land besturen en onze maatschappij ordenen, maakt deel uit van de essentie van opvoeding, vorming en scholing.
- Als er enkele weken voor de verkiezingen kritiek te leveren valt op het onderwijs, dan is het wel dat onze scholen de jongeren niet genoeg voorbereiden op de stembusgang.
- Opvallend is dat Vlaams minister van Onderwijs Pascal Smet (SP.A) verbaasd is over het verbod. Nu willen wij wel aannemen dat niet elke brief die zijn administratie uitstuurt, door hemzelf gelezen en goedgekeurd wordt, maar een verbod op politieke debatten afvaardigen zonder de minister daarin te kennen, dat is ongezien.
- Al even opvallend is dat de educatieve dienst van het Vlaams parlement een verkiezingspakket heeft ontwikkeld om leerkrachten bij te staan wanneer ze les willen (moeten) geven over de verkiezingen.
- De verkiezingen mogen op school dus wel ter sprake komen binnen het keurslijf van een onderwijspakket van de Vlaamse overheid maar er mag daarbuiten niet over worden gedebatteerd.
- Om het te zeggen met de woorden van een intussen al lang overleden meester van het eerste studiejaar van een dorpsschooltje dat al lang niet meer bestaat: 'Zit stil en schrijf op. Er worden hier geen vragen gesteld en er wordt niet gebabbeld.'
- Of hoe de verkiezingen 2014 op een pijnlijke manier aantonen dat er binnen de Vlaamse overheid toch echt wel iets schort aan de visie op onderwijs.
- Knack.be-nieuws in je facebook nieuwsfeed
-
- General Mills new legal policy: Suddenly customers are reading the fine print.
- Make sure to read the fine print.Photo by Scott Olson/Getty Images
- Starting today, you might want to think twice about downloading a dollar-off coupon for Cinnamon Toast Crunch or a two-for-one discount on Yoplait. Those small savings will now cost you the right to sue.
- Alison Griswold is a Slate staff writer covering business and economics.
- General Mills, the massive food company behind Cinnamon Toast Crunch, Yoplait, Cheerios, and dozens of other labels, added language to its website this week that fundamentally alters its customers' legal rights. Under the new terms, people who interact with General Mills in a broad range of ways'--downloading a coupon online or entering a contest, for example'--waive their right to class action and agree to resolve any disputes with the company through informal negotiations or binding arbitration.
- To get a sense of just how broad the umbrella for these class action waivers are, here's a relevant section on the changes from General Mills' website:
- In exchange for the benefits, discounts, content, features, services, or other offerings that you receive or have access to by using our websites, joining our sites as a member, joining our online community, subscribing to our email newsletters, downloading or printing a digital coupon, entering a sweepstakes or contest, redeeming a promotional offer, or otherwise participating in any other General Mills offering, you are agreeing to these terms.
- Needless to say, people are unhappy. After all, who wants to think about forfeiting legal rights to a massive corporation when they're just trying to get a discount on Pillsbury cookies and Toaster Strudel? And waiving your right to a class suit feels like a tall price to pay for a few dollars or cents in savings.
- ''I will have to take to wearing a hat into the grocery store that says, in boldface print of course, 'By accepting payment for any purchases I may make, you hereby agree that trial by jury and lawsuits including class actions remain available means for the resolution of any disputes,''' says Ted Mermin, executive director of the Public Good Law Center and a professor of consumer law at UC''Berkeley School of Law. '''I will set my Web browser to carry a cookie conveying the same message.'''
- Joking aside, class-action waivers, while disadvantageous to consumers, have been quite common ever since the Supreme Court upheld them in its 2011 ruling in AT&T Mobility v. Concepcion. ''The case provides corporate America with another useful tip on how to avoid costly litigation: If you haven't already done so, rush to lock your customers and/or employees into invisible mandatory arbitration agreements that will bar them from challenging your misconduct in a class-action suit,'' Dahlia Lithwick wrote in Slate at the time.
- And rush they have. AT&T, Sprint, eBay, Amazon, and Dropbox are just a handful of the companies that have introduced arbitration clauses and class-action waivers into their terms of service'--aka those dense pages of legalese that only the rarest of users ever bothers to read in full. ''Class action waivers are everywhere,'' says Florencia Marotta-Wurgler, a professor at New York University School of Law. Her research shows that fewer than one in 1,000 people will click on website links to view the full terms of a contract before hitting ''I agree.''
- What's so unusual about the General Mills situation is that consumers, all of a sudden, are taking note. That's at least in part because the changes have drawn extensiveandcriticalcoverage from the media, but also because the scope of how consumers can become subject to this agreement is unprecedented.
- ''What's unusual about General Mills' move is that we haven't seen such a broad-based waiver from a consumer packaged goods company,'' explains Eric Goldman, a professor at Santa Clara University School of Law and director of its High Tech Law Institute. ''General Mills is using a direct point-of-contact with its customers'--its Web interactions'--to create new contract terms that would be difficult or impossible through the normal distribution chain.''
- Compounding that is the fact that General Mills largely botched the rollout of its new policy. Rather than broadcasting the changes, the company quietly added the terms to a legal statement online and has since appended a thin gray advisory bar to its website. Initially, though, the New York Times reported that placing an order through the General Mills online store did not trigger any sort of notice that the company had changed the legal terms governing the purchaser.
- When consumers aren't made to explicitly agree with terms of use, a major change like a class-action waiver won't be considered enforceable unless the company can demonstrate it gave ''reasonable notice.'' This notification needs to be fairly prominent, so the initial update on the General Mills website may not have made the cut. ''Courts have said it's not reasonable notice when companies do way more than that,'' Marotta-Wurgler notes.
- We reached out to General Mills for comment, and a spokesman referred us to a post on the company's blog. "The policy doesn't preclude a consumer from pursuing a claim. It merely determines the forum," they write. "Arbitration is a straightforward and efficient way to resolve such disputes."
- Even if the General Mills changes do hold up, legal experts say it might not be such a bad thing. ''I will say that I will be grateful to General Mills if its foray into forced arbitration makes people start to ask a little more seriously whether we really want a society in which fundamental rights can be waived with the click of a mouse,'' says Mermin. If nothing else, people certainly are talking.
-
- Tennessee set to criminalise pregnant women who use illegal drugs | World | The Guardian
- Tennessee is poised to become the first state in the US to criminalise pregnant women for harm caused to their foetuses or newborn babies as a result of addiction to illegal drugs.
- The proposal, SB 1391, is expected to land on the desk of Bill Haslam, the Republican governor, early next week. He will then have 10 days to decide whether to sign it into law.
- If Haslam passes the bill, which cleared both chambers of the state legislature last week with resounding majorities, Tennessee will become the first state in the union to hold women criminally accountable for illegal drug use during pregnancy, with punishments of up to 15 years in prison.
- Many other states, predominantly in the south, have considered similar laws but have always pulled back in the face of the overwhelming medical consensus that such moves put babies at risk.
- In 2011, the American College of Obstetricians and Gynecologists found that ''drug enforcement policies that deter women from seeking prenatal care are contrary to the welfare of the mother and foetus. Incarceration and the threat of incarceration have proved to be ineffective in reducing the incidence of alcohol or drug abuse''.
- Women's rights groups are scrambling to persuade Haslam to veto the bill, arguing that not only would what they call the ''pregnancy criminalisation law'' endanger mothers and babies, but it would also make Tennessee an extreme outlier in the US, with resulting economic consequences.
- Farah Diaz-Tello, staff attorney with the women's rights group National Advocates for Pregnant Women, said the bill had potentially severe ramifications.
- ''It would create the idea that women are accountable to the state for the outcome of their pregnancies '' and no-one can guarantee such outcomes,'' she said.
- SB 1391 takes an already existing fetal assault Tennessee law and allows it to be applied to prosecute pregnant women with drug issues. It says charges can be brought against a woman, ranging from misdemeanours to aggravated assault and carrying sentences of up to 15 years in prison, for ''the illegal use of a narcotic drug while pregnant, if her child is born addicted to or harmed by the narcotic drug or for criminal homicide if her child dies as a result of her illegal use of a narcotic drug taken while pregnant''.
- Opponents of the bill point to a dearth of treatment facilities that makes it virtually impossible for poor women, who are disproportionately African American, to seek help. There are 177 addiction treatment centres in Tennessee, but only two offer prenatal care on site. Only 19 provide any services for pregnant women.
- Cherisse Scott, head of the Tennessee health rights group SisterReach, said the new legislation would demonise a woman with drug addiction problems.
- ''It treats her as someone who can think and make decisions as though she were sober,'' she said, ''yet offers her no treatment to help her deal with her addiction.''
- Scott added: ''Addiction is an illness. Pregnant women struggling with addiction need access to treatment, not jail time. Drug addiction isn't a choice, it's a health problem.''
- The Tennessee law is the latest attempt by Republican-controlled legislatures across the US to chip away at the constitutional guarantee of the right to abortion in Roe vs Wade, by giving foetuses legal protections in their own right.
- Several states have debated so-called ''personhood'' laws that would treat the fertilised egg from conception to birth as a legal entity, though no such laws have so far been enacted.
- Thirty-eight states have variations of fetal homicide laws on their books that can lead to criminal prosecutions in cases of induced miscarriages and other pre-natal trauma, but these were all designed to protect unborn children from assault by third parties such as violent partners of the pregnant mother.
- In two states '' South Carolina and Alabama '' pregnant women can be criminally prosecuted for harming their foetuses. This provision, however, was established through rulings by the supreme court of each state rather than through legislative action.
- The most authoritative study of the spread of the criminalisation of pregnancy across the US, by the National Advocates for Pregnant Women, found that between 1973, when Roe vs Wade came into play, and 2005 there were 413 criminal and civil cases in which women were arrested or detained for their actions while pregnant.
- Some were put in prison or held in hospitals or mental institutions; others were forced to have medical interventions including surgery.
-
- Girls who prove the theory behind the #BanBossy campaign
- "I'm not bossy, I'm the boss," says Beyonc(C).
- That's the message behind the #BanBossy campaign, which was also backed by Jennifer Garner and Facebook COO Sheryl Sandberg: that it's OK for girls to show courage, determination and leadership.
- The outcome is not just a video that's been viewed millions of times in just a few weeks, but the sparking of a genuine debate about how girls should be encouraged to follow their dreams rather than forced to conform to someone else's vision.
- But you don't have to be an A-lister like Beyonc(C) to show what's possible when girls are empowered to be ambitious.
- All over the world girls are doing remarkable things and inspiring others to do the same. Here are just five who've hit the headlines since #BanBossy went viral. With inspiration from campaigns such as this, we hope to see many more like them in the future'...
- The girl who took a stand against FGMLillian Mwita, from Kenya, is outspoken, confident and unafraid of standing up for what she believes in. "I would never accept the cut, whether they brand me an outcast or not." At just nine years old, when faced with female genital mutilation she ran away from home and took refuge with some anti-FGM crusaders. "I am young. I have big dreams for my future and what matters to me now is education," she says.
- The girl who refused to accept violenceJoyce Mkandawire saw girls regularly being encouraged to have sex with men (known as hyenas) in her home country, Malawi. "The hyena doesn't wear protection, which is why I know girls who have contracted HIV because of hyenas," she explains. Refusing to adopt a passive attitude, Joyce decided to do something about it and set up the Girls Empowerment Network. Her tenacity and drive are helping to drive genuine change for for Malawi's girls, a shift for the better led by another Joyce - President Joyce Banda.
- The girl who spoke out about traffickingAfter being bought for USD$400 by traffickers, 19-year-old Somila was almost sold into prostitution before being rescued at the last minute. It would have been easy for her to go into hiding afterwards, but Somila refused to stay silent and spoke out passionately about her ordeal in India: "They should realise that they cannot separate daughters from their parents and make us fools. They speak lies and make us fools. They cheat us."
- The girls educating other girlsQuite rightly, almost everyone in the world will have heard about Malala Yousafzai's incredible fight for girls' education. But not everyone will have heard of 23-year-old Shiza Shahid. Now chief executive and co-founder of the Malala Fund, Pakistan-born Shiza left her job as an analyst to be by Malala's side after she was shot. Ambitious, courageous and determined, her qualities match Malala's perfectly. She's steered their campaign to its high-profile status and recently established a groundbreaking partnership with Vodafone to use mobile technology to power literacy programmes for girls.
- The girl who spoke the truth about child marriageEven though the law in India says girls must be 18 before they marry, almost half aren't. Often, it's girls' parents who make that decision, so it's difficult and scary for girls to speak out. When Kamla, 13, spoke to the Council on Foreign Relations for its interactive report on child marriage, her honest and frank answers completely broke the mould. "When my parents mentioned marriage, I had no idea what 'marriage' even meant," she told her interviewer. Her courage to speak up is inspiring leaders such as Hillary Clinton to act.
- If #BanBossy has a lasting impact, girls like these five will become the norm. Let's make it happen.
- Have you heard a remarkable story about an ambitious girl? Tell us on Facebook or Twitter
-
- Agenda 21
-
- It's Time For a Real War on Cars
- In railing against everything from bike lanes to transit spending, pundits and politicians often raise the spectre of a "war on cars." Of course, there is no war on cars -- but there should be.
- Cars directly kill and hurt more people every year than most diseases, resulting in 1.5-million deaths and 78-million injuries needing medical care, according to the World Bank. Road injury is the eighth leading cause of death worldwide. Pollution from cars also causes acute and chronic health problems that often result in premature death -- from heart disease and stroke to respiratory illness and lung cancer.
- Environmental impacts of cars are also well-known and wide-ranging, including climate change, smog and oily run-off from roads, not to mention the green space sacrificed for infrastructure to sell, drive, fuel and park them. Despite fuel-efficiency improvements, emissions from vehicles have more than doubled since 1970, and will increase with rising car demand in countries like China, India and Brazil, according to the latest Intergovernmental Panel on Climate Change report.
- Because many people, especially North Americans, can't conceive of a world without cars for everyone, we overlook major problems caused by our private automobile obsession. We're rightly outraged when a company like General Motors ignores faulty ignition switches in some of its vehicles, thought to have caused 13 deaths over 13 years. The massive recall that followed was justified and necessary. But as a headline on Treehugger's website argues, "It's time for a bigger recall of a seriously defective product: The Car."
- The article continues, "Since we can't recall every car all at once and redesign the entire country, there are at least things we can do to make it less bad. Significantly reduce speed limits. Make drivers pay the full cost of infrastructure construction and maintenance through the gas tax. Build the cost of medical care for those millions of injured by cars into the price of gas. Invest in walkable cities and alternative forms of transport."
- Seattle newsweekly The Stranger, only somewhat tongue-in-cheek, created a 2011 manifesto for a real war on cars. "We demand that car drivers pay their own way, bearing the full cost of the automobile-petroleum-industrial complex that has depleted our environment, strangled our cities, and drawn our nation into foreign wars," it says. "Reinstate the progressive motor vehicle excise tax, hike the gas tax, and toll every freeway, bridge, and neighborhood street until the true cost of driving lies as heavy and noxious as our smog-laden air."
- As Treehugger notes, we can't shift from car-centric societies overnight. And until we find ways to better design our urban areas, many people will continue to rely on cars. After all, in the "developed" world, and increasingly in the developing world, we privilege private automobiles when creating infrastructure, often at the expense of what we need for public transit, walking and cycling.
- Some even claim automobile and oil companies bought and dismantled streetcar and urban rail lines from the mid-1930s to the 1950s to sell more cars and oil. Fuel efficiency wasn't a concern because, before pollution and climate change impacts were known, gas sale profits were a priority. Many factors were involved in the development of car culture, but we now find ourselves in an era when much of our oil is burned to propel mostly single users in inefficient vehicles.
- Even with today's improved fuel standards, only about 15 per cent of the energy from each litre of fuel burned is used to move the vehicle, which typically weighs 10 to 20 times more than the passenger(s) it carries. That translates to about a one per cent efficiency to move those passengers.
- Although we can't stop using cars altogether, we can curtail their damage to people and the environment. We can reduce greenhouse gas emissions by cutting back on car use, choosing fuel-efficient vehicles, joining a car pool or sharing program and reducing speed. At the policy level, we need increased investment in public transit and cycling and pedestrian infrastructure, stronger fuel-efficiency standards, reduced speed limits, higher gas taxes and human-centric urban design.
- Besides combatting pollution and climate change, reduced dependency on private automobiles will lead to healthier people, fewer deaths and injuries and livable cities with happier citizens. And that's worth fighting for!
- With contributions from David Suzuki Foundation Senior Editor Ian Hanington. Learn more at www.davidsuzuki.org.
- Top 10 Most Polluting CountriesIn the following slides, find the top 10 countries with the greatest carbon dioxide emissions in 2011. Figures are estimates from the Emissions Database for Global Atmospheric Research (EDGAR), a joint project of the European Commission and the Netherlands Environmental Assessment Agency. (Photo Getty Images)
- 10. United KingdomEstimated 2011 CO2 Emissions in metric tonnes: 470 million (Photo Getty/AFP/MIGUEL MEDINA)
- 9. IndonesiaEstimated 2011 CO2 Emissions in metric tonnes: 490 million (Photo Getty/AFP/ROMEO GACAD)
- #8 - CanadaEstimated 2011 CO2 Emissions in metric tonnes: 560 million (Photo MARK RALSTON/AFP/Getty Images)
- #7 - South KoreaEstimated 2011 CO2 Emissions in metric tonnes: 610 million (Photo CHOI JAE-KU/AFP/Getty Images)
- #6 - GermanyEstimated 2011 CO2 Emissions in metric tonnes: 810 million (Photo JOHANNES EISELE/AFP/Getty Images)
- #5 - JapanEstimated 2011 CO2 Emissions in metric tonnes: 1.24 billion (Photo YOSHIKAZU TSUNO/AFP/Getty Images)
- #4 - Russian FederationEstimated 2011 CO2 Emissions in metric tonnes: 1.83 billion (Photo KIRILL KUDRYAVTSEV/AFP/Getty Images)
- #3 - IndiaEstimated 2011 CO2 Emissions in metric tonnes: 1.97 billion (Photo ROBERTO SCHMIDT/AFP/Getty Images)
- #2 - USAEstimated 2011 CO2 Emissions in metric tonnes: 5.42 billion (Photo by Kevork Djansezian/Getty Images)
- #1 - ChinaEstimated 2011 CO2 Emissions in metric tonnes: 8.7 billion (Photo PETER PARKS/AFP/Getty Images)
- Follow David Suzuki on Twitter: www.twitter.com/DavidSuzukiFDN
-
- How green is a Tesla? Electric cars' environmental impact depends on where you live.
- A Tesla assembly line. Just because the company's cars are electric-powered, doesn't mean they have no environmental impact.Photo by Guus Schoonewille/AFP/Getty Images
- The knock on electric cars has always been the same: They're great for the environment, but they're pokey and impractical, and nobody wants to buy one. The stunning success story of the Tesla Model S has, improbably, flipped that equation. It's blazingly fast, surprisingly practical, and everyone wants to buy one. But now some critics are asking: How green is it, really?
- The quick answer: If current trends hold, it could be pretty darn green in the long run. But as of today, the calculation isn't as straightforward as you might think. Depending on whom you ask, what assumptions you make, and how you quantify environmental impact, the answer could range from ''greener than a Prius'' to ''as dirty as an SUV.'' And where the Tesla falls on that spectrum depends to a surprising extent on where you live and how much you drive it.
- Electric cars are squeaky clean, of course, in the sense that they don't burn gas. With no engine, no gas tank, and no exhaust, they're considered to be zero-emissions vehicles. But there's more to a vehicle's environmental impact than what comes out of the tailpipe. The Tesla doesn't run on air. It runs on electricity, which in turn is generated from a range of different sources, from nuclear fission to natural gas to the darkest, dirtiest fossil fuel of them all: coal.
- So if you're going to stack a Tesla's per-mile emissions against those of a gas-powered vehicle, you'll need to start by looking at the composition of the electrical grid. Nationally, the grid is roughly 40 percent coal, 25 percent natural gas, 20 percent nuclear power, and about 10 percent renewable sources, led by hydroelectricity. So it's fair to say that your average Tesla is powered in large part by burning fossil fuels.
- Tesla acknowledges this, and insists that its cars are still far cleaner than their internal-combustion competitors. That's because battery-powered cars are more efficient at converting their stored energy into forward progress. A Model S can travel upwards of 265 miles on a single charge of its 85 kilowatt-hour battery, which equates to less than 3 gallons of gas. Its official EPA miles-per-gallon equivalent is 89, far greater than a standard Toyota Prius.
- For any given Model S, though, the emissions-per-mile depend heavily on the mix of energy sources that go into your local grid. According to Tesla's own emissions calculator, if you're driving your Model S in West Virginia'--where the power mix is 96 percent coal'--you're spewing some 27 pounds of CO2 in a typical 40-mile day, which is comparable to the amount you'd emit in a conventional Honda Accord. Indiana, Kentucky, and Ohio aren't much better. On the other hand, if you're charging your Tesla in California, where natural gas supplies more than half the electricity'--or, better yet, Idaho or Washington, where hydroelectricity reigns'--your per-mile emissions are a fraction of that amount. Congratulations: Your Model S is a clean machine after all.
- Or is it? In May, a market analyst named Nathan Weiss prompted spit-takes throughout the clean-energy world in May with an incendiary post on the financial news site Seeking Alpha. The headline: ''Is the Tesla Model S Green?'' Weiss' answer: a resounding, math-heavy, 6,500-word ''No.'' In fact, Weiss argued, the Model S is in many ways dirtier than a Jeep Grand Cherokee'--and nearly as dirty as a Ford Expedition, one of the largest SUVs on the market. That's an extreme position, and large swaths of Weiss' argument were readily rebutted by electric-car advocates. Facing a barrage of criticism, Weiss soon revised his calculations, but still insisted that the Model S's effective CO2 emissions exceeded those of a smaller SUV like the Toyota Highlander.
- Weiss' post was followed in late June by a report in IEEE Spectrum from Ozzie Zehner, a one-time electric-car enthusiast turned outspoken critic. His report, titled ''Unclean at Any Speed,'' cites studies that find electric cars are no cleaner'--and in some cases less clean'--than gas-powered cars.
- How could that be? Critics point to three main factors that make a Tesla dirtier than the EPA's ratings, or the company's own data, would suggest. First, coal-burning power plants emit not just CO2 but also other noxious gases like nitrogen oxides and sulfur dioxide'--and in far greater quantities than gas-powered cars. ''If a smog-testing center could measure the effective emissions of a Tesla Model S through a tailpipe,'' Weiss wrote, ''the owner would face fines, penalties, or the sale of the vehicle under state 'clunker buyback' programs.'' (This problem isn't Tesla's fault, obviously, and it would vanish with a cleaner energy grid.)
- The Gavin coal plant tower in Cheshire, Ohio. Coal still provides much of the nation's electricity'--including that which powers zero-emission cars.Photo by Benjamin Lowy/Getty Images
- Second, electric vehicles are more environmentally destructive to manufacture, starting with the energy required to produce their lithium-ion batteries. Those battery packs today are big, bulky, and extremely expensive to manufacture'--especially Tesla's, which is larger and more powerful than that of its competitors. And many electric-vehicle batteries contain rare-earth minerals that are hard to come by and costly to extract. The Tesla's AC induction motors don't use rare-earth magnets, but even the company's engineers would admit that the Model S takes more energy to produce than, say, a Toyota Camry. The question is how long it takes to close that initial gap once you start driving your zero-emissions Tesla. The more you drive it, the greener it becomes.
- That leads to the third main argument against the Model S: that it hogs more power than advertised. Weiss reckons that the Model S's energy-efficiency is dragged down heavily by ''vampire load,'' or the power that drains from the battery while the car is not in use. Those idle losses played a starring role in John Broder's famous New York Times piece about running out of juice on a Tesla test drive. Otherwise satisfied owners complain that their cars lose battery range just sitting in the garage.
- Vampire load plays a significant role in Weiss' calculations. In August, though, Tesla delivered on its promise to address the issue in a firmware upgrade. CleanTechnica put the reduction in idle losses at 50 to 70 percent, but Tesla will not confirm the amount. A bigger blow to Weiss' ''dirty as an SUV'' argument: as Green Car Reports' David Noland pointed out in a thorough response, Weiss took into account the carbon footprint of the Tesla's fuel source, but ignored the carbon footprint of gasoline production. Weiss also assumed, probably erroneously, that people drive the Model S far fewer miles each year than they do the average gas-powered car. Still, Noland agreed that Tesla's power-consumption estimates may be on the optimistic side. Rejecting the Toyota Highlander comparison, he puts the Model S's emissions closer to those of the Lilliputian Scion iQ. Not bad for a 4,600-pound luxury sedan.
- It's true, meanwhile, that several studies have cast doubt on the overall environmental benefits of electric cars, including a 2010 report from the National Academy of Sciences. That report is indeed sobering'--but less so when you consider that the nation's electrical grid is already cleaner today than it was at the time of the report. And as a bevy of IEEE officials were quick to point out, Zehner's ''Unclean at Any Speed'' (which relied on the NAS report) glosses over a larger body of peer-reviewed research that finds electric cars are cleaner than internal-combustion cars even in coal-heavy states. Still, Zehner is right to say that these studies, including one by the Union of Concerned Scientists in 2012, tend to give short shrift to the full life-cycle impacts of electric cars.
- But there's a reason scientists aren't scrambling to write papers evaluating the precise present-day tradeoffs between electric cars and their internal-combustion counterparts. The present is short, and the future is long. Environmental trade-offs are changing all the time, mostly in electric cars' favor. Natural gas has already reduced coal's share of the national energy mix in recent years. And the new power added to the U.S. grid each year is skewed much more heavily toward renewables than the current mix. If that trend holds, the Model S and other electric cars will only get cleaner. Besides, a lot of electric-car owners are already investing in solar power to charge their vehicles. Meanwhile, Tesla, Nissan, and other automakers are working feverishly to increase the efficiency and reduce the cost of batteries. The technology isn't advancing exponentially, as it has with computer processors, but it is advancing.
- To use the nation's reliance on dirty coal as an argument against electric cars is to get things backward. Rather, the prospect of making cars far greener than they are today should count as yet another argument against the nation's continued reliance on dirty coal.
-
- Tesla will source battery materials from North America exclusively | BizFeedz.com
- You are here:Home>>Tesla will source battery materials from North America exclusivelyLast update on April 20, 2014underBusinessAbove: A lithium processing plant in Chile. Lithium is typically refined from vast piles of salts.
- There is no such thing as a truly green car.
- All cars require raw materials and energy to produce, use energy during their time as transport, and require energy to recycle''the components that can be recycled, at least.
- To mitigate such pollution issues and increase supply chain transparency, Tesla Motors [NSDQ:TSLA] has announced it will source raw battery materials from North America only, when it opens its $5 billion battery gigafactory.
- Batteries are the subject of much environmental debate, requiring large quantities of assorted metals and minerals in their manufacture.
- These are often mined, produced and transported at great expense and energy''leaving behind a large and dubious pollution footprint as they do so.
- The plight of China has brought such issues to attention recently, where government regulations have closed several graphite-producing plants amid pollution concerns.
- Used in battery anodes, graphite creates polluting dust during its mining, and requires corrosive chemicals like hydrochloric acid to process into a usable form. These, and other forms of pollution, are causing great damage to the surrounding areas.
- Unfortunately, graphite and other materials are used in significant quantities in electric car batteries''particularly batteries as big as those fitted to Tesla's vehicles.
- According to Bloomberg, Tesla says its local sourcing will be ''focused on minimizing environmental impact while significantly reducing battery cost''.
- Cost will be a defining factor, as U.S.-sourced graphite may not be as inexpensive as that sourced elsewhere''even if it's greener, and as one analyst puts it, ''more patriotic''.
- Typically, battery materials are shipped thousands of miles during the supply chain, with significant environmental impact before a car even turns a wheel.
- Doing so with Tesla's gigafactory, expected to double worldwide output of lithium-ion batteries when it opens, could leave a vast pollution footprint behind it''the result of lithium, cobalt, graphite and other materials converging from global locations.
- So where could Tesla get the materials it seeks?
- There are several current possibilities. Tesla currently gets cobalt from the Philippines, but Formation Metals Inc. in Idaho provides them with one option''the firm is currently seeking capital to fund a new facility there.
- For lithium, Tesla could look to Rockwood in Nevada and North Carolina. Toronto-based Avalon Rare Metals Inc. is also an option.
- Another firm, RB Energy, is soon to start work on a large plant in Quebec. While 75 percent of its output (itself 12 percent of the world's total) is heading to two large customers in Asia, Tesla could pick up a significant proportion of the remainder.
- Graphite could be more difficult''another five or six graphite mines are needed to meet the demand that Tesla's factory would cause, though U.S. regulation means production would be far cleaner than that of China''and that's before you get to the benefits of reducing transportation distances.
- Producing batteries for half a million cars a year''as Tesla intends to do at its plant''will never be a truly green process.
- But sourcing locally could be the difference between the firm making a real difference, or indirectly doing real environmental harm.
- Now, it just needs to ensure it can keep on top of the costs of locally-sourced battery materials.
- This story originally appeared on Green Car Reports.
- Tags: Batteries, Business, electric cars, gadgets, gigafactory, Green, GreenCarReports.com, lithium, lithium batteries, Tesla Motors
-
- NORTH KOREA HAS 6 TRILLION DOLLARS WORTH OF UNTAPPED RARE EARTH MINERALS | InvestmentWatch
- ''The value of rare earth metals and their relatively limited supply would seem to work in North Korea's favor. Rare earth metals are used in the construction of everything from iPods to precision guided missiles. China currently produces more than 95% of the world's output of these metals. China's control over these minerals has regional implications for Northeast Asia. For example, in 2010 Japan alleged that China suspended its export of the minerals to Tokyo in response to a territorial dispute between the two countries. The EU, U.S., and Japan also recently brought a case against China at the WTO for unfairly inflating the prices of these minerals.''
- ''If North Korea is willing to create conditions for investment, its supply of rare earth metals and its rich mineral sector have tremendous transformative potential. ''
- ''This could change the regional power dynamic in Northeast Asia as North Korea becomes a hub for investment from China, Japan, South Korea and elsewhere. However, for this to happen, the value of the resources, including the cost of extracting the minerals from North Korea, must outweigh the risks of doing business there.''
- ''Amidst these disputes, the South Korean government believes that North Korea may have as much as $6 trillion USD in rare earth elements. Beyond the metals, North Korea is known to be a rich source of many minerals including gold, zinc, magnesite, and others. ''
- http://thediplomat.com/2012/08/30/north-koreas-six-trillion-dollar-question/
- Precisely why the Illuminati had to invade Afghanistan. There are minerals there worth trillions.
- ''The previously unknown deposits '-- including huge veins of iron, copper, cobalt, gold and critical industrial metals like lithium '-- are so big and include so many minerals that are essential to modern industry that Afghanistan could eventually be transformed into one of the most important mining centers in the world, the United States officials believe.
- http://www.globalresearch.ca/the-war-is-worth-waging-afghanistan-s-vast-reserves-of-minerals-and-natural-gas/19769
- Did you already share this? No? Share it now:
-
- Kate Humble: We don't value food because it's not expensive enough | Life | The Guardian
- "I'm over here!" shouts Kate Humble, and she of Springwatch and Lambing Live gambols towards me, closing the gate on a field of anxious goats and their Disney-cute babies. She's carrying a bucket. "I was just about to muck out," she announces, and I'm reminded this is a working farm in the Wye Valley and in no way a TV set.
- The photographer has already done his work and gone. Apparently Humble had no idea he was coming. It is hard to think of another TV person on the planet for whom an impromptu photoshoot while wearing a well-loved fleece and no makeup would be OK, but Humble couldn't give a hoot. She's been up since the wee small hours: "I love getting up early. I can bounce out of bed at 5am but I'm useless at night."
- She leads me to a kitchen, which doubles as the HQ for Humble by Nature courses on animal husbandry and rural skills, from foraging to building an outdoor pizza oven. Her assistant Rebecca wonders if I'd be OK with some old coffee heated up in the microwave. I'm wondering how to explain that although I'm against food waste, there are limits. "No! That sounds disgusting," says Humble, even though she's a green tea drinker. "Make some new!" It's an earthy introduction.
- Kate Humble has been the poster girl for a particularly immersive brand of popular science and wildlife programming for the last 15 years. Behind the scenes TV executives are full of admiration for her prowess at delivering live broadcasts (one tells me she has a photographic memory) and her ability to pull in the viewers. Lambing Live is an unlikely hit on paper, but it has proved to be a ratings juggernaut, pulling 2.5 million viewers, even on a Friday night. What you get as a viewer is her warmth and natural curiosity. She gets right in there, sometimes quite literally; her inspection of a ram's testicles on the most recent series of Lambing Live caused quite the Twitter frenzy.
- Much has been made of her decision to be child-free too. She rightly thinks it's rude of journalists to pry about this. But then she brings the topic up quite naturally, so I feel at liberty to ask her how she feels about those who think your environmental conscience only really forms when you have kids. "I think one of the most environmentally friendly things you can do is NOT have children," she says. "Yes, I know we have an ageing population but I've got a great plan for my old age, which is a return to communal student living. The idea that people have to have children before they wake up to the idea that the world might not be a great place in 15-20 years' time is nonsense. I'm not particularly clever, nor brilliant nor insightful but I don't need to have kids to tell me that. I've got godchildren. I don't know why: I'm woefully unqualified on both parts of that equation '' can't be a mother, don't believe in God. But you know, I want them to have a world that's functional and great to live in."
- It's only when you observe her on home territory '' now a 117-acre former council farm in Trellech, Monmouth, that you realise just how far this natural curiosity has propelled her. Keeping sheep is famously hard work. They are ingenious at finding ways to die. Almost anyone who observes them up close is put off. Humble was completely seduced.
- "After I did the first series [of Lambing Live] I desperately wanted to keep sheep. It's the herding instinct that gets me. Most breeds of sheep are very cyclical creatures '' it draws you in and brings you close to the seasons. I didn't just want a few pet lambs for the table, I wanted to do it properly and rear ewes. God, George Monbiot [who is famously anti-sheep] probably hates me."
- The four acres she has up the road where she lives with her husband, TV director Ludo Graham, wouldn't accommodate these sheepy dreams, so they began asking around and found the working farm that we're now on. There were once 16,000 such council farms around Britain, small parcels of land rented out to farming families or individuals who didn't have their own land, but councils have spent the last decade selling them off for development. Humble estimates there are just 4,000 left.
- The opportunity to "save" a farm fed into another strong belief. "Do we want everything to be imported, to deny our farming heritage, to get rid of every opportunity for young farmers?" she asks. "It's nigh on impossible to get into farming now, if you even wanted to." She once tried to buy a farm in the Karoo, South Africa, for £70,000 but was dissuaded by Ludo, who pointed out they knew nothing about farming. This time, however, she battled until she "won" it from the council and then almost fell into despair because she thought she'd never find a tenant farmer. Then she lucked out with local farmers Tim and Sarah Stephens, who breed Welsh mountain sheep and Hereford cattle and are now happily settled.
- But it's the price of food, the farmer's end product, that really irks her. "Everyone's going to hate me and call me a middle-class bitch but I'm past caring because I'm so incensed. Food waste is endemic but we don't value food because it's not expensive enough. Four pints of milk for a quid, are you kidding me? And the reason we can buy that without thinking of the implications is because we're so disconnected from the land and farming process. People will see TV footage, like last year, of lambs being buried in the snow but then they'll complain about paying more for lamb. Here, we want to make that connection again."
- Kate Humble with a fellow farm worker. Photograph: Stephen ShepherdThe farm has PV panels and a permaculture garden, they've planted 2,000 trees, the RSPB carries out an annual survey on bird life, and it's minimal-input, so why not go the whole hog and go organic? "Honestly, because it's a huge faff. And sometimes it's unrealistic. I want to make what we're doing as accessible as possible. I want people coming here on courses or visits to think 'I can do that' without a huge amount of land, money and paperwork. To all intents and purposes we're organic anyway."
- We go back outside and examine a strange crescent-shaped building-in-progress that sums up Humble's irrepressible nature. Last year, while working on a BBC Scotland programme called the Great Big Energy Saving Challenge, which challenged six families to slash their energy use by a third in three weeks (they all managed a 50% cut) she visited the Passive House development on the Dormont Estate near Lockerbie. Here, talking to a German academic, she came across the idea of aquaponic food production, combining conventional aquaculture with hydroponics. Months on, she has secured a grant from the Welsh government and is midway through a £60,000 build that will see her launch the UK's first closed-loop aquaponics centre, producing fish and fruit and veg working with aquaponics specialist Charlie Price.
- Using the same super-strong plastic that forms the Eden project's biomes, Humble and team are effectively creating an incredibly efficient heat pocket that requires no additional heating. "Obviously aquaponics isn't new," she stresses. "People are doing this in the UK already. But what is clever here is the marriage between hydroponics and aquaculture." In essence the two systems are symbiotic: as Humble explains it, "you've got your fish in your tanks '' tilapia '' shitting away merrily, and that water full of nitrates is pumped through vegetable beds. The leafy greens love the nitrates and grow like fury, the vegetables clean the water and back it goes to the fish."
- The ecological stumbling block for aquaculture is usually the feeding of the fish '' using dead fish. But she has an ingenious plan. "It's all about waste management," she says brightly. "As well as a wormery there's a biopod, a sealed unit containing a non-endemic species of black soldier fly. This is where waste goes that can't be composted. The flies lay eggs, grubs hatch, then they pupate and we harvest them. Voil : fish and poultry food. It's totally self-sustaining and incredibly low-maintenance."
- If it works, it could be a real coup. In German trials the system has showed capacity to produce 250kg of fish a year and 32kg of fruit and veg a week. "You would never need food banks again!" she says.
- It must be cool to create your own specialised ecosystem. "It is! I love the idea that in order to create a sustainable harmonious working environment you need your predators and your prey, but there's so many people whose idea of a perfect world is one without insects or predators. I've made wildlife films where they don't really want to show anything killing anything. What's the point?
- "I suppose this is like creating my own slice of a perfect world." We could call it the Humble Bubble.
- An earlier version of the article stated that German trials of aquaponics showed capacity to produce 250kg of fish and 32kg of fruit and veg a year. This was amended on 18/04/2014 at 16.12.
- Interested in finding out more about how you can live better? Take a look at this month's Live Better Challenge here.
- The Live Better Challenge is funded by Unilever; its focus is sustainable living. All content is editorially independent except for pieces labelled advertisement feature. Find out more here.
-
- The Great Lakes Are Still Almost Half Frozen, And It Could Affect The Environment For Years
- Ana Simovska:Grand Island in Lake Superior- Summer 2012
- The Green Point Dunes Nature Preserve in Michigan, south of Elberta.
- A thirty-second night exposure reveals streaking clouds and stars in the sky in Nordhouse Dunes Wilderness Area, Lake Michigan, Michigan. American photographer Ian Plant experiments with light sources and long exposures to turn remote nocturnal landscapes into psychedelic dreamlands. From swirling desert stars to bright exploding steam from geysers, Ian conjures up magical vistas and surreal scenes from midnight treks across the Americas. In one striking image, sleep-deprived, Ian, 39, from Virginia, USA, transforms the stem of a common desert plant into the red tentacles of an alien creature reaching up into space. While many photographers choose to take pictures of what is in front of them, Ian says he has other ideas about his medium. 'I use the night time like a blank canvass to project my ideas onto,' he explained. 'Instead of being at the mercy of the scene that's in front of me I can create the image from my imagination.' (Photo by Ian Plant / Barcroft Media / Getty Images)
- The sun rises over a frozen Lake Erie.
- Winter view of Point Betsie Lighthouse on Lake Michigan in Frankfort, Mich.
- Panoramic view of city of Chicago skyline at dusk, reflected on Lake Michigan.
- ErinJohnson:Apostle Islands National Lakeshore Sea Caves - on every kayakers bucket list.
- A sunset at Big Sable Point Lighthouse. This lighthouse is located in Ludington, Mich. just north of the state park.
- A bridge to Paradise in Michigan's Upper Peninsula.
- Gneiss shoals can be seen underwater surrounding Shaw Island, just outside Isle Royale National Park, Lake Superior, Michigan.
- Scenic overlook of Lake Michigan at Sleeping Bear Dunes National Park, South Manitou Island in the distance.
- A swimmer dives in to lake Michigan to cool off July 31, 2006 in Chicago, Illinois. Temperatures in the city reached 99 degrees Fahrenheit, tying the record high for the day. (Photo by Scott Olson/Getty Images)
- Sunset on the shore of Lake Michigan, Warren Dunes State Park, Mich.
- Lake Michigan, from New Buffalo, Mich., 2003.
- Waves crashing on pier and lighthouse on Lake Michigan at sunset.
- Miner's Beach at the Pictured Rocks on Lake Superior.
- Sunset at Illinois Beach State Park, Il.
- View of the cliffs on Lake Superior from Lakeshore Trail; Pictured Rocks National Lakeshore.
- View of Michigan Island in Wisconsin's Apostle Islands in Lake Superior.
- View from the Thousand Islands Bridge of treetops (foreground left) below on Constance Island and Georgina Island (back right), two of about 20 islands and 90 islets that are part of the St. Lawrence Islands National Park of Canada.
- Floating maple leaf, Lake Superior.
- Goldenrod wildflowers growing along the water's edge of Lake Ontario in the early Autumn season.
- Cottage country in Ontario with metamorphic rock in the foreground.
- Tree with red foliage on the shores of Georgian Bay, Killbear Provincial Park, Ontario, Canada.
- Fog delay below the MacArthur Lock.
- Rainbow over Lake Superior.
- Scenic vista, Presque Isle State Park, along Lake Erie in Pennsylvania.
- Lake Superior Provincial Park, Wawa, Ontario.
- Sunset falls on the cliffs of the Niagara Escarpment, over Barrow Bay, a part of Georgian Bay, Bruce Peninsula, Ontario, Canada.
- Sunset on Lake Superior shore, Mich.
- Miner's Castle Overlook on Lake Superior near Munising, Mich. Pictured Rocks National Lakeshore is a U.S. National Lakeshore on the shore of Lake Superior in the Upper Peninsula of Michigan.
- Glenn Haven on the shore of Lake Michigan.
- Lake Ontario in fog, Toronto.
- The Grand Hotel on Mackinac Island in Lake Huron.
- A weathered barn on the shoreline of Lake Ontario.
- Evening light on fall colour hardwoods near Agawa Bay, with Montreal Island. Lake Superior Provincial Park, Ontario, Canada.
- SAULT STE. MARIE, Mich. '-- The U.S. Coast Guard Cutter Mackinaw appears to float in a cloud as it approaches the Poe Lock in low lying fog in Sault Ste. Marie. (U.S. Army Corps of Engineers photo by Michelle Hill)
- Girl running with Shih-Bi through waters of Lake Huron at Singing Sands Beach, Bruce Peninsula National Park, south of Tobermory, Ontario.
- Michigan, Isle Royale National Park, Sunrise from the east end of Mott Island, looking toward Tookers Island.
- Beautiful McCargoe Cove in Isle Royale National Park, Lake Superior.
- Michigan, Isle Royale National Park. The park is a wildflower lover's paradise with hundreds of native plants blooming every year.
- A moose is swimming to the left of the island at Isle Royale.
- Aerial view of Chicago river mouth and Lake Michigan.
- A sunset at Esch Road beach on the Sleeping Bear Dunes National Lakeshore.
- Ice Boulders stranded in the still water of Lake Michigan.
- Kayaker expore the sea caves of Devils Island in the Apostle Islands National Lakeshore on Lake Superior, Wisconsin.
- Lake Ontario from Chimney Bluffs State Park, NY
- Gregory Mann:Mackinac Bridge at sunset from a Big Cat returning to Mackinaw City from Mackinac Island.
- lynnannetterogers:Sleeping Bear Dunes
- lynnannetterogers:Sunset on Lake Michigan - Ludington Beach
- ErinJohnson:Gorgeous colors among the Apostle Islands National Lakeshore.
- filmboi:The sun setting on Lake Superior's Chequamegon Bay in Ashland, Wisconsin on a warm summers night.
- The many moods of Lake Huron provide an ever-changing landscape
- Tom999:Lighthouse on Lake Michigan, Frankfort, Michigan.
- Tom999:Iron Ore Dock on Lake Superior in Marquette, Michigan. Built in the late 1800s, it was used to load iron ore from railroad cars to freighter ships, which then transported the ore to steel mills. It is no longer in use.
- Wisconsin State Highway 13 follows the shoreline of Lake Superior on the Bayfield Peninsula, Wisconsin
- IceBlock:A late October morning at the Lone Rock campsite, Porcupines Mountains Wilderness State Park, Silver City, Michigan. This part of the rugged and remote Lake Superior lakeshore is only accessible by backpacking, leaving pristine wilderness along the greatest of Great Lakes.
- IceBlock:Lafayette Landing, Porcupines Mountains Wilderness State Park, Silver City, Michigan.
- Kathryn Houser:When the winds blow just so, the sand forms strange and wonderful shapes. Near Pentwater, Michigan, on the eastern edge of Lake Michigan. October, 2012.
- David S Roberts:Lighthouse at Saugeen River mouth Lake Huron, Southampton, Ontario
- Marthawitt:Chicago lakefront at dawn
- This gorgeous sunset was captured last Friday, 8.30.13 on Lake Michigan. The Point Betsie Lighthouse is located on M22 just north of Frankfort, MI.
- Nick Danz:Taken on our trek along the Lakeshore trail!
- Pam Mulder Plamann:Grand Haven Pier, amid the dune grass. Lake Michigan, Grand Haven, Michigan
- Pam Mulder Plamann:A foggy day at Lake Michigan, Grand Haven
- Pam Mulder Plamann:Canoeing at sunset. Lake Superior, Ontonagon, Michigan
- Pam Mulder Plamann:Large driftwood along the shore of Lake Superior, Ontonagon, Michigan
-
- Why climate deniers are winning: The twisted psychology that overwhelms scientific consensus - Salon.com
- In the run-up to Earth Day this year, two major reports were released by the UN's Intergovernmental Panel on Climate Change, the largest such body in the world. On March 31, Working Group II released its report, Climate Change 2014: Impacts, Adaptation, and Vulnerability, and on April 13, Working Group III released its report, Climate Change 2014: Mitigation of Climate Change. Both reports cited substantially more evidence of substantially more global warming and related impacts than past reports have, and they did so more lucidly than in past iterations.
- As climate scientist and communicator Katharine Hayhoe toldSalon, ''This time around, to its credit, the IPCC has gotten a lot more serious about improving its ability to communicate the report's message, through graphics and other ancillary products.'' There was also a greater sophistication in how to conceptualize, measure and compare things, even where substantial uncertainties are involved. And there was a substantial list of more than 90 major impacts already recorded on every part of the planet.
- Yet, one of the most disturbing stories to emerge around the reports was the New York Times report that language about the need for $100 billion in crisis funds to aid poor nations was removed from the Working Group III executive summary for policymakers during the final round of editing. The action neatly encapsulated the yawning gap between the growing danger of climate change '-- and growing maturity of climate scientists '-- on the one hand, and the utter lack of political will on the other.
- But the growing sophistication of the scientific community is a cause for continued hope '-- if they can accelerate their learning curve, and follow the right path. They no longer mistakenly assume that the facts can ''speak for themselves,'' and they've gotten much better at developing ways to communicate lucidly about complex challenges and uncertainty. But the entrenched denialist, do-nothing opposition is still winning when it comes to writing the checks. If that's to change, Australian psychologist Stephan Lewandowsky will almost certainty be part of the reason why.
- One reason global warming opponents still have the upper hand is basic confusion over the nature and significance of uncertainty. ''There are numerous instances in which politicians and opinion makers stated that 'there is still so much uncertainty, we shouldn't invest money to solve the climate problem,''' Lewandowsky explained to Salon. Now he has just co-authored two related articles on scientific uncertainty and climate change '-- ''Part I. Uncertainty and unabated emissions'' and ''Part II. Uncertainty and mitigation'' '-- which show this thinking is completely backwards. ''This is shown to be wrong by our analysis, because uncertainty can never be too great for action. On the contrary, uncertainty implies that the problem is more likely to be worse than expected in the absence of that uncertainty.''
- It's a simple fact that your typical scientist already knows intuitively: Uncertainty grows with risk, exposure and potential loss, especially with complex nonlinear systems, like the global climate system. In fact, it's not even possible to calculate how much damage could come from worst-case climate scenarios, as Working Group III lead co-author Christopher Field pointed out at the press conference for their report. The relationship between greater uncertainty and risk is both obvious to those in the know and invisible to those who aren't. So it's never been properly talked about '-- or even rigorously analyzed '-- until now.
- ''Basically, we tried a new mathematical approach that is called 'ordinal,''' Lewandowsky said. ''An ordinal method allows us to address questions such as: 'What would the consequences be if uncertainty is even greater than we think it is?' That is, ordinal questions refer to the order of things, such as 'greater than' or 'lesser than,' but don't address absolute questions such as 'how much.'''
- So it doesn't tell you how much worse things will get '-- which would certainly be nice to know '-- but it does tell you that they will get worse the more uncertain things are. In short, it gets you oriented in the right direction '-- 180 degrees away from where so-called ''common sense'' would take you. It puts you on the right path, asking the right kinds of questions, taking the right kinds of first steps, and avoiding getting lost in the confusion, mistakenly thinking that uncertainty means less to worry about. It's hard to imagine a more basic finding.
- ''Using that approach we showed that as uncertainty in the temperature increase expected with a doubling of CO2 from pre-industrial levels rises, so do the economic damages of increased climate change,'' Lewandowsky continued. ''Greater uncertainty also increases the likelihood of exceeding 'safe' temperature limits and the probability of failing to reach mitigation targets. Likewise, in the context of sea level rise, larger uncertainty requires greater precautionary action to manage flood risk.''
- As for the impact on policy, Lewandowsky said, ''We show that the adverse effects of uncertainty are 'leveraged' and hence amplified by more emissions. It follows that to reduce the adverse effects of uncertainty, we should curtail emissions. This is a pretty strong imperative, but our papers don't prescribe an exact target for emissions. As I noted above, we cannot answer 'how much' questions, we can only say 'less (pollution) is better.'''
- Acceptance and Rejection of Science
- But these two recent papers are only side of the story of what Lewandowsky has been up to. He's also written a series of papers dealing with how people process information, either rejecting or accepting science. When I asked about the relationship, Lewandowsky replied,''The underlying 'theme' '-- if there is one '-- is how people respond to uncertainty or ambiguity. What the uncertainty papers analyze is how people should respond to uncertainty if they were mathematically-optimal. What my rejection-and-acceptance work shows is how people actually respond to things they perceive to be uncertain. So the two streams of research are opposing sides of the coin '-- what reality actually means and how people interpret it.''
- There's also quite a bit more controversy surrounding this work '-- some of it intellectual, some anti-intellectual. In a 2012 paper, ''The pivotal role of perceived scientific consensus in acceptance of science,'' Lewandowsky and his co-authors reported on two studies. The first showed that acceptance of several scientific propositions '-- including the acceptance of HIV causing AIDS, smoking causing lung cancer, and human CO2 emissions causing global warming '-- were all manifestations of a common factor, which in turn is correlated with a factor reflecting perceived scientific consensus. In short, the more that people perceived scientific consensus, the more they accepted scientific findings.
- The second study demonstrated a causal relationship, showing that acceptance of human-caused (anthropogenic) global warming (AGW) increases when the scientific consensus is highlighted. Subjects were divided into two groups, the ''control'' group subjects ''greatly underestimated the AGW consensus'' at 67 percent, while the second group, exposed to a graph and text highlighting the 97 percent consensus among climate scientists, still underestimated the consensus, but by much less '-- placing it at 88 percent. Not only did acceptance of global warming increase, the most dramatic finding was the neutralization of the effect of worldview, which otherwise had a significant impact. While there were significant differences due to worldview in the control group, the differences were ''effectively nonexistent'' for those exposed to consensus information, even though that information was only partially absorbed.
- The impact of worldview can informally be seen in partisan trend polling data on global warming evidence perception from Pew (graph here), as well as snapshot data showing Tea Party Republicans as significant outliers, with views significantly different from other Republicans, whose views are surprisingly close to average. Academics take a more rigorous approach toward worldviews, though their specific methods may vary. In this case, worldview was measured via five items expressing attitudes about the free market.
- Dan Kahan is a leading researcher who's skeptical of the implications of this paper. He's done extensive research into the resilience of perceptions, regardless of contrary information, and finds strong evidence of ''identity-protective cognition'' among people of all different worldviews. (He uses a two-dimensional model, as opposed to a more common one-dimensional left/right one.) Kahan was the subject of Ezra Klein's first cover story at Vox.com, and I first wrote about his work in a three-part series at Open Left in January 2010. Not only has Kahan shown that people are resistent to information that challenges their identities and the worldviews that support them, he's shown that more information tends to drive people apart in their views, rather than lead to convergence. People use more information to rationalize what they already believe, rather than to question and reformulate it. Kahan doesn't doubt the results Lewandowski reported, he just thinks they won't stand up in the real world, in part because they haven't so far. (Kahan and Lewandowski debated each other on the Inquiring Minds podcast co-hosted by Salon contributor Chris Mooney '-- write-up and podcast here.)
- ''The reason 'consensus' has not appeared to work in society at large to date isn't because it's ineffective '-- it's because there is a well-funded countermovement out there that takes every opportunity to mislead the public into thinking that there isn't a consensus,'' Lewandowsky told me, in response to this argument.
- But Kahan stresses it as an inescapable fact. ''The real world has counter-messaging in it That's one reason the experimental studies aren't externally valid, in my view,'' he said. ''Unless those counseling 'broadcast 97 percent' have a plan for stifling all the culturally grounded cues that real people will be exposed to that motivate them to discount the '97 percent' message '-- as they've been doing for 10 years '-- it is bad advice, in my view, to tell communicators that they can expect '97 percent' to work in the world as it does in the lab.''
- This is clearly the challenge '-- how to take Lewandowsky's results out of the lab. He doesn't have a plan, per se, but he does have a sense of direction, and a track record, and a growing community of like-minded collaborators to work with. Kahan and Lewandowsky differ most on how to reach conservatives and libertarians, but there's potentially more acheivable progress to be made within the ranks of the reality-based community itself. To get the full picture of what this means, we first need to develop two historical threads '-- the growing understanding of the scientific process and its interactions with the wider world, which involves a widening circle of other experts, and the growing understanding of what stands in its way, which will bring us back to another emerging aspect of Lewandowky's work.
- To begin the first thread, we need to go back to 2004. That's when science historian Naomi Oreskes first published an initial survey of global warming literature, ''Beyond The Ivory Tower: The Scientific Consensus on Climate Change.'' Climate scientists had long known that there was an overwhelming consensus on anthropogenic global warming, but Oreskes was the first to take a scientific approach to studying that consensus '-- just as Lewandowsky, more recently, has been the first to formalize what scientists informally knew about uncertainty.
- Oreskes analyzed ''928 abstracts, published in refereed scientific journals between 1993 and 2003, and listed in the ISI database with the keywords 'climate change.''' She found that 75 percent of papers accepted the consensus view ''either explicitly or implicitly,'' while ''25 percent dealt with methods or paleoclimate,'' and took no position on AGW. ''Remarkably, none of the papers disagreed with the consensus position,'' she found. Later studies have found a small sliver of dissenting views, but the more the consensus has been studied, the sturdier it appears, while the dissenting literature is dogged with repeated problems.
- For example, a 2010 paper, ''Expert credibility in climate change,'' recomfirmed the 97 percent consensus figure, and found that ''the relative climate expertise and scientific prominence of the researchers unconvinced of ACC [or AGW] are substantially below that of the convinced researchers.'' A 2013 paper, ''Quantifying the consensus on anthropogenic global warming in the scientific literature,'' examined ''11,944 climate abstracts from 1991''2011'' and found that ''97.1 percent endorsed the consensus position,'' while a parallel self-rating survey found that ''97.2 percent endorsed the consensus.''
- One of the co-authors of the 2013 study, Dana Nuccitelli, co-writes the Guardian's ''Climate Consensus '-- The 97%'' blog. In an April 14 entry, he showed how far the study of climate science itself can take us in understanding the workings of anti-science as well. He detailed ''4 ways contrarian papers get published: (1) Flawed paper gets into credible journal, (2) Flawed paper gets into off-topic journal, (3) Contrarian editor gets into journal, (4) Vanity journal created by contrarians.'' But that wasn't the primary topic of his column. His primary topic was the climate contrarian backlash against Lewandowsky's work on the second thread mentioned above '-- the growing understanding of what stands in the way of science, which began with worldviews and branched out from there.
- Conspiracist Ideation '-- Better than Science at Playing Its Own Game
- Taking up that second thread, in 2013, Lewandowsky co-authored two papers probing more deeply into the role of what's known as ''motivated reasoning'' as an obstacle to scientific knowledge. In ''The Role of Conspiracist Ideation and Worldviews in Predicting Rejection of Science,'' he approached the influence of worldviews and conspiratorial thinking (AKA ''conspiracist ideation'') as related types of motivated reasoning which interfere with scientific truth-seeking. In this instance, worldviews included both liberals vs. conservatives and free market orientation. Conspiracist ideation can be found across the ideological spectrum '-- even in the center, much to the chagrin of some '-- but it functions in similar patterns to resist unwanted information, regardless of subject matter.
- Lewandowsky and his co-authors took a closer look at conspiracism specifically in the other paper, ''NASA Faked the Moon Landing '-- Therefore, (Climate) Science Is a Hoax: An Anatomy of the Motivated Rejection of Science.'' The second paper touched a real nerve, producing a great deal of conspiracy theorizing about Lewandowsky himself, his co-authors and others. So, naturally, being a good scientist, Lewandowsky decided to study that as well. The result was a third paper, ''Recursive Fury: Conspiracist ideation in the blogosphere in response to research on conspiracist ideation,'' which was subsequently retracted by the publisher, following sharp attacks from climate contrarians '-- even though the publisher found nothing scientifically or ethically wrong with the paper. Britain's notoriously lax libel law (changed just this year) was supposedly the reason. Following a further retreat by the publisher, three editors with the journal resigned. Nuccitelli provides a good account in his column (as does Lewandowsky himself, here), where he notes that this is just the latest example of a pattern that's played out before, but we need to go back and unpack the insights into conspiracist ideation that lie at the core of this work.
- In the paper on conspiracist ideation and worldviews, the authors wrote, ''The prominence of conspiracist ideation in science rejection is not unexpected in light of its cognitive attributes.'' For one thing, it provides an out for people who don't like what the consensus says. ''If you are faced with agreement among scientists, you have two choices,'' Lewandowsky told me. ''You either accept that they are on to something or'... You think they all conspire to create a hoax for some nefarious reason. There aren't too many other options, are there?''
- ''When you look at the history of science denial, there is plenty of evidence that a scientific consensus drives deniers into postulating such a conspiracy '-- from tobacco to AIDS to climate.''
- A second reason conspiracist ideation crops up in resisting science is that it has greater explanatory reach than science, because it's not constrained by ''the criteria of consistency and coherence that characterize scientific reasoning.''
- ''In the case of climate, this is '-- humorously '-- known as the 'Quantum theory of denial,''' Lewandowsky told me. ''Deniers will claim in the same breath (or within a few minutes) that (a) temperatures cannot be measured reliably, (b) there is definitely no warming, (c) the warming isn't caused by humans, and (d) we are doing ourselves a favor by warming the planet. The four propositions are incoherent because they cannot all be simultaneously true '-- and yet deniers will utter all those in close succession all the time.''
- Finally, conspiracist ideation is also typically immune to falsification, ''because contradictory evidence (e.g., climate scientists being exonerated of accusations) can be accommodated by broadening the scope of the conspiracy (exonerations are a whitewash), often with considerable creativity.''
- ''One good example for this is Jim Sensenbrenner, a Republican congressman who called the exonerations of climate scientists after 'climategate' a 'whitewash,''' Lewandowsky said. ''This happens all the time, and sometimes takes on rather baroque forms, e.g., when the United Nations is invoked.'' Lewandowksy sometimes refers to this as the ''self-sealing'' property of conspiracist ideation. It can be absolutely maddening to try to argue against.
- When I asked about other aspects of conspiracist ideation, I questioned whether it didn't reflect a quest for meaning, at the expense of information, along the lines of the mythos/logos distinction drawn by Karen Armstrong in ''The Battle For God.'' Lewandowsky agreed.
- ''One of the aspects of conspiratorial thinking is '-- paradoxically '-- that it gives people a sense of control because it gives meaning to apparent randomness. It may be more comforting to some people to think that 9/11 was an ''inside job'' than accepting that it was a fairly random event triggered by a few fanatics.'' Even more in line with Armstrong's thinking, he added, ''I also think that there is a lot of identity politics in this, e.g., if Republicans generally think that climate change is a hoax, then it becomes a 'tribal totem' for others to pick up on this.''
- As a further refinement, I noted that conspiracist ideation thrives on creating specific malicious others as a particuarly powerful form of meaning-making. ''Yes, absolutely,'' Lewandowsky responded. ''There is this tension between 'victim' and 'hero' within the conspiracist worldview that leads to those contradictory positions. On the one hand (the 'hero' frame) it is permissible to accuse scientists of fraud and harass them, but by the same token ('victim' frame) scientists must do nothing to cast aspersions on the accusers or to defend themselves. Arthur Koestler has referred to those people as 'mimophants.' It is crucial for the public to understand this.''
- With these insights in mind, the experience of what happened with ''Recursive Fury'' becomes a tremendous learning opportunity '-- though, as Nuccitelli points out, it's an opportunity that's been repeatedly missed in the past.
- But there's a pattern here on the positive side as well. In 2004, Oreskes reframed the informal experience of climate consensus as a subject for formal knowledge '-- and that has helped climate scientists gain a much better self-understanding of what they're doing, through a succession of further studies. Likewise, just this past month, Lewandowsky's uncertainty papers have taken the informal knowledge that uncertainty means more unkown risk, and reframed uncertainty as the subject for scientific study. It's too soon to know what will happen as a result, but the potential is obvious if we can put an end to knee-jerk do-nothing arguments based on uncertainty.
- Likewise, the dysfunctional impact of conspiracist ideation is just one example of how the scientific community itself has an underdeveloped immune system '-- as does the much broader ''reality-based community,'' which takes science seriously as a primary source of information. There would be great potential for any project that would take this informally recognized (by some) reality and make it the subject for rigorous scrutiny, just as Oreskes did in 2004 or as Lewandowksy did this year. That's a tall order, but it's possible that the two of them just might do something like that. They are currently working together on a paper on the effects of denial on the scientific community. It's obviously way too soon to say what it will look like, much less what impact it will have. But we do know that bringing ''peripheral,'' informally known subject matter to light can be an incredibly powerful way of moving human understanding forward. And there's no field of human understanding that needs that more than the science of saving our planet '-- and, not incidentally, ourselves.
-
- Al Gore Calls Global Warming Skeptics ''Immoral, Unethical And Despicable'''... | Weasel Zippers
- The man who was almost president graced Honolulu with his presence Tuesday and walked us through a ''seminar of sustainability.''
- By turns a university professor, a wry observer, a recovering politician, a joke teller and a Southern preacher, Al Gore fired up an audience of thousands at the Stan Sheriff Center to believe that global warming can be stopped. But it's possible only if each of us does our part.
- ''Ultimately, we are going to win this thing,'' he said, one of many statements met with hearty applause.
- He also managed to repeatedly gush over fellow Democrats Neil Abercrombie and Brian Schatz, who he singled out multiple times as leading the fight here at home and in Washington to tackle the environmental crisis head on. [...]
- But Gore cited two ''game changers'' in recent years that will help. The first is the growing realization from even climate-change deniers that something seems to be strange with the weather. The second is the exponential growth in photovoltaic solar panels, driven largely by consumer demand for lower prices.
- The ''barriers'' to doing something about climate change are business and political interests that profit off of fossil fuels '-- ''dirty energy that causes dirty weather.'' He compared fake science from polluters stating that humans are not to blame for the climate to tobacco companies that used to hire actors to play doctors who denied cigarettes were dangerous.
- ''That's immoral, unethical and despicable,'' he said of both.
-
- Earth 'Serially Doomed': UN Issues New 15 Year Climate Tipping Point '' But UN Issued Tipping Points in 1982 & Another 10-Year Tipping Point in 1989! | Climate Depot
- Climate Depot Factsheet on Inconvenient History of Global Warming 'Tipping Points' -- Hours, Days, Months, Years, Millennium -- Earth 'Serially Doomed'
- It's difficult to keep up whether it is hours, days, months or 1000 years. Here are few recent examples of others predicting "tipping points" of various duration.
- HOURS: Flashback March 2009: 'We have hours' to prevent climate disaster -- Declares Elizabeth May of Canadian Green Party
- Days: Flashback Oct. 2009: UK's Gordon Brown warns of global warming 'catastrophe'; Only '50 days to save world'
- Months: Prince Charles claimed a 96-month tipping point in July 2009
- Years: 2009: NASA's James Hansen Declared Obama Only First Term to Save The Planet! '-- 'On Jan. 17, 2009 Hansen declared Obama only 'has four years to save Earth' or Flashback Oct .2009: WWF: 'Five years to save world'
- Decades: 1982: UN official Mostafa Tolba, executive director of the UN Environment Program (UNEP), warned on May 11, 1982, the 'world faces an ecological disaster as final as nuclear war within a couple of decades unless governments act now.'
- Millennium: Flashback June 2010: 1000 years delay: Green Guru James Lovelock: Climate change may not happen as fast as we thought, and we may have 1,000 years to sort it out'
- It is becoming obvious that the only authentic climate "tipping point" we can rely is this one:
- Flashback 2007: New Zealand Scientist on Global Warming: 'It's All Going to be a Joke in 5 Years'
- By: Marc Morano - Climate DepotApril 16, 2014 1:28 PM with 359 comments
- According to the Boston Globe, the United Nations has issued a new climate ''tipping point'' by which the world must act to avoid dangerous global warming.
- The Boston Globe noted on April 16, 2014: ''The world now has a rough deadline for action on climate change. Nations need to take aggressive action in the next 15 years to cut carbon emissions, in order to forestall the worst effects of global warming, says the Intergovernmental Panel on Climate Change.''
- Once again, the world is being warned of an ecological or climate ''tipping point'' by the UN.
- In 1982, the UN issued a two decade tipping point. UN official Mostafa Tolba, executive director of the UN Environment Program (UNEP), warned on May 11, 1982, the ''world faces an ecological disaster as final as nuclear war within a couple of decades unless governments act now.'' According to Tolba in 1982, lack of action would bring ''by the turn of the century, an environmental catastrophe which will witness devastation as complete, as irreversible as any nuclear holocaust.''
- As early as 1989, the UN was already trying to sell their ''tipping point'' rhetoric to the public. See: U.N. Warning of 10-Year 'Climate Tipping Point' Began in 1989 '' Excerpt: According to July 5, 1989, article in the Miami Herald, the then-director of the New York office of the United Nations Environment Program (UNEP), Noel Brown, warned of a ''10-year window of opportunity to solve'' global warming. According to the 1989 article, ''A senior U.N. environmental official says entire nations could be wiped off the face of the Earth by rising sea levels if the global warming trend is not reversed by the year 2000. Coastal flooding and crop failures would create an exodus of 'eco-refugees,' threatening political chaos.'' (LINK) & (LINK)
- It's all so confusing. In 2007, UN IPCC chief Pachauri declared 2012 as the climate deadline to act or it would be ''too late.'' See: Celebrate! UN IPCC Chairman Pachauri: It's Too Late to Fight Climate Change! '' Pachauri in 2007: 'If there's no action before 2012, that's too late. What we do in the next two to three years will determine our future. This is the defining moment'
- Not to be outdone by the UN, Former Irish President Mary Robinson weighed in this week, issuing a more generous 20 year tipping point. ''Former president says we have 20 years to save the world from climate change effects'...Robinson calls for climate agreement by 2015.'' Robinson noted that global leaders have ''at most two decades to save the world''.
- Not to be left out, NASA got in the climate tipping point act in 2009. See: NASA's James Hansen Declared Obama Only First Term to Save The Planet! '-- 'On Jan. 17, 2009 Hansen declared Obama only 'has four years to save Earth'
- Watch Now: Morano rips NASA's James Hansen: 'Hansen said we only have 4 years left to save the planet in Jan.2009, We passed another Mayan calendar deadline'
- But in 2012, the UN gave Obama and planet Earth another four year reprieve. See: Tipping points extended again: UN Foundation Pres. Warmist Tim Wirth: 2012 is Obama's 'last window of opportunity' to get it right on climate change
- Former Vice President Al Gore also created a 10 year climate tipping point in 2006: See: Climatologist Dr. Roy Spencer Mocks Gore for issuing 10-year tipping point in 2006: Al Gore's 10-year climate warning '' Only 2 years left & still no global warming - Spencer: 'Gore told us in January 2006 that we had only 10 years left to solve the global warming problem' '' 'In the grand tradition of prophets of doom, his prognostication is not shaping up too well'...still no statistically significant warming'
- Then, Michael Mann weighed in with his 2036 Mayan calendar type deadline. See: 2036 is the new 2012?! UN Scientist Michael Mann starts his own Mayan Calendar deadline: 'Global Warming Will Cross a Dangerous Threshold in 2036'²
- Other global warming activists chose 2047 as the key date. See: Global warming activist scientists may not be the first to proclaim a doomsday year of 2047 as the end of time! '-- 2047 is the new 2012 '-- but global warming activists were beaten to Armageddon! '' A Climate Depot analysis has uncovered that 2047 has long been seen as a successor to 2012 as an apocalyptic date.
- Finding no date agreement, 20 governments chose 2030 as the scary deadline: See: Skeptics Repent! We are all doomed! Report: More than 100 million people will die by 2030 if world fails to act on climate'-- Reuters: 'More than 100 million people will die and global economic growth will be cut by 3.2% of GDP by 2030 if the world fails to tackle climate change, a report commissioned by 20 governments said on Wednesday. As global avg. temps rise due to ghg emissions, the effects on planet, such as melting ice caps, extreme weather, drought and rising sea levels, will threaten populations and livelihoods, said the report conducted by humanitarian organisation DARA'
- The tipping point rhetoric seems to have exploded after 2002. See: Tipping Points In Env. Rhetoric: An Unscientific Survey of Nexis: After June 2002, news media's use of tipping point in the context of global warming and climate change exploded' '-- 'Between June 2002 and June 2005 '' CC: 262; GW: 303. Between June 2005 and June 2008 '' CC: more than 3,000; GW: more than 3,000* Between June 2008 and June 2011 '' CC: more than 3,000; GW: 2903 Between June 2011 and June 2012 '' CC: 1,348; GW; 637 Of course, the problem with tipping points is that they can never be proven wrong; only right in retrospect. And that, of course, makes citing them a wonderful rhetorical device for doomsayers'
- UNEP Warns of New 'Tipping Points' Being Reached '-- '20-30 years into future'...far enough away that it can be forgotten when date approaches & Armageddon hasn't yet arrived on schedule'
- Perhaps the best explanation of tipping points comes from UK scientist Philip Stott.
- See: UK Scientist Philip Stott ridiculed ''tipping point'' claims in 2007. ''In essence, the Earth has been given a 10-year survival warning regularly for the last fifty or so years. We have been serially doomed. [...] Our post-modern period of climate change angst can probably be traced back to the late-1960s, if not earlier. By 1973, and the 'global cooling' scare, it was in full swing, with predictions of the imminent collapse of the world within ten to twenty years, exacerbated by the impacts of a nuclear winter. Environmentalists were warning that, by the year 2000, the population of the US would have fallen to only 22 million [the 2007 population estimate is 302,824,000]. [...] In 1987, the scare abruptly changed to 'global warming', and the IPCC (the Intergovernmental Panel on Climate Change) was established (1988), issuing its first assessment report in 1990, which served as the basis of the United Nations Framework Convention on Climate Change (UNFCC).''
- Inconvenient History of Climate 'Tipping Point' Warnings
- UK's Top Scientist Sir David King in 2004: 'Antarctica is likely to be the world's only habitable continent by the end of this century if global warming remains unchecked'
- NASA scientist James Hansen has been warning of a ''tipping point'' for years now. See: Earth's Climate Approaches Dangerous Tipping Point '' June 1, 2007 '' Excerpt: A stern warning that global warming is nearing an irreversible tipping point was issued today'' by James Hansen.
- Former Vice President Al Gore invented his own ''tipping point'' clock a few years ago. Excerpt: Former Vice-President Al Gore came to Washington on July 17, 2008, to deliver yet another speech warning of the ''climate crisis.'' ''The leading experts predict that we have less than 10 years to make dramatic changes in our global warming pollution lest we lose our ability to ever recover from this environmental crisis,'' Gore stated.
- Prince Charles claimed a 96-month tipping point in July 2009. Excerpt: The heir to the throne told an audience of industrialists and environmentalists at St James's Palace last night that he had calculated that we have just 96 months left to save the world. And in a searing indictment on capitalist society, Charles said we can no longer afford consumerism and that the ''age of convenience'' was over.
- Get ready, we only have 190 years! Scientists 'expect climate tipping point' by 2200 '' UK Independent '' June 28, 2010 - Excerpt: ''13 of the 14 experts said that the probability of reaching a tipping point (by 2200) was greater than 50 per cent, and 10 said that the chances were 75 per cent or more.''
- 'World has only ten years to control global warming, warns Met Office '' UK Telegraph '' November 15, 2009 '' Excerpt: Pollution needs to be brought under control within ten years to stop runaway climate change, according to the latest Met Office predictions. [...] ''To limit global mean temperature [increases] to below 2C, implied emissions of CO2 to the atmosphere at the end of the century fall close to zero in most cases.''
- In 2013, the UN extended the deadline again. See: Earth Gets 15 Year Reprieve From Climate Doom?!: UN in 1989: World has a '10-year window of opportunity to solve' global warming '-- Now in 2013: 'UN needs global warming answer by 2015'² - New date is the latest in a long history of flexible global warming deadlines
- The UN chief Ban Ki-moon further shortened the ''tipping point'' in August 2009, when he warned of 'incalculable' suffering without climate deal in December 2009!
- Newsweek magazine waded into the tipping point claims as well. Newsweek wrote: ''The longer the planners delay, the more difficult will they find it to cope with climatic change once the results become grim reality.'' But, Newsweek's ''tipping point'' quote appeared in a April 28, 1975 article about global cooling! Same rhetoric, different eco-scare.
- For an explanation of why climate fear promoters are failing to convince the public, see: MIT Climate Scientist: 'Ordinary people see through man-made climate fears '-- but educated people are very vulnerable' '' July 6, 2009]
- Warmists Prep for UN Summit: 'World headed for irreversible climate change in five years, IEA warns': 'The world will 'lose for ever' the chance to avoid dangerous climate change''-- 'The door is closing,'' Fatih Birol, chief economist at the International Energy Agency'...Every month now counts: if the world is to stay below 2C of warming'
- UK greenie George Monbiot 2002 warned we only had 10 years! 'Famine can only be avoided if the rich give up meat, fish and dairy''' Monbiot on December 24, 2002: 'Within as little as 10 years, the world will be faced with a choice: arable farming either continues to feed the world's animals or it continues to feed the world's people. It cannot do both'
- 1924: Top Scientists Say That Earth Is Doomed (April 16, 1924) '' 'It is the firmest conviction of a group of serious scientists of established reputation, who have devoted their lives to a dispassionate and careful examination of geological and astronomical evidence. This group includes such investigators as Dr. Max Valier, of Munich. Engineer Hanne Hoerbiger, of Vienna, Dr. Voigt, of Berlin; and Professor F. Queisser. of Prague'
- New Ecology Paper Challenges 'Tipping Point' Meme
- Analysis: 'Al Gore's 10-Year 'Scorching' Prophesy Emerging As A Grand Hoax'...Global Temperatures Declined Over Last Decade'
- Gore Losing: No cause for alarm at 5-year mid-point of Armstrong-Gore climate 'bet' '-- 'Gore should be pleased to find concerns about a 'tipping point' have turned out to be unfounded''' 'The latest global temperature is exactly where it was at the beginning of the 'bet' '-- 'The IPCC's forecasting procedures have been found to violate 72 of the 89 relevant principles'
- ALERT: Obama (& Planet Earth) Granted Last Minute Reprieve! Four years ago, the world's greatest climatologist James Hansen gave Obama until Jan. 17, 2013 to save the planet'
- Doomster Paul Ehrlich is back and just as wrong as ever! Remember when we all starved to death in the 1980s, just as I predicted? It might happen AGAIN! '' Ehrlich: 'We risk a global collapse of our civilization as we know it. Climate change is just one of our problems. We cannot avert calamity without tackling it and other pressing ecological concerns'
- Flashback: 'Accurate Tribute to Paul Ehrlich: 'Mad'...Kook'...Lunatic'...Disgraced'...Worse than Hitler'...fear-monger'...parasite on Academic system'
- UK Guardian: '50 months to avoid climate disaster' '-- 'On a very conservative estimate, 50 months from now, the dice become loaded against us in terms of keeping under a 2C temp rise'
- Forty Year Cycle Of Scientific Psychosis Discovered: 'There appears to be a forty year cycle of mental illness in the scientific community' '-- 'This is what they were saying in 1970'²: 'Civilization will end within 15 or 30 years unless immediate action is taken against problems facing mankind; '-- George Wald, Harvard Biologist '-- 'We are in an environmental crisis which threatens the survival of this nation, and of the world as a suitable place of human habitation.' '-- Barry Commoner, Wash. U biologist'
- MIT to Obama: Only 4 years left to stop global warming: 'It is quite possible that if this is not done over the next four years, it will be too late' '-- MIT to Obama: 'We can no longer pretend that addressing climate change will be without real costs' '-- 'You have the power and the opportunity to lay the groundwork for a new clean-energy policy that will help us avoid the worst consequences of climate change,'' said the letter, published in the MITTechnology Review'
- Flashback 2007: Climatologist Dr. Michaels mocks 'tipping points': 'We have to do something in 10 years '-- they have been saying that for two years. Why don't they at least subtract 2 and make it 8?'
- Another Atmospheric Scientist Dissents: Calls fears of CO2 tipping point 'alarmist, ludicrous, and totally without foundation' '' July 13, 2009 - 'Over geologic time there has been 15 to 25 times more CO2 than current concentrations'
- Media Tipping Point! Houston Chronicle Reporter Reconsiders Science is 'Settled' Claims! 'I am confused. 4 years ago this all seemed like a fait accompli' '' September 6, 2009
- Antarctic Tipping Point? 'If we don't act soon, the planet will become a barren ball of ice and snow' '' October 2, 2009 - '5 of the 6 years with the greatest Southern Hemisphere sea ice extent have occurred in just the last decade'
- 2007 '' GLOBAL WARMING ALARMISM REACHES A TIPPING POINT '' October 26, 2007
- Climate Depot's Morano on new alarmist National Academy of Sciences' climate 'tipping point' study: It 'openly shills for more climate funding for its members' '-- Morano: 'The organization [NAS] is virtually 100% dependent on government funding. So when they do a study like this '' and they've done other studies in the past '' you know the outcome of these studies before they do them. The actual funding quote from new study is: 'The sudden changes in the climate is full of uncertainties. The world can prepare by better monitoring,' Morano offers. 'And it goes on [to say that] because of budget cuts and aging satellites, we have fewer measurements than we did a few years ago.' '' 'When the NAS is advocating for a carbon tax, it's not too surprising that all [their] reports are going to fall in line.'
- Former Greenpeace co-founder turned climate skeptic Dr. Patrick Moore calls NAS 'tipping point' study 'pure junk': 'Low point for US National Academy of Science. Warns of 'tipping points' in climate like 'drunk drivers'
- AP's Seth Borenstein: 'FEDERAL STUDY WARNS OF SUDDEN CLIMATE CHANGE WOES'
- See: NAS Corrupted Warmist Ralph Cicerone: Turned Org. into political advocacy group: $6 million NAS study used to lobby for climate bill
- Flashback: MIT's Lindzen Slams: 'Ralph Cicerone of NAS/NRC is saying that regardless of evidence the answer is predetermined. If gov't wants carbon control, that is the answer that the Academies will provide'
- Cicerone's Shame: NAS Urges Carbon Tax, Becomes Advocacy Group '-- 'political appointees heading politicized scientific institutions that are virtually 100% dependent on gov't funding'
-
- Mann vs. Steyn: The Trial of the Century | RealClearPolitics
- The global warming hysteria is disastrous enough in its intended goal, which is to ban the use of our cheapest and most abundant fuels and force us to limp along on "alternative energy" sources that are insufficient to support an industrial civilization. But along the way, the global warming campaign is already wrecking our science and politics by seeking to establish a dogma that cannot legally be questioned.
- The critical point in this campaign is a defamation lawsuit by global warming promoter Michael Mann against Mark Steyn, National Review, and the Competitive Enterprise Institute.
- When the "Climategate" e-mails were leaked five years ago, a lot of us speculated that it could all end up in the courts, given the evidence that climate scientists were pocketing large sums of government money on the basis of a scientific consensus they were manipulating behind the scenes. But it's typical of our upside-down political and cultural environment that when this issue does reach the courts, it will be in the form of a lawsuit against the climate skeptics.
- Steyn and the others are being sued for criticizing Mann's scientific arguments. In the case of the Competitive Enterprise Institute, for example, they're being sued for Rand Simberg's complaint that Mann "has molested and tortured data." (See a summary of the case here.) Frankly, I'm not sure how I escaped this lawsuit myself. I shall have to review what I have written and see if my language was not sufficiently inflammatory. Perhaps I don't have pockets deep enough to be worth looting. Or perhaps I'm not a big enough target to be worth intimidating and bankrupting. Note the glee with which the left slavers at the prospect of taking out a prominent voice on the right, with one leftist gloating that "it's doubtful that National Review could survive" losing the case.
- (Steyn points out that National Review is insured against such lawsuits and will survive. But it's interesting that no one asks who is going to go bankrupt funding Mann's lawsuit. A deterrent to the abuse of libel laws is the prospect of spending a lot of money on lawyers' fees for a lawsuit that fails. Who is insuring Mann against this loss?)
- Here is the point at which we need a little primer on libel laws, which hinge on the differentiation between facts and opinion. It is libel to maliciously fabricate facts about someone. (It is not libel to erroneously report a false fact, so long as you did so with good faith reason to believe that it was true, though you are required to issue a correction.) But you are free to give whatever evaluation of the facts you like, including a negative evaluation of another person's ideas, thinking method, and character. It is legal for me, for example, to say that Michael Mann is a liar, if I don't believe that his erroneous scientific conclusions are the product of honest error. It is also legal for me to say that he is a coward and a liar, for hiding behind libel laws in an attempt to suppress criticism.
- These are all reasons that the lawsuit should have been summarily thrown out. It goes beyond the legitimate scope of libel and defamation laws and constitutes an attempt to suppress opinions that are considered politically correct.
- But it gets worse. Consider the specific argument Mann is making, as summed up in the report I linked to above.
- "In the articles, Mann says in his lawsuit, the think tank and the publication ignored more than half a dozen investigations that found no scientific wrongdoing, focusing almost exclusively on the Penn State inquiry in order to call him a fraud. CEI also mentioned the National Academy of Science's investigation, but dismissed those findings by saying the body had obtained information from Penn State, meaning the inquiry was 'not truly independent.' The basis mentioned by CEI to call the Penn State investigation a whitewash was stating it had only interviewed Mann, and 'seemingly ignored the content of the emails.'"
- Even more ominous, the DC Superior Court, which let the suit proceed, embraced this reasoning in its ruling.
- "The CEI Defendants' persistence despite the EPA and other investigative bodies' conclusion that Plaintiff's work is accurate (or that there is no evidence of data manipulation) is equal to a blatant disregard for the falsity of their statements."
- In other words, Steyn's evaluation of Mann's scientific claims can be legally suppressed because Steyn dares to question the conclusions of established scientific institutions connected to the government. On this basis, the DC Superior Court arrives at the preposterous conclusion that it is a violation of Mann's rights to "question his intellect and reasoning." That's an awfully nice prerogative to be granted by government: an exemption against any challenge to your reasoning.
- I said before that I don't know how the rest of us skeptics escaped being sued along with Steyn. Now we know. Mann is attempting to establish a precedent for climate censorship. If he wins this suit, then we're all targets.
- Mann has made a lot of noise about setting himself as some kind of modern Galileo, a persecuted scientist. This analogy was all wrong from the beginning. Galileo was not the enforcer of the prevailing scientific "consensus" but its caustic critic. And now it is Mann who is trying to dictate what others can and cannot say about scientific facts and reasoning. So no, he's not a modern Galileo. He's a modern Cardinal Bellarmine.
- Or perhaps there is a better historical analogy. Mann is attempting to install himself as a kind of American Lysenko. Trofim Lysenko was the Soviet scientist who ingratiated himself to Joseph Stalin and got his crackpot theories on genetics installed as official dogma, effectively killing the study of biology in the Soviet Union. Under Lysenko, the state had an established and official scientific doctrine, and you risked persecution if you questioned it. Mann's libel suit is an attempt to establish that same principle here.
- Mann has recently declared himself to be both a scientist and a political activist. But in attempting to intimidate his critics and suppress free debate on global warming, he is violating the fundamental rules of both science and politics. If it is a sin to doubt, then there is no science. If it is a crime to dissent, then there is no politics.
- Mann vs. Steyn may be the trial of the century. It may determine, not merely whether the environmentalists can shut down industrial civilization, but whether they can shut down the independent thinking of skeptical dissidents.
-
- The Spread of 'Debate is Over' Syndrome | Newgeography.com
- The ongoing trial involving journalist Mark Steyn '' accused of defaming climate change theorist Michael Mann '' reflects an increasingly dangerous tendency among our intellectual classes to embrace homogeneity of viewpoint. Steyn, whose column has appeared for years on these pages, may be alternatingly entertaining or over-the-top obnoxious, but the slander lawsuit against him marks a milestone in what has become a dangerously authoritarian worldview being adopted in academia, the media and large sections of the government bureaucracy.
- Let's call it ''the debate is over'' syndrome, referring to a term used most often in relationship with climate change but also by President Barack Obama last week in reference to what remains his contentious, and theoretically reformable, health care plan. Ironically, this shift to certainty now comes increasingly from what passes for the Left in America.
- These are the same people who historically have identified themselves with open-mindedness and the defense of free speech, while conservatives, with some justification, were associated more often with such traits as criminalizing unpopular views '' as seen in the 1950s McCarthy era '' and embracing canonical bans on all sorts of personal behavior, a tendency still more evident than necessary among some socially minded conservatives.
- But when it comes to authoritarian expression of ''true'' beliefs, it's the progressive Left that increasingly seeks to impose orthodoxy. In this rising intellectual order, those who dissent on everything from climate change, the causes of poverty and the definition of marriage, to opposition to abortion are increasingly marginalized and, in some cases, as in the Steyn trial, legally attacked.
- A few days ago, Brendan Eich, CEO of the web browser company Mozilla, resigned under pressure from gay rights groups. Why? Because it was revealed he donated $1,000 to the campaign to pass Proposition 8, California's since-overturned ballot measure defining marriage as between one man and one woman.
- In many cases, I might agree with some leftist views, say, on gay marriage or the critical nature of income inequality, but liberals should find these intolerant tendencies terrifying and dangerous in a democracy dependent on the free interchange of ideas.
- This shift has been building for decades and follows the increasingly uniform capture of key institutions '' universities, the mass media and the bureaucracy '' by people holding a set of ''acceptable'' viewpoints. Ironically, the shift toward a uniform worldview started in the 1960s, in part as a reaction to the excesses of Sen. Joseph McCarthy and the oppressive conformity of the 1950s.
- But what started as liberation and openness has now engendered an ever-more powerful clerisy '' an educated class '' that seeks to impose particular viewpoints while marginalizing and, in the most-extreme cases, criminalizing, divergent views.
- Today's clerisy in some ways resembles the clerical First Estate in pre-revolutionary France, which, in the words of the historian Georges Lefebvre, ''possessed a control over thought in the interests of the Church and king.'' With today's clerisy, notes essayist Joseph Bottum, ''social and political ideas [are] elevated to the status of strange divinities ... born of the ancient religious hunger to perceive more in the world than just the give and take of ordinary human beings, but adapted to an age that piously congratulates itself on its escape from many of the strictures of ancient religion.''
- To be sure, there remains a still-potent camp of conservative ideologues, many associated with think tanks, such as the Heritage Foundation, and a host of publications, most notably the media empire controlled by the Murdoch family. But, for the most part, today's clerisy in media and academia tilts in one basic direction, embracing a fairly uniform set of secular ''truths'' on issues ranging from the nature of justice, race and gender, to the environment.
- Those who dissent from the ''accepted'' point of view may not suffer excommunication, burning at the stake or other public rituals of penance, but can expect their work to be vilified or simply ignored. In some bastions of the new clerisy, such as San Francisco, an actress with unsuitable views can be pilloried, and a campaign launched to remove her from a production for supporting a Tea Party candidate.
- Nowhere is this shift more evident than in academia, as evidenced in Mann's civil action against Steyn. The climate change issue, one of great import and worthy of serious consideration, is now being buried by the seemingly unscientific notion that everyone needs to follow orthodoxy on an issue that '' like the nature of God in the Middle Ages '' is considered ''settled,'' and those who do not agree deserve to be pilloried.
- But climate change is just one manifestation of the new authoritarian view in academia. On many college campuses, ''speech codes'' have become an increasingly popular way to control thought at many campuses. Like medieval dons, our academic worthies concentrate their fire on those whose views '' say on social issues '' offend the new canon. No surprise, then, as civil libertarian Nat Hentoff notes, that a 2010 survey of 24,000 college students found that barely a third of them thought it ''safe to hold unpopular views on campus.''
- This is not terribly surprising, given the lack of intellectual diversity on many campuses. Various studies of political orientation of academics have found liberals outnumber conservatives, from 8-to-1 to 14-to-1. Whether this is a reflection of simply natural preferences of the well-educated or partially blatant discrimination remains arguable,but some research suggests that roughly two of five professors would be less inclined to hire an evangelical or conservative colleague than one more conventionally liberal.
- Political uniformity is certainly in vogue. A remarkable 96 percent of presidential campaign donations from the nation's Ivy League faculty and staff in 2012 went to Obama, a margin more reminiscent of Soviet Russia than a properly functioning pluralistic academy.
- This story originally appeared at The Orange County Register.
- Joel Kotkin is executive editor of NewGeography.com and Distinguished Presidential Fellow in Urban Futures at Chapman University, and a member of the editorial board of the Orange County Register. He is author of The City: A Global History and The Next Hundred Million: America in 2050. His most recent study, The Rise of Postfamilialism, has been widely discussed and distributed internationally. He lives in Los Angeles, CA.
-
- Obama Nation
-
- Obama signs law to bar Iran diplomat from serving in U.N. post
- WASHINGTONFri Apr 18, 2014 4:53pm EDT
- TweetShare thisEmailPrintU.S. President Barack Obama delivers remarks before presenting the Commander-in-Chief Trophy to the United States Naval Academy football team in the Rose Garden at the White House in Washington April 18, 2014.
- Credit: Reuters/Jonathan Ernst
- WASHINGTON (Reuters) - President Barack Obama signed a law on Friday that effectively bars an Iranian diplomat from serving as an envoy at the United Nations because of suspicions he was involved in the 1979-81 Tehran hostage crisis.
- Obama signed a law passed by the U.S. Congress that blocks any individual from entering the United States who has been found to have been engaged in espionage or terrorist activity against the United States or if that person may pose a threat to U.S. national security.
- The United States had already said it would not grant a visa to Iran's proposed U.N. ambassador, citing the envoy's links to the 1979-1981 hostage crisis. Obama had come under strong pressure not to allow Hamid Abutalebi into the country to take up his position in New York.
- The U.S. government objects to Abutalebi because of his suspected participation in a Muslim student group that seized the U.S. embassy in Tehran in November 1979 and held 52 Americans hostage for 444 days.
- The veteran Iranian diplomat has acknowledged that he acted as an interpreter for the militants who held the hostages.
- The United States said a week ago it had told Iran it would not give Abutalebi a visa. U.S. officials privately said at the time they hoped Iran would quietly drop the issue and name a new envoy.
- But Iran on Monday asked for a special meeting of a U.N. committee on the U.S. decision, calling it a dangerous precedent that could harm international diplomacy.
- (Reporting By Steve Holland; Editing by Sandra Maler)
- Tweet thisLink thisShare thisDigg thisEmailPrintReprintsComments (3)
- It is the right thing to do.
- That was a particularly stupid thing to do'...Obama with each passing month is being shown to be a complete fool!
- The UN is the United Nations'....not the United States'....
- Besides ..it seems to be OK for the US to barge into other countries bombing left, right & centre..but if a nation objects or fights back- then the US gets all bolshy!
- A note to Obama'....you ARE NOT Emperor of the World!
- One nation should not be able to control who a different nation sends as an envoy to the U.N. The fact that the U.N. is located in New York should be irrelevant.
-
- Statement by the President
- Office of the Press Secretary
- Today I have signed into law S. 2195, an Act concerning visa limitations for certain representatives to the United Nations. S. 2195 amends section 407 of the Foreign Relations Authorization Act, Fiscal Years 1990 and 1991, to provide that no individual may be admitted to the United States as a representative to the United Nations, if that individual has been found to have been engaged in espionage or terrorist activity directed against the United States or its allies, and if that individual may pose a threat to United States national security interests. As President Bush observed in signing the Foreign Relations Authorization Act, Fiscal Years 1990 and 1991, this provision "could constrain the exercise of my exclusive constitutional authority to receive within the United States certain foreign ambassadors to the United Nations." (Public Papers of the President, George Bush, Vol. I, 1990, page 240). Acts of espionage and terrorism against the United States and our allies are unquestionably problems of the utmost gravity, and I share the Congress's concern that individuals who have engaged in such activity may use the cover of diplomacy to gain access to our Nation. Nevertheless, as President Bush also observed, "curtailing by statute my constitutional discretion to receive or reject ambassadors is neither a permissible nor a practical solution." I shall therefore continue to treat section 407, as originally enacted and as amended by S. 2195, as advisory in circumstances in which it would interfere with the exercise of this discretion.
-
- Statement by the Press Secretary on S. 2195
- Office of the Press Secretary
- On Friday, April 18, 2014, the President signed into law:
- S. 2195, which amends current law to deny admission to the United States to any representative to the United Nations who the President determines has been engaged in terrorist activity against the United States or its allies and may pose a threat to U.S. national security interests.
-
- Baby philanthropists wooed by Obama: Administration invites Rockefeller, Marriott and Hilton heirs to talk about future of philanthropy
- Published: 00:59 EST, 19 April 2014 | Updated: 15:22 EST, 19 April 2014
- Some of the country's richest young people came together at the White House recently for a day-long conference about how exactly they plan to spend their inherited wealth.
- The invitation-only event sought to engage the young billionaires with the public sector and with each other in order to empower and advance their philanthropic endeavors.
- The event was organized by Thomas Khalil, a deputy director for technology and innovation in the White House Office of Science and Technology Policy along with Nexus, an organization that aims to encourage philanthropy among the young and rich.
- Philanthropic summit: (left to right) Ian Simmons, Leisel Pritzker Simmons and Europe Director of Nexus James Hurrell
- Important issues: Patrick Gage, heir to the Carlson hotels fortune, speaks during the 'Combating Human Trafficking' session
- Founded by Jonah Wittkamper and Rachel Cohen Gerrol in 2011, Nexus Network is a collection of more than 1,000 young philanthropists and social entrepreneurs.
- The event, held in late March, was closed to media, but Johnson & Johnson heir Jamie Johnson was invited to attend and report on the event for The New York Times.
- Among the attendees were Patrick Gage, the 19-year-old heir to the Carlson hotel fortune.
- 'I think it's fantastic,' Gage told the New York Times. 'I've never seen anything like this before.'
- His family company, which owns Radisson hotels, T.G.I. Fridays and and Park Plaza Hotels and Resorts, among others, is renowned for its work in the prevention of sex trafficking.
- The real Hilton heir: Philanthropist Justin McAuliffe has quite different interests to his cousin Paris Hilton
- He spoke at a session during the conference entitled 'Combating Human Trafficking,' which resonated with his peers.
- 'The person two seats away from me was a Marriott,' he told The New York Times. 'And when I told her about trafficking, right away she was like, "Uh, yeah, I want to do that."'
- Another attendee was Leisel Pritzker Simmons, 30, who received an estimated $500 million fortune after taking her father and 11 cousins to court when she was 19.
- Pritzker Simmons found fame as a child actor before she garnered headlines for suing her father, appearing in several films including the 1995 remake of the Shirley Temple classic The Little Princess.
- In 2011, she married Ian Simmons, heir to the Montgomery Ward department store chain. Together, the pair formed the Blue Haven Initiative, an investment office and philanthropic organization.
- Pritzkker Simmons aims to prove that investing with a social conscience and investing for profit are not mutually exclusive.
- 'We want 100 per cent of our assets to be value aligned or impact invested,' she told the New York Times.
- 'I was a little worried they were going to get a bunch of rich kids in the room and fund-raise for the Democratic Party. But they didn't.'
- Child star: Leisel Pritzker Simmons was awarded $500 million after suing her father and now pursues philanthropic endeavours
- New generation: Patrick Gage (left), heir to the Carlson hotels fortune, and Zac Russell (right), who family owns Russell Investments
- The young philanthropists attended sessions such as 'Climate Change,' 'Millennial Healthcare,' and 'Revitalizing Cities.'
- 'It's not just seen as some old guy writing checks anymore,' Zac Russell, heir to the Russell Investments fortune, told the Times. 'It's young people who want to solve real problems.'
- Nexus says that nearly $40 trillion dollars will transfer from older to younger generations by 2050 in the United States alone, meaning now is the time to engage with young heirs.
- And the new generations are becoming more and more involved in philanthropic giving.
- The Dorothy A. Johnson Center for Philanthopy and the nonprofit group 21/64 found in a recent study that heirs are engaging with family philanthropic foundations in the 20s and 30s, reports the Times.
- 'The vision of our conference is a community of strong, capable young change-makers who are cognizant of the challenges and opportunities facing the world, and committed to good stewardship,' according to Nexus.
- Share or comment on this article
-
- Benghazi attack could have been prevented if US hadn't 'switched sides in the War on Terror' and allowed $500 MILLION of weapons to reach al-Qaeda militants, reveals damning report | Mail Online
- Citizens Committee on Benghazi claims the US government allowed arms to flow to al-Qaeda-linked militants who opposed Muammar GaddafiTheir rise to power, the group says, led to the Benghazi attack in 2012The group claims the strongman Gaddafi offered to abdicate his presidency, but the US refused to broker his peaceful exitThe commission, part of the center-right Accuracy In Media group, concluded that the Benghazi attack was a failed kidnapping plotUS Ambassador Chris Stevens was to be captured and traded for 'blind sheikh' Omar Abdel-Rahman, who hatched the 1993 WTC bombing plotBy David Martosko, U.s. Political Editor
- Published: 15:09 EST, 22 April 2014 | Updated: 09:53 EST, 23 April 2014
- The Citizens Commission on Benghazi, a self-selected group of former top military officers, CIA insiders and think-tankers, declared Tuesday in Washington that a seven-month review of the deadly 2012 terrorist attack has determined that it could have been prevented '' if the U.S. hadn't been helping to arm al-Qaeda militias throughout Libya a year earlier.
- 'The United States switched sides in the war on terror with what we did in Libya, knowingly facilitating the provision of weapons to known al-Qaeda militias and figures,' Clare Lopez, a member of the commission and a former CIA officer, told MailOnline.
- She blamed the Obama administration for failing to stop half of a $1 billion United Arab Emirates arms shipment from reaching al-Qaeda-linked militants.
- 'Remember, these weapons that came into Benghazi were permitted to enter by our armed forces who were blockading the approaches from air and sea,' Lopez claimed. 'They were permitted to come in. ... [They] knew these weapons were coming in, and that was allowed..
- 'The intelligence community was part of that, the Department of State was part of that, and certainly that means that the top leadership of the United States, our national security leadership, and potentially Congress '' if they were briefed on this '' also knew about this.'
- The weapons were intended for Gaddafi but allowed by the U.S. to flow to his Islamist opposition.
- The Citizens Committee on Benghazi released its interim findings on April 22, 2014 in Washington. Pictured are (L-R) Clare Lopez, Admiral (Ret.) Chuck Kubic, Admiral (Ret.) James 'Ace' Lyons, former CIA officer Wayne Simmons and civil rights attorney John Clarke
- On September 11, 2012 armed terror-linked militias attacked U.S. diplomatic outposts in Benghazi, Libya, killing four Americans and driving the United States out of that part of the country
- 'The White House and senior Congressional members,' the group wrote in an interim report released Tuesday, 'deliberately and knowingly pursued a policy that provided material support to terrorist organizations in order to topple a ruler [Muammar Gaddafi] who had been working closely with the West actively to suppress al-Qaeda.'
- 'Some look at it as treason,' said Wayne Simmons, a former CIA officer who participated in the commission's research.
- Retired Rear Admiral Chuck Kubic, another commission member, told reporters Tuesday that those weapons are now 'all in Syria.'
- 'Gaddafi wasn't a good guy, but he was being marginalized,' Kubic recalled. 'Gaddafi actually offered to abdicate' shortly after the beginning of a 2011 rebellion.
- 'But the U.S. ignored his calls for a truce,' the commission wrote, ultimately backing the horse that would later help kill a U.S. ambassador.
- Kubic said that the effort at truce talks fell apart when the White House declined to let the Pentagon pursue it seriously.
- 'We had a leader who had won the Nobel Peace Prize,' Kubic said, 'but who was unwilling to give peace a chance for 72 hours.'
- In March 2011, Kubic said, U.S. Army Africa Commander General Carter told NBC News that the U.S. military was not actively targeting Muammar Gaddafi. That, Kubic revealed, was a signal to the Libyan dictator that there was a chance for a deal.
- Gaddafi responded by 'verifiably ... pull[ing] his forces back from key rebel-held cities such as Benghazi and Misrata.'
- Christopher Stevens served as the U.S. Ambassador to Libya from June 2012 to September 11, 2012 when he was killed in the attack
- Then-Secretary of State Hillary Clinton told the Senate Foreign Relations Committee in January 23 that it mattered little why the Benghazi diplomatic compound was attacked: 'What difference, at this point, does it make?'
- Gaddafi wanted only two conditions to step down: permission to keeo fighting al-Qaeda in the Islamic Maghreb (AQIM), and the lifting of sactions against him, his family, and those loyal to him.
- The Obama administration's unwillingness to help broker a peaceful exit for the Libyan strongman, 'led to extensive loss of life (including four Americans)' when al-Qaeda-linked militants attacked U.S. diplomatic facilities in the city of Benghazi,' the commission told reporters.
- The White House and the National Security Staff did not immediately respond to questions about the group's findings.
- 'We don't claim to have all the answers here,' said Roger Aronoff, whose center-right group Accuracy in Media sponsored the group and its work.
- 'We hope you will, please, pursue this,' he told reporters. 'Check it out. Challenge us.'
- Retired Admiral Chuck Kubic said the White House refused to let the Pentagon pursue a peaceful exit for Muammar Gaddafi: 'We had a leader who had won the Nobel Peace Prize, but who was unwilling to give peace a chance for 72 hours'
- The commission and AIM filed 85 document requests under the Freedom Of Information Act, hitting the Department of Defense, State Department, Federal Bureau of Investigation and Central Intelligence Agency with demand after demand.
- But most of its information has come from insiders with deep knowledge of the flow of weapons in Libya and elsewhere in the African Maghreb.
- Admiral James 'Ace' Lyons told the group that he believes the raid on the Benghazi compound was intended as a kidnapping exercise, aimed at snatching U.S. Ambassador Chris Stevens and demanding a prisoner swap for the 'blind sheikh' Omar Abdel-Rahman.
- Abdel-Rahman is serving a life sentence in federal prison for planning the 1993 bombing of the World Trade Center garage in New York City. He also masterminded a plan, later foiled, to blow up the United Nations, both the Lincoln and Holland tunnels, the George Washington Bridge and a federal building where the FBI had a base of operations.
- A senior FBI source, Lyons said Tuesday, 'told me that was the plan.'
- The attack, history shows, grew in intensity and resulted in the deaths of Stevens and three other U.S. personnel.
- Lyons also said U.S. claims that it lacked the resources to mount a counterattack in time to save lives is false.
- 'I'm going to tell you that's not true,' he said. 'We had a 130-man unit of forces at Sigonella [AFB in Italy]. They were ready to go.'
- 'The flight time from Sigonella to Benghazi is roughly an hour.'
- Killed: An image captured by a cellular phone camera shows the arrest of strongman Muammar Gaddafi in Sirte, Libya on October 20, 2011
- Former CIA officer Clare Lopez accused the U.S. government of allowing arms to flow to al-Qaeda militants who opposed Gaddafi in 2011, 'switching sides in the war on terror'
- Some of the group's claims strain credibility, including the assertion that the Obama administration's early effort to blame the Benghazi attack on a protest against a crude anti-Muslim YouTube video 'appears to have been well-coordinated with U.S.Muslim Brotherhood organizations as well as Islamic state members of the Organization of Islamic Cooperation (OIC).'
- Those groups, the commission noted, 'all joined in condemnation of the video, and, even more troubling, issued calls for restrictions on Americans' free speech rights.'
- But Simmons, the former CIA officer, criticized the Obama administration on the familiar refrain of then-Secretary of State Hillary Clinton exclaiming in a Senate hearing that it mattered little why the Benghazi facilities were struck.
- 'They believed they were going to be saved, that they were going to be rescued, but they weren't,' Simmons said of the four Americans who died.
- 'I know who made the decision, in my heart of hearts, to leave our war fighters there and be blown up. And then to have one of the most powerful politicians in our country sit there and say, "What difference does it make?" '' should be an alarm bell for all Americans.
- 'It haunts me,' Simmons said. 'I play that line over, and over, and over, and over in my mind.'
- The group has called for a Select Congressional Committee to investigate the Benghazi episode. A total of 189 House members have signed on to a bill that would create the committee, which would be bipartisan and have sweeping powers to subpoena the executive branch.
- House Speaker John Boehner, Lopez said Tuesday, 'he blocked it. One has to wonder if he and Congress have had some sort of briefing on what happened.'
- Kubic insisted that Congress is unable to break logjams in the Obama administration and find out what happened in the days leading up to and following the Benghazi attack without a new committee.
- 'If they don't have strong subpoena power, if they don't have the ability to do long-term cross examination, it won't work,' he said.
- Share or comment on this article
-
- Afrika
-
- Tientallen ontvoerde meisjes Nigeria nog vast | Buitenland | Telegraaf.nl
- Exclusieve artikelen van de Telegraaf redactie
- MAIDUGURI - De Nigeriaanse terreurorganisatie Boko Haram houdt vermoedelijk nog zo'n 85 schoolmeisjes vast. Dat maakten de autoriteiten van de staat Borno zaterdag bekend. De meisjes werden deze week ontvoerd na een aanval op hun school in de noordoostelijke plaats Chibok.
- Volgens de autoriteiten zijn 44 meisjes inmiddels weer op vrije voeten. De jongeren zijn niet gered, maar wisten op eigen houtje te vluchten. Dat lukte 16 meisjes al op de nacht van de aanval. Nog eens 28 ontvoerde schoolmeisjes konden op een later punt de benen nemen.
- Het Nigeriaanse leger maakte eerder bekend dat de meeste jongeren waren gered, maar moest die verklaring later weer intrekken. Het is nog onduidelijk hoeveel meisjes precies in handen zijn van de islamitische terreurgroep. Op de school waren 129 kinderen aanwezig.
- (C) 1996-2014 TMG Landelijke Media B.V., Amsterdam.Alle rechten voorbehouden.e-mail: redactie-i@telegraaf.nlGebruiksvoorwaarden | Privacy | Cookies | Cookie-voorkeuren
-
- S.Sudan rebels slaughter 'hundreds' in ethnic massacres: UN
- JUBA: Rebel gunmen in South Sudan killed "hundreds" of civilians when they captured the oil town of Bentiu last week, the UN said Monday.
- "More than 200 civilians were reportedly killed and over 400 wounded at the mosque," the UN peacekeeping mission in South Sudan (UNMISS) said in a statement.
- Radio broadcasts had urged fighters to massacre a rival tribe sheltering at a church, mosque and hospital.
-
- LGBBTQQIAAP
-
- Brunei Sultan Approves Death by Stoning For Gay People
- In a shift to a harsh Islamic penal code, the leader of the southeast Asian country of Brunei has mandated the death penalty for a wide variety of offenses, including homosexuality.
- The United Nations Commission on Human Rights expressed its concern over the new laws.
- "We are deeply concerned about the revised penal code in Brunei Darussalam, due to come into force later this month, which stipulates the death penalty for numerous offences," said Rupert Colville, spokesman for the UN high commissioner for human rights.
- Colville said that punishable offenses include rape, adultery, sodomy, extramarital sexual relations for Muslims, and also crimes such as robbery, murder, defamation of the Prophet Muhammad, and declaring oneself a non-Muslim.
- "Application of the death penalty for such a broad range of offences contravenes international law," Colville said.
- Despite assurances from Brunei officials that prosecutors would require a high burden of proof to enforce capital punishment, Colville said that stoning is banned under global human rights treaties as it constitutes "torture or other cruel, inhuman or degrading treatment or punishment.''
- There have been no executions in Brunei since 1957. But the country's all-powerful sultan, Hassanal Bolkiah, announced last October that his sultanate would be phasing in Islamic sharia law, which dictates punishments like flogging and stoning, the Times of India reports.
- Brunei's brand of Islam has always been more conservative than that of Malaysia and Indonesia, its neighbors. The sale and public consumption of alcohol is illegal, and other religions are tightly restricted. The sultan recently referred to his country as a ''firewall'' against globalization.
- While the punishment for same-sex relations was previously 10 years in prison in Brunei, those found guilty will now be subjected to death by stoning.
- ''The provisions of the revised penal code may encourage further violence and discrimination against women and also against people on the basis of sexual orientation,'' Colville said.
- The code is expected to go into effect April 22.
- Sources: UN News Centre, Times of India, Gay Asia News
-
- Was RuPaul Wrong to Be Using ''She-Male'' All These Years? | Dame Magazine
- What's in a word? That's a question RuPaul found himself having to consider once more as the producers ofRuPaul's Drag Racedecided to pull all mentions of the term ''she-male'' from past and future shows.
- In the offending segment, Ru has a bit'--much like Tyra Banks on America's Next Top Model'--where he delivers a message to his competitors via mail or video message. It used to be called ''You've got She-Mail.'' But recently, a group of activists pushed the network, Logo, to change it'--especially after recent episode took ''she-male'' to a new level'--asking contestants to look at close up pictures of women and drag queens and guess if they were ''real or she-male.'' Probably not the brightest idea the writers room ever had.
- While producers initially balked and issued a tepid statement of vague support, the higher-ups had second thoughts, and she-mail as a concept has been banished from Drag Race.
- Much like the debates over the word ''tranny,'' the she-male controversy has ignited another firestorm over language and semantics, but the trans community seems to be getting fed up'--with itself. While the younger generation does its due diligence trying to educate the greater public through Twitter and media campaigns, some members, including many of the pioneers of the trans community, are getting tired of people in their own community telling them what they can and can't say.
- On the one side of the debate are people like transwoman Parker Marie Molloy, a writer for the Advocate.com, the Daily Beast (where I am also a contributor), and the Huffington Post. Molloy has earned the ire of longtime queer performers Jayne County and Penny Arcade with some of her comments, inciting an Internet flame war. After the offending ''Female or She-Male'' segment aired, she tweeted ''I f*cking hate RuPaul,'' and wrote a piece for the Advocate explaining that ''she-male" is a word that historically refers to transgender women, most prominent in pornography. The word originated with transgender porn and doesn't have roots in "drag culture," as some have argued is the case with the word "tranny."
- Molloy has been outspoken about the acceptance of words like tranny that she categorizes as hate speech.
- When reached by email, she said: ''I'd just like to clear up that I don't actually hate RuPaul. Does his dismissal of trans people and our identities frustrate me? Absolutely. Should I have said that? No.''
- Many of those who disagree with her and others in this debate complain of humorlessness and over-policing. Another transwoman, singer Our Lady J, wrote a piece for the Huffington Post, titled ''RuPaul's Drag Race'--and the Danger of Overpolicing Language.'' In it, she points out that even on the LGBT spectrum, drag queens, transpeople, and other gender nonconforming types are on the farther end of the continuum than the mainstream sector of the LGB community.
- She equivocated the policing of language with manipulation, itself another form of oppression. ''When I first transitioned, I proudly identified as a 'tranny' until people within the trans community told me the word was offensive to them,'' wrote Our Lady J. ''I complied but quickly realized that while striving to be accepted by the hetero-dominated world, the upper echelons of the trans community were trying to sweep the fringe under the rug by censoring the language with which they identify. In addition to banishing 'tranny,' 'sissy,' 'sex change,' and 'she-male' as slander, they insisted that the users of these words were the oppressors, making themselves the victims'--a well-worn tool of manipulation and control.''
- But Molloy disagrees with the sentiment that language can be overpoliced'--especially if it's hate speech. ''I really don't think so. In this case, these are slurs that have been considered derogatory for years. Anyone who says things like, 'Well, why are you just now concerned about this?' hasn't been paying attention.''
- County and Arcade are pioneers in the realm of gender. County was trans in public when the very act of dressing in drag was hugely transgressive. Neither artist has any patience for what they see as infringements of free speech by people within their own community, particularly those who are just joining it. County was an actress in Warhol's Factory in the 1960s, and later formed her band, then called Wayne County and the Backstreet Boys, playing at seminal punk clubs like Max's Kansas City and CBGB. She was one of the first visible transwomen in rock and roll'--no easy feat in the mean streets of New York during the '70, and '80s.
- To say she is outspoken is an understatement. County wrote in an email, ''This policing of words must stop! '¨It is both homo AND transphobic!'¨I am against transfascism!''
- County said that as the years change, what language people like to use also changes'--she used to call herself transsexual, and now she says she prefers to identify as ''two spirit'' or ''gender variant.''
- '''Cuz no matter what you do or change, your mind, soul, consciousness, etc., is basically the same regardless of an 'opinion,''' she says. ''No matter how you alter your body! We can't force one groups' opinion on another 'cuz our experiences with it [being trans] are all different.'' County likened the people who are policing language to uptight ''church ladies.''
- Arcade, a queer-friendly performance artist, has performed shows about gender for years. Her show Bitch! Dyke! FagHag! Whore! dealt with sexuality and gender'--a response to Jesse Helms's revoking grant money to the National Endowment for the Arts for perceived ''obscene'' art. Arcade responded to Molloy's piece in the Advocate with rage on her public Facebook wall.
- ''Molloy has NO LINKS to the Gay World and Transitioned from Heterosexual man to Female 2 years ago'...UNDERSTANDS NOTHING OF RUPAUL'S WORLD OR OUR WORLD'...EARNS A LIVING WRITING ABOUT TRANSEXUAL ISSUES as an EXPERT. I DID NOT GET MY HEAD KICKED IN ON THE STREETS OF THIS WORLD to have this kind of intellectual pygmy parasite have power in the QUEER world!!!!!!!!! The word SLUR comes with a middle class mindset'... If WORDS COULD STOP US NOTHING WOULD HAVE Changed in Gay Rights or Gender rights'.... Just try to imagine how much Marsha P Johnson or Jackie Curtis or International Chrysis would care about a WORD!,'' she wrote, invoking the names of transgender pioneers.
- Perhaps the divide is generational. The people spearheading the charge to formalize the language around trans people tend to be younger. ''I think there is a difference as far as generational gaps are concerned,'' said Molloy. ''For a long time, trans people were essentially given the table scraps of LGBT activism spoils. If that meant having an identity to call their own, even if it was also seen in a derogatory way, some became attached to those terms. And that's wonderful. If you are trans and want to reclaim these words, more power to you! I have so much respect for the trans people who have paved the way for my generation.''
- The inter-community squabbling is akin to people standing in a circle pointing a gun at each other. Everyone loses. Michael Cavadias, an actor who played a transwoman in The Wonder Boys, and who has performed in and out of drag in New York City as a DJ wrote on his Facebook wall: ''I couldn't walk from one class to another in school without being called faggot and being thrown against a locker or my face pushed into a drinking fountain leaving my mouth bloody almost daily. I felt like a girl and a boy and I still do,'' said Cavadias. ''I am not bothered when Lenny Bruce or Louis C.K. use the word faggot.''
- He added: ''I remember the Catholics claiming hurt feelings because of a painting at the Brooklyn Museum and the mayor tried to shut it down. Don't think these tactics can't and won't be used against us. They will. I saw Jayne County sing 'Man Enough to Be A Woman' when I moved to New York and it changed my life. People are dying, living in poverty, being attacked and beaten and we are arguing about a reality show.''
- Cavadias pointed out what many others in the queer community have said: There are bigger battles to fight.
- ''We have the privilege of arguing about theory and language and we are fighting each other while all of our rights are being eroded by corporate behemoths, people are forced from their homes in our city and workers are exploited. Many people I know are on food stamps and struggle to get health care. Trans women like Jayne, Page (R.I.P.), Amanda, and so many others taught me about being authentically alive,'' he wrote. ''Now marginalized and traumatized people are attacking each other and labeling people who have lived on the outside all their lives 'oppressors' or 'phobic.' It's heartbreaking and it's shortsighted and it accomplishes nothing.''
- Honey Dijon, a New York''based DJ who came out of the Chicago house scene with peers like Derrick Carter, began her career as a DJ who played while in drag. She wasn't yet out to herself as a transwoman, but doing drag was her introduction into the queer world. One of the reasons it seems the language over ''tranny'' and ''she-male'' and other formerly accepted words have come under fire is because of the context: drag queens have long used words like ''queen,'' referring to each other as ''she'' and ''girl'' and cracking jokes about ''trannys.''
- ''The problem I have with she-male language is that a lot of it is defined by sex work. They are sensationalist and exploitative words that have been used by the sex industry,'' said Dijon. ''I have no problem with Ru. I've known Ru when I was in New York. And I can understand the sensitivity of the trans community around these words. I understand where Ru is coming from but not everyone does. I can see Ru is using language that gay men, drag queens, gender illusionists, and even transwomen'--because, let's be honest, the gay community was the only place where you could feel safe. Other transwomen called each other tranny, and for a long time, I would make fun of things like that. One, I didn't have any other examples of how to be a transwoman and two, I was letting others define who I was instead of having the knowledge and experience of who I was,'' she said.
- ''But this is all growing pains. All this shit is growing pains. We have to allow for mistakes. This is the problem with people, we don't allow people to navigate and have mistakes,'' she said. ''There's gonna be a lot of clumsiness along the way until we get it right.''
-
- Bank$ters
-
- Weinig sporen na schietpartij - De Standaard
- In Wezet in de provincie Luik zijn een kind van negen en een man van 37, een bankier, vrijdagavond laat doodgeschoten. Een vrouw, de meter van het kind, raakte zwaargewond en overleed deze ochtend in het ziekenhuis. Een onbekende schutter vuurde minstens zeven schoten af op zijn slachtoffers. Maar de speurders hebben bitter weinig elementen om de dader(s) te identificeren.
- De precieze omstandigheden van de schietpartij zijn nog onduidelijk. Rond 23 uur schoot een persoon die in een wagen zat op de drie mensen, toen die een woning in de buurt van de sporthal binnengingen. Het kind van negen, Esteban C., zou meteen overleden zijn. De man, Beno®t P. (37), die niet de vader van het kind is, zou later gestorven zijn. De vrouw, Carole H. (37), raakte zeer ernstig gewond en bezweek zaterdagochtend aan haar verwondingen.
- De twee volwassen slachtoffers van de schietpartij hadden een goede reputatie. Hij was bankdirecteur bij een groot filiaal van BNP Paribas Fortis en ook de vrouw werkte voor dezelfde bank.
- Het gerecht onderzoekt nu of er meerdere schutters betrokken waren bij de schietpartij. Er zouden in elk geval minstens zeven schoten afgevuurd zijn op de slachtoffers, dat is vernomen uit gerechtelijke bron. De man kreeg een kogel in het hoofd en een in de buik. Zijn echtgenote werd getroffen door drie kogels in de rug. De jongen werd geraakt door een kogel. In een venster werd nog een kogel teruggevonden.
- Maar de zoektocht naar de dader wordt moeilijk, want de speurders hebben voorlopig maar weinig elementen in handen om de dader(s) te identificeren. Volgens de eerste elementen van het onderzoek wachtte een wagen de drie op voor hun huis in de buurt van de sporthal van Wezet. De schoten werden afgevuurd met een automatisch pistool.
-
- Banker Death 'Epidemic' Spreads To China | Zero Hedge
- Until now, the terrible trail of dead bankers has been only among US and European financial executives. However, as Caixin reports, the increasing pressures on the Chinese banking system appear to have take their first toll. Li Jianhua, director of China's Banking Regulatory Commission (CBRC), died this morning due to a "sudden heart attack" - he was less than 49 years old. Li was among the main drafters on new "caveat emptor" market-based rules on China's shadowy banking system and recently said in an interview that "now is not only a time to control risk, but to transform the trust industry.. if it's too loose, it's a big problem." Li was found by his wife.
- Li Jianhua, director of the CBRC AfDB died due to heart attack, still less than 49 years old. As planned, Li Jianhua this morning to attend a major industry conference.
- According to several sources close to the CBRC said, Li Jianhua was revising to 12 o'clock at night.
- Unexpectedly around 6:00 this morning, his wife found him passed away, due to sudden heart attack.
- Both inside and outside China Banking Regulatory Commission expressed sorrow and regret.
- Li was well-known as the author of major China Trust regulations...
- Li Jianhua was born in July 1965, Hunan Yongxing, graduated from Wudaokou Finance Institute.
- Li Jianhua was the main drafter of "one law two rules" or "People's Republic of China Trust Law," "Trust management approach" "Trust Capital Trust scheme management approach,"
- It seems clear that Li was somewhat anti-bailout, preferring market forces to fix the trust industry...
- Li Jianhua has made it clear for the new financial reporters that this understanding is wrong. No. 99 Wen emphasized that "sellers responsible" does not mean that the buyer can zero-risk, high-yield.
- Now China has not yet Trustee Ordinance, if the trustee's duty to strengthen and plug loopholes flaws, accordingly, "caveat emptor" is also strengthened. This is the market rules.
- For the trust industry has experienced many ups and downs rectification, Li Jianhua was believed that this industry is still promising, but trust industry needs to find new profit model, there is also the process of transformation...
- "if too loose, I'm afraid to be a big problem."
- This brings the sad list of senior financial services exectives who have died in the last few months to 13:
- 1 - William Broeksmit, 58-year-old former senior executive at Deutsche Bank AG, was found dead in his home after an apparent suicide in South Kensington in central London, on January 26th.
- 2 - Karl Slym, 51 year old Tata Motors managing director Karl Slym, was found dead on the fourth floor of the Shangri-La hotel in Bangkok on January 27th.
- 3 - Gabriel Magee, a 39-year-old JP Morgan employee, died after falling from the roof of the JP Morgan European headquarters in London on January 27th.
- 4 - Mike Dueker, 50-year-old chief economist of a US investment bank was found dead close to the Tacoma Narrows Bridge in Washington State.
- 5 - Richard Talley, the 57 year old founder of American Title Services in Centennial, Colorado, was found dead earlier this month after apparently shooting himself with a nail gun.
- 6 - Tim Dickenson, a U.K.-based communications director at Swiss Re AG, also died last month, however the circumstances surrounding his death are still unknown.
- 7 - Ryan Henry Crane, a 37 year old executive at JP Morgan died in an alleged suicide just a few weeks ago. No details have been released about his death aside from this small obituary announcement at the Stamford Daily Voice.
- 8 - Li Junjie, 33-year-old banker in Hong Kong jumped from the JP Morgan HQ in Hong Kong this week.
- 9 - James Stuart Jr, Former National Bank of Commerce CEO, found dead in Scottsdale, Ariz., the morning of Feb. 19. A family spokesman did not say whatcaused the death
- 10 - Edmund (Eddie) Reilly, 47, a trader at Midtown's Vertical Group, commited suicide by jumping in front of LIRR train
- 11 - Kenneth Bellando, 28, a trader at Levy Capital, formerly investment banking analyst at JPMorgan, jumped to his death from his 6th floor East Side apartment.
- 12 - Jan Peter Schmittmann, 57, the former CEO of Dutch bank ABN Amro found dead at home near Amsterdam with wife and daughter.
- 13 - Li Jianhua, 49, the director of China's Banking Regulatory Commission died of a sudden heart attack
- Average:Your rating: NoneAverage: 4.7(3 votes)
-
- Chiner$
-
- Forty thousand workers strike at shoe manufacturer in southern China
- By Joseph Santolan19 April 2014An estimated 40,000 workers at the Taiwanese-owned Yue Yuen Industrial Company in Dongguan City have been on strike since Monday. Located 30 kilometers east of Guangzhou in Guangdong province's Pearl River Delta, Dongguan is a key manufacturing center in China.
- Yue Yuen is the largest branded footwear manufacturer in the world and makes shoes for Nike, Adidas, Reebok, Converse and other major brands. According to Yue Yuen's web site, the company operates factories in China, Vietnam, Indonesia, Mexico and the United States, and employed a total of 460,000 workers in 2011. Yue Yuen operates three factories in Guangdong province, employing 60,000 workers.
- Yue Yuen reported that it made over 300 million pairs of shoes last year, making a net profit of $434.8 million on $7.58 billion in revenue.
- China Labor Watch, a US based non-governmental organization described the Yue Yuen strike as ''likely one of the largest Chinese worker strikes in recent history.''
- The primary issue being raised by the striking workers is Yue Yuen's decade-long underpayment into workers' retirement and housing benefits. Each month, workers pay approximately 10-20 percent of their earnings into a Social Insurance account. Corporations are legally required by China's Social Insurance law to match workers' contributions into these retirement plans.
- Workers going to the Social Insurance offices to collect printouts of the contributions made to their accounts discovered that Yue Yuen had either significantly under contributed to their account or had made no contributions at all.
- Yue Yuen has been calculating the contributions made to the social insurance accounts on workers' base salary rather than their actual pay, thus leaving out all overtime income. The employees of Yue Yuen, as with all manufacturing in China, are grossly overworked. Actual pay is routinely double the base salary.
- Yue Yuen has not only cheated workers of their social insurance payments, it has not paid them their housing funds either. According to Xinhua, ''A human resources executive who requested anonymity confirmed the matter, saying only about 1,000 workers of the plant's 45,000 staff have been paid housing funds.''
- Yue Yuen announced on Monday that the company's failure to pay workers their benefits and housing was the result of a ''misunderstanding,'' and that Yue Yuen would begin implementing ''an improved social benefit plan.''
- This statement did nothing to appease the striking workers.
- ''The factory has been tricking us for 10 years,'' a female worker at Yue Yuen's Gaobu plant told Reuters. ''The Gaobu government, labor bureau, social security bureau and the company were all tricking us together.''
- These statements reflect deep anger in the Chinese working class over the grotesque exploitation and social inequality that emerged after the Stalinist Chinese Communist Party's restoration of capitalism, a quarter of a century ago, allowing it to run China as the sweatshop of the world.
- This situation for workers at Yue Yuen reflects the exploitation suffered by workers throughout China. China Labor Watch conducted 400 factory investigations over the past decade. During that time, it reported, ''not one factory bought for its workers all of the social insurance items required by Chinese law.''
- On Tuesday over 10,000 Yue Yuen workers marched through the streets of Dongguan in protest. One banner read ''Return our Social Insurance, return my housing fund.''
- The peaceful marchers were violently dispersed by riot police. It is unclear how many workers were injured in the clash, but over twenty were reportedly hospitalized. The wife of one worker told the BBC that her husband had been beaten so severely that he had lost the ability to speak. A video of the police crackdown is visible here.
- According to the latest reports, forty thousand workers are still on strike. They are gathered outside the Yue Yuen factories, where they continue to swipe their time cards each day, but refuse to report to work. They are surrounded by over 1,000 riot police. The New York Times has reported that there have been sporadic clashes between the police and the strikers and additional workers have been hospitalized.
- One worker told the Times that she earned an average of 1,300 renminbi (US$210) each month, while she has paid 100 renminbi a month for social insurance, an amount the company did not match.
- Another worker, who gave the name Li, told the press that he was 38 years old, and his monthly salary is about 3,500 renminbi, but Yue Yuen's payments to his social insurance were based on an income of 1,810 renminbi.
- Please enable JavaScript to view the comments powered by Disqus.
-
- Former Dutch Labour prime minister works for big Chinese bank
- Former Dutch Labour prime minister works for big Chinese bankThursday 17 April 2014
- Former Dutch prime minister and union leader Wim Kok has joined the second biggest Chinese bank as a non-executive director.
- Kok, 75, has worked for the listed China Construction Bank since November, the Volkskrant reports on Thursday.
- The role involves at least six meetings a year, most of which involve a trip to China, Kok, who led the Labour party for years, told the paper. Kok was prime minister for eight years and has been on the supervisory board of ING, Shell and KLM since then.
- Kok is a member of two bank commissions: strategic development, and appointments and remuneration. He earns '¬42,000 for the function, the Volkskrant says.
- Please enable JavaScript to view the comments powered by Disqus.
-
- Chinese Twitter clone Weibo makes $285.6M in its U.S. IPO, shares up 19%
- Sina Weibo, a Twitter-like service under Chinese online media company Sina, went public on the Nasdaq Capital Market this week under the ticker symbol of ''WB.''
- The company filed for this long-rumored IPO in March 2014.
- The company will issue 16.8 million American depository shares at the bottom of its planned range of $17 each to raise $285.6 million of capital. The company had planned to sell 20 million shares at between $17 and $19 per share.
- At the time of this writing, shares are trading at $20.24, up by around 19 percent.
- Sina held a 77.6 percent stake in Weibo before the IPO. Another big shareholder of the microblog service is Chinese e-commerce giant Alibaba Group, which invested $586 million for an 18 percent stake in Weibo one year earlier.
- Alibaba, which is also preparing for a U.S. IPO, now holds a 19.3 percent stake in Weibo and it has filed to increase its shares to 32 percent in March, while Sina's stake is expected to reduce to 56.9 percent.
- According to the prospectus, $250 million of the funds raised in the IPO will be used to pay back the loans from Sina, while rest of the capital will be injected in technology and R&D.
- This story originally appeared on TechNode.
-
- Vaccine$
-
- FDA approves heroin/painkiller overdose antidote
- A syringe(Photo: Ingram Publishing via Getty Images)
- SHARE1296CONNECTEMAILMOREThe Food and Drug Administration approved a device on Thursday that reverses the effects of overdoses from opioids, including heroin and prescription painkillers.
- Called Evzio, the injection-style device administers the drug naloxone.
- Naloxone has long been used in ambulances and emergency rooms to treat opioid overdoses. Now Evzio allows caregivers, family members and non-medical personnel to keep naloxone on hand, according to the FDA. The device requires a prescription.
- Evzio is injected into the muscle or under the skin. When the device is turned on, verbal instructions tell the user how to deliver the medication.
- Naloxone is effective because it reverses the slowed-down breathing that leads to death during an overdose, writes Douglas Throckmorton, deputy director for regulatory programs with the FDA's Center for Drug Evaluation and Research, in a blog post.
- If someone is given naloxone who is not overdosing from an opioid, the dose available in the Evzio device will not hurt them, Throckmorton said in a press call.
- However, Evzio is not a substitute for immediate medical care, the FDA says.
- Calling products like Evzio "extremely important innovations that will help to save lives," FDA Commissioner Margaret Hamburg, in a statement, added that the broader aim remains to reduce opioid abuse.
- More than 16,000 people died in 2010 due to opioid-related overdoses, driven largely by prescription drug overdoses, according to the most recent year for which data was available, according to the Centers for Disease Control and Prevention.
- One concern around the availability of this device is some people might feel encouraged to experiment with higher doses of opioid.
- "There are risks and benefits to all medications," said Eric Strain, director of the Johns Hopkins Center for Substance Abuse Treatment and Research. But, he added, "in the big scheme of things, this is probably a valuable tool, especially if it's used and provided in the context of improving access to treatment."
- Robert Shesser, chair of the Department of Emergency Medicine at George Washington University, likened the device to a needle-exchange program.
- "You can't stop people from doing it, but you might as well give them a clean needle," he said.
- Shesser said that whether the overdose is from a prescription drug or an illegal drug like heroin, "having these auto-injectors out there is going to save lives, for sure."
- Follow @JolieLeeDC on Twitter
- SHARE1296CONNECTEMAILMORE
-
- The Scary Truth About the New York City Flu Vaccine Mandate
- Missy FlueggeActivist PostThis year, 150,000 children will be added to the list of victims of forced vaccination. The leaders of New York City have mandated that all children under the age of six years old who attend day care or preschool must be vaccinated with the flu vaccine.
- The official requirement mandates that all children between the ages of six months and five years who will be attending day care or preschool in New York City must be vaccinated between July 1 and December 31 of any given year. One health official claims that the rule won't officially be enforced until the end of 2014, and a press release from the New York City Board of Health states that they will begin issuing violations on January 1, 2016. [1] [2]
- New York City already mandates that children must be vaccinated against measles, mumps, rubella, pertussis, chicken pox, and tetanus. The new mandate is expected to affect 150,000 children under the age of six. Daycare and preschool facilities will be required to enforce the mandates or they will face fines. [3]
- Reason #1: It Interferes with Parental Choice
- Regardless of people's views about the safety and efficacy of vaccines, many people would agree that it should be an individual's right to choose '' or, in the case of a minor, a parent's right to choose '' which substances are injected into their body.
- Well-known groups comprising large numbers of employees in New York are already opposed to vaccine mandates, including the New York State Public Employees Federation and the New York State Chapter of the American Civil Liberties Union (ACLU). [4]In its own statement regarding vaccination, even the American Medical Association (AMA) grants approval for medical personnel to receive exemptions for vaccines due to a ''recognized medical, religious, or philosophic reason,'' exemptions which are more lenient than those granted to babies and preschool children affected by the NYC mandate.
- Also in question is whether or not the city government has the authority to mandate vaccines. City officials claim that their Health Department has ''authority over all matters concerning health in New York City'' through the City Charter.
- Recently, many Americans were outraged by the decision of officials from United Arab Emirates to mandate forced breastfeeding for the first two years of a child's life. We knew that forcing someone to breastfeed, regardless of the benefits of breastfeeding, infringed on their personal right to make choices about their own bodies. Yet, some people fail to recognize that vaccination, the injection of foreign substances into one's body, should also be a choice. [5]
- Reason #2: The Flu Vaccine is Ineffective
- The most recent statistics, based on scientific studies published by well-known media channels such as USA Today and The Huffington Post, demonstrate the flu vaccine's inability to prevent the flu. Contrary to what vaccine manufacturers want us to believe, the flu vaccine will not make us healthier.
- An article published on the website for USA Today stated, ''This season's flu vaccine was almost completely ineffective in people 65 and older.'' One source from Vanderbilt University's School of Medicine stated, ''Everyone at CDC's Advisory Committee on Immunization Practices meeting was scratching their heads over this.'' [6] A similar article published by The Huffington Post reported an overall effectiveness rate of only 59 percent. [7]
- Older adults are not the only group of people who experience few benefits from the flu vaccine. The CDC itself, when answering the question ''How effective is the flu vaccine in children?'' on its website, admits that ''reduced benefits of flu vaccine are often found in studies of young children,'' especially those under two years of age, the very age group targeted by this vaccine mandate. [8]
- Influenza and similar illnesses can be caused by over 200 to 300 viruses, and some research indicates that vaccines may be most effective against combating influenza A and B, which comprise a mere ten percent of circulating viruses. Often, people mistake flu-like symptoms for influenza, and they don't actually have the flu.
- Furthermore, if you win the ''flu lottery,'' by actually contracting one of the three strains of flu that happens to be in this season's flu vaccine, the vaccine will be worthless if your body hasn't fully responded to the vaccine (which takes two weeks) or if too much time (more than three months) has passed between vaccination and viral exposure. [9] [10]
- Reason #3: The Flu Vaccine is Dangerous
- According to the CDC, the flu vaccine contains thimerosal, aluminum, antibiotics, egg protein, aborted human fetal cells, and monosodium glutamate (MSG). Our immune systems may be unable to combat these foreign, toxic substances, especially while under the influence of very common conditions such as high sugar intake, low vitamin D3 levels, and damaged gut lining.
- According to a search of the Vaccine Adverse Event Reporting System (VAERS) website, in the past five years, (during the period from January 2009 until February 2014) there were 55, 578 adverse events reported to VAERS related to the flu vaccine. Of these adverse events, 7,904 affected children under the age of six. [11]
- Most disturbing among these numbers are the reported 47 children age five and under who died after receiving the flu vaccine during the past five years alone.
- Keep in mind, vaccine injuries and deaths are grossly under-reported. Less than ten percent of vaccine injuries are actually reported, which brings the likely death toll from the flu vaccine to over one hundred children per year. [12]
- Are There Exemptions for This Mandate?
- Yes, although options for parents who don't wish to vaccinate their children are limited. New York State allows medical and religious exemptions, although philosophical exemptions against vaccines are not granted. Fortunately, children who attend family day cares in people's homes are currently exempt from the flu vaccine mandate. [13]
- Families should not be forced to inject their child with toxic substances. They should not be forced to receive a vaccine that is ineffective and dangerous. They should not be forced to give up their preferred choice for quality, early childhood education and care programs in order to avoid forced vaccination. Families should be allowed to make the choices for their health and well-being that are best for their family.
- If your child attends day care or preschool in New York City, we urge you to contact your elected officials and tell them you are against forced vaccination for your child. In addition, you may exercise your right to choose a religious exemption from the flu vaccine mandate, or enroll your child in a family day care, where they will be exempt from mandatory vaccination against the flu.
- Finally, whether or not your child is affected by the latest NYC vaccine mandate, we urge you to learn about vaccine legislation where you live and research vaccine ingredients. You can download a free vaccine research guide right now to protect your child from unwanted, toxic substances contained in vaccines.
- RELATED:Ginseng can treat and prevent influenza and RSV: Study
- http://newyork.cbslocal.com/2013/12/11/nyc-board-of-health-to-vote-on-flu-shot-mandate-for-young-children/http://www.nyc.gov/html/doh/downloads/pdf/imm/day-care-flu-faq.pdfhttp://www.cbsnews.com/news/nyc-requires-flu-shots-for-all-daycare-preschool-children/http://www.nvic.org/NVIC-Vaccine-News/August-2012/labor-unions-oppose-mandatory-flu-shots-as-ama-che.aspxhttp://www.nytimes.com/roomfordebate/2014/03/23/making-vaccination-mandatory-for-all-children/parents-deserve-to-have-a-choice-about-vaccinationhttp://www.usatoday.com/story/news/health/2013/02/21/flu-vaccine-doesnt-work-over-65/1934651/http://www.huffingtonpost.com/2011/10/27/flu-shot-only-59-percent-effective_n_1032916.htmlhttp://www.cdc.gov/flu/about/qa/vaccineeffect.htmhttp://www.nvic.org/vaccines-and-diseases/Influenza/Why-Influenza-Vaccine-Mandates-Are-Ineffective'--U.aspxhttp://www.naturalnews.com/037323_flu_vaccines_junk'...http://wonder.cdc.gov/controller/datarequest/D8http://www.nvic.org/reportreaction.aspxhttp://www.cbsnews.com/news/nyc-requires-flu-shots-for-all-daycare-preschool-children/Missy Fluegge writes for VacTruth.org where this first appeared.BE THE CHANGE! PLEASE SHARE THIS USING THE TOOLS BELOW
-
- Chickenpox Parties
-
- Candanavia
- Ramon Rojo here. I just want to quickly mention that in my neck of the
- woods in Manitoba, Candanavia, growing up in the 70s - we had chicken pox
- parties. One kid got the pox so they crammed us into a room with them to
- play hoping we'd get infected - and it works.
- Glad I have my natural immunity - I've had mumps, measles, chicken pox -
- all naturally - and have not had all my vaccines. I feel that is stronger
- than any disease that's introduced straight into the bloodstream and
- bypasses the immune system.
-
- War on Weed
-
- edibles bullcrap story from AP
- DENVER (AP) -- A college student eats more than the recommended dose of a marijuana-laced cookie and jumps to his death from a hotel balcony. A husband with no history of violence is accused of shooting his wife in the head, possibly after eating pot-infused candy.The two recent deaths have stoked concerns about Colorado's recreational marijuana industry and the effects of the drug, especially since cookies, candy and other pot edibles can be exponentially more potent than a joint."We're seeing hallucinations, they become sick to their stomachs, they throw up, they become dizzy and very anxious," said Al Bronstein, medical director of the Rocky Mountain Poison and Drug Center.Studies are mixed about whether there is any link between marijuana and violence. Still, pot legalization opponents said the deaths are a sign of future dangers.Twenty-six people have reported poisonings from marijuana edibles this year, when the center started tracking such exposures. Six were children who swallowed innocent-looking edibles, most of which were in plain sight.Five of those kids were sent to emergency rooms, and two to hospitals for intensive care, Bronstein said. Children were nauseous and sleepy, and doctors worried about their respiratory systems shutting down.Supporters of the pot law and some experts counter that alcohol causes far more problems among users, and the issues with pot can be largely addressed through better regulations.The deaths occurred as Colorado lawmakers are scrambling to create safety regulations for the largely unmonitored marijuana snacks. On Thursday, the Legislature advanced a package of bills that would lower the amount of THC that could be permitted in a serving of food and require more extensive warning labels."It really is time for regulators, and the industry, to look at how do we move forward more responsibly with edible products," said Brian Vicente, who helped lead the state's legalization campaign.An autopsy report listed marijuana intoxication as a significant contributing factor in the death of 19-year-old Levy Thamba Pongi.Authorities said Pongi, who traveled from Wyoming to Denver with friends to try marijuana, ate six times more than the amount recommended by a seller. In the moments before his death, he spoke erratically and threw things around his hotel room.Toxicologists later found that the cookie Pongi ate contained as much THC - marijuana's intoxicating chemical - as six high-quality joints.Less is known about Richard Kirk, 47, who was charged in Denver with shooting his 44-year-old wife to death while she was on the phone with a 911 dispatcher. Police said his wife reported that her husband had consumed marijuana-laced candy, but no information has been released about potency.The public defender's office has declined comment on the allegations against Kirk."Sadly, we're going to start to understand over time all of the damage and all of the problems associated with marijuana," said Thornton police Sgt. Jim Gerhardt, speaking in his capacity as a board member of the Colorado Drug Investigators Association. "It's going to dispel the myth that there's no downside, that there's no side effect, to this drug. It's sad that people are going to have to be convinced with the blood of Coloradans."State lawmakers last year required edible pot to be sold in "serving sizes" of 10 milligrams of THC. Lawmakers also charged marijuana regulators with setting potency-testing guidelines to ensure consumers know how much pot they're eating. The guidelines are slated to be unveiled next month.For now, the industry is trying to educate consumers about the strength of pot-infused foods and warning them to wait up to an hour to feel any effects before eating more. Still, complaints from visitors and first-time users have been rampant."One of the problems is people become very impatient," Bronstein said. "They eat a brownie or a chocolate chip cookie and they get no effect, so then they stack the doses, and all the sudden, they get an extreme effect that they weren't expecting."Last year, the poison center run by Bronstein received 126 calls concerning adverse reactions to marijuana. So far this year - after pot sales became legal on Jan. 1 - the center has gotten 65 calls. Bronstein attributed the spike to the higher concentrations of THC in marijuana that has become available.Although millions of Americans have used pot without becoming violent, Bronstein said such behavior is possible depending on the type of hallucinations a user experiences. Toxicologists say genetic makeup, health issues and other factors also can make a difference."With these products, everybody is inexperienced," Bronstein said. "It's the first time people have been able to buy it in a store. People need to be respectful of these products."---Associated Press writers Kristen Wyatt and Nicholas Riccardi contributed to this report.
-
- US approves 'Palcohol' - powdered alcohol is on the way.
- "What's worse than going to a concert, sporting event, etc. and having to pay $10, $15, $20 for a mixed drink with tax and tip. Are you kidding me?! Take Palcohol into the venue and enjoy a mixed drink for a fraction of the cost," the product's promotional material read.
- "Remember, you have to add Palcohol AFTER a dish is cooked as the alcohol will burn off if you cook with it... and that defeats the whole purpose."
- Perhaps recognising that such a marketing strategy risked causing controversy, and even possible legal issues, Palcohol has removed the copy and issued a clarification: "We were caught off guard with the release of some of our labels by the TTB. As a result, people visited this website that we thought was under the radar because we had not made a formal announcement of Palcohol.
- "Clearly, this site isn't finished. Thus, the verbiage that was copied was still in draft mode and the labels that were up were incorrect. So please disregard what is being printed as a result of information taken from this site.
- "What we can say now is that we hope the product will be used in a responsible and legal manner. Being in compliance with all Federal and State laws is very important to us. Palcohol will only be sold through establishments that are licensed to sell liquor."
- Patent lawyer Daniel Christopherson, writing for the Bevlog beverage blog, has speculated that the company will not be given exclusive rights of the production of powdered alcohol: "My expectation is that the patentability of Palcohol is very narrow and a patent will not be effective at keeping competitors at bay."
- He points out that powdered alcohol is not a new concept, with similar products already sold in countries like Japan and Germany. Alcohol as a powder has even been sold in the US and has been the subject of several US patents.
-
- Science!
-
- Only 20 percent of Americans surveyed believe in Big Bang - CNET
- Scientists express dismay at an Associated Press/GfK survey that suggests skepticism of science is still strong. Only 20 percent of Americans believe in the Big Bang. Less than one-third of Americans said they thought climate change was real.
- They'll watch a TV show about it, of course.CBS screenshot by Chris Matyszczyk/CNET
- We Americans adore science when it gives us the iPhone or that little robot that cleans our floors all on its own.
- But please, please don't force us to believe big, fat scientific theories.
- We're not ready for that. We're still too young. We're still too enthralled by Hollywood movies, fast food, and instant cures for our spiritual ills.
- There's no reason, therefore, to be surprised or pained by an Associated Press/GfK survey that suggests a mere 20 percent of Americans believe in the Big Bang.
- We need a little more convincing to believe a random bang in outer space was the beginning of our Earth. We're still happy to think it was the waft of a wand by an old man in a gray beard.
- To change our minds, we want evidence. We want proof. Oh, alright, sometimes we just want a good slap.
- But this survey delved deeper into our convictions about science. Less than a third of the 1,012 alleged adults surveyed last month thought climate change was a real thing caused by real humans.
- A mere 27 percent would stand behind the peculiar notion that the Earth is 4.5 billion years old.
- Naturally the minute the AP contacted scientists to seek their opinion, they heard mostly the gurgling of angry craniums.
- Randy Schekman of the University of California, Berkeley, who managed to win a Nobel Prize in medicine last year, offered: "Science ignorance is pervasive in our society, and these attitudes are reinforced when some of our leaders are openly antagonistic to established facts."
- Oh, Randy. I've had girls tell me they love me and that it's an actual fact. It turned out to be a temporary actual fact.
- Anthony Leiserowitz of the Yale Project on Climate Change Commission was equally hurt. He said the poll indicated evidence of "the iron triangle of science, religion and politics."
- Naturally, I am tempted to ask him for the scientific proof behind such an assertion.
- Still, this isn't the first survey that suggests Americans aren't impressed by scientists' claims to righteousness.
- A few months ago, a Pew survey revealed that 33 percent of Americans positively reject evolution. Which might explain why so many Americans never change at all.
- There were a few tinges of hope tossed toward scientists by these AP/GfK respondents. Only 4 percent doubted that smoking causes cancer. A mere 8 percent questioned whether our cells contain a genetic code.
- It's easy to declare, as scientists do, that beliefs are all that stand between Americans and enlightenment.
- Perhaps, though, scientists themselves don't do quite enough to explain their theories in ways that people can embrace.
- It's sometimes hard for those who just know they're right to communicate their truths to those who think scientists are just politicians with bow ties.
-
- VIDEOS-CLIPS-DOCS
-
- VIDEO-PBS NewsHour : KQED : April 17, 2014 3:00pm-4:00pm PDT : Free Streaming : Internet Archive
- and yet, the people who are moving the bags, pushing the wheelchairs, serving the food, selling the magazines, aren't able to support their families. it's really a tragedy. >> reporter: just outside the airport, at sea-tac's larger hotels and parking lots some 1,600 workers did get their raises, on january first. but for the 5,000 or so workers on airport property, the court decision-- now being appealed-- was a body blow. >> hearing this, my heart just sunk. i feel that now i can never get ahead. >> reporter: jenay zimmerman, who manages taxis at the airport, still makes $11.90 an hour. baggage handler joshua vina of menzies aviation, which services several airlines here, including alaska, still earns $9.50 an hour. >> it was actually gonna help me pay a lot of things off. it was gonna help me have a lot more things to give to my wife and my son. i'm barely supporting them right now with this. >> reporter: a decade ago, alaska airlines' ramp workers
-
- VIDEO-BREAKING! FDA Ready To Propose First Regulations On E-Cigarettes - YouTube
-
- VIDEO- The Drastic Surgery Giving Hope To Tourettes Sufferers - YouTube
-
- VIDEO-The Century of the Self '' Part One | philosophyofmetrics
- Over the next four weeks I will post the documentary The Century of the Self. It is one of the most informative and eye opening series which I've ever seen. It's difficult to find nowadays so I'm attempting to upload the actual files as opposed to link or embed. Part Two will be uploaded next week. Enjoy. - JC
-
- VIDEO-Mika: Hillary's 'Cabal' Would 'Get Rid Of' Elizabeth Warren If She Expressed Presidential Ambitions | MRCTV
- MRC TV is an online platform for people to share and view videos, articles and opinions on topics that are important to them '-- from news to political issues and rip-roaring humor.
- MRC TV is brought to you by the Media Research Center, a 501(c) 3 nonprofit research and education organization. The MRC is located at: 1900 Campus Commons Drive, Reston, VA 20194. For information about the MRC, please visit www.MRC.org.
- Copyright (C) 2014, Media Research Center. All Rights Reserved.
-
- VIDEO-Elizabeth Warren condemns 'obscene' profits made on student loans - by government, not banks | MRCTV
- MRC TV is an online platform for people to share and view videos, articles and opinions on topics that are important to them '-- from news to political issues and rip-roaring humor.
- MRC TV is brought to you by the Media Research Center, a 501(c) 3 nonprofit research and education organization. The MRC is located at: 1900 Campus Commons Drive, Reston, VA 20194. For information about the MRC, please visit www.MRC.org.
- Copyright (C) 2014, Media Research Center. All Rights Reserved.
-
- VIDEO- the writing on the wall - YouTube
-
- VIDEO- Why I Care: Years of Living Dangerously - YouTube
-
- VIDEO- "I Never Thought I'd Say This! One Could Imagine The Possibility Of WAR Between The West And Russia" - YouTube
-
- VIDEO- Google And Apple Tech Workers Accuse Employers Of Collusion - YouTube
-
- VIDEO- "There's Been No Confirmation The Bomb Maker Has Been Killed!" Congressman Mike Rogers - YouTube
-
- VIDEO-Daily Press Briefing - April 21, 2014
- MS. PSAKI: Happy Monday. So I have a couple of items for all of you at the top, including a visual aid. Everyone get excited. You may have --
- MS. PSAKI: I know. Look at the excitement in here. It's so supportive.
- You may have seen the Secretary's tweet, where he announced the oceans conference. He will host the ''Our Ocean'' international oceans conference at the Department of State on June 16th and 17th. The Secretary's conference is the third in a series of high-profile oceans events this spring that together will advance the policy discussion. The time is right to elevate these issues. In his many years as a public servant, Secretary Kerry has a strong record of efforts to promote ocean conservation. He is personally committed to building global stewardship for our oceans in the face of unsustainable fishing practices, record pollution, and the devastating effects of climate change, so let me turn you to the video here behind me.
- MS. PSAKI: All right. I have one additional item at the top. Presidential '' on Syria, I should say '' presidential elections '' actually a referendum, not a real vote '' in Syria planned by the Assad regime undermine the Geneva framework and are a parody of democracy. They have no credibility. Further, the Syrian regime under the Assads has never held a credible, free, and fair election, and has taken legal and administrative steps to ensure that this vote will not be fair. Calling for a de facto referendum rings especially hollow now, as the regime continues to massacre the very electorate it purports to represent. The regime's violent suppression of the Syrian people's calls for freedom and dignity is what sparked this brutal conflict. Staging elections under current conditions, including the effective disenfranchisement of millions of Syrians, neither addresses the aspirations of the Syrian people nor moves the country any closer to a negotiated political solution.
- QUESTION: Sorry I missed the top of the ocean. Was that the first thing?
- MS. PSAKI: That was the first item, and the Secretary also tweeted an announcement of the oceans conference, which will be June 16th and 17th.
- QUESTION: Okay. On the Syrian election just for a second. In your view, there's no way that '' there's no way for an election to actually '' for a real election to actually take place because of the current conditions in Syria, or because of the fact that there are millions of people outside who would '' outside of Syria, or both?
- MS. PSAKI: Well, I think one of the major reasons, which you didn't mention but is worth noting, is that this '' the Syrian regime and the Assad family has a history of not holding free and fair elections. Also, clearly what's happening on the ground and the fact that this brutality has happened at the hands of the very brutal dictator who is planning to announce elections we don't think would be free and fair is really the greatest concern.
- QUESTION: Can you also just explain, how does it undermine the Geneva framework?
- MS. PSAKI: Well, as the London Eleven announced in its April 3rd statement, any unilateral decision by the regime to hold presidential elections would be entirely inconsistent with the Geneva communique's call for the establishment of a transitional governing body to oversee constitutional reforms leading to free and fair elections.
- QUESTION: So '' on the Geneva, so I can understand you correctly, it is the transitional aspect that is missing? You need something transitional '' a transitional government '' to oversee some sort of a fair and free election?
- MS. PSAKI: Well, there are several aspects, Said.
- MS. PSAKI: I think the first and foremost is the brutality of this very dictator who is planning to hold these elections, so '' and the history of what's happened over the last few years. But certainly, the Geneva communique calls for the creation of a transitional governing body.
- QUESTION: So that's the one I think that would legally '' or stand in the face of a free and fair elections, correct? A transitional body of some sort.
- MS. PSAKI: Well, there are also steps '' laws that have been passed by the regime that preclude anyone who hasn't lived in the country for 10 years from running for office that make it very difficult for other candidates to run in an election like this.
- QUESTION: Okay. Do you still believe that Assad's days are numbered?
- MS. PSAKI: And we certainly '' as you know, Daniel Rubinstein is back in the region.
- MS. PSAKI: We continue to work with the opposition, we continue to work with our international partners, and we'll continue to press for bringing an end to this regime.
- QUESTION: Okay. So no amount of transparency could actually be '' could be conceivable, correct, in this '' in conducting this kind of election?
- QUESTION: Aside from the fact that maybe one-third of the population is dislocated?
- MS. PSAKI: Well, the Assads have never held a credible, fair, or free election.
- QUESTION: And after this announcement, Jen, do you think that Geneva II is still alive? And is there any hope to hold another meeting?
- MS. PSAKI: Well, as you know, there are many tracks to our process and the Geneva meeting and the beginning of a Geneva process. The purpose was in part to have more than 40 countries and organizations stand together in support of the opposition. We're still working to determine what the next steps are.
- The Secretary met with Joint Special Representative Brahimi last week. Daniel Rubinstein is in the region and will continue to consult and determine what to do next.
- QUESTION: And one more on '' I don't know if you have seen the reports on the use of chemical weapons in Syria in the last few days.
- MS. PSAKI: I have seen those reports.
- QUESTION: And can you confirm these reports?
- MS. PSAKI: We have indications of the use of a toxic industrial chemical '' probably chlorine '' in Syria this month in the opposition-dominated village of Kfar Zeita. We are examining allegations that the government was responsible. We take all allegations of the use of chemicals in combat use very seriously. We're working to determine what has happened, and we will continue consulting and sharing information with key partners, including at the OPCW.
- QUESTION: And did you '' do you think that the Assad regime has crossed the redline again by using this --
- MS. PSAKI: Again, I'm not going to speculate here. Obviously, there needs to be an investigation of what's happened here. We're working with our partners to determine what the facts are on the ground.
- QUESTION: Chlorine is a chemical weapon?
- MS. PSAKI: I don't want to get into too many details because it's probably chlorine, but we're still looking into the specifics.
- QUESTION: Chlorine gas? Chlorine like you put in your pool? Chlorine, like '' no, I mean, I'm not trying to --
- MS. PSAKI: No, no, I understand what you're asking.
- QUESTION: There are different forms of chlorine.
- MS. PSAKI: I understand what you're asking, Matt. We're still looking into the specifics. I just don't want to get ahead of the process.
- QUESTION: Is this the same '' this incident is the same that the French were talking about '' is that your understanding '' earlier today?
- MS. PSAKI: I believe there have been reports that, as we've said, we've been looking into these reports. We continue to look into them. Obviously, we have a little bit more information.
- QUESTION: And is chlorine something that the Syrians would have had to have '' what would they --
- QUESTION: Yeah. Well, turn in, but just identify as part of their stockpile under the CW agreement?
- QUESTION: So it is not actually a '' chlorine is not technically, under the OPCW, a chemical weapon. Is that --
- MS. PSAKI: Well, there are, as you know, a range of different mechanisms for monitoring what is a '' and a range of things that could be violated. Obviously, we're in the preliminary stages here. We're still looking into what this chemical, in fact, is. But it wasn't one of the priority one or two chemicals, no.
- QUESTION: Jen, you said that you take all allegations seriously?
- QUESTION: Okay. The government is alleging that it is the opposition that used this chlorine. Do you take that allegation seriously?
- MS. PSAKI: I understand what is being alleged here.
- QUESTION: Mm-hmm. All right.
- MS. PSAKI: We're examining allegations. We're obviously looking at the facts on the ground. We shouldn't forget the context of what the regime has been capable of in the past, Said.
- QUESTION: Are you aware that paramilitary forces have used chlorine in the past, like in Iraq, for instance, where they would do '' ride along these IEDs, they would have a canister that stinks up the air and makes it yellow, and so on?
- MS. PSAKI: Historically --
- QUESTION: But actually, it doesn't kill anyone. The shrapnels kill people, but not the chlorine itself. Are you aware of that?
- MS. PSAKI: I'm not going to do a history lesson here, but certainly we're, again, looking at these allegations. And if there's new reports or new information to provide, we will be happy to provide that.
- QUESTION: Sorry. Just one more on it with regard to looking at the allegations beyond just reading them and '' who are the partners we're working with and what is the '' is there actually a process in place where we can run this to the ground? And how is that happening right now?
- MS. PSAKI: Well, obviously, there has consistently been '' we'll work with the OPCW, we'll work with international partners, we'll work with the UN. We're still determining what the best mechanism is to get to the bottom of the facts.
- QUESTION: I just want to go back a little bit on an issue that I '' a question that I asked Ambassador Ford last week regarding possible contacts with the regime.
- QUESTION: Because there are some voices that are being raised that we need to talk to them, especially on the passage of humanitarian aid. Are you prepared to conduct any kind of either direct or indirect talks with the regime itself to ensure that humanitarian aid gets through these multitude of roadblocks?
- MS. PSAKI: Said, as you know in the past, and Ambassador Ford and others have confirmed, we've had a means of being in contact. I don't have anything to update you on on that front.
- QUESTION: Yeah. But you're dependent on, let's say like NGOs or maybe humanitarian bodies and so on?
- MS. PSAKI: I'm not going to update you further on that.
- QUESTION: Yes, on this one. Do you consider the use of this gas as a breach for the UN resolution?
- MS. PSAKI: Again, we're going to let the process see itself through to determine the facts on the ground about what this toxic industrial chemical was to confirm those details, and then we'll work with our international partners to determine if any issue was violated here.
- QUESTION: What is that process?
- MS. PSAKI: Well, I think first we need to determine what the facts are, what was the chemical, to make sure we have those all lined up. Then we'll work with the OPCW, who is obviously overseeing the implementation, and determine if any violation occurred.
- QUESTION: But is it your understanding that the OPCW people who are on the ground, it's part of their mandate to go look at this?
- MS. PSAKI: I'm not '' again, this is very preliminary.
- MS. PSAKI: So we will be working with the OPCW. I'm not suggesting there is a violation. We're still determining what the facts are on the ground.
- QUESTION: Have you got any samples from the ground?
- MS. PSAKI: I don't have any additional details beyond what I've shared so far.
- QUESTION: Can we move to Ukraine?
- QUESTION: There seems to be '' well, not seems to be. There has been a lot of attention given in the last day or so to these photographs that the Ukrainians have apparently presented or apparently did present to the OSCE showing or purporting to show Russian '' people who are the same as in the Georgia incursion in 2008, similar to '' or at least one guy in particular '' similar to people who have appeared in eastern Ukraine over the course of the last couple weeks. I'm wondering '' the stories, the reports about this, about these photographs, this evidence that I've seen, say that the Administration endorses or accepts that these are factual. Is that correct?
- MS. PSAKI: Well, a range of the photos that the Ukrainians have provided '' and to be fair, a number of U.S. officials have Tweeted and provided publicly '' are from publicly available photos, either in international media or already on Twitter that show either individuals or signs of a connection with '' between Russia and some of the armed militants in eastern Ukraine. So that, as you know, has long been what we have believed and we've made the case publicly about, whether that's the Secretary or the President or others. So these are just further evidence of the connection between Russia and the armed militants.
- QUESTION: Well, how confident are you in their veracity or in the strength of the case that these photographs would appear or that you and the Ukrainians seem to say '' let me start again. I'm having a difficult day here today.
- How strong is the case, do you think, that these photographs make?
- MS. PSAKI: Well, we've stated the case pretty strongly publicly before these photos were out there, before we were talking about them, in terms of our belief that there's a strong connection between Russia and the armed militants that we've seen in eastern Ukraine and Crimea and other places. So this is more just further photographic evidence of that.
- QUESTION: Right. But I mean, how certain are you that these photographs show people, individuals who are '' who have links to Russia, who were involved in Georgia in 2008 and now are involved in Ukraine in 2014?
- MS. PSAKI: Well, what we're '' what we see in the photos that have been, again, in international media, on Twitter, and publicly available, is that there are individuals who visibly appear to be tied to Russia. We've said that publicly a countless number of times. I will let you all draw the conclusions yourself as to whether these are individuals who look similar or not to other events.
- QUESTION: Right. But you keep calling it evidence.
- QUESTION: Do you think that this is evidence that would stand up in a court of law?
- MS. PSAKI: I don't think it's a legal '' we're not making a court of law case here. We're just showing that this is photographic evidence that indicates the connection we've been talking about for weeks now.
- QUESTION: But it doesn't prove '' but you think that it is proof of the connection, or it's just a '' or you're just alleging that it's another sign of this?
- MS. PSAKI: It's another sign, Matt, of --
- MS. PSAKI: -- just if you look at these photos.
- QUESTION: I'm just '' as you know, and you've talked about '' and the Russians have talked about as well, this propaganda war that's going on between the two sides. And what we saw last week was Secretary Kerry in Geneva getting up and talking about this leaflet that was put out, which '' regarding Jewish registration in Donetsk. And it appears that this is just a hoax. This is not a real thing. And yet, it was identified as something of major significance by the Secretary and by others. And I'm just wondering, given that and the apparent '' the fact that that '' or the '' what appears to have been a hoax got turned into something very much more major than it potentially '' than it had the potential to be, if these photographs could fall '' if the Russians could point to these photographs as falling into the same category.
- MS. PSAKI: Well, Matt, there's a range of details out there we've talked about that leads us to believe there's a strong connection. We'll let people draw their own conclusions.
- QUESTION: Jen? But you're saying '' you're making a case, in this case. And --
- MS. PSAKI: Well, Said, I would point you to --
- QUESTION: Let me just ask you --
- MS. PSAKI: Let me finish. I would point you to what the Secretary, what the President, what Susan --
- MS. PSAKI: -- and Susan Rice have said, what we've all been saying for weeks about the strong connection. This is not a new argument.
- QUESTION: But you're not '' are you saying that the United States Government, with its great tradition of intelligence gathering and sources and so on, is now dependent on publicly traded photographs on the internet and Twitter and so on?
- MS. PSAKI: I think it's fair to '' for me to convey that we're looking at a fair share of classified and unclassified information. We're discussing both. But these are a range of photos '' and you've hit the point on the '' nail on the head there '' that have been publicly available, that are on Twitter, that are in international media, and we'll let you draw your own conclusions.
- QUESTION: No, you said something that they appear to be, they look like. Are you saying that you're actually looking at the '' what they look physically, and they look like people who are connected to Russia? Is that what you're suggesting?
- MS. PSAKI: Again, Said, I think I've answered this question. Do we have --
- QUESTION: Sorry, you're saying that these photographs back up classified intelligence that you've gotten from --
- MS. PSAKI: No, I'm not saying that at all. I'm saying they back up the public argument we've been making for weeks.
- QUESTION: Right. But your argument is not just based on the publicly available photographs like these ones, correct?
- MS. PSAKI: Obviously, I'm not going to talk about classified information.
- QUESTION: Well, I'm just asking, do you --
- MS. PSAKI: But it is fair that we are having a range of conversations with our international partners, and these photos are '' which are, again, publicly available --
- MS. PSAKI: -- are just further evidence or further examples, I should say.
- QUESTION: I guess I'm just not sure why you keep pointing out that they're publicly available. I mean, no one's saying they're not. But just because they're publicly available doesn't '' I don't see how that buttresses your argument one way or the other. What I'm asking is whether these publicly available photographs mesh with, back up anything, any indications that you're getting from non-public or intel --
- MS. PSAKI: Well, Matt, I'd point you to the public argument we've been making for weeks about the connection.
- QUESTION: Would you make that public argument if you didn't have other reasons to believe that it was true?
- MS. PSAKI: I'm not going to answer it further.
- QUESTION: Well, then I'm not sure. Then you're just --
- MS. PSAKI: I think we have consistently --
- QUESTION: You have no reason to believe --
- MS. PSAKI: Matt, we have consistently made the same argument about the connection between '' we see between Russia and between these armed militants. That's been consistent for weeks. These photos just show further examples of that connection.
- QUESTION: But you wouldn't be making that argument '' am I correct? You wouldn't be making that argument if you didn't have other reasons to suspect that this '' that (inaudible)?
- MS. PSAKI: We feel confident in our argument. I'm not going to back '' I'm not going to outline it further.
- QUESTION: (Off-mike) these photographs and publicly available evidence. This publicly available evidence does actually support what we have gathered in other '' by other means?
- MS. PSAKI: What we have stated for weeks.
- MS. PSAKI: Do we have any more on this topic?
- QUESTION: Yeah, I have one more question.
- QUESTION: Now, the Russians are claiming that the Ukrainians are already '' they '' whatever you call '' they already violating the terms of the agreement in Geneva. Do you have any comment on that?
- MS. PSAKI: We've seen those comments. Let me give you just actually a readout on a phone call with Foreign Minister Lavrov this morning. The Secretary urged Russia to take concrete steps to help implement the Geneva agreement, including publicly calling on separatists to vacate illegal buildings and checkpoints, accept amnesty and address their grievances politically. He also called on Russia to assign a senior diplomat to work with the OSCE mission in eastern Ukraine to make absolutely clear to the separatists that Russia supports the agreement and wants de-escalation. He also called on Russia to speak out against the seizing of journalists and other innocents as hostages and to join the U.S. in calling for the immediate release of Irma Krat. He noted that the Ukrainian government has pledged a full investigation of the violent events in Slovyansk. Given some suspicious aspects of the events, Russia should withhold judgment on who was responsible until that investigation is complete.
- The Secretary also made clear that Russia's recent public statement casting doubt on Ukraine's commitment to the Geneva agreement flies in the face of the facts. The Government of Ukraine put forward a broad amnesty bill for separatists to give up buildings and weapons, and has sent senior representatives to the east with the OSCE to help implement the agreement, and had called an Easter pause in its counterterrorism operations. He asked that Russia now demonstrate an equal level of commitment to the Geneva agreement in both its rhetoric and its actions. As noted in Geneva, without implementation, the joint statement is only a piece of paper, and what is needed is true de-escalation.
- QUESTION: But given the fact that Foreign Minister Lavrov '' I don't know if it was before or after this call, but '' I don't know if '' he spoke today --
- MS. PSAKI: He just spoke with him in the last hour.
- QUESTION: All right. Well, then, in the hour or so '' hours before the phone call, Foreign Minister Lavrov was basically trashing Ukraine and the West for these violations. Did the Secretary get any indication from him that they are willing to do or to take any of these steps that he discussed in the phone call? And also, is the United States assigning a senior diplomat to the OSCE monitoring mission, or is that Ambassador Pyatt?
- MS. PSAKI: Well, that was part of the discussion. Obviously, Ambassador Pyatt is closely involved. I will '' I'm happy to check and see who our person who will be closely on '' working closely on the ground with the OSCE. But part of what was in the statement was that all parties would --
- MS. PSAKI: -- have individuals from their countries play a role. I'm not going to, obviously, speak for what Foreign Minister Lavrov or the Russians are or aren't willing to do. But the point here is that the Ukrainians have taken steps; the Russians need to take additional steps. Obviously, we would have to make a decision in the matter of '' in a matter of days if there are going to be consequences for inaction.
- QUESTION: Okay. You said the Russians need to take additional steps.
- QUESTION: To your '' in your view, have the Russians taken any steps at all to help implement the Geneva agreement?
- MS. PSAKI: Well, we did see a couple of steps. I don't want to overstate them. As I mentioned over the weekend, we saw the OSCE ramping up their efforts. That, of course, is on the Ukrainian side. In accordance with '' on Sunday, we also saw a government building in the city of Yenyakiyevo released and is now back in the hands of Ukrainian authorities. But obviously, there are a range of steps that need to be abided by in the joint statement, and that's what we're looking for.
- QUESTION: In light of the situation thus far, since Thursday, since the Geneva statement was signed, I'm wondering if you '' do you still think it was worth the time and effort to negotiate this statement?
- MS. PSAKI: We do. We think that there should always be an opportunity for diplomacy. We '' as we said last week, we are looking at this over the coming days with our eyes open. And if they don't take steps that they have committed to, then there will be consequences.
- QUESTION: Is not the presumption of negotiating agreements like this the '' do you not have a presumption that the other side is actually going to commit '' to actually undertake what is agreed to in them?
- MS. PSAKI: Certainly, you do. And we'll see --
- QUESTION: And you still have --
- MS. PSAKI: -- over the next pivotal days what happens.
- QUESTION: And given that was has happened since the crisis in Ukraine began and with Geneva on '' the Geneva process on Syria, you still go into these negotiations with the Russians with the presumption that they are actually going to do what they say they'll do?
- MS. PSAKI: We do, Matt, because Russia has been a partner on other issues. I would point you to even the removal of chemical weapons and the progress that's been made in recent weeks there. So --
- QUESTION: So you would reject those critics '' and there are many, perhaps the usual suspects, critics, but '' who say that the Administration is just being hopelessly na¯ve in entering into agreements with the Russians and thinking that the Russians are actually going to follow through on them? You would --
- MS. PSAKI: Well, I would point those critics to the fact that nearly 80 percent, if not 80 percent of chemical weapons, have been removed from Syria, that Russia remains a partner in the P5+1 talks.
- MS. PSAKI: But clearly, there are areas where we disagree. And we --
- QUESTION: Right. But 80 percent of the chemical weapons are gone, but yet another chemical which is not covered by that appears to just have been used. So if they're just going to switch things up '' there seems to be a fundamental disagreement over what you even agreed upon, and you '' did the Secretary in his call with the foreign minister make clear to the foreign '' Foreign Minister Lavrov that illegally occupied buildings does not mean government buildings in Kyiv?
- MS. PSAKI: I don't have any further readout than what I just provided to all of you, Matt, but I think that should be pretty evident to the Russians.
- QUESTION: Forgive me, Jen. You said the Russians are partners. They're not adversaries in this case? Russia is not your adversary in the Ukraine?
- MS. PSAKI: Said, there are areas where agree '' where we agree; there are areas where we disagree. We have not held back in laying out economic consequences when necessary, but again, we feel there should be an opportunity for diplomacy. If they don't take steps in the coming days, there'll be consequences.
- QUESTION: I'm sorry, but you '' there are areas you agree and disagree in Syria, but the lines are --
- MS. PSAKI: Broadly speaking, Said, there are.
- QUESTION: Just bear with me for a second.
- QUESTION: The lines are really clearly drawn in the Ukraine. They are your adversaries, aren't they, in the Ukraine?
- MS. PSAKI: Again, Said, I think I've --
- QUESTION: I mean, listening to all this talk and bellicosity.
- MS. PSAKI: I think I've laid out what our view is on this. Do we have more?
- QUESTION: Let me come from another --
- QUESTION: Yeah, on the Ukraine.
- MS. PSAKI: On Ukraine, sure.
- QUESTION: Yeah, yeah, yeah, yeah. At what point did United States decide and move to additional sanction? Last week the Russian has to take another action within couple days or by the weekend. But '' so I'm talking about the timeline.
- MS. PSAKI: Sure. Well, we hope to see a de-escalation in the coming '' in this '' over the situation over the next few days. And if there's not progress, we remain prepared, along with our European and G7 partners, to impose additional costs. So there'll need to be decisions made in a matter of days.
- QUESTION: Jen, Senator Murphy yesterday called on the Administration to take those additional steps to put more sanctions on Russia. Do you have a reaction to that?
- MS. PSAKI: Not specifically. Obviously, there are a range of members who have their views, and we consult with them regularly. Obviously, we haven't held back from putting sanctions in place. We are prepared to put more sanctions in place, including on individuals and on sectors, and if the situation warrants it, we won't hesitate to do that.
- QUESTION: Now these additional sanctions would target petrochemical companies and banks, which would, of course, have a dire impact on the European economy. How do you expect Europe to go along with additional sanctions if it's going to hurt their economy?
- MS. PSAKI: Well, one, I would say, as you know, but just to remind any critics out there, that this executive order the President signed weeks ago gives us the flexibility and the ability to sanction sectors, including those that you mentioned. Beyond that, obviously, we've been working closely with our European partners on continuing to work in lockstep. I'm not going to get ahead of where we are, but they are fully briefed on what our options are and what we're thinking about, and we're obviously fully briefed on what they're thinking about as well.
- QUESTION: Would a decision on Keystone help our European allies come to a conclusion?
- MS. PSAKI: I'm not aware of a connection, but you may lay one out for me.
- QUESTION: Well, I'm just saying if this is going to hurt their economy, and we tell them to go along with more sanctions, which is going to hurt them, how do we justify that when we won't pass Keystone?
- MS. PSAKI: Entirely different situations. Not apples and not only oranges; apples and, I don't know, papaya or something very different.
- More on Ukraine? Go ahead Ali.
- QUESTION: Thank you. There are reports that NATO is going to be sending U.S. troops to Poland and Estonia. I'm just wondering if you have anything on that from here.
- MS. PSAKI: I have seen those reports from over the weekend. Obviously, we've been taking steps in cooperation with NATO to continue to boost our allies in the region. Let me see if I have anything new on this. I don't. But I will, of course, let DoD make any announcements about that. I know they've made comments over the weekend.
- QUESTION: Yeah. Jen, I know you already went through the readout of the Kerry-Lavrov call, but was '' can you just '' was there anything in there about the Vice President visiting Kyiv today? And the fairly large delegation that he has of people from both sides of the aisle here in the legislature --
- QUESTION: -- running around having meetings. And I wonder if there was any connection in the messaging on the call, because it looks like the Vice President's office says that part of the mission is to reverse the flow of gas in the region. So I'm wondering, I mean, was there '' how did this come together and did it get talked about at all?
- MS. PSAKI: Sure. Well, again, I don't have any further readout just because this call just happened. I'm happy to check if more, but --
- MS. PSAKI: -- the Vice President, as you noted, is on the ground for the next couple of days. He'll be meeting with a range of Ukrainian officials. At every point in this process, there have been several paths that we have been pursuing, including seeing if there is a path to work with Russia and encourage them to take additional steps to work with the OSCE to de-escalate, but also boosting the Ukrainians and the legitimate government. And that's what the Vice President is on the ground to do over the next couple of days. He'll be assessing the situation on the ground. He'll be '' we'll all be in close contact over the next couple of days.
- But a big part of what we're going is lifting up the Ukrainian government, providing them economic assistance, political assistance. We put out a kind of a range of details I think a week or so ago of what we're doing to boost them, and that's part of the Vice President's trip.
- QUESTION: And have the Russians expressed any misgivings about this?
- MS. PSAKI: About which piece?
- QUESTION: That we are trying to prop up, as you say, this government. I don't know if you used that word exactly, but that we've got our Vice President in Kyiv right now trying to legitimize a government that basically came to power after overthrowing the president there.
- MS. PSAKI: Well, that's hardly an actual, accurate account of what happened.
- QUESTION: Right, he fled.
- MS. PSAKI: The former president --
- MS. PSAKI: -- left Ukraine. As you know, the Rada put the new government in place. They're working towards constitutional reform and elections at the end of May. I don't think that the Russians would be surprised, given we have been working with the Government of Ukraine for weeks now, that we have the Vice President there, that we are continuing to coordinate and work closely with them. So I don't know that there's any conflict there.
- QUESTION: Do you have any clarification on that comment he referred to about the gas supplies from Russia to Europe through Ukraine? Because it seems that in Brussels the Europeans are not very happy about this particular comment.
- MS. PSAKI: Well, certainly I'd refer you to the Vice President's office. Broadly speaking, we are working closely with Ukraine on their energy needs. We're working with our European partners on that, whether that's putting energy reforms in place or ensuring that they have the resources they need.
- QUESTION: Can we move on?
- MS. PSAKI: Do we have any Ukraine? Ukraine?
- QUESTION: On a different topic.
- MS. PSAKI: Ukraine '' no more Ukraine? Okay. One '' can we '' okay if we give we give a few other?
- QUESTION: Sure. Absolutely.
- QUESTION: Yes, I have one on Asia.
- QUESTION: So just ahead of the President's trip to Asia, there's been a few provocative actions occurring in East Asia. I want to know if you any comment on a particularly odd one. A court in Shanghai has ordered the seizure of a Japanese ship that's owned by the Matsui Corporation over an 80-year-old unpaid debt. So for the Japanese, they believe that this issue, among others, was resolved in the 1972 agreement, so many Japanese businesses are concerned about the security of their assets in China. I wanted to know if you have a comment on that.
- MS. PSAKI: Well, we have seen that report. We believe that strong and constructive relations between countries in the region promotes peace and stability and is in the interests of both these countries as well as the interests of the United States. We continue to encourage dialogue and diplomacy to resolve any areas of disagreement. And obviously, the President, as you all know, will be arriving in Asia, I think, on Wednesday. So I'm sure there'll be a range of issues that will be discussed that I know the White House has previewed already.
- QUESTION: And I have another question on a related topic. The Japanese also announced a few days ago their intention to have about 1,000 troops on the island of Yonaguni. Do you have any comment on that?
- MS. PSAKI: I believe I do have something on this. Decisions regarding Japan's defense and security are for the Japanese Government and people to make. Japan has demonstrated over the last 60-plus years an abiding commitment to peace, democracy, and the rule of law. Its very significant contributions to global security speak for themselves. We welcome Japan's efforts to be transparent as it implements its evolving defense policies, and good relations between Japan and all of its neighbors benefit everyone in the region.
- All right, I can do a few more and then I'm doing a little Twitter town hall.
- MS. PSAKI: Go ahead, Said.
- QUESTION: If we could change topics to the Palestinian-Israeli --
- QUESTION: -- peace talks.
- QUESTION: Today there is a meeting that is ongoing that's supposed to either resolve the '' I mean, put life back into the process or basically announce it brain-dead.
- QUESTION: Could you comment on that?
- MS. PSAKI: Well, Said, we're focused on helping the parties find a way to extend the negotiations, because we believe they both want to find a way to do that. Unfortunately, developments over the last month make it '' made it necessary to find a new formula or mechanism to move it forward, but we would hope that the parties can reach agreement as soon as possible. As long as they want to find a way to continue the negotiations, we're willing to help them do that.
- QUESTION: So the focus now on extending the talks --
- QUESTION: -- not necessarily a framework agreement that may come out between now and the 29th, correct?
- MS. PSAKI: The parties '' the focus between the parties is on extending the talks, yes.
- QUESTION: So in other words, we are not likely to see a framework, or at least an announcement of a framework by, let's say, the 29th of this month.
- MS. PSAKI: Their focus at this point is on extending negotiations.
- QUESTION: Are you making headway?
- MS. PSAKI: I'm not going to give a further readout of it. Obviously, we're '' continue to work with the parties, and it is going to be up to them to determine whether there's path forward.
- QUESTION: And my last question.
- QUESTION: Are you telling Abbas not to keep issuing statements and proclamations that they are going to sort of just close shop with the PA and turn over the occupation responsibility to the Israelis?
- MS. PSAKI: Well, let me speak to that, because it's an important question. That '' we're aware, of course, of these reports and comments. That type of extreme step would obviously have grave implications. A great deal of effort has gone into building Palestinian institutions by Palestinians as well as the international community, and it would certainly not be in the interests of the Palestinian people for all of that to be lost. We '' the United States has put millions of dollars into this effort. It would obviously have very serious implications for our relationship, including our assistance going forward. And as I just noted, of course, the parties are continuing to work to find the basis for extending the negotiations. Ambassador Indyk is there to help facilitate that, and that's where our focus is.
- QUESTION: Sorry. Does the Secretary still remain willing and able to fly over to help get an extension?
- MS. PSAKI: He does, but there's no plans I have to announce today.
- QUESTION: Okay. Well, would you say that if there was going to be an extension that he would be involved in it '' directly involved in it? In other words, on the ground before the 29th, which is only 8 days.
- MS. PSAKI: I understand why you're asking the question. But again, it's between the parties, so I think it would only be if there's a determination that would be helpful.
- QUESTION: Right. But if they would ask for him to come, he has not gotten so fed up with this process and shuttling back and forth all the time, he would go?
- MS. PSAKI: No. He would, I think, be open to discussing what the most useful steps are. But again, it's between the parties, so we'd have to consider what the right steps are.
- QUESTION: But right now '' so you don't expect him to make a trip over there at the last minute just before this '' the target deadline expires?
- MS. PSAKI: There's '' I have no trip to announce at this point, but we'll keep monitoring day by day what would be most productive.
- QUESTION: If there were to be an extension, it is natural to expect that the Secretary of State would announce. I mean, that's been his project all along.
- MS. PSAKI: You're the communications planner in chief here, Said.
- QUESTION: Well, I'm not. I'm just a modest reporter. I'm not --
- MS. PSAKI: I don't want to make a prediction of that. Obviously, it would be because the parties agreed to extend. So I don't want to make a prediction of what would happen.
- QUESTION: I've got two very, very brief ones on different --
- QUESTION: I've got one more on this issue.
- QUESTION: Do you have any reaction to the reconciliation efforts between Hamas and Fatah?
- MS. PSAKI: I don't. But let me check with our team and see if there's anything we have to say on that.
- QUESTION: All right. One, did you get any answers to my questions about this letter that was sent to Representative Lowey and other members of Congress? Or we can do it when you have more time, if you want.
- MS. PSAKI: Yeah. We don't have the final answers yet, but we're continuing to work on those.
- QUESTION: Okay. Secondly, you will have seen that the Supreme Court this morning said that it would look into or we '' go over this case about the '' involving passports and whether people born in Jerusalem can have their passport to say ''Jerusalem, Israel''? I'm presuming that the Administration position on this, which is that it should not '' that's a final status issue and it has not changed since previous times this has come to court. Is that correct?
- MS. PSAKI: I'm not aware of it changing. No.
- QUESTION: All right. And then the last one which is not on this is: Did you get an answer to my question about the resumption of Japanese whaling?
- MS. PSAKI: And then we'll go to you, Lucas, next. And then we may have to wrap this up. But you can tweet me questions. #AskJen. Okay. The United States has not received any official reports, including Japan's '' indicating Japan's intent to resume whaling. We refer you, of course, to the Government of Japan on this issue. We continue to support the moratorium on commercial whaling, adopted by the International Whaling Commission, as a necessary measure for the conservation of large whales.
- QUESTION: Jen, who made the decision in the State Department to extend the public comment period on Keystone? And did it require the Secretary's signature?
- MS. PSAKI: Again, this was a decision made by a range of officials, and you're familiar with the reasoning, but let me just repeat that for all of you. As you know, there has been a court case in Nebraska in the Nebraska Supreme Court. There have also been an unprecedented number of public comments. So on Friday, we notified the eight federal agencies specified in the Executive Order that we will provide more time for the submission of their views on the proposed Keystone Pipeline project. Agencies need additional time based on the uncertainty created by the ongoing litigation I referenced in the Nebraska Supreme Court, which could ultimately affect the pipeline route in the state.
- In addition, during this time we'll review and appropriately consider, of course, the 2.5 million comments. The Secretary was certainly aware of the decision, but there '' I don't think '' it was more of a decision about what was needed, what the agencies needed, what was needed for the process.
- QUESTION: And was that '' did that decision require the sign-off of the Secretary?
- MS. PSAKI: Certainly, he was supportive of the decision.
- QUESTION: The court case that you mentioned in Nebraska '' this is '' that litigation's been pending for some time. Did it just occur to the Secretary to extend the deadline last week?
- MS. PSAKI: Well, again obviously, yes, it's been out there for a little bit of time, but there was a determination made that it could impact, of course, the route of the pipeline. Obviously, we have no impact on that. That's a judicial process in Nebraska. But because of that, we felt it was the appropriate step to extend the timeline.
- QUESTION: And why was early-May ever chosen?
- QUESTION: Why was early-May, as a decision, ever chosen?
- MS. PSAKI: Well, there it was '' there was a mandated timeline through the executive order that gave up to 90 days for public comment '' I'm sorry '' for agencies to comment '' the same agencies that we notified on Friday. There was also a public comment period, as you know, so that was the May timeline.
- QUESTION: On a different topic? Yemen.
- QUESTION: There have been reports of drone strikes the last couple days in Yemen, as part of this wide-scale operation.
- QUESTION: I'm wondering if you can share with us '' obviously U.S. involvement, we're curious about that, but separate from that just anything on what sort of coordination is going on between the U.S. Government and the Yemeni Government on --
- MS. PSAKI: Well, sure. I mean, broadly speaking we have a strong, collaborative relationship with the Yemeni Government. We work together on various initiatives to counter the shared threats '' threat we face from AQAP. You saw, I'm sure, this weekend that the Yemeni Government confirmed that air strikes were carried out this weekend against al-Qaida militants in remote training camps and in a convoy. According to the Yemenis, these individuals were planning to target civilian and military facilities '' in military facilities. As a matter of policy, of course, we don't comment on the details of counterterrorism cooperation with our foreign partners, so I don't have more to share with you. But of course, as I noted, we have a strong working relationship and I would point you to the details the Yemeni Government confirmed over the weekend.
- QUESTION: Jen, did any of those killed appear in the al-Qaida video?
- MS. PSAKI: I don't have any more details for you.
- QUESTION: Was it a coincidence that the video was released and the strike happened --
- MS. PSAKI: Lucas, I would put a call in to the Yemeni Government and see if they have more details to share with you.
- We have to wrap this up, unfortunately.
- QUESTION: You are aware that the Yemeni Government was not able to provide a single name or a single statistics on these people that were killed and allegedly were (inaudible).
- MS. PSAKI: They confirmed the details.
- (The briefing was concluded at 1:41 p.m.)
-
- VIDEO-Remarks With EU High Representative Catherine Ashton After Their Meeting
- SECRETARY KERRY: Well, good afternoon, everybody. Or good evening, actually, I guess. I'm very, very grateful to be joined here today by the High Representative Cathy Ashton, my friend and colleague, and a terrific partner in this and in other efforts. And I thank her for her leadership throughout this particular initiative.Diplomacy requires willing partners, and I also want to thank Minister Deshchytsia and also Minister Lavrov for their willing work in the course of today, their readiness to engage in a constructive dialogue. We worked hard, and we worked in good faith, in order to try to narrow what are real differences, some of them significant, and to find a way forward for the people of Ukraine that helps them in achieving their aspiration to live in a stable, peaceful, and unified democracy.
- As recent events in eastern Ukraine make clear, they need our support now, and they need it more than ever. Ukraine has shown admirable '' sometimes, I think, even remarkable '' restraint in the face of considerable challenge. But no one should expect the leaders of a sovereign state to always stand by passively while public order is threatened. And the public order of Ukraine has been threatened in recent days.
- Our most urgent task is to de-escalate the situation in Ukraine. So let me just outline where we are and some initial concrete steps that we have agreed to take in the course of the discussions today in order to de-escalate the tensions and restore security for all Ukrainians.
- The parties agreed today that all sides must refrain from the use of violence, intimidation, or provocative actions. And we strongly condemned and rejected all expressions of extremism, racism, and religious intolerance, including anti-Semitism.
- Let me say a quick word about that. Just in the last couple of days, notices were sent to Jews in one city indicating that they had to identify themselves as Jews. And obviously, the accompanying threat implied is '' or threatened '' or suffer the consequences, one way or the other.
- In the year 2014, after all of the miles traveled and all of the journey of history, this is not just intolerable; it's grotesque. It is beyond unacceptable. And any of the people who engage in these kinds of activities, from whatever party or whatever ideology or whatever place they crawl out of, there is no place for that. And unanimously, every party today joined in this condemnation of that kind of behavior.
- In addition, recently, the Ukrainian '' the Russian Orthodox Church members in Ukraine were threatened that the Ukrainian Orthodox Church was somehow going to attack them in the course of the next days. That kind of behavior, that kind of threat, has no place. And all parties agreed that that kind of behavior is not just grotesque and unacceptable, but it will not stand the test of the direction that Ukraine wants to move in.
- We agreed today that all illegal armed groups must be disarmed, that all illegally seized buildings must be returned to their legitimate owners, and all illegally occupied streets, squares, and other public places in Ukrainian cities and towns must be vacated.
- The Government of Ukraine itself affirmed, and again today, that it will grant amnesty to protestors and to those who have left buildings and other public places and surrender weapons, with the exception of those people who are found guilty of capital offenses.
- We also agreed '' and I think this is a key part of what was focused on today '' we wanted to find concrete steps, not just words, but concrete steps that could be acted on immediately in order to defuse the situation. And so we agreed that the OSCE Special Monitoring Mission, which is already on the ground, whose mission has already been defined and granted, that they undertake a special role in assisting Ukrainian authorities in local communities in the immediate implementation of the de-escalation measures, that they will do so wherever they are needed the most in the coming days. That means beginning immediately. The United States, the EU, and Russia committed to support this mission, including by providing monitors directly.
- Now I want to emphasize that Ukraine's leaders indicated that they are prepared to go to extraordinary lengths to address regional demands for more autonomy, for local self-government, for the protection of minority rights. And I talked this afternoon with Prime Minister Yatsenyuk, and he indicated and reaffirmed his and the government's strong commitment to a genuine, comprehensive, and inclusive process by which they will engage in the constitutional reform process of Ukraine.
- Foreign Minister Deshchytsia briefed us on the extensive and inclusive constitutional reform process already underway, which is geared to address all of the legitimate grievances, but importantly, he and Prime Minister Yatsenyuk committed themselves to going as far as they can to reach out to opponents, to people with different ideas, from people from different constituencies, from different geography, and bring them together over the course of these next days in order to have a comprehensive, inclusive process.
- Today, the Ukrainian foreign minister, Minister Deshchytsia, affirmed all of us repeatedly that they will have an inclusive, transparent, and accountable constitutional reform process, and it will include the immediate establishment of a broad national dialogue with outreach to all of Ukraine's regions and political constituencies, and it will allow for the consideration of public comments and proposed amendments that will be considered. The parties also agreed on the importance of the economic-financial stability of Ukraine, and the importance of all of us being engaged in that effort going forward.
- Now, all of this, we believe, represents '' excuse me '' all of this, we are convinced, represents a good day's work. But on the other hand, this day's work has produced principles, and it has produced commitments, and it has produced words on paper. And we are the first to understand and to agree that words on paper will only mean what the actions that are taken as a result of those words produce. So it is absolutely clear now that what is important is that these words are translated immediately into actions, and none of us leave here with the sense that the job is done because the words are on the paper.
- The job will not be done until these principles are implemented, until they are followed up on. And what is vital is that the OSCE needs to get to work immediately to de-escalate the security situation in Luhansk, in Donetsk, in Sloviansk, and all the other towns that have been destabilized. And people need to provide them the immediate access in order to be able to do that job, and we intend to be watching extremely carefully to make certain that our monitors and our embassies and our eyes on the ground are able to verify what is taking place.
- We fully expect the Russians, as they said they would here today, to demonstrate their seriousness by insisting that pro-Russian separatists, who they've been supporting, lay down their arms, leave the buildings, and pursue their political objectives through the constitutional processes that the agreement guarantees. No more incidents of this kind should occur, and if they do, it will be clear that it will elicit a response.
- I made clear to Foreign Minister Lavrov today that if we're not able to see progress on the immediate efforts to be able to implement the principles of this agreement this weekend, then we will have no choice but to impose further costs on Russia.
- The Ukrainian Government has exhibited extraordinary patience and fortitude in the face of enormous challenges and pressure. They have asked their people to restrain themselves. They have purposefully assumed a nonviolent posture in the face of challenges that might have invited others to engage in violence. And the Ukrainian people now deserve a right to choose their own future. The international community remains firmly by their side as they travel the difficult, democratic path to prosperity and to peace.
- HIGH REPRESENTATIVE ASHTON: Thank you, Secretary Kerry. Thank you, John, very much. I just want to add a few comments. You've set out very clearly the discussions on the agreement that's been reached today. As you've said, these have been very frank, but I think constructive discussions that are looking to find the concrete steps, real, practical things that can de-escalate the tensions in Ukraine.
- I think it was extremely important to bring us all together here to have that process of dialogue begin. It has to be the first priority that we focus on, to see a de-escalation of the situation, and collectively, as you've indicated, we agreed a number of concrete steps that we can see implemented immediately. The word ''immediately'' is extremely important in this context. We want to see these happen so that we can see things achieved.
- The OSCE's Special Monitoring Mission, as you've indicated, will play a leading role in this. It will assist the Ukrainian authorities and local communities to take the necessary measures that they need to take. And we absolutely welcome the Ukrainian commitment to conduct an inclusive and transparent constitutional process. We know that free and fair presidential elections on the 25th of May are the best way to express the will of the people of Ukraine, as is this process of constitutional reform, and we want to see all candidates behaving well and being treated with great respect in that process.
- We remain committed to the unity, sovereignty, and territorial integrity of Ukraine. In the meantime, the European Union will continue to support efforts to stabilize the situation in Ukraine economically, financially and politically.
- Today, President Barroso of the European Commission wrote to President Putin on behalf of the European Union, accepting President Putin's proposal for consultations with Russia and Ukraine, trilateral consultations on the security of gas supply and transit.
- I end by saying that I believe that by discussing constructively the solutions and actions, that this is the best way to find a way out of the current crisis. Thank you.
- MS. PSAKI: The first question will be from Karen DeYoung of The Washington Post.
- QUESTION: Thank you. Mr. Secretary, did you discuss or did you receive any Russian commitment for the withdrawal of Russian troops along the border of Ukraine? And did the United States and Europe make any commitments regarding the removal of existing sanctions against Russian individuals? Just to follow up on something you said, you mentioned that Russia had committed to call on those it is supporting inside eastern Ukraine to lay down their weapons. What happens if they don't respond to that? And finally, did Russia make any commitment on Ukraine's debt and the gas payments it says are overdue?
- SECRETARY KERRY: The answers are no, no commitments with respect to the debt, no commitments with respect to the gas payments overdue, but a commitment to engage in a dialogue that Lady Ashton just described, which will begin to tackle the whole question of energy. And with respect to the withdrawal of troops, they '' excuse me '' they've made it clear that over a period of time, assuming this can de-escalate and it does de-escalate, as the rights of the people they are concerned about are represented, as the constitutional process unfolds and the future government of Ukraine takes place, they are absolutely prepared to begin to respond with respect to troops and larger numbers.
- They indicated and reiterated that they have withdrawn one battalion in response to the efforts we've made to insist on some movement, and I raised the question of whether more couldn't now also become part of the equation. And our hope is that as these steps are taken, that that can happen. That would be part of a managed de-escalation.
- We said at the beginning, and the document says, ''initial concrete steps.'' We do not envision this as the full measure of de-escalation. So if this starts and starts effectively, and we can begin to see some progress, we intend to continue to have our meetings, and we discussed with Foreign Minister Lavrov at the end of the meeting the notion that we would continue to talk and to follow up on this. So this is just the beginning. It depends, obviously, as I said, on the good faith of parties and pursuing and following through. And we're going to watch that very, very closely.
- You had one other part to your question?
- QUESTION: There were two, actually. One, did you discuss at all lifting any existing sanctions? And finally, if the separatists in eastern Ukraine decline to lay down their arms, who is responsible for making sure that they do?
- SECRETARY KERRY: Well, on the question of additional sanctions, the other sanctions, no. There was no discussion at this point in time of removal of any of the existing sanctions. I think everybody understands that would be premature at a moment where we're putting to test the bona fides of the proffers made today in the course and context of this agreement. So if this agreement pans out and they do indeed produce some change on the ground, then obviously, as we go down the road, I'm sure that is going to become a topic of conversation, but it's premature right now.
- In addition to that, I would just say '' thank you very much, thank you, thanks '' on the subject of the laying down of weapons, the responsibility will lie with those who have organized their presence, equipped them with the weapons, put the uniforms on them, supported them, and been engaged in the process of guiding them over the course of this operation. And we'll have to '' before we start making judgments about exactly where that accountability will fall, we've made it very, very clear that Russia has huge impact on all of those forces. And we've made clear what the evidence is. It's out in the public domain. I think almost everybody in the world has drawn their conclusions about what is happening, and so that's why these next days will be very important to making judgments.
- And I repeat what the White House policy is and what we have said: That if there is not progress over the course of these next days and we don't see a movement in the right direction, then there will be additional sanctions, additional costs as a consequence.
- MODERATOR: The next question is for Julian Borger in the front row. If you could raise your hand, Julian.
- SECRETARY KERRY: Can I just say one other thing? Our goal is not to come here and be threatening or to be talking about the downsides. We're just trying to express a reality about what has to happen. Our hope is that we've opened the door so that both of the entities that have an ability in Ukraine to make a difference, or all the entities, will respond. Russia clearly has an enormous ability to be able to impact that outcome, and the Government of Ukraine has an ability to affect it.
- So to the degree that both of them can take steps here that will help to provide space for each of them to take further steps, that's what we're encouraging, and that's what we hope will happen.
- QUESTION: Did the talks today and the agreement make any progress to finding a compromise between Kyiv and Moscow on just how much autonomy the eastern Ukraine should have ultimately?
- SECRETARY KERRY: Well, let me say '' and Cathy can obviously respond here too and I think would want to '' we were both very impressed by Prime Minister Yatsenyuk's definition of what he is prepared to do, and he and the government '' the interim government in Kyiv are prepared to do. It's quite extensive. And they have laid down their own vision of autonomy which includes election of local officials; election of the governors; election and management of their budget to a large measure, to the largest measure; management of education; other functions of governance, really reserving to the federal government the principal initiatives of defense, justice, and foreign policy.
- It's frankly far more extensive an offer of autonomy than anything that exists in any oblast in Russia. And so I think we were impressed by it and they are committed to it and their constitutional process will now open up significantly in an effort to bring all of the political players in Ukraine together.
- HIGH REPRESENTATIVE ASHTON: Just to echo and endorse that, but the whole process of constitutional reform, the capacity of people to have the kind of public meetings, opportunities to receive ideas from different parts of the country, for people to have a genuine debate about what kind of country they want to live in and how far they want centralization and decentralization '' in some ways, this is actually a very exciting moment to be able to try and do that in a proper way. And we want to see that process happen in ways that will enable people to feel that they are engaging in serious discussion about the future of their nation and looking at how local and national governments work together. And that's a really, really important part of going forward, and I think we want to support that in every possible way.
- MS. PSAKI: Margaret Brennan from CBS.
- QUESTION: Thank you very much. Mr. Secretary, what is the specific timeframe and specific consequences if these steps are not followed through on? Do we understand you correctly in saying that any and all sanctions are put on pause here? And with the type of autonomy you just described Ukraine being willing to offer, aren't you concerned that Russia has seemingly carved out a mechanism for influence in Ukraine without even having to launch an overt military invasion of east Ukraine? Vladimir Putin said today he hopes he doesn't have to demonstrate his right to take military intervention there.
- SECRETARY KERRY: Well, first of all, we obviously would contest the notion of a right to do so, and we do. And we obviously differ over the exercise of that so-called right with respect to Crimea, which we believe was taken illegally, against the constitution of Ukraine as well as against the standards of international law. So we begin with a difference there.
- But that said, let me make it clear that what has been promised by the government '' the interim Government of Ukraine '' what Prime Minister Yatsenyuk has promised was promised way before any of these exercises by Russia took place. Almost immediately, Prime Minister Yatsenyuk promised increased autonomy. And the reason he promised the increased autonomy is that he was sensitive to and aware of the fractures within the social fabric of Ukraine and the differences of representation and the complaints that have existed for some period of time, long preceding the events of the Maidan and the change of the government.
- So I just '' I don't think that '' I think the premise of the question is incorrect that this has happened because of Russia's pressure. This has happened because this is something that the moment Crimea took place, they made clear they cared about, they thought was important, and they thought represented a better way to manage the differences of background, culture, history, language, and other things that have been reflected in the politics of Ukraine for some period of time.
- So I think they've taken these steps because they believe it's the best way to strengthen Ukraine. It's the best way to have a Ukraine that can be united but still respect some of the passions and differences that exist in the constituencies of Ukraine. And I think it's an act of '' it's a visionary act, I think it's a courageous act, and I think it does offer the best prospect going forward for a strong and united, sovereign Ukraine in which all people feel proud to be Ukrainian, but at the same time feel like their day-to-day lives are reflected in the way that they want them to be.
- QUESTION: And what about the timeframe for the steps?
- SECRETARY KERRY: The timeframe for the steps taken right now? As I said earlier, we expect in the next few days, over the course of this weekend and the earliest part of next week, some of these steps need to begin to be seen and be evident. They don't have to all be accomplished by then, and it would be hard to see how they would be, but if there's a clear indication that this is moving in the right direction, then the President will '' our President will make his decision and the leaders in Europe will make their decisions, obviously in consultation with each other.
- MODERATOR: Final question. Gentleman in the third row.
- QUESTION: Thank you. Steve Sedgwick, CNBC. I'm amazed, up until the last answer, Secretary of State and Baroness Ashton, that we haven't heard the word ''Crimea'' at all today. Could I confirm now that the West and Ukraine have given up on Crimea and that the whole sanctions process and escalation of sanctions or de-escalation of sanctions has now got nothing to do with Crimea anymore; it's all about the south and the east of remaining Ukrainian territory?
- SECRETARY KERRY: No, you cannot confirm that. And I'm amazed that you asked that question after the answer I just gave. Maybe it was a question you really felt you had to ask, and despite my prior answer you asked it anyway. But I said very clearly that we differed on Crimea, and I said it was illegal, and I said we disagree with the basis, on the constitution of Ukraine as well as on international law. I just said it. In addition to that, the fact is that we just sanctioned them two days ago, I believe, on the issue of Crimea.
- So the fact is that we have made it crystal clear that there is a significant difference over Crimea. We are not, quote, ''given up,'' but today we didn't come here to talk about Crimea. Today we came here to get something done to reduce the violence, reduce the potential for a complete and total implosion, and to try to move away from what is a spiraling downwards confrontation that takes nobody to a great place. And our hope is that we've opened up the opportunity to be able to do that.
- But no, nobody has left behind the issue of Crimea, which remains as differentiated today as it was on the day that we first raised the issue and put the sanctions in place.
- HIGH REPRESENTATIVE ASHTON: When I said territorial integrity of Ukraine, I meant the territorial integrity of the whole country. I didn't think I needed to spell out where the European Union stands on that. We've been absolutely crystal clear, and the measures we've taken equally remain for that reason.
- SECRETARY KERRY: Thank you all very much. Appreciate it. Thanks.
-
- VIDEO-Remarks by Vice President Joe Biden to the Ukrainian Parliament
- Vice President Joe Biden: No nation has the right to simply grab land from another nation. No nation has that right. And we will never recognize Russia's illegal occupation of Crimea and neither will the world.
- But now it's time for Russia to stop talking and start acting. Act on the commitments that they made: to get pro-Russian separatists to vacate buildings and checkpoints, accept amnesty and address their grievances politically. To get out on the record, calling for the release of all illegally occupied buildings -- that's not a hard thing to do. And to send senior Russian officials to work with the OSCE in the east.
- The United States for this election is providing substantial assistance to make sure that they are clean and closely monitored, so that nobody on the 26th of May can question their legitimacy.
- Ukrainian Prime Minister Arseny Yasteniuk: Thank you for your strong support, Mr. Vice President.
-
- VIDEO- CNN: NATO Scrambles Fighter Jets To Investigate Russian Bombers! - YouTube
-
- VIDEO- "WE ARE ON THE BRINK OF WORLD WAR III!" Farmers In Eastern Ukraine - YouTube
-
- VIDEO- Georgia Governor Signs "GUNS EVERYWHERE LAW"! - YouTube
-
- VIDEO-FPI Policy Director Robert Zarate Discusses the Situation in Ukraine on BBC News | Foreign Policy Initiative
- The Foreign Policy Initiative seeks to promote an active U.S. foreign policy committed to robust support for democratic allies, human rights, a strong American military equipped to meet the challenges of the 21st century, and strengthening America's global economic competitiveness.Read More
-
- VIDEO-FPI Board Member William Kristol Discusses Ukraine on CNN | Foreign Policy Initiative
- The Foreign Policy Initiative seeks to promote an active U.S. foreign policy committed to robust support for democratic allies, human rights, a strong American military equipped to meet the challenges of the 21st century, and strengthening America's global economic competitiveness.Read More
-
- VIDEO-Insane Bankster World War | philosophyofmetrics
- Hugh sent this video interview from SGT Report where a potential war is discussed. I've always contended that it would be a debt restructuring and consolidation, or collapse, which would most likely lead to war. The video should encourage some healthy debate about the motivations for what is happening in the world today. '' JC
-
- VIDEO-Bryan Singer Accuser -- Alleged Sex Abuse Victim Accuses 3 More Hollywood Honchos | TMZ.com
- Alleged Sex Abuse VictimAccuses 3 More Hollywood Honchos4/21/2014 1:31 PM PDT BY TMZ STAFFThe man who has sued "X-Men" director Bryan Singer -- claiming he was sexually assaulted when he was 15 -- has just filed lawsuits against 3 other Hollywood big wigs, also claiming sexual assault.
- The 3 men named in the new lawsuit are Garth Ancier, David Neuman and Gary Goddard.
- Ancier has a slew of hits under his belt, including The Ricki Lake Show, which he created. He headed up the Fox entertainment group and produced 21 Jump Street, Married ... with Children, TheSimpsons and In Living Color. He also developed Home Improvement at Disney. And at NBC he put The West Wing on the air.
- Neuman is the former president of Disney TV. Goddard produced off-Broadway shows.
- According to the new lawsuits, Ancier sexually abused Egan numerous times by sodomizing him, forcing oral sex and fondling him -- when he was 15 at an Encino estate. The suit goes on to allege Ancier sexually abused Egan in Hawaii 2 years later.
- The suit against Goddard and Neuman are similar -- alleging they were part of a Hollywood sex ring, giving Egan alcohol and drugs and sexually assaulted him at the Encino estate and in Hawaii.
- Michael Egan -- now 31 -- and his lawyer, Jeff Herman are holding a news conference detailing the new allegations.
- Egan's mother, Bonnie, sobbed uncontrollably as she tried explaining why she let her son go to adult parties and on trips to Hawaii. She said the alleged abusers seemed like nice people.
- The state of Hawaii has allowed alleged victims of sexual assault to sue, even if the statute of limitations has long since expired -- but the deadline for filing is Thursday.
-
- VIDEO-Cody Wilson: Happiness is a 3-D Printed Gun - Reason.com
- "Legal encapsulation is not effectively possible," declares Cody Wilson of Defense Distributed, makers of the world's first gun made via 3D printing technology. "So it's fun to kind of challenge the state to greater and greater levels of its own hyper-statism."
- Last year, Wilson and crew unveiled The Liberator, a plastic pistol they created on a 3D printer that fired a shot heard around the world. Then they put the 3D-printing files (or CADs) up on the Internet for free. To folks interested in cutting-edge technology and decentralized experiments in living, Wilson's gun symbolized an age of uncontrollable freedom. To lawmakers, it symbolized a threat that moved faster than, well, a speeding bullet. The State Department, in fact, shut down Defense Distributed's ability to disseminate the gun files on the Internet, claiming the nonprofit was violating federal rules about exporting munitions.
- A self-declared crypto-anarchist, the 26-year-old Wilson is fighting the situation in court'--and relishing every minute of his battle with the government.
- While he's aggressively challenging restrictions on 3D-printed guns, Wilson is also working on an innovative Bitcoin project called Dark Wallet, which would further anonymize financial transactions on the Web, and a book intended to inspire a new generation of digital libertarians.
- Reason TV's Todd Krainin sat down with Wilson at the SXSW festival in Austin, Texas.
- Produced by Todd Krainin. Cameras by Paul Detrick and Alexis Garcia.
- Among the topics covered (with approximate time):
- How the State Department is shutting down Wilson's 3-D printable gun business (3:58)What it's like to be surveilled by the Department of Homeland Security (8:50)What is the Liberator 3-D printed gun? (11:00)How printable guns will change the dynamic of political power. (14:30)Will this challenge to the state lead to more personal freedom? (16:15)How does the Internet break down the politics of gun control? (17:35)What is Dark Wallet? And what's wrong with Bitcoin? (19:30)What's Wilson's new book about? (25:25)Read Brian Doherty's profile of Wilson and Defense Distributed from the December 2013 issue of Reason.
- Scroll down for downloadable versions and subscribe to ReasonTV's YouTube Channel to receive notifications when new material goes live.
-
- VIDEO-: FPI Board Member William Kristol Discussed the White House's Strategy Towards Russia | Foreign Policy Initiative
- The Foreign Policy Initiative seeks to promote an active U.S. foreign policy committed to robust support for democratic allies, human rights, a strong American military equipped to meet the challenges of the 21st century, and strengthening America's global economic competitiveness.Read More
-
- VIDEO- Uncovered of Planned Parenthood Founder Calling For Ban On Childbirth, ''No More Babies'''... | Weasel Zippers
- ''God bless'' Planned Parenthood '' Barack Obama
- In what can only be called a gracious historical act, a newsreel archive company called British Path(C) has uploaded 85,000 historic films on YouTube'--in high resolution, no less.
- The collection spans from 1896 to 1976 and there's obviously a lot of great stuff to comb through that ranges from politics to art to culture to sports.
- One video that has caught The Daily Caller's eye is the one below, in which American birth control activist Margaret Sanger (here called Margaret Slee, which was her second husband's name) sternly demands that the women of the world have ''no more babies.'' [...]
- As the text below the YouTube clip explains, Sanger was specifically arguing that people in developing countries shouldn't have babies until 1957.
-
- VIDEO-Nigeria: Why abducting 100 girls from school isn't shocking - CNN.com
- A week later, 77 girls are still missingThis poor corner of Nigeria is no stranger to such brazen, violent actsBoko Haram-related violence killed 1,500 in the first three months of 2014The latest incident has ratcheted up pressure on the militaryAbuja, Nigeria (CNN) -- The heavily armed militants stormed the girl's dormitory in the middle of the night, herding more than 100 students on to vehicles and burning down nearby buildings as they made their escape.
- That was a week ago Monday.
- Of the 129 students abducted from the Government Girls Secondary School from the Nigerian town of Chibok, 77 are still missing.
- Boko Haram: Nigeria's crisis
- Boko Haram: Nigeria's crisis
- Boko Haram: Nigeria's crisis
- Boko Haram: Nigeria's crisis
- Boko Haram: Nigeria's crisis
- Boko Haram: Nigeria's crisis
- Boko Haram: Nigeria's crisis
- Boko Haram: Nigeria's crisis
- Boko Haram: Nigeria's crisis
- Boko Haram: Nigeria's crisis
- Boko Haram: Nigeria's crisis
- Boko Haram: Nigeria's crisis
- Boko Haram: Nigeria's crisis
- Boko Haram: Nigeria's crisis
- Boko Haram: Nigeria's crisis
- Boko Haram: Nigeria's crisis
- Boko Haram: Nigeria's crisis
- Boko Haram: Nigeria's crisis
- Boko Haram: Nigeria's crisis
- Boko Haram: Nigeria's crisis
- Boko Haram: Nigeria's crisis
- No one knows where they are. And surprising still, no one's particularly shocked.
- "All the community are sympathizing with the parents," principal Asabe Kwambura told CNN. But, she said, "the people in the villages are not surprised."
- Such is life in the lawless Borno province.
- Tucked away near the border with Cameroon, with phone services cut off and travel strongly discouraged, this poor corner of Nigeria is no stranger to such brazen, violent acts.
- For 11 months, the provinces of Borno, Yobe and Adamawa have been under a state of emergency due to relentless assaults blamed on the Boko Haram.
- The Islamist militant group has bombed churches and mosques; kidnapped women and children; and assassinated politicians and religious leaders.
- Boko Haram -- whose name means "Western education is sin" in the local Hausa language -- says it wants to impose a stricter enforcement of Sharia law across Africa's most populous nation.
- The group has gone about its misguided mission with such depressing regularity that residents have become somewhat numb.
- Nigerians marvel that U.S. President Barack Obama traveled to Massachusetts after the Boston Marathon bombings that killed three people last year.
- Boko Haram-related violence killed 1,500 in the first three months of this year alone. And yet, Nigerian President Goodluck Jonathan has not visited the region recently.
- Leaders of deadliest terrorist groups
- Leaders of deadliest terrorist groups
- Leaders of deadliest terrorist groups
- Leaders of deadliest terrorist groups
- Leaders of deadliest terrorist groups
- Leaders of deadliest terrorist groups
- Part of it may have to do with geographic divisions.
- Jonathan is from the predominantly Christian south. That's not just geographically distant but also culturally different from the Muslim-dominated, violence-wracked north.
- To put things in perspective, none of Jonathan's major political rivals from the north attended his inauguration in 2011. And widespread violence broke out in the north when his presidential win was announced, with some residents claiming the election was rigged.
- It's the opposite of what happened with Jonathan's predecessor.
- The previous president, Umaru Yar'Adua, was from the north. During his tenure, violence ravaged the country's oil-rich, southern Niger Delta, with militant groups saying they wanted a fairer distribution of the region's oil wealth.
- The Nigerian military has been engaged in a brutal, ever-escalating fight with Boko Haram. Rights group accuse both sides of ruthlessness -- Boko Haram of indiscriminate attacks, and the military of extrajudicial killings.
- But when it comes to the abductions of girls -- and there have been many -- the military has had a difficult time.
- Last week, the defense ministry erroneously reported that all but eight of the girls from the latest kidnapping were free. It retracted a day later.
- Lawan Zanna, the father of one of the students, said the government turned from using "blatant propaganda" to making a "blatant lie."
- Part of the reason the military is loathe to respond mightily maybe because the girls who are kidnapped are raped, forced into servitude -- but rarely killed.
- In February, 29 college students in the northern Yobe province were killed after an attack authorities blamed on Boko Haram. All of them were males. The women were spared.
- In other instances, kidnapped girls were later rescued while working on farms. Many were pregnant or had babies -- the result of rape.
- The spate of kidnappings began in May 2013 when Boko Haram leader Abubakar Shekau announced in a video that this was part of its latest bloody campaign. The kidnappings, he said, were retaliation for Nigerian security forces nabbing the wives and children of group members.
- Those kidnapped, he said, would begin a new life as a "servant."
- But the latest incident has ratcheted up the pressure on the military.
- The military said "ongoing frantic efforts" of security forces, vigilante groups and hunters are attempting to find and free the students.
- But a week later, the fate of 77 girls remain unknown.
- READ: Boko Haram: A bloody insurgency, a growing challenge
- READ: A year of attacks linked to Nigeria's Boko Haram
- CNN's Vladimir Duthiers reported from Abuja, and CNN's Holly Yan reported and wrote from Atlanta. CNN's Jonathan Mann, Faith Karimi, Nana Karikari-Apau and Chelsea J. Carter contributed to this report.
-
- VIDEO-Nevada Assemblywoman Shreds MSNBC Host Over Bundy Ranch Conflict (VIDEO) - The Ulsterman Report
- What happened, and may continue happening at the Bundy Ranch in Nevada is resonating across the country, much to the panicked chagrin of the Mainstream Media. Here's a great clip of Assemblywoman Michele Fiore not backing down to the openly snide and derisive questioning of MSNBC's Chris Hayes. (I still say Chris Hayes is actually a more feminine version of Rachel Maddow.
- Rachel Maddow vs common sense'...
- Hayes tries to get Fiore to say Bundy is a criminal, or to have her state the federal government has no authority. Fiore swats away the attempt, and hammers back at the key points the make up the foundation of the Bundy Ranch dispute:
- - Why is the federal government sending hundreds of armed men guns to collect a debt from a rancher?
- - Does Bundy actually owe the million dollars liberals are claiming he does?
- - What is the deal with Harry Reid's personal ties to the dispute '' and why aren't government officials investigating that?
- A great interview '' so check it out!
- _________________________________
- BENNINGTON P.I. ''Take Two And Call Me In The Morgue''
- ''Once again Frank Bennington lives and breathes opening my eyes to current events to be researched. Every book D.W. Ulsterman pens is a joy to read with characters who become old friends. As a medical professional, this bookrings true with the conspiracies of our government and pharmaceutical giants. After all, if the sick are healed there is no money to be made. Well done D.W., well done.''
- BENNINGTON P.I. ''Take Two And Call Me In The Morgue''
- ''Take two and call me in the morgue takes Frank Bennington and drops him into the middle of a very big medical industry and government conspiracy, and its a story that I think is very possible in real life. What I also really like about the story is how strong the female characters are. Strong, smart, tough, it's nice to see a writer who develops multi dimensional characters.
- And then there is Frank Bennington himself. He just keeps getting more and more interesting. His work with the hot tempered priest was great, and then the relationship with the very mysterious Gabriel left me wanting to read more about those two. I hope they work together in the future!''
- BENNINGTON P.I. ''Take Two And Call Me In The Morgue''
-
- VIDEO-Wikileaks Cables Confirm Existence of Extraterrestrial Life | Collective-Evolution
- We're already halfway through 2013 and the world continues to wake up to the fact that we are not alone in the universe. This year alone we've seen a tremendous step forward regarding UFO disclosure. In early May, researchers, activists, political leaders and high ranking military/agency personnel from around the world testified to the reality of the UFO/extraterrestrial phenomenon in front of several former United States members of congress. To watch an interview with the former 2008 presidential candidate and ex-congressman Mike Gravel (who participated in the hearings) click here. You can watch interviews with all of the senators that participated in the event here.
- For more CE articles on the subject of UFOs and extraterrestrials, click HERE.
- Prior to the recent hearing on UFOs and extraterrestrial life, we've had explosive statements made by NASA astronauts and professors, you can watch some of those statements here and here. Not only has the world heard from all of these credible people, its also been privy to official documentation released by dozens of governments worldwide that outline the reality of the UFO phenomenon. Documents indicate that UFOs are of concern to governments, and they put a significant amount of time, effort and resources into studying them. Apart from governments, agencies like the National Security Agency also released official files regarding UFOs, you can view some of these previously classified documents here.
- It's now a fact that UFOs are tracked on radar, performing maneuvers that defy our idea of physics. Jets are constantly scrambled to take a closer look at them. This is no longer a conspiracy theory, it's a fact. Release of files began early in 2007 with the UK, among others. Since then they've released thousands of pages every year, with the latest ones published in June 2013 made available at the UK's National Archives. You can view them here.
- Behind the scenes, high-ranking Air Force officers are soberly concerned about UFOs. But through official secrecy and ridicule, many citizens are led to believe the unknown flying objects are nonsense.
- '--Former CIA Director, Roscoe Hillenkoetter, 1960.
- The UFO/extraterrestrial phenomenon is extremely top secret, access to this type of documentation and the deeper truth behind it is almost impossible. CIA directors, presidents and other high ranking officials barely have any access to these programs. That being said, all of the information that's already out in the public domain is overwhelming. It makes you wonder how far down the rabbit hole this topic goes.
- As most of the world today already knows, Wikileaks is an international, online, non-profit organization that publishes secret information, news leaks, and classified material from anonymous sources. They've been a tremendous threat to the controlling elite for a number of years, and have gained the attention of major mainstream media outlets worldwide. For the most part, these mainstream media outlets have bashed Assange, pointing to the idea that the release of classified documents is a threat to national security. That's not true, it's more like a threat to the truth that the elite try to cover up on a daily basis that would threaten their ability to control the human race.
- Since a large amount of official documentation has already been released, documents from the Wikileaks cables shouldn't come as a big surprise. Assange has already mentioned that there are yet to be published cables that make reference to UFOs. This is no joke, below are quotations taken from official transcripts via the official Wikileak cables. You can view it here: http://wikileaks.org/cable/2010/01/10DUSHANBE82.html
- On January 13 Ambassador called on Dushanbe Mayor and Chairman of the upper house of Parliament Mahmadsaid Ubaidulloev at his parliamentary office. The Mayor began the meeting with a lengthy discourse on Afghanistan, thanking the United States for its contributions and sacrifices there, and saying that U.S. activities there were very important ''as we enter the third millennium and the 21st century.'' Ubaidulloev thought the main task there was to build a sense of national identity among ethnically disparate groups, and said the United States was an example for this. He noted that ''war is very dangerous'', and said ''we know there is life on other planets, but we must make peace here first.
- In a platitude-ridden meeting, Dushanbe Mayor Mahmadsaid Ubaidulloev said upcoming elections would be free and fair, that contributions to the Roghun Dam were voluntary, and that the losses suffered by the United States in Afghanistan were felt by Tajiks as their own. Ubaidulloev asked for help in getting Tajik students admitted to Harvard University, but effectively declined to help find a new location for an American Corner in Dushanbe. He asserted the existence of life on other planets, caveating this by noting that we should focus on solving our problems on Earth. End Summary.
- Not only do these cables raise an eyebrow, but a statement given by Julian Assange himself raises the need for further inquiry. The audio on the video is delayed. What points to this interview being real? For one, if you can read lips it's not hard to follow. Secondly, it sounds exactly like Julian. Thirdly, multiple mainstream media outlets (Telegraph, CBS news and more) published the original version of the video which was taken down immediately. One of the mainstream media outlets was Forbes, you can view that poorly written article here in which you will see access to the video has been cut off. Articles written by major media outlets are usually very poor, and do their best to ridicule the subject of UFOs. The original version had perfect audio, the same sound and was in the same setting.
- I have said in passing there is information about UFOs in Cablegate. And that is true, but these are only small passing references. Most of the material concerns UFO cults, and their behaviour in recruiting people. For instance, there is quite a large cable, which we'll try and release in the next few days, concerning the Raelians, a UFO cult which has a strong presence in Canada and was of concern to the U.S. ambassador in Canada '' Julian Assange
- It's not surprising that that the U.S. ambassador in Canada was concerned with this group. High level agencies are also concerned with abductees and ET contactees. Their mail is stamped in a special way, they are constantly surveyed by army intelligence, phone tapping and are also confronted by 'men in black' (intelligence officers). Agencies that are active in the UFO phenomenon keep close tabs on UFO/extraterrestrial activity outside of their sphere of influence. That being said, again, it's no surprise that the U.S. ambassador had an interest in this 'UFO cult.' Anything extraterrestrial would be a concern to the elite, as they are the ones active in the cover up.
- We are living in an extremely unique time, our world has become much more transparent than ever before. One aspect of multiple realizations is the UFO/extraterrestrial phenomenon, but it seems to branch into every aspect of our reality depending on how far down the rabbit hole you want to go. Our perception of life on other planets largely comes from external sources like television programming. As a result, many are filled with fear when giving thought to this subject. Hopefully as we move through the shift in consciousness the planet is currently experiencing, fear will dissipate as it will no longer serve the human race. This is undoubtedly one of the largest realizations in human history. The only thing that goes beyond it, in my opinion, is the realization of humanities infinite potential to create a new experience from a place of peace, love, co-operation and understanding.
- There is nothing to be afraid of.
- http://wikileaks.org/cable/2010/01/10DUSHANBE82.html
- http://www.forbes.com/sites/andygreenberg/2011/02/07/wikileaks-ufo-cables-more-about-raelian-cult-than-alien-life/
- http://ufos.nationalarchives.gov.uk
-
- VIDEO: Pro-Russians 'shot dead in Ukraine'
- Russia's foreign ministry says it is outraged by an apparent deadly shootout in Eastern Ukraine.
- The country's state media is reporting that up to 5 people were killed after gunmen attacked a checkpoint manned by pro-Russian activists near Sloviansk. They are blaming Ukrainian nationalists.
- Ukraine officials said three died in a clash between "two groups of citizens".
- Daniel Sandford has visited the scene.
-
- VIDEO-Judge Blocks Massachusetts Ban on Painkiller - ABC News
- SHARETwitterFacebookEmailSmallMediumLargeExtra Largex
- Home TrendingU.S.Video PoliticsInternationalInvestigativeHealthMoneyTechnologyLifestyleEntertainmentSportsTravelSlideshows StoriesVideoStoriesVideoStoriesVideoStoriesVideoStoriesVideoVideo by Section and ShowAll VideoVideo by Section and ShowAll Video(C) 2014 ABC News Internet Ventures. All rights reserved.Regular Site|Privacy PolicyInterest-Based Ads|Terms of Use|Feedback
-
- VIDEO-The disturbing messages in police recruiting videos
- According to the New Mexico Watchdog Web site, this is a new recruiting video being used by the police department in Hobbs, New Mexico.
- Note the aspects of policing the video emphasizes: Shooting stuff. K-9 enforcement. Nabbing the bad guys. The SWAT team. This is the first step in the process.
- (There's also the separate but related question of why Hobbs '-- a town of 35,000 people '-- needs a SWAT team in the first place. As the Watchdog reports, the SWAT team has its own page on the Hobbs department Web site, complete with a video of SWAT cops shooting and destroying things, set to heavy metal music. The statement in the video that ''The rules of engagement of SWAT are simple: Defeat the enemy . . . any way you can'' is also troubling. The mission of a SWAT team ought to be to resolve volatile situations without force and violence whenever possible.)
- Note, too, what's missing from the recruiting video: Public service. Cops walking beats. Community policing. Helping people.
- Now ask yourself: What sort of person would be attracted to a career in law enforcement based on the images and activities depicted in that video? And is that the sort of person you'd want wearing a badge and carrying a gun in your neighborhood?
- The video isn't disturbing only because of the type of police officer it's likely to attract. It also suggests that the leadership in the Hobbs police department believes that these are the aspects of police work most worth touting '-- that this is the face they want to project to the community.
- Hobbs isn't alone in this. It's a trend in policing that I've covered for a few years and part of a general move toward more aggressive, militarized police forces. There are many other examples. Here's one from Gainesville, Fla.:
- Here's one from Denison, Tex.:
- The Vermont State Police:
- You get the idea. But they aren'tallbad. Here's one that stresses all the public service components of policing.
- Unfortunately, that particular department is in Canada. (They're so polite!) So let's end on a good note from the United States. Here's one from Decatur, Ala.:
- Also on The WatchHow do we fix the police 'testilying' problem?
-
- VIDEO-Nebraska School's 'Ludicrous' Advice for Bullying Victims Sparks Parent Outrage '-- Read the 9 Rules Here | TheBlaze.com
- Fifth grade students at Zeman Elementary School in Lincoln, Neb., were recently sent home with a ''flyer'' outlining how they should handle bullies. The instructions were apparently deemed so ridiculous by parents that the school district quickly issued an apology and the ''inaccurate information'' was pulled.
- That was after the nine ''rules'' for dealing with bullies went viral, of course.
- Here are some of the more questionable ones:
- ' Rule #3 Do not be afraid.' Rule #4: Do not verbally defend yourself.' Rule #7: Do not tell on bullies.' Rule #8: Don't be a sore loser' Rule #9: Learn to laugh at yourself and not get ''hooked'' by put-downs.
- You can read the full list, along with their descriptions in the photo below:
- Screengrab via Jezebel/Facebook
- After seeing parents' reaction to the flyer, Lincoln Public Schools issued an apology on its Facebook page.
- As noted in the embedded Facebook post above, the school linked to another worksheet on bullying, which includes tips like ''contact a school staff member'' and ''do not minimize or make excuses for bullying behaviors.''
- Many Facebook users were still not completely satisfied after the apology.
- ''That list of 9 rules for dealing with bullies was hands down the worst advice any person could give to another,'' one user wrote. ''That it was an 'educator' giving it to elementary age children is just beyond the pale. 'Don't tell on bullies'... would we keep our friends if we tattled on them?' '' Seriously?!''
- ''Sorry. This is not a learning opportunity. This is a show of complete incompetence. 1970 called, they want their flier back,'' another commented.
- Others wanted an explanation as to why the ''ludicrous'' flyer even made it home in the first place.
-
- VIDEO-8 mumps cases at NJ college - New York News
- Basil farm ready to switch to marijuanaBasil farm ready to switch to marijuanaUpdated:Friday, April 18 2014 4:11 PM EDT2014-04-18 20:11:50 GMT
- Basil plants grow on a New Jersey farm, but the facility could be turned into a five-acre medical marijuana greenhouse with only 48 hours' notice. The hoses from the state-of-the-art Dutch hydroponic system are watering flowers now, but with a few minor adjustments could just as easily grow marijuana plants for medicinal cannabis. The only reason it's not happening now is because the company is publicly traded and subject to federal law.
- Basil plants grow on a New Jersey farm, but the facility could be turned into a five-acre medical marijuana greenhouse with only 48 hours' notice. The hoses from the state-of-the-art Dutch hydroponic system are watering flowers now, but with a few minor adjustments could just as easily grow marijuana plants for medicinal cannabis. The only reason it's not happening now is because the company is publicly traded and subject to federal law.
- NJ woman sues over "8theist" plateNJ woman sues over "8theist" plateUpdated:Friday, April 18 2014 12:08 PM EDT2014-04-18 16:08:10 GMT
- A New Jersey woman has filed a lawsuit against the state's Motor Vehicle Commission, claiming the agency rejected her application for a license plate proclaiming she's an Atheist. Shannon Morgan filed the suit in federal court, saying the rejection of a plate reading "8THEIST" is a violation of her First Amendment rights. The Maurice River Township woman claims plates reading "BAPTIST" have been approved.
- A New Jersey woman has filed a lawsuit against the state's Motor Vehicle Commission, claiming the agency rejected her application for a license plate proclaiming she's an Atheist. Shannon Morgan filed the suit in federal court, saying the rejection of a plate reading "8THEIST" is a violation of her First Amendment rights. The Maurice River Township woman claims plates reading "BAPTIST" have been approved.8 mumps cases at NJ college8 mumps cases at NJ collegeUpdated:Friday, April 18 2014 10:40 AM EDT2014-04-18 14:40:12 GMT
- Officials are investigating eight confirmed cases of mumps found in students at New Jersey's Stevens Institute of Technology.The college in Hoboken says the students range in age from 18 to 21. All were fully vaccinated with two documented doses of mumps-containing vaccine.
- The New Jersey Department of Health is investigating eight confirmed cases of mumps found in students at Stevens Institute of Technology. The college in Hoboken says the students range in age from 18 to 21. All were fully vaccinated with two documented doses of mumps-containing vaccine. Symptoms include swollen salivary glands, fever, headache, tiredness and loss of appetite.Ex-NBA player: Re-entry tougher than serving timeEx-NBA player: Re-entry tougher than serving timeUpdated:Thursday, April 17 2014 6:50 PM EDT2014-04-17 22:50:46 GMT
- Former NBA player Jayson Williams says trying to re-enter society after serving time for shooting a limousine driver was more difficult than being in prison.
- Former NBA player Jayson Williams says trying to re-enter society after serving time for shooting a limousine driver was more difficult than being in prison.
- Governor Christie wants to do away with campaign donation limits and realty transfer feesGovernor Christie wants to do away with campaign donation limits and realty transfer feesUpdated:Thursday, April 17 2014 4:08 PM EDT2014-04-17 20:08:25 GMT
- During his town hall meeting in Somerset County on Tuesday Gov. Chris Christie said he believes there should be no limits on the amount of money people can donate to political campaigns, as long as they disclose their contributions within a 48-period, according to nj.com.
- During his town hall meeting in Somerset County on Tuesday Gov. Chris Christie said he believes there should be no limits on the amount of money people can donate to political campaigns, as long as they disclose their contributions within a 48-period, according to nj.com.
- Man with samurai sword arrested at New Jersey deliMan with samurai sword arrested at New Jersey deliUpdated:Thursday, April 17 2014 9:27 AM EDT2014-04-17 13:27:28 GMT
- Employees at a southern New Jersey deli say they feared for their lives when a man walked in and brandished a samurai sword. It happened at American Deli in Lower Township.
- Employees at a southern New Jersey deli say they feared for their lives when a man walked in and brandished a samurai sword. It happened at American Deli in Lower Township.
- NJ mom charged with trying to kill her 3 teensNJ mom charged with trying to kill her 3 childrenUpdated:Wednesday, April 16 2014 8:25 PM EDT2014-04-17 00:25:35 GMT
- A southern New Jersey woman is in custody on charges she tried to kill her three children by driving her car into the Delaware River.
- A southern New Jersey woman is in custody on charges she tried to kill her three children by driving her car into the Delaware River.
- German Shepherd called to jury dutyGerman Shepherd called to jury dutyUpdated:Wednesday, April 16 2014 6:16 PM EDT2014-04-16 22:16:16 GMT
- At least one prospective juror in New Jersey could take a bite out of crime. Cumberland County has summoned IV Griner to jury duty. The only problem is IV is a 5-year-old German Shepherd.
- At least one prospective juror in New Jersey could take a bite out of crime. Cumberland County has summoned IV Griner to jury duty. The only problem is IV is a 5-year-old German Shepherd.
- Woman allegedly exposes genitals during heroin arrestWoman allegedly exposes genitals during heroin arrestUpdated:Wednesday, April 16 2014 3:47 PM EDT2014-04-16 19:47:46 GMT
- A Barnegat woman tried to spit on police officers and repeatedly exposed her genitals during a heroin arrest. Police say that Angela Woerner, 28, was in the parking lot of the CVS on West Bay Avenue. An officer saw her and knew that she had outstanding warrants out for her arrest.
- A Barnegat woman tried to spit on police officers and repeatedly exposed her genitals during a heroin arrest. Police say that Angela Woerner, 28, was in the parking lot of the CVS on West Bay Avenue. An officer saw her and knew that she had outstanding warrants out for her arrest.
- Giant whale pulled out of Jersey City harborGiant whale pulled out of Jersey City harborUpdated:Wednesday, April 16 2014 2:04 PM EDT2014-04-16 18:04:35 GMT
- A whale that was found dead earlier this week in New York harbor has been transported to the Caven Point Marine Terminal in Jersey City.
- A whale that was found dead earlier this week in New York harbor has been transported to the Caven Point Marine Terminal in Jersey City. The United States Army Corps of Engineers successfully extracted the 60 ton giant from the water around on Wednesday.
-
- AUDIO-A Closer Look At The Co-Pilot Of Missing Flight 370 | Here & Now
- Fariq Abdul Hamid, left, and Richard Quest are pictured in a photo on Instagram. (Instagram)
- One of the more bizarre coincidences in the mystery of missing Malaysia Airlines flight 370 is the fact CNN airline and aviation correspondent Richard Quest met with the co-pilot, Fariq Abdul Hamid, weeks before the plane's disappearance.
- It was part of a taping Quest was doing in February for CNN Business Traveler, and it hasn't aired yet on CNN. Hamid, a 27-year-old first officer, was taking part in a training session, flying from Hong Kong to Kuala Lumpur.
- Quest speaks with Here & Now's Robin Young about that experience and the latest on the investigation into the missing plane. He says it came as a surprise when he realized he had interviewed the co-pilot.
- ''Fariq Hamid had posted one of the pictures of himself and myself in the cockpit on the flight deck, and somebody else had seen it and tweeted it,'' Quest says. ''It was quite a shock to look at the picture and to think that I had sat behind, watching him land a 777 only a matter of weeks earlier.''
- He says there was nothing that stood out to him about Hamid at the time.
- ''He was charming,'' Quest said. ''I was more concerned, frankly, that we had a relatively inexperienced first officer doing a landing with CNN sitting in the back filming.''
- Likewise, he says nothing jumped out at him about Malaysian Airlines.
- ''Malaysia airlines is a robust airline '-- it's been around for many years,'' Quest said. ''It has an excellent reputation, both for service and for safety. The issues we were looking at had nothing to do with these. They are the question of how Malaysia is finding a competitive advantage against the Gulf three '-- Qatar, Emirates and Etihad, on the one hand, and the low-cost carriers like Air Asia, which is based in Kuala Lumpur as well.''
-
- VIDEO-ABC on Chelsea Clinton's Pregnancy: 'Move Over, Prince George'; U.S. Has New 'Royal' | NewsBusters
- According to the liberal network journalists, being part of a Democratic family makes you "royalty." Reporters on ABC, CBS and NBC gushed over the announcement that Chelsea Clinton is pregnant. Good Morning America's Bianna Golodryga enthused, "Move over, Prince George, though. This morning, Americans have their own royal, or, rather, presidential baby, to look forward to. "
- On CBS This Morning, Jan Crawford was almost as excited, hyping, "...This is not as quite as big of a deal as when Prince William and Kate Middleton said they were expecting. But in the U.S., I guess you could say political dynasties might be the thing we've got closest to royalty." [Video to follow. MP3 audio here.]
- ABC previously labeled another Democratic family, the Kennedys, as "American royalty."
- CBS co-host Gayle King fawned, "But you would have thought a member of my family had announced she was pregnant." She asked colleague Charlie Rose, "Are you excited?" He replied, "I actually am because I know them."
- Compared to the "royalty" description, however, Rose was restrained, calling the Clintons "one of the country's most powerful political families."
- On GMA, George Stephanopoulos heralded, "We all watched Chelsea Clinton grow up in the White House. " In Stephanopoulos's case, this is literally true. As a former Democratic operative, he worked for Bill Clinton in the White House.
- On NBC's Today, Savannah Guthrie touted "one of the country's most prominent families." Reporter Andrea Mitchell reminiced like a proud relative:
- ANDREA MITCHELL: Chelsea grew up in front of our eyes, from the governor's mansion in Arkansas to the White House years. At her parents' side as they traveled the world and campaigned at home. More recently, she also joined the family business, a full partner in their foundation. But always right beside her mother in good times and bad.
- As the Media Research Center's Brent Baker pointed out on Thursday night, on December 12, 2012, the NBC Nightly News allowed 33 seconds to the announcement of Jenna Bush Hager's pregnancy. ABC's World News and the CBS Evening News skipped it.
- Since Thursday, the three networks have devoted 16 minutes and 48 seconds of coverage to Chelsea Clinton's pregnancy. On Thursday night, NBC, CBS and ABC offered five minutes and 17 seconds of coverage. The network morning shows devoted another 11 minutes and 31 seconds on Friday.
- A transcript of the April 18 GMA segment is below:
- ABC GRAPHIC: Baby on Board for Chelsea Clinton: Bill and Hillary to Be Grandparents
- GEORGE STEPHANOPOULOS: We're going to switch gears now and go to that big baby announcement. We all watched Chelsea Clinton grow up in the White House. Now, after some very public nudges from her very famous parents, she is having a child of her own. And our GMA weekend anchor Bianna Golodryga here with more on the happy news. Good morning, Bianna.
- BIANNA GOLODRYGA: Hey. Good morning, George. I'm officially on baby watch this week. Move over, Prince George, though. This morning, Americans have their own royal, or, rather, presidential baby, to look forward to. Chelsea Clinton making the announcement that she and husband, Marc, are expecting at an event discussing efforts to advance women and girls, an event attended by her husband and beaming parents, soon-to-be grandparents. Former first daughter Chelsea Clinton making a surprise announcement, Thursday.
- CHELSEA CLINTON: Marc and I are excited that we have our first child arriving later this year.
- GOLODRYGA: The 34-year-old and her husband, Marc Mezvinsky, who attended Stanford together, married for years ago.
- CLINTON: And I certainly feel all the better, whether it's a girl or a boy, that she or he will grow up in a world with so in many strong, young female leaders.
- GOLODRYGA: The future grandparents positively elated by the news. The former secretary of state tweeting, "Bill Clinton and I are thrilled that Chelsea and Marc are expecting their first child." And the former president also tweeting, "excited to add a new line to my Twitter bio, grandfather-to-be." It's no secret that the Clintons have been pining for a grandchild. Just last month, Jimmy Kimmel jokingly put the former First Lady on the hot seat.
- JIMMY KIMMEL: You and the president will have another child? Anymore children?
- HILLARY CLINTON: Well, no. But I wouldn't mind --
- KIMMEL: Let's get into it.
- HILLARY CLINTON: I wouldn't mind one of those grandchildren that I hear so much about.
- GOLODRYGA: And it was three years ago that her father also put on the pressure.
- BILL CLINTON: I would like to have a happy wife and she won't be unless she's a grandmother.
- GOLODRYGA: For eight years, the world watched Chelsea Clinton grow up in the White House and blossom into a young woman, even amid scandal. And when it comes to bedtime reading, grandpa may have picked out his material.
- BILL CLINTON: My daughter, when she was a little girl, loved the Curious George stories. I would always tell her a story every night before she would go to bed.
- GOLODRYGA: As for Chelsea, she admits she has got big shoes to fill.
- CHELSEA CLINTON: I just hope that I will be as good a mom to my child, and hopefully my children, as my mom was to me.
- GOLODRYGA: They really are such a close family. Of course, social media was on fire. Ellen DeGeneres tweeting, "Chelsea Clinton is going to have a baby. No reports if it's a boy or girl. But it just did win a seat in the Illinois general assembly."
- GOLODRYGA: Dr. Oz also weighing in. Of course, he's a new grandfather. He says congratulations to Chelsea Clinton, Hillary Clinton and Bill Clinton. If you need advice on grandparenthood, I'm becoming an expert." And some unsolicited advice from me as an only child to another only child, be prepared for many, many, many parental visits.
- STEPHANOPOULOS: Well, after all of the hints, yeah.
- STEPHANOPOULOS: Get a baby. Get a baby. Thanks, Bianna.
-
- VIDEO-Michael Bloomberg: I'm going straight to heaven, it's not even close | Mail Online
- Former NYC mayor said:'I am telling you if there is a God, when I get to heaven I'm not stopping to be interviewed. I am heading straight in'Bloomberg spending $50m on new anti-gun campaign to battle the NRABillionaire said he didn't miss being mayor and had no plans to run for the White House in 2016By Louise Boyle
- Published: 07:50 EST, 16 April 2014 | Updated: 13:13 EST, 16 April 2014
- Michael Bloomberg has no doubts about where he's headed when he shuffles off this mortal coil - straight to heaven, according to the former mayor.
- In an interview, published on Tuesday in the New York Times, the billionaire quipped that his liberal philanthropy - including his latest plan to drop $50million battling the NRA on gun control - should guarantee him a seat in the afterlife.
- Bloomberg said: 'I am telling you if there is a God, when I get to heaven I'm not stopping to be interviewed. I am heading straight in. I have earned my place in heaven. It's not even close.'
- Former New York Mayor Michael Bloomberg, who is spending $50million to fight the NRA on gun control, said in a recent interview that his philanthropy as definitely earned him a place in heaven
- Bloomberg announced this week that he plans to spend $50 million of his estimated $31billion fortune to build a grass-roots network to challenge the National Rifle Association and seek stricter gun control laws.
- The billionaire plans to strike fear into the powerful NRA and persuade politicians who kowtowed to gun lobbies around election time that the anti-gun lobby was equally powerful.
- The current groups he funds - Mayors Against Illegal Guns and Moms Demand Action for Gun Sense in America - will now be encompassed under an umbrella group called Everytown for Gun Safety.
- The strategy will focus on expanding the background check system for gun buyers at the state and national levels.
- Bloomberg told Today on Wednesday that he is not targeting Americans who want to hunt or protect themselves. Instead, he is advocating for a series of checks so that criminals, minors and the mentally ill do not gain access to firearms.
- The group will focus on 15 states, including pro-gun territories like Texas and where gun control initiatives have advanced.
- Michael Bloomberg appeared on Today on Wednesday with Shannon Watts, founder of Moms Demand Action, to discuss their new campaign on gun control
- It has set a goal of signing up one million new supporters this year.
- When asked by Today presenter Savannah Guthrie whether his goal was simply to outspend the NRA, Bloomberg said that it was 'not a battle of dollars' but for the hearts and minds of Americans, to protect our children.
- The NRA declined to comment.
- When asked by Guthrie if he missed being mayor of New York City, Bloomberg, without hesitation replied no.
- He also nixed any suggestion that he would ever run for the White House, adding: 'I'm going to spend the rest of my life trying to make a better world for myself, for my kids, for my grandchildren.'
- Bloomberg: I won't run for president, 'plain and simple'
- Share or comment on this article