How Technology Is Changing The Workplace

By Scott Wilkins

Technology in the workplace has become an integral factor in the successes of forward-thinking businesses today. The changing face of technology is allowing the nature of the workplace to change by increasing the rate of productivity and communication. The collaborative nature of social technology in particular is enabling people to work together rather than alongside one another in the office. Technology in the workplace resonates with a cultural change towards social communications. Businesses are now embracing this kind of strategy in creating a more flexible and innovative structure.

The economic downturn has lead businesses to re-think their methods and find new strategies. Technology in the workplace and its ability to influence collaboration is one of these strategies. The workplace is essentially evolving through the integration of social technology in business systems. Social technology in the workplace allows existing business models to be adapted and expands the vendor landscape. People now work together more than ever, and technology in the workplace has been critical in facilitating that kind of collaborative effort.

The trend of technology in the workplace is becoming increasingly more important when considering security concerns. Technology is critically valuable in counteracting the cyber attack threats that run rampant on the web and frequently target businesses. These businesses require protection of information and technology in the workplace provides that kind of security against data breaches. The workplace has entered a largely digital age where technology in the workplace has become a standard necessary component of business security. While the business landscape is expanding in a positive way, technology has become indispensable in protecting information.

[youtube]http://www.youtube.com/watch?v=3O_Ut5_Os_0[/youtube]

The nature of the workplace is quickly changing with technology allowing information to be more consumer-friendly. Endpoint devices such as smartphones, laptops, and other personal assistant devices are allowing people a much wider kind of access to corporate information. Technology in the workplace is allowing people to expand their reach on such information. Employees can now access work-related information on the go, from home, while traveling, or simply while away from the office. Technology in the workplace is allowing people to stay connected to their work from anywhere in the world.

New computing models have lead social technology to the forefront of business strategies. People are increasingly using social media tools, for example, in order to share information and communicate with one another. Social platforms such as Facebook, Twitter, Flickr, LinkedIn, and more are becoming commonplace as part of technology in the workplace. By integrating these methods of communication, businesses can expand their reach and build their client base.

The consumerization of information technology is being embraced by many businesses as they adapt to meet the new demands of a tech-savvy era. Adapting in this way to technology in the workplace allows businesses to have a competitive advantage in progressive strategy. One of the biggest changes in this technology-focused day and age is the rapid rate at which information is being exchanged. Employees are becoming quicker, more creative, and efficient workers by adapting to the trend of technology in the workplace.

About the Author: Scott Wilkins is a Canadian business and financial expert. To order cheques online for your business please visit Cheque Depot. http://www.chequedepot.com

Source: isnare.com

Permanent Link: isnare.com/?aid=581416&ca=Business

Continue Reading

Fiat plans to buy majority stake in Chrysler

Sunday, May 29, 2011

Fiat announced on Friday that it intends to purchase the six percent of automaker Chrysler that the US government currently owns, which would give the Italian company a 52 percent majority stake in Chrysler.

According to Fiat’s announcement, the company has told the US Treasury that it intends to use its option to buy the share in Chrysler held by the US government, a deal that will be finalized by June 10. If a price is not agreed on by that time, Fiat will pay the average of the estimates of two investment banks.

In 2009, Fiat bought a twenty percent stake in Chrysler, which had just exited bankruptcy, and has since increased its holding to 46 percent, expected to increase to 57% by the end of this year.

According to analyst Maryann Keller, the deal is a good one for both companies, as “[n]either one has the ability to compete alone in the kind of global environment that they face.” Analyst Rebecca Lindland said that the move will also benefit the companies by getting “them out from underneath any hint of government ownership and any of that negativity that went along with the bailout.”

Continue Reading

Australian researchers confirm stress makes you sick

Wednesday, December 7, 2005

Australian researchers say they have scientifically proven that stress causes sickness. The Garvan Institute in Sydney has discovered that a hormone, known as neuropeptide Y, (NPY) is released into the body during times of stress. Their findings show the hormone can stop the immune system from functioning properly.

Neuropeptide Y is one of those hormones that gets unregulated or released from neurones when stressful situations occur…it’s known for example that it regulates blood pressure and heart rates so your heart rate goes up but it hasn’t been known that it actually can affect immune cells as well,” said Professor Herbert Herzog, one of the researchers.

Herzog feels it is good to finally have proof of something people have suspected for so long.

“Now we have proven without doubt that there is a direct link and that stress can weaken the immune system and that makes you more vulnerable when you for example have a cold or flu and even in the more serious situations such as cancer can be enhanced in these situations,” said Herzog.

The Garvan Institute study centres on two key events that enable the human body to recognise foreign substances and control invaders. When our body encounters a pathogen (bacteria and viruses), the immune cells retain and interrogate suspects. Their activation is made possible by NPY. These cells then return to the lymph nodes, which are found all over the body, with information about the foreign invaders. The lymph nodes are where decisions about defence are made.

“Most of us expect to come down with a cold or other illness when we are under pressure, but until now we have mostly had circumstantial evidence for a link between the brain and the immune system,” said lead Garvan researcher, associate Professor Fabienne Mackay. “During periods of stress, nerves release a lot of NPY and it gets into the bloodstream, where it directly impacts on the cells in the immune system that look out for and destroy pathogens (bacteria and viruses) in the body.”

In the case of bacteria and viruses, TH1 cells are part of the attack team that is sent out on the ‘search and destroy’ mission. But when their job is done they need to be turned ‘off’ and the immune system reset. The same hormone, NPY, that activates the sentry cells now prompts the TH1 cells to slow down and die.

“Under normal conditions, circulating immune cells produce small amounts of NPY, which enables the immune cells on sentry duty and the TH1 immune cells to operate – it’s a yin and yang kind of situation. But too much NPY means that the TH1 attack is prevented despite the foreign invaders being identified – and this is what happens during stress,” added McKay.

The impact of stress on the body has been observed in athletes. Ph. D researcher at the University of Queensland, Luke Spence, together with the Australian Institute of Sport, studied elite and recreational athletes over five months.

They found elite athletes were more susceptible to respiratory diseases under stress.

“A lot of elite athletes put themselves through vast amounts of physical stress in their training, but also their emotional, psychological stress of feeling the pressure of Australia on their shoulders, wanting to compete and wanting to do their best,” said Spence.

It’s not just athletes who are prone to stress. Pressures at work and at home may cause emotional and mental stress that can be equally damaging. Almost a third of all work absenteeism in Australia is due to illness, costing employers over $10 billion a year.

“I think it has a huge impact for the work force and also for employers – if their employees are constantly stressed, constantly under pressure, they are more likely to get sick,” Spence said.

Further research could lead to the development of new drugs which may inhibit the action of the neuropeptide Y hormone.

Herzog warns people to minimise stress before it becomes a problem.

“Relaxation methods like yoga will help you to prevent that but there will still be people out there that are not responding to that and treatment by interfering with the system will be important,” he said. “There’s obviously some time until such a treatment will be available but this is something we will definitely work towards.”

The Garvan research will be published in the Journal of Experimental Medicine, Volume 202, No. 11.

Continue Reading

Recall of Thomas the Tank Engine toys due to lead-paint fears

Thursday, June 21, 2007

A recall issued last week for Thomas the Tank Engine toys made in China and containing lead-based paint, is the latest scare for consumers, and follows recent scandals involving Chinese-made pet food, pharmaceuticals, toothpaste and other toys, The New York Times has reported in a series of articles.

Last week, RC2, a U.S. toy company based in Oak Brook, Illinois, issued a recall for its popular wooden “Thomas the Tank Engine and Friends” train sets. The recall involved 1.5 million “Thomas Wooden Railway” vehicles and train sets sold at toy stores and various retailers across the U.S. from January 2005 through June 2007.

A subsequent recall has been issued in the United Kingdom, where Thomas the Tank Engine was originated in the 1940s as a character in a children’s story by the Reverend W.V. Awdry. Around 70,000 toys are involved in the U.K. recall, according to The Guardian.

“RC2 has determined that the surface paints on the recalled products contain lead. Lead is toxic if ingested by young children and can cause adverse health effects,” the Consumer Product Safety Commission said in a press release dated June 13. “Consumers should take the recalled toys away from young children immediately and contact RC2 Corp. for a replacement toy,” the commission said.

Those “adverse health effects” could include brain and nerve damage, especially in young children, as well as blood and brain disorders. Severe lead poisoning causes vomiting, diarrhea, convulsions, anemia, loss of appetite, headaches and in particularly high doses, coma and death.

In an article on Monday, The New York Times reported that recalls have been issued for 24 different toys in the U.S. in the past year, and every one of them was made in China. According to the Toy Industry Association, toys made in China account for around 70 percent to 80 percent of all the toys sold in the U.S., The Times said.

“These are items that children are supposed to be playing with,” Prescott Carlson was quoted as saying by The Times. Carlson is a co-founder of a child-safety website called Imperfect Parent, which tracks recalls of toys and other baby products. “It should be at a point where companies in the United States that are importing these items are held liable,” Carlson said.

RC2 would not comment to The Times, and a Consumer Product Safety Commission spokesman would not say how long ago the problem with the lead paint was discovered.

For a follow-up article on Tuesday, The Times visited a factory in Dongguan, in China’s Guangdong province, where the “Thomas and Friends” toys are made. The paper interviewed workers and took photos on the factory floor.

“You’re intruding,” a factory manager identified only as Zhong was quoted as telling the reporters. “Tell me, why exactly are you here?”

During the visit, a reporter, translator and a photographer were detained by factory officials, and released a day later after local police and government officials intervened.

The factory also produces other toys for RC2, including toy John Deere trucks, NASCAR racing models and M&M’s cars, The Times said. RC2 makes the toys under licenses from various companies. The “Thomas and Friends” toys are made under license from Hit Entertainment, which owns the “Thomas” brand.

According to RC2, items in the “Thomas and Friends” recall are:

  • Red James Engine & Red James’ # 5 Coal Tender
  • Red Lights & Sounds James Engine & Red James’ #5
  • Lights & Sounds Coal Tender
  • James with Team Colors Engine & James with Team Colors *#5 Coal Tender
  • Red Skarloey Engine
  • Brown & Yellow Old Slow Coach
  • Red Hook & Ladder Truck & Red Water Tanker Truck
  • Red Musical Caboose
  • Red Sodor Line Caboose
  • Red Coal Car labeled “2006 Day Out With Thomas” on the Side
  • Red Baggage Car
  • Red Holiday Caboose
  • Red “Sodor Mail” Car
  • Red Fire Brigade Truck
  • Red Fire Brigade Train
  • Deluxe Sodor Fire Station
  • Red Coal Car
  • Yellow Box Car
  • Red Stop Sign
  • Yellow Railroad Crossing Sign
  • Yellow “Sodor Cargo Company” Cargo Piece
  • Smelting Yard
  • Ice Cream Factory

Toys listed that are marked with codes containing “WJ” or “AZ” are not included in the recall.

Earlier, RC2 said that customers would have to cover shipping costs to return the toys to the company. It later agreed to cover postage after angry complaints by parents, The Times said in an article yesterday. Refunds will take about two months.

Continue Reading

Your Premier Auto Repair And Ser VIC E Shop}

YOUR PREMIER AUTO REPAIR AND SERVICE SHOP

by

Zara EvansAs your local BMW Auto Repair experts, our highly trained automotive technicians take pride in all of their repairs. From Basic maintenance to any advance mechanical repair, our Greensboro BMW auto repair shop will have your car back on the road in a timely fashion, for your peace of mind.Each and every one of our reliable specialists obtains advanced certification in BMW Transmission Repair, BMW Brake Repair, BMW Engine Repair, and Auto Electrical Service. Equipped with the latest in diagnostic and repair technology, your vehicle will receive nothing less than first class care.No matter your vehicle needs, our BMW service team in Greensboro, NC Service Department will gladly accommodate. We are grateful to offer reliable vehicle care to our friends and neighbors in Greensboro North Carolina, as well those just driving through Burlington, high Point and Winston-Salem NC.No matter your vehicle needs, our BMW service team in Greensboro, NC Service Department will gladly accommodate. We are grateful to offer reliable vehicle care to our friends and neighbors in Greensboro North Carolina, as well those just driving through Burlington, high Point and Winston-Salem NC.while you’re approximately to buy a automobile, finding the right automobile for you isn’t all you need to think about. you furthermore may have to bear in mind which car dealership to give your commercial enterprise to. there are numerous elements to don’t forget, including region, price factor, and customer service. here at eurobahn bmw greensboro, we try to earn your enterprise in any way possible, and could take the strain out of the auto buying enjoy.at bmw greensboro, we are able to paintings with you to make sure all of your wishes are met, and could assure that our income team of workers has the answer to any query you can have. irrespective of what automobile type or characteristic you’re searching out, our sales team of workers is aware of which car will be exceptional proper in your budget and way of life. their significant knowledge is at your disposal, and it’s for your quality interest to apply it on your gain. they’re committed to finding the exact vehicle you’re searching out.beyond our superior sales workforce, our provider branch is full of certified technicians you can trust along with your automobile. we provide the satisfactory care viable, and could take the suitable measures to make certain your automobile is safely again on the road right away. moreover, our finance department of specialists work difficult to locate you the best car mortgage you deserve. our monetary advisors concentrate on getting you the charge you can have enough money, and may answer any questions you have got about obtaining a vehicle loan, further proving our vehicle dealership is your one-stop store for all your vehicle desires.you can also enjoy the fact that we provide manufacturer incentives similarly to other vehicle specials all the time, helping you to keep cash everywhere we are able to. we also paintings to discover approaches in an effort to shop while you’re in need of vehicle upkeep, like brake exams, new tires or tire rotation, oil changes, and a lot extra.it’s miles clean that eurobahn bmw is your one-prevent-shop for all of your car shopping for wishes. whether or not you’re looking for the suitable automobile, an oil change, an vehicle loan, and the entirety in between, you could be sure you’ve got come to the right place. we want to peer you at the back of the wheel of your dream car, so visit us today, your depended on car dealership in Greensboro NC.

zara evans is a freelance creator with years of enjoy in writing on diverse subjects. he’s a bmw fanatic too and has preceding revel in in running with numerous automobile producers and

BMW Greensboro

.

Article Source:

eArticlesOnline.com
}

Continue Reading

FBI investigates AT&T security breach

Sunday, June 13, 2010

File:IPad-02.jpg

The United States Federal Bureau of Investigation (FBI) has launched a probe into a security breach that allowed hackers to retrieve 114,000 e-mail addresses of iPad users on the AT&T network.

The FBI announced the investigation Friday, which will determine exactly what allowed a group of hackers using the name “Goatse Security” to access the data. The security breach was first announced by the blog Gawker on Wednesday. The FBI has since asked Gawker Media LLC, the owners of the site, to retain all information relating to the incident. The company was also involved in another recent case with Apple Inc., which included the iPhone 4. Gawker said that it does not believe it is the main target of this FBI investigation.

Editors at Gawker were able to verify the information the hackers sent to them, and did not post full e-mail addresses or any other identifying information in its initial story of the incident. Gawker said that it did not pay Goatse Security for the data. One of the hackers later wrote that they did not reveal the addresses to anyone else and had already deleted them.

The hackers were able to obtain the data after discovering a program on AT&T’s website that provides the e-mail address of a user when that user’s identification number is given. The hackers essentially guessed and then saved the numbers for the 114,000 users. They did not tell AT&T of the security hole.

A spokesperson for AT&T said Wednesday that the company “was informed by a business customer on Monday of the potential exposure of their iPad ICC-IDs [the identification numbers]”, and had disabled the e-mail-providing program by Tuesday. AT&T also said that no other information was stolen other than the e-mails addresses of their customers, and that “there is no evidence that any other customer information was shared.” The company says it will notify all of the iPad users whose information was compromised.

Many of the users involved are high-ranking government or corporate officials, including Rahm Emanuel, the current White House Chief of Staff, and Michael Bloomberg, the mayor of New York City. Others include employees of Google and the U.S. military.

Apple has not commented about the breach.

Continue Reading

President Bush, Congress agree on economic stimulus package

Friday, January 25, 2008

U.S. President George W. Bush and Congressional leaders from both political parties have reached agreement on US$150 billion in tax relief in an effort to help stimulate the United States economy. VOA White House Correspondent Scott Stearns has the story.

The agreement includes provision to give up to US$600 in tax rebates to millions of wage earners and an additional US$300 refund for each child. It allows businesses to immediately write off 50 percent of capital equipment purchases.

President Bush says it is an effective, robust and temporary set of incentives that will boost the economy and create new jobs.

“This package has the right set of policies and is the right size,” he said. “The incentives in this package will lead to higher consumer spending and increased business investment this year.”

The incentives in this package will lead to higher consumer spending and increased business investment this year.

The president says he knows Americans are concerned about their economic future, with the challenges of higher energy prices and a falling housing market slowing growth.

President Bush is urging the House of Representatives and Senate to pass the agreement as soon as possible.

“We have an opportunity to come together and take the swift, decisive action our economy urgently needs,” he added.

Stock markets around the world dipped sharply early this week amid widespread fears of a U.S. recession and its potential to drag down foreign markets as well.

The stimulus deal was an unusual display of bipartisanship in Washington, with Democrats and Republicans in the House making concessions to get the deal done quickly.

Republicans dropped a provision that would have allowed businesses to reclaim taxes previously paid. Democrats dropped their demands for increases in food stamps and unemployment benefits.

This bipartisan package should be acted upon rapidly and can help alleviate the economic pain felt by millions of Americans.

House Speaker Democrat Nancy Pelosi says she is not totally pleased with the package, but knows it will help stimulate the economy.

“This bipartisan package should be acted upon rapidly and can help alleviate the economic pain felt by millions of Americans,” she said.

John Boehner is the leader of Republicans in the House of Representatives. He says it was not easy for Republicans and Democrats to agree on a plan, but he is confident it is in the best interests of the nation.

“This agreement is a big win for the American people,” he said. “It will stimulate our economy in the most direct and effective way possible by putting money in the hands of middle income American families and by giving businesses incentives to create and build new jobs in our country.”

Treasury Secretary Henry Paulson was the president’s lead negotiator with Congress.

“I know the work isn’t done yet,” he noted. “As the Speaker said, we’ve got more to do. And I am looking forward to working with the Senate and working with the House to get a package as soon as possible, because, again, speed is of the essence.”

Senate Majority Leader Democrat Harry Reid says he wants to get the plan to the president for signature by February 15. But changes in the Senate may slow passage of the package, as Reid says senators may consider restoring provisions to extend unemployment benefits.

Continue Reading

Can You Teach An Old Dog New Tricks?}

More On This Topic:

Can You Teach an Old Dog New Tricks?

by

Dog_Lover

You cant teach an old dog a new trick,

If you always do what youve always done, then youll always get what youve always got!

In other words, if you want to train a dog, no matter his age, to do something new, then you need to do something different while training him.

And you know what?

If you use the right approach, it will work!

Yet, unfortunately, when humans just repeat the same old actions to training a dog, and the dog fails to learn, we quickly label the dog stupid or too old to learn, which is simply not true.

So, can you teach an old dog a new trick?

Yes. Absolutely. But it starts with you and me!

Ready to discover how to teach an old dog a new trick?

Here are some basic tips for training a dog to learn a new behaviour

1. Establish yourself as the decision maker.

If your dog takes no notice of you when you ask him to follow a command, its vital to establish that you are the decision maker first, before you begin training.

Why?

Because establishing yourself as the decision maker enables your dog to trust you. When he trusts you, hell be more likely to do something when you ask him to do it.

Its just like having a child. If your child looks up to you because she knows you make decisions for her that will keep her safe and happy, she will be more likely to listen to you when you ask her to do something.

A great example would be keeping your child safe while cooking. If you tell your child not to touch a hot stove top because it will hurt her, and the child trusts you, chances are shell take your warning and directions seriously.

[youtube]http://www.youtube.com/watch?v=vg9wjGqxueo[/youtube]

If the child couldnt care less about what you have to say and she doesnt trust you, theres a good chance shell touch the burning stove top because she thinks she knows whats best.

Always make sure your dog knows youre the ultimate decision maker.

2. Dont lose control of the environment.

While teaching your dog a new command, its so important to ensure the environment youre teaching in is a controlled setting. Its up to you to help your dog make the right decision.

For example, you may have a dog that charges out the front door and runs up and down the picket fence barking at people.

You dont like this behaviour, so you want to train your dog to not run out the door and bark.

Despite the fact you want to change this behavior, its summer outside, and you want to leave your doors open to let the fresh air into your home.

So, in this case, Id install a baby gate just inside the door to help motivate your dog to make the right decision and stay inside, despite the fact that he wants to bark at people along the fence.

That baby gate will often make all the difference to the training pattern.

And over time, hell learn that he is not allowed to rush out the door without your permission.

Keeping control of the environment may mean keeping your dog on a long line or leash or putting a gate up in your home. Do whatever you need to do to keep control of your dog while you are teaching a behaviour.

Back to the parent/child analogyits like holding a toddlers hand as you walk through a busy parking lot.

Holding your kids hand is taking control of the environment, and it ensures that your kid wont do something silly like run out in front of a car because she wasnt paying attention.

While youre holding your kids hand, you begin to teach her that its important to walk slowly through a parking lot, to look for cars and to always look both ways before walking across a street.

This is how practically controlling the environment allows you to train your dog (and your child) while also keeping them safe.

3. Remember your dog is trying to avoid pain and gain pleasure!

Im a firm believer than we need to do more than just bribe and train our dogs with food and treats while training; however, they can certainly motivate a dog to learn a new skill.

So use treats and then fade them out later over time as your dog gets the hang of the new action.

Also keep in mind that different foods may motivate different behaviours. spelling

To a dog, a piece of kibble is like 10 cents.

Then a big dry biscuit is like a dollar to your dog.

And if you take it a step further, a piece of cheese or bacon is like $100 dollars.

And what your dog may do for $100, he may not do for 1o cents.

(Maybe we are not so different after all!)

For example, if your dog escapes and gets out of the house, a piece of kibble may not be enough to make him listen and come back to you. Yet, Im sure a shake of the tasty treat tin will grab his attention and motivate him to come back inside.

4. Start small and set your dog up to win.

We should always be looking for ways to set up our dogs to win when they are being trained.

For example, if youre trying to break the habit of your dog raiding your garbage bin, its no good leaving the leftover lamb chop bones in the trash.

Its just too tempting for your dog, especially when he has not learned that the trash is off limits for him.

Make it easy and keep it simple when you are starting out.

5. Finish on a high and exercise regularly!

Always end your training session on a high note.

This may even be as simple as ending your training session on a basic recall or finishing the walk with a treat when they come and jump up into the car. When you do this, you always leave a training session feeling happy, and the dog youre working with finishes a session feeling confident and willing to learn.

So, can you teach an old dog a new trick? Follow my 5-step method above, and the answer is YES!

But what about you?

Are you too old to learn a new skill or try out a new career path?

Listen to this

My amazing dad, alongside my nephew and me, just climbed Ben Nevis, the highest mountain in the UK!

He climbed up and down in a single day! And hes 70!

You are never too old or too young to start something new! Age is simply a number. What really counts is what you believe and feel.

In the words of Henry Ford, Whether you think you can or whether you think you cant, youre right.

So if youve been reading some of the latest posts and have been thinking about becoming a dog trainer but arent sure if you can do itchoose the empowering belief that you can!

Whether its as a full-time or part-time job, as a hobby or as an extra income to supplement your current salary, believe, and it can come true.

And when it comes to your dog its trueold dogs can learn new tricks!

Dogs can change. The question is, can YOU?

Discover The Quick And Easy Way To An Obedient Dog WITHOUT Spending Hours Of Training & Thousands Of Dollars! See more at http://howtotrainthedogs.com/You’ll discover…- Why most Dog Training methods only set you up to FAIL! – Why using food bribes and clickers to train your dog won’t work long term – That trying to use force, fear or aggression is outdated and just plain sad! – When you apply my method, you don’t have to spend hours ‘training’ your dog!- your dog will simply CHOOSE to obey you and follow your commands!. Click find out at http://howtotrainthedogs.com/..Thanks for reading!

Article Source:

eArticlesOnline.com }

Continue Reading

ACLU, EFF challenging US ‘secret’ court orders seeking Twitter data

Thursday, April 7, 2011

Late last month, the American Civil Liberties Union (ACLU) and Electronic Frontier Foundation (EFF) filed objections to the United States Government’s ‘secret’ attempts to obtain Twitter account information relating to WikiLeaks. The ACLU and EFF cite First and Fourth amendment issues as overriding reasons to overturn government attempts to keep their investigation secret; and, that with Birgitta Jonsdottir being an Icelandic Parliamentarian, the issue has serious international implications.

The case, titled “In the Matter of the 2703(d) Order Relating to Twitter Accounts: Wikileaks, Rop_G, IOERROR; and BirgittaJ“, has been in the EFF’s sights since late last year when they became aware of the US government’s attempts to investigate WikiLeaks-related communications using the popular microblogging service.

The key objective of this US government investigation is to obtain data for the prosecution of Bradley Manning, alleged to have supplied classified data to WikiLeaks. In addition to Manning’s Twitter account, and that of WikiLeaks (@wikileaks), the following three accounts are subject to the order: @ioerror, @birgittaj, and @rop_g. These, respectively, belong to Jacob Apelbaum, Birgitta Jonsdottir, and Rop Gonggrijp.

Birgitta is not the only non-US citizen with their Twitter account targeted by the US Government; Gonggrijp, a Dutch ‘ex-hacker’-turned-security-expert, was one of the founders of XS4ALL – the first Internet Service Provider in the Netherlands available to the public. He has worked on a mobile phone that can encrypt conversations, and proven that electronic voting systems can readily be hacked.

In early March, a Virginia magistrate judge ruled that the government could have the sought records, and neither the targeted users, or the public, could see documents submitted to justify data being passed to the government. The data sought is as follows:

  1. Personal contact information, including addresses
  2. Financial data, including credit card or bank account numbers
  3. Twitter account activity information, including the “date, time, length, and method of connections” plus the “source and destination Internet Protocol address(es)”
  4. Direct Message (DM) information, including the email addresses and IP addresses of everyone with whom the Parties have exchanged DMs

The order demands disclosure of absolutely all such data from November 1, 2009 for the targeted accounts.

The ACLU and EFF are not only challenging this, but demanding that all submissions made by the US government to justify the Twitter disclosure are made public, plus details of any other such cases which have been processed in secret.

Bradley Manning, at the time a specialist from Maryland enlisted with the United States Army’s 2nd Brigade, 10th Mountain Division, was arrested in June last year in connection with the leaking of classified combat video to WikiLeaks.

The leaked video footage, taken from a US helicopter gunship, showed the deaths of Reuters staff Saeed Chmagh and Namir Noor-Eldeen during a U.S. assault in Baghdad, Iraq. The wire agency unsuccessfully attempted to get the footage released via a Freedom of Information Act request in 2007.

When WikiLeaks released the video footage it directly contradicted the official line taken by the U.S. Army asserting that the deaths of the two Reuters staff were “collateral damage” in an attack on Iraqi insurgents. The radio chatter associated with the AH-64 Apache video indicated the helicopter crews had mistakenly identified the journalists’ equipment as weaponry.

The US government also claims Manning is linked to CableGate; the passing of around a quarter of a million classified diplomatic cables to WikiLeaks. Manning has been in detention since July last year; in December allegations of torture were made to the United Nations High Commissioner for Human Rights regarding the conditions under which he was and is being detained.

Reports last month that he must now sleep naked and attend role call at the U.S. Marine facility in Quantico in the same state, raised further concern over his detention conditions. Philip J. Crowley, at-the-time a State Department spokesman, remarked on this whilst speaking at Massachusetts Institute of Technology; describing the current treatment of Manning as “ridiculous and counterproductive and stupid”, Crowley was, as a consequence, put in the position of having to tender his resignation to Secretary of State Hillary Clinton.

Despite his native Australia finding, in December last year, that Assange’s WikiLeaks had not committed any criminal offences in their jurisdiction, the U.S. government has continued to make ongoing operations very difficult for the whistleblower website.

The result of the Australian Federal Police investigation left the country’s Prime Minister, Julia Gillard, having to retract a statement that WikiLeaks had acted “illegally”; instead, she characterised the site’s actions as “grossly irresponsible”.

Even with Australia finding no illegal activity on the part of WikiLeaks, and with founder Julian Assange facing extradition to Sweden, U.S. pressure sought to hobble WikiLeaks financially.

Based on a State Department letter, online payments site PayPal suspended WikiLeaks account in December. Their action was swiftly followed by Visa Europe and Mastercard ceasing to handle payments for WikiLeaks.

The online processing company, Datacell, threatened the two credit card giants with legal action over this. However, avenues of funding for the site were further curtailed when both Amazon.com and Swiss bank PostFinance joined the financial boycott of WikiLeaks.

Assange continues, to this day, to argue that his extradition to Sweden for questioning on alleged sexual offences is being orchestrated by the U.S. in an effort to discredit him, and thus WikiLeaks.

Wikinews consulted an IT and cryptography expert from the Belgian university which developed the current Advanced Encryption Standard; explaining modern communications, he stated: “Cryptography has developed to such a level that intercepting communications is no longer cost effective. That is, if any user uses the correct default settings, and makes sure that he/she is really connecting to Twitter it is highly unlikely that even the NSA can break the cryptography for a protocol such as SSL/TLS (used for https).”

Qualifying this, he commented that “the vulnerable parts of the communication are the end points.” To make his point, he cited the following quote from Gene Spafford: “Using encryption on the Internet is the equivalent of arranging an armored car to deliver credit card information from someone living in a cardboard box to someone living on a park bench.

Continuing, the Katholieke Universiteit Leuven (KUL) expert explained:

In the first place, the weak point is Twitter itself; the US government can go and ask for the data; companies such as Twitter and Google will typically store quite some information on their users, including IP addresses (it is known that Google deletes the last byte of the IP address after a few weeks, but it is not too hard for a motivated opponent to find out what this byte was).
In the second place, this is the computer of the user: by exploiting system weaknesses (with viruses, Trojan horses or backdoors in the operating system) a highly motivated opponent can enter your machine and record your keystrokes plus everything that is happening (e.g. the FBI is known to do this with the so-called Magic Lantern software). Such software is also commercially available, e.g. for a company to monitor its employees.
It would also be possible for a higly motivated opponent to play “man-in-the-middle”; that means that instead of having a secure connection to Twitter.com, you have a secure connection to the attacker’s server, who impersonates Twitter’s and then relays your information to Twitter. This requires tricks such as spoofing DNS (this is getting harder with DNSsec), or misleading the user (e.g. the user clicks on a link and connects to tw!tter.com or Twitter.c0m, which look very similar in a URL window as Twitter.com). It is clear that the US government is capable of using these kind of tricks; e.g., a company has been linked to the US government that was recognized as legitimate signer in the major browsers, so it would not be too large for them to sign a legitimate certificate for such a spoofing webserver; this means that the probability that a user would detect a problem would be very low.
As for traffic analysis (finding out who you are talking to rather than finding out what you are telling to whom), NSA and GCHQ are known to have access to lots of traffic (part of this is obtained via the UK-USA agreement). Even if one uses strong encryption, it is feasible for them to log the IP addresses and email addresses of all the parties you are connecting to. If necessary, they can even make routers re-route your traffic to their servers. In addition, the European Data Retention directive forces all operators to store such traffic data.
Whether other companies would have complied with such requests: this is very hard to tell. I believe however that it is very plausible that companies such as Google, Skype or Facebook would comply with such requests if they came from a government.
In summary: unless you go through great lengths to log through to several computers in multiple countries, you work in a clean virtual machine, you use private browser settings (don’t accept cookies, no plugins for Firefox, etc.) and use tools such as Tor, it is rather easy for any service provider to identify you.
Finally: I prefer not to be quoted on any sentences in which I make statements on the capabilities or actions of any particular government.

Wikinews also consulted French IT security researcher Stevens Le Blond on the issues surrounding the case, and the state-of-the-art in monitoring, and analysing, communications online. Le Blond, currently presenting a research paper on attacks on Tor to USENIX audiences in North America, responded via email:

Were the US Government to obtain the sought data, it would seem reasonable the NSA would handle further investigation. How would you expect them to exploit the data and expand on what they receive from Twitter?

  • Le Blond: My understanding is that the DOJ is requesting the following information: 1) Connection records and session times 2) IP addresses 3) e-mail addresses 4) banking info
By requesting 1) and 2) for Birgitta and other people involved with WikiLeaks (WL) since 2009, one could derive 2 main [pieces of] information.
First, he could tell the mobility of these people. Recent research in networking shows that you can map an IP address into a geographic location with a median error of 600 meters. So by looking at changes of IP addresses in time for a Twitter user, one could tell (or at least speculate about) where that person has been.
Second, by correlating locations of different people involved with WL in time, one could possibly derive their interactions and maybe even their level of involvement with WL. Whether it is possible to derive this information from 1) and 2) depends on how this people use Twitter. For example, do they log on Twitter often enough, long enough, and from enough places?
My research indicates that this is the case for other Internet services but I cannot tell whether it is the case for Twitter.
Note that even though IP logging, as done by Twitter, is similar to the logging done by GSM [mobile phone] operators, the major difference seems to be that Twitter is subject to US regulation, no matter the citizenship of its users. I find this rather disturbing.
Using 3), one could search for Birgitta on other Internet services, such as social networks, to find more information on her (e.g., hidden accounts). Recent research on privacy shows that people tend to use the same e-mail address to register an account on different social networks (even when they don’t want these accounts to be linked together). Obviously, one could then issue subpoenas for these accounts as well.
I do not have the expertise to comment on what could be done with 4).
((WN)) As I believe Jonsdottir to be involved in the Icelandic Modern Media Initiative (IMMI), what are the wider implications beyond the “WikiLeaks witchhunt”?
  • Le Blond: Personal data can be used to discredit, especially if the data is not public.

Having been alerted to the ongoing case through a joint press release by the ACLU and EFF, Wikinews sought clarification on the primary issues which the two non-profits saw as particularly important in challenging the U.S. Government over the ‘secret’ court orders. Rebecca Jeschke, Media Relations Director for the EFF, explained in more detail the points crucial to them, responding to a few questions from Wikinews on the case:

((WN)) As a worse-case, what precedents would be considered if this went to the Supreme Court?
  • Rebecca Jeschke: It’s extremely hard to know at this stage if this would go to the Supreme Court, and if it did, what would be at issue. However, some of the interesting questions about this case center on the rights of people around the world when they use US Internet services. This case questions the limits of US law enforcement, which may turn out to be very different from the limits in other countries.
((WN)) Since this is clearly a politicised attack on free speech with most chilling potential repercussions for the press, whistleblowers, and by-and-large anyone the relevant U.S. Government departments objects to the actions of, what action do you believe should be taken to protect free speech rights?
  • Jeschke: We believe that, except in very rare circumstances, the government should not be permitted to obtain information about individuals’ private Internet communications in secret. We also believe that Internet companies should, whenever possible, take steps to ensure their customers are notified about requests for information and have the opportunity to respond.
((WN)) Twitter via the web, in my experience, tends to use https:// connections. Are you aware of any possibility of the government cracking such connections? (I’m not up to date on the crypto arms race).
  • Jeschke: You don’t need to crack https, per se, to compromise its security. See this piece about fraudulent https certificates:
Iranian hackers obtain fraudulent httpsEFF website.
((WN)) And, do you believe that far, far more websites should – by default – employ https:// connections to protect people’s privacy?
  • Jeschke: We absolutely think that more websites should employ https! Here is a guide for site operators: (See external links, Ed.)

Finally, Wikinews approached the Icelandic politician, and WikiLeaks supporter, who has made this specific case a landmark in how the U.S. Government handles dealings with – supposedly – friendly governments and their elected representatives. A number of questions were posed, seeking the Icelandic Parliamentarian’s views:

((WN)) How did you feel when you were notified the US Government wanted your Twitter account, and message, details? Were you shocked?
  • Birgitta Jonsdottir: I felt angry but not shocked. I was expecting something like this to happen because of my involvement with WikiLeaks. My first reaction was to tweet about it.
((WN)) What do you believe is their reasoning in selecting you as a ‘target’?
  • Jonsdottir: It is quite clear to me that USA authorities are after Julian Assange and will use any means possible to get even with him. I think I am simply a pawn in a much larger context. I did of course both act as a spokesperson for WikiLeaks in relation to the Apache video and briefly for WikiLeaks, and I put my name to the video as a co-producer. I have not participated in any illegal activity and thus being a target doesn’t make me lose any sleep.
((WN)) Are you concerned that, as a Member of Parliament involved in the Icelandic Modern Media Initiative (IMMI), the US attempt to obtain your Twitter data is interfering with planned Icelandic government policy?
  • Jonsdottir: No
((WN)) In an earlier New York Times (NYT) article, you’re indicating there is nothing they can obtain about you that bothers you; but, how do you react to them wanting to know everyone you talk to?
  • Jonsdottir: It bothers me and according to top computer scientists the government should be required to obtain a search warrant to get our IP addresses from Twitter. I am, though, happy I am among the people DOJ is casting their nets around because of my parliamentary immunity; I have a greater protection then many other users and can use that immunity to raise the issue of lack of rights for those that use social media.
HAVE YOUR SAY
Do you believe the U.S. government should have the right to access data on foreign nationals using services such as Twitter?
Add or view comments
((WN)) The same NYT article describes you as a WikiLeaks supporter; is this still the case? What attracts you to their ‘radical transparency’?
  • Jonsdottir: I support the concept of WikiLeaks. While we don’t have a culture of protection for sources and whistleblowers we need sites like WikiLeaks. Plus, I think it is important to give WikiLeaks credit for raising awareness about in how bad shape freedom of information and expression is in our world and it is eroding at an alarming rate because of the fact that legal firms for corporations and corrupt politicians have understood the borderless nature of the legalities of the information flow online – we who feel it is important that people have access to information that should remain in the public domain need to step up our fight for those rights. WikiLeaks has played an important role in that context.I don’t support radical transparency – I understand that some things need to remain secret. It is the process of making things secret that needs to be both more transparent and in better consensus with nations.
((WN)) How do you think the Icelandic government would have reacted if it were tens of thousands of their diplomatic communications being leaked?
  • Jonsdottir: I am not sure – A lot of our dirty laundry has been aired via the USA cables – our diplomatic communications with USA were leaked in those cables, so far they have not stirred much debate nor shock. It is unlikely for tens of thousands of cables to leak from Iceland since we dont have the same influence or size as the USA, nor do we have a military.
((WN)) Your ambassador in the US has spoken to the Obama administration. Can you discuss any feedback from that? Do you have your party’s, and government’s, backing in challenging the ordered Twitter data release?
  • Jonsdottir: I have not had any feedback from that meeting, I did however receive a message from the DOJ via the USA ambassador in Iceland. The message stated three things: 1. I am free to travel to the USA. 2. If I would do so, I would not be a subject of involuntary interrogation. 3. I am not under criminal investigation. If this is indeed the reality I wonder why they are insisting on getting my personal details from Twitter. I want to stress that I understand the reasoning of trying to get to Assange through me, but I find it unacceptable since there is no foundation for criminal investigation against him. If WikiLeaks goes down, all the other media partners should go down at the same time. They all served similar roles. The way I see it is that WikiLeaks acted as the senior editor of material leaked to them. They could not by any means be considered a source. The source is the person that leaks the material to WikiLeaks. I am not sure if the media in our world understands how much is at stake for already shaky industry if WikiLeaks will carry on carrying the brunt of the attacks. I think it would be powerful if all the medias that have had access to WikiLeaks material would band together for their defence.
((WN)) Wikinews consulted a Belgian IT security expert who said it was most likely companies such as Facebook, Microsoft, and Google, would have complied with similar court orders *without advising the ‘targets*’. Does that disturb you?
  • Jonsdottir: This does disturb me for various reasons. The most obvious is that my emails are hosted at google/gmail and my search profile. I dont have anything to hide but it is important to note that many of the people that interact with me as a MP via both facebook and my various email accounts don’t always realize that there is no protection for them if they do so via those channels. I often get sensitive personal letters sent to me at facebook and gmail. In general most people are not aware of how little rights they have as users of social media. It is those of uttermost importance that those sites will create the legal disclaimers and agreements that state the most obvious rights we lose when we sign up to their services.
This exclusive interview features first-hand journalism by a Wikinews reporter. See the collaboration page for more details.
((WN)) Has there been any backlash within Iceland against US-based internet services in light of this? Do you expect such, or any increase in anti-American sentiments?
  • Jonsdottir: No, none what so ever. I dont think there is much anti-American sentiments in Iceland and I dont think this case will increase it. However I think it is important for everyone who does not live in the USA and uses social services to note that according to the ruling in my case, they dont have any protection of the 1st and 4th amendment, that only apply to USA citizens. Perhaps the legalities in relation to the borderless reality we live in online need to be upgraded in order for people to feel safe with using social media if it is hosted in the USA. Market tends to bend to simple rules.
((WN)) Does this make you more, or less, determined to see the IMMI succeed?
  • Jonsdottir: More. People have to realize that if we dont have freedom of information online we won’t have it offline. We have to wake up to the fact that our rights to access information that should be in the public domain is eroding while at the same time our rights as citizens online have now been undermined and we are only seen as consumers with consumers rights and in some cases our rights are less than of a product. This development needs to change and change fast before it is too late.

The U.S. Government continues to have issues internationally as a result of material passed to WikiLeaks, and subsequently published.

Within the past week, Ecuador has effectively declared the U.S. ambassador Heather Hodges persona-non-grata over corruption allegations brought to light in leaked cables. Asking the veteran diplomat to leave “as soon as possible”, the country may become the third in South America with no ambassadorial presence. Both Venezuela and Bolivia have no resident U.S. ambassador due to the two left-wing administrations believing the ejected diplomats were working with the opposition.

The U.S. State Department has cautioned Ecuador that a failure to speedily normalise diplomatic relations may jeapordise ongoing trade talks.

The United Kingdom is expected to press the Obama administration over the continuing detention of 23-year-old Manning, who also holds UK citizenship. British lawmakers are to discuss his ongoing detention conditions before again approaching the U.S. with their concerns that his solitary confinement, and treatment therein, is not acceptable.

The 22 charges brought against Manning are currently on hold whilst his fitness to stand trial is assessed.

Continue Reading

Train derailed by collision with semi in Saskatchewan, Canada

Tuesday, March 22, 2005

Twenty-four cars of a west-bound Canada Pacific train were thrown from the tracks after the train collided with a semi tractor-trailer in poor weather and visibility near Regina, Saskatchewan around 11 a.m. Tuesday morning. The driver was rushed to hospital.

The accident took place on a level section of Highway 46 just north of Highway 1, about 25 kilometres east of Regina. The RCMP spokesperson reported the crossing is marked with lights, but weather may have played a role.

“Road conditions were wet and sloppy and it’s foggy,” RCMP Cpl. Brian Jones said to the CBC. The bad weather, including a heavy overnight snowfall, may have contributed to the accident.

Most of the 93 cars in the train were empty bulk transit cars, used for moving agricultural products such as grains. The RCMP report that neither train or truck were transporting any hazardous materials.

Continue Reading