Dataset Viewer
Auto-converted to Parquet Duplicate
pred_label
stringclasses
2 values
pred_label_prob
float64
0.5
1
wiki_prob
float64
0.25
1
text
stringlengths
149
972k
source
stringlengths
37
43
__label__wiki
0.598301
0.598301
Accademia di Vino About ADV Chef Biography Owner Profile Anthony Mazzola, Managing Partner/Proprietor of Accademia di Vino, is a Bronx native with a rich Italian heritage and esteemed gastronomic background. Anthony brings his proven reputation for tradition and excellence to his latest concept, the spacious and evocative Accademia di Vino. Having won over New York’s east side with the first location, Anthony opened the second Accademia di Vino on Broadway in 2009. Influencing his future success, good food featured largely in Anthony’s early life. His parents emigrated from the town of Leonforte in southern Sicily. His mother, having cooked for a prominent Sicilian family before coming to America, and his father, proprietor of a fresh pasta, ravioli and salumeria store in the Bronx, laid the foundation for an innate love of food. “We never knew we were poor,” he recounts “there was always good food on the table, every night.” Always an entrepreneur, Anthony opened his first retail wine-and-liquor store by the age of 25, eventually amassing a total of eight retail wine-and-liquor stores in the tri-state area. The showcase among them was the highly regarded, and much frequented, Sutton Wine Shop on 57th and 1st Avenue. Deciding it was time to pursue a new goal he sold his retail operations and moved to Rome, Italy where he researched the idea of owning his own vineyard and producing his own wine. Over the next two years he traveled extensively, exploring the wines and foods unique to every region of Italy. Understanding that his soul would always be in Italy, but he belonged at home in New York, he returned. Eager to share his inspiration, he launched into restaurant ownership. First with Ouest, along with Chef Tom Valenti, he achieved an unprecedented success for fine dining on the Upper West Side. With an eye for a unique opportunity and knowing the importance of firsthand experience, Anthony then traveled throughout the southern U.S. experiencing its many forms of BBQ. As a result Big Bubbas was established at the Mohegan Sun Casino in Uncasville, CT, bringing authentic southern cuisine north of the Mason-Dixon Line. Next he returned to his roots and opened ‘Cesca on W. 75th Street, an upscale Italian dining experience that was an immediate success by both popular and critical standards. And today, with two Accademia di Vino locations joining ‘Cesca, all three New York restaurants benefit from Anthony’s annual trips back to Italy. He continues to explore the authentic Italian tastes and traditions that inspire exciting new additions to each menu. Make a date to get to know Accademia di Vino… and Anthony. He’ll be there to welcome you, so join us soon! Accademia di Vino is an Italian restaurant and wine bar located on Third Avenue at 63rd Street offering an impressive wine list of some 800 bottles and a dynamic wine-by-the-glass program with over 50 wines. There’s even a Wine School with weekly wine classes. And don’t miss the Accademia di Vino West-Side experience. Please plan to visit our Broadway location soon! Contact us for more information on either location: For our East-Side Accademia di Vino location, please contact Wine Director, Michael Doctor, at doctor@accademiadivino.com, or General Manager, John Fanning, at fanning@accademiadivino.com. For our West-Side Accademia di Vino location, please call Carlo Stanisci or David Patten at 212-787-3070. Anthony Mazzola Managing Partner/Proprietor Nutrition and Emotions: How income affects your food choice Places To Eat and Drinks in New York 1081 THIRD AVENUE © 2010 ACCADEMIA DI VINO
cc/2019-30/en_head_0024.json.gz/line1
__label__wiki
0.588273
0.588273
ExposeFacts Myths of Pakistani Election JUNAID AHMAD, junaidsahmad at gmail.com Ahmad is assistant professor at the University of Lahore in Pakistan, and Secretary-General of the International Movement for a Just World. See Ahmed’s interviews on The Real News. He said today: “With more than 100 million eligible voters, Pakistan is witnessing one of its most highly contested elections ever. And democratic elections are important here, since half the country’s history has been under military rule. “The cricketer-turned politician [Imran Khan] and his political party, PTI (‘The Movement for Justice’) stand a good chance in putting a significant dent in the PML(N) dominated by the Sharif family and their single party dominance of the influential Punjab over the past few decades. “In all of Western mainstream and even alternative media, there’s the simplistic and erroneous narrative advanced that claims Khan is just riding on the coattails of the military. It actually may be the reverse, i.e. the military is exploiting the popular political campaign of Khan. “But the Western political establishment, along with the rulers in New Delhi and Riyadh, love who they deem (not without merit) their businessman puppet-partner Nawaz Sharif — now jailed in Pakistan for being implicated in gross corruption. The Western press couldn’t seem to help itself in regurgitating nonstop this past week how this is the ‘dirtiest election’ ever in Pakistan’s history. In fact, it’s deemed so ‘dirty’ because the wrong guy, i.e. Khan, who has taken forceful positions against Pakistan’s involvement in the U.S./NATO ‘war on terror,’ stands a chance of winning or at least having his party gain enormously. “However, defeating PML(N)’s stranglehold over the political life of Pakistan’s most influential and populous province, the Punjab, is certainly a Herculean task for Khan and his PTI. “The other political parties, including secular ones like the PPP or ANP, as well as some religious parties, may become more significant in the context of a hung parliament where coalitions will be necessary.” Search News Releases Key term: By Date Range: Month January February March April May June July August September October November December Day 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Year 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 Month January February March April May June July August September October November December Day 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Year 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 Most Recent News Releases “Official Secrets” Highlights Lies of Iraq War Venezuela: “Humanitarian Intervention” That Isn’t Epstein: Protected Because He Is a Spy? — A Backgrounder Military Spending: * Pentagon’s Massive Accounting Scandal * Backing Saudi Aggression in Yemen NoMoreCamps.org Kamala Harris’ Claims About Her Record on Big Banks “Doesn’t Withstand a Moment’s Scrutiny” “Kamala Harris Was Not a ‘Progressive Prosecutor'” Biden’s Deceits on * Busing * Iraq War Trump-Putin Meeting: “Will U.S. Elites Give Détente With Russia a Chance?” Biden’s Record: Segregationists, Wall Street, War 1714 Franklin Street #100-133 ipa[at]accuracy.org Washington Office (journalist contact) 915 National Press Building
cc/2019-30/en_head_0024.json.gz/line2
__label__wiki
0.668041
0.668041
« Low-Level Employee At Nuke Tech Plant Steals Aluminum Tubes, Information About Uranium Enrichment To Sell To Foreign Buyers | Main | Terror Bombing Kills 50 In Pakistan, Including Chinese Workers » Bible-Level Mega-Flood Separated Britain From Europe Dude, those maps in the beginning of every Conan book? Totally real. A flood of biblical proportions cut the British Isles off from mainland Europe sometime between 450,000 and 200,000 years ago, according to a new study. The research, based on three-dimensional sonar mapping of the English Channel, provides the strongest evidence yet that a catastrophic megaflood broke a land bridge that once connected what is now Britain and France. "It is probably one of the largest floods ever identified," said Phillip Gibbard, a geographer at the University of Cambridge who wasn't involved in the study. At its peak, the flood would have discharged water at a rate of about 264 million gallons (a million cubic meters) a second, gushing at speeds of up to 62 miles (100 kilometers) an hour, the researchers say. This is roughly equivalent to ten times the combined flow rate of all the rivers in the world. The flood also marooned many animals and plants, so those species gradually evolved into different forms than their mainland cousins. And humans appear to have avoided the newly made island altogether, leaving it unoccupied for over a hundred thousand years. The great flood could help explain why Britain remained an uninhabited region for a large chunk of the archaeological record. "There seems to be a large gap in the evidence for human occupation [of Britain] during cold and warm phases from about 180,000 until about 60,000 years ago," said Nicholas Ashton, an archaeologist at the British Museum in London. "It wasn't until 60,000 years ago," Ashton said, "that humans—late Neanderthals—had the technological capabilities, such as more effective clothing and shelter, to survive the cold conditions."
cc/2019-30/en_head_0024.json.gz/line3
__label__wiki
0.894737
0.894737
Selling Exhibition of Key Modern British Sculpture at Robert Bowman Modern Robert Bowman Modern presents works by the key modern British sculptors. LONDON.- Robert Bowman Modern is holding a selling exhibition of Modern British Sculpture. On view until April 7, 2011, the show coincides with that of their neighbour the Royal Academy who is hosting its first 20th-Century British Sculpture exhibition for 30 years. Robert Bowman Modern presents works by the key modern British sculptors including Kenneth Armitage, Michael Ayrton, Jacob Epstein, Elizabeth Frink, Barbara Hepworth and Leon Underwood. The exhibition features a number of works by Jacob Epstein (1880-1959), one of the leading pioneers of Modern British Sculpture. In his lifetime he championed many of the concepts central to modernist sculpture, including ‘truth to material’, direct carving, and inspiration from so-called primitive art, all of which became central to twentieth-century practice. Among the highlights of the exhibition is a rare Epstein maquette for ‘Rush of Green’ commissioned by Lord Samuel for Bowater House, Knightsbridge, London. Property developer Harold Samuel built Bowater House between 1956 and 1958 at the beginning of the first post-war redevelopment of London. To commemorate the commission, Lord Samuel also requested Epstein cast four maquettes for Lady Samuel and their three children. This maquette is from the estate of Lady Samuel who said that work on the monumental sculpture was completed on the day of Epstein’s death, 19 August 1959. The original project drawings for this sculpture are in the Henry Moore Institute. Lord Samuel, the man behind the maxim; ‘There are three things you need in property, location, location and location’, was an avid art collector and connoisseur who built up one of the finest collections of Dutch and Flemish paintings in the UK, since bequeathed to the Mansion House art collection. Another highlight of the exhibition is Epstein’s portrait bust of Albert Einstein. Einstein posed for Epstein in 1933, sitting for him each day for two hours over a three day period before Einstein left to take up a professorship at Princeton. Epstein said of the encounter; ‘Einstein’s manner was full of charm and bonhomie…(he) appeared dressed very comfortably in a pullover with his wild hair floating in the wind. His glance contained a mixture of the humane, the humorous, and the profound. This was a combination, which delighted me. He resembled an ageing Rembrandt…‘ Epstein is undoubtedly the most versatile and famous portrait sculptor of the twentieth century. The Einstein bust is the most impressionistic of Epstein’s portraits partly as a result of the speed with which the work had to be done, but also because of a conscious decision to play up to the Rembrandt-esque humanity of Einstein’s head. The deeply broken surface, in which each modelling gesture is distinctly visible, results in a sculptural impasto. The portrait of Albert Einstein was first exhibited at Tooth’s in 1933. Two casts entered public collections within a year, one at the Fitzwilliam Museum and the other at the Tate. Further casts are now at the Hirshhorn Museum, Princeton University, London Science Museum, and Walker Art Gallery, Liverpool. Leon Underwood (1890-1975) has been called the father of the modern sculpture in Britain and Robert Bowman Modern is delighted to show ‘The Liar’, a unique bronze, cast by the artist himself in 1953. Like Epstein, Underwood drew his inspiration from Tribal Art. In 1928 he travelled in Mexico studying Mayan and Aztec sculpture and wrote several books on African Art. These influences are evident in this mask-like bronze. Although the development and range of Underwood’s work clearly show the importance of his achievements, his work has received a fraction of the acclaim that has been afforded to his pupil Henry Moore whom he taught at the Brook School of Art in Hammersmith, the college he founded in 1921. For Kenneth Armitage (1916-2002), the 1952 Venice ‘New Aspects of British Sculpture’ exhibition was ‘really the beginning of my professional life’. The show also featured work by Adams, Butler, Chadwick, Clarke, Meadows, Paolozzi and Turnbull, provoking intense interest and ushering in a new wave in British sculpture. Peggy Guggenheim, Elsa Schiaparelli, the Museum of Modern Art in Rome and MoMA all bought pieces at this seminal exhibition. Included in the Robert Bowman Modern exhibition is the maquette for ‘Diarchy’ which featured in Armitage’s one-man show at the Venice Biennale in 1958 where he won the David E. Bright Foundation Award. ‘Diarchy’ was purchased by the Tate in 1971. Two of the foremost modern British female sculptors, Barbara Hepworth (1903-1975) and Elizabeth Frink (1930-1993) are also represented in the exhibition. Hepworth revealed her move towards abstraction at her exhibition at Tooth’s in 1932. This became the abiding direction of her work, epitomised by the pioneering piercing of the block. A further highlight in the exhibition is the only Barbara Hepworth sculpture ever to be executed in glass. ‘Two Forms (Gemini)’ was commissioned by the Carborundum Company of Niagara Falls, New York, and created at the Barthmann Cristall Foundry in Wolfach, Germany. ‘Horse and Rider’ by Elizabeth Frink was originally commissioned in 1974 by de Beers as the trophy (complete with diamonds) for the King George VI and Queen Elizabeth Stakes- Britain’s most prestigious annual open-age flat race, which takes place at Ascot in July. Frink’s affection for horses stemmed from her Suffolk childhood. Her father was a brilliant horseman, a good polo player and an amateur jockey. One of the leading lights of the post-war school of British sculptors, Frink’s work is characterised by her scarred surfaces created by repeatedly coating an armature with wet plaster; each coating is distressed and broken, eliminating detail and generalising form. The Modern British Sculpture show responds to the increasing interest in this genre and follows the success of Wild Thing! and the Henry Moore retrospective at the Tate. Modern British Sculpture has continued to perform strongly at auction even creating record prices in the dark days of the recession. In 2008 Henry Moore’s Draped Reclining Woman sold for a record price of over four million pounds. Major Exhibition of Spanish Art at the Dawn of the 20th Century at Fondation de l'Hermitage Tasende Gallery Presents Exhibition of Sculptures and Drawings by Mark di Suvero Art Institute of Chicago Announces Significant Acquisition of Seminal Kazimir Malevich Painting Louvre Hosts a Group of Sculptures by Leading British Contemporary Artist Tony Cragg Rembrandt Portrait, Which Sold at Christie's in 2009, to Be Offered for $47 Million British Sculpture Survey at the Royal Academy in London Sharply Divides Critics Joel and Lila Harnett Museum of Art Presents Pilgrimage and Faith: Buddhism Christianity and Islam Brooklyn-Based Artist and Photographer Lorna Simpson Opens Solo Exhibition at Brooklyn Museum Exhibition of Drawings and Sculptures by Italian Artist Marisa Merz at Gladstone Gallery The Romanovs, Tsars and Art Collectors at the Pinacotheque de Paris Auction Record Set for Titian at Sotheby's Old Master Paintings Sale in New York Statues Devastated in World War II Go on Show at the Pergamon Museum in Berlin Milwaukee Art Museum, Carnegie Museum of Art Wager Masterpiece on Super Bowl XLV Team of Researchers Says Humans May Have Left Africa Earlier than Thought Bronzino & Portraits of Power Exhibition at the Palazzo Strozzi Attracts 230,000 Malmo Konsthall Presents Exhibition Presents Photographs by Ake Hedstrom Paul Kasmin Presents Dual Exhibition of New Works and Iconic Paintings by Kenny Scharf Indeterminate Stillness: Berkeley Art Museum Exhibition Looks at James McNeill Whistler Trove of Previously Unseen Letters Written by J.D. Salinger Reveal His Human Side British Museum and Rio Tinto Announce Australian Season: Broad Program of Exhibitions Italy's Largest and Most Important Art Fair Arte Fiera Art First Celebrates Contemporary Art Henry Scott Tuke Painting of a Sleeping Sailor to Sell at Bonhams Museo d'Arte Moderna di Bologna Presents Matthew Day Jackson Exhibition The Bronx Museum of the Arts Presents Exhibition Exploring Work of Elizabeth Catlett Christie's 2010 Global Art Sales Total $5.0 Billion, Highest Sales Total in History An Evening Sale of South African Masterpieces at Bonhams in London Jon Stewart to Join 9/11 Memorial Foundation Board
cc/2019-30/en_head_0024.json.gz/line9
__label__cc
0.721044
0.278956
Patent Office finds voice, calls for software patent sanity The US Patent and Trademark Office is a convenient whipping boy for problems with the patent system. By Timothy B. Lee | Published: July 28, 2008 - 10:25AM CT The USPTO famously approved the junk patents at the heart of the legal battle between Research in Motion and a patent-trolling firm called NTP. The USPTO belatedly recognized its mistake and began invalidating the patents, but didn't finish the job in time to save RIM from being forced to pay $612.5 million to avoid having its whole BlackBerry network shut down. Perhaps shaken by the negative publicity generated from that case and others, the USPTO seems to have gotten religion on patent quality. Over the last year, the courts have heard a series of cases in which the Patent Office has rejected software-related applications. The legal theories advanced by the Patent Office in these cases are causing consternation among software patent supporters. In an article last week at Patently-O, law professor John Duffy warns that the Patent Office has staked out positions that, if accepted by the courts, would amount to the de facto abolition of software patents. He's right that the Patent Office has become increasingly hostile to software patents in the last couple of years. However, it's far from clear that the end of software patents is imminent. And Duffy is dead wrong to suggest that fewer software patents would be bad for innovation. [ARS Technica...] [Comments...]
cc/2019-30/en_head_0024.json.gz/line14
__label__cc
0.672561
0.327439
Banff Book Discussion Weekend 2020 May 22-24 59th Annual Terry Fallis Jessica Shattuck Robertson Davies Facilitator’s Information What does a Facilitator Do? Facilitator Tips Banff Centre Accommodation Society’s Bylaws Home The Reluctant Fundamentalist The Reluctant Fundamentalist “Extreme times call for extreme reactions, extreme writing. Hamid has done something extraordinary with this novel.”—Washington Post “At a café table in Lahore, a bearded Pakistani man converses with an uneasy American stranger. As dusk deepens to night, he begins the tale that has brought them to this fateful encounter . . . Changez is living an immigrant’s dream of America. At the top of his class at Princeton, he is snapped up by an elite valuation firm. He thrives on the energy of New York, and his budding romance with elegant, beautiful Erica promises entry into Manhattan society at the same exalted level once occupied by his own family back in Lahore. But in the wake of September 11, Changez finds his position in his adopted city suddenly overturned, and his relationship with Erica shifting. And Changez’s own identity is in seismic shift as well, unearthing allegiances more fundamental than money, power, and maybe even love. Mohsin Hamid was born in 1971 in Lahore, Pakistan, and moved to the US at the age of 18 to study at Princeton University and Harvard Law School. He then worked as a management consultant in New York, and later as a freelance journalist back in Lahore. His first novel was Moth Smoke (2000), winner of a Betty Trask Award and shortlisted for the PEN/Hemingway Award. Moth Smoke was made into a television mini-series in Pakistan and an operetta in Italy, and was a New York Times Notable Book of the Year in 2000. In 2007 his second novel, The Reluctant Fundamentalist, was published and shortlisted for the 2007 Man Booker Prize for Fiction. In 2008, it won the South Bank Show Annual Award for Literature and was shortlisted for the 2008 Commonwealth Writers Prize (Eurasia Region, Best Book) and the 2008 James Tait Black Memorial Prize (for fiction). A short story based on the novel was also published in The Paris Reviewin 2006. Mohsin Hamid discussing his novel The Reluctant Fundamentalist History of the Banff Book Discussion Weekend Historical Book List 1961 – 2019 Katherena Vermette Video Elisabeth Hay video 2018
cc/2019-30/en_head_0024.json.gz/line17
__label__cc
0.664205
0.335795
City Tallahassee Land Area 96 mi2 Valdosta, Albany, Jacksonville Listings Near Tallahassee, FL Florida is a state located in the Southeastern United States. It borders Alabama to the northwest and Georgia to the north. Much of the state's land mass is a large peninsula with the Gulf of Mexico to the west, the Atlantic Ocean to the east, and the Florida Straits and Caribbean to the south. Florida was admitted as the twenty-seventh U.S. state in 1845, after a three hundred year period of European rule. With an area of 53,900 square miles, it is ranked twenty-second in size among the fifty U.S. states. Florida has the longest coastline in the contiguous United States, encompassing approximately 1,350 miles. The state has four large urban areas, a number of smaller industrial cities, and many small towns. Florida is nicknamed the "Sunshine State" because of its generally warm climate-subtropical in the northern and central regions of the state, with a true tropical climate in the southern portion. The United States Census Bureau confirmed that the state population was 18.8 million on April 1, 2010, ranking Florida as the fourth most populous state in the U.S. Though Tallahassee is the state capital, Jacksonville is the largest city, and the South Florida metropolitan area is the largest metropolitan area. http://en.wikipedia.org/wiki/Florida http://www.wolframalpha.com/input/?i=tallahassee,+fl
cc/2019-30/en_head_0024.json.gz/line18
__label__wiki
0.729216
0.729216
Terry Precision Bicycles for Women and Advanced Sports, Inc. Sign License Agreement PHILADELPHIA (September 23, 2009) - Terry Precision Bicycles announced today that it has signed a license agreement with Advanced Sports, Inc. (ASI) to distribute an expanded line of women's performance and lifestyle bicycles. Terry, the premier women's cycling company, has been at the forefront of women-specific design for over two decades. ASI is an established leader in the design, development and production of bicycles producing more than 250,000 units worldwide in 2008 under its primary brands Fuji, SE, Kestrel and Breezer, as well as various private label models. ASI will manufacture, sell and distribute the Terry line of women's bicycles worldwide that will be available for sale Spring 2010. A preview of the collection will be presented to retailers and the media at Interbike in Las Vegas, September 23, 2009. Look for Terry at booth #3207 and ASI at #1825. "Partnering with Advanced Sports, a leader in bicycle distribution and sourcing, is a strategic decision that will help us re-launch our bikes to tie in with our successful line of clothing and accessories," says Liz Robert, new CEO of Terry. "We expect these new bikes to complement our existing apparel and accessory lines and provide performance to our consumers who participate in cycling activities." Terry Precision Bicycles, founded by industry pioneer Georgena Terry, has been producing women's-specific bicycles longer than any manufacturer in the industry. Terry's designs for frames and saddles have won numerous awards for innovation, style and comfort. Georgena will continue to be the driving force behind the line's design moving forward. The first ASI-produced models that will launch at Interbike include the Susan B, the Symmetry, and the Tailwind. The Susan B, Terry's hybrid bike, has reworked componentry to fit with today's current market trends. The Susan B will be available in five sizes from 11" to 20". The Symmetry, a fitness road bike, which will be sold in two versions - a flat bar or drop bar configuration - and the Tailwind, a performance road bike, will be available in six sizes from 40cm to 58cm. All four models feature Terry's signature comfort geometry and are spec'd with current components and materials. Plans for 2011 call for a wider range of women's products, including a custom carbon frame. "Our focus and our strength is designing, producing and selling high quality bicycles," says Patrick Cunnane, president of Advanced Sports, Inc. "Terry has built a fierce brand loyalty around fit and comfort and the bicycles we design will stay true to these core values." In addition to manufacturing the bicycles, the license agreement gives ASI the ability to sell the products through its existing retail sales channel. ASI will also handle warranty for Terry Bicycles produced post agreement. About Terry Precision Bicycles Terry Precision Bicycles was founded in 1985 by Georgena Terry. The company was purchased in April of this year by Elisabeth Robert, former CEO of Vermont Teddy Bear Company. In addition to women-specific bicycles, Terry designs and markets a comprehensive apparel line for women and a revolutionary line of comfort saddles for men and women. Information about Terry products can be found on its website www.terrybicycles.com. About Advanced Sports, Inc. Advanced Sports, Inc. (ASI) is a privately held corporation located in Philadelphia, Pennsylvania with distributors in over sixty-five countries. Operating in the U.S. through the independent bicycle dealer network (IBD), ASI markets a full line of high performance bicycles including road, mountain, women's, comfort, BMX and recreational bicycles under the Fuji, Kestrel, SE and Breezer brands. For more information, visit:fujibikes.com, sebikes.com, kestrelbicycles.com, breezerbikes.com. Sony’s PlayStation 3 game consoles will be able to stream movies and TV shows from Netflix Last night, Sony rolled out the 3.0 firmware for the Playstation 3, just in time for the launch of the new, lower priced "PS3 Slim. A little off topic, Guys... I have a question. Two days ago I trapped on this site: [url=http://www.rivalspot.com]Rivalspot.com - Wii tournaments for money[/url] They say you can play online Madden game tournaments on any console for cash... had anyone tried that before? Looks like a cool idea... Are there any other sites where you can play sports games for real moneys? I Googled and found only Bringit.com and Worldgaming.com but it looks these guys don't specialize in sport gamez. Any suggestions? A little off topic, Guys... I have a question. Yesterday I looked at this site: They say you can play online NHL game tournaments on any console for cash... had anyone tried that before? Looks like a cool idea...
cc/2019-30/en_head_0024.json.gz/line19
__label__wiki
0.713294
0.713294
Atlanta's Black History Maker Stories and highlights of the best black history makers in Atlanta About The Project & Writer Men History Makers Joseph Lowery is more than a history maker; he is a warrior who took up the sword of civil rights and made monumental history Posted By: Bunnie Jackson-Ransom 0 Comment I wrote this story in 2015. It is time for an update. Reverend Dr. Joseph E. Lowery, age 96 years young, is still giving advice and making more history today than he did in his hay-day. I discovered that Reverend Lowery loves neck bones, and every now and then I prepare this dish, the way my grandmother did, and I share it with my dear friend. The Reverend Dr. Joseph Echols Lowery is my neighbor and my friend. As a matter of fact, his family is near and very dear to me and my family. We make our homes in Southwest Atlanta and we are neighbors. I realize that nothing I have mentioned so far makes him the history maker that he is; however, it clearly shows the readers that I am partial to this man and his legacy. Minister, civil rights leader, social activist, preacher, husband and father, Joseph Lowery has fought against bigotry, prejudice and discrimination wherever he saw it imposed against the downtrodden, the undeserved, poor people, and Black people for most of his lifetime. His actions have truly changed the course of history. Born on October 6, 1921 in Huntsville, AL, we must give the credit for getting Joseph started on the right path to his parents, Leroy and Dora Lowery, a businessman and a teacher. He attended middle school in Chicago while staying with relatives, but he returned to Huntsville where he completed William Hooper Council High School. He grew up in the segregated South and learned firsthand the hardships and cruelty that many African-Americans experienced. At the age of 12, he was assaulted by a white officer as they attempted to enter and exit through the same door. Lowery matriculated at Knoxville College and Alabama A&M College, Paine Theological Seminary and the Chicago Ecumenical Institute. He was ordained in the Methodist Church in 1952. Lowery found his soul-mate Evelyn Gibson and they were married in 1947. A civil rights activist and leader in her own right, she was the sister of the late Rev. Dr. Harry Gibson, an activist, and Elder member of the Northern Illinois Conference of the United Methodist Church, Chicago Area. She passed away on September 26, 2013. They had three daughters: Yvonne Kennedy, Karen Lowery, and Cheryl Lowery; and a host of grandchildren. As an ordained Methodist minister, Lowery brought his new wife to Alabama where he served as pastor for the Warren Street United Methodist Church in Mobile. He became active in the evolving civil rights movement and began to follow his God-given purpose toward fighting against social injustice. He headed the Alabama Civil Affairs Association, the organization which led the movement to desegregate buses and public accommodations. In 1957, Lowery worked with the Reverend Dr. Martin Luther King, Jr., Ralph David Abernathy, and others to form the Southern Christian Leadership Conference (SCLC). He became the organization’s vice president and helped the group with efforts to fight for equality through nonviolent actions. In 1961, he was one of four Alabama ministers (Lowery, Abernathy, Solomon Seay) sued for libel by a Montgomery commissioner because of a 1960 newspaper ad that made critiques of the city’s police department. Their assets were taken when the court ruled against the SCLC members. After an appeal, the case, was overturned by the U.S. Supreme Court in 1964. Lowery moved to Birmingham, Alabama, in 1964, and served as the pastor for St. Paul’s Church. Continuing to speak out about civil rights, he participated in copious protests including the 1965 marches from Selma to Montgomery. He was chosen by Dr. King to Chair the delegation delivering the demands of the Selma-to-Montgomery March to Alabama Governor George Wallace. These demonstrations were part of the campaign for voter’s rights and a response to the killing of Jimmie Lee Jackson, a civil rights protestor, by an Alabama state trooper. The Black Leadership Forum, a group of Black advocacy leaders and organizations, was yet another organization co-founded by Lowery which was dedicated to protesting Apartheid in South Africa through the end of the white-minority rule. Lowery was one of the first Black men arrested at the African Embassy in Washington, D. C. during the free South Africa movement. In 1968, the same year that Martin Luther King Jr. was assassinated, Lowery took over as pastor at the Central UM Church in Atlanta. He also became the chairman of the SCLC around this time, serving as one of the organization’s leaders who spoke with the voice of the people. In 1977, Lowery won the presidency of the SCLC over more radical factions. He helped revitalize the organization, bringing in new members and focusing on such pressing issues in the African-American community as police brutality and human rights. Lowery was called to a new United Methodist Church in the mid-1980s. As the pastor of the Cascade United Methodist Church, he helped increase the size of the congregation and improve its financial situation. Lowery remained politically and socially active, campaigning against the ills of the city. His sermons in the churches around Atlanta were illustrious and most notable – not a vacant seat in the audience. (I know this because I was one who squeezed myself in to the pews to witness this skillful speaker.) Even after his retirement in 1992, Lowery continued to fight for causes against social injustice and for the rights of others. He was extremely active in the effort to remove the Confederate symbols from the Georgia state flag. While chairing the MARTA Board of Directors, he was the reasonable voice in the community’s planning process as the city of Atlanta prepared for 1996 Olympics. President Barack Obama, the nation’s first African-American president, selected Lowery to deliver the benediction at his inauguration in January, 2009. In his speech, Lowery quoted from the “Negro National Anthem” (Lift Every Voice and Sing) and called for the president and the rest of the nation “to work for that day. . . when justice will roll down like waters and righteousness as a mighty stream.” In 2009, President Obama named Reverend Dr. Joseph E. Lowery to receive the Presidential Medal of Freedom. America’s highest civilian honor, the Medal of Freedom is awarded to individuals who make an especially meritorious contribution to the security or national interests of the United States, world peace, cultural or other significant public or private endeavors. Rev. Lowery is a member of Alpha Phi Alpha Fraternity Inc. and attends Cascade United Methodist Church. He has received numerous accolades for his work, including Ebony magazine’s Black Achievement Award. Clark Atlanta University established the Joseph E. Lowery Institute for Justice and Human Rights in his honor. He is known as the “Dean of the Civil Rights Movement.” The City of Atlanta renamed Ashby Street to Joseph E. Lowery Boulevard. His footprints are embedded in the Civil Rights Walk of Fame housed near the Martin Luther King Jr National Historic Site. The NAACP gave him a lifetime achievement award. He has received the Martin Luther King Jr. Center’s Peace Award; and the National Urban League gave him the Whitney Young Jr. Lifetime Achievement Award; and he was awarded the Fred Shuttlesworth Human Rights Award from the Birmingham Civil Rights Institute. He has been awarded many honorary doctorate degrees from prestigious colleges and universities. Not finished with what God called him to do, Lowery founded the Georgia Coalition for the People’s Agenda which continues to meet every Tuesday at noon in the SCLC offices on Auburn Avenue in Atlanta. He shows up at community events and participates in worthy causes, and primarily dedicates and reserves his efforts to help sustain the Lowery Institute. Dr. Lowery recently celebrated his 94th birthday with a host of friends and family in October, 2015 at the Delta Flight Museum, a fundraising effort to promote and sustain the work of the Lowery Institute. Happy Birthday Dr. Lowery . . . and many more. Genuinely loved and revered by countless, Reverend Lowery is one of our treasures. History will reflect his genius and his service to mankind and woman kind alike. What a life! What a legacy! What a man! I agree, God is not finished with you yet! Georgia “Gee Gee” Dickens – A One-Of-A-Kind History Maker Andrew Patterson – A History Maker who knows how to make “good” history. A Recent Visit to the Legacy Museum and The National Memorial for Peace and Justice Museum in Montgomery Young Black History Maker Ashley Derby is making history at Chick-fil-A Copyright © 2019 Atlanta's Black History Maker. Theme: ColorNews by ThemeGrill. Powered by WordPress.
cc/2019-30/en_head_0024.json.gz/line20
__label__wiki
0.74467
0.74467
Autopsy reveals Michigan shooting victim McBride shot in face Civil rights groups have called for vigorous prosecution, saying McBride was targeted because of race November 11, 2013 11:16PM ET In this file photo, a mourner holds an obituary displaying a picture of shooting victim Renisha McBride during her funeral service in Detroit, Mich. on Nov. 8 Joshua Lott/Reuters An autopsy on a 19-year-old woman allegedly killed by a homeowner on a suburban Detroit porch – where she had reportedly gone to seek help after a car crash – confirmed that she died of a gunshot wound to her face. Renisha McBride, of Detroit, was fatally shot Nov. 2 in predominantly white Dearborn Heights. Civil rights groups have called for a vigorous prosecution in the case, saying that McBride, a black woman, was targeted because of her race. The homeowner, who has not been publicly named, has told investigators that he thought someone was trying to break into his home and that he accidentally discharged his shotgun. The Wayne County Medical Examiner's Office report, released Monday, said McBride's death was a homicide. Prosecutors said they were reviewing the case and deciding whether to charge the homeowner, a 54-year-old man. Messages seeking comment were left with police and the homeowner's attorney. Time to tame the dietary supplement industry by Lynn Stuart Parramore Iran is negotiating with the wrong US officials by Christopher A. Bidwell
cc/2019-30/en_head_0024.json.gz/line23
__label__wiki
0.957402
0.957402
Protesters demand action following the kidnapping of more than 200 girls in Nigeria at a demonstration at Union Square in New York on Saturday. Yinka Ajakaiye for Applause Africa Yinka Ajakaiye for Applause Africa Global outrage over kidnapping of Nigerian schoolgirls Activists with #BringBackOurGirls lambaste Nigerian government’s perceived inaction in the face of girls’ abductions May 6, 2014 3:18PM ET by Lisa De Bode @lisadebode Google+ Dozens of protesters rallied at the Nigerian Embassy in Washington on Tuesday against the kidnapping of 276 girls, and their alleged sale as "brides" for as little as $12, with the hope of pressuring authorities to take action against Boko Haram, the armed group responsible for their abduction. They gathered outside the embassy, dressed in red and holding signs that read “Bring back our girls,” and “276 stolen dreams.” Molly Alawode, a leader of the Bring Back Our Girls campaign, told Al Jazeera the protests would continue “if the government doesn’t live up to its duty of service and protect the Nigerian population. “We think it’s really important to send this message today to let him [President Goodluck Jonathan] and other leaders know that the world is really watching,” she added. On April 14, 276 girls were kidnapped from their dormitories at the Government Girls Secondary School in Chibok, a city in the northern state of Borno. On Monday, the leader of Boko Haram, an armed group that seeks to create an Islamic fundamentalist state in Nigeria’s north, claimed responsibility for the attack and said he would sell the girls as slaves. “I abducted your girls. I will sell them in the market, by Allah,” Abubakar Shekau said, according to Agence France-Presse, which reported it had obtained a video from the group. The rally comes after hundreds of protesters at Union Square in New York staged a similar demonstration on Saturday. The demonstrators, in solidarity with the parents of the missing girls, use the hashtag #BringBackOurGirls to raise awareness about the kidnapping. Michael Ikotun, who is involved with the campaign, said its goal is twofold. “We want to know exactly how many girls were kidnapped, the names of these girls, [and] the actual steps being taken to bring [them] back,” he said. “We want the U.S. government to be involved.” World leaders, meanwhile, will gather for two days starting May 7 for a meeting of the World Economic Forum in Nigeria’s capital, Abuja. The event has local authorities focused on international concerns about the country’s security and military instability. Activists are using the WEF meetings to highlight what they claim are a tepid government response to the kidnappings. “It’s very rare in a country to have more than 200 girls kidnapped, and it’s business as usual,” Ikotun said. A day after the April kidnappings, Nigerian authorities claimed that the number of abducted was just over 100 young women, and that most had already been rescued. But that number later rose, and the military was forced to recant its statement and acknowledge that it had not rescued any of the girls. On Tuesday, three weeks after the abduction, suspected Boko Haram members kidnapped eight more girls ages 12 to 15 from a village in northeastern Nigeria, police and residents said. Protesters have also organized marches in London and Los Angeles in the past days. In Germany, an online petition created by Nigerian student Ify Elueze, which calls on Jonathan and world leaders to bring the girls home, gathered more than 200,000 signatures in less than a week. Its signatories include supporters from South Africa, Canada and the United Kingdom. “It started because I believe everyone feels the pain, and all you want is for these girls to be brought back,” Elueze said. “And I really hope that this would create awareness, which would ultimately bring them back.” With wire services Anger swells against Nigeria government in response to girl abductions Three weeks after the abduction of hundreds of schoolgirls, protests have erupted against perceived state fecklessness. Boko Haram forcing kidnapped girls to marry, rights group says Protesters decry weak government response as US offers help in locating students who have been missing for two weeks. Fears mount that Boko Haram could bring Nigeria to the brink As government closes schools in response to targeted bombings on students, analysts say violence likely to increase.
cc/2019-30/en_head_0024.json.gz/line24
__label__wiki
0.837669
0.837669
Leah Mahan Leah Mahan is an independent documentary filmmaker whose work has been nominated by the Directors Guild of America for Outstanding Directorial Achievement. She has been a fellow at the Sundance Institute Documentary Editing and Story Lab and the Producers Institute for New Media Technologies. Leah’s film Sweet Old Song (2002) was featured on the PBS series P.O.V. and was selected by film critic Roger Ebert to be screened at his Overlooked Film Festival (“Ebertfest”). The film tells the story of Howard “Louie Bluie” Armstrong, an old-time string band musician who undertakes a bittersweet journey with the woman he loves. In 2013 she completed Come Hell or High Water: The Battle for Turkey Creek, about a group of determined Mississippians who struggle to save their endangered Gulf Coast community in the face of rampant development, industrial pollution and disaster. She worked with Gulf Coast NGOs to develop a related community journalism project titled Bridge the Gulf. Leah began her career as a research assistant for filmmaker Henry Hampton on the groundbreaking PBS series on the civil rights movement Eyes on the Prize. A sequel to her first film, Holding Ground: The Rebirth of Dudley Street (1996), was completed in 2013. The films tell the story of a vibrant community organization that transforms a devastated Boston neighborhood through grassroots organizing. Leah’s work has been supported by the Sundance Institute Documentary Fund, Independent Television Service, Ford Foundation and W.K. Kellogg Foundation. She holds a BA in anthropology from Cornell University and an MFA in Cinema from San Francisco State University. She lives in the San Francisco Bay Area with her husband and their two children. Leah’s Website Leah’s Facebook Leah’s Twitter
cc/2019-30/en_head_0024.json.gz/line25
__label__wiki
0.809296
0.809296
“The Future of Warfare Is Warfare in Cyberspace,” NSA Declared Bernd Pulch in BERND PULCH, THE NATIONAL SECURITY, THE NATIONAL SECURITY AGENCY (NSA) May 4, 2013 April 23, 2018 13,606 Words Washington, D.C., April 26, 2013 – Since at least 1997, the National Security Agency (NSA) has been responsible for developing ways to attack hostile computer networks as part of the growing field of Information Warfare (IW), according to a recently declassified internal NSA publication posted today by the non-governmental National Security Archive (“the Archive”) at The George Washington University. Declaring that “the future of warfare is warfare in cyberspace,” a former NSA official describes the new activity as “sure to be a catalyst for major change” at the super-secret agency. The document is one of 98 items the Archive is posting today that provide wide-ranging background on the nature and scope of U.S. cyber activities. Activities in cyberspace — both defensive and offensive — have become a subject of increasing media and government attention over the last decade, although usually the focus has been on foreign attacks against the United States, most notably the Chinese government’s reported exploitation of U.S. government, commercial and media computer networks. At the same time, the apparent U.S.-Israeli created Stuxnet worm, designed to damage Iranian centrifuges, has put the spotlight on the United States’ own clandestine cyber efforts. The NSA’s new assignment as of 1997, known as Computer Network Attack (CNA), comprises “operations to disrupt, deny, degrade or destroy” information in target computers or networks, “or the computers and networks themselves,” according to the NSA document. Today’s posting by the Archive highlights various aspects of U.S. cyberspace activities and concerns going back to the late 1970s. The documents — obtained from government and private websites as well as Freedom of Information Act requests — originate from a wide variety of organizations. These include the White House and National Security Council, the National Security Agency, the Departments of Defense, Energy, and Homeland Security, the military services, the General Accounting/ Government Accountability Office, and the Congressional Research Service — as well as three private organizations (Project 2049, Mandiant Corporation, and Symantec). Source: Department of Homeland Security (see Document 52). Among the highlights of the documents are: The NSA’s earlier concerns about the vulnerability of sensitive computer systems to either viruses or compromise through foreign intelligence service recruitment of computer personnel (Document 1, Document 2, Document 3, Document 4, Document 9) The Secretary of Defense’s March 1997 authorization of the National Security Agency to conduct computer network attack operations (Document 11) Detailed discussions of Chinese computer network exploitation activities (Document 66, Document 79, Document 83) Analyses of the Stuxnet worm (Document 40, Document 42, Document 44, Document 88) Extensive treatments of intelligence collection concerning U.S. technologies through computer network exploitation (Document 18, Document 55, Document 63) Cyberspace and U.S. National Security By Jeffrey T. Richelson In an October 2012 speech (Document 78), then-Secretary of Defense Leon Panetta told a group of business executives that “a cyber attack perpetrated by nation states [or] violent extremist groups could be as destructive as the terrorist attack on 9/11,” and raised the prospect of a “cyber Pearl Harbor.” In his February 2013 State of the Union address, President Barack Obama asserted that “our enemies are … seeking the ability to sabotage our power grid, our financial institutions, our air traffic control systems.” Later that month, Director of National Intelligence James R. Clapper led off his annual threat assessment (Document 90) appearance before the Senate Select Committee on Intelligence with a discussion of the Intelligence Community’s assessment of the cyber threat.1 Stuxnet: “The world’s first precision cybermunition.” Source: Department of Homeland Security (see Document 52) Concern about the potential damage of cyber attack did not originate in the current administration. Even before the establishment of the computer connectivity of the current Internet-era, there was concern, including in the National Security Agency, about the threat of computer viruses (Document 1, Document 2, Document 3, Document 4, Document 5, Document 6) or the vulnerability of computer systems due to recruitment efforts by hostile intelligence services (Document 9). More recently, the William J. Clinton and George W. Bush administrations focused on the connection between cyberspace and national security, issued policy directives, and considered and/or authorized both public and covert actions. Occasionally, some of those concerns have been met with skepticism. Critiques have included the assertion that the very structure of the Internet means it is not subject to a ‘Pearl Harbor’ type attack — that is, an attack at single point. The association of power outages in the northeastern United States in 2003 and Brazil in 2007 with cyberattacks has been challenged by reviewers and experts — who point to studies that concluded there were other, more mundane, causes. One writer has asserted that cyberwar is not here, and that it is not coming. Additional issues that have been raised include the lack of disclosed evidence with regard to more extreme claims concerning the threat, the dangers of threat inflation (including facilitating the expenditure on ‘cyber pork’), and the extent to which the costs of other types of criminal activity (such as car theft) dwarf the cost of cyber crime.2 What is indisputable, however, is the dramatic increase in attention — both in the U.S. Government and private industry — to activities in cyberspace in the last decade — which has been reflected in both media coverage and the release of private and government documents. Attacks & Exercises Source: Defense Science Board. See Document 81. Significant attention has been devoted, in both the classified and unclassified realms, to actual attacks as well as exercises that have sought to determine the vulnerability of key government and infrastructure systems to attack. The Government Accounting Office (renamed the Government Accountability Office in 2004) reported (Document 6) that between April 1990 and May 1991, a period that encompassed Operations Desert Shield and Desert Storm, computer hackers from the Netherlands penetrated 34 Department of Defense sites. According to that report, the hackers were able to access “unclassified, sensitive information” concerning military personnel, logistics, and weapons systems development. The report also asserted that, particularly during times of international conflict, “such information … can be highly sensitive.” In March and April 1994, according to GAO reports (Document 10a, Document 10b), the Air Force’s Rome Laboratory, in upstate New York, was targeted by a pair of hackers (a 16-year old British student and a 22-year old Israeli technician) who, using “Trojan Horse” and “sniffer” programs, managed to take control of the lab’s networks. In addition to taking all of the lab’s 33 subnetworks offline for several days, the hackers also stole air tasking order research data and gained access to systems at NASA’s Goddard Space Flight Center, Wright Patterson Air Force Base, and a variety of defense contractors. In February 1998, several Department of Defense networks were attacked through a commonly understood vulnerability in the Solaris (UNIX-based) computer system — the investigation of which was designated SOLAR SUNRISE. The attack involved probing Defense Department servers to determine if the vulnerability existed, and then exploiting it — entering the system and planting a program to collect data. The hackers, ultimately discovered to be two California high school students, also mounted at least a second intrusion to extract data from the penetrated computers.3 In 2003, a series of computer intrusions were directed against the U.S. Defense Information Systems Agency (DISA), the U.S. Redstone Arsenal, the Army Space and Strategic Defense Command, and several DoD contractors – but they apparently went undetected for several months. That series of intrusions was labeled TITAN RAIN, and Defense Department investigators believed it to have originated in China. In June 2006, Department of Energy officials acknowledged that the names of and personal information of more than 1,500 National Nuclear Security Administration (NNSA) employees had been stolen due to network intrusion that apparently began in 2004.4 Another set of attacks that attracted attention (Document 27) was directed against former Soviet-controlled territories, and was widely believed to have been the work of the Russian government. On July 20, 2008, the Georgian president’s website was subjected to a denial-of-service attack. On August 8, a coordinated, distributed denial-of-service attack occurred on other Georgian government websites. At that time, Russian forces were engaged in combat with Georgian forces. Additional cyber attacks on Lithuanian and Kyrgzstan targets took place in June 2008 and January 2009, respectively. The attack on Lithuanian websites occurred three days after that country passed legislation outlawing the use of Soviet and communist symbols, while the January 2009 attack took place on the same day that Russia tried to pressure Kyrgyzstan to revoke U.S. access to the Bishkek airbase being used as a transit point for supplies to Afghanistan.5 Since that time there have been numerous reports of cyber incidents. Included have been a series of attacks on global energy targets, dubbed NIGHT DRAGON, a 2012 cyber attack on the Saudi Arabian state-owned Aramco oil company, and cyber attacks on U.S. banks and companies — attacks alleged to have been the responsibility of Iran.6 Along with the actual intrusions that have been taking place for over two decades, the United States has also conducted a number of exercises and studies in an attempt to assess the extent of computer network vulnerability. The first exercise, designated ELIGIBLE RECEIVER, was conducted over 90 days in 1997, and involved a Red Team consisting of 35 individuals. Simulated, and apparently successful, cyber attacks were made against government and private power and communications networks in Oahu, Los Angeles, Colorado Springs, St. Louis, Chicago, Detroit, Washington, D.C., Fayetteville, and Tampa. The head of the Pentagon’s Joint Task Force – Computer Network Defense, wrote that the exercise “clearly demonstrated our lack of preparation for a coordinated cyber and physical attack on our critical military and civilian infrastucture.”7 A subsequent exercise, designated LIVEWIRE, was conducted by the Department of Homeland Security. In 2005, the CIA’s Information Operations Center conducted a three-day exercise, codenamed SILENT HORIZON. The objective of the exercise was to practice defending against a cyber attack that would be on the same scale as the September 11, 2001, events, and would target both governmental and private sectors.8 Intelligence and Threat Assessments Intelligence/threat assessments concerning cyberspace include estimates of the current and projected future cyber capabilities and activities of a variety of nations and groups. They can also include assessments of the specific threats faced by government and private organizations in relation to the current state of cyber security. In late 2012 and early 2013, several press sources reported that a national intelligence estimate focused on worldwide cyber activities had either been completed or was in the process of completion. An earlier estimate was produced in February 2004: NIE-2004-01D/I, Cyber Threats to the Information Infrastructure. An additional national intelligence product was produced for the Office of the Director of National Intelligence (ODNI) by the Intelligence Science Board – a January 2008 report titled Technical Challenges of the National Cyber Initiative. 9 None of those products has been released, even in redacted form. Estimates and assessments which have been released include those produced by the Congressional Research Service, the Defense Security Service, a ODNI component, and a contractor for the U.S.-China Security and Economic Review Commission. In 2007, the CRS examined (Document 24), inter alia, examples of vulnerabilities that terrorists might decide to exploit in attempting a coordinated cyberattack and ways that terrorists might be improving their cyber skills. The report, Terrorist Capabilities for Cyberattack: Overview and Policy Issues, noted different views concerning the ability of Al-Qaeda (or other terrorist groups) to launch a significant cyberattack and the related danger of a “Digital Pearl Harbor.” It also noted a CIA assessment, provided in April 2002 to the Senate Select Committee on Intelligence, that “cyberwarfare attacks against the U.S. critical infrastructure will become a viable option for terrorists as they become more familiar with the technology required for the attacks.” A 2004 assessment of the intelligence threat (Document 18), particularly from nations or others seeking to conduct economic espionage was produced by the Interagency OPSEC Support Staff. One chapter focuses on ‘Computers and the Internet’. In addition to providing a history of Internet security and discussing the relationship between website content and operational security, it also explores the roots of network vulnerability and eight outsider attack techniques – including scanning, packet sniffing, and malware. Several unclassified assessments (Document 26, Document 43, Document 63) by the Defense Security Service have focused on foreign attempts to acquire advanced U.S. technology. The most recent version (Document 63), as with previous versions, examines a variety of methods for acquiring information on U.S. technologies — including “suspicious network activity,” which was the most prevalent collection method for “entities originating from East Asia and the Pacific.” A similar type of assessment (Document 55) was produced in October 2011 by the Office of the National Counterintelligence Executive, a component of the Office of the Director of National Intelligence. The report, Foreign Spies Stealing US Economic Secrets in Cyberspace, examines the vulnerability of US technologies and trade secrets to cyberspace operations, the threat from specific collectors (including Russia, China, and U.S. partners), and the outlook for the future (including both “near certainties” and “possible game changers”). Key assessments of Chinese computer network exploitation that are in the public domain have been produced either by contractors in response to tasking from the U.S.-China Economic and Security Review Commission or by private organizations. In October 2009, the review commission released Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation (Document 30). It examined Chinese computer network exploitation activities, strategy and operations during a military conflict, key entities in Chinese computer network operations, cyber-espionage, an operational profile of an advanced cyber intrusion and a chronology of alleged Chinese computer network exploitation activities. A second report (Document 66), also produced for the U.S.-China review commission, and released in 2012, Occupying the High Ground, focused on Chinese capabilities for computer network exploitation. It included a look at the key entities and institutions supporting Chinese computer network operations, potential risks to the U.S. telecommunications supply chain, and the risks and reality of collaboration between U.S. and Chinese information security firms. Along with the reports for the review commission, two private organizations have produced detailed reports on PRC computer espionage activities. In 2012, a research group focused on China released a study (Document 79) based on open sources and computer-based investigations, examining the roles of several PLA organizations in cyber operations, including the Third Department of the PLA General Staff Department, its 2nd Bureau as well as its Beijing North Computer Center. Early the next year, the Mandiant computer security company released its study (Document 83) on the 2nd Bureau — which discussed the tasking of the unit, its past espionage operations, attack lifecycle, and the unit’s infrastructure and personnel. In contrast to the extensive public documents concerning China’s computer attack and exploitation activities, far less has appeared concerning similar Iranian activities. In 2012, Director of National Intelligence James Clapper did characterize them as “dramatically increasing in recent years in depth and complexity.” 10 A hearing in 2012 featured statements on Iranian cyber activities from two members of Congress and two non-governmental experts. (Document 71a, Document 71b, Document 71c, Document 71d). Directives, Strategies, Policies, and Plans While a number of presidential directives in earlier years addressed subjects such as communications security and information security, Presidential Decision Directive 63 (Document 12), Critical Infrastructure Protection, signed by President William J. Clinton on May 22, 1998, focused on protecting both “physical and cyber-based systems essential to the minimum operations of the economy and government.” Among the steps Clinton directed was the establishment of a National Infrastructure Assurance Plan, increased intelligence collection and analysis devoted to the cyber threat, and creation of a National Infrastructure Protection Center. The George W. Bush administration produced a number of classified as well as unclassified documents concerning cyberspace. The first, National Security Presidential Directive 16 (NSPD-16) was reported to have been issued in July 2002 and provide guidelines for the conduct of offensive cyber operations. A public document, The National Strategy to Secure Cyberspace (Document 16), was released in February 2003 and was followed by the classified NSPD-38, with the same title, of July 7, 2004. A third classified directive, NSPD-54, Cyber Security and Monitoring, was issued on January 8, 2008. 11 President Obama has signed two Presidential Policy Directives concerning cybersecurity — the still classified PPD-20 (title unknown) and PPD-21, “Critical Infrastructure Security and Resilience” (Document 86) — the latter following the failure of two proposed pieces of cybersecurity legislation to make it through Congress. Its key components are its delineation of roles and responsibilities, of officials and agencies, its identification of three strategic imperatives, and its direction to the Secretary of Homeland Security on steps to take to implement the directive. Issued the same day was an executive order (Document 87) that focused solely on critical infrastructure cybersecurity — including information sharing, reduction of cyber risk, and identification of critical infrastructure at greatest risk. On May 8, 2009, the White House issued the results of its cyberspace policy review — Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure (Document 28). It produced a plan that included establishing performance metrics, preparing a cybersecurity response plan, and instituting a national public awareness and education campaign to promote cybersecurity. In May 2011 the White House released its International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World (Document 46), which discussed the building of U.S. cyberspace policy, the future of cyberspace, as well as U.S. policy priorities and concludes with the a discussion of the implementation of U.S. strategy. Then, in early 2013, along with PPD-21 and the related executive order, the administration released Administration Strategy on Mitigating the Theft of U.S. Trade Secrets (Document 82). Part of the strategy concerns mitigating cyber theft and describes four action items – diplomatic efforts, voluntary practices by industry, enhancing domestic law enforcement operations, improving domestic legislation, and promoting public awareness. Numerous departments also have produced cyber strategy documents at various levels of classification. In 2006, the Chairman of the Joint Chiefs of Staff produced the National Military Strategy for Cyberspace Operations (Document 23), which was classified Secret. Its introduction described it as the “comprehensive strategy of the U.S. Armed Forces to ensure U.S. military superiority in cyberspace.” Since released under the Freedom of Information Act, the document identified four strategic priorities in implementing the strategy – including gaining and maintaining the initiative to operate within adversary decision cycles and integrating cyber capabilities across the full range of military operations using cyberspace. In July 2011, that strategy was replaced by the unclassified Department of Defense Strategy for Operating in Cyberspace (Document 50) — which noted five strategic initiatives with regard to DoD operations in cyberspace. Those initiatives include treating cyberspace as an operational domain with regard to organization, training, and equipment as well as employing new concepts to protect DoD networks and systems. The individual military services and their components have also produced their own policy and planning documents concerning cyberspace activities. In February 2010, the Army’s Training and Doctrine Command published an unclassified pamphlet (Document 33) on how cyber operations would be integrated into the full spectrum of Army operations. The next year, the Air Force produced Air Force Doctrine Document 3-12, Cyberspace Operations (Document 60), which included a discussion of the design, planning, execution, and assessment of cyberspace operations. Civilian departments have also produced their own strategy documents — such as the Department of Homeland Security’s November 2011 Blueprint for a Secure Cyber Future (Document 58), which listed four cybersecurity goals (including reducing exposure to cyber risk and increasing resilience) and nine means for achieving those goals. In addition to presidential directives, departmental directives also serve to state policies as well as assign responsibilities. Thus, the 2006 DoD Directive 3600.01 (Document 22), “Information Operations,” assigned the Assistant Secretary of Defense for Networks and Information Integration responsibilities with regard to computer network defense — a responsibility since assumed by the department’s Chief Information Officer.. A January 2010 directive (Document 31) focuses on protection of unclassified Defense Department information that passes through or resides on Defense Industrial Base information systems and networks. The Department of Energy has also issued its own directives concerning cybersecurity — including a September 2010 directive (Document 36) on the department’s cybersecurity management policy, including a statement of objectives, principles, responsibilities, and implementation, as well as a May 2011 directive (Document 48) which stipulates that the department’s cybersecurity policy be based on a risk management approach. U.S. government organizations involved in cyberspace activities (excluding those involved in evaluating programs) can be found in the Intelligence Community, Department of Defense, and several civilian departments or agencies – including the Federal Bureau of Investigation and the Department of Homeland Security. The most senior U.S. official concerned with the analysis of intelligence concerning foreign cyber capabilities and activities is a member of the DNI’s National Intelligence Council — the National Intelligence Officer for Cyber Issues — a position first established in May 2011. Sometime in the late 1990s, an Information Operations Center was established within the CIA’s Directorate of Operations (now the National Clandestine Service). It absorbed some of the functions of the Directorate of Science and Technology’s Clandestine Information Technology Office. The office was officially described as being responsible for addressing “collection capabilities within emerging information technologies.” The Center’s Analysis Group is located in the Directorate of Intelligence and evaluates foreign threats to U.S. computer systems, particularly those that support critical infrastructure. 1 2 The National Security Agency’s involvement in cyber security is a consequence of its long-time role in insuring first communications and then information security for various components of the government and private sector as well as its need to insure the security of the computers it has relied on heavily for decades (e.g. Document 2, Document 3, Document 4). Its role in computer network exploitation – of gathering electronic “data at rest” is a natural extension of its signals intelligence role of gathering “data in motion.” In March 1997, according to an article (Document 11) by a former deputy director, it was also assigned the mission of computer network attack. A major step in the organization of U.S. cyberspace activities, indicative of an upgrade in attention, occurred in late June 2009, when Secretary of Defense Robert Gates ordered (Document 29) the establishment of a unified U.S. Cyber Command subordinate to the U.S. Strategic Command. In his memo Gates noted that he would recommend to the president that he appoint the director of the National Security Agency as commander of the Cyber Command, that the command would reach initial operating capability by October 2009 and full operating capability by October 2010. He also directed disestablishment of STRATCOM’s Joint Task Force — Global Network Operations (JTF-GNO) and Joint Functional Component Command — Network Warfare (JFCC-NW) prior to the new command reaching full capability. In addition, Gates wrote that his memorandum “reinforces, but does not expand, USSTRATCOM authorities and responsibilities for military cyberspace operations.” According to a brief fact sheet (Document 38), the Cyber Command is responsible for planning, coordinating, and conducting the operations and defense of specified Department of Defense information networks.” It also, when directed, conducts “full-spectrum military cyberspace operations.” Its current headquarters organization, as depicted in an organization chart (Document 92), was released in April 2013. Subordinate to the Cyber Command are its component commands — Army Forces Cyber Command; the 24th Air Force (a component of the Air Force Space Command); the U.S. Fleet Cyber Command (Document 69), which oversees the Navy Information Operations Command; the Navy Cyber Warfare Development Group; the Navy Cyber Defense Operations Command; and the Marine Forces Cyber Command. In June 2002, the Director of the FBI established a Cyber Division. The division is responsible for coordinating and supervising the FBI’s investigation of federal violations “in which the Internet, computer systems, or networks are exploited as the principal instruments or targets of terrorist organizations, foreign government-sponsored intelligence operations, or criminal activity, and for which the use of such systems is essential to that activity.” 13 The Department of Homeland Security established the National Cyber Security Division (NCSD) in June 2003 “to serve as the national focal point for cybersecurity and to coordinate implementation of the February 2003 national cyberspace strategy (Document 16). Its mission (Document 52) is to “serve as the Federal Government’s lead in assessing, mitigating and responding to cyber risks in collaboration with Federal, State and local governments, the private sector, academia, and international partners.” Cybersecurity White Papers The most public aspect of U.S. activities in cyberspace centers around standard cybersecurity operations. In addition to documents such as presidential and departmental directives or strategy documents that stipulate cybersecurity goals, objectives or specific activities, there are a variety of other relevant documents. Included are a number of “white papers” which described cybersecurity efforts. In March 2010, the White House released The Comprehensive National Cybersecurity Initiative (Document 34), which described details of the initiative launched in the previous administration and provided details of a dozen different components of the effort. In February 2010, the Department of Homeland Security released a paper (Document 32) describing various cybersecurity activities — such as the operation of the EINSTEIN intrusion detection system. In July 2011 a DHS official briefed his audience (Document 52) on a variety of topics — including the department’s National Cyber Security Division, hacking activities directed at both government and private organizations, the Stuxnet worm, and the NIGHT DRAGON exploitation effort, and cybersecurity advisory activities. Computer Network Exploitation Computer network exploitation (CNE) has been defined (Document 22) as “enabling operations and intelligence collection to gather data from target or adversary automated information systems or networks.” Such exploitation operations can be intended to produce information about the computer systems and networks as a prelude to a network attack or as another method of gathering economic or military intelligence. 14 CNE operations are examined in a number of intelligence threat assessments, including the Defense Security Service (Document 26, Document 43, Document 63) assessments, as well as the report by the Office of the National Counterintelligence Executive. (Document 55). As noted above, Chinese CNE operations are discussed in two reports (Document 30, Document 66) for the U.S-China review commission as well as the reports by Project 2049 (Document 79) and the Mandiant Corporation (Document 83). In addition, an Army War College paper (Document 72) also examines Chinese cyber, including CNE, capabilities. Computer Network Attack Computer Network Attack (CNA) has been defined (Document 22) as “operations to disrupt, deny, degrade or destroy information resident in computers and computer networks, or the computers and networks themselves. According to former NSA official William B Black Jr. (Document 11), on March 3, 1997, the Secretary of Defense officially delegated to the National Security Agency the authority to develop CNA techniques. Prior to U.S.-led airstrikes against the Qaddafi government in March 2011, the U.S. reportedly considered a cyber offensive designed to disrupt and even disable the Libyan government’s air-defense system.15 What is widely believed to be the product of a joint U.S-Israeli CNA operation was the worm Stuxnet — part of a U.S. CNA effort designated OLYMPIC GAMES.16 The worm was reported to have infected Iranian industrial control systems at the Natanz nuclear facility and damaged Iranian centrifuges. While there has been no official U.S. or Israeli confirmation of their involvement in the operation, it has been the subject of reports by the RAND Corporation (Document 42) and Congressional Research Service (Document 40) as well as the Symantec computer security corporation. The CRS paper (Document 40), The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability, provides an overview of the worm, an exploration of possible developers and future users, a discussion of whether Iran was the intended target, as well as coverage of industrial control systems vulnerabilities and critical infrastructure, national security implications, and issues for Congress. RAND’s study, A Cyberworm that Knows No Boundaries (Document 42), explores the issues raised by the Stuxnet case, the vulnerabilities exploited, the difficulties in defending against such malware, and the problems posed by organizational and legal restrictions. It also provides a short assessment of the status of U.S. defensive capabilities and efforts required to improve those capabilities. Symantec’s initial analysis (Document 44) provided a technical analysis of the worm, exploring the attack scenario, timeline, Stuxnet architecture, installation, load point, command and control, propagation methods, payload exports, payload resources, and other topics. A subsequent Symantec report (Document 88) stated that the company had “discovered an older version of Stuxnet that can answer questions about its evolution.” Computer Network Defense See Document 23. Computer network defense is defined in the DoD Information Operations directive (Document 22) as “actions taken to protect, monitor, analyze, detect, and respond to unauthorized activity within DoD information systems and computer networks.” Those actions can include counterintelligence, law enforcement, and other military capabilities. The first of these is the subject of one classified DoD directive (Document 41) — “Counterintelligence (CI) Activities in Cyberspace.” That directive makes clear that those activities include not only counterintelligence collection and support but offensive counterintelligence operations. Techniques for computer network defense are also the subject of two Naval Postgraduate School theses. A 2003 thesis (Document 17) explores the feasibility of employing deception against cyberterrorists, where cyberterrorists are defined by two criteria – that the aim of launching unlawful attacks or threatening such attacks on computers, networks, and the information stored in them is to intimidate or coerce a government or its people in pursuit of political or social objectives, and that the activities result either in violence against persons or property or cause enough harm to generate fear. A 2008 thesis (Document 25) examines what the author believes to be the key elements of deterrence in cyberspace – including denial, the development and demonstration of overt punishment techniques, the establishment of thresholds, and the development and articulation of national policy – and the prospects for cyber deterrence. Audits and Evaluations Audits and evaluations of cybersecurity and other cyberspace operations have been conducted by the GAO and the inspectors general of the Defense, Energy, Homeland Security, and Justice departments. The inspector general of the Department of Homeland Security produced a classified report, released with redactions (Document 54), which examined the department’s capability to share cyber threat information with other federal agencies and the private sector. A subsequent classified report, also released with redactions in August 2012 (Document 75), addressed the department’s international cybersecurity program and noted areas that could be targeted for improvement — including developing a strategic implementation plan for foreign engagement and improving communications between the U.S. Computer Emergency Readiness Team and foreign entities. The Department of Energy’s inspector general issued a report (Document 56) in October 2011 on the department’s unclassified cybersecurity program, which examined whether that program provided sufficient protection of its data and information systems. According to the report, corrective actions for only 11 of 35 cyber security weaknesses identified in the inspector general’s 2010 report had been completed. It also reported that there was a 60 percent growth in identified weaknesses over the 2010 report. In early 2013, the department’s inspector general issued a report (Document 84) on the cybersecurity program at the Los Alamos National Laboratory. The Justice Department’s inspector general produced a 2011 audit report (Document 45) on the FBI’s ability to address the national security cyber intrusion threat. It reported on the FBI’s efforts in developing and operating the National Cyber Investigative Joint Task Force, and the ability of the FBI field offices to investigate national security cyber cases. The GAO also produced a report (Document 47), released in May 2011, that evaluated the extent to which the Department of Defense and the U.S. Cyber Command had provided the military services with adequate guidance with respect to roles and responsibilities, command and control relationships, and mission requirements and capabilities with regard to cyberspace operations. Other GAO reports have examined continued challenges facing DoD (Document 49) and protection of critical infrastructure (Document 51, Document 62). A 2012 GAO report (Document 70) assessed the cyber threats to federal and other computer systems and vulnerabilities present in federal information systems and supporting critical infrastructure. A February 2013 report (Document 85) focused on the challenges facing the federal government in producing a strategic approach to cybersecurity. Some GAO evaluations have focused on cybersecurity issues with respect to single components of critical U.S. infrastructure – including the electricity grid (Document 74), and pipelines (Document 76). The GAO’s report on securing the electricity grid examines cyber threats to the grid, actions taken to prevent attacks, and remaining challenges. The office’s pipeline study cybersecurity risks, U.S. pipeline security initiatives, and the adequacy of voluntary pipeline cybersecurity. The increasing attention to cyberspace issues has also been reflected in the examination of associated legal issues — both in law journals and government documents.17 In November 1999, the Office of the General Counsel of the Department of Defense issued a second edition of An Assessment of International Legal Issues in Information Operations (Document 13). The section “Application to Computer Network Attacks” (pp.16-23) concludes with a one-paragraph assessment which begins, “It is far from clear the extent to which the world community will regard computer network attacks as ‘armed attacks’ or ‘uses of force,’ and how the doctrines of self-defense and countermeasures will be applied to computer network attacks.” More recently, an Air Force instruction (Document 53) specifies the responsibilities of different Air Force components for legal reviews of weapons and cyber capabilities as well as the content of such reviews. Legal issues have also been examined by the Congressional Research Service. In a March 2012 paper (Document 65), CRS explored Fourth Amendment, civil liberties, and privacy issues related to the protection of critical infrastructure and the sharing of cybersecurity information — as well as the possibility of conflicts between state and federal cybersecurity law. Another CRS study (Document 73) examines possible cyber-related changes to 28 different statutes. The question of whether the U.S. Cyber Command had sufficient legal authority to carry out its mission was the catalyst for an exchange of letters (Document 68a, Document 68b, Document 68c), beginning in March 2012, between Senator John McCain (R-AZ) and General Keith B. Alexander, Director of the National Security Agency and the commander of the U.S. Cyber Command. In his initial letter McCain posed six questions, while in his second letter he notes a number of disagreements with the content of Alexander’s responses. The Documents Document 1: [Deleted], National Security Agency, “Computer Operating System Vulnerabilities,” Cryptolog, VI, 3 (March 1979). Unclassified. Source: http://www.nsa.gov This article, which appeared in a classified NSA journal, explores seven common computer operating system vulnerabilities, several penetration techniques, defensive measures, and future research areas. Document 2: Robert J. Hanyok, National Security Agency, “Some Reflections on the Reality of Computer Security,” Cryptolog, IX, 6-7 (June-July 1982). Confidential. The author of this article argues that while computer users at NSA have been confident that the security of their systems is “ironclad and invulnerable” the reality is quite different. He then notes a number of user practices and implementation problems that make those systems vulnerable. Document 3: [Deleted], “Computer Virus Infections: Is NSA Vulnerable?,” Cryptologic Quarterly, 4, 3 (Fall 1985). Top Secret. This paper examines the nature of computer viruses, whether there is an algorithm to determine whether a program is infected with a virus, different classes of attack (including compromise, spoofing, and denial of service), and solutions. Document 4: [Deleted], “A First Generation Technical Viral Defense,” Cryptologic Quarterly, 7, 2 (Summer 1988). Secret. This paper examines a defense, involving encryption, that can be used to respond to the detection of a computer virus — and means for checking the effectiveness of the response. Document 5: General Accounting Office, GAO/IMTEC-89-57, Computer Security: Virus Highlights Need for Improved Internet Management, June 1989. Unclassified. The catalyst for this report was a November 1988 computer virus that caused thousands of computers, in the United States and overseas, to shut down. The report provides details on some of the networks disrupted by the virus, the means of infection, and notes the vulnerabilities highlighted by the incident. Document 6: General Accounting Office, GAO/T-IMTEC-92-5, Computer Security: Hackers Penetrate DOD Computer Systems, November 20, 1991. Unclassified. Source: http://www.gao.gov This testimony of a GAO official concerns his division’s investigation of the attacks by Dutch hackers on Army, Navy, and Air Force computer systems — which the official characterizes as containing unclassified but sensitive information — during Operation Desert Storm/Shield. It examines how the hackers penetrated the systems, agency responses, and the need for greater attention to computer security. Document 7: Richard Sylvester, National Security Agency, “NSA and Computer Viruses,” Cryptolog, XIX, 3 (1992). Unclassified/For Official Use Only. This one-page article reports NSA classification guidelines with respect to any discussion of computer viruses with regard to NSA systems. Classification of specific facts ranged from Unclassified to Top Secret/Handle Via Comint Channels Only. Document 8: [Deleted], National Security Agency, “Global Network Intelligence and Information Warfare: SIGINT and INFOSEC in Cyberspace,” Cryptolog, XXI,1 (1995). Top Secret/Handle Via Comint Channels Only. This heavily-redacted article extends beyond cyber issues, but does note that “sophisticated telecommunications and data networks … make it possible to deny and degrade a potential adversary’s command and control communications and sensitive commercial and diplomatic communications from great distances with little or no risk to life and limb.” Document 9: [Deleted], “Out of Control,” Cryptologic Quarterly, Special Edition, 15, 1996. Secret. This article, in another National Security Agency journal, discusses the threat to computer systems containing classified information via human intelligence operations directed at systems administrators. A largely redacted section is titled “”Foreign Intelligence Services Are Already Targeting Computer Personnel,” while the final section offers recommendations on how to address the problem. Document 10a: Government Accounting Office, GAO/AIMD- 96-84, Information Security: Computer Attacks at Department of Defense Pose Increasing Risks, May 22, 1996. Unclassified. Document 10b: Jack L. Brock, General Accounting Office, GAO/T-AIMD-96-92, Information Security: Computer Attacks at Department of Defense Pose Increasing Risks, May 22, 1996. Unclassified. This report and testimony by a GAO official reports on an examination of hacker attacks on Defense Department computer systems, including a 1994 episode that involved over 150 attempts to access the computer systems of Rome Laboratory — which resulted in the theft of air tasking research data and damage to the laboratory’s air tasking order research project “beyond repair,” according to lab officials. The report and testimony also discuss the challenges faced by DoD in securing its computer systems. Document 11: William B. Black, National Security Agency, “Thinking Out Loud About Cyberspace,” Cryptolog, XXIII, 1 (Spring 1997). Secret. This article, by a senior NSA official, notes that NSA was assigned the mission of computer network attack in March 1997, and argues that the world was on the verge of a new age — “the information age” — and that the future of war would be warfare in cyberspace. Document 12: William J. Clinton, Presidential Decision Directive/NSC-63, Subject: Critical Infrastructure Protection, May 22, 1998. For Official Use Only/Unclassified. Source: Federation of American Scientists (www.fas.org) The introduction to this directive notes that the military and economy of the United States are “increasingly reliant upon certain critical infrastructures and upon cyber-based information systems.” The remainder of the 18-page directive specifies the President’s intent “to assure the continuity and validity of critical infrastructures” in the face of physical or cyber threats, states a national goal, delineates a public-private partnership to reduce vulnerability, states guidelines, specifies structure and organization, discusses protection of Federal government critical infrastructures, orders a NSC subgroup to produce a schedule for the completion of a variety of tasks, and directs that an annual implementation report be produced. Document 13: Office of General Counsel, Department of Defense, An Assessment of International Legal Issues in Information Operations, Second Edition, November 1999. Unclassified. Source: http://www.dod.gov The introduction to this assessment notes that information operations includes information attack which, in turn, includes computer network attack. It goes on to consider the implications of a variety of domestic and international laws and treaties with regard to information operations. Document 14: Steven A. Hildreth, Congressional Research Service, Cyberwarfare, June 19, 2001. Unclassified. Source: http://www.fas.org This report discusses the definition of cyberwarfare, and contains three case studies — including the Rome Laboratory incident (Document 8a, Document 8b) and two exercises — and, inter alia, reviews U.S policy and doctrine, organization, and legal issues. It also discusses selected foreign views and activities with regard to cyberwar. Document 15: Michael Vatis, ESDP Discussion Paper-2002-04, Cyber Attacks: Protecting America’s Security Against Digital Threats, John F. Kennedy School of Government, Harvard University, June 2002. Not classified. Source: Belfer Center for Science and International Affairs, Harvard University (www.beflercenter.hks.harvard.edu) This paper, written by the first director of the Federal Bureau of Investigation’s National Infrastructure Protection Center, examines: the range of cyber attackers (including insiders, criminal groups, virus writers, foreign intelligence services, foreign military organizations, terrorists, “hacktivists,” and recreational hackers), types of cyber attacks, the international component of cyber attacks, the federal response to cyber attacks, Presidential Decision Directives 62 and 63, and the policy of the George H.W. Bush administration. Vatis also offers recommendations concerning cyber research and development, alert status during conflict, and identifying best practices related to cyber security. Document 16: The White House, The National Strategy to Secure Cyberspace, February 2003. Unclassified. Source: http://www.us-cert.gov This 76-page document discusses the strategy’s strategic objectives (including preventing cyber attacks against critical U.S. infrastructures), the government’s role in cyber security, the anticipated role of the Department of Homeland Security in cyber security, and five critical priorities for cyberspace security (including a national cyberspace security response system and international cooperation). A classified National Security Presidential Directive (NSPD-38), with the identical title, was issued on July 7, 2004. Document 17: Kheng Lee Gregory Tran, Naval Postgraduate School, Confronting Cyberterrorism with Cyber Deception, December 2003. Unclassified. Source: Dudley Knox Library, Naval Postgraduate School (www.nps.edu/library) This master’s thesis examines the possibility of using deception to defeat or mitigate the damage from cyberterrorism. It examines, inter alia, the cyberterrorism threat, the values and risks of deception, nine varieties of cyber deception (including concealment, camouflage, false and planted information, ruses, and feints) and cyber defense, and the pitfalls of cyber defense. Document 18: Interagency OPSEC Support Staff, Intelligence Threat Handbook, June 2004. Unclassified. Source: Author’s Collection The scope of this handbook is broader than cybersecurity, but one section — Computers and the Internet — addresses the history of Internet security, threats to computer network security, roots of network vulnerability, outsider attack techniques, insider attack techniques, and countermeasures. Document 19: Office of Inspector General, Department of Homeland Security, OIG-04-29, Progress and Challenges in Securing the Nation’s Cyberspace, July 2004. Unclassified. Source: http://www.dhs.gov This document reports on the inspector general’s evaluation of the Department of Homeland Security’s efforts to implement The National Strategy to Secure Cyberspace (Document 14). It notes “major accomplishments” — including the creation of a Computer Emergency Readiness Team, creation of the National Cyber Alert System, and sponsorship of the National Cyber Security Summit. It also notes “a number of challenges to address long-term cyber threats and vulnerabilities” — including the DHS National Cybersecurity Division’s need to prioritize its initiatives, identify resources required to carry out its mission, and develop strategic implementation plans. Document 20: President’s Information Technology Advisory Committee, Report to the President, Cyber Security: A Crisis of Prioritization, February 2005. Unclassified. Source: http://www.nitrd.gov/pitac/reports The two main chapters of this report, prior to the concluding chapter, address the importance of cyber security and examine federal cyber security research and development efforts. In its concluding chapter the committee states its findings and recommendations with regard to federal funding for fundamental research in civilian cyber security, the cyber security research community, technology transfer efforts, and the coordination and oversight of federal cyber security research and development. Document 21: Donald Rumsfeld, to Steve Cambone, Subject: Cyber Attack Issue, November 04, 2005, Unclassified/FOUO . Source: http://www.rumsfeld.com In this “snowflake” directed to his under secretary for intelligence, Rumsfeld suggests that Cambone consider establishing a group to review organization, budgeting, and presentation issues with regard to cyber attacks. Document 22: Department of Directive O-3600.01, Subject: Information Operations, August 14, 2006. Unclassified/For Official Use Only. Source: Department of Defense Freedom of Information Act Release This directive states Department of Defense policy and responsibilities with regard to information operations (defined as the integrated deployment of electronic warfare, computer network operations, psychological operations, military deception, and operations security). Among those whose responsibilities are identified is the Assistant Secretary of Defense for Networks and Information Integration. Document 23: Chairman of the Joint Chiefs of Staff, The National Military Strategy for Cyberspace Operations, December 2006. Secret. Source: Department of Defense Freedom of Information Act Release. This strategy document was issued to provide guidelines to the Defense Department — including military service organizations, the unified commands, and DoD components (including agencies, field activities and other entities) — with regard to planning, executing, and allocating resources for cyberspace operations. Its main chapters focus on the strategic context, threats and vulnerabilities, strategic considerations, the military strategic framework, and implementation and assessment. Several enclosures address topics such as examples of threats and threat actors, examples of vulnerabilities, and strategic priorities and outcomes. Document 24: John Rollins and Clay Wilson, Congressional Research Service, Terrorist Capabilities for Cyberattack: Overview and Policy Issues, January 22, 2007. Unclassified. This study examines possible terrorists’ objectives in conducting cyberattacks, computer vulnerabilities that might make cyberattack against the U.S. homeland’s critical infrastructure viable, and emerging computer and technical skills of terrorists. It also examines the cybersecurity efforts of several government agencies, changing concerns about cyberattack, and a number of additional issues concerning terrorist or criminal cyber activities. Document 25: Ryan J. Moore, Naval Postgraduate School, Prospects for Cyber Deterrence, December 2008. Unclassified. Source: http://www.nps.edu/library The author of this thesis argues that with “more sectors of critical national infrastructure [being] interconnected in cyberspace,” the risk to national security from cyberattack “has increased dramatically.” He explores the fundamentals of strategic deterrence, the evolving cyber threat, deterrence strategy in cyberspace, and the prospects for cyber deterrence. Document 26: Defense Security Service, Targeting U.S. Technologies: A Trend Analysis of Reporting from Defense Industry, 2009. Unclassified. Source: http://www.dss.mil This assessment of foreign attempts to illicitly acquire U.S. technologies concerns a variety of techniques, including “suspicious internet activity” — which includes, but is not limited to “confirmed intrusion, attempted intrusion, [and] computer network attack.” Document 27: Major William C. Ashmore, School of Advanced Military Studies, United States Army Command and General Staff, Impact of Alleged Russian Cyber Attacks, 2009. Unclassified. Source: http://www.dtic.mil/dtic/fr/fulltext/u2/a504991.pdf This monograph was written to examine the implications of alleged Russian cyber attacks against Estonia and Georgia for the Russian Federation, former Soviet satellites, and international organizations. Document 28: The White House, Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure, May 8, 2009. Unclassified. Source: The White House (www.whitehouse.gov) This paper reports the results of a presidentially-directed 60-day comprehensive review to evaluate U.S. policies and organizational structures related to cybersecurity. The review produced seven main conclusions which included: “The Nation is at a crossroads,” “The status quo is no longer acceptable,” “The United States cannot succeed in securing cyberspace if it works in isolation,” and “The Federal government cannot entirely delegate or abrogate its role in securing the Nation from a cyber incident or accident.” Document 29: Robert M. Gates, Memorandum to Secretaries of the Military Departments, Subject: Establishment of a Subordinate Unified U.S. Cyber Command Under U.S. Strategic Command for Military Cyberspace Operations, June 23, 2009. Unclassified. This memo from the Secretary of Defense directs the commander of the U.S. Strategic Command to establish a U.S. Cyber Command and that the command reach an initial operating capability by October 2009 and a full operating capability by October 2010. It also informs the recipients of the Secretary’s plan to recommend to the president that the National Security Agency director also become commander of the Cyber Command. Document 30: Bryan Krekel, Northrop Grumman, Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation, October 9, 2009. Unclassified . Source: Air University (www.au.af.mil) This study, prepared for the U.S.-China Economic and Security Review Commission, focuses largely on Chinese computer network exploitation (CNE) as a strategic intelligence collection tool. It examines Chinese CNE operations strategy and operations during conflict, key entities in Chinese computer network operations, cyber-espionage, an operational profile of an advanced cyber intrusion, and a chronology of alleged Chinese computer network exploitation events. Document 31: Department of Defense, DoD Instruction 5205.13, Subject: Defense Industrial Base (DIB) Cyber Security/Information Assurance (CS/IA) Activities, January 29, 2010. Unclassified. Source: http://www.dtic.mil/whs/directives/corres/pdf/520513p.pdf This Defense Department instruction states policy, establishes responsibilities, and delegates authority with regard to the protection of unclassified DoD information that passes through or resides on unclassified Defense Industrial Base information systems and networks. Document 32: Department of Homeland Security, Computer Network Security & Privacy Protection, February 19, 2010. Unclassified. This white paper describes the Department of Homeland Security’s computer network security activities, which includes the operation of the EINSTEIN intrusion detection systems — including the systems collection methods and the implications for privacy protection. It also discusses topics such as oversight and compliance, the role of the National Security Agency, and future program development. Document 33: U.S. Army Training and Doctrine Command, TRADOC Pamphlet 525-7-8, The United States Army’s Cyberspace Operations Concept Capability Plan, 2016-2028, February 22, 2010. Unclassified. This pamphlet explores how “the Army’s future force in 2016-2028 will leverage cyberspace and CyberOps” and how CyberOps (which is specified to consist of four components — cyberwarfare, cyber network operations, cyber support, and cyber situational awareness) will be integrated into full spectrum operations. Document 34: The White House, The Comprehensive National Cybersecurity Initiative, March 2, 2010. Unclassified. Source: http://www.whitehouse.gov The release of this document by the Obama White House revealed details of the cybersecurity initiative launched during the previous administration. It provides basic details of twelve different components of the initiative — which include intrusion detection and prevention systems across the federal government, coordination and redirection of research and development efforts, enhancing situational awareness, increasing the security of classified networks, developing enduring deterrence strategies, and defining the role of the federal government for extending cybersecurity into critical infrastructure domains. Document 35: Keith Alexander, Director, National Security Agency, Advanced Questions for Lieutenant General Keith Alexander, USA Nominee for Commander, United States Cyber Command, April15, 2010. Unclassified. This 32-page documents consists of 28 questions (some with multiple parts) posed to, and answered by, General Alexander in advance of his appearance before the Senate Armed Services Committee with respect to his nomination to head the newly formed U.S. Cyber Command. Document 36: Department of Energy, DOE P 205.1, Subject: Departmental Cyber Security Management Policy, September 23, 2010. Unclassified. Source: http://www.energy.gov This Department of Energy policy directive covers the six components of the department’s cyber security management policy — its objectives, guiding principles, core functions, mechanisms, responsibilities, and implementation. Document 37: Janet Napolitano and Robert Gates (signators), Memorandum of Agreement Between the Department of Homeland Security and the Department of Defense Regarding Cybersecurity, September 27, 2010. Unclassified. The purpose of the agreement, signed by the Secretaries of Homeland Security and Defense, is specified as establishing the terms by which the two departments “will provide personnel, equipment, and facilities” in order to increase interdepartmental collaboration in strategic planning as well as operational activities concerning cybersecurity. Document 38: Department of Defense, Cyber Command Fact Sheet, October 13, 2010. Unclassified. This fact sheet provides basic information about the U.S. Cyber Command — including its mission, focus, and components. Document 39: JASON, JSR-10-102, Science of Cyber-Security, November 2010. Unclassified. This report, by the Defense Department’s JASON scientific advisory group, was a response to the department’s request that the group examine whether there were underlying fundamental principles that would make it possible to adopt a more scientific approach to the issue of cybersecurity. The sciences they examine for possible guidance are economics, meteorology, medicine, astronomy, and agriculture. Document 40: Paul K. Kerr, John Rollins, and Catherine A. Theohary, Congressional Research Service, The Stuxnet Computer Worm: Harbringer of an Emerging Warfare Capability, December 9, 2010. Unclassified. This short paper provides an overview of the Stuxnet worm, an exploration of possible developers and future users, a discussion of whether Iran was the intended target, as well as industrial control systems vulnerabilities and critical infrastructure, national security implications, and issues for Congress. Document 41: Department of Defense, DoD Instruction S-5240.23, Subject: Counterintelligence (CI) Activities in Cyberspace, December 13, 2010. Secret. According to this instruction, DoD counterintelligence activities in cyberspace are to be directed against foreign intelligence services and international terrorist organizations. The two key portions of the instruction define the responsibilities of DoD components and establish procedures for counterintelligence activities. While much of the segment concerning procedures is redacted in the declassified version, the table of contents indicates three different types of CI-related activities in cyberspace: counterintelligence support, counterintelligence collection, and offensive counterintelligence operations (OFCO). Document 42: Isaac R. Porsche III, Jerry M. Sollinger, and Shawn McKay, RAND Corporation, A Cyberworm that Knows no Boundaries, 2011. Unclassified. Source: http://www.rand.org The catalyst for this paper were the reports of the Stuxnet worm (Document 40). It explores issues raised by “sophisticated yet virulent malware” — including the nature of the threats, the vulnerabilities exploited and the difficulties in defending against Stuxnet-type worms, and the problems posed by organizational and legal restrictions. It also provides a short assessment of the status of U.S. defensive capabilities and efforts required to improve those capabilities. This report updates the Defense Security Service’s 2009 assessment of foreign attempts to illicitly acquire U.S. technologies, and concerns a variety of techniques, including “suspicious internet activity.” It notes a high level of suspicious network activity “in the form of cyber intrusion attempts directed at cleared contractor networks.” Document 44: Nicolas Falliere, Liam O. Murchu, and Eric Chien, Symantec, W 32. Stuxnet Dossier, Version 1.4, February 2011. Not classified. Source: http://www.symantec.com This study, prepared by the Symantec computer security firm, provides a technical analysis of the Stuxnet malware — exploring the attack scenario, timeline, Stuxnet architecture, installation, load point, command and control, propagation methods, payload exports, payload resources and other topics. Document 45: Office of the Inspector General, Department of Justice, Audit Report 11-22, The Federal Bureau of Investigation’s Ability to Address the National Security Cyber Intrusion Threat , April 2011. Secret. Source: http://www.justice.gov/oig/reports/FBI/a1122r.pdf The audit which is the subject of this report was conducted to evaluate the FBI’s efforts in developing and operating the National Cyber Investigative Joint Task Force in response to the national security cyber threat, and assess the FBI field offices’ capabilities to investigate national security cyber cases. Document 46: The White House, International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World, May 2011. Unclassified. This policy document discusses the process of building U.S. cyberspace policy, the future of cyberspace (including the preferences of the U.S. and its role in achieving its preferred outcomes), and U.S. policy priorities (with regard to economic issues, network protection, law enforcement, and several additional issues). It concludes with a discussion of U.S. implementation of its strategy. Document 47: Government Accountability Office, GAO-11-421, Defense Department Cyber Efforts: More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities, May 2011. Unclassified. This study was conducted to determine the extent to which the Defense Department and U.S. Cyber Command had provided the military services with adequate guidance with respect to roles and responsibilities, command and control relationships, and mission requirements and capabilities with regard to cyberspace operations. Document 48: Department of Energy, DOE O 205.1B, Subject: Department of Energy Cyber Security Program, May 16, 2011. Unclassified . This Energy department order states requirements for the department’s Cyber Security Program, which requires a risk management approach. It also specifies the responsibilities of over a dozen department components or officers in formulating and implementing the program. Document 49: Government Accountability Office, GAO-11-75, Department of Defense Cyber Efforts: DOD Faces Challenges In Its Cyber Activities, July 2011. Unclassified. This is an unclassified version of a previously classified report. It examines DoD’s organization for addressing cybersecurity threats as well as assessing the extent to which the Defense Department had developed a joint doctrine for cyberspace operations, assigned command and control responsibilities, and identified and addressed key capability gaps involving cyberspace operations. Document 50: Department of Defense, Department of Defense Strategy for Operating in Cyberspace, July 2011. Unclassified . Source: http://www.defense.gov The core of this strategy document is the discussion of five strategic initiatives with regard to DoD operations in cyberspace — treating cyberspace as an operational domain with regard to organization, training, and equipment; employing new defense operations concepts to protect DoD networks and systems; collaboration with other U.S. government departments and the private sector; cooperation with U.S. allies and international partners; and leveraging “the nation’s ingenuity” through the cyber work force and technological innovation. Document 51: Gregory C. Wilshusen, Government Accountability Office, GAO-11-865T, Cybersecurity: Continued Attention Needed to Protect Our Nation’s Critical Infrastructure, July 26, 2011. Unclassified. The focus of this study is the federal role in enhancing cybersecurity related to the private sector’s operation of critical infrastructure. It describes cyber threats facing cyber-reliant critical infrastructures; discusses recent federal government actions, taken in cooperation with the private sector, to identify and protect such infrastructures; and identifies challenges to the protection of those infrastructures. Document 52: Bradford Willke, Department of Homeland Security, Moving Toward Cyber Resilience, July 27, 2011. Unclassified. Source: Pubic Intelligence (http://info.publicintelligence.net/DHS-CyberResilience.pdf) This briefing covers a number of topics, including the origins, organization, and mission of the DHS National Cyber Security Division, hacking activities directed at a number of government and private entities (the CIA, Booz Allen Hamilton, Lockheed Martin), the Stuxnet worm, an effort designated Night Dragon that involved cyber-theft of sensitive information from international oil and energy companies, and cyber security advisory activities. Document 53: Department of the Air Force, Air Force Instruction 51-402, Legal Reviews of Weapons and Cyber Capabilities, July 27, 2011. Unclassified. This instruction focuses on the responsibilities of different Air Force components for legal reviews of weapons and cyber capabilities, as well as the contents of such reviews. Document 54: Office of Inspector General, Department of Homeland Security, Review of the Department of Homeland Security’s Capability to Share Cyber Threat Information (Redacted), September 2011, Unclassified. The Fiscal Year 2010 Intelligence Authorization Act required the inspectors general of the Intelligence Community and DHS to provide Congress with an assessment of how cyber threat information is being shared among federal agencies and the private sector, the means used to share classified cyber threat information, and the effectiveness of the sharing and distribution of cyber threat information. In addition to providing such an assessment, the Inspector General made three recommendations to DHS. Document 55: National Counterintelligence Executive, Foreign Spies Stealing US Economic Secrets in Cyberspace: Report to Congress on Foreign Economic Collection and Industrial Espionage, 2009-2011 , October 2011. Unclassified. Source: http://www.ncix.gov This report, produced by a component of the Office of the Director of National Intelligence, consists of three major sections. One is the vulnerability of U.S. technologies and trade secrets to cyberspace operations and the appeal of cyberspace collection. Another examines the threat from specific collectors, including Russia, China, and U.S. partners. The third provides an outlook for the future, divided between sections on “near certainties” and “possible game changers.” Document 56: Office of Inspector General, Department of Energy, DOE/IG-0856, Evaluation Report: The Department’s Unclassified Cyber Security Program – 2011, October 2011. Unclassified. The Federal Information Security Management Act of 2002 required an independent evaluation to determine whether the Department of Energy’s unclassified cyber security program adequately protected its data and information systems. According to the report, corrective actions for only 11 of 35 cybersecurity weaknesses identified in the inspector general’s 2010 report had been completed. In addition, there was a 60 percent growth in identified weakness over the 2010 report. Document 57: Department of Homeland Security, Preventing and Defending Against Cyber Attacks, October 2011. Unclassified. This DHS paper focuses on the department’s efforts in assisting federal executive branch civilian departments with securing their unclassified computer networks. It reports on the department’s efforts with respect to cybersecurity coordination and research, cybersecurity initiatives and exercises, the promotion of public awareness of cybersecurity, cybersecurity workforce development, and privacy and civil liberties issues. Document 58: Department of Homeland Security, Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise, November 2011. Unclassified. This blueprint contains two main components. It lists four cybersecurity goals (reducing exposure to cyber risk, ensuring priority response and recovery, maintaining shared situational awareness, and increasing resilience) — to be attained through nine objectives. Secondly, it specifies four goals for strengthening the cyber system (to be attained via eleven objectives). Document 59: Department of Defense, Department of Defense Cyberspace Policy Report: A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2011, Section 934 , November 2011. Unclassified. This 14-page document describes the legal and policy issues associated with cyberspace, reports on decisions of the secretary of defense, and notes that there are no plans to update the National Military Strategy for Cyberspace Operations (Document 23) but that the Department of Defense Strategy for Operating in Cyberspace (Document 50) would provide strategy guidance. In addition, it describes the use and application of cyber modeling and simulation. Document 60: United States Air Force, Air Force Doctrine Document 3-12, Cyberspace Operations, November 30, 2011. Unclassified. Source: http://www.e-publishing/af.mil This document examines cyberspace fundamentals (including U.S. national policy and the challenges of cyberspace operations); command and organization (including a description of U.S. cyberspace organizations as well as command and control of cyberspace operations); and the design, planning, execution, and assessment of cyberspace operations. Document 61: National Science and Technology Council, Executive Office of the President, Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program, December 2011. Unclassified . Source: http://www.cyber.st.dhs.gov This plan specifies four interconnected priorities for U.S. government agencies that conduct or sponsor research and development in cybersecurity. The priorities are organized along four lines: inducing change, developing scientific foundations, accelerating transition to practice, and maximizing research impact. Document 62: Government Accountability Office, GAO-12-92, Critical Infrastructure Protection: Cybersecurity Guidance Is Available but More Can Be Done to Promote Its Use, December 2011. Unclassified. This GAO report examines the use of cybersecurity guidance in seven critical infrastructure sectors (including banking and finance, energy, and nuclear reactors) from national and international organizations. It reports that while such guidance is being employed, sector officials do not believe it is comprehensive, and DHS and other sector-specific agencies have not identified key cybersecurity guidance applicable to each of their critical infrastructure sectors. The main focus of this report, by the Pentagon’s Defense Security Service, is not cybersecurity but the attempts to gather information on U.S. technologies — by whatever method. However, as did previous DSS reports (Document 26, Document 43), it does discuss “suspicious network activity” (SNA) as one acquisition method. It notes that SNA is “the most prevalent collection method for entities originating from East Asia and the Pacific,” although it is no higher than fifth with regard to collection methods associated with other regions. Document 64: 624th Operations Center, Intelligence Surveillance & Reconnaissance Division, Air Force Space Command, Cyber Threat Bulletin, 2012 Top Ten Cyber Threats, January 9, 2012. Unclassified/For Official Use Only. Source: http://www.publicintelligence.net This bulletin passes along the conclusions of the McAfee computer security firm concerning the top 10 cyber threats for the coming year. The top five are attacking mobile devices, embedded hardware, “legalized” spam, industrial attacks, and hacktivism. Document 65: Mark Mateski, Cassandra M. Trevino, Cynthia K. Veitch, John Michalski, J. Mark Harris, Scott Maruoka, and Jason Frye, Sandia National Laboratories, SAND 2012-2427, Cyber Threat Metrics, March 2012. Unclassified. This report was prepared in support of the DHS cyber-risk and vulnerability assessment program intended to aid federal civilian executive branch agencies. It reviews alternative cyber threat metrics and models that might be employed in any operational threat assessment. Document 66: Bryan Krekel, Patton Adams, George Bakos, Northrup Grumman, Occupying the Information High Ground: Chinese Capabilities for Computer Network Espionage and Cyber Espionage, March 7, 2012. Unclassified. Source: http://www.uscc.gov This report, prepared for the U.S.-China Economic and Security Review Commission, focuses on six topics: information warfare strategy, Chinese use of network warfare against the United States, key entities and institutions supporting Chinese computer network operations (the Third and Fourth Departments of the Peoples Liberation Army’s General Staff Department), potential risks to the U.S. telecommunications supply chain, the comparison between criminal and state-sponsored network exploitation, and the risks and reality of collaboration between U.S. and Chinese information security firms. Document 67: Edward C. Liu, Gina Stevens, Kathleen Ann Ruane, Alissa M. Dolan, and Richard M. Thompson II, Congressional Research Service, Cybersecurity: Selected Legal Issues, March 14, 2012. Unclassified. The authors of this report address legal issues related to the protection of critical infrastructure, the protection of federal networks (including Fourth Amendment as well as civil liberties and privacy issues), and the sharing of cybersecurity information. In addition, the authors explore the possibility of federal cybersecurity law preempting state law. Document 68a: John McCain to General Keith B. Alexander, Letter, March 29, 2012. Unclassified. Document 68b: Keith B. Alexander, Commander, U.S. Cyber Command to The Honorable John McCain, May 3, 2012. Unclassified/For Official Use Only. Document 68c: John McCain to General Keith B. Alexander, May 9, 2012. Unclassified. Sources: http://www.washingtonpost.com, http://www.federalnewsradio.com, http://blog.zwillgencom This series of letters begins with Senator John McCain (R-Az.) writing to Cyber Command chief Keith Alexander concerning the issue of whether the U.S. government needs additional authorities to deter and defend against cyber attacks. Alexander’s May 3 letter contains responses to the six questions posed by McCain in his March 29 letter. In turn, McCain’s May 9 letter notes a number of disagreements with the content of Alexander’s responses. Document 69: Office of the Chief of Naval Operations, OPNAV Instruction 5450.345, Subj: Mission, Functions, and Tasks for Commander, U.S. Fleet Cyber Command and Commander, U.S. Tenth Fleet, April 4, 2012. Unclassified. Source: http://doni.daps.dla.mil/Directives This instruction specifies the authorities and missions of the U.S. Fleet Cyber Command, as well as the relationship between the commander, Fleet Cyber Command, and the commander, U.S. Tenth Fleet. It also specifies a number of Navy entities under the administrative control of the Fleet Cyber Command — including the Navy Information Operations Command (which conducts signals intelligence operations), the Navy Cyber Warfare Development Group, and the Navy Cyber Defense Operations Command. Document 70: Gregory C. Wilshusen, Government Accountability Office, GAO-12-666T, Cybersecurity: Threats Impacting the Nation, April 24, 2012. Unclassified. This report describes GAO’s assessment of cyber threats posed to federal and other computer systems, and vulnerabilities present in federal information systems and supporting critical infrastructure. It also describes reported cyber incidents and their impacts. It characterizes the number of cybersecurity incidents reported by federal agencies as rising and that “recent incidents illustrate that these pose serious risk.” Document 71a: Pat Meehan, Statement to Subcommittee on Counterterrorism and Intelligence and Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies, “Iranian Cyber Threat to the U.S. Homeland,” April 26, 2012. Unclassified. Document 71b: Dan Lungren, Statement to Subcommittee on Counterterrorism and Intelligence and Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies, “Iranian Cyber Threat to the U.S. Homeland,” April 26, 2012. Unclassified. Document 71c: Frank J. Cilluffo, Director, Homeland Security Policy Institute, George Washington University, Statement to Subcommittee on Counterterrorism and Intelligence and Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies, “The Iranian Cyber Threat to the United States,” April 26, 2012. Document 71d: Ilan Berman, American Foreign Policy Council, Statement to Subcommittee on Counterterrorism and Intelligence and Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies, “The Iranian Cyber Threat to the U.S. Homeland,” April 26, 2012. Unclassified. Source: http://homeland.house.gov Substantial attention has been devoted to Chinese cyberwarfare activities in the reports of private and government organizations as well as in Congressional hearings. While Iranian cyber activities were noted in the 2012 testimony of Director of National Intelligence James Clapper, who characterized them as “dramatically increasing in recent years in depth and complexity,” they have received less attention that those of the People’s Republic of China. These hearings, before a subcommittee of the House Committee on Homeland Security, involve assessments of the Iranian cyber threat by two Congressmen and representatives of two private organizations. Document 72: Colonel Jayson M. Spade, U.S. Army War College, Information as Power: China’s Cyber Power and America’s National Security, May 2012. Unclassified. Source: U.S. Army War College (www.carlisle.army.mil) This research paper examines the growth of Chinese cyber capabilities — including those for offensive, defensive, and computer network exploitation operations. It also compares China’s capacity and potential in cyberspace to United States efforts with regard to cybersecurity. In addition, the author suggests a number of steps to improve U.S. cybersecurity policy. Document 73: Eric A. Fischer, Congressional Research Service, Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions, June 29, 2012. Unclassified. This analysis contains an introduction reviewing the then-current legislative framework on cybersecurity, executive branch actions, and legislative proposals. It then discusses proposed cybersecurity-related revisions to 28 different statutes — from the Posse Comitatus Act of 1879 to the Intelligence Reform and Terrorism Prevention Act of 2004. Document 74: Gregory C. Wilshusen, Government Accountability Office, GAO-12-962T, Cybersecurity: Challenges in Securing the Electricity Grid, July 17, 2012. Unclassified. This testimony, by a GAO official, concerns cyber threats to critical infrastructure — including the electricity grid — as well as actions taken to prevent cyber attacks on the grid and challenges that remain. Mr. Wilshusen notes the actions taken by a number of entities (including the North American Electric Reliability Corporation, the National Institute of Standards and Technology, and the Federal Energy Regulatory Commission), and identifies challenges such as a focus by utilities on regulatory compliance instead of comprehensive security and the lack of electricity metrics for evaluating cybersecurity. Document 75: Office of Inspector General, Department of Homeland Security, OIG-12-112, DHS Can Strengthen Its International Cybersecurity Program (Redacted) , August 2012. Unclassified. This is an unclassified version of a DHS inspector general report. In addition to reviewing actions taken to establish relationships with international cybersecurity entities, the report notes four areas that could be targeted for improvement — developing a strategic implementation plan for foreign engagement, streamlining the National Programs and Protection Directorate’s (NPPD) international affairs program and processes, improving communication between the U.S. Computer Emergency Readiness Team and foreign entities, and strengthening NPPD information sharing capabilities. Document 76: Paul W. Parfomak, Congressional Research Service, Pipeline Cybersecurity: Federal Policy, August 16, 2012. Unclassified. As a means of aiding Congressional consideration of possible measures to enhance pipeline security, this report examines pipeline security risks (including general security threats, supervisory control and data acquisition (SCADA) security risks, and cyber threats to U.S. pipelines), U.S. pipeline security initiatives, and the adequacy of voluntary pipeline cybersecurity. Document 77: Brian McKeon, Executive Secretary, National Security Staff, The White House, Memorandum, Subject: Papers Deputies Committee Meeting on Executive Order on Improving Critical Infrastructure Cybersecurity Practices, September 28, 2012 w/atts: Discussion Paper for Deputies Committee Meeting on Executive Order on Improving Critical Infrastructure Cybersecurity Practices; Draft Executive Order on Improving Critical Infrastructure Cybersecurity Practices. Unclassified. Source: http://www.lawfareblog.com In the face of Congressional rejection of the Administration’s proposed cybersecurity legislation, work began on producing an executive order intended to accomplish the desired objectives. The first attachment (Tab A) to the covering memo discusses the key components of the cybersecurity legislation as well as how the executive order relies on current agency authorities to accomplish those objectives. The second attachment is a draft of the executive order. Document 78: Leon E. Panetta, Secretary of Defense, “Defending the Nation from Cyber Attack,” Speech to Business Executives for National Security, October 11, 2012. Unclassified. In this speech, Secretary Panetta warns of the possibility of a “cyber Pearl Harbor” — which could involve the derailing of passenger trains, contamination of the water supply in major cities, or the shutdown of the power grid across large parts of the country. Document 79: Mark A. Stokes and L.C. Russell Hsiao, Project 2049 Institute, Countering Chinese Cyber Operations: Opportunities and Challenges for U.S. Interests, October 29, 2012. Not classified. Source: http://project2049.net This report, by a private organization, examines the role of several Chinese organizations — including the Third Department of the PLA General Staff Department, its Second Bureau, and its Beijing North Computing Center — in cyber operations. It also explores a number of possible reactions — including deception, an international code of conduct, an Asian cyber defense alliance, and what the report terms a “forceful response.” Document 80: Richard Colbaugh and Kristin Glass, Sandia National Laboratories, SAND2012-10177, Proactive Defense for Evolving Cyber Threats, November 2012. Unclassified. This technical/mathematical analysis seeks to characterize “the predictability of attack/defender coevolution” — which is then used to create a framework for designing proactive defenses for large networks. Document 81: Defense Science Board, Resilient Military Systems and the Advanced Cyber Threat, January 2013. Unclassified. Source: http://www.acq.osd.mil/reports This report (consisting of eleven chapters and six appendices) examines and evaluates the Defense Department’s defensive and offensive cyber operations. It concludes that DoD cyber security practices “have not kept up” with the tactics of cyber adversaries. It characterizes the threat as “serious” and “insidious” and objects that current Defense Department actions are “fragmented,” intelligence against targeting of DoD systems is “inadequate,” and that “with present capabilities and technology it is not possible to defend with confidence against the most sophisticated cyber attacks.” Document 82: The White House, Administration Strategy on Mitigating the Theft of U.S. Trade Secrets, February 2013. Unclassified. This document describes the administration strategy on mitigating the theft of U.S. trade secrets — including those stolen through cyber operations. It describes four action items — involving diplomatic efforts, promoting voluntary practices by private industry, enhancing domestic law enforcement operations, improving domestic legislation, and promoting public awareness. Document 83: Mandiant, APT 1: Exposing One of China’s Cyber Espionage Units, February 2013. Not classified. Source: http://www.mandiant.com As a result of its investigation into computer security breaches around the world, Mandiant identified 20 groups designated Advanced Persistent Threat (APT) groups. The focus of this report is APT 1 — which the report concludes is the People Liberation Army’s Unit 61398 — the military unit cover designator for the 2nd Bureau of the Third Department of the PLA General Staff Department (also discussed in Document 79). The key elements of the report are the discussions of tasking to the unit, its past espionage operations, attack lifecycle, and the unit’s infrastructure and personnel. Document 84: Office of Inspector General, Department of Energy, DOE/IG-0880, Audit Report, Management of Los Alamos National Laboratory’s Cyber Security Program, February 2013. Unclassified. Based on its audit of the Los Alamos National Laboratory’s (LANL) cyber security practices, the DoE inspector general observes that “LANL had made significant improvements to its cybersecurity program in recent years,” but that there were continuing concerns for several reasons – including a failure to address the full set of “critical and high-risk vulnerabilities.” The inspector general also makes three recommendations to improve LANL cybersecurity. Document 85: Government Accountability Office, GAO-13-187, Cybersecurity: National Strategy, Roles, and Responsibilities Need to Be Better Defined and More Effectively Implemented, February 2013. Unclassified. This study reports a 782-percent increase in cybersecurity incidents between 2006 and 2012. It examines the challenges facing the federal government in producing a strategic approach to cybersecurity and the degree to which the “national cybersecurity strategy adheres to desirable characteristics for such a strategy.” Document 86: The White House, Presidential Policy Directive/PPD-21, Subject: Critical Infrastructure Security and Resilience, February 12, 2013. Unclassified. This directive states basic U.S. policy with regard to the protection and recovery of critical infrastructure from both physical and cyber attacks. The key components are its delineation of roles and responsibilities of officials and agencies, its identification of three strategic imperatives, and its direction to the Secretary of Homeland Security on steps to implement the directive. Document 87: The White House, Executive Order – Improving Critical Infrastructure Cybersecurity, February 12, 2013. Unclassified. Source: Federal Register, 78, 33 (February 19, 2013) In contrast to PPD-21 (Document 86) this executive order focuses solely on critical infrastructure cybersecurity. It address cybersecurity information sharing, a framework to reduce cyber risk to critical infrastructure, and the identification of critical infrastructure at greatest risk. Document 88: Geoff McDonald, Liam O. Murchu, Stephen Doherty, and Eric Chien, Symantec Corporation, Stuxnet 0.5: The Missing Link, February 26, 2013. Not classified. This analysis follows up on Symantec’s earlier examination of the Stuxnet worm (Document 44, also see Document 40). It reports that Symantec “discovered an older version of Stuxent that can answer the questions about [its] evolution.” Document 89: Eric A. Fischer, Edward C. Liu, John Rollins, and Catherine A. Theohary, Congressional Research Service, The 2013 Cybersecurity Executive Order: Overview and Considerations for Congress, March 1, 2013. Unclassified. This paper identifies a number of types of individuals or groups that are considered threats to cybersecurity. It also provides an overview of President Obama’s executive order (Document 87), considers the question of the scope of presidential authority, and examines the relationship between the executive order and legislative proposals. Document 90: James R. Clapper, Director of National Intelligence, Worldwide Threat Assessment of the US Intelligence Community, Statement for the Record to the Senate Select Committee on Intelligence, March 12, 2013. Unclassified. Source: http://www.dni.gov In his annual worldwide threat assessment, Director of National Intelligence James Clapper begins with a discussion of global threats, and his discussion of global threat with an examination of the cyber threat. Specific topics addressed include the risk to U.S. critical infrastructure, the impact on U.S. economic and national security, information control and internet governance, and the activities of hacktivists and cybercrimnals. Document 91: General Keith Alexander, Commander, United States Cyber Command, Statement before the Senate Committee on Armed Services, March 12, 2013. Unclassified. Source: http://www.armed-services-senate.gov In this statement, Alexander describes the organization and personnel strength of the Cyber Command, the strategic landscape, the command’s priorities, and plans for the future. Document 92: U.S. Cyber Command, U.S. Cyber Command Organization Chart, n.d., Unclassified. Source: U.S. Strategic Command Freedom of Information Act Release This chart depicts the headquarters organizational structure of U.S. Cyber Command as of April 2013. 1. Leon Panetta, Address to Business Executives for National Security, “Defending the Nation from Cyber Attack,” October 11, 2012, http://www.defense.gov; Barack Obama, “Remarks by the President in the State of the Union Address,” February 12, 2013, http://www.whitehouse.gov; James R. Clapper, Statement for the Record, Worldwide Threat Assessment of the US Intelligence Community, March 12, 2013, pp. 1-3, http://www.dni.gov; “Senate Armed Services Committee Gets Grim Briefing on Cyber Threats,” March 20, 2013, http://www.matthewaid.com. 2. See Ted Lewis, “Cyber Insecurity: Black Swan or Headline?,” Homeland Security Watch (www.hlswatch.com), February 8, 2013; Ryan Singel, “Richard Clarke’s Cyberware: File Under Fiction, http://www.wired.com, April 22, 2010; John Arquilla, “Panetta’s Wrong About a Cyber ‘Pearl Harbor’, http://www.foreignpolicy.com, November 19, 2012; Jerry Brito and Tate Watkins, “Loving the Cyber Bomb?: The Dangers of Threat Inflation in Cybersecurity Policy,” Homeland National Security Journal, Vol. 3, 2011, pp. 39-83; Thomas Rid, “Cyber War Will Not Take Place,” Journal of Strategic Studies, 35, 1 (February 2012), pp. 5-32; Ronald Bailey, “Cyberwar Is Harder Than It Looks,” Reason, May 2011, pp. 50-51. 3. Steven A. Hildreth, Congressional Research Service, Cyberwarfare , June 19, 2001, p. CRS-4 4. John Rollins and Clay Wilson, Congressional Research Service, Terrorist Capabilities for Cyberattack: Overview and Policy Issues , January 22, 2007,pp. CRS-16-17. 5. Major William C. Ashmore, United States Army Command and General Staff College, Impact of Alleged Russian Cyber Attacks , 2009, pp. 11-14. 6. McAfee, Global Energy Cyberattacks: “Night Dragon”, February 10, 2011; “Three Saudis Sent to Prison for Stealing Info From Aramco Computer Systems,” http://www.matthewaid.com,March 19, 2013; Ellen Nakashima, “Iran blamed for cyberattacks on U.S. banks and companies,”www.washingtonpost.com, September 21, 2012. 7. Michael Vatis, Cyber Atttacks: Protecting America’s Security against Digital Threats,” ESDP Discussion Paper ESDP-2002-04, John F. Kennedy School of Government, Harvard University, June 2002, p. 15, n.42. 8. Ted Bridis, “‘Silent Horizon’ war games wrap up for the CI A,” http://www.usatoday.com,May 26,2005 9. Chairman of the Joint Chiefs of Staff, The National Military Strategy for Cyberspace Operations , December 2006, p. C-2. 10. James R. Clapper, Director of National Intelligence, Unclassified Statement for the Record on the Worldwide Threat Assessment for the Senate Select Committee on Intelligence , January 31, 2012, p. 8. 11. “National Security Presidential Directives [NSPD] George W. Bush Administration,”www.fas.org, accessed March 30, 2013. 12. “Sean Kanuck – National Intelligence Officer for Cyber Issues, Office of the Director of National Intelligence,” http://www.security-innovation.org/bios, accessed April 5, 2013; Jeffrey T. Richelson, The U.S. Intelligence Community (Boulder, Co.: Westview, 2011), pp. 23, 29;”The Information Operations Center Analysis Group (IOC/AG),” http://www.cia.gov, accessed April7, 2013; John Rollins and Clay Wilson, Congressional Research Service, Terrorist Capabilities for Cyberattack: Overview and Policy Issues, January 22, 2007, p. CRS-8. 13. Jana D. Monroe, Federal Bureau of Investigation, “Testimony before House Judiciary Committee, Subcommittee on Courts, the Internet and Intellectual Property,” June 17, 2002,www.fbi.gov/news/testimony/the-fbis-cyber-division; “Cyber Division,” http://www.fbigovs.gov/311132.asp, accessed March 31, 2013. 14. A computer virus designated FLAME has been reported to have been designed to gather information needed for the U.S. and Israel to employ the Stuxnet worm. See Ellen Nakishima, Greg Miller, and Julie Tate, “U.S., Israel developed Flame computer virus to slow Iranian nuclear efforts, officials say,” http://www.washingtonpostcom, June 19, 2012; Kim Zetter, “Meet ‘Flame,’ The Massive Spy Malware Infiltrating Iranian Computers,” http://www.wired.com, May 28, 2012. 15. Eric Schmitt and Thom Shanker, “U.S. Weighed Use of Cyberattacks To Weaken Libya,” New York Times, October 18, 2011, pp. A1, A7. 16. David E. Sanger, Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power (New York: Crown, 2012), pp. 188-225; Marc Ambinder and D.B. Grady, Deep State: Inside the Government Secrecy Industry (New York: Wiley, 2013), pp. 261-279. 17. Some law review articles include David E. Graham, “Cyber Threats and the Law of War,” Journal of National Security Law and Policy , 4, 2010, pp. 87-102; Matthew C. Waxman, “Cyber-Attack and the Use of Force: Back to the Future, Article 2(4),” Yale Journal of International Law, 36, 2011, pp. 421-459; Eric Talbot Jensen, “Computer Attacks on Critical National Infrastructure,” Stanford Journal of International Law, 38, 2002, pp. 207-240. magister bernd pulch magister pulch Nsa Acronym Nsa Address Nsa Advisor Nsa Agent Nsa Agent Salary Nsa Agreement Nsa Alabama Nsa Annapolis Nsa Approved Shredders Nsa Arc Nsa Backdoor Nsa Badge Nsa Bahrain Nsa Baseball Nsa Benefits Nsa Bethesda Nsa Budget Nsa Budget 2016 Nsa Building Nsa Building Nyc Nsa Cae Nsa Careers Nsa Chief Nsa Colorado Nsa Conference Nsa Crane Nsa Crypto Challenge Nsa Csfc Nsa Css Nsa Cyber Security Nsa Data Center Nsa Data Collection Nsa Datasheet Nsa Datasheet Is Called Nsa Day Of Cyber Nsa Definition Nsa Deputy Director Nsa Director Nsa Director Salary Nsa Domestic Surveillance Nsa Echelon Nsa Edward Snowden Nsa Email Nsa Emblem Nsa Employees Nsa Employment Nsa Encryption Nsa Eternal Blue Nsa Evaluated Products List Nsa Exploits Nsa Facebook Nsa Facts Nsa Fastpitch Nsa Florida Nsa Florida Youth Nsa Flynn Nsa Foia Nsa Fort Gordon Nsa Fort Meade Nsa Friend Nsa Game Nsa Georgia Nsa Gif Nsa Gift Shop Nsa Github Nsa Glassdoor Nsa Government Nsa Grants Nsa Grindr Nsa Guy Nsa Hacked Nsa Hacking Tools Nsa Hacking Tools Leaked Nsa Hampton Roads Nsa Hawaii Nsa Head Nsa Headquarters Nsa Headquarters Address Nsa Hiring Process Nsa History Nsa Iad Nsa Ias 2017 Nsa Illinois Nsa India Nsa Indiana Nsa Industries Nsa Influence 2017 Nsa Insurance Nsa Intelligence Analyst Nsa Internships Nsa Japan Nsa Job Openings Nsa Job Requirements Nsa Jobs Nsa Jobs In Md Nsa Jobs Salary Nsa Jobs Utah Nsa Jokes Nsa Juice Plus Nsa Jurisdiction Nsa Kankakee Nsa Kaspersky Nsa Kc Nsa Keith Alexander Nsa Kentucky Nsa Key Nsa Keywords Nsa Kmi Nsa Korea Nsa Kunia Nsa Language Analyst Nsa Leader Nsa Leadership Nsa Leak Nsa Leaked Tools Nsa Leaker Nsa Listening Nsa Locations Nsa Login Nsa Logo Nsa Maryland Nsa Mcmaster Nsa Meaning Nsa Media Nsa Meet Nsa Meme Nsa Mid South Nsa Mike Rogers Nsa Mission Statement Nsa Museum Nsa Name Generator Nsa Naples Nsa Nashville Nsa New Orleans Nsa News Nsa Norfolk Nsa North Nsa Number Nsa Nursing Nsa Nyc Nsa Obama Nsa Of 1947 Nsa Offices Nsa Online Test Nsa Only Nsa Operational Interview Nsa Opm Test Nsa Org Chart Nsa Organization Nsa Orlando Nsa Panama City Nsa Pay Scale Nsa Philadelphia Nsa Phone Number Nsa Play Nsa Police Nsa Police Officer Nsa Polygraph Nsa Prism Nsa Purpose Nsa Qualifications Nsa Qualifier Nsa Quantum Nsa Quantum Computer Nsa Quantum Computer Farm Nsa Quartet Nsa Questions Nsa Quiz Nsa Quizlet Nsa Quotes Nsa Ransomware Nsa Recruiting Nsa Relationship Nsa Reno Nsa Requirements Nsa Responsibilities Nsa Rogers Nsa Rule Book Nsa Rules Nsa Russia Nsa Salary Nsa Scandal Nsa Scholarship Nsa Slang Nsa Soccer Nsa Softball Nsa Softball Rules Nsa Spying Nsa Stands For Nsa Surveillance Nsa Tao Nsa Test Nsa Texas Nsa Tinder Nsa Tools Nsa Tools Leaked Nsa Tournaments Nsa Training Nsa Trump Nsa Twitter Nsa Umpire Nsa Unconstitutional Nsa Under Obama Nsa Uniform Nsa Unmasking Nsa Urban Nsa Usa Nsa Utah Nsa Utah Facility Nsa Utah Jobs Nsa Vanilla Nsa Violation Of Privacy Nsa Virginia Nsa Virus Nsa Visitor Center Nsa Visitor Control Center Nsa Vpn Nsa Vs Cia Nsa Vs Cia Vs Fbi Nsa Vs Fbi Nsa Wannacry Nsa Washington Nsa Watchlist Nsa Water Filter Nsa Website Nsa Whistleblower Nsa Wiki Nsa Wikileaks Nsa Wiretapping Nsa World Series Nsa X Files Nsa Xbox Live Nsa Xbox One Nsa Xcode Nsa Xeno Tournament Nsa Xeno World Qualifier Nsa Xkeyscore Nsa Xkeyscore Download Nsa Xkeyscore Presentation Nsa Yakima Nsa Yearly Budget Nsa Yellow Dots Nsa Yogurt Nsa Yottabyte Nsa Young Investigator Grant Nsa Youth Nsa Youth Florida Nsa Youth Program Nsa Youtube Nsa Za Nsa Zero Day Nsa Zero Day Exploit Nsa Zero Division Nsa Zeus Nsa Zimbabwe Nsa Zimmermann Telegram Nsa Zip Code Nsa Zone Store Nsa Zyxel Published May 4, 2013 April 23, 2018 Video – The Future of News: Investigative Journalism – Bob Woodward Michael Moore – Sicko – Full Movie
cc/2019-30/en_head_0024.json.gz/line32
__label__cc
0.526047
0.473953
MyUS has made every effort to provide the best available shopping options for our members. However, some merchants listed may have established purchase restrictions, may not take all forms of payment or may restrict purchases to certain countries. Always check the merchant’s site for terms of sale, shipping guidelines or terms and conditions for more information. Some workers, "pickers", who travel the building with a trolley and a handheld scanner "picking" customer orders can walk up to 15 miles during their workday and if they fall behind on their targets, they can be reprimanded. The handheld scanners give real-time information to the employee on how fast or slowly they are working; the scanners also serve to allow Team Leads and Area Managers to track the specific locations of employees and how much "idle time" they gain when not working.[183][184] In a German television report broadcast in February 2013, journalists Diana Löbl and Peter Onneken conducted a covert investigation at the distribution center of Amazon in the town of Bad Hersfeld in the German state of Hessen. The report highlights the behavior of some of the security guards, themselves being employed by a third party company, who apparently either had a neo-Nazi background or deliberately dressed in neo-Nazi apparel and who were intimidating foreign and temporary female workers at its distribution centers. The third party security company involved was delisted by Amazon as a business contact shortly after that report.[185][186][187][188][189] On October 16, 2016, Apple filed a trademark infringement case against Mobile Star LLC for selling counterfeit Apple products to Amazon. In the suit, Apple provided evidence that Amazon was selling these counterfeit Apple products and advertising them as genuine. Through purchasing, Apple was able to identify that nearly 90% of the Apple accessories sold and fulfilled by Amazon were counterfeit. Amazon was sourcing and selling items without properly determining if they are genuine. Mobile Star LLC settled with Apple for an undisclosed amount on April 27, 2017.[164] Between texting, directions, and social media, it's easy to drain your battery when you're out and about. To assure that you have enough power to make an emergency phone call while still being able to use various apps, you should always have a portable charger on hand. This one from Anker has fast charging capabilities, can charge an iPhone 8 up to 2.5 times, and it's slim, meaning it's easy to carry in a purse or back pocket. When you first move into a new apartment, you're always missing a few things—like say, a complete knife set. If you're not looking to spend too much, this colorful, stainless steel set from Vremi is one of the best knife sets we've tested under $100. They come with hard plastic covers that are ideal for storage and right now, you can get them at their lowest price. They're not the sharpest knives out there, but they make a great set for a basic kitchen. Prime membership will set you back $12.99/£7.99 per month ($6.49 if you're a student) or $119/£79 annually. But if you're not a Prime subscriber already and don't want to commit, you can sign up for a free 30-day Amazon Prime trial and you'll be eligible for Lightening deals (as well as all the other Prime benefits). You can then cancel any time within that 30 days with no strings attached. Just don’t sign up yet – wait until 1st November. As one of its daily deals, Woot via Amazon offers the refurbished Samsung 28" 4K LED-Backlit LCD Monitor for $229.99 with free shipping. Although it was $10 less for a refurb in August, it's still $65 cheaper than the best price we could find for a new unit today. It features a 3840x2160 4K native resolution, 1ms response time, DisplayPort, and two HDMI inputs. A 90-day Samsung warranty applies. Deal ends today. BuyDig offers the Sony 69.5" 4K HDR Flat LED Ultra HD Smart Television, model no. XBR70X830F, bundled with a $150 Visa Gift Card for $1,598 with free shipping. (The gift card will be emailed within six to eight weeks.) Assuming you'll use the gift card, that's $52 under our mention from two weeks ago and the lowest price we could find now by $150. This 2018 model features: Mevol via Amazon offers its Mevol Stainless Steel Tub Drain Hair Catcher for $12.99. Coupon code "WDLK8SZM" cuts that to $8.96. Plus, Prime members receive free shipping. That's tied with our mention from two weeks ago, $4 off, and the lowest price we could find. It fits drains from 1.5" to 1.8" diameter and comes with four rubber gaskets. Deal ends October 31. Gimme Shopping Australia is a great Australian price comparison website that allows customers to find the best product prices online. Store owners can choose to have their products listed on the platform for free. They pride themselves in being an ad free platform to avoid biasing their customers. The platform can help store owners drive more traffic to their online stores. However, you will need to pay a commission for traffic that leads to sales. Our favorite is DealNews.com, which has a team of deal hunters who keep their eyes on a million products at more than 2,000 reputable online retailers and update the site with new deals at least 200 times a day. Plus, it works with merchants to offer exclusive deals you won't find elsewhere. There's a picture of each product and ample information, including the original price, sale price and whether it's the lowest price DealNews has found for the product. You can sign up for e-mail alerts for products or stores you're interested in and get shopping advice from the site's buying guides. Now Discount’s price comparison app helps customers get online prices from local retailers. It helps brick and mortar retailers compete with online retail pricing to draw in more customers into stores. Brick and mortar retailers can choose whether or not to sell the item at the online price or for a discounted price. The app connects consumers to stores in their geographical location. This means that customers can also use this app to compare supermarket prices in their geographic location. Brilliance Audio is an audiobook publisher founded in 1984 by Michael Snodgrass in Grand Haven, Michigan.[93] The company produced its first 8 audio titles in 1985.[93] The company was purchased by Amazon in 2007 for an undisclosed amount.[94][95] At the time of the acquisition, Brilliance was producing 12–15 new titles a month.[95] It operates as an independent company within Amazon. Amazon puts all of its daily deals into a Gold Box. Check the Today's Deals page to access these daily deals and get limited-time savings of up to 80% off select items, coupons to instantly clip and access to Lightning Deals. Lightning Deals are available only for a limited amount of time and have a countdown timer showing how much time is left to get the discount. Shop before the deal expires or the item sells out.
cc/2019-30/en_head_0024.json.gz/line33
__label__wiki
0.661041
0.661041
Holby City actor McFadden named for Britain's Strictly Come Dancing He's also appeared in Heartbeat, Take the High Road, The Crow Road and Sex, Chips & Rock "n" Roll. He said that: " Strictly is one of the biggest, most enter... Etta Candy stars in the unseen epilogue for 'Wonder Woman' Domestically, it's now one of the films to have made $400 million and has become the highest grossing live-action film helmed by a single female director. At ... Tim Minchin says 'yes' to equality with song for pollies They think we're kind, fun and amusing; tall, tanned and toned; and a little bit racist and a little bit homophobic. "It's bad enough, these poli-arseholes p... Usa e Corea Sud concordano di discutere passi su Corea del Nord Parole che un comunicato dell'esercito bolla come " sciocchezze ", annunciando che il piano per l'attacco alle acque di Guam a metà agosto andrà avanti. Le pr... OutKast rapper gives service puppy to girl paralyzed in bounce house shooting Big Boi's passions are music and the bulldogs he breeds at Pitf Fall Kennels. "What are you going to name your puppy?" The Atlanta native has chose to cove... Tabárez convocó a Federico Valverde y Mauricio Lemos Valverde fue uno los pilares fundamentales de la selección sub-20 que llegó hasta semifinales en el pasado certamen del orbe sub-20 en Corea del Sur. La única... Ransom money worth $250000 demanded from HBO The executive continues: "You have the advantage of having surprised us". In a message leaked by the hackers, the executive says "HBO has been working hard si... Singapore Airlines Unveils New In-Flight Safety Video Singapore Airlines (SIA) and Columbia Metropolitan Airport (CAE) entered a Memorandum of Understanding (MOU) to build a flight training centre in Singapore. CAE... Graham Phillips cast as Veronica's ex on Riverdale As such, we have a feeling that his fragile relationship with Veronica may not survive anthey pressure and tension that Nick brings when he arrives in town. ET/... Police summon Bigg Boss Contestant The channel had telecasted visuals of Oviya immersing herself into a pool on August 4. It's well known that Oviya attempted suicide due to too much stress i... Aishwarya Rai Bachchan, daughter Aaradhya hoist Indian flag at IFFM 2017 The actress flew to Melbourne along with her daughter Aaradhya to attend Indian Film Festival Melbourne 2017. The duo not only hoisted the flag but also sang ... RSP Permian (RSPP) - Investment Analysts' Weekly Ratings Updates Some buy side analysts are also providing their Analysis on RSP Permian, Inc ., where 12 analysts have rated the stock as Strong buy, 17 analysts have given a ... DMX Violates Bail Bond on Tax Evasion Case He left NY to see family in St. Louis, without telling hizzoner ... and that could be a deal breaker. "The Court has received a report from pretrial services ... Cambodia gives ultimatum to Laos over 'border invasion' Cambodian troops were seen riding through the capital Phnom Penh in armored military vehicles to reinforce defences at the border. In a news conference after ... Toilet 1 Prem Katha- 1st Day Collection Let's see how Akshay Kumar and Bhumi Pednekar starrer film will perform at the box office , we hope the film will set the mark at the box office soon. Wome... 'Every Day There Are Boats': Migrant Arrivals Triple In Spain Three times as many migrants have arrived so far in 2017 as the amount who had arrived in the same period a year ago. Spain's increase is in stark contrast to... Celebrity Big Brother 2017 Earlier this week it was confirmed that Kathy, Sarah Hardin, Chad Johnson, and Trisha Paytas would face the public vote this Friday. Trisha had been threate... Talent Manager Apologizes For Sexist Emails: "Completely Inexcusable" Both men and women experience verbal abuse, but are afraid to stand up for themselves. I'm an a**hole. If you come back we can play Nazi death camp. Laursen, ... Two killed as speeding tempo hits stationary DTC bus Driver Pramod Kumar and conductor Sumit got down and found the bus had developed a major snag.Pramod called the DTC engineers, who sent three mechanics, Sukhpre... Dwayne Johnson covers up his infamous bull tattoo... with even bigger tattoo We talked for hours and hours and hours of what this means, the evolution, what it means, how it reflects me as a man. He went on to share what the updated ta... CNN Poll: Nearly seven in 10 judge Congress a failure so far Now, Young is talking about bipartisanship as he faces the reality that Democrats are gunning for him in a state where Trump's approval is sinking and neither c... You can now get branded 'Broad City' sex toys The Broad City Respect Your Dick love ring is some high class sh*t. Brought to you courtesy of Lovehoney, the special edition set has everything your (dirty... 'Star Wars: The Last Jedi': Maz Kanata Will Have a Smaller Role The Force Awakens really made a missed opportunity - Phasma could have been a good villain if she was just given a chance to show off her skills as a chrometro... Richa Chadha attends Fukrey Returns teaser launch despite having swine flu Aamir Khan and his wife Kiran Rao are down with H1N1 influenza and are undergoing treatment for the same at home. When asked about her illness, she told... Lamar Advertising Company (LAMR) - Citigroup Maintains Rating And Updates Price Target Creative Planning increased its stake in Lamar Advertising by 11.1% in the first quarter. The Ranger Investment Management Lp holds 950,881 shares with $29.31... Tim & Eric's Bedtime Stories: New Season & Special Coming to Adult Swim Sporadically placed throughout the stage show was the first episode of Season 2 of T&E's other Adult Swim series Tim and Eric's Bedtime Stories , aptly tit... Overwatch : nouveau mode de jeu et nouvelle carte dévoilée ! Le combat à mort par équipe est un mode à 6 contre 6, dont l'équipe victorieuse est la première à cumuler 30 victimes. Cependant l'arrivée du mode arcade ... 'Jersey Shore' Cast Returns To TV For A Reunion The special will follow these outrageous friends as they come back together for the first time in five years to gossip about each other's relationships, recent ... Petrol power for Audi Q2 quattro For the first time a petrol-powered Q2 is available with quattro 4WD, and here in the Q2 that 190 PS 2.0 litre TFSI delivers 187bhp, enough to get to 62mph in 6... McConnell-Linked Super PAC Interested In Kid Rock Candidacy Yes, really. This might actually happen, because this is the world we live in now. The comments from Steven Law in an interview Friday on C-SPAN's "Newsmakers... Fifth Harmony release music video for new single 'Angel' The Fifth Harmony singer publicly came out as bisexual in November 2016, and has said she feels "motivated" rather than "scared" when it comes to showing of... L'étoile de Charles Aznavour brillera à Hollywood Après Maurice Jarre , Pierre Monteux ou encore Maurice Chevalier , un autre chanteur français va se voir décerner l'une des fameuses étoiles qui recouvrent le... GOT's Bronn's Mailman Is No Longer Talking To Him - With Good Reason However, while Bronn may now be in the pocket of Jaime "Kingslayer" Lannister , let's not forget Bronn's bromance with little Lord Tyrion. Warning: This ... The Death of Stalin Trailer: From Russia, With Incompetence And they haven't bothered to put a Russian twang on their accents, which makes it all the more entertaining. Set in 1953, and based on the just-published Titan... DMX sentenced to home confinement after violating bail conditions District Judge Jed Rakoff also said the rapper must wear an electronic bracelet and ask his permission at least a week in advance if he wants to travel. "In add... Newborn Baby Found Tossed in the Bushes and Covered With Bugs Spencer said deputies followed blood on the sidewalk back to an apartment, where they found the baby's mother. Albert Peterson disclosed to KHOU that he tho... Service Corporation International (SCI) Upgraded to "Buy" by Zacks Investment Research The brokerage now has $39.00 price target on the stock. According to Zacks, "Service Corp.is the largest provider of funeral and cemetery services in the worl... Netflix cancels Naomi Watts' Gypsy after one season But while Watts' intimate therapist isn't coming back to the streaming service after only one season, the gorgeous ladies of wrestling will be stepping back in ... Kylie Jenner Was Once Turned Down by Her Ultimate Celebrity Crush So I went back down and I found the backing. "But Kim right now is my fave". "He's very daddy. I'm very into it", Woods added. When asked to reveal their ce... Scorpio Tankers (NASDAQ:STNG) Receiving Somewhat Positive News Coverage, Accern Reports The firm is expected to report its next quarterly earnings report on Thursday, August 10th. The legal version of this report can be read at https://www.themarke... Nikki Reed Has Given Birth To Her First Baby With Ian Somerhalder This means no visitors and even no phones, adding that there are no expectations for them communicate. "Hi Little One. I know you, but only because I feel you... Comparable Company Analysis: Twenty-First Century Fox, Inc. (FOX), HCA Healthcare, Inc. (HCA) Broadcom Ltd (NASDAQ:AVGO) has risen 64.00% since August 11, 2016 and is uptrending. Finally, Bronfman E.L. Rothschild L.P. increased its stake in Twenty-First... Fiona Apple shares heartfelt message for Sinead O'Connor Fiona Apple has shared a heartfelt video message for Sinead O'Connor, following O'Connor's recent admission of struggles with depression and suicidal thought... Madhubala Immortalized at Madame Tussauds So, does that mean that she was the same at home? Some of her widely acclaimed films include Mahal (1949), Amar (1954), Mr. & Mrs. 55 (1955), Chalti Ka Naam Gaa... JUSTICE LEAGUE Reshoots To Lighten Up SNYDER's 'Too Dark' Cut, Says Actor However, he spoke about Fisher's Victor/Cyborg. He said, "I know that with Ray [Fisher], the young man who plays Victor, there were some adjustments that they m... Daniel Dae Kim Says Hawaii Five-0 Departure Was About "Self-Worth" The 49-year-old actor, who is popularly known for his on-screen avatar as detective lieutenant, Chin Ho Kelly said the CBS show was a "really important part" ... 'Walking Dead' Creator Moves From AMC to Amazon With Big Overall Deal Still, Kirkman's creative power is a force to be reckoned with and a proven recipe for success in original TV content production, so it seems like a good pick-u... Salma Hayek Cooks Dinner At Ryan Reynolds and Blake Lively's Home And though she was there as a dinner guest, she found herself taking charge of the kitchen and the couple's 10-month-old daughter, Inez ! "When your friends ... Premier League 2017 odds: Chelsea among betting favorites on opening EPL weekend While Manchester City are intimidating opposition, Brighton will go into the game with the adrenalin of promotion still pumping through their veins. But the... Federal Court Taking up Location Issue for Unite the Right Rally The man behind the Unite the Right rally that is set to take place in Charlottesville on Saturday has now filed an injunction against the city. Officials have... Arrière 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 Avant
cc/2019-30/en_head_0024.json.gz/line37
__label__cc
0.547103
0.452897
Magnum Venus Products Celebrates 50th Anniversary and New Facility Last week, Magnum Venus Products (MVP), a premier manufacturer of composite application equipment, celebrated its 50th anniversary and broke ground on a new $12 million, 80,000-square foot manufacturing facility near the company headquarters in Knox County, Tenn. “We are excited to announce the site of our future home in East Tennessee,” MVP President Pete Hedger, Sr. said. “This facility will provide for increased production on the East Coast and allow us to better serve our customers and partners in the composites industry. Additionally, this facility will be home to our headquarters operations, including corporate functions as well as state-of-the-art research and demonstration areas.” MVP says that with growing market demand for its products in many industries, as well as the large number of composite-related businesses moving into the area, the new plant further solidifies the company’s ties to the Knoxville area. “One of the reasons this 50 year anniversary is so important is that breaking ground on the new facility not only cements a true milestone for our company, but also shows that we are committed to the Knoxville community and to our employees,” said Ron Blackburn, MVP Marketing Coordinator. “We live here, we love it here, and that’s why we are putting down roots to expand further as the business grows.” MVP expects to hire 70 additional employees to staff the new facility during the second half of 2017. In order to educate prospective new hires, some of the partner organizations set up tabletop booths at the company’s groundbreaking event, with information about the opportunities East Tennessee has to offer. For more information, watch the video below: This Dye Eliminates the Need for Tough-To-Remove Solvents in Graphene-Polymer Composites World’s Largest Carbon Composites Superyacht Launched Big Opportunities in the Bio-Based Resin Market 3-D Printed Car “Strati” Gets Ready to Rev Up Carbon Fiber Prices Could Drop by As Much As 90 Percent
cc/2019-30/en_head_0024.json.gz/line41
__label__wiki
0.956278
0.956278
Visit the National Edition Video of robot playing pingpong champ points to future Elected 365 days ago, Pope Francis rides popularity wave High teen suicide rates raise alarm on reservations View all blogs » Sibling Success with The Band Perry By Pat Reavy, Wednesday, January 25, 2012 at 3:02 pm MST The Band Perry have been busy writing songs for their next album, finding inspiration in their experiences over the past year-and-a-half for their new music. “A great song is, ‘I could use some sleep,'” Reid Perry joked during a recent tour stop in Kansas. But the trio could also be writing songs with titles like, “Our skyrocket ride to the top” or “Our first album did really really really well” or “You May Have Heard Our Song On The Radio.” Since their self-titled debut album in the fall of 2010, The Band Perry – siblings Kimberly Perry (lead vocals, guitar), Neil Perry (mandolin) and Reid Perry (bass, the one with the David Cassidy/ Keith Richards circa 1970s haircut) – have achieved widespread success, thanks in no small part to their single, “If I Die Young,” which made an impact in much the same way Lady Antebellum’s “Need You Now” did a year earlier, bridging country, pop and rock radio genres. “If I Die Young” was a song written by Kimberly. “She said she wrote it on a cloudy day in east Tennessee,” Reid Perry recalled. The “seize the day” type anthem was written on the eve of the band going into the recording studio for their first independent project. “We were completely content and happy with what we had accomplished already,” Reid Perry said. “We said, if it all ended today, we’d be completely happy with what we did.” But the recording didn’t stop for siblings. In fact, it only got bigger. In October of 2010, The Band Perry released their major label self-titled debut. With the popularity of “If I Die Young,” the band won Grammy awards for Top New Artist and Top New Vocal Duo or Group as well as the CMT Breakthrough Video of the Year, and the CMA single and song of the year awards. “We kind of knew from the beginning it was a special song,” Neil Perry said, noting that their mother cried the first time they played it for her. “There’s old soul wisdom behind the song.” Even today, it’s still a song the band loves playing. “Honestly, it’s one of our favorite moments live,” he said. The band will usually stop singing midway through the song and let the audience take over the vocals. It’s a feeling that the Perrys say is very special to them knowing fans have taken the song that much to heart. But “If I Die Young” isn’t the only good song on the album. The band’s follow-up singles, “You Lie” and “All Your Life” are more upbeat and less likely to be played on mainstream pop radio. But are actually some of the best songs on the album. When asked whether The Band Perry’s “sound” is more in the style of “If I Die Young” or the other upbeat songs on the album, the Perry brothers say it’s all the above. “We wanted every single song to have it’s own personalty,” Reid Perry said. “You put it all together, you get a complete picture.” The songs, he said, cover all parts of life. “We have cheating songs, romantic songsevery song is our child. We love them all equally.” Growing up, the Perry siblings say their parents exposed them to a wide range of music, from Loretta Lynn to Led Zeppelin. When Kimberly was 15 she joined a band in high school and her younger brothers asked to be her roadies. Eventually, the brothers formed their own band. But after they found themselves in need of a lead singer, they asked if their sister wanted to join them. This will be The Band Perry’s second trip to Utah. The first coming last summer during the Tim McGraw tour. This time, the group is opening for a man who frequently finds his way to Utah, Brad Paisley. Paisley is renowned for being a practical jokester while on tour. After being the victims of a small prank early in the tour, The Band Perry got a little payback. Each night on the tour, the band performs the solemn “Whiskey Lullaby” on stage with Paisley. One night, the band walked out on stage wearing “pointy alien ears.” Reid Perry said Paisley did a double take with Kimberly cams up next to him and sing and got then cracked up. The Perrys are now bracing for their payback as they get closer to the end of the tour. The Band Perry and Brad Paisley will be at the Maverik Center on Friday night along with reigning American Idol winner Scotty McCreery. DeseretNews.com encourages a civil dialogue among its readers. We welcome your thoughtful comments. Email Address (Required) * Your email address is kept private and will not be shown publicly. Summer regulars Poison, Cheap Trick, return to USANA Royal Bliss celebrates 20 years of being ‘Utah’s Band Peter Hook returns with New Order/Joy Division Substance Reckless Kelly returns to SLC The Foo Fighters epic night in Utah Teri Murray on Cracker: the band we need right now Johnny Ray Kirch on Micky and the Motorcars raise their glasses in SLC Nancy Moore on Johnny Hickman: Measure of a Deep Thinking Man Jody Rogers on Huey Lewis still excelling in Sports 30 years later Julie Felt-Ishmael on Bliss frontman ready to give Utah The Royal treatment Utah » Salt Lake County Davis County Police/Courts Utah Wire Salt Lake Bees Utah Valley Wolverines Sports Wire Faith » Featured Faiths Mormon Times LDS Church News Mission Reunions Faith Wire Family » Marriage & Parenting Family Media Family Life Wire Special Sections » LDS General Conference Mormons in America Utah Blaze Utah Grizzlies
cc/2019-30/en_head_0024.json.gz/line42
__label__wiki
0.66205
0.66205
152 BUSINESS HISTORY OF FOND DU LAC explosion in which he so nearly lost his life. Miller was an English¬ man and claimed to be a regularly educated gas engineer, but if so he must have been very careless, for he had a number of accidents of various kinds while in charge of the works here. Jn at least one of them it is a wonder that he was not killed. The Fond du Lac Gas Works until now have not had a fair chance. They were cheaply put in at the start and when in need of repairs and improvements, the money to pay the cost was not forth¬ coming. The owners were too poor or too stingy to do the work needed, and the result has been that the works were not satisfactory to the people. The present owners are believed to have ample capital and that the gas works will be greatly improved and made what they ought to be. When the gas works were started, gas was used for lighting purposes only, now the use has extended to heating and cooking, and who can tell to what other purposes it may be applied in the not distant future? The scientific genius may soon find other uses for it. At different times efforts have been made to cheapen the product at the works by the use of rosin, petroleum and even wood. At one time hundreds of cords of tamarack wood was used annually to adulterate or cheapen the product to the manufacturer but were abandoned. Gas can be made from such articles, but after all is but an adulteration and is satisfying to neither manufacturer nor con¬ sumer. Straight coal gas properly made, is the only product that is satisfactory to all concerned. That which is now made at the Fond du Lac Gas Works is understood to be of this character and the coal used is of a high grade. There is some complaint about the gas furnished consumers, but such complaints will come at times though the best material is used. In this connection it is appropriate to speak of the lights in use when the gas works came into existence. Fifty years ago the people were using lights of which the present generation has no knowledge. The people now do know a little about candles, but what do they know about lard oil lamps, fluid lamps and camphene lamps? Prac¬ tically nothing. Camphene was made of alcohol, turpentine and gum camphor, and fluid the same without the turpentine. Both were very explosive but generally used. The first kerosene oil brought to Fond du Lac was by J. R. and J. W. Partridge, the druggists, about 1855. They brought lamps to burn it which were very different from those of today. It was liked very much but after the first invoice of oil was sold, no more could be obtained for several months. Crude petroleum would not work in the lamps and Mr. Partridge could not get refined oil and the old lamps had to be brought into use again. Finally some refined oil was obtained along in the spring of 1856, and since then the refiners kept up with the demand. The lamps given to us to burn the first kerosene, were as crude as was the oil, and would be amusing to the modern consumers, but after all were so much of an improvement in methods of lighting then in use, that they were gladly accepted. And the oil—well, it was Full Text 152 BUSINESS HISTORY OF FOND DU LAC explosion in which he so nearly lost his life. Miller was an English¬ man and claimed to be a regularly educated gas engineer, but if so he must have been very careless, for he had a number of accidents of various kinds while in charge of the works here. Jn at least one of them it is a wonder that he was not killed. The Fond du Lac Gas Works until now have not had a fair chance. They were cheaply put in at the start and when in need of repairs and improvements, the money to pay the cost was not forth¬ coming. The owners were too poor or too stingy to do the work needed, and the result has been that the works were not satisfactory to the people. The present owners are believed to have ample capital and that the gas works will be greatly improved and made what they ought to be. When the gas works were started, gas was used for lighting purposes only, now the use has extended to heating and cooking, and who can tell to what other purposes it may be applied in the not distant future? The scientific genius may soon find other uses for it. At different times efforts have been made to cheapen the product at the works by the use of rosin, petroleum and even wood. At one time hundreds of cords of tamarack wood was used annually to adulterate or cheapen the product to the manufacturer but were abandoned. Gas can be made from such articles, but after all is but an adulteration and is satisfying to neither manufacturer nor con¬ sumer. Straight coal gas properly made, is the only product that is satisfactory to all concerned. That which is now made at the Fond du Lac Gas Works is understood to be of this character and the coal used is of a high grade. There is some complaint about the gas furnished consumers, but such complaints will come at times though the best material is used. In this connection it is appropriate to speak of the lights in use when the gas works came into existence. Fifty years ago the people were using lights of which the present generation has no knowledge. The people now do know a little about candles, but what do they know about lard oil lamps, fluid lamps and camphene lamps? Prac¬ tically nothing. Camphene was made of alcohol, turpentine and gum camphor, and fluid the same without the turpentine. Both were very explosive but generally used. The first kerosene oil brought to Fond du Lac was by J. R. and J. W. Partridge, the druggists, about 1855. They brought lamps to burn it which were very different from those of today. It was liked very much but after the first invoice of oil was sold, no more could be obtained for several months. Crude petroleum would not work in the lamps and Mr. Partridge could not get refined oil and the old lamps had to be brought into use again. Finally some refined oil was obtained along in the spring of 1856, and since then the refiners kept up with the demand. The lamps given to us to burn the first kerosene, were as crude as was the oil, and would be amusing to the modern consumers, but after all were so much of an improvement in methods of lighting then in use, that they were gladly accepted. And the oil—well, it was
cc/2019-30/en_head_0024.json.gz/line43
__label__wiki
0.758648
0.758648
638 HISTORY OF WAUPACA COUNTY Menasha. He lived a long and useful life, saw his land cleared and in cultivation, and he and his wife spent their last years in comfort and plenty, though in the early days they more than once had to put their dependence upon wild berries and the game supplied by the forest, as the only thing between them and starvation. Mr. and Airs. Butler are the parents of five children: Molly, Alar¬ garet, Clara, Edward and Frances. They are all members of the Catholic Church. Besides the practical work he has done as a farmer, Mr. Butler has served as treasurer of his home school district and also as path master. August E. Domke. Though Mr. Domke now has one of the fine farms in Royalton Township, in his early years he was on intimate terms with hard work and poverty, and he has been the master of his own destiny. As a young man he learned how to swing an axe and help clear off the forest which covered many acres of some of the best farming district in Wisconsin. Besides industry he had the fine asset of thrift and with these two resources he has never failed to make a living and to get a little bit further ahead in the world each year. Mr. Domke was born in Germany February 11, 1862, a son of Stephen and Caroline (Steinberg) Domke. His father died in Ger¬ many when August was about eighteen months old. There was one older child, a son, who died in infancy. The widowed mother then married Mr. Lewis Strochine, and they all came to America about 1864, locating in Bloomfield Township of Waushara County, Wisconsin. Air. Strochine had to cut down some of the trees in order to make a clearing for his first cabin home, and he continued the work of clearing and improvement until he had a good farm. He died there in 1909, and his widow still resides on the homestead. August E. Domke attended the public and parochial schools of Bloomfield Township in Waushara County. He grew up a strong and resourceful man, and before he started out on his own account there was no lack of demand for his services as a helper on other farms. At the beginning of his independent career Mr. Domke came to Waupaca County and bought a tract of land in Weyauwega Township. In 1894 he bought the ninety-six acres comprising his present well improved place in Royalton Township. Nearly all the improvements on that farm represent his labor and management. Practically all the buildings were erected under his ownership. Air. Domke is a general farmer and he contributes his share to the aggregate of products for which Waupaca County is justly famous. In 1893, the year before he came to his present homestead, on the sixteenth day of November, he married Miss Emma Pagel. Mrs. Domke was born in the State of Aiinnesota, a daughter of Ferdinand and Kate (Mundinger) Pagel. Her mother was born near Fremont, Wisconsin, and her father was a native of Germany, having been brought to America by his parents when he was a boy. The Pagels originally settled in Bloomfield Township of Waushara County. Ferdinand Full Text 638 HISTORY OF WAUPACA COUNTY Menasha. He lived a long and useful life, saw his land cleared and in cultivation, and he and his wife spent their last years in comfort and plenty, though in the early days they more than once had to put their dependence upon wild berries and the game supplied by the forest, as the only thing between them and starvation. Mr. and Airs. Butler are the parents of five children: Molly, Alar¬ garet, Clara, Edward and Frances. They are all members of the Catholic Church. Besides the practical work he has done as a farmer, Mr. Butler has served as treasurer of his home school district and also as path master. August E. Domke. Though Mr. Domke now has one of the fine farms in Royalton Township, in his early years he was on intimate terms with hard work and poverty, and he has been the master of his own destiny. As a young man he learned how to swing an axe and help clear off the forest which covered many acres of some of the best farming district in Wisconsin. Besides industry he had the fine asset of thrift and with these two resources he has never failed to make a living and to get a little bit further ahead in the world each year. Mr. Domke was born in Germany February 11, 1862, a son of Stephen and Caroline (Steinberg) Domke. His father died in Ger¬ many when August was about eighteen months old. There was one older child, a son, who died in infancy. The widowed mother then married Mr. Lewis Strochine, and they all came to America about 1864, locating in Bloomfield Township of Waushara County, Wisconsin. Air. Strochine had to cut down some of the trees in order to make a clearing for his first cabin home, and he continued the work of clearing and improvement until he had a good farm. He died there in 1909, and his widow still resides on the homestead. August E. Domke attended the public and parochial schools of Bloomfield Township in Waushara County. He grew up a strong and resourceful man, and before he started out on his own account there was no lack of demand for his services as a helper on other farms. At the beginning of his independent career Mr. Domke came to Waupaca County and bought a tract of land in Weyauwega Township. In 1894 he bought the ninety-six acres comprising his present well improved place in Royalton Township. Nearly all the improvements on that farm represent his labor and management. Practically all the buildings were erected under his ownership. Air. Domke is a general farmer and he contributes his share to the aggregate of products for which Waupaca County is justly famous. In 1893, the year before he came to his present homestead, on the sixteenth day of November, he married Miss Emma Pagel. Mrs. Domke was born in the State of Aiinnesota, a daughter of Ferdinand and Kate (Mundinger) Pagel. Her mother was born near Fremont, Wisconsin, and her father was a native of Germany, having been brought to America by his parents when he was a boy. The Pagels originally settled in Bloomfield Township of Waushara County. Ferdinand
cc/2019-30/en_head_0024.json.gz/line44
__label__wiki
0.942455
0.942455
ALEX GALCHENYUK GROWS INTO HIS SUPERSTAR STATUS The fashion / tech story of a hockey star … January 13, 2017 by Erik Leijon in Profiles When star Montreal Canadiens forward Alex Galchenyuk first arrived in the city as a talented but raw 18-year-old, his future was considered bright. Fast forward five years and the American-Belarussian has lived up to the hype: he’s now the team’s first-line centre, one of the league’s top scorers and his physique has transformed from thin teenager into chiseled adonis. He’s also grown into a superstar off the ice, thanks in large part to technology like social media. His Instagram feed has become legendary for its footage of his unbelievable offseason workouts in the forests of Belarus, and his emerging fashion sense earned him accolades at last year’s glitzy McLaren Formula One party at the Ritz-Carlton hotel. Galchenyuk is currently the face of Montreal-based Frank & Oak’s casual State Concepts line, and it’s a partnership that suits him well. “I signed on with them over the summer, and it’s great for me because I like their clothes,” Galchenyuk says. “I’m always on the lookout for what’s cool and new, and they’re cool so I like wearing them.” Although it’s only been recently that the 22-year-old has started to turn heads for his sense of style, he says it’s always been something that’s important to him. “I spent my whole first paycheque on Louis Vuitton and Gucci,” he says with a laugh. “When you make it, you get into the mindset where you should do something to recognize that you’ve made it. There were things that I used to see in stores and I would think to myself ‘one day you’ll be able to get them.’ And when you get to a certain point where you can, you have to do it. It’s satisfying.” As for trying to describe his budding style, he points out that comfort is a priority. He also doesn’t sweat the details, admitting that he only takes about five minutes to get ready every morning. “I wouldn’t say I’m trying to follow trends, but I have my own style and so far it’s been working for me,” he says. “I think it’s my mood. Whatever I feel like, I’ll dress accordingly. Sometimes I’ll wear all black, or sometimes I’ll wear more colours. The thing is I have a lot of clothes so no matter what I do, chances are I’ll find something that works.” His sister Anna, a Montreal celeb in her own right, helps out as well. “She went to New York recently and picked up some cool stuff for me that’s hard to find. When I entered the league I was always trying to buy the high-end brands – now I’m more into limited edition clothes, ones that are harder to find,” he says. Growing up the son of a hockey player also helped broaden his horizons. His dad, Alexander Galchenyuk, moved around the United States and Europe during his playing career. He eventually settled in Russia, where Alex grew up, but the Milwaukee, Wisconsin native returned to North America as a teen to pursue his hockey career. “In Russia, people are fashionable,” Galchenyuk says. “And then, when you’ve been fortunate enough to live in places like Italy and Switzerland, you learn about different brands. I was also exposed to so many cultures growing up; in my life I’ve been able to take aspects of each.” He’s a huge fan of Old Montreal, saying that it captures the history and culture of the European cities he spent time in as a child. “I think it’s [Montreal] a creative city,” he adds. “It isn’t like any other city in Canada.” If fans want to know what he’s wearing, or what sort of mind-blowing workout he’s been doing, his Instagram feed is the place to go. Galchenyuk is exactly what professional hockey needs: a social media savvy star who doesn’t mind showing what life is like away from the rink. Last summer, he went viral after posting a video of himself shirtless, running through the forest while pulling a tire that was tied to his waist. “I’ll give credit to my dad for the idea,” he says. “We were tired of the same old workout and we wanted to try something else, just to keep my mind fresh.” The minute he started pulling the tire up the slope, he knew it had to be Instagrammed, he recalled. Although he likes to drown out the noise during the season, in the summer he likes to get creative with his social media.. “I think the key is to not just post hockey stuff,” he says. “Everyone who follows you knows you’re a hockey player. What’s important to give is these little life moments. You want to show that you’re a normal person, but with hard work anything is possible.” Given his comfort level connecting with hockey fans online, it shouldn’t be a surprise that he’s glued to his iPhone when he’s not at work. It’s the one piece of technology he couldn’t live without. “There’s always something to read or watch on it,” he says. “I can’t even get into my car without putting on some music on my phone first or checking the news.” Photography NEIL MOTA (Rodeo Productions) Styling JESSY COLUCCI (FIRST LOOK) Hoodie and pants FRANK + OAK STATE CONCEPTS. Bling VERSACE V1969 ITALIA JEWELLERY MEN’S COLLECTION (Delmar Jewelers). Watch ROLEX YACHT- MASTER. (SECOND LOOK) Shirt and pants HUGO BOSS. Shoes NIKE RED OCTOBER. Bling VERSACE V1969 ITALIA JEWELLERY MEN’S COLLECTION (Delmar Jewelers). Smart Watch FREDERIQUE CONSTANT (BIRKS). Special thanks to Maria Antonopoulos and the Antonopoulos Group for kind hospitality at the new William Gray hotel, Anna Galchenyuk for being the superstar she is and Na’eem Adam and the Parvin team for great support. Tags: CANADIENS, DIARY VOL 6, hockey star, MONTREAL CANADIENS, PROFILES, TECHNOLOGY PROFILE: THE MASTERFUL WORLD OF PHILIPPE MALOUIN FURNITURE PHENOM ANTOINE ROSET ACTOR CHRIS NOTH A TATTOO ADVENTURE WITH ARTIST SCOOTER LAFORGE OLIVIER ROYANT, THE ULTIMATE ( PARIS ) MATCH
cc/2019-30/en_head_0024.json.gz/line45
End of preview. Expand in Data Studio

No dataset card yet

Downloads last month
32