Jump to content
ScienceWeather

Declassified MISC 16


Jeb

Recommended Posts

That DM 15 thread got so unbelievably long, that I realized it's high time to launch the new DM 16 news topic!

 

 

 

 

Rep. LaHood urges pause in page program

 

A close House ally of Speaker

Dennis Hastert called Wednesday for temporary suspension of the congressional page program amid the uproar over former Rep. Mark Foley's Internet exchanges with former teenage pages and Hastert's handling of the problem.

 

 

"People are very, very concerned" about daily disclosures concerning Foley's salacious messages, said Rep. Ray LaHood, saying the program should be shut down at least for awhile.

 

As Republicans grow increasingly nervous about their election prospects and Hastert tries to save his job in the face of criticism, the scandal dominates the 24-hour news media and the Internet blogosphere.

 

Asked by conservative talk show host Rush Limbaugh Tuesday if he was going to step down, Hastert, R-Ill., replied, "I'm not going to do that."

 

Meanwhile, LaHood, who also is from Illinois, said that it's not the speaker who should go and said the page program should be shut down, at least temporarily.

 

He questioned an "antiquated" congressional page system that brings 15- and 16-year-olds to the Capitol and has resulted in scandals in the past.

 

"Some members betray their trust by taking advantage of them. We should not subject young men and women to this kind of activity, this kind of vulnerability," LaHood said in a CNN interview. He said the program should be shut down until problems can be resolved.

 

In another development Wednesday, Sen. Mitch McConnell of Kentucky, who's in line to become Republican leader in the Senate after the election, said the scandal could hurt House candidates in November. But McConnell also said he didn't expect it to have any impact on Senate races.

 

President Bush, speaking at a Stockton, Calif., elementary school on Tuesday, said he was disgusted by the Foley revelations and voiced support for Hastert.

 

"I know that he wants all the facts to come out," the president said.

 

Conservatives debated whether Hastert should resign over his handling of the controversy.

 

Activist Richard A. Viguerie called for Hastert to step down. "The fact that they just walked away from this, it sounds like they were trying to protect one of their own members rather than these young boys," Viguerie said on Fox News.

 

Yet the Christian Coalition said it was standing behind Hastert, and Arizona Republican Rep. John Shadegg circulated a "Dear Colleague" letter in support of Hastert, saying calls for the speaker to resign were "unwarranted and fundamentally unfair."

 

Hastert says he first heard details of the Foley matter last Friday when the story was breaking. The No. 2 House Republican, Rep. John Boehner of Ohio, and House GOP campaign chair Rep. Tom Reynolds of New York said they had spoken with Hastert about a complaint concerning a former page from Louisiana last spring after being told about it by Rep. Rodney Alexander, R-La., who had sponsored the teen.

 

Hastert sought to blame Democrats for leaking sexually explicit computer instant messages between Foley and former pages from 2003.

 

"Democrats have ... put this thing forward to try to block us," Hastert told Limbaugh.

 

"It's absolutely not true," countered House Minority Leader Nancy Pelosi, D-Calif.

 

ABC News, which first reported on initial online exchanges from Foley that were questionable but not graphic, says sexually explicit messages reported last Friday were provided by former pages after its initial report Thursday.

 

ABC News said Tuesday it had obtained additional instant messages.

 

"Can I have a good kiss goodnight," Foley was said to have messaged in one. A boy responded with cyber symbols and "kiss."

 

In another message, Foley invited the teenager to his Capitol Hill town house "for a few drinks" even though he knew the boy was under the legal drinking age. "We may need to drink at my house so we dont get busted," Foley messaged.

 

Foley's attorney, David Roth, said at a news conference in West Palm Beach, Fla., on Tuesday that he had no reason to believe that Foley "ever had teenage boys at his house to have alcohol."

 

Roth said Foley, 52, had himself been molested between the ages of 13 and 15 by a clergyman but added that Foley "does not blame the trauma he sustained as a young adolescent for his totally inappropriate e-mails" and instant messages. "He continues to offer no excuse whatsoever for his conduct."

 

Roth insisted Foley never had had sexual contact with a minor. He said the former Florida congressman, who had kept his sexual orientation private, wanted people now to know that he is gay.

 

The House ethics committee, meanwhile, scheduled its first meeting on Foley's actions for Thursday, in closed session. The House voted last Friday to direct the ethics panel to inquire into the matter.

 

Foley resigned abruptly on Friday after being confronted with the 2003 instant message exchanges.

 

The FBI announced over the weekend it was opening a preliminary investigation into the matter.

 

Separately, Kirk Fordham, a Reynolds aide who was a longtime former aide to Foley, told The Associated Press of counseling Foley on Friday on how to deal with the developing story.

 

Fordham said when he learned the details of some of the instant messages, he confronted Foley.

 

"I said: 'Are these authentic?' and he said 'probably' and he confirmed that they were likely his instant messages," Fordham said.

 

Reynolds immediately said Foley had to resign and GOP campaign aides drafted a resignation letter.

http://news.yahoo.com/s/ap/20061004/ap_on_.../congress_pages

--------------------------------------------------------------------------------------

 

 

 

 

 

 

 

 

 

Drive Thru Marketing

 

Remember the Dotcom burst? I do. I specifically remember things like clients asking for content management system enabled Websites when they didn’t need one. Or better yet—choosing the wrong system. I remember the abuse of Flash (skip intro anyone)? I even remember co-workers back in the height of the bubble saying things like “this will make your site sticky”—when the experience of the site was about buying something quickly vs. hanging around it. And who can forget about scalable? Oh yeah and let’s throw in seamless for good measure hold the ROI.

 

Thankfully those days are over. So let’s learn from them. Today’s marketing mix has it’s own challenges. RSS feeds, Podcasts, Blogs, Viral content—it all sounds so yummy and immediately gratifying. Just like fast food. But We all know what fast food leads to. Putting together a marketing mix that looks like “one Social Media Network with a side of Viral, hold the mayo”—may not be the best thing for your business and brand. And the stakes are high.

 

Here’s a few things to think about as you plan your 2.0 marketing strategy:

What percentage of your customers are using these platforms regularly?

What is the plan to maintain something like a blog? (they require a lot of effort—trust me)

How transparent are you willing to be?

How will you deal with negative feedback?

How will these channels compliment the traditional/digital ones?

What will make your effort genuine vs. feeling "staged"?

 

I know there is more, but just think of this as a little fast food for thought. The marketing media landscape is changing, but it’s best to combine calculated experimentation with strategic planning vs. the “midnight munchies” approach to selecting tactics.

http://darmano.typepad.com/logic_emotion/2..._thru_mark.html

-----------------------------------------------------------------------------------

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

When Splog Attacks

http://darmano.typepad.com/logic_emotion/2...splog_atta.html

 

 

The Advertising Brand is in Trouble

http://darmano.typepad.com/logic_emotion/2...dvertising.html

 

 

Making Your Viral Video Long Tail Friendly

http://www.micropersuasion.com/2006/10/making_your_vir.html

 

MIMA Summit Starts Today

http://www.toprankblog.com/2006/10/mima-summit-starts-today/

 

Matt Cutts Answers Common PageRank Questions

http://www.hawaiistreets.com/seoblog/index.php?itemid=1063

 

Google outlines plans at Manhattan opening

http://www.threadwatch.org/node/9104

 

A9 Quits. 83rd is not worthy

http://www.threadwatch.org/node/9123

 

More Politics - Google PR (PoliticoRank, Stoopid)

http://www.threadwatch.org/node/9129

 

Google Literacy

http://www.threadwatch.org/node/9130

 

PR Can't Spin Gym's Service

http://www.marketingshift.com/2006/10/pr-c...yms-service.cfm

 

New Cisco Logo Thoughts

http://www.marketingshift.com/2006/10/new-...go-thoughts.cfm

 

Worm Boosts AdSense Traffic

http://www.marketingshift.com/2006/10/worm...nse-traffic.cfm

 

Links That Generate Click Thrus

http://www.marketingpilgrim.com/2006/10/li...lick-thrus.html

 

 

 

Hint: Don’t Reveal Your Gmail RSS Feed

 

Okay, this should be a no-brainer, but just because Gmail offers RSS feeds doesn't mean you should offer them to the public.

 

A number of people have done just that, sending their Gmail off to Feedburner and then subscribing in Bloglines, which puts it in the public directory (unless you actually thought to make it private). Among the apparent victims: Andy Rutledge, who likes Bear Grams when he isn't redesigning company homepages.

 

I've already found out Naveen Joshi's username (and missed his password by an ellipsis), know that Joe is getting messages from his personal trainer, Joe Grossberg invited himself to Gmail (for multiple accounts, I presume), and that there are nine companies that will refinance. Does Bloglines need to protect these users from themselves, or is it your fault when you make a feed of your email public?

 

Martin Belam discovered this snafu, and has a lot more to say on it. He also found one guy's termination letter (ouch!). Maybe someone should email all these people and let them know what happened?

http://www.securitypronews.com/news/securi...ailRSSFeed.html

----------------------------------------------------------------------------------------------

 

 

SEE ALSO:

 

http://bloglines.com/search?q=gmail+inbox+...op=l&news=m

 

Design View : Andy Rutledge

http://www.andyrutledge.com/

 

 

 

 

Using Bloglines to snoop on people's private Gmail

 

I was astonished on Friday when I was looking at my Gmail account inbox, and accidently hit the 'Subscribe with Bloglines' bookmarklet on my Firefox links toolbar. Bloglines then dutifully put up on the screen a whole series of Atom feeds of other people's Gmail accounts that I could subscribe to.

 

At first, because all of the Atom feeds had been sent through FeedBurner, and the content seemed so spammy, I wondered if it might not have been set up to entice people to subscribe to the feeds as a way of getting more eyeballs on spam email. However, a couple of the feeds seemed to contain genuine personal email, and frankly, such a high percentage of email traffic is spam that if you monitored any email address I'm sure the ratio of spammy mail would look quite high.

 

Whilst you are not able to go straight from the feed to look at the complete email, once subscribed you can read the subject and the first line of any email sent to these addresses. That can be enough though, especially once a thread starts. For example I know one of these people left their job last week.

 

In another email, you nearly get hold of someone's user ID and password for a website, further prove that Dave Cross is right when complaining about the poor handling of password data by a lot of online applications. In this case there just are not enough characters in the snippet to reveal the password - but only just.

 

I think that is where the privacy issue gets a bit scarier and, for me, more controversial. The people sending emails to these addresses have no control over whether the recipient has made their Gmail feed public via an aggregator like Bloglines or not. There is the potential that in the opening line or subject of an email that they think is a secure private one-to-one conversation they could give out very personal details, or defame someone, and end up with their private communication plastered all over the web.

 

The fault I guess lies with both Google and Bloglines. Google clearly need to more to educate their Gmail Atom users about the potential privacy implications of making their email available in a syndication format. They do have an FAQ answer that warns you that if you do not set the feed to private in your aggregator, you are revealing your email to the world.

 

Are my Google Mail RSS feeds publicly accessible?

Many aggregator services mark your profile and feeds as public by default, making the subjects and snippets of your Google Mail messages searchable. Even though other users can view the subjects and snippets, the entire content of your messages is not accessible.

If you want to make sure that your Google Mail feeds are not searchable, we suggest setting your profile and feeds as private.

 

However, that warning isn't given in the main FAQ entry about setting the feed up, even though Google take the time to warn you that the feed will not appear until you have some unread mail in the feed.

 

How do I view Google Mail messages with my aggregator?

You can view Google Mail messages in your aggregator by subscribing to a new channel. Enter https://mail.google.com/mail/feed/atom in the 'URL' field, then submit your Google Mail address and password.

Please keep in mind that Google Mail messages will not appear in your aggregator unless there are unread messages in your inbox.

 

And Bloglines could do something to restrict the display of feeds with the telltale sign of contaning content from Gmail, so that if you know your own Gmail Atom address you can subscribe to it, but that you can't fish for other people's mail using Bloglines anymore.

 

 

 

COMMENTS

 

 

 

Hmm, I'd say that it's more of Google's fault than Bloglines. Bloglines can't after all be expected to detect and place warnings on all the various kinds of potentially private news feeds (why give Gmail special treatment). Besides, there are potentially cases where uses might WANT to make a Gmail feed publically available (difficult to think of examples though, other than perhaps as part of some Alternative Reality Game).

 

Ultimately, having 'private' RSS feeds via a unique and non-easily guessable URI is just an example of trying to do 'security through obscurity', and is doomed to failure. To really do private feed syndication, you either need to use simple HTTP authentication (which Bloglines doesn't support) or invent some new format...

 

Posted by Frankie Roberto, October 1, 2006 08:17 PM

 

As all these GMail feeds have been put through Feedburner or some similar service (you can also access them by clicking on the green feedburner.com links), then the blame lies at the feet of Feedburner (by not password-protecting feeds that are read from password-protected sources), or the user themselves (for running a private feed through a public RSS provider, then publicly subscribing to it in Bloglines).

 

Posted by Chris Applegate, October 2, 2006 04:35 PM

 

I would tend to think that Google, Bloglines and Feedburner *all* need to look at either the way they have their system set up, or the advice that they are giving to their users at the point where the users are causing/allowing this to happen.

 

Of the feeds you can see via Bloglines, a couple of them are not being made available via Feedburner, although all of the ones in my screenshot were

 

Posted by Martin Belam, October 2, 2006 04:59 PM

 

This is the fault of the education system and its lack of informing the public not to do foolish things in life.

 

Posted by umopapisdn, October 3, 2006 07:02 PM

http://www.currybet.net/cbet_blog/2006/10/...snoop_on_pe.php

-----------------------------------------------------------------------------------------------

 

SEE ALSO:

 

How do I view Gmail messages with my aggregator?

http://mail.google.com/support/bin/answer....&topic=1573

----------------------------------------------

 

When I use Atom, are my Gmail RSS feeds publicly accessible?

http://mail.google.com/support/bin/answer....&topic=1573

----------------------------------------------

 

Basic Password Handling

http://blog.dave.org.uk/archives/000860.html

-----------------------------------------------

 

 

 

 

 

 

 

 

 

 

 

 

Basic Password Handling

 

This afternoon I signed up to a new web-based application from a very well-known media company. I gave them my email address and the password that I wanted to use and a few minutes later I got an email from them confirming my registration.

 

That was fine. But then I noticed that the email from them contained the name of their site, my username and my password. All in plain text. This is a breach of basic internet security processes. And thinking about it, I've seem several similar breaches recently. So I thought it was worthwhile making a note of some of the rules you should be following when handling users' passwords on web sites and in emails. A sort of "Password Handling 101".

 

Rule 1: Don't Store Plaintext Passwords

 

This is the fundemental principle that all the other rules follow from. It is non-negotiable. If I give you a password to use on your web site then I should be the only person who knows it. I don't want it stored unencrypted in your database so that any of your staff can look it up.

 

"But," you say, "if it's encrypted, how can we check it against the password you give us when you log in?"

 

"Easy," I reply, "you do it the same way that Unix passwords have been checked for decades."

 

You store the password using some encryption algorithm. The stronger the better. Then when I give you a password for you to check, you encrypt the new password using the same algorithm and compare it against the encrypted version in your database. If the two encrypted strings match then I've given you the correct password and you can log me in. Simple isn't it?

 

"But," you say, "if it's encrypted, how can we tell you what it is if you forget it?"

 

"Simple," I reply, "you don't."

 

If I forget my password then you have two options. Option one is that you generate me a new password, email it to my registered email address (but see rule 2 below) and store an encrypted version of the new password in your database. Option two is that you send (to my registered email address) a link to a web page where I can enter a new password. This link should obviously be time-limited (so I can only use it for a few hours) and should contain some encrypted key so that no-one can guess what the link is. The second option is less secure as anyone can intercept the email and get access to the link, so the first option should be prefered.

 

Rule 2: Username and Password Travel Separately

 

The problem with internet email is that (unless you use something like GPG) everything is in plain text and anyone can intercept it and read it. It's like you are sending every letter on a postcard rather than in an envelope. For this reason you should never put the username and the password in the same email. The forgotten password scenario above should be the only reason why you ever send a password to a user in an email. So don't put the username in that email as well.

 

Rule 3: Web Pages with Passwords Should Use HTTPS

 

Like email, by default, all web traffic is unencrypted. Anyone can potentially read anything that you send to a web site. So when I log on to your site and I enter my username and password, anyone can potentially intercept those values and that will enable them to log on to your site as me. If you serve login pages using HTTPS instead of just HTTP then that login transaction will be encrypted all the time the data is on the public internet and it will be much harder for anyone to extract my login details.

 

 

Three simple rules that every web site should be following. And it's surprising (or, at least, it surprises me) how many sites don't follow these basic rules. Following these rules won't make your site impervious to people determined to break into in, but it will go a long way to making your users' accounts more secure.

 

I was going to name and shame the site that I dealt with this afternoon, but I wrote them a polite email explaining the problems and in less than 45 minutes I got a reply saying that these problems had already been noted and that they should be fixed by the end of the week. That's pretty good customer service so I won't embarass them by telling everyone who they are.

http://blog.dave.org.uk/archives/000860.html

---------------------------------------------------------------

 

 

 

 

 

 

 

 

Top Malware Threats And Hoaxes For September

http://www.securitypronews.com/news/securi...rSeptember.html

 

Sophos Shows HIPS

http://www.securitypronews.com/news/securi...sShowsHIPS.html

 

 

McAfee And Symantec Unhappy With Microsoft

http://www.securitypronews.com/news/securi...hMicrosoft.html

 

McAfee Acquires Citadel

http://www.securitypronews.com/news/securi...resCitadel.html

 

Citadel

http://www.citadel.com/

 

Plenty Of Love For The LG C1 Tablet

http://www.webpronews.com/expertarticles/e...LGC1Tablet.html

 

Is Confidence In Paid Search Slipping?

http://www.webpronews.com/blogtalk/blogtal...chSlipping.html

 

 

Google Germany Reunification Doodle

http://www.webpronews.com/blogtalk/blogtal...tionDoodle.html

 

Scoble's Day Of Meetings

http://www.webpronews.com/blogtalk/blogtal...ofMeetings.html

 

Pincus Punked By The Post

http://www.webpronews.com/blogtalk/blogtal...dbythePost.html

 

Countdown To Oracle Open World

http://www.webpronews.com/blogtalk/blogtal...eOpenWorld.html

 

 

Why And How To Podcast

http://www.webpronews.com/topnews/topnews/...wToPodcast.html

 

Podcasting Could Resurrect Employee Comm

http://www.webpronews.com/topnews/topnews/...ployeeComm.html

 

Pimp Your Web Ride With Google

http://www.webpronews.com/topnews/topnews/...WithGoogle.html

 

Facebook Will Pay If It Goes To Yahoo

http://www.webpronews.com/topnews/topnews/...oesToYahoo.html

 

Piczo Plays It Safe

http://www.webpronews.com/topnews/topnews/...laysItSafe.html

 

Piczo

http://www.piczo.com/?cr=4&rfm=y

 

 

Google Does The Mashup Dance

http://www.techcrunch.com/2006/10/03/googl...e-mashup-dance/

 

FilmLoop 2.0 Coming This Month, Improvements Mixed

http://www.techcrunch.com/2006/10/03/filml...ovements-mixed/

 

FilmLoop

http://filmloop.com/

 

Pageflakes 2.0 To Launch

http://www.techcrunch.com/2006/10/03/pagef...s-20-to-launch/

 

PageFlakes

http://www.pageflakes.com/

 

Fighting Open Source Competition May Be Foolish

http://www.techcrunch.com/2006/10/04/perha...ion-is-foolish/

 

Introducing SlideShare: Power Point + YouTube

http://www.techcrunch.com/2006/10/04/intro...-point-youtube/

 

SlideShare

http://slideshare.net/login

 

Why Blogs Are Different #99: They Thank Their Advertisers

http://www.micropersuasion.com/2006/10/why_blogs_are_d.html

 

links for 2006-10-04

http://www.micropersuasion.com/2006/10/lin...or_20061_3.html

 

View your Flickr photos on a gorgeous plain all-black or all-white background.

http://bighugelabs.com/flickr/onblack.php

 

Hidden Labels in Gmail

http://googlesystem.blogspot.com/2006/10/h...s-in-gmail.html

 

Axing the Podcast Middleman

http://www.wired.com/news/technology/0,718...ml?tw=rss.index

 

iTunes Cheat Sheet

http://doors.stanford.edu/itunes/

 

The Innovators - John Battelle

http://adage.com/article?article_id=112221

 

Commenting Tips

http://www.micropersuasion.com/2006/10/commenting_tips.html

 

Commenting Tips - Lifehacker

http://www.lifehack.org/articles/lifehack/...nting-tips.html

 

Verizon jumps into the blogosphere with a policy blog

http://www.blogwriteforceos.com/blogwrite/...on_jumps_i.html

 

Making Your Viral Video Long Tail Friendly

http://www.micropersuasion.com/2006/10/making_your_vir.html

 

Wikipedia Mobile

http://www.micropersuasion.com/2006/10/wikipedia_mobil.html

 

Piecing together Windows Vista

http://news.com.com/2009-1016_3-6050105.ht...5&subj=news

 

Fonality buys into Asterisk community

http://news.com.com/2061-10795_3-6122569.h...9&subj=news

 

Pay checks for Gates, Ballmer fall short of $1 million

http://news.com.com/2100-1014_3-6122597.ht...7&subj=news

 

Google gadgets a-go-go

http://news.com.com/2061-11199_3-6122601.h...1&subj=news

 

U.S. Army to join MySpace ranks

http://news.com.com/2061-10796_3-6122604.h...4&subj=news

 

 

 

 

 

 

 

Amish grandfather: 'We must not think evil of this man'

 

PARADISE, Pennsylvania (CNN) -- A grieving grandfather told young relatives not to hate the gunman who killed five girls in an Amish schoolhouse massacre, a pastor said on Wednesday.

 

"As we were standing next to the body of this 13-year-old girl, the grandfather was tutoring the young boys, he was making a point, just saying to the family, 'We must not think evil of this man,'" the Rev. Robert Schenck told CNN.

 

"It was one of the most touching things I have seen in 25 years of Christian ministry."

 

The girl was one of 10 shot by Charles Carl Roberts IV after he invaded their one-room schoolhouse in rural Pennsylvania on Monday.

 

Three died at the scene and two died early Tuesday at hospitals.

 

Funerals for four of the victims are scheduled for Thursday, and the fifth will be Friday.

 

Five girls remained hospitalized on Wednesday in critical or serious condition.

 

At the families' request, the hospital did not provide details on the extent of the girls' injuries.

 

Schenck met with the families of two of the victims as well as the family of the gunman.

 

Relatives of Roberts had no hint that he would commit such violent acts, the pastor said.

 

Others who knew him described him as troubled.

 

"One person who had had almost daily encounters with him said that she noted that he never looked into anyone's eyes, he never looked into anyone's faces, and she knew that there was something deeply troubling about him," Schenck said.

 

"Although she did say, she was very careful to say, that Charles Roberts was not an evil person. That he was a deeply troubled man, that he had, in her words -- the sort of modest words of the Amish -- that he had problems of the heart."

 

On Tuesday, police said Roberts told his wife he molested young relatives 20 years ago and was dreaming about molesting children again.

 

Pennsylvania State Police Commissioner Jeffrey Miller said Roberts may have targeted the school for its girl students and -- given various items found in the school -- intended to molest the children.

 

Jack Meyer, a member of the Brethren community living near the Amish in Lancaster County, said local people were trying to follow Jesus' teachings in dealing with the "terrible hurt."

 

"I don't think there's anybody here that wants to do anything but forgive and not only reach out to those who have suffered a loss in that way but to reach out to the family of the man who committed these acts," he told CNN.

 

Sam Stoltzfus, 63, an Amish woodworker who lives a few miles away from the shooting scene, told The Associated Press that the victims' families will be sustained by their faith.

 

"We think it was God's plan, and we're going to have to pick up the pieces and keep going," he told AP. "A funeral to us is a much more important thing than the day of birth because we believe in the hereafter. The children are better off than their survivors."

 

When members of the community die, they are buried in wooden coffins; women in all white and men in all black, according to AP.

 

Bodies are embalmed, but undertakers do not apply makeup. Funerals are held in the victim's home, and the dead are delivered to the cemetery in a horse-drawn carriage. A hymn is read, but there is no singing, AP reported.

http://www.cnn.com/2006/US/10/04/amish.shooting/index.html

--------------------------------------------------------------------------------------

 

 

 

 

 

 

 

 

 

 

 

 

 

Report: Hastert's office warned about Foley two years ago

 

A senior congressional aide said Wednesday he told House Speaker Dennis Hastert's office in 2004 about worrisome conduct by former Rep. Mark Foley with teenage pages -- the earliest known alert to the GOP leadership.

 

Kirk Fordham told The Associated Press that when he was told about Foley's inappropriate behavior toward pages, he had "more than one conversation with senior staff at the highest level of the House of Representatives asking them to intervene."

 

The conversations took place long before the e-mail scandal broke, Fordham said, and at least a year earlier than members of the House GOP leadership have acknowledged.

 

Fordham resigned Wednesday as chief of staff to Rep. Thomas Reynolds, R-New York.

 

Fordham spoke to the AP after ABC News quoted unidentified GOP sources as insinuating that he had intervened on behalf of Foley, his former boss, to prevent an inquiry into Foley's conduct.

 

"This is categorically false," Fordham said. "At no point ever did I ask anyone to block any inquiries into Foley's actions or behavior."

 

The longtime Capitol Hill aide said he would fully disclose to the FBI and the House ethics committee "any and all meetings and phone calls" regarding Foley's behavior that he had with senior staffers in the House leadership.

 

"The fact is even prior to the existence of the Foley e-mail exchanges I had more than one conversation with senior staff at the highest level of the House of Representatives asking them to intervene when I was informed of Mr. Foley's inappropriate behavior," Fordham said.

 

Fordham said one staffer to whom he spoke remains employed by a senior House Republican leader. He would not identify the staffer.

 

"Rather than trying to shift the blame on me, those who are employed by these House leaders should acknowledge what they know about their action or inaction in response to the information they knew about Mr. Foley prior to 2005," Fordham said.

 

A Capitol Hill aide for more than a decade, Fordham said he resigned because he did not want his role in the Foley matter to harm his boss' re-election bid.

 

"I have no reason to state anything other than the facts. I have no congressman and no office to protect," Fordham said.

 

Justice Department launches investigation

 

Fordham's resignation comes as the Justice Department ordered House officials to "preserve all records" related to disgraced Rep. Mark Foley's electronic correspondence with teenagers, intensifying an investigation into a scandal rocking Republicans five weeks before midterm elections.

 

Republicans have been struggling to put the scandal behind them, but another member of the leadership, Rep Roy Blunt of Missouri, said pointedly during the day he would have handled the entire matter differently than Speaker Dennis Hastert did, had he known about the complaints when they were first raised last year.

 

"I think I could have given some good advice here, which is you have to be curious. You have to ask all the questions you can think of," Blunt said. "You absolutely can't decide not to look into activities because one individual's parents don't want you to."

 

Acting U.S. Attorney Jeff Taylor for the District of Columbia sought protection of the records in a three-page letter to House counsel Geraldine Gennet, according to a Justice official speaking on condition of anonymity.

 

Such letters often are followed by search warrants and subpoenas, and signal that investigators are moving closer to a criminal investigation.

 

The request was aimed at averting a conflict with the House similar to a standoff in May when FBI agents raided Louisiana Rep. William Jefferson's office seeking information in a bribery investigation.

 

FBI interviews former pages

 

Meanwhile, FBI agents have begun interviewing participants in the House page program, according to a law enforcement official who spoke on condition of anonymity because of the ongoing investigation. The official declined to say whether the interviews were limited to current pages or included former pages.

 

Justice Department spokeswoman Tasia Scolinos stressed that the investigation is still preliminary. Also, the Florida Department of Law Enforcement confirmed that it has begun its own preliminary inquiry. Spokesman Tom Berlinger said the case is in its initial stages and is not a full-blown criminal inquiry.

 

Fordham played a key role in fast-developing events late last week. Initially, Foley was reported to have written overly friendly -- not sexually explicit -- e-mails to a former Capitol page. A day later, ABC news followed up with a report that said the Florida lawmaker had also sent sexually explicit instant messages to at least one other male page.

 

He said earlier this week he asked Foley about the sexually explicit instant messages, and the congressman confirmed they were probably his.

 

"Like so many, I feel betrayed by Mark Foley's indefensible behavior," he said. He blamed Democrats for seeking to make a political issue of the matter in Reynolds' re-election campaign, "and I will not let them do so."

McCain calls for independent investigation

 

There were signs of concern among Republicans, as well.

 

Sen. John McCain of Arizona called for a group of former senators and others to investigate how the House handled the affair.

 

"We need to move forward quickly and we need to reach conclusions and recommendations about who is responsible," McCain said during a campaign speech for Sen. Lincoln Chafee in Rhode Island. "I think it needs to be addressed by people who are credible."

 

Some other Republicans rallied to the speaker. The chairmen of two coalitions of social and fiscal conservatives in Congress said he should not step down. "Speaker Hastert is a man of integrity," Rep. Mike Pence, R-Indiana, and Rep. Joe Pitts, R-Pennsylvania, said in a joint statement.

 

Rep. Rodney Alexander, R-Louisiana, the congressman who sponsored the page at the heart of the furor, said Hastert "knew about the e-mails that we knew about," including one in which Foley asked the page to send his picture. But he quickly backed off that comment, saying he discussed the e-mails with Hastert's aides, not the speaker himself.

 

"I guess that's a poor choice of words that I made there," he told AP.

 

Hastert has insisted he not know about the e-mails that were discussed with his staff.

Representative says Hastert's staff knew about e-mail

 

Alexander said in an interview he first took up the matter after receiving press inquiries in November, when he told Hastert's staff and the parents of the 16-year-old boy who received the e-mails. The parents wanted the correspondence stopped but apparently did not want to take the matter further.

 

After a second round of press inquiries in the spring, Alexander said, he again notified the family and discussed the e-mails with the new majority leader, John Boehner of Ohio, on the House floor during a vote.

 

Alexander said Boehner turned first to Reynolds, the architect of the Republican midterm election strategy.

 

"I went to Boehner before Reynolds," Alexander told AP. "He sent Reynolds to me to talk about it. Within a minute Reynolds and I were talking."

 

Boehner and Reynolds have both said they had spoken with Hastert about a complaint concerning a former page from Louisiana last spring, after Alexander told them about it.

 

The uproar that followed Foley's resignation has enveloped Republicans who were already at risk at losing control of Congress in elections five weeks away.

 

Conservative activist Richard A. Viguerie was among those who called for Hastert to step down. "The fact that they just walked away from this, it sounds like they were trying to protect one of their own members rather than these young boys," Viguerie said on Fox News.

 

Hastert has he would not quit.

 

Alexander defended Hastert on Wednesday, as well as his own response.

 

"Hey, what else was I supposed to do?" Alexander asked. "I was very uncomfortable even talking to somebody in the speaker's office."

http://www.cnn.com/2006/POLITICS/10/04/foley.ap/index.html

-------------------------------------------------------------------------------------

 

 

 

 

 

 

 

 

 

Dow hits new record

Major gauges jump, with the industrials hitting a fresh all-time high and the S&P 500 hitting a 5-1/2 year high.

http://money.cnn.com/2006/10/04/markets/ma...dex.htm?cnn=yes

 

FBI searches 2 spinach processors

http://www.cnn.com/2006/HEALTH/10/04/taint...h.ap/index.html

 

Dobbs: Are you a casualty of the class war?

http://www.cnn.com/2006/US/10/03/Dobbs.Oct4/index.html

 

 

 

 

 

Dad pleads guilty in beating death of suspected molester

 

A man pleaded guilty Wednesday to criminally negligent homicide for beating to death a 77-year-old man he believed had molested his young daughter.

 

Robert Fontanez Jr., 27, had faced the more serious charge of second-degree murder in the April death of Bismark Vasquez before agreeing to the plea. He faces up to five years in prison at sentencing, expected early next year.

 

According to police, Fontanez became enraged when his 5-year-old daughter told him that Vasquez had touched her inappropriately.

 

He went to Vasquez's home and punched him so hard that the older man went through the back door, police said. Investigators said Fontanez continued to beat Vasquez as he lay bleeding on the concrete outside. Vasquez died in a hospital three days later.

 

Police detective Scott Chaffin said there was no physical evidence to support the molestation allegation, though he said the child's comments to police were consistent with what she had told her mother.

 

In a similar case in Fairfield, Connecticut, a man was charged with stabbing to death a 58-year-old neighbor in August whom he had suspected of molesting his 2-year-old daughter.

 

Jonathon Edington, 29, is free on $1 million bond and due back in court next week. Police have said they do not know if the abuse claim against the neighbor was true.

http://www.cnn.com/2006/LAW/10/04/molestat...n.ap/index.html

---------------------------------------------------------------------------------------

 

 

 

 

 

 

Paris Hilton, Shanna Moakler in altercation

http://www.cnn.com/2006/SHOWBIZ/TV/10/04/p...r.ap/index.html

 

Flower girl's last moments shown in DWI murder trial

http://www.cnn.com/2006/LAW/10/04/wedding....h.ap/index.html

 

Madonna adopts baby boy in Malawi

http://www.cnn.com/2006/WORLD/africa/10/04...reut/index.html

 

 

 

 

 

Coroner describes gruesome scene at Amish school

 

When the deputy coroner reached the Amish schoolhouse, she found blood on every desk, every window broken and the body of a young girl slumped beneath the chalkboard. Ten children had been shot, five fatally, and the gunman was dead.

 

"It was horrible. I don't know how else to explain it," Amanda Shelley, deputy Lancaster County coroner, said Wednesday. "I hope to never see anything like that again in my life."

 

The gunman, a 32-year-old milk truck driver and father of three, was wearing jeans, a T-shirt and a button-down shirt, Shelley said. He had stationed weapons around the schoolhouse and "really appeared he had planned on staying there a few hours," she said.

 

Authorities say Charles Carl Roberts IV had started buying supplies for a long siege six days before he stormed the tiny schoolhouse. He made a checklist of what to bring and wrote out four suicide notes, one talking about how he was "filled with so much hate" and "unimaginable emptiness."

 

Monday morning, Roberts ran his milk route as usual and walked his own children to school, police said. Then he drove to the Amish school and walked inside.

 

Teacher Emma Mae Zook, 20, said she immediately sensed something was off.

 

"He stood very close to me to talk and didn't look in my face to talk," she told the Intelligencer Journal of Lancaster in Wednesday's edition. She thought he was saying something about a metal object in the road.

 

Roberts walked back to his truck, then reappeared at the door with a gun, she said.

 

He sent the adults and boys out and bound the 10 girls in a row at the chalkboard, police said. He had been inside for about an hour, at one point speaking briefly by cell phone with his wife, when authorities closed in and Roberts opened fire on the girls at close range, fatally wounding five of them and then killing himself.

 

"We're quite certain, based on what we know, that he had no intention of coming out of there alive," State Police Commissioner Jeffrey B. Miller said.

 

The letters Roberts left behind and that short conversation with his wife indicated Roberts had remembered molesting two relatives 20 years ago and had been tormented by dreams about molesting again.

 

Roberts had brought lubricating jelly to the schoolhouse and may have planned to sexually assault the Amish girls, Miller said. He said a piece of lumber found in the school had 10 large eyebolts spaced about 10 inches apart, suggesting that Roberts may have planned to truss up the girls.

 

In the suicide notes, Roberts also said he was haunted by the death of his prematurely born daughter in 1997. The baby, Elise, died 20 minutes after being delivered, Miller said.

 

Elise's death "changed my life forever," Roberts wrote to his wife. "I haven't been the same since it affected me in a way I never felt possible. I am filled with so much hate, hate toward myself hate towards God and unimaginable emptyness it seems like everytime we do something fun I think about how Elise wasn't here to share it with us and I go right back to anger."

 

The state police commissioner on Tuesday laid out the steps Roberts took in the days and hours leading up to his attack on the West Nickel Mines Amish School in Lancaster County, where the Amish live an 18th-century lifestyle with no automobiles and electricity.

 

"He certainly was very troubled, psychologically deep down, and was dealing with things that nobody else knew he was dealing with," Miller said. But he said Roberts, who was not Amish, did not appear to have anything against the Amish people.

 

During the standoff, Roberts told his wife in a cell phone call that he molested two female relatives when they were 3 to 5 years old, Miller said. Also, in the note to his wife, Marie, he said he "had dreams about doing what he did 20 years ago again," Miller said.

 

Police could not immediately confirm Roberts' claim that he molested relatives, and family members knew nothing of molestation in his past. Police located the two relatives and were hoping to interview them.

 

At the time Roberts' wife received the phone call, she was attending a meeting of a prayer group she led that prayed for the community's schoolchildren.

 

The crime bore some resemblance to an attack on a high school in Bailey, Colorado, where a 53-year-old man took six girls hostage and sexually assaulted them before fatally shooting one girl and killing himself. That attack occurred September 27, the day after Roberts began buying materials for his siege.

 

At least three prayer services were held Tuesday night, attended by more than 1,650 people, who observed moments of silence, sang hymns and listened to Bible readings.

 

"Set your troubled hearts to rest," the Rev. Douglas Hileman said from the pulpit of Georgetown United Methodist Church, a short distance from the crime scene. "May we be able to forgive as God has already forgiven us."

 

The victims were identified as Naomi Rose Ebersole, 7; Anna Mae Stoltzfus, 12; Marian Fisher, 13; Mary Liz Miller, 8; and her sister Lena Miller, 7. Stoltzfus' sister was among the wounded.

 

Three other girls were in critical condition and two were in serious condition. They ranged in age from 6 to 13.

 

Church members visited with the victims' families Tuesday, preparing meals and doing household chores, while Amish elders planned funerals.

 

Sam Stoltzfus, 63, an Amish woodworker who lives a few miles away from the shooting scene, said the victims' families will be sustained by their faith.

 

"We think it was God's plan, and we're going to have to pick up the pieces and keep going," he said. "A funeral to us is a much more important thing than the day of birth because we believe in the hereafter. The children are better off than their survivors."

http://www.cnn.com/2006/US/10/04/amish.sho...g.ap/index.html

--------------------------------------------------------------------------------

 

 

 

 

 

 

 

 

 

Timeline of Amish school attack

 

Charles Carl Roberts IV had planned the fatal attack on an Amish schoolhouse Monday "at least two or three days in advance," State Police Commissioner Jeffrey Miller told CNN.

 

Below is a rough timeline that police have been able to piece together of events leading up to the attack after interviewing Roberts' wife.

 

3:00 a.m. -- Roberts is home from work after finishing his milk run, picking up milk between Amish farms.

 

7:30 a.m.-7:45 a.m. -- Roberts and his wife, Marie, are up with their children getting them ready for school.

 

8:45 a.m. -- Roberts walks his children to the bus stop

 

9:00 a.m. -- Marie Roberts leaves the house before Roberts and heads to a church prayer group at the Presbyterian Church, picking up a friend along the way. Charles Roberts was to leave for a random drug test as required by his employer for the license to drive in Pennsylvania.

 

9:15 a.m. -- Marie Roberts arrives at the Presbyterian Church.

 

10:30 a.m. -- Marie Roberts leaves the church with her friend.

 

10:45 a.m. -- Marie Roberts drops off her friend.

 

10:45 a.m. - 10:50 a.m. -- Roberts' wife tries to call him from their home phone. He had taken her cell phone.

 

10:48 a.m. -- The Lancaster County, Pennsylvania, emergency communications Web site showed 20 incident calls listed to the normally quiet Bart Township.

 

10:50 a.m. -- Roberts calls his wife and would not tell her where he is but says he is not coming home and that the police had arrived. He then tells his wife the location of his suicide notes. Roberts' wife finds some of the suicide notes and calls her mother and 911.

http://www.cnn.com/2006/US/10/03/amish.timeline/

----------------------------------------------------------------

 

 

 

 

 

 

 

 

 

 

Political gridlock: Good news for big stocks

If the November elections bring a politically divided government as expected, that would help bonds and some types of blue chips.

http://money.cnn.com/2006/10/02/commentary...dex.htm?cnn=yes

 

 

Housing burden rising across America

Renters and homeowners paying more than 30 percent of income on housing increasing across the U.S.; median home prices up 32 percent nationwide.

http://money.cnn.com/2006/10/03/news/econo...dex.htm?cnn=yes

 

 

 

 

 

 

 

-----------------------------------

Link to comment
Share on other sites

North Korea Raises the Stakes

Analysis: More tough talk, another provocation. What's behind Pyongyang's threat to test a nuclear weapon?

 

We'll see your financial sanctions and raise you a nuclear bomb test. So, in essence, went North Korea's latest bid in the high-stakes poker game with the U.S. over its nuclear program.

 

North Korea's foreign ministry made the unprecedented announcement Tuesday that the regime would test a nuclear weapon at an unspecified point in the future. The statement cited among Pyongyang's reasons for considering the step the "vicious sanctions and pressure" it said the U.S. was using to "isolate and stifle" North Korea. Those sanctions, intensified in the wake of North Korea's test firing of a long-range missile in July and confirmed in a U.N. Security Council resolution last month, were part of a U.S.- and Japan-led drive to squeeze the regime in Pyongyang to reverse course on its nuclear program. Instead, North Korea is threatening to raise the ante by testing a nuclear weapon — a step that would finally confirm Pyongyang's February 2005 claim to have built such weapons. (Although U.S. intelligence has concluded that North Korea has sufficient fissile material to build six devices, the actual extent of its technological progress in transforming that material into working nuclear warheads remains a matter of speculation.)

 

The threat to test a weapon certainly fits with the traditional North Korean game of provocative threats and actions aimed at securing concessions. It hasn't yet named a date, of course, and its statement makes clear that it wants a negotiated settlement with the U.S. at the end of the day. But testing a weapon would mark the crossing of a threshold over which retreat may be difficult. Only one country has ever dismantled an arsenal of actual nuclear weapons, and that was South Africa during the early 1990s, in one of the final acts of the outgoing apartheid regime.

 

Previous North Korean saber-rattling has been directed at squeezing more concessions out of the U.S. and its allies around the six-party negotiating table. The six-party process, which also involves South Korea, China and Russia, remains stalled amid sharply differing interpretations between the U.S. and North Korea over what had previously been agreed. North Korea has repeatedly pushed for direct talks with the U.S. — an idea supported by South Korea, China and Russia — but Washington has insisted, much as it has in its nuclear standoff with Iran, that it will only do business with Pyongyang on the basis set out in the multiparty process.

 

The North Korean statement made clear that once it had tested a weapon, it would continue to pursue the goal of a nuclear-free Korean peninsula, but seemed to suggest that it would negotiate with a weapon in hand. The goal of diplomacy, it said, could not be "unilateral disarmament," but instead "settling the hostile relations between the DPRK and the U.S. and removing the very source of all nuclear threats from the Korean Peninsula and its vicinity."

 

Pyongyang clearly wants the international community to believe that it is prepared to dramatically raise the stakes now in pursuit of a "grand bargain" agreement with the U.S. All the diplomatic players have adopted familiar responses, with Japan threatening harsh responses to a nuclear test and Russia and China calling for restraint and diplomacy. Hawks in the U.S. policy debate will say the new threat is a sign that sanctions are effective and are hurting the regime; doves will warn that escalating pressure will simply provoke the North Koreans into crossing the nuclear Rubicon.

 

In Pyongyang, however, the calculation may be different: The experience of India and Pakistan shows that no matter how hostile the initial response of the international community is to newcomers breaking into the exclusive club of nuclear-armed nations, the weapon's daunting capability eventually forces everyone to find ways of dealing with those states to avoid confrontation. That, unfortunately, may be an example the North Koreans are now opting to follow.

http://www.time.com/time/world/article/0,8...00.html?cnn=yes

-----------------------------------------------------------------------------------------------------

 

 

 

 

 

 

 

 

North Korea Raises the Stakes

Analysis: More tough talk, another provocation. What's behind Pyongyang's threat to test a nuclear weapon?

 

We'll see your financial sanctions and raise you a nuclear bomb test. So, in essence, went North Korea's latest bid in the high-stakes poker game with the U.S. over its nuclear program.

 

North Korea's foreign ministry made the unprecedented announcement Tuesday that the regime would test a nuclear weapon at an unspecified point in the future. The statement cited among Pyongyang's reasons for considering the step the "vicious sanctions and pressure" it said the U.S. was using to "isolate and stifle" North Korea. Those sanctions, intensified in the wake of North Korea's test firing of a long-range missile in July and confirmed in a U.N. Security Council resolution last month, were part of a U.S.- and Japan-led drive to squeeze the regime in Pyongyang to reverse course on its nuclear program. Instead, North Korea is threatening to raise the ante by testing a nuclear weapon — a step that would finally confirm Pyongyang's February 2005 claim to have built such weapons. (Although U.S. intelligence has concluded that North Korea has sufficient fissile material to build six devices, the actual extent of its technological progress in transforming that material into working nuclear warheads remains a matter of speculation.)

 

The threat to test a weapon certainly fits with the traditional North Korean game of provocative threats and actions aimed at securing concessions. It hasn't yet named a date, of course, and its statement makes clear that it wants a negotiated settlement with the U.S. at the end of the day. But testing a weapon would mark the crossing of a threshold over which retreat may be difficult. Only one country has ever dismantled an arsenal of actual nuclear weapons, and that was South Africa during the early 1990s, in one of the final acts of the outgoing apartheid regime.

 

Previous North Korean saber-rattling has been directed at squeezing more concessions out of the U.S. and its allies around the six-party negotiating table. The six-party process, which also involves South Korea, China and Russia, remains stalled amid sharply differing interpretations between the U.S. and North Korea over what had previously been agreed. North Korea has repeatedly pushed for direct talks with the U.S. — an idea supported by South Korea, China and Russia — but Washington has insisted, much as it has in its nuclear standoff with Iran, that it will only do business with Pyongyang on the basis set out in the multiparty process.

 

The North Korean statement made clear that once it had tested a weapon, it would continue to pursue the goal of a nuclear-free Korean peninsula, but seemed to suggest that it would negotiate with a weapon in hand. The goal of diplomacy, it said, could not be "unilateral disarmament," but instead "settling the hostile relations between the DPRK and the U.S. and removing the very source of all nuclear threats from the Korean Peninsula and its vicinity."

 

Pyongyang clearly wants the international community to believe that it is prepared to dramatically raise the stakes now in pursuit of a "grand bargain" agreement with the U.S. All the diplomatic players have adopted familiar responses, with Japan threatening harsh responses to a nuclear test and Russia and China calling for restraint and diplomacy. Hawks in the U.S. policy debate will say the new threat is a sign that sanctions are effective and are hurting the regime; doves will warn that escalating pressure will simply provoke the North Koreans into crossing the nuclear Rubicon.

 

In Pyongyang, however, the calculation may be different: The experience of India and Pakistan shows that no matter how hostile the initial response of the international community is to newcomers breaking into the exclusive club of nuclear-armed nations, the weapon's daunting capability eventually forces everyone to find ways of dealing with those states to avoid confrontation. That, unfortunately, may be an example the North Koreans are now opting to follow.

http://www.time.com/time/world/article/0,8...00.html?cnn=yes

--------------------------------------------------------------------------------------

 

 

 

 

 

 

 

A Right-Wing Rebellion on the Foley Scandal

Republican lawmakers are hanging with their leadership for now, but social conservatives needed for the election are raising an outcry

 

During a 90-minute crisis conference call earlier this week, House Republicans scattered across the nation mostly pledged support for Speaker Dennis Hastert despite the leadership's clumsiness in recognizing the implications of former Rep. Mark Foley's inappropriate interest in teen-age male pages. Foley has resigned in disgrace and is seeking treatment for alcoholism, but House members and their aides tell TIME that they fear new revelations are coming. On the conference call, a rank-and-file member asked about a report, circulating in the leadership since at least Friday, that Foley had showed up drunk at a page dorm. A House leader said that the alleged visit should be discussed privately because reporters might learn about the call, according to people who were on the call.

 

Leadership aides expressed relief that members were, at least initially, staying loyal. "The ship didn't go down," one congressional aide said. Trying to quash speculation Hastert might step down under pressure from the Speakership next year if the G.O.P. retains control, his office issued a statement today saying he "will run again and serve his full term" if his colleagues elect him. But now Republicans have a new worry: Key social conservatives have issued blistering statements about the handling of the Foley matter, arguing that political correctness kept G.O.P. leaders from intervening earlier, and are making it clear that they are not giving Hastert and his team the benefit of the doubt. Republican pollsters are warning party officials that enthusiasm among their voters is waning from its already listless levels. And officials say the rebukes from Christian conservatives carry ominous implications for the midterm elections, when the G.O.P. will depend on these voters to turn out and work for the party's candidates. "These are the people you need," one dismayed official said.

 

The least political of these groups, James Dobson's Focus on the Family, did not take shots at Republican leaders. Its newly created separate lobbying group, Focus on the Family Action, said in a statement that the revulsion from Americans shows that society recognizes "limits to tolerance of our culture's anything-goes view of sexuality." Tom Minnery, the group's senior vice president of government and public policy, used the statement to add that the lurid episode might discredit "the politically correct notion fed to us by those on the left that obscenity is just another form of free speech."

 

But the Family Research Council, led by Tony Perkins, a frequent guest on television talk shows, went straight at the Republican Party, declaring in a message to supporters that the House leadership could suffer the same disgrace that Catholic leaders did in the priest scandal. "They discounted or downplayed earlier reports concerning Foley's behavior, probably because they did not want to appear 'homophobic,'" Perkins said. "The Foley scandal shows what happens when political correctness is put ahead of protecting children." So no one could miss the message, the headline was: "Pro-Homosexual Political Correctness Sowed Seeds for Foley Scandal."

 

A similarly blunt broadside is being distributed by the Arlington Group, a coalition of what it calls "pro-family organizations," including such well-known figures as Don Wildmon of the American Family Association, Gary Bauer of American Values and Paul Weyrich of the Free Congress Foundation. "We are very concerned that the early warnings of Mr. Foley's odd behavior toward young male pages may have been overlooked or treated with deference, fearing a backlash from the radical gay rights movement because of Mr. Foley's sexual orientation," the group said. "It appears that the integrity of the conservative majority has given way to political correctness." If Republican ground troops are as convinced as their leaders that the party coddled Foley, that conservative majority may find itself in the minority on the morning of Nov. 8.

http://www.time.com/time/nation/article/0,...00.html?cnn=yes

---------------------------------------------------------------------------------------------

 

 

 

 

 

 

 

 

California seeks indictments in HP case

Attorney General files criminal complaint against ex-chairman Dunn, others involved in leak probe; CEO Hurd not named.

 

California Attorney General Bill Lockyer sought felony indictments against former Hewlett-Packard chairman Patricia Dunn and others involved in the company's controversial leak probe Wednesday, Reuters reported.

 

In addition to Dunn, Lockyer filed a criminal complaint against Kevin Hunsaker, HP's former chief ethics officer, and private investigators Ronald DeLia, Bryan Wagner, and Joseph DePante, the newswire said, citing a court clerk.

neral Bill Lockyer has filed a criminal complaint against five individuals involved in the Hewlett-Packard leak probe.

 

 

CEO tells Fortune's Adam Lashinsky that he's apologetic for approving a strategy of lying to the media, but stands by his instincts.

 

Chief executive Mark Hurd, who has come under increased scrutiny for the role he played in the probe, was not named in the complaint, Reuters said.

 

The indictments would be the first charges filed against individuals involved in the HP (Charts) leak probe.

 

At a House hearing last week, Dunn testified that she never knew that tactics involving the misrepresentation of someone's identity would be used in the investigation and that she was assured by Hunsaker that the methods HP were using were legal.

 

Hunsaker led the investigative team which eventually identified the source of the boardroom leaks.

 

Both he and DeLia invoked their Fifth Amendment right against self-incrimination at the hearing. Several other witnesses lawmakers had called to testify also took the Fifth.

 

The discovery that HP used "pretexting" - a practice where personal confidential information is obtained through false pretenses - to spy on its directors, journalists and employees has enveloped the venerable Silicon Valley firm since the scandal broke early last month.

 

The company's surveillance tactics have also sparked an investigation from the Justice Department.

 

HP said it is still cooperating with state and federal investigations.

 

The HP probe goes back to 2005, when then-chairman Dunn initiated an investigation into company leaks after the departure of former chief executive Carly Fiorina in March. The probe came up inconclusive and was restarted again early this year.

 

Board member George Keyworth eventually was fingered as the source of the leaks. Keyworth resigned from the board last month.

 

Shares of HP (Charts) rose in regular trading Wednesday. Shares of rivals Dell (Charts) and IBM (Charts) also gained.

http://money.cnn.com/2006/10/04/news/compa...dex.htm?cnn=yes

--------------------------------------------------------------------------------------------------

 

 

 

 

 

 

 

Kids need help coping with fear over school shootings

 

For parents hoping to shield children from news of the recent school shootings across the country, the task is nearly impossible.

 

Today's adolescents and teens happen upon an endless amount of news while researching homework on the Internet or talking with friends through instant messaging systems, chat rooms and blogs. Some even receive news updates on their cell phones.

 

So while parents' instincts might be to shy away from talking about frightening real-life stories of harm to children, chances are they will need to confront the news instead.

 

"Open up the conversation. If the child is saying they're not upset, you can drop the conversation," says Melissa Brymer, director of the terrorism and disaster programs at the National Center for Child Traumatic Stress at UCLA. "Some kids do need the parent or adult to take that first step."

 

She suggests talking at a time when you can focus on your child's verbal and nonverbal responses, perhaps after dinner. Bedtime isn't a good choice, since the child's anxiety could spiral late at night. "Explain that emergencies can happen in many different ways," says Brymer, "and that schools have crisis plans to make sure kids are safe so they can learn."

 

If you haven't done so already, get details on the disaster plan for your school district, including specifics on evacuation and how you can get accurate information during a crisis. Then reassure your child that you'll know how to reach him or her in an emergency.

 

Help children form their own plans. Brymer advises making a list of two or three trusted adults that your children can go to at school if they see a suspicious stranger or overhear students talking about committing violence. Ask if any new terms (such as "lockdown") confuse them, then discuss how you can contact each other if cell phone service is jammed.

 

Do they know where the nearest pay phones are, and have they ever used one? Do they know how much change is needed to make a local call? They may never need this information, but having it can be emotionally empowering.

 

Discuss how the people who have carried out these attacks should have dealt with their anger. "This is a prime time, what we call a teachable moment, where you can discuss how to solve problems and ways to show anger that don't involve verbally or physically hurting someone," says Marilyn Tolbert, director of laboratory schools for Texas Christian University in Fort Worth, Texas.

 

Tolbert also recommends reminding children that they can always talk with you or others about their anger or fear.

 

Remind children how rare school shootings are. "If you figure how many schools there are in the country," says Brymer, "we realize it feels more commonplace than it is. It's important to be putting it into context."

 

It is also useful to point out to smaller children that the images they see on television are the same shootings being repeated, not new violence. "We saw after 9/11 that very young kids who kept seeing the images of buildings crashing thought there were buildings crashing every day," says Brymer. It can also help to let them know just how far away these recent events took place from their own community.

 

You can express confidence in school safety, without promising that violence won't happen. "We don't want to lie to them," Tolbert says. "I would err toward the side of saying, 'I feel very comfortable at your school and you feel safe there. They're taking every precaution."' Remind your child that safety rules, such as requiring visitors to wear badges, are in place at their school to protect them.

 

If older children are watching a lot of news coverage of recent violence, says Brymer, you may want to limit their intake or ask again how they're feeling. Watching some coverage can be helpful to clarify misinformation they may have gotten from their peers, but consuming too much violent imagery can intensify their anxiety.

http://www.cnn.com/2006/EDUCATION/10/04/sc...s.ap/index.html

--------------------------------------------------------------------------------------------

 

 

 

 

 

 

 

 

City schools are often safer than others

 

At the Samuel H. Daroff Elementary school in West Philadelphia, students must pass a security officer who uses a metal detector wand to search for possible weapons. A network of cameras pans the grounds and beyond for any sign of trouble.

 

It's a typical scene in a city where schools have become a refuge from drug-fueled gang shootings.

 

It's also a scene in sharp contrast with schools in suburbia, rural America and at the one-room Amish schoolhouse an hour west of Philadelphia where a gunman struck Monday.

 

The attack, which left five girls dead, was the latest school shooting far from an urban center, illustrating for some experts that city schools have often succeeded in making themselves safer.

 

Last week in Bailey, Colorado, a man held students as hostages in a classroom and then killed one of them and himself. Also last week, a principal was fatally shot by a student in rural Cazenovia, Wisconsin.

 

Despite such shootings, the public tends to view city schools as less secure and more dangerous -- yet urban districts are consistently better prepared, said Ken Trump, president of the National School Safety and Security Services, a consulting firm in Cleveland, Ohio.

 

Suburban, rural and private schools frequently "have not gotten past the 'it can't happen here' mentality," he said.

 

"That's the first perception -- inner cities are the problem hotspots and the rural areas are safer," agreed Ronald Stephens, executive director of the California-based National School Safety Center. "This is a reminder that no place, person or school system is immune from violence."

 

Delores Shur, a 42-year-old West Philadelphia homemaker, said the Amish school shooting unnerved both her and her 13-year-old son, Darren.

 

Despite all the security precautions at the 850-student Daroff Elementary, she wondered what any school could do to stop a person determined to find a way inside.

 

"Anybody could walk into the schools," she said.

 

Jeffrey Jackson, the Philadelphia school system's manager of non-instructional services, said security systems are not the only reason schools like Daroff Elementary have never had a shooting, despite violence in the community.

 

He cited an urban attitude in which guns are looked at with greater suspicion than in rural areas, where you have "that God and country thing, the right to bear arms."

 

"Violence we see in the city is directed, like a drug deal gone bad or a bad relationship," Jackson said. "We know about it."

 

At Daroff Elementary, Officer Michael Gammon monitors 28 views of the school and can even scan the McDonald's restaurant across the street.

 

All the city's high schools have even tighter security, requiring students and visitors to walk through metal detectors, said James Golden, its chief safety executive.

 

The district has deployed 2,800 security cameras at 150 schools of all levels and the remaining 120 schools will soon get them as well, he said. About 450 police officers are also stationed at schools.

 

"There is a balance you can strike," said Paul Vallas, the Philadelphia school district's chief executive. "You can add these things and create a school environment that's conducive to learning."

http://www.cnn.com/2006/EDUCATION/10/04/am...n.ap/index.html

--------------------------------------------------------------------------------------------

 

 

 

 

 

 

 

 

A look inside Virgin Galactic's new ride

 

Virgin Galactic recently unveiled a mock-up of the slick, Philippe Starck --designed interior of its SpaceShipTwo (SS2) suborbital tourist vehicle.

 

The real bird won't be shown for at least a year, but at a press conference in New York, led by Richard Branson himself and Virgin Galactic chief Will Whitehorn, gave a good peek into how the program is progressing and what these first consumer spaceflights will be like.

 

The cabin itself is more than three times as large as that of the X Prize-winning SpaceShipOne (SS1), accommodating six passengers and two pilots and permitting plenty of float-around possibilities during the estimated five minutes of weightlessness the vehicle will achieve at the peak of its ascent.

 

Burt Rutan, designer of both vehicles and their motherships, White Knight and WhiteKnightTwo (WK2), and his team at Scaled Composites seem to be on track for the prototype unveiling late next year, although the stated 2009 commencement of commercial flights seems optimistic, given the apparent delays in the development of the scaled-up, more complex SS2.

 

Mockups of the cabin hints at Rutan's strategy -- make the spaceflight experience user-friendly for anyone other than hardcore test pilots.

 

In particular, he had to address the issue of the high-G climb out and the reentry, which was extraordinarily violent for the pilots on the three SS1 suborbital flights. SS2's cabin has ergonomic seats that automatically recline to orient the passengers' bodies to best absorb the G-forces.

 

They will be at a 60-degree upright angle for the ascent and then recline to a nearly horizontal attitude for the descent, with the passengers' legs comfortably bent in order to tolerate the high-G ride and the extreme buffeting that accompanies it.

 

Once back in the atmosphere, the seats will return to a 60-degree angle for the glide back to the spaceport.

 

The fully pressurized cabin will have 15 windows, including several on the floor and ceiling, permitting passengers to see Earth from multiple angles during their free-floating period. The view will be approximately 1,000 miles in any direction.

 

Large dials on the bulkhead will convey the mission time, speed of the spaceship, altitude and current G-forces being experienced. Passengers will wear lightweight, form-fitting pressure suits and helmets to ease movement around the cabin.

 

The overall flight profile, though extended, will mimic that of SS1. The enormous WK2 mothership -- which will be larger than a 757 and have a cabin identical to SS2, permitting the aircraft to be used as a training vehicle for the Virgin Galactic passengers -- will carry the 60-foot-long SS2 to 10 miles above sea level, about 50,000 feet, and release it.

 

SS2's hybrid motor will then ignite, accelerating passengers at four Gs to three times the speed of sound. For reentry, SS2's wings will pitch upward, "feathering" in a shuttlecock formation to automatically position the ship for the steep descent. At 70,000 feet, the wings will return to a horizontal glide formation for the runway landing.

 

Branson, in keeping with his recently announced commitment to environmental consciousness, extolled the spaceship's green qualities.

 

"It might be strange to think of a space vehicle as 'green,' " he said, "especially when you consider that the amount of energy released in a typical space shuttle launch could power New York City for a week. But we've created a fuel for SS2 that can launch eight people into space while expending the same amount of carbon dioxide as a single business-class seat on a New York-to-London flight."

 

The first SS2 will be called VSS Enterprise, and Virgin Galactic expects its first full fleet to comprise two motherships and five SS2s -- which would also permit the company to quickly expand its operations beyond the initial spaceport in New Mexico to other countries that permit the flights (the U.K. is high on its list).

 

Virgin is sticking by their ticket price of $200,000 and expects to offer lotteries and other means of democratizing the opportunity, including a reality-TV game show that is now under development.

 

Longer-term, Whitehorn says, the program is "about developing a methodology for spaceflight." He expects to use the SS2 technology for space and Earth-science studies, to expand to orbital flights, and to begin offering high-speed "spaceline" service going from, say, London to Sydney in less than an hour.

http://www.cnn.com/2006/TECH/space/10/04/s...hip2/index.html

--------------------------------------------------------------------------------

 

 

WEB EXCLUSIVE

Unveiled! Virgin Galactic's New Ride

Check out their YouTube video!!!!

http://www.popsci.com/popsci/aviationspace...ecbccdrcrd.html

-------------------------------------------------------------------------------

 

 

 

 

 

 

 

 

 

Report: Sewage, coastal destruction threaten oceans

 

THE HAGUE, Netherlands (Reuters) -- Sewage is a growing threat to oceans and seas, putting at risk marine life and habitats as the pollution problem escalates, the United Nations Environment Program (UNEP) said in a report on Wednesday.

 

The "State of the Marine Environment" report found that substantial progress had been achieved in reducing oily wastes and organic pollutants such as long-lived industrial chemicals in the past two decades but other problems had grown worse.

 

In many developing countries, between 80 and 90 percent of sewage entering coastal zones is estimated to be raw and untreated, said the report compiled by the UNEP global program of action for protection of marine environment (GPA).

 

The pollution -- linked to rising coastal populations, inadequate treatment infrastructure and poor waste handling facilities -- is putting at risk human health and wildlife as well as livelihoods from fisheries to tourism, it said.

 

"In the past we thought the ocean could be our sewage treatment plant," UNEP executive director Achim Steiner told a news conference in The Hague.

 

"But we cannot do that any more as even in the Arctic we see two-three times increase in concentration of mercury in seals and whales," Steiner said.

 

The report estimated that an additional $56 billion is needed annually to address the global sewage problem. UNEP said countries should make polluters contribute to the bill.

 

There is also a rising concern over the increasing damage and destruction of essential and economically important coastal ecosystems like mangrove forests -- needed for coastal defenses and fisheries, as well as coral reefs and seagrass beds.

Population pressure

 

Growing coastal populations and overuse of marine resources are the main source of the problem, the UNEP said. Close to 40 percent of the world's population live on the coastal fringe.

 

Threatened areas include the North Sea's bed, coral reefs in South East Asia, wetlands in North America, Southern and Western Africa, mangroves in many Caribbean countries, Ecuador and Colombia, and fisheries in Latin America.

 

The report also noted increasing levels of pollutants from sources like agricultural fertilizer, manure, sewage and fossil fuel burning, with the problem spreading from developed to developing countries as well.

 

This has led to doubling of the number of oxygen deficient coastal "dead zones" every decade since 1960, and degradation of seagrass beds and emergence of toxic algal blooms.

 

The UNEP highlighted progress made in reducing global oil and chemicals pollution. The world has cut oil discharges from industry and cities by nearly 90 percent since the mid-1980s.

 

But concerns of further oil pollution remain as climate change and the loss of ice is opening up the North East passage across the roof of the world to shipping and oil exploration.

 

The findings will be given to more than 60 member governments of the GPA initiative at a meeting in Beijing on October 16-20 to encourage a review of their planning and investment strategies to ensure they are genuinely marine-friendly, the UNEP said.

 

"An estimated 80 percent of marine pollution originates from the land and this could rise significantly by 2050 if, as expected, coastal populations double in just over 40 years time and action to combat pollution is not accelerated," Steiner said.

http://www.cnn.com/2006/TECH/science/10/04...reut/index.html

---------------------------------------------------------------------------------------------

 

 

 

 

 

 

 

 

How to keep the kids safe, in day care or with a Saturday-night sitter

 

By Diana Burrell

When I went back to work part-time, my husband and I hired Dawn to care for our baby, then 18 months old. Dawn seemed the perfect sitter: She and Oliver were crazy about each other, and she had plenty of experience with other kids who adored her.

 

Then one day she mentioned having a lead foot behind the wheel. Since the only cars they'd been driving together were plastic, this hadn't been a problem. Yet it made me nervous, because up till then, I would have handed Oliver -- and my car keys -- over to her for a trip to the playground. This revelation hit home: It's easy for parents to become lulled into a false sense of security, even if they've checked references and double-checked child-care credentials. While cases of abuse by a sitter are rare, none of us wants to be that case. Fortunately, there are crucial ways you can lower your child's risk of harm.

 

What to do before you decide: Get independent verification. Double-check all the information a prospective day-care provider gives you, says Erika Karres, author of "Violence Proof Your Kids Now." If the center is licensed, call the state bureau to make sure the license is current and ask about any complaints the provider has had in the past. If the provider says she is accredited, make sure that's the case. Unless a provider has lied about it, lack of accreditation doesn't have to be a deal breaker -- applying for accreditation is voluntary, and many small, home-based caregivers don't bother. Without it, though, you have one safety check fewer, so additional sleuthing on your part is important. Check references, but don't just go with the ones you're handed. "Chat with the parents you see dropping off their kids," Karres says. Find out why they go there -- and what they don't like about the center.

 

Take a good look around. Noticing details about a day-care center or family-care provider's home can help you make an informed decision, says Karres. Look at everything from the floor's condition to how the house looks from outside. Is there plenty of room for kids to move around? Do you see workers washing their hands? Are there smoke alarms and safety gates? Do they schedule monthly safety drills, or is there too much trash and not enough lighting? Don't assume that a perfectly neat room means a well-run operation. "What's going to happen if your kid throws a bowl of spaghetti?" says Pamela Rowse, president of the Kierra Harrison Foundation for Child Safety, in Las Vegas, Nevada. Instead, think about whether the kids look comfortable just being kids. Find out how many staff members there are, too. Experts recommend a ratio of at least one adult to every four babies, and two adults in a classroom of up to 18 2- and 3-year-olds. These aren't state or national requirements, though, so if the numbers don't match up exactly, you'll have to decide if the ratio still seems reasonable.

 

Ask about security measures. How does the day care supervise and control dropoffs and pickups? Who has access to your child? When a father tried -- unsuccessfully -- to abduct his 3-year-old from Judith Katz's day-care center in suburban Chicago, she realized she needed to improve security. Now all four of her Minee Subee early childhood centers are equipped with finger-print scanners to limit who gets into -- and out of -- the school. Make sure there's a system in place that you feel is satisfactory.

 

Find out about dropping in. Ask the owner if she minds unexpected visits from you. Red flags should be waving if she answers yes or she says you can't drop by between certain hours. You should never be denied access to your child.

 

How to keep your child safe: Join forces with other parents. Many pairs of eyes are better than one. Agree with other moms and dads that on one day, you'll drop by the day care unannounced during lunch, and the next day, another parent will arrive early for pickup.

 

Listen to your child. Even toddlers can give you feedback on day care. Encourage them to tell you what they've done during their day. Try "What was your favorite thing about today? What was your least favorite thing about today?" What do their facial expressions reveal? Out-of-the-ordinary behavior at home like tantrums, hitting, or sudden changes in personality can signal a problem. Talk to the day-care provider about it first (has she noticed these problems? what does she think is causing them?), but also talk to your pediatrician.

 

What to do before you hire: Write up a thorough job description. This is important, whether you're looking for a full-time caregiver or a neighborhood teenager to play with your child for a few hours in the afternoon. You can then ask each candidate if she can do the tasks on the list with or without assistance (such as needing a back brace to lift your toddler, for instance) says Bob King, an employment attorney and owner of Legally Nanny, an Irvine, California, firm that gives advice to household employers. Ask other questions about the job duties, too. For instance, if one of her responsibilities will be to drive your child to school, you could say, "Sometimes Charlie hates to get into his car seat. Have you had to deal with that before? What did you do?" (And when you do a background check, make sure that driving records are included.)

 

Require a medical exam. You have the right to ask the candidate to take a medical exam and/or be tested for illegal drugs as a condition of employment. This could have saved the life of Michelle and William Puckett's son, Bryan. Despite posing health questions to the registered nurse they hired to care for their 11-month-old, the Winchester, Kentucky, couple didn't discover the truth about her medical history until after their son's death from hyperthermia. (The sitter left him, and her own son, strapped into the back seat of her car while she ran errands.) During her trial, the Pucketts were horrified to learn she had a history of disorienting "seizures." Says Michelle: "If we'd had access to her medical history, Bryan would've never set foot in her home."

 

Listen to your gut. If it doesn't sit right with you when a candidate is hard to reach or has to reschedule your interview, move on. Your instincts can also tell you what's right. Lisa Bain, a Parenting staffer, thought she'd found the perfect caregiver after a long interview but was dismayed when the woman's day-care-center employer had nothing positive to say. So Bain asked for the names of parents at the day-care center and called many of them. They raved about the woman, and she wound up working for Bain's family for more than three years.

 

Read body language. During the interview, you notice your top candidate looks bored with your questions, or you catch her rolling her eyes. No, you aren't going overboard -- you need to move on to another candidate, says Meri-K Appy, president of the Home Safety Council, in Washington, D.C. "You want someone who's philosophically in sync with you," she says.

 

How to keep your child safe: Offer your support. Your sitter should know that you can be called at any time for any reason. If she knows she can reach out when she's reached her limit, your child will be safer.

 

Treat caregivers with respect. Building a strong bond goes a long way toward making sure your sitter gives her best to the job. You don't need to become best friends (you're still her employer), but learning more about who she is can help her feel like she matters. The bottom line: Treat her like a professional.

 

Stay in the loop. As with day-care centers, drop in unexpectedly. Urge neighbors, family, friends, and other parents to keep their eyes and ears open, too. Tim Barton (not his real name) of Charlotte, Vermont, was called by a concerned mother at his 1-year-old's music class, who told him that she and other parents had witnessed Barton's nanny pushing the boy into his car seat so roughly that he was crying. "We're so grateful to those who spoke up," he says. "We let the nanny go."

 

If good care goes bad: Don't make or accept excuses. This is another area in which to listen to your gut. When Barton and his wife were around their son and his nanny, all seemed well. But when the couple called home during the day, the phone was frequently busy. "We let ourselves believe that during those phone calls, the baby was napping," he says. If you sense something is off, deal with it instead of explaining it away.

 

Craft a Plan B. As soon as you suspect a problem, you need to get your child out of the situation at once. That means always having a safe temporary option. Plan B can be a grandparent, a neighbor, or another sitter, but make sure it provides the level of safety you wanted with Plan A.

 

Take a stand for all kids. "If you pull your child out of a day care because you're genuinely concerned about his welfare, make it safe for the children left behind," urges Rowse. File a report with your state's childcare licensing bureau, or go to law-enforcement authorities. Says Rowse: "There are too many parents who say, 'If I'd just done something.'"

http://www.cnn.com/2006/HEALTH/09/29/kids.....par/index.html

---------------------------------------------------------------------------------

 

 

 

 

 

 

 

Family gets Disney World all to themselves

 

LAKE BUENA VISTA, Florida (AP) -- Walking hand-in-hand on a red carpet, Raymond and Tammy Spangler and their two children seemed unsure of their steps Wednesday at Walt Disney World.

 

The Magic Kingdom was eerily quiet, with only the chirping of birds, piped in orchestra music and the sound of their footsteps filling the 125-acre park. They were about halfway up the red carpet to the Cinderella Castle when all that dissolved and 1,500 mouses, maids, baseball players and princesses came streaming out of hiding to welcome them.

 

"There were like thousand and thousands of people in the streets all of the sudden," 13-year-old Derick Spangler said.

 

The Spanglers, of Randolph, Ohio, were the first to win a marquee prize in Disney's "Year of a Million Dreams" celebration. One of 50,000 online entrants, they were rewarded with a morning at the Magic Kingdom all to themselves -- and a VIP tour.

 

By noon the family had been on Space Mountain, to the Dumbo attraction, on a carousel filled with Disney characters and on the Jungle Cruise, where 11-year-old Ashley Spangler got to drive the boat. All were free of lines, of course.

 

Other prizes to be awarded in Disney's contest include a chance to be the first to stay overnight in the Cinderella Castle, trips around the world as grand marshal in the Disney parade, a membership to the Disney Vacation Club and more.

 

Some, like a pass allowing guests to skip lines at attractions for the day, will be awarded at random to unsuspecting guests visiting a Disney park. All the company's worldwide properties are participating, but the biggest prizes are at Disney World and Disneyland in Anaheim, California.

 

Prize values range from $3.83 to $83,701 for the vacation club package, which provides annual points that can be redeemed for stays at Disney properties.

 

The Spanglers had been to Disney World before, but did not plan on coming to Orlando now. They only found out three weeks ago that they had won, but said it was no trouble to get work and school off.

 

"The kids' principal was like, 'Well I'd pull my kids out too!"' Tammy Spangler said.

 

The Magic Kingdom opened to the rest of the public at 10 a.m. Wednesday, an hour later than usual. Different sections of the park were opened to all guests after the Spanglers moved through.

http://www.cnn.com/2006/US/10/04/disney.alone.ap/index.html

-----------------------------------------------------------------------------------------------

 

 

 

 

 

 

 

 

 

 

Hoists for heists: Robbers grab ATMs with forklifts

 

Leave the gun. Bank robbers have found an easier way to make off with other people's money: Around the country, thieves have hot-wired forklifts at construction sites, chugged up to banks and scooped up their ATMs, with all the cash inside.

 

ATM manufacturers have been working on ways to stop the heists, and sometimes the money involved is so small it hardly seems worth the risk. But that hasn't discouraged thieves this summer in such states as Arizona, California and Georgia.

 

They have pulled off or attempted such thefts at least 21 times this year in the Phoenix area alone.

 

"It's called the smash-and-dash," said Rob Evans, director of industry marketing for Dayton, Ohio-based NCR Corp., the world's largest maker of automated teller machines. Evans is the company expert on ATM thefts.

 

Since the 1990s, thieves have used forklifts to steal ATMs in Indonesia, New Zealand, Scotland, Ireland and Estonia, as well as the U.S. Four years ago, criminals plowed through the front doors of a movie theater in Lethbridge, Canada, with a forklift, drove into the lobby, hoisted the bulky machine and carried it to a waiting pickup truck.

 

The payoff for those who succeed in breaking into the machines varies widely, from a few hundred dollars to tens of thousands of dollars.

 

"The vast majority of those attacks are unsuccessful," Evans said. "A lot of times you just get a lot of damage."

 

Some attempts end in almost comic failure. Often, ATM thieves are spotted by security guards and surveillance cameras as soon as they come rumbling up, and they are eventually caught. (Some at least are smart enough to wear ski masks.) Others flee after failing to pry the ATM loose. Some get away with the machines, only to find the concrete-and-steel vault tough to crack.

 

In the Phoenix area -- a booming region with plenty of construction projects and lots of drive-through banks with open-air ATMs bolted to the ground, instead of embedded in a brick wall -- police will not say how much has been stolen.

 

One of the most recent cases took place Monday at a bank in Mesa. Sheriff's deputies found the ATM later that night burned in the desert. The cash was gone.

 

Law enforcement agencies in the metropolitan area have formed a task force with banking industry officials to investigate the thefts. So far, authorities have made at least two arrests in one case and are looking into whether the crimes are connected.

 

"It could be some organized syndicate that's just decided to hit," said Sgt. Mike Angstead, who supervises the property crimes unit with Gilbert police.

 

Banks won't talk about how much money their machines typically contain.

 

"Those with the highest concentrations of cash are in casinos and other venues with high security," Evans said. "The little tabletop machine in your quickie mart, that literally has a couple hundred bucks in it."

 

The smaller machines with the least security tend to be the ones that get stolen, Evans said. "It's hardly worth the trouble."

 

To protect their money, many banks use ATMs equipped with global-positioning technology that tells authorities where the machines are. Some have an alarm that goes off is someone tampers with the machine. Even if the thieves get away with the machines, they have to pound away pretty hard to get the safe open.

 

During the summer in Sacramento, California, thieves took off with an ATM in a rented truck. Within hours, a GPS device inside the machine gave away its location. When police arrived, the smashed ATM was sitting on a back porch, covered in a blue tarp.

 

"They were just using a sledgehammer trying to open up the machine," Placer County, California, sheriff's Sgt. Brian Whigam said. "Once they got to the core, they discovered the GPS tracking device, and they knew the jig was up."

 

Four people were arrested.

http://www.cnn.com/2006/US/10/04/atm.thefts.ap/index.html

------------------------------------------------------------------------------------------------

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

--------------------------------------------

Link to comment
Share on other sites

Investigators to House: Keep Foley documents

 

Federal investigators have asked the House of Representatives to keep computer records and papers from former Rep. Mark Foley, a senior Justice Department official said Wednesday.

 

The move is a sign that a criminal investigation into the congressman's correspondences with teen pages is imminent, perhaps within days, Justice Department officials said.

 

The investigation remains a preliminary inquiry, but a full criminal investigation will pave the way for subpoenas, searches and grand jury testimony, Justice Department officials said.

 

House members are expected to cooperate with any necessary searches during the probe, according to federal law enforcement sources.

 

Foley, a Republican who represented a district in Florida, resigned Friday amid allegations that he sent "overly friendly" e-mails to a male teenage page in the House. Soon afterward, sexually explicit instant messages, allegedly between Foley and a page, surfaced. The former congressman checked in to a treatment facility Sunday for alcoholism and mental issues, his lawyer said.

 

Attorney David Roth held a news conference in West Palm Beach, Florida, on Tuesday to announce that Foley was gay and had been molested when he was a teen by a clergyman. Roth would not elaborate. He said Foley would explain when he was discharged from the treatment center, which will take at least 30 days.

 

Roth conceded that his client engaged in inappropriate exchanges with pages and former pages. However, Roth emphatically stated that Foley "never, ever had an inappropriate sexual contact with a minor in his life." Any assertion that Foley is a pedophile is "categorically false," Roth said.

 

Foley was under the influence of alcohol when he wrote the messages, the attorney said.

 

Roth's statement came shortly after ABC News published an instant message exchange that it said showed Foley had cybersex with a teen before a House vote in 2003. ABC News has released several portions of lurid instant messages, allegedly between Foley and a page.

 

Washington ethics group: FBI knew

 

The Washington watchdog group that first published the inappropriate e-mails between Foley and a Louisiana teenager said Wednesday that it told the FBI in July about Foley's communications. Those messages were deemed by a congressman who oversees the page program inappropriate but not sexually explicit.

 

The FBI contends that Citizens for Responsibility and Ethics in Washington did not provide enough information -- including the pages' identities and e-mail addresses -- to pursue the case. The FBI reviewed copies of the messages, government officials said, but did not have enough information to move forward with an investigation or seek subpoenas.

 

CREW Executive Director Melanie Sloan disputed that account, saying the FBI was given the teen's full e-mail address July 21. CREW received the e-mails that day from "a third party who had gotten them from a congressional staffer," she said.

 

Sloan said they were sent via e-mail to the FBI.

 

"The agent called me to follow up to say, 'So, these are e-mails from Mark Foley?' And I said, 'Yes.' And that was the end of our interaction," she said.

 

CREW has questioned whether the White House helped "cover up Rep. Foley's conduct and leave a potential sexual predator on the loose." The group also asked the Justice Department's inspector-general to investigate why the FBI didn't take further action.

 

The scandal has rocked the Republican leadership of the House about five weeks before the November midterm elections. It also has triggered a call for House Speaker Dennis Hastert, an Illinois Republican, to step down, but his spokesman and fellow GOP congressmen have said that isn't going to happen.

 

Hastert asked the Justice Department on Sunday to investigate Foley's conduct and what steps were taken by House members and staff when concerns about the congressman came up.

 

Government officials said several former pages have been interviewed, and investigators are still trying to find and interview others. Part of this process is "getting real people to make real charges," one official said.

 

House leaders have acknowledged they were told in late 2005 that Foley was sending "overly friendly" e-mails to the Louisiana teen. Rep. John Shimkus, the Illinois Republican who chairs the board overseeing the page program, told Foley to stop, and said Foley claimed he would.

 

Rep. Tom Reynolds, a Republican from New York and head of the GOP's House campaign committee, has said he warned Hastert about Foley's e-mail in the spring. Hastert said he doesn't dispute Reynolds' account but doesn't recall the conversation.

 

Reynolds' chief of staff resigned Wednesday amid allegations he tried to protect Foley from congressional inquiries. Kirk Fordham, who previously had served as Foley's chief of staff, denied taking any inappropriate action on Foley's behalf. Fordham said he was merely reaching out to Foley "as any good friend would."

 

According to The Associated Press, Fordham claims he told Hastert's office three years ago about Foley's worrisome conduct with the pages.

 

Meanwhile, Rep. Ray LaHood, a Republican from Illinois, has called the page program "antiquated" and suggested suspending it until "some scholarly people in Washington really evaluate the program and bring it into the 21st century,"

 

"These young men and women come to Washington, look to us as their heroes and people they can look up to, and then we betray their trust -- or some members betray their trust -- by taking advantage of them," he said. "We should not subject young men and women to this kind of activity and this kind of vulnerability."

 

Along with the FBI, the Florida Department of Law Enforcement and the House Ethics Committee are also investigating Foley's conduct and whether there was any attempt to cover it up.

http://www.cnn.com/2006/POLITICS/10/04/fol...ndal/index.html

----------------------------------------------------------------------------------

 

 

 

 

 

 

 

 

 

Report: Aide said he warned Hastert's office about Foley

 

A former aide to former Rep. Mark Foley said Wednesday he notified House Speaker Dennis Hastert's office of concerns about Foley's behavior over three years ago -- two year before previous accounts have suggested top GOP leaders knew of the issue, according to The Associated Press.

 

There was no immediate response to the report from Hastert's office.

 

Kirk Fordham told the AP about his warning after resigning Wednesday amid allegations that he tried to protect Foley from congressional inquiries into his inappropriate contacts with teenage pages.

 

Fordham was the top aide to Rep. Tom Reynolds, R-New York, and once held the same job for Foley. In his resignation statement, Frodham vigorously denied taking any inappropriate action on Foley's behalf.

 

"When I sought to help Congressman Foley and his family when his shocking secrets were being revealed, I did so as a friend of my former boss, not as Congressman Reynolds' chief of staff," Fordham said. "I reached out to the Foley family, as any good friend would, because I was worried about their emotional well-being. At the same time, I want it to be perfectly clear that I never attempted to prevent any inquiries or investigation of Foley's conduct by House officials or any other authorities."

 

Reynolds is the chairman of the National Republican Congressional Committee, which is working to keep the GOP in control of the House in November's elections. The scandal not only has rocked the Republican leadership but it has become an issue in Reynolds' upstate New York district just weeks before the vote.

 

"It is clear the Democrats are intent on making me a political issue in my boss's race, and I will not let them do so," Fordham wrote in his resignation.

 

Reynolds would not say Wednesday whether he asked Fordham to quit. However, Reynolds said he thought it was "inappropriate" for his chief of staff to negotiate with a news outlet over its coverage. And he said Fordham believed he was becoming a "distraction."

 

Foley, a six-term Florida Republican, resigned Friday after his e-mails to a teenage boy who had served as a congressional page became public -- and as ABC News was about to air more explicit records of instant messages the congressman exchanged with other pages.

 

ABC reported that Fordham offered the network an exclusive on Foley's resignation if it agreed not to air transcripts of the most explicit messages. Wednesday, citing unnamed GOP sources, it said Fordham had interceded with Republican leaders to keep concerns raised by the family of a Louisiana teen from the full three-member board that oversees the page program.

 

The network also reported that Fordham's associates consider him a scapegoat for Hastert, R-Illinois, who has been sharply criticized for his handling of the issue. But Ron Bonjean, a spokesman for the speaker, said Hastert had no advance knowledge of Fordham's resignation, nor did he demand it.

Conservatives rally behind Hastert

 

The resignation comes as key conservative House members voiced support for Hastert but questioned how he handled the Foley matter.

 

The call for Hastert's resignation came Tuesday in an editorial on The Washington Times Web site. The editorial charged that "either [Foley] was grossly negligent ... or he deliberately looked the other way." (Full story)

 

A spokesman for Hastert said the speaker would not step down.

 

And in a statement released Wednesday, Rep. Mike Pence, R-Indiana, and Joe Pitts, R-Pennsylvania, said "regardless of our reservations about how this matter was handled administratively, we believe Speaker Hastert is a man of integrity who has led our conference honorably and effectively throughout the past eight years. Speaker Dennis Hastert should not resign.

 

Rep. Pence is chairman of the influential Republican Study Committee, and Pitts is chairman of the conservative Values Action Team.

 

A key Hastert ally, Republican Ray LaHood of Illinois, called the call for Hastert to step down "absolute nonsense." (Watch the GOP defend Speaker Hastert -- 2:54)

 

"The speaker brought us through 9/11. He's helped the president with major legislative initiatives," LaHood told CNN on Wednesday.

 

"He's been a good, strong speaker and has been able to deal with ethical conduct of members of Congress. ... This idea he should resign is absolute nonsense, and it's just a lot of political fodder for people who want to make hay 35 days before the election," LaHood said.

Shadegg shows support

 

Arizona Republican Rep. John Shadegg also rallied to Hastert's side, by circulating a letter that says the calls for Hastert to resign "are unwarranted and fundamentally unfair."

 

The letter, dated Tuesday, said at least two newspapers, including the Miami Herald, knew of an e-mail exchange between Foley and a page "for months" (Read letter) and didn't view the contacts as significant.

 

"And, after conducting their own inquiries, they decided not to publish the story or pursue the matter further," the letter continued.

 

"To demand (Hastert's) resignation based on the current facts and before the investigation that he has called for is completed, is unwarranted and wrong," the letter said.

 

But another member of the Republican leadership, Rep. Roy Blunt of Missouri, said Tuesday said he would have handled the Foley situation differently, the AP reports.

 

"I think I could have given some good advice here, which is you have to be curious. You have to ask all the questions you can think of," Blunt said, according to the AP. "You absolutely can't decide not to look into activities because one individual's parents don't want you to."

http://www.cnn.com/2006/POLITICS/10/04/has...oley/index.html

------------------------------------------------------------------------------------------------

 

 

 

 

 

 

 

 

 

 

 

 

 

Popular Science Blog

http://popsci.typepad.com/

 

 

 

 

Dow: Record high for 2nd day

Wall Street has a party as more investors jump on record-setting bandwagon; oil higher; gold tumbles.

http://money.cnn.com/2006/10/04/markets/ma...dex.htm?cnn=yes

 

 

 

India's Buddhist heritage a draw

http://www.cnn.com/2006/TRAVEL/10/03/india...m.ap/index.html

 

 

 

Court allows NSA surveillance program during appeal

http://www.cnn.com/2006/POLITICS/10/04/dom...g.ap/index.html

 

 

 

 

Overseas Indians turn to Web for festival prayers

http://www.cnn.com/2006/TECH/internet/10/0...reut/index.html

 

 

 

 

 

Google launches literacy project

http://www.cnn.com/2006/TECH/internet/10/0...reut/index.html

 

 

 

 

 

War plans: Congress OKs $20 mil for victory parties

http://www.cnn.com/2006/POLITICS/10/04/con...q.ap/index.html

 

 

 

 

 

Turkey: Pope safe despite hijack

http://www.cnn.com/2006/WORLD/europe/10/04...e.ap/index.html

 

 

 

 

 

Oil workers freed in Nigeria

http://www.cnn.com/2006/WORLD/africa/10/04...reut/index.html

 

 

 

 

 

 

Frenchman reburied in Congo capital he founded

http://www.cnn.com/2006/WORLD/africa/10/03...reut/index.html

 

 

 

 

 

Nations confront N. Korea over nuke test

 

North Korea's neighbors scrambled Wednesday to forge a common front against Pyongyang's threatened nuclear test, with South Korea warning of a regional atomic arms race that could upend the regional balance of power.

 

The cooperative efforts displayed by Japan, China and South Korea marked a sharp contrast with the fractured reaction to a series of North Korean missile tests in July. In that incident, China and South Korea accused Japan of overreacting.

 

On Wednesday, China — the North's main ally and key benefactor — appealed to Pyongyang to show calm and restraint, issuing an unusually pointed statement that referred to North Korea by name, instead of its usual appeals for all sides to remain calm.

 

Japan, China and South Korea announced a series of summit meetings over the next week to repair damaged ties and coordinate a strategy. Japanese Prime Minister Shinzo Abe will meet with Chinese President Hu Jintao on Sunday and South Korean President Roh Moo-hyun on Monday. Roh will then visit Beijing for talks with Hu and other officials on Oct. 13.

 

The three countries are key players — along with the United States and Russia — in the long-stalled six-nation talks aimed at persuading the impoverished communist regime to give up its nuclear ambitions in return for badly needed economic aid.

 

Japan also took its case to the United Nations, pressing a divided Security Council to adopt a statement urging the North to cancel the test and return immediately to talks. Japan's draft text warned that a test would "jeopardize peace, stability and security in the region and beyond." U.S. Ambassador John Bolton told reporters that members were divided on how to respond to the North.

 

The joint effort came a day after North Korea triggered global alarm by saying it will undertake an unprecedented nuclear test in a step toward building the atomic arsenal it views as a deterrent against any U.S. attack.

 

It was the first time the North has publicly announced plans to conduct a nuclear test, though recent reports have said it may be preparing one. North Korea claims to have nuclear weapons, but detonating one would be the first proof of its atomic capabilities.

 

Russia's defense minister voiced concern about the environmental consequences in neighboring Russian territory. "The nuclear tests in North Korea, if they take place, could cause ecological damage in Russia," Sergei Ivanov said on a visit to a Russian air base in Kyrgyzstan.

 

The United States said it has warned the communist nation not to stage a nuclear test.

 

"We are not going to live with a nuclear North Korea," Assistant Secretary of State Christopher Hill said Wednesday.

 

Hill, the chief envoy to disarmament talks, said the United States has passed a message of "deep concern" through diplomatic channels at the United Nations but has yet to hear back from North Korea.

 

A U.S. intelligence official, speaking on condition of anonymity, said the United States is now seeing the movement of people, materials, automobiles and other activity around one possible test site, but it could be similar to the activity that was seen a couple months ago. At that time, no test occurred.

 

The official noted that international observers don't have a baseline for comparison, because North Korea has never performed a nuclear test.

 

South Korea's top official on dealings with the North, Unification Minister Lee Jong-seok, said Wednesday there were no signs of an imminent test. And Japan's Asahi newspaper reported that two Japanese spy satellites focusing on a suspected underground test site had not observed any activities apparently connected to test preparations as of Tuesday.

 

While North Korean leader Kim Jong Il may decide to hold the test, it cannot be ruled out that the announcement is saber-rattling, an effort to force a change in the stalled diplomatic negotiations or some other motivating factor.

 

Lee, however, warned there was "a high possibility" North Korea would go ahead with a test if "efforts to resume the six-party talks fail."

 

North Korea has boycotted six-nation nuclear talks for nearly a year, angered by American financial restrictions imposed over the North's alleged illegal activities such as money laundering and counterfeiting.

 

Any display of Pyongyang's nuclear force could prompt Japan to go nuclear and trigger a regional arms race, South Korean Vice Foreign Minister Yu Myung-hwan warned. Speaking to lawmakers, Yu said such a North Korean nuclear test "could provide a pretext for Japan's nuclear armament."

 

"This will prompt countermoves by China or Russia and lead to a change in the balance of power in Northeast Asia," Yu said.

 

In a worst-case scenario, analysts have speculated, a test could push Japan to seek its own nuclear deterrent, intensifying historical tensions with China and South Korea, both of which suffered under Japanese colonial rule in the early 20th century.

 

Just last month, a think tank run by former Japanese Prime Minister Yasuhiro Nakasone proposed in a policy paper that Tokyo "consider the nuclear option."

 

The South Korean president called Wednesday for a "cool-headed and stern" response to the North's announcement, while Foreign Ministry spokesman Choo Kyu-ho said a test could cause Seoul to change its engagement policy toward the communist regime.

 

But a test could strain the alliance between South Korea and the United States, which has adopted a harder-line toward Pyongyang.

 

South Korea has consistently pursued dialogue with North Korea since their leaders first met in a historic summit in 2000. Seoul is also a main aid provider. On Wednesday it was shipping previously promised flood relief aid, including 6,400 tons of cement, despite the nuclear test threat.

 

"As North Korea has yet to conduct a nuclear test, it is difficult to immediately halt sending flood relief aid, which is being provided on a humanitarian basis," a ministry official said on condition of anonymity, citing official policy.

 

Other issues could also splinter a common front against North Korea.

 

Japan, the top U.S. ally in East Asia, has been the most hard-line against Pyongyang, especially since North Korea fired a test missile over its territory in 1998.

 

China, meanwhile, sees Pyongyang as a counterbalance to U.S. influence in its own backyard.

 

"North Korea's next step may be to do nothing at all, other than to sit back and watch the rest of the world argue about what to do next," Ralph Cossa, president of the Honolulu-based Pacific Forum, wrote in a report on the latest threat.

 

Some experts believe the North has enough fissile material to build at least a half-dozen nuclear bombs, though there are doubts about whether it could deliver them accurately on a warhead.

http://news.yahoo.com/s/ap/20061004/ap_on_.../koreas_nuclear

-----------------------------------------------------------------------------------------------

 

 

 

 

 

 

 

Aide says he reported Foley 3 years ago

 

Speaker Dennis Hastert's political support showed signs of cracking on Wednesday as Republicans fled an election-year scandal spawned by steamy computer messages from disgraced Rep. Mark Foley to teenage male pages.

 

 

At the same time, a congressional aide said in an Associated Press interview he first warned Hastert's aides more than three years ago that Foley's behavior toward pages was worrisome. That was long before GOP leaders acknowledged hearing of it.

 

The aide, Kirk Fordham, said he had "more than one conversation with senior staff at the highest level of the House of Representatives asking them to intervene" at the time.

 

The claim drew a swift, unequivocal denial from Hastert's chief of staff. "What Kirk Fordham said did not happen," Scott Palmer said through a spokesman.

 

Half a continent away, Rep. Roy Blunt of Missouri, third-ranking leader, pointedly told reporters he would have handled the matter differently than Hastert, had he known of it.

 

"I think I could have given some good advice here, which is, You have to be curious, you have to ask all the questions you can think of," said Blunt, who was acting majority leader at the time Hastert was told of overly friendly e-mails from Foley to one page. "You absolutely can't decide not to look into activities because one individual's parents don't want you to."

 

Rep. Ron Lewis of Kentucky, in a tougher-than-expected re-election race, abruptly canceled an invitation for Hastert to join him at a fundraiser next week.

 

"I'm taking the speaker's words at face value," Lewis told the AP. "I have no reason to doubt him. But until this is cleared up, I want to know the facts. If anyone in our leadership has done anything wrong, then I will be the first in line to condemn it."

 

Ron Bonjean, Hastert's spokesman, said the entire issue had been referred to the House ethics committee. "We fully expect that the bipartisan panel will do what it needs to do to investigate this mater and protect the integrity of the House," he added.

 

House Democratic leader Nancy Pelosi went one step further, issuing a statement saying that Hastert and the rest of the GOP leadership should be "immediately questioned under oath...."

 

"The children, their parents, the public, and our colleagues deserve answers and those who covered up Mark Foley's behavior must be held accountable," she said.

 

Foley, 52, a Florida Republican, resigned last Friday after he was confronted with sexually explicit electronic messages he had sent teenage male pages. He has since entered an alcohol rehabilitation facility at an undisclosed location. Through his lawyer, he has said he is gay but denied having had any sexual contact with minors.

 

His abrupt departure left behind a sex scandal that has shaken Republican confidence — and poll numbers — little more than a month before elections at which their control of the House will be tested.

 

It also plunged Hastert and others into an intensive effort to grapple with conflicting claims about what senior lawmakers knew, when they learned and what they did about it.

 

State and federal investigators swung into action.

 

The Justice Department ordered House officials to "preserve all records" related to Foley's electronic correspondence with teenagers, and one law enforcement official said

FBI agents have begun interviewing participants in the House page program. It was not clear whether those questioned were current or former pages, or both.

 

The request for record preservation is often followed by search warrants and subpoenas, and signal that investigators are moving closer to a criminal investigation.

 

The request was aimed at averting a conflict with the House similar to a standoff in May when FBI agents raided Louisiana Rep. William Jefferson's office seeking information in a bribery investigation.

 

Separately, the Florida Department of Law Enforcement has begun a preliminary inquiry.

 

Hastert was at home in Illinois during the day as he struggled with the first major cracks in his political support from fellow Republicans.

 

His office heatedly denied any suggestion that he intended to resign as speaker.

 

"When Republicans keep the majority this November, the speaker will run again and serve his full term should his colleagues choose to elect him," Bonjean said.

 

But the comments by Fordham, who resigned during the day, coupled with the remarks by Blunt and Lewis' action, suggested Hastert's plans might face a challenge. The speaker is elected by the full House, but he essentially serves at the please of the members of the rank and file of the majority party.

 

In this case, that's the Republicans, who already had been struggling to retain their majority in adverse political circumstances and now must contend with the questions about Hastert's actions.

 

Even a Republican from Hastert's home state of Illinois expressed reservations about asking the speaker for campaign help.

 

"We still take the position that we want all the facts," said Ryan McLaughlin, a sopkesman for state Sen. Peter Roskam, who is running for an open seat now in Republican hands.

http://news.yahoo.com/s/ap/20061004/ap_on_.../congress_pages

---------------------------------------------------------------------------------------

 

 

 

 

 

Court temporarily OKs domestic spying

 

The Bush administration can continue its warrantless surveillance program while it appeals a judge's ruling that the program is unconstitutional, a federal appeals court ruled Wednesday.

 

 

The president has said the program is needed in the war on terrorism; opponents argue it oversteps constitutional boundaries on free speech, privacy and executive powers.

 

The unanimous ruling from a three-judge panel of the 6th U.S. Circuit Court of Appeals gave little explanation for the decision. In the three-paragraph ruling, judges said that they balanced the likelihood an appeal would succeed, the potential damage to both sides and the public interest.

 

The Bush administration applauded the decision.

 

"We are pleased to see that it will be allowed to continue while the Court of Appeals examines the trial court's decision, with which we strongly disagree," Deputy White House press secretary Dana Perino said in a statement.

 

The program monitors international phone calls and e-mails to or from the United States involving people the government suspects have terrorist links. A secret court has been set up to grant warrants for such surveillance, but the government says it can't always wait for a court to take action.

 

U.S. District Judge Anna Diggs Taylor in Detroit ruled Aug. 17 that the program was unconstitutional because it violates the rights to free speech and privacy and the separation of powers.

 

The Justice Department had urged the appeals court to allow it to keep the program in place while it argues its appeal, claiming that the nation faced "potential irreparable harm" and would be more vulnerable to a terrorist attack. The appeal is likely to take months.

 

"This program is both critical to preventing terrorist attacks and fully consistent with law," said Justice Department spokesman Brian Roehrkasse.

 

The American Civil Liberties Union filed a lawsuit in January seeking to stop the program on behalf of journalists, scholars and lawyers who say it has made it difficult for them to do their jobs because they believe many of their overseas contacts are likely targets. Many said they had been forced to take expensive and time-consuming overseas trips because their contacts wouldn't speak openly on the phone or because they didn't want to violate their contacts' confidentiality.

 

The ACLU contends that the 1978 Foreign Intelligence Surveillance Act, which set up the secret court to grant warrants for such surveillance, gave the government enough tools to monitor suspected terrorists.

 

"We are confident that when the 6th Circuit addresses the merits of this case, it will agree that warrantless wiretapping of Americans violates the law and is unconstitutional," Melissa Goodman, an ACLU attorney, said in a news release.

 

Similar lawsuits challenging the program have been filed by other groups, including in New York and San Francisco. The issue could wind up before the U.S. Supreme Court.

http://news.yahoo.com/s/ap/20061004/ap_on_...domestic_spying

--------------------------------------------------------------------------------------

 

 

 

 

 

Eavesdropping can continue pending appeal: court

 

CINCINNATI (Reuters) - The U.S. government can continue to eavesdrop on Americans' overseas phone calls and e-mails until its appeal of a judge's ruling outlawing the surveillance is decided, the U.S. Court of Appeals ruled on Wednesday.

 

 

The Sixth Circuit Court of Appeals granted the government's request for a stay of U.S. District Judge Anna Diggs Taylor's ruling that would have halted at once the warrantless surveillance, which the government says it needs to ferret out terrorists.

 

"This program is both critical to preventing terrorist attacks and fully consistent with law. We are pleased to see that it will be allowed to continue while the Court of Appeals examines the trial court's decision, with which we strongly disagree," White House spokeswoman Dana Perino said.

 

In a three-paragraph ruling, the court said Diggs' ruling outlawing the program would be stayed based on factors including the chances of the government winning on appeal and the public interest.

 

The ACLU filed the suit in March on behalf of scholars, attorneys and journalists who regularly communicate with people in the Middle East.

 

"A stay in this type of case is not uncommon. We're focused on the appeal of the case itself," said Paul Silva of the American Civil Liberties Union.

 

The expedited appeal calls for the government to submit its arguments to the appeals court by October 13, with a response due a month later, and a ruling likely before the end of the year, Silva said.

 

The losing side is almost certain to appeal to the

U.S. Supreme Court, which is likely to take up the case.

 

CIVIL RIGHTS QUESTION

 

In August, Judge Taylor ruled that the National Security Agency's 5-year-old surveillance program, implemented as part of the government's war on terrorism, violates the civil rights of Americans because the government does not have to present justification for its monitoring in court and obtain a warrant.

 

Last week Taylor gave the government a week before it would have to shut down the program. Wednesday's ruling by the 6th Circuit Court of Appeals granted the lengthier stay.

 

The Bush administration has insisted its "Terrorist Surveillance Program" was necessary to protect the public, while civil rights activists and some lawmakers -- including some Republicans -- said

President George W. Bush had overstepped his powers by authorizing the wiretaps without warrants.

 

In requesting the stay, the government had argued: "Because we cannot control how or when the enemy will seek to communicate or strike, even a temporary interruption could result in grave harm to the American public."

 

Bush authorized the NSA surveillance program after the September 11 attacks on the United States, although the public only learned of its existence last year.

 

The program allows the government to eavesdrop on the international phone calls and e-mails of U.S. citizens without obtaining a warrant, if those wiretaps are made to track suspected terrorist operatives.

 

Some in Congress proposed legalizing the program by revising the 1978 law governing domestic intelligence activities, but legislation failed to materialize. The law established a special court to consider, in secret, warrants for wiretaps, but the court was bypassed by the NSA program.

http://news.yahoo.com/s/nm/20061004/pl_nm/...avesdropping_dc

---------------------------------------------------------------------------------------

 

 

 

 

 

 

 

 

Significant Aztec ruin unearthed in busy Mexico City

 

MEXICO CITY, Mexico (Reuters) -- Mexican archeologists have found what may be the most significant Aztec ruin in decades, with the unearthing of an altar and a monolith in the busy heart of Mexico City, Mayor Alejandro Encinas said on Wednesday.

 

The 15th-century altar, part of the Aztec empire's main temple, was uncovered last weekend near the city's main Zocalo square along with the 11-foot (3.5-meter) stone slab, most of which is still buried under earth.

 

"It is a very important discovery, the biggest we have made in 28 years. It will allow us to find out a lot more," Encinas told reporters.

Temple building started in 1375

 

The altar has a frieze of the rain god Tlaloc and another figure related to an agricultural rite. Archeologists are still unearthing the monolith which they think might be part of an entrance to an underground chamber.

 

The Aztecs began building the Templo Mayor pyramid-shaped temple in 1375. Its ruins are now only yards from downtown's choking traffic. It was first excavated in 1978 after electricity workers found an eight-ton carving of an Aztec goddess.

 

Spanish conquistadors destroyed the temple when they razed the city in 1521 and used its stones to help build their own capital.

http://www.cnn.com/2006/WORLD/americas/10/...reut/index.html

----------------------------------------------------------------------------------------------

 

 

 

 

 

 

 

 

Mysterious blog scooped media on Foley messages

 

Capitol Hill controversies are nothing new, but as details emerge about former Rep. Mark Foley's e-mails and instant messages with underage congressional pages it's clear that the Internet is reinventing the Washington scandal.

 

Not since the revelations in independent counsel Kenneth Starr's report on the President Clinton-Monica Lewinsky affair have the intimate and graphic details of a Beltway scandal been at American fingertips. Most of Foley's discussions are too lurid for television, but viewers are able to go online and read the transcripts.

 

One can imagine that if not for the Internet, Mark Foley might still be representing Florida's 16th Congressional District; Foley's digital trail proved to be his downfall. However, aside from the instant messages and e-mails themselves, the Web is shaping this story in manifold ways.

 

One of the more curious angles to emerge from the scandal surrounding Foley is the creation of a little-known Web site called Stop Sex Predators. It was at that site on September 24, four days before ABC News reported Foley's e-mails with a 16-year-old page, that the Florida congressman's correspondence first appeared.

 

Because the site was virtually unknown at the time, bloggers were skeptical of the e-mails' authenticity. Nothing is known about the site beyond the small number of postings on it.

 

The site appeared in July, declaring that it was "dedicated to exposing sex predators before they can get to our kids."

 

Over the next two months the blog featured a few intermittent postings on notable public sex scandals.

 

Then on September 21, Stop Sex Predators says, it received e-mails from readers suggesting Foley was a "danger to any young, slightly attractive young man on The Hill."

 

Three days later, the e-mails from Foley to the 16-year-old page -- one of which requested a photo -- were posted on the site.

Who's behind the site?

 

So how did a relatively new blog that saw little to no Web traffic before last week suddenly receive those e-mails? Bloggers are wondering the same thing, suggesting that that the site was created by somebody in possession of the e-mails who wanted to shop them around.

 

However, the identity of the site's owner remains a mystery. Though the site posted the e-mails before the ABC News report, the site does not appear to be that news organization's original source.

 

ABC's Brian Ross told the Wall Street Journal that he "wasn't familiar" with the Web site before his online report Thursday about the e-mails. (According to Ross, it was only after his report was posted that he received transcripts of the more lurid instant message exchanges between Foley and pages.)

 

After Foley's e-mails were reported, others disclosed knowledge of them. Several news organizations, including the St. Petersburg Times and the Miami Herald, had been made aware of the initial e-mails but chose not publish them.

 

Tom Fiedler, executive editor of the Herald, told CNN that the paper had been tipped to the e-mails but did not run a story because their language, while "inappropriate," was also "ambiguous in what it actually meant or what a message might be."

 

The liberal watchdog group Citizens for Responsibility and Ethics in Washington also obtained the e-mails in July. It forwarded them directly to the FBI for investigation.

 

The owner of Stop Sex Predators responded to CNN inquires from an anonymous e-mail address posted on the Web site.

 

"My plans are to remain anonymous for the foreseeable future," the Web site's owner wrote in an e-mail. "I've been getting threats from folks and will no longer allow the posting of comments on the website. I can't believe the anger out there for exposing a hypocritical sex predator."

 

Other correspondence between Foley and pages came to light soon after ABC reported the e-mails. The instant messages contained explicit language, as opposed to the initially vague nature of the e-mails. Foley immediately resigned from Congress.

 

Foley apparently used the handle "Maf54" in his chat sessions, letters corresponding to his own initials. While a number of instant message transcripts between Foley and congressional pages going back to 2003 have surfaced, none of those pages have come forward.

 

Foley's attorney, David Roth, said Tuesday: "There was absolutely never any inappropriate sexual contact with any minor. [Foley] has acknowledged full responsibility for inappropriate e-mails and IMs."

 

Former pages look back

 

Because sites like http://www.MySpace.com and Facebook.com are popular with teenagers and college students, former congressional pages are going online to discuss the scandal and their memories of Foley.

 

On http://www.Facebook.com , used mainly by college students, a few students recalled feeling uncomfortable around Foley. Others said they were not surprised by the scandal. One former Foley page used his Facebook.com profile to say that he was "referring all media inquiries to the Clerk of the House."

 

Other online forums used by former pages were taken offline or made private to restrict access to them.

 

A Web forum run by the House Page Alumni Association was taken offline soon after the scandal broke. However, CNN identified archived versions of those Web pages in which Foley was discussed.

 

On the alumni site, one page in August 2004 wrote that Foley had "taken the time to find out who I was and then he actually remembered who I was a few months later!"

 

Another user of the message board posted in April 2005 that he had applied to be a page in Foley's office. In response, a former page simply wrote "eeeeeeeeeeeeeeeeeeee Foley."

 

However, the majority of former pages online are expressing dismay at the scandal and worry that it will tarnish the page program.

 

In the face of calls for more oversight of the program, a user group has been created on Facebook.com asking page alumni to e-mail their sponsor "and any other people you know up on the hill! ... Make it known that we should rid Congress of child predators, not the pages themselves!"

http://www.cnn.com/2006/POLITICS/10/04/fol...rnet/index.html

--------------------------------------------------------------------------------

 

 

 

 

 

 

 

 

Aide: I warned Hastert's office about Foley

 

House Speaker Dennis Hastert's office was notified of concerns about then-Rep. Mark Foley before 2005, casting doubt on top GOP leaders' statements that they heard nothing of Foley's inappropriate behavior before then, a former aide to Foley said Wednesday.

 

Hastert's office has denied the claim.

 

Kirk Fordham made his remarks after resigning Wednesday amid allegations that he tried to protect Foley from congressional inquiries into his inappropriate contact with congressional pages.

 

Fordham elaborated in an interview with ABC News and said he told Hastert's chief of staff, Scott Palmer, that Foley was too friendly with the pages, and that Palmer talked to Foley.

 

Hastert's spokesman Ron Bonjean told ABC News, "That [warning] never happened."

 

Added Palmer, "What Kirk Fordham said did not happen."

 

In a statement to CNN, Bonjean said only that "this matter has been referred to the Standards Committee and we fully expect that the bipartisan panel will do what it needs to do to investigate this matter and protect the integrity of the House."

 

A GOP leadership aide, however, questioned why Fordham told AP on Wednesday morning that he "had no inkling that this kind of blatantly reckless -- just obscene -- behavior was going on behind our backs," but later said he had warned Hastert about it.

 

"It's contradictory from what he said just this morning. He's changed his story," the aide said.

 

Fordham was the top aide to Rep. Tom Reynolds, R-New York, and once held the same job for Foley. In his resignation statement, Fordham vigorously denied taking any inappropriate action on Foley's behalf.

 

"When I sought to help Congressman Foley and his family when his shocking secrets were being revealed, I did so as a friend of my former boss, not as Congressman Reynolds' chief of staff," Fordham said. "I reached out to the Foley family, as any good friend would, because I was worried about their emotional well-being. At the same time, I want it to be perfectly clear that I never attempted to prevent any inquiries or investigation of Foley's conduct by House officials or any other authorities."

 

Reynolds is the chairman of the National Republican Congressional Committee, which is working to keep the GOP in control of the House in November's elections. The scandal has not only rocked the Republican leadership but it has become an issue in Reynolds' upstate New York district just weeks before the vote.

 

"It is clear the Democrats are intent on making me a political issue in my boss's race, and I will not let them do so," Fordham wrote in his resignation letter.

 

Reynolds would not say Wednesday whether he asked Fordham to quit. However, Reynolds said he thought it was "inappropriate" for his chief of staff to negotiate with a news outlet over its coverage. And he said Fordham believed he was becoming a "distraction."

 

Foley, a six-term Florida Republican, resigned Friday after his e-mails to a teenage boy who had served as a congressional page became public -- and as ABC News was about to air more explicit records of instant messages the congressman exchanged with other pages.

 

ABC reported that Fordham offered the network an exclusive on Foley's resignation if it agreed not to air transcripts of the most explicit messages. Wednesday, citing unnamed GOP sources, it said Fordham had interceded with Republican leaders to keep concerns raised by the family of a Louisiana teen from the full three-member board that oversees the page program.

 

The network also reported that Fordham's associates consider him a scapegoat for Hastert, R-Illinois, who has been sharply criticized for his handling of the issue. But Bonjean, a spokesman for the speaker, said Hastert had no advance knowledge of Fordham's resignation, nor did he demand it.

 

Conservatives rally behind Hastert

 

The resignation comes as key conservative House members voiced support for Hastert but questioned how he handled the Foley matter.

 

The call for Hastert's resignation came Tuesday in an editorial on The Washington Times Web site. The editorial charged that "either [Foley] was grossly negligent ... or he deliberately looked the other way."

 

A spokesman for Hastert said the speaker would not step down.

 

And in a statement released Wednesday, Rep. Mike Pence, R-Indiana, and Joe Pitts, R-Pennsylvania, said "regardless of our reservations about how this matter was handled administratively, we believe Speaker Hastert is a man of integrity who has led our conference honorably and effectively throughout the past eight years. Speaker Dennis Hastert should not resign. "

 

Pence is chairman of the influential Republican Study Committee, and Pitts is chairman of the conservative Values Action Team.

 

A key Hastert ally, Republican Ray LaHood of Illinois, said the call for Hastert to step down was "absolute nonsense."

 

"The speaker brought us through 9/11. He's helped the president with major legislative initiatives," LaHood said Wednesday.

 

"He's been a good, strong speaker and has been able to deal with ethical conduct of members of Congress," LaHood said. "This idea he should resign is absolute nonsense, and it's just a lot of political fodder for people who want to make hay 35 days before the election."

 

However, not all Republicans are in Hastert's corner. Rep. Ron Lewis, of Kentucky, "disinvited" the speaker Tuesday from joining him on a campaign stop, Lewis' spokesman Michael Dodge said.

 

"It was not done as a gesture to condemn the speaker," Dodge said. "There's an investigation that's begun with the FBI, the House ethics committee is going to convene as early as tomorrow and in light of there being some questions in leadership about who knew what and when [Lewis thought] it would be inappropriate."

 

Dodge also said that the Foley matter "came up at just about every stop" Wednesday on the campaign trail.

 

Shadegg shows support

 

Arizona Republican Rep. John Shadegg, however, rallied to Hastert's side Tuesday, circulating a letter that says the calls for Hastert to resign "are unwarranted and fundamentally unfair."

 

The letter, dated Tuesday, said at least two newspapers, including the Miami Herald, knew of an e-mail exchange between Foley and a page "for months" (Read letter) and didn't view the contacts as significant.

 

"And, after conducting their own inquiries, they decided not to publish the story or pursue the matter further," the letter continued.

 

"To demand (Hastert's) resignation based on the current facts and before the investigation that he has called for is completed, is unwarranted and wrong," the letter said.

 

But another member of the House leadership, Majority Whip Roy Blunt of Missouri, said Tuesday said he would have handled the Foley situation differently, the AP reported.

 

"I think I could have given some good advice here, which is you have to be curious. You have to ask all the questions you can think of," Blunt said, according to the AP. "You absolutely can't decide not to look into activities because one individual's parents don't want you to."

http://www.cnn.com/2006/POLITICS/10/04/has...oley/index.html

------------------------------------------------------------------------------

 

 

 

 

 

 

 

Police standoff in Texas

 

FOREST HILL, Texas (AP) -- Authorities were trying to negotiate Wednesday evening with a man suspected of shooting and wounding at least three people in an apparent domestic dispute, then holing himself up in a home, possibly with a child hostage, officials and residents said.

 

Broadcast footage showed police escorting several children out the back of a home in this Fort Worth suburb and across open fields. Several adults were taken to ambulances by the same route.

 

Tanya Gilstrap was in stable condition at John Peter Smith Hospital in Fort Worth, a spokesman said. The extent of her injuries wasn't immediately available, nor were the conditions of the other two victims.

 

Police were evacuating homes in the neighborhood, said Terry Grisham, a spokesman for the Tarrant County Sheriff's Office.

 

Brenda Jackson told The Dallas Morning News that the situation started with an argument between her sister and her sister's estranged boyfriend.

 

"He and my sister were in an argument, and he tied her to the bed," said Jackson, who lives next door. "I confronted him, and he said, 'If y'all call police, it's gonna be a war."'

 

Then, Jackson said, "he was standing next door to my yard, and everybody who was outside was shot."

 

Authorities were trying to communicate with the man and determine whether he was holding a child hostage.

 

"We'd like to know if the child is OK," Grisham said. "If the child is OK we'll take it as slow as we have to so long as we have no evidence that anyone inside is hurt."

http://www.cnn.com/2006/US/10/04/texas.sho...g.ap/index.html

--------------------------------------------------------------------------------

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

------------------------------------------

Link to comment
Share on other sites

I got more news for y'all soon......................................................

 

Slain Amish girls laid to rest

http://www.cnn.com/2006/US/10/05/amish.shooting/index.html

 

Building eBay 2.0

Clobbered by Wall Street. Fierce competition from Google. Meg Whitman's had a rough couple years. Fortune's Adam Lashinsky finds out how she's trying to turn eBay from ultra-hot to built-to-last.

http://money.cnn.com/magazines/fortune/for...dex.htm?cnn=yes

 

 

 

 

 

Are Argentina's Death Squads Making a Comeback?

The 'disappearance' of a witness who helped convict a former police torturer raises fears that the nightmare isn't over

 

If Argentines are haunted by the horrors of the past, that may be because the dark forces responsible for the "disappearance" of thousands of people at the hands of their country's last military dictatorship appear to be very much alive — and as willing as ever to resort to violence against their foes. Two weeks ago, a key witness whose testimony had recently helped put a major human-rights offender in prison for life disappeared in a manner reminiscent of the methods employed by Argentina's military 30 years ago.

 

Jorge Julio Lopez, 77, a former torture victim and retired construction worker, was reported missing from his home on the last day of a trial in which he'd testified against his torturer, former police commissioner Miguel Etchecolatz, who ran clandestine detention centers during the dictatorship. His apparent abduction has sent a chill down the spines of many Argentines, unsettled by memories of the state of terror imposed by the military in the 1970s. Lopez's disappearance "has touched a sensitive nerve in society," said an editorial in Clarin, Argentina's largest-selling newspaper. "It revives fears of one of the darkest episodes in Argentine history."

 

And for Lopez's fellow sufferers, there was no doubt about the identity of his abductors: "This is the work of right-wing fascists in conjunction with members of the security forces sympathetic to their cause," says Adriana Calvo, a survivor of the dictatorship's detention centers and also a witness in the Etchecolatz case.

 

The recent uptick in prosecution and conviction of the former officers responsible for widespread human rights abuses during the 1976-83 military dictatorship has been accompanied by increasing incidents of intimidation of witnesses and judicial officials. "There has never been such a wave of threats before," adds Tati Almeida, whose own son was never seen again after being abducted by military forces three decades ago.

 

Almeida, a soft-spoken woman who still marches every Thursday afternoon in front of the Presidential Palace with other members of the Mothers of Plaza de Mayo, a human rights group demanding justice for the "disappeared," believes Lopez's disappearance was designed to dissuade others from testifying against the torturers. "Those who abducted Lopez know that the conviction of Etchecolatz is just the preview of more trials," she says. "They feel the noose tightening around their necks and are scared."

 

The Lopez disappearance is also an open challenge to President Nestor Kirchner's policy of restarting long-stalled human rights prosecutions. "We're looking for him everywhere, almost with desperation," Kirchner said. "We hope to God things are not how we imagine, but the past has not been defeated and we must be on the alert." Following the apparent abduction, the government retired 36 police officers who had served during the dictatorship, although human rights groups claim other veterans of that abusive era remain in active service.

 

The defiance shown by Etchecolatz upon his conviction lends further credence to the suggestion that the disappearance of the witness was directly tied to the case. "I am not condemned, you have condemned yourselves," Etchecolatz told the court when he was sentenced. "It was a clear threat, coming as it did the day after Lopez disappeared," says Calvo.

 

Federal Judge Carlos Rozanski, who sentenced Etchecolatz, has himself received death threats, along with 17 other court officials. "Yes, I'm worried," said the judge. "But I'm still working, it's part of being a judge in a case like this."

 

One letter threatened court officials that they will receive "real justice" if they continue handing out sentences. Calvo, who is a member of the Association of Former Detainees, which had helped bring Etchecolatz to justice, says her association receives constant threats. "When we get home from our meetings, we'll often find on our answering machines a recording of what we discussed there," says Calvo. "They tap our cell phones, using them as microphones to record our conversations."

 

Despite the threats, the Etchecolatz conviction has offered new hope to relatives of the missing who had seen justice postponed over the two decades since the fall of the dictatorship. A handful of generals were incarcerated following the return to democracy in 1983, but judicial proceedings were blocked by amnesty laws that had been passed by Congress under the threat of a military uprising by disgruntled officers in 1986. By 1990, the few officers imprisoned before those amnesties took effect were freed by then President Carlos Menem, despìte massive protest marches across Argentina. The amnesty laws that had protected human-rights abusers were finally overturned by the Supreme Court last year, paving the way for the current trials and the prospect of hundreds of former military and police officers being convicted for doing away with thousands of Argentines. Many Argentines now believe that some of those who committed crimes while serving the state, having lost the protection of the law, have resorted to their old ways to evade justice.

http://www.time.com/time/world/article/0,8...00.html?cnn=yes

-------------------------------------------------------------------------------------------------

 

 

 

 

 

 

 

 

Wal-Mart rolls out drug program four months early

Discounter will begin its $4 generic prescription program statewide in Florida by Oct. 6, four months ahead of schedule.

http://money.cnn.com/2006/10/05/news/compa...dex.htm?cnn=yes

 

 

First the high, then the hangover

Major stock gauges wobbly Thursday after the Dow industrials ended Wednesday's session at record mark; oil prices surge.

http://money.cnn.com/2006/10/05/markets/ma...dex.htm?cnn=yes

 

Best B&Bs for leaf-peeping

It's New England's most beautiful season and Fortune shows you how best to enjoy it.

http://money.cnn.com/2006/10/04/lifestyle/...dex.htm?cnn=yes

 

Private railroad cars roll back in time

http://www.cnn.com/2006/TRAVEL/DESTINATION...s.ap/index.html

 

Harvard committee recommends returning religion to curriculum

http://www.cnn.com/2006/EDUCATION/10/04/ha...m.ap/index.html

 

No excuses or short cuts at Atlanta charter school

http://www.cnn.com/2006/EDUCATION/10/02/kipp.ways/index.html

 

Study: Vaccine promising for hay fever relief

http://www.cnn.com/2006/HEALTH/10/04/hay.f...s.ap/index.html

 

 

 

 

 

Mysterious blog scooped media on Foley messages

 

Capitol Hill controversies are nothing new, but as details emerge about former Rep. Mark Foley's e-mails and instant messages with underage congressional pages it's clear that the Internet is reinventing the Washington scandal.

 

Not since the revelations in independent counsel Kenneth Starr's report on the President Clinton-Monica Lewinsky affair have the intimate and graphic details of a Beltway scandal been at American fingertips. Most of Foley's discussions are too lurid for television, but viewers are able to go online and read the transcripts.

 

One can imagine that if not for the Internet, Mark Foley might still be representing Florida's 16th Congressional District; Foley's digital trail proved to be his downfall. However, aside from the instant messages and e-mails themselves, the Web is shaping this story in manifold ways.

 

One of the more curious angles to emerge from the scandal surrounding Foley is the creation of a little-known Web site called Stop Sex Predators. It was at that site on September 24, four days before ABC News reported Foley's e-mails with a 16-year-old page, that the Florida congressman's correspondence first appeared.

 

Because the site was virtually unknown at the time, bloggers were skeptical of the e-mails' authenticity. Nothing is known about the site beyond the small number of postings on it.

 

The site appeared in July, declaring that it was "dedicated to exposing sex predators before they can get to our kids."

 

Over the next two months the blog featured a few intermittent postings on notable public sex scandals.

 

Then on September 21, Stop Sex Predators says, it received e-mails from readers suggesting Foley was a "danger to any young, slightly attractive young man on The Hill."

 

Three days later, the e-mails from Foley to the 16-year-old page -- one of which requested a photo -- were posted on the site.

 

Who's behind the site?

 

So how did a relatively new blog that saw little to no Web traffic before last week suddenly receive those e-mails? Bloggers are wondering the same thing, suggesting that that the site was created by somebody in possession of the e-mails who wanted to shop them around.

 

However, the identity of the site's owner remains a mystery. Though the site posted the e-mails before the ABC News report, the site does not appear to be that news organization's original source.

 

ABC's Brian Ross told the Wall Street Journal that he "wasn't familiar" with the Web site before his online report Thursday about the e-mails. (According to Ross, it was only after his report was posted that he received transcripts of the more lurid instant message exchanges between Foley and pages.)

 

After Foley's e-mails were reported, others disclosed knowledge of them. Several news organizations, including the St. Petersburg Times and the Miami Herald, had been made aware of the initial e-mails but chose not publish them.

 

Tom Fiedler, executive editor of the Herald, told CNN that the paper had been tipped to the e-mails but did not run a story because their language, while "inappropriate," was also "ambiguous in what it actually meant or what a message might be."

 

The liberal watchdog group Citizens for Responsibility and Ethics in Washington also obtained the e-mails in July. It forwarded them directly to the FBI for investigation.

 

The owner of Stop Sex Predators responded to CNN inquires from an anonymous e-mail address posted on the Web site.

 

"My plans are to remain anonymous for the foreseeable future," the Web site's owner wrote in an e-mail. "I've been getting threats from folks and will no longer allow the posting of comments on the website. I can't believe the anger out there for exposing a hypocritical sex predator."

 

Other correspondence between Foley and pages came to light soon after ABC reported the e-mails. The instant messages contained explicit language, as opposed to the initially vague nature of the e-mails. Foley immediately resigned from Congress.

 

Foley apparently used the handle "Maf54" in his chat sessions, letters corresponding to his own initials. While a number of instant message transcripts between Foley and congressional pages going back to 2003 have surfaced, none of those pages have come forward.

 

Foley's attorney, David Roth, said Tuesday: "There was absolutely never any inappropriate sexual contact with any minor. [Foley] has acknowledged full responsibility for inappropriate e-mails and IMs."

 

Former pages look back

 

Because sites like MySpace.com and Facebook.com are popular with teenagers and college students, former congressional pages are going online to discuss the scandal and their memories of Foley.

 

On Facebook.com, used mainly by college students, a few students recalled feeling uncomfortable around Foley. Others said they were not surprised by the scandal. One former Foley page used his Facebook.com profile to say that he was "referring all media inquiries to the Clerk of the House."

 

Other online forums used by former pages were taken offline or made private to restrict access to them.

 

A Web forum run by the House Page Alumni Association was taken offline soon after the scandal broke. However, CNN identified archived versions of those Web pages in which Foley was discussed.

 

On the alumni site, one page in August 2004 wrote that Foley had "taken the time to find out who I was and then he actually remembered who I was a few months later!"

 

Another user of the message board posted in April 2005 that he had applied to be a page in Foley's office. In response, a former page simply wrote "eeeeeeeeeeeeeeeeeeee Foley."

 

However, the majority of former pages online are expressing dismay at the scandal and worry that it will tarnish the page program.

 

In the face of calls for more oversight of the program, a user group has been created on Facebook.com asking page alumni to e-mail their sponsor "and any other people you know up on the hill! ... Make it known that we should rid Congress of child predators, not the pages themselves!"

http://www.cnn.com/2006/POLITICS/10/04/fol...rnet/index.html

-------------------------------------------------------------------------------------------

 

 

 

 

 

 

 

 

 

 

Lawyer for Neil Entwistle says he will fight request for DNA at hearing Thursday

http://www.courttv.com/news/2006/1005/neil...ap.html?cnn=yes

 

 

 

 

Chipmaker to race video-equipped cars

http://www.cnn.com/2006/TECH/10/05/chip.racers.ap/index.html

 

 

 

Microsoft warns software pirates

http://www.cnn.com/2006/TECH/ptech/10/05/m...reut/index.html

 

 

 

 

 

Stars' septic systems suspect in Pacific pollution

 

The mystery: Just whose waste is befouling the most celebrity-saturated stretch of California coast?

 

The suspects: Malibu residents whose septic tanks might let what gets flushed down the toilet flow down the hills and into the Pacific Ocean.

 

The strategy: DNA testing and a pledge, if need be, to get court warrants to inspect leaky tanks buried beneath the backyards of some Hollywood stars.

 

"This is going to get messy," predicts Mark Pestrella, the Los Angeles County public works official tasked with the project.

 

Loyalty to septic systems runs deep in a city that was incorporated to stop construction of a sewer line. Residents who fiercely deny that their tanks are the source of ocean bacteria also fiercely guard their privacy and their right to flush the estimated 2,400 septic tanks in a city strung along 25 miles of coast.

 

After decades of wrangling, Los Angeles County officials are promising to get tough -- threats of hefty fines by clean water regulators were an important push.

 

During the next few months, investigators will begin testing sea water. If DNA tests show the waste is human and not from, say, raccoons or coyote, they will follow the trail up the creeks that traverse neighborhoods in Malibu, where clean water advocates such as Pierce Brosnan and Ted Danson live.

 

Where the tests show a concentration of human waste, inspectors will sleuth out the source. Though they will not request DNA samples from residents to match waste with its human source, they say they may ask a judge for authority to inspect the tanks of property owners who bar them from taking samples.

 

"It is a big deal that the county is now saying 'We're willing to go on to properties to see what the source of fecal contamination is,"' said Mark Gold, executive director of the local environmental group Heal the Bay.

 

Malibu leaders have argued that the pollution comes from a wastewater treatment plant, storm runoff and bird droppings. The lack of a sewer system limits development and preserves rustic details amid the million-dollar homes. Oak-shaded private paths that wind through the canyons and spill onto the beaches have attracted numerous environmentally minded celebrities over the years including Sting and Tom Hanks.

 

At least one Malibu resident believes septic tanks are not the problem. Actress and animal rights activist Pamela Anderson said that the real polluter is animal agriculture, such as chicken farms.

 

"When the results of these tests come back, I'll bet that once again we'll find that ... people's meat addiction, not their septic tanks, is causing this pollution," Anderson wrote in an e-mail through her publicist. "The best thing any of us can do to fight pollution is to adopt a vegetarian diet."

 

County officials initially will focus on properties with heavier commode traffic, such as restaurants and Barbra Streisand's old estate.

 

In 1993, the singer donated her property to the Santa Monica Mountains Conservancy, a state organization that has held weddings, conferences and public tours at the 22-acre estate. Conservancy spokeswoman Dash Stolarz said the site has a sophisticated septic system and has not hosted a wedding in two years. In June, the site temporarily halted tours.

 

If county officials locate suspect systems, they will inform the Los Angeles Water Quality Board. The board could fine homeowners or require them to upgrade their systems at an estimated cost of $30,000.

 

Board president H. David Nahai said he is optimistic that residents will want to comply with the investigation.

 

"The very cachet of Malibu and the high property values they enjoy are dependent upon a clean ocean," he said.

 

Some of the areas' most famous spots, including legendary Surfrider Beach, have repeatedly received poor grades in Heal the Bay's annual beach report card. Most contamination occurs during winter when heavy rains overload storm drain and sewage systems, washing waste directly into the sea. Swimming in such waters can cause gastrointestinal, respiratory and other illnesses.

 

Pollutants in Santa Monica Bay have been a problem for decades. The water quality drastically declined in the 20th century as the Los Angeles area boomed and dumped sewage and trash into the ocean. In 1985, the director of Los Angeles County's health services declared septic tanks a health hazard after 12 miles of coast were closed for more than two months because of overflows.

 

Water quality has improved through programs mandated by the Clean Water Act and the dogged efforts of various conservation groups. A major boost came in September, when the water board decided to fine Los Angeles County and municipalities surrounding Santa Monica Bay up to $10,000 a day if they do not meet clean water standards.

 

Still, skeptics see the DNA testing program, which will cost an estimated $1 million, as a delay tactic that will let the county blame Malibu.

 

"It's time for us to find real solutions to our bacteria problems," said Tracy Egoscue, who heads the Santa Monica Baykeeper, "and stop chasing ghosts up the watershed."

http://www.cnn.com/2006/US/10/04/malibu.septic.ap/index.html

--------------------------------------------------------------------------

 

 

 

 

 

 

 

 

U.S. warns North Korea against nuclear test

 

The U.S. envoy to stalled North Korea nuclear talks says the United States will not tolerate a nuclear North Korea and has warned Pyongyang not to test a nuclear weapon.

 

"We are not going to live with a nuclear North Korea," Assistant Secretary of State Chris Hill told the U.S.-Korea Institute at Johns Hopkins University Wednesday. "We are not going to accept it."

 

North Korea "can have a future, or it can have these weapons. It cannot have both," Hill said. The U.S. and its allies "are in a very tense time" in dealing with Pyongyang, Hill added.

 

South Korea, meanwhile, warned North Korea's stance could trigger a regional atomic arms race that could upend the balance of power in Northeast Asia.

 

Any display of Pyongyang's nuclear force could prompt Japan to go nuclear and trigger a regional arms race, South Korean Vice Foreign Minister Yu Myung-hwan said Wednesday, according to The Associated Press.

 

Speaking to lawmakers, Yu said such a North Korean nuclear test "could provide a pretext for Japan's nuclear armament."

 

"This will prompt countermoves by China or Russia and lead to a change in the balance of power in Northeast Asia," AP reports Yu saying.

 

Hill said that on Tuesday the United States passed a message "of deep concern" about a possible test to Pyongyang through the North Korean mission to the United Nations, which serves as a contact between the two governments, but did not receive an answer.

 

"We will do all we can to dissuade the DPRK [North Korea] from this test," Hill said.

 

He declined to say exactly what the United States would do if North Korea undertakes such a test, but said, "we would have no choice but to act resolutely to make sure that the DPRK understood -- and to make sure that any other country understands -- that this (nuclear test) is a very bad mistake."

 

If North Korea does conduct a test, it "will realize that they had a bad day when they made that choice," he said.

 

After his appearance, Hill told reporters, "if they think that firing off a weapon will somehow make them a part of some sort of nuclear club, they should think again."

 

"If they think that by exploding a weapon, that somehow we will come to terms with it, we won't," he said.

 

Citing U.S. belligerence and pressure, North Korea said Tuesday that a nuclear test was in the works.

 

North Korea's announcement came in the form of a Foreign Ministry statement published by the Korean Central News Agency, or KCNA -- the communist country's official news agency.

 

"The field of scientific research of the DPRK will in the future conduct a nuclear test under the condition where safety is firmly guaranteed," the statement said.

 

The ministry added, "The U.S. extreme threat of a nuclear war and sanctions and pressure compel the DPRK to conduct a nuclear test ... as a corresponding measure for defense."

 

A date and time for the test was not issued.

 

A flurry of diplomatic activity has taken place since the North Korean announcement. U.S. Secretary of State Condoleezza Rice has reached out to her counterparts in Asia, and U.S. Ambassador to the United Nations John Bolton has been meeting with members of the U.N. Security Council about a possible statement urging North Korea not to take any provocative action by testing a nuclear weapon.

 

Russian Foreign Minister Sergei Lavrov said talks were under way with with the DPRK to convince it to "abstain from any steps that may aggravate the situation."

 

Japan on Wednesday pressed a divided U.N. Security Council to adopt a statement urging North Korea to cancel its planned test and return immediately to six-party talks aimed at persuading Pyongyang to scrap its nuclear weapons program.

 

China calls for talks

 

Japan's U.N. Ambassador Kenzo Oshima, the current council president, circulated a draft text warning North Korea that a nuclear test would bring international condemnation, "jeopardize peace, stability and security in the region and beyond," and lead to further unspecified council action, AP reports.

 

"I think it is important for the international community, through the council, (to) let North Korea understand that noncompliance would involve some consequences," Oshima said.

 

Pyongyang's closest ally, China, called on all parties to return to the six-party talks and implement the agreement reached in September 2005 in which the North pledged to give up its nuclear program in exchange for aid and security guarantees.

 

In order to solve the North Korean nuclear issue, U.N. Ambassador Wang Guangya said China and many other countries believed the key was progress in U.S.-North Korean relations.

 

"If there could be less mistrust between the two, certainly I think it will lead to good results," he said, according to AP.

 

"If North Korea adopts a more constructive approach, this will enable us to make progress, and also if the United States could be more creative in their thinking it will certainly help."

Report: Test could trigger Asian nuke race

 

Tuesday is the first time North Korea has made an official announcement that it is going to conduct nuclear tests. Previously, it has said it had the right to conduct such tests.

 

Such a scenario would significantly set back diplomatic efforts with North Korea and have serious implications for regional security, according to a House Intelligence Committee report released Tuesday.

 

Coming on the heels of North Korea's test firing of seven missiles, including a long-range ballistic missile in July, a nuclear test would bring Pyongyang's relations with its neighbors to a new low, the report found.

 

The tests might prompt not only Japan, but also Taiwan and possibly South Korea to begin their own nuclear weapons programs, the report found.

 

Six-party talks on the country's nuclear program have been stalled for months. In addition to the United States and North Korea, China, Japan, Russia and South Korea are taking part.

 

North Korea wants bilateral talks with the United States before the six-party talks resume and it wants Washington to ease up on economic pressures.

 

Hill repeated that the United States was willing to meet with North Korean officials, but only within the context of six-party talks.

http://www.cnn.com/2006/WORLD/asiapcf/10/0...onse/index.html

-------------------------------------------------------------------------------------------------------

 

 

 

 

 

 

Baby sitter picks up wrong kid, triggers alert

 

LONG BEACH, California (AP) -- A baby sitter bungled her first day on the job by picking up the wrong 5-year-old boy from his elementary school, police said.

 

Angel Guerrero was taken by mistake Monday when the woman arrived at the school and took him without knowing what the child she was to care for looked like, Sgt. David Cannan said.

 

The mix-up caused alarm when Angel's grandmother came to the school and was told someone had already picked him up. Police issued a missing child alert, and his name and picture were broadcast on several TV stations.

 

Meanwhile, the baby sitter had no idea she picked up the wrong child until her employers returned home.

 

"The baby sitter said 'This is your son,' and the parents said, 'No, this is not our son,"' Cannan said. When the parents saw Angel's picture on their TV screen, they immediately called police.

 

School officials didn't notice the mix-up, Cannan said, because Angel willingly left with the woman. Meanwhile, the boy she was supposed to pick up waited for several hours until school staff called an uncle to pick him up.

 

"There's a lesson here," Cannan said. "What an opportunity to tell parents to talk to their kids, and communicate with their caregivers. This young child was full of trust, and he sees an older, caring adult and just walked off with that person."

http://www.cnn.com/2006/US/10/04/baby.sitt...p.ap/index.html

----------------------------------------------------------------------------------

 

 

 

 

 

 

 

Lawyer: FBI to question former aide about Foley scandal

 

The FBI will interview a top congressional aide Thursday, the day after he resigned and said he had warned House leaders about Rep. Mark Foley's contacts with teenage pages before 2005, the aide's lawyer said.

 

Kirk Fordham, chief of staff to Republican Rep. Tom Reynolds, will be questioned in the FBI's investigation into Foley's sexually explicit Internet correspondence with teenage male congressional pages, attorney Tim Heaphy said.

 

The interview will focus on whether Fordham knew of any possible crimes committed by Foley, Heaphy said.

 

Fordham was the top aide to Reynolds and once held the same job for Foley.

 

Fordham said he did not intervene to help Foley

 

In a sharply worded statement issued after his resignation, Fordham denied intervening with the House Page Board on Foley's behalf and dropped a new bombshell: He had notified "senior staff at the highest levels" about concerns with the six-term GOP congressman.

 

"Rather than trying to shift the blame on me, those who are employed by these House leaders should acknowledge what they know about their action or inaction in response to the information they knew about Mr. Foley prior to 2005," he said.

 

Scott Palmer, House Speaker Dennis Hastert's chief of staff, issued a terse statement.

 

"What Kirk Fordham said did not happen," he said.

 

Fordham's statement cast doubt on top GOP leaders' statements that they heard nothing of Foley's inappropriate behavior before then.

 

Fordham elaborated in an interview with ABC News, saying he told Palmer that Foley was too friendly with the pages, and that Palmer talked to Foley.

 

Hastert's spokesman Ron Bonjean told ABC News, "That [warning] never happened."

 

In a statement to CNN, Bonjean said only that "this matter has been referred to the Standards Committee and we fully expect that the bipartisan panel will do what it needs to do to investigate this matter and protect the integrity of the House."

 

A GOP leadership aide, however, questioned why Fordham told AP on Wednesday morning that he "had no inkling that this kind of blatantly reckless -- just obscene -- behavior was going on behind our backs," but later said he had warned Hastert about it.

 

"It's contradictory from what he said just this morning. He's changed his story," the aide said.

 

Fordham's former boss, Rep. Reynolds, is chairman of the National Republican Congressional Committee, which is working to keep the GOP in control of the House in November's elections. The scandal has not only rocked the Republican leadership but it has become an issue in Reynolds' upstate New York district just weeks before the vote.

 

"It is clear the Democrats are intent on making me a political issue in my boss's race, and I will not let them do so," Fordham wrote in his resignation letter.

 

Reynolds would not say Wednesday whether he asked Fordham to quit. However, Reynolds said he thought it was "inappropriate" for his chief of staff to negotiate with a news outlet over its coverage. And he said Fordham believed he was becoming a "distraction."

 

Foley, a six-term Florida Republican, resigned Friday after his e-mails to a teenage boy who had served as a congressional page became public -- and as ABC News was about to air more explicit records of instant messages the congressman exchanged with other pages.

 

ABC reported that Fordham offered the network an exclusive on Foley's resignation if it agreed not to air transcripts of the most explicit messages. Wednesday, citing unnamed GOP sources, it said Fordham had interceded with Republican leaders to keep concerns raised by the family of a Louisiana teen from the full three-member board that oversees the page program.

 

The network also reported that Fordham's associates consider him a scapegoat for Hastert, R-Illinois, who has been sharply criticized for his handling of the issue. But Bonjean, a spokesman for the speaker, said Hastert had no advance knowledge of Fordham's resignation, nor did he demand it.

 

Conservatives rally behind Hastert

 

The resignation comes as key conservative House members voiced support for Hastert but questioned how he handled the Foley matter.

 

The call for Hastert's resignation came Tuesday in an editorial on The Washington Times Web site. The editorial charged that "either [Hastert] was grossly negligent ... or he deliberately looked the other way."

 

A spokesman for Hastert said the speaker would not step down.

 

And in a statement released Wednesday, Rep. Mike Pence, R-Indiana, and Joe Pitts, R-Pennsylvania, said "regardless of our reservations about how this matter was handled administratively, we believe Speaker Hastert is a man of integrity who has led our conference honorably and effectively throughout the past eight years. Speaker Dennis Hastert should not resign. "

 

Pence is chairman of the influential Republican Study Committee, and Pitts is chairman of the conservative Values Action Team.

 

A key Hastert ally, Republican Ray LaHood of Illinois, said the call for Hastert to step down was "absolute nonsense."

 

"The speaker brought us through 9/11. He's helped the president with major legislative initiatives," LaHood said Wednesday.

 

However, not all Republicans are in Hastert's corner. Rep. Ron Lewis, of Kentucky, "disinvited" the speaker Tuesday from joining him on a campaign stop, Lewis' spokesman Michael Dodge said.

 

"It was not done as a gesture to condemn the speaker," Dodge said. "There's an investigation that's begun with the FBI, the House ethics committee is going to convene as early as tomorrow and in light of there being some questions in leadership about who knew what and when [Lewis thought] it would be inappropriate."

 

Dodge also said that the Foley matter "came up at just about every stop" Wednesday on the campaign trail.

 

Shadegg shows support

 

Arizona Republican Rep. John Shadegg, however, rallied to Hastert's side Tuesday, circulating a letter that says the calls for Hastert to resign "are unwarranted and fundamentally unfair."

 

The letter, dated Tuesday, said at least two newspapers, including the Miami Herald, knew of an e-mail exchange between Foley and a page "for months" and didn't view the contacts as significant.

 

"And, after conducting their own inquiries, they decided not to publish the story or pursue the matter further," the letter continued.

 

"To demand (Hastert's) resignation based on the current facts and before the investigation that he has called for is completed, is unwarranted and wrong," the letter said.

 

But another member of the House leadership, Majority Whip Roy Blunt of Missouri, said Tuesday said he would have handled the Foley situation differently, the AP reported.

 

"I think I could have given some good advice here, which is you have to be curious. You have to ask all the questions you can think of," Blunt said, according to the AP. "You absolutely can't decide not to look into activities because one individual's parents don't want you to."

http://www.cnn.com/2006/POLITICS/10/05/has...oley/index.html

---------------------------------------------------------------------------------

 

 

 

 

 

 

 

Virginia Sex Offender Found In Hole Behind St. Marys School

 

ST. MARYS, Ga. -- A sex offender wanted by the Virginia State Police was arrested Tuesday morning was found in a wooded area behind Mary Lee Clark Elementary School, where he was apparently living in a hole dug into the ground.

 

Timothy Primrose, 50, of Virginia Beach, was being held and expected to be extradited back to Virginia.

 

Primrose is a registered sex offender in Virginia after a 1996 conviction on charges of attempted rape, forcible sodomy and taking indecent liberties with children.

 

St. Marys police said they received a tip about suspicious activity and followed an SUV to the area. Cpl. Shannon Brock and Oficer Christopher Snyder found Primrose in the hole, which was 4 feet wide, 8 feet long and 6 feet deep.

 

 

According to Virginia's sex offender database, Primrose was employed by a Virginia Beach plumbing company.

 

Primrose's daughter and her family live in the area. Police suspect someone had been delivering food to Primrose, and police said the investigation into who may have aided Primrose was continuing.

 

After police finished collecting evidence, St. Marys Publics Works employees filled the hole so it would not be a hazard to children or anyone else walking through the woods.

 

 

 

 

 

 

 

 

 

 

 

 

 

10 die in 22-hour police standoff

http://www.cnn.com/2006/WORLD/asiapcf/10/0...ence/index.html

 

 

Newspaper Readers Moving To The Web

http://www.webpronews.com/topnews/topnews/...ngToTheWeb.html

 

Google Groups Regroups With Beta

http://www.webpronews.com/topnews/topnews/...psWithBeta.html

 

Is Google Involved With IPhoto?

http://www.webpronews.com/topnews/topnews/...WithiPhoto.html

 

Ask.com CEO: We Have “Best Special Sauce”

http://www.webpronews.com/topnews/topnews/...ecialSauce.html

 

What happened after they killed the butler

http://technology.guardian.co.uk/weekly/st...1887271,00.html

 

 

Schwartz To SEC: Can We Blog?

http://www.webpronews.com/topnews/topnews/...CCanWeBlog.html

 

Podzinger to listen for ad opportunities

http://www.techcrunch.com/2006/10/04/podzi...-opportunities/

 

AOL’s New Private Information Harvester

http://www.techcrunch.com/2006/10/04/aols-...ation-gatherer/

 

Yelp secures $10 million more for local reviews

http://www.techcrunch.com/2006/10/04/yelp-...-local-reviews/

 

Audioblogger Joins DeadPool

http://www.techcrunch.com/2006/10/04/audio...joins-deadpool/

 

Will Powerset Pull a Google?

http://www.techcrunch.com/2006/10/05/will-...-pull-a-google/

 

Powerset

http://www.powerset.com/

 

Wikipedia Mobile

http://www.micropersuasion.com/2006/10/wikipedia_mobil.html

 

New Metrics Published on Podcast Adoption

http://www.micropersuasion.com/2006/10/new_metrics_pub.html

 

LonelyBloggers.com: Free Personals for Bloggers

http://www.micropersuasion.com/2006/10/lonelybloggersc.html

 

links for 2006-10-05

http://www.micropersuasion.com/2006/10/lin...or_20061_4.html

 

Stanford Launches a Wiki, Companies Take Note

http://www.micropersuasion.com/2006/10/stanford_launch.html

 

Welcome To The Stanford Wiki

http://stanford.wikia.com/wiki/Main_Page

 

Stanford Wiki launches on Web

http://daily.stanford.edu/article/2006/10/...kiLaunchesOnWeb

 

Waking up to a simulated sunrise

http://news.com.com/2061-11200_3-6122843.h...3&subj=news

 

Sites that help you call in sick

http://news.com.com/2061-11200_3-6122817.html?tag=nl

 

French government report lauds ODF

http://news.com.com/2061-10795_3-6122939.h...9&subj=news

 

Perspective: What China thinks about China

http://news.com.com/2010-1014_3-6122947.ht...7&subj=news

 

Life imitates Star Trek

http://news.com.com/2300-11395_3-6121389-1...9&subj=news

 

Early Look at Jay-Z's NBA Commercial

http://www.prohiphop.com/2006/10/early_look_at_j.html

 

Widgetizing the Web

http://searchviews.com/archives/2006/10/widgets.php

 

Disney Promotes Movie Everyone's Already Seen

http://www.adrants.com/2006/10/disney-prom...s-already-s.php

 

Written Well Not Agency Website Is

http://www.adrants.com/2006/10/written-wel...-website-is.php

 

Lolita Titillates For Lee Jeans, Gets Away With It

http://www.adrants.com/2006/10/lolita-titi...s-gets-away.php

 

18 Questions Your CEO Forgot to Ask When Building Your Website

http://www.stuntdubl.com/2006/10/04/website-questions/

 

Ploppy's how to revamp a site.. complete with tool list

http://www.threadwatch.org/node/9135

 

I'm Feeling Lucky

http://www.threadwatch.org/node/9137

 

Yahoo Debuts Sponsored Mobile Search Results in US Starting Today

http://www.threadwatch.org/node/9138

 

Google launches Code Search

http://www.threadwatch.org/node/9140

 

Will Online Porn Signups Decrease During Ramadan?

http://www.threadwatch.org/node/9145

http://www.stuntdubl.com/2006/10/04/website-questions/

 

 

 

 

 

 

 

 

 

 

 

----------------------------------------------------------

Link to comment
Share on other sites

JumpTap Gets $22M to Push Mobile Search Offering

http://www.marketingpilgrim.com/2006/10/ju...ile-search.html

 

JumpTap

http://www.jumptap.com/

 

Google Code Search Indexing Proprietary Code?

http://www.marketingpilgrim.com/2006/10/go...h-indexing.html

 

Google Groups Gets Much Needed Facelift

http://www.marketingpilgrim.com/2006/10/go...uch-needed.html

 

 

 

 

Google Analytics' Brett Crosby Reveals All

http://www.marketingpilgrim.com/2006/10/go...by-reveals.html

-----------------------------------------------

 

 

 

Ten Minutes With….. Brett Crosby, Google Analytics

 

For this installment of the Ten Minutes series we have the great privilege of meeting Brett Crosby from Google Analytics. Many of us also know Brett as one of the co-founders of Urchin.

 

I met Brett at the start of the year at a Frost & Sullivan event. During that interaction, and all subsequent ones, I have been struck by Brett’s knowledge of the delightful web analytics space as well as his passion for driving Google Analytics towards solving real customer problems.

 

I had originally sent these questions to Brett for an interview at the end of June. He had agreed to do the interview right away but warned about his busy schedule. And he was right. But true to his word he sent in the interview a couple days back. So while the questions are three months old the answers are fresh, just like the aroma of freshly baked bread!

 

In this interview Brett shares his perspective on Google, Google Analytics challenges, tips on metrics you can action, how GA will help analyze SEM & SEO and finally, if you need it, how to get help for your GA implementation. Without further ado, here’s Brett……

 

1. Could you please tell us a little bit about your role at Google?

 

I am the customer acquisition, messaging, spokesperson, and all around marketing guy for Google Analytics.

 

There are many things I don’t touch such as help articles and things that are best left up to much smarter people. And thankfully I work with a lot of very bright and motivated people. So there is plenty of the stuff I am responsible for, but don’t actually do myself. But I also focus a great deal of my time thinking about the future of web analytics and how it relates to our product strategy.

 

My title is Senior Manager, Google Analytics.

 

2. How do you make yourself indispensable to a company?

 

Well, this is an interesting question. The advice I have always tried to follow is to “work on your business rather than in your business”. I try to make sure other people can do my job so that I can work on taking the business to the next level. That sounds a little bit as though I am sitting around letting other people do all the work! But I think if you ask anyone I work with they will tell you that I am very hands-on and involved.

 

In general though, and I don’t mean this to sound salesy, in my own biased thinking, if you can prove the value of your ideas by tracking their success, you are going to be much more valuable than people who cannot. If you are the only person who does that, you will be indispensable to your company.

 

3. What are some examples of activities and surroundings that motivate you?

 

I come from a startup background, so I am always thinking about work whether I am there or not. In fact, I often get my best ideas while I am cycling, surfing or having an informal conversation without a set agenda. That is why I think it is so important not to get so bogged down with your daily tasks that you can’t spend time thinking about the big picture: what you could be doing better and where you have opportunities to take an industry.

 

4. What did you really love about your last job?

 

The thing I loved most about my last job about was the people I worked with. But thankfully that has only gotten better at Google. I work with a lot of the same people and many new people who I also greatly enjoy. If you work on a product team at Google, it is similar to running a startup company around that product. So things aren’t all that different. I guess if I had to pick one thing that I miss it was having a manageable amount of email ;-)

 

5. What is Google Analytics’s biggest strategic strength?

 

Google Analytics’ actually has two strategic strengths: the first that it is tightly integrated into AdWords and the second that it is free. The first one makes it extremely easy to setup and use, the second gets many thousands of businesses using the data GA provides to make business decisions everyday.

 

6. What is Google Analytics’s biggest challenge, looking into the future?

 

Our biggest challenge is taking advantage of an enormous opportunity. We are in a position to help so many businesses become more profitable and effective, but we need to execute on our vision in order to do this.

 

7. What do you think is the biggest change (could be the nicest) in moving from “Urchin” to “Google Analytics”? For you or for the team or for the software?

 

Well, at Urchin we used to have free bagels on fridays. We thought that was pretty nice. Google provides employees truly gourmet breakfast, lunch, dinner and snacks in between. So not having to decide where we’re going to lunch is a pretty nice change.

 

The real change though is the scale of our opportunity.

 

8. Could you share what you look for in Google Analytics employees?

 

If you can make it past the Google hiring gauntlet and you are passionate about web analytics, welcome aboard!

 

(Tip: If you want to work at Google you need to have done well scholastically, professionally, and have an interesting extra-curricular life.)

 

9. On my blog I talk about the challenge with the mass of metrics available in our tools, what is the analysis that you most wish your customers did but something that most don’t?

 

One of the biggest challenges facing the industry right now in my opinion is getting the right data to the right people at the right time. Some companies are great at using the data, but far too often there is only a small handful of people who use this data regularly. This is partially because vendors, us included, have assumed a basic level of proficiency and knowledge. I think that assumption leads some people to feel intimidated when trying to use the data to make decisions.

 

Google Analytics has focused a lot of development on delivering on the core promises of web analytics: our interface is easy to use, the product is easy to setup and has status checks as you go, it is deeply integrated with AdWords, and we have a wonderful educational resource at www.ConversionUniversity.com. But there is still much to do.

 

10. Are there any special enhancements made to Google Analytics that make it the best tool to analyze SEO and SEM efforts that companies are executing on? My hypothesis is that perhaps being a part of Google helps.

 

Good hypothesis. Google Analytics is deeply integrated into AdWords. If you connect your Analytics and AdWords accounts (which simply requires checking a box), you don’t have to add tracking code to your destination URLs. Google Analytics automatically imports your cost, impression, ad group, and keyword position data for you. This is a huge time saver and removes an often error-prone process. This is just the beginning of what is possible and there are many other integrations on the drawing board.

 

As for SEO specifically, there is a lot we do well already and even more we can do better. We have many plans on our roadmap that I should probably avoid disclosing, so let me touch on one of my favorite reports in GA that we designed as an SEM tool, but is also a great SEO tool. This is the “Keyword Considerations” report. This report shows you the organic keywords that are converting well then subtracts the keywords you are buying. The resulting list is great for finding new keywords to buy (SEM). But it is also great for discovering new organic terms that are driving people to your site (SEO), some you might not even be aware of. This is also a great report to keep an eye on to monitor how the vernacular about your industry or product changes. And you can see which products and features people really want, not just the stuff you are selling/marketing.

 

11. IMHO Google Analytics is creating “data democracy”, anyone with a website can now suddenly get access to fairly sophisticated web analytics data. This is cool. But GA is still a fairly complex tool to use (just like the big boys :)). Beyond Conversion University are there other efforts you are considering in order to drive up the level sophistication / usage of the tool for the newly democratic masses?

 

This is a good point. We have the most extensive support options available in the market already, so let me first mention those:

 

* GA HelpCenter is in 16 languages: www.google.com/support/analytics

* The GA user forums: groups.google.com/group/analytics-help

* The GA blog: analytics.blogspot.com

* The Conversion University: www.ConversionUniversity.com

* Tech Support in 16 languages: www.google.com/support/analytics/bin/request.py

* Dozens of channel partners who offer paid technical support and professional services: www.google.com/analytics/support_partner_provided.html

 

Beyond that there is more we can do. The four main areas we are focusing on going forward are:

 

* more integrations that save people time and money

* developing the product to be even more intuitive

* increasing the prominence and number of channel partners

* and continuing to develop our existing resources.

 

12. I am sure you have many favorite clients who use GA/Urchin but probably one closest to your heart. Could you share some reasons why this anonymous client is your favorite? What is it that they do that is unique? What can the rest of us learn from them and emulate?

 

You are right Avinash, I have many favorite clients. But one of the most interesting involves millions of dollars, a Paris Hilton video, and a major industry trend. Interested? It is the story of how CKE, Inc, (Carl’s Jr and Hardee’s) promoted their new Spicy Chicken Burger with a TV commercial staring Paris Hilton washing a car and eating a sandwich. But my favorite part of this story isn’t the ad content. It is fact that this ad ran on TV only once, then it was moved to the web and tracked with Google Analytics.

 

The goals of this promotion were viral marketing using a “forward-to-a-friend” button, coupon downloads, visits to the restaurant locater and of course interaction with and recognition of their brands. What they found is that not only did they reach their target audience at a much higher rate than they could have on television, but they also saved millions of dollars on advertising and were able to track the success of the campaign.

 

This is just one example of a very large and very lucrative shift from offline to online advertising that works for big and small companies alike. We are seeing much more of this than in previous years and I expect the trend to grow dramatically.

 

13. What is the one thing about the future of web analytics that none of us know, but you do? :)

 

Google is just getting started in this space…

 

Please share your feedback via comments. Did you have a favorite answer? Is there a question I should have asked but you think I did not? How can I improve future interviews?

 

[Like this post? For more posts like this please click here.]

 

 

 

Tags: Analytics & Marketing Tips & Web Analytics & Web Metrics & Advanced Analytics & Web Insights & Search Engine Marketing

RSS feed for comments on this post. | TrackBack URI

 

2 Responses

 

1. Andy Beal Says:

October 5th, 2006 at 07:00

 

Great interview! Avinash, I’m surprised you didn’t ask him what’s it like to be the grandson of Bing Crosby. ;-)

2. James Clark Says:

October 5th, 2006 at 07:59

 

Avinash, thanks for striking up the conversation with Brett. We’ll have to start zeroing on the “Keyword Considerations” report with our clients. Great tip…

http://www.kaushik.net/avinash/2006/10/ten...-analytics.html

--------------------------------------------------------------------------------

 

 

 

 

 

 

 

 

Occam’s Razor by Avinash Kaushik

http://www.kaushik.net/avinash/

 

 

 

 

 

 

Calendar Sharing Becoming New Social Phenomenon

http://www.webpronews.com/expertarticles/e...Phenomenon.html

 

 

 

Mobile Advergaming: "Advertising To Go"

http://www.webpronews.com/expertarticles/e...tisingToGo.html

 

Another Old SCO Box

http://www.webpronews.com/expertarticles/e...roldSCOBox.html

 

Sales Speak From Bob Vila

http://www.webpronews.com/expertarticles/e...romBobVila.html

 

What You Need To Know About Patch Management Software

http://www.webpronews.com/expertarticles/e...ntSoftware.html

 

The Suits Vs. The Geeks

http://www.webpronews.com/blogtalk/blogtal...vstheGeeks.html

 

Video Advertising Ticks Off The Audience?

http://www.webpronews.com/blogtalk/blogtal...heAudience.html

 

News As A Part Of Your Internet Marketing Strategy

http://www.webpronews.com/blogtalk/blogtal...ngStrategy.html

 

Internet Marketing Strategy

http://www.expansionplus.com/impr/index.html

 

 

 

 

Interview With ClickTracks CEO John Marshall

 

Last week I got the opportunity to speak with the CEO of ClickTracks John Marshall. During the interview I was able to get his views about topics such as the Web Analytics Industry and J.L. Halsey's acquisition of ClickTracks.

 

If you ever get a chance to speak with John you can totally hear the passion in his voice about what he does. Here's how it went:

 

[Manoj] - How did you get into the web analytics industry?

 

[John] - I was running a small software company in 1998 (a very web centric marketing company) and we bought a log analyzer product which was the most popular and most expensive product at the time. I hated it; it was very clunky and rigid. It had 2 major problems: firstly, it did not encourage thinking about the website analytically. It was just list of stats, as if the developers had simply written every possible report in the hope the user would find something useful. Of course this made the product intimidating and actually discouraged heavy use. The second was the unnecessary complexity of the data presentation. I recall ranting that I just needed to see where people click on the page, and I can work out the rest - and the light bulb went on. Therefore my origin in the industry was as a small business owner trying to answer: What do people do when they arrive at my website? I realized that no product was doing a good job of answering that question, and therefore a need was going unmet.

 

[Manoj] - 1998 was a great time to get into the Web Analytics market considering how new the concept was.

 

[John] - Yes it was, however I would like to clarify that we didn't actually start ClickTracks until 2000. The original company in 1998 was a different product altogether.

 

I started to think about the books by Edward Tufte. I am a big fan of what he does, long before ClickTracks and it was at that time I started thinking through his idea of data presentation methods (which he promoted in his book). It was from that I gained the inspiration for the first ClickTracks product.

 

[Manoj] - What are specific things you and your organization do to help ClickTracks stay a leader in the Web Analytics Industry?

 

[John] - We practice what we preach by acting as Web Analysts to analyze our clients' sites as well as our own. We go to a lot of Trade Shows where you'll usually find me in the booth. There is something about the environment of the tradeshow where a customer or prospect will come and say in very passionate terms: I have the following business problem or I am looking for a product that solves this need. Sometimes those conversations involve us telling the customer/prospect that ClickTracks can solve a particular problem, whereas other times the conversations are more insightful making us think of ways to help solve their pain (this makes us learn from our customers). We are very methodical in the way we add features to the product, we generally don't add features unless it solves a compelling need and this is a strategy I have learned from my past experiences doing website analysis. We are constantly trying to stay away from feature bloat by listening closely to the problems the customers are trying to solve.

 

[Manoj] - Focus is key because there are times with analytics packages you are lost when having to sift through so many reports.

 

[John] - Yes exactly, you obviously are an experienced user. We try to keep the promise that our software does less; we come right out and say that. Adding features makes a product harder to use so you'd better be sure there are compelling reasons behind adding it. Our users don't have time to go through extra features and we don't want to get in their way when they're just trying to get the job done.

 

[Manoj] - I really like the idea that even you, the CEO gets involved in things like teaching classes.

 

[John] - Yeah… (Laughs), I am flattered you noticed such a thing. I really enjoy doing that because it's a lot of fun and we learn what our customers are trying to accomplish in their analytics. Through the act of teaching these classes we get to help customers solve these needs and I get a lot of satisfaction out of that.

 

[Manoj]- What is one of the best business decisions you've made?

 

[John] - Good question, superficially I might say starting the company but I might also say that early on we wanted to present data that was animated on the screen, because I have always thought the brain is very good at interpreting data that moves temporally. However, I am really glad we didn't go down that path. It leads to products that are useful for entertainment but not for decision making. It was a concept that I had early on and I am glad we abandoned it.

 

[Manoj] - What makes a good Web Analytics Vendor?

 

[John] - I think training and support, because you gain so much through one on one training and the process of good informed assistance. The value of the data and price of failure of a bad implementation is so high that a vendor really needs to nail this item. I am very biased to the idea of analysis rather than reporting because if you find yourself only looking at the trends of visitors to your site you are probably not going to succeed at improving your website. What makes a good web analyst and good web analytics package are somewhat related. Interactive exploration is important, for example: 2 months after I have collected my data, can I go back and add another segment (metric) and measure it against my previously collected data. We have designed our product to do that and that's what we're known for. It's this idea that helps a good analyst think and understand why things are happening on a website rather than simply looking at a graph that goes up and to the right. That in turn requires some training.

 

[Manoj] - Do you have hints or tidbits for some upcoming products?

 

[John] - Let me say that we will be coming out with API level access to the underlying data store of ClickTracks. We have very good reasons for not releasing this earlier but this has been a frequently requested feature.

 

[Manoj] - I have some background in software development so I can understand how useful and powerful this feature can be.

 

[Manoj] - You were recently purchased by J.L Halsey, what does this do for ClickTracks (i.e. any kind of leverage?).

 

[John] - J.L. Halsey already owns 2 other companies that sell product to digital marketers. At the same time they acquired ClickTracks they also acquired Hot Banana (CMS Vendor) and you can clearly see that there is an intent to build a suite of products that focuses primarily on customer acquisition and retention. ClickTracks is mainly about the analysis of customer acquisition (email campaigns, search campaigns, click fraud…). We now have easier access to resources allowing us to grow our business faster. We basically have more scale and reach (we are growing and hiring).

 

[Manoj] - What does the future hold for ClickTracks and the rest of the Industry?

 

[John] - I hope that we'll get some consensus on the terminology and best practices. Web Analytics is sort of like accounting in that dealing with things that can be interpreted in different ways makes for different vendors have different standards (this is something users complain about). In the web analytics industry we don't yet accept the idea that the data is open to interpretation because I hear people saying that "I just want the numbers to agree" (across different vendors). I feel that they don't need to agree because there are reasons that company A and company B count things differently. In accounting we readily accept that some things are depreciated over 3 years and some over 5. They don't agree, and there are good reasons because they are used for different things. We do, however, need to agree on what the underlying standards are, in the same way we all know what a year is. As the concepts mature it will become less specialized and will be part of marketing analysis. I think we'll move away from the term Web Analytics to Digital Marketing Analytics (or Marketing Analytics).

 

[Manoj] - Top 5 things you enjoy most working at ClickTracks.

 

[John] -

 

- Innovating

 

- Talking to the Customer

 

- Meeting Colleagues at Tradeshows/Networking Events

 

- Teaching

 

- Working with very bright people

 

[Manoj] - It's always nice to enjoy who you work with.

 

[John] - Yes and I am very fortunate.

http://www.webpronews.com/blogtalk/blogtal...hnMarshall.html

-----------------------------------------------------------------------------

 

 

 

 

 

 

 

 

 

Consumer Input Reaching Deep

http://www.webpronews.com/blogtalk/blogtal...achingDeep.html

 

Scoble In The Blogger's Lounge

http://www.webpronews.com/insiderreports/m...gersLounge.html

 

EBay Developer Program Chief Departs

http://www.webpronews.com/insiderreports/m...iefDeparts.html

 

Yahoo Mobilizes Sponsored Search

http://www.webpronews.com/insiderreports/s...oredSearch.html

 

Blip.tv Gives Glimpse Of TV Future

http://www.webpronews.com/insiderreports/m...OfTVFuture.html

 

Tales Of A Ninth-Grade Executive

http://www.webpronews.com/insiderreports/m...eExecutive.html

 

About Teen Podcasters Network

http://www.teenpodcasters.com/?q=node/56

 

 

 

 

State lawmaker suggests arming teachers, principals

 

A state lawmaker, worried about a recent string of deadly school shootings, suggested arming teachers, principals and other school personnel as a safety measure and a deterrent.

 

It might not be politically correct, but it has worked effectively in other countries, Republican Rep. Frank Lasee said Wednesday.

 

"To make our schools safe for our students to learn, all options should be on the table," he said. "Israel and Thailand have well-trained teachers carrying weapons and keeping their children safe from harm. It can work in Wisconsin."

 

In Thailand, where officials have been waging a bloody fight with Muslim separatists for the last two years, some teachers carry weapons for self defense as they are viewed as part of the government. In Israel, teachers are not allowed to carry weapons in the school, but security guards at the entrances are armed.

 

Lasee said he planned to introduce legislation that would allow school personnel to carry concealed weapons. He stressed that it would hinge on school staff members getting strict training on the use of the weapons, and he acknowledged he would have to work around a federal law that bans guns on school grounds.

 

The director of school safety for Milwaukee Public Schools, Pete Pochowski, opposed the idea.

 

"Statistically, the safest place for a child to be is in school," Pochowski said. "We have problems in our schools, but not to the point where we need to arm our teachers and principals."

 

Last week, a 15-year-old Wisconsin student was arrested in the shooting death of Weston Schools Principal John Klang. The criminal complaint said the teen brought guns to school to confront students, teachers and the principal.

http://www.cnn.com/2006/EDUCATION/10/05/sc...s.ap/index.html

-------------------------------------------------------------------------------------------

 

 

 

 

 

 

 

 

 

This is not a fairy tale

 

There are some things you see, some things you hear that simply are unspeakable. In a hospital in the eastern Congo city of Goma, we met a little girl. She never said a word to us, she could barely look us in the eyes. When she did, her eyes told the story.

 

"She never says anything to men," one of the hospital counselors explained, and then she told us why.

 

The little girl was raped. Gang-raped. It was allegedly done by soldiers engaged in a complicated regional war that has claimed millions of lives. The war officially ended in 2003, but outbreaks of violence and rape continue. The girl is now five years old. She was raped when she was three.

 

I wish I could tell you this was an extraordinary event. I wish I could tell you she was the only child attacked. The hospital was full of rape victims, and the doctor had seen other small children victimized.

 

Because the rapes are so violent, women often develop fistulas -- ruptures in their vaginas or rectums that make it impossible to control bodily functions. A charity called Heal Africa was running this hospital, and the doctor said he was able to fix about 70-80 percent of the fistula cases, but of course some wounds never heal.

 

Heal Africa has opened up a residence for women with fistulas that can't be surgically fixed, at least not here in the Democratic Republic of the Congo. The women can't go home. Often they've been rejected by their husbands because they were raped. The stigma here is strong.

 

I met a woman named Angela. I can't stop thinking about her. She was raped by three men in front of her children. Afterwards they shot her, and she says they burned her baby girl. The girl is four now and has a massive scar all over her chest.

 

Angela's fistula was fixed, but her arm remains injured from the gunshot. Pscyhologically she's still devastated. To make matters worse, her husband kicked her out of the house.

 

"He heard I was raped," she said whispering. "And he just said, 'Go on your own, I don't need you anymore. If we lived together, you now might have HIV so you might infect me.'"

 

I didn't ask Angela her HIV status. I didn't think it was any of my business. Perhaps I should have asked, but she didn't volunteer it, and I felt like I'd already asked her too much.

 

The funding for the Heal Africa house comes from a non-governmental organization. They say their funding ends in April. It's not clear what will happen then.

 

"The only thing I need is some land so I can build a house," Angela said to me before I left. "I might die and I want my kids to have that castle. I'm hoping for a miracle."

 

There aren't many miracles in the Democratic Republic of the Congo. This is not a fairy tale, some stories don't have happy endings. Here the men who rape with impunity are rarely brought to justice. Women like Angela are expected to simply bear the pain.

 

If you would like to help Heal Africa in the work they are doing, you can log onto their Web site.

http://www.cnn.com/CNN/Programs/anderson.c...fairy-tale.html

-----------------------------------------------

 

Comments so far:

 

Mr. Cooper,

 

I watched your report on these stories last night and I wept the entire time. I've never felt so selfish. We, as Americans, think these things are worlds away and they aren't. Each of these people have a horrible story. Why $300 billion plus in Iraq? I agree it's horrible there too, but why no attention to The Congo, Darfur, all of Africa? This is dispicable. I commend you for opening our eyes. The blood will be on our hands now. We must step up and do the right thing. I'm also glad that you are reporting on the gorillas that are being mistreated, sold, and even killed. Those who do these things should be brought to justice. Great reporting. Stay safe.

Posted By Cyn, Tupelo, Mississippi : 12:35 PM ET

It is a difficult thing to watch the harrowing tales transmitted from across width and breadth of the ailing continent of Africa, ...and yet it has become a magnetic thing, which draws one to the television each night. Can the atrocities possibly have worsened since last evening's report? Indeed. These stories are far too gruesome and horrible to ignore. Keep at it, please- your news does not fall on deaf ears or blind eyes. Many thanks for the unrelenting course you are all staying, delivering kind smiles to small children, simple relief and aid to thousands, and a harsh call to action for those of us who would otherwise do nothing but watch from afar.

Posted By Sam, Huntsville, Alabama : 12:50 PM ET

First of all, thanks for the coverage. The stories are great but very very sad. It's hard to imagine things like this still occuring.

 

It's beyond me to understand how and why they raped and killed babies, toddlers or any human being. It just makes me angry and sad...

Posted By Chew, Houston TX : 12:53 PM ET

Anderson,

 

As I have been watching your show the last two days, I've noticed how each and every pair of eyes you've shown on 360 have told me a different story. It's unbearable to watch, but I want to know, have to know, what's going on in Africa. The stories in those eyes are what's driving me to lead a different life whether it's with my vote, my money, or my career.

 

Thank you for showing us what no one else will.

Posted By Marcie, Vista, California : 12:56 PM ET

Anderson, it is a truly horrendous world to live in where an innocent child can be violated in such a way. I hope that the work you are doing in Congo and the team is doing in Darfur exposing all of the heinous crimes being committed against our fellow human beings will inspire the world to act on a massive scale.

 

Today is DarfurFast, an international day where people may give up an item of luxury and donate the money they save to a charity working in Darfur. We all must do our part to help these people.

 

Thank you for your work, thank you for keeping us informed and showing us what is really happening.

Posted By Chelsea, Halifax, Nova Scotia : 12:58 PM ET

This is absolutely horrific. Thank you for covering this Anderson and opening the eyes of many to these injustices. We, as a human race, should stand up and not let things like this take place in this day and age. Hopefully, each person that reads this will find it in them to help in some way.

Posted By Katayoun, Houston TX : 12:58 PM ET

Hey Anderson,

 

It's a first,but, I don't know what to say. I watched it last night. I felt like throwing up,I felt so sad and so mad. What really gets to me,is that the men have no repercussions. But most of all, the women are thrown away like yesterday's garbage!

 

 

As a woman, it is hard for me to accept that women and children are treated like animals,no, less than animals. Thank you for the link, but most of all, thank you for caring enough to bring us the story.

 

Take care

Joanne Ranzell

Laval Quebec

Posted By Joanne Ranzell Laval Quebec : 1:08 PM ET

Hi Anderson,

Well, you're certainly right when you say this is no fairy tale..Reality has a way of taking the wind out of your sails..It trumps hope all too often..Thank you for reporting this and giving the link..I've been watching ac360 this week and I must admit it has been hard to see. A jolt of reality always is..But I raised to never give up hope..Not on myself or on others. Sending a donation will probably be of little comfort to these women, but I'm sending one today..And so will many others..One person at a time..That's hope..Take Care

Posted By Lorie Ann, Buellton,Calif. : 1:09 PM ET

Thanks for the great reporting. I teach Genocide at the high school level and have my students watching your reports each nite. This has given them more insight into just some of the terrible tragedies happening in Africa. We all need to do our part to spread awarenss!!

Posted By Jill Tejeda, Livingston New Jersey : 1:41 PM ET

It is shocking and horrifying that females are treated like animals. Acutally, the animals are treated better. The trauma (physical and mental) is so gruesome, it is almost surreal.

 

What you described sounds more like hell than a country. :(

Posted By Genevieve Matthews, El Paso, TX : 1:41 PM ET

In a world of frappucinos and razor cell phones. It's so hard to believe that we as humans still allow these horrific things to happen to our fellow humans. With billions of dollars going towards the Middle East it makes me livid that we as Americans are hardly ever exposed to these situations in the world. Most media coverage is so busy covering Tom Cruise stories... I thank CNN and Anderson Cooper for reporting on these stories which touch our lives and making us think. Maybe also inspiring some people like myself to want to help and make a difference.

Posted By Valerie Cua, Spring TX : 1:45 PM ET

As a father of two girls (6 and 2), I weep at the vision of a sweet 5 year old in which all security and innocence was so brutally erased by... I can not even think of the words to describe the individuals who would do such a thing. It moves me to action. My action to take is still undefined yet my resolve is now set. Who else is on board?

Posted By Dr. David M. Sluss, PhD, Columbia, South Carolina : 1:59 PM ET

My God, I am just shocked. I dont really even know what to say. I know that America cant save everyone but if we had a chance to go there and help I would rejoin the Military.

Posted By Michelle, Memphis, TN : 1:59 PM ET

This kind of story makes you realize how fortunate we are to live in a country where we are protected from such things

Posted By Dan Mellemstrand lakewood CO : 2:01 PM ET

Anderson, I grew up on a mission station called Nyankunde about 50 miles from Bunia. many of the people we knew were killed. Some taken into the operating rooms at the hospital and butchered. Milions have died in the Congo unnoticed. Thank you for

covering this story.

Posted By Bryan MacDougall - Georgia : 2:02 PM ET

I worked in Goma and the Lake Kivu area in the 1980's, and it was like paradise there. It was a time of peace. To read about the situation there, that little girl who had been raped by soldiers, is heart-wrenching. How humans can turn paradise into a living hell!

Posted By Michael Mau, Montreal, Canada : 2:04 PM ET

This story was especially difficult to watch and read about but thank you for reporting it. We need to know and to see the horrors that are happening over there. People do care and can make a difference even if it's just one person at a time. I appreciate the links to agencies that are trying to help. I hope that you will continue to report on this area of the world on a regular basis. Many thanks to you and your staff for the great shows of the past few nights. Greatly looking forward to tonight's show.

Posted By Mary Anne, Parlin, NJ : 2:04 PM ET

"Africa's Shame". First, Africa is not a village so you are doing a diservice to the people you are trying to help by lumping every problem there as one.

 

No wonder the only thing Americans know about Africa is of hunger, poverty and rape. So you touch the souls of the majority of Americans and they they feel guilty and compelled to act by just sending more AID.

 

You point out each cell phone has a piece of Congo in it. Very true. And then you point out the hardworking African miner getting pennies for his work because of corruption. Very true also. But does the story end there? Dont you have the resources to fly to those private airstrips that brings in American/Western Investors everyday to come bribe the locals officials so they can come in and leave with that tin without paying duties/taxes and sell it to the Motorollas?

 

Does the typical American know that the low cost for their phones is based on that..thus they are benefiting/contributing to the corruption you are exposing. That $20 they send for AID is probably the same $20 they have saved from the cellphones because of the way the TIN was sold.

 

A typical American would come out thinking Congo Republic is where it is because of corruption and that unfortunately is a very distorted picture.

 

And then there was a gentleman from one of those AID agencies talking to you about corrupt moral values. Can you really sit there far away in African and talk about the continent losing its moral values with whatever is going on in your own backyard. And am not trying to justify the sick acts being committed by those men.

 

There are problems in Africa, major ones for that matter but how you address them is counter productive, especially to the African man/woman who is trying to resolve the issues. If western help is to come it should not be based on guilt of living comfortably here. At the very least it should be of guilt of acknowledging that the comfort you have in partly due to the problems you see on that side.

 

Why are all these Militias fighting each other in Congo and who sponsors them? That wasn't covered. Did they cover the contracts American companies were signing with rebel/militia movement the moment the rebel seized an inch of land. This is just as bad as that situation in Sierra Leone with blood diamonds.

 

Please expose the whole problem so the typical American can connect the dots. And start with Lumumba, then to his assination and the coming of your Mobutu, the dictator you supported all along until you had no use for him anymore though he was robbing his people blind.

 

I am 100% sure CNN has the resources to do a much better job.

 

I am not surprised with the comments coming from the few here, it is exactly what i was expecting with such work.

Posted By Mkangafu, San Jose California : 2:07 PM ET

It is very hard to come to terms with reality! You do a great service by bringing us these stories and showing us that we have a very long way to go as a race. We take false pride in words like "humanity".

Posted By Simanta, Ames, IA : 2:13 PM ET

As a Black female, I wish there were more of an outcry from Blacks here in the USA about the atrocities taking place in Africa. Sad doesn't begin to describe what's taking place on the entire continent of Africa.

Posted By Angelia Perry, Vero Beach, FL : 2:14 PM ET

Where's Spike Lee and Jesse Jackson?

Posted By Brad Gillette, Amery Wisconsin : 2:14 PM ET

I think that it's really good of you guys to report on this thing that I didn't even know existed, while the rest of the media is stuck on Foley. Stay safe and keep up the good work.

Posted By Kelli, Clayton NC : 2:15 PM ET

This is perhaps the most horrific example of evil I have ever read.

Posted By Seth, West Chester PA : 2:18 PM ET

Why are we so fixated on Mr. Foley's transgressions when something far more aggregious and on a much bigger scale is taking place in Africa? I appreciate the efforts being made to bring this information forward and am left wondering how we, as a nation, systematically reduce the genocide and the de-humanization of our women to the margins in our media. It doesn't matter where we are from or who we are, those precious and wounded girls are all of our daughters and all of our sisters. Until we really believe this- we won't be able to afford them the protection they are entitled to.

Posted By Elisa, Sacramento, CA : 2:20 PM ET

Anderson and Friends:

 

We have be taping your shows from Africa. We can feel your outrage thousands of miles away.

 

Thanks CNN for having minds of capitalists (to produce the Africa shows) and hearts of social workers.

 

 

 

Thank you for showing us the world and bringing it to our homes each and every night.

Posted By Renee Bradenton, FL : 2:20 PM ET

What human being can look at a child and so violently take her innocence, then go on with life as though he's done his job?

 

As a woman, wife, and mother, I can't tell you how numb I am right now just reading your report. And I have so little hope that it will stop, sadly. We can help organizations like Heal Africa, but what are we doing to the animals that perpetrate this brutality????

Posted By Laura Lappe, Lubbock, Texas : 2:22 PM ET

The comments by Mkangafu seem to be ignored by all the other posters after him/her.

 

The fact no one is debating his comments underlines how mis-informed and ignorant everyone is about the

socio-economic political situations we are living in today.

 

Whether you care to admit it or not:

the rich countries of the world are the reason we have such horrible things happening.

 

Connect the dots and you will see that our super consumer, junk, garbage making society, based on materialism and greed is responsibility for these horrible acts.

 

uh oh, my 3 month old Ipod is obsolete, I look like a fool, better go replace it...

Posted By Haggisns, Toronto, Canada : 3:02 PM ET

Why have we not learned the lessons of the 1930s?

 

How can we let this happen again and again?...

 

And why aren't we willing to take responsibility or recognition for its existence?

Posted By Keith Gargano, Smyrna GA : 3:03 PM ET

Angelia of Vero Beach----You're not getting it....So not a "color issue"....a HUMAN issue. Would you feel any less horrified if their skin color was white??? I wouldn't.

Posted By Heidi Miami, FL : 3:06 PM ET

One comment here accused you of not telling the whole story. While that may be true, the history of Africa is a very complicated one. Africa has been used politically, economically, by religion and so on for gain. I don't doubt that is true and I can't say I know the whole tale. This person said that although he didn't condone these acts of violence in the Congo, he almost accuses you of sensationalizing the situation instead of looking at the big picture. He patronized the comments of people here saying they are acting out of guilt and luxery of being American.

 

I disagree. It's called compassion and any normal person would be outraged by the acts of violence committed against the women and children of the Congo. This has been going on for YEARS. I have seen many specials about it and this story needs to be told over and over. The fact is that people need to outraged. You can't solve all of Africa's problems overnite but many of us can't stand one more day of knowing that a child (a baby for God's Sake) is being GANG raped. These brutal men are in-human and as evil as evil can get. It needs to stop somehow and it starts with people being aware and yes, outraged.

 

Anderson, keep reporting the only way you know you can. It will help bring change. People will find out more about Africa and thier own government. For that person who thinks that the 20 dollar donation is just the same 20 dollars in savings from buying a motoroller cell phone, what are you trying to convey? Don't donate? No. Donate anyway. This cause is great and in desperate need whichever way you look at it. Ultimately.

Posted By Christine Raposa, Griswold, CT : 3:16 PM ET

I read most of your answers. You people are not in touch with reality and what is going on around the world. American, get off you box, read more, travel more, and try to learn more. These are old news and it is going on forever. The government of many countries is corrupted and they don�t care about their people. All they care is how to enrich them selves.

Posted By Russell, Plainivew, NY : 3:19 PM ET

Two observations

 

1) There better be a lot of room in hell because it will continue to be a busy place

 

2) I concede that I do not fully understand the poltical, economic and socio intricacies that have generated these atrocities. I do know that we are doing virtually nothing to stop them. For that, we should all be ashamed

Posted By Tim Spencer, Richmond VA : 3:25 PM ET

The biggest problem in this world is MEN.

Posted By Michelle, Washington DC : 3:25 PM ET

This is like watching the scariest horror move you can imagine and you know at the same time there is no "The End" I pray that God avenge's this little baby's suffering because a baby is what she is. What a shame, I'm heart sick right now.

Posted By Peter, St.Paul,MN : 3:30 PM ET

TO: Posted By Mkangafu, San Jose California

 

Many people are aware of corruption. There is corruption EVERYWHERE, but does that have anything to do with or justify raping women???? And yes this actually is a HUGE deal for many countries in Africa. Africa has many problems, and not all of them can beblamed on the Western world. MEN chosing to rape women and children, disfigure them is not justified by anything.

Posted By Njeri, NY : 3:31 PM ET

Heidi I think you are misunderstanding. I "feel" what Angela is saying. Our decendants are from there whether or not we can trace them back or not. All human beings should be outraged and tug on the pants of officials to help, but Black people in America have lost the focus of our own. My generation is more concerend about "bling-bling" than focusing on Africa.

 

Think of it like raising a child. Of course if you see a child hurt you will help them no matter if they are yours or not, but in your mind you ask where is this child's family?

 

We as humans need to wake up and help. It is surprising that George Clooney (Darfur) and Anderson Cooper are bringing this to light but not an African-American. I thank Anderson for bringing this forward maybe with this coverage many more will open up.

Posted By Brandy, Chicago, IL : 3:42 PM ET

Mkangafu,

 

Why are you more angry about the way these stories are being broadcasted and not the stories themselves? It's NOT unfortunate to say that human beings respond to emotion thus these images will make us want to help. So what if we're "guilted" into helping. Help is help regardless of why you're helping. Redirect your anger towards the people committing these horrible acts. Not to the people showing us. Hatred and ignorance, like you're showing, are the seeds that give birth to these catastrophies. You may want to keep that in check.

Posted By Cyn, Tupelo, Mississippi : 4:09 PM ET

As I read the comments, most expressing horror, a couple expressing anger(basically because they feel their land is being potrayed 'too negatively' and that theres more to it), the one thing I really see missing is this simple question...what can we do to make it better?

 

You cant pray to god to help make it all better , he , apparently doesnt give a damn, you cannot really solve this problem through military might (though its tempting); the only thing you can practically do...adopt kids from africa, or give money to aid organizations working there (which I will do as soon as I am done posting this), or go work there yourself.

 

expressing horror / sadness does nothing; trying to get the finger to point someplace else is even more useless. The only thing to do after reading something like this...pass this on to others and practically do something to help.

Posted By Jay, Philadelphia, PA : 4:25 PM ET

Anderson, I sat at my computer for 10 minutes in shock, not knowing what to write about this act of PURE EVIL. It doesn't matter what I write, it wouldn't be enough. It's so incredibly sad that we are capable of these atrocities...

Posted By Rubin Mendoza, Whittier, CA : 4:37 PM ET

That is horrible! I was gathering current events for my class when I saw this. I cried as I read what was going on! I, just like many others here in America, had no idea of what was going on. I wish you the best of luck. May God bless you.

~Christy

Posted By Christy, Knoxville, TN : 4:38 PM ET

I am African and I am sick of some Africans ever trying to blame their problems on the west & the western lifestyles. What is going on in Congo & many African countries is simply evil! You can never justify raping a child for whatever reason! Having spent a greater part of my life in Africa, I understand the root of [most] these problems is corruption in the political leadership. God bless you Anderson for bringing these to light.

Posted By Akin, Austin TX : 4:41 PM ET

To Cyn, Tupelo:

Believe me, I do not have any hate in me and I am not as ignorant as you might assume especially in regards to Africa. I am just pragmatic about the challenges we face in Africa. I believe in long lasting solutions not patch up work. Stories like these generate the kinda of "guilt" you feel which unfortunately tends to be short term.

 

A better representation of the story however will allow people to see the bigger picture and those commiting to help in that bigger picture will hopefully be working on a long term solution. It would not be a guilt act, but one based on your own conscience. That tends to last longer.

 

By the way, its ignorant to think hatred and ignorance are seeds that give birth to these catastrophies. Its deeper than that, and that part is what is missing from this type of coverage.

Posted By Mkangafu, San Jose CA : 4:44 PM ET

Holy crap. This is just awful. I teach elementary school and the thought of anything like this happening to one of my girls just terrifies me. I think the reason stories like these remain largely untold is because here in the relative safety of the states we don't want to know about the horrors that occur in other places in the world. What we don't understand is that everytime something like this happens it does affect us. We are touched by it because we live on the same planet as this sweet girl and the more we try to turn away and act like its not happening or not our problem we lose one more bit of the humanity we have left in us. Its not that it happened to a little girl in Africa, it's that it happened at all that makes me fear how much more inhumane we can possibly become.

Posted By raquel, los angeles : 4:47 PM ET

Reading this is enraging. What is more enraging is reading about it and not doing anything. It's one thing to feel bad, but we should feel worse if we sit on the sidelines as an observer.

 

I made my $20 donation. No it's not much, but if thousands of people would give even 1/2 that, think of the difference it could make.

Posted By Jacob, Arlington, TX : 4:48 PM ET

Perhaps your next report could be about forced female circumcison which is practiced in parts of Isla mic Africa.

Posted By mick in the UK : 4:57 PM ET

Njeri is right. Corruption is everywhere. I was frustrated by some of it even today here in Congo but then I read about the well respected congressman from my home town going to jail for selling influence and it gives me some perspective.

 

The story of even the recent war in Congo is so complex and secretive, people in other parts of the world generally don't even try to talk about it or understand it. (Darfur is much easier to falsely condense into a 45 second news piece.)

 

I don't claim to fully understand what has happened here in DRC, but I am trying to listen and learn. The recent war has hidden causes and it is about profiteering for a lot of people of various races, creeds and nationalities who like money more than human life. (Like an international cookie jar for illicit profit.) It's about legacies of a brutal colonial/postcolonial history and crazy Cold War era politics.

 

I hope that some will be motivated to real change by the stories presented on CNN. I hope they will be motivated to look deeper and to spread the word, to recognize that the West has played a detrimental role, and that Congolese lives are just as valuable as American ones.

 

As long as we can comfortably stay far enough away from the truth that those in deep suffering are not "the other" but they are part of us- we will not be reconciled. We will at best salve the festering wound with aid donations (not all bad, and not always good). But if we can get serious about justice, build real relationships with people who are poor and who suffer and help find ways to encourage them in their struggle (while also learning from them), allow ourselves to be changed, our frame of vision widened... Then perhaps true healing will begin.

Posted By Brian Becker, Kisangani, DR Congo : 5:05 PM ET

There is no crime more horrible than rape, and raping babies is not barbaric or inhuman ... it's just pure evil. I am not preaching my religion here, but I am at a loss what else to call this. You wonder what kind of lives these rapists have lived. What goes on in their minds, and what drives them to disregard and destroy others existence. All the wondering however, does not cure the malaise that is afflicting Africa. The evil cycle of poverty, ignorance, dictatorship and corruption is at work. Doing the great work that many non-profits are performing in Africa helps to ease the pain for some, but does not reduce the overall suffering, nor does it eradicate this evil cycle. There is one proven way to break this cycle: By breaking one of the links in this cycle, the rest of the links will be destroyed over time. Poverty can't be eradicated first because corrupt officials are in the way. Corruption can't be eradicated because dictators are in the way. Overthrowing dictators is useless, because ignorance will breed other dictators. Only an informed, intellectually capable population can rid themselves of dictatorship, corruption and therefore poverty. To break the devil's back, support organizations that are dedicated to eradication of ignorance ... in Africa and everywhere else.

Posted By Sam Manafi, Lake Oswego, OR : 5:06 PM ET

Nothing can explain or justify the horror of the acts committed so any explanation to that effect cannot go down well. However, I feel it is important to know the whole story. What makes men do such things...the part that is so scary to me is that such stories are so common in war ravaged regions...which means that evil lurks inside most men...given certain circumstances, men, seemingly normal will act upon their most primal instincts, even to the extent of stealing the innocence of a little child...

Posted By Charu, Orlando, FL : 5:10 PM ET

Something is mentally wrong with these people. Are they even human? How could they do such a thing to a little girl, let alone a woman in front of her children. Sick. I can't even imagine the horror those woman and children have to live with.

 

To all the torturers - you are not a man. You are an animal. You are not even an animal. You are filth, dirt. When you die you WILL be going to hell. Thank yourself for that.

Posted By Angela F. Marysville,WA : 5:10 PM ET

Mkangafu and Njeri and all-- Your points are well stated and point to bigger stories needing to be told.

Anderson-- this is your responsibility; to tell the bigger story

All-- we must look ultimately to ourselves an within ourselves to heal our own wounds and those wounds we have created around us. We are now aware of these atrocities and have been for some while. What are we doing to help. Heal ourselves and donate $20 and start talking w your friends about what you have read here. Wear and arm band for protest and awareness. No more witty chit chat until the story has spread and the nation's voice of anger rises for a change.

Posted By Anne Medfrod OR : 5:12 PM ET

Why?

 

I feel revolted, sickened. I want to help. Have already made a donation. But I just can't get my head around the violence - the brutality. Why do people do this?

 

I can understand a moment of rage but not this repeated brutality. What do the perpetrators say?

 

I just keep coming back to - why?

Posted By Cassie Dallas, PA : 5:17 PM ET

This makes my life seem so wonderful and easy in comparison. Truly, truly horrible stuff.

Posted By Emilie, Florham Park, NJ : 5:20 PM ET

I am completely gutted over this story. I feel so helpless when I read things like this. My heart breaks for people under these circumstances.

Posted By Richard Spatafora, NYC, NY : 5:21 PM ET

I know many people say to themselves or out loud "Why doesn't GOD do something about this" and I bet GOD's answer would be "I did...I SENT YOU"!

 

I commend the efforts of those who are working so hard with so little support from the world community of goernment leaders.

 

Can we please abolish the UN once and for all. It is so pathetically useless and corrupt.

Posted By Robert Martinez, Houston, TX : 5:24 PM ET

This is such an unbelievable story. It just makes you want to do something about it as you read the article.

Posted By Miguel Munoz, Addison, IL : 5:27 PM ET

I hope you continue to bring to light the conditions in Africa. Its about time someone did what you all are doing. Thankyou.

Posted By Bonnie S., Grand Rapids MN : 5:29 PM ET

-----------------------------------------------------------------------------

 

 

 

 

 

 

 

-----------------------

 

 

 

 

 

 

 

 

 

 

 

 

--------------------------------------------------------------

Link to comment
Share on other sites

Hastert sorry, but not quitting

 

Rep. Dennis Hastert will not step down as House speaker over the controversy surrounding ex-Rep. Mark Foley, the congressman said during a speech Thursday, explaining "I haven't done anything wrong."

 

"I'm going to run and presumably win in this election, and when I do I expect to run for speaker," he told reporters at his district office outside Chicago.

 

A GOP leadership aide told CNN that Hastert was going to ask former FBI Director Louis Freeh to examine the congressional page system and recommend how to improve the program, but it's unclear if that will happen.

 

The aide later said Hastert was holding off because House Minority leader Nancy Pelosi objected. Pelosi's spokeswoman denied that the congresswoman quashed the move to tap Freeh.

 

"We're looking for a person of high caliber to advise us on the page program," Hastert said during his speech. "I reached out to the Democrat leader and shared with her some of the ideas and we hope to resolve this soon."

 

Hastert has been the subject of fierce criticism since Foley resigned from office Friday after e-mails and lurid instant messages he wrote to a teenage male congressional page became public.

 

However, many GOP leaders have stood by Hastert, saying he should not give up his speakership.

 

In his speech Thursday, Hastert took responsibility for the program, but insisted he learned about the sexually explicit messages Friday when they were released, though he heard about an inappropriate "Katrina e-mail" earlier. A former House staffer has said he told Hastert's office before 2005.

 

"I'm sorry. You know, when you talk about the page issue and what's happened in the Congress, I'm deeply sorry that this has happened," Hastert said. "And the bottom line is that we're taking responsibility because ultimately, as someone has said in Washington before, the buck stops here."

 

Hastert has asked the House ethics committee to look into this matter and the Justice Department, FBI and state of Florida to open criminal investigations, he said, adding that a hotline has been set up for pages and their family members to contact with their concerns.

 

The number is (866) 348-0481.

 

"I don't know who knew what when," Hastert said. "That's why we asked for an investigation."

 

Dozens of House of Representatives members, officers and staff could be subpoenaed in the investigation into Foley's contacts with teenage pages, the head of the House Ethics Committee said Thursday.

 

Rep. Doc Hastings, R-Washington, would not say which staff members would be called on to testify.

 

The committee convened to discuss the Foley matter on Thursday and voted unanimously to form an investigative subcommittee to be headed by Hastings and the committee's ranking Democrat, Rep. Howard Berman.

 

Berman said he expects the investigation to take "weeks, not months."

 

Hastings said the committee approved almost 48 subpoenas.

 

Hastert issued a statement that commended the committee "for moving promptly with an investigation" and said he had instructed his attorney to cooperate with the committee.

 

FBI to interview former Foley aide

 

The FBI will interview a top congressional aide Thursday, the day after he resigned and said he had warned House leaders about Rep. Mark Foley's contacts with teenage pages before 2005, the aide's lawyer said.

 

Kirk Fordham, who resigned as chief of staff to Republican Rep. Tom Reynolds, will be questioned in the FBI's investigation into Foley's Internet correspondence with the pages, attorney Tim Heaphy said.

 

The interview will focus on whether Fordham knew of any possible crimes committed by Foley, Heaphy said.

 

Fordham was the top aide to Reynolds and once held the same job for Foley.

 

Hastert said in his Thursday speech that the investigation will determine if anyone in his staff knew about the messages before 2005.

 

"If somebody didn't let us know, then there's a problem," Hastert said. "And I think the investigation will find that out."

Aide denies he tried to intervene to help Foley

 

In a sharply worded statement issued after his resignation, Fordham denied intervening with the House Page Board on Foley's behalf and dropped a new bombshell: He had notified "senior staff at the highest levels" about concerns with the six-term GOP congressman earlier than 2005.

 

Scott Palmer, Hastert's chief of staff and one person Fordham said he had contacted, issued a terse statement.

 

"What Kirk Fordham said did not happen," he said.

 

Fordham's statement cast doubt on top GOP leaders' statements that they heard nothing of Foley's behavior before last year.

 

Fordham elaborated in an interview with ABC News, saying he told Palmer that Foley was too friendly with the pages, and that Palmer talked to Foley.

 

Hastert's spokesman Ron Bonjean told ABC News, "That [warning] never happened."

 

 

In a statement to CNN, Bonjean said only that "this matter has been referred to the Standards Committee and we fully expect that the bipartisan panel will do what it needs to do to investigate this matter and protect the integrity of the House."

 

Foley, a six-term Florida Republican, resigned Friday after his e-mails to a teenage boy who had served as a congressional page became public -- and as ABC News was about to air more explicit records of instant messages the congressman exchanged with other pages.

 

ABC: Fordham tried to make a deal

 

ABC reported that Fordham offered the network an exclusive on Foley's resignation if it agreed not to air transcripts of the most explicit messages.

 

On Wednesday, citing unnamed GOP sources, it said Fordham had interceded with Republican leaders to keep the full three-member board that oversees the page program from learning about concerns raised by the family of a Louisiana teen.

 

Fordham's former boss, Rep. Reynolds, is chairman of the National Republican Congressional Committee, which is working to keep the GOP in control of the House in November's elections.

 

The scandal has not only rocked the Republican leadership but it has become an issue in Reynolds' upstate New York district just weeks before the vote.

 

"It is clear the Democrats are intent on making me a political issue in my boss's race, and I will not let them do so," Fordham wrote in his resignation letter.

 

Reynolds would not say Wednesday whether he asked Fordham to quit. However, Reynolds said he thought it was "inappropriate" for his chief of staff to negotiate with a news outlet over its coverage. And he said Fordham believed he was becoming a "distraction."

 

ABC also reported that Fordham's associates consider him a scapegoat for Hastert, R-Illinois, who has been sharply criticized for his handling of the issue. But Bonjean, a spokesman for the speaker, said Hastert had no advance knowledge of Fordham's resignation, nor did he demand it.

 

Hastert says he won't fold his tent

 

The resignation came as key conservative House members voiced support for Hastert but questioned how he handled the Foley matter.

 

The call for Hastert's resignation came Tuesday in an editorial on The Washington Times Web site. The editorial charged that "either [Hastert] was grossly negligent ... or he deliberately looked the other way."

 

Several key Republicans issued statements Wednesday supporting Hastert.

 

"I've talked to our members," Hastert told The Chicago Tribune in an interview Wednesday night. "Our members are supportive. I think that [resignation] is exactly what our opponents would like to have happen -- that I'd fold my tent and others would fold our tent and they would sweep the House."

 

"When the base finds out who's feeding this monster, they're not going to be happy," Hastert told the Tribune. "The people who want to see this thing blow up are ABC News and a lot of Democratic operatives, people funded by [liberal activist] George Soros."

http://www.cnn.com/2006/POLITICS/10/05/has...oley/index.html

-------------------------------------------------------------------------------

 

 

 

 

 

 

 

 

 

 

 

 

 

House opens page sex scandal inquiry

 

WASHINGTON - The House ethics committee opened an expansive investigation into the unfolding page sex scandal Thursday, approving nearly four dozen subpoenas for witnesses and documents as House Speaker Dennis Hastert held his ground against pressure to resign.

 

 

"I'm deeply sorry this has happened and the bottom line is we're taking responsibility," Hastert, R-Ill., told a news conference outside his district office.

 

"Ultimately, the buck stops here," the speaker said of the controversy enveloping the House, former Republican Rep. Mark Foley (news, bio, voting record) of Florida and the page program, a venerable institution almost as old as the Congress itself.

 

Hastert's handling of the issue has come under harsh criticism by some fellow Republicans and conservative activists at a time when the GOP is worried about holding onto its congressional majority in the fast-approaching elections Nov. 7.

 

Hastert abruptly changed the tactics he has followed since the scandal broke last week in the wake of the disclosures and Foley's resignation. As recently as Wednesday, the speaker blamed Democrats for the scandal and insisted he had done nothing wrong.

 

"Could we have done it better? Could the page board have handled in better? In retrospect, probably yes," Hastert said. "If it's members of my staff that didn't do the job, we will act appropriately.

 

He said he expected to win re-election to an 11th term in the House. "And when we do I expect to run for speaker."

 

Foley's former chief of staff, Kirk Fordham, said in an interview Wednesday with The Associated Press that he had talked three years ago with top aides in the speaker's office about Foley's behavior with pages.

 

"Kirk Fordham also said just about three or four days ago that he worked for this guy for 10 years and he never did anything wrong," Hastert said Thursday. "So there's a little bit of difference in the testimony or what he said."

 

Shortly after Hastert's press conference, Fordham emerged from an

FBI interview. His lawyer, Timothy Heaphy said the session was productive but that Fordham could not comment on the case.

 

The ethics committee's chairman, Rep. Doc Hastings (news, bio, voting record), R-Wash., said a new subcommittee's investigation "will go wherever our evidence leads us."

 

Asked if the embattled Hastert was among those subpoenaed, Hastings would not comment. Hastings said the subpoenas cover lawmakers and staff as well as appointed officers of the House.

 

Hastert spokesman Ron Bonjean said the speaker has not received a subpoena from the ethics committee. "If the ethics committee asks him to, of course," Bonjean said.

 

The committee's senior Democrat, Rep. Howard Berman (news, bio, voting record) of California, said the investigation should take "weeks, not months."

 

Hastings and Berman will conduct the investigation along with Reps. Stephanie Tubbs Jones, D-Ohio, and Judith Biggert, R-Ill., whose district is next to Hastert's.

 

"The facts will lead us to who, if there is someone, who perhaps did a cover-up," Biggert said.

 

Said Hastert: "Any person who is found guilty of improper conduct involving sexual contact or communication with a page should immediately resign, be fired, or subjected to a vote of expulsion."

 

Hastert was said by officials in advance of the speaker's news conference to have planned to ask former FBI Director Louis Freeh to also examine the page system and make recommendations. But that did not immediately materialize, and Hastert did not broach the name at his news conference.

 

Congressional aides said Hastert called House Minority Leader Nancy Pelosi, D-Calif., to suggest Freeh, but that Pelosi objected.

 

The swift-moving developments came as a furor mounted over the revelations about Foley and his resignation last Friday. Foley checked himself into an alcohol rehabilitation facility in Florida.

 

Negative fallout for Republicans struggling to keep control of Congress was apparent in the latest AP-Ipsos poll, conducted this week after the Foley revelations surfaced.

 

About half of likely voters said recent disclosures of corruption and scandal in Congress will be very or extremely important in their vote next month, and Democrats enjoyed a nearly 2-to-1 advantage as the party better able to fight corruption.

 

Some leading Republicans have publicly blamed Hastert for failing to take action after he was warned about the messages.

 

In Atlanta, meanwhile, former page Tyson Vivyan, now 26, told AP he received sexually suggestive computer messages in 1997, years before the communications exposed last week, from an anonymous sender who turned out to be Foley.

 

Foley's lawyer, David Roth, declined to comment.

 

Hastert announced that a tip line had been activated for people to call if they have information on Foley or any problems with the page program. The number is 866-348-0481.

 

The Justice Department earlier this week ordered House officials to preserve all records related to Foley's electronic correspondence with teenagers. The request for record preservation is often followed by search warrants and subpoenas, and signal that investigators are moving closer to a criminal investigation.

 

Foley, 52, stepped down after he was confronted with sexually explicit electronic messages he had sent teenage male pages. Through his lawyer, he has said he is gay but denied any sexual contact with minors.

http://news.yahoo.com/s/ap/20061005/ap_on_.../congress_pages

------------------------------------------------------------------------------------------

 

 

 

 

Voters say scandals will affect votes

 

WASHINGTON - In yet another hurdle for Republicans, the scandals that have dogged Congress for the past year are prominent in the minds of many voters who say corruption will significantly influence their vote in November.

 

 

With midterm elections less than five weeks away, the latest Associated Press-Ipsos poll found that about half of likely voters say disclosures of corruption and scandal in Congress will be very or extremely important when they enter the voting booth.

 

About two out of three of those voters said they would cast their ballots for Democrats in House races, further complicating the political landscape for Republicans already struggling against negative public perceptions.

 

The poll was conducted this week as House Republican leaders came under increasing pressure to explain what they knew of sexually explicit messages from former Rep. Mark Foley of Florida to teenage pages. Last month, another Republican, Rep. Bob Ney of Ohio, admitted that he accepted trips, meals and other gifts in exchange for legislative favors.

 

In that roiling environment, the poll found that by a margin of nearly 2-to-1 likely voters say Democrats would better combat corruption than Republicans. More troubling to Republicans, likely voters in some key Republican groups were split on whether to trust Democrats or Republicans to clean up corruption.

 

Voter perceptions about corruption underscore a strong sense of dissatisfaction, if not outright anger, toward Congress. And they help explain the pessimism with which some Republicans in and outside Congress now view their chances on Election Day.

 

Among likely voters, 28 percent said they are angry at the Republican leadership in Congress and 35 percent said they were dissatisfied but not angry.

 

Rep. Mike Simpson, R-Idaho, told the Associated Press that Republicans had been somewhat upbeat in early September, believing they would only lose a handful of House seats and still retain their majority. But after Foley's electronic exchanges with teenage boys became public on Friday, Simpson said he now is "not confident" they can keep control of the House.

 

"From Thursday it went (from) fairly confident we were going to keep the majority to a real tossup," he said.

 

The Foley scandal, with its proximity to the elections and its simple set of facts, has sent Republican leaders and GOP candidates on a political detour just as they were preparing their final offensive against Democrats to save control of Congress. Since Friday, the Foley affair has broadened amid questions about who in the GOP leadership had been warned about his behavior.

 

Like other Democrats, Joe Courtney, who is challenging Republican Rep. Rob Simmons of Connecticut, has called for the resignation of House Speaker

Dennis Hastert, R-Ill., over the Foley matter. But he said voters raised the subject without prompting during campaign stops last weekend.

 

"This Congress wasn't exactly held in high regard before this incident," he said. "It has a life of its own."

 

Lawrence Nuccio, a 78-year-old Republican from Glen Cove, N.Y., said he would vote for Democrats for the first time out of frustration with Republican congressional leaders.

 

"I'm a registered Republican, but when I turn around and see them trying to cover up — and that's what they're doing — and try to pass the buck to the Democrats, that's not right," Nuccio said. "You have elected officials who are running the country and you assume are doing the right thing, but they're not."

 

Whether they live in the suburbs or cities or rural areas, likely voters tended to trust Democrats more than Republicans to handle corruption. That didn't necessarily mean they would vote for Democratic candidates, but the results highlighted a vulnerability for Republicans. Even suburban men, traditionally a strong Republican voting bloc, were divided about which party could better address the problem of corruption.

 

Overall, Democrats maintained a 10-percentage point lead over Republicans in House races. Fifty-one percent of likely voters said they would vote for the Democrat in their congressional district; 41 percent said they would vote for the Republican. That's essentially unchanged from last month.

 

The number of adults who say the country is on the wrong track remained virtually unchanged from last month at 64 percent. That's still lower than in August, when it was 71 percent or May when it reached 73 percent.

 

The leading issue among likely voters remained Iraq, followed closely by the economy.

 

But the poll also found that President Bush's efforts to depict the war in Iraq as part of a larger campaign against terrorism and to portray Democrats as weak on national security was not altering the political landscape.

 

Approval of Bush's handling of the war in Iraq was at 37 percent among likely voters, down slightly from 41 percent last month. Bush's rating on handling foreign policy and terrorism also fell slightly, from 47 percent last month to 43 percent this month.

 

Similarly, recent good news on the economic front — from lower gas prices to a rising stock market — did not appear to pierce through the public's downbeat view of the economy. Fifty-six percent of likely voters disapproved of Bush's handling of the economy, compared to 59 percent who held that view last month.

 

The low approval ratings that have dogged the president and Congress were essentially unchanged from last month. Among likely voters, 24 percent approved of the way Congress was handling its job and 39 percent approved of Bush's job performance.

 

While many voters aim their antipathy at Republicans, who control Congress, others blame both parties for refusing to work together.

 

John Hart, a 47-year-old materials manager from Norwalk, Ohio, said he would prefer neither party controlled Congress after next month's elections.

 

"I've become much more cynical about the whole process just because it's no longer about what's your plans for the good of the country, now it's what can we throw at the other side and avoid getting tossed back at us," he said.

 

The poll of 741 likely voters was conducted Monday through Wednesday and has a margin of error of plus or minus 4 percentage points.

 

___

 

AP Manager of News Surveys Trevor Tompson and Associated Press Writers Philip Elliott and Kasie Hunt contributed to this report.

 

___

 

On the Net:

 

Ipsos: http://www.ap-ipsosresults.com

http://news.yahoo.com/s/ap/20061005/ap_on_...blicans_ap_poll

-------------------------------------------------------------------------------------------

 

 

 

 

 

 

 

 

 

 

 

 

 

 

OUTSOURCING SEO SERVICES

I discovered this site when they joined my marketing webrings!!!

You REALLY need to check out their Articles!!!!!!

 

http://www.outsourcingseoservices.com/Sear...on-Articles.php

-------------------------------------------

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

-------------------------------------

Link to comment
Share on other sites

Police: Father says he killed four children

http://www.cnn.com/2006/US/10/06/children....d.ap/index.html

 

Historic Memphis church burns, sparks other fires

http://www.cnn.com/2006/US/10/06/memphis.fire.ap/index.html

 

Donors pitch in to help grieving Amish community

http://www.cnn.com/2006/US/10/06/amish.donations/index.html

 

----------------

Oct 6 2006

1158>>34

41>>76

----------------

 

Getting lost in a corn maze

http://www.cnn.com/2006/TRAVEL/DESTINATION...e.ap/index.html

 

Family friend: Amish girl asked to be shot to save others

http://www.cnn.com/2006/US/10/06/amish.girls.reut/index.html

 

GOP prods Dems over Foley scandal

http://www.cnn.com/2006/POLITICS/10/06/fol...lout/index.html

 

Report: Thousands wrongly on terror list

http://news.yahoo.com/s/ap/20061007/ap_on_...rror_watch_list

 

Chemicals, fire force N.C. evacuation

http://news.yahoo.com/s/ap/20061007/ap_on_...fire_evacuation

 

End User Buy-In And How To Guarantee A Good Software Implementation

http://www.webpronews.com/expertarticles/e...ementation.html

 

Why Website Globalization Should Matter To International Businesses

http://www.webpronews.com/expertarticles/e...Businesses.html

 

Strategies For Preventing Comment Spam

http://www.webpronews.com/expertarticles/e...ommentSpam.html

 

Google May Be In Talks To Buy YouTube

http://www.webpronews.com/blogtalk/blogtal...BuyYouTube.html

 

Austin Paper Offers Blogs To Local Politicos

http://www.webpronews.com/topnews/topnews/...lPoliticos.html

 

InfiniBand meets storage networking

http://news.com.com/2100-1015_3-6123685.ht...5&subj=news

 

Tech Politics Podcast: E-mail and its (political) discontents

http://news.com.com/2324-11424_3-6123724.h...4&subj=news

 

Working out of a 'third place'

http://www.usatoday.com/life/2006-10-04-third-space_x.htm#

 

Weblo's world: a crazy online economy

http://news.com.com/2061-12572_3-6123728.h...8&subj=news

 

Weblo's World

http://www.weblo.com/

 

Google ropes Microsoft, Yahoo into copyright lawsuit

http://news.com.com/2061-10803_3-6123730.h...0&subj=news

 

 

Angry Grocery Store Employee Vents

http://www.caffeinemarketing.com/videos/an...employee-vents/

 

Danny gets all worked up about NL search

http://www.threadwatch.org/node/9179

 

3 steps to great search engine knowledge

http://www.threadwatch.org/node/9180

 

Game On for Branding

http://www.marketingshift.com/2006/10/game...or-branding.cfm

 

LOST has TV's Answers To Advertisers Woes

http://www.marketingshift.com/2006/10/lost...advertisers.cfm

 

Search: Innovation Vs. Inertia

http://www.marketingshift.com/2006/10/sear...-vs-inertia.cfm

 

MySpace Founder Claims Foul Play on News Corp. Deal

http://www.marketingpilgrim.com/2006/10/my...ul-play-on.html

 

SEMPO Expands Resources to In-House Search marketers

http://www.marketingpilgrim.com/2006/10/se...o-in-house.html

 

Welcome Search Marketing Standard!

http://www.marketingpilgrim.com/2006/10/we...g-standard.html

 

Social Networking And Safety

http://www.securitypronews.com/news/securi...gandSafety.html

 

Social Networker, Meet Identity Thief

http://www.securitypronews.com/news/securi...ntityThief.html

 

Gang Jailed In Russia For DDoS Blackmail

http://www.securitypronews.com/news/securi...SBlackmail.html

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

--------------------------------------------------

Link to comment
Share on other sites

Lawmakers face scrutiny in House probe

http://news.yahoo.com/s/ap/20061008/ap_on_...ey_ethics_probe

 

Amish mourn gunman in school rampage

http://news.yahoo.com/s/ap/20061008/ap_on_...school_shooting

 

How Not To Start A Social Network

http://blog.coolz0r.com/2006/10/07/how-not...social-network/

 

A Big Thank You To Michael Pollock From Solostream Webstudio

http://www.smallbusinessbranding.com/576/a...ream-webstudio/

 

Searchmash - No failure at all.

http://www.threadwatch.org/node/9181

 

MSN Adcenter - Cross Browser Testing What's That?

http://www.threadwatch.org/node/9188

 

The New Small Business Branding

http://www.entrepreneurs-journey.com/550/t...iness-branding/

 

http://smallbusinessbranding.com/

 

 

Symantec ID Protection Launching Monday

http://www.securitypronews.com/news/securi...hingMonday.html

 

Microsoft, Mozilla Ready New Browsers

http://www.webpronews.com/topnews/topnews/...ewBrowsers.html

 

10 'seriously cool' workplaces

http://news.com.com/2061-11200_3-6123585.h...5&subj=news

 

GoogleTube would keep the lawyers busy

http://news.com.com/2061-11199_3-6123756.h...6&subj=news

 

 

How not to raise a spoiled rotten brat

The world's most powerful women discuss how to raise financially responsible children in an atmosphere of extreme affluence.

http://money.cnn.com/2006/10/06/magazines/...dex.htm?cnn=yes

 

Space debris punched hole in shuttle

http://www.cnn.com/2006/TECH/space/10/06/s...e.ap/index.html

 

Mars images show rover perched on crater

http://www.cnn.com/2006/TECH/space/10/06/v...ages/index.html

 

Synchronizing sex: Time to harmonize your hormones

http://www.cnn.com/2006/HEALTH/10/04/sex.health/index.html

 

Guidelines forged to ban unhealthy items from schools

http://www.cnn.com/2006/EDUCATION/10/06/sc...s.ap/index.html

 

Lawyer: Zoloft tainted murder confession by boy, 12

http://www.cnn.com/2006/LAW/10/06/zoloft.k...s.ap/index.html

 

Starship Enterprise model boldly sold for $576,000

http://www.cnn.com/2006/SHOWBIZ/TV/10/07/t...l.ap/index.html

 

Microsoft warns software pirates

http://www.cnn.com/2006/TECH/ptech/10/05/m...reut/index.html

 

Mexico: Plan for border fence 'deplorable'

http://www.cnn.com/2006/WORLD/americas/10/...e.ap/index.html

 

North Carolina chemical plant fire evacuees going home

http://www.cnn.com/2006/US/10/07/plant.fire.ap/index.html

 

GOP campaign chief: Sorry for not catching Foley's 'lies'

http://www.cnn.com/2006/POLITICS/10/07/fol...lout/index.html

 

Bushes christen dad's nuclear-powered aircraft carrier

http://www.cnn.com/2006/US/10/07/bush.chri...g.ap/index.html

 

Castro Is Reported to Have Cancer

U.S. intelligence reports now say the Cuban leader's condition appears terminal, government officials tell TIME

http://www.time.com/time/world/article/0,8...00.html?cnn=yes

 

Ground beef recalled due to suspected E. coli

http://www.cnn.com/2006/US/10/07/beef.recall.ap/index.html

 

Amish mourn gunman who killed 5 girls'

http://www.cnn.com/2006/US/10/07/amish.mou...s.ap/index.html

 

 

---------------------

Saturday OCT 6 2006

632.34

41.76

------------------------

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

----------------------------------------------------------------------

Link to comment
Share on other sites

I found these game pages on the Silicon Travel computer at the Nags Head beach house we stayed at from Oct 6 through 9.

 

http://www.ugoplayer.com/games/wildpistol.html

http://www.actionflash.com/

 

Making millions on budget caviar

http://money.cnn.com/popups/2006/fsb/cavia...ex.html?cnn=yes

 

Is now a good time to refinance?

Plus other reader questions, on Internet savings accounts and on lowering your property tax bill.

http://money.cnn.com/2006/10/06/pf/saving/...dex.htm?cnn=yes

 

Bulls to keep running, for now

Upbeat investors have pushed the Dow to a record and the S&P 500 to a 5-1/2 year high. The momentum should continue - at least for another week.

http://money.cnn.com/2006/10/08/markets/su...dex.htm?cnn=yes

 

CBS gives 'Smith' the boot

http://www.cnn.com/2006/SHOWBIZ/TV/10/06/t...o.ap/index.html

 

North Korea and Iran Crises May Force the U.S. to Choose

Analysis: As multilateral diplomacy falters on both fronts, the Bush Administration may be forced to resolve its regime change vs. engagement debate

 

North Korea and Iran Crises May Force the U.S. to Choose

Analysis: As multilateral diplomacy falters on both fronts, the Bush Administration may be forced to resolve its regime change vs. engagement debate

http://www.time.com/time/world/article/0,8...1543357,00.html

 

GOP campaign chief: Sorry for not catching Foley's 'lies'

http://www.cnn.com/2006/POLITICS/10/07/fol...lout/index.html

 

Boater killed during Miami Columbus Day regatta

http://www.cnn.com/2006/US/10/08/boat.crash.ap/index.html

 

The end of a revolution

http://www.cnn.com/2006/POLITICS/10/08/cov...y.tm/index.html

 

NATO chief warns of Afghan tipping point

http://news.yahoo.com/s/ap/20061008/ap_on_re_as/afghanistan

 

Japan, China: N. Korea test unacceptable

http://news.yahoo.com/s/ap/20061008/ap_on_.../koreas_nuclear

 

Iran refuses to suspend atomic work

http://news.yahoo.com/s/nm/20061008/ts_nm/nuclear_iran_dc

 

AP: Allen didn't disclose stock options

http://news.yahoo.com/s/ap/20061008/ap_on_...len_in_business

 

Fran Kelly, Arnold Worldwide, and Ken Romanzi of Ocean Spray

http://ana.blogs.com/maestros/2006/10/fran_kelly_arno.html

 

The Battle of the Bairds

http://ana.blogs.com/maestros/2006/10/the_battle_of_t.html

 

Greg Stuart, President and CEO of the IAB

http://ana.blogs.com/maestros/2006/10/greg_stuart_pre.html

 

PIAS Music First

http://blog.coolz0r.com/2006/10/08/pias-clips/

 

Meet Or Delete?

http://blog.coolz0r.com/2006/10/08/meet-or-delete/

 

Google Blog Search Annouces Pinging Service

http://www.hawaiistreets.com/seoblog/index.php?itemid=1064

 

Retro Roundup: One Year Ago on Blog SEO

http://www.hawaiistreets.com/seoblog/index.php?itemid=1065

 

Making the Transition from Bloglines to Google Reader

http://www.hawaiistreets.com/seoblog/index.php?itemid=1066

 

IE7 Launching in October

http://www.threadwatch.org/node/9198

 

Rumor: Google Cancels Click to Call (or Their Blog was Hacked)

http://www.threadwatch.org/node/9199

 

ShoeMoney The New King Of Link Baiting ?

http://www.threadwatch.org/node/9212

 

The New Small Business Branding *

http://www.entrepreneurs-journey.com/550/t...iness-branding/

 

Congratulations To b5media For Raising US$2 Million

http://www.entrepreneurs-journey.com/551/c...ng-us2-million/

 

Cisco CCNP / BSCI Exam: ISIS Hellos And Adjacencies

http://www.webpronews.com/expertarticles/e...djacencies.html

 

Adobe Includes Drag And Drop Flash Support In New Contribute Release

http://www.webpronews.com/expertarticles/e...uteRelease.html

 

Google, EBay Hang Up Click-to-Call

http://www.webpronews.com/topnews/topnews/...licktoCall.html

 

A 3D system for safer flights

http://news.com.com/2300-1008_3-6123506-1....6&subj=news

 

'Star Trek' lives, in upstate New York

http://news.com.com/2009-1025_3-6123152.ht...2&subj=news

 

Been here at Nags Head for a couple days, time to catch up on Micro Persuasion and TechCrunch articles dating from Friday Oct 6 to today Oct 8.

 

Blue Dot Launches Partner Program, Adds DOS’s MZ to Advisory Board

http://www.techcrunch.com/2006/10/06/blue-...advisory-board/

 

Zoho Adds Single Sign On Across Online Suite

http://www.techcrunch.com/2006/10/07/zoho-...s-online-suite/

 

AllofMP3 Outsources Marketing to U.S. Government

http://www.techcrunch.com/2006/10/07/allof...-us-government/

 

Strange Things Afoot at the Google Blog

http://www.techcrunch.com/2006/10/07/stran...he-google-blog/

 

 

 

 

Kudos to the MSM for Giving Blogs Credit When it's Due

http://www.micropersuasion.com/2006/10/kudos_to_the_ms.html

-------------------------

 

 

 

Completely Unsubstantiated Google/YouTube Rumor

http://www.techcrunch.com/2006/10/06/compl...eyoutube-rumor/

-------------------------

 

 

 

 

 

 

 

Ice Rocket Adds Free Blog Stats Service

http://www.micropersuasion.com/2006/10/ice_rocket_adds.html

 

THE ICEROCKET BLOG TRACKER

http://tracker.icerocket.com/

 

 

 

 

 

 

 

 

links for 2006-10-07

http://www.micropersuasion.com/2006/10/lin...or_20061_6.html

 

P&G's Chairman of the Board, President, and Chief Executive: AG Lafley

http://ana.blogs.com/maestros/2006/10/pgs_ag_lafley.html

 

 

 

Older Demos Get Social

http://www.mediaweek.com/mw/news/recent_di...t_id=1003221208

------------------------------

 

 

 

 

 

 

Send the elevator directly to your floor

http://www.lifehacker.com/software/travel/...loor-205918.php

 

 

 

 

STUMP THE GEEKS

http://www.newsobserver.com/business/technology/stump_geeks

----------------------------------

 

10 tips to avoid, handle computer trouble

http://www.newsobserver.com/306/story/491192.html

----------------------------------

 

 

Public relations firms growing nationwide

http://www.newsobserver.com/104/story/495067.html

----------------------------------

 

 

 

 

 

 

 

NY Times Live-Blogs the Baseball Playoffs

http://www.micropersuasion.com/2006/10/ny_times_livebl.html

 

 

 

The Web 2.0 Toolbar *

http://www.web20toolbar.com/

 

 

Top web videos *

http://www.purevideo.com/

 

 

Outside innovation blog ****

http://outsideinnovation.blogs.com/

 

 

Giving the Heave-Ho in an Online Who’s Who

http://www.nytimes.com/2006/10/08/weekinre...amp;oref=slogin

 

 

 

 

 

Google News Releases Guidelines

http://www.micropersuasion.com/2006/10/google_news_rel.html

 

links for 2006-10-06

http://www.micropersuasion.com/2006/10/lin...or_20061_5.html

 

Video Games Now a Social Experience

http://adage.com/digital/article.php?article_id=112303

 

Technorati Daily Vlog

http://technorati.com/weblog/2006/10/129.html

 

OPML Generator

http://www.downes.ca/cgi-bin/xml/make_opml.cgi

 

CMO Strategy

http://adage.com/cmostrategy/article?article_id=112246

 

Live Blogging the ANA

http://www.micropersuasion.com/2006/10/live_blogging_t.html

 

 

 

 

 

 

ANA CEO: Advertising is 2.5% of the US Economy

 

Bob Liodice, CEO of the ANA, is up first at the ANA Annual Conference. He talked a lot about how technology is reinventing marketing. However, the big nugget was this: according to an ANA study, advertising accounts for 2.5% of the US economy. It influences 21M jobs (15% of the US total).

 

Wow. That's a heckuva lot of money. The question that popped up in my mind is to what lengths will the ad industry go to protect that huge pile of money when the effectiveness of TV advertising is eroding. Further, how much of it is going to divert from traditional media into the citzen's media. Small dollars for marketers is big dollars for individuals who are creating content.

http://www.micropersuasion.com/2006/10/ana_ceo_adverti.html

------------------------------------------

 

 

 

 

 

Washington Post Allows Comments on All Stories

http://www.micropersuasion.com/2006/10/washington_post.html

------------------------------------------

 

 

 

Washingtonpost.com Allows Comments Site-wide

http://publications.mediapost.com/index.cf...31&p=114134

 

 

 

 

Pew Chronicles the History of the Web 2.0 Buzzword

http://www.micropersuasion.com/2006/10/pew_chronicles_.html

 

 

 

Ad Exec: The Nice and Funny Finish First

http://www.micropersuasion.com/2006/10/ad_exec_the_nic.html

 

 

 

 

FreshBooks invoicing reports how you stack up

http://www.techcrunch.com/2006/10/05/fresh...w-you-stack-up/

 

 

Use Case: How Companies Can Use Photosharing Correctly

http://www.techcrunch.com/2006/10/06/use-c...ring-correctly/

 

 

 

 

 

 

 

 

 

Bloglines Has Lost its Way

http://www.micropersuasion.com/2006/10/bloglines_has_l.html

 

 

Google Corporate Block Gets Hacked

http://www.micropersuasion.com/2006/10/google_corporat.html

 

 

Will Powerset Pull a Google?

http://www.techcrunch.com/2006/10/05/will-...-pull-a-google/

 

Google Presents Code Search

http://www.techcrunch.com/2006/10/05/googl...ts-code-search/

 

Wikia’s Facebook-like College Wikis

http://www.techcrunch.com/2006/10/05/wikia...-college-wikis/

 

 

 

CAPS Takes “Wisdom of the Few” To Stock Picking

http://www.techcrunch.com/2006/10/05/caps-...-stock-picking/

 

 

Completely Unsubstantiated Google/YouTube Rumor

http://www.techcrunch.com/2006/10/06/compl...eyoutube-rumor/

 

 

 

 

WSJ reports Google and YouTube are in acquisition talks

http://www.techcrunch.com/2006/10/06/wsj-r...-talks-as-well/

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

-----------------------------------------------------------

Link to comment
Share on other sites

North Korea claims successful nuclear weapons test

http://www.cnn.com/2006/WORLD/asiapcf/10/0...test/index.html

 

Sixth 2006 Nobel goes to American

http://www.cnn.com/2006/WORLD/europe/10/09...s.ap/index.html

 

Report: Foley warned in 2000

http://www.cnn.com/2006/POLITICS/10/09/con...s.ap/index.html

 

Nuke test yields market jitters

Asia markets rattled by news from N. Korea, overshadows multi-billion dollar bank deal and reported Cablevision offer.

http://money.cnn.com/2006/10/09/markets/st...dex.htm?cnn=yes

 

Lettuce recalled over E. coli fears

http://www.cnn.com/2006/HEALTH/10/08/taint...e.ap/index.html

 

Gas tumbles, but don't get used to it

Lundberg Survey: Pump prices fall nearly 15 cents a gallon, but colder weather will drive them back up.

http://money.cnn.com/2006/10/08/news/econo...dex.htm?cnn=yes

 

Is now a good time to refinance?

Plus other reader questions, on Internet savings accounts and on lowering your property http://money.cnn.com/2006/10/06/pf/saving/...dex.htm?cnn=yes

 

A Nuclear Nightmare Comes True

With North Korea claiming a successful nuclear weapons test, its neighbors and the U.S. must figure out how to respond

http://www.time.com/time/asia/news/article...00.html?cnn=yes

 

PNC to acquire Mercantile for $6 billion

Cash, stock deal becomes latest consolidation in regional banking industry, merger should be completed in early 2007.

http://money.cnn.com/2006/10/09/news/compa...dex.htm?cnn=yes

 

Artificial turf taking root with high schools

http://www.cnn.com/2006/EDUCATION/10/08/tu...p.ap/index.html

 

Sheryl Crow: Cancer will change my music

http://www.cnn.com/2006/HEALTH/10/06/crow.cancer/index.html

 

U.S. calls for sanctions against North Korea

http://www.cnn.com/2006/WORLD/asiapcf/10/0...test/index.html

 

Woman wants to 'unadopt' troubled boy

http://www.cnn.com/2006/LAW/10/09/unadoption.ap/index.html

 

Shivering Alaskans to Hugo Chavez: Keep your oil

http://www.cnn.com/2006/US/10/09/alaska.oi...z.ap/index.html

 

Bells toll in memory of Amish shooting victims

http://www.cnn.com/2006/US/10/09/amish.sho...g.ap/index.html

 

Poll: About half think Hastert should resign

http://www.cnn.com/2006/POLITICS/10/09/has...poll/index.html

 

Aide: Congressman learned of Foley e-mail in 2000

http://www.cnn.com/2006/POLITICS/10/09/kol...oley/index.html

 

Google to buy YouTube for $1.65 billion

Search engine leader looks to bulk up in the burgeoning online video market.

http://money.cnn.com/2006/10/09/technology...dex.htm?cnn=yes

 

North Korea's Teflon Dictator

http://www.time.com/time/asia/covers/50104...ry.html?cnn=yes

 

Student, 13, fires assault rifle in Missouri school

http://www.cnn.com/2006/US/10/09/missouri....l.ap/index.html

 

Tick. Tick. Beware the mortgage time-bomb

That ridiculously low-rate ARM seemed like such a good idea at the time. But now, payments will be coming due in a big, big way.

http://money.cnn.com/2006/10/09/real_estat...dex.htm?cnn=yes

 

Kids put their own stamp on school fundraising

http://www.cnn.com/2006/EDUCATION/10/09/sc...s.ap/index.html

 

Art teacher, school spar after complaints about nude artwork

http://www.cnn.com/2006/EDUCATION/10/08/ar...d.ap/index.html

 

Temporary innsanity: Try your hand at innkeeping

http://www.cnn.com/2006/TRAVEL/ADVISOR/10/...ping/index.html

 

 

 

 

 

West Texas pool offers rare desert diving

 

TOYAHVALE, Texas (AP) -- It's certainly not the first place you think of when you want to go diving. In fact, it may be the last.

 

Way out in arid West Texas, surrounded by the tumbleweeds and cactus you expect to find in this part of the country, Balmorhea State Park offers the unusual opportunity to do a little scuba diving in the Chihuahuan Desert.

 

"It's rare; there are not this many places around this little oasis out in the desert," said scuba diving instructor Bill Murrill, who regularly brings his class on the 2 1/2-hour drive from Carlsbad, New Mexico.

 

The oasis is located just south of Pecos, about 200 miles from El Paso near the foothills of the Davis Mountains. In addition to the huge 3 1/2-million gallon L-shaped pool that takes up nearly 2 acres, there's a concession building, bath houses and a hotel built during the New Deal public works projects of the Great Depression.

 

The limestone and adobe buildings, with red tile roofs and wooden portals, were built by Company 1856 of the Civilian Conservation Corps in a Spanish colonial style of architecture.

 

But the big draw is the water.

 

The limestone-ringed pool is filled by a continual flow from the San Solomon Spring, named by Mexican farmers who dug the first irrigation canals for their crops. Native American artifacts surround the watering hole.

 

The pool is good for swimming as well as diving, offering a 3-foot shallow end for the kids and a 25-foot deep end with a high-dive for adults and divers.

 

The crystal clear water is a constant low- to mid-70s, a mild relief in an area where summertime highs typically top 100 degrees.

 

An estimated 24 million gallons flow through the pool each day, supporting a varied aquatic ecosystem, ranging from tiny tetra fish to foot-long catfish.

 

"Getting to see the fish up close and personal is the best," said scuba diver Anne Strait of Carlsbad.

 

The fish are used to hand-feeding. When it's time to eat, the two-inch tetras create a shimmering cloud as they swarm around swimmers and divers.

 

Timid hubcap-sized water turtles slink at the grassy bottom, occasionally swimming to the surface. Dozens of black catfish swim lazily, their dark silhouettes almost resembling circling sharks.

 

A rare site is the multicolored endangered pupfish that keeps to the grasses and mossy rocks. Crawfish and water snails are found throughout the bottom.

 

"Wonderful, way wonderful," said Derrick Bendixsen, 19, also of Carlsbad. "You look around, there are fish everywhere and you're in this huge pool."

 

They're all easy to see in the clear, unclouded water. Looking up from the bottom, sunlight sparkles into the deep blue color, making it look like aqua Caribbean waters. Looking through the pool from underwater, you can see 100 feet across.

 

Strait said the clarity is better than other diving hotspots.

 

"We were in the (Florida) Keys last week, and the visibility was nonexistent," she said.

 

Another big selling point for visitors is the remote location.

 

While park superintendent Tom Johnson said about 200,000 people visit each year, the park -- and especially the surrounding landscape -- never seem crowded.

 

"The solitude, man, the solitude," Bendixsen said.

http://www.cnn.com/2006/TRAVEL/DESTINATION...t.ap/index.html

----------------------------------------------------

 

 

 

 

 

 

 

 

Universe might be pill-shaped

http://www.cnn.com/2006/TECH/space/10/09/u...pill/index.html

 

Greece hopeful museum will house Elgin marbles

http://www.cnn.com/2006/TECH/science/10/09...s.ap/index.html

 

Lettuce company retrieves nearly all suspect greens

http://www.cnn.com/2006/HEALTH/10/08/taint...e.ap/index.html

 

Woman charged with using baby as weapon

http://www.cnn.com/2006/LAW/10/09/baby.weapon.ap/index.html

 

Doc suspected in wife's cyanide death nabbed in Cyprus

http://www.cnn.com/2006/LAW/10/09/cyanide....h.ap/index.html

 

Can Internet communication sustain us?

http://www.cnn.com/2006/TECH/internet/10/0...s.ap/index.html

 

Report: Kids need more time for play

http://www.cnn.com/2006/HEALTH/parenting/1...y.ap/index.html

 

 

 

Google to buy YouTube for $1.65 billion

Search engine leader looks to bulk up in the burgeoning online video market.

http://money.cnn.com/2006/10/09/technology...dex.htm?cnn=yes

 

The Politics of the Bomb

North Korea's nuclear test shifts the debate back to national security, still perceived as Bush's strength. But having the world afire on your watch has its drawbacks

http://www.time.com/time/world/article/0,8...00.html?cnn=yes

 

Most Americans think tax distribution unfair

Survey by Money Magazine and ICR shows Democrats and Independents show highest levels of discontent with current system.

http://money.cnn.com/2006/09/27/pf/moneyic...dex.htm?cnn=yes

 

Why Facebook matters

It's not just for arranging dates. And it's not just another social network. Facebook offers sophisticated tools for maintaining social relationships.

http://money.cnn.com/2006/10/06/magazines/...dex.htm?cnn=yes

 

Unknown Frequencies

http://blog.coolz0r.com/2006/10/09/unknown-frequencies/

 

Google Buys YouTube

http://blog.coolz0r.com/2006/10/09/google-buys-youtube/

 

Mobile on the Mind: New Mobile Services from Cingular, Microsoft and JaJah (Jawho?)

http://searchviews.com/archives/2006/10/mobile_on_the_m.php

 

Musical Guerrilla

http://blog.coolz0r.com/2006/10/10/musical-guerrilla/

 

'Pulse' DVD Release Promoted With Cryptic Belgian Site

http://www.adrants.com/2006/10/pulse-dvd-r...h-cryptic-b.php

 

Retro Roundup: One Year Ago on Blog SEO

http://www.hawaiistreets.com/seoblog/index.php?itemid=1067

 

Washington Post : Our largest driver of traffic is Matt Drudge

http://www.threadwatch.org/node/9214

 

Google Buys YouTube for $1.65 BILLION

http://www.threadwatch.org/node/9230

 

Google's YouTube Strategy

http://www.marketingshift.com/2006/10/goog...be-strategy.cfm

 

Advertise On MarketingShift

http://www.marketingshift.com/2006/10/adve...ketingshift.cfm

 

Mobiles Compete With IPod, XM

http://www.marketingshift.com/2006/10/mobi...ith-ipod-xm.cfm

 

Target Audience Should Define Your Marketing Channel

http://www.marketingpilgrim.com/2006/10/ta...efine-your.html

 

New Prizes Added to SEM Scholarship Contest

http://www.marketingpilgrim.com/2006/10/ne...cholarship.html

 

Cingular Partners with Tellme for Enhanced 411

http://www.marketingpilgrim.com/2006/10/ci...tellme-for.html

 

Ingenio to Provide Pay Per Call to Windows Mobile Search

http://www.marketingpilgrim.com/2006/10/in...er-call-to.html

 

Google Buys YouTube - Confirmed

http://www.marketingpilgrim.com/2006/10/go...-confirmed.html

 

Make A Linux Home Data Server Of An Old PC

http://www.webpronews.com/expertarticles/e...rofanOldPC.html

 

What To Look For When Buying Resell Rights Products

http://www.webpronews.com/expertarticles/e...tsProducts.html

 

Mac OS X Internals Review

http://www.webpronews.com/expertarticles/e...nalsReview.html

 

Configuring An Access Server

http://www.webpronews.com/expertarticles/e...cessServer.html

 

Microsoft Revokes MVP Status For AdWare Bundling

http://www.webpronews.com/blogtalk/blogtal...reBundling.html

 

A List Of Amazon S3 Backup Tools

http://www.webpronews.com/blogtalk/blogtal...ackupTools.html

 

GooTube Looking More Likely

http://www.webpronews.com/blogtalk/blogtal...MoreLikely.html

 

Google Acquires YouTube For $1.65

http://www.webpronews.com/blogtalk/blogtal...Tubefor165.html

 

Target Audience Should Define Your Marketing Channel

http://www.webpronews.com/blogtalk/blogtal...ingChannel.html

 

Google Book Scans Boosting Sales

http://www.webpronews.com/insiderreports/s...stingSales.html

 

Pew: Web 2.0 Is Web 1.0

http://www.webpronews.com/insiderreports/m...b20IsWeb10.html

 

Sour Grapes MySpace Suit Dismissed

http://www.webpronews.com/topnews/topnews/...tDismissed.html

 

Microsoft, Blinkx To Team Up

http://www.webpronews.com/topnews/topnews/...kxtoTeamUp.html

 

MySpace Grows Up, Helps Darfur

http://www.webpronews.com/topnews/topnews/...elpsDarfur.html

 

It's Official: Google Buys YouTube

http://www.webpronews.com/topnews/topnews/...uysYouTube.html

 

RC2 Review Bodes Poorly For Vista

http://www.webpronews.com/topnews/topnews/...lyForVista.html

 

Will GoogleTube Be Announced This Week?

http://www.techcrunch.com/2006/10/09/will-...nced-this-week/

 

Google, YouTube sign more separate deals; NYT says acquisition announcement could come tonight

http://www.techcrunch.com/2006/10/09/googl...separate-deals/

 

Sequoia could take $480 million from Google/YouTube deal

http://www.techcrunch.com/2006/10/09/sequo...leyoutube-deal/

 

Is Fox a Factor in the Google/YouTube Deal?

http://www.techcrunch.com/2006/10/09/is-fo...leyoutube-deal/

 

Google Has Acquired YouTube

http://www.techcrunch.com/2006/10/09/googl...quired-youtube/

 

Put an RSS Ticker on Your Desk

http://www.micropersuasion.com/2006/10/put_an_rss_tick.html

 

Mister Tipster RSS Display

http://www.uncrate.com/men/gear/computer-p...play-006544.php

 

Social Network Advertising to Top $850M in 2010

http://www.micropersuasion.com/2006/10/social_network_.html

 

Google-YouTube is Done - Who Cares

http://www.micropersuasion.com/2006/10/googleyoutube_i.html

 

The Day the Entire World Gets RSS

http://www.micropersuasion.com/2006/10/the_day_the_ent.html

 

Brand Engagement is a Myth, Like Bigfoot

http://www.micropersuasion.com/2006/10/brand_engagemen.html

 

Internet deals of the damned

http://news.com.com/2100-1030_3-6124131.ht...1&subj=news

 

Video site buying spree in the offing?

http://news.com.com/2100-1030_3-6124137.ht...7&subj=news

 

Perspective: OK, so Eric Schmidt is a moron

http://news.com.com/2010-1030_3-6124144.ht...4&subj=news

 

YouTube may add to Google's copyright worries

http://news.com.com/2100-1030_3-6124149.ht...9&subj=news

 

Salesforce.com CEO: Customization is king

http://news.com.com/2100-1012_3-6124153.ht...3&subj=news

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

-----------------------------------------------

Link to comment
Share on other sites

Hastert: Anyone hiding page issue leaves

http://news.yahoo.com/s/ap/20061010/ap_on_.../congress_pages

 

Winter heating bills likely to be lower

http://news.yahoo.com/s/ap/20061010/ap_on_.../winter_heating

 

China: N. Korea faces 'punitive actions'

http://news.yahoo.com/s/ap/20061010/ap_on_re_as/un_nkorea

 

 

 

 

 

User Generated Content Reports

 

Well it seems that User Generated Content, also known as UGC, will be making some leaps and bounds over the next few years as a new report from In Stat was released yesterday. The report shows that primarily due to an influx in advertising dollars being spent, we will see not only a boost in UGC but the profits that will accompany it.

 

The primary source of advertising revenue generated from this websites will include banne ads, embedded video ads (which Google Adsense recently employeed), and branded channels. The leaders in UGC included both Myspace and YouTube (which was bought by Google yesterday). Yahoo! ranked as the top online video viewing site followed closely by MySpace and YouTube in third.

 

It goes to show you that YouTube, although it is often regarded as the cream of the crop in the online video viewing world there is still much more competition out there for Google’s new buy.

http://www.caffeinemarketing.com/online-ma...ontent-reports/

--------------------------------------------------

 

 

 

 

 

 

Beware Of Malware-Infected Blogs

 

Internet users and blog-browsing addicts beware! As weblogs come free and are quite easy to use, they continue to gain popularity.

 

Hence, criminals operating on the Internet are becoming more aware and are taking advantage of the use of these online personal journals to ensnare unwitting victims. Not long ago, spyware and malware were spread mostly through email and file-sharing, and system infection was prevented by spam blockers and email scanners. Nowadays, clicking on a seemingly harmless link can make you vulnerable to those with shady intentions in an instant.

 

A common practice of computer crooks involves making up phony weblogs that look harmless or genuine. They then embed viral codes or keylogging programs within the site, and send out the blog's url address through spam e-mail, chat rooms or instant messenger. Even innocent blogs that allow comments that are not moderated may fall be victimized through comment spam leading to infected blogs. The trick lies in convincing the potential victim to click on a link that activates the malware embedded in the blog site, or leading them to input valuable information within the fraudulent blog, such as credit card details and account passwords, which the keylogging program then records and automatically sends to the site owner.

 

In computer and information technology, "malware" is a term that generally refers to software that is intended by the creator to cause damage or break into a computer system, often without the knowledge or informed assent of the owner. The different types of malware include computer viruses, Trojan horses, adware, worms, and spyware. On a more specific level, spyware is a type of malware that is primarily used for profit. Produced commercially, these programs are used for collecting information about the users of a computer system. It does this by activating pop-up advertisements, as well as changing the normal activity of a system's web browser in such a way that the creator of the spyware benefits financially.

 

A typical sign that a spyware is in effect, is when a standard search engine query is redirected to a different page filled with paid-for ads. A certain type of spyware, at times referred to as stealware, does as its name implies; it steals from a genuine business or website owner by overwriting relevant marketing codes, such that the income value goes to the spyware author instead. Malware can also be used to thieve directly from the infected computer's user, by installing keyloggers that record specific keystrokes as the user types in passwords, or other valuable information like credit card numbers. The malicious program then sends this information to the spyware creator, and that's how the stealing begins.

 

In the case of a malware-infected blog, the site itself deceitfully serves as host to the malicious program. The setup is one that often allows malware to get past detection and filtering systems unnoticed. Furthermore, having a somewhat permanent place in the world wide web, it is always accessible to Internet users--all they have to do is click on an active link to be lured into the trap. As such, it posts a greater danger to those who are unaware that malware-infected blogs abound and how they can become victims.

 

Today, there may be hundreds of these malware-infected blogs that still continue to spread malicious software. The spread of these malware and spyware infected blogs may be due in part to the increased availability of malware and spyware to online crooks. Recent reports have it that certain search engines like Google are dealing with exposure of a special search capability in their system that allows end-users to locate and download malware files on the web. This feature was previously hidden and served as a device utilized and known only to security research and anti virus companies. The bad news is, these supposedly secreted features are by now known to hackers and profiteering Internet criminals. They don't need to create these malicious programs to cause damage to other people's computer systems or steal valuable data; hundreds of them are just a download away.

 

For one to find malware with the use of Google, it is essential to have the specific signature of a certain malware program. These signatures are now being shared on the Internet by hackers, and that causes greater ease for other online bandits to carry out the search for a particular malware program using its unique signature. In some pro-hacking web sites, the signatures are even indexed in an online database, such that users only need to input the name of the malware and it instantly returns the corresponding signature. End-users are even asked to share fresh malware to the site so that the site moderators are able to produce a signature for it fast, to be made available to other users. This way, hackers, even bloggers who are unskilled in hacking but nonetheless have a tainted intention, will be able to make use of any malware of their choice, and spread it through different blogs.

 

Probably the most important thing to do in order to protect your computer from malware is to install a trusted anti-virus program and to keep it updated. Scan computers on a regular basis, and also keep patches up to date. Keeping a firewall up should also help. Next is to be cautious when opening and reading email and instant messages, especially those that are unwanted, or come from email addresses you don't recognize.

 

Furthermore, when using an instant messenger, beware of active links that even your trusted contacts send. Before you even consider clicking on any link, be sure to ask first what site it leads to. Better yet, you may even consider holding off on clicking the link until you're able to personally talk to the person sending it to verify its authenticity. Ignoring the message is yet another option, if the message does not seem that important at all.

 

There is hope, however, as leading IT and Internet firms are coming up with ways to disable these web scammers. Information sites, as well as blog code improvements like Google's "nofollow" tag, are up and running to help bloggers and other users protect their computer systems. While more advanced means are yet to make it to the greater public's knowledge, staying informed and vigilant is the main defense against malware-infected blogs.

http://www.securitypronews.com/news/securi...ectedBlogs.html

----------------------------------------------------------------------------

 

 

 

 

 

 

 

 

 

 

 

Google Buys YouTube For $1.65 Billion In Stock

http://www.caffeinemarketing.com/online-ma...llion-in-stock/

 

 

Could Google Face YouTube Lawsuits?

http://www.marketingpilgrim.com/2006/10/co...e-lawsuits.html

 

 

Google Blog Hacked Again

http://www.securitypronews.com/news/securi...ackedAgain.html

 

 

 

 

Vista Kill Switch: Only For Shoplifters

http://www.securitypronews.com/news/securi...hoplifters.html

 

 

 

 

 

 

 

Phishing On The Pharm

 

Bob squinted at the email and began to read...

 

"Dear eBay User, as part of our security measures, eBay Inc. has developed a security program against fraudulent attempts and account thefts. Therefore, our system requires further account verification…"

 

Security Measures. A threat to suspend his account to prevent "fraudulent activity". The email went on to say that there were "procedural safeguards with federal regulations to protect the information you provide for us."

 

Bob clicked the link and was confronted with an authentic looking logon page, just waiting for him to input his user name and password and confirm what ebay supposedly didn't know.

 

He almost did it. The page looked absolutely authentic, and he had already been "set up" by the email message. His fingers were poised over the keyboard when he happened to glance at the URL.

 

There was something very, very wrong with it.

 

"PHARMING" TO FLEECE SHEEP

 

The art of "pharming" involves setting up an illegitimate website that is identical with its legitimate prototype, for example the ebay page Bob was almost suckered into using, and redirecting traffic to it.

 

"Pharmers" can do it in two ways:

 

1. By altering the "Hosts" file on your computer. The Hosts file stores the IP address of websites you have been accessing. By inserting a new IP address into the database field corresponding to a website, your own computer can be redirected to the pharmer's website. Any information you give the bogus site is immediately hijacked by the pharmer.

 

2. Hijacking the DNS (Dynamic Name Server) itself. A DNS matches the names of address with their IP addresses. If this server can be coerced into assigning new IP addresses to traditional names, all computers using the name resolution provided by the DNS server will be redirected to the hijacker's web site.

 

Once that happens, it's time to be fleeced.

 

DOWN ON THE PHARM

 

"Pharmers" hijack your "hosts" file or DNS servers using Spyware, Adware, Viruses or Trojans. One of the most dangerous things you can do is to run your computer without some form of Internet Security installed on it.

 

Your security software should be continually updating its virus definitions, and be capable of warning you if something has been downloaded from a web site or through email. It should be able to remove it, "quarantine it", or tell you where it is so that you can remove it by hand.

 

You should also have Spyware and Adware programs installed, and be aware of any change in Internet browsing patterns. If your home page suddenly changes, or you experience advertising pop ups (which may pop up even when you are not hooked up to the Internet), you should run a Virus, Spyware or Adware scan.

 

Thanks to the efficacy of these protection programs, pharming is a lot more difficult than it used to be. It isn't as easy to hijack a computer as it once was.

 

So, the "pharmers" have teamed up with the "phishermen" to get you to visit the bogus web page yourself, and enter all the information they need.

 

PHISHING TO CATCH YOU ON THE PHARM

 

As Bob discovered, the page he had been taken to by the bogus email message was identical to the ebay logon page. Identical in every way except for the URL.

 

Out of curiosity, he checked the URL for the ebay logon by accessing ebay directly and clicking on the logon link. The two URL's were nothing alike, except the bogus one did have the word "ebay" in it twice - just enough to make it look authentic.

 

By combining the two techniques, the phishermen/pharmers had avoided the high tech problems associated with downloading a Virus that could get past his protection software. They had gone straight for the throat.

 

Bob's throat.

 

YOUR ONLY REAL IDENTITY THEFT PREVENTION AND PROTECTION

 

The bottom line is that the only real protection against the pharmers and phishermen is YOU. There are three things you must consider when you read any email demanding information:

 

• Why do they want it? Be extremely skeptical when they say they have to "update their records", "comply with federal regulations", or prevent fraud. They are the ones initiating the fraud.

 

• Why can't this be done at the website? Why not invite you to access the website directly and provide this information? The answer is because the bonafide company doesn't need an update.

 

• What does the URL look like? Is it a series of subdomains some of which have the name of the bonafide company? Most likely the subdomain is set up with a free hosting company.

 

• Have they provided partial information about you as a guarantee that the email authentically comes from the legitimate source? Be very careful of this one. This technique is effective for "pretexting", impersonating a person or company, and was used in the Hewlett Packard scandal to collect information. Just because they know your first and last name (and any other information - known only to the legitimate source) doesn't mean the email is legitimate. They probably hijacked the information off the server.

 

THE BOTTOM LINE

 

The bottom line is: don't provide any information at the behest of an email, no matter how authentic it looks, or how authentic the page it directs you to looks. If you must log in, do so at the parent site itself.

 

Your Identity Theft prevention and protection is, in the final analysis, up to you.

 

Don't be the next sheep fleeced by the pharmers who caught you with the phisherman's hook. Being dropped naked into their frying pan is NOT a fate you want.

http://www.securitypronews.com/news/securi...onthePharm.html

------------------------------------------------------------

 

 

 

 

 

 

 

 

SECURITY PRO NEWS SECURITY NEWS LINEUP

http://www.securitypronews.com/news/securi...urity_news.html

 

 

What To Know About SQL Injection Attacks

http://www.securitypronews.com/news/securi...ionAttacks.html

 

 

 

Professor Studies Why Phishing Works

 

Those who have spent a long time working with and learning about technology have found it hard to determine why non-techies seem more vulnerable to phishing attacks.

 

At Indiana University, computer science professor Markus Jakobsson explores and researches the whole problem of phishing scams. Since these are primarily social engineering attacks against people, Jakobsson wanted to find out why certain attacks work.

 

Symantec Security Response blogger Zulfikar Ramzan posted about Jakobsson's assessment of behavioral vulnerabilities and trust abuse associated with phishing. Jakobsson's anti-phishing group brought in a number of subjects to observe why certain aspects of phishing work.

 

The study group viewed emails and web pages, and were asked to rate them on their likelihood of being a phishing attempt. Jakobsson screened the group to exclude computer science majors, as he wanted to see how people who are typical but non-technical users handled phishing attempts.

 

The subjects also had to explain their thought processes out loud, and they were aware that the experiment had been designed to test their ability to discern phishing from legitimate communications. Some interesting conclusions emerged, and we will summarize some of them here.

 

Subjects knew to do mouseovers of URLs, and were wary of ones containing an IP address instead of a domain name. But they also tended to trust domain names like "www.citibank-login.com" and "www.bankofamerica.pin-update.com."

 

Trust brands like BBB seals did not matter to the subjects, who were not influenced by their placement on a site. That could be discouraging to companies who have a business where the seals they make available to trustworthy sites are not having the desired impact on suspicious visitors.

 

While talking about money or transactions raised red flags, informative emails that did not call for immediate action were more likely to be trusted. That would be dangerous if a phishing attempt included a link at the bottom of a seemingly trustworthy, informative message.

 

One insight from Jakobsson echoed a similar statement I heard from TriCipher's Tim Renshaw, on the topic of educating users. Education only goes so far, as people will make poor judgments about whether or not a site is legitimate.

 

During a chat with Renshaw, he mentioned that a big problem with phishing comes from laziness on the part of financial institutions in attacking the issue. Losing money due to fraud can be handled, but losing data that can facilitate identity theft is not treated with the same urgency.

 

That makes it all the more important for people to demand better treatment of their online access to financial resources. The technology to make online banking even more secure, like SSL and digital certificates for users, has been available for some time.

 

While banks extensively use SSL, few if any seem to require their customers to have a digital certificate that can be used to verify the customer has connected to a legitimate site. The push needs to come from the financial institutions to enable this and knock out threats like phishing and man-in-the-middle attacks.

http://www.securitypronews.com/insiderrepo...shingWorks.html

--------------------------------------------------------------------------------------

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Google Blog Has A Rough Weekend

http://www.securitypronews.com/insiderrepo...ughWeekend.html

 

 

Continuation Lines

http://www.webpronews.com/expertarticles/e...ationLines.html

 

 

Target Audience Should Define Your Marketing Channel

http://www.webpronews.com/blogtalk/blogtal...ingChannel.html

 

Google And YouTube, The Morning After

http://www.webpronews.com/insiderreports/m...rningAfter.html

 

ChronoPay Sponsors OsCommerce

http://www.webpronews.com/insiderreports/m...osCommerce.html

 

Get Your Mac On With Google

http://www.webpronews.com/topnews/topnews/...WithGoogle.html

 

Google Has Acquired YouTube (THIS TECH CRUNCH ARTICLE HAS HAD 243 COMMENTS POSTED TO IT AS OF 1237PM OCT 10 2006!!)

http://www.techcrunch.com/2006/10/09/googl...quired-youtube/

 

Ten Things I Wish IE 7 Was About to Deliver

http://www.techcrunch.com/2006/10/09/ten-t...out-to-deliver/

 

Toyota branches out into ethanol

http://news.com.com/2100-11389_3-6124113.h...3&subj=news

 

Newsmaker: For Opera, smaller is better

http://news.com.com/2008-1032_3-6124184.ht...4&subj=news

 

Fueling Toyota's future

http://news.com.com/2300-11389_3-6124161-1...1&subj=news

 

Oracle buys Sunopsis

http://news.com.com/2110-1014_3-6124212.ht...2&subj=news

 

Google's Billion Dollar Video Play

http://news.com.com/2009-1014_3-6124086.ht...6&subj=news

 

 

 

 

 

Phishing is type of electronic fraud that uses social engineering.

 

Phishers pretend to be a trustworthy party (such as a bank) in attempt to steal sensitive information (such as passwords, bank account numbers, or credit card details). A Phishing attack is carried out electronically -- commonly through email or instant messaging, but it can also occur through voice phone calls, text messages, or other electronic communication methods. Once a phisher has collected this sensitive information, it can be used to take money from an account or simply shuffle money back and forth to make it harder to audit where money flows.

 

Phishing and identity theft are problems faced by millions of people every day. Some people have begun to question how they use the Internet: "Is it safe to use my credit card on the Internet?" ... "Does my bank really want me to change my password?" Others fall victim to these scams without realization.

 

Book on Phishing

 

New! Jakobsson and Myers have completed their comprehensive book, to be published in November 2006: Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft. (Wiley, Nov 2006).

 

At IU, we are attacking the problem head-on, by studying the problem in depth to figure out exactly what makes phishers tick. Electronic fraud affects nearly everyone: students, researchers, banks, everyday people... the list is endless. Depending on who you are, it may affect you differently. If you work for a bank you probably want to protect your clients from harm. If you use online banking, you are probably interested in protecting your investments and family.

http://www.indiana.edu/~phishing/

--------------------------------------------

 

See also:

Stop-Phishing.com at Indiana University

http://www.indiana.edu/~phishing/

 

Phishing Attacks Using Social Networks

http://www.indiana.edu/~phishing/social-network-experiment/

 

Phishing for Clues

https://www.indiana.edu/~phishing/browser-recon/

 

A study in socially transmitted malware

http://www.indiana.edu/~phishing/verybigad/

 

Can You Trust a Wireless Router?

http://www.cs.indiana.edu/~atsow/mal-router/

 

Net Trust

http://ljean.com/netTrust.html

 

Riddle me This:

He starts and ends 2 common English words. One painful in love, One painful in everyday matter. Do you know what 2 words I must be? (Personal information potentially collected)

http://homer.informatics.indiana.edu/cgi-b...ddle/riddle.cgi

 

Phroogle

http://homer.informatics.indiana.edu/cgi-b...le/phroogle.cgi

-----------------------------------------------------------------------

 

 

 

 

Protect Your Clients

 

The Indiana University Phishing group, with its multi-faceted set of members, has the competence and knowhow to analyze threat situations and make recommendations for how you should best deal with current threats as well as the likely threats your clients will face tomorrow. Consider the following questions, and let us know if you would want us to review your unique threat situation:

 

How do you communicate with clients? Are you facilitating phishing attacks by using techniques that can easily be abused -- whether technically or psychologically -- by phishers? If you are communicating by email with your clients, do your messages get stuck in your clients spam filters? Do your clients know the messages are from you, or do they fear that they are inauthentic? Do you authenticate yourself to your clients in an appropriate manner? Are your email templates appropriate from a security point of view? Do you ever request clients to call a toll-free number to respond to needs for information? Whether you do or not, what if an attacker does?

 

To what extent do you rely on educational measures? What do you assume about your clients? To what extent do your clients follow your recommendations? Do you cause contradictions by requesting that they never respond to unsolicited emails and never click on links, and then send unsolicited emails with clickable links? Can some of your educational efforts be counter-productive, making clients following them by the word more likely to cleverly crafted attacks that are designed with your educational attempts in mind?

 

Do you benefit from suitable industry collaboration to shield your clients from threats? How can filters against phishing, spam and malware be augmented to provide better and faster protection of clients? What risk assessment measures in place to determine when your clients are under attack? Are you able to single out high-risk users and flag suspicious operations for scrutiny?

 

What do you do to proactively defend against attacks that are happening to your competitors' clients? What do you do to anticipate what attacks may strike your clients next? What can you do? During times with fewer or less serious attacks, do you consider the problem of phishing no longer a problem, or do you take advantage of the relative peace to prepare for the next wave?

http://www.indiana.edu/~phishing/?corporate

--------------------------------------------------------

 

 

 

Reducing Risk of Phishing

 

Most phishing attacks have several technical shortcomings that are detectable by well informed users. However, the particular inconsistencies change as phishers develop more sophisticated methods to spoof legitimate email and web sites. A few high level principles can reduce the risk of fraud victimization, and these general strategies will outlast the latest phishing ploy.

 

When responding to an email that requires web action (i.e. following a link), navigate to the web site independently. If the message appears to be from a financial institution, look up the website using a search engine instead of trusting the message's link. If you happen to have an account with the financial institution, cross-reference your billing statement for the URL of authoritative web site. Similarly, if the email prompts you to call their customer service, do not trust the supplied phone number; use an independently verified number (perhaps from the back of your credit card). Using independent sources for contact information breaks a potential victim out of a phisher's sphere of influence. Assuming that the computer system is not subverted by some other means, the phisher can only control the contents of the bait message and corresponding web hosts.

 

Wait. Phishing web sites are under immense pressure to vanish quickly. On average they last 5-6 days according to the APWG, although some network administrators have reported 3 day server uptimes for confirmed servers, while some financial institutions claim takedown response in 4 to 5 hours. Most victims respond to the bait email message within 24 hours of reciept, and 95% of victims respond within 3 days. Many bait messages have some kind of veiled threat to coerce a quick response: e.g., "We will be forced to shut down your account if you do not respond within 48 hours."

 

The following message was recieved with a notable date of receipt and the deadline imposed by the threat. It was received after the deadline! This may have been a copycat message where the phisher forgot to update the message contents.

 

Use separate accounts or computers when possible for critical transactions. This is a tall order for home users, but the principle of separation is an important one. The internet provides many novelties, spectacles and services of wide ranging interest: peer file sharing networks, online video games, internet surveys and quizzes, just to name a few. Any software that you install has the opportunity to hijack control of your computer. Perhaps you need to install the latest version of a video codec to view a movie clip, or need the latest graphics drivers to play a hot new game demo. The host website may even "mirror" a copy - a copy that may contain spyware or a virus; you put yourself at risk when you trust their copy. Installing the new codec or driver may well install the latest crimeware simultaneously. These nasty programs are responsible for stealthily sniffing passwords, redirecting legitimate URLs, and snooping your browsing habits. Some operating systems allow accounts with/without admin control. The one without admin control is safer because software will have the same amount of control as the user; i.e. software in a non-admin account cannot install new programs. This restricted-access account should be used by kids in the family - they are less likely to think before they click and this way they will not accidentally install malware that could compromise your private data.

 

Trying new things is part of the joy of using the Internet. Balancing vigilence and exploration is a difficult task. You can reduce your risk by using separate accounts or (better yet) separate computers for your critical transactions and recreation. On the "high assurance" account, limit interactions to sensitive operations such as online financial management. Currently, about 90% of phishing attacks target the financial sector, so isolating these transactions from the rest of your (possibly unsafe) computer usage eliminates an important attack vector for phishers. Further, an isolated email address that is only distributed to your financial institutions can reduce exposure to spam related phishing. Use a different address when signing up for free trials, new profiles (e.g. a discussion forum), and mailing lists. This will not eliminate spam, just reduce the volume in the limited access account. One should be careful to simply increase suspicion of messages "from your financial institution" in the regular account rather than increase trust in those the limited access account.

 

Attune yourself to current phishing trends. "Copycat attacks" are among the most voluminous kind of phishing messages. This is due in part to the usage of phishing toolkits that automate the attack setup and in part to the phisher's recognition of good tactics. Effective bait messages are quickly adapted to serve the needs of particular phishers. As a result, regular examination of your spam/junk folder will inform you of current phishing tactics. While the filters are not perfect, many of the messages that evade them are easily recognized by humans as the same scam. The details of why a particular message assails a filter are often invisible to the casual observer; variances in the header information, formatting and hidden text can make the difference between delivery and quarantine.

 

The following screenshots show two spam (although not phishing) emails that have the same message. The first one was stopped by a spam filter on July 10, 2006 -- 12 days prior to the followup message that bypassed the same filter. Note the differences in the text on the right side and to the bottom of each message. In a phishing message these changes could be concealed by making the text invisible (e.g., using the same background and foreground color for these sections).

 

Similarly, examining the links referenced by a known bait message can improve your risk assessments. However, be sure to limit exploration to your high risk email and computer accounts. Following a phishing link alerts the phisher to a live (and susceptible) email address, and may elevate that account's exposure to phishing. Similarly, a phishing website may also exploit an unknown vulnerability in your web browser that enables the installation of malware; this is not common, but should be noted as a potential risk.

 

Understanding Web Browser Displays

 

There are many components to a web broswer. Large portions of the display are controlled by web hosts, while others are controlled by your computer. Some portions are determined by third parties. Internet web servers control the largest area of web browser displays. The diagram below illustrates a web browser's most important standard components with respect to phishing/fraud.

 

The website has complete control over the main display area. In particular, the main displays for phishing websites and authentic websites can look and behave in exactly the same way. Since the main display is the largest area of the web browser, this is enough to fool most people, particularly when the right context has been established. The title frame, though not part of the main display area, is also specified by the server.

 

The protocol field of the address bar indicates how data was transferred from the server to the web broswer for the currently displayed page, and is controlled by the browser. It is best practice to only enter sensitive information, such as usernames and passwords, when the form display page uses https://. The https:// protocol has the property that only the web browser and the web host can read the data. The intermediaries that transfer the communication between these two cannot read the contents of the transmission. For this reason, https:// is considered the "secure" version of the universally readable http:// protocol. However, this point-to-point unreadability property does not protect against misuse of the data by a fraudulent end host. To assure the identity of web hosts, the https:// protocol requires a digital certificate from the web host. The digital certificates are issued by a trusted third party and can not be faked. In a normal https:// transaction, exchange and verification of certificates is transparent to the user. The user is alerted if the computer detects a problem with the certificate, e.g. it is self signed or by an untrusted third party. As a result of the third party scrutiny required for a smooth https:// transaction, most fraudulent web sites use http:// instead. Legitimate sites should always use https:// when handling your sensitive data to protect it from interception by intermediaries. https:// is an encrypted protocol for transferring your data. In order to enter an https:// without additional user intervention, a web site must present a certificate that has been verified by a third party that your browser trusts. This requirement raises the cost of attack, so most fraudulent hosts resort to the unencrypted http:// (no 's' at the end) protocol when asking users for sensitive information.

 

Unfortunately, to speed up the loading time of a web site, some legitimate institutions use an SSL post to send data to their servers. In this case, the entry form was acquired by the unencrypted http:// protocol, but the actual submission occurs through https:// after the submit button is pressed. Attackers may easily mimic a site that does this since they do not have to establish a secure connection before you enter your date. One way to avoid the SSL post is to enter a bogus password and username. After denying your login attempt, most legitimate web sites will follow up with an https:// submittion form. Do not trust a web site that fails to do this -- they may never establish a secure connection!

 

The status bar on Internet Explorer has two components. Most of the bar, beginning at the left and consuming about 75% of the area, is a text display. By default this shows the URL of hyperlinks on mouse-over, and the download status as a particular page loads. However, on some older web browsers, the text in here may also be programmed by the web page. In particular, display of the target URLs on mouse-over could be spoofed by a fraudulent web site. Place your mouse over this link; the status bar displays "your browser is vulnerable" in the status bar on mouse-over if it allows status bar programming.

 

The other component of the Internet Explorer status bar is on the right side. It shows a number of graphics to indicate additional properties of the currently displayed web page. This can not be programmed by the web host. The best known icon is a padlock that coincides with the use of https:// protected pages. Phishers (and legitimate institutions, too) often try to generate trust by placing a copy or similar icon in a display area of the browser that is web host programmable. These padlocks are meaningless, and do not indicate usage of https://. Other icons indicate the browser's classification of the web host; the classification policy is user configurable to determine trust by domain names.

 

The domain name is a function of the computer's domain name service. Name resolution, e.g., mapping the human readable www.informatics.indiana.edu to the "machine-readable" 156.56.94.2, depends on a system of servers outside the end user's client and outside the web host. It is trustworthy so far as the DNS (domain name service) system is trustworthy. Phishing websites are often exposed because they employ incorrect domains names in the address bar. The following diagram show the web site corresponding to the Citibank phishing bait message above:

 

Subversion of DNS is known as pharming. Pharming attacks misdirect requests for legitimate website to fraudulent hosts. It is an especially dangerous attack because of the trust placed in the third party DNS system. Weak points in the DNS chain include the client's internal settings (such as the host file, a local map between names and addresses) and the router settings of the local network. Setting a strong password for a local router's administrative access eliminates one large vulnerability. Running up-to-date anti-malware software helps to stop client originated DNS subversion as well as and other client side compromises.

 

How can I identify a phishing email?

 

This can be an incredibly difficult task, and usually just takes practice. eBay has put together a nice tutorial on how to spot spoofed emails that appear to come from eBay, but it is also a good tutorial on how to spot fraudulant emails in general.

 

Additional Resources

 

What to do if you've given out private information:

http://www.apwg.com/consumer_recs2.html

The Anti-Phishing Working Group's instructions on what to do if you are a victim of identity theft.

 

http://www.indiana.edu/~phishing/?protection

---------------------------------------------------------------

 

 

 

 

Professor Studies Why Phishing Works

 

Those who have spent a long time working with and learning about technology have found it hard to determine why non-techies seem more vulnerable to phishing attacks.

 

At Indiana University, computer science professor Markus Jakobsson explores and researches the whole problem of phishing scams. Since these are primarily social engineering attacks against people, Jakobsson wanted to find out why certain attacks work.

 

Symantec Security Response blogger Zulfikar Ramzan posted about Jakobsson's assessment of behavioral vulnerabilities and trust abuse associated with phishing. Jakobsson's anti-phishing group brought in a number of subjects to observe why certain aspects of phishing work.

 

The study group viewed emails and web pages, and were asked to rate them on their likelihood of being a phishing attempt. Jakobsson screened the group to exclude computer science majors, as he wanted to see how people who are typical but non-technical users handled phishing attempts.

 

The subjects also had to explain their thought processes out loud, and they were aware that the experiment had been designed to test their ability to discern phishing from legitimate communications. Some interesting conclusions emerged, and we will summarize some of them here.

 

Subjects knew to do mouseovers of URLs, and were wary of ones containing an IP address instead of a domain name. But they also tended to trust domain names like "www.citibank-login.com" and "www.bankofamerica.pin-update.com."

 

Trust brands like BBB seals did not matter to the subjects, who were not influenced by their placement on a site. That could be discouraging to companies who have a business where the seals they make available to trustworthy sites are not having the desired impact on suspicious visitors.

 

While talking about money or transactions raised red flags, informative emails that did not call for immediate action were more likely to be trusted. That would be dangerous if a phishing attempt included a link at the bottom of a seemingly trustworthy, informative message.

 

One insight from Jakobsson echoed a similar statement I heard from TriCipher's Tim Renshaw, on the topic of educating users. Education only goes so far, as people will make poor judgments about whether or not a site is legitimate.

 

During a chat with Renshaw, he mentioned that a big problem with phishing comes from laziness on the part of financial institutions in attacking the issue. Losing money due to fraud can be handled, but losing data that can facilitate identity theft is not treated with the same urgency.

 

That makes it all the more important for people to demand better treatment of their online access to financial resources. The technology to make online banking even more secure, like SSL and digital certificates for users, has been available for some time.

 

While banks extensively use SSL, few if any seem to require their customers to have a digital certificate that can be used to verify the customer has connected to a legitimate site. The push needs to come from the financial institutions to enable this and knock out threats like phishing and man-in-the-middle attacks.

http://www.securitypronews.com/insiderrepo...shingWorks.html

------------------------------------------------------------------

 

 

 

 

 

Context-Aware phishing realized

 

Last year, researchers at Indiana University performed a fascinating study on the potential impact of a phishing attack that included some form of relevant context. It was felt that it wouldn't be much longer before phishers harnessed the power of contextual techniques. The academic work I'm referring to, entitled "Social Phishing", involved an experiment where researchers at Indiana University first mined available resources (social networking sites, etc.) to determine who was friends with who. Then, they launched a mock phishing attack to see how individuals responded to a phishing email when the email message was forged to appear as if one of their friends sent it. It turned out that 72% of email recipients fell for the ruse and divulged sensitive credentials (compared to 15% in the "control" group that received an email from a random stranger).

 

At the time of the study, we weren't really aware of phishers trying to use the same trick to increase the "conversion rate" on their attacks. But, that is no longer the case. Consider two relatively recent attacks—one involving Yahoo! and the other involving AT&T.

 

In the Yahoo! scam, unsuspecting victims received a message (via Yahoo! Messenger) from a "friend" of theirs. The message asked them to click on a link using some guise, such as inviting them to check out some online photos. The link took them to a Geocities page, where the victims were asked to enter their Yahoo! login credentials. The phishers, lying in wait, had access to the login credentials just as soon as they were entered. At this point, the phishers logged into the victim's Yahoo! account using the newly provided username and password, fired up Yahoo! Messenger, and repeated the attack.

 

The AT&T attack was a little more involved. In this case, malicious attackers actually broke into one of AT&T’s back end systems that stored data for customers who had recently ordered DSL-related equipment. They then sent phishing emails to many of these individuals. To make the email look realistic, they included information that would be familiar to the customer, such as the last four digits of the victim's credit card number and their home address. The email also made some claim about a recent order requiring the victim's attention and led the victims to a site where they were asked to provide additional information, such as their social security number and birth date. Who knows how many people fell for this attack?

 

These attacks point to the larger trend that we are starting to see. Namely, phishers are indeed getting more sophisticated. It used to be the case that you could infer an email's legitimacy by looking for a few select trust cues. However, that's no longer the case. The scales have tipped and now, more than ever, it's important to look for any clues that suggest an email is not legitimate. Until we can solve the phishing problem, or at least get to the point where it is no longer a big issue, many legitimate businesses who use email as a way to reach out to their customers will suffer.

 

Further reading:

• Phishing research at Indiana University: http://www.indiana.edu/~phishing/

• My colleague, Eric Chien, has posted some good blogs regarding IM phishing: http://www.symantec.com/enterprise/securit...m_accounts.html , and http://www.symantec.com/enterprise/securit...ing_threat.html

 

http://www.symantec.com/enterprise/securit...g_realized.html

-------------------------------------------------------------------------

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

----------------------------------------------------

Link to comment
Share on other sites

Behavioral Vulnerabilities and Trust Abuse in Phishing

 

 

 

Markus Jakobsson is a computer science professor at Indiana University and has done some excellent work on understanding phishing attacks. I’ve blogged about some of Markus’ research in the past and I thought I’d share some information about some recent work of his that focuses on the question: What causes people to fall for phishing attacks?

 

Markus and his group completed a study at Indiana University where the subjects were shown various types of stimuli, such as Web pages and emails. Some of these were legitimate and others were based on phishing attacks. The subject group was asked to rate (on a scale of one to five) how authentic the stimulus was. If a participant marked a score of one, it was thought that the stimulus was taken from a phishing attack. A score of five meant that it appeared legitimate.

 

To make things interesting, the subjects were asked to explain their thought process out loud. Keep in mind that in this case, the subjects obviously knew they were being tested—which is different from what happens in a real phishing attack, where the victims are unaware. So, you have to weigh in this difference when trying to interpret the results (i.e., subjects who know they are part of a test might be more careful and conservative than people who are blindsided). Another important point is that there were no computer science majors in the subject group (the purpose was to get a sense of how a typical, usually non-technical, user would view these sites).

 

The study provided the following conclusions:

• Subjects looked at the URLs and knew how to do “mouseovers”, which seems to suggest that the subjects were wary of what was going on. Also, if the URL consisted of an IP address, then it got the user’s attention. This is promising behavior because many phishing URLs involve raw IP addresses. On the flip side, there is the danger that users might put too much trust in otherwise “normal looking” URLs. For example, many subjects thought that "www.citibank-login.com" was associated with Citibank and thought it was reasonable to expect that "www.bankofamerica.pin-update.com" was legitimately associated with doing pin updates with Bank of America.

• Trust indicators do not matter. If people see a seal from an independent party associated with “trustworthiness” (as with the Better Business Bureau), they do not let that influence their decision about whether a site or email is actually legitimate.

• People judge relevance before authenticity. Any mention of money or financial transactions tends to be a major red flag. Also, any type of unusual password request or threat (for example, threats like “if you don’t do XYZ, your account will be suspended” didn’t work too well).

• Subjects were inclined to trust emails that simply seemed informative. Of course, the danger is that some users might follow links in such messages.

• People might not understand the difference between a meaningful authentication cue and a more-or-less useless one. For example, if your credit card company mentions the last four digits of your card number in an email or Web site, then you should have more confidence that you are dealing with a legitimate party since few parties will know this information. On the other hand, if instead you see the first four digits of your number, then that is pretty meaningless. All holders of any credit card coming from the same provider will share the first four digits—which means that this is not a good authentication cue. Unfortunately, the subjects Markus tested were not able to make this distinction.

• Spelling matters a lot! Subjects were less inclined to trust a site with spelling errors.

• A really good way to gain a user’s trust was to use a favicon (a “favicon” is one of those icons that appears in the address bar next to the URL) in the shape of a lock, along with legitimate-sounding URL. Of course, this demonstrates that a phisher can just as easily use a favicon and a reasonable-sounding URL.

• People care about design. The subjects gave a legitimate site a relatively low score because the login and password boxes were different sizes!

 

Here are some of the insights Markus shared during the conference:

• Education does not work. People will make poor judgments when it comes to determining the legitimacy of sites. (Markus also admitted that this was a bold statement to be making, especially considering that he is a professor.) He did mention that some forms of education could work, but that he felt it was better to focus on technical countermeasures to phishing.

• Independent channels create trust. For example, a site that says “Call us if you are worried…” seems more trustworthy. (Although, we are starting to see phishing attacks use the lure of independent channels as well, where they ask you to call a rogue telephone number that they own.)

• Personalization creates trust. If a site seems personalized—even if that personalization data is otherwise publicly available—then users trust it more. This means that phishers who include social context in their attacks are more likely to be successful. (I wrote a blog about this topic in the past.)

http://www.symantec.com/enterprise/securit...g_realized.html

 

 

I believe that Markus’ work provides some solid evidence that says we can’t expect typical users to know what to look for. On one hand, I think there is always room for educating users further and some users are exhibiting smarter behaviors (like doing mouseovers and checking for URLs that contain IP addresses). On the other hand, I believe that it is too much to expect typical users to know (without the assistance of any relevant technologies) what the real risks and threats are. For example, many users don’t know that there is nothing secret about the first four digits of their credit card number.

 

To understand many of these risks, you have to understand what is and isn’t easy for phishers to do. That requires knowledge of technology, various operating procedures, and the tools phishers can use, among other things. Trying to get a grip on all these considerations would be a full time job—I should know! If users had to understand all that, they wouldn’t have time for anything else.

 

Further reading:

 

The Anti-Phishing group at Indiana University: http://www.stop-phishing.com

 

http://www.symantec.com/enterprise/securit...lities_and.html

------------------------------------------------------

 

 

 

 

 

 

Botnet Tactics Enable Click Fraud

 

 

An instant messaging botnet attack that plagued users of Yahoo's Messenger client has been revamped into a more sophisticated approach that could lure people into clicking lucrative ads for the attacker's benefit.

 

FaceTime researcher Chris Boyd, who also writes under the pen name Paperghost at VitalSecurity.org, has found a variant of some malicious code seen traveling over IM. People whose machines were infected by the malware had a bot placed on their machines, which in turn perform automated clicks on the bad guy's ad-stuffed page.

 

The new version removes the bot from the equation. Instead, the person who clicks on a link in the message ends up at a page that causes their client to send out messages to others on the buddy list, which also leads to the malicious page.

 

Then the real aim of the crime appears, according to Boyd:

 

Meanwhile, you'll find your homepage has been jacked, Botnet style, to a site stuffed with adverts.

 

Not just any old adverts, though - these guys have done their homework. Unlike the previous ads that I've seen served up by Botnets, these ones are targeted towards a specific kind of cancer. Namely, Mesothelioma.

 

Among keywords, mesothelioma has a decent payout for clicks in online advertising. Overture's bid tool listed a top bid of $13.02 for "mesothelioma help." Where an automated bot would normally begin clicking away, it is left to the user to click, or not click, on the ads.

 

A click or two from a number of people across a range of IP addresses probably would not prompt the same level of scrutiny that a horde of botnet clicks should generate inside the black boxes of contextual advertising engines at places like Google or Yahoo.

 

If that happens, the advertiser ends up losing money, the advertising company makes money, and the individuals who spread the infection profit.

 

Boyd discussed the ploy in a more formal fashion at FaceTime. He noted it only works when someone uses Internet Explorer to visit the malicious webpage. "Remember - in this attack, you simply need to visit the offending webpage to become infected. There is NO need to physically allow a download or run a file," he wrote.

 

Other tactics in use, such as filtering who sees the ad page by IP address, make it less likely such a scheme would be caught by detection filters at Google. If the visitor's IP address is from a country that would not normally see such ads, the malicious page will not display them.

 

Since one person or group has now made this attempt at using people to do the work of bots, we won't be surprised to see this scheme appear in copycat ploys in the future.

http://www.securitypronews.com/insiderrepo...ClickFraud.html

-----------------------------------------------------------------------------------

 

 

 

 

 

 

 

 

 

Runaway bride sues former fiance

http://www.cnn.com/2006/LAW/10/10/runaway....e.ap/index.html

 

 

Speaker vows to fire anyone involved in Foley cover-up

http://www.cnn.com/2006/POLITICS/10/10/con...s.ap/index.html

 

 

Bolton: U.S. won't bend to North Korean bullying

http://www.cnn.com/2006/WORLD/asiapcf/10/1...test/index.html

 

 

Gunman threatened to kill Amish children 'in 2 seconds'

http://www.cnn.com/2006/US/10/10/amish.sho...g.ap/index.html

 

 

Excerpts of 911 calls in Amish shootings

http://www.cnn.com/2006/US/10/10/911.trans...t.ap/index.html

 

 

 

Ford recalls nearly 150,000 vehicles

Recall involves 2005 and 2006 sedans, minivans and SUVs with latch, drivetrain problems.

http://www.cnn.com/2006/AUTOS/10/10/bc.aut...reut/index.html

 

Civil suits thrive in backdating scandal

Plaintiff attorneys, rather than the government, may prove to be a bigger headache for corporations embroiled in the stock backdating scandal.

http://money.cnn.com/2006/10/09/news/compa...6100911?cnn=yes

 

Illegals in the Line of Fire

Thousands of illegal aliens are walking through one of the military's most important live-fire training grounds. Will building a fence stop them?

http://www.time.com/time/nation/article/0,...00.html?cnn=yes

 

After YouTube: The beginning of the end?

Now that Google has snatched up the leading online video site, will rivals shell out big bucks, or will the competition dry up for smaller sites?

http://money.cnn.com/2006/10/10/technology...dex.htm?cnn=yes

 

Dow claws to new all-time high

Blue chip gauge manages slim gains, but sets new record, as investors brace for third-quarter earnings; oil sinks.

http://money.cnn.com/2006/10/10/markets/ma...dex.htm?cnn=yes

 

Cracked crab and high stakes: Life in the VIP room

http://www.cnn.com/2006/TRAVEL/10/10/bi.vi...g.ap/index.html

 

Yahoo laser to ask: Anybody there?

http://www.cnn.com/2006/TECH/space/10/09/m...reut/index.html

 

Young sniper pleads guilty to 6 D.C.-area shootings

http://www.cnn.com/2006/LAW/10/10/malvo.plea.ap/index.html

 

Runaway bride sues former fiance

http://www.cnn.com/2006/LAW/10/10/runaway....e.ap/index.html

 

Streisand to heckler: 'Shut the @#&% up'

http://www.cnn.com/2006/SHOWBIZ/Music/10/1...d.ap/index.html

 

Device helps navigate daily life

http://www.cnn.com/2006/TECH/10/10/pilotin...e.ap/index.html

 

Hussein, co-defendants ejected in rowdy session

http://www.cnn.com/2006/WORLD/meast/10/10/...rial/index.html

 

Murder mars Putin visit to Germany

http://www.cnn.com/2006/WORLD/europe/10/10...reut/index.html

 

Blackwater River crests; Virginia city inundated

http://www.cnn.com/2006/WEATHER/10/10/va.f...g.ap/index.html

 

Bush administration hopes to quell school violence

http://www.cnn.com/2006/EDUCATION/10/10/sc...y.ap/index.html

 

Your e-mails: The world can't live with a nuclear North Korea

http://www.cnn.com/2006/WORLD/asiapcf/10/1...ils2/index.html

 

Foley's failings don't faze some religious conservatives

http://www.cnn.com/CNN/Programs/anderson.c...-faze-some.html

 

North Korea's Test: The Good News

Now that the regime has officially become part of the nuclear club, it has to play by the club's rules - or else

http://www.time.com/time/world/article/0,8...1544489,00.html

 

Mystery surrounds Kim Jong Il

http://www.cnn.com/2006/WORLD/asiapcf/06/2....kim/index.html

 

North Korean test 'went wrong,' U.S. official says

http://www.cnn.com/2006/WORLD/asiapcf/10/1...test/index.html

 

Dud or deception? Experts examine N. Korea claims

http://www.cnn.com/2006/WORLD/asiapcf/10/1...b.ap/index.html

 

Scarlett Johansson: 'I'm not promiscuous'

http://www.cnn.com/2006/SHOWBIZ/Movies/10/...n.ap/index.html

 

Runaway bride sues former fiance

http://www.cnn.com/2006/LAW/10/10/runaway....e.ap/index.html

 

Kolbe says he warned clerk about Foley, denies confrontation

http://www.cnn.com/2006/POLITICS/10/10/fol...ndal/index.html

 

Iran vows to continue nuclear program

http://www.cnn.com/2006/WORLD/meast/10/10/...r.ap/index.html

 

After YouTube: The beginning of the end?

Now that Google has snatched up the leading online video site, will rivals shell out big bucks, or will the competition dry up for smaller sites?

http://money.cnn.com/2006/10/10/technology...dex.htm?cnn=yes

 

Study: Dust may quell hurricanes

http://www.cnn.com/2006/TECH/science/10/10...t.ap/index.html

 

'Saw III' Splatters Actor's Blood All Over Promotional Posters

http://www.adrants.com/2006/10/saw-iii-spl...-all-over-p.php

 

Strip Waxing Studio

http://blog.coolz0r.com/2006/10/10/strip-waxing-studio/

 

Social Media for Social Change

http://searchviews.com/archives/2006/10/social_media_fo.php

 

Child Sponsorship Charity Drive 2006

http://www.entrepreneurs-journey.com/552/c...ity-drive-2006/

 

http://www.prohiphop.com/2006/10/heads_up_design.html

 

From a source inside YouTube...

http://www.threadwatch.org/node/9242

 

Blinkx.tv Launches New Look, Video Features

http://www.marketingpilgrim.com/2006/10/bl...look-video.html

 

New Weekly Prize Added to SEM Scholarship Contest

http://www.marketingpilgrim.com/2006/10/ne...ded-to-sem.html

 

What Is XML DOM?

http://www.webpronews.com/expertarticles/e...atisXMLDOM.html

 

 

 

 

Etailing Vs. Retailing

 

While much is known about retail store displays for physical stores, what about your ecommerce storefront?

 

The consumer shopping experience is entirely different online that it is in a retail store, so we are going to examine some good practices for the visual merchandising of your products on the web.

 

Perhaps the most distinguishing feature of Internet shopping as compared to shopping in a retail store is the fact that the product is not physically available for the customer to examine when it is presented online. Customer behavior, therefore, is notably different.

 

Products in your physical retail store speak for themselves. It is often sufficient to present the product in an attractive retail store display and simply allow the customer to touch, feel, even try on the product. None of these options are available on the web.

 

Therefore, it is necessary to provide more information to consumers within your ecommerce storefront. While you would probably never think of including extended product descriptions within your physical store, such descriptions are an absolute must in ecommerce. While it has been said that a picture is worth a thousand words, pictures are not enough. You must include a text description of each product. It is usually not sufficent to keep it simple in this case. A description that provided no more information than "large red shirt" would not be likely to entice many customers to purchase the product. A more effective description would be along the lines of "This attractive red pullover is made of 100% cotton and breathes easily. It is machine washable and comfortable to wear. It is perfect for a business casual environment or a day at the lake."

 

I'm sure that a marketing professional could write a better description, but you get the idea.

 

Additionally, it is important to include clickable thumbnail images, which enlarge when clicked, so as to give the customer a better view. It is also a good idea to provide several views of the product from different angles, so the customer gets the entire picture (no pun intended).

 

Finally, as it is important in your physical storefront, the architectural layout of your ecommerce storefront should be clean, appealing, intuitive, and easy to navigate. It should include your logo for branding purposes, and it should be easy for the customer to check out, edit his or her shopping cart, read store policies such as terms and conditions and refund policies, and individual pages should not require excessive load time. Customer support contacts such as toll free numbers and email addresses should be readily and easily identifiable and not hidden in some obscure portion of the web site. And, as is also the case in physical store layout, your online store should be organized into logical categories, allowing the customer to easily navigate to a desired product. For purposes of upselling, an ecommerce system that supports a suggested product feature is desirable. Such functionality would take the form of additional, related products appearing on individual product pages, with easy linking to each of the suggested items.

 

An excellent ecommerce software that is search engine friendly is available at http://www.primecart.com .

 

http://www.webpronews.com/expertarticles/e...sRetailing.html

-----------------------------------------------------------------

 

 

 

 

 

 

 

SEO Link Building For Web 2.0

 

You need to think about what it would take for you to become the renowned expert in your field. You must offer content that is original and valuable to a consumer. Only then, will you conquer the major search engines.

 

One way link building is the core part of search engine marketing. There are many simple ways to obtain one way links: directories, articles, press releases, and most importantly social bookmarking. When you submit your website to a directory, the directory has an editor take a look at your website and either approve or deny it based on their rules. If you are approved, you will gain the all important one way link pointing to your website. Directories need to accept new submissions to keep their content fresh. This makes the search engines and consumers happy.

 

Social Bookmarking gives YOU all of the power. You select your site and use a social bookmarking website to gain one automatic backlink. It does not stop there! Then, you add tags to the listing. The secret here is that you get a link to your site on every single tag page as well. That can result in anywhere from 10 to 20 one way links per social bookmarking site! You must make sure that your website offers unique, relevant, highly valuable content. If it does, other people will bookmark your website as well. The more people bookmark your site, the better traffic you will gain from that social bookmarking website.

 

Social Bookmarking is the best way to create an internet buzz about your products or your company. If you offer unique content that people will find useful, you have outstanding odds of ending up on the front page of social bookmarking websites. If your link is on the frontpage, you will receive a large amount of traffic for the effort.

 

If you do not offer outstanding content on your website, you will still gain the all important one way links to your website. Even negative reviews of your site will not change the ways the search engines see your link. Search engines look for new relevant content. All you have to do is provide it to them!

 

The most important aspect of social bookmarking is spam. Most sites allow their users to either vote on the importance of a site, or allow them to ignore you and your site slowly goes away. Don't ruin this great opportunity for the other internet marketers out there. Social bookmarking is based on the idea of a sites popularity being decided by the visitors of that site. Make sure you are adding important sites that you use every day to these sites, as well as your own personal websites. Social bookmarking is meant for the entire community to enjoy. You should cater your bookmarks to a person that would find them, not the major search engines. You can be sure that the search engines will figure out how to find social bookmarking spam, just like they've found all of the other spamming methods.

 

Link exchanges are a thing of the past. The only time when link exchanges work is when they provide useful information and products to your customers. Otherwise, link exchanges are nearly useless. Search Engines have figured out the idea behind the link exchange and have lowered the value of exchanged links to almost nothing.

 

Links are the most important aspect of search engine optimization, according to all three of the major search engines.

 

Even the links you use inside of your website count. MSN, Yahoo, and Google all analyze your site's inner linking structure to figure out what keywords are most important to your website. This is the best way for them to find which keywords are important in regards to your company.

 

Spamming of search engines is on the rapid decline, because search engines have become smarter than most of us.

 

Use your head and you should be soaring to the top of the search engines in no time! Here are some tools that will help:

 

http://www.onlywire.com - Onlywire is a web-based social bookmarking tool. It allows you to format your bookmark once and submit it to the 15 most popular social bookmarking websites in one shot! Talk about a timesaver!

 

http://ekstreme.com/socializer - The socializer is a site that makes social bookmarking a breeze. You add socializer to your favorites and when you find a site worth bookmarking (including your own of course), you click on the item in your favorites that states "socialize this". It then saves the web address and title of the page and sends you to an area where 50 different social bookmarking websites reside. There is a little more effort involved here, but 50 bookmarks is definitely worth the time involved.

 

http://www.tagtooga.com/pg/delicioso - Delicioso is a desktop based tool that allows you operates similar to onlywire. It allows you to submit your bookmarks to http://www.tagtooga.com , http://www.del.icio.us.com , http://www.furl.net , http://www.blogmarks.net , http://www.shadows.com , http://www.spurl.net , http://www.simpy.com , and http://www.netvouz.com at one shot. Definitely a worthwile tool.

 

http://www.webpronews.com/expertarticles/e...ngforWeb20.html

------------------------------------------------------------

 

 

 

 

 

 

 

 

 

 

 

 

 

Firefox 2.0 RC2…. An Upgrade?

http://www.webpronews.com/expertarticles/e...2AnUpgrade.html

 

 

 

 

 

The Boring Blogger Visits Google Reader Later Today

 

I'm off to see the Google Reader team later today (among others, I have another day packed with interviews, will head over to Salesforce.com's big shindig in SF in the afternoon).

 

I might be boring, but Google Reader's team has a sense of humor. Maybe I should make a "how boring is Scoble meter?"

 

Well, on one side of the meter would be Dare Obasanjo's blog today about meeting Bill Gates. Next would come Shelley Powers' writings about JavaScript and her photography (which rocks). Heading down the graph would be something like Doc Searls, which I find exciting, but is decidedly less exciting than meeting with Bill Gates, although today we learn that Doc listens to (or tries to, at least) Howard Stern.

 

Anyway, since I'm on this boring narcissistic kick, might as well talk about Pier 38. That's where the cool kids hang out now. I was there today and saw Om. Niall. Irina. Eddie. Toni. Among others.

 

That's where True Ventures is (the venture capital firm that funded Automattic, the company that hosts my blog).

 

Actually Eddie and Irina were over there for a meeting. Someone came over "oh, so Wordpress hosts your blog for free and now you want free office space too?"

 

Guilty as charged.

 

Anyway, back to Google Reader. I am growing more and more enamored of it. What would you want to see the Reader team do? What would you like me to ask them?

 

Me? I want a bigger reader window, especially for when I just scroll through the latest items in a "read the river" fashion. I also want to resize the various panes. I can't see the ends of some blog names, for instance, which also blocks how many items that particular blog has.

 

I also would like to see Google Reader join the Attention Trust (they were one of the RSS reader teams in attendance last week at the Attention Trust luncheon, by the way. Dan Farber has the details on that).

 

All our attention data are belong to us.

 

What?

 

You know that these tools know what blogs we're really reading, right? Clicking on. Emailing around. Voting on (or, in Google Reader parlance "starring").

 

That's attention data. Why don't we have access to it? Or, at least know what is being collected?

 

I guess we'll find out when the government starts asking for logs.

 

Hey, you're not allowed to read boring blogs! Only those cool government approved blogs.

 

You think you don't live in China? Give it a few years.

http://www.webpronews.com/blogtalk/blogtal...latertoday.html

-----------------------------------------------------------------

 

 

 

 

 

 

 

 

The Attention Gang prepares for a land grab

http://blogs.zdnet.com/BTL/?p=3727

 

 

 

Om’s Party

http://www.crunchnotes.com/?p=287

 

 

 

Too Many Domains

http://just.shelleypowers.com/

 

 

 

While You’re Waiting

http://scriptteaser.com/

 

Meeting Bill Gates

http://www.25hoursaday.com/weblog/PermaLin...fa-04fa19ab22b2

 

Facebook: A Great Way To Hobble A Brand

http://www.webpronews.com/blogtalk/blogtal...bbleABrand.html

 

Hit Counter 2.0, Or "Web 2.0 Metrics"

http://www.webpronews.com/blogtalk/blogtal...b20Metrics.html

 

Countdown To Oracle Open World: OAUG SIG's

http://www.webpronews.com/blogtalk/blogtal...ldOAUGSIGs.html

 

NBC Making Smart Moves

http://www.webpronews.com/blogtalk/blogtal...SmartMoves.html

 

Ask Drives RSS Smart Answers To Europe

http://www.webpronews.com/topnews/topnews/...rsToEurope.html

 

Progress Made Towards Netflix Prize

http://www.webpronews.com/topnews/topnews/...tflixPrize.html

 

Google Buys YouTube For Entertainment

http://www.webpronews.com/topnews/topnews/...ertainment.html

 

Napster Hounded For Pounds In UK

http://www.webpronews.com/topnews/topnews/...PoundsInUK.html

 

Top AIM Developer Now With Google

http://www.webpronews.com/topnews/topnews/...WithGoogle.html

 

Juberti has signed off.

http://journals.aol.com/juberti/runningman...signed-off./259

 

Tales of a Running Man

http://journals.aol.com/juberti/runningman/

 

SmallTown.com: Small Town Reviews, in Flash

http://www.techcrunch.com/2006/10/10/small...views-in-flash/

 

Overflow 2.0 is a clean, simple launcher

http://www.techcrunch.com/2006/10/10/overf...imple-launcher/

 

Lala Leverages Internet Radio for CD Swapping, Sales

http://www.techcrunch.com/2006/10/10/lala-...swapping-sales/

 

Revver: The Newest British Comedy

http://www.techcrunch.com/2006/10/10/revve...british-comedy/

 

Zoho Virtual Office Launching Tommorow; Racing Google to Market

http://www.techcrunch.com/2006/10/10/zoho-...ogle-to-market/

 

Edelman and Technorati Detail the Most Influential Blogs in German, French and Italian

http://www.micropersuasion.com/2006/10/edelman_and_tec.html

 

Microsoft struggles with patch

http://news.com.com/2100-1002_3-6124447.ht...7&subj=news

 

The TV preferred by four out of five evil geniuses

http://news.com.com/2061-10801_3-6124463.h...3&subj=news

 

 

 

 

Solar start-up SolFocus pens Indian deal

http://news.com.com/2110-11746_3-6124486.h...6&subj=news

 

Start-up bags funding for solar concentrators

http://news.com.com/Start-up+bags+funding+...135.html?tag=nl

 

Old solar tech back in limelight

http://news.com.com/Old+solar+tech+back+in...926.html?tag=nl

 

 

 

 

 

 

 

 

 

Podcast: Steve Ballmer's plans for a new Microsoft

http://news.com.com/2324-11424_3-6124490.h...0&subj=news

 

 

 

 

 

A lamp that might improve your mood

 

Winter is just around the corner, and that's depressing news for those who get the blues from gray skies. But new hybrid lighting technologies may afford at least some psychological relief, as it is powered by the sun's rays.

 

A company called Sunlight Direct manufactures a halogen-solar lamp that collects energy from a roof-mounted device, then sends it through fiber-optic lines to a halogen refractor that can light any room of your home, according to Automated Home. The post includes a YouTube clip on the product from a Discovery Channel segment.

 

A photosensor chip automatically maintains consistent levels of light, so you don't need to constantly adjust the lamp when more clouds move in. Light from the lamp is even supposed to bear some of the sun's natural hues at appropriate hours.

 

The downside: one less convenient excuse for being in a foul mood.

http://news.com.com/2061-10801_3-6124493.h...3&subj=news

-----------------------------------------------------------

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

-------------------------------------------

Link to comment
Share on other sites

Archived

This topic is now archived and is closed to further replies.

×
×
  • Create New...