Australian PM faces inquiry into Iraqi kickbacks

Filed under: Uncategorized — @ 1:01 am, July 25, 2018.

Friday, April 14, 2006

Wikinews Australia has in-depth coverage of this issue: Cole Inquiry

Australian Prime Minister, John Howard appeared before the Cole inquiry on Thursday, the first time an Australian Prime Minister has appeared before an inquiry with royal commission powers since 1983.

Unlike his foreign minister Alexander Downer who gave evidence before the inquiry on Tuesday, Mr Howard entered through the front door where he gave a brief address. He told the press that his government is being open about the Iraqi kickback affair. ” just want to make one point and that is that the appearance by me, earlier this week by the Foreign Minister and also by the Trade Minister, demonstrates absolutely how open and transparent and accountable the Government is being in relation to this matter” Mr Howard said to reporters.

Mr Howard was questioned by John Agius, counsel assisting the inquiry. Counsel for AWB, the company at the centre of the scandal did not apply to cross-examine the prime minister.

Terrence Cole, the inquiry’s commissioner received an application from Peter Geary and Micheal Long’s counsel to cross-examine the prime minister but refused it on the grounds that the proposed line of questioning was similar to that of Mr Aguis’ and that there was no evidence that Mr Howard had “ever met with Mr Geary or Mr Long”.

Mr Agius questioned the prime minister about a series of diplomatic cables sent to his office, which raised concerns about AWB’s contracts in Iraq.

Mr Howard told the inquiry that he doesn’t recall reading or being briefed about any of the cables referred to by the inquiry. The inquiry also heard that prior to 2003 there was no system in place to identify which cables had been bought to the prime minister’s attention.

In his statement to the inquiry, Mr Howard said that his office had not received four of the cables mentioned by the inquiry. Under questioning, Mr Howard confirmed this but conceded that it was likely that his staff had read the other 17.

When asked whether there were any guidelines which guided his advisors in deciding which cables should be bought to the prime minister’s attention, Mr Howard replied “No, there weren’t”.

The inquiry heard that the only discussions about which cables which should be bought to Mr Howard’s attention occurred when an advisor changed in very generic terms. Mr Howard told the inquiry that he would tell a new advisor “Well, you’ve got to exercise your own judgment, I can’t possibly read everything, and clearly I want things brought to my attention which are, in your judgment, important and are relevant to issues in front of the government at the time”.

Mr Howard admitted that the government had an interest in Iraq using the United Nations oil for food program for its own financial benefit, but said he did not expect cables dealing with alleged breach of UN sanctions to have been bought to his attention.

The questioning then turned to a statement Mr Howard made to the National Press Club on March 13, 2003, one week prior to the US-led Iraqi occupation. Speaking about Saddam Hussein Mr Howard said “He has cruelly and cynically manipulated the United Nations oil-for-food programme. He’s rorted it to buy weapons to supporthis designs at the expense of the wellbeing of his people”.

Mr Agius asked Mr Howard if his statement was based upon briefngs he had received. Mr Howard told the inquiry that the information was based upon “open source” intelligence stated at addresses by British foreign secretary Jack Straw and the United States state department. Mr Howard said one of his advisors “checked with some cables to confirm that those cables supported the open-source claims and was satisfied that they did”.

Mr Howard denied seeing the cables used by the advisor to support the claims, but believed he would have told her to be sure that everything they were saying can be supported by fact. Mr Howard told the inquiry that he never knew about cables which referred to Hussein rorting the UN Oil for Food program. Mr Howard admitted that at the time his “general knowledge” was that Hussein had breached UN sanctions and was rorting the Oil for Food program.

“My general knowledge at the time and belief was that the program had been rorted, and it was not seriously in dispute. Nobody was arguing it hadn’t been rorted” Mr Howard said.

The prime minister was questioned about an unassessed intelligence report which mentioned a Jordanian trucking company known as “Alia” paying kickbacks to Hussein. In response to this Mr Howard told the inquiry that he could not recall the information being bought to his attention, which was not unusual.

News briefs:July 30, 2010

Filed under: Uncategorized — @ 1:19 am, July 24, 2018.
Wikinews Audio Briefs Credits
Produced By
Turtlestack
Recorded By
Turtlestack
Written By
Turtlestack
Listen To This Brief

Problems? See our media guide.

[edit]

ACLU, EFF challenging US ‘secret’ court orders seeking Twitter data

Filed under: Uncategorized — @ 1:10 am, .

Thursday, April 7, 2011

Late last month, the American Civil Liberties Union (ACLU) and Electronic Frontier Foundation (EFF) filed objections to the United States Government’s ‘secret’ attempts to obtain Twitter account information relating to WikiLeaks. The ACLU and EFF cite First and Fourth amendment issues as overriding reasons to overturn government attempts to keep their investigation secret; and, that with Birgitta Jonsdottir being an Icelandic Parliamentarian, the issue has serious international implications.

The case, titled “In the Matter of the 2703(d) Order Relating to Twitter Accounts: Wikileaks, Rop_G, IOERROR; and BirgittaJ“, has been in the EFF’s sights since late last year when they became aware of the US government’s attempts to investigate WikiLeaks-related communications using the popular microblogging service.

The key objective of this US government investigation is to obtain data for the prosecution of Bradley Manning, alleged to have supplied classified data to WikiLeaks. In addition to Manning’s Twitter account, and that of WikiLeaks (@wikileaks), the following three accounts are subject to the order: @ioerror, @birgittaj, and @rop_g. These, respectively, belong to Jacob Apelbaum, Birgitta Jonsdottir, and Rop Gonggrijp.

Birgitta is not the only non-US citizen with their Twitter account targeted by the US Government; Gonggrijp, a Dutch ‘ex-hacker’-turned-security-expert, was one of the founders of XS4ALL – the first Internet Service Provider in the Netherlands available to the public. He has worked on a mobile phone that can encrypt conversations, and proven that electronic voting systems can readily be hacked.

In early March, a Virginia magistrate judge ruled that the government could have the sought records, and neither the targeted users, or the public, could see documents submitted to justify data being passed to the government. The data sought is as follows:

  1. Personal contact information, including addresses
  2. Financial data, including credit card or bank account numbers
  3. Twitter account activity information, including the “date, time, length, and method of connections” plus the “source and destination Internet Protocol address(es)”
  4. Direct Message (DM) information, including the email addresses and IP addresses of everyone with whom the Parties have exchanged DMs

The order demands disclosure of absolutely all such data from November 1, 2009 for the targeted accounts.

The ACLU and EFF are not only challenging this, but demanding that all submissions made by the US government to justify the Twitter disclosure are made public, plus details of any other such cases which have been processed in secret.

Bradley Manning, at the time a specialist from Maryland enlisted with the United States Army’s 2nd Brigade, 10th Mountain Division, was arrested in June last year in connection with the leaking of classified combat video to WikiLeaks.

The leaked video footage, taken from a US helicopter gunship, showed the deaths of Reuters staff Saeed Chmagh and Namir Noor-Eldeen during a U.S. assault in Baghdad, Iraq. The wire agency unsuccessfully attempted to get the footage released via a Freedom of Information Act request in 2007.

When WikiLeaks released the video footage it directly contradicted the official line taken by the U.S. Army asserting that the deaths of the two Reuters staff were “collateral damage” in an attack on Iraqi insurgents. The radio chatter associated with the AH-64 Apache video indicated the helicopter crews had mistakenly identified the journalists’ equipment as weaponry.

The US government also claims Manning is linked to CableGate; the passing of around a quarter of a million classified diplomatic cables to WikiLeaks. Manning has been in detention since July last year; in December allegations of torture were made to the United Nations High Commissioner for Human Rights regarding the conditions under which he was and is being detained.

Reports last month that he must now sleep naked and attend role call at the U.S. Marine facility in Quantico in the same state, raised further concern over his detention conditions. Philip J. Crowley, at-the-time a State Department spokesman, remarked on this whilst speaking at Massachusetts Institute of Technology; describing the current treatment of Manning as “ridiculous and counterproductive and stupid”, Crowley was, as a consequence, put in the position of having to tender his resignation to Secretary of State Hillary Clinton.

Despite his native Australia finding, in December last year, that Assange’s WikiLeaks had not committed any criminal offences in their jurisdiction, the U.S. government has continued to make ongoing operations very difficult for the whistleblower website.

The result of the Australian Federal Police investigation left the country’s Prime Minister, Julia Gillard, having to retract a statement that WikiLeaks had acted “illegally”; instead, she characterised the site’s actions as “grossly irresponsible”.

Even with Australia finding no illegal activity on the part of WikiLeaks, and with founder Julian Assange facing extradition to Sweden, U.S. pressure sought to hobble WikiLeaks financially.

Based on a State Department letter, online payments site PayPal suspended WikiLeaks account in December. Their action was swiftly followed by Visa Europe and Mastercard ceasing to handle payments for WikiLeaks.

The online processing company, Datacell, threatened the two credit card giants with legal action over this. However, avenues of funding for the site were further curtailed when both Amazon.com and Swiss bank PostFinance joined the financial boycott of WikiLeaks.

Assange continues, to this day, to argue that his extradition to Sweden for questioning on alleged sexual offences is being orchestrated by the U.S. in an effort to discredit him, and thus WikiLeaks.

Wikinews consulted an IT and cryptography expert from the Belgian university which developed the current Advanced Encryption Standard; explaining modern communications, he stated: “Cryptography has developed to such a level that intercepting communications is no longer cost effective. That is, if any user uses the correct default settings, and makes sure that he/she is really connecting to Twitter it is highly unlikely that even the NSA can break the cryptography for a protocol such as SSL/TLS (used for https).”

Qualifying this, he commented that “the vulnerable parts of the communication are the end points.” To make his point, he cited the following quote from Gene Spafford: “Using encryption on the Internet is the equivalent of arranging an armored car to deliver credit card information from someone living in a cardboard box to someone living on a park bench.

Continuing, the Katholieke Universiteit Leuven (KUL) expert explained:

In the first place, the weak point is Twitter itself; the US government can go and ask for the data; companies such as Twitter and Google will typically store quite some information on their users, including IP addresses (it is known that Google deletes the last byte of the IP address after a few weeks, but it is not too hard for a motivated opponent to find out what this byte was).
In the second place, this is the computer of the user: by exploiting system weaknesses (with viruses, Trojan horses or backdoors in the operating system) a highly motivated opponent can enter your machine and record your keystrokes plus everything that is happening (e.g. the FBI is known to do this with the so-called Magic Lantern software). Such software is also commercially available, e.g. for a company to monitor its employees.
It would also be possible for a higly motivated opponent to play “man-in-the-middle”; that means that instead of having a secure connection to Twitter.com, you have a secure connection to the attacker’s server, who impersonates Twitter’s and then relays your information to Twitter. This requires tricks such as spoofing DNS (this is getting harder with DNSsec), or misleading the user (e.g. the user clicks on a link and connects to tw!tter.com or Twitter.c0m, which look very similar in a URL window as Twitter.com). It is clear that the US government is capable of using these kind of tricks; e.g., a company has been linked to the US government that was recognized as legitimate signer in the major browsers, so it would not be too large for them to sign a legitimate certificate for such a spoofing webserver; this means that the probability that a user would detect a problem would be very low.
As for traffic analysis (finding out who you are talking to rather than finding out what you are telling to whom), NSA and GCHQ are known to have access to lots of traffic (part of this is obtained via the UK-USA agreement). Even if one uses strong encryption, it is feasible for them to log the IP addresses and email addresses of all the parties you are connecting to. If necessary, they can even make routers re-route your traffic to their servers. In addition, the European Data Retention directive forces all operators to store such traffic data.
Whether other companies would have complied with such requests: this is very hard to tell. I believe however that it is very plausible that companies such as Google, Skype or Facebook would comply with such requests if they came from a government.
In summary: unless you go through great lengths to log through to several computers in multiple countries, you work in a clean virtual machine, you use private browser settings (don’t accept cookies, no plugins for Firefox, etc.) and use tools such as Tor, it is rather easy for any service provider to identify you.
Finally: I prefer not to be quoted on any sentences in which I make statements on the capabilities or actions of any particular government.

Wikinews also consulted French IT security researcher Stevens Le Blond on the issues surrounding the case, and the state-of-the-art in monitoring, and analysing, communications online. Le Blond, currently presenting a research paper on attacks on Tor to USENIX audiences in North America, responded via email:

Were the US Government to obtain the sought data, it would seem reasonable the NSA would handle further investigation. How would you expect them to exploit the data and expand on what they receive from Twitter?

  • Le Blond: My understanding is that the DOJ is requesting the following information: 1) Connection records and session times 2) IP addresses 3) e-mail addresses 4) banking info
By requesting 1) and 2) for Birgitta and other people involved with WikiLeaks (WL) since 2009, one could derive 2 main [pieces of] information.
First, he could tell the mobility of these people. Recent research in networking shows that you can map an IP address into a geographic location with a median error of 600 meters. So by looking at changes of IP addresses in time for a Twitter user, one could tell (or at least speculate about) where that person has been.
Second, by correlating locations of different people involved with WL in time, one could possibly derive their interactions and maybe even their level of involvement with WL. Whether it is possible to derive this information from 1) and 2) depends on how this people use Twitter. For example, do they log on Twitter often enough, long enough, and from enough places?
My research indicates that this is the case for other Internet services but I cannot tell whether it is the case for Twitter.
Note that even though IP logging, as done by Twitter, is similar to the logging done by GSM [mobile phone] operators, the major difference seems to be that Twitter is subject to US regulation, no matter the citizenship of its users. I find this rather disturbing.
Using 3), one could search for Birgitta on other Internet services, such as social networks, to find more information on her (e.g., hidden accounts). Recent research on privacy shows that people tend to use the same e-mail address to register an account on different social networks (even when they don’t want these accounts to be linked together). Obviously, one could then issue subpoenas for these accounts as well.
I do not have the expertise to comment on what could be done with 4).
((WN)) As I believe Jonsdottir to be involved in the Icelandic Modern Media Initiative (IMMI), what are the wider implications beyond the “WikiLeaks witchhunt”?
  • Le Blond: Personal data can be used to discredit, especially if the data is not public.

Having been alerted to the ongoing case through a joint press release by the ACLU and EFF, Wikinews sought clarification on the primary issues which the two non-profits saw as particularly important in challenging the U.S. Government over the ‘secret’ court orders. Rebecca Jeschke, Media Relations Director for the EFF, explained in more detail the points crucial to them, responding to a few questions from Wikinews on the case:

((WN)) As a worse-case, what precedents would be considered if this went to the Supreme Court?
  • Rebecca Jeschke: It’s extremely hard to know at this stage if this would go to the Supreme Court, and if it did, what would be at issue. However, some of the interesting questions about this case center on the rights of people around the world when they use US Internet services. This case questions the limits of US law enforcement, which may turn out to be very different from the limits in other countries.
((WN)) Since this is clearly a politicised attack on free speech with most chilling potential repercussions for the press, whistleblowers, and by-and-large anyone the relevant U.S. Government departments objects to the actions of, what action do you believe should be taken to protect free speech rights?
  • Jeschke: We believe that, except in very rare circumstances, the government should not be permitted to obtain information about individuals’ private Internet communications in secret. We also believe that Internet companies should, whenever possible, take steps to ensure their customers are notified about requests for information and have the opportunity to respond.
((WN)) Twitter via the web, in my experience, tends to use https:// connections. Are you aware of any possibility of the government cracking such connections? (I’m not up to date on the crypto arms race).
  • Jeschke: You don’t need to crack https, per se, to compromise its security. See this piece about fraudulent https certificates:
Iranian hackers obtain fraudulent httpsEFF website.
((WN)) And, do you believe that far, far more websites should – by default – employ https:// connections to protect people’s privacy?
  • Jeschke: We absolutely think that more websites should employ https! Here is a guide for site operators: (See external links, Ed.)

Finally, Wikinews approached the Icelandic politician, and WikiLeaks supporter, who has made this specific case a landmark in how the U.S. Government handles dealings with – supposedly – friendly governments and their elected representatives. A number of questions were posed, seeking the Icelandic Parliamentarian’s views:

((WN)) How did you feel when you were notified the US Government wanted your Twitter account, and message, details? Were you shocked?
  • Birgitta Jonsdottir: I felt angry but not shocked. I was expecting something like this to happen because of my involvement with WikiLeaks. My first reaction was to tweet about it.
((WN)) What do you believe is their reasoning in selecting you as a ‘target’?
  • Jonsdottir: It is quite clear to me that USA authorities are after Julian Assange and will use any means possible to get even with him. I think I am simply a pawn in a much larger context. I did of course both act as a spokesperson for WikiLeaks in relation to the Apache video and briefly for WikiLeaks, and I put my name to the video as a co-producer. I have not participated in any illegal activity and thus being a target doesn’t make me lose any sleep.
((WN)) Are you concerned that, as a Member of Parliament involved in the Icelandic Modern Media Initiative (IMMI), the US attempt to obtain your Twitter data is interfering with planned Icelandic government policy?
  • Jonsdottir: No
((WN)) In an earlier New York Times (NYT) article, you’re indicating there is nothing they can obtain about you that bothers you; but, how do you react to them wanting to know everyone you talk to?
  • Jonsdottir: It bothers me and according to top computer scientists the government should be required to obtain a search warrant to get our IP addresses from Twitter. I am, though, happy I am among the people DOJ is casting their nets around because of my parliamentary immunity; I have a greater protection then many other users and can use that immunity to raise the issue of lack of rights for those that use social media.
HAVE YOUR SAY
Do you believe the U.S. government should have the right to access data on foreign nationals using services such as Twitter?
Add or view comments
((WN)) The same NYT article describes you as a WikiLeaks supporter; is this still the case? What attracts you to their ‘radical transparency’?
  • Jonsdottir: I support the concept of WikiLeaks. While we don’t have a culture of protection for sources and whistleblowers we need sites like WikiLeaks. Plus, I think it is important to give WikiLeaks credit for raising awareness about in how bad shape freedom of information and expression is in our world and it is eroding at an alarming rate because of the fact that legal firms for corporations and corrupt politicians have understood the borderless nature of the legalities of the information flow online – we who feel it is important that people have access to information that should remain in the public domain need to step up our fight for those rights. WikiLeaks has played an important role in that context.I don’t support radical transparency – I understand that some things need to remain secret. It is the process of making things secret that needs to be both more transparent and in better consensus with nations.
((WN)) How do you think the Icelandic government would have reacted if it were tens of thousands of their diplomatic communications being leaked?
  • Jonsdottir: I am not sure – A lot of our dirty laundry has been aired via the USA cables – our diplomatic communications with USA were leaked in those cables, so far they have not stirred much debate nor shock. It is unlikely for tens of thousands of cables to leak from Iceland since we dont have the same influence or size as the USA, nor do we have a military.
((WN)) Your ambassador in the US has spoken to the Obama administration. Can you discuss any feedback from that? Do you have your party’s, and government’s, backing in challenging the ordered Twitter data release?
  • Jonsdottir: I have not had any feedback from that meeting, I did however receive a message from the DOJ via the USA ambassador in Iceland. The message stated three things: 1. I am free to travel to the USA. 2. If I would do so, I would not be a subject of involuntary interrogation. 3. I am not under criminal investigation. If this is indeed the reality I wonder why they are insisting on getting my personal details from Twitter. I want to stress that I understand the reasoning of trying to get to Assange through me, but I find it unacceptable since there is no foundation for criminal investigation against him. If WikiLeaks goes down, all the other media partners should go down at the same time. They all served similar roles. The way I see it is that WikiLeaks acted as the senior editor of material leaked to them. They could not by any means be considered a source. The source is the person that leaks the material to WikiLeaks. I am not sure if the media in our world understands how much is at stake for already shaky industry if WikiLeaks will carry on carrying the brunt of the attacks. I think it would be powerful if all the medias that have had access to WikiLeaks material would band together for their defence.
((WN)) Wikinews consulted a Belgian IT security expert who said it was most likely companies such as Facebook, Microsoft, and Google, would have complied with similar court orders *without advising the ‘targets*’. Does that disturb you?
  • Jonsdottir: This does disturb me for various reasons. The most obvious is that my emails are hosted at google/gmail and my search profile. I dont have anything to hide but it is important to note that many of the people that interact with me as a MP via both facebook and my various email accounts don’t always realize that there is no protection for them if they do so via those channels. I often get sensitive personal letters sent to me at facebook and gmail. In general most people are not aware of how little rights they have as users of social media. It is those of uttermost importance that those sites will create the legal disclaimers and agreements that state the most obvious rights we lose when we sign up to their services.
This exclusive interview features first-hand journalism by a Wikinews reporter. See the collaboration page for more details.
((WN)) Has there been any backlash within Iceland against US-based internet services in light of this? Do you expect such, or any increase in anti-American sentiments?
  • Jonsdottir: No, none what so ever. I dont think there is much anti-American sentiments in Iceland and I dont think this case will increase it. However I think it is important for everyone who does not live in the USA and uses social services to note that according to the ruling in my case, they dont have any protection of the 1st and 4th amendment, that only apply to USA citizens. Perhaps the legalities in relation to the borderless reality we live in online need to be upgraded in order for people to feel safe with using social media if it is hosted in the USA. Market tends to bend to simple rules.
((WN)) Does this make you more, or less, determined to see the IMMI succeed?
  • Jonsdottir: More. People have to realize that if we dont have freedom of information online we won’t have it offline. We have to wake up to the fact that our rights to access information that should be in the public domain is eroding while at the same time our rights as citizens online have now been undermined and we are only seen as consumers with consumers rights and in some cases our rights are less than of a product. This development needs to change and change fast before it is too late.

The U.S. Government continues to have issues internationally as a result of material passed to WikiLeaks, and subsequently published.

Within the past week, Ecuador has effectively declared the U.S. ambassador Heather Hodges persona-non-grata over corruption allegations brought to light in leaked cables. Asking the veteran diplomat to leave “as soon as possible”, the country may become the third in South America with no ambassadorial presence. Both Venezuela and Bolivia have no resident U.S. ambassador due to the two left-wing administrations believing the ejected diplomats were working with the opposition.

The U.S. State Department has cautioned Ecuador that a failure to speedily normalise diplomatic relations may jeapordise ongoing trade talks.

The United Kingdom is expected to press the Obama administration over the continuing detention of 23-year-old Manning, who also holds UK citizenship. British lawmakers are to discuss his ongoing detention conditions before again approaching the U.S. with their concerns that his solitary confinement, and treatment therein, is not acceptable.

The 22 charges brought against Manning are currently on hold whilst his fitness to stand trial is assessed.

Blown for Good author discusses life inside international headquarters of Scientology

Filed under: Uncategorized — @ 1:32 am, July 23, 2018.

Friday, November 13, 2009

Wikinews interviewed author Marc Headley about his new book Blown for Good, and asked him about life inside the international headquarters of Scientology known as “Gold Base“, located in Gilman Hot Springs near Hemet, California. Headley joined the organization at age seven when his mother became a member, and worked at Scientology’s international management headquarters for several years before leaving in 2005.

Finnish trio shot dead in Brazil

Filed under: Uncategorized — @ 1:29 am, .

Monday, December 5, 2011

It has emerged that three Finnish nationals have been shot dead in Brazil. Their bodies were found near João Pessoa in a sugarcane field on Friday.

The three were from Savonlinna but two of them — a married couple — owned a second home nearby where they spent winters. The retired surgeon, 72, and his wife, a retired gynaecologist, 68, had been trying to sell the nearby property. The third victim was a nurse, 60. All were from Savonlinna.

The bodies were found in Paraiba beside a road connecting Taquara and Pitimbu. G1 has reported local police are questioning five people and treating all the deaths as homicides. The Finnish National Bureau of Investigation does not plan to get directly involved but is helping the investigation with background information.

Local cash, a Finnish credit card, a mobile phone, and jewellery had all been left after the crimes. There were blood traces inside the house. The Helsingin Sanomat suggests a financial dispute relating to the house sale may have been the motive.

The couple has spent the last five winters in Brazil, but Finnish ambassador Jari Luoto called the area in question “dangerous and restless.”

Chilean earthquakes: in pictures

Filed under: Uncategorized — @ 1:28 am, .

Thursday, March 18, 2010

On the Feb. 27, Chile was hit by an magnitude 8.8 earthquake; almost 500 were killed, with resulting tsunami destroying most coastal towns between Llolleo and Araucanía Region. A second earthquake last week, with its epicentre in Pichilemu, caused destruction in the Coquimbo and Bío Bío regions.

A Wikinews contributor is in the area, and we look at the extent of this natural disaster’s damage through his photographs.


  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42

People camping in La Cruz Hill, Pichilemu. They even constructed little houses, to make their stay more comfortable. Image: Diego Grez.

Church of Santa Cruz, after the February earthquake. Image: Diego Grez.

The Arturo Prat square before and after the earthquake and tsunami in Pichilemu. Image: Diego Grez.

Boat after tsunami in Pichilemu. Image: Diego Grez.

Military representatives in La Cruz Hill, Pichilemu, after the March earthquake. Image: Diego Grez.

On-scene soldiers on a truck, in Lolol, after the March earthquake. Image: Diego Grez.

Destroyed balaustrades and the ceiling of a kiosk over another balaustrades, near the beach of Pichilemu. Image: Diego Grez.

Lolol church after the March earthquake. Image: Diego Grez.

Many houses in Lolol were declared Historic Monuments of Chile. This is one of many that are going to be demolished. Image: Diego Grez.

Destroyed building Mirador by the tsunami in Pichilemu, and also by a kiosk/container. Image: Diego Grez.

Cars driving to La Cruz Hill in Pichilemu, a few hours after the disaster. Image: Diego Grez.

Chilean singer Joe Vasconcellos did a free solo tour in Chile after the Pichilemu and Maule earthquakes. Pictured during his performance in La Cruz Hill, Pichilemu. Image: Diego Grez.

House in front of the Main Beach of Pichilemu after the tsunami and earthquake combo. Image: Diego Grez.

Bucalemu was severely impacted by the February tsunami and earthquake; this picture taken after the March temblor. Image: Diego Grez.

Many houses were destroyed after the earthquake in Lolol, because they were old and made with rustic materials. Image: Diego Grez.

Another destroyed house, a few meters behind the Lolol church. Image: Diego Grez.

Pichilemu highway, the day of the earthquake and tsunami. Image: Diego Grez.

Most of the balustrades aroundRoss Park, in Pichilemu, were destroyed after the 2010 Pichilemu earthquake. Image: Diego Grez.

Destroyed kiosks after the tsunami in Pichilemu. Image: Diego Grez.

Just one kiosk and some bathrooms in front of the Arturo Prat Square survived the tsunami in Pichilemu. Image: Diego Grez.

The Cahuil Bridge was severely damaged after both quakes. It is broken in half and is a serious danger to motorists. Image: Diego Grez.

Several houses were destroyed in the town of Bucalemu, almost 40 kilometers from Pichilemu. In this picture, a house located in front of the beach was later thrown in the half of the roadway. Image: Diego Grez.

Cobquecura, the epicentre of the February quake.

The building Alto Río, in Concepción, collapsed after the February earthquake. Image: Claudio Núñez.

A severely damaged building in Maipú. Image: Jorge Barrios.

Collapsed Vespucio Norte Express Highway in Santiago, after the February earthquake.

The damaged Museum of Contemporary Art, after the February earthquake.

Aftermath of the February earthquake and tsunami in San Antonio. Image: Atilio Leandro.

Damaged Autopista del Maipo, near the city of Chada. Image: Lufke.

People trying to buy gasoline, in Chillán. Image: JOjo Jose Tomas.

Fire in the University of Concepción, after the February earthquake.

Destroyed houses in the Maule Region. Image: Pontificia Universidad Católica de Chile.

Fire in a plastics factory, in Ruta 5 Norte.

Chillán‘s Medialuna after the February earthquake.

House in Pelluhue after the February temblor. Image: Caritas Linares.

US President Barack Obama holds a conference call from the White House Situation Room.

President Sebastián Piñera visits ONEMI after the February quake. Image: Sebastián Piñera E..

Zones affected by the February earthquake. Image: B1mbo.

Map of Chile showing the epicenter of the February quake.

USGS shake map of the February earthquake.

USGS intensity map of the March earthquake.

USGS intensity map for the most strong aftershock of the temblor.Image: USGS.

This article is a featured article. It is considered one of the best works of the Wikinews community. See Wikinews:Featured articles for more information.

Wikinews interviews biologist Chris Simon about periodical cicadas

Filed under: Uncategorized — @ 1:27 am, .

Wednesday, June 12, 2013

In May, periodical cicadas with 17 years life cycle emerged on the East Coast of the USA after underground development as juveniles since 1996. Researchers and scientists worked to map and study the rare wave, and the locals prepared for the noisy event. First recorded in 1666, the Magicicada septendecim species recently emerged in 1979, 1996, this year, with a next wave due in 2030.

This week, Wikinews interviewed Chris Simon, an ecology and evolutionary biologist at University of Connecticut, about the cicadas.

((Wikinews)) What caused your initial interest in periodical cicadas?

Chris Simon: As an undergraduate student, I was interested in the formation of species so when I went to graduate school I looked for a study organism that was likely to be in the process of forming new species. I chose periodical cicadas because they are broken up into reproductively isolated broods (or year classes). Reproductive isolation leads to speciation so I planned to study biochemical differences among the broods.

((WN)) You study the emergence of the periodical cicadas. What do you study? What observations are you making?

CS: We record exactly where each cicada population emerges (using GPS automated mapping and crowd sourcing). We record the presence or absence of each of the three morphologically distinct species groups of periodical cicadas (Decim group, Cassini group, and Decula group). We collect specimens for DNA analysis. We look for cicadas coming up one and four years early and late. We dig up cicada nymphs and monitor their growth rates.

((WN)) What equipment do you use?

CS: Nets, shovels, automated GPS recorders, cameras, laptop computers, automated DNA sequencers.

((WN)) Do you study the periodical cicadas with anyone else? What is their role?

CS: Yes, there are a large number of people studying periodical cicadas in my lab and in other labs. My lab is made up of Research Scientists, Postdoctoral Researchers, a technician, graduate students, and undergraduates. Research Scientist John Cooley is the leader of the GPS mapping project; he invented the automated GPS recorder; he built our crowd-sourcing website, and he is instrumental in public outreach. Postdoctoral research David Marshall also participates in the mapping project and leads the part of the research related to the mapping of stragglers. John and Dave and Technician Kathy Hill all study periodical cicada mating behavior and conduct mating and hybridization experiments. One of my graduate students Beth Wade has participated in the nymph collections and will soon start genetic work involving genome wide association mapping designed to locate genes related to life cycle. My graduate student Russ Meister is studying the genes of the bacterial endosymbionts of cicadas. My current undergraduate honors student Erin Dwyer is also studying the development of Magicicada nymphs and is helping to design a lab exercise for college students around the eastern US to do the same. Many of my past undergraduate students have studied the biochemical genetics and development of periodical cicadas. See the Simon Lab website.
CS: We are collaborating with Teiji Sota at the University Kyoto and Jin Yoshimura at Shizuoka University in Japan. They are studying the phylogeography of Magicicada. We are collaborating with John McCutcheon of the University of Montana who is studying the endosymbiont genomes.
CS: We are also collaborating with ecologists Rick Karban and Louie Yang, both professors at UC Davis who have an interest in cicada population dynamics and nutrient cycling in the ecosystem.

((WN)) You studied the periodical cicadas in 1979 and 1996 too. What changes with time?

CS: I have studied periodical cicadas since I was a student back in 1974. What changes with time is increased human development constantly shrinking the patch size of cicada populations.

((WN)) What are your thoughts on the long life span of the periodical cicadas? Why could it be so? What advantages and what disadvantages does it have?

CS: Most or all cicadas have long life cycles compared to your typical annual insect. Examples have been found of two-year to 9-year cycles in different species. Periodical cicadas evolved an even-longer life cycle and I think that part of this relates to the evolution of their synchronized life cycles and peculiar safety-in-numbers strategy for survival. To become synchronized, periodical cicadas had to evolve an exact length life cycle and all adults would have to appear in the same year. Because the nymphs grow at different rates underground, a longer life cycle and a way of counting years must have evolved so that the individuals that get to the last nymphal (underground juvenile) stage first would wait long enough for all other individuals in the population to become ready to emerge.

((WN)) News reports mention this is ‘Brood II’ of the periodical cicadas. What are the distinctive features of this specific species and what is its full scientific name?

CS: The same species exist in multiple broods. No species is restricted to Brood II. The three species present in Brood II are: Magicicada septendecim, M. cassini, and M. septendecula. These same three species are found in every 17-year brood (except the farthest north which only has M. septendecim).

((WN)) At what depth do the cicadas juveniles live underground?

CS: Most live within the top foot of soil but some have been found deeper. We do not know if they go deeper in winter. We need to do much more digging to understand the nymphs.

((WN)) How do people prepare for the cicada emergence?

CS: Of course various people prepare in different ways. Ideally, everyone prepares by studying information available on the web (especially on our websites Magicicada Central and Magicicada.org).

((WN)) Do cicadas affect transport in the local area?

CS: No, not really. Occasionally individuals can be seeing flying across highways and sometimes they smash into cars.

((WN)) Do cicadas usually stay outside or do they also invade houses too?

CS: They stay outside. One might accidentally fly in through an open window but that would be rare.

((WN)) What do the cicadas eat?

CS: Cicadas suck xylem fluid (the watery fluid coming up from the roots of plants) in deciduous forest trees and herbs. Essential amino acids in the cicada diet are supplied by their bacterial endosymbionts. There are two species of endosymbionts. One makes 8 essential amino acids and one makes two essential amino acids.

((WN)) Do cicadas damage crops or city vegetation? What damage?

CS: Cicadas do not chew leave so they do not damage crops like other insects. They can inflict some damage by their egg laying. Cicadas lay eggs in pencil-sized tree branches. If there are not enough branches available, too many female cicadas may lay eggs in a single branch weakening it and making it susceptible to breakage by wind. This can sometimes cause damage in fruit orchards. If the branches break, the eggs die so this behavior is selected against by natural selection.

((WN)) Thank you.

CS: You’re welcome. I am happy to have this opportunity to communicate with your readers!

Dan Rather resigns as anchor, to stay on as correspondent

Filed under: Uncategorized — @ 1:23 am, .

Monday, November 22, 2004

Dan Rather has announced that he will retire on March 9th, 2005 as anchor of CBS Evening News. He will continue to be a correspondent for both of the 60 Minutes shows.

It is reported that Rather’s leaving has nothing to do with a report in 2004 regarding US President Bush’s National Guard service that was widely reported to be factually false. A CBS panel is looking into that report.

Others believe that Rather is stepping down due to this report and investigation. Howard Kurtz, a reporter for the Washington Post, states that “It’s pretty clear that Dan Rather faced a very unpalatable choice… His contract had at least two more years to run. [Should he] step down now before the outside investigative report, commissioned by CBS News expected in the next few weeks about his botching — and the network’s botching — of that story about President Bush’s National Guard service? Rather [decided] today that it would be better for him to step down on his own terms.”

Dan Rather, 74, has been the anchor for CBS Evening News for 24 years, succeeding Walter Cronkite. Rather is the third most watched anchor on United States television.

All links dated November 23, 2004.

This article has passed through community review. The users who have reviewed it believe it to be factually accurate, neutral and free of legal problems. Please comment on the discussion page if you find any issues with this article, and please clearly denote any updates you make at the bottom.

20 injured in Montreal college shooting spree

Filed under: Uncategorized — @ 1:19 am, .

Wednesday, September 13, 2006

At 12:41 p.m. local time (UTC-5), a man opened fire at Dawson College, in Westmount, Quebec, Canada; the college is located near the heart of downtown Montreal. Police report at least 20 people being injured. The gunman was reportedly killed at the scene by police. Students told reporters that they heard several shots in the building at about 12:45 local time. One student told a local radio station that she saw two people who had been shot, including one who was hit at the neck. The student said a friend told her four people had been shot.

Hundreds of students fled the building, and the area has been cordoned off. Nearby Plaza Alexis Nihon and Westmount Square were evacuated and the Green line of the Montreal Metro was shut down between Lionel-Groulx and Peel. Police officers wearing bullet-proof vests are keeping people away from the college. “They’re telling me, ‘Go the other way, lady, you’re in the line of fire,'” said CBC News reporter Nancy Wood, who reported from the scene.

Local media have reported police hotlines have been established for loved ones to gain more information: +1-(514)-280-2880, +1-(514)-280-2805, and +1-(514)-280-2806. The Montreal General Hospital has also set up a hotline at +1-(514)-843-2839.

Police have reported that the situation has been neutralized as of 20:06, September 13, 2006 (UTC). Police have been told to stand down and are no longer looking for new victims or shooters.

Dawson College is a CEGEP that hosts about 10,000 students.

SpaceX scrubs Falcon I rocket launch

Filed under: Uncategorized — @ 1:19 am, .

Monday, November 28, 2005

SpaceX called off the much-delayed inaugural launch of their new Falcon 1 rocket on Saturday from Kwajalein’s Omelek Island launch site. The intent was to launch the U.S. Air Force Academy’s FalconSat 2 satellite, which will monitor plasma interactions with the Earth’s upper atmosphere and magnetosphere.

The launch was delayed, then finally cancelled after an oxygen boil-off vent had accidentally been left open. The oxygen was unable to cool the helium pressurant, which then proceeded to evaporate faster than it could be replenished. A main computer issue, probably serious enough to cause a scrub on its own, was also discovered.

This long-anticipated flight was originally expected to be launched in January 2005, however a series of setbacks forced a series of delays, with the flight most recently scheduled to be in early 2006. It was intended to be launched from the Kwajalein atoll in the middle of the Pacific Ocean.

The maiden voyage was originally intended to launch from Vandenberg Air Force Base in California with a Naval Research Laboratory satellite and a Space Services Incorporated space burial payload.

« Previous PageNext Page »