Trump commits to NATO’s Article 5 – CNN International

"I am committing the United States to Article 5," Trump said at Friday's press conference, referring to the alliance's principle that an attack on one NATO nation is an attack on them all.

"And certainly we are there to protect," Trump added, saying this is why the US is "paying the kind of money necessary to have that force."

"Yes, absolutely I would be committed to Article 5," he concluded.

But Trump declined to make the same statement during his speech at NATO headquarters in Brussels last month, when he scolded NATO leaders for failing to meet the alliance's defense spending guideline of 2% of GDP.

Appearing with Romanian President Klaus Iohannis on Friday, Trump also reiterated his call for NATO members to meet the guideline along with his claim that NATO members should repay what he regards as underpayments from previous years.

That didn't seem to bother Iohannis, who noted that Romania was the first country under Trump's administration to "step up to 2 percent of GDP for defense spending."

"I'm very glad that due to your strong leadership NATO decided to go against terrorism," the Romanian president said. "Your involvement made so many nations conscious of the fact that we have to share the burden inside NATO."

Ahead of Trump's comments Friday, Democrats had slammed the President for failing to commit to Article 5 while at NATO, as well as his comments during the campaign that the alliance was "obsolete."

"While it is important that senior officials such as the vice president, secretary of state and secretary of defense reiterate that commitment, explicit endorsement -- and the absence of an endorsement -- has meaning," seven House Armed Services Democrats, including ranking member Adam Smith of Washington, wrote in a letter Friday.

But Sen. Tom Cotton, an Arkansas Republican and ally of Trump in the Senate, argued Trump was just misunderstood.

"It's a good thing that President Trump made explicit what he plainly meant in Brussels last month: the United States stands by the collective security guarantee of NATO Article 5," Cotton said in a statement. "But make no mistake: uttering magic words does not deter aggressors like Vladimir Putin. Only the credible threat of military force does. And until Democrats and our European allies get serious about funding our common defense, deterrence in Europe will remain dangerously weak."

CNN's Dan Merica contributed to this report.

Read this article:

Trump commits to NATO's Article 5 - CNN International

Canadians First On The Ground With NATO Mission To Latvia – The Daily Caller

The Canucks are on the ground in Latvia.

Canadian Army soldiers deployed near the Latvian capitol of Riga began arriving Saturday as the first part of an enhanced NATO role in the country, CBC News reports. Its a prominent mission as tensions continue to remain high with neighboring Russia, which controlled the Baltic nation throughout the Cold War.

The Canadian contingents commander says it wont be difficult to assesss whether or not NATO is successful in keeping the Russian bear at bay.

Its a funny mission success criteria, that if nothing happens, well all go home happy, but thats it, said Lt. Col. Wade Rutland.

The Canadians are the first of 450 soldiers that are expected to land in Latvia over the next week to maintain a stronger NATO presence near the capitol in a tactical position called the enhanced forward presence in military parlance.

They will lead a battle group composed of a multinational force of troops and heavy equipment from several European countries including Italy, Spain, Poland, Slovenia and Albania. The mission is expected to cost $348.5 million over the next three years.

Maj. John Hagemeyer, a company commander, jumped off the plane carrying his kit bag and exclaimed to CBC, Its good to finally be here. We want to be here. Latvia wants us here.

Latvia fears Russian aggression because of the past and the present. It was targeted by the Soviet Union when Stalin was allied with Nazi Germany from 1939-41 and was again occupied by Soviet soldiers in 1945. Today, after Russia annexed Crimea in 2014, many Latvians wonder if the Russian arm wont reach further north in an attempt to retake land that many Russians view as part of their historic empire.

Though Canadians have been in Latvia before as part of NATO, the current mission has no expiration date. They will be staying at a Soviet-era base less than an hours drive from Riga. The military facility had fallen into disrepair of late and the Latvians have had to initiate some serious renovations.

But the Canadians are bringing it up to NATO standard. Lt. Col. Hugo Delisle is in charge of the 185 personnel who are preparing the site for operational readiness.

The soldiers right now have only had two days off in the last 45 days. Theyre working 10 hours a day to arrive at this point, said Delisle.

Though NATO will soon have over 4,000 combat troops in the Baltic region, that number is dwarfed by the size of the Soviet force that is facing them believed to be up to 70,000.

Hagemeyer isnt worried about Russias superiority in numbers.

Thats not our concern, he said. We are fully prepared for the highest levels of threat.

Follow David on Twitter

Excerpt from:

Canadians First On The Ground With NATO Mission To Latvia - The Daily Caller

In 1983, A NATO Military Exercise Almost Started a Nuclear World War III – The National Interest Online (blog)

On the night of November 20, 1983, Armageddon went prime time. Over 100 million Americans tuned in to the ABC television network to watch the two-hour drama The Day After. This depiction of a hypothetical nuclear attack on the United States attracted a great deal of publicity and controversy. Schools made watching the film a homework assignment, discussion groups were organized in communities across the country, and even the secretary of state at the time, George Schulz, took part in a question-and-answer session hosted by ABC after the films broadcast. That a mere made-for-TV movie could garner such attention from a leading figure in the Reagan administration indicates how real the fear of a nuclear apocalypse was at the time. But almost no one watching that Sunday night realized just how close fiction came to reality in the fall of 1983.

The possibility of the worlds two greatest military powers destroying each other and the earth in a full-scale thermonuclear war was a fear shared by many throughout the world. At the time, both the United States and the USSR maintained huge nuclear arsenals of over 20,000 nuclear warheads each. In North America and Western Europe, nuclear freeze movements were gaining new members daily, with mass demonstrations that routinely numbered in the tens of thousands.

World events seemed to only reaffirm peoples fears. It was the third year of the presidency of Ronald Reagan, a man who had built his political career on a virulent hatred for all things communist. His 1980 victory over incumbent President Jimmy Carter had largely been the result of his hard-line stance against the Russians. A former film actor with a natural flair for the dramatic, Reagan both inspired and shocked people with his hardcore rhetoric, such as his statement before the British House of Commons in 1982 that the Marxist ideology would be relegated to the ash heap of history. Perhaps his most memorable and antagonistic remarks came on March 8, 1983, when Reagan referred to the Soviet Union as the focus of evil in the modern world and an evil empire.

The actions of the Reagan administration in its first three years backed up his uncompromising rhetoric. To match the USSRs huge expenditures on its armed forces, Reagan and Secretary of Defense Casper Weinberger initiated one of the largest peacetime military buildups in American history. Weapons programs such as the M1 Abrams tank, Trident nuclear submarine, and Stealth bomber were accelerated, while previously cancelled programs such as the B1 Lancer strategic bomber and the MX Missile were resurrected. To achieve the goal of creating a 600-ship navy, the Defense Department brought all four of its mammoth World War II-era Iowa-class battleships out of mothballs and returned them to active duty.

Star Wars and Fleetex 83: On the Brink of Nuclear War

On March 23, 1983, Reagan took the superpower rivalry to a new level when he unveiled the Strategic Defense Initiative Program during a live television address. The SDI program, more popularly referred to as Star Wars, was to provide an orbital shield that would protect the United Statesat least partlyfrom a nuclear strike. Reagan and supporters of the project argued that such a defense network, while not being able to completely block a full-scale strike from Russia, would at least cut down its effectiveness considerably and would be able to destroy smaller scale strikes, accidental nuclear launches, or missile attacks from rogue states. Reagan proposed to share the technology with the Soviets in a bid to eliminate the threat of nuclear war altogether.

To Yuri Andropov, then general secretary of the USSR, Reagans intentions spelled trouble. Andropov had dedicated his entire life to defending the Soviet Union, whether as a member of the partisans fighting behind German lines during World War II or as head of the Soviet secret police, the KGB. His supreme ambition to lead the nation had been realized with the death of Leonid Brezhnev in November 1982.

Andropov was scared to death of Ronald Reagan. He sincerely believed that Reagan meant what he said about the Soviet Union being an evil empire and seeing himself as a crusader who would not have any qualms in ordering the USSRs destruction. During the summer and fall of 1983, events only served to add fuel to Andropovs burning fears. In Western Europe, the United States prepared to deploy the latest generation of Intermediate Range Ballistic Missiles (IRBM), the Pershing II. The Pershing missiles were a countermove to the Soviet deployment of the larger SS-20 IRBMs. But while the SS-20s could only reach targets in Western Europe, the Pershing IIs had the range to hit targets inside the USSR itself. It represented a new threat that the Soviets found intolerable.

In April and May of that year, as the rhetoric between Washington and Moscow escalated, the United States Navy conducted a series of fleet exercises in the Northwest Pacific known as FLEETEX 83. With more than 40 warships massed into three carrier battle groups, it was the largest concentration of American naval might in the Western Pacific since World War II. The massive exercise involved the counterclockwise sweep of these waters with the extreme right flank of the formation coming close to Russias Kamchatka Peninsula. Round-the-clock air operations from the carriers Enterprise, Coral Sea, and Midway were meant to make the Soviets respond by putting their eastern air bases on constant alert. During the course of the maneuvers, a combined flight of six F-14 Tomcat fighters from Midway and Enterprise flew over Zelyony Island in the Kuril Archipelago, a violation of Soviet airspace that the U.S. Navy later insisted was an accident, an explanation that the Soviets obviously did not accept.

Originally posted here:

In 1983, A NATO Military Exercise Almost Started a Nuclear World War III - The National Interest Online (blog)

The latest NSA leak is a reminder that your bosses can see your every move – Washington Post

The Washington Post's Devlin Barrett explains how an arrest of a government contractor was made so quickly in the NSA document leak to The Intercept. (Whitney Leaming/The Washington Post)

It took just days forauthorities to arrest and charge a federal contractorwithleaking classified intelligence to the media. Court documents explain in detail how the 25-year-old woman suspected in the leak,Reality Leigh Winner, allegedly printed off a copy of a National Security Agency report on Russian tampering in the U.S. elections and mailed it to a news outlet.

What helped federal authorities link Winner to the leak were unrelated personal emails she had sent to the Intercept news site weeks before, which surfaced when investigators searched her computer. But how were officials able to gain access to her personal accounts? The answer, according to some former NSA analysts, is that the agency routinely monitors many of its employees' computer activity.

The case offers a reminder that virtually every American worker in today's economy can be tracked and reported and you don't even have to be the NSA to pull it off.

[What we know about Reality Winner, the contractor accused of leaking an NSA document]

She emailed the Intercept using her work computer, said Michelle Richardson, a privacy expert at the Center for Democracy and Technology, a Washington think tank. They can monitor the traffic on their systems, look at thesix people who printed the doc, and see that she was the one who had contact.

The NSA didn't immediately respond to a request for comment.

Employee monitoring issoextensive in American society that it may be difficult for workers to know just how far they might have to go to avoid it.Itis a $200 million-a-year industry, according toa study last year by 451 Research, a technology research firm, and is estimated to be worth $500 million by 2020.

[How Congress dismantled federal Internet privacy rules]

Monitoringtechniques have become quite sophisticated, enabling employers to track notonly what websitestheir workers visit, but also when they plug in USB storage devices, move or copy files, and what programs theyrun, privacyexperts say. One companyevenallows bosses to play back videos of what took place on a user's screen and can collect communications activity both on traditional email programs as well as popular webmail services.

Employee monitoringrecently came tolight in ahigh-profile lawsuit involving Uber and Waymo, the self-driving car company owned by Google's parent firm, Alphabet. In accusing former Waymo employee Anthony Levandowski of stealing trade secrets and taking them to Uber, Waymo said it was able to determine that Levandowski installed inappropriate software on his company-issued laptop, then downloaded thousands of confidential files before putting them on an external storage device he connected to the machine.

[Supreme Court to decide if a warrant is needed to track a suspect through cellphone records]

Despite Levandowski's attempt to then erase forensic fingerprints by reformatting the laptop's hard drive, Waymo said, the company was nonetheless able to gather the requisite evidence likely using monitoring technology, analysts said.

Even workers who don't report to an office every day are subject to monitoring. The proliferation of GPS devices in smartphones now means that even truck drivers can be tracked. Arecent report from the technology research firm Aberdeen Group found that nearly two-thirds of companies with employees who work in the field were tracking their employees with GPS.

The earliest forms of modern employee monitoring date to the early 1910s, when companies would use mechanical counters to track how quickly workers were typing on their typewriters, according to Jitendra Mishra and Suzanne M. Crampton, who co-wrote a study in 1998 on the topic.Theynotedthatwhat has changed in more recent years is the method of supervision and the extent of information gathering capabilities available. That includes phone and video surveillance, keystroke logging and other forms of monitoring.

[Booz Allen Hamilton employee left sensitive passwords unprotected online]

Since then, numerous court cases have givenemployers a remarkable amount of freedom towatch their workers. In 2010, the Supreme Court heard a case involving two police officers who had been punished at work after it was discovered that they had used their mobile devices to send personal text messages. The officers argued that the police department's search of their devices was unconstitutional under the Fourth Amendment, but the court unanimously ruled against them, saying it was a reasonable search and that the officers should have known that their work devices might be inspected.

Privacy advocates have been pushing for years to have Congress review various communications privacy laws in light of updates to technology. Many argue that the 1986 Electronic Communications Privacy Act does not provide enough protections to consumers today because many emails, text messages and other content can be summoned by law enforcement with little more than a subpoena.

ECPA was first passed in 1986 before Congress could imagine the wealth of personal information that would be stored on third-party servers rather than private hard drives, the Electronic Frontier Foundation, a technology advocacy group, has said.

Congresstook a step toward updating the country's digital privacy laws in February, when the Housevoted to approve the Email Privacy Act. While the bill has largely stalled, it proposes requiring a warrant for searching emails that have been sitting in an account for more than 180 days.

Still, given the other case law surrounding employee surveillance, it's important to note that changes to the ECPA mightnot putan end to routine employer monitoring. Soyou might still want to be careful with what you do on your devices at work.

More here:

The latest NSA leak is a reminder that your bosses can see your every move - Washington Post

Posted in NSA

Accused NSA leaker may be treated harshly as an example, experts say – MyAJC

Her family calls Reality Leigh Winner a patriot who may have made some mistakes but acted with conviction for the good of her country. The federal government portrays her as something more sinister a threat to national security.

Those contrasting portraits, first unveiled last week in a bond hearing in an Augusta federal court, will likely emerge in the months ahead as the central themes in the first leak prosecution under the Trump administration.

Each side has much at stake.

Legal experts say prosecutors will want to make an example of someone who allegedly shared secrets in an era where rampant leaks have angered President Donald Trump and damaged his presidency. Winner, meanwhile, will be fighting for her freedom.

Winner, an intelligence contractor who worked at Fort Gordon near Augusta, pleaded not guilty to a single count of willful retention and transmission of national defense information. She is charged under the Espionage Act with leaking a top secret NSA document on Russian attempts to hack U.S. election systems to the news media.

Prosecutors won the first sortie on Thursday, convincing U.S. Magistrate Judge Brian Epps that Winner is too great a risk to be released on bond. Assistant U.S. Attorney Jennifer Solari said the government is concerned Winner might have compromised other secrets, and that she had a persistent desire to travel to Afghanistan and researched technology that could be used to cover her digital tracks.

Winner allegedly wrote that she wanted to burn the White House down and in notes appeared sympathetic to the Taliban.

Winners lawyer, Titus Nichols, said his client isnt a flight risk nor a threat.

Friends and her family have described her as an animal lover, a fitness buff and a decorated Air Force veteran. Her stepfather, Gary Davis, said her youth, her liberal views and her high security clearance make her a perfect patsy.

Thats what our biggest fear is political persecution to drive home a political point, Davis said. Thats the unwritten message. If you go against the government, then were going to shut you down. And were going to throw you into prison and throw away the key.

Record might engender sympathy

President Barack Obama prosecuted more leakers than all other presidents before him combined, and though the Winner case is the first under Trump, the new president has demanded the Department of Justice find and prosecute more.

Under Trump, even the definition of leaker has expanded. On Friday, the president called James Comey, the FBI director he fired amid probes into Russia election meddling, a leaker, although the contents of the memo Comey told Congress he had distributed to the press do not appear to qualify as classified information.

Joshua Lowther, a criminal defense attorney in Atlanta, said Winner could make a sympathetic defendant. Shes a six-year veteran of the Air Force awarded a commendation for her intelligence work, which helped kill and capture hundreds of enemy combatants.

One of Winners potential defenses is to highlight that history of service to her country, including in the decision whether misguided or principled to leak material about Russian influence on the 2016 presidential election that she believed the public needed to know, Lowther said.

In court Thursday, prosecutors sought to shoot down that line of defense with explosive allegations she expressed sympathies to American enemies and wanted to burn the White House, Lowther said.

The government thinks this is someone who deserves to be prosecuted severely, Lowther said.

So far, though, the prosecutions picture of Winner as a danger to the nation doesnt fully square with the material she is alleged to have leaked, said Kenneth Geers, a senior fellow at international affairs think tank Atlantic Council.

Geers, a former NSA and Defense Department analyst, said what Winner allegedly leaked and where she sent the information to the whistleblower website, The Intercept makes it appear she acted out of conscience.

When I read the (original Intercept) article I thought this is a person who might be a Bernie supporter, said Geers, referring to Bernie Sanders, the U.S. senator from Vermont and former Democratic presidential candidate.

Unless prosecutors uncover that Winner compromised more sensitive information, something that would aide an adversary or wound U.S. interests abroad, the case doesnt seem to support the argument that shes a jihadist, Geers said.

I dont know her state of mind or logic, but it seems like if she were a jihadist, only releasing information about the election doesnt make a lot of sense, Geers said.

Prosecutors do not have to prove harm

Not all leak cases are treated equally.

Former CIA Director Gen. David Petraeus and Marine Gen. James Cartwright avoided lengthy prison sentences by pleading to lesser charges. Winner fits into the pattern of the Justice Department throwing the book at lower level employees, said Edward MacMahon, a veteran criminal defense lawyer versed in national security cases.

MacMahon was part of the defense team for Jeffrey Sterling, a former CIA operative who was convicted of espionage and sent to prison for leaking details of a secret U.S. operation to sabotage Irans nuclear program to a New York Times reporter.

Though the Winner case is slated to be tried in federal court in Augusta, it will be directed from Washington by the Counterintelligence and Export Control Section of the Justice Departments National Security Division.

The government will put enormous resources into trying this case, MacMahon said.

Prosecutors will attempt to prove that Winner had access to the classified material, gave it to persons without that access and that they can exclude other possible suspects.

The salacious allegations of sympathizing with enemies only ups the ante.

Prosecutors also have a significant advantage: they do not have to prove the leak caused harm to the nation.

They dont have to prove actual harm, they only have to prove the possibility of harm, he said. Its been challenged in court as vague but no court has ever overturned a conviction from it.

Staff writers Johnny Edwards and Jeremy Redmon contributed to this report.

Read the original here:

Accused NSA leaker may be treated harshly as an example, experts say - MyAJC

Posted in NSA

Rosie O’Donnell Donates $1000 to NSA Leaker’s GoFundMe Page – Accuracy In Media (blog)

Liberal television personality Rosie ODonnell confirmed that she donated $1,000 to a GoFundMecampaign set up for the family of Reality Winner, the25-year-old NSA contractor accused of illegally leaking classified intelligence documents.

Winner, who was arrested Tuesday for giving classified documents to the website The Intercept,has pleaded not guilty to one count of willful retention and transmission of national defense information. If convicted, she faces up to 10 years in prison.

This is part of the description from the GoFundMe page:

LETS STAND UP WITH REALITY LEIGH WINNER AND HER FAMILY!

It is a Difficult time for Reality Winner and her family. Please show your love and support with kind messages and a monetary donation if you feel led to do so.

This is a time to come together and unite in peace and hope and show the world LOVE ALWAYS WINS over hate! Good resists even when evil persists!

These funds will be able to assist with loss of wages, counseling from this traumatic experience and tobe able to recover from this as Reality & her family rebuilds theirlives. Possible expenses for travel for the family and anything they might need to help them through these troubled times.

ODonnell praised Winner as a brave young patriot in a tweet.

The page may violate GoFundMes terms of service, which prohibits establishing a campaign for the defense or support of anyone alleged to be involved in criminal activity. But that doesnt bother liberals like ODonnell, who sees Winner as a victim rather than as a traitor to her country.

Here is the original post:

Rosie O'Donnell Donates $1000 to NSA Leaker's GoFundMe Page - Accuracy In Media (blog)

Posted in NSA

Does the Second Amendment cover edged weapons? – Hot Air Hot Air – Hot Air

Eugene Volokh is tackling a less common Second Amendment argument this week. It stems from a recent decision made by the New Jersey state supreme court involving a resident who was convicted of Unlawful Possession of a Weapon. The crime in question was the fact that there was a dispute going on with a neighbor in his apartment complex and when he came pounding on the door, the defendant answered the door with a machete in his hand. He may or may not have pointed it at the unruly neighbor (stories conflict on that point) but he definitely didnt injure or even attack the person. The state supreme court overturned the conviction and sent the case back for a new trial with different instructions from the judge because the defendants rights had been violated.

This leads Volokh to answer another question which he apparently gets fairly often from people who dont follow the subject closely. Are swords, knifes, machetes and other blade weapons covered by the Second Amendment? We spend so much of our time talking about guns that this area of hardware doesnt come up very often. His conclusions: (The Volokh Conspiracy, Washington Post)

This should be obvious, I think: The Second Amendment protects arms, and the D.C. v. Heller opinion discusses bows and knives as examples of such arms; opinions in the 1800s and 1900s dealing with state constitutional rights to bear arms also mention bladed weapons; and post-Heller opinions, such as from courts in Connecticut, Michigan, and Wisconsin agree. But some have disagreed the Massachusetts government in the Caetano stun gun case before the Massachusetts high court, for instance, argued that Heller was limited to firearms. The New Jersey decision should be a helpful precedent, then, for other non-gun cases (though of course it doesnt dispose of the question of exactly what weapons are protected, and where they can be possessed).

The Constitution Society has a handy document you might want to bookmark which covers this, as well as many other questions on related topics. In it, they go into a bit more detail about precisely what the Founders intended and what classes of weapons should be covered. (Emphasis added)

The U.S. Constitution does not adequately define arms. When it was adopted, arms included muzzle-loaded muskets and pistols, swords, knives, bows with arrows, and spears. However, a common- law definition would be light infantry weapons which can be carried and used, together with ammunition, by a single militiaman, functionally equivalent to those commonly used by infantrymen in land warfare. That certainly includes modern rifles and handguns, full-auto machine guns and shotguns, grenade and grenade launchers, flares, smoke, tear gas, incendiary rounds, and anti-tank weapons, but not heavy artillery, rockets, or bombs, or lethal chemical, biological or nuclear weapons. Somewhere in between we need to draw the line.

Personally, they go a bit further over the gray line that must be drawn between personal weaponry and group combat weapons for my taste (grenade launchers and anti-tank missiles seem a bit heavy handed) but thats mostly about right I think. Keep in mind that not everyone could afford a firearm at the time of the nations founding and many may have been making do with a bow, a knife or even a farm implement. Im not sure how common swords were for the layman at the time (good ones were also historically quite expensive) but that would have to fall into the same class.

Its also commonly noted in literature of the time that people signing up for militia duty would need to be provided with a rifle if they couldnt afford their own. This, by the way, is where we get the term well regulated because regulated in that context meant properly supplied. But in any event, Volokh has some good information in both of the articles linked above which I thought you might find useful. And since weve recently seen them used by terrorists, might the Second Amendment also cover hammers if you were holding one when you answered the door? Since you can clearly kill someone with a well placed hammer blow Id have to say yes. Same for baseball bats.

Read more from the original source:

Does the Second Amendment cover edged weapons? - Hot Air Hot Air - Hot Air

Trump Blocking Twitter Users Is a First Amendment Issue …

Photograph by Getty Images

Twitter users block others on the service all the time, in some cases because they are abusive and sometimes just because they're irritating. But is it different if the user doing the blocking happens to be the president of the United States?

The Knight First Amendment Institute says it is different, or at least that it should be. The Institute, a non-profit group associated with Columbia University, has sent a letter to the White House arguing that Trump is breaching the First Amendment rights of those he blocks.

It might seem laughable at first -- and there are some First Amendment experts and supporters who appear to find it so -- but the Institute believes that it has a valid case.

According to the letter, written by Institute director Jameel Jaffer, the president's Twitter account fits the legal definition of a "designated public forum," and as such it can't be closed to public access under the First Amendment.

Get Data Sheet , Fortunes technology newsletter.

In effect, the Institute argues that the law requires Trump make his account available to everyone regardless of whether they criticize him. It has said it is considering pursuing a case against the president on behalf of two users who were blocked by him.

"Though the architects of the Constitution surely didnt contemplate presidential Twitter accounts, they understood that the President must not be allowed to banish views from public discourse simply because he finds them objectionable," Jaffer said in a statement.

"Having opened this forum to all comers, the President cant exclude people from it merely because he dislikes what theyre saying."

Not everyone is buying this argument, however. Ken White, a former assistant U.S. Attorney who writes legal commentary at Popehat and is a First Amendment expert, said that he found the idea of the Institute's case "ridiculous."

Ken Paulson, president of the First Amendment Center, told the Wall Street Journal that the Institute had a "novel and ambitious argument" that was clearly in the public interest. But he also described it as a "tough sell."

Is the presidents Twitter account "a public forum where interactive free expression is expected or more like a newsletter, where the communication is all one way?" Paulson asked. Municipalities that establish Facebook pages and invite citizen input may be creating public forums, "but Im not sure that Donald Trumps brief bursts of opinion are the same thing."

There a number of problems with determining whether Trump's Twitter account is a public forum or not, and one of them stems from the fact that the law is far from settled on the question of what exactly constitutes a truly public forum.

The other complicating factor is that Twitter is a privately-held company, and the president is just behaving in accordance with its terms of service.

The laws relating to free public access to government property were designed to protect the ability of demonstrators, protesters, etc. to speak their mind in public parks and other areas. The extension of this right to any "public forum" didn't occur until a Supreme Court decision in 1972, and from that point things just got more and more complicated.

As University of Florida law professor Lyrissa Lydsky put it in a legal paper on the First Amendment and online forums that was published in 2011, the U.S. Supreme Court's public forum and government speech doctrines are "lacking in coherence -- to put it mildly."

In a nutshell, there are several definitions for public forums, based in part on what the government's intentions were in setting them up in the first place. In a fully public forum, opposing views can't be censored. But a "limited public forum," which has a specific purpose, can be restricted in a variety of ways.

To further complicate things, the government and its representatives are protected from First Amendment rules on such matters if what they are doing is defined by the court as "government speech." If so, then feedback or input or access theoretically can be restricted.

So should Donald Trump's Twitter account be considered a public forum, a limited public forum, or a form of protected government speech?

Comments from press secretary Sean Spicer on Tuesday could be pertinent to such a case, because he said that Trump's tweets are considered to be "official statements by the president." That could support the argument that Trump is engaging in government speech, and therefore opposing viewpoints can be restricted without breaching the First Amendment.

Read more:

Trump Blocking Twitter Users Is a First Amendment Issue ...

Editorial: First Amendment protects all faiths – NorthJersey.com

NorthJersey 6:00 a.m. ET June 11, 2017

In this Sept. 23, 2016, file photo, Muslim worshippers pray during a service at the Bernards Township Community Center in Basking Ridge.(Photo: Julio Cortez/AP)

The right to worship, or not to worship at all, is one of the basic principles that has guided this nation since its founding. That right, though, increasingly, has come under siege lately as communities in New Jersey and across the country have tried to stymie Muslims in their efforts to practice their faith as they see fit.

As Staff Writer Hannan Adely reported, Muslims from New York to Minnesota are fighting what they believe to be an ongoing anti-Muslim campaign by filing lawsuits whenever they feel threatened. One such case recently involved Bernards Township in Somerset County. The U.S. Department of Justice announced that Bernards Township will pay $3.25 million to a settle a lawsuit over its denial of a permit to build a mosque.

Part of that settlement requires the township to train, within 180 days, all current and future members of its Planning Board and Township Committee in diversity and inclusion, particularly focusing on Islam and Muslims. It should never have had to come to this, not in diversity-rich New Jersey, and not anywhere in this country where people merely seek a place to pray or worship without feeling threatened.

Now, a new and similar case has surfaced in Bayonne, where a Muslim group filed a federal-discrimination lawsuit in late May after the city rejected its plan to convert an old warehouse on a dead-end street into a mosque. Indeed, as anti-Muslim sentiment has increased including reports of anti-mosque fliers being placed in childrens mailboxes at school Muslim groups have remained undeterred, and more determined than ever to press the issue.

Municipalities around the country should pay close attention to what happened in Bernards Township, said Adeel Abdullah Mangi, an attorney representing Muslim groups in the Bernards and Bayonne lawsuits. The American Muslim community has the legal resources, the allies and the determination to stand up for its constitutional rights in court and will do so.

The U.S. Department of Justice, in a report last year, said there had been a sharp increase in the number of its investigations into religious discrimination involving mosques or Islamic schools over the past six years. The same report noted particularly severe discrimination faced by Muslims in land use.

The founders of this nation were not perfect men, but they knew enough to realize the importance of religious liberty, the practical right of individuals to practice their faith without interference from the state. That right is enshrined in the Constitution, and it is going to stay there. Local municipalities around the country opposed to the building of mosques had better get used to the idea.

Read or Share this story: https://njersy.co/2t8LOrD

Read more:

Editorial: First Amendment protects all faiths - NorthJersey.com

Mark Levin: CNN Is Destroying the First Amendment Jake Tapper Is ‘Evil’ – Breitbart News

Friday on his nationally syndicated radio show, conservative talker Mark Levin, author of the forthcoming book Rediscovering Americanism: And the Tyranny of Progressivism, read from a Federalist piece by Ben Domenech laying out how Domenech viewed CNNs war on President Donald Trump.

Domenech argued CNN was sacrificing balance and centrism in its quest against Trump.

Levin agreed with Domenechs findings but took it a step further by declaring that CNN was destroying the First Amendment and that Trump was right to say the media are evil in some circumstances and singled out CNNs Jake Tapper.

You can see how CNN has changed its coverage, Levin said. CNN is at war with Trump. CNN is violating CNN is destroying the First Amendment and freedom of the press. And when Jake Tapper says, How dare President [Trump] call us evil? Jake, youre evil. Youre unconscionable. All of you because you know exactly what youre doing. You dont care.

Later in the segment, Levin argued there was more truthful reporting on Russia TV than CNN, adding that he had never watched Russia TV before.

I think you get more truthful reporting on Russia TV, which I have never watched in my life, than you get on CNN, he added. How do I know? Because you dont get truthful reporting on CNN. And you know what youre getting on Russia TV. They call themselves Russia TV. Oh must be about Russia or something, Russia TV. CNN pretends to be something its not an objective news organization. Its not an objective news organization. They got one clown after another, one fool after another, one Democratic appointee after another.

Follow Jeff Poor on Twitter @jeff_poor

P.S. DO YOU WANT MORE ARTICLES LIKE THIS ONE DELIVERED RIGHT TO YOUR INBOX?SIGN UP FOR THE DAILY BREITBART NEWSLETTER.

See the original post:

Mark Levin: CNN Is Destroying the First Amendment Jake Tapper Is 'Evil' - Breitbart News

First Amendment lawyer defending neo-Nazi website publisher – San Francisco Chronicle

A Las Vegas-based lawyer specializing in free-speech cases is representing the publisher of a leading neo-Nazi website who has been sued for orchestrating an anti-Semitic online trolling campaign against a Montana family.

Marc Randazza told The Associated Press on Friday that his law firm is defending The Daily Stormer's founder, Andrew Anglin, against a federal lawsuit that real estate agent Tanya Gersh filed against him in April.

"Everybody deserves to have their constitutional rights defended," Randazza said. "Nobody needs the First Amendment to protect Mr. Rogers. That's not what it's there for."

Gersh is represented by attorneys from the Alabama-based Southern Poverty Law Center, which tracks hate groups.

Gersh's suit claims anonymous internet trolls bombarded her family with hateful and threatening messages after Anglin unleashed a "campaign of terror" by publishing their personal information, including her 12-year-old son's Twitter handle and photo.

In a string of posts, Anglin accused Gersh and other Jewish residents of Whitefish, Montana, of engaging in an "extortion racket" against the mother of white nationalist Richard Spencer.

The suit accuses Anglin of invading Gersh's privacy, intentionally inflicting "emotional distress" and violating a Montana anti-intimidation law.

Randazza, who said Anglin never directly sent any messages to Gersh, argued the suit's allegations "leave room for disagreement" over whether Anglin did anything wrong.

Randazza's clients have included adult entertainment websites; the 8chan online message board, a popular forum for racist internet trolls; and Mike Cernovich, a right-wing author and attorney who has promoted a conspiracy theory about Democrats running a child-sex slavery ring from a Washington pizza restaurant's basement.

"If it's unpopular and people want to shut it up, then we have represented them," Randazza said.

The Daily Stormer used a crowdfunding website, WeSearchr, to raise more than $152,000 in donations from nearly 2,000 contributors to help pay for its legal expenses.

Anglin uses a mailing address in Worthington, Ohio, for his website, which takes its name from Der Strmer, a newspaper that published Nazi propaganda. The site includes sections called "Jewish Problem" and "Race War."

Other targets of The Daily Stormer and its "Troll Army" of readers have included prominent journalists, a British Parliament member and Alex Jones, a radio host and conspiracy theorist whom Anglin derided as a "Zionist Millionaire."

Gersh's lawsuit said she agreed to help Richard Spencer's mother sell commercial property she owns in Whitefish amid talk of a protest outside the building. Sherry Spencer, however, later accused Gersh of threatening and harassing her into agreeing to sell the property.

Anglin's initial Dec. 16 post about Gersh urged readers to "take action" against her and other Jewish residents of Whitefish, posting their telephone numbers, email addresses and Twitter handles.

"And hey if you're in the area, maybe you should stop by and tell her in person what you think of her actions," he added.

See the rest here:

First Amendment lawyer defending neo-Nazi website publisher - San Francisco Chronicle

3 Signs the Cryptocurrency Exchange Market Is Maturing – CoinDesk

This article highlights findings from CoinDesk Research's new Q1 2017 State of Blockchain report, and expands on the composition of bitcoin, ethereum and other exchange trading volumeinto Q2.

Click here to view the slides in your browser.

Underlying bitcoin and ether'sall-time-high price rallies in Q1 was a dramaticallyshifting global exchange market.

So far in 2017, trading volumes have seen big changes, ones that indicate a reshaping of the global market.

Global exchange volume for bitcoin, for example, plummeted in January after the People's Bank of China (PBoC)issued guidance to domestic exchanges around their regulatory and operational policies. The development led to periods wherewithdrawals and margin tradingwere stalled, andtrading feeswere instituted after years of no-fee trading.

Despite the substantial shifts, here are three trends that CoinDesk Research has highlighted as signs of a maturing overall market in Q1 and the periodsince.

The PBoCs impact on the Chinese 'Big 3' exchanges in January sent worldwide trading volume figures tumbling to levels lower than seen in years.

The drop in CNY volume however made room for USD and JPY markets to develop as major constituents of global trading in Q1.

Since the end of the first quarter, the Japanese yen (JPY)has continued as the leading fiat currency traded for bitcoin (following legislation recognizing bitcoin as a legal payment method), with USD trailing narrowly.

Chinese yuan (CNY)volume has dropped to about a quarter to a third of that of JPY and USD, and South Korean won (KRW)and euros(EUR) are now not far behind, comprising one of the most diverse allocationsof global trading the industry has ever seen.

Markets for ether followed a different trend as prices and volume both spiked at the end of Q1.

Trading throughout the quarter was dominated by BTC, with USD steadily gaining traction.

Regarding exchange trading volume, Poloniex led BTC volumes by a large margin, while Coinbase narrowly edged out Bitfinex for dominance over USD-based markets in the first quarter.

Since then, exchange dominance has remained relatively consistent, but currency rankings have shifted as KRW-based trading rallied into the third place position.

The global composition of ether trading is similarly now the most diverse it has ever been.

Ethereum now serves as the base protocol or infrastructure layer for many decentralized applications as well as acting asa cryptocurrency (now with a combined market cap of several billion dollars alone), further positioning itself as a major backbone of future projects and trading.

The aggregate market cap of all blockchain tokens now exceeds $100m (or more depending on how you evaluate supply), currently dominated by bitcoin, ether and ripple.

Over 130tokens now have an implied valuation of north of $10m, comprised of new blockchains like zcash, monero or litecoin and tokens created on top of existing blockchains (like ethereum or waves) such as golem, augur or gnosis. Just four years ago, onlytwo tokens had a market cap over $10m, bitcoin and litecoin.

In the last month, 18 tokens averaged over $10m in daily trading volume.

As alternative blockchains andassets have grown in popularity, many large exchanges have extended trading support to profit from the trend fueling their rise in trading and quoted valuations.

Leading global digital asset exchanges such as Coinbase, Poloniex, Kraken, Bittrex, Shapeshift and Bitfinex now support numerous markets for tokens and fiat currency pairs. Further, an emerging market of decentralized exchanges and protocols like EtherDelta and 0xis growing, all of which diversifies what was once a centralized and bitcoin-dominated trading market.

The demand side of the equation has also seen increased inflows asall-time-high prices and increased media attention led to new users pouringinto the cryptocurrency space, with major exchanges like Poloniex and Coinbase experiencing record growth and trading across assets.

The allocation of cryptocurrency trading across exchanges and currencies has changed markedly over the years due to sentiment, regulation, hacks and business decisions by exchanges to support new trading pairs.

In March, the SECrejected two bitcoin ETFs, citing the lack of significant regulated markets and industryconcentration in China. Around the same time, the markets sawa notable decrease in volume from China and an increase from South Korea and Japan after significant regulatory guidance.

Since, trading volume compositions have remained more diverse than ever across bitcoin and ethereum, and the industry has seen both pushes to reconsider abitcoin ETF and consider a new ethereum ETF.Wewill undoubtedly see future initiatives for new types of structured products as the market continues to mature.

The biggest change, however, could continue to be the sharpdecrease in bitcoin's dominance should ethereum and other tokens capture a larger percentage of overall trading in a more diverse set of markets.

View CoinDesk Research'sfull Q1 2017 State of Blockchain for more analysis on cryptocurrency trading volumes and other market statistics.

Disclosure: CoinDesk is a subsidiary of DCG, which has an ownership stake in Coinbaseand zcash.

Urban road scene image via Shutterstock

Original post:

3 Signs the Cryptocurrency Exchange Market Is Maturing - CoinDesk

Weekend tech reading: Cryptocurrency valuations still rising, 3 years on a Hackintosh – TechSpot

What the hell is happening to cryptocurrency valuations? The total market cap for all cryptocurrencies just surpassed $100 billion. The vast majority of these gains have come in just the last few months on April 1st the total market cap was just over $25 billion representing a 300 percent increase in value in just over 60 days. While some of these gains are from bitcoin itself (BTC is up ~160 percent in the same two-month time frame), other digital currencies like Ethereum are also responsible for the increase, which on its own has increased ~439 percent over the last two months. TechCrunch (also, 3 reasons the cryptocurrency exchange market is maturing & Cryptoeconomics 101)

My experience using hackintosh low-end PC for 3 years Almost 3 years ago I installed Mac OS X mavericks for the first time on my personal computer, before this I used a lot of distributions of gnu linux. but sometimes I had heard about Mac OS X and hackintosh, in that moment it seemed something Impossible to do. After spending hours reading guides in forums, reddit, tonymac86. I decided to try installing mavericks. The first thing I did was to download a torrent of niresh. For that moment there was no support for Yosemite. Jhonny Arana

Pirate Bay founder: Weve lost the internet, its all about damage control now At its inception, the internet was a beautifully idealistic and equal place. But the world sucks and weve continuously made it more and more centralized, taking power away from users and handing it over to big companies. And the worst thing is that we cant fix it we can only make it slightly less awful. The Next Web

An open letter to Microsoft: A 64-bit OS is better than a 32-bit OS There are a few absolutes in life death, taxes, and that a 64-bit OS is better than a 32-bit OS. Moving over to a 64-bit OS allows your laptop to run BOTH the old compatible 32-bit processes and also the new 64-bit processes. In other words, there is zero downside (and there are gigantic upsides). Backblaze

Following the money hobbled vDOS attack-for-hire service A new report proves the value of following the money in the fight against dodgy cybercrime services known as booters or stressers virtual hired muscle that can be rented to knock nearly any website offline. Last fall, two 18-year-old Israeli men were arrested for allegedly running vDOS, perhaps the most successful booter service of all time. Krebs on Security

Automate the freight: maritime drone deliveries Ships at sea are literally islands unto themselves. If what you need isnt on board, good luck getting it in the middle of the Pacific. As such, most ships are really well equipped with spare parts and even with raw materials and the tools needed to fabricate most of what they cant store, and mariners are famed for their ability to make do with what theyve got. Hackaday (also, Japan to launch self-navigating cargo ships 'by 2025')

Its been so windy in Europe that electricity prices have turned negative It's been very windy across Europe this week. So much so, in fact, that the high wind load on onshore and offshore wind turbines across much of the continent has helped set new wind power records. For starters, renewables generated more than half of Britain's energy demand on Wednesdayfor the first time ever. Vice

Amazon lent $1 billion to merchants to boost sales on its marketplace Amazon.com Inc has stepped up lending to third-party sellers on its site who are looking to grow their business, a company executive said in an interview on Wednesday. The e-commerce giant has doled out more than $1 billion in small loans to sellers in the past 12 months, compared with more than $1.5 billion it lent from 2011 through 2015, said Peeyush Nahar, vice president for Amazon Marketplace. Reuters

DARPA funds development of new type of processor A completely new kind of non-von-Neumann processor called a HIVE Hierarchical Identify Verify Exploit is being funded by the Defense Advanced Research Project Agency (DARPA) to the tune of $80 million over four-and-a-half years. Chipmakers Intel and Qualcomm are participating in the project, along with a national laboratory, a university and a defense contractor North Grumman. EE Times

Xbox Unleashed: Our deep-dive study of how millions use Xbox Live For three years now, Ars Steam Gauge project and the public sampling projects it has inspired (such as Steam Spy) have provided an important behind-the-scenes look at what kinds of games are popular on PC gamings most popular marketplace. Today, after years of work, were ready to unveil a new effort that similarly uncovers whats popular among Xbox Live users on the Xbox One and Xbox 360. Ars Technica

Read the original here:

Weekend tech reading: Cryptocurrency valuations still rising, 3 years on a Hackintosh - TechSpot

Top 5 Ways to Shill a Cryptocurrency – The Merkle

In the world of Bitcoin and cryptocurrency, we have a phenomenon known as shilling. This particular endeavor revolves around tricking as many people as possible into thinking a particular coin or token will be valuable in the future. There are many different ways to go about things, although some methods are far more common compared to others. Below are some of the more common methods people use to shill particular cryptocurrencies.

One of the places where people often used to shill cryptocurrencies was the Trollbox on the Poloniex exchange. Albeit such hangout places are designed to have a nice chat with other users, they often become a tool to promote new cryptocurrencies regardless of whether they have any real value whatsoever. Trollboxes and chatboxes on most cryptocurrency exchanges simply need to be avoided when it comes to any cryptocurrency advice. Shilling is the top priority there, rather than having mature conversations. Thankfully, Poloniex shut down its Trollbox not too long ago.

The BitcoinTalk forums are the go-to place for any discussion related to cryptocurrency. What once started out as a bitcoin-only bastion slowly evolved into a place where multiple cryptocurrencies can be discussed at any given time. Do keep in mind a lot of people hanging out in the altcoin section are merely shilling particular coins, though. There are also quite a few paid advertising campaigns to spread the world about coin X or token Y. Always be careful when looking for specific information on BitcoinTalk.

As we have come to expect these days, a lot of people rely on Reddit for the latest information regarding cryptocurrency. Virtually every token, asset, or coin has its own subreddit these days, which is good. However, a lot of those Reddit posts in those subsections are merely speculation, fake news, and shilling attempts as well. Any information found on Reddit regarding whichever cryptocurrency needs to be taken with a massive grain of salt, to say the least. There is also the risk of seeing a paid Reddit advertisement at the top of a particular subreddit, which is designed to shill a particular coin.

One of the most common ways to shill currencies, tokens, and assets is by using social media. Things are getting a bit out of hand on both Twitter and Facebook these days. A lot of people will tweet something in quick succession to gain some form of social traction. That is not always a successful way of doing things, but it certainly ensures things get noticed on the platform. This is especially true with most ICO tokens and altcoins which bring nothing of value to the table.

Things are virtually the same on Facebook, though. Every group related to Bitcoin or cryptocurrency will ultimately attract shills trying to promote a specific project or service. In most cases, these coins are useless or the service turns into a scam. It is impossible to trust the information one receives from social media, as shilling becomes a second nature pretty quickly.

The most intriguing way to ensure some projects gain traction regardless of their legitimacy is by paying for content on blogs and news sites. We often see scam projects and pointless ICOs issue press releases to sites, who publish them in exchange for a small fee. In some cases, such paid content will show up on PR Newswire, or even get picked up by mainstream media outlets. People need to be especially wary of this type of content, as a lot of shills will gladly pay a small fee to ensure their flavor of the month project gets some attention.

If you liked this article, follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin, cryptocurrency, and technology news.

View original post here:

Top 5 Ways to Shill a Cryptocurrency - The Merkle

Linux worm turns Raspberry Pis into cryptocurrency mining bots – Boing Boing

Linux.MulDrop.14 is a Linux worm that seeks out networked Raspberry Pi systems with default root passwords; after taking them over and ZMap and sshpass, it begins mining an unspecified cryptocurrency, creating riches for the malware's author and handing you the power-bill.

Experts say the initial infection takes place when Raspberry Pi operators leave their devices' SSH ports open to external connections.

Once a Raspberry Pi device is infected, the malware changes the password for the "pi" account to:

$6$U1Nu9qCp$FhPuo8s5PsQlH6lwUdTwFcAUPNzmr0pWCdNJj.p6l4Mzi8S867YLmc7BspmEH95POvxPQ3PzP029yT1L3yi6K1

After this, Linux.MulDrop.14 shuts down several processes and installs libraries required for its operation, including ZMap and sshpass.

The malware then launches its cryptocurrency mining process and uses ZMap to continuously scan the Internet for other devices with an open SSH port.

Once it finds one, the malware uses sshpass to attempt to log in using the username "pi" and the password "raspberry." Only this user/password combo is used, meaning the malware only targets Raspberry Pi single-board computers.

Linux Malware Mines for Cryptocurrency Using Raspberry Pi Devices [Catalin Cimpanu/Bleeping Computer]

(Image: Evan-Amos, PD)

report this ad

Pity poor Turla, the advanced persistent threat hacking group closely associated with the Russian government who were outed yesterday for their extremely clever gimmick of using Britney Spearss Instagram account as a covert channel for controlling compromised computers in the field while protecting their command and control servers; today, Turla faces another devastating disclosure, a []

The independent, Congressionally mandated Health Care Industry Cybersecurity Task Force released its report last week, setting out their findings about the state of security in Americas health technology (very, very, very bad) and their recommendations (basic commonsense cybersecurity 101).

A key weakness in malicious software is the Command and Control (C&C) system: a central server that the malware-infected systems contact to receive updates and instructions, and to send stolen data. Anti-malware researchers like to reverse engineer malicious code, discover the C&C servers address, and then shut it down or blacklist it from corporate routers.

If Apples AirPods are a bit too rich for your blood, or you know, youre an Android user, these discreet earbuds can be had for a fraction of the cost and will stay securely in place whether youre working out, commuting, or running between errands. Plus, with IPX4 water resistance, they can survive splashing water []

The QFX Elite Series of wireless speakers can be synced up to provide a perfect multi-room sound system, and each speaker (and all three together) are currently available at a discount price.The Elite Series iscompatible with any Bluetooth-capable device, and you can connect eachspeaker over WiFi for a wider reach and greater signal stability. Pair []

In Deception: Murder in Hong Kong, players must solve a grisly murder through collaborative deduction. One person plays the role of the killer, who carefully chooses what kind of evidence they leave at the scene of the crime. The killer tries to sabotage the investigation, while the forensic scientist attempts to reveal him or her []

report this ad

The rest is here:

Linux worm turns Raspberry Pis into cryptocurrency mining bots - Boing Boing

Top 6 Recent Cryptocurrency Pumps – The Merkle

In the world of Bitcoin and cryptocurrency, there are multiple pump-and-dump schemes to be found every week. Mainly smaller coins are often pumped to inflate the price, in the hopes of getting other people to buy in. Unfortunately, there is often a lot of hype associated with any major pump, regardless of whether it is relevant news or not. We have seen quite a few pumps in recent weeks, and the following ones stood out.

One of the many smaller altcoins to integrate Segregated WItness goes by the name of Vertcoin. On paper, there is no real reason to sue this cryptocurrency over others, by any means. However, some people are trying to drive the price up, and one VTC is worth nearly US$1 at the time of writing. That is quite a jump in value, considering VTC was valued at roughly US$0.25 a few weeks ago. Someone is definitely pumping the value.

It has been extremely quiet where CloakCoin was considered for quite some time. A few days ago, the value per coin suddenly started going up, despite there being very little trading volume. One CLOAK is valued at US$3.83 now. There is absolutely no reason to use CloakCoin, other than from a privacy perspective. Then again, there are multiple major cryptocurrencies offering similar and sometimes better- technology to achieve the same goal. It looks like CloakCoin is a clear pump-and-dump, although it is too early to tell what might happen.

It is not hard to see why people think of BitcoinDark as a pump-and-dump scheme. The currency is trying to ride Bitcoins coattails on the way to success. It is one of the many futile attempts to bring more privacy and anonymity to Bitcoin. In fact, it uses its own blockchain, removing any potential ties with Bitcoin in the process. Every BTCD is worth US$65.65 right now, which is massively overvalued, to say the least.

When Primecoin initially launched, a lot of people got excited because it provides a bit of a novel concept. To this very day, there is no reason to actually use Primecoin, other than from a speculative point of view, though. Primecoin has seen its market cap grow to over US$10.7m, despite having no real use cases. Once again, a clear example of someone trying to pump the price and looking to dump on investors getting caught up in the frenzy.

Although a lot of people would rather not see Digibyte on the list, it is impossible to deny the currency is getting pumped hard right now. Many people still believe there is a Minecraft deal, which is not the case. Nor did Digibyte win the Citibank tech challenge, which is somewhat of a shame. In fact, there is no real reason for one Digibyte to be worth what it is today, and the trend is already showing signs of reversing. The Digibyte team is working on some amazing technology, yet they do not hinge on the success of DGB as a currency.

It is a bit difficult to quantify the use cases for Stellar, albeit they are quite similar to Ripple and their XRP asset. It appears Stellar is trying to compete with Ripple in developing technology and a currency for the financial sector. There are some key differences between both projects, as we highlighted before. Over the past few weeks, the value of Stellar Lumens has been pumped to US$0.05. That is rather remarkable, considering a large amount of XLM is distributed free of charge. Stellar has some partnerships with banks, but it is not even close to the same level Ripple is at right now.

If you liked this article, follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin, cryptocurrency, and technology news.

Read the rest here:

Top 6 Recent Cryptocurrency Pumps - The Merkle

Mark Cuban tweets, and bitcoin drops – MarketWatch

When Mark Cuban tweets, people listen.

At least that appeared to be the case on Tuesday when the outspoken billionaire offered this bitcoin warning to his 7.1 million Twitter followers:

At the time, bitcoin BTCUSD, +5.00% was slightly off its high for the day but was still holding strong near the $2,900 level. As you can see, soon after the tweet, the volatile cryptocurrency drifted further from its peak.

Regardless, bitcoin has been on an absolute tear this year, surging some 200% and gaining more widespread recognition, even prompting one of social medias most popular gun-toting poker players to join the fun.

But Cuban remains unconvinced:

And:

Of course, this isnt a big departure for Cuban, who once told USA Today that bitcoins got no shot as a long-term digital currency.

He didnt, however, rule it out as a possible investment play.

Read: With bitcoin surge, cryptocurrencies top $100 billion in market capitalization.

See the rest here:

Mark Cuban tweets, and bitcoin drops - MarketWatch

4 Reasons Why Bitcoin Is Not In A Bubble – CryptoCoinsNews

Is bitcoins price in a bubble? Those who say so believe people are buying the cryptocurrency is for speculative purposes versus its original purpose for transactions.

Nathan Martin, writing in Economic Edge, believes most are buying bitcoin because its a better store of value. Bitcoin provides a better store of value than assets that are controlled by banks, he claims, and it will continue to do so for the foreseeable future. Hence, the number of people using bitcoin will continue to increase.

People cannot earn anywhere near the pace of actual inflation by putting their money in traditional savings accounts. Central banks control the currencies most people use and are manipulating these currencies to keep interest rates low.

Stocks, bonds and real estate are all in a bubble, as is the U.S. dollar, Martin noted. Gold and silver are also being manipulated by central banks.

Hence, there is no good store of value. Retirees on fixed incomes simply cannot, and will not be able to keep up as the impossible math of the dollar debt continues on its vertical ascent, Martin wrote.

Bitcoin is a better store of value for the following reasons.

1. Bitcoin is decentralized. Martin and many others consider this the most important characteristic of bitcoin. No central power controls bitcoin. Central banks could indirectly manipulate cryptocurrencies by creating derivatives and exchange traded funds based on those cryptocurrencies. But this will not change bitcoins underlying store of value.

Should central banks create derivatives based on bitcoin, Martin encourages people to buy bitcoin directly. Banks cannot manipulate what they dont control.

2. Bitcoins supply is limited. There will only be 21 million bitcoins created, and 80% of this number has already been created. The more funds invested in bitcoin, the greater the value of each bitcoin. Other blockchain currencies could affect bitcoins value, but all the other cryptocurrencies combined are not yet equal to bitcoins market value. In addition, those cryptocurrencies that dont have limited supply will not hold their value.

3. Bitcoin is secure. Encryption and decentralization make it so. It can be stored in cyber vaults, where owners keep a hard copy of the encryption cipher. While a bitcoin exchange and a computer can be hacked, bitcoin that is in a vault will not reside in the exchange or the computer, and only the owner has the code to access the stored bitcoin. No one can confiscate it.

4. Bitcoin transactions are stored on a public ledger that lists all confirmed transactions. Decentralized bookkeeping is more secure than centralized ledgers.

Also read: Bitcoin is no bubble in climb to $3,000

Bitcoin will someday be in a bubble, but that time is far away, Martin noted.

One benefit of cryptocurrencies is that they coexist with other forms of money used for transactions. Bitcoin is not in a bubble. Instead, people are using it to park their dollars so central banks cannot destroy their value.

Volatility will continue for bitcoin, as nothing moves in a straight line. Martin believes cryptocurrencies will trade along with sovereign currencies and eventually replace them.

He will not be convinced that the growth of bitcoins price has stalled until its market cap rivals that of the United States money supply, which is $13.5 trillion.

Featured image from Shutterstock.

See the original post here:

4 Reasons Why Bitcoin Is Not In A Bubble - CryptoCoinsNews

The mystery xenon in Earths atmosphere came from icy comets …

Xenon delivery service

ESA/Rosetta/NAVCAM, CC BY-SA IGO 3.0

By Leah Crane

The origin of the xenon in Earths atmosphere has been a mystery for decades. Now, using data from the Rosetta spacecrafts tight orbits around a comet, researchers have determined that 22 per cent came from comets. This strengthens suspected connections between these celestial bodies and Earths evolution.

The xenon gas in Earths atmosphere contains more heavy isotopes than xenon in the solar wind or meteoroids, and for decades researchers couldnt figure out where this heavy component came from. The idea that it could have been brought here by comets was often suggested, but evidence was limited.

In 2014, the Rosetta spacecraft orbited the comet 67P/Churyumov-Gerasimenko mere kilometres from the surface, allowing it to sample the gas coming off the comets ice patches. Bernard Marty at the University of Lorraine in France and his colleagues found that those gases closely matched the composition of Earths heavy xenon.

The Earths atmospheric xenon is a mixture between meteoritic and cometary, and we know the composition of each now, says Marty. So we mix them, we make up a cocktail, until we find the taste of the atmosphere.

The cocktail that best matched our atmosphere was about 22 per cent cometary xenon, with the rest of the xenon coming from meteors. Its a nice, elegant explanation for xenon in the atmosphere, something which has eluded geochemists to date, says Colin Jackson at the Smithsonian Institution in Washington DC.

However, this does assume that all comets are similar to 67P. This is based on measurements on this one comet, and the study of materials in the solar system always emphasises how diverse chemistry is throughout the solar system, says Jackson

Should the type of xenon on 67P prove to be representative of a large group of comets, it also has larger implications for Earths evolution.

In addition to matching the heavy components of xenon in Earths atmosphere, the comet samples also had a surprising amount of a particular type of the gas, xenon-129.

On Earth, we presumed the presence of this isotope was primarily a result of decaying iodine. We know the rate at which iodine decays, so we use the quantity of xenon-129 to gauge the time at which planetary events took place. But if 22 per cent of the xenon in Earths atmosphere was transported by comets, models based on iodine decay arent accurate. They overestimate the age of Earths atmosphere and the moon.

Looking at Earths mantle gives us a hint as to when our xenon delivery must have occurred, and it means comets would have had a difficult job to reach us. The mantle doesnt contain the cometary signature of xenon, so the xenon in the modern atmosphere must have been delivered after the mantle stopped incorporating gases from the atmosphere. At that time, 4.5 to 3.5 billion years ago, comets would have had to navigate a treacherous solar system to get here.

Astronomers think Jupiter, Saturn, Neptune and Uranus formed a kind of barrier between the inner and outer parts of the solar system. Their gravitational fields would have attracted small bodies, like these xenon-laden comets, lowering their chances of making it to Earth.

But comets are from the outer solar system, and now we know they came to Earth, says Marty. He says if the orbits of the giant planets changed at some point 100 million years or more after the solar system began to form, which some theories have suggested that they did, they could have allowed some comets through toward Earth.

Those comets could have brought with them not just xenon, but also the volatile elements crucial for life, like hydrogen and nitrogen. The inner solar system was probably too hot for these elements to survive the cloud of dust and gas from which Earth was formed, so its long been postulated that at least some portion was delivered after the planets formation by comets.

This new evidence that our planet was visited by comets relatively early in its formation could strengthen the connection between comets and Earths hospitality to life. Comets could have potentially carried a lot of organic molecules out to Earth, says Marty. It doesnt mean that comets brought life, but they could have brought the bricks of life.

Journal reference: Science, DOI: 10.1126/science.aal3496

Read more: Our atmosphere came from outer space

More on these topics:

See more here:

The mystery xenon in Earths atmosphere came from icy comets ...

Comets | Cool Cosmos

Comets are like time capsules, telling us what conditions around the Sun were like when the Earth was first forming. Some, like Halley's comet, are regular visitors to our skies, while others have only been seen once in human history, and may only return every several hundred thousand years.

One astronomical unit, or AU, is equal to the distance between the Earth and the Sun, which is 150 million km; or 93 million miles.

Comets are like dirty snowballs, made mainly of ice and frozen carbon dioxide with some dust and organic molecules, left over from the formation of the Solar System. They're like "time capsules," telling us what conditions were like in our Solar System 4.5 billion years ago, when the Sun and planets were first forming.

Comets were born in the icy outer regions of our Solar System. Occasionally, one will make its way in towards the Sun. As itstarts to get close to the Sun, the comet warms up, and the ice, carbon dioxide and dust that are trapped inside start to evaporate, bursting out of the comet in bright jets.

The solid part of the comet is called the nucleus. As the nucleus starts to evaporate,a coma, or cloud of this dust and gas, surrounds the nucleus. As more gas and dust are lost, the comet then forms a tail that is pushed away from the Sun by the pressure of sunlight. This dust tail is easily spotted with infrared telescopes, and it traces the comet's curved orbital path.

Comet Siding Spring is a great example of this: the dusty tail glows in the infrared, curving along its orbital path. The comet and its dust tail appear red because they are more than ten times colder than the bright blue stars in the background.

About once every ten years, a comet comes with a tail so bright that we can even see it with the naked eye. Astronomers hope that Comet ISON, due to swing past the Sun in late 2013, will put on a spectacular show. If it doesn't break up under the pressure of gases forcing their way out of the nucleus, it could look as bright as the moon, and may even be visible during the day.

Comets often form a second tail, called the ion tail, or gas tail. As the name suggests, it is made of ionized gas, which also gets blown away by the Solar wind, and always points directly away from the Sun. Comet Hale-Bopp was a bright comet that had two very distinct tails. The white dust tail and the blue ion tail could be seen pointing in slightly different directions - the blue ion tail pointing directly away from the Sun, and the white dust tail following the curve of the comet's orbit.

Astronomers believe that comets formed in both the Oort Cloud and the Kuiper Belt. The Oort Cloud is a vast, spherical shell of icy bodies left over from the cloud of gas and dust that formed the Sun, which surrounds the Solar System at a distance between 5,000 and 100,000 astronomical units (AU) away. Comets that come from the Oort Cloud are long period comets, which only come near the Sun for short periods of time, every few thousand years. They trace out large eccentric, or egg shaped orbits rather than circular orbits. Astronomers estimate that there could be as many as a trillion comets out in the Oort cloud.

Halley's Comet last visted the Earth in 1986. Can you calculate when it will next be back? How old will you be then?

Comets that orbit the Sun at much closer distances are called short-period comets and swing past the Sun more regularly. They are thought to have been formed in the Kuiper belt - a disk of icy worlds and rocky bodies that rings the Solar System at the orbit of Pluto and beyond.Comets that have been seen more than once in human history, like Halley's Comet (which visits the inner Solar System every 75-76 years), are all short-period comets.

Infrared light is very important for measuring the size of a comet. When we observe a comet in visible light, we see the light that the comet reflects from the Sun. Because of that, a large, dark comet can appear to be the same size as a small, highly reflective comet. In infrared light, however, a comet's brightness depends upon the amount of heat it absorbs from the Sun and re-radiates back into space. A bigger comet has a bigger surface area, so it gives off more heat and looks brighter in the infrared. Comet nuclei range from a few hundred meters to tens of kilometers across, but their tails can stretch for millions of kilometers.

Comets are mainly made up from water and carbon dioxide ice, but the small amounts of dust can tell us a lot about the early solar system. Astronomers using data from NASA's Spitzer Space Telescope and the Deep Impact mission put together a recipe for comet "soup" -- the primordial stuff of planets, comets, and other bodies in our Solar System.

These "comet soup" ingredients are pictured: (in the back from left to right) a cup of ice and a cup of dry ice; (in measuring cups in the middle row from left to right) olivine, smectite clay, polycyclic aromatic hydrocarbons, spinel, metallic iron; (in the front row from left to right) the silicate enstatite, the carbonate dolomite, and the iron sulfide marcasite.

The comet ingredients were excavated from Comet Tempel 1 in 2005, when Deep Impact's probe plunged below the comet's surface. While Deep Impact was busy collecting data up close, other telescopes around the world were also watching from the ground and space.

Spitzer observed the dramatic event using its infrared spectrograph, an instrument that breaks apart light like a prism, allowing astronomers to pick out chemical signatures that appear between the wavelengths of 5 and 38 microns. Spitzer detected clays; iron-containing compounds; carbonates, the minerals in seashells; crystallized silicates, such as the green olivine minerals; and polycyclic aromatic hydrocarbons, carbon-containing compounds found in car exhaust and on burnt toast. Hints of the mineral found in the reddish-brown gem spinel were also observed.

Deep Impact's spectrometer also picked up the signatures of additional molecules within the wavelength range of 1 to 5 microns, including water vapor and carbon dioxide gas (the swirling vapor that comes off "dry ice").

Our Solar System is not the only place to find comets in the Universe. Spitzer has revealed the telltale signature of comet dust around other stars. The silicate mineral, olivine, in the form of forsterite, was detected in the dust around a star called HD 69830, and found to match the dust seen in Comet Hale-Bopp.

Forsterite is a bright green gem found on Earth, on the green sand beaches of Hawaii, among other places. Olivine is one of the main ingredients of the Earth's interior. You might even say that we live on a congealed pile of mineral dust, like the dust contained in the comets that swarmed around the Sun 4500 million years ago. That same mineral dust is now seen around other stars, like HD 69830.

Evidence for comets has even been seen around dying stars. The Helix Nebula is one of the most famous images from Spitzer, showing a dying star unraveling its outer layers out into space. The bright pink glow in the center is the combined ultraviolet and infrared glow of a dusty disk encircling the fading star, most likely kicked up from comets that survived its final death throes. Before the star died, its comets, and possibly planets, would have orbited the star in an orderly fashion, much like our own Solar System today. When the star ran out of hydrogen to burn, and blew off its outer layers, the icy comets would have been tossed about and into each other, kicking up an ongoing cosmic dust storm.

For more on how stars die, see Star Death.

As comets are relics from the protosolar nebula (before the Sun was a star), they played a major role in the formation of the planets. According to some theories, a substantial fraction of our oceans may have formed from the ice of comets that bombarded the Earth. Other theories suggest that carbon compounds contained in comets may have contributed raw materials for the origin of life on the Earth. Understanding more about the composition and behavior of these icy time capsules is therefore crucial for a fuller understanding of our cosmic origins.

See original here:

Comets | Cool Cosmos