As Trump leaves for Europe, a question looms: Will he really commit to NATO once and for all? – Washington Post

By Kelly M. McFarland By Kelly M. McFarland July 6 at 5:00 AM

President Trumps second foreign trip kicks off today in Warsaw the first leg of a trip that includes the G-20 Summit in Hamburg and a stop in Paris for Bastille Day. The trip comes in the wake of the turmoil from the presidents European trip to the G-7 meeting in May, with the additional drama of the first Trump-Putin bilateral meeting.

But for Trump and for the United States, the Warsaw stop will present a set of modern-day challenges with historical echoes. On the one hand, Trump probably will have his most favorable meetings in Poland. Warsaws right-wing government and anti-immigration stance, among other things, are more in line with his administrations anti-internationalist stance.

[This is what the gradual erosion of rule of law looks like in Poland]

On the other hand, Poland like much of Europe will also be looking for Trump to put European allies at ease, and make a strong U.S. commitment to NATOs Article 5 treaty. Poland, along with the NATO member states bordering Russia, is fearful of Russias recent aggression spreading westward.

Poland and Estonia are two of only five NATO members that meet the target of spending 2 percentof gross domestic producton defense, a commitment NATO members agreed to work toward after the 2014 Wales Summit. Three other nations in the region, Romania, Latvia and Lithuania, are set to join this list by next year.

Article 5 is the glue holding NATO together

What all of these countries want to hear is a firm statement on Article 5 of the NATO treaty which simply stipulates that an attack on one alliance nation is an attack on them all. This is the core of the NATO alliance, and U.S. adherence to Article 5 dominates alliance members calculations, especially in Eastern Europe. AlthoughTrump pledged U.S. adherence to Article 5 during a June news conference with the Romanian president, many in the alliance remain uncertain, given the presidents failure to make a public commitment during his speech to fellow NATO leaders in May.

[Trump isnt a huge fan of NATO. But his complaints are off target.]

Collective defense was the core of the NATO alliances formation and credibility in 1949, and it remains so. As a crucial first step in NATOs creation and a prerequisite as far as the United States was concerned Britain, France, Belgium, the Netherlands and Luxembourg proved that they could come together for collective defense in the 1948 Brussels Treaty. To solidify a credible deterrent to the Soviet Union, the defense pact needed to expand to include the United States.

The biggest hurdle for the Truman administration at the time was overcoming a historical antipathy against alliances to create the first entangling alliance since the 1778 treaty with France. Realizing what was at stake in the growing Cold War, the administration worked across the political aisle to get key Republicans on board, most notably Sen. Arthur Vandenberg (R-Mich). In short, Vandenberg crafted the requisite legislation that would allow the United States to bind itself to the progressive development of regional and other collective self-defense.

As NATO historian Stanley R. Sloan points out, Today, the collective defense commitment still endows the North Atlantic Treaty with special meaning. It is a potential deterrent against would-be enemies of the allies and a source of reassurance should future threats develop.

Historically, Poland could use some reassurance

Poland hasnt had the best of luck controlling its sovereignty over the past two centuries. It was partitioned between regional powers in the late 1700s and gained independence only in 1918. As we know from more recent history, that didnt last long.

The Nazi-Soviet Non-Aggression Pact of August 1939 divided Poland between Hitlers Germany and Stalins Soviet Union. On Sept. 1, 1939, the German invasion of Poland launched World War II. Berlin eventually reneged on the pact and invaded the Soviet Union in the summer of 1941. The Poles, especially Polish Jews, would suffer some of the worst atrocities of the war.

The Soviet Red Armys liberation of Poland in 1945 and the conclusion of World War II didnt give Warsaw much of a break. Stalin sought a sphere of influence in Eastern Europe to act as a buffer between himself and the West, the direction from which Russias adversaries had come twice in the past 30 years. Against American protests, the Soviets installed a Moscow-friendly communist government in Warsaw, ushering in close to 45 years of Soviet dominance. Warsaw would also become the namesake for the pro-Soviet alliance system the Warsaw Pact created in 1955 to become NATOs counterfoil.

NATOs front lines have shifted

During the Cold War, if a hot war between NATO and the Warsaw Pact was going to begin, the chances were it would begin in a divided Berlin. For more than40 years, the two sides stared at one anotheracross dividing lines with names such asCheckpoint Charlie and weathered a major crisis from 1958 to 1961. The Berlin Walls fall in 1989, Germanys unification and the collapse of the Soviet Union in 1991 ended the Cold War and nightmares of Soviet tanks crossing into Western Europe.

In the past 25 years, NATO expanded eastward to include former Warsaw Pact members such asPoland, as well as former Soviet states. As tensions with a resurgent Russia have risen, many of these states worry that, as in Ukraine and Crimea, the Russians will find a pretext to initiate a hybrid war in the region to regain lost influence and control. This is why such a large portion of Russias neighbors in Europe spend at least 2 percent of GDP on defense, or will by 2018.

[Trumps national security adviser wants to water down U.S. NATO commitments. Heres what that means.]

As the Monkey Cage has noted, NATO stepped up its involvement in Eastern Europe in response to Russias actions in Ukraine, including Obama administration-ordered troop increases in Poland and other Eastern European nations. Poland and its Baltic neighbors will be looking for Trump to give strong assurances in a major speech he will deliver in Poland. Mediareports after Trumps May speech at NATO headquarters note that it appears the president intentionally removed a sentence reaffirming U.S. adherence to Article 5.

According to national security adviser H.R. McMaster, the president will reiterate Americas commitment to NATOs common defense this week in Poland. Whether this is a formal adherence to Article 5, a common understanding of the threat Russia poses to the region, or continued backing of American forces in the Baltics and Poland remains to be seen.

Kelly M. McFarlandis a U.S. diplomatic historian and director of programs and research at Georgetown Universitys Institute for the Study of Diplomacy and an adjunct professor in the Walsh School of Foreign Service.

Read more:

As Trump leaves for Europe, a question looms: Will he really commit to NATO once and for all? - Washington Post

NATO – News: NATO boosts cooperation with Ukraine on scientific … – NATO HQ (press release)

Y{s_agND%d[RI|{I{F wR6H6:V]x|sIcw,BddQcOH|%th118/d!c<5&hJIQHefD@+FaaR1.43rFF"*t(LKYHRhLLBjfJ.41Uv<4K THRC00TlP{^j Qqn"'%sufRjrgtrA_ ""Dbf936r`LwSpi?0m8)nE&l$Y@ X"L]!DH.D'($KuM"kTWVstV!-Vl|9tOp*fdslDCk:BQnlUySOLHV|h@S2qbBw2X@U'+Zv~VA].^l]>:ai[N2(u&3.ZwZl(/;~;( vUvvR7[BRUkVRnM3p9:b;)cN+"iT#!K#)m2$N-@POY8o^(,N"* r.iB zbK CH`94niOhmmxo{b,^}l&(< ),4lWj7olT9d]N.1(46 7~+]: QseyyUBfghTI P+H+ +^Ozv,?,y' _?vr]#WZmW3ZS GB`m07Xf@9;qjV!Ml/M&M ^7!EHu TRD0S|gl59g@VJqoc7(aI ^c%|!zWw(Ep(&ovw|GI)08%pY0fhc#0Nh:Eu}{2=D65$4+ ?un4,H8%oOj@@~)*RN('r #F.D~_uR'!3ODs,)Y~unL^cWEpe I1MX3bs.n'rW`|8z2z01V@Lc'g2f _<~C"}-,(pnxU|p|Dg"XfMeTRR1>!@p`i+F)[m9O?+z-yk^pPf@Det=}~--wk7j?=wJ4:tm1oYj(b%e`W1)XAq5VS2J}C6=k[Vkk"F4uw-F%1&9W>lZ@ m/9gfxIIw7H/3g`oBM7{!`%O]_=;vhq{>4C-ox9JOk+O>1c?gd&C;]c$-sN>/U,P{Kz)kl[*%^SmHBCqMc)3UUY8Fj cp!5U|i`*MK-]wm{h!K8?WUe^0leCJbb :&95WYE)|5#b j*ph"v/TSyOZ%lHYFiY_.tFuXChs(_v!5jiUmm,.^c 6JpXAiSK/'Ad<&a5v3*P-)%Rp q4-eC :Jd(]97R`'Q9:c/0^)<4Y988#i{skwwrvjsC2'(AE{L8f%8"!'u-%r;4:YiEX5X2+n7=oTiMqUDXLYS 4ey`e[*9jJ:B{f[eLg:m&XH(M]US`s|(]|))pdI|;ZZeU(9Fq~F]u@KES_q+isFepsdpstrn'9{Gjze)XjUXna>mE6vm<~[9"Toej.8O]j#Om6pJJ gF~,_eb #.)QXblo,wZJ, TOM,FD(,/:Z5KlB0AeZkLb9msqd4}mf888P4C{&OfM:hR$q$llnwN7vv;'{~`{o++ ~E,m g[xo:-M%pOs%[x%Jp2;J N^CKd,x < 8tUB n*@Cxcn#b#<#T"/>R3nndgmXP2@w*m0#txr/t 7/-~k+g6.j5~~&68Jtzx,B,nm@]6*16 3N#$U83IIc/5A;1a=`@UE0;QEnQKTi:1GGS@C6pnJCz"P."$!~pK3hRBG`_P5 2f33/]Cy@RZK< Pc.8v6_.elp[>VL@C8n@ qz0rXaR#AXnxz&%G*m!v-(x5@;H>0PMtFN0 5Vw./VU~!p9?*!2kg&Vn>pD"`'MA'Qx6%n GqZZ #0E;SX 1Y,$NcJ1<|Z5S:D1lX,*Lr;%1u*?Dtb)v>:HUv*vcX'Fe@P=Kuxv}.QU7YEL$%6`j@M2}gjeWnLe(%AZ~kRIFbtYT)174Y!( N k(`eR6qDxa2xJ%I UGP)@ojFMlj+^/Q_S`E ` %X -W-M}g,H=#G[`S'P)L4ur6J>v6f,JMHC1ySuRNKp?Tj#uH]h 7/dH )h`aB-m#ILtAB=" P*[AnfP@db*]DGKYGJlN]y1g, R6NS$Kd6P"( `]6cGn8k,#@7EV[}4^lX(OC%@~(F'"d$X8: !)E}))`)-;}`"0F#9Ht^XQ%@H_TQ.4ga!8Bd_AgV E5~=q(rG*pAxjKJoc(tNGH:x^My0,T!L[-pEzP,3&RF_hfw]edS$#*]a7UV2"'#a}rgH.=U0g'e"kbND9>%9VVL|:Nhju.~{=Mb'1=:%37+ sU``^kCZ}?Dw4fp :ku" {G*:iD"^@9pH6oh5ec/:H[q(+dNKYL5c.UEGJ`hZS^&vS;;[ajw!TonxiL3N9Yqvs["lH-DeWLfLt3~%}.v~|~^z-fR~P|:'Sz^T#**VqE,] _fC $ihqJzi A-aX)x DTGU,t Dh3.{W=z]5O4s/=y;h$# C$3~|sGX*U.sl%j/:=6,zz2f!YXh(OHp}"8d /U_.]R%[~.Bq#1!7vqU/4j9Db*L}i@ZO.W>"%31{!e+1vf-FGj[8| uGiq[6

Go here to see the original:

NATO - News: NATO boosts cooperation with Ukraine on scientific ... - NATO HQ (press release)

Japan, NATO look to expand cooperation at sea, in cyberspace – The Japan Times

BRUSSELS Prime Minister Shinzo Abe and North Atlantic Treaty Organization Secretary General Jens Stoltenberg affirmed Thursday in Brussels that Japan and NATO should expand their existing cooperation, particularly in maritime security and cybersecurity.

By further strengthening cooperation between Japan and NATO, we must make solid the foundation of (ties between) Japan, the United States and Europe, which share basic valuesI agreed on this awareness with Secretary General Stoltenberg today, Abe said at a joint news event after their talks at NATO headquarters.

In Abes first meeting with Stoltenberg since the latter took up his post in 2014, they both hailed Japans participation in NATO activities, including counterpiracy and cybersecurity initiatives, under a partnership and cooperation program started in 2014.

In the future, we could also look into further maritime cooperation and expand our dialogue on security challenges. We should seek to deepen our cyberdefense cooperation, where NATO sees Japan as a key partner, Stoltenberg said.

Their meeting followed North Koreas apparent test of an intercontinental ballistic missile on Tuesday.

Our position is very clear: North Korea must comply with its international obligations, stop all activities related to its ballistic missile and nuclear programs, abandon all existing weapons of mass destruction programs once and for all and engage in real dialogue with the international community, Stoltenberg said.

Abe also said he invited Stoltenberg to visit Japan before the end of the year.

Link:

Japan, NATO look to expand cooperation at sea, in cyberspace - The Japan Times

Tribune Editorial: Lawsuit should get to the truth about NSA spying in Utah – Salt Lake Tribune

Drake continued, "The new mantra to intercepting intelligence was 'just get it' regardless of the law."

Shameful.

It is becoming clear that such a lack of candor from our government officials has become a feature of our post-9/11 surveillance state, and not a bug. Perhaps the infringements of our freedoms necessitate an end to the entire post-9/11 project. But with the billion dollar Utah Data Center sitting right-smack in Salt Lake County, it's doubtful we could successfully kill the beast that is the surveillance industry.

Perhaps we, too, like Jonathan Swift, need "A Modest Proposal." It would be a shame to let the texts, emails, phone records and Google searches of Utah's most popular citizens go to waste. We paid for these records, let's make them public.

Just think, no one would need private investigators to catch husbands texting old girlfriends. You could easily recover your mom's old meatloaf recipe she emailed years ago.

And all those public officials who, when under investigation, manage to lose thousands of emails, as one-time IRS official Lois Lerner did. And former Utah Attorney General John Swallow, who just happened to leave his tablets on airplanes. Call up the NSA. Problem solved!

Think of the money newspapers and community watchdogs would save in GRAMA / FOIA requests. And how would life be different if police, prosecutors, legislators and other government officials knew their communications would be discoverable?

Deception begets deception, poison begets poison. The Fourth Amendment means what it says, and the government should not have power to spy on Americans without a warrant. In this current case, U.S. Department of Justice officials have until March to disclose relevant documents. Let's hope they can do so honestly.

Read this article:

Tribune Editorial: Lawsuit should get to the truth about NSA spying in Utah - Salt Lake Tribune

Posted in NSA

Mother of accused NSA leaker defends daughter – KRISTV.com | Continuous News Coverage | Corpus Christi – KRIS Corpus Christi News

KINGSVILLE -

The mother of a Kingsville native accused of leaking government information continues to stand up for her daughter. 25 year old Reality Winner remains in jail as she awaits her trial in federal court. She's charged with giving out information important to national security.

Billie Winner-Davis, her mother, wants people to wait for an outcome in that trial before judging her daughter.

"People, you know, just want to lock her up, throw away the key, or even hang her not knowing whether or not she did this, not knowing if she's guilty. She hasn't had a trial yet," Winner-Davis says.

Reality Winner is accused of sending classified information about Russian election meddling to a news outlet while she worked as a National Security Agency contractor in Georgia. The FBI says Winner admitted to leaking the information and prosecutors allege she said, "Mom, those documents. I screwed up.", in a recorded jail phone call.

"I really don't recall her saying those words to me. She could have, you know, maybe I've forgotten, you know?" Winner-Davis says.

Winner-Davis says she doesn't know if her daughter did it, adding she wants to ask but hasn't been able to, since all conversations between them have been recorded.

"I don't know if she would risk her entire life, if she would risk her new job that she just got, her future, her entire life for something like this," Winner-Davis says.

Winner-Davis calls her daughter a patriot. She references her daughter's time in the Air Force and some shirts paid for by supporters. One of the shirts has hash tags on it that say #TRUEPATRIOT and #ISTANDWITHREALITY.

"I'm afraid that she won't get a fair trial in this. I'm afraid that they're going to try to make an example out of her and I want the American people to be watching," Winner-Davis says.

Winner-Davis says that mainly because of President Trump's vow to crack down on leakers.

Reality Winner's trial is set for late October in Georgia. Her mom returned from there a few weeks ago and plans on going back in August. Billie Winner-Davis says she plans on staying through the end of her daughter's trial.

Read more:

Mother of accused NSA leaker defends daughter - KRISTV.com | Continuous News Coverage | Corpus Christi - KRIS Corpus Christi News

Posted in NSA

Appeals court overturns death sentence in 1982 Reno murder case – Las Vegas Review-Journal

A federal appeals court on Wednesday overturned the death sentence for Nevada prisoner Tracy Petrocelli, a three-time convicted killer.

A federal appeals court on Wednesday overturned the death sentence for state prisoner Tracy Petrocelli, a three-time convicted killer.

Petrocelli has lived for more than a quarter-century on death row since being found guilty in a murder that has had substantial influence on Nevada criminal procedure.

He shot and killed Reno used car salesman James Wilson in 1982, after he fled Washington, where he had killed his 18-year-old fiancee, Melanie Barker.

He etched his name into state legal history books after his appeal of the Wilson murder conviction led the Nevada Supreme Court to establish a three-prong test for whether a defendants prior bad acts can be included in evidence at trial.

The decision Wednesday by the 9th U.S. Circuit Court of Appeals was largely unrelated to the prior bad acts issue that dominated Petrocellis early appeals.

The 9th Circuit instead ruled that the penalty phase of the Wilson murder trial represented a flagrant violation of Petrocellis constitutional rights, because it relied on testimony from a psychiatrist who examined Petrocelli without informing him of his Miranda rights.

The psychiatrist, Dr. Lynn Gerow, was hired by the prosecution to perform a competency evaluation after Petrocelli was arrested on murder and robbery charges. He visited Petrocelli at the Washoe County jail and conducted an interview without contacting defense lawyers and without informing Petrocelli of his Fifth Amendment protection against self-incrimination and his Sixth Amendment right to legal representation.

Gerow testified as a government witness during the penalty phase of the Wilson murder trial and told jurors that Petrocelli had a psychopathic personality for which there is no cure. The jury imposed a sentence of death.

U.S. Circuit Judge William Fletcher wrote in his opinion that the effect of Dr. Gerows testimony was magnified by an erroneous jury instruction, which he said gave jurors an inaccurate warning about the chances of Petrocellis release if he was sentenced to life without parole.

The psychiatrists testimony, coupled with the instruction, had a substantial and injurious effect on the jurys decision to impose the death sentence, Fletcher wrote.

Since the first guilty verdict, Petrocelli, now 65, has been convicted of two other killings that occurred in 1981. One was of Barker, who was killed in October 1981. The other murder, of Dennis Gibson, was not prosecuted until the late 2000s. In that case, Petrocelli pleaded guilty to second-degree murder.

All three of his victims were killed within six months of one another from October 1981, when he shot Barker, to March 1982, when he killed Wilson. Petrocelli had not been convicted of murdering Barker when he stood trial for the shooting of Wilson, but the jury still learned of her death through testimony at trial.

Case created evidence parameters

Petrocellis lawyers argued on appeal that such evidence was unfairly prejudicial, citing trial law that generally prohibits evidence of prior bad acts or bad character except under certain circumstances. In a 1985 decision, the Nevada Supreme Court upheld Petrocellis conviction but set out a new test for courts to determine what prior bad acts can come into evidence at trial.

The state high courts ruling led to the establishment of what is known as a Petrocelli hearing, at which defense attorneys and prosecutors argue over whether the bad acts evidence meets the standard spelled out in the 1985 ruling.

The Petrocelli case has defined the parameters of the admissibility of character evidence in Nevada, Clark County Deputy Public Defender Jordan Savage said. The bad character evidence is disfavored because there is the danger that the prejudicial and inflammatory impact of that type of character evidence will cause the jury to not fairly consider the evidence of the charges in the current case.

Petrocellis lawyer could not be reached for comment.

Original conviction upheld

The 9th Circuit, in reversing the death sentence, upheld the original conviction. According to the ruling, state prosecutors can hold a new penalty phase trial or impose a lesser sentence consistent with the law.

We are pleased that the Ninth Circuit has affirmed the District Courts denial of Petrocellis challenges to his convictions, and we are in the process of further reviewing the Ninth Circuits decision to reverse the District Courts denial of relief with respect to his sentence, said Monica Moaz, a spokeswoman for Nevada Attorney General Adam Laxalt, whose office defended the conviction and the death sentence.

Contact Jenny Wilson at jenwilson@reviewjournal.com or 702-384-8710. Follow @jennydwilson on Twitter. Review-Journal reporter Ben Botkin contributed to this story.

Here is the original post:

Appeals court overturns death sentence in 1982 Reno murder case - Las Vegas Review-Journal

Sorry Gavin, Your Civilian Disarmament Agenda Does Not Trump the Second Amendment – AmmoLand Shooting Sports News

by C.D. Michel

U.S.A. -(Ammoland.com)- On June 29 2017, Cuban-born Federal District Court Judge Roger T. Benitez issued aninjunctionin an NRA and CRPA supported lawsuit that challenges Californias laws prohibiting the possession of standard capacity firearm magazines.

For now at least, Judge Benitezs ruling in the Duncan v. Becerra case stops the ban from taking effect. More generally, and perhaps more significantly, it affirms that the Second Amendment is not a second class right, and must be respected and protected by the courts.

In 1960, when he was 10 years old, Judge Benitez emigrated from communist controlled Cuba to the United States. He was accompanied by his 13-year old brother, but his mother was initially unable to accompany them because she had been arrested by Castros forces on suspicion of sympathizing with the United States Government. After being held for three days without being allowed to call a lawyer or her family, she was fortunately released, and was eventually able to escape Castros regime.

Judge Benitez familys experiences under communist rule have impacted his judicial career, and apparently shaped his thinking. Thursdays well-reasoned and meticulously thorough 66-page decision to issue an injunction stopping California law from turning hundreds of thousands of California gun owners into criminals demonstrates that. It shows Judge Benitezs profound respect for, and appreciation of, the freedoms enshrined in the United States Constitution an appreciation likely brought into sharp relief compared to the oppressive dictatorship he and his family lived through.

It seems the Judge has seen how insidious government infringements on civil rights can be, and grasps how the Founding Fathers shaped the Bill of Rights to protect us from statist politicians incrementally increasing those infringements, even in the beguilingly alluring name of public safety.

The ruling is welcome news for gun owners who are under siege from shrewd California lawmakers with an extreme progressive agenda. Last year California politicians were faced with a threat from Gavin Newsoms self-promoting Prop 63 as he vied to seize the mantle of the King-of-Gun-Control from Senator Kevin DeLeon so he could build his name recognition in his gubernatorial campaign. So they raced to pass a number of gun bans that have collectively become known as Gunmageddon. Both Prop 63 and Gunmaggedon included a ban on the possession of standard capacity magazines that can hold more than ten rounds. Although acquisition and importation of the magazines had been banned since 2000, under the new laws gun owners were compelled to dispossess themselves of the magazines by July 1. Its government confiscation with a mustache. But by issuing the preliminary injunction, Judge Benitez instead preserved the status quo while the constitutionality of the ban is fully litigated in court, where plaintiffs are seeking to eventually have a permanent injunction issued.

Unsurprisingly Newsom, Prop 63s main proponent, was unhappy with the decision. As he stated to Fox News, large-capacity magazines enable murderers to unleash dozens of rounds without having to stop and reload.

But to quote the landmark case of District of Columbia v. Heller, the enshrinement of constitutional rights necessarily takes certain policy choices off the table. And despite Prop 63s purported public safety interests, those interests may not eviscerate the Second Amendment, as Judge Benitez put it.

Even so, Newsoms claim that banning these magazines would somehow save lives is pure fallacy. To support this policy choice, attorneys for the government offered a number of studies and expert testimonies trying to prop up that claim. But unlike some courts that have almost blindly accept the governments claims without scrutinizing the evidence, Judge Benitez took a close look. He found that states evidence was inconclusive at best. One of those experts admitted that it is not clear how often the ability to fire more than 10 shots without reloading . . . affects the outcomes of gun attacks. Another so-called expert cited nothing more than news articles in concluding that the bans on large capacity magazines can help save lives by forcing mass shooters to pause and reload ammunition.

As Judge Benitez correctly notes, the burden of justification is demanding and it rests entirely on the State. In order to meet this burden, the State cannot get away with shoddy data or reasoning. But in this case, the States evidence is nothing more than a false dichotomy. For as a purely public policy choice, a government may declare that firearms of any capacity are dangerous in the hands of criminals, while simultaneously concluding that firearms with larger than 10-round magazines in the hands of law-abiding citizens makes every individual safer and the public as a whole safer. As a result, banning such magazines is hardly the reasonable fit constitutionally required to uphold such a ban.

In addition to the lack of evidentiary support for the policy being advocated, Judge Benitez bravely questioned the appropriateness of the trend of lower courts to apply a convoluted, multi-step test in scrutinizing the constitutionality of gun control laws. Its a subjective test that lets judges put their fingers on the scales of justice, and almost always results in upholding any form of gun-control. But even if that test were applied here, Judge Benitez found the States evidence to be incomplete, unreliable, and speculative at best, flatly rejecting the States attempt to support its ban with anything less than hard facts and reasonable inferences drawn from convincing analysis.

Newsom wasnt the only one to criticize Judge Benitezs clear and well-founded reasoning. Having just recently suffering a defeat before the Office of Administrative Law, which rejected his Departments most recent proposed assault weapon regulations, California Attorney General Xavier Becerra put out a press release stating that Proposition 63 was overwhelmingly approved by voters to increase public safety and enhance security in a sensible and constitutional way.

But Judge Benitez was mindful that a majority of California voters approved Prop 63, just as he was equally mindful that the Constitution is a shield from the tyranny of the majority. If all that was needed to undermine constitutionally protected rights was a simple majority vote, the Constitution would long ago have lost all meaning. And without the Constitution to preserve and protect Americas civil liberties we could, and given that bureaucrats crave power and power inevitably corrupts almost certainly eventually would, find ourselves under oppressive government regimes like those of 1960s Cuba.

Of course, this wont stop the state from appealing the decision to the Ninth Circuit, where the politicians hope to find a more sympathetic audience that will bend over intellectually backwards to defer to the governments arguments.

To learn more about the Duncan case, as well as other NRA / CRPA lawsuits brought to protect the rights of California gun owners, subscribe to NRA and CRPA email alerts. And please take a moment to consider donating to the CRPA Foundation, to support the Duncan case, and other NRA / CRPA efforts in California. About: CalGunLaws.comis an online research resource designed primarily for use by attorneys and interested firearm owners. CalGunLaws.com strives to provide easy access to and facilitate understanding of the multitude of complex federal, state, and local firearm laws and ordinances, administrative and executive regulations, case law, and past and current litigation that defines the California firearms regulatory scheme in theory and practice.

Read this article:

Sorry Gavin, Your Civilian Disarmament Agenda Does Not Trump the Second Amendment - AmmoLand Shooting Sports News

BRIEF-Cross Country Healthcare Inc enters into a second amendment to its credit agreement – Reuters

July 6 Cross Country Healthcare Inc:

* Cross Country Healthcare Inc- on July 5 entered into a second amendment to its credit agreement dated June 22, 2016

* Cross country Healthcare-in connection with acquisition of advantage, on July 1, under credit agreement, entered into incremental term loan agreement

* Cross Country Healthcare - incremental term loan agreement provided co with incremental term loan of $40.0 million to pay for part of advantage acquisition

* Cross Country Healthcare Inc - maturity date for incremental term loan is June 22, 2021 Source text: (bit.ly/2tkbbJS) Further company coverage:

JOHANNESBURG, July 6 South Africa's Finance Minister Malusi Gigaba on Thursday lodged court papers opposing a recommendation by the corruption watchdog that the central bank's mandate be changed to focus on economic growth rather than inflation and protecting the currency.

July 6 Dish Network Corp Chief Executive Charlie Ergen and Amazon.com Inc head Jeff Bezos have discussed a partnership to enter the wireless business, the Wall Street Journal reported, citing people familiar with the matter.

The rest is here:

BRIEF-Cross Country Healthcare Inc enters into a second amendment to its credit agreement - Reuters

All Americans should care about this First Amendment case – Fox News

First Amendment cases are very much on the national mind these days, and the news from the U.S. Supreme Court (SCOTUS) is very encouraging for those who believe in strong protections for constitutional freedoms. The court delivered a First Amendment victory last week in a case involving religious free exercise, and kept alive hope for victories in two other cases where the hot button issues of same-sex marriage and abortion are involved.

First, inTrinity Lutheran Church of Columbia, Inc. v. Comer, SCOTUS ruled 7-2 that the State of Missouri had unconstitutionally excluded Trinity Lutheran Church Child Learning Center from a competitive grant program to help schools, daycares, and other nonprofits install rubber playground surfaces made from recycled tires. The preschool and daycare center ranked fifth out of 44 applicants the year it applied for the grant, but was categorically rejected by the government because it was operated by a church. In ruling for Trinity Lutheran, the Court reaffirmed that all Americans should be free from government discrimination based on their religious identity.

Looking down the road, SCOTUS also agreed to hearMasterpiece Cakeshop, Ltd. v. Colorado Civil Rights Commission, buoying the hopes of First Amendment advocates who argue that government should not be permitted to compel a religiously opposed individual to create a wedding cake honoring a same-sex marriage, just as a secular wedding cake maker is not required to create a cake opposing same-sex marriage.

Later this year the Court will also decide whether to hearNational Institute of Family and Life Advocates (NIFLA) v. Becerra.NIFLAis a national network of more than 1,400 pro-life pregnancy centers and medical clinics. Its membership includes 135 such centers in California, and of these, 85 operate as licensed medical clinics. These clinics and centers are faith-based ministries that do not provide or refer for abortion as a matter of principle. What SCOTUS eventually decides will have far-reaching implications for people of all faiths, no faith, and of all moral or political persuasions.

In asking the Court to hear this case, the petitioners noted the California law forces licensed pro-life medical centers to post notices informing women how to contact the state ... for information on how to obtain state-funded abortions, directly contradicting the centers pro-life message.

Simply stated, the issue before SCOTUS is: Can the government compel a faith-based ministry to speak a message with which it fundamentally disagrees and which violates its foundational principles?

In the case from California, pro-life pregnancy centers have challenged AB 775, the states so-called Reproductive FACT Act, as unconstitutional. When asking SCOTUS to hear this case, the petitionersnotedthat this California law forces licensed pro-life medical centers to post notices informing women how to contact the State at a particular phone number for information on how to obtain state-funded abortions, directly contradicting the centers pro-life message. The same law also forces non-medical, unlicensed pro-life organizations to give extensive disclaimers that they are not a licensed medical facility in large font and in as many as 13 languages to clients on site as well as in their ads, both print and digital, including on their own Internet websites.

The First Amendment right to free speech not only protects the right to speak, but also prevents government from compelling speech. AB 775 compels faith-based charities to speak a message that goes against their pro-life values, and it imposes massive fines upon any pro-life clinic that does not comply. Such fines would force most noncompliant clinics to close.

This might seem like only a fight about abortion and the freedoms of pregnancy resource centerswhich number over 3,000 nationwide and provide free resources such as ultrasounds, maternity care, adoption services, education, STI testing, and more to pregnant women. However, the merits of constitutional challenges should not depend on whose conscience ox is being gored. For example, SCOTUS hasrecognizedthat Americans have the right to refuse to say the Pledge of Allegiance in public schools, as well as the right to claimconscientious objectionto military conscription. First Amendment freedoms are equally as valuable to death-penalty opponents and environmentalists as they are to pro-life nonprofits.

Pro-life pregnancy centers provide a very valuable resource to our nation at no cost to the taxpayer. A 2015surveyby the Charlotte Lozier Institute established that pro-choice women themselves are pro-pregnancy resource centers and admire the services they provide. Laws like Californias stem from activist ideology, not demands by women seeking help. This provides one more reason why SCOTUS should accept NIFLAs appeal and strike down this abusive law.

The illegitimate actions of government like AB 775s coerced speech should be of concern to all Americans even those who disagree with the life-affirming philosophy of pro-life pregnancy centers. The First Amendment is among our most treasured possessions, a guarantor of our freedom and ability to live together despite our deepest differences.

Thomas A. Glessner is the founder and President of the National Institute of Family and Life Advocates (NIFLA), a public interest law firm founded in 1993 and committed to legal counsel and training for Pregnancy Resource Centers. NIFLA represents more than 1,430 Pregnancy Resource Centers across the country.

Charles A. Chuck Donovan is president of the Charlotte Lozier Institute, the education and research arm of Susan B. Anthony List.

Read this article:

All Americans should care about this First Amendment case - Fox News

Our Love-Hate Relationship With The First Amendment – Greeneville Sun

Common practice for liberals and conservatives now is to take turns calling each other enemies of the First Amendment. The results of this years State of the First Amendment survey gave us the opportunity to consider these insults and after the numbers are crunched, who is the real enemy of the First Amendment?

Well, no one. And, everyone.

Most of our fellow citiziens, regardless of their political ideology, are quite fond of the First Amendment, at least in the abstract. The people who think that the First Amendment goes too far are a minority 22.5 percent of us. A majority of Americans (67.7 percent) think that the press plays an important role as a watchdog on government; a slightly narrower majority (58.8 percent) thinks that freedom of religion should extend to all religious groups, even those widely considered extreme or fringe.

Thats the good news: Even in a time of great political turmoil, were generally supportive of the First Amendments protections.

The bad news: When it comes down to specific applications of the First Amendment, were less positive, and also deeply divided along ideological lines. Both liberals and conservatives have certain pain points where they balk at the amount of protection that the First Amendment provides.

Liberals are more likely than conservatives to think:

Colleges should be able to ban speakers with controversial views.

People should not be able to express racist comments on social media.

Meanwhile, conservatives are more likely than liberals to think:

Government officials who leak information to the press should be prosecuted.

Journalists should not be able to publish information obtained illegally, even if it serves the public interest.

Government should be able to determine which media outlets can attend briefings.

Government should be able to hold Muslims to a higher standard of scrutiny.

Worth noting: Some of these differences in attitude may not be a direct result of whether youre a liberal or a conservative; instead, they might be circumstantial. Do more liberals support press freedoms because thats a core value of liberal ideology or because the press is a watchdog on the government, which liberals dont currently control?

Do more conservatives think that colleges shouldnt be able to ban speakers because of a greater commitment to free speech or because most banned speakers, at least in recent years, have tended to be conservative?

It will be interesting to see in subsequent years if attitudes change as circumstances change.

One thing that unites the majority of Americans right now: Most of us both liberals and conservatives prefer to read or listen to news that aligns with our own views.

Thats true even if you think that the news media reports with a bias, as most Americans do (56.8 percent). Apparently, were not inclined to correct that bias by taking in multiple and varied news sources. Instead, were more likely to double down on the news that fits in with our pre-existing ideological perspective.

This finding is both obvious and disheartening: Everyone likes reading and hearing news that confirms what they already believed. Thats one of the factors that keep us so divided.

The writer is executive director of the First Amendment Center of the Newseum Institute. Contact her via email at lnott@newseum.org. Follow her on Twitter at @LataNott.

View original post here:

Our Love-Hate Relationship With The First Amendment - Greeneville Sun

RIAA Trashes Its Legacy As 1st Amendment Supporter, Cheers On Global Internet Censorship [Op-Ed] – hypebot.com

Although the RIAA used to function as a major force in safeguarding free speech and the First Amendment, the organization has of late taken a different direction, and become noticeably wish-washy on the issue of free speech, and in some instances seems even to be championing censorship.

_________________________

Guest post by Mike Masnick of Techdirt

It appears that many people don't remember this, but the RIAAused to bea major force in protecting free speech and the First Amendment. It had many good reasons to do so, after all, since free speech is very important to all of the artists that the RIAA's labels work with. Artistic expression -- especially in the musical realm -- has frequently come under attack by politicians and, for decades, the RIAA was actually a really important player in standing up for the First Amendment. See, for example, this 1992 article in the LA Times from then RIAA President Jason Berman, in whichhe lists out all the waysthat the RIAA has been fighting censorship. Yes, these are all specific in protecting musicians, but they were some really important First Amendment arguments to be made in these areas:

And that's just one article -- the first I found via a quick Google search. If you were interested in these issues in the 1980s, the RIAA was very involved in protecting the First Amendment.

So it's fairly ridiculous (if entirely expected) that the modern RIAA is destroying that historic legacy of protecting free speech by now cheering on global internet censorship. As we've discussed, Canada recently launched ahorrific attack on free speech, by saying that it can issue injunctions blocking entire sitesgloballyon mere accusations of infringement. Let's repeat that: the Canadian court is saying that, even before a trial has determined if there is actual infringement, it can order sites (in this case Google) to blockentire websites(not just pages involved in the infringement) -- and that it can do so globally. As we pointed out, this precedent is horrifying. What will happen when China demands all stories about Tiananmen Square be blocked globally? Or what happens when Saudi Arabia or Iran demands that pages supporting democratic reforms or LGBTQ rights must be taken down globally?

And yet, rather than condemn an overly broad ruling that will lead to global censorship, the RIAA sullied its own historical legacy andcheered on this global censorship ruling, claiming that it was "a win."

These days, the bosses at the RIAA have got so much "piracy-on-the brain" that they seem completely unable to (1) stick to a principled position on the First Amendment or (2) see how cheering on global censorship might come back to bite them as well.

See more here:

RIAA Trashes Its Legacy As 1st Amendment Supporter, Cheers On Global Internet Censorship [Op-Ed] - hypebot.com

FAQ | Jitsi | Prometheism.net euvolution.com | Futurist

Featured questions (hide)

How do I get the latest Jitsi source code?

You could either clone the Git repository from GitHub (see Retrieving and Building the Sources for details) or use one of the nightly source snapshots (check the Download page).

Ive discovered a bug, what can I do?

Please, report it to the developers! Take a look at the Reporting bugs guidelines page describing the steps to report bugs effectively.

Where is the user profile directory?

Jitsis user profile directory is where Jitsi keeps its configuration, logs, etc. Its location depends on the operating system.

Where do I find the log files?

The easiest way to get hold of the log files is to save them to a location of your choice using Jitsis GUI. You can do so by clicking on ToolsOptions (JitsiPreferences on OS X), then selecting the Advanced tab and opening the Logging form. Youll see the Archive Logs button in there.

Check out the screenshot for an even better description.

Important Note: When asked for logs, please make sure that you provide the full set of logs, or better yet, the zip that Jitsi generates when following the above instructions. Please do not send separate files or file snippets as those are likely to be insufficient. If you need to provide the logs for a GitHub issue, send them to Dev Mailing List and link to the thread in the archive or create a Gist and link to it. Please DO NOT paste the log as a comment.

Otherwise, if you really want to know, the log files are located in:

Where is the configuration file?

Jitsis main configuration file is called sip-communicator.properties and is in the user profile directory.

How do you spell Jitsi and what does it mean?

The correct spelling of the application name is Jitsi (jitsi also works). The origin of the name is Bulgarian (spelled ). It means wires and the point is that the application allow you to connect to many network and people just as wires do. Of course no one other than Bulgarians is supposed to know what this means and we picked the name mainly because it was short and sounded good.

Id like to see a new feature in Jitsi, can you do that for me?

Yes, developers take feature requests into account. Send an email to the development list with a detailed description of the requested feature. After we examine its feasibility and decide whether it can be included in the Jitsi distributions you would likely be asked to open a ticket in our issue tracker. It is worth mentioning though, that handling feature requests is highly dependent of the developers availability and there is no guarantee that all requests will be satisfied.

How do I subscribe to mailing lists?

Please visit the Mailing Lists page to learn more about Jitsis mailing lists.

How do I contact the project developers?

You can ask questions concerning usage of the Jitsi on the dev mailing list (Note that the mailing lists are moderated, so, unless you subscribe to them, there may be a delay before your post shows up). For all urgent queries you could also use IRC at irc.freenode.net, channel #jitsi.

How do I send a patch?

Mail patches to the dev mailing list, with a subject line that contains the word PATCH in all uppercase, for example

A patch submission should contain one logical change; please dont mix N unrelated changes in one submission, send N separate emails instead.

The patch itself should be generated from within the project root directory using unified diff format. The following example shows one way to generate it:

You should give your patch files meaningful names. For instance if you fix a socket bug in the foo class do not call your patch file patchfile.txt but instead call it foo-socket.patch.

If the patch implements a new feature, make sure to describe the feature completely in your mail; if the patch fixes a bug, describe the bug in detail and give a reproduction recipe. An exception to these guidelines is when the patch addresses a specific issue in the issues database in that case, just make sure to refer to the issue number in your log message.

Note that unless you are describing a change rather than posting one, we would probably need you to sign our contributor agreement as either an individual or a corporation

I would like to update this wiki what can I do?

Currently, only project developers are permitted to update the wiki. Please send your suggested changes to the dev mailing list.

A wiki page can be updated by appending the string ?action=edit to the current url and refreshing the page. The page will then be displayed with an extra menu line that includes a Page Edit item.

If you click on the Page Edit item, you will be redirected to a logon page. Enter your developer username and password and you should be redirected back to the original page. Click on Page Edit again to access the source content of the page (a quick reference to wiki markup syntax is also displayed).

How do I reset my XMPP or jit.si password?

You can reset your jit.si password from within Jitsi. You can do the same for any XMPP account that allows it.

In the case of jit.si, you can also change your password via the web

Why cant I connect to ekiga.net?

NB: the problems described in this section also apply to other providers such as 1und1.de

Short Answer: The ekiga.net SIP servers are configured in a way that prevent Jitsi (and many other SIP user agents for that matter) to register with the service. Please use iptel.org or ippi.com instead.

Slightly Longer Answer: The service at ekiga.net is configured to only accept SIP REGISTER requests that contain a public IP address in their Contact header. This means that registration from Jitsi would fail unless you actually have a public IP address. The Ekiga client circumvents this by using STUN to learn the address and port that have been allocated for the current session. It then uses the pair in the SIP Contact header. This kind of use was common for the first version of the STUN protocol defined in RFC 3489 which was sometimes referred to as classic STUN.

The IETF has since significantly reviewed the way STUN should be used. The new version of the protocol is now defined in RFC 5389 which, among other things, advises against the use of STUN as a standalone NAT traversal utility:

Today STUN represents one of the tools used by complete traversal mechanisms such as SIP OUTBOUND (RFC 5626) or ICE (RFC 5245). Neither of these includes sending a STUN obtained address in a Contact header.

So, where does Jitsi currently stand on all this? At the time of writing, we support the ICE protocol but only use it with XMPP. Use with SIP is likely to come in the near future. The reason we havent implemented it yet is that most SIP servers currently open to use over the Internet, use a technique called latching. When such servers detect you are connecting from behind a NAT, they would start acting as a relay, receiving media from your peers and then forwarding it to you (and vice versa). While this is by far the most reliably way of traversing NATs, it does indeed imply some scalability constraints.

ICE on the other hand would only fall back to relaying if no other way was found to connect the two participants. This is why it is considered as a more optimal solution and why its also on our roadmap.

Note however that the constraints on ekiga.net would continue preventing Jitsi from connecting even when we do implement support for ICE.

Why do I see ICE failed errors when trying to make calls.

Jitsi implements a number of NAT traversal methods as described here. In many situations we will be able to setup a call directly between you and other users but in order to be able to reliably establish calls, your XMPP or SIP provider has to provide relaying capabilities such as TURN, Jingle Nodes or . If looking for services that support these you can try jit.si or ippi. Also note that both you and your partner need to have unhindered outgoing UDP access to the Internet or at least to your VoIP service provider. You DO NOT however need to map any port numbers on your home router. At best this is going to have no effect.

Does Jitsi support STUN? (and how about TURN, UPnP and Jingle Nodes?)

STUN, together with TURN, Jingle Nodes, IPv6 and UPnP, is one of the techniques that Jitsi uses as part of the Interactive Connectivity Establishment (ICE) protocol to handle NAT traversal for calls made over XMPP.

For its SIP calls, Jitsi currently relies on servers to relay media (a technique also known as Hosted NAT Traversal or latching, which would be the case of the majority of the SIP servers used on the Internet today. Note that in terms of reliability Hosted NAT Traversal gives the same results as use of ICE. It even works better in some ways because the connection is setup immediately and no time is waisted for gathering candidates and making connectivity checks. The only downside of HNT is that it may put a strain on SIP providers requiring more bandwidth. This could become a problem especially in environments with a high number of all IP high quality video calls.

It is likely that ICE support for SIP calls would also be added to Jitsi in 2014 especially since this would also help with WebRTC compatibility.

Standalone support for STUN is NOT going to be part of Jitsi. Check out the ekiga entry for more information on the shortcomings of STUN as a standalone NAT traversal utility.

I have a few questions regarding ZRTP, SRTP and VoIP security in general. Where can I find some answers?

Check out our ZRTP FAQ.

Why does my call stay in the Initiating Call status and I can never connect?

A common reason for providers not to respond to calls is that they simply dont get the INVITE request Jitsi sends to them. This can happen if you are using UDP. The Jitsi INVITE requests may often exceed the maximum allowed packet size (MTU) for your network or that of your server. In such cases packets may be fragmented by your IP stack and fragmentation for UDP does not always work well in certain networks. This is what happens when a client supports multiple features ;). To resolve the issue you can do one of the following:

How does on-line provisioning work?

On-line provisioning is the feature that allows Jitsi to connect to an http URI every time it starts and retrieve part or all of its configuration there. On-line provisioning is often used by providers to remotely configure the clients they maintain. It can be used to set any property in Jitsi such as the codecs used, the features that users can manually configure and even protocol accounts.

When requesting its provisioning information Jitsi can transmit any of a number of parameters to the server, like for example: the OS it is running on, user credentials, a unique ID and others. This way the provisioning server can fine-tune the parameters it sends to Jitsi.

For more information, please check our on-line provisioning manual

Are my chat sessions protected and if so, how?

Jitsi supports the OTR encryption protocol. OTR stands for Off-the-Record Messaging and once youve set it up (i.e. clicked on that padlock icon in a chat window and verified the identity of your contact) it allows you to make sure that no one other than you two can read your messages, not even your service provider. You can find more on the OTR mechanisms here:

http://en.wikipedia.org/wiki/Off-the-Record_Messaging

Should logging be disabled by default when using OTR?

By default Jitsi stores all chats so that if you need any information from them it would always be available. If you would like to disable this behavior you can currently do so by opening Jitsis Options/Preferences, selecting the General pane and then unchecking the Log chat history option near the top. It is also possible to disable chats for specific contacts, to erase their history. An indicator in the chat window makes it aware at all times whether history is on or off while chatting with someone.

OTR protected chats follow the same pattern and some users have expressed concerns that this might be incompatible with their security expectations. Our position on this is that Jitsis role is to protect your communication. We also strive to offer usability. The current defaults represent these objectives: most people would prefer for their private communication not to be readable by third parties and most of the time people use Jitsi from personal devices where they are in control of the access policy.

In some cases users may wish for their communications not to be stored locally. This can be the case when using Jitsi on devices that others may also have access to. In such cases users need to be able to easily see whether history is being logged. They would also need to easily turn this off and potentially even erase previous history.

Note however that this subject is entirely different from the encryption one. They are separate measures meant to protect you against separate attacks or problems. We dont believe that the need for one would necessarily imply the need for the other. We are hence committed to also keeping that separation in the user interface.

Force SIP Message support.

Some SIP servers (Asterisk in particular) do not announce the MESSAGE support, despite supporting it. If you enable the account property FORCE_MESSAGING, Jitsi will attempt to use MESSAGE for chats, despite your configured SIP server not explicitly announcing this support to connected clients. For example, if your SIP account is john.smith@example.com, go to property editor type that in the search field and look for something like

net.java.sip.communicator.impl.protocol.sip.acc0123456789.ACCOUNT_UID with the value SIP:john.smith@example.com

The property to add in that case would be:

net.java.sip.communicator.impl.protocol.sip.acc0123456789.FORCE_MESSAGING with the value true.

How to add/edit configuration properties.

You can do so by clicking on ToolsOptions (JitsiPreferences on OS X), then selecting the Advanced tab and opening the Property Editor form. There you can search edit/delete or create new properties.

Is there an an Android version of Jitsi?

Yes, but it is still in an early alpha stage and further development has been put on hold until further notice. A lot of the user interface is not yet implemented. You can find the apk on the Download page.

Is there an iPhone/iPad version of Jitsi?

No. Due to the restrictions imposed by the platform it is highly unlikely this answer is going to change.

The cc-buildloop target of ant fails with the following error message: Could not create task or type of type: junitreport.

On some Linux distributions such as Debian, the ant package is actualy subdivided into multiple packages. So when you chose to install junit and ant with the distribution specific package system, dont forget to install ant-optional too.

The cc-buildloop target of ant fails with the following error message: No test with id=IcqProtocolProviderSlick.

Have you created your own accounts.properties file in the lib directory? Youll need to define two ICQ test accounts at least, and preferably some test accounts for the other supported protocols.

Read this article: FAQ | Jitsi

Read the original:

FAQ | Jitsi | Prometheism.net

. Bookmark the

.

View original post here: FAQ | Jitsi | Prometheism.net euvolution.com

Read more from the original source:

FAQ | Jitsi | Prometheism.net euvolution.com

. Bookmark the

.

Go here to read the rest: FAQ | Jitsi | Prometheism.net euvolution.com | Futurist

More here:

FAQ | Jitsi | Prometheism.net euvolution.com | Futurist

Jitsi Meet (advanced) Projects | Prometheism.net

How to join Jitsi Meet video conferences over the Web

If you do not already know what Jitsi Meet is, here is the official homepage. Jitsi Meet allows you to create and join video calls over the Web (even as a simple viewer). Some of its features are: encrypted by default, no account needed, invite by pretty URL https://mysite.com/myroom

Thanks to UV4L it is possible to create or join an existing room and broadcast live video and audio to all the participants or viewers in the room from a camera and a microphone connected to the Raspberry Pi. Its also possible to automatically hear and see other participants if you have speakers and display (HDMI, touchscreen, etc) connected to the Raspberry Pi. Of course, other participants can be other Raspberry Pis. The great news is that you do not need any browser installed on the Raspberry Pi to do this.

Its necessary to install the required packages before proceeding: uv4l, uv4l-server, uv4l-webrtc, uv4l-xmpp-bridge and one video driver (e.g. uv4l-raspicam, uv4l-uvc, etc). Please refer to these installation instructions for more details.

To start and stop streaming to a particular Jitsi Meet server (called videobridge), its enough to invoke the corresponding commands by means of the UV4L Streaming Server installed on the Raspberry Pi. This can be done in two ways.

The first convenient way is through a browser by using the Jitsi Meet control page available at the URL the Streaming Server itself is listening to (e.g. http://myraspberrypi:8080), from which its possible to specify all the mandatory informations (i.e. XMPP and/or BOSH signalling server, chat room, your username and password) required to establish a connection and to click on start/stop buttons in order to join or leave the specified room respectively.

The second way is to invoke the start/stop commands via HTTP/GET requests sent to the Streaming Server from command line. For example, to start streaming to the videobridge which is at the base of the official, free-access Jitsi Meet service at meet.jit.si, type (in one line):

where raspberrypi will have to be replaced with the real hostname of your Raspberry Pi in your network (it can be localhost if you are executing the command from within your Raspberry Pi) and port will have to be replaced with the real port number the Streaming Server is listening to (8080 is the default). The above command will make the Raspberry Pi create or join a conference at http://meet.jit.si/testroom.

If the UV4L Streaming Server is providing HTTPS instead of HTTP, be careful to specify https://[] in the URL. You may also desire to add the insecure option to curl to turn off the verification of the servers certificate (see the curl manual for more details).

Please note the parameters in the URL that you are allowed to specify:

server (XMPP server hostname or ip address) port (port the XMPP server is listening to) muc (multiuser chat domain) room (desired room you want to join or create) room_password (room password, if the room is protected) username (desired username in the chat room) password (password if the server is password protected) reconnect (try to reconnect after disconnection) bosh_enable (1 if you want to use BOSH signalling, 0 otherwise) bosh_server (usually HTTP(S) server hostname for BOSH) bosh_tls (1 for HTTPS, 0 otherwise) bosh_port (typically 443 for HTTPS, 80 for HTTP) bosh_hostname (connection manager hostname, typically the same as bosh_server) action (Start or Stop streaming)

All the above settings can be optionally specified once for all in the UV4L configuration file (except action) (see the uv4l-server manual for more details).

Similarly, to stop streaming:

If you are protecting the UV4L Streaming Server with a password, then the above URL will not work. In this case, you must specify user and password in the URL as in the below example:

Go here to read the rest: Jitsi Meet (advanced) Projects

Original post:

Jitsi Meet (advanced) Projects | Prometheism.net

How to safely search the deep web – The Sydney Morning Herald – The Sydney Morning Herald

The deep web and its inner recess, the dark web those less well-trodden parts of the internet beyond the reach of Google and Bing are not for the faint-hearted or untrained. With the right tools, however, there's little to fear and plenty to discover. Here's how you can start exploring the deep web without having to worry about your digital well-being.

There are a few ways to approach this, but we're going to focus on one of the most straightforward and secure for simplicity's sake. We're going to be usingTails OS, a bootable operating system that includes everything you need to get down to those hidden parts of the web.

Play Video Don't Play

Play Video Don't Play

Previous slide Next slide

You can buy drugs, weapons and even assassins on it, so do we need the deep web?

Play Video Don't Play

Environment Minister Josh Frydenberg declared the decision a 'big win' as the Great Barrier Reef avoids UN 'in danger' list despite mass bleaching.

Play Video Don't Play

Former Richmond hardman Jake King, a friend of Vickery's, has been charged with making threats to kill over an alleged extortion attempt.

Play Video Don't Play

North Korea's new long-range missiles pose "very little risk" to Darwin or Cairns according to the Australian Defence Force.

Play Video Don't Play

An tourist with autism who went missing from a Melbourne beach has returned to the place he was staying with his family. Vision courtesy Seven News, Melbourne.

Play Video Don't Play

North Korea's decision to test an intercontinental ballistic missile has provoked anger and stern words from world leaders.

Play Video Don't Play

As former PM Tony Abbott continues to criticise his party, more are heaping criticism on him. Perhaps he should take some advice from fellow former PM Julia Gillard.

Play Video Don't Play

Coca-Cola Amatil has announced it will close its South Australia manufacturing plant after posting a drop in annual profit.

You can buy drugs, weapons and even assassins on it, so do we need the deep web?

If you're still unclear about what the deep web is, it's any part of the internet that's not indexed by search engines. Anywhere you can't get from just clicking links. A large part of the deep web is made up of.onionsites (likethe infamous Silk Road), which use a special top-level domain only reachable by a special browser called Tor. Technically, the dark web is a more illicit subsection of the deep web, though the terms are often confused.

For the curious or privacy-conscious internet explorer, it's worth checking out to see what lies beyond the internet we interact with on a day to day basis. But please note: you should be extra careful when clicking links on the deep web as some can lead toillegal sites. Browse at your own risk.

Fortunately Tails hasan installation wizardthat guides you step-by-step through the process of setting up the software. If you want to create a bootable USB copy of Tails (which we do), then you need a Windows machine and two 4GB+ USB sticks (the first is for an "intermediary" version of the OS).

You're also going to requireFirefox, theTor Browseror aBitTorrent clientin order to verify the initial download and confirm it is what it says it is. On top of that you need a Universal USB Installer utility, which the installation wizard directs you to, which will take care of creating the first USB stick using your downloaded Tails ISO.

Get the latest news and updates emailed straight to your inbox.

After that's done, boot from this newly created drive to configure the second one.This official guidetakes you carefully through the process. Use the 'Install by cloning' option in the Tails Installer to create your second USB stick, which includes some security enhancements and extras not built into the first one.

Finally, remove the first USB stick, keep the second in place, and boot from it. You're now ready to start venturing out into the deep web. If you run into trouble (and we hit one or two obstacles along the way), then a general web search for your issue orthe official Tails support portalshould get you moving again.

The Tor Browseris your gateway into the dark web. You can actually use it on Mac and Windows too, but Tails OS adds an extra few layers of security, and comes with Tor included. The browser is based on Firefoxso you shouldn't have many problems finding your way aroundand will open the Tails OS homepage by default.

As you might expect, browsing the deep web isn't quite as simple as clicking on a few links or searching Google. The best way in is through 'hidden' wikislike this one(note you won't be able to click through on any onion links without the Tor browser) and various others you can find via Reddit or with some clever web searching on sites likeDuckDuckGo.

Of course the whole point of the deep web is that casual internet users can't simply fire up Google or read a guide like this to get started easily,so finding working, up-to-date links and directories can take some time. Forums, plenty of patience, and occasionallythe Torch search engineare your best bets for finding a way into new communities.

The deep web has a reputation for shady activity, but it's also a place for whistleblowing, bitcoin exchanges, and political discussion away from the glare of the public internet. It's changed a lot in recent years as security agencies have become more aware of its presence, and it will continue to evolve in the future.

The Tor browser protects you by routing your traffic through various different IP locations (and you'll probably notice your web connection slows down a lot as a result).

And as we've already mentioned,Tails OS includes extra security featureslike built-in encryption, and because you're running it on a USB stick you really are leaving no trace. Tails itself stands for The Amnesiac Incognito Live System, which just about sums up why it's one of the best options for some deep web browsing.

Don't compromise that security and anonymity by giving away personal details, including email addresses and so on, and keep downloading to a minimum. Once you've set up Tails, it's generally common sense. But if you're up to something illegal, you can't rely on these security measures to protect you.

As for whether using Tor will get you in trouble with the authorities on its own, it largely depends where in the world you live and what you're doing with it, but it's worth bearing in mind thatnothing is ever 100 per cent anonymous and secure. For the most paranoid, there's always the option of tape over the webcam but sometimes even that might not be enough.

Follow this link:

How to safely search the deep web - The Sydney Morning Herald - The Sydney Morning Herald

National Science Foundation Awards $450k for Cryptocurrency Incentive Study – CoinDesk

A Princeton University researcher has receivedmore than $400,000 in federal funding to study mechanism incentivesand their applications to cryptocurrencies like bitcoin.

The study project, "Duality-based tools for simple vs. optimal mechanism design and applications to cryptocurrency", is being led by Seth Weinberg, an assistant professor of computer science at Princeton. The grant, worth $450,000, was awarded on 28th June by the National Science Foundation. The project is set to begin in September and will last until August 31, 2020, according to the NSF.

As theorganization's website explains:

"A secondary focus of this project is to apply these theoretical foundations to resolve cryptocurrency incentive issues arising within Bitcoin, an emerging cryptocurrency. While bitcoin has remained largely immune to traditional security breaches, numerous incentive issues have been discovered which could undermine its future security if not properly addressed."

Though cryptocurrencies constitute only part of the research study its primary focus is the design of algorithmic mechanisms and the theoretical incentives at play its the latest instance of a projectthat involves the tech receiving federal backing.

In mid-2015, the NSF awarded $3m to theInitiative for Cryptocurrency and Contracts (IC3), a research effort involving academics from Cornell, the University of Maryland and the University of California Berkeley. The NSF has also moved to back cybersecurity-related research that involves blockchain.

Image via Shutterstock

The leader in blockchain news, CoinDesk is an independent media outlet that strives for the highest journalistic standards and abides by a strict set of editorial policies. Have breaking news or a story tip to send to our journalists? Contact us at [emailprotected].

See original here:

National Science Foundation Awards $450k for Cryptocurrency Incentive Study - CoinDesk

Cryptocurrency Has Its Potato Salad Moment With the Useless Ethereum Token – Observer

Its been almost three years since Zack Brown raised $55,000 on Kickstarter for a potato salad. His goal was $10. He wanted to raise the money in order to pay for making the midwestern cookout staple for the first time.

I made that Kickstarter project to get a laugh out of seven people, so the money and attention were a shock, Brown wrote the Observer in an email. The original intent of the joke was more like, This is funny because its not what Kickstarter is for.' But it didnt take long for him to see that hed created a satire of the site on the site itself.

My first two thoughts were This is ridiculous and How can I get in on this?

But when Brown raised far more money than he ever thought he would, the Columbus, Ohio, resident opted to actually do something with the cash and make a cookbook devoted to the staple of Midwestern picnics,The Peace, Love and Potato Salad Cookbook.It came out two years after the campaign ended, which isnt bad considering the fact that he didnt launch the campaign to make a book and hed never made a potato salad before.

The Useless Ethereum Token logo. Thats a cityscape (no its not). Twitter

Today, theres a new, even more ephemeral way to raise money: by creating a new cryptocurrency. Called an initial coin offering or ICO, entrepreneurs have been creating new digital currencies (like Bitcoin) in order to support various projects. Fortunately, just as it starts to crack mainstream attention, ICOs have gotten their own answer to the potato salad campaign. Its called the Useless Ethereum Token(UET), and its creator will absolutely sell you cryptocurrency good for absolutely nothing.

It went on sale yesterday and runs through July 11.

The UET ICOtransparentlyoffers investors no value, so there will be no expectation of gains, its creator, who only goes by UET CEO, writes on its website. Rememberthis is acompletely honestICO, which means I dont want anyone to mistakenlyexpectthe value of the tokens to go up, either. Theyre called Useless Ethereum Tokens for a reason.

We can think of one other cryptocurrency that came out and promised buyers nothing but the digital asset itself: bitcoin. In the end, every new currency of any kind is a satire on the very strange idea of money.

We wrote about a decentralized company, The DAO, which was working well until a security flaw made it collapse horribly. We wrote about the first Bitcoin felons ICO-poweredsecond act after prison, which fizzled (according to a profile in Fortune, hes glad). Recently, we covered the Basic Attention Token designed by a major web pioneer to change the economy for eyeballs online. It sold out almost instantly. Soon, messaging unicornKik is going to have a crowdsale to foster a new venture capital-independent ecosystem of developers.

Its such a buzzy world thatThe New York Times ran a deep dive recently begging the question: how many millions will get raised in this space for the Securities and Exchange Commission starts putting up red flags? UET CEO sees it much the same way.

I saw that people were investing in ICO after ICO, with each having its own slew of problems (both technical and in principle) and still making absurd amounts of money, UET CEO wrote the Observer in an email. My first two thoughts were This is ridiculous and How can I get in on this? I didnt have a product but I realized that people didnt really care about the product. They cared about spending a little bit of money, watching a chart and then withdrawing a little bit more money. So why not have an ICO without a product, and do so completely transparently just to see what happened?

The satire is actually built into the smart contract as well. Buyers get 1 UET for every 0.1 Ether (ETH) invested, plus a bonus. Every UET bought comes with free UET equal to the number of ETH invested. So, as of this writing, someone who paid 0.1 ETH right now would get 1 UET from the base formula plus 52 bonus UET, because people have put in 52 ETH so far.

Plus, the system will also randomly give away some bonus tokens along the way.

This, along with the bonus blocks were completely intentional, both to mirror some of the goofy crap other ICOs have tried to do in the name of fairness or whatever, and to further highlight that these tokens arent meant to be attached to any real value, UET CEO wrote. What good is an ICO if it just gives away tokens right?

Tokens get released right away. Prices dont swing with ETHs value.

Most crypto watchers online like the gag. We liked this exchange on an Ethereum investor subreddit.

This guy gets it. Reddit

The only way to buy in is with Ethereum, which also provides most of the underlying code. So far, UET has acquired 52 ETH, worth an equivalent of nearly $14,000. Over $1,000 worth has gone in since we have been working on this post. The site continuously updates with investments, but it can all also be verified on Etherscan, a third party site that makes the blockchain records a bit more comprehensible.

So whats UET CEO trying to say with this project? Well leave that for readers to decide, but remember that the best jokes tend to be made by folks who care about a subject enough to understand it well.Will the anonymous entrepreneur imitate Brown and do something substantive at the end of the crowdsale? Or would it be more in the spirit of the project if he just took all the money and blew it on an epic night at Applebees?

See the article here:

Cryptocurrency Has Its Potato Salad Moment With the Useless Ethereum Token - Observer

Get Your Wages in Cryptocurrencies: Bitwage Expands to the UK – Bitcoin Magazine

Its getting easier all the time to be paid in cryptocurrency. As of Monday, July 3, Bitwage, the Bitcoin payroll and international wage payment service, announced that it is launching services in the U.K. While there might be irony given that earlier this year Bitwage also announced it would offer European Union (EU) IBAN numbers to workers anywhere in the world receiving wages from EU companies, the latest news suggests that the United Kingdom is ready for cryptocurrency. But Bitwage has been saying that for two years.

For domestic workers, we are providing the easiest way for users to obtain digital currencies, Jonathan Chester, founder and president of Bitwage, told Bitcoin Magazine in a recent interview. It is just set it and forget it, as your savings of bitcoin, ether or litecoin increase over time. This is great timing to allow all the new U.K. users that have come into the ecosystem due to the recent price rise.

For international workers, this comes at a good time during the uncertainty of Brexit, said Chester. Once the U.K. leaves the EU, it will be much harder to receive payments from U.K. companies throughout Europe. Our solution will help reduce the cost and delays for workers receiving wages from the U.K., despite the impending consequences of the U.K. leaving the EU.

If Brexit leads to a significant change in the exchange rate, businesses will need to account for the most efficient payment process possible to reduce the likelihood of errors, delays or any other costs within their control.

While entire companies can easily switch their entire workforce payroll onto Bitwage, this scenario is not entirely necessary. Individual employees can create accounts for themselves. If someone is interested in getting their wages or a portion [of them] in cryptocurrency, all they have to do is sign up to Bitwage and provide the bank account provided to their employer, explained Chester. [Employers] dont even need to know the difference.

However, a great way to spread cryptocurrency adoption in the workplace would be to discuss the advantages of Bitcoin with fellow employees and management. As Chester put it, Bitcoin is a much better store of value than gold [because its] easier to use and store, and its much more scarce. For employees, taking a portion of wages in cryptocurrency would be an investment. Because users have the option of allocating the portion of their wages that are paid out in crypto versus fiat, it is an easy way to automatically start holding small amounts of cryptocurrencies.

If you are paying a lot of workers, it is about saving money on wire fees and not being limited on the amount you can send, said Chester. Systems that save you money on wire fees, but do not leverage blockchain [technology], have to use a method called float. This essentially means they are holding money in the other country to pay out when they receive the funds and then send a bulk wire to replenish the accounts in the payout country later. These systems have to limit the amount you can send so that they do not run out of funds to pay out. This is not the case with blockchain [technology].

Chester said that, before announcing its U.K. launch, several U.K. companies had approached Bitwage, hoping to use their service to pay workers in the Philippines. They wanted a way to save money on wire fees, save their workers money on exchange rates and remove limits on the amount of money that can be sent.

For many people, particularly millennials, having options can be a legitimate benefit. Offering employees more options for how they want their wages paid out is empowering. Furthermore, it signifies trust between employee and employer.

Bitwage can also receive and pay out in a wide range of other currencies such as gold, silver, USD, Euros, GBP, BRL, PHP, INR, MXN, ARS, VND, NGN and UAH. Choice of currency could be a formidable recruiting tool to attract a much wider pool of talent. For instance, international employees, the unbanked, gold bugs, silverites and of course the crypto community might appreciate the option of getting paid in the currency of their choice.

Chester pointed out that once more than 50 percent of employees at a business are getting paid in cryptocurrency, an employer might even decide to provide an incentive package like a bitcoin 401k.

It is important to note, however, that once businesses receive bitcoins from a Bitcoin transaction, it becomes that entitys responsibility to report capital gains. If a business receives all of their transactions in another designated currency, no additional reporting is required. Before making these choices on the type of payment, payment processor and preferred currency for Bitcoin transactions, and before making any changes to their settlement, its a good idea for business owners to discuss their intentions and their options with their accountants.

Furthermore, employees should pay careful attention to Bitwages fee structures, since there are some costs associated with the service.

Continued here:

Get Your Wages in Cryptocurrencies: Bitwage Expands to the UK - Bitcoin Magazine

Comets carve up Aplington-Parkersburg 16-0 in three innings – Marshalltown Times Republican

Local Sports

Jul 6, 2017

T-R PHOTO BY THORN COMPTON BCLUW pinch-runner Parker Scurr slides into second base off a steal attempt in the top of the first inning while Aplington-Parkersburg second baseman Maddie Waller catches the throw-out attempt in the Comets 16-0 win over the Falcons on Wednesday evening.

CONRAD The last time a highly ranked BCLUW team faced off against Aplington-Parkersburg in the first round of regionals, the 20-win Comets lost to the six-win Falcons in a 1-0 tilt that cut a promising season short in 2015.

On Wednesday, when the two teams met up in a similar fashion, Class 2A No. 12 BCLUW was clearly out to wash that two-year-old taste from its mouth as the Comets took a 4-0 lead in the first inning and stretched it all the way to 16-0 by the end of the third, securing a spot in the semifinal round of the Region 3 tournament.

Senior and winning pitcher Samantha Ubben, who was just coming up through the ranks last time these teams faced off in regionals, said the team definitely didnt lack for motivation in its quarterfinal match.

I was on that team when we lost to A-P so it was kind of revenge in a way, Ubben said after the win. I was just starting to play varsity my sophomore year, so this game kind of meant a lot and obviously our goal is state so we have to take it as seriously as we could and I think we really did that.

Ubben was perfect in her two innings of work Wednesday night, striking out four and retiring all six batters she faced with relative ease. Junior Lauren Anderson closed out the third inning with one hit, one walk and one strike out.

T-R PHOTO BY THORN COMPTON Comets pitcher Lauren Anderson delivers a strike to catcher Kate Goecke during the third and final inning of BCLUWs 16-0 rout of Aplington-Parkersburg on Wednesday in Conrad. Anderson pitched the final frame, giving up one hit while striking out one.

Due to a coin flip before the game, the Comets were actually the away team though they were playing at home, and Ubben said a furious first inning of batting helped her out before she took the mound.

I had to think it was a big game, the girls who were up there could hit the ball even though they arent the best team or whatever, she said. I really focused on that and batting-wise we had to treat it like we were away, not think we are at home. Start off well early because we were visitors.

Every BCLUW batter came to the plate in the first inning, and every batter made an appearance in the second inning as well. Four Comets Ubben, seniors Leah Yantis and Sara Sharp and sophomore Easton Swanson were perfect swinging the bat against A-P (7-13), with Yantis leading the way by going 4-for-4 with two RBIs. Ubben, Sharp and Swanson all went 3-for-3 at the plate, with Ubben driving in two RBIs, Sharp recording an RBI and three runs, and Swanson scoring three times while knocking in two RBIs.

Yantis, who has hit safely in each of her last eight at bats, said her approach at the plate makes it easier to knock down hits.

I can hit, I know I can hit, and if I swing for the fences its not going to happen so if I just poke it, it will do whatever I want it to, she said. Its just a mental game, hitting is not just a talent, you can do it if you put the bat on the ball. Throughout the years you get the hang of it. Most people think oh I want to hit it super hard! but its not really that, if you just put the bat on the ball it will go.

T-R PHOTO BY THORN COMPTON

After BCLUWs conference title win against West Marshall Monday night, head coach David Lee said Yantis is the cog that makes his offense go. Yantis said having that kind of role on the team is no problem considering the experience she has playing for the Comets.

Youd think its a lot of pressure but after doing it for a while and as a senior you kind of do what you want and people will follow, she said. If you make it look easy everyone thinks they can do it and that builds their confidence. I try my hardest to help everyone get more confidence throughout the year and I think we have done a pretty good job putting the bat on the ball.

Though the team seemed to thoroughly enjoy every hit and every run scored against the Falcons, Lee said his team was more focused on making sure they are playing at their best, rather than avenging a loss from when he wasnt even coaching.

It wasnt really on our mind, we just have to play and do our thing and play our game, but we did mention it this morning in batting practice just to get everyone focused on whats going on, Lee said. Everybody knows what peoples records are, but you look at any level the pros, college, anything upsets happen when somebody is not ready to play. Everybody has athletic people, and if someone gets things going sometimes you dont get it shut off before you get it turned around. We were determined not to let that happen.

Up next for the Comets is 2A No. 13 South Hamilton, a team they lost to way back in their second game of the season. Ubben said both teams have come a long way since that game in late May, and neither team is looking to end their postseason run just yet.

T-R PHOTO BY THORN COMPTON

We did lose to South Hamilton at the beginning of the year so that will be another game we are looking for revenge in a way, she said. Lauren and I split that game and we arent the same team we were when we faced them but neither are they, so we want to go out and play hard.

That game for the right to play for the Region 3 title will be at 7 p.m. in Conrad on Friday.

LA PORTE CITY It was high drama for the East Marshall softball team in its first game of the Class 3A Region 5 ...

DES MOINES Marshalltown hit the road for the final time this regular season Wednesday night, splitting a ...

IRVING, Texas The Northern Iowa wrestling program will be moving to the Big 12 Conference effective for the ...

WEST DES MOINES The Marshalltown softball team was swept by Class 5A No. 10 Dowling Catholic for the second ...

SILVIS, Ill. Jordan Spieth has decided to skip the John Deere Classic to prepare for the British Open. Spieth ...

Go here to see the original:

Comets carve up Aplington-Parkersburg 16-0 in three innings - Marshalltown Times Republican

Bizarro comet challenging researchers – Space Daily

Scientists pursue research through observation, experimentation and modeling. They strive for all of these pieces to fit together, but sometimes finding the unexpected is even more exciting. That's what happened to University of Central Florida's astrophysicist Gal Sarid, who studies comets, asteroids and planetary formation and earlier this year was part of a team that published a study focused on the comet 174P/Echeclus. It didn't behave the way the team was expecting.

"This is another clue that Echeclus is a bizarre solar system object," said University of South Florida physics research Professor Maria Womack, who leads the team.

Comets streak across the sky and as they get closer to the sun look like bright fuzz balls with extended luminous trails in their wake. However, comets are actually bulky spheres of mixed ice and rock, many of them also rich in other frozen volatile compounds, such as carbon monoxide, carbon dioxide, hydrogen cyanide and methanol.

Comets heat up as they get closer to the sun, losing their icy layers by sublimation and producing emission jets of water vapor, other gases and dust expelled from the comet nucleus, Sarid said. Once they move away from the sun, they cool off again. But some comets start showing emission activity while still very far from the sun, where heating is low.

That's what Sarid and Womack research as they study these kinds of distantly active comets. Womack and graduate student Kacper Wierzchos used the Arizona Radio Observatory Submillimeter telescope to observe Echeclus last year as it approached the sun. This work will be part of Wierzchos' doctoral dissertation in applied physics at USF. Sarid provided theoretical expertise for interpreting the observational results.

Echeclus is part of the population of objects called centaurs, which have orbits around the sun at distances between that of Jupiter and Neptune. It is also part of a special group within the centaurs, which sometimes exhibit comet-like activity. Previous research indicated that Echeclus might have been spewing carbon monoxide as its icy material changed phases.

The team found that the levels of carbon monoxide were nearly 40 times lower than typically expected from other comets at similar distances from the sun. This suggests that Echeclus and similar active Centaurs may be more fragile than other comets. Echeclus may have gone through a different physical process from most comets that caused it to lose a lot of its original carbon monoxide, or it may have had less of that substance to begin with.

Understanding the composition of comets and how they work will help researchers understand how our solar system was formed. It will also aid space explorers plan for their travels - things to avoid and perhaps hidden resources found within the nucleus of comets that may be useful on deep space missions.

"These are minor bodies that we are studying, but they can provide major insights," Sarid said. "We believe they are rich in organics and could provide important hints of how life originated."

Sarid is determined to solve the puzzle. This week he hosts a group of comet experts at UCF to discuss the mysterious activity of Echeclus and other similar bodies. The idea for the workshop is to capitalize on the local expertise in observation, laboratory and theoretical work that is required to fully understand the mysteries of active comets at great distances from the sun. The inaugural Florida Distant Comets workshop was held a year ago at USF.

"I guess I've always liked challenges," Sarid said from his office at the Florida Space Institute at UCF, where he spends his days trying to decipher the models and mathematical equations related to his work.

Sarid has a Ph.D. in geophysics and planetary Sciences from Tel Aviv University in Israel and completed postdoctoral work at the Institute for Astronomy and the NASA Astrobiology Institute in Hawaii, followed by a second postdoctoral research appointment at Harvard University. He was a part of a team that used the telescopes in Hawaii for several years chasing comets and asteroids for NASA observing campaigns and space missions before joining UCF in 2014.

He teamed up with Womack in 2016 and on this most recent study provided theoretical expertise for interpreting the observational results. The National Science Foundation funds the project, under a grant awarded to USF, with Womack as the principal investigator and Sarid as a co-investigator.

They will continue to look at centaur-type comets and measure the level of their carbon monoxide emission and related activity.

Research Report

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.

Excerpt from:

Bizarro comet challenging researchers - Space Daily

Hulak signs with another AHL team – Utica Observer Dispatch

Ben Birnell

Another forward from last season's Utica Comets team has moved on.

Forward Derek Hulak, who missed much of the 2016-17 season due to an injury, is one of five players signed to an American Hockey League contract with the Lehigh Valley Phantoms, the Atlantic Division team announced Thursday.

Hulak, who had back-to-back 40-point seasons with Texas before joining Utica, was limited to 17 games with what then-Comets coach Travis Green called an upper-body injury. Hulak finished with four goals and an assist, but didn't play after Dec. 3.

Hulak, who remained with the team during his injury, was active in the community and earned the team's Man of the Year honor. After earning the honor late in the 2016-17 season, Hulak said he was hopeful he might return to the Comets' lineup, but did not.

The other players to sign with different teams since free agency began Saturday are the Comets' franchise leader in multiple offensive categories Alex Grenier and forward Curtis Valk. The forwards, who were among the Comets' top offensive players in combining for 91 points last season, both signed one-year contracts with the Florida Panthers.

Comets earn honor

The Comets' front office staff is among the AHL teams to be recognized for their work on the business side.

As part of the league's Team Business Services program, Utica was the Eastern Conference's recipient for outstanding fan experience at home games. Cleveland was recognized from the Western Conference.

The Comets have sold out 93 consecutive games at the Utica Memorial Auditorium dating back to the team's 2014-15 Calder Cup playoff run.

Read this article:

Hulak signs with another AHL team - Utica Observer Dispatch