pharmawikipedia.org

">
A380 makes maiden flight to US

Monday, March 19, 2007

The Airbus A380, the world’s largest passenger plane, was set to land in the United States of America on Monday after a test flight. One of the A380s is flying from Frankfurt to Chicago via New York; the airplane will be carrying about 500 people.

It is being billed as the first time it has carried a near-normal number of passengers, though most will be staff of Airbus and German airline Lufthansa.

A second A380 is also travelling to the U.S. on Monday, but without passengers. This will be branded as a Qantas flight and fly from Frankfurt to Los Angeles LAX airport. The first leg of the flight going towards New York will be travelling under a Lufthansa flight number, and is due to arrive at New York’s John F. Kennedy airport at 12:30 EST (16:30 UTC).

The test flights are being used to monitor everything from how easily the plane docks at the terminal gate to the way the in-flight dining and entertainment services work. Deliveries to Singapore Airlines, its launch customer, are not due until October – two years late.

Delays of the production of the A380 have cost Airbus more than 6 billion dollars. Airbus has warned there could be additional charges to come.

These monetary problems have led to a recently-announced restructuring program at Airbus, called Power8, in which 10,000 jobs go and several factories will be sold to Airbus partners. France will lose 4,300 jobs, followed by Germany having a loss of 3,700 jobs, while the United Kingdom and Spain will see 1,600 and 400 jobs cut respectively.

The Belgian government has announced that it will give up to 150 million (US$ 199 million) in aid to help sub-contractors which supply Airbus and employ thousands of workers.

Retrieved from “https://en.wikinews.org/w/index.php?title=A380_makes_maiden_flight_to_US&oldid=1971226”

No Comments

Excavators: A Condensed Soup

Submitted by: Robert Tate

Innovation; it is what drives the people of the world to a better life. It is innovation that allowed the excavator to come into being. The excavator is a vehicle that is composed of a moveable arm attached to a bucket for scooping, as well as an operator s cab mounted on a rotating platform. These sit atop an underbody with either tracks or wheels, depending upon the application. Excavators are commonly used in the digging of trenches and foundations, material handling, demolition, river dredging, mining, and grading and landscaping.

The vehicle itself is produced in a wide variety of shapes and sizes. Smaller vehicles are called compact excavators while larger ones are simply called excavators. Recently, hydraulic excavators have opened up new possibilities in the capabilities of the machinery. The equipment is now capable of compacting, pulverizing, hammering, and grappling objects through the use of attachments. Several newer excavators include quick-attaching mounting systems to simplify the attachment process on the job site. Another advancement in the potential of the machinery occurred in the early nineteen-nineties. The Komatsu Engineering Company noticed that a counterweight that was built into the rear of machines to provide more lifting capacity obstructed the excavators ability to turn in constricted areas, thus rendering it relatively useless in such situations. Therefore, the company launched a prototype model that eliminated the counterweight design; this type of machinery is now extensively used throughout the world.

[youtube]http://www.youtube.com/watch?v=cQLUHbHDiI4[/youtube]

Akin to many things, the realm of excavators has its own language, so to speak. There is a distinct set of vocabulary that is associated with the machinery; the devices themselves are sometimes referred to as diggers or three-hundred and sixty degree excavators. Also, excavators are sometimes called front hoes because of the location of their bucket. An excavators bucket moves in the same way as a backhoes’ — that is, toward the machine. Therefore, the previously mentioned term is incorrect.

An interesting side note is that excavating technology has even made its way onto Mars with the one of the exploration rovers. It features a robotic excavating arm controlled by an embedded operating system or the NASA Operations Center on Earth. The excavating arm is festooned with a bucket, auger, camera, and various sensors; the system has failed many times, however. This is because of the intense weather conditions on Mars.

Essentially, excavators are what have driven the world into this age of technologically advanced buildings and cities. The excavator is an advanced piece of machinery, complete with a bucket, articulated arm, and tacks or wheels. It is used for digging, auguring, mining, material handling, and many other things. Modern excavators allow for the use of many attachments such as drills and grappling devices. It has its own set of vocabulary that is used to describe the equipment itself and various attachments. All in all, the excavator is a beautiful vehicle in both the engineering sense and design. The excavator is an innovation. Perhaps you will one day create an innovative product too.

About the Author: Robert Tate Region Sales Manager of Mascus UK. Mascus is an electronic marketplace for used trucks, trailers and tractors. Mascus makes trading in

excavators

more efficiently by collecting all information about supply and demand in one place. Contacts: Robert Tate Regional Sales Manager – UK Mob:+ 44 (0) 7970 230055 E mail: robert.tate@mascus.com

Source:

isnare.com

Permanent Link:

isnare.com/?aid=409288&ca=Education

No Comments

ACLU, EFF challenging US ‘secret’ court orders seeking Twitter data

">
ACLU, EFF challenging US ‘secret’ court orders seeking Twitter data
April 16th, 2021 | Uncategorized |

Thursday, April 7, 2011

Late last month, the American Civil Liberties Union (ACLU) and Electronic Frontier Foundation (EFF) filed objections to the United States Government’s ‘secret’ attempts to obtain Twitter account information relating to WikiLeaks. The ACLU and EFF cite First and Fourth amendment issues as overriding reasons to overturn government attempts to keep their investigation secret; and, that with Birgitta Jonsdottir being an Icelandic Parliamentarian, the issue has serious international implications.

The case, titled “In the Matter of the 2703(d) Order Relating to Twitter Accounts: Wikileaks, Rop_G, IOERROR; and BirgittaJ“, has been in the EFF’s sights since late last year when they became aware of the US government’s attempts to investigate WikiLeaks-related communications using the popular microblogging service.

The key objective of this US government investigation is to obtain data for the prosecution of Bradley Manning, alleged to have supplied classified data to WikiLeaks. In addition to Manning’s Twitter account, and that of WikiLeaks (@wikileaks), the following three accounts are subject to the order: @ioerror, @birgittaj, and @rop_g. These, respectively, belong to Jacob Apelbaum, Birgitta Jonsdottir, and Rop Gonggrijp.

Birgitta is not the only non-US citizen with their Twitter account targeted by the US Government; Gonggrijp, a Dutch ‘ex-hacker’-turned-security-expert, was one of the founders of XS4ALL – the first Internet Service Provider in the Netherlands available to the public. He has worked on a mobile phone that can encrypt conversations, and proven that electronic voting systems can readily be hacked.

In early March, a Virginia magistrate judge ruled that the government could have the sought records, and neither the targeted users, or the public, could see documents submitted to justify data being passed to the government. The data sought is as follows:

  1. Personal contact information, including addresses
  2. Financial data, including credit card or bank account numbers
  3. Twitter account activity information, including the “date, time, length, and method of connections” plus the “source and destination Internet Protocol address(es)”
  4. Direct Message (DM) information, including the email addresses and IP addresses of everyone with whom the Parties have exchanged DMs

The order demands disclosure of absolutely all such data from November 1, 2009 for the targeted accounts.

The ACLU and EFF are not only challenging this, but demanding that all submissions made by the US government to justify the Twitter disclosure are made public, plus details of any other such cases which have been processed in secret.

Bradley Manning, at the time a specialist from Maryland enlisted with the United States Army’s 2nd Brigade, 10th Mountain Division, was arrested in June last year in connection with the leaking of classified combat video to WikiLeaks.

The leaked video footage, taken from a US helicopter gunship, showed the deaths of Reuters staff Saeed Chmagh and Namir Noor-Eldeen during a U.S. assault in Baghdad, Iraq. The wire agency unsuccessfully attempted to get the footage released via a Freedom of Information Act request in 2007.

When WikiLeaks released the video footage it directly contradicted the official line taken by the U.S. Army asserting that the deaths of the two Reuters staff were “collateral damage” in an attack on Iraqi insurgents. The radio chatter associated with the AH-64 Apache video indicated the helicopter crews had mistakenly identified the journalists’ equipment as weaponry.

The US government also claims Manning is linked to CableGate; the passing of around a quarter of a million classified diplomatic cables to WikiLeaks. Manning has been in detention since July last year; in December allegations of torture were made to the United Nations High Commissioner for Human Rights regarding the conditions under which he was and is being detained.

Reports last month that he must now sleep naked and attend role call at the U.S. Marine facility in Quantico in the same state, raised further concern over his detention conditions. Philip J. Crowley, at-the-time a State Department spokesman, remarked on this whilst speaking at Massachusetts Institute of Technology; describing the current treatment of Manning as “ridiculous and counterproductive and stupid”, Crowley was, as a consequence, put in the position of having to tender his resignation to Secretary of State Hillary Clinton.

Despite his native Australia finding, in December last year, that Assange’s WikiLeaks had not committed any criminal offences in their jurisdiction, the U.S. government has continued to make ongoing operations very difficult for the whistleblower website.

The result of the Australian Federal Police investigation left the country’s Prime Minister, Julia Gillard, having to retract a statement that WikiLeaks had acted “illegally”; instead, she characterised the site’s actions as “grossly irresponsible”.

Even with Australia finding no illegal activity on the part of WikiLeaks, and with founder Julian Assange facing extradition to Sweden, U.S. pressure sought to hobble WikiLeaks financially.

Based on a State Department letter, online payments site PayPal suspended WikiLeaks account in December. Their action was swiftly followed by Visa Europe and Mastercard ceasing to handle payments for WikiLeaks.

The online processing company, Datacell, threatened the two credit card giants with legal action over this. However, avenues of funding for the site were further curtailed when both Amazon.com and Swiss bank PostFinance joined the financial boycott of WikiLeaks.

Assange continues, to this day, to argue that his extradition to Sweden for questioning on alleged sexual offences is being orchestrated by the U.S. in an effort to discredit him, and thus WikiLeaks.

Wikinews consulted an IT and cryptography expert from the Belgian university which developed the current Advanced Encryption Standard; explaining modern communications, he stated: “Cryptography has developed to such a level that intercepting communications is no longer cost effective. That is, if any user uses the correct default settings, and makes sure that he/she is really connecting to Twitter it is highly unlikely that even the NSA can break the cryptography for a protocol such as SSL/TLS (used for https).”

Qualifying this, he commented that “the vulnerable parts of the communication are the end points.” To make his point, he cited the following quote from Gene Spafford: “Using encryption on the Internet is the equivalent of arranging an armored car to deliver credit card information from someone living in a cardboard box to someone living on a park bench.

Continuing, the Katholieke Universiteit Leuven (KUL) expert explained:

In the first place, the weak point is Twitter itself; the US government can go and ask for the data; companies such as Twitter and Google will typically store quite some information on their users, including IP addresses (it is known that Google deletes the last byte of the IP address after a few weeks, but it is not too hard for a motivated opponent to find out what this byte was).
In the second place, this is the computer of the user: by exploiting system weaknesses (with viruses, Trojan horses or backdoors in the operating system) a highly motivated opponent can enter your machine and record your keystrokes plus everything that is happening (e.g. the FBI is known to do this with the so-called Magic Lantern software). Such software is also commercially available, e.g. for a company to monitor its employees.
It would also be possible for a higly motivated opponent to play “man-in-the-middle”; that means that instead of having a secure connection to Twitter.com, you have a secure connection to the attacker’s server, who impersonates Twitter’s and then relays your information to Twitter. This requires tricks such as spoofing DNS (this is getting harder with DNSsec), or misleading the user (e.g. the user clicks on a link and connects to tw!tter.com or Twitter.c0m, which look very similar in a URL window as Twitter.com). It is clear that the US government is capable of using these kind of tricks; e.g., a company has been linked to the US government that was recognized as legitimate signer in the major browsers, so it would not be too large for them to sign a legitimate certificate for such a spoofing webserver; this means that the probability that a user would detect a problem would be very low.
As for traffic analysis (finding out who you are talking to rather than finding out what you are telling to whom), NSA and GCHQ are known to have access to lots of traffic (part of this is obtained via the UK-USA agreement). Even if one uses strong encryption, it is feasible for them to log the IP addresses and email addresses of all the parties you are connecting to. If necessary, they can even make routers re-route your traffic to their servers. In addition, the European Data Retention directive forces all operators to store such traffic data.
Whether other companies would have complied with such requests: this is very hard to tell. I believe however that it is very plausible that companies such as Google, Skype or Facebook would comply with such requests if they came from a government.
In summary: unless you go through great lengths to log through to several computers in multiple countries, you work in a clean virtual machine, you use private browser settings (don’t accept cookies, no plugins for Firefox, etc.) and use tools such as Tor, it is rather easy for any service provider to identify you.
Finally: I prefer not to be quoted on any sentences in which I make statements on the capabilities or actions of any particular government.

Wikinews also consulted French IT security researcher Stevens Le Blond on the issues surrounding the case, and the state-of-the-art in monitoring, and analysing, communications online. Le Blond, currently presenting a research paper on attacks on Tor to USENIX audiences in North America, responded via email:

Were the US Government to obtain the sought data, it would seem reasonable the NSA would handle further investigation. How would you expect them to exploit the data and expand on what they receive from Twitter?

  • Le Blond: My understanding is that the DOJ is requesting the following information: 1) Connection records and session times 2) IP addresses 3) e-mail addresses 4) banking info
By requesting 1) and 2) for Birgitta and other people involved with WikiLeaks (WL) since 2009, one could derive 2 main [pieces of] information.
First, he could tell the mobility of these people. Recent research in networking shows that you can map an IP address into a geographic location with a median error of 600 meters. So by looking at changes of IP addresses in time for a Twitter user, one could tell (or at least speculate about) where that person has been.
Second, by correlating locations of different people involved with WL in time, one could possibly derive their interactions and maybe even their level of involvement with WL. Whether it is possible to derive this information from 1) and 2) depends on how this people use Twitter. For example, do they log on Twitter often enough, long enough, and from enough places?
My research indicates that this is the case for other Internet services but I cannot tell whether it is the case for Twitter.
Note that even though IP logging, as done by Twitter, is similar to the logging done by GSM [mobile phone] operators, the major difference seems to be that Twitter is subject to US regulation, no matter the citizenship of its users. I find this rather disturbing.
Using 3), one could search for Birgitta on other Internet services, such as social networks, to find more information on her (e.g., hidden accounts). Recent research on privacy shows that people tend to use the same e-mail address to register an account on different social networks (even when they don’t want these accounts to be linked together). Obviously, one could then issue subpoenas for these accounts as well.
I do not have the expertise to comment on what could be done with 4).
((WN)) As I believe Jonsdottir to be involved in the Icelandic Modern Media Initiative (IMMI), what are the wider implications beyond the “WikiLeaks witchhunt”?
  • Le Blond: Personal data can be used to discredit, especially if the data is not public.

Having been alerted to the ongoing case through a joint press release by the ACLU and EFF, Wikinews sought clarification on the primary issues which the two non-profits saw as particularly important in challenging the U.S. Government over the ‘secret’ court orders. Rebecca Jeschke, Media Relations Director for the EFF, explained in more detail the points crucial to them, responding to a few questions from Wikinews on the case:

((WN)) As a worse-case, what precedents would be considered if this went to the Supreme Court?
  • Rebecca Jeschke: It’s extremely hard to know at this stage if this would go to the Supreme Court, and if it did, what would be at issue. However, some of the interesting questions about this case center on the rights of people around the world when they use US Internet services. This case questions the limits of US law enforcement, which may turn out to be very different from the limits in other countries.
((WN)) Since this is clearly a politicised attack on free speech with most chilling potential repercussions for the press, whistleblowers, and by-and-large anyone the relevant U.S. Government departments objects to the actions of, what action do you believe should be taken to protect free speech rights?
  • Jeschke: We believe that, except in very rare circumstances, the government should not be permitted to obtain information about individuals’ private Internet communications in secret. We also believe that Internet companies should, whenever possible, take steps to ensure their customers are notified about requests for information and have the opportunity to respond.
((WN)) Twitter via the web, in my experience, tends to use https:// connections. Are you aware of any possibility of the government cracking such connections? (I’m not up to date on the crypto arms race).
  • Jeschke: You don’t need to crack https, per se, to compromise its security. See this piece about fraudulent https certificates:
Iranian hackers obtain fraudulent httpsEFF website.
((WN)) And, do you believe that far, far more websites should – by default – employ https:// connections to protect people’s privacy?
  • Jeschke: We absolutely think that more websites should employ https! Here is a guide for site operators: (See external links, Ed.)

Finally, Wikinews approached the Icelandic politician, and WikiLeaks supporter, who has made this specific case a landmark in how the U.S. Government handles dealings with – supposedly – friendly governments and their elected representatives. A number of questions were posed, seeking the Icelandic Parliamentarian’s views:

((WN)) How did you feel when you were notified the US Government wanted your Twitter account, and message, details? Were you shocked?
  • Birgitta Jonsdottir: I felt angry but not shocked. I was expecting something like this to happen because of my involvement with WikiLeaks. My first reaction was to tweet about it.
((WN)) What do you believe is their reasoning in selecting you as a ‘target’?
  • Jonsdottir: It is quite clear to me that USA authorities are after Julian Assange and will use any means possible to get even with him. I think I am simply a pawn in a much larger context. I did of course both act as a spokesperson for WikiLeaks in relation to the Apache video and briefly for WikiLeaks, and I put my name to the video as a co-producer. I have not participated in any illegal activity and thus being a target doesn’t make me lose any sleep.
((WN)) Are you concerned that, as a Member of Parliament involved in the Icelandic Modern Media Initiative (IMMI), the US attempt to obtain your Twitter data is interfering with planned Icelandic government policy?
  • Jonsdottir: No
((WN)) In an earlier New York Times (NYT) article, you’re indicating there is nothing they can obtain about you that bothers you; but, how do you react to them wanting to know everyone you talk to?
  • Jonsdottir: It bothers me and according to top computer scientists the government should be required to obtain a search warrant to get our IP addresses from Twitter. I am, though, happy I am among the people DOJ is casting their nets around because of my parliamentary immunity; I have a greater protection then many other users and can use that immunity to raise the issue of lack of rights for those that use social media.
HAVE YOUR SAY
Do you believe the U.S. government should have the right to access data on foreign nationals using services such as Twitter?
Add or view comments
((WN)) The same NYT article describes you as a WikiLeaks supporter; is this still the case? What attracts you to their ‘radical transparency’?
  • Jonsdottir: I support the concept of WikiLeaks. While we don’t have a culture of protection for sources and whistleblowers we need sites like WikiLeaks. Plus, I think it is important to give WikiLeaks credit for raising awareness about in how bad shape freedom of information and expression is in our world and it is eroding at an alarming rate because of the fact that legal firms for corporations and corrupt politicians have understood the borderless nature of the legalities of the information flow online – we who feel it is important that people have access to information that should remain in the public domain need to step up our fight for those rights. WikiLeaks has played an important role in that context.I don’t support radical transparency – I understand that some things need to remain secret. It is the process of making things secret that needs to be both more transparent and in better consensus with nations.
((WN)) How do you think the Icelandic government would have reacted if it were tens of thousands of their diplomatic communications being leaked?
  • Jonsdottir: I am not sure – A lot of our dirty laundry has been aired via the USA cables – our diplomatic communications with USA were leaked in those cables, so far they have not stirred much debate nor shock. It is unlikely for tens of thousands of cables to leak from Iceland since we dont have the same influence or size as the USA, nor do we have a military.
((WN)) Your ambassador in the US has spoken to the Obama administration. Can you discuss any feedback from that? Do you have your party’s, and government’s, backing in challenging the ordered Twitter data release?
  • Jonsdottir: I have not had any feedback from that meeting, I did however receive a message from the DOJ via the USA ambassador in Iceland. The message stated three things: 1. I am free to travel to the USA. 2. If I would do so, I would not be a subject of involuntary interrogation. 3. I am not under criminal investigation. If this is indeed the reality I wonder why they are insisting on getting my personal details from Twitter. I want to stress that I understand the reasoning of trying to get to Assange through me, but I find it unacceptable since there is no foundation for criminal investigation against him. If WikiLeaks goes down, all the other media partners should go down at the same time. They all served similar roles. The way I see it is that WikiLeaks acted as the senior editor of material leaked to them. They could not by any means be considered a source. The source is the person that leaks the material to WikiLeaks. I am not sure if the media in our world understands how much is at stake for already shaky industry if WikiLeaks will carry on carrying the brunt of the attacks. I think it would be powerful if all the medias that have had access to WikiLeaks material would band together for their defence.
((WN)) Wikinews consulted a Belgian IT security expert who said it was most likely companies such as Facebook, Microsoft, and Google, would have complied with similar court orders *without advising the ‘targets*’. Does that disturb you?
  • Jonsdottir: This does disturb me for various reasons. The most obvious is that my emails are hosted at google/gmail and my search profile. I dont have anything to hide but it is important to note that many of the people that interact with me as a MP via both facebook and my various email accounts don’t always realize that there is no protection for them if they do so via those channels. I often get sensitive personal letters sent to me at facebook and gmail. In general most people are not aware of how little rights they have as users of social media. It is those of uttermost importance that those sites will create the legal disclaimers and agreements that state the most obvious rights we lose when we sign up to their services.
This exclusive interview features first-hand journalism by a Wikinews reporter. See the collaboration page for more details.
((WN)) Has there been any backlash within Iceland against US-based internet services in light of this? Do you expect such, or any increase in anti-American sentiments?
  • Jonsdottir: No, none what so ever. I dont think there is much anti-American sentiments in Iceland and I dont think this case will increase it. However I think it is important for everyone who does not live in the USA and uses social services to note that according to the ruling in my case, they dont have any protection of the 1st and 4th amendment, that only apply to USA citizens. Perhaps the legalities in relation to the borderless reality we live in online need to be upgraded in order for people to feel safe with using social media if it is hosted in the USA. Market tends to bend to simple rules.
((WN)) Does this make you more, or less, determined to see the IMMI succeed?
  • Jonsdottir: More. People have to realize that if we dont have freedom of information online we won’t have it offline. We have to wake up to the fact that our rights to access information that should be in the public domain is eroding while at the same time our rights as citizens online have now been undermined and we are only seen as consumers with consumers rights and in some cases our rights are less than of a product. This development needs to change and change fast before it is too late.

The U.S. Government continues to have issues internationally as a result of material passed to WikiLeaks, and subsequently published.

Within the past week, Ecuador has effectively declared the U.S. ambassador Heather Hodges persona-non-grata over corruption allegations brought to light in leaked cables. Asking the veteran diplomat to leave “as soon as possible”, the country may become the third in South America with no ambassadorial presence. Both Venezuela and Bolivia have no resident U.S. ambassador due to the two left-wing administrations believing the ejected diplomats were working with the opposition.

The U.S. State Department has cautioned Ecuador that a failure to speedily normalise diplomatic relations may jeapordise ongoing trade talks.

The United Kingdom is expected to press the Obama administration over the continuing detention of 23-year-old Manning, who also holds UK citizenship. British lawmakers are to discuss his ongoing detention conditions before again approaching the U.S. with their concerns that his solitary confinement, and treatment therein, is not acceptable.

The 22 charges brought against Manning are currently on hold whilst his fitness to stand trial is assessed.

Retrieved from “https://en.wikinews.org/w/index.php?title=ACLU,_EFF_challenging_US_%27secret%27_court_orders_seeking_Twitter_data&oldid=4515305”

No Comments

Looted, possibly contaminated body parts transplanted into USA, Canadian patients

">
Looted, possibly contaminated body parts transplanted into USA, Canadian patients
April 16th, 2021 | Uncategorized |

Monday, March 20, 2006

Fears of contaminated bone and skin grafts are being felt by unsuspecting patients following the revelation that funeral homes may have been looting corpses.

Janet Evans of Marion Ohio was told by her surgeon, “The bone grafts you got might have been contaminated”. She reacted with shock, “I was flabbergasted because I didn’t even know what he was talking about. I didn’t know I got a bone graft until I got this call. I just thought they put in screws and rods.”

The body of Alistair Cooke, the former host of “Masterpiece Theatre,” was supposedly looted along with more than 1,000 others, according to two law enforcement officials close to the case. The tissue taken was typically skin, bone and tendon, which was then sold for use in procedures such as dental implants and hip replacements. According to authorities, millions of dollars were made by selling the body parts to companies for use in operations done at hospitals and clinics in the United States and Canada.

A New Jersey company, Biomedical Tissue Services, has reportedly been taking body parts from funeral homes across Brooklyn, New York. According to ABC News, they set up rooms like a “surgical suite.” After they took the bones, they replaced them with PVC pipe. This was purportedly done by stealth, without approval of the deceased person or the next of kin. 1,077 bodies were involved, say prosecuters.

Investagators say a former dentist, Michael Mastromarino, is behind the operation. Biomedical was considered one of the “hottest procurement companies in the country,” raking in close to $5 million. Eventually, people became worried: “Can the donors be trusted?” A tissue processing company called LifeCell answered no, and issued a recall on all their tissue.

Cooke’s daughter, Susan Cooke Kittredge, said, “To know his bones were sold was one thing, but to see him standing truncated before me is another entirely.” Now thousands of people around the country are receiving letters warning that they should be tested for infectious diseases like HIV or hepatitis. On February 23, the Brooklyn District Attorney indicted Mastromarino and three others. They are charged with 122 felony counts, including forgery and bodysnatching.

Retrieved from “https://en.wikinews.org/w/index.php?title=Looted,_possibly_contaminated_body_parts_transplanted_into_USA,_Canadian_patients&oldid=4380177”

No Comments

Calls for corporate tax reform in Australia goes unheeded">
Calls for corporate tax reform in Australia goes unheeded

April 16th, 2021 | Uncategorized |

Friday, May 12, 2006

Peter Costello’s budget announcement has led to rejoicing for small businesses, but the lack of joy for those pushing for radical corporate taxation reform has led to many businesses asking “what about us?”

Personal taxation and small business have been the big winners after this year’s federal budget. Although dampened by the twin economic threats of rising interest rates and petrol prices, there should be a reasonable amount of real income savings for both low and high income earners, with those receiving Medicare, or a superannuation benefit, privy to an even lower level of taxation (0% for those on super benefits).

Small business also has benefited from the Howard government’s 11th annual budget, with them receiving a higher level of reducing depreciation, leading to a higher level of deductions in the years following the uptake of new technology or other capital. They are also privy to a AU$435 million dollar tax cut to compensate for their changing accounting requirements under the government’s new AIFRS reporting standards, as well as increasing the uptake of both the small business tax relief scheme and CGT (Capital Gains tax) Concessions.

The budget was not a complete loss for big business however, as superannuation laws have been tweaked to streamline contribution and payment rules previously impeding those with multitudes of staff.

But this is not enough, says Big 4 accounting firm Ernst & Young. In their newly published paper “Taxation of Investment in Australia: the need for ongoing reform”. In it they lead the charge for a greater streamlining and organization of the corporate tax system in Australia, submitting that it will lead to reductions in “disincentives to work save and invest in Australia [as well as improving] the international competitiveness of Australian businesses.” This follows from a recent report brought out by Mr. Costello himself about the need for tax reform in Australia.

A budget night Mr. Costello was notably coy about any future reform of corporate tax in Australia. He alluded to the report by his ministers but kept from outlining the government’s plan precisely.

Retrieved from “https://en.wikinews.org/w/index.php?title=Calls_for_corporate_tax_reform_in_Australia_goes_unheeded&oldid=565549”

No Comments

Tips For Tuxedo Rental

April 15th, 2021 | Yoga |

byadmin

A tuxedo can give you a formal look for a wedding or a prom. Tuxedo rental is an affordable option if you will not wear this formal outfit often. You can look distinguished without burning a hole in your wallet. There are many options when it comes to this outfit- you could choose from designer wear, and you need to decide on whether you want a bow or a tie.

You can begin your search on the web. Make a list of shops that offer rental services, so that you can choose from their designs after you compare their fees. If you have a senior who opted to rent, you can ask for recommendations.

Start your search three months before the event, so that you are not in a hurry. The company staff will also be able to pay more attention to you. You should think of any questions you have for them in advance so that you can clarify your doubts quickly.

Check the fashion trends popular then so that you can look contemporary. Wearing an old fashioned style can make you look out of place. You should also make sure that the tux you are planning to wear fits you well. Check the condition of the suit carefully.

You can also research fashion trends online before you start doing the rounds of shops. Resist the temptation to choose an outfit which matches your date’s. She would not consider matching her outfit to yours, so why should you?

Budget for the rental so that you do not have to cut back on other expenses when the time comes. Read the terms and conditions so that you know what will happen if you rip the suit accidentally. You should also decide on the shoes that you will be wearing.

Tight shoes can spoil the look of your outfit, so be prepared. You can check with your date if she is renting a dress. You can ask the same shop if they also rent tuxedos. It may be convenient to pick up and bring back the outfits in that case.

Choose a reputed shop for tuxedo rental. Tucson residents should consider one which is nearby, so that it is easy to visit. You may study at the last minute, but decisions like these should be made in advance to create the right impact. Your date will appreciate the effort that you make.

No Comments

MSN Encarta introduces wiki-like enhancements">
MSN Encarta introduces wiki-like enhancements

April 15th, 2021 | Uncategorized |

April 9, 2005

This article mentions the Wikimedia Foundation, one of its projects, or people related to it. Wikinews is a project of the Wikimedia Foundation.

Microsoft’s Encarta has announced the addition of a blog as well as some wiki-like functionality to the online subscription encyclopedia.Encarta is welcoming revision suggestions from their users, but they have a disclaimer:

Encarta is different from open-content encyclopedias found elsewhere on the Web that post users’ changes immediately.

When the changes are implemented at Encarta, readers can click an “Edit this article” link to have their contribution reviewed by editors at Microsoft for possible use.

The web enhancement has introduced a minor security glitch for the subscription service. When trying to look up an article on Encarta as a non-subscriber, web surfers receive a teaser page suggesting the user sign up for a subscription [1]. However, using the editor URL for the same article will get a WYSIWYG display of the article requested; a simple way around the subscription requirement [2].

Retrieved from “https://en.wikinews.org/w/index.php?title=MSN_Encarta_introduces_wiki-like_enhancements&oldid=4567692”

No Comments

Interim report blames ice for British Airways 777 crash in London">
Interim report blames ice for British Airways 777 crash in London

April 15th, 2021 | Uncategorized |

Saturday, September 6, 2008

The United Kingdom’s Air Accidents Investigation Branch (AAIB) has released an interim report into the crash of British Airways Flight 38. The Boeing 777-ER crashed early this year as it tried to land at London’s Heathrow Airport.

The report states that the AAIB believes the crash occurred when ice crystals formed within the fuel system. However, it should be noted that the report only serves as an update into the progress of the investigation and that the final report is yet to be published and may yet reach a different conclusion into the cause of the accident.

The flight from Beijing, China had been normal until final approach at Heathrow, at which point the aircraft was coming in for landing with the autopilot and autothrottle engaged. However, engine power became greatly reduced when the autothrottle requested more thrust, and the aircraft made a forced landing 1,000 feet from the runway. The aircraft suffered substantial damage as it slid across the grass to the runway threshold, where it came to rest, and was written off. There was only one serious injury and eight minor ones to the 136 passengers and 16 crew.

As the jet passed over Siberia it encountered significantly reduced temperatures. The AAIB has determined that the fuel was at a temperature below 0°C for an unusually long duration. This is believed to have caused water in the fuel – which met all relevant international standards – to have frozen into crystals. These were able to form undetected as the aircraft cruised with a low fuel requirement, and it was only when extra fuel was pumped in from the tanks for the landing that the crystals became a problem.

The report says that the current explanation being offered for the accident is an “apparently hitherto unknown phenomenon” and warns that other combinations of aircraft models and engines may also be vulnerable. The 777 involved was powered by Rolls-Royce Trent 800s, like 222 of the 736 777s currently operating. Data from 141,000 other flights of such aircraft has not yielded any other set of circumstances similar to the one in the crash flight.

In light of these results, a worldwide alert has been issued to the 11 airlines that between them operate all the aircraft identical to the lost jet. Boeing have instructed airlines to vary altitude regularly when fuel is below 10°C and to run the engines at max power for ten seconds before attempting a landing if the fuel has been at such temperatures for over three hours. The extra power is intended to clear out any buildup of water. To prevent buildup of water during ground operation at freezing temperatures all fuel pumps should be run at full power for one minute.

Air New Zealand have already confirmed they will introduce the new measures, and United States authorities are expected to make them mandatory within days. The affected aircraft are operated by US carriers American Airlines and Delta Air Lines.

Retrieved from “https://en.wikinews.org/w/index.php?title=Interim_report_blames_ice_for_British_Airways_777_crash_in_London&oldid=4577470”

No Comments

Apollo Moon landings tapes reported missing">
Apollo Moon landings tapes reported missing

April 14th, 2021 | Uncategorized |
 Correction — August 13, 2006 

This article incorrectly reports that magnetic tapes of first moon landing and five other Apollo missions are missing. This is erroneous. Only the magnetic data tapes containing the recorded transmission from the moon’s surface are missing. The data on these tapes includes the original slow-scan TV signals, plus voice and telemetry data of the first Apollo landing. The originally broadcast conversion of the slow-scan recordings of the landing are preserved at the National Archives.

The article also reports the Goddard centre is scheduled to be closed in October. This is incorrect. Only the Data Evaluation Laboratory at the Goddard centre is planned for closure.

Wikinews apologises for any confusion caused by these errors

See Also: Erroneous tabloid report garners publicity for Moon landing tapes 

Saturday, August 5, 2006

The magnetic tapes of the first moon landing that was beamed to the world via three tracking stations and those of other 5 Apollo missions have gone missing. There will be a search for these tapes in the hope that they may be found before they deteriorate.

The missing tapes contain original recordings of five Apollo Moon Landings. Due to the format incompatibility between the Apollo recordings and the commercial TV, the public transmissions were projected onto a screen from which they were filmed using conventional TV cameras which substantially degraded the quality of the picture. These were digitized and can be seen in the Apollo Lunar Surface Journal website, where all the graphic documentation of the Apollo Moon landings is maintained.

The tapes were originally stored at Goddard Space Flight Center, but, without any explanation, were taken to the US National Archives in 1970. A few years after, in 1984, about 700 hundred boxes of tapes were returned to Goddard along with documents stating that the tapes were withdrawn.

“We have the documents to say they were withdrawn, but no one knows exactly where they went,” said John Sarkissian, a CSIRO scientist.

Mr. Sarkissian who has been working at the Parkes Observatory for more than decade, initiated a study about the participation of Australia in the Apollo Mission. He requested the tapes from NASA and they told him the tapes were missing.

“We are working on the assumption they still exist,” Mr Sarkissian said, “Your guess is a good as mine as to where they are.”

“People may have thought ‘we have tapes of the moon walk, we don’t need these’,”

“We want the public to see the way the moon walk was meant to be seen,”

Mr Sarkissian proposes that if the tapes are found that they be digitised and stored.

The Goddard centre, home to the only known piece of equipment that decodes the analogue tapes, is set to be closed in October raising fears that, even if they are found, it might not be possible to decode and copy them.

Only a few people saw the original high-quality broadcast. One of these people is David Cooke, a Parkes control room engineer in 1969.

“I can still see the screen,” Mr Cook, 74, said. “I was amazed, the quality was fairly good.”

Retrieved from “https://en.wikinews.org/w/index.php?title=Apollo_Moon_landings_tapes_reported_missing&oldid=4230750”

No Comments

Chinese Horoscope 2011 Know About Rat, Monkey, Ox, Snake .

April 13th, 2021 | Social Media Management |

Chinese horoscope 2011- Know About Rat, Monkey, Ox, Snake .

by

ganesha

Below are the

Chinese Zodiacs 2011

and

Chinese Horoscope 2011

compatibility readings.

Rat 2011

In you want to know about Rats horoscope then they are very cute and have a charm appeal. Rats are very creative, bold, and aggressive. Due to this quality they are known to be a good businessmen, accountants and bankers.

Ox – If you want to know about Ox horoscope then they are very hardworking, methodical and can handle difficulties. Ox by nature is very clever, creative and down to earth.

[youtube]http://www.youtube.com/watch?v=Ln3ZiOJaOFw[/youtube]

Tiger As the name tiger as they are, the year born to be a leader and have a quality to fight and compete. Their nature is taking risks and also likes to be associated with trouble. They can give their best in areas such as military leaders, firemen and teachers.

Rabbit If you want to know about Rabbit horoscope then they are very social and happy in coming year. Rabbits are such who can get people’s attention in meetings and events. They are known to be very sensitive to falsehood and can judge a person’s character very well.

Dragon 2011

– If you want to know about Dragon horoscope then they are very fashionable. Dragons can be great doctors, artists and architects.

Snake – If you want to know about Snake horoscope then they are very romantic, passionate and well informed individuals.

Horse 2011

– If you want to know about house horoscope then they are very popular and hard workers. These Types of people are independent and self-willed which makes them great financiers and politicians.

Ram – If you want to know about Ram horoscope then they are very elegant and charming but are also pessimists and hesitant. They are known to be very religious and talented.

Monkey 2011

– If you want to know about Monkey horoscope then they are very mischievous, clever and vain individuals. They are deep thinkers but can often be eccentric. Monkeys do well in the fields of trade, law and politics.

Rooster – If you want to know about Rooster horoscope then they are very industrious and diligent. They are good cooks, beauticians, and public relations agents. They are known to be very compatible with the Ox and the Snake.

Dog 2011

-If you want to know about Dog horoscope then they are very honest, loyal and with a sense of duty. Dogs make superior leaders such as priests and educators.

Pig – If you want to know about Pig horoscope then they are very honest, trustful and sincere. They are finishers and are keen in placing details.

Ganesha is a professional astrologer. He has written books on astrology ,

Boar 2011

and has taught the subject at all levels. In his work he uses both Eastern and Western techniques, and he has a particular

Astrology 2011

,

Calendar 2011

From Our Website http://www.newyearhoroscope.com.

Article Source:

ArticleRich.com

No Comments