Tuesday, June 11, 2013

US leaker faces hard choices while in hiding

Employees stand at the entrance of the Mira Hotel in Hong Kong Tuesday, June 11, 2013. Edward Snowden, an American defense contractor who said he leaked information on classified U.S. surveillance programs, checked out of the hotel on Monday and has not been seen in public in the territory. (AP Photo/Kin Cheung)

Employees stand at the entrance of the Mira Hotel in Hong Kong Tuesday, June 11, 2013. Edward Snowden, an American defense contractor who said he leaked information on classified U.S. surveillance programs, checked out of the hotel on Monday and has not been seen in public in the territory. (AP Photo/Kin Cheung)

A woman uses her smartphone at the waterfront in Hong Kong Tuesday, June 11, 2013. Edward Snowden, an American defense contractor who said he leaked information on classified U.S. surveillance programs, could benefit from a quirk in Hong Kong law that would ensure a lengthy battle to deport him. (AP Photo/Kin Cheung)

A man uses his smartphone at the waterfront in Hong Kong Tuesday, June 11, 2013. Edward Snowden, an American defense contractor who said he leaked information on classified U.S. surveillance programs, could benefit from a quirk in Hong Kong law that would ensure a lengthy battle to deport him. (AP Photo/Kin Cheung)

A woman walks past the Mira Hotel in Hong Kong Tuesday, June 11, 2013. Edward Snowden, an American defense contractor who said he leaked information on classified U.S. surveillance programs, checked out of the hotel on Monday and has not been seen in public in the territory. (AP Photo/Kin Cheung)

Journalists wait outside the Mira Hotel in Hong Kong Tuesday, June 11, 2013. Edward Snowden, an American defense contractor who said he leaked information on classified U.S. surveillance programs, checked out of the hotel on Monday and has not been seen in public in the territory. (AP Photo/Kin Cheung)

HONG KONG (AP) ? Edward Snowden, the former CIA employee who leaked top-secret documents about U.S. surveillance programs, has few options to stay one step ahead of the authorities while in apparent hiding.

One possibility is to seek asylum in a place that does not have an extradition pact with the United States -- there are few in Asia alone, a short flight away from Hong Kong where he was last spotted, but none where he is guaranteed refuge.

On Tuesday the 29-year-old Snowden's whereabouts were unknown, a day after he checked out of a trendy hotel in the Chinese territory of Hong Kong. But large photos of his face were splashed on most Hong Kong newspapers with headlines such as "Deep Throat Hides in HK," and "World's Most Wanted Man Breaks Cover in Hong Kong."

The coverage is likely to increase the chances of him being recognized although he could still blend with the city's tens of thousands of expatriates from the United States, Britain, Australia and Europe.

If and when the Justice Department charges him ? and it's not certain when that will be ? its next step will likely be to ask the International Criminal Police Organization, or Interpol, for a provisional request to arrest him pending extradition to the United States.

Assuming that Snowden is still in Hong Kong, the judicial proceedings for an extradition request could take a year, and once completed it would be up to Hong Kong's leader, known as the chief executive, to decide on handing over Snowden, said Michael Blanchflower, a Hong Kong lawyer with three decades of experience in extradition cases.

"Ultimately it is his decision," he said.

But even if the chief executive allows the extradition, the fugitive can request a judicial review and those decisions could be appealed up through three court levels, Blanchflower said.

Although a semi-autonomous part of China, the former British colony has an independent justice system based on the British legal structure.

One option for Snowden would be to claim he is the object of political persecution, and fight the issue in the courts to avoid extradition. He could argue that he would be subject to cruel and humiliating treatment in the United States. Hong Kong changed its regulations six months ago to require that a court consider cruel and humiliating treatment and not simply torture when considering extradition requests.

It's up to "the Chief Executive to determine whether the offence is one that's of a political character, in which case the extradition is blocked," said Hong Kong-based lawyer, Tim Parker.

However, the strategy carries considerable risk because the U.S. could simply provide diplomatic assurances that he would not be subject to cruel or humiliating treatment.

"At that point it would be difficult for Hong Kong to resist deporting him," said Patricia Ho, a Hong Kong lawyer who specializes in asylum and refugee claims.

But as things stand now, there is nothing to prevent Snowden from traveling to a destination of his choice -- to one of the handful of nearby jurisdictions or countries that do not have extradition treaties with the United States.

One of the Asian countries without an American treaty is China, though there is no guarantee Beijing would want to risk a confrontation with the United States by taking Snowden in, even if gained a windfall of sensitive American intelligence information in the process. Snowden himself has given no indication that he prepared to cooperate with any foreign intelligence service, including China's.

China's state media has confined its coverage of the Snowden affair to factual reports, and on online social media, China's relatively unfettered venue for public discourse, comments have been largely muted.

"People in China are used to not having security and privacy on the internet, so this does not come as a big surprise," Peking University journalism professor Hu Yong said in an interview. Official media, Hu said, would "try not to focus too much on how wrong the practice is, or whether the leaker is right or wrong. They will use the news to highlight that China is not the only country with such practices."

Another Asian flight possibility for Snowden is the self-governing island of Taiwan, which split from China in 1949 after a protracted civil war, and since 1979, has not had formal diplomatic relations with the U.S.

In lieu of a formal extradition treaty, American extraction requests to Taiwan are examined on a case by case basis.

An official at the de facto U.S. Embassy in Taipei ? the American Institute in Taiwan ? said Taiwan has generally been cooperative on the extradition issue.

"Taipei has so far been pretty good on responding to our requests," the official said, speaking on condition of anonymity because of the sensitivity of the issue.

Also, any attempt by Snowden to come to Taiwan could prove extremely embarrassing to the government of Ma Ying-jeou, which while doing its best to improve relations with China, also seeks to maintain close ties with the United States, its major security backer. An official at the Justice Ministry said Tuesday there were no indications at all that Snowden would make any attempt to land on the island.

Aside from numerous flights from Hong Kong's busy international airport, Snowden could take an hour-long high speed ferry ride to Macau, also a semiautonomous region of China. From Macau he could hop over to Guangdong province in mainland China.

Beyond Taiwan and China, Vietnam, Laos, Cambodia and North Korea are also theoretical destinations for Snowden, because they lack extradition treaties with the U.S. But the communist or authoritarian systems they share make them unlikely destinations for a man who has gone to considerable lengths to portray his decision to reveal National Security Agency surveillance programs as an act of conscience.

Outside of Asia, Snowden might also consider seeking asylum in countries like Iceland and Russia. According to the Kommersant Daily, Moscow has said it might provide asylum. But Russia is also an authoritarian nation, so there is no guarantee that Snowden would accept any offer that Moscow rendered.

__

Enav reported from Taipei, Taiwan. Chris Bodeen in Hong Kong and AP video-journalist Isolda Morillo in Beijing contributed to this report.

Associated Press

Source: http://hosted2.ap.org/APDEFAULT/cae69a7523db45408eeb2b3a98c0c9c5/Article_2013-06-11-Phone%20Records-Snowden's%20Choices/id-2b07d85463b94051a3ad4e2be340e1c9

autism speaks ubaldo jimenez ncaa final country music awards autism awareness angelman syndrome total recall

Monday, June 10, 2013

Liberace's ex-lover: He took advantage of me

Celebs

1 hour ago

In 1988, Scott Thorson wrote a book detailing the good times, bad times and undeniably bizarre times he shared with legendary entertainer Liberace over the course of their romance. This year, that story moved to the small screen in HBO's "Behind the Candelabra."

The movie highlighted everything, including the couple's initial attraction, their shared plastic surgeries, Thorson's decent into drug abuse, and the messy, lawsuit-filled end of it all. And according to Thorson, the directors, producers and stars got it right.

"I think they were right on target," he said during a Monday morning appearance on TODAY. "I'm just delighted; I'm overwhelmed."

Thorson is also "thrilled to death" about the success of "Candelabra," but he doesn't want to gloss over the romance at the center of the film. After all, he claims he was just 16 years old when he got involved with the pianist, who was 40 years his senior.

"Well, I think back ? I was so young at the time," he recalled. "I don't think it would go over too well today. (Liberace) would possibly go to jail for something like that."

When asked if he thought the man once known as Mr. Showmanship took advantage of him back then, Thorson agreed, crediting the relationship as the starting point of his problems with addiction.

"I don't think anybody in life sets out to be an addict," he said.

Still, despite it all, Thorson doesn't have any regrets about his time with Liberace.

"I mean, it's been a marvelous life, don?t get me wrong," he added. "I loved Liberace, and he was just a great guy."

Source: http://www.today.com/entertainment/liberaces-former-lover-he-took-advantage-me-6C10262980

my bloody valentine Super Bowl Winners what time does the superbowl start Kaepernick Tattoos superbowl time what time is the super bowl world war z

Philadelphia excavator operator facing charges

Sorry, Readability was unable to parse this page for content.

Source: http://feeds.nbcnews.com/c/35002/f/653381/s/2d0ee0bc/l/0Lvideo0Bmsnbc0Bmsn0N0Cid0C52151976/story01.htm

acm passover recipes 2012 kids choice awards kansas ohio state wrestlemania results womens final four josh hutcherson

Stunning Behind-the-Scenes Photos Show Iconic Movies in a New Light

Stunning Behind-the-Scenes Photos Show Iconic Movies in a New Light


We love the magic of the movies, that trickery that lets us believe in beautiful robots, time-traveling scientists, wolf men, and flying superheroes. But sometimes it's fun to peek behind the curtain, and see the secrets and candid faces behind our favorite films.

Read more...

    


Source: http://feeds.gawker.com/~r/gizmodo/full/~3/XTqZZFnNB80/stunning-behind-the-scenes-photos-show-iconic-movies-in-512190237

kenny powers carl hagelin triple play james neal virginia tech emancipation proclamation april 16

Sunday, June 9, 2013

'GoT' by the book: Could changes impact finale?

TV

7 hours ago

Image: Robb and Talisa

HBO

Hey! Jeyne -- errr, Talisa -- wasn't supposed to be at the Red Wedding!

If you're still reeling from the "Game of Thrones" Red Wedding, steel yourself: One episode remains in the HBO fantasy's third season, and the finale could deal even more devastating blows to our already fragile psyches.

But even though the series is adapted from George R.R. Martin's "A Song of Ice and Fire" fantasy novels, the show runners are deviating enough from his original story and timelines to keep even devoted readers guessing.

Here's a rundown of the major differences this season -- and what they could mean for Sunday's finale, "Mhysa." (More on the title's significance below.)

Baby-mama drama: The most gruesome, shocking scene in the wedding massacre -- the frenzied stabbing in the gut of Robb's pregnant queen -- never happened in "A Storm of Swords." In fact, "Talisa" (she was Jeyne Westerling in the books, with a different history altogether), wasn't even in attendance. Other than heightening the scene's drama and heartbreak, Talisa's murder probably won't change the story line that much, but it will definitely intensify the backlash and the Stark supporters' thirst for revenge.

Bloody face: What the writers giveth, they taketh away. While Talisa's gut-wrenching (sorry) death scene was made out of whole cloth (or, if you will, chain mail), "The Rains of Castamere" spared us from the madness of Catelyn. In fact, she went so bonkers after her eldest son's murder that she gouges her own face. To quote author George R.R. Martin, "tearing off strips of flesh, leaving deep furrows that ran red with blood." (This is a perplexing omission, considering what is to come.)

Slings and arrows: Joffrey is a monstrous, vicious psychopath and sadist, but in the books he never practiced his toy crossbow on prostitutes. This kid really needs a time out, and Tywin might give him one in their finale showdown.

Spirited away: Melisandre's kidnapping of Gendry never happened in the books. Her motives at this point are unclear, but we wager they have less to do with his blacksmithing skills than the fact that he's Robert Baratheon's bastard son -- and living proof for Stannis that Joffrey and his sibs aren't legitimate heirs to the Iron Throne. (On account of Uncle Jaime being their dad and all.) Melisandre's face time with Arya Stark never happened on the page either, but it's unlikely their meeting will be addressed until season four.

Run like the (Grey) Wind: During the Red Wedding, Robb's direwolf was murdered in captivity while Arya looked on. In the books, she never got that close, and Grey Wind was released from his stable -- inflicting some major damage before he was shot down. Maybe HBO didn't have any room left in the CGI budget for the direwolf's heroism? Or could this omission indicate their choice not to depict the Freys' horrifying "postmortem" of the King in the North? (It could still happen in the finale, so be warned: It's unspeakably gruesome.)

Image: Theon

HBO

Poor Theon's getting it much worse on the show than in the books.

Torture chamber: Theon's tiresome, gratuitous "Hostel"-style torture scenes warranted only a very peripheral mention -- sans gruesome details -- in the third book. In fact, the show really steps on the gas when compared to the former Winterfell hostage's story in "A Song of Ice and Fire." The tale of the torturer's identity, and the new one Martin creates for Theon, isn't told until the fifth book ("A Dance With Dragons"), but considering how much airtime they devoted this season, it's possible it will be bumped up all the way to Sunday's finale.

You know nothing: Jon Snow is virtually unscathed (besides a few eagle scratches) when he abandons Ygritte in episode nine. Her reaction in "Swords" is more befitting of a wildling than her struck-dumb TV counterpart: She shoots him in the leg with an arrow as he flees. From the preview we know that Ygritte returns in the finale -- but will she stick around for season four after his betrayal?

Storming the city: While the writers dialed up the graphic horror of the Red Wedding and Theon's torture, they showed some restraint when Khaleesi's men stole into Yunkai. In the book series, they gain entry via the town's sewers. That's some real devotion to their queen!

Image: Daenerys Targaryen

HBO

All hail the Mother of Dragons!

Mother tongue: Now back to the finale's title. "Mhysa" presumably refers to Daenerys' successful taking of Yunkai, a Ghiscari slaver city-state. When the city's slaves shout "Mhysa" to the Mother of Dragons in "A Storm of Swords," her translator Missandei explains, "It is Ghiscari, the old pure tongue. It means 'Mother.' "

Could it also refer to Catelyn Stark, Melisandre or even Talisa? We'll find out Sunday -- or next season!

Source: http://www.today.com/entertainment/throwing-book-game-thrones-could-tv-changes-impact-finale-6C10245219

us map Electoral Map concede Obama Acceptance Speech Prop 30 Election 2012 Michigan Election Results

First Cut Pro Just Made Post-Production Collaborative Video Editing Much Less Painful

77oR9qLAknBpfMgl5emeo297m6c4lQy6kfopwukP9gokbhTWW81m_4cwkBuJO1qoqcycNnnhp7jYQdLTiGf1hsctv1hq-j9AwtONvhM7-inPJyME2QM-34oQDjEEditing video is tedious enough on its own, but it becomes a whole new world of pain when producers, editors, audio guys, and others are trying to collaborate on a single project. That's where First Cut Pro (not to be confused with Final Cut Pro) comes in. The software comes out of Austin, where the company won our TC Meetup + Pitch-off Competition, meaning that the First Cut Pro guys will be ready to roll at TC Disrupt SF in September.

Source: http://feedproxy.google.com/~r/Techcrunch/~3/HDG3Sz6zbMs/

john tortorella the voice miranda lambert Canelo Alvarez red wings luke bryan michele bachmann

Autopsy set for body believed to be Iowa girl

BOONE, Iowa (AP) ? Authorities planned to conduct an autopsy Saturday on a body found in a river that is believed to be that of a 15-year-old girl who was abducted more than two weeks ago.

Investigators are confident that the body a fisherman found Friday night in the Des Moines River near Boone is that of Kathlynn Shepard, who was abducted in Dayton, about 20 miles north of Boone, on May 20 along with a 12-year-old girl who later escaped and called 911.

The clothes on the body matched what Kathlynn was wearing the day she was taken, and authorities also found zip ties that matched those used to restrain the younger girl who escaped.

Gerard Meyers, assistant director of field operators of the Iowa Division of Criminal Investigation, said the body was concealed by debris when the fisherman found it. It was recovered by Boone County sheriff's deputies.

"We're fairly confident the unfortunate circumstance this evening was the recovery of Kathlynn," Meyers said at a news conference just after midnight in Boone.

Authorities believe Michael Klunder, a registered sex offender who has since killed himself, approached the girls after they got off their school bus and asked whether they wanted to earn money mowing lawns. They say Klunder offered to drive them to ask their parents for permission, but he instead took them several miles away to the hog confinement facility where he worked.

Klunder bound the girls' hands with zip ties in an office there, but when he took Kathlynn to another part of the property, the younger girl managed to slip her ties and flee through the woods, authorities allege. She eventually found some farmers and called 911.

Authorities found Klunder dead hours later at another rural property. They say the 42-year-old hanged himself.

Hundreds of officers and volunteers had searched for Kathlynn, but hopes of finding her alive were dampened when testing confirmed that blood found on Klunder's truck and at the hog building was Kathlynn's.

"We were robbed of some innocence in this whole thing," said Webster County Sheriff James Stubbs. "We'll never quite be the same. Hopefully time will heal some of those wounds, but the awareness is a lot higher than it was before."

Klunder was released from prison in 2011 after serving 20 years for convictions in two separate kidnappings in Iowa that occurred on back-to-back days in December 1991.

In the first, police said he lured a woman on a highway near Mason City out of her vehicle by claiming she was missing a taillight, and then forced her into his car and tried to assault her. In the second, he snatched two 3-year-old toddlers from a Charles City apartment complex, put them in a trunk and left them 50 miles away at a secluded garbage bin, where they were found alive hours later.

Police are also looking into whether Klunder may have been responsible for the kidnapping and slaying of two young cousins who vanished while riding bikes in Evansdale, about 90 miles from Dayton. The bodies of the girls, who were 10 and 8 years old when they vanished, were found in December in a wooded area in Bremer County, where Klunder once lived in a home for emotionally troubled youth.

The cousins were from Black Hawk County, where sheriff's office investigators are still tracking the actions and whereabouts of Klunder around the time that Lyric Cook and Elizabeth Collins went missing.

Authorities note that Klunder isn't their sole focus and they continue to follow up on other leads.

Source: http://news.yahoo.com/autopsy-set-body-believed-iowa-girl-135949681.html

Xbox reveal college board Skagit River Bridge Call Of Duty Ghosts alice eve kevin durant tumblr

Saturday, June 8, 2013

Denials in surveillance program require decoding

A man walks past a Google sign in Mountain View, Calif., Friday, June 7, 2013. Google CEO Larry Page is denying reports linking the Internet search company to a secret government program that has provided the National Security Agency access to email and other personal information transmitted on various online services. (AP Photo/Jeff Chiu)

A man walks past a Google sign in Mountain View, Calif., Friday, June 7, 2013. Google CEO Larry Page is denying reports linking the Internet search company to a secret government program that has provided the National Security Agency access to email and other personal information transmitted on various online services. (AP Photo/Jeff Chiu)

Pedestrians pass the Apple store location on fifth avenue Thursday, June 6, 2013, in New York. A leaked document has laid bare the scope of the government's surveillance of Americans' phone records ? hundreds of millions of calls ? in the first hard evidence of a massive data collection program aimed at combating terrorism under powers granted by Congress after the 9/11 attacks. In statements, Apple, Facebook, Google, Microsoft and Yahoo said they only provide the government with user data required under the law. (AP Photo/Frank Franklin II)

(AP) ? Google CEO Larry Page and Facebook chief executive Mark Zuckerberg are denying reports that depict two of the Internet's most influential companies as willing participants in a secret government program that gives the National Security Agency unfettered access to email and other personal information transmitted on various online services.

The rebuttals issued Friday in blog posts expand upon earlier statements that the companies issued in an attempt to distance themselves from a government surveillance program that is raising questions. At issue is whether the NSA has constructed a direct pipeline into the computers that run some of the world's most widely used online services.

Each of the statements issued by Google Inc., Facebook Inc. and the five other companies linked to the program has been carefully worded in ways that doesn't rule out the possibility that the NSA has been gathering online communications as part of its efforts to uncover terrorist plots and other threats to U.S. national security.

"I think a lot of people are spending a lot of time right now trying to parse those denials," says Lee Tien, a senior staff attorney at the Electronic Frontier Foundation, a digital rights group. "The top level point is simply: it's pretty hard to know what those denials mean."

Google and Facebook were tied to a clandestine snooping program code-named PRISM in reports published late Thursday by The Washington Post and The Guardian, a British newspaper. James Clapper, the director of national intelligence for the Obama administration, subsequently confirmed PRISM had been approved by a judge and is being conducted in accordance with U.S. law.

But Clapper didn't identify what companies fall under PRISM's broad authority, leaving the reports by the Post and Guardian as the only windows into the spying program. The newspapers based their reports on confidential slides and other documents about PRISM.

Besides Google and Facebook, those documents cited Microsoft Corp., Apple Inc., Yahoo Inc., AOL Inc. and Paltalk as the other companies immersed in PRISM. The NSA program also is getting data from Google's YouTube video service and Microsoft's Skype chat service, according to the PRISM documents posted on the Post's website.

All of the companies have issued statements making it clear that they aren't voluntarily handing over user data. They also are emphatically rejecting newspaper reports indicating that PRISM has opened a door for the NSA to tap directly on the companies' data centers whenever the government pleases.

"Press reports that suggest that Google is providing open-ended access to our users' data are false, period," Page asserts in a blog post co-written with Google's top lawyer, David Drummond.

In his post, Zuckerberg lambasts the media accounts as "outrageous."

All the companies but Microsoft and Yahoo said they had never heard of PRISM before the name was revealed Thursday.

All of the statements could be technically true. At the same time, they could mean the companies have been turning over user data when served a legally binding order issued under a program that they didn't know had a code name until they read about it like the rest of the world.

It's all part of a linguistic tango that's often performed when the cover is blown on a top-secret operation, Tien says. "The person could say 'That story is not true' and then say 'We have never done X,' pointing to the 5 percent that was in fact, inaccurate," he says. "A company could say "'We've never heard of the PRISM program.' Well, maybe the government didn't call it that. Or the company could say "'We don't allow backdoor access!' Well, maybe they allow front door access."

The companies tied to PRISM also are limited by law in how much they can say. They are prohibited from disclosing their compliance with orders issued under the Foreign Intelligence Surveillance Act of 1978. That law hatched the Foreign Intelligence Surveillance Court, whose activity is considered to be classified.

Microsoft began turning over data in 2007 on the sixth anniversary of the 9/11 terrorist attacks, according to the PRISM slides obtained by the Post. The documents list the following start dates for data collection at the other companies and services: Yahoo, March 2008; Google, January 2009; Facebook, June 2009; Paltalk, December 2009; YouTube, September 2010; Skype, February 2011; AOL, March 2011; Apple, October 2012.

In their posts, both Page and Zuckerberg seem to be telegraphing to the world that Google and Facebook are doing their best to limit the amount of user data that's being handed over to the U.S. government.

To do so, they both cite disclosures earlier this week that Verizon Communications has been providing the NSA with portions of the calling records for all its U.S. customers since late April. The disclosures being made under court order cover an estimated 3 billion calls per day.

"We were very surprised to learn that such broad orders exist," Page writes in his post. "Any suggestion that Google is disclosing information about our users' Internet activity on such a scale is completely false."

Zuckerberg also points out that Facebook has never received a government order covering as much user data as the one that Verizon received. "If we did, we would fight it aggressively," he says in the post.

Both Page and Zuckerberg conclude their posts by imploring the government to be more forthcoming about the steps that it is taking to protect the public's safety.

"The level of secrecy around the current legal procedures undermines the freedoms we all cherish," Page writes.

Google is no stranger to defying the federal government's requests. The company recently received a setback in its challenge of the FBI's warrantless demands for customer data. In a ruling written May 20, U.S. District Court Judge Susan Illston rejected the company's argument that the government's practice of issuing so-called national security letters to telecommunication companies, Internet service providers and banks was unconstitutional and unnecessary.

Illston ordered Google to comply with the FBI's demands. But she put her ruling on hold until the 9th U.S. Circuit Court of Appeals can decide the matter. Until then, Google must comply with the letters unless it shows the FBI didn't follow proper procedures in making its demands for customer data in the 19 letters Google is challenging, she said.

___

AP Technology Writer Peter Svensson in New York contributed to this story.

___

Online:

Larry Page's blog post: http://googleblog.blogspot.com/2013/06/what.html

Mark Zuckerberg's Facebook post: https://www.facebook.com/zuck/posts/10100828955847631

PRISM program slides: http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/

Associated Press

Source: http://hosted2.ap.org/APDEFAULT/f70471f764144b2fab526d39972d37b3/Article_2013-06-07-NSA-Phone%20Records-Google/id-98948abd348d40aba30b1de1e93d7b74

rex ryan Louisville football Fidelity Charlie Strong Calendar 2013 john boehner HGTV Dream Home 2013

Siri "Eyes Free" mode coming to 2014 BMWs

Siri "Eyes Free" mode coming to 2014 BMWs

BMW announced this week that 2014 models equipped with its iDrive 4.2 interface will include Siri Hands Free mode, making it possible to pair an iPhone with your car and use Siri without ever taking your hands off the wheel.

iDrive already includes voice commands, but by pressing and holding the steering wheel-mounted voice command button, you can use Siri instead.

Apple isn't the only one to receive iDrive integration, either - BMW notes that Samsung's SVoice control is also supported.

BMW also notes support in 2014 models for iPod Accessory Protocol (iAP). As a result, users won't need a USB connection to their iPhone or iPod to browse and select music using the BMW controller - it'll work over Bluetooth as well.

    


Source: http://feedproxy.google.com/~r/TheIphoneBlog/~3/mT2YCB2a69M/story01.htm

Sam Mikulak London 2012 diving Tim Berners-Lee Olympics 2012 Schedule Kenneth Branagh Lupe Ontiveros London 2012 China

Computex 2013: the best of Haswell

ASUS Transformer Book Trio

Intel used this year's Computex to officially debut Haswell-based Core processors, and it had no shortage of willing launch partners: seemingly everyone had at least one updated PC to reveal. The refinements to battery life and graphics also led to quite a few companies pushing the boundaries, whether it was in cutting-edge screens or exotic form factors. Quite frankly, there was a lot to cope with in several days -- enough so that we're putting the more important Haswell offerings in one convenient roundup. Read on for our look at the desktops, laptops and tablets that launched in sync with Taiwan's premier tech event.

Filed under: , , , , , ,

Comments

Source: http://www.engadget.com/2013/06/07/computex-2013-the-haswell-pc-roundup/?utm_medium=feed&utm_source=Feed_Classic&utm_campaign=Engadget

cbs sports ncaa tournament kids choice awards Miley Cyrus Twerk ncaa march madness cbs march madness bracket

Senate seat scramble is on in N.J.: how Christie, GOP may benefit from it

New Jersey Gov. Chris Christie named state?Attorney General Jeffrey Chiesa?as a place holder and set a special election to replace the late US Sen. Frank Lautenberg. In a heavily Democratic state, Newark Mayor Cory Booker is the one to watch.

By Brad Knickerbocker,?Staff writer / June 6, 2013

New Jersey Attorney General Jeffrey Chiesa listens Thursday, in Trenton, N.J., as Gov. Chris Christie announces that Chiesa will temporarily fill the US Senate seat that opened up this week after Frank Lautenberg's death.

Mel Evans/AP

Enlarge

The death of US Sen. Frank Lautenberg (D) and a special election called by Gov. Chris Christie (R) have set off a political scramble in New Jersey this week, as candidates to fill the seat of the veteran senator rush to meet a looming filing deadline.

Skip to next paragraph

' + google_ads[0].line2 + '
' + google_ads[0].line3 + '

'; } else if (google_ads.length > 1) { ad_unit += ''; } } document.getElementById("ad_unit").innerHTML += ad_unit; google_adnum += google_ads.length; return; } var google_adnum = 0; google_ad_client = "pub-6743622525202572"; google_ad_output = 'js'; google_max_num_ads = '1'; google_feedback = "on"; google_ad_type = "text"; // google_adtest = "on"; google_image_size = '230x105'; google_skip = '0'; // -->

The calendar illustrates the scramble: A candidate must declare his or her candidacy by next Monday, including handing in a petition with 1,000 signatures. There?s to be a primary election Aug. 14, followed by the special election Oct. 16. If whoever wins that election wants to run for a full term, he or she would have to run again next year.

Meanwhile, to appoint a place holder in the Senate seat, Christie on Thursday named state Attorney General Jeffrey Chiesa, who has never held elective office and who will not run for the seat.

There may have been some personal political method in Christie?s decision to hold an early primary and election to fill Lautenberg?s seat. Christie himself faces reelection in the regular general election this November, and having a strong Democrat for US Senate at the top of the ballot ? in a state where registered Democrats outnumber Republicans by 700,000 ? might hurt Christie and GOP candidates for other offices.

Among those strong Democrats is Newark Mayor Cory Booker, who had already been considering a run for the US Senate. Aides to Mr. Booker confirm that he?s gathering signatures ahead of Monday?s filing deadline. US Reps. Frank Pallone and Rush Holt are prominently mentioned as other Democrats who might enter the race.

The only declared Republican so far is Steve Lonegan, former mayor of Bogota, N.J. Mr. Lonegan, who ran unsuccessfully for governor in 2005 and 2009, has been a tea party favorite who now heads the New Jersey chapter of the conservative advocacy group Americans for Prosperity.

New Jersey hasn?t elected a Republican to the US Senate since 1972, and behind the scenes, candidates are declining to run, donors are wary, and operatives say the seat is out of reach, writes Robert Costa in the conservative National Review Online.

?He burned us,? a New Jersey Republican consultant told Mr. Costa. ?He could have appointed a senator to stay through 2014. Instead, he gave us a weird little primary during beach season.?

Holding the special US Senate election instead of waiting until the regular election three weeks later will cost New Jersey taxpayers an extra $24 million.

The added expense has caused some grumbling ? particularly among Democrats who note that that?s the same amount it would have cost to allow New Jersey voters to start voting 14 days early in regular elections. Christie vetoed that Democratic proposal, citing cost as one issue.

?I don?t know what the cost [of the special election] is and I quite frankly don?t care,? Christie said at a news conference Tuesday. ?I don?t think you can put a price tag on what it?s worth to have an elected person in the United States Senate.?

In his reelection race, Christie holds a wide edge over Democratic challenger Barbara Buono, a state senator.

?The issue here is that Chris Christie doesn?t want to win by 10 points,? Patrick Murray, director of the Monmouth University polling institute in?West Long Branch, N.J., told Bloomberg News. ?He wants to win by 25 points.?

Mr. Chiesa, a Republican, will become New Jersey?s junior US senator next Monday, holding the post until the winner of the special election Oct. 16 takes office. He has agreed not to run for the seat himself.

Chiesa owes much of his professional career to Christie ? first as a federal prosecutor under then-US Attorney Christie from 2002 to 2009, then as executive director of Christie?s transition team after the 2009 gubernatorial election, and then as the governor?s chief counsel and state attorney general.

"I've only had these chances because of the governor,? Chiesa has said. ?I don't kid myself."

Source: http://rss.csmonitor.com/~r/feeds/csm/~3/Hp889jisO_0/Senate-seat-scramble-is-on-in-N.J.-how-Christie-GOP-may-benefit-from-it

News nbc news msnbc reddit abc news Boston Police Scanner Jeff Bauman

Shocking Report: Gov't Also Tapping Servers of 9 Major Internet ...

The National Security Agency and FBI are interested in more than just your phone records ? they are also interested in your audio, video, photographs, emails, documents, and connection logs, according to a bombshell report from The Washington Post.

Although the massive Internet surveillance program, code-named ?PRISM,? reportedly began in 2007, we are only now learning about it because an anonymous intelligence officer apparently leaked the information to the press.

?Firsthand experience with these systems, and horror at their capabilities, is what drove a career intelligence officer to provide PowerPoint slides about PRISM and supporting materials,? the report notes, ?in order to expose what he believes to be a gross intrusion on privacy.?

?They quite literally can watch your ideas form as you type,? the officer said.

Report: Govt Also Tapping Servers of Top Internet Companies

PRISM collects data from nine tech companies. Here?s a slide from the leaked PowerPoint presentation. (WaPo)

But how, exactly, are the feds tapping directly into the central servers and getting their hands on online users? information? With the assistance of major technology companies, of course:

The technology companies, which participate knowingly in PRISM operations, include most of the dominant global players of Silicon Valley. They are listed on a roster that bears their logos in order of entry into the program: ?Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.?

For some of these companies, they had no choice but to comply with the feds.

?Formally, in exchange for immunity from lawsuits, companies like Yahoo and AOL are obliged accept a ?directive? from the attorney general and the director of national intelligence to open their servers to the FBI?s Data Intercept Technology Unit, which handles liaison to U.S. companies from the NSA,? the Post reports.

?In 2008, Congress gave the Justice Department authority ? for a secret order from the Foreign Surveillance Intelligence Court to compel a reluctant company ?to comply,?? it adds.

In short, the feds have strong-armed a few reluctant tech companies into playing along with the program.

?In practice, there is room for a company to maneuver, delay or resist. When a clandestine intelligence program meets a highly regulated industry,? the report continues, ?neither side wants to risk a public fight.?

?The engineering problems are so immense, in systems of such complexity and frequent change, that the FBI and NSA would be hard pressed to build in back doors without active help from each company.?

Microsoft became PRISM?s first corporate partner in 2007, according to the leaked 41-slide PowerPoint presentation, followed shortly by Yahoo, Google, and Facebook. Apple didn?t join until after the death of Steve Jobs, five years after the start of PRISM.

Unsurprisingly, spokesmen for the major tech companies deny any knowledge of PRISM.

Here?s what Google said:

Google cares deeply about the security of our users? data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ?back door? into our systems, but Google does not have a back door for the government to access private user data.

Meanwhile, a spokesman for Apple told The Guardian that he had? ?never heard? of PRISM.

An official statement released by Facebook claims the social networking sight has never given the feds ?direct? access to its servers (the word ?direct? may be key here).

Report: Govt Also Tapping Servers of Top Internet Companies

This slide shows the timeline of tech giants signing on with the PRISM surveillance program. (WaPo)

The program is so secretive that the members of Congress who do know about it are apparently unable comment on it due to their oaths of office.

Here?s how The Washington Post reports the story:

An internal presentation on the Silicon Valley operation, intended for senior analysts in the NSA?s Signals Intelligence Directorate, described the new tool as the most prolific contributor to the President?s Daily Brief, which cited PRISM data in 1,477 articles last year. According to the briefing slides, obtained by The Washington Post, ?NSA reporting increasingly relies on PRISM? as its leading source of raw material, accounting for nearly 1 in 7 intelligence reports.

That is a remarkable figure in an agency that measures annual intake in the trillions of communications. It is all the more striking because the NSA, whose lawful mission is foreign intelligence, is reaching deep inside the machinery of American companies that host hundreds of millions of American-held accounts on American soil.

Under President Obama, the program has allegedly enjoyed ?exponential growth? since its founding in 2007 when then-Senator Obama routinely criticized President George W. Bush?s surveillance programs.

?The PRISM program is not a dragnet, exactly. From inside a company?s data stream the NSA is capable of pulling out anything it likes, but under current rules the agency does not try to collect it all,? the report notes.

?Analysts who use the system from a Web portal at Fort Meade key in ?selectors,? or search terms, that are designed to produce at least 51 percent confidence in a target?s ?foreignness.??

?That is not a very stringent test. Training materials obtained by the Post instruct new analysts to submit accidentally collected U.S. content for a quarterly report, ?but it?s nothing to worry about,?? it adds.

Report: Govt Also Tapping Servers of Top Internet Companies

WaPo.

But here are some really frightening details:

Even when the system works just as advertised, with no American singled out for targeting, the NSA routinely collects a great deal of American content. That is described as ?incidental,? and it is inherent in contact chaining, one of the basic tools of the trade. To collect on a suspected spy or foreign terrorist means, at minimum, that everyone in the suspect?s inbox or outbox is swept in. Intelligence analysts are typically taught to chain through contacts two ?hops? out from their target, which increases ?incidental collection? exponentially.

Click here to read the full report and here to see portions of the leaked PowerPoint presentation.

?

Follow Becket Adams (@BecketAdams) on Twitter

Featured image screen grab. This post has been updated.

Source: http://www.theblaze.com/stories/2013/06/06/bombshell-report-govt-also-tapping-servers-of-top-internet-companies-to-collect-americans-emails-photos-messages/

sheree whitfield weather dallas pat summitt real housewives of atlanta colton bo ryan the last waltz

Friday, June 7, 2013

Sutherland to play Snake in 'Metal Gear Solid'

FILE - This undated file photo released by Konami shows a scene from "Metal Gear Solid 4". "Metal Gear Solid" creator Hideo Kojima says actor Kiefer Sutherland will play protagonist Snake in the next installment of the stealth video game series. The character has been portrayed by voice actor David Hayte since the first "Metal Gear Solid" game in 1998. (AP Photo/Konami)

FILE - This undated file photo released by Konami shows a scene from "Metal Gear Solid 4". "Metal Gear Solid" creator Hideo Kojima says actor Kiefer Sutherland will play protagonist Snake in the next installment of the stealth video game series. The character has been portrayed by voice actor David Hayte since the first "Metal Gear Solid" game in 1998. (AP Photo/Konami)

LOS ANGELES (AP) ? Kiefer Sutherland is slithering into a very different role.

"Metal Gear Solid" creator Hideo Kojima said Thursday the "24" star will play protagonist Snake in the next installment of the stealth video game series.

The character has been portrayed in the "Metal Gear Solid" games by voice actor David Hayte since the original was released in 1998.

Kojima said because "Metal Gear Solid V: The Phantom Pain" takes place in 1984, it required an actor who could convey the facial and vocal qualities of a 49-year-old version of the super-soldier.

"We're taking on some very heavy subjects, such as race and revenge," Kojima said Thursday in an online video streamed by "Metal Gear Solid" publisher Konami, ahead of next week's Electronic Entertainment Expo.

"I wanted Snake to have a more subdued performance, expressed through subtle facial movements and tone of voice rather than words," Kojima said.

___

Online:

http://www.metalgearsolid.com

___

Follow AP Entertainment Writer Derrik J. Lang on Twitter at http://www.twitter.com/derrikjlang .

Associated Press

Source: http://hosted2.ap.org/APDEFAULT/4e67281c3f754d0696fbfdee0f3f1469/Article_2013-06-06-US-Games-Kiefer-Sutherland/id-38f26b8cb8a54c9d8f1253d38866ca1d

dj am bully bohemian rhapsody bohemian rhapsody spike lee carson daly heejun han

Thursday, June 6, 2013

The Most Terrifying Cherry Blossom to Ever Take Flight

The Most Terrifying Cherry Blossom to Ever Take Flight

By 1945 Allied forces were knocking on Japan's front door. As the Empire's military grew increasingly desperate, it began to focus on eliminating the Allies' willingness to fight?by intentionally crashing manned aircraft in kamikaze attacks. And for pilots aboard one breed of these notorious flying coffin, the MXY-7 Navy Suicide Attacker Ohka, death wasn't the last resort, it was the only one.

Conceived by Ensign Mitsuo Ohta of the 405th Kokutai and developed at the University of Tokyo's Aeronautical Research Institute, the MXY-7 Navy Suicide Attacker Ohka ("Cherry Blossom") wasn't so much an airplane as 1,200 kg bomb with wings and a cockpit. These single-seat suicide machines measured 20 feet long with a nearly 17-foot wingspan and weighed just 4,700 pounds when loaded. They were constructed of wood over an aluminum frame. A trio of Type 4 Mark 1 Model 20 rocket motors, each blowing 587 pound-feet of thrust could speed a pilot to his demise at up to 576 mph but only for about 23 miles.

The Most Terrifying Cherry Blossom to Ever Take Flight

With such a short range, the Ohkas had to be ferried to their final destination underneath lumbering Mitsubishi G4M2e "Betty" Model 24J bombers. The pilot would ride along with the bomber crew to the drop sight, load into his Ohka, have the cockpit locked from the outside, and then release through the bomb bay. The missile would glide toward a US capital ship?carriers, destroyers?before igniting the solid-fuel rockets, dropping into a nearly 600 MPH dive, and aim for a hit. Faced with the prospect of an enemy willing to die so easily, the Allied forces would then lose their will to fight, and slow their ever-advancing march on the Japanese home islands. At least that's how it was supposed to work.

See, capital ships aren't just floating willy-nilly in the middle of the ocean, waiting to have someone sink it with an aeroplane. These are the Navy's most valuable and necessary warships and, as such, are surrounded by a perimeter of slightly-smaller, heavily-armed warships. Getting a slow-moving bomber within 23 miles of this Allied hornet's nest proved quite difficult.

The introduction of Cherry Blossoms in the Pacific theater in 1945 was met with minimal success. Their initial assault on Task Group 58.1 in March of that year saw Allied F-16s engage the fleet of Betty bombers more than 70 miles from their target?though that didn't stop the bombers from launching their explosive human cargo regardless. During the few short months the Ohkas saw action before the war ended that September, these manned missiles sank or damaged a total of seven US warships and not a single capital ship. Today, the pilots that gave their lives for their country, members of the Jinrai Butai - Thunder Gods Corps, are honored in memorials across Japan. [Wiki - Military Factory - i09 - illustration: Fiddlers Green]

Source: http://gizmodo.com/the-most-terrifying-cherry-blossom-to-ever-take-flight-510659917

bagpipes aspirin aspirin 21 jump street illinois primary results acapulco mexico hines ward

Following fierce opposition from Congress and the airline industry, the TSA has shelved plans to all

Following fierce opposition from Congress and the airline industry, the TSA has shelved plans to allow you to bring small knives and bats on to planes.

Source: http://gizmodo.com/following-fierce-opposition-from-congress-and-the-airli-511508927

jaleel white levi johnston 2013 srt viper scott walker recall fisker atlantic social darwinism wisconsin recall election

Fossil sheds light on early primates

Partial skeleton near root of monkey, ape and human line

By Bruce Bower

Web edition: June 5, 2013

Enlarge

The earliest known fossil primate, Archicebus achilles (depicted in illustration above), was probably a tiny, arboreal insectivore that was active during the day.

Credit: X. Ni/Institute of Vertebrate Paleontology and Paleoanthropology/Chinese Academy of Sciences

A palm-sized creature sporting a tail longer than its body has given scientists an unprecedented look at one of the earliest phases of primate evolution.

An international team led by paleontologist Xijun Ni of the Chinese Academy of Sciences in Beijing analyzed this animal?s 55-million-year-old remains, the oldest known primate skeleton. Discovered 10 years ago along an ancient lake bed in central China, the fossil comes from a previously unknown genus and species, Archicebus achilles, the scientists report June 6 in Nature.

Over the past decade, digital scanning of the find with X-rays enabled the scientists to assemble a 3-D reconstruction of the fragile skeleton.

Enlarge

The oldest known primate specimen, a 55-million-year-old partial skeleton of a 1-ounce creature (above), was analyzed using a digital 3-D reconstruction .

Credit: Paul Tafforeau/ESRF and X. Ni/Chinese Academy of Sciences

Archicebus was the earliest member of a group that eventually evolved into tarsiers, small primates that now live in Southeast Asia, Ni says. The skeleton includes some unexpected features, however, that look less like tarsiers and more like ancient anthropoids, the primate precursors of monkeys, apes and humans. These traits include small, forward-facing eyes and monkeylike feet.

?Archicebus marks the first time that we have a reasonably complete picture of a primate close to the evolutionary divergence of tarsiers and anthropoids,? Ni says. That split probably occurred between 60 million and 55 million years ago, he estimates.

Researchers suspect that primates first evolved sometime between 85 million and 65 million years ago, around the time of the dinosaurs? demise. Whatever the exact timing, the new Chinese find bolsters the idea that primates started out in Asia, Ni says.

Paleontologist Erik Seiffert of Stony Brook University in New York agrees that primates likely have Asian roots. But the skull and teeth of another creature from around 55 million years ago, Teilhardina (SN: 1/3/04, p. 4), display traits suggesting that it was the oldest relative of tarsiers, Seiffert holds. Whether Archicebus or Teilhardina prevails as the earliest tarsier ancestor, this line of research will help to clarify the timing of the evolutionary split that led to rise of monkeys, apes and ultimately people.

Ni?s team uncovered Archicebus by splitting apart two thin layers of rock encasing about half of a skeleton. Each layer contains bones as well as impressions of bones from the other side.

Weighing in at about 1 ounce, Archicebus was slightly smaller than the tiniest living primates, Madagascar?s pygmy mouse lemurs, the researchers report. Other early primates, including the common ancestor of tarsiers and anthropoids, must also have been minuscule, Ni says.

Given its small eyes, Archicebus was probably active during the day, unlike today?s big-eyed tarsiers and lemurs.

Source: http://www.sciencenews.org/view/generic/id/350841/title/Fossil_sheds_light_on_early_primates

Romina Puga Red Wedding The Fosters game of thrones michael douglas Tnt Nba.com

College Republicans: GOP turning off young voters

In the report, the young Republican activists acknowledge their party has suffered significant damage in recent years. A sampling of the critique on:

Gay marriage: ?On the ?open-minded? issue ? [w]e will face serious difficulty so long as the issue of gay marriage remains on the table.?

Hispanics: ?Latino voters ? tend to think the GOP couldn?t care less about them.?

Perception of the party?s economic stance: ?We?ve become the party that will pat you on your back when you make it, but won?t offer you a hand to help you get there.?

Source: http://talk.baltimoresun.com/showthread.php?331490-College-Republicans-GOP-turning-off-young-voters&goto=newpost

brandon marshall ryder cup Kate Middleton Bottomless the Pirate Bay Hotel Transylvania eagles nfl schedule 2012

Wednesday, June 5, 2013

Samsung consigue bloquear la venta de varios modelos de iPhone e iPad en EEUU

trial veredict

Cuando parec?a que la guerra de patentes entre Apple y Samsung se daba un respiro, llega un golpe duro para la empresa americana. Si bien ya ten?amos una primera sentencia sobre la copia de unos a otros donde Samsung result? la perdedora (en relaci?n con copias al dise?o y patentes de software) , hoy toca lo contrario.

En Samsung andan de celebraciones por la decisi?n de la Comisi?n de Comercio Internacional estadounidense que ha impuesto una sanci?n consistente en la prohibici?n a Apple de vender e importar a EEUU modelos de iPhone 4 y 3GS, as? como iPad 2 y 3 en sus versiones 3G de la operadora AT&T. Se trata esta vez de una decisi?n final.

Una patente sobre transmisi?n de datos 3G es la clave

Este veredicto final ha sorprendido al ser opuesto al inicial que dejaba libre a Apple. En la sentencia definitiva y que Apple tiene previsto recurrir, se indica que la compa??a americana ha infringido en estos modelos de AT&T varias patentes de Samsung, especialmente una relacionada con la transmisi?n de datos en redes 3G.

El siguiente paso ser? que la agencia americana de la orden a la Casa Blanca, que tiene 60 d?as para imponer un veto y que el bloqueo no llegue a producirse.

Samsung ya se ha congratulado de esta sentencia afirmando que esta decisi?n final de la ITC ?confirma el historial de Apple de aprovechar las innovaciones tecnol?gicas de Samsung?, mientras que Apple quita importancia a la misma ya que dice que no le afectar? especialmente a las ventas al no aplicarse a sus modelos l?deres de ventas actualmente.

Dicho eso, Apple insiste en que mientras con otras compa??as Samsung llega a acuerdos sensatos en precio por esas patentes, con ellos han decidido el enfrentamiento directo y tratar de bloquear la venta de los productos de Apple en EEUU, seg?n palabras de la compa??a a AllThingDigital.

Source: http://feeds.weblogssl.com/~r/xataka2/~3/j2FHiGphey8/samsung-consigue-bloquear-la-venta-de-varios-modelos-de-iphone-e-ipad-en-eeuu

world trade center kirk cousins ovechkin bks new dark knight rises trailer khloe and lamar oklahoma city thunder

Is sales training ethical? | LiveseySolar Practice Builders

?

Follow Heather Wagner on Twitter: www.twitter.com/heatherwag

"; var coords = [-5, -72]; // display fb-bubble FloatingPrompt.embed(this, html, undefined, 'top', {fp_intersects:1, timeout_remove:2000,ignore_arrow: true, width:236, add_xy:coords, class_name: 'clear-overlay'}); });

Source: http://www.huffingtonpost.com/heather-wagner/real-housewives-of-orange-county-recap-viva-mexico_b_3381937.html

Katherine Russell Tsarnaev Richie Havens Allan Arbus Jaguars new uniforms aapl jenelle evans jenelle evans