gle Alleged Human Smuggler Extradited to Face Charges in Washington, D.C. By www.justice.gov Published On :: Mon, 28 Apr 2014 15:50:14 EDT Habtom Merhay, a national of Eritrea and a citizen of the United Kingdom, made his initial appearance today in federal court to face human smuggling charges for his role in smuggling primarily Eritrean and Ethiopian undocumented migrants. Full Article OPA Press Releases
gle Texas Man Pleads Guilty to Conspiring to Smuggle and Traffic Counterfeit Viagra Tablets By www.justice.gov Published On :: Tue, 20 May 2014 18:36:07 EDT A Texas man pleaded guilty today to conspiring to smuggle and to traffic in counterfeit and misbranded pharmaceuticals, including Viagra tablets, from China. Full Article OPA Press Releases
gle Ringleader of International Rhino Smuggling Conspiracy Sentenced in New Jersey to 70 Months in Prison for Wildlife Trafficking Crimes By www.justice.gov Published On :: Wed, 28 May 2014 08:41:50 EDT Zhifei Li, the owner of an antique business in China, was sentenced today to serve 70 months in prison for heading an illegal wildlife smuggling conspiracy in which 30 rhinoceros horns and numerous objects made from rhino horn and elephant ivory worth more than $4.5 million were smuggled from the United States to China. Full Article OPA Press Releases
gle Lupin Pharma: Phase 3 Trial Of Single-Dose Solosec Met Primary Endpoint By www.rttnews.com Published On :: Mon, 04 May 2020 11:56:29 GMT Lupin Pharmaceuticals Inc. (LUPIN, 500257) on Monday announced positive top-line results from its pivotal Phase 3 clinical trial to assess the efficacy and safety of single-dose Solosec or secnidazole 2g oral granules in 147 female patients with trichomoniasis. Full Article
gle eSource Terminology Untangled By polarisconsultants.blogspot.com Published On :: Mon, 14 May 2018 16:31:00 +0000 True or False:(1) eSource in clinical trials means eliminating the possibility for transcription errors.(2) Data collected in Electronic Data Capture (EDC) systems is eSource.Strictly speaking, both statements are false. If that surprises you, it’s probably because many casual uses of the term “eSource” actually differ from the formal definition laid out by FDA. If the participants in any discussion share the same interpretation of “eSource”, or if it’s clear from context how “eSource” is being used, then no harm, no foul. (Contemporary translation: “Meh.”) BUT…and you know where we’re going with this…when a term can be interpreted in multiple ways, there’s always a possibility for miscommunication and cross talk.FDA Guidance on eSource in Clinical InvestigationsFDA defines eSource as *any* data initially recorded in electronic format. That’s a broad definition, one that includes: a) equipment-generated data, such as digital imaging and labs b) electronic Patient Reported Outcome (ePRO) transmissions c) data streams from mobile health devices, such as Apple ResearchKit d) data entered directly into an EDC, known as Direct-Data-Entry (DDE) solutions e) data entered into an Electronic Health Record (EHR) or electronic Medical Record (EMR) systemDiscussion of Direct-Data-Entry (DDE)DDE systems allow research staff members to use portable devices to enter study data directly into an EDC system. DDEs have been garnering a lot of industry attention of late, and a number of companies offer solutions that offer a DDE data flow. As independent 3rd party auditors, we don’t want to play favorites by mentioning specific systems as examples, but if your company sells or uses a DDE system that you want to highlight, feel free to add a comment below to give it a shout out.Discussion of EMR/EDC IntegrationNot long after finalizing its e-Source guidance, FDA hosted a webinar that encouraged companies to explore direct EMR/EDC integration. While a few industry players have taken up the effort, movement has been slow. One difficulty: generally EMRs are built with healthcare in mind, not clinical research. Secondly, with so many EMR and EDC vendors, ensuring that EMR data from one system is mapped to appropriate EDC fields in another system relies heavily on data standards that are still being defined and need to be implemented on both sides. Source Data Verification (SDV)If data is transmitted directly from the source system to an Electronic Data Collection (EDC) system, SDV is not required, since the source data isn’t being transcribed manually. (Note: other types of Source Data Review (SDR) activities are still necessary, even if SDV isn’t. SDR must be conducted to verify ALCOA-C data principles such as attribution, originality, accuracy, completeness, etc.) Direct transmission from source system to EDC system is the typical pathway for items (a) – (d) above, and so SDV is not required for these types of eSource.Common ConfusionsSDV. Unless there is EMR/EDC integration – Item (e) above – source data from an EMR system needs to be manually transcribed. This is what makes T/F question #1 false. Just because source data originates in an EMR, it does *not* suggest SDV checks are superfluous. You could argue, as many have, that SDV is not a high-value activity and uncovers only a small percent of data error. That argument may well influence how much SDV is conducted, but whenever data is transcribed from original source into an EDC system, SDV is a relevant discussion.EDC Data. It’s not unusual for someone to refer to data stored in EDCs as eSource. Data stored in EDCs are electronic, and may be source, but only if the EDC is the first place the data is recorded. This is what makes T/F question #2 false.In SummaryIf you’re ever in a discussion about eSource and things start going sideways, it may be time to haul out the formal definition of eSource -- in all its tedious detail -- to make sure everyone is using the term the same way. _____________________________________________________Image Credit: Paradox by Brett Jordan Full Article clinical research clinical trials Direct Data Entry EDC EMR/EDC eSource SDV
gle She Made Every Effort to Avoid COVID-19 While Pregnant. Not a Single Thing Went According to Plan. By tracking.feedpress.it Published On :: 2020-05-05T05:00:00-04:00 by Annie Waldman ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published. Last September, over pancakes at a diner in central Massachusetts, Molly Baldwin told her husband, Jonathan, they were going to have a baby. He cried into his coffee mug, elated and a little surprised. They had only been trying for about a week, and they had yearned for a summer baby, ideally in June, which would enable their parents to spend more time with their first grandchild. “We thought we had the best timing,” she said. But as the novel coronavirus began to spread through the country this year, Baldwin realized in early March that it was only a matter of time before the virus hit her town, Fitchburg, and the nursing home where she’s a social worker. Her patients would be among the most vulnerable: Some had battled addiction, many had experienced homelessness and most were elderly. Flu seasons were always hard on her patients, and she dreaded the havoc a more lethal disease would wreak. Baldwin also worried about her baby. She spent hours looking up the prenatal effects of COVID-19, and the lack of evidence-based research concerned her. She called her obstetrician, who cautioned that because of the unknowns, she should consider working from home to limit her exposure to the virus. So Baldwin made a plan for when COVID-19 arrived at her nursing home: She would swap shifts with a colleague to work fewer hours and request to work from home, as many of her duties are paperwork or computer-based. She would work from the comfort of her kitchen table. She would avoid catching the virus. She would keep visiting her doctor until it was time to deliver, her belly swelling with a baby girl she knew was healthy and safe. None of it, not a single thing, would go according to plan. Baldwin said her supervisor and the human resources representative from the facility verbally agreed in mid-March to let her work from home. (Baldwin spoke with ProPublica on the condition that her workplace not be named; ProPublica contacted her employers with questions for this story.) Then, on April 16, one of the residents at her facility tested positive for the virus. Baldwin sought testing at a walk-in clinic, and the results came back negative. But when she called her obstetrician’s office, she got a warning: If she continued to work at the facility, potentially exposing herself to the virus, they would not allow her to enter their office for prenatal appointments unless she could prove with a test, before each visit, that she was negative for COVID-19. She understood their caution; her job was beginning to feel at odds with her pregnancy. It was time for her work-from-home plan to go into action. She called her employer and asked to start the accommodations she had requested the month before. But they told her that now the plan would not be feasible, she said. Other pregnant employees were continuing to work at the facilities, and she would have to as well, she said she was told. “The services provided at a nursing home do not typically allow for remote working,” a company spokesperson told ProPublica. “However, we have made changes to accommodate our staff whenever possible, provided there is no impact on patient care.” After finding out her request to work from home would not be granted, Baldwin panicked. “I’m not even a mom yet,” she said. “This is my first baby, and I already feel like I’m doing everything wrong.” Baldwin is one of dozens of pregnant workers who ProPublica has heard from who are navigating the risks of COVID-19 while in the field of health care. “There are plenty of pregnant women across the country who are trying to figure out what to do to protect themselves, given the uncertainty,” said Emily Martin, vice president for education and workplace justice at the National Women’s Law Center. “If you feel like you can’t do your job because there aren’t certain accommodations and you feel like you’re at risk, it’s difficult to see where to go next.” About half of the states have laws that allow pregnant women to request reasonable accommodations, including Massachusetts, Martin said. According to the Massachusetts Pregnant Workers Fairness Act, signed into state law in July 2017, employers must grant reasonable accommodations to their pregnant employees that allow them to continue to do their job, “unless doing so would impose an ’undue hardship’ on the employer.” An employer also “cannot make an employee accept a particular accommodation if another reasonable accommodation would allow the employee to perform the essential functions of the job.” Both the Centers for Disease Control and Prevention and the American College of Obstetricians and Gynecologists have stated that based on the data available, pregnant women do not face a higher risk of infection or severe morbidity related to COVID-19. That said, both the CDC and ACOG have suggested that health care facilities may want to consider reducing the exposure of pregnant health care workers to patients with confirmed or suspected COVID-19, if staffing permits. “In the overwhelming majority of pregnancies, the person who is pregnant recovered well with mild illness,” said Dr. Neel Shah, an obstetrician and assistant professor at Harvard Medical School, echoing the current guidance. But, he cautioned, there is a lot we still don’t know about how the virus impacts bodies, let alone those that are pregnant. “We can’t say that it’s completely safe — we don’t know.” Baldwin and her husband went through their options. She couldn’t quit because they needed her paycheck. They had a mortgage, student loans and a new baby on the way. She also loved her job and cared deeply for her patients, whom she wanted to continue to serve. Her employer, trying to manage understaffing, had discouraged employees from taking time off, she said. She didn’t want to take any additional sick days, because she needed to save them for her maternity leave. They decided that she would have to return to work. Her employer told her to wear a mask and gloves, use hand sanitizer and remain in her small, boxy office, which has three desks for four people. Though she didn’t have contact with the residents, her office mates still did. Baldwin’s job began to feel at odds with her pregnancy. (Kayana Szymczak for ProPublica) Even though she was scared, she tried to stay optimistic. “I was grateful for what I had because I have friends that are out of work right now,” she said. But she remained perplexed about why her requests had been denied. “I was sitting in my office doing work that would have easily been done from a laptop on my kitchen table.” The company spokesperson did not respond to a question about whether it had originally given Baldwin verbal approval to work from home. When asked why she couldn’t have done the same work remotely, he said, “Based on your questions, our HR and Risk Management are anticipating action and would prefer to not comment at all.” The next day, the Massachusetts National Guard delivered testing kits to the nursing home, and every resident was checked for the virus. When the results came back, at least 22 residents and 20 other staff members tested positive. “We are conducting cleanings and infection control measures multiple times per day, with extra focus on high touch areas,” the company spokesperson said. “We screen and take the temperature of anyone entering our building, and we have increased monitoring of our residents.” Public data shows the facility has more than 30 cases among residents and staff, the maximum number that the state reports publicly. “I thought if I just keep working, stay in my office, use hand sanitizer, wear my mask, go home and shower right away, disinfect my clothes, then I will be fine, and I can keep my baby safe, and I can shed all this guilt,” she said. Then on April 24, two of her office mates texted to tell her they had the virus. And that morning, she’d felt a tickle in her throat. “I know I’m positive,” she thought to herself, as she left work midday and drove to a CVS drugstore testing site an hour away that was offering free rapid tests for front-line and health care workers. Hundreds of cars were already lined up. She waited alone in her Jeep Wrangler for three hours, wearing her mask as required, which muffled her nagging cough. She shifted around constantly, to keep blood from pooling in her swelling feet. At the front of the line, she received a 6-inch cotton swab, wedged it deep in her nasal cavity, and returned it to the technicians. They directed her into a side parking lot, and 30 minutes later, she got a phone call with her results. “We’re sorry to tell you that you’re positive,” the voice on the line told her. Baldwin’s mind stalled, engulfed in a wave of anxiety, which gave way to seething frustration. “This was so preventable,” she said. “Now here I am, 33 weeks pregnant and positive. My most important job is to keep the baby safe, and my actual job wasn’t making that happen.” When she called her co-workers and supervisor to tell them she tested positive, she said they were “all very caring and compassionate.” They told her to stay home for at least a week, or until her symptoms subsided. The Families First Coronavirus Response Act requires most employers to provide their workers with two weeks of paid leave if the employee is quarantined or experiencing COVID-19 symptoms. Baldwin said she would have to exhaust her sick days first; she’d been saving them for her maternity leave. Her husband, who works as a correctional officer at a county jail, was allowed to take 14 days of paid leave to tend to his wife, without using his own sick days. She could no longer go to her normal obstetrician for in-person appointments, and instead, she would have to rely on telemedicine. Her doctor connected her with an obstetrician specializing in COVID-19 cases, with whom she planned to meet this week. Last Saturday, Baldwin’s mother had planned to throw her daughter a baby shower. She had invited 50 of their closest friends to celebrate at a new restaurant and had ordered dozens of pink favors from Etsy. Because of the stay-at-home order, her shower morphed into a drive-by celebration, where her friends and family passed by her house, honking their horns and holding celebratory signs, balloons and streamers. They dropped gifts in front of her house, including first aid kits and a handsewn pink mask for an infant. Her symptoms have, so far, been relatively mild, similar to a normal flu: headaches, a stuffy nose, a sore throat and muscle pains. She’s spent most of the past week resting in bed and taking baths to soothe her body aches. While taking care of Baldwin, her husband has also contracted the virus and is experiencing severe body aches as well. In addition to her disappointment that the hypnobirthing and breastfeeding classes she had signed up for are canceled, her time in quarantine is now filled with anxious questions about how the disease may impact her baby. Will the stress of this experience damage her baby neurologically? Will her baby be born early? Will she have to deliver by cesarean section to relieve pressure on her body and lungs, like so many stories she had read? Will she have to be secluded from her baby for days or weeks after birth? And what if her own symptoms worsen? “This is our first baby, and it was so planned and wanted,” she said. “But had we known this awful thing would happen, would we have tried when we did?” Full Article
gle Despite sales bump, brands that are not preparing for stormy seas ahead could struggle, consultant says By www.nutraingredients-usa.com Published On :: Tue, 05 May 2020 13:22:00 +0100 The dietary supplement industry as a whole is enjoying booming sales as consumer stock up on products to support optimum health. But an industry strategist warns that that sales bump is likely to be ephemeral, and brands that are not strategizing vigorously now may be caught out in the near future. Full Article Markets
gle Google Says Most Of Its Employees Will Likely Work Remotely Through End of Year By www.npr.org Published On :: Fri, 08 May 2020 16:22:07 -0400 The tech giant announces it is extending its previous work-from-home plans for most of its staff and will begin reopening offices this summer. Full Article
gle Remembering a past global struggle in the midst of a present one By www.latimes.com Published On :: Fri, 8 May 2020 06:52:36 -0400 As nations across the globe try to fight a pandemic, many also stop to mark the close of another conflict: the end of World War II in Europe. Full Article
gle 'It's not what this town is about': Seal Beach's Main Street struggles to come back By www.latimes.com Published On :: Fri, 8 May 2020 19:48:21 -0400 It is an "eerie" day in Seal Beach as businesses struggle to come back and crowds stay away. Full Article
gle Birx to help lead remdesivir distribution effort as hospitals struggle to access drug By www.nbcnews.com Published On :: Fri, 08 May 2020 20:37:00 GMT Since the drug was granted emergency use authorization, doctors have been left with no clear path to get it. Full Article
gle Yokogawa Releases SU10 Single Cellome Unit for Use in Biological Research By www.yokogawa.com Published On :: 2020-03-18T11:00:00+09:00 Yokogawa Electric Corporation (TOKYO: 6841) announces that it has developed the SU10 Single Cellome Unit, a device that uses a nanopipette to inject substances such as genes and drugs and aspirate intracellular materials at target locations in individual cells. Full Article
gle Google introduced Fiber Phone with unlimited domestic calling By www.jagranjosh.com Published On :: 2016-03-31T11:40:00Z It is a home telephone service which gives users unlimited local and nationwide calling in the US. For international calls, users will get the same rates used as the Google Voice service. Full Article
gle Treatment of peyronie’s disease with combination of clostridium histolyticum collagenase and penile traction therapy: a prospective, multicenter, single-arm study By feeds.nature.com Published On :: 2020-05-04 Full Article
gle People Digest: OYO adds former Starbucks COO to board; Google Pay names Shikha Sharma as advisor By www.dealstreetasia.com Published On :: Mon, 04 May 2020 05:54:10 +0000 OYO has appointed former Starbucks Corporation chief operating officer Troy Alstead as an independent director. The post People Digest: OYO adds former Starbucks COO to board; Google Pay names Shikha Sharma as advisor appeared first on DealStreetAsia. Full Article Oyo Hotels & Homes (OYO) Shikha Sharma Troy Alstead
gle The role of single-cell mechanical behaviour and polarity in driving collective cell migration By feeds.nature.com Published On :: 2020-05-04 Full Article
gle Natural polyphenol assisted delivery of single-strand oligonucleotides by cationic polymers By feeds.nature.com Published On :: 2020-05-04 Full Article
gle Biomimetic niches reveal the minimal cues to trigger apical lumen formation in single hepatocytes By feeds.nature.com Published On :: 2020-04-27 Full Article
gle COVID-19 mental-health responses neglect social realities By feeds.nature.com Published On :: 2020-05-04 Full Article
gle Mapping the twist-angle disorder and Landau levels in magic-angle graphene By feeds.nature.com Published On :: 2020-05-06 Full Article
gle A metabolic labeling method detects m<sup>6</sup>A transcriptome-wide at single base resolution By feeds.nature.com Published On :: 2020-04-27 Full Article
gle Single-nucleus transcriptomics of the prefrontal cortex in major depressive disorder implicates oligodendrocyte precursor cells and excitatory neurons By feeds.nature.com Published On :: 2020-04-27 Full Article
gle Single cell and tissue-transcriptomic analysis of murine bladders reveals age- and TNFα-dependent but microbiota-independent tertiary lymphoid tissue formation By feeds.nature.com Published On :: 2020-05-04 Full Article
gle A single-centre investigator-blinded randomised parallel-group study protocol to investigate the influence of an acclimatisation appointment on children’s behaviour during N<sub>2</sub>O/O<sub>2</sub> sedation as measured by psycho By www.nature.com Published On :: 2020-03-17 Full Article
gle Single-cell RNA counting at allele and isoform resolution using Smart-seq3 By feeds.nature.com Published On :: 2020-05-04 Full Article
gle Simultaneous quantification of protein–DNA interactions and transcriptomes in single cells with scDam&T-seq By feeds.nature.com Published On :: 2020-04-29 Full Article
gle Differentiation of transplanted haematopoietic stem cells tracked by single-cell transcriptomic analysis By feeds.nature.com Published On :: 2020-05-04 Full Article
gle Publisher Correction: Optomechanical detection of vibration modes of a single bacterium By feeds.nature.com Published On :: 2020-04-29 Full Article
gle Impact of COVID-19 outbreak on spinal pathology: single center first impression By feeds.nature.com Published On :: 2020-05-05 Full Article
gle Single-cell RNA sequencing reveals the heterogeneity of liver-resident immune cells in human By feeds.nature.com Published On :: 2020-04-28 Full Article
gle Immune cell profiling of COVID-19 patients in the recovery stage by single-cell sequencing By feeds.nature.com Published On :: 2020-05-04 Full Article
gle Structure of the cytoplasmic ring of the <i>Xenopus laevis</i> nuclear pore complex by cryo-electron microscopy single particle analysis By feeds.nature.com Published On :: 2020-05-06 Full Article
gle Button blames tyre temperature for qualifying struggle By en.espnf1.com Published On :: Sat, 23 Oct 2010 07:34:21 GMT Jenson Button has blamed a lack of tyre temperature for his seventh place qualifying position for the Korean Grand Prix Full Article
gle The impossible (pipe) dream—single-payer health reform By webfeeds.brookings.edu Published On :: Tue, 26 Jan 2016 08:38:00 -0500 Led by presidential candidate Bernie Sanders, one-time supporters of ‘single-payer’ health reform are rekindling their romance with a health reform idea that was, is, and will remain a dream. Single-payer health reform is a dream because, as the old joke goes, ‘you can’t get there from here. Let’s be clear: opposing a proposal only because one believes it cannot be passed is usually a dodge.One should judge the merits. Strong leaders prove their skill by persuading people to embrace their visions. But single-payer is different. It is radical in a way that no legislation has ever been in the United States. Not so, you may be thinking. Remember such transformative laws as the Social Security Act, Medicare, the Homestead Act, and the Interstate Highway Act. And, yes, remember the Affordable Care Act. Those and many other inspired legislative acts seemed revolutionary enough at the time. But none really was. None overturned entrenched and valued contractual and legislative arrangements. None reshuffled trillions—or in less inflated days, billions—of dollars devoted to the same general purpose as the new legislation. All either extended services previously available to only a few, or created wholly new arrangements. To understand the difference between those past achievements and the idea of replacing current health insurance arrangements with a single-payer system, compare the Affordable Care Act with Sanders’ single-payer proposal. Criticized by some for alleged radicalism, the ACA is actually stunningly incremental. Most of the ACA’s expanded coverage comes through extension of Medicaid, an existing public program that serves more than 60 million people. The rest comes through purchase of private insurance in “exchanges,” which embody the conservative ideal of a market that promotes competition among private venders, or through regulations that extended the ability of adult offspring to remain covered under parental plans. The ACA minimally altered insurance coverage for the 170 million people covered through employment-based health insurance. The ACA added a few small benefits to Medicare but left it otherwise untouched. It left unaltered the tax breaks that support group insurance coverage for most working age Americans and their families. It also left alone the military health programs serving 14 million people. Private nonprofit and for-profit hospitals, other vendors, and privately employed professionals continue to deliver most care. In contrast, Senator Sanders’ plan, like the earlier proposal sponsored by Representative John Conyers (D-Michigan) which Sanders co-sponsored, would scrap all of those arrangements. Instead, people would simply go to the medical care provider of their choice and bills would be paid from a national trust fund. That sounds simple and attractive, but it raises vexatious questions. How much would it cost the federal government? Where would the money to cover the costs come from? What would happen to the $700 billion that employers now spend on health insurance? How would the $600 billion a year reductions in total health spending that Sanders says his plan would generate come from? What would happen to special facilities for veterans and families of members of the armed services? Sanders has answers for some of these questions, but not for others. Both the answers and non-answers show why single payer is unlike past major social legislation. The answer to the question of how much single payer would cost the federal government is simple: $4.1 trillion a year, or $1.4 trillion more than the federal government now spends on programs that the Sanders plan would replace. The money would come from new taxes. Half the added revenue would come from doubling the payroll tax that employers now pay for Social Security. This tax approximates what employers now collectively spend on health insurance for their employees...if they provide health insurance. But many don’t. Some employers would face large tax increases. Others would reap windfall gains. The cost question is particularly knotty, as Sanders assumes a 20 percent cut in spending averaged over ten years, even as roughly 30 million currently uninsured people would gain coverage. Those savings, even if actually realized, would start slowly, which means cuts of 30 percent or more by Year 10. Where would they come from? Savings from reduced red-tape associated with individual insurance would cover a small fraction of this target. The major source would have to be fewer services or reduced prices. Who would determine which of the services physicians regard as desirable -- and patients have come to expect -- are no longer ‘needed’? How would those be achieved without massive bankruptcies among hospitals, as columnist Ezra Klein has suggested, and would follow such spending cuts? What would be the reaction to the prospect of drastic cuts in salaries of health care personnel – would we have a shortage of doctors and nurses? Would patients tolerate a reduction in services? If people thought that services under the Sanders plan were inadequate, would they be allowed to ‘top up’ with private insurance? If so, what happens to simplicity? If not, why not? Let me be clear: we know that high quality health care can be delivered at much lower cost than is the U.S. norm. We know because other countries do it. In fact, some of them have plans not unlike the one Senator Sanders is proposing. We know that single-payer mechanisms work in some countries. But those systems evolved over decades, based on gradual and incremental change from what existed before. That is the way that public policy is made in democracies. Radical change may occur after a catastrophic economic collapse or a major war. But in normal times, democracies do not tolerate radical discontinuity. If you doubt me, consider the tumult precipitated by the really quite conservative Affordable Care Act. Editor's note: This piece originally appeared in Newsweek. Authors Henry J. Aaron Publication: Newsweek Image Source: © Jim Young / Reuters Full Article
gle The Metropolitan Transportation Authority is Not Alone in its Financial Struggles By webfeeds.brookings.edu Published On :: Fri, 24 Apr 2009 00:00:00 -0400 Even in comfortable times, the service cutbacks and fare increases being proposed by the Metropolitan Transportation Authority would have sparked outrage from New Yorkers. Coming in the depths of the most serious economic crisis since the Great Depression, things seem that much worse. Not that it's any consolation to frustrated New York transit riders and taxpayers, but you are not alone. Transit agencies like the MTA are reeling nationwide; all are suffering from factors at least some of which they really can't control without some legislative help.This is not to deny the pain that could occur unless the state comes up with a rescue plan. In its 2009 budget, the agency proposes painful service cutbacks and fare increases to help cover a projected deficit of around $1.5 billion. No fewer than 51 transit agencies around the country are in the same financial situation. For example, the Massachusetts Bay Transportation Authority that runs Boston's smaller transit system is chewing over major service cuts and fare increases if the state doesn't help cover its $160 million deficit.The fact that so many transit agencies are struggling may come as a surprise. After all, didn't Washington just pump a lot of money into infrastructure as part of the $787-billion American Recovery and Reinvestment Act? Wasn't public transit a big part of that law? Yes. The stimulus package provides $8.4 billion to be spent on transit this year. That's a helpful shot in the arm to metropolitan transit agencies that Washington ordinarily relegates to second-class status. And the MTA will receive the largest portion of this money: more than $1 billion. Even by today's standards, that's nothing to sneeze at.But how much will it really help? Federal rules in effect since 1998 stipulate that this money can be spent only on capital improvement projects and not to finance gaps in day-to-day operating expenses.Surely there is no transit service without capital - the buses, trains, tracks and other facilities that make the system run. However, operating costs - which are generally about twice as high as capital expenses for the largest transit agencies - cover the salaries of the workers who keep the system running, as well as the debt contracted to pay for capital projects. So as the federal government aims to put Americans back to work on shovel-ready, temporary construction jobs, transit agencies are looking at the likelihood of laying people off from stable, permanent positions.Why the disconnect?The response in Washington is predictably stubborn: Recovery money cannot be used for operating expenses because operating is not a federal role.You would think that the pressure of this policy would lead to transit agencies that are self-sufficient - where passenger fares pay the full costs of operating the system. But large metropolitan transit agencies generally "recover" only about one-third of their costs from subway riders and about one-quarter from bus passengers. The MTA has the highest cost-recovery ratio among all subway operators - its fares pay for two-thirds of operating costs. For large bus systems, the MTA's New York City Transit ranks second only to New Jersey's in terms of the share of operating costs paid for by riders. The Long Island Rail Road is the seventh among the 21 commuter rail systems in the country, recovering from fares close to half of its operating costs.So what should be done to close the MTA's budget gap?For one thing, lawmakers in Albany need to recognize that the state contributes a lower proportion of the MTA's budget from its general revenue than other states provide to their transit agencies from general revenue. In New York, about 4 percent of all the MTA operating costs are covered by the state budget; in other states, transit agencies are getting closer to 6 percent.Raising state general fund support to national levels would be a good place to start helping the MTA. Another idea is to get Washington to help. Not in doling out more money, but in stepping aside and empowering metropolitan agencies to spend their federal money in ways that best meet their own needs.Specifically, the federal rules could be changed to allow transit agencies to spend their transit capital stimulus dollars on operating expenses. Certainly, agencies have capital needs as well, but particularly in these stressful economic times they should have the short-term flexibility to use those federal dollars to meet their immediate problems.Over the long term, some form of federal competitive funding for operating assistance also might provide the right incentive - or reward - to states and localities to commit to funding transit. Based on their level of commitment, metropolitan agencies, localities and states that legislatively dedicate a stable stream of funds could potentially receive federal operating assistance, perhaps as a matching grant. The federal government would be helping those who help themselves. The New York metropolitan area cannot afford to have a transit system that is hampered from operating at its fullest and most efficient potential. An extensive transit network like the MTA provides important transportation alternatives to those who have options and basic mobility for those who don't. It can help mitigate regional air-quality problems by lowering overall automobile emissions and slowing the growth in traffic congestion. It also can provide economic benefits by creating development opportunities around transit stations and help enhance regional economic competitiveness as an important and attractive metropolitan amenity.Such a functioning network plays a fundamental role in attracting highly skilled labor and talent, which we know is so important in 21st century metropolitan America. Authors Emilia IstrateRobert Puentes Publication: Newsday Full Article
gle 2006 Brookings Blum Roundtable: The Tangled Web - The Poverty-Insecurity Nexus By webfeeds.brookings.edu Published On :: Wed, 02 Aug 2006 00:00:00 -0400 Event Information Register for the EventIn a world where borders matter less and where seemingly faraway threats can become immediate problems, the fight against poverty is no longer a matter of just doing the right thing – it is a matter of doing the smart thing to ensure security at home and abroad. As seen across the globe, by exhausting institutions, depleting resources, weakening leaders and crushing hope, extreme poverty fuels instability that often leads to armed conflict and can be a breeding ground for terrorists. The reverse is also true: insecurity stemming from conflict and demographic and environmental challenges makes it harder for leaders, institutions and other stakeholders to address poverty. Simply put, poverty is both a cause of insecurity and a product of it. To explore this tangled web, in August 2006 the Brookings Blum roundtable discussed the challenges and possible solutions with a diverse group of leaders, including policymakers, business executives and academics, and developed recommendations for change. 2006 Brookings Blum Roundtable: Related Materials Read the roundtable report - Ending Poverty, Promoting Peace: The Quest for Global Security » View related conference book » Download the participant list » (PDF) Download the scene setter » (PDF) 2006 Brookings Blum Roundtable Agenda: Global Poverty, Conflict and Insecurity Susan Rice, The Brookings Institution, "Global Poverty, Weak States and Insecurity" Edward Miguel, University of California, Berkeley, "Global Poverty, Conflict and Insecurity" Operating in Insecure Environments Jane Nelson, Harvard University, "Operating in Insecure Environments" Keynote Address: "Achieving Peace in an Inequitable World" James D. Wolfensohn, Chairman of Citigroup International Advisory Board and Former President of the World Bank The Role of Leadership in Overcoming Poverty & Security in Africa Chaired by: Mary Robinson, Realizing Rights: The Ethical Globalization Initiative Robert Rotberg, Harvard University, "The Role of Leadership in Overcoming Poverty & Insecurity in Africa" Leadership Presentations: Mohammed Ibrahim, Chairman, Celtel International John Kachamila, Former Minister, Mozambique Ketumile Masire, Former President of Botswana Resource and Environmental Insecurity Colin Kahl, University of Minnesota, "Demography, Environment and Civil Strife" Anthony Nyong, University of Jos, Nigeria, "Resource and Environmental Security" Keynote Address Kemal Dervis, Administrator, United Nations Development Programme Youth and Conflict Henrik Urdal, The International Peace Research Institute, "The Demographics of Political Violence: Youth Bulges, Insecurity and Conflict" Marc Sommers, Tufts University, "Embracing The Margins: Working with Youth Amidst War and Insecurity" Jane Nelson, Harvard University, "Operating in Insecure Environments: The Youth Demographic" Transformational Diplomacy and the Route to Security Jennifer Windsor, Freedom House, "Breaking the Poverty-Insecurity Nexus: Is Democracy the Answer?" Presentations: Philip Zelikow, United States Department of State Madeleine Albright, 64th Secretary of State Mary K. Bush, Chairman, HELP Commission Lael Brainard, The Global Economy and Development Program, The Brookings Institution Full Article
gle Incorporating continuing education into single-drug REMS: Exploring the challenges and opportunities By webfeeds.brookings.edu Published On :: Mon, 18 May 2015 09:00:00 -0400 Event Information May 18, 20159:00 AM - 4:15 PM EDTThe Brookings Institution1775 Massachusetts Ave., NWWashington, DC The Risk Evaluation and Mitigation Strategies (REMS) program has become an important tool of the U.S. Food and Drug Administration (FDA) in ensuring that the benefits of a given medical product outweigh the associated risks, and has enabled FDA to approve a number of products that might not otherwise have been made available for patient use. Since the implementation of the REMS program, however, concerns have been raised regarding its impact on patient access to products and the associated burden on providers and health care systems. In an effort to address these concerns—and as part of its commitments under the Prescription Drug User Fee Act reauthorization of 2012—FDA has undertaken efforts to standardize and improve the effectiveness of REMS, and to better integrate REMS programs into the health system. As part of this broader initiative, the Agency is currently assessing the feasibility of integrating accredited continuing education (CE) programs and activities into REMS programs that have been developed for a single drug. Under a cooperative agreement with the FDA, the Center for Health Policy held an expert workshop on May 18, titled “Incorporating Continuing Education into Single-Drug REMS: Exploring the Challenges and Opportunities”. This workshop provided an opportunity for pharmaceutical manufacturers, regulators, CE providers, accreditors, and other stakeholders to explore the ways that CE can be a valuable addition to the REMS toolkit, discuss potential barriers to the development and implementation of REMS-related CE for single products, and identify strategies for addressing those barriers. Event Materials Bio sheetREMS CE Meeting AgendaREMS_CE_Meeting_Discussion_Guide_FinalREMS CE Meeting Summary Full Article
gle Incorporating continuing education into single-drug REMS: Exploring the challenges and opportunities By webfeeds.brookings.edu Published On :: Wed, 20 May 2015 00:00:00 -0400 The Risk Evaluation and Mitigation Strategies (REMS) program has become an important tool of the U.S. Food and Drug Administration (FDA) in ensuring that the benefits of a given medical product outweigh the associated risks, and has enabled FDA to approve a number of products that might not otherwise have been made available for patient use. Since the implementation of the REMS program, however, concerns have been raised regarding its impact on patient access to products and the associated burden on providers and health care systems. In an effort to address these concerns—and as part of its commitments under the Prescription Drug User Fee Act reauthorization of 2012—FDA has undertaken efforts to standardize and improve the effectiveness of REMS, and to better integrate REMS programs into the health system. As part of this broader initiative, the Agency is currently assessing the feasibility of integrating accredited continuing education (CE) programs and activities into REMS programs that have been developed for a single drug. Under a cooperative agreement with the FDA, the Center for Health Policy held an expert workshop on May 18 titled, “Incorporating Continuing Education into Single-Drug REMS: Exploring the Challenges and Opportunities”. This workshop provided an opportunity for pharmaceutical manufacturers, regulators, CE providers, accreditors, and other stakeholders to explore the ways that CE can be a valuable addition to the REMS toolkit, discuss potential barriers to the development and implementation of REMS-related CE for single products, and identify strategies for addressing those barriers. Downloads Download discussion guide Authors Gregory W. DanielMark B. McClellan Image Source: © Joshua Lott / Reuters Full Article
gle The struggle for democracy in Myanmar/Burma By webfeeds.brookings.edu Published On :: Tue, 14 Jul 2015 09:30:00 -0400 Event Information July 14, 20159:30 AM - 11:00 AM EDTSaul/Zilkha RoomsBrookings Institution1775 Massachusetts Avenue NWWashington, DC 20036 Register for the EventMyanmar/Burma is in the fourth year of a historic transition out of military rule that began after the junta dissolved itself in March 2011, replaced by an elected parliament and the government led by President Thein Sein. New elections are expected in November for its second government under the 2008 constitution. While expressing commitment to holding a free and fair election, the Thein Sein government has left in place a constitutional obstacle to allowing Aung San Suu Kyi, leader of the opposition National League for Democracy (NLD), from becoming the country’s next president. The NLD seems likely to emerge from the new elections with the most seats in the legislature, but may fall short of its landslide victory in the 1990 election, which was not accepted by the ruling military junta. On July 14, the Center for East Asia Policy Studies at Brookings hosted a discussion of Myanmar’s progress over the past four years and the prospects for strengthening democratic rule under the next government. Delphine Schrank, a former reporter with The Washington Post, spent four years among dissidents in Myanmar/Burma and has written a narrative nonfiction account about their epic multi-generational fight for democracy. Her book “The Rebel of Rangoon; A Tale of Defiance and Deliverance” (Nation Books, 2015) will set the stage for the discussion. Panelists included Brookings Senior Fellow Ted Piccone, Nonresident Senior Fellow Lex Rieffel, and Priscilla Clapp, former chief-of-mission to the U.S. Embassy in Burma (1999-2002). Richard Bush, senior fellow and director of the Center for East Asia Policy Studies, offered opening remarks and moderated the discussion. Audio The struggle for democracy in Myanmar/Burma Transcript Uncorrected Transcript (.pdf) Event Materials 20150714_democracy_burma_transcript Full Article
gle Tanvi Madan on the US-India-China “Fateful Triangle” By webfeeds.brookings.edu Published On :: Tue, 17 Mar 2020 19:07:39 +0000 Full Article
gle Islamic exceptionalism: How the struggle over Islam is reshaping the world By webfeeds.brookings.edu Published On :: Thu, 09 Jun 2016 17:30:00 -0400 Event Information June 9, 20165:30 PM - 8:00 PM EDTFalk AuditoriumBrookings Institution1775 Massachusetts Avenue NWWashington, DC 20036 With the rise of ISIS and a growing terrorist threat in the West, unprecedented attention has focused on Islam, which despite being the world’s fastest growing religion, is also one of the most misunderstood. In his new book “Islamic Exceptionalism: How the Struggle over Islam is Reshaping the World” (St. Martin’s Press, 2016), Senior Fellow Shadi Hamid offers a novel and provocative argument on how Islam is, in fact, “exceptional” in how it relates to politics, with profound implications for how we understand the future of the Middle East. Hamid argues for a new understanding of how Islam and Islamism shape politics by examining different modes of reckoning with the problem of religion and state, including the terrifying—and alarmingly successful—example of ISIS. On June 9, Shadi Hamid and Isaiah Berlin Senior Fellow in Culture and Policy Leon Wieseltier discussed the unresolved questions of religion’s role in public life and whether Islam can—or should—be reformed or secularized. Join the conversation on Twitter using #IslamicExceptionalism Video Islamic exceptionalism: How the struggle over Islam is reshaping the world - Part 1Islamic exceptionalism: How the struggle over Islam is reshaping the world - Part 2 Audio Islamic exceptionalism: How the struggle over Islam is reshaping the world Transcript Uncorrected Transcript (.pdf) Event Materials 20160609_islamic_exceptionalism_transcript Full Article
gle Putin weaves a tangled Mideast web By webfeeds.brookings.edu Published On :: Mon, 30 Nov -0001 00:00:00 +0000 Full Article
gle The impossible (pipe) dream—single-payer health reform By webfeeds.brookings.edu Published On :: Tue, 26 Jan 2016 08:38:00 -0500 Led by presidential candidate Bernie Sanders, one-time supporters of ‘single-payer’ health reform are rekindling their romance with a health reform idea that was, is, and will remain a dream. Single-payer health reform is a dream because, as the old joke goes, ‘you can’t get there from here. Let’s be clear: opposing a proposal only because one believes it cannot be passed is usually a dodge.One should judge the merits. Strong leaders prove their skill by persuading people to embrace their visions. But single-payer is different. It is radical in a way that no legislation has ever been in the United States. Not so, you may be thinking. Remember such transformative laws as the Social Security Act, Medicare, the Homestead Act, and the Interstate Highway Act. And, yes, remember the Affordable Care Act. Those and many other inspired legislative acts seemed revolutionary enough at the time. But none really was. None overturned entrenched and valued contractual and legislative arrangements. None reshuffled trillions—or in less inflated days, billions—of dollars devoted to the same general purpose as the new legislation. All either extended services previously available to only a few, or created wholly new arrangements. To understand the difference between those past achievements and the idea of replacing current health insurance arrangements with a single-payer system, compare the Affordable Care Act with Sanders’ single-payer proposal. Criticized by some for alleged radicalism, the ACA is actually stunningly incremental. Most of the ACA’s expanded coverage comes through extension of Medicaid, an existing public program that serves more than 60 million people. The rest comes through purchase of private insurance in “exchanges,” which embody the conservative ideal of a market that promotes competition among private venders, or through regulations that extended the ability of adult offspring to remain covered under parental plans. The ACA minimally altered insurance coverage for the 170 million people covered through employment-based health insurance. The ACA added a few small benefits to Medicare but left it otherwise untouched. It left unaltered the tax breaks that support group insurance coverage for most working age Americans and their families. It also left alone the military health programs serving 14 million people. Private nonprofit and for-profit hospitals, other vendors, and privately employed professionals continue to deliver most care. In contrast, Senator Sanders’ plan, like the earlier proposal sponsored by Representative John Conyers (D-Michigan) which Sanders co-sponsored, would scrap all of those arrangements. Instead, people would simply go to the medical care provider of their choice and bills would be paid from a national trust fund. That sounds simple and attractive, but it raises vexatious questions. How much would it cost the federal government? Where would the money to cover the costs come from? What would happen to the $700 billion that employers now spend on health insurance? How would the $600 billion a year reductions in total health spending that Sanders says his plan would generate come from? What would happen to special facilities for veterans and families of members of the armed services? Sanders has answers for some of these questions, but not for others. Both the answers and non-answers show why single payer is unlike past major social legislation. The answer to the question of how much single payer would cost the federal government is simple: $4.1 trillion a year, or $1.4 trillion more than the federal government now spends on programs that the Sanders plan would replace. The money would come from new taxes. Half the added revenue would come from doubling the payroll tax that employers now pay for Social Security. This tax approximates what employers now collectively spend on health insurance for their employees...if they provide health insurance. But many don’t. Some employers would face large tax increases. Others would reap windfall gains. The cost question is particularly knotty, as Sanders assumes a 20 percent cut in spending averaged over ten years, even as roughly 30 million currently uninsured people would gain coverage. Those savings, even if actually realized, would start slowly, which means cuts of 30 percent or more by Year 10. Where would they come from? Savings from reduced red-tape associated with individual insurance would cover a small fraction of this target. The major source would have to be fewer services or reduced prices. Who would determine which of the services physicians regard as desirable -- and patients have come to expect -- are no longer ‘needed’? How would those be achieved without massive bankruptcies among hospitals, as columnist Ezra Klein has suggested, and would follow such spending cuts? What would be the reaction to the prospect of drastic cuts in salaries of health care personnel – would we have a shortage of doctors and nurses? Would patients tolerate a reduction in services? If people thought that services under the Sanders plan were inadequate, would they be allowed to ‘top up’ with private insurance? If so, what happens to simplicity? If not, why not? Let me be clear: we know that high quality health care can be delivered at much lower cost than is the U.S. norm. We know because other countries do it. In fact, some of them have plans not unlike the one Senator Sanders is proposing. We know that single-payer mechanisms work in some countries. But those systems evolved over decades, based on gradual and incremental change from what existed before. That is the way that public policy is made in democracies. Radical change may occur after a catastrophic economic collapse or a major war. But in normal times, democracies do not tolerate radical discontinuity. If you doubt me, consider the tumult precipitated by the really quite conservative Affordable Care Act. Editor's note: This piece originally appeared in Newsweek. Authors Henry J. Aaron Publication: Newsweek Image Source: © Jim Young / Reuters Full Article
gle Facebook, Google, and the Future of Privacy and Free Speech By webfeeds.brookings.edu Published On :: Mon, 02 May 2011 00:00:00 -0400 IntroductionIt was 2025 when Facebook decided to post live feeds from public and private surveillance cameras, so they could be searched online. The decision hardly came as a surprise. Ever since Facebook passed the 500 million-member mark in 2010, it found increasing consumer demand for applications that allowed users to access surveillance cameras with publicly accessible IP addresses. (Initially, live feeds to cameras on Mexican beaches were especially popular.) But in the mid-2020s, popular demand for live surveillance camera feeds were joined by demands from the U.S. government that an open circuit television network would be invaluable in tracking potential terrorists. As a result, Facebook decided to link the public and private camera networks, post them live online, and store the video feeds without restrictions on distributed servers in the digital cloud. Once the new open circuit system went live, anyone in the world could log onto the Internet, select a particular street view on Facebook maps and zoom in on a particular individual. Anyone could then back click on that individual to retrace her steps since she left the house in the morning or forward click on her to see where she was headed in the future. Using Facebook’s integrated face recognition app, users could click on a stranger walking down any street in the world, plug her image into the Facebook database to identify her by name, and then follow her movements from door-to-door. Since cameras were virtually ubiquitous in public and commercial spaces, the result was the possibility of ubiquitous identification and surveillance of all citizens virtually anywhere in the world—and by anyone. In an enthusiastic launch, Mark Zuckerberg dubbed the new 24/7 ubiquitous surveillance system “Open Planet.” Open Planet is not a technological fantasy. Most of the architecture for implementing it already exists, and it would be a simple enough task for Facebook or Google, if the companies chose, to get the system up and running: face recognition is already plausible, storage is increasing exponentially; and the only limitation is the coverage and scope of the existing cameras, which are growing by the day. Indeed, at a legal Futures Conference at Stanford in 2007, Andrew McLaughlin, then the head of public policy at Google, said he expected Google to get requests to put linked surveillance networks live and online within the decade. How, he, asked the audience of scholars and technologists, should Google respond? If “Open Planet” went live, would it violate the Constitution? The answer is that it might not under Supreme Court doctrine as it now exists—at least not if it were a purely-private affair, run by private companies alone and without government involvement. Both the First Amendment, which protects free speech, and the Fourth Amendment, which prohibits unreasonable searches and seizures, only restrict actions by the government. On the other hand, if the government directed Open Planet’s creation or used it to track citizens on government-owned, as well as private-sector, cameras, perhaps Facebook might be viewed as the equivalent of a state actor, and therefore restricted by the Constitution. At the time of the framing of the Constitution, a far less intrusive invasion of privacy – namely, the warrantless search of private homes and desk drawers for seditious papers – was considered the paradigmatic case of an unreasonable and unconstitutional invasion of privacy. The fact that 24/7 ubiquitous surveillance may not violate the Constitution today suggests the challenge of translating the framers’ values into a world in which Google and Facebook now have far more power over the privacy and free speech of most citizens than any King, president, or Supreme Court justice. In this essay, I will examine four different areas where the era of Facebook and Google will challenge our existing ideas about constitutional protections for free speech and privacy: ubiquitous surveillance with GPS devices and online surveillance cameras; airport body scanners; embarrassing Facebook photos and the problem of digital forgetting; and controversial YouTube videos. In each area, I will suggest, preserving constitutional values requires a different balance of legal and technological solutions, combined with political mobilization that leads to changes in social norms. Let’s start with Open Planet, and imagine sufficient government involvement to make the courts plausibly consider Facebook’s program the equivalent of state action. Imagine also that the Supreme Court in 2025 were unsettled by Open Planet and inclined to strike it down. A series of other doctrines might bar judicial intervention. The Court has come close to saying that we have no legitimate expectations of privacy in public places, at least when the surveillance technologies in question are in general public use by ordinary members of the public.[1] As mobile camera technology becomes ubiquitous, the Court might hold that the government is entitled to have access to the same linked camera system that ordinary members of the public have become accustomed to browsing. Moreover, the Court has said that we have no expectation of privacy in data that we voluntarily surrender to third parties.[2] In cases where digital images are captured on cameras owned by third parties and stored in the digital cloud—that is, on distributed third party servers--we have less privacy than citizens took for granted at the time of the American founding. And although the founders expected a degree of anonymity in public, that expectation would be defeated by the possibility of 24/7 surveillance on Facebook. The doctrinal seeds of a judicial response to Open Planet, however, do exist. A Supreme Court inclined to strike down ubiquitous surveillance might draw on recent cases involving decisions by the police to place a GPS tracking device on the car of a suspect without a warrant, tracking his movements 24/7. The Supreme Court has not yet decided whether prolonged surveillance, in the form of “dragnet-type law enforcement practices” violates the Constitution.[3] Three federal circuits have held that the use of a GPS tracking device to monitor someone’s movements in a car over a prolonged period is not a search because we have no expectations of privacy in our public movements.[4] But in a visionary opinion in 2010, Judge Douglas Ginsburg of the U.S. Court of Appeals disagreed. Prolonged surveillance is a search, he recognized, because no reasonable person expects that his movements will be continuously monitored from door to door; all of us have a reasonable expectation of privacy in the “whole” of our movements in public. [5] Ginsburg and his colleagues struck down the warrantless GPS surveillance of a suspect that lasted 24 hours a day for nearly a month on the grounds that prolonged, ubiquitous tracking of citizen’s movements in public is constitutionally unreasonable. “Unlike one’s movements during a single journey, the whole of one’s movements over the course of a month is not actually exposed to the public because the likelihood anyone will observe all those movements is effectively nil,” Ginsburg wrote. Moreover, “That whole reveals more – sometimes a great deal more – than does the sum of its parts.”[6] Like the “mosaic theory” invoked by the government in national security cases, Ginsburg concluded that “Prolonged surveillance reveals types of information not revealed by short-term surveillance, such as what a person does repeatedly, what he does not do, and what he does ensemble. These types of information can each reveal more about a person than does any individual trip viewed in isolation.”[7] Ginsburg understood that 24/7 ubiquitous surveillance differs from more limited tracking not just in degree but in kind – it looks more like virtual stalking than a legitimate investigation – and therefore is an unreasonable search of the person. Because prolonged surveillance on “Open Planet” potentially reveals far more about each of us than 24/7 GPS tracking does, providing real time images of all our actions, rather than simply tracking the movements of our cars, it could also be struck down as an unreasonable search of our persons. And if the Supreme Court struck down Open Planet on Fourth Amendment grounds, it might be influenced by the state regulations of GPS surveillance that Ginsburg found persuasive, or by Congressional attempts to regulate Facebook or other forms of 24/7 surveillance, such as the Geolocational Privacy and Surveillance Act proposed by Sen. Ron Wyden (D-OR) that would require officers to get a warrant before electronically tracking cell phones or cars.[8] The Supreme Court in 2025 might also conceivably choose to strike down Open Planet on more expansive grounds, relying not just on the Fourth Amendment, but on the right to autonomy recognized in cases like Casey v. Planned Parenthood and Lawrence v. Texas. The right to privacy cases, beginning with Griswold v. Connecticut and culminating in Roe v. Wade and Lawrence, are often viewed as cases about sexual autonomy, but in Casey and Lawrence, Justice Anthony Kennedy recognized a far more sweeping principle of personal autonomy that might well protect individuals from totalizing forms of ubiquitous surveillance. Imagine an opinion written in 2025 by Justice Kennedy, still ruling the Court and the country at the age of 89. “In our tradition the State is not omnipresent in the home. And there are other spheres of our lives and existence, outside the home, where the State should not be a dominant presence,” Kennedy wrote in Lawrence. “Freedom extends beyond spatial bounds. Liberty presumes an autonomy of self that includes freedom of thought, belief, expression, and certain intimate conduct.”[9] Kennedy’s vision of an “autonomy of self” that depends on preventing the state from becoming a “dominant presence” in public as well as private places might well be invoked to prevent the state from participating in a ubiquitous surveillance system that prevents citizens from defining themselves and expressing their individual identities. Just as citizens in the Soviet Union were inhibited from expressing and defining themselves by ubiquitous KGB surveillance, Kennedy might hold, the possibility of ubiquitous surveillance on “Open Planet” also violates the right to autonomy, even if the cameras in question are owned by the private sector, as well as the state, and a private corporation provides the platform for their monitoring. Nevertheless, the fact that the system is administered by Facebook, rather than the Government, might be an obstacle to a constitutional ruling along these lines. And if Kennedy (or his successor) struck down “Open Planet” with a sweeping vision of personal autonomy that didn’t coincide with the actual values of a majority of citizens in 2025, the decision could be the Roe of virtual surveillance, provoking backlashes from those who don’t want the Supreme Court imposing its values on a divided nation. Would the Supreme Court, in fact, strike down “Open Planet” in 2025? If the past is any guide, the answer may depend on whether the public, in 2025, views 24/7 ubiquitous surveillance as invasive and unreasonable, or whether citizens have become so used to ubiquitous surveillance on and off the web, in virtual space and real space, that the public demands “Open Planet” rather than protesting against it. I don’t mean to suggest that the Court actually reads the polls. But in the age of Google and Facebook, technologies that thoughtfully balance privacy with free expression and other values have tended to be adopted only when companies see their markets as demanding some kind of privacy protection, or when engaged constituencies have mobilized in protest against poorly designed architectures and demanded better ones, helping to create a social consensus that the invasive designs are unreasonable. The paradigmatic case of the kind of political mobilization on behalf of constitutional values that I have in mind is presented by my second case: the choice between the naked machine and the blob machine in airport security screening. In 2002, officials at Orlando International airport first began testing the millimeter wave body scanners that are currently at the center of a national uproar. The designers of the scanners at Pacific Northwest Laboratories offered U.S. officials a choice: naked machines or blob machines? The same researchers had developed both technologies, and both were equally effective at identifying contraband. But, as their nicknames suggest, the former displays graphic images of the human body, while the latter scrambles the images into a non-humiliating blob.[10] Since both versions of the scanners promise the same degree of security, any sane attempt to balance privacy and safety would seem to favor the blob machines over the naked machines. And that’s what European governments chose. Most European airport authorities have declined to adopt body scanners at all, because of persuasive evidence that they’re not effective at detecting low-density contraband such as the chemical powder PETN that the trouser bomber concealed in his underwear on Christmas day, 2009. But the handful of European airports that have adopted body scanners, such as Schiphol airport in Amsterdam, have opted for a version of the blob machine. This is in part due to the efforts of European privacy commissioners, such as Germany’s Peter Schaar, who have emphasized the importance of designing body scanners in ways that protect privacy. The U.S. Department of Homeland Security made a very different choice. It deployed the naked body scanners without any opportunity for public comment—then appeared surprised by the backlash. Remarkably, however, the backlash was effective. After a nationwide protest inspired by the Patrick Henry of the anti-Naked Machines movement, a traveler who memorably exclaimed “Don’t Touch my Junk,” President Obama called on the TSA to go back to the drawing board. And a few months after authorizing the intrusive pat downs, in February 2011, the TSA announced that it would begin testing, on a pilot basis, versions of the very same blob machines that the agency had rejected nearly a decade earlier. According to the latest version, to be tested in Las Vegas and Washington, D.C, the TSA will install software filters on its body scanner machines that detects potential threat items and indicates their location on a generic, blob like outline of each passenger that will appear on a monitor attached to the machine. Passengers without suspicious items will be cleared as “OK,” those with suspicious items will be taken aside for additional screening. The remote rooms in which TSA agents view images of the naked body will be eliminated. According to news reports, TSA began testing the filtering software in the fall of 2010 – precisely when the protests against the naked machines went viral. If the filtering software is implemented across the country, converting naked machines into blob machines, the political victory for privacy will be striking. Of course, it’s possible that courts might strike down the naked machines as unreasonable and unconstitutional, even without the political protests. In a 1983 opinion upholding searches by drug-sniffing dogs, Justice Sandra Day O’Connor recognized that a search is most likely to be considered constitutionally reasonable if it is very effective at discovering contraband without revealing innocent but embarrassing information.[11] The backscatter machines seem, under O'Connor's view, to be the antithesis of a reasonable search: They reveal a great deal of innocent but embarrassing information and are remarkably ineffective at revealing low-density contraband. It’s true that the government gets great deference in airports and at the borders, where routine border searches don’t require heightened suspicion. But the Court has held that non-routine border searches, such as body cavity or strip searches, do require a degree of individual suspicion. And although the Supreme Court hasn't evaluated airport screening technology, lower courts have emphasized, as the U.S. Court of Appeals for the 9th Circuit ruled in 2007, that "a particular airport security screening search is constitutionally reasonable provided that it 'is no more extensive nor intensive than necessary, in the light of current technology, to detect the presence of weapons or explosives.'"[12] It’s arguable that since the naked machines are neither effective nor minimally intrusive – that is, because they might be designed with blob machine like filters that promise just as much security while also protecting privacy – that courts might strike them down. As a practical matter, however, both lower courts and the Supreme Court seem far more likely to strike down strip searches that have inspired widespread public opposition – such as the strip search of a high school girl wrongly accused of carrying drugs, which the Supreme Court invalidated by a vote of 8-1,[13] then they are of searches that, despite the protests of a mobilized minority, the majority of the public appears to accept. The tentative victory of the blob machines over the naked machines, if it materializes, provides a model for successful attempts to balance privacy and security: government can be pressured into striking a reasonable balance between privacy and security by a mobilized minority of the public when the privacy costs of a particular technology are dramatic, visible, widely distributed, and people experience the invasions personally as a kind of loss of control over the conditions of their own exposure. But can we be mobilized to demand a similarly reasonable balance when the threats to privacy come not from the government but from private corporations and when those responsible for exposing too much personal information about us are none other than ourselves? When it comes to invasions of privacy by fellow citizens, rather than by the government, we are in the realm not of autonomy but of dignity and decency. (Autonomy preserves a sphere of immunity from government intrusion in our lives; dignity protects the norms of social respect that we accord to each other.) And since dignity is a socially constructed value, it’s unlikely to be preserved by judges--or by private corporations--in the face of the expressed preferences of citizens who are less concerned about dignity than exposure. This is the subject of our third case, which involves a challenge that, in big and small ways, is confronting millions of people around the globe: how best to live our lives in a world where the Internet records everything and forgets nothing—where every online photo, status update, Twitter post and blog entry by and about us can be stored forever.[14] Consider the case of Stacy Snyder. Four years ago, Snyder, then a 25-year-old teacher in training at Conestoga Valley High School in Lancaster, Pa., posted a photo on her MySpace page that showed her at a party wearing a pirate hat and drinking from a plastic cup, with the caption “Drunken Pirate.” After discovering the page, her supervisor at the high school told her the photo was “unprofessional,” and the dean of Millersville University School of Education, where Snyder was enrolled, said she was promoting drinking in virtual view of her under-age students. As a result, days before Snyder’s scheduled graduation, the university denied her a teaching degree. Snyder sued, arguing that the university had violated her First Amendment rights by penalizing her for her (perfectly legal) after-hours behavior. But in 2008, a federal district judge rejected the claim, saying that because Snyder was a public employee whose photo didn’t relate to matters of public concern, her “Drunken Pirate” post was not protected speech.[15] When historians of the future look back on the perils of the early digital age, Stacy Snyder may well be an icon. With Web sites like LOL Facebook Moments, which collects and shares embarrassing personal revelations from Facebook users, ill-advised photos and online chatter are coming back to haunt people months or years after the fact. Technological advances, of course, have often presented new threats to privacy. In 1890, in perhaps the most famous article on privacy ever written, Samuel Warren and Louis Brandeis complained that because of new technology — like the Kodak camera and the tabloid press — “gossip is no longer the resource of the idle and of the vicious but has become a trade.”[16] But the mild society gossip of the Gilded Age pales before the volume of revelations contained in the photos, video and chatter on social-media sites and elsewhere across the Internet. Facebook, which surpassed MySpace in 2008 as the largest social-networking site, now has more than 500 million members, or 22 percent of all Internet users, who spend more than 500 billion minutes a month on the site. Facebook users share more than 25 billion pieces of content each month (including news stories, blog posts and photos), and the average user creates 70 pieces of content a month. Today, as in Brandeis’s day, the value threatened by gossip on the Internet – whether posted by us our by others – is dignity. (Brandeis called it an offense against honor.) But American law has never been good at regulating offenses against dignity – especially when regulations would clash with other values, such as protections for free speech. And indeed, the most ambitious proposals in Europe to create new legal rights to escape your past on the Internet are very hard to reconcile with the American free speech tradition. The cautionary tale here is Argentina, which has dramatically expanded the liability of search engines like Google and Yahoo for offensive photographs that harm someone’s reputation. Recently, an Argentinean judge held Google and Yahoo liable for causing “moral harm” and violating the privacy of Virginia Da Cunha, a pop star, by indexing pictures of her that were linked to erotic content. The ruling against Google and Yahoo was overturned on appeal in August, but there are at least 130 similar cases pending in Argentina to force search engines to remove or block offensive content. In the U.S., search engines are protected by the Communications Decency Act, which immunizes Internet service providers from hosting content posted by third parties. But as liability against search engines expands abroad, it will seriously curtain free speech: Yahoo says that the only way to comply with injunctions about is to block all sites that refer to a particular plaintiff.[17] In Europe, recent proposals to create a legally enforceable right to escape your past have come from the French. The French data commissioner, Alex Turc, who has proposed a right to oblivion – namely a right to escape your past on the Internet. The details are fuzzy, but it appears that the proposal would rely on an international body – say a commission of forgetfulness – to evaluate particular take down requests and order Google and Facebook to remove content that, in the view of commissioners, violated an individuals’ dignitary rights. From an American perspective, the very intrusiveness of this proposal is enough to make it implausible: how could we rely on bureaucrats to protect our dignity in cases where we have failed to protect it on our own? Europeans, who have less of a free speech tradition and far more of a tradition of allowing people to remove photographs taken and posted against their will, will be more sympathetic to the proposal. But from the perspective of most American courts and companies, giving people the right selectively to delete their pasts from public discourse would pose unacceptably great threats to free speech. A far more promising solution to the problem of forgetting on the Internet is technological. And there are already small-scale privacy apps that offer disappearing data. An app called TigerText allows text-message senders to set a time limit from one minute to 30 days, after which the text disappears from the company’s servers, on which it is stored, and therefore, from the senders’ and recipients’ phones. (The founder of TigerText, Jeffrey Evans, has said he chose the name before the scandal involving Tiger Woods’s supposed texts to a mistress.)[18] Expiration dates could be implemented more broadly in various ways. Researchers at the University of Washington, for example, are developing a technology called Vanish that makes electronic data “self-destruct” after a specified period of time. Instead of relying on Google, Facebook or Hotmail to delete the data that is stored “in the cloud” — in other words, on their distributed servers — Vanish encrypts the data and then “shatters” the encryption key. To read the data, your computer has to put the pieces of the key back together, but they “erode” or “rust” as time passes, and after a certain point the document can no longer be read. The technology doesn’t promise perfect control — you can’t stop someone from copying your photos or Facebook chats during the period in which they are not encrypted. But as Vanish improves, it could bring us much closer to a world where our data don’t linger forever. Facebook, if it wanted to, could implement expiration dates on its own platform, making our data disappear after, say, three days or three months unless a user specified that he wanted it to linger forever. It might be a more welcome option for Facebook to encourage the development of Vanish-style apps that would allow individual users who are concerned about privacy to make their own data disappear without imposing the default on all Facebook users. So far, however, Zuckerberg, Facebook’s C.E.O., has been moving in the opposite direction — toward transparency, rather than privacy. In defending Facebook’s recent decision to make the default for profile information about friends and relationship status public, Zuckerberg told the founder of the publication TechCrunch that Facebook had an obligation to reflect “current social norms” that favored exposure over privacy. “People have really gotten comfortable not only sharing more information and different kinds but more openly and with more people, and that social norm is just something that has evolved over time,” [19] he said. It’s true that a German company, X-Pire, recently announced the launch of a Facebook app that will allow users automatically to erase designated photos. Using electronic keys that expire after short periods of time, and obtained by solving a Captcha, or graphic that requires users to type in a fixed number combinations, the application ensures that once the time stamp on the photo has expired, the key disappears.[20] X-Pire is a model for a sensible, blob-machine-like solution to the problem of digital forgetting. But unless Facebook builds X-Pire-like apps into its platform – an unlikely outcome given its commercial interests – a majority of Facebook users are unlikely to seek out disappearing data options until it’s too late. X-Pire, therefore, may remain for the foreseeable future a technological solution to a grave privacy problem—but a solution that doesn’t have an obvious market. The courts, in my view, are better equipped to regulate offenses against autonomy, such as 24/7 surveillance on Facebook, than offenses against dignity, such as drunken Facebook pictures that never go away. But that regulation in both cases will likely turn on evolving social norms whose contours in twenty years are hard to predict. Finally, let’s consider one last example of the challenge of preserving constitutional values in the age of Facebook and Google, an example that concerns not privacy but free speech.[21] At the moment, the person who arguably has more power than any other to determine who may speak and who may be heard around the globe isn’t a king, president or Supreme Court justice. She is Nicole Wong, the deputy general counsel of Google, and her colleagues call her “The Decider.” It is Wong who decides what controversial user-generated content goes down or stays up on YouTube and other applications owned by Google, including Blogger, the blog site; Picasa, the photo-sharing site; and Orkut, the social networking site. Wong and her colleagues also oversee Google’s search engine: they decide what controversial material does and doesn’t appear on the local search engines that Google maintains in many countries in the world, as well as on Google.com. As a result, Wong and her colleagues arguably have more influence over the contours of online expression than anyone else on the planet. At the moment, Wong seems to be exercising that responsibility with sensitivity to the values of free speech. Google and Yahoo can be held liable outside the United States for indexing or directing users to content after having been notified that it was illegal in a foreign country. In the United States, by contrast, Internet service providers are protected from most lawsuits involving having hosted or linked to illegal user-generated content. As a consequence of these differing standards, Google has considerably less flexibility overseas than it does in the United States about content on its sites, and its “information must be free” ethos is being tested abroad. For example, on the German and French default Google search engines, Google.de and Google.fr, you can’t find Holocaust-denial sites that can be found on Google.com, because Holocaust denial is illegal in Germany and France. Broadly, Google has decided to comply with governmental requests to take down links on its national search engines to material that clearly violates national laws. But not every overseas case presents a clear violation of national law. In 2006, for example, protesters at a Google office in India demanded the removal of content on Orkut, the social networking site, that criticized Shiv Sena, a hard-line Hindu political party popular in Mumbai. Wong eventually decided to take down an Orkut group dedicated to attacking Shivaji, revered as a deity by the Shiv Sena Party, because it violated Orkut terms of service by criticizing a religion, but she decided not to take down another group because it merely criticized a political party. “If stuff is clearly illegal, we take that down, but if it’s on the edge, you might push a country a little bit,” Wong told me. “Free-speech law is always built on the edge, and in each country, the question is: Can you define what the edge is?” Over the past couple of years, Google and its various applications have been blocked, to different degrees, by 24 countries. Blogger is blocked in Pakistan, for example, and Orkut in Saudi Arabia. Meanwhile, governments are increasingly pressuring telecom companies like Comcast and Verizon to block controversial speech at the network level. Europe and the U.S. recently agreed to require Internet service providers to identify and block child pornography, and in Europe there are growing demands for network-wide blocking of terrorist-incitement videos. As a result, Wong and her colleagues worry that Google’s ability to make case-by-case decisions about what links and videos are accessible through Google’s sites may be slowly circumvented, as countries are requiring the companies that give us access to the Internet to build top-down censorship into the network pipes. It is not only foreign countries that are eager to restrict speech on Google and YouTube. In May, 2006, Joseph Lieberman who has become the A. Mitchell Palmer of the digital age, had his staff contacted Google and demanded that the company remove from YouTube dozens of what he described as jihadist videos. After viewing the videos one by one, Wong and her colleagues removed some of the videos but refused to remove those that they decided didn’t violate YouTube guidelines. Lieberman wasn’t satisfied. In an angry follow-up letter to Eric Schmidt, the C.E.O. of Google, Lieberman demanded that all content he characterized as being “produced by Islamist terrorist organizations” be immediately removed from YouTube as a matter of corporate judgment — even videos that didn’t feature hate speech or violent content or violate U.S. law. Wong and her colleagues responded by saying, “YouTube encourages free speech and defends everyone’s right to express unpopular points of view.” Recently, Google and YouTube announced new guidelines prohibiting videos “intended to incite violence.” That category scrupulously tracks the Supreme Court’s rigorous First Amendment doctrine, which says that speech can be banned only when it poses an imminent threat of producing serious lawless action. Unfortunately, Wong and her colleagues recently retreated from that bright line under further pressure from Lieberman. In November, 2010, YouTube added a new category that viewers can click to flag videos for removal: “promotes terrorism.” There are 24 hours of video uploaded on YouTube every minute, and a series of categories viewers can use to request removal, including “violent or repulsive content” or inappropriate sexual content. Although hailed by Senator Lieberman, the new “promotes terrorism category” is potentially troubling because it goes beyond the narrow test of incitement to violence that YouTube had previously used to flag terrorism related videos for removal. YouTube’s capitulation to Lieberman shows that a user generated system for enforcing community standards will never protect speech as scrupulously as unelected judges enforcing strict rules about when speech can be viewed as a form of dangerous conduct. Google remains a better guardian for free speech than internet companies like Facebook and Twitter, which have refused to join the Global Network Initiative, an industry-wide coalition committed to upholding free speech and privacy. But the recent capitulation of YouTube shows that Google’s “trust us” model may not be a stable way of protecting free speech in the twenty-first century, even though the alternatives to trusting Google – such as authorizing national regulatory bodies around the globe to request the removal of controversial videos – might protect less speech than Google’s “Decider” model currently does. I’d like to conclude by stressing the complexity of protecting constitutional values like privacy and free speech in the age of Google and Facebook, which are not formally constrained by the Constitution. In each of my examples – 24/7 Facebook surveillance, blob machines, escaping your Facebook past, and promoting free speech on YouTube and Google -- it’s possible to imagine a rule or technology that would protect free speech and privacy, while also preserving security—a blob-machine like solution. But in some areas, those blob-machine-like solutions are more likely, in practice, to be adopted then others. Engaged minorities may demand blob machines when they personally experience their own privacy being violated; but they may be less likely to rise up against the slow expansion of surveillance cameras, which transform expectations of privacy in public. Judges in the American system may be more likely to resist ubiquitous surveillance in the name of Roe v. Wade-style autonomy than they are to create a legal right to allow people to edit their Internet pasts, which relies on ideas of dignity that in turn require a social consensus that in America, at least, does not exist. As for free speech, it is being anxiously guarded for the moment by Google, but the tremendous pressures, from consumers and government are already making it hard to hold the line at removing only speech that threatens imminent lawless action. In translating constitutional values in light of new technologies, it’s always useful to ask: What would Brandeis do? Brandeis would never have tolerated unpragmatic abstractions, which have the effect of giving citizens less privacy in the age of cloud computing than they had during the founding era. In translating the Constitution into the challenges of our time, Brandeis would have considered it a duty actively to engage in the project of constitutional translation in order to preserve the Framers’ values in a startlingly different technological world. But the task of translating constitutional values can’t be left to judges alone: it also falls to regulators, legislators, technologists, and, ultimately, to politically engaged citizens. As Brandeis put it, “If we would guide by the light of reason, we must let our minds be bold.” [1] See Florida v. Riley, 488 U.S. 445 (1989) (O’Connor, J., concurring). [2] See United States v. Miller, 425 U.S. 435 (1976).[3] See United States v. Knotts, 460 U.S. 276, 283-4 (1983). [4] See United States v. Pineda-Morena, 591 F.3d 1212 (9th Cir. 2010); United States v. Garcia, 474 F.3d 994 (7th Cir. 2007); United States v. Marquez, 605 F.3d 604 (8th Cir. 2010). [5] See United States v. Maynard, 615 F.3d 544 (D.C. Cir 2010). [6] 615 F.3d at 558. [7] Id. at 562.[8] See Declan McCullagh, “Senator Pushes for Mobile Privacy Reform,” CNet News, March 22, 2011, available at http://m.news.com/2166-12_3-20045723-281.html [9] Lawrence v. Texas, 539 U.S. 558, 562 (2003). [10] The discussion of the blob machines is adapted from “Nude Breach,” New Republic, December 13, 2010. [11] United States v. Place, 462 U.S. 696 (1983). [12] U.S. v. Davis, 482 F.2d 893, 913 (9th Cir. 1973).[13] Safford Unified School District v. Redding, 557 U.S. ___ (2009). [14] The discussion of digital forgetting is adapted from “The End of Forgetting,” New York Times Magazine, July 25, 2010. [15]Snyder v. Millersville University, No. 07-1660 (E.D. Pa. Dec. 3, 2008). [16] Brandeis and Warren, “The Right to Privacy,” 4 Harv. L. Rev. 193 (1890).[17] Vinod Sreeharsha, Google and Yahoo Win Appeal in Argentine Case, N.Y. Times, August 20, 2010, B4.[18] See Belinda Luscombe, “Tiger Text: An iPhone App for Cheating Spouses?”, Time.com, Feb. 26, 2010, available at http://www.time.com/time/business/article/0,8599,1968233,00.html [19]Marshall Kirkpatrick, “Facebook’s Zuckerbeg Says the Age of Privacy Is Over,” ReadWriteWeb.com, January 9, 2010, available at http://www.readwriteweb.com/archives/facebooks_zuckerberg_says_the_age_of_privacy_is_ov.php [20] Aemon Malone, “X-Pire Aims to Cut down on Photo D-Tagging on Facebook,” Digital Trends.com, January 17, 2011, available at http://www.digitaltrends.com/social-media/x-pire-adds-expiration-date-to-digital-photos/ [21] The discussion of free speech that follows is adapted from “Google’s Gatekeepers,” New York Times Magazine, November 30, 2008. Downloads Download the Full Paper Authors Jeffrey Rosen Image Source: David Malan Full Article
gle While Egypt Struggles, Ethiopia Builds over the Blue Nile: Controversies and the Way Forward By webfeeds.brookings.edu Published On :: Thu, 25 Jul 2013 15:02:00 -0400 On April 2, 2011, Ethiopia embarked upon the construction of what is expected to be the biggest hydroelectric power plant in Africa. Called the Grand Ethiopian Renaissance Dam (GERD), it will be located on the Blue Nile, 40 kilometers (25 miles) from the border with the Republic of Sudan and will have the capacity to produce 6,000 megawatts of electricity. The GERD, once completed and made operational, is expected to ameliorate chronic domestic energy shortages, help the country’s households (especially those located in the rural areas) switch to cleaner forms of energy and allow the government to earn foreign exchange through the exportation of electricity to other countries in the region. Although authorities in Addis Ababa believe that the dam will contribute significantly to economic growth and development—not just in Ethiopia, but also in neighboring countries, such as Sudan—its construction has been very controversial. The major controversies revolve around Ethiopia’s decision to fund the building of the dam from its own sources and the potential impacts of the dam on downstream countries, especially Egypt. Ethiopia opted to source funds for the construction of the GERD through selling bonds to citizens at home and abroad. Government employees have been encouraged to devote as much as one or two months of their salaries to the purchasing of the GERD bonds. Most public workers in Ethiopia earn relatively low wages and face a significantly high cost of living. Hence, they are not likely to be able to sacrifice that much of their salaries to invest in this national project. Nevertheless, many of them have been observed purchasing the GERD bonds, primarily because of pressure from the government and the belief that participation in this national project is a show of one’s patriotism. The government of Ethiopia has also encouraged the private sector to invest in the GERD project. Specifically, private domestic banks and other business enterprises are expected to purchase millions of Birr worth of these bonds. The government also hopes that Ethiopians in the diaspora will contribute significantly to this massive effort to develop the country’s hydroelectric power resources. However, many Ethiopians in the diaspora have not been willing to invest in the GERD project, citing pervasive corruption in the public sector and dictatorial government policies as reasons why they would not commit the resources necessary to move the project forward. Additionally, Ethiopians living outside the country have argued that the present government in Addis Ababa continues to impede the country’s transition to democracy by making it virtually impossible for opposition parties to operate, using draconian laws (e.g., anti-terrorism laws) to silence legitimate protests and generally denying citizens the right to express themselves. For these reasons, many of them have refused to invest in the GERD project. Finally, Ethiopia’s traditional development partners, including such international organizations as the World Bank and the International Monetary Fund, appear to be unwilling to lend the country the necessary funds for the construction of the dam given the controversies surrounding the dam and their policies on the building of megadams. Egypt has registered its opposition to the construction of the GERD. In fact, before he was ousted, former Egyptian president Mohamed Morsi made it known to authorities in Addis Ababa that Egypt would not support the project. The Egyptians, as they have done before, have invoked the Anglo-Egyptian Treaty of 1929, which granted Egypt veto power over all construction projects on the Nile River and its tributaries. According to Cairo, then, Ethiopia was supposed to obtain permission from Egypt before embarking on the GERD project. In May 2010, five upstream riparian states (Ethiopia, Kenya, Uganda, Rwanda and Tanzania) signed the Nile Basin Cooperative Framework Agreement (CFA), which, they argue, would provide the mechanism for the equitable and fair use of Nile River waters. On June 13, 2013, the Ethiopian Parliament ratified the CFA and incorporated it into domestic law. The other four signatories have not yet ratified the treaty but plan to do so eventually. Egypt and Sudan, however, have refused to sign the CFA and continue to argue that the 1929 Anglo-Egyptian Treaty, as well as the 1959 bilateral agreement between Egypt and Sudan, represent the only legal mechanisms for Nile River governance. Recently, however, the government of Sudan has indicated its support for the GERD, and South Sudan, which gained its independence from Khartoum on July 9, 2011, does not oppose the project either. Significant increases in population in Egypt, the need for the country to expand its irrigated agricultural base, as well as other industrial needs have significantly increased the country’s demand for water. Unfortunately for Egyptians, the only viable source of water in the country is the Nile River. Thus, Egyptians, as made clear by their leaders, are not willing to relinquish even one drop of water. The country’s bitter opposition to the GERD stems from the fact that it will reduce the flow of water into the Nile River and force Egyptians to live with less water than now. Egyptian leaders are not willing to accept the assertion made by the Ethiopian government that the construction of the dam will not significantly reduce the flow of water from the Blue Nile into Egypt. Thus, Cairo has hinted that it would employ all means available to stop the construction of the GERD. The site of the GERD was identified during geological surveys conducted between 1956 and 1964 by the United States Bureau of Reclamation. Although studies determining the feasibility of a dam on the Blue Nile were completed almost half a century ago, previous Ethiopian governments did not make any attempt to build such a structure on the Blue Nile. This inaction may have been due to Egypt’s ability to lobby the international donor community and prevent it from providing Addis Ababa with the necessary financial resources to complete the project, Ethiopia’s chronic internal political instability, or Egypt’s military strength and its strong ties with neighboring Sudan (the latter shares the same interests as Egypt regarding the waters of the Nile River). In fact, the 1929 Anglo-Egyptian Treaty and the 1959 bilateral agreement between Sudan and Egypt granted both countries complete control of all the waters of the Nile River. Since the ouster of Hosni Mubarak, Egypt has been weakened significantly, politically, economically and militarily. The struggle between the military and civil society for control of the government has been a major distraction to the Egyptian military, and it is unlikely that it can effectively face a relatively strong and more assertive Ethiopian military. Hence, it appears that this might be the most opportune time for Ethiopia to initiate such a construction project. Perhaps more important is the fact that virtually all of the upstream riparian states are no longer willing to allow both Egypt and Sudan to continue to monopolize the waters of the Nile River. In addition, Ethiopia is relatively at peace and maintains good relations with its neighbors, particularly the Republic of Sudan, which would be critical in any successful attack on Ethiopia by Egypt. Of course, Addis Ababa has also invoked and relied on the Cooperative Framework Agreement which, besides Ethiopia, has been signed by four other upstream riparian States—the CFA favors the equitable and fair use of the waters of the Nile River. Authorities in Addis Ababa believe that the GERD will contribute to such fair and equitable use; after all, the Blue Nile (which is located in Ethiopia) provides 86 percent of the water that flows into the Nile River. Up to this point, Ethiopia has made virtually no use of that water, allowing Egypt and Sudan alone to dictate its usage. Critics of the GERD, including some Ethiopians within and outside the country, argue that Addis Ababa initiated the building of the dam just to divert public attention away from internal political tensions associated with lack of religious freedom, human rights violations, suppression of the press, and the economic and political polarization that has become pervasive throughout the country during the last several decades. Given the economic significance of the Blue Nile for the source country (Ethiopia) and downstream countries (Egypt and Sudan), it is critical that these countries engage in constructive dialogue to find a mutually beneficial solution for the project. Such negotiations should take into consideration the fact that the status quo, characterized by Egyptian monopolization of the waters of the Nile River and the exclusion of Ethiopia from exploiting its own water resources for its development, cannot be maintained. Thus, the construction of the GERD should be taken as a given and the three countries—Egypt, Sudan and Ethiopia—should find ways to maximize the benefits of the dam and minimize its negative impacts on the downstream countries. As part of that negotiation, both Egypt and Sudan should abandon their opposition to the CFA, sign it and encourage their legislatures to ratify it. The Nile River and its tributaries should be considered common property belonging to all Nile River Basin communities and should be managed from that perspective. Authors Temesgen T. DeressaJohn Mukum Mbaku Image Source: © Amr Dalsh / Reuters Full Article
gle The U.S.-Turkey-Israel Triangle By webfeeds.brookings.edu Published On :: Mon, 06 Oct 2014 13:30:00 -0400 The confrontation between Israel and Hamas during the summer of 2014 deepened tensions between Israel and Turkey. Now, in the fall of 2014, U.S.-Turkish relations are strained over Turkey’s role in the fight against ISIS, while gaps between the United States and Israel over policies on Iran and Palestine serve as points of friction in the relationship. Clearly the U.S.-Turkey-Israel triangle has suffered many setbacks in recent years on all sides, but the Turkish-Israeli relationship has suffered the most, as it has been in a state of semi-paralysis for the last four years. The watershed moment in this gradual process of deterioration between Ankara and Jerusalem is the Mavi Marmara incident of May 31, 2010, when Israeli commandos boarded a Turkish flotilla consisting of six vessels, among them the MV Mavi Marmara, headed from Turkish ports to Gaza to break the Israeli naval blockade. When activists resisted, using knives and metal bars, the commandos opened fire. Eight Turks and one Turkish-American were killed. Relations between Israel and Turkey were already sorely strained, but bilateral relations mostly collapsed following the incident, with a total disconnect and absence of a dialogue at the very senior levels. This new paper, "The U.S.-Turkey-Israel Triangle," looks at the diplomatic ties among all three countries before, during and after this period. Dan Arbell suggests two closely intertwined conclusions: first, that good Turkish-Israeli relations are essential to the security and stability of the Middle East; and second, that U.S. leadership has come to play a central role in shaping–and often mediating–the Turkish-Israeli relationship. Other highlights from this paper include: • The history of the relations between Turkey and Israel, developing gradually during the “early years” (1948-1992) and moving towards the “golden years” (1992-2008), during which a strategic partnership was forged between Turkey and Israel. • The lessons learned and policy implications for the United States. • What diplomatic steps by the United States led to an apology from Prime Minister Netanyahu to Prime Minister (recently elected President) Erdoğan for the incident. • The key drivers in the Turkish-Israeli relationship, focusing on domestic and regional interests that inform geostrategic alliances in the region, including the Islamic Justice and Development Party’s (AKP) and the Israeli-Palestinian conflict. • How the two countries’ economic ties held together the Turkish-Israeli relationship, when political and diplomatic ties came practically to a standstill. • Why it is important to consider a set of regional challenges, on which the two countries almost see eye to eye, that may provide the necessary glue for a future Israeli-Turkish normalization process. Downloads The U.S.-Turkey-Israel Triangle Authors Dan Arbell Image Source: © Stringer Turkey / Reuters Full Article
gle Wretched Excess Never Looked So Good: 45,000 Lights On A Single House By www.treehugger.com Published On :: Tue, 25 Dec 2012 08:02:22 -0500 Sometimes it's worth it. Full Article Design
gle Lucirmás Turns Single Wine Bottles into 3-Piece Table Sets By www.treehugger.com Published On :: Tue, 10 Apr 2012 02:52:00 -0400 Spanish company Lucirmás debuts Pure-Bottle, a fully recycled and recyclable table set which consists of a glass, lantern and spoon. Full Article Living
gle Morocco: let us break the rod of repression with organisation and struggle By www.marxist.com Published On :: Tue, 07 Jan 2020 11:59:40 +0000 Those who follow the situation in Morocco can see that the repressive dictatorial regime has become more and more frenzied, and the police state has tightened its repressive grip on everyone and everything. They are arresting those who protest, who sing, who criticise, who write, and who show solidarity with those arrested. Full Article Morocco
gle Smuggler caught with more than 10 percent of an entire species By www.treehugger.com Published On :: Wed, 27 Mar 2013 16:36:45 -0400 The arrest of a wildlife smuggler in Thailand proves just how easily a handful of criminals could bring about the demise of an endangered species. Full Article Science