Tumgik
#forensic science e magazine
forensicfield · 2 months
Text
Forensic Science E-Magazine (Feb-March 2024)
We proudly present the January issue (Vol 20) of your favourite magazine, Forensic Science E-Magazine. As usual, the current issue has helpful content related to forensic science. #forensicscienceemagazine #forensicscience #forensicfield #crimescene
Continue reading Forensic Science E-Magazine (Feb-March 2024)
Tumblr media
View On WordPress
4 notes · View notes
no-justice-no-joy · 1 year
Text
Links/Sources Masterpost
Here's a List of a bunch of Links for Anyone Who Wants to Read more about the Case, or about the topics surrounding it! (In JFS Format because Why Not)
Vuille J, Biedermann A, Taroni F. Wrongful Convictions and Miscarriages of Justice: Causes and Remedies in North American and European Criminal Justice Systems, 1st edn.: New York, USA: Routledge; 2013; p. 137–160. DOI: https://doi-org/10.4324/9780203597286    
Gill P. Analysis and implications of the miscarriages of justice of Amanda Knox and Raffaele Sollecito. Forensic Sci Int-Gen. 2016;23:9–18.  http://dx.doi.org/10.1016/j.fsigen.2016.02.015  
Volgin L. The importance of evaluating findings given activity level propositions in order to avoid misleading evidence. Aust J Forensic Sci. 2019;51(sup1):S10–S13. https://doi.org/10.1080/00450618.2019.1569131 
Krone T. Raising the alarm? role definition for prosecutors in criminal cases. Aust J Forensic Sci. 2012;44(1):15–29. https://doi.org/10.1080/00450618.2011.581247   
Grossman J, Nyarko J, Goel S. Racial bias as a multi-stage, multi-actor problem: An analysis of pretrial detention. SSRN Electronic Journal 2022;20(1):86–133. https://doi.org/10.1111/jels.12343 
Haque SE, Saleem S. Augmented reality based criminal investigation system (ARCRIME). 2020 8th International Symposium on Digital Forensics and Security (ISDFS) 2020;  10.1109/ISDFS49300.2020.9116204
Multani A. Fraud in forensics: 5 cases of evidence tampering and abuse [Internet]. Forensics Colleges. 2022 [cited 2023 Feb 9];Available from: https://www.forensicscolleges.com/blog/resources/real-cases-of-forensic-fraud-flawed-evidence   
Yadav PK. Ethical issues across different fields of forensic science - egyptian journal of forensic sciences [Internet]. SpringerOpen. 2017 [cited 2023 Feb 9]; Available from: https://ejfs.springeropen.com/articles/10.1186/s41935-017-0010-1   
N/A. Amanda Knox Biography [Internet]. Biography.com. 2014 [cited 2023 Feb 9]; Available from: https://www.biography.com/crime/amanda-knox   
N/A. Amanda Knox: A Complete Timeline of Her Italian Murder Case and Trial [Internet]. Biography.com. 2020 [cited 2023 Feb 9]; Available from: https://www.biography.com/crime/amanda-knox-murder-trial-timeline-facts 
Arice L. Amanda Knox Case Explained [Internet]. People Magazine. 2016 [cited 2023 Feb 9]; Available from: https://people.com/celebrity/amanda-knox-case-explained/ 
Stockton C. This theory finally explains why Amanda Knox almost went down for the murder of Meredith Kercher [Internet]. Thought Catalog. 2021 [cited 2023 Feb 9]; Available from: https://thoughtcatalog.com/christine-stockton/2021/01/why-people-thought-amanda-knox-was-guilty/ 
Finn N. Why the amanda knox case still doesn't make any sense: Inside a shockingly misogynistic murder investigation [Internet]. E! Online. 2017 [cited 2023 Feb 9]; Available from: https://www.eonline.com/news/798763/why-the-amanda-knox-case-still-doesn-t-make-any-sense-inside-a-shockingly-misogynistic-murder-investigation 
Apuzzo M, Schmidt MS. F.B.I. evidence is often mishandled, an internal inquiry finds [Internet]. The New York Times. 2014 [cited 2023 Feb 9]; Available from: https://www.nytimes.com/2014/12/20/us/politics/fbi-evidence-keeping-criticized.html 
Helmer M. The impact of mishandled evidence on the accused [Internet]. Tracker Products. 2022 [cited 2023 Feb 9];Available from: https://trackerproducts.com/the-impact-of-mishandled-evidence-on-the-accused/#:~:text=Mishandled%2C%20damaged%20or%20lost%20physical%20or%20digital%20evidence,when%20transferring%2C%20and%20during%20evidence%20analysis%20and%20storage. 
1 note · View note
hurtworld · 4 years
Note
mesaj attım ama cevap vermedin dostum. PCR ve qPCR teknikleriyle alakalı kaynak olarak yardımcı olabilir misin?
mendeley kullanıyor musun bilmiyorum ama ben APA şeklinde buraya atayım kaynakları sen seç beğen al dostum.
Polymerase chain reaction - Wikipedia. (n.d.). Retrieved May 27, 2020, from https://en.wikipedia.org/wiki/Polymerase_chain_reaction
Citations for Chemical Breakthrough Awards 2017 Awardees. (n.d.). Division of the History of Chemistry. Retrieved May 27, 2020, from http://www.scs.illinois.edu/~mainzv/HIST/awards/CCB-2017_Awardees.php
Kary B. Mullis – Nobel Lecture: The Polymerase Chain Reaction. (n.d.). Retrieved May 27, 2020, from http://nobelprize.org/nobel_prizes/chemistry/laureates/1993/mullis-lecture.html
Advice on How to Survive the Taq Wars. (2006). GEN Genetic Engineering News – Biobusiness Channel, 26(9). https://www.genengnews.com/magazine/49/advice-on-how-to-survive-the-taq-wars/
Babineaux, M. J., & Alter, M. J. (2011). Viral Hepatitis. In Netter’s Infectious Disease (pp. 399–410). Elsevier Inc. https://doi.org/10.1016/B978-1-4377-0126-5.00067-7
Key ingredient in coronavirus tests comes from Yellowstone’s lakes. (2020). Science. https://www.nationalgeographic.com/science/2020/03/key-ingredient-in-coronavirus-tests-comes-from-yellowstone/
Bing, D., Boles, C., Rehman, F., Audeh, M., Belmarsh, M., Kelley, B., & Adams, C. (1996). Bridge amplification: a solid phase PCR system for the amplification and detection of allelic differences in single copy genes. Genetic Identity Conference Proceedings, Seventh International Symposium on Human Identification. http://www.promega.com/geneticidproc/ussymp7proc/0726.html
Tomar, R. S. (2010). Molecular markers & plant biotechnology. New India Pub. Agency.
Full Text – LaNe RAGE: a new tool for genomic DNA flanking sequence determination. (n.d.). Retrieved May 27, 2020, from http://www.ejbiotechnology.info/content/vol8/issue2/full/7/index.html
Kieleczawa, J. (2006). DNA sequencing II : optimizing preparation and cleanup. Jones and Bartlett Publishers.
David, F. (2002). Utiliser les propriétés topologiques de l’ADN: une nouvelle arme contre les agents pathogènes. Fusion. http://www.lab-rech-associatives.com/pdf/Utiliser la Topologie de l’ADN.pdf
Kellogg, D. E., Rybalkin, I., Chen, S., Mukhamedova, N., Vlasik, T., Siebert, P. D., & Chenchik, A. (1994). TaqStart antibody(TM): “Hot start” PCR facilitated by a neutralizing monoclonal antibody directed against Taq DNA polymerase. BioTechniques, 16(6), 1134–1137.
Ochman, H., Gerber, A. S., & Hartl, D. L. (1988). Genetic applications of an inverse polymerase chain reaction. Genetics, 120(3), 621–623.
Ninfa, A. B. et all. (2010). Fundamental laboratory Approaches for Biochemistry and Biotechnology about PAGE. In Fundamental laboratory Approaches for Biochemistry and Biotechnology. John Wiley & Sons. inc.
Boehnke, M., Arnheim, N., Li, H., & Collins, F. S. (1989). Fine-structure genetic mapping of human chromosomes using the polymerase chain reaction on single sperm: Experimental design considerations. American Journal of Human Genetics, 45(1), 21–32.
Coronavirus: il viaggio dei test. (n.d.). Istituto Superiore Di Sanità. Retrieved May 27, 2020, from https://www.iss.it/web/guest/primo-piano/-/asset_publisher/o4oGR9qmvUz9/content/id/5269706
Patidar, M., Agrawal, S., Parveen, F., & Khare, P. (2015). Molecular insights of saliva in solving paternity dispute. Journal of Forensic Dental Sciences, 7(1), 76. https://doi.org/10.4103/0975-1475.150325
Chemical Synthesis, Sequencing, and Amplification of DNA (class notes on MBB/BIO 343). (n.d.). Arizona State University. Retrieved May 27, 2020, from http://photoscience.la.asu.edu/photosyn/courses/BIO_343/lecture/DNAtech.html
Electronic PCR. (n.d.). NCBI – National Center for Biotechnology Information. Retrieved May 27, 2020, from https://www.ncbi.nlm.nih.gov/sutils/e-pcr/
Bogetto, P. and W. L. (2000). Helpful tips for PCR. Focus, 22(1), 12. http://tools.thermofisher.com/Content/Focus/Focus Volume 22 Issue 1.pdf
Mullis, K. B. (1990). The unusual origin of the polymerase chain reaction. Scientific American, 262(4), 56–65. https://doi.org/10.1038/scientificamerican0490-56
Borman, J., Schuster, D., Li, W., Jessee, J., & Rashtchian, A. (2000). PCR from problematic templates. Focus, 22(1), 10. http://tools.thermofisher.com/Content/Focus/Focus Volume 22 Issue 1.pdf
Mullis, K. B. (1998). Dancing naked in the mind field. Pantheon Books. https://archive.org/details/dancingnakedinmi00mull
PCR. (n.d.). Genetic Science Learning Center, University of Utah. Retrieved May 27, 2020, from http://learn.genetics.utah.edu/content/labs/pcr/
Polymerase Chain Reaction (PCR). (n.d.). National Center for Biotechnology Information, U.S. National Library of Medicine. Retrieved May 27, 2020, from https://www.ncbi.nlm.nih.gov/probe/docs/techpcr/
Rabinow, P. (1996). Making PCR : a story of biotechnology. University of Chicago Press. https://archive.org/details/makingpcrstoryof00rabi
Park, D. J. (2005). A new 5′ terminal murine GAPDH exon identified using 5′RACE LaNe. Molecular Biotechnology, 29(1), 39–46. https://doi.org/10.1385/MB:29:1:39
White, B. A. (1993). PCR protocols : current methods and applications. Humana Press.
Myrick, K. V., & Gelbart, W. M. (2002). Universal Fast Walking for direct and versatile determination of flanking sequence. Gene, 284(1–2), 125–131. https://doi.org/10.1016/S0378-1119(02)00384-0
McPherson, M. J., & Møller, S. G. (2006). PCR. Taylor & Francis.
Bagchi, D. (2013). Bio-nanotechnology : a revolution in food, biomedical, and health sciences. Wiley-Blackwell.
Liu, Y. G., & Whittier, R. F. (1995). Thermal asymmetric interlaced PCR: automatable amplification and sequencing of insert end fragments from P1 and YAC clones for chromosome walking. Genomics, 25(3), 674–681. https://doi.org/10.1016/0888-7543(95)80010-J
Thornhill, A. (2007). Single Cell Diagnostics. Cell, 132. https://doi.org/10.1007/978-1-59745-298-4
Khan, Z., Poetter, K., & Park, D. J. (2008). Enhanced solid phase PCR: mechanisms to increase priming by solid support primers. Analytical Biochemistry, 375(2), 391–393. https://doi.org/10.1016/j.ab.2008.01.021
Baron, S. (1996). Medical microbiology (4th ed.). University of Texas Medical Branch at Galveston. https://www.ncbi.nlm.nih.gov/books/NBK7813/
Bustin, S. A., & Nolan, T. (2009). Analysis of mRNA Expression by Real-time. In Real-Time PCR: Current Technology and Applications. Caister Academic Press. http://www.caister.com/realtimepcr
White, B. A., Shyamala, V., & Ames, G. F.-L. (2003). Single Specific Primer-Polymerase Chain Reaction (SSP-PCR) and Genome Walking. In PCR Protocols (pp. 339–348). Humana Press. https://doi.org/10.1385/0-89603-244-2:339
Dobosy, J. R., Rose, S. D., Beltz, K. R., Rupp, S. M., Powers, K. M., Behlke, M. A., & Walder, J. A. (2011). RNase H-dependent PCR (rhPCR): Improved specificity and single nucleotide polymorphism detection using blocked cleavable primers. BMC Biotechnology, 11, 80. https://doi.org/10.1186/1472-6750-11-80
Sambrook, J., & Russell, D. W. (David W. (2001). Molecular cloning : a laboratory manual (3rd ed.). Cold Spring Harbor Laboratory Press. https://archive.org/details/molecularcloning0000samb_p7p5
David, F., & Turlotte, É. (1998). Une methode d’amplification genique isotherme. Comptes Rendus de l’Academie Des Sciences - Serie III, 321(11), 909–914. https://doi.org/10.1016/S0764-4469(99)80005-5
Shen, C., & Zhang, Z. (2013). An Overview of Nanoparticle-Assisted Polymerase Chain Reaction Technology. In Bio-Nanotechnology: A Revolution in Food, Biomedical and Health Sciences (pp. 97–106). Blackwell Publishing Ltd. https://doi.org/10.1002/9781118451915.ch5
Kleppe, K., Ohtsuka, E., Kleppe, R., Molineux, I., & Khorana, H. G. (1971). Studies on polynucleotides. XCVI. Repair replication of short synthetic DNA’s as catalyzed by DNA polymerases. Journal of Molecular Biology, 56(2), 341–361. https://doi.org/10.1016/0022-2836(71)90469-4
Park, D. J. (2004). 3′ RACE LaNe: A simple and rapid fully nested PCR method to determine 3′-terminal cDNA sequence. BioTechniques, 36(4), 586–590. https://doi.org/10.2144/04364bm04
Kim, B., Kim, J., Kim, M., Kim, B.-D., Jo, S., Park, S., Son, J., Hwang, S., Dugasani, S., Chang, I., Kim, M., & Liu, W. (2016). Ternary and senary representations using DNA double-crossover tiles. Nanotechnology, 10(45), 105601. https://doi.org/10.1088/0957-4484
Isenbarger, T. A., Finney, M., Ríos-Velázquez, C., Handelsman, J., & Ruvkun, G. (2008). Miniprimer PCR, a new lens for viewing the microbial world. Applied and Environmental Microbiology, 74(3), 840–849. https://doi.org/10.1128/AEM.01933-07
Raoult, D., Aboudharam, G., Crubézy, E., Larrouy, G., Ludes, B., & Drancourt, M. (2000). Molecular identification by “suicide PCR” of Yersinia pestis as the agent of Medieval Black Death. Proceedings of the National Academy of Sciences of the United States of America, 97(23), 12800–12803. https://doi.org/10.1073/pnas.220225197
Herman, J. G., Graff, J. R., Myöhänen, S., Nelkin, B. D., & Baylin, S. B. (1996). Methylation-specific PCR: A novel PCR assay for methylation status of CpG islands. Proceedings of the National Academy of Sciences of the United States of America, 93(18), 9821–9826. https://doi.org/10.1073/pnas.93.18.9821
Zietkiewicz, E., Rafalski, A., & Labuda, D. (1994). Genome fingerprinting by simple sequence repeat (SSR)-anchored polymerase chain reaction amplification. Genomics, 20(2), 176–183. https://doi.org/10.1006/geno.1994.1151
San Millán, R. M., Martínez-Ballesteros, I., Rementeria, A., Garaizar, J., & Bikandi, J. (2013). Online exercise for the design and simulation of PCR and PCR-RFLP experiments. BMC Research Notes, 6(1), 513. https://doi.org/10.1186/1756-0500-6-513
Horton, R. M., Hunt, H. D., Ho, S. N., Pullen, J. K., & Pease, L. R. (1989). Engineering hybrid genes without the use of restriction enzymes: gene splicing by overlap extension. Gene, 77(1), 61–68. https://doi.org/10.1016/0378-1119(89)90359-4
Schwartz, J. J., Lee, C., & Shendure, J. (2012). Accurate gene synthesis with tag-directed retrieval of sequence-verified DNA molecules. Nature Methods, 9(9), 913–915. https://doi.org/10.1038/nmeth.2137
Mueller, P. R., & Wold, B. (1989). In vivo footprinting of a muscle specific enhancer by ligation mediated PCR. Science, 246(4931), 780–786. https://doi.org/10.1126/science.2814500
Priye, A., Hassan, Y. A., & Ugaz, V. M. (2013). Microscale chaotic advection enables robust convective DNA replication. Analytical Chemistry, 85(21), 10536–10541. https://doi.org/10.1021/ac402611s
Vincent, M., Xu, Y., & Kong, H. (2004). Helicase-dependent isothermal DNA amplification. EMBO Reports, 5(8), 795–800. https://doi.org/10.1038/sj.embor.7400200
Pierce, K. E., & Wangh, L. J. (2007). Linear-After-The-Exponential Polymerase Chain Reaction and Allied Technologies (pp. 65–85). https://doi.org/10.1007/978-1-59745-298-4_7
Krishnan, M., Ugaz, V. M., & Burns, M. A. (2002). PCR in a Rayleigh-Bénard convection cell. Science, 298(5594), 793. https://doi.org/10.1126/science.298.5594.793
Innis, M. A., Myambo, K. B., Gelfand, D. H., & Brow, M. A. D. (1988). DNA sequencing with Thermus aquaticus DNA polymerase and direct sequencing of polymerase chain reaction-amplified DNA. Proceedings of the National Academy of Sciences of the United States of America, 85(24), 9436–9440. https://doi.org/10.1073/pnas.85.24.9436
Stemmer, W. P. C., Crameri, A., Ha, K. D., Brennan, T. M., & Heyneker, H. L. (1995). Single-step assembly of a gene and entire plasmid from large numbers of oligodeoxyribonucleotides. Gene, 164(1), 49–53. https://doi.org/10.1016/0378-1119(95)00511-4
Alonso, A., Martín, P., Albarrán, C., García, P., García, O., Fernández De Simón, L., García-Hirschfeld, J., Sancho, M., De La Rúa, C., & Fernández-Piqueras, J. (2004). Real-time PCR designs to estimate nuclear and mitochondrial DNA copy number in forensic and ancient DNA studies. Forensic Science International, 139(2–3), 141–149. https://doi.org/10.1016/j.forsciint.2003.10.008
Yeh, S. H., & Mink, C. A. M. (2012). Bordetella pertussis and Pertussis (Whooping Cough). In Netter’s Infectious Disease (pp. 11–14). Elsevier Inc. https://doi.org/10.1016/B978-1-4377-0126-5.00003-3
Kwok, S., Mack, D. H., Mullis, K. B., Poiesz, B., Ehrlich, G., Blair, D., Friedman-Kien, A., & Sninsky, J. J. (1987). Identification of human immunodeficiency virus sequences by using in vitro enzymatic amplification and oligomer cleavage detection. Journal of Virology, 61(5), 1690–1694. https://doi.org/10.1128/jvi.61.5.1690-1694.1987
Cai, H. Y., Caswell, J. L., & Prescott, J. F. (2014). Nonculture Molecular Techniques for Diagnosis of Bacterial Disease in Animals: A Diagnostic Laboratory Perspective. In Veterinary Pathology (Vol. 51, Issue 2, pp. 341–350). https://doi.org/10.1177/0300985813511132
Bustin, S. A., Benes, V., Garson, J. A., Hellemans, J., Huggett, J., Kubista, M., Mueller, R., Nolan, T., Pfaffl, M. W., Shipley, G. L., Vandesompele, J., & Wittwer, C. T. (2009). The MIQE guidelines: Minimum information for publication of quantitative real-time PCR experiments. Clinical Chemistry, 55(4), 611–622. https://doi.org/10.1373/clinchem.2008.112797
Quill, E. (2008). Medicine: Bood-matching goes genetic. In Science (Vol. 319, Issue 5869, pp. 1478–1479). https://doi.org/10.1126/science.319.5869.1478
Garibyan, L., & Avashia, N. (2013). Polymerase chain reaction. Journal of Investigative Dermatology, 133(3), 1–4. https://doi.org/10.1038/jid.2013.1
Movert, E., Wu, Y., Lambeau, G., Kahn, F., Touqui, L., & Areschoug, T. (2013). Using Patient Pathways to Accelerate the Drive to Ending Tuberculosis. Journal of Infectious Diseases, 208(12), 2025–2035. https://doi.org/10.1093/INFDIS
Lawyer, F. C., Stoffel, S., Saiki, R. K., Chang, S. Y., Landre, P. A., Abramson, R. D., & Gelfand, D. H. (1993). High-level expression, purification, and enzymatic characterization of full-length Thermus aquaticus DNA polymerase and a truncated form deficient in 5′ to 3′ exonuclease activity. Genome Research, 2(4), 275–287. https://doi.org/10.1101/gr.2.4.275
Pombert, J. F., Sistek, V., Boissinot, M., & Frenette, M. (2009). Evolutionary relationships among salivarius streptococci as inferred from multilocus phylogenies based on 16S rRNA-encoding, recA, secA, and secY gene sequences. BMC Microbiology, 9, 232. https://doi.org/10.1186/1471-2180-9-232
Chien, A., Edgar, D. B., & Trela, J. M. (1976). Deoxyribonucleic acid polymerase from the extreme thermophile Thermus aquaticus. Journal of Bacteriology, 127(3), 1550–1557. https://doi.org/10.1128/jb.127.3.1550-1557.1976
Sharkey, D. J., Scalice, E. R., Christy, K. G., Atwood, S. M., & Daiss, J. L. (1994). Antibodies as thermolabile switches: High temperature triggering for the polymerase chain reaction. Bio/Technology, 12(5), 506–509. https://doi.org/10.1038/nbt0594-506
Carr, A. C., & Moore, S. D. (2012). Robust quantification of polymerase chain reactions using global fitting. PLoS ONE, 7(5), e37640. https://doi.org/10.1371/journal.pone.0037640
Rhizobium, G. E. (2013). Complete Genome Sequence of the Sesbania Symbiont and Rice. Nucleic Acids Research, 1(1256879), 13–14. https://doi.org/10.1093/nar
Pavlov, A. R., Pavlova, N. V., Kozyavkin, S. A., & Slesarev, A. I. (2004). Recent developments in the optimization of thermostable DNA polymerases for efficient applications. In Trends in Biotechnology (Vol. 22, Issue 5, pp. 253–260). https://doi.org/10.1016/j.tibtech.2004.02.011
Determining Annealing Temperatures for Polymerase Chain Reaction. (2012). The American Biology Teacher, 74(4), 256–260. https://doi.org/10.1525/abt.2012.74.4.9
Cheng, S., Fockler, C., Barnes, W. M., & Higuchi, R. (1994). Effective amplification of long targets from cloned inserts and human genomic DNA. Proceedings of the National Academy of Sciences of the United States of America, 91(12), 5695–5699. https://doi.org/10.1073/pnas.91.12.5695
Saiki, R., Gelfand, D., Stoffel, S., Scharf, S., Higuchi, R., Horn, G., Mullis, K., & Erlich, H. (1988). Primer-directed enzymatic amplification of DNA with a thermostable DNA polymerase. Science, 239(4839), 487–491. https://doi.org/10.1126/science.239.4839.487
Saiki, R. K., Scharf, S., Faloona, F., Mullis, K. B., Horn, G. T., Erlich, H. A., & Arnheim, N. (1985). Enzymatic amplification of β-globin genomic sequences and restriction site analysis for diagnosis of sickle cell anemia. Science, 230(4732), 1350–1354. https://doi.org/10.1126/science.2999980
2 notes · View notes
sixth-light · 6 years
Note
hey this is uni anon again and I wanted to say thank you for the first genuinely helpful piece of advice I have gotten over the course of 2 years. also if you had a list of popular science reading recs that would be so immensely helpful, the last time I did anything close to this was when I was deciding on the topic of my seminar paper (german education system, yay) and that mainly consisted of reading Wikipedia articles about early 1900s murder conspiracy theories which isn't really helpful rn
Popular science recs, coming right up! (I will note if you’re in Germany there’s a bit less wiggle room so definitely make sure you get to grips with prerequisities and what you have to take to complete a degree in a specific field - but I know there’s lots of Germans here who can give you more specific advice on that.)
BiologyAlmost Like A Whale (Steve Jones) - evolution in generalThe Emperor Of All Maladies (Siddartha Mukherjee) - cancer biology and medicineI Contain Multitudes (Ed Yong) - microbes! microbes microbes microbes. Other Minds (Peter Godfrey-Smith) - octopuses and intelligence
GeologyLab Girl (Hope Jahren) - a memoir, but one that revolves around geobiology and palaeoclimate sciencePale Blue Dot (Carl Sagan) - space exploration and planetary geologyKrakatoa (Simon Winchester) - VOLCANOES (he also wrote a good one on the San Franciscon 1905 earthquake)
ChemistryUncle Tungsten (Oliver Sacks) - a chemistry primer/memoir comboThe Poisoner’s Handbook (Deborah Bloom) - forensic toxicology in Jazz Age New York
Psychology/AnthropologySapiens (Yuval Noah Harari) - the evolution of our species The Man Who Mistook His Wife For A Hat (Oliver Sacks) - case studies in weird brain things 
Maths/computersThe Code Book (Simon Singh) - cryptography
PhysicsThe Elegant Universe (Brian Greene) - prob a bit outdated now, but made string theory vaguely comprehensible to meThe Glass Universe (Dana Sobel) - a social history of female astronomers in 19thC AmericaHidden Figures (Margot Lee Shetterley) - you may have seen the movie, but the book is equally good and can get into more detail about the scienceE=MC2 (David Bodanis) - how the famous equation works, with some great side-trips into things like how Norwegians on skis stopped the Nazis getting the nuclear bomb
There is also a lot of good science writing out there on the internet - for long-form articles I particularly recommend Ed Yong and the magazines Wired and Scientific American. Also, some of these books are pretty long and this list is intended as a “try this” list, not a “you should read the whole thing” list. 
I’m going to throw this out to my followers - any other great popular science book recs, especially in the areas where I have fewer and/or written by women? 
101 notes · View notes
lastsonlost · 6 years
Text
A circumcision masterpost for anyone who needs it..
THIS IS THE FUNCTIONALITY YOU LOSE TO CIRCUMCISION
Frenar Band, or Ridged Band                                                                              The frenar band is a group of soft ridges near the junction of the inner and outer foreskin. This region is the primary erogenous zone of the intact male body. Loss of this delicate belt of densely innervated, sexually responsive tissue reduces the fullness and intensity of sexual response. [Source: Taylor, J. R. et al., “The Prepuce: Specialized Mucosa of the Penis and Its Loss to Circumcision,” British Journal of Urology 77 (1996): 291-295.]                                                                                                                                                                                            
Mechanical Gliding Action                                                                                The foreskin’s gliding action is a hallmark feature of the normal, natural, intact penis. This non-abrasive gliding of the penis in and out of its own shaft skin facilitates smooth, comfortable, pleasurable intercourse for both partners. Without this gliding action, the corona of the circumcised penis can function as a one-way valve, making artificial lubricants necessary for comfortable intercourse. [Source: P. M. Fleiss, MD, MPH, “The Case Against Circumcision,” Mothering: The Magazine of Natural Family Living (Winter 1997): 36-45.]                                                                                              
Meissner’s Corpuscles                                                                                            Circumcision removes the most important sensory component of the foreskin - thousands of coiled fine-touch receptors called Meissner’s corpuscles. Also lost are branches of the dorsal nerve, and between 10,000 and 20,000 specialized erotogenic nerve endings of several types. Together these detect subtle changes in motion and temperature, as well as fine gradations in texture. [Sources: 1. R. K. Winkelmann, “The Erogenous Zones: Their Nerve Supply and Its Significance,” Proceedings of the Staff Meetings of the Mayo Clinic 34 (1959): 39-47. 2. R. K. Winkelmann, “The Cutaneous Innervation of Human Newborn Prepuce,” Journal of Investigative Dermatology 26 (1956): 53-67.]                                                                                                    
Frenulum                                                                                               The frenulum is a highly erogenous V-shaped structure on the underside of the glans that tethers the foreskin. During circumcision it is frequently either amputated with the foreskin or severed, which destroys or diminishes its sexual and physiological functions. [Sources: 1. Cold, C, Taylor, J, “The Prepuce,” BJU International 83, Suppl. 1, (1999): 34-44. 2. Kaplan, G.W., “Complications of Circumcision,” Urologic Clinics of North America 10, 1983.]                                                                                              
Dartos Fascia                                                                                               Circumcision removes approximately half of this temperature-sensitive smooth muscle sheath which lies between the outer layer of skin and the corpus cavernosa. [Source: Netter, F.H., “Atlas of Human Anatomy,” Second Edition (Novartis, 1997): Plates 234, 329, 338, 354, 355.]                                                                                                                                                                                            
Immunological System                                                                                      The soft mucosa (inner foreskin) contains its own immunological defense system which produces plasma cells. These cells secrete immunoglobulin antibodies as well as antibacterial and antiviral proteins, including the pathogen killing enzyme lysozyme. [Sources: 1. A. Ahmed and A. W. Jones, “Apocrine Cystadenoma: A Report of Two Cases Occurring on the Prepuce,” British Journal of Dermatology 81 (1969): 899-901. 2. P. J. Flower et al., “An Immunopathologic Study of the Bovine Prepuce,” Veterinary Pathology 20 (1983):189-202.]                                                                                              
Lymphatic Vessels                                                                                               The loss of these vessels due to circumcision reduces the lymph flow within that part of the body’s immune system. [Source: Netter, F.H., “Atlas of Human Anatomy,” Second Edition (Novartis, 1997): plate 379.]                                                                                                    
Estrogen Receptors                                                                                                The presence of estrogen receptors within the foreskin has only recently been discovered. Their purpose is not yet understood and needs further study. [Source: R. Hausmann et al., “The Forensic Value of the Immunohistochemical Detection of Oestrogen Receptors in Vaginal Epithelium,” International Journal of Legal Medicine 109 (1996): 10-30.]                                                                                              
Apocrine Glands                                                                                               These glands of the inner foreskin produce pheromones - nature’s powerful, silent, invisible behavioral signals to potential sexual partners. The effect of their absence on human sexuality has never been studied. [Source: A. Ahmed and A. W. Jones, “Apocrine Cystadenoma: A Report of Two Cases Occurring on the Prepuce,” British Journal of Dermatology 81 (1969): 899-901.]                                                                                              
Sebaceous Glands                                                                                               The sebaceous glands may lubricate and moisturize the foreskin and glans, which is normally a protected internal organ. Not all men have sebaceous glands on their inner foreskin. [Source: A. B. Hyman and M. H. Brownstein, “Tyson’s Glands: Ectopic Sebaceous Glands and Papillomatosis Penis,” Archives of Dermatology 99 (1969): 31-37.]                                                                                                                                                                                          
Langerhans Cells                                                                                               These specialized epithelial cells are a component of the immune system in the penis. [Source: G. N. Weiss et al., “The Distribution and Density of Langerhans Cells in the Human Prepuce: Site of a Diminished Immune Response?” Israel Journal of Medical Sciences 29 (1993): 42-43.]                                                                                              
Natural Glans Coloration                                                                                  The natural coloration of the glans and inner foreskin (usually hidden and only visible to others when sexually aroused) is considerably more intense than the permanently exposed and keratinized coloration of a circumcised penis. The socio-biological function of this visual stimulus has never been studied.                                                                                  ——–    The glans ranges from pink to red to dark purple among intact men of Northern European ancestry, and from pinkish to mahagony to dark brown among intact men of Color. If circumcision is performed on an infant or young boy, the connective tissue which protectively fuses the foreskin and glans together is ripped apart. This leaves the glans raw and subject to infection, scarring, pitting, shrinkage, and eventual discoloration. Over a period of years the glans becomes keratinized, adding additional layers of tissue in order to adequately protect itself, which further contributes to discoloration. Many restoring men report dramatic changes in glans color and appearance, and that these changes closely mirror the natural coloration and smooth, glossy appearance of the glans seen in intact men.                                                                              ———    [Source: P. M. Fleiss, MD, MPH, “The Case Against Circumcision,” Mothering: The Magazine of Natural Family Living (Winter 1997): 36-45.]                                                                                                
Length and Circumference                                                                                     Circumcision removes some of the length and girth of the penis - its double-layered wrapping of loose and usually overhanging foreskin is removed. A circumcised penis is truncated and thinner than it would have been if left intact. [Source: R. D. Talarico and J. E. Jasaitis, “Concealed Penis: A Complication of Neonatal Circumcision,” Journal of Urology 110 (1973): 732-733.]                                                                                              
Blood Vessels                                                                                                Several feet of blood vessels, including the frenular artery and branches of the dorsal artery, are removed in circumcision. The loss of this rich vascularization interrupts normal blood flow to the shaft and glans of the penis, damaging the natural function of the penis and altering its development. [Sources: 1. H. C. Bazett et al., “Depth, Distribution and Probable Identification in the Prepuce of Sensory End-Organs Concerned in Sensations of Temperature and Touch; Thermometric Conductivity,” Archives of Neurology and Psychiatry 27 (1932): 489-517. 2. Netter, F.H., “Atlas of Human Anatomy,” Second Edition (Novartis, 1997): plates 238, 239.]                                                                                                                                                                                            
Dorsal Nerves                                                                                                  The terminal branch of the pudendal nerve connects to the skin of the penis, the prepuce, the corpora cavernosa, and the glans. Destruction of these nerves is a rare but devastating complication of circumcision. If cut during circumcision, the top two-thirds of the penis will be almost completely without sensation. [Sources: 1. Agur, A.M.R. ed., “Grant’s Atlas of Anatomy,” Ninth Edition (Williams and Wilkins, 1991): 188-190. 2. Netter, F.H., “Atlas of Human Anatomy,” Second Edition (Novartis, 1997): plate 380, 387.]                                                                                              
Other Losses
                                                                                           - Circumcision performed during infancy disrupts the bonding process between child and mother. There are indications that the innate sense of trust in intimate human contact is inhibited or lost. It can also have significant adverse effects on neurological development.                                                                                              
-Additionally, an infant’s self-confidence and hardiness is diminished by forcing the newborn victim into a defensive psychological state of “learned helplessness” or “acquired passivity” to cope with the excruciating pain which he can neither fight nor flee.                                                                                              
- The trauma of this early pain lowers a circumcised boy’s pain threshold below that of intact boys and girls. This has been proven in a study during vaccination time. [Sources: 1. R. Goldman, Circumcision: The Hidden Trauma (Boston: Vanguard Publications, 1997), 139-175. 2. A. Taddio et al., “Effect of Neonatal Circumcision on Pain Responses during Vaccination in Boys,” Lancet 345 (1995): 291-292.]                                                                                              
- Every year some boys lose their entire penises from circumcision accidents and infections. They are then “sexually reassigned” by castration and transgender surgery, and are expected to live their lives as females. [Sources: 1. J. P. Gearhart and J. A. Rock, “Total Ablation of the Penis after Circumcision with Electrocautery: A Method of Management and Long-Term Followup,” Journal of Urology 142 (1989):799-801. 2. M. Diamond and H. K. Sigmundson, “Sex Reassignment at Birth: Long-Term Review and Clinical Implications,” Archives of Pediatrics and Adolescent Medicine 151 (1997): 298-304.]
-Every year many boys in the United States and elsewhere lose their lives as a result of circumcision - a fact that is routinely ignored or obscured.
[Sources: 1. G. W. Kaplan, “Complications of Circumcision,” Urologic Clinics of North America 10 (1983): 543-549. 2. R. S. Thompson, “Routine Circumcision in the Newborn: An Opposing View,” Journal of Family Practice 31 (1990): 189-196.
NOT LONG ENOUGH FOR YOU? I DIDN’T THINK SO EITHER.
MORE ON “THE HEALTHIER THAN DEALING WITH STIGMA” ARGUMENT..
let’s talk infant maintenance:
n babies, the foreskin is completely fused to the head of the penis. You cannot and should not retract it to clean it, as this would cause the child pain, and is akin to trying to clean the inside of a baby girl’s vagina. The infant foreskin is perfectly designed to protect the head of the penis and keep feces out. All you have to do is wipe the outside of the penis like a finger. It is harder to keep circumcised baby’s penis clean because you have to carefully clean around the wound, make sure no feces got into the wound, and apply ointment. The foreskin separates and retracts on its own sometime between age 3 and puberty. Before it retracts on its own, you wipe the outside off like a finger. After it retracts on its own, it will get clean during the boy’s shower or bath.  There is nothing special that the parents need to do.
let’s talk about risk and side effects:
Removal of healthy tissue from a non-consenting patient is, in itself, harm (more on this point later). Circumcision has an number of risks and side effects. There is a 1-3% complication rate during the newborn period alone (Schwartz 1990).
Here is a short list potential complications.
Meatal Stenosis: Many circumcised boys and men suffer from                           meatal stenosis. This is a narrowing of the urethra which can interfere with urination and require surgery to
fix.Adhesions. Circumcised babies can suffer from
adhesions, where the foreskin remnants try to heal to the head of the penis in an area they are not supposed to grow on.                                                Doctors treat these by ripping them open with no anesthesia.Buried penis. Circumcision can lead to trapped or buried penis – too much skin is removed, and so the penis is forced inside the body.
This can lead to problems in adulthood when the man does not have enough skin to have a comfortable erection. Some men even have their skin split open when they have an erection. There are even more sexual consequences, which we will address in a future post.
Infection. The circumcision wound can become infected. This is especially dangerous now with the prevalence of hospital-acquired multi-drug resistant bacteria.
Death. Babies can even die of circumcision. Over 100 newborns die each year in the USA, mostly from loss of blood and infection (Van Howe 1997 & 2004, Bollinger 2010).
All of these dangers are not at all risked if you simply don’t circumcize your child, and all of these dangers are incredibly reduced in likelyhood if at a later time the child makes the decision on their own after puberty in their late teens to early adult hood.
medical misinformation:
Medical advice may have promoted infection in uncircumcised males. A shocking number of doctors are uneducated about the normal development of the foreskin, and they (incorrectly) tell parents that they have to retract the baby’s foreskin and wash inside it at every diaper change. Doing this tears the foreskin and the tissue (called synechia) that connects it to the head of the penis, leading to scarring and infection.American doctors receive little medical school education on the care and treatment of the intact penis. The curriculums assume that all men will be circumcised.
Doctors in America are trained to circumcise. Hence, when an American doctors encounters an intact penis with a minor problem his first recommendation is circumcision.Misinformation was especially prevalent during the 1950s and 60s, when most babies were circumcised and we didn’t know as much about the care of the intact penis, which is why the story is always about someone’s uncle. Doing this to a baby boy would be like trying to clean the inside of a baby girl’s vagina with Q-tips at every diaper change. Rather than preventing problems, such practices would cause problems by introducing harmful bacteria. Remember that humans evolved from animals, so no body part that required special care would survive evolutionary pressures.
The human genitals are wonderfully self-cleaning and require no special care.Also, in medicine we only treat the sick, injured or diseased. We do not prescribe medications preemptively. We do not perform preemptive surgery until there is a real problem. We do not prescribe antibiotic until there is evidence of infection. We do not perform tonsillectomies until there is repeated tonsillitis.  We do not perform mastectomies until there is cancer or a proven high risk of cancer. So why should circumcision be any different?
on the subject of urinary tract infection:
Girls have a 3 times higher rate of UTI than boys. Yet no one suggests cutting girls genitals to prevent UTI.  When a girl gets a UTI, she is simply prescribed antibiotics. The same treatment works for boys. The UTI claim is based on one study that looked at charts of babies born in one hospital (Wiswell 1985). The study had many problems, including that it didn’t accurately count whether or not the babies were circumcised, whether they were premature and thus more susceptible to infection in general, whether they were breastfed (breastfeeding protects against UTI), and if their foreskins had been forcibly retracted (which can introduce harmful bacteria and cause UTI) (Pisacane 1990). There have been many studies since which show either no decrease in UTI with circumcision, or else an increase in UTI from circumcision. Thus circumcision is not recommended to prevent UTI (Thompson 1990).
How does male circumcision protect against HIV infection? SHORT ANSWER: IT DOESN'T
Robert Szabo, medical resident a,  Roger V Short, professor b.
a Faculty of Medicine, Monash University, Wellington Road, Melbourne 3168, Australia, bDepartment of Obstetrics and Gynaecology, University of Melbourne, Royal Women’s Hospital, 132 Grattan Street, Melbourne 3053, Australia
Correspondence to: R V Short
In his otherwise excellent review of the AIDS epidemic in the 21st century, Fauci presented no new strategies for preventing the spread of the disease.1 He made no mention of male [or female] circumcision, yet there is now compelling epidemiological evidence from over 40 studies which shows that male circumcision provides significant protection against HIV infection; circumcised males are two to eight times less likely to become infected with HIV.2
[The evidence is far from “compelling”. Each of the studies has its own flaws. See the relevant page of this site. The extraordinary history of circumcision as a panacea, and before that as a rite, strongly suggest that latter-day claims of prophylaxis should be regarded with a sceptical, if not jaundiced, eye. Few if any men can be truly neutral about circumcision. The temptation to justify what was done to oneself seems almost irresistible.]
Furthermore, circumcision also protects against other sexually transmitted infections, such as syphilis and gonorrhoea, 3 4 [This is contradicted by Laumann] and since people who have a sexually transmitted infection are two to five times more likely to become infected with HIV,5 circumcision may be even more protective. The most dramatic evidence of the protective effect of circumcision comes from a new study of couples in Uganda who had discordant HIV status; in this study the woman was HIV positive and her male partner was not.6 No new infections occurred among any of the 50 circumcised men over 30 months, whereas 40 of 137 uncircumcised men became infected during this time. [But as Peiperlpoints out, over one-third (29 out of 79) of the circumcised men in this study were HIV-positive before the study began.] Both groups had been given free access to HIV testing, intensive instruction about preventing infection, and free condoms (which were continuously available), but 89% of the men never used condoms, and condom use did not seem to influence the rate of transmission of HIV. [Why not? What’s going on? Did circumcision status influence the rate of usage of condoms?] These findings should focus the spotlight of scientific attention onto the foreskin. [No, on the condoms or their use] Why does its removal reduce a man’s susceptibility to HIV infection? [This is the fallacy of post hoc ergo propter hoc, after this therefore because of this. Circumcision does not take place in a social vacuum. What is associated with circumcision and intactness in Ugandan society? It very commonly goes with religion, for example, and religion in turn influences sexual practice in a variety of ways:
choice of partner
degree of monogamy
use of alcohol and hence unprotected sex
attitudes towards homosexuality]
Summary points
The majority of men who are HIV positive have been infected through the penis [In some parts of the world perhaps, but not all.]
_____________________________________________________________
There is conclusive epidemiological evidence to show that uncircumcised men are at a much greater risk of becoming infected with HIV than circumcised men [No, there is some very debatable, highly selective evidence.] _____________________________________________________________
The inner surface of the foreskin contains Langerhans’ cells with HIV receptors; these cells are likely to be the primary point of viral entry into the penis of an uncircumcised man [Equally, the Langerhans’ cells may have a protective function. Their function is certainly not to receive HIV, as the term “HIV receptors” implies.] _____________________________________________________________
Male circumcision should be seriously considered as an additional means of preventing HIV in all countries with a high prevalence of infection [The Roman Senator Cato would finish every speech, no matter its subject, with “Therefore, Carthage must be destroyed”. This refrain, like that one, tolls like a knell through the literature on HIV and circumcision. There are many other factors that must be considered before moving from a dubious correlation to passionate advocacy.]  The development of HIV receptor blockers, which could be applied to the penis or vagina before intercourse, might provide a new form of HIV prevention
Methods
To compile the information for this review a Medline search was done using the terms circumcision, HIV, Langerhans’ cells, penis, foreskin, and prepuce, and extensive email correspondence with other researchers was also undertaken. Histological observations were carried out on samples of penile tissue obtained from 13perfusion fixed cadavers of men aged 60-96 years, seven of whom had been circumcised. [The advanced age of the men from whom the samples were taken, in considering a process that is age-related, throws suspicion on this work.]
The pathogenesis of sexually acquired HIV infection
Between 75% and 85% of cases of HIV infection worldwide have probably occurred during sexual activity.7 Most cases of primary HIV infection are thought to involve HIV binding initially to the CD4 and CCR5 receptors found on antigen presenting cells - which include macrophages, Langerhans’ cells, and dendritic cells - in the genital and rectal mucosa.
The most widely accepted model for the sexual transmission of HIV is based on infection of the genital tract of rhesus macaques with simian immunodeficiency virus. 8 9 After female macaques are inoculated intravaginally with simian immunodeficiency virus, the virus targets the Langerhans’ cells located in the vaginal mucosa. [And do Short and Szabo consider advocating the amputation of vaginal mucosa? The fatal sexism of a policy that protects men but not women, compared with one that protects both, such as condom use, is not considered.] Once infected, these cells fuse with adjacent CD4 lymphocytes and migrate to deeper tissues. Within two days of infection, the virus can be detected in the internal iliac lymph nodes and shortly thereafter in systemic lymph nodes. This ultimately leads to a fatal infection.
Similarly, infection in male macaques occurs when simian immunodeficiency virus is inoculated into the penile urethra or onto the foreskin; the same sequence of cellular events involving the infection of Langerhans’ cells is then likely to occur.9 Infected Langerhans’ cells have also been detected in the penile mucosa of male rhesus macaques that have chronic simian immunodeficiency virus infection.9 In humans, histological studies have identified antigen presenting cells in the mucosa of the inner foreskin and urethra.10 Therefore it seems likely that antigen presenting cells at these mucosal sites are the primary target for HIV in men.
In vitro studies have shown that the CD4 receptor is generally necessary, although insufficient on its own, to permit HIV-1 to enter host cells.11 The entry of HIV-1 into cells requires an additional chemokine receptor, usually CCR5, although CXCR4 is used by cells that become infected during the later stages of the disease.12 After primary infection occurs, the virus mutates, which allows it to utilise other chemokine receptors, such as CXCR4, and thus spread to a variety of cell types. However, more than 99% of HIV-1 isolates from acutely infected patients are homologous, indicating that one specific variant is likely to be responsible for most cases of primary HIV infection.13 HIV variants that are transmitted to other individuals almost invariably use CCR5 as a coreceptor and are therefore named R5 viruses, to reflect their specific requirement for a coreceptor.14
How HIV enters the penis
About 70% of men infected with HIV have acquired the virus through vaginal sex, and a smaller number have acquired it from insertive anal intercourse.7 Thus, on a global scale most men who are HIV positive have acquired the virus via the penis. This raises questions of how HIV enters the penis and why men who are uncircumcised are potentially more susceptible to becoming infected with HIV.
The uncircumcised penis consists of the penile shaft, glans, urethral meatus, inner and outer surface of the foreskin, and the frenulum, the thin band connecting the inner foreskin to the ventral aspect of the glans. A keratinised, stratified squamous epithelium covers the penile shaft and outer surface of the foreskin. This provides a protective barrier against HIV infection. [There is no evidence for this claim.] In contrast, the inner mucosal surface of the foreskin is not keratinised15 and is rich in Langerhans’ cells,10 making it particularly susceptible to the virus. [Again, this is conjecture.] This is particularly important because during heterosexual intercourse the foreskin is pulled back down the shaft of the penis, and the whole inner surface of the foreskin is exposed to vaginal secretions, providing a large area where HIV transmission could take place. [In that case, why are women, with the much greater area of their vaginal surfaces, not vastly more susceptible to HIV infection from men?]
There is controversy about whether the epithelium of the glans in uncircumcised men is keratinised; some authors claim that it is not,15 but we have examined the glans of seven circumcised and six uncircumcised men […aged 60 to 96…], and found the epithelia to be equally keratinised. In circumcised males only the distal penile urethra is lined with a mucosal epithelium. However, this is unlikely to be a common site of infection because it contains comparatively few Langerhans’ cells.10 [This is an example of begging the question, assuming what you have to prove.]
Ulcerative or inflammatory lesions of the penile urethra, foreskin, frenulum, or glans that are caused by other sexually transmitted infections may provide additional potential routes for HIV transmission. In uncircumcised males, the highly vascular frenulum is particularly susceptible to trauma during intercourse, [It is equally so in circumcised males - if it has not been ablated - and in addition traumas and tearing of the scarred ring are only possible in circumcised men] and lesions produced by other sexually transmitted infections commonly occur there. Thus, male circumcision further reduces the risk of infection by reducing the synergy that normally exists between HIV and other sexually transmitted infections.5
Conclusions
Of the estimated 50 million people infected with HIV worldwide, about half are men, most of whom have become infected through their penises
[… and a vast number of whom were circumcised].
The inner surface of the foreskin, which is rich in HIV receptors, and the frenulum, a common site for trauma and other sexually transmitted infections, must be regarded as the most probable sites for viral entry in primary HIV infection in men.
 [“Must”? Yet a vast number of them don’t have one.]
Although condoms must remain the first choice for preventing the sexual transmission of HIV, they are often not used consistently or correctly, they may break during use, and there may be strong cultural and aesthetic objections to using them. Cultural and religious attitudes towards male circumcision are even more deeply held,
[and the perfectly rational view that it reduces sexual pleasure, and the human rights issue of consent]
but in the light of the evidence presented here circumcising males seems highly desirable,
 [“Desirable”? A strange choice of word, suggesting a sexual rather than rational motivation]especially in countries with a high prevalence of HIV infection. [Yet Ethiopia and the US already have high prevalences of both HIV infection and circumcision.]
Although neonatal circumcision is easy to perform, and has a low incidence of complications,16[Other references cite much higher rates] it would be 15-20 years before a programme of circumcision had any effect on HIV transmission rates. Circumcision at puberty, as practised by many Muslim communities, would be the most immediately effective intervention for reducing HIV transmission since it would be done before young men are likely to become sexually active
[… and knew what they had been deprived of].
It may also be time to re-think the definition of “safe sex.” Since the penis is the probable site of viral entry, neither infected semen nor vaginal secretions should be allowed to come in contact with the penis, particularly in uncircumcised males. Thus, mutual male masturbation during which a penis is exposed to the potentially infected semen of another male should be regarded as risky sexual behaviour.
[Szabo and Short present no evidence for this claim. They have reasoned backward from their analysis of the literature of heterosexual transmission.]
Let’s not even get started on Africa & FAILED HIV/STD PREVENTION:
Three studies in Africa several years ago claimed that circumcision prevented HIV transmission and that circumcision was as effective as a 60% effective vaccine (Auvert 2005, 2006). These studies had many flaws, including expectation bias (both researcher and participant), selection bias, lead-time bias, attrition bias, duration bias, and early termination that favored the treatment effect the investigators were hoping for. (Van Howe, Storms 2011: How the circumcision solution in Africa will increase HIV infections.)It as been suggested that the researchers tailored the studies to reach the conclusions they wanted. Read more about how circumcision is a dangerous mistake for HIV prevention.There have also been several studies that show that circumcision does not prevent HIV (Connolly 2008).
There are many issues at play in the spread of STDs which make it very hard to generalize results from one population to another.In Africa, where the recent studies have been done, most HIV transmission is through male-female sex, but in the USA, it is mainly transmitted through blood exposure (like needle sharing) and male-male sex. Male circumcision does not protect women from acquiring HIV, nor does it protect men who have sex with men (Wawer 2009, Jameson 2009).
What’s worse, because of the publicity surrounding the African studies, men in Africa are now starting to believe that if they are circumcised, they do not need to wear condoms, which will increase the spread of HIV (Westercamp 2010). Even in the study with the most favorable effects of circumcision, the protective effect was only 60% – men would still have to wear condoms to protect themselves and their partners from HIV.
In the USA, during the AIDS epidemic of the 1980s and 90s, about 85% of adult men were circumcised (much higher rates of circumcision than in Africa), and yet HIV still spread.It is important to understand, too, that the men in the African studies were adults and they volunteered for circumcision. Babies undergoing circumcision were not given the choice to decide for themselves.
Recent studies have demonstrated that circumcised men are at increased risk of contracting gonorrhea, syphilis and genital warts. Men are at equal risk for developing human papillomavirus lesions and herpesvirus infections regardless of circumcision status. At least four studies have shown human immunodeficiency virus infection to occur more commonly in circumcised men.
SEXUAL INTERCOURSE… CIRCUMCISED VERSUS UNCIRCUMCISED:
The function of the foreskin for women in intercourse is to seal the natural lubrication inside the vagina and provide a gentle internal massaging action. The intact penis moves in and out of its foreskin, which provides a frictionless, rolling, gliding sensation.
Intact men tend to make shorter strokes that keep their bodies in contact with the clitoris more, thus aiding female orgasm (O’Hara 1999). On the other hand, the circumcised penis functions like a piston during intercourse – the head of the penis actually scrapes the lubrication out of the vagina with each stroke.
As the man thrusts, his skin rubs against the vaginal entrance, causing discomfort, and sometimes pain (O’Hara 1999, Bensley 2001). Far from making sex better for women, circumcision decreases female satisfaction.
In a landmark study of US women, 85% who had experienced both circumcised and intact men preferred sex with intact men. Sex with a circumcised man was associated with pain, dryness and difficulty reaching orgasm (O’Hara 1999). In another study, women were twice as likely to reach orgasm with an intact man (Bensley 2003). Even when a woman said she preferred a circumcised partner, she had less dryness and discomfort with intact men (O’Hara 1999).
Men who are circumcised are 60% more likely to have difficulty identifying and expressing their feelings, which can cause marital difficulties (Bollinger 2010). Circumcised men are 4.5 times more likely to be diagnosed with erectile dysfunction, use drugs like Viagra, and to suffer from premature ejaculation (Bollinger 2010, Tang 2011).
Men who were circumcised as adults experienced decreased sensation and decreased quality of erection, and both they and their partners experienced generally less satisfaction with sex (Kim 2007, Solinis 2007).
The foreskin contains several special structures that increase sexual pleasure, including the frenulum and ridged band (the end of the foreskin where it becomes internal), both of which are removed in circumcision.
The LEAST sensitive parts of the foreskin are more sensitive than the MOST sensitive parts of the circumcised penis (Sorrells 2007).
In other words, if you wanted to decrease a penis’ sensitivity the most, circumcision would be the ideal surgery.
The foreskin has nerves called fine-touch receptors which are clustered in the ridged band (Cold 1999). This type of nerve is also found in the lips and fingertips. To get an idea of the sensation these nerves provide, try this experiment: first lightly stroke your fingertip over the back of the other hand. Now stroke your fingertip over the palm of your hand. Feel the difference?
That is the kind of sensation the foreskin provides, and the circumcised man is missing. It may feel like the penis is overly sensitive to a circumcised man because there is little sensation left to indicate excitement, leading to unexpected premature ejaculation (a common problem with circumcised young men).
However, as circumcised penises age they become calloused and much less sensitive.
It is documented that circumcised adult males exhibit a greater tendency to engage in risky sexual behavior. Hooykaas and colleagues reported that circumcised men in the Netherlands engage in more risky sexual behavior and have markedly higher rates of STDs. Laumann and colleagues reported more risky sexual behavior amongst circumcised men in the United States and have higher rates of STDs.
Michael et al.reported more variability in sexual behavior, less condom usage, and more STD amonst the predominantly circumcised population of the United States as compared with the predominantly non-circumcised intact males of the United Kingdom.
Do you STILL NEED MORE  sources? HERE YOU GO…!!
Intactivist linksThis list is mostly an effort to consolidate old bookmarks and fix links I’d bookmarked that were broken. It’ll be updated as I find new links, or have to fix broken links. Be aware that links to images or videos are probably NSFW, given that this is a discussion involving genitals.
let's pretend Halloween is around the corner with some circumcision horror stories both domestic and abroad.
A dozen men are ambushed, stripped naked and forced to undergo circumcisions in Kenya after their wives complained that they were not as good in bed.
A 14-Year Old Kenya Boy Recounts Torture, Forced Circumcision
Kenyan men in hiding fearing circumcision
S. African boys saved from forced circumcision:
Kenya: Men Circumcised by Force in Luhya Tribe Ceremony
A Florida mother took her son into hiding to avoid circumcision.
Child forced to undergo circumcision has been diagnosed with leukemia
Forced Circumcisions For Ugandan Males Over 15
(Godfrey Olukya) The Ugandan town of Mbale was brought to a standstill on Tuesday afternoon, as a naked man ran through the streets, with more than 50 men in pursuit. He was fleeing a forced circumcision.
Islamic State (ISIS) FUCKING ISIS forcefully circumcised Assyrian Christian men
32 boys dead in South African botched circumcisions by ill-trained traditional surgeons.
Half a million boys killed and hospitalised by tribal circumcision
Testimony from the Global Survey of Circumcision
Some writing on the topic:
No Justification for routine neonatal circumcision, part 1, fallacious medical arguments
No Justification for routine neonatal circumcision, part 2, unmerited social support The first article includes a lot of links to information supporting the assertions I’ve made.
Those links are also included among the links below on this page.
Videos:
Doctor Discusses Circumcision Controversy
The Prepuce Anatomy and Physiology of the Foreskin Video I originally had linked here was removed from youtube, but this one is excellent.
Child Circumcision: An Elephant in the Hospital   ♦
Whose body, whose rights
Difference Between: Male & Female Circumcision
Discussion after screening of the movie “Cut.”
Related to Cut, the Film: Debate with Rabbi Shmuley Boteach Eli Ungar-Sargon offers facts and logic; Rabbi Shmuley preaches, ridicules, and mocks, even after hearing evidence.
Brian D Earp, scientist and ethicist; discusses why there’s no moral difference between male and female circumcision. ††
More from Brian D Earp on comparing male circumcision to female circumcision †††
Brian D. Earp; Female genital mutilation and male circumcision: toward an autonomy-based ethical framework
The Penis - Sex education 101  ††††
Water Bear Brigade: Circumcision, male and female
Doctors on Circumcision:
doctorsopposingcircumcision.org/
Doctors Opposing Circumcision HIV Statement
Medical Association Position Statements
Doctors Opposing Circumcision - Publications
Medical Organizations Statements on Circumcision
How the circumcision solution in Africa will increase HIV infections
Circumcision as a prophylactic against STIs and cancer
NORM COHEN: Circumcision AIDS Fraud
U.S. Navy Finds That Circumcision Does Not Prevent HIV or STIs
Male Circumcision and the HIV/AIDS Myth
Circumcision and Sexually Transmitted Infections
Circumstitions.com: Circumcision and the HIV prevention myth
Circumcision in HIV-infected men and its effect on HIV transmission to female partners in Rakai, Uganda: a randomised controlled trial
PrePex in Rwanda: Male Circumcision Associated with Higher HIV Transmission and Higher Profits
Sub-Saharan and African randomized clinical trials into male circumcision and HIV transmission: Methodological, ethical, and legal concerns
STD prevalence over time: Europe vs U.S.
American Cancer Society: Penile cancer and circumcision
Circumcision the most common risk factor for hepatitis B & C infection in men in Nigeria †
Phimosis: Is circumcision necessary?
Anatomy and function
Functions of the Foreskin: Purposes of the Prepuce
Fine-touch pressure thresholds in the adult penis
Study: Circumcision Removes Most Sensitive Parts
Damage
Leaked Audio Shows Doctors’ Association LYING About Effects Of Circumcision On The Penis
Ritual circumcision and risk of autism spectrum disorder in 0- to 9-year-old boys: national cohort study in Denmark
Adult Circumcision Outcomes Study: Effect on Erectile Function, Penile Sensitivity, Sexual Activity and Satisfaction
Alexithymia and Circumcision Trauma: A Preliminary Investigation
Circumcisionharm.org
Male circumcision and sexual function in men and women: a survey-based, cross-sectional study in Denmark Circumcision was associated with frequent orgasm difficulties in Danish men and with a range of frequent sexual difficulties in women, notably orgasm difficulties, dyspareunia and a sense of incomplete sexual needs fulfillment.
Estimated U.S. Incidence of Neonatal Circumcision Complications (physical only) Affecting Males Born between 1940 and 1990
100+ circumcision deaths each year in United States
Lost Boys: An Estimate of U.S. Circumcision-Related Infant Deaths
Toddler’s tragic death after circumcision
Baby dies in circumcision
A Gallery of Botched Circumcisions[NSFW]
Male Circumcision: Pain, Trauma and Psychosexual Sequelae
Study Links Circumcision to Personality Trait Disorder
Other Research:
72 peer-reviewed studies
Circumcision and law
Is circumcision legal? Does it matter?
Changes in the practice
Circumcision: Then and Now (How the procedure has become more dramatic)
Timeline of the medicalization of circumcision **
From Ritual to Science, the Medical Transformation of Circumcision in America
Mythbusting
Myths about Circumcision You Likely Believe
More Circumcision Myths You May Believe: Hygiene and STDs
NoCirc PA (archive) Myths vs Facts
Follow the money:
Circumcision: Who Profits?
Wrinkle Treatment Uses Babies’ Foreskins
Interest in circumcision more than foreskin deep
Sale of Neonatal Dermal Fibroblasts is quite lucrative.
Hair Loss Treatment Uses Baby Foreskins
Human Foreskins are Big Business for Cosmetics
Babies’ foreskins used to make cosmetics. Is this ethical?
The Foreskin Mafia
American Bias (1) (2)
Circumfetish
NoCirc.com Articles on Circumcision
For Jewish Readers:
How “Cut” Saved My Son’s Foreskin: A Movie Review By Diane Targovnik
Cut, the film Q & A
Jewish Circumcision Critics Integral in National Circumcision Debate
Jewish Circumcision: An Alternative Perspective by Jenny Goodman, MD.
On Alternative Rituals by Ronald Goldman, Ph.D.
Jewish Intactivism: Circumcision Resources
Jewish Intactivism Part II
Jewish Intactivism Part III, More Jewish Parents Are Skipping Circumcision, Keeping New Sons Intact
Jewish Voices: The Current Judaic Movement to End Circumcision: Part 1
Jewish Voices: The Current Judaic Movement to End Circumcision: Part 2
Jewish Voices: The Current Judaic Movement to End Circumcision: Part 3
Jewish Circumcision Resource Center
Jews Against Circumcision
Beyond the Bris
Brit Shalom
What is a Jewish Bris Shalom (Covenant Without Cutting)? A ‘Bloodless Bris’ is Becoming Popular Among American Jews How Judaic is circumcision? An Israeli Hebrew scholar on Biblical intactivism.
100+ Rabbis and Celebrants who lead intact covenant ceremonies worldwide.
Song for a Brit Shalom.
Bris B'lee Milah Ceremony
A Bris Shalom Ceremony
Judaism, the Foreskin and Human Rights.
Rabbis on a Brit Shalom / Covenant without Circumcision
Humanistic Jewish Movement is Increasingly Intactivist
Jewish Ethical Advancement, the Foreskin, and Human Rights | Part 1.
Jewish Ethical Advancement, the Foreskin, and Human Rights | Part 2.
Jewish Ethical Advancement, the Foreskin, and Human Rights | Part 3.
Israeli Intactivist Groups (Mostly in Hebrew)
Israeli Association Against Circumcision / Intact Son
Protect the Child / Eran Saddeh
Kahal (Jewish & Israeli Parents of Intact Sons)
Intactivism Spreads in Israel. This Time by Jews. (Israeli Intactivist Ads)
Jewish Intactivist Resources and Groups
Cut: A Movie by a Jewish Intactivist.
Questioning Circumcision. A Jewish Perspective By Ron Goldman, Ph.D.
Beyond the Bris Weblog by Rebecca Wald.
Jews Against Circumcision (Bay Area)
Jewish Intactivist Families: Jewish Parents’ Experiences Keeping their Sons Intact.
Jewish Family in Vancouver Canada Opts for a Brit Shalom
A Jewish Father’s Brit Shalom Journey
Laura Stanley: A Jewish Woman and Midwife Denounces Circumcision
Tikkun: Michael Kimmel: The Kindest Un-Cut: Feminism, Judaism, and My Son’s Foreskin
Circumcision Questions (Letter from an Intact Jew). | Published in the Northern California Jewish Bulletin.
Jewish Daily Forward: Outlawing Circumcision: Good for the Jews? By Eli Ungar-Sargon. Published in the Jewish Daily Forward.
Dear Elijah: A Conservative Jewish Father’s Letter to His Intact Son | Published on Peaceful Parenting.
Stacey Greenberg: My Son: The Little Jew with a Foreskin
The debate on neonatal male circumcision isn’t and shouldn’t be about women, but here are some links for those who think it should.
How Male Circumcision Harms Women
Why feminists should be anti-circumcision
Similarities in Attitudes and Misconceptions toward Infant Male Circumcision in North America and Ritual Female Genital Mutilation in Africa
Neonatal circumcision vs female circumcision - though comparison should not matter to the discussion on the right or wrong of performing circumcision on infants, here are some links for those who think it should.
FGC vs MGC
Difference Between: Male & Female Circumcision
On the Good for the goose, good for the gander front, many arguments used to support neonatal circumcision are the same arguments used to support female circumcision
Female circumcision does not reduce sexual activity
The Association between Female Genital Mutilation ( FGM ) and the Risk of HIV/AIDS in Kenyan Girls and Women (15-49 Years)
Yes to female circumcision?
Medical benefits of female circumcision
INDONESIA: Health official claims ‘female circumcision is not genital mutilation’
Two studies have reported that FGC is associated with decreased risk of HIV.
*Note - many of these links I obtained either from
this page
or by researching broken/outdated links on it. I’ve put them here to have them in a place that’s easy to find. I will update this page as I run across new links.
135 notes · View notes
wolfliving · 5 years
Text
The PETRAS Internet of Things Research Hub
https://www.petrashub.org/outputs/
Ahlfeldt, G., Koutroumpis, P., & Valletti, T. (2017). Speed 2.0: Evaluating Access to Universal Digital Highways. Journal of the European Economic Association, 15(3), 586–625. Retrieved from http://dx.doi.org/10.1093/jeea/jvw013
Akmal, H., & Coulton, P. (2018). Using Heterotopias to Characterise Interactions in Physical/Digital Spaces. Retrieved from http://eprints.lancs.ac.uk/123792/
Alberts, G., Gurguc, Z., Koutroumpis, P., Martin, R., Muûls, M., & Napp, T. (2016). Competition and norms: A self-defeating combination? Energy Policy, 96, 504–523. Retrieved from https://spiral.imperial.ac.uk/bitstream/10044/1/33898/9/Competition and norms.pdf
Aldrich, R. J., & Richterova, D. (2018). Ambient accountability: intelligence services in Europe and the decline of state secrecy. West European Politics, 41(4), 1003–1024. http://doi.org/10.1080/01402382.2017.1415780 Anthi, E., Williams, L., & Burnap, P. (2018). Pulse: An adaptive intrusion detection for the Internet of Things. In Living in the Internet of Things: Cybersecurity of the IoT – 2018 (pp. 1–4). http://doi.org/10.1049/cp.2018.0035
Anthonysamy, P., Rashid, A., & Chitchyan, R. (2017). Privacy Requirements: Present & Future. In Proceedings of the 39th International Conference on Software Engineering: Software Engineering in Society Track (pp. 13–22). Piscataway, NJ, USA: IEEE Press. http://doi.org/10.1109/ICSE-SEIS.2017.3
Arapinis, M., Liu, J., Ritter, E., & Ryan, M. (2017). Stateful applied pi calculus: Observational equivalence and labelled bisimilarity. Journal of Logical and Algebraic Methods in Programming, 89, 95–149. http://doi.org/https://doi.org/10.1016/j.jlamp.2017.03.001
Asuquo, P., Cruickshank, H., Morley, J., Ogah, C. P. A., Lei, A., Hathal, W., … Sun, Z. (2018). Security and Privacy in Location-Based Services for Vehicular and Mobile Communications: An Overview, Challenges and Countermeasures. IEEE Internet of Things Journal, 1. http://doi.org/10.1109/JIOT.2018.2820039
Asuquo, P., Cruickshank, H., Ogah, C. P. A., Lei, A., & Sun, Z. (2018). A Distributed Trust Management Scheme for Data Forwarding in Satellite DTN Emergency Communications. IEEE Journal on Selected Areas in Communications, 36(2), 246–256. http://doi.org/10.1109/JSAC.2018.2804098
Bao, S., Hathal, W., Cruickshank, H., Sun, Z., Asuquo, P., & Lei, A. (2018). A lightweight authentication and privacy-preserving scheme for VANETs using TESLA and Bloom Filters. ICT Express. http://doi.org/10.1016/j.icte.2017.12.001
Beck, S., Finney, J., & Knowles, B. H. (2018). How Freya Built Sharkie: Initial explorations into the safety, security, and privacy concerns of children’s IoT devices. In London Computing Education Research Symposium. Retrieved from http://eprints.lancs.ac.uk/126151/
Binns, R. (2017). Fairness in Machine Learning: Lessons from Political Philosophy. ArXiv Preprint ArXiv:1712.03586. Retrieved from https://arxiv.org/abs/1712.03586
Binns, R., Van Kleek, M., Veale, M., Lyngs, U., Zhao, J., & Shadbolt, N. (2018). “It’s Reducing a Human Being to a Percentage”: Perceptions of Justice in Algorithmic Decisions. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (p. 377:1–377:14). New York, NY, USA: ACM. http://doi.org/10.1145/3173574.3173951
Blackstock, J. (2018). Standardising a Moving Target: The Development and Evolution of IoT Security Standards. IET Conference Proceedings, 24 (9 pp.)-24 (9 pp.)(1). Retrieved from http://digital-library.theiet.org/content/conferences/10.1049/cp.2018.0024
Blythe, J. M., Michie, S., Watson, J., & Lefevre, C. E. (n.d.). Internet of Things in Healthcare: Identifying key malicious threats, end-user protective and problematic behaviours. Retrieved from https://www.ucl.ac.uk/behaviour-change/events/presentations-17/blythe.pdf
Blythe, J. M., & Lefevre, C. E. (2017). Cyberhygiene Insight Report. Retrieved from https://iotuk.org.uk/wp-content/uploads/2018/01/PETRAS-IoTUK-Cyberhygiene-Insight-Report.pdf
Boyes, H., Hallaq, B., Cunningham, J., & Watson, T. (2018). The industrial internet of things (IIoT): An analysis framework. Computers in Industry, 101, 1–12. http://doi.org/https://doi.org/10.1016/j.compind.2018.04.015
Bradbury, M., & Jhumka, A. (2017). Understanding source location privacy protocols in sensor networks via perturbation of time series. In IEEE INFOCOM 2017 – IEEE Conference on Computer Communications (pp. 1–9). http://doi.org/10.1109/INFOCOM.2017.8057122
Bradbury, M., & Jhumka, A. (2017). A Near-Optimal Source Location Privacy Scheme for Wireless Sensor Networks. In 2017 IEEE Trustcom/BigDataSE/ICESS (pp. 409–416). http://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.265
Bradbury, M., Jhumka, A., & Leeke, M. (2018). Hybrid online protocols for source location privacy in wireless sensor networks. Journal of Parallel and Distributed Computing, 115, 67–81. http://doi.org/https://doi.org/10.1016/j.jpdc.2018.01.006
Brass, I. C. (2018). Standardising IoT Security: Implications for Digital Forensics. Digital Forensics Magazine, (35), 44–48. Retrieved from http://discovery.ucl.ac.uk/10050054/13/Brass_BRA001-pdf.pdf
Brass, I. C., Sowell, J., Carr, M., & Blackstock, J. (2017). The Role of Transnational Expert Associations in Governing the Cybersecurity Risks of the Internet of Things. International Public Policy Association. Retrieved from http://discovery.ucl.ac.uk/10054015/1/59530f6763ae8.pdf
Brass, I. (2017). Cybersecurity and Liability in Autonomous and Intelligent Transport.
Brass, I., Tanczer, L., Maple, C., Blackstock, J., & Carr, M. (2018). Unbundling the emerging cyber-physical risks in connected and autonomous vehicles. Retrieved from https://alerts.pinsentmasons.com/rs/emsdocuments/Future-of-the-Car-Whitepaper-Pinsent-Masons.pdf
Breza, M., Tomic, I., & McCann, J. (2018). Failures from the Environment, a Report on the First FAILSAFE Workshop. SIGCOMM Comput. Commun. Rev., 48(2), 40–45. http://doi.org/10.1145/3213232.3213238
Bures, T., Weyns, D., Schmer, B., Tovar, E., Boden, E., Gabor, T., … Tsigkanos, C. (2017). Software Engineering for Smart Cyber-Physical Systems: Challenges and Promising Solutions. SIGSOFT Softw. Eng. Notes, 42(2), 19–24. http://doi.org/10.1145/3089649.3089656
Calvo, J. L., Tindemans, S. H., & Strbac, G. (2016). Incorporating failures of System Protection Schemes into power system operation. Sustainable Energy, Grids and Networks, 8, 98–110. Retrieved from https://www.sciencedirect.com/science/article/pii/S2352467716301242
Cath, C., Wachter, S., Mittelstadt, B., Taddeo, M., & Floridi, L. (2018). Artificial Intelligence and the ‘Good Society’: the US, EU, and UK approach. Science and Engineering Ethics, 24(2), 505–528. http://doi.org/10.1007/s11948-017-9901-7
Catlow, R., Garrett, M., Jones, N., & Skinner, S. (2017). Artists Re: thinking the Blockchain (Vol. 1). Torque editions. Retrieved from http://eprints.lancs.ac.uk/124584/
Chen, S., Lach, J., Lo, B., & Yang, G.-Z. (2016). Toward Pervasive Gait Analysis With Wearable Sensors: A Systematic Review. IEEE J. Biomedical and Health Informatics, 20(6), 1521–1537. Retrieved from https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=7574303
Chizari, H., Lupu, E., & Thomas, P. (2018). Randomness of physiological signals in generation cryptographic key for secure communication between implantable medical devices inside the body and the outside world. Living in the Internet of Things: Cybersecurity of the IoT – 2018, 27 (6 pp.)-27 (6 pp.). http://doi.org/10.1049/cp.2018.0027
Choi, D.-W., Pei, J., & Heinis, T. (2017). Efficient Mining of Regional Movement Patterns in Semantic Trajectories. Proc. VLDB Endow., 10(13), 2073–2084. http://doi.org/10.14778/3151106.3151111
Coulton, P., & Lindley, J. (2017). Design Fiction: Anticipating Adoption. IEEE Pervasive Computing, 16(1), 43–47. http://doi.org/10.1109/MPRV.2017.5
Coulton, P., Lindley, J., & Cooper, R. (2018). The Little Book of Design Fiction. (C. Coulton, Ed.). Retrieved from https://www.petrashub.org/the-little-book-of-design-fiction-for-the-internet-of-things/
Craggs, B., & Rashid, A. (2017). Smart Cyber-Physical Systems: Beyond Usable Security to Security Ergonomics by Design. In 2017 IEEE/ACM 3rd International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS) (pp. 22–25). http://doi.org/10.1109/SEsCPS.2017.5
Davies, N., Clinch, S., Mikusz, M., Bates, O., Turner, H., & Friday, A. (2017). Better off: when should pervasive displays be powered down? In Proceedings of the 6th ACM International Symposium on Pervasive Displays (p. 19). ACM. Retrieved from https://core.ac.uk/download/pdf/83920831.pdf
Deligianni, F., Wong, C., Lo, B., & Yang, G. Z. (2018). A fusion framework to estimate plantar ground force distributions and ankle dynamics. Information Fusion. http://doi.org/10.1016/j.inffus.2017.09.008
Dianati, M., Shen, X., & Naik, S. (2005). A new fairness index for radio resource allocation in wireless networks. In IEEE Wireless Communications and Networking Conference, 2005 (Vol. 2, p. 712–717 Vol. 2). http://doi.org/10.1109/WCNC.2005.1424595
Edwards, M., Larson, R., Green, B., Rashid, A., & Baron, A. (2017). Panning for gold: Automatically analysing online social engineering attack surfaces. Computers & Security, 69, 18–34. http://doi.org/https://doi.org/10.1016/j.cose.2016.12.013
Floridi, L. (2018). Soft Ethics and the Governance of the Digital. Philosophy & Technology, 31(1), 1–8. http://doi.org/10.1007/s13347-018-0303-9
Floridi, L. (2016). Faultless responsibility: on the nature and allocation of moral responsibility for distributed moral actions. Phil. Trans. R. Soc. A, 374(2083), 20160112. Retrieved from http://rsta.royalsocietypublishing.org/content/374/2083/20160112
Floridi, L., & Taddeo, M. (2016). What is data ethics? Philosophical Transactions. Series A, Mathematical, Physical, and Engineering Sciences, 374(2083), 20160360. http://doi.org/10.1098/rsta.2016.0360
Furnell, S. (2018). Information security collaboration formation in organisations. IET Information Security, 12(3), 238–245(7). Retrieved from http://digital-library.theiet.org/content/journals/10.1049/iet-ifs.2017.0257
Ghirardello, K., Maple, C., Ng, D., & Kearney, P. (2018). Cyber security of smart homes: development of a reference architecture for attack surface analysis. Living in the Internet of Things: Cybersecurity of the IoT – 2018, 45 (10 pp.)-45 (10 pp.)(1). http://doi.org/10.1049/cp.2018.0045
Gu, C., Bradbury, M., & Jhumka, A. (2017). Phantom Walkabouts in Wireless Sensor Networks. In Proceedings of the Symposium on Applied Computing (pp. 609–616). New York, NY, USA: ACM. http://doi.org/10.1145/3019612.3019732
Gu, C., Bradbury, M., Kirton, J., & Jhumka, A. (2018). A decision theoretic framework for selecting source location privacy aware routing protocols in wireless sensor networks. Future Generation Computer Systems. http://doi.org/10.1016/j.future.2018.01.046
Hadian, A., & Heinis, T. (2018). Towards Batch-Processing on Cold Storage Devices. In 2018 IEEE 34th International Conference on Data Engineering Workshops (ICDEW) (pp. 134–139). http://doi.org/10.1109/ICDEW.2018.00028
Hay, D., Buyuklieva, B., Daothong, J., Edmonds, B., Hudson-Smith, A., Milton, R., & Wood, J. (2018). IoT in the wild: what negotiating public deployments can tell us about the state of the Internet of Things. Living in the Internet of Things: Cybersecurity of the IoT – 2018, 17 (6 pp.)-17 (6 pp.)(1). http://doi.org/10.1049/cp.2018.0017
He, H., Maple, C., Watson, T., Tiwari, A., Mehnen, J., Jin, Y., & Gabrys, B. (2016). The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence. In Evolutionary Computation (CEC), 2016 IEEE Congress on (pp. 1015–1021). IEEE. Retrieved from http://eprints.bournemouth.ac.uk/24677/1/He_et_al_IoT_Challenges_CEC_2016.pdf
Heinis, T., & Ailamaki, A. (2017). Data Infrastructure for Medical Research. Foundations and Trends® in Databases, 8(3), 131–238. http://doi.org/10.1561/1900000050
HM Government. (2015). Digital Built Britain Level 3 Building Information Modelling – Strategic Plan. Digital Built Britain, (February), 1–47. http://doi.org/URN BIS/15/155
Illiano, V. P., Paudice, A., Muñoz-González, L., & Lupu, E. C. (2018). Determining Resilience Gains From Anomaly Detection for Event Integrity in Wireless Sensor Networks. ACM Transactions on Sensor Networks (TOSN), 14(1), 5. Retrieved from https://spiral.imperial.ac.uk/handle/10044/1/55080
Ivanov, I., Maple, C., Watson, T., & Lee, S. (2018). Cyber security standards and issues in V2X communications for Internet of Vehicles. In Living in the Internet of Things: Cybersecurity of the IoT – 2018 (pp. 1–6). http://doi.org/10.1049/cp.2018.0046
Janeček, V. (2018). Ownership of personal data in the Internet of Things. Computer Law & Security Review, 34(5), 1039–1052. http://doi.org/https://doi.org/10.1016/j.clsr.2018.04.007
Jhumka, A., & Bradbury, M. (2017). Deconstructing Source Location Privacy-aware Routing Protocols. In Proceedings of the Symposium on Applied Computing (pp. 431–436). New York, NY, USA: ACM. http://doi.org/10.1145/3019612.3019655
Jhumka, A., & Mottola, L. (2016). Neighborhood view consistency in wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 12(3), 19. Retrieved from https://re.public.polimi.it/retrieve/handle/11311/1027581/213771/jhumka16view.pdf
Katsaros, K., & Dianati, M. (2017). A cost-effective SCTP extension for hybrid vehicular networks. Journal of Communications and Information Networks, 2(2), 18–29. Retrieved from https://link.springer.com/article/10.1007/s41650-017-0021-y
Kirton, J., Bradbury, M., & Jhumka, A. (2017). Source Location Privacy-Aware Data Aggregation Scheduling for Wireless Sensor Networks. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) (pp. 2200–2205). http://doi.org/10.1109/ICDCS.2017.171
Kleek, M. Van, Seymour, W., Binns, R., & Shadbolt, N. (2018). Respectful things: Adding social intelligence to “smart” devices. In Living in the Internet of Things: Cybersecurity of the IoT – 2018 (pp. 1–6). http://doi.org/10.1049/cp.2018.0006
Knowles, B., Finney, J., Beck, S., & Devine, J. (2018). What children’s imagined uses of the BBC micro:bit tells us about designing for their IoT privacy, security and safety. In Living in the Internet of Things: Cybersecurity of the IoT – 2018 (pp. 1–6). http://doi.org/10.1049/cp.2018.0015
Kolodenker, E., Koch, W., Stringhini, G., & Egele, M. (2017). PayBreak: Defense against cryptographic ransomware. In Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security (ASIACCS) (pp. 599–611). ACM (Association for Computing Machinery). Retrieved from http://www0.cs.ucl.ac.uk/staff/G.Stringhini/papers/ransomware-ASIACCS2017.pdf
Koutroumpis, P., & Leiponen, A. (2016). Crowdsourcing mobile coverage. Telecommunications Policy, 40(6), 532–544. Retrieved from https://www.sciencedirect.com/science/article/abs/pii/S0308596116000410
Langheinrich, M. (2018). Raising Awareness of IoT Sensor Deployments. IET Conference Proceedings, 9 (8 pp.)-9 (8 pp.)(1). Retrieved from http://digital-library.theiet.org/content/conferences/10.1049/cp.2018.0009
Latinopoulos, C., Sivakumar, A., & Polak, J. W. (2017). Response of electric vehicle drivers to dynamic pricing of parking and charging services: Risky choice in early reservations. Transportation Research Part C: Emerging Technologies, 80, 175–189. http://doi.org/https://doi.org/10.1016/j.trc.2017.04.008
Latinopoulos, C., Daina, N., & Polak, J. W. (2018). Trust in IoT-enabled mobility services: Predictive analytics and the impact of prediction errors on the quality of service in bike sharing. IET Conference Publications, 2018(CP740), 44 (7 pp.)-44 (7 pp.)(1). http://doi.org/10.1016/0013-7944(92)90299-T
Le Vine, S., Kong, Y., Liu, X., & Polak, J. (2017). Vehicle automation and freeway ‘pipeline’ capacity in the context of legal standards of care. Transportation. http://doi.org/10.1007/s11116-017-9825-8
Le Vine, S., & Polak, J. (2017). The impact of free-floating carsharing on car ownership: Early-stage findings from London. Transport Policy. http://doi.org/https://doi.org/10.1016/j.tranpol.2017.02.004
Lei, A., Cruickshank, H., Cao, Y., Asuquo, P., Ogah, C. P. A., & Sun, Z. (2017). Blockchain-based dynamic key management for heterogeneous intelligent transportation systems. IEEE Internet of Things Journal, 4(6), 1832–1843. Retrieved from https://ieeexplore.ieee.org/abstract/document/8010820
Li, T., Heinis, T., & Luk, W. (2017). ADvaNCE–Efficient and Scalable Approximate Density-Based Clustering Based on Hashing. Informatica, 28(1), 105–130. Retrieved from https://www.mii.lt/informatica/pdf/INFO1136.pdf
Lindley, J. G., & Coulton, P. (2017). On the Internet Everybody Knows You’re a Whatchamacallit (or a Thing). In CHI 2017 Workshop. Retrieved from http://eprints.lancs.ac.uk/84761/
Lindley, J. G., Coulton, P., & Akmal, H. (2018). Turning Philosophy with a Speculative Lathe: Object Oriented Ontology, Carpentry, and Design Fiction.
Lindley, J. G., Coulton, P., Akmal, H., & Knowles, B. H. (2017). Anticipating GDPR in Smart Homes Through Fictional Conversational Objects. Retrieved from http://eprints.lancs.ac.uk/87438/1/Anticipating_GDPR_in_Smart_Homes_Through_Fictional_Conversational_Objects.pdf
Lindley, J., Coulton, P., & Cooper, R. (2017). Why the Internet of Things needs Object Orientated Ontology. The Design Journal, 20(sup1), S2846–S2857. http://doi.org/10.1080/14606925.2017.1352796
Lindley, J., Coulton, P., & Cooper, R. (2017). Not on Demand: Internet of Things Enabled Energy Temporality. In Proceedings of the 2017 ACM Conference Companion Publication on Designing Interactive Systems (pp. 23–27). New York, NY, USA: ACM. http://doi.org/10.1145/3064857.3079112
Lindley, J., Coulton, P., & Sturdee, M. (2017). Implications for Adoption. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (pp. 265–277). New York, NY, USA: ACM. http://doi.org/10.1145/3025453.3025742
Liu, J., Jager, T., Kakvi, S. A., & Warinschi, B. (2018). How to build time-lock encryption. Designs, Codes and Cryptography, 86(11), 2549–2586. http://doi.org/10.1007/s10623-018-0461-x
Lo, B. P. L., Ip, H., & Yang, G.-Z. (2016). Transforming health care: body sensor networks, wearables, and the Internet of Things. Retrieved from https://spiral.imperial.ac.uk/bitstream/10044/1/33458/3/Transforming Heathcare v3_ed_BL_Oct 30 2015.pdf
Lombardi, F., Aniello, L., De Angelis, S., Margheri, A., & Sassone, V. (2018). A Blockchain-based Infrastructure for Reliable and Cost-effective IoT-aided Smart Grids. In Living in the Internet of Things: Cybersecurity of the IoT – 2018. http://doi.org/10.1049/cp.2018.0042
Lundbæk, L.-N., Janes Beutel, D., Huth, M., Jackson, S., Kirk, L., & Steiner, R. (2018). Proof of Kernel Work: a democratic low-energy consensus for distributed access-control protocols. Royal Society Open Science, 5(8). Retrieved from http://rsos.royalsocietypublishing.org/content/5/8/180422.abstract
Lustgarten, P., & Le Vine, S. (2018). Public priorities and consumer preferences for selected attributes of automated vehicles. Journal of Modern Transportation, 26(1), 72–79. http://doi.org/10.1007/s40534-017-0147-5
Mace, J. C., Morisset, C., Pierce, K., Gamble, C., Maple, C., & Fitzgerald, J. (2018). A multi-modelling based approach to assessing the security of smart buildings. IET. Retrieved from https://ieeexplore.ieee.org/abstract/document/8379718
Maxwell, D., Speed, C., & Pschetz, L. (2017). Story Blocks: Reimagining narrative through the blockchain. Convergence, 23(1), 79–97. http://doi.org/10.1177/1354856516675263
Mike, D., Susan, Y. L. W., Irene, C. L. N., & Carsten, M. (2017). Consumer Perceived Vulnerability, privacy calculus and information disclosure: an empirical investigation in retailer loyalty program. In Naples Forum on Service. Sorrento, Italy.
Mikusz, M., Bates, O., Clinch, S., Davies, N., Friday, A., & Noulas, A. (2016). Poster: Understanding Mobile User Interactions with the IoT. Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services Companion, 1(Jan 2015), 140. http://doi.org/10.1145/2938559.2938607
Mikusz, M., Clinch, S., Shaw, P., Davies, N., & Nurmi, P. (2018). Using Pervasive Displays to Aid Student Recall -Reflections on a Campus-Wide Trial. In Proceedings of the 7th ACM International Symposium on Pervasive Displays (p. 6:1–6:8). New York, NY, USA: ACM. http://doi.org/10.1145/3205873.3205882
Mikusz, M., Noulas, A., Davies, N., Clinch, S., & Friday, A. (2016). Next generation physical analytics for digital signage. In Proceedings of the 3rd International on Workshop on Physical Analytics (pp. 19–24). ACM. Retrieved from http://eprints.lancs.ac.uk/80300/1/Next_Generation_Physical_Analytics_for_Digital_Signage.pdf
Milton, R., Hay, D., Gray, S., Buyuklieva, B., & Hudson-Smith, A. (2018). Smart IoT and soft AI. IET Conference Publications, 2018(CP740), 16 (6 pp.)-16 (6 pp.)(1). http://doi.org/10.1049/cp.2018.0016
Milton, R., Buyuklieva, B., Hay, D., Hudson-Smith, A., & Gray, S. (2018). Talking to GNOMEs: Exploring Privacy and Trust Around Internet of Things Devices in a Public Space. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (p. LBW632:1–LBW632:6). New York, NY, USA: ACM. http://doi.org/10.1145/3170427.3188481
Mistry, M., D’Iddio, A. C., Huth, M., & Misener, R. (2018). Satisfiability modulo theories for process systems engineering. Computers & Chemical Engineering, 113, 98–114. http://doi.org/https://doi.org/10.1016/j.compchemeng.2018.03.004
Mittelstadt, B. (2017). From Individual to Group Privacy in Big Data Analytics. Philosophy & Technology, 30(4), 475–494. http://doi.org/10.1007/s13347-017-0253-7
Mittelstadt, B. (2017). Ethics of the health-related internet of things: a narrative review. Ethics and Information Technology, 19(3), 157–175. http://doi.org/10.1007/s10676-017-9426-4
Mittelstadt, B. (2017). Designing the Health-related Internet of Things: Ethical Principles and Guidelines. Information. http://doi.org/10.3390/info8030077
Mittelstadt, B. D., Allo, P., Taddeo, M., Wachter, S., & Floridi, L. (2016). The ethics of algorithms: Mapping the debate. Big Data & Society, 3(2), 2053951716679679. Retrieved from http://journals.sagepub.com/doi/pdf/10.1177/2053951716679679
Mukisa, S. S., & Rashid, A. (2017). Challenges of Privacy Requirements Modelling in V2X Applications: A Telematic Insurance Case Study. In 2017 IEEE 25th International Requirements Engineering Conference Workshops (REW) (pp. 97–103). http://doi.org/10.1109/REW.2017.48
Muñoz-González, L., & Lupu, E. C. (2019). The Security of Machine Learning Systems BT – AI in Cybersecurity. In L. F. Sikos (Ed.), (pp. 47–79). Cham: Springer International Publishing. http://doi.org/10.1007/978-3-319-98842-9_3
Ng, I. C. L., & Wakenshaw, S. Y. L. (2017). The Internet of Things: Review and Research Directions. International Journal of Research in Marketing, 34(1), 3–21. http://doi.org/10.1016/j.ijresmar.2016.11.003
Nissen, B., Symons, K., Tallyn, E., Speed, C., Maxwell, D., & Vines, J. (2017). New Value Transactions: Understanding and Designing for Distributed Autonomous Organisations. In Proceedings of the 2017 ACM Conference Companion Publication on Designing Interactive Systems (pp. 352–355). New York, NY, USA: ACM. http://doi.org/10.1145/3064857.3064862
Nurse, J. R. C., Creese, S., & Roure, D. De. (2017). Security Risk Assessment in Internet of Things Systems. IT Professional, 19(5), 20–26. http://doi.org/10.1109/MITP.2017.3680959
Nurse, J. R. C., Radanliev, P., Creese, S., & De Roure, D. (2018). If you can’t understand it, you can’t properly assess it! The reality of assessing security risks in Internet of Things systems. IET Conference Proceedings. http://doi.org/10.1049/cp.2018.0001
Oehmichen, A., Guitton, F., Sun, K., Grizet, J., Heinis, T., & Guo, Y. (2017). eTRIKS analytical environment: A modular high performance framework for medical data analysis. In 2017 IEEE International Conference on Big Data (Big Data) (pp. 353–360). http://doi.org/10.1109/BigData.2017.8257945
Olma, M., Tauheed, F., Heinis, T., & Ailamaki, A. (2017). BLOCK: Efficient Execution of Spatial Range Queries in Main-Memory. In Proceedings of the 29th International Conference on Scientific and Statistical Database Management (p. 15:1–15:12). New York, NY, USA: ACM. http://doi.org/10.1145/3085504.3085519
Pavlovic, M., Heinis, T., Tauheed, F., Karras, P., & Ailamaki, A. (2016). Transformers: Robust spatial joins on non-uniform data distributions. In Data Engineering (ICDE), 2016 IEEE 32nd International Conference on (pp. 673–684). IEEE. Retrieved from https://infoscience.epfl.ch/record/218595/files/ICDE16_research_179.pdf
Pavlovic, M., Zacharatou, E. T., Sidlauskas, D., Heinis, T., & Ailamaki, A. (2016). Space odyssey: efficient exploration of scientific data. ExploreDB@SIGMOD/PODS, 12–18. http://doi.org/10.1145/2948674.2948677
Perera, C., Wakenshaw, S. Y. L., Baarslag, T., Haddadi, H., Bandara, A. K., Mortier, R., … Crowcroft, J. (2016). Valorising the IoT Databox: creating value for everyone. Transactions on Emerging Telecommunications Technologies, 28(1), e3125. http://doi.org/10.1002/ett.3125
Pschetz, L., Tallyn, E., Gianni, R., & Speed, C. (2017). Bitbarista: Exploring Perceptions of Data Transactions in the Internet of Things. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (pp. 2964–2975). ACM. Retrieved from https://www.research.ed.ac.uk/portal/files/30037134/Submitted.pdf
Radanliev, P., De Roure, D. C., Nicolescu, R., Huth, M., Montalvo, R. M., Cannady, S., & Burnap, P. (2018). Future developments in cyber risk assessment for the internet of things. Computers in Industry, 102, 14–22. http://doi.org/https://doi.org/10.1016/j.compind.2018.08.002
Ravì, D., Wong, C., Deligianni, F., Berthelot, M., Andreu-Perez, J., Lo, B., & Yang, G. (2017). Deep Learning for Health Informatics. IEEE Journal of Biomedical and Health Informatics, 21(1), 4–21. http://doi.org/10.1109/JBHI.2016.2636665
Ravi, D., Wong, C., Lo, B., & Yang, G.-Z. (2017). A deep learning approach to on-node sensor data analytics for mobile or wearable devices. IEEE Journal of Biomedical and Health Informatics, 21(1), 56–64. Retrieved from http://discovery.ucl.ac.uk/10041080/1/Ravi.Deep Learning Approach.pdf
Rosa, B. M. G., & Yang, G. Z. (2016). Active implantable sensor powered by ultrasounds with application in the monitoring of physiological parameters for soft tissues. In Wearable and Implantable Body Sensor Networks (BSN), 2016 IEEE 13th International Conference on (pp. 318–323). IEEE. Retrieved from https://spiral.imperial.ac.uk/bitstream/10044/1/43464/2/BSN_paper_active_ultrasound_sensing_Bruno.pdf
Safa, N. S., Maple, C., Watson, T., & Von Solms, R. (2018). Motivation and opportunity based model to reduce information security insider threats in organisations. Journal of Information Security and Applications, 40, 247–257. http://doi.org/https://doi.org/10.1016/j.jisa.2017.11.001
Seymour, W. (2018). How Loyal is Your Alexa?: Imagining a Respectful Smart Assistant. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (p. SRC20:1–SRC20:6). New York, NY, USA: ACM. http://doi.org/10.1145/3170427.3180289
Smart, P., Madaan, A., & Hall, W. (2018). Where the smart things are: social machines and the Internet of Things. Phenomenology and the Cognitive Sciences. http://doi.org/10.1007/s11097-018-9583-x
Speed, C., Maxwell, D., & Pschetz, L. (2017). Data and the City: Blockchain City: Economic, social and cognitive ledgers (1st ed.). Routledge. Retrieved from https://www.routledge.com/Data-and-the-City/Kitchin-Lauriault-McArdle/p/book/9781138222632
Speed, C., & Oberlander, J. (2017). Centre for Design Informatics. Interactions, 24(2), 18–21. http://doi.org/10.1145/3047400
Stead, M., & Coulton, P. (2017). Old, Sick And No Health Insurance.: Will You Need A Permit To Use Your Home-made Health Wearable? In Proceedings of the 2017 ACM Conference Companion Publication on Designing Interactive Systems (pp. 101–105). New York, NY, USA: ACM. http://doi.org/10.1145/3064857.3079127
Stead, M., Coulton, P., & Lindley, J. (2018). Do-It-Yourself Medical Devices: Exploring Their Potential Futures Through Design Fiction.
Stringhini, G., Shen, Y., Han, Y., & Zhang, X. (2017). Marmite: Spreading Malicious File Reputation Through Download Graphs. In Proceedings of the 33rd Annual Computer Security Applications Conference (pp. 91–102). New York, NY, USA: ACM. http://doi.org/10.1145/3134600.3134604
Sun, Y., Wong, C., Yang, G., & Lo, B. (2017). Secure key generation using gait features for Body Sensor Networks. In 2017 IEEE 14th International Conference on Wearable and Implantable Body Sensor Networks (BSN) (pp. 206–210). http://doi.org/10.1109/BSN.2017.7936042
Taddeo, M. (2017). Trusting Digital Technologies Correctly. Minds and Machines, 27(4), 565–568. http://doi.org/10.1007/s11023-017-9450-5
Taddeo, M. (2017). Data Philanthropy and Individual Rights. Minds and Machines, 27(1), 1–5. http://doi.org/10.1007/s11023-017-9429-2
Taddeo, M. (2016). Data philanthropy and the design of the infraethics for information societies. Phil. Trans. R. Soc. A, 374(2083), 20160113. Retrieved from http://rsta.royalsocietypublishing.org/content/374/2083/20160113
Tallyn, E., Fried, H., Gianni, R., Isard, A., & Speed, C. (2018). The Ethnobot: Gathering Ethnographies in the Age of IoT. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (p. 604:1–604:13). New York, NY, USA: ACM. http://doi.org/10.1145/3173574.3174178
Tanczer, L. M., Steenmans, I., Elsden, M., Blackstock, J., & Carr, M. (2018). Emerging risks in the IoT ecosystem: Who’s afraid of the big bad smart fridge? Retrieved from http://discovery.ucl.ac.uk/10050092/1/Tanczer_et_al_Emerging_risks.pdf
Tanczer, L., Blythe, J., Yahya, F., Brass, I., Elsden, M., Blackstock, J., & Carr, M. (2018). DCMS Secure by Design:Literature Review of Industry Recommendations and International Developments on Iot Security. London. Retrieved from https://www.gov.uk/government/publications/secure-by-design
Tanczer, L., Carr, M., Brass, I., Steenmans, I., & Blackstock, J. J. (2017). IoT and Its Implications for Informed Consent. London. Retrieved from https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3117293
Tinati, R., Madaan, A., & Hall, W. (2017). The Role of Crowdsourcing in the Emerging Internet-Of-Things. In Proceedings of the 26th International Conference on World Wide Web Companion (pp. 1669–1672). Republic and Canton of Geneva, Switzerland: International World Wide Web Conferences Steering Committee. http://doi.org/10.1145/3041021.3051693
Tiropanis, T. (2018). Observing Data in IoT Worlds: What and How to Observe? IET Conference Proceedings, 32 (7 pp.)-32 (7 pp.)(1). Retrieved from http://digital-library.theiet.org/content/conferences/10.1049/cp.2018.0032
Tomić, I., & McCann, J. A. (2017). A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4(6), 1910–1923. Retrieved from https://spiral.imperial.ac.uk/bitstream/10044/1/53004/6/FINAL VERSION.PDF.pdf
Trotter, L., Harding, M., Mikusz, M., & Davies, N. (2018). IoT-Enabled Highway Maintenance: Understanding Emerging Cybersecurity Threats. IEEE Pervasive Computing, 17(3), 23–34. http://doi.org/10.1109/MPRV.2018.03367732
Turner, H. C. M., Chizari, H., & Lupu, E. (2018). Step intervals and arterial pressure in PVS schemes. IET Conference Publications, 2018(CP740), 36 (10 pp.)-36 (10 pp.)(1). http://doi.org/10.1093/ntr/ntq246
Ullah, F., Edwards, M., Ramdhany, R., Chitchyan, R., Babar, M. A., & Rashid, A. (2018). Data exfiltration: A review of external attack vectors and countermeasures. Journal of Network and Computer Applications, 101, 18–54. http://doi.org/https://doi.org/10.1016/j.jnca.2017.10.016
Van Kleek, M., Binns, R., Zhao, J., Slack, A., Lee, S., Ottewell, D., & Shadbolt, N. (2018). X-Ray Refine: Supporting the Exploration and Refinement of Information Exposure Resulting from Smartphone Apps. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (p. 393:1–393:13). New York, NY, USA: ACM. http://doi.org/10.1145/3173574.3173967
Van Kleek, M., Seymour, W., Veale, M., Binns, R., & Shadbolt, N. (2018). The Need for Sensemaking in Networked Privacy and Algorithmic Responsibility. In Sensemaking in a Senseless World: Workshop at ACM CHI’18, 22 April 2018, Montréal, Canada. ACM Conference on Human Factors in Computing Systems (CHI’18). Retrieved from http://discovery.ucl.ac.uk/10046886/
Veale, M., Binns, R., & Ausloos, J. (2018). When data protection by design and data subject rights clash. International Data Privacy Law.
Veale, M., Binns, R., & Van Kleek, M. (2018). Some HCI Priorities for GDPR-Compliant Machine Learning.
Wachter, S. (2018). Ethical and normative challenges of identification in the Internet of Things. IET Conference Proceedings, 13 (10 pp.)-13 (10 pp.)(1). Retrieved from http://digital-library.theiet.org/content/conferences/10.1049/cp.2018.0013
Wachter, S. (2018). GDPR and the Internet of Things: Guidelines to Protect Users’ Identity and Privacy. Retrieved from https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3130392
Wachter, S. (2018). Normative challenges of identification in the Internet of Things: Privacy, profiling, discrimination, and the GDPR. Computer Law & Security Review, 34(3), 436–449. http://doi.org/https://doi.org/10.1016/j.clsr.2018.02.002
Wachter, S., Mittelstadt, B., & Floridi, L. (2017). Why a Right to Explanation of Automated Decision-Making Does Not Exist in the General Data Protection Regulation. International Data Privacy Law, 7(2), 76–99. Retrieved from http://dx.doi.org/10.1093/idpl/ipx005
Wakenshaw, S. Y. L., Maple, C., Schraefel, M., Gomer, R., & Ghirardello, K. (2018). Mechanisms for Meaningful Consent in Internet of Things. Living in the Internet of Things: Cybersecurity of the IoT – 2018, 14 (10 pp.)-14 (10 pp.)(1). http://doi.org/10.1049/cp.2018.0014
Wakenshaw, S. Y. L., Dhamotharan, L., Ignatius, J., Ng, I. C. L., Ma, X., Chen, D., & Maple, C. (2017). Privacy, vulnerability, and willingness to share : an empirical investigation using latent growth curve model. In Data for Policy Conference. Retrieved from http://wrap.warwick.ac.uk/93828/
Wakenshaw, S. Y. L., Masi, D., Micillo, R., Godsell, J., & Maple, C. (2017). The Internet of Things? potential to achieve supply chain integration : a case study. In 21st Annual CIM Symposium – Globalisation 2.0. Retrieved from http://wrap.warwick.ac.uk/93833/
Wang, X., Madaan, A., Siow, E., & Tiropanis, T. (2017). Sharing Databases on the Web with Porter Proxy. In Proceedings of the 26th International Conference on World Wide Web Companion (pp. 1673–1676). Republic and Canton of Geneva, Switzerland: International World Wide Web Conferences Steering Committee. http://doi.org/10.1145/3041021.3051694
Weissbacher, M., Mariconti, E., Suarez-Tangil, G., Stringhini, G., Robertson, W., & Kirda, E. (2017). Ex-Ray: Detection of History-Leaking Browser Extensions. In Proceedings of the 33rd Annual Computer Security Applications Conference (pp. 590–602). New York, NY, USA: ACM. http://doi.org/10.1145/3134600.3134632
Xiang, W., Zheng, K., & Shen, X. S. (2016). 5G mobile communications. Springer. Retrieved from https://link.springer.com/book/10.1007%2F978-3-319-34208-5
Yang, G.-Z. (2018). Implantable Sensors and Systems: From Theory to Practice. Springer. Retrieved from https://link.springer.com/book/10.1007%2F978-3-319-69748-2
Yuan, H., Maple, C., Chen, C., & Watson, T. (2018). Cross-device tracking through identification of user typing behaviours. Electronics Letters, 54(15), 957–959. http://doi.org/10.1049/el.2018.0893
Yuan, H., Maple, C., & Ghirardello, K. (2018). Dynamic Route Selection for Vehicular Store-Carry-Forward Networks and Misbehaviour Vehicles Analysis. Retrieved from https://core.ac.uk/download/pdf/159768447.pdf
Yuan, H., Maple, C., Lu, Y., & Watson, T. (2018). Peer-assisted location authentication and access control for wireless networks. Internet Technology Letters, 0(0), e71. http://doi.org/10.1002/itl2.71
Zhao, C., Yang, S., Yang, X., & McCann, J. A. (2017). Rapid, User-Transparent, and Trustworthy Device Pairing for D2D-Enabled Mobile Crowdsourcing. IEEE Transactions on Mobile Computing, 16(7), 2008–2022. http://doi.org/10.1109/TMC.2016.2611575
1 note · View note
Text
Polygraph Tests: Efficacy and Utility Examined
By Emily Condon, University of Pennsylvania Class of 2021
October 9, 2019
Tumblr media
At an early age, the development of deception skills marks progress. Children as young as two
years old begin to concoct lies, often for personal benefit, and these lies reflect the ability of the child to anticipate consequences and others’ behavior. Lying never ceases to provide the opportunity for personal gain, and as humans develop, these opportunities may seem irresistible and weighted, especially in the context of a criminal investigation or career development. Polygraph examinations, colloquially dubbed ‘lie-detector tests,’ seek to measure these diversions from the truth in such settings, and while the mechanisms associated with the exam involve scientific measurements, the test has proven unreliable in most courts, inadmissible evidence. However, the polygraph exam persists, and along with its frequent appearances in movies and on reality television, the tool is used in job screenings and investigations with more frequency than its accuracy imposes. Below, we will examine the utility of this tool and discuss the role it continues to play, despite its suspect reliability.
The most common type of polygraph exam, which happens to be the one that’s most publicized in the media, is the Control Question Test (CQT). In the CQT, the examiner asks both general and specific questions. Specific questions relate to immediately relevant subject matter. For example, in the criminal investigation in the murder of a man by firearm, an examiner might ask the wife of the victim, “Did you shoot your husband in the chest last Tuesday night?” General questions relate to a person’s past, and ask, for example, “Have you ever violated someone’s trust?” (APA) The idea behind this bifurcated line of questioning is to ask general questions that are vague and difficult to answer completely truthfully in order to create a baseline level of anxiety. If the person is innocent, they will be more likely to show signs of anxiety about general questions, because they have definitive, clear answers to the specific questions. Using the example questions above, an innocent wife knows for sure that she didn’t shoot her husband but may fumble when it comes to the question of betraying trust, needing to think back. This creates a situation in which her biological responses indicate more anxiety about general questions rather than specific ones. However, a guilty wife knows she committed the crime, and won’t have the same reaction to specific questions because she must lie to maintain innocence, the lying process often eliciting biological responses linked to deception. (Stromberg, 2014)
In terms of mechanics, the polygraph exam is quite simple. Variation exists across machines, however, in general, examiners attach between four and six sensors to the subject, including finger sensors, chest straps, and a blood pressure cuff. These sensors and others serve to  measure the subject’s blood pressure, pulse, respiration rate, and perspiration, among other factors. A combination of these factors and strategic questioning yields physical results for interpretation by the examiner, designed to determine if the subject told the truth throughout his or her questioning. The idea is that when any one of these factors is elevated, breathing rate, pulse, and/or the other aforementioned items measured, the person can be assumed to be lying. (How Stuff Works) A large part of this alleged pseudoscience, however, proves subjective and manipulatable, and as there exists no biologically-based measure for deception, the test surely measures the correlation of biological symptoms, and subsequent findings aren’t as easy to corroborate. “‘There's no unique physiological sign of deception. And there's no evidence whatsoever that the things the polygraph measures — heart rate, blood pressure, sweating, and breathing — are linked to whether you're telling the truth or not,’ says Leonard Saxe, a psychologist at Brandeis University who's conducted research into polygraphs.” (Stromberg, 2014)
Another drawback and link in the chain of inadmissibility for this device is the fact that the test can be fooled, and subjects can markedly manipulate the accuracy of the test results. These tests can be stifled through many means, for example, by medication or psychological manipulation. Taking certain muscle relaxants or mind-altering drugs before a polygraph may inhibit the validity of a test, numbing a person to the stimuli and potentially blocking a natural biological reaction to the need to lie for oneself. It’s easy to see how taking a benzodiazepine, for example, designed to limit or inhibit a person’s anxiety, may impact the results of the exam. A person may also engage in thought-control to cause their body to artificially elicit biological responses at strategic moments to create areas of interest on the test results. Publication of these strategies is abundant, and suggests the success of these strategies, which devalue the accuracy of readings further.
The New York Times published an interview with a former Oklahoma City police detective and polygraph examiner named Doug Williams to explain the strategy behind mind control. “‘Before your test, practice deciphering between the two question types. “‘Go to the beach’” when you hear a relevant question, Williams says. Calm yourself before answering by imagining gentle waves and warm sand. When you get a control question, which is more general, envision the scariest thing you can in order to trigger physiological distress; the polygraph’s tubes around your chest measure breathing, the arm cuff monitors heart rate and electrodes attached to you fingertips detect perspiration. What is your greatest fear? Falling? Drowning? Being buried alive? “‘Picture that,’” Williams says.” (Wollan, 2015)
If these tests are so fallible, why do we still use them? One common use for polygraph testing is the screening of job candidates and employees. Those seeking employment with the NSA, CIA, and several other government agencies are often subject to polygraph tests. Additionally, the exams may be used as a scare tactic. The examiner may attempt to convince the subject that this test will reveal the complete truth, so he may as well confess. This strategy has the potential to lead to proof of guilt that may have otherwise flown under the radar, undetected by the exam. These tests may also be used as a deterrent, for example, in post-conviction sexual offender treatment programs. (Bear Forensics, 2019) If a person knows they’ll undergo polygraph testing related to their behavior, they may feel more inclined to perform only behaviors that won’t get them in trouble. (Cummins, 2019)
Clearly, the debate about the role of polygraphs in our society remains active. It’s clear that while polygraphs can point investigators in the right direction, they aren’t fool-proof. A large gap exists between the hard science of DNA testing, for example, and the alleged pseudoscience of interpreting manipulatable and subjective polygraph results, and therefore, it’s clear why most courts don’t allow polygraph testing as admissible evidence. The utility of the exam extends beyond court cases, though, and therefore, extinction of the exam is unlikely any time soon.
________________________________________________________________
(n.d.). Retrieved from https://www.hg.org/legal-articles/is-a-polygraph-test-admissible-as-evidence-31737.
(n.d.). Retrieved from https://www.apa.org/research/action/polygraph.
12 Common Lies That Cheaters Tell says: (2018, December 6).
Polygraph testing explained: Process and steps of a lie detector exam. Retrieved from https://bearforensics.com/2017/08/24/polygraph-testing-explained/.
Conti, A. (2014, November 18). Are Lie Detector Tests Complete... Retrieved from https://www.vice.com/en_us/article/qbeaeq/are-lie-detector-tests-complete-bullshit-1117.
Contributors, H. S. W. (2019, September 11). How Does a Lie Detector (Polygraph) Work? Retrieved from https://science.howstuffworks.com/question123.htm.
Cummins, E. (2019, March 18). Polygraph tests don't work as lie detectors and they never have. Retrieved from https://www.popsci.com/polygraph-test-science/.
Handler, M. (n.d.). Polygraph Frequently Asked Questions. Retrieved from https://apoa.memberclicks.net/polygraph-frequently-asked-questions.
Horton, S., Horton, S., Horton Law PLLC, & Horton Law PLLC. (2018, July 20). Polygraph Testing at Work. Retrieved from https://hortonpllc.com/polygraph-testing-work/.
Kismet, M. (2018, February 9). Polygraph Tests and How to Beat Them. Retrieved from https://owlcation.com/social-sciences/How-To-Beat-A-Polygraph-Test.
Stromberg, J. (2014, December 15). Lie detectors: Why they don't work, and why police use them anyway. Retrieved from https://www.vox.com/2014/8/14/5999119/polygraphs-lie-detectors-do-they-work.
Wollan, M. (2015, April 10). How to Beat a Polygraph Test. Retrieved from https://www.nytimes.com/2015/04/12/magazine/how-to-beat-a-polygraph-test.html.
0 notes
mwsa-member · 4 years
Text
MWSA Interview with Zita Fletcher
Date of interview: 19 January 2020 Zita Ballinger Fletcher (also known by the pen name Zita Steele) is a journalist, author and military history writer. She writes fiction and nonfiction books, and has published more than 10 works. With a background in art, she designs and illustrates her published work. She also produces videos and creates multimedia content. Zita is the author of the first published collection of Field Marshal Erwin Rommel’s wartime photography, an ongoing book series. Her areas of interest include World War II British and Commonwealth history and German Resistance. In addition to MWSA, Zita is a member of the British Military Historical Society and the Friends of the Fusilier Museum Warwick (conserving the history of the Royal Warwickshire Regiment) in the UK. Zita is also a member of the National Society of the Washington Family Descendants and the Daughters of the American Revolution (DAR). Zita is fluent in German. She attended the Honors College at the University of South Florida and graduated Magna Cum Laude with an Honors Degree in Social Sciences. Her writings have been published by: Military History magazine, World War II Quarterly journal, World War II History magazine, The National Rifle Association, The Max Kade Institute for German-American Studies, The Abraham Lincoln Association’s For the People Newsletter, North Irish Roots (UK), and the Journals of the Gloucestershire and Lincolnshire Family History Societies (UK). She is also a photographer. Visit Zita’s website at: http://www.fletcherpublishers.com/ Visit Zita’s Amazon Author profile: https://www.amazon.com/Zita-Steele/e/B009W3L5H8 MWSA: Would you recommend MWSA membership to other authors? Zita Fletcher: Definitely. MWSA provides so many resources for professional development and opportunities to learn from and connect with a wonderful community of fellow authors. I am happy to be part of the MWSA writing community and encourage all prospective authors to join. No matter what your experience level, you will find opportunities to learn, engage with others and share your story. MWSA: Please tell us a little about your writing background and philosophy. Zita Fletcher: I’ve been writing stories for as long as I can remember. I excelled at writing in school and loved storytelling. My earliest ambition was to write books. Besides writing, history and social studies were my strongest subjects in school. They continue to be my strongest subjects. In college, I majored in Social Sciences with concentrations in International Studies and Criminology. Within my discipline, I focused on criminal profiling and psychology. I earned many academic distinctions. After graduation, I strongly considered pursuing a career in Forensic Psychology. I ultimately decided to become a professional writer and am happy with my choice. As a journalist, I've enjoyed being able to share the stories and thoughts of many of our country’s veterans including a Marine medic who fought in the Battle of Guam, a Korean War veteran, wounded veterans who participated in the Warriors to Lourdes journey, a Medal of Honor recipient and others. As an American, I’m a strong believer in intellectual freedom and the human right to question. Freely exchanging opinions and firsthand learning are opportunities for discovery and enlightenment. Throughout my life I have rejected attempts by others to control or dictate what I think or believe. I became a political independent in college and remain so. I reject labels. I use the term “free thinker” to emphasize my philosophy of independently determining my beliefs and values. MWSA: Why do you write under a pen name as an author? Zita Fletcher: As a creative person, I like to have the flexibility of writing under a creative name to express myself. I use the pen name Zita “Steele.” The name “Steele” is a wordplay on steel metal. According to the Chinese zodiac and Five Element system, my element is Metal. I do not believe in astrology or horoscopes; I simply find this very cool. MWSA: When did you become interested in military matters? Zita Fletcher: My interest in war, soldiers and generals dates from an early age. As a child, I liked to play with toy knights instead of dolls. Also growing up in a Catholic house, I had a strong attraction to muscular male saints (often depicted with weapons) including St. Michael, St. George, and St. Sebastian. When I was 10, people were astonished to learn that my favorite movie was Ridley Scott’s “Gladiator.” I also amazed others when I bought Sun Tzu’s “Art of War” during a bookstore trip at about age 12. I was one of the only girls I knew who liked shooting games and war movies. On trips to museums, I was fascinated by guns, armor, swords and spears. In high school I was a voracious reader of ancient Roman war histories and keenly interested in samurai. One of my favorite TV shows was “Human Weapon.” I liked to watch the Military Channel, which is now called the American Heroes Channel. I think my interests surprised people who did not expect a feminine young lady to have such a strong attraction to warriors and military science. My genetic makeup is English, Irish, German, and Spanish—all ethnicities known for having great fighting spirit and strength of character. I was also born in the Chinese zodiac Year of the Horse. While I do not believe in astrology, some traits associated with the Horse accurately describe my personality. I was raised in a single-parent household; given my strong-willed nature, things could have been difficult. Thankfully my mom appreciated my free spirit and allowed me to be very independent growing up. In addition to military history, I’ve also had a lifelong interest in martial arts and sports. My favorite sports include mixed martial arts and fencing (foil); I started foil fencing at age 17, and still love it. MWSA: What do you like about military history? Zita Fletcher: One of the main reasons I love military history is because it is filled with courage, leadership and self-sacrifice. I like to learn about feats of bravery and strength. There is also a lot of warmth and humor among soldiers. I admire stories of brotherhood and great commanders who bonded with their troops. I’ve always been very curious about the international landscape—I love travel and foreign languages. This has led me to have keen interest in military history and theories from other countries. MWSA: Do you come from a military family? Zita Fletcher: My family history includes military tradition. My great-grandfather Edward W. Arnold was a U.S. Marine Corps instructor during World War I. My grandfather Ray A. Fletcher Sr. served as a medic in the U.S. Army Air Forces during World War II and as a Lieutenant Colonel in the Civil Air Patrol during the Korean War. My direct ancestor, Morris Gibbons, was a “bushwhacker” guerilla chief who led raids under Col. Joe Porter in Missouri during the Civil War. My other ancestors include a Southern cavalryman in Hampton’s Legion, several Revolutionary War-era militia captains, a British Royal Navy privateer, a Swiss-German mercenary who fought for the Duke of Marlborough and Spanish conquistadors. MWSA: Why do you speak German? Zita Fletcher: I studied German for many years as part of a personal journey to get in touch with my heritage. Aside from the rewarding experience of connecting with other people, this skill has also been priceless regarding military history. I’ve been able to do research at many German-language institutions in Europe, including the German Historical Museum in Berlin, the Jewish Museum of Berlin, the Nuremberg Trials Memorial, the Munich City Museum, the Museum of Military History in Vienna, and many other places. I find there is a void when it comes to sharing German history and perspectives with English readers—things get lost in translation, or just simply lost. I use my German language skills to research and share knowledge through my writing. MWSA: Where did your interest in British military history come from? Zita Fletcher: The first time I encountered the British military was through research on World War II North Africa for a project that started when I was 15. The desert war has remained a major interest for me ever since. I was impressed with the brave soldiers of the British Eighth Army. I learned so much from the compelling stories of these heroic men from England and the Commonwealth countries. I was also impressed with the Eighth Army’s leader, Field Marshal Bernard L. Montgomery. This led me to develop interests in other aspects of the British military and its rich history. I also personally relate to and admire British people and culture given my strong British heritage (Northern Irish + English). British history is a great source of inspiration to me. MWSA: Why did you decide to write a book series on Field Marshal Erwin Rommel? Zita Fletcher: Rommel is a controversial figure—but that is why he is interesting. We cannot ignore controversy if we want to learn from the past. Studying Rommel gives insights into the experiences of a German soldier who began his career in an era of turmoil, rose in the ranks and was ultimately killed by the Nazi system. There are many aspects of his story that are worth examining. What first got my attention regarding Rommel was his photography collection, which I found fascinating. I created my book series because I wanted to share my discoveries. Rommel is not the only general I find interesting. Other military leaders I’ve enjoyed studying include Hannibal, Yi Sun Shin, George Washington and T.E. Lawrence—and of course my favorite commander, Field Marshal Bernard Montgomery.
0 notes
edc-creations-blog · 5 years
Text
Maxine Listens by Dr. Lynda Mubarak (Book II, Detective Maxine Hill Series)
Young Detective Maxine Hill is always busy performing community service, investigating issues, and exploring future careers. However, Maxine is facing a special challenge this year. This time it’s very personal. Follow our little problem solver as she finds a solution for a unique situation. Detective Maxine HIll is on the case again and she’s on the way back! If you enjoyed Maxine’s New Job, you will like Book II of the series; Maxine Listens.
  Book Excerpt: Maxine Listens
  One afternoon Maxine Hill began to notice some changes in her vision during her math class. Her teacher, Mr. Norman, was explaining a process on the whiteboard and his writing was completely blurred. She knew she would eventually grow tired of asking Mr. Norman to repeat the instructions, even the ones written on the board. Maxine finally asked to be moved closer to the front of the class. After a few weeks she realized the new seating arrangement did not seem to be helping. Mr. Norman had also noticed her squinting her eyes on several occasions and decided to call Maxine’s mother, Mrs. Hill, and discuss the situation.
“Mr. Norman, I am so glad you brought this to our attention. I am noticing how Max has to adjust her glasses several times when we are working on a puzzle, playing Scrabble, or watching a movie. I’ll call our ophthalmologist and make an appointment immediately,” said Mrs. Hill.
Maxine did not like the sound of that. She did not enjoy visits to the doctor’s office, especially when her eyes had to be dilated.
“Oh no, not another eye appointment,” Maxine uttered in a slow moan. “The eye drops don’t hurt Mom, but the ride home is rough because the sun seems extra bright after my eyes are dilated.”
“I know honey, but Dr. Chambers has to look inside those beautiful brown eyes to see what’s going on,” Mrs. Hill replied.
Maxine smiled.
That night, Maxine sat on the couch with her Dad watching TV. When she briefly took her eyes off the screen she caught a glimpse of her cat, Amos. He was sitting on her mother’s favorite chair.
“Shoo Amos! Get down from there!” Maxine waved. Amos scurried off the chair onto the floor. “Wow!” she shouted, “I am so glad tomorrow is Friday! It’s been a busy week at school and I’m looking forward to enjoying the weekend.”
“Well,” replied Mrs. Hill, tapping her foot against the carpet, “if you want to enjoy the weekend then you better head upstairs and get ready for bed. It’s a school night. Do you know what time it is young lady?”
“Please Mom!” Maxine begged, “It’s only 9:30 and tomorrow is Friday.”
“I know honey,” said Mrs. Hill as she sat down on her favorite chair, “but you need all the rest you can get because we have your early morning appointment with Dr. Chambers. I have your doctor’s note prepared for the attendance office tomorrow explaining your late arrival, so go upstairs and get ready for bed. Right now!”
“OK Mom. I can’t believe I forgot all about my eye appointment. Nighty-night, Dad,” Maxine said reluctantly, dragging her feet across the floor and adjusting her glasses.
“What did you say Max?” Mr. Hill asked.
“I said . . . NIGHTY-NIGHT, DAD!” Maxine raised her voice and laughed.
Mr. Hill nodded and smiled as Maxine gave him a big hug, scooped up Amos and ran up the stairs. The next morning, Maxine and Mrs. Hill left early to avoid the traffic which seemed to swell between 6:30 am and 8:00 am, especially during the weekdays. Maxine noticed the construction workers drilling and operating the huge cranes as they passed the detour signs. The highway was filled with red dust blowing from the machinery.
“Mom, when are they going to finish this interstate? They have been working on this since I was in second grade,” said Maxine with a frown on her face. Mrs. Hill smiled, “Baby, you might be a senior in high school before it’s completed. Road construction sometimes lasts for years.” Maxine sighed, put her head back on the seat, closed her eyes and listened to her favorite musical group on the radio for the remainder of the ride.
After arriving at the doctor’s office, Maxine sat on the red leather chair next to Dr. Chambers’ rack of magazines, and began looking over the latest issues. Hmm, where are the kid’s magazines? I don’t want to read the Ladies Home Journal, thought Maxine. As soon as she found a copy of Sports Illustrated for Kids with an interesting article named “Girls on The Mound,” the receptionist walked into the patient waiting area with a folder in her hand and announced, “Maxine Hill.”
“OK Max, that’s us,” said Mrs. Hill.
Moments later, Maxine sat quietly as Dr. Chambers began his eye exam. “Max, your mom says you have been having some vision problems in class lately.”
“Yes, mostly in math class when I’m looking back and forth from the whiteboard to my notebook,” answered Maxine.
“Well, your exam shows no serious vision concerns, but your prescription needs to be upgraded for another pair of glasses. This is not unusual for your nearsightedness. We will discuss contacts as you get older. Until then, you will be just fine. However, I would like to see you in six months,” explained Dr. Chambers.
Mrs. Hill smiled and thanked Dr. Chambers. Maxine shook Dr. Chambers’ hand and walked out to the receptionist’s counter while her mom waited on the instructions for the next appointment. A few minutes later they left the doctor’s office and headed for B. H. Obama Elementary School.
As they walked to the car, Maxine said, “Mom, I saw some cool, round purple frames in the 20-20 Optical Store window in the mall last week. Can we take my new prescription there this weekend and see if they can measure them for me?”
“We sure can Max. It’s a deal,” Mrs. Hill gleamed.
( Continued… )
© 2019 All rights reserved. Book excerpt reprinted by permission of the author, Dr. Lynda Mubarak. Do not reproduce, copy or use without the author’s written permission. This excerpt is used for promotional purposes only.
Maxine Listens by Dr. Lynda Mubarak will be released on March 23, 2019 Picture Book for ages 6-10. Genre: Children’s Literature Purchase books:  https://www.amazon.com/Lynda-Mubarak/e/B01ELLYYGO
        Intimate Conversation with Dr. Lynda Mubarak
  BPM Describe yourself in three words. I am funny, optimistic and creative.
  BPM What drove you to publish your first book? How long have you been writing? I did not write my first book until I retired as a special education teacher and facilitator. I have been writing professionally for three years.
  BPM Introduce us to the people in the book, Maxine Listens. Give us some insight into your main speakers. The main characters in Maxine Listens are 5th grader student Maxine Hill and her parents, the Hills. Maxine is an only child with a pet cat named Amos. She spend hours reading, doing community service with her family at a local food pantry. Maxine enjoys solving mysteries, puzzles, and other family, neighborhood and school events. She is often told by her mom that she asks far too many questions. Her family thinks she may have a future career in law enforcement as a detective or in forensic science as an investigator or researcher. Maxine reads constantly, is president of her school book club, plays Scrabble with her BFF, Amanda Grayson, and often enrolls in courses offered at the local library including American Sign Language and Creative Writing. Mr. and Mrs. Hill are often amazed by Maxine’s interest in anything and everything from architecture and engineering to learning Mandarin Chinese.
  BPM Share one specific point in your book that resonated with your present situation or journey. Maxine’s mothers tells her, “Max, if you want to learn the truth about a person or a group of people, take some time to learn how they live, work and play.” I think so much time is spent analyzing or over-analyzing people or other cultures that we often forget that life experiences are different for all of us and we are all products of the events and backgrounds in our life. Your view of life can transition as you mature and grow. How you feel about a person or situation at 20 may be totally different by the time you reach 35. We all live our lives in phases.
  BPM Tell us about you most recent work with the community. I have a lifetime partnership with the Community Food Bank of Fort Worth, TX. A percentage of each book sold by Stations for Kids is donated to the food bank to assist families in need and displaced workers. I am honored to part of an organization that provides so much for so many!
  BPM What was one of the most surprising things you learned in creating your book? I was surprised by the families that related to my themes in my first and second Maxine books. The story topics are common to all families and Maxine offers some simple solutions to the challenges faced by each family in the stories. The solutions are doable and simple to implement.
  BPM Do you ever have days when writing is a struggle? Writers are often overcome with the term ‘writer’s block’. What I have discovered as many will affirm, is that ‘writer’s block’ is another term for distractions. Daily distractions keep you from focusing and remaining grounded until your book is completed. Finances, children, job issues, aging parents, ill family members, or personal medical issues can be a deterrent to your book project. It often becomes difficult to stay on course while keeping your purpose on target, and allowing your faith to provide the strength to forge ahead. You must select a time each day or on the weekend to pull away from everyone for a few hours and continue your writing journey. It is essential if you truly want to become an author.
  BPM What project are you working on at the present? I am currently completing Maxine’s Hands, Book 3 of the Detective Maxine Hill Series. Maxine continues to learn new concepts and apply her knowledge of community service anywhere it is needed. In progress is a Stations for Kids website which will be completely kid friendly and interactive.
  BPM What legacy to you hope to leave future generations of readers with your writing? I would like to instill a love of reading and writing to the readers of my writing. I want them to know that reading my book or other great literature will allow your mind to flourish, explore and navigate through life and its challenges. In addition, reading will increase your critical thinking skills and provide a way to understand mankind in general. They also need to know that everything you need to know about yourself and life has been recorded in a book somewhere.
  BPM What is your preferred method to have readers get in touch with or follow you? Readers can get in touch with me by email at [email protected]
Website: http://www.lyndamubarak.com Twitter: https://twitter.com/stationsforkids Facebook: https://www.facebook.com/lyndamubarak Amazon Page:  amazon.com/author/lyndamubarak.com IG: https://www.instagram.com/ljmubarakstationsforkids
    Maxine Listens by Dr. Lynda Mubarak (Book II, Detective Maxine Hill Series) Maxine Listens by Dr. Lynda Mubarak (Book II, Detective Maxine Hill Series) Young Detective Maxine Hill is always busy performing community service, investigating issues, and exploring future careers.
0 notes
all-about-us-media · 5 years
Photo
Tumblr media
All About Us Global Media Production welcomes our new Ambassador Of Cybersecurity and Technology Dr. Chanel Suggs (Duchess of Cybersecurity ®) is the Founder and CEO of Wyvern Security. She is a subject matter expert in Cyber Security, Forensics, Network Security, Cryptography, Information Assurance, and IT strategy. Dr Suggs will be a contributor to our Radio/Magazine coming in 2019. Dr. Suggs is a proven thought leader, and influencer whom advises clients regarding their security posture and works with clients to uncover and identify new and emerging threats. Dr. Suggs is a distinguished professor and speaker on cybersecurity, forensics, hacking and cryptography. She has an extensive background in managing, designing, implementing, and assessing cyber security risks, threats, and vulnerabilities. She was awarded 6 certifications through the National Security Agency (NSA) and Committee on National Security Systems (CNSSI). Dr. Suggs holds a Doctor of Science Cybersecurity, Masters Project Management, Master of Science Information Assurance, Masters of Networking and Communications, MBA and a Bachelor of Science in Computer Science. Dr. Suggs is certified CompTIA Advanced Security Practitioner (CASP), Certified Chief Information Security Officer (C| CISO), Certified Ethical Hacker (C| EH), Computer Hacking Forensic Investigator (CHFI), Certified EC- Council Instructor, EC- Council Security Analysis (ECSA), Certified Network Defense Architect (CNDA), CompTIA Security +, Access Data Mobile Phone Examiner (MPE), Information Technology Infrastructure Library (ITILv3) and Access Data Certified Examiner (ACE). Dr. Suggs provides solution to the most complex issues within the public and private sectors to ensure a better security posture and best practices. Duchess of Cybersecurity® www.DuchessofCyberSecurity.com Roger & Chevonna Johnson, Sr. The Whitney E. Johnson Foundation, Inc. AAU Global Media Production Group TV/Radio/Magazine/Blog www.wejfoundation.org #AAUGlobalMediaProductionGroup #DrChanelSuggs #DuchessofCybersecurity #Technology https://www.instagram.com/p/BrGe2gHlc67/?utm_source=ig_tumblr_share&igshid=wjut1y9ercr8
0 notes
forensicfield · 1 year
Text
Tumblr media Tumblr media
2 notes · View notes
Text
Murder, Maps, Mansions
This month sadly saw the last issue of IndiePicks Magazine. Below are the last of the mystery reviews I did for IndiePicks. They include one of my favorite books of this spring--Sujata Massey’s The Widows of Malabar Hill; historical fiction is not usually my thing, but I found this one a cut above the rest. Recently I also reviewed some non-mystery titles, including the outstanding Where the Animals Go (maps and infographics...you can’t go wrong) and The Country House Library, a look at the best appointed home libraries of old in Ireland and Britain.
IndiePicks Magazine
The Widows of Malabar Hill. Massey, Sujata. Soho House, $17.95, 9781616957780. The Widows of Malabar Hill is set in 1920s Bombay, where the city’s first female lawyer, Perveen Mistry, finds her gender for once working in her favor. Her lawyer father’s client dies and his three widows, Muslims who live in seclusion from the outside world, need representation. Perveen is a Parsi Zoroastrian, not a Muslim, but she’s compassionate and her kind nature and smarts are put to the test as she tries to help women who find themselves unprotected and in great danger. Over the course of the novel, readers also travel back in time to a few years before, when Perveen engages in a forbidden romance, a period that brings Parsi traditions to the fore. Those who enjoy stories about women using their wiles to make it in tough situations will relish this layered story and find a favorite character in Perveen, while soaking in the details of colonial-era India. This is one to give patrons who enjoyed Suzanne Joinson’s A Lady Cyclist’s Guide to Kashgar, which is set in a different place but the same era and has a similar feel. The Black Painting. Olson, Neil. Hanover House, $24.99, 9781335953810. It’s not exactly your traditional romance, but a years-long hidden affair is just one aspect of the supernaturally tinged family drama in The Black Painting. The book opens as a group of cousins, close as children but now living separate and far-flung lives, gather at their grandfather’s old-money Connecticut mansion. The patriarch has just been found dead, his horrified face staring at an empty space on the wall that, before its theft years ago, was home to the Black Painting. The painting, a Goya masterpiece, was rumored to be cursed—anyone who looked at it would go insane and meet a horrible end. Is that what happened to the grandfather? Who’s going to get his money? Where’s the painting now? And finally, can this dysfunctional, greedy clan get along for even the short time it will take to sort this all out? Olson deftly creates a festering family dynamic with psychological twists and turns that complement the supernatural element of the story, keeping readers wondering to the end as they try to unravel this family’s contorted relationships and buried past. The painting in the story is a real one; book groups that try this tale could pair it with Stephanie Stepanek and Frederick Ilchman’s Goya: Order & Disorder.
Dying Day. Edger, Stephen. Bookouture, $8.99, 9781786812704. Subtitling your book “Absolutely Gripping Serial Killer Fiction” means you’d better come through and Dying Day doesn’t disappoint. This second in the Detective Kate Matthews trilogy sees the Southampton, England police detective on the trail of a serial killer while trying to atone for the misjudgment that she believes led to the death of a young colleague. The guilt is crushing, and Matthews will do almost anything to catch this man, including put her life and career on the line. The trope of a detective who has to go it alone because nobody else cares enough could come across as well worn, but Matthews is a highly relatable character whom women who work too hard will see themselves in, and her quest to make things right is as compelling as the hunt to find the killer. The solution to this puzzle is unpredictable, too, making Dying Day an absorbing trip that readers won’t forget. This is a great readalike for Belinda Bauer’s The Beautiful Dead, another novel that stars a determined young woman on the heels of a monster.
In the Shadow of Agatha Christie: Classic Crime Fiction by Forgotten Female Authors, 1850-1917. Klinger, Leslie S. Pegasus, $25.99, 9781681776309. Only the Bible and Shakespeare have sold better than Agatha Christie’s books, says the introduction to In the Shadow of Agatha Christie, but the authors included here set Christie’s stage. The introduction—which provides an extensive early-mystery reading list—also explains what is hard to imagine now: mystery as a genre barely existed until the establishment of a professional English police force in the mid-nineteenth century. Highlights here include “Traces of a Crime,” an Australia-set police procedural by Mary Helena Fortuna, the first woman to write detective fiction. It’s fascinating to see the detective protagonist struggle to find a killer with only the most rudimentary tools and forensic knowledge at his disposal. In another standout tale, L.T. Meade—many female authors of the time used initials or pseudonyms, were anonymous, or were simply uncredited—and coauthor Robert Eustace introduce the social minefield surrounding an heirloom pearl necklace that a disreputable woman has her eye on. A main character in this tale has the shocking habit of wearing her evening dresses too high at the neck, which telegraphs what readers are in for here: stories that delightfully show what made a page-turner in the nineteenth century and the birth of domestically set mysteries of today.
Booklist
The One. Marrs, John (author). Feb. 2018. 416p. Hanover Square, hardcover, $  26.99 (9781335005106); e-book (9781488084874). First published December 1, 2017 (Booklist). In this mystery with an SF twist, it’s the present day, but the world has been radically changed by a new kind of dating service: Match Your DNA, which pairs love-seekers with the one person in the world who is their genetic soulmate. It sounds perfect at first, and many couples worldwide are blissfully happy with their match, but the downsides are considerable. What if your match is decades younger or older, or he or she lives in a far-off country? What if you’re already married when you’re notified that your match has been found? The possibilities can become knotty, and they’re well illustrated by the several people featured in Marrs’ alternating chapters, among them a young Englishwoman whose match is in Australia, an engaged couple who didn’t meet via Match and fear their test results, and a career-focused scientist who wants to find love at last. Complicating the story still further is a serial killer who uses dating sites to find his prey. Marrs’ engrossing, believable thriller raises intriguing questions about our science-tinged future.
Library Journal
The Country House Library. Purcell, Mark. Yale University Press. 9780300227406. Purcell (deputy director, Cambridge Univ. Library; formerly libraries curator, National Trust) meticulously portrays dozens of libraries throughout Britain and Ireland in what is or was a private home (some are now museums). In an introduction that sets the tone for the book, Purcell carefully defines a "country house library"; like the rest of the work, each sentence has been deliberated at length and is packed with meaning and references. Thereafter are chapters that each cover a trend in country home book collecting over the past 2,000 years, starting with the likelihood of villa libraries in Roman Britain and continuing through today, when the dwindling fortunes of the aristocracy and the politics surrounding wealth have meant a certain amount of downsizing. The trends are illustrated by top-quality photographs and charts of the libraries and reproductions showing some of their treasures. The back matter is also impressive and includes a lengthy notes section and thorough index. VERDICT Libraries covering British or Anglo-Irish history, library science, and architecture are encouraged to acquire this gorgeous volume.
Where the Animals Go: Tracking Wildlife with Technology in 50 Maps and Graphics. Cheshire, James & Oliver Uberti. Norton. 9780393634020. This gorgeous data trove is refreshing in its admission that scientists are nowadays awash in the flood of information that comes from animal tracking devices and methods, and that even that is a fraction of what could be collected. Cheshire (geography, Univ. Coll. London) and Uberti (formerly senior design editor, National Geographic; both, London: The Information Capital) are relative amateurs in a field that doesn't even have a fixed name yet come across as pleasantly wonderstruck by the technology involved in, and the results of, animal tracking work. They impart earnest accounts of scientists' endeavors and some of the individual subject creatures involved. Accompanying the text are beautifully designed four-color maps and other visualizations that illustrate some of the breakthroughs that have been made using this newly found information—one map shows, for example, how the Ethiopian government had to redraw the boundaries of a giraffe conservation park after tracking data made it clear that the giraffes lived elsewhere. VERDICT The illustrations and step-by-step data-collection efforts combine to create an inspiring introduction to an important area of science.
School Library Journal
Festival of Color. Sehgal, Kabir and Surishtha Sehgal. S&S. Beach Lane. 9781481420495 PreS-Gr 3—Brother and sister Chintoo and Mintoo are getting ready for Holi, the Indian festival of colors. Their process is slowly revealed as the siblings gather petals, dry and separate them, and then crush the dried petals into powders. Lively digital illustrations show the children's excited family members and neighbors carrying the powders through the streets, and then "POOF!" wet and dry powders fly through the air in a rambunctious celebration. Readers will learn from the book's endnotes that Holi celebrates "inclusiveness, new beginnings, and the triumph of good over evil." This is useful information, but the real beauty of this attractive book is that it shows the country's home life and community togetherness beyond the holiday celebration. Children in primary grades will find this an accessible read, whereas younger patrons can enjoy it as a read-aloud and learn about colors and cultural festivals in an engaging way. VERDICT A must-buy for picture book sections that will delight children regardless of their familiarity with the holiday. Cool Cat Versus Top Dog. Yamada, Mike. Frances Lincoln. 9781847807380. Preschool-Gr 1—All year long, Cool Cat and Top Dog tinker, tweak, and polish their race cars to perfection until it's time for the annual showdown the Pet Quest Cup. Each competitor has an arsenal of tricks ready on the big day: this time, Cat has her Bone Bazooka, while Dog's packing the fearsome water gun Soggy Moggy. Something's different this year, though—the competition takes a twist when the sometime-rivals work together and are joint winners. Don't take this for a preachy tale about cooperation. The competition is cutthroat and resorting to shenanigans to win by any means necessary is hardly an exemplary message. Nonetheless, the lively text keeps the suspense running high and action-packed illustrations featuring expressive animal characters will hold little readers' interest until the end. VERDICT An exciting choice for children who are fans of car races and readers who have outgrown Penny Dale's Dinosaur Zoom Pigín of Howth. Kathleen Watkins. Dufour Editions. 9780717169726. Pigín (pronounced "pig-een" and meaning "little Pig") enjoys three adventures in this gentle and colorful look at life in a well-to-do Irish seaside town. Pigín lives in the fishing village of Howth in a cozy house overlooking the sea. He spends his days enjoying friendship with Sammy Seal, Sally Seagull, and other animals, as well as some human pals. The three stories depict Pigín learning to swim, going for a magical picnic with fairies, and dressing up to go to the horse races. While the dialogue can be clunky in places, the tales are a little reminiscent of what Paddington and Lyle the Crocodile get up to, with love and friendship complemented by the odd, nutty activity. Suggs's striking watercolors are up to the task, depicting the Irish town, its inhabitants, and the child and animal characters with colorful aplomb. VERDICT This is sure to be a hit in Ireland as Watkins is well known there—in her own right as a harpist but also as the wife of one of Ireland's most beloved celebrities, the broadcaster Gay Byrne. The book should find fans on these shores, too, as well-depicted friendship and seaside outings are hard to beat. An additional but nonessential purchase.
0 notes
itsworn · 7 years
Text
What’s That Hemi Worth? Real-World Guide for Muscle Car Collectors Today
No matter what sort of car enthusiast you are, some names you just know by instinct. While Chrysler admits it was not the first to create an engine with hemispherical combustion chambers, nobody doubts the fame Mopar brought to the design. If you love old muscle, there is not a lot of explaining to do.
Mystique has always been part of the Hemi. It was an expensive option, in part because the engineering crew upgraded a significant number of ancillary systems on any car getting one. Prior to the hydraulic cam era of 1970, it was also high maintenance, needing semi regular valve adjustments and featuring valve spring pressure that could eat camshafts. If you wanted something that purred under the hood, you were in the wrong showroom. It loped at idle and got horrible mileage in traffic. But when the roar evened out at about 4,000 rpm, you decided it really was all worth it.
Hemi Now
Owning a car built with a Hemi gets attention, and that desire has made these cars both bellwethers and blue chips in the modern market. The Gen II 426 Hemi was built to withstand the blunt forces of competition and was only lightly detuned for street use. Though it has finally been surpassed in horsepower potential by the computer-controlled supercars offered today, collectors remain serious about them. As a result, little things can make a big difference in the scheme of investment, enjoyment, and purpose. If you have questioned whether a Hemi muscle car is in your future, these will be the things that determine how to spend your money.
Many who consider buying a factory-verified Hemi car today feel that its potential appreciation is a top reason to buy, followed by originality and body design. Restoring one of these cars can easily cost more than the fair market value of most new-car offerings, so starting from the right place is important. Transforming a rusted hulk into a factory-correct restoration will be costly, in part because many original components are in high demand.
Top Dogs
Hemi cars are expensive now because they were expensive then. The same holds true for their rarity, especially when talking about Hemi convertibles. Only a handful of people wanted them new, and just as few can actually own an original one now. When we consider the multimillion-dollar prices commanded by some of the cars, you know the Hemi mystique is at work.
At the top are 1971 convertibles, which were only available in the ’Cuda line. Frankly, if you have the wherewithal to pay this price, you probably don’t need our advice. The 1970 Challenger R/T and ’Cuda models are a bit behind the 1971 models in market value, but all will push into the million-dollar range with the right market forces at play.
That said, let’s consider what makes a Hemi car “right.” First, provenance is key. A solid ownership history, restoration shop reputation, and rebuilding process documentation all help confirm a right choice. When possible, an intact original driveline will bring a premium, though the nature of Hemi car use (and abuse) sometimes makes this impossible.
If the original drivetrain is not there, then the imperative becomes every detail being correct. That sounds easy until you try to locate a set of date-code-correct carburetors or window glass. You see, everyone else has been looking for them, too. With demand so high, buying the missing details can cost tens of thousands of dollars. But you can only spend the money if you find the parts before somebody else does. We don’t say this to be discouraging, but to be honest. Make sure the sum of the parts is there if the price is high.
A second factor is the optional equipment. For Hemi buyers after 1968, the N96 fresh air equipment was standard in one form or another, the major exception being the 1970 Challenger at midyear when the Shaker hood was discontinued until fresh safety bracing could be added to it. Even these cars sometimes received the fiberglass hood used on the Challenger T/A, but many Hemi Challenger R/Ts from 1970 models had the nonfunctional sport blister hood installed. Floor shift is important when considering an investment, as are such driveline details as the Super Track Pak four-speed/4.10-ratio Dana 60 differential. The plethora of body add-ons, especially in the final 1970-1971 production years, also create added desire. Every piece of optional equipment left off may coincide with a loss in potential value. The flipside is that it’s possible to afford a Hemi more reasonably if you don’t need all the extras.
The engine came in street-released midsize B-Bodies its entire run, and in the sporty E-Body design in 1970-191, part of the reason why the latter models command a premium. On both body types, convertibles still command the highest prices. Follow that with cars that are unchanged survivors or highly optioned restorations with provenance, then older restorations, then incorrect or incomplete restorations, and finally tributes with no factory Hemi DNA beyond the body shape itself.
E-Body values are often driven by option packages, with ’Cudas bringing a premium over Challenger R/T in most cases if options are identical. In the midsize B-Body lines, the aero-styled Daytona and Superbird would be valued just below convertibles, followed by the 1968-1971 Chargers, the 1968-1971 GTX/Road Runner, the 1966-1967 Coronets and Chargers, and the 1966-1967 GTX/Belvedere.
Hemi Racing
The reason the Hemi ended up on the street was to keep it legal in racing. These would break into two categories: cars built to race, and cars built to legalize race equipment. It is the latter that has shown the most interest, and for good reason. The aero warrior 1969 Dodge Charger Daytona and 1970 Plymouth Superbird are to this day considered the extreme of the “win on Sunday, sell on Monday” idea. To date, the Daytona is the only B-Body Hemi noted to have publicly crossed the million-dollar threshold, and did so because everything about that particular car was right. These aero-styled models are instantly identifiable to car fans, and the Hemi is their ultimate option. A third version, the 1969 Charger 500, was also aero styled but to a much lesser extreme and subsequently has less appeal.
Many of the original Hemi NHRA-focused Super Stock packages have been retired from racing and are now restored. The ultimate versions for many people were the 70 Barracudas and 80 Darts built for 1968. Not street legal, they featured fiberglass components and minimal highway safety equipment, so a disclaimer was issued to the buyer. Other versions were released in 1964 (with aluminum body paneling), 1965 (with the A990-code aluminum-head race engine), and 1967 (more in line with stock and the most streetable of the drag releases). These are not practical as drivers, but many collectors like them as “ultimate representations.” The major factor in value would be original ownership notoriety (Sox, Landy, then everyone else) and car originality. This is a buyer-beware area if you don’t know how to determine how much a car has been modified or rebodied during restoration.
Of course, Hemi engines were in NASCAR stockers and more extreme-class drag cars as well. All were heavily modified by secondary race-oriented competitors, making it important to know what makes the car verifiable. Market determinations in those cases is again based on ownership notoriety, with originality primarily focused on the correct parts usage for the era the car is restored to. Again, doing vehicle forensic science is important to determine the car is indeed what it is purported to be. It’s easy to just add paint. Hemi on a Budget
Budget is a relative term. Today a Hemi-powered muscle car is probably $75,000 for a running “average” restoration. You will pay more for better options, and this amount will not put you into any real E-Body, aero model, or convertible in today’s market. That said, you can shop and determine what you would want from that Hemi purchase.
Column shifts would be the first thing to consider when shopping on a budget. If you can live with a car that has been rebuilt with some modifications or an older restoration, there may be some hidden value there as well. Remember that if you want the OE perfection like date-correct factory carbs, adding the hardware and details will be expensive. With the interest in unrestored cars on the upswing, that area is no longer inexpensive, but possibilities are there if you can bide your time.
In my opinion, the models that offer the best potential at current market prices are the 1966-1967 Chargers, with upscale appointments from stock that make them attractive. Make sure the dash lights function and the long rear taillamp lens is intact. The nonconvertible 1966-1967 B-Bodies are also at the lower end of the spectrum. Although better equipped, GTXs sometimes, ironically, offer better buying opportunity than Road Runners simply based on the latter’s name recognition.
Eye candy and curb appeal help drive the collector side. Of course, if you are interested in doing a lot of cruising or burnouts, you might find that a Hemi tribute or clone is the way to join the club. But that story is probably a better fit for another magazine.
Al Rogers photo The legendary 426 Hemi was installed in approximately 10,000 Chrysler vehicles. Those that survived the folly of youthful owners, successful and failed racing modifications, and the passage of almost a half-century are now among the most important collector cars from any American manufacturer of the time. This is an example from a 1969 Charger 500.
For many enthusiasts, the very low production E-Body convertibles from 1971 are the ultimate Hemi collector cars. This example, on display at MCACN in 2014, sold for $3.5 million through a Mecum auction.
Seen here during the annual MCACN gathering is this beautiful unrestored 1970 Challenger R/T owned by Bruce Bartie. The Challenger body design has not proven as popular as the similar ’Cuda models with identical equipment, though any real Hemi E-Body will be expensive.
Hemi Plymouth models, like this pair in the Tony D’Agostino collection, show two possible directions to go if you have the wherewithal to own an OE Hemi. The 1968 Road Runner in the foreground is a long-term correct restoration, while the 1966 Satellite is an unrestored original.
Options matter when it comes to Hemi vehicles. This sunroof 1971 Hemi GTX in the Wellborn collection is noted as the highest-sticker-priced Hemi vehicle ever constructed. The fact that it’s also an unrestored, final-year example only adds to the attraction.
Speaking of options, if you were buying a basic model or wanted the special “buddy seat” interior, a more-than-expected number of Hemi cars came with column shift. These cars are sometimes available at a lower price.
Convertible muscle-car-era vehicles are uncommon regardless of powerplant. The beautiful example here, noted as part of a number of world-class collections, soared to more than $600,000 when it sold in 2015 at Mecum Kissimmee.
The 1966-1967 Chargers are often well equipped in terms of standard equipment but have sometimes been lower-priced than the restyled 1968-1971 models.
Due to the rules that racing bodies enacted, a minimum number of cars had to be created for racing. Chrysler built special Hemi releases solely for racing in 1964, 1965, 1967, and 1968. The 1964 models, like this one on display at Carlisle’s annual show, were often seriously modified for early funny car racing when NHRA outlawed the aluminum panels in Super Stock.
Although not true race cars like the drag packages, three models were released to legalize parts for NASCAR and circle track racing. The Hemi Daytona is considered one of the most desirable muscle cars from the years of Hemi production. This car arrived at the 2014 wing car reunion in Alabama from Colorado with its longtime owners.
When it comes to convertibles, price is driven by a number of factors, including production numbers, driveline and interior options, and condition. Collector Steve Fox displayed his 1968 Hemi GTX convertible at the All-Hemi Reunion, and it is the only red paint, white top, white interior B-Body Hemi convertible built in any body or year.
Some factory Hemi race cars have been rebuilt showing their race-correct paint. The Gene’s Speed Coronet was originally raced out of Massachusetts. The challenge with this type of rebuild is how to correctly show any day-two-type changes.
Drive it like you stole it? Probably not at today’s prices, but that doesn’t mean you cannot enjoy owning one of the most important muscle cars of the golden era. Ray Dupius shows how small the factory tires were back in the summer of 1966.
Tim Wellborn became the expert on 1971 Chargers, buying a good many of them during the course of his collecting. The Super Bee became a Charger model for that year only, resulting in unique designs like this example sold by Mr. Norms. This was the only year the Hemi Charger had a factory fresh-air hood design option.
Beautifully restored, the 1969 Hemi Super Bee was owned by Don Fezell and was a car that he pulled from the backyard of a longtime owner. Cars featuring the functional Ramcharger hood were built between 1969 and 1970; early Dodge B-Bodies only had hood trim. The hood was standard on all Hemi models during the years it was available.
Since the originals were often raced and underwent literally decades of evolution, some builders went ahead and created similar but more streetable versions around standard production cars. Charlie and Denise Caldwell built their Hemi tribute for cruising, selecting a nice level of OE-type changes that the so-called A990 models received.
To keep from having to compete against the previous models, in 1967 the “race cars” used all-steel bodies, other minor changes, and inline Hemi manifolds. These Coronets and Belvederes were not overly competitive because they weighed the same amount as the new GTX and RT models with reworked weight distribution. They are also considered the most streetable of the factory race packages.
Quite interestingly, this GTX got a column shift only because the buyer wanted that third seat. GTXs normally received a console layout as standard equipment, making this one a rare example of the breed.
The 1970 ’Cuda and Challenger Hemi convertibles have stepped into the realm of million-dollar sales. These three were on display at the 2015 MCACN show, where Mecum Auctions presented them as part of the largest gathering of these cars ever assembled. All sold the following January.
The vanity plate on Paul Veney’s 1970 Super Bee tells the story: 1 of 21. The 1970 R/T and Super Bee models have become very visible as collector cars, as only three Hemi convertibles were built on that platform, all R/Ts. This body design lasted a single year and was the final two-model version on this nameplate during the era.
This 1970 Hemi Road Runner turned up in a Texas barn and, despite a drag racing background, was “original enough” that Tim Wellborn chose to leave it as found. Seen here at MCACN, at the Wellborn Museum it is now the centerpiece of a special group of cars and parts that are unrestored but still presentable.
Of the handful of extant Hemi Challengers from 1971, few showcase the uniqueness of this very early built “pilot” car that was on display at Carlisle. Real Shaker-hood Challengers from 1970 are especially rare due to hood safety issues.
This stunning 1971 “billboard” ’Cuda turned up recently and proved to be a one-of-one tricolor combination. Red paint, black leather interior, and white billboard stripes make it exceptional. Many buyers opted to leave the large graphics off these cars when buying them, making this a rarer option than many restorations would seem to suggest. Brothers Curtis and Tim Wellborn completed it in early 2017.
With so few Hemi examples left, Canadian collector Clarence Arnoldussen built a tribute when a 440ci model showed up without an original engine. At $220,000 it sold for approximately a third of what the real version would bring, but that is still higher than what some nonoriginal 440 models have sold for.
Being invited to display at the MCACN Vintage Certification program allows a car to be forensically examined by experts. This 1969 Super Bee is undergoing a careful inspection at the annual November event in Chicago. If you cannot own a Hemi car personally, this is a terrific opportunity to see many of the rarest examples in person.
If you want to let it all hang out, you might be better served starting from scratch and creating a Hemi package on your own. These are the Bienekes and their truly unique 71wingcars.com racers at speed on the front straight at Road Atlanta several years ago. If you want a Hemi for fun, you will probably want to stay away from the factory restorations.
The post What’s That Hemi Worth? Real-World Guide for Muscle Car Collectors Today appeared first on Hot Rod Network.
from Hot Rod Network http://www.hotrod.com/articles/whats-hemi-worth-real-world-guide-muscle-car-collectors-today/ via IFTTT
0 notes
Text
Choosing details Is Simple.
The Expert Keys of information Discovered
Biomimicry or biomimetics is the research of nature's versions, systems, components, as well as processes in order to acquire motivation to fix human issues. Subtract Your Credit Card Processing Account Costs isn't really expensive, yet you'll find that the little purchase charges do accumulate when you incorporate them with arrangement costs as well as various other costs that gather throughout the year. In practice, details is typically lugged by weak stimulations that should be found by specialized sensory systems and amplified by energy inputs before they could be useful to the organism or system.
What Everyone is Claiming Regarding information Is Dead Incorrect And also Why
Having a kiosk in the waiting room suggests that you could have lots of details on the stand readily available to the visitors. Google has no equals, and it is really near obtaining a stranglehold on the genuine power behind all marketing, which is information. For example vogue is a style magazine that knows just regarding the most recent style where and also spider is a publication about the computer system world. Handle this standard info-- your phone, name, as experience project poop (My Home Page) well as e-mail number-- to assist others locate you on Google items like Hangouts, Gmail, and also Maps, as well as make it less complicated to get in touch. In Thermodynamics, information is any type of sort of occasion that affects the state of a vibrant system that can interpret the info. An essay publication is continual as well as to obtain information about the topic, one needs to review guide completely. Testimonial the questions produced before the info was collected due to the fact that nearly all study is a direct result of a concern that need to be answered. Just what is amazing is the toolkit leverages PIL's current research study on lifelong learning (Head, 2016) to recognize and resolve the information needs of 18 to 60+ years of age town library customers. Leslie Color tells us exactly how today's youth use many social media sites tools to browse their lives-- devices that create jealousy, bring joy, break relationships, or, start new ones. Such details is not shown us and undergoes the personal privacy plan of each such third-party solution. The business value of information technology depends on the automation of company processes, provision of information for decision making, attaching businesses with their customers, as well as the provision of efficiency tools to boost performance. If you want to know regarding the other services from BSNL, you can only rely on one website which offers sufficient details about the telecommunication system. You may be holding onto the information since you believe you'll be able to utilize it someday, or it's a great idea that you should" do. Perhaps you hold onto it due to the fact that you assume it's interesting or that it might be beneficial for a customer. This component also covers medical local area network and also systems as well as information safety and also protection. To learn more on these places of interest you can check out Perpignan France Tourism Office on line. However Google should find a means to transmit its info at no cost to its customers.
Obtain The Inside story on details Before You're Too Late
Some qualified as well as good information resources are federal government internet sites, university resources, business on the internet data sources (Lexis/Nexis, Expanded Academic Index, ABI Inform, EBSCOhost and so on), which you can conveniently access from the majority of town library websites, community watch pet dog companies and also trusted customer groups. To read more regarding Womens Earth Shoes visit our blog for more details in the world shoes for ladies consisting of blockages and also boots. Often times a specialist interview could be used to develop an amazing details product. This course supplies an introduction to the sophisticated digital forensic subject associating with malicious software program (malware), which represents a boosting info safety risk to computer system systems and also networks. The indications can be further boosted by showing news feeds or various other helpful details. Placing info with each other will often increase essential, pertinent as well as unanticipated concerns. Pupils will evaluate software program engineering design fundamentals as well as turn around design strategies utilized to conduct static and dynamic forensic evaluation on computer systems and also networks. We will certainly not sell, share or rent this details to any kind of 3rd parties, as well as your details will just be utilized for the factors stipulated on this page. Here at A1 articles our authors supply all the very latest info daily to maintain you approximately day with just what's occurring. It covers both concept and practice and whether you are a starting computer programmer or an information science philosopher, you need to discover something in below that you didn't know and that will awaken you to some originalities. Editor's note: Analysis is a separated activity as well as paying attention to a speech is a social one. Earth shoes negative heel modern technology is integrated in such a way that your toes are placed above your heels. Understand as well as use architectural, computational, and mathematical thinking and principles of concurrency to the design of details systems. Using a bookmarking solution is truly useful for everyone online because bookmarking is sharing details. A demand is transmitted through a small handling track if it inclusives 50 pages or less, a tool handling track if it incorporates 51 to 950 web pages, or a big processing track if it inclusives 951 pages or even more. A lot of trainees participate in a paid summer teaching fellowship in between the second and initial years of their program, to implement as well as build upon expertise obtained in the first-year program work and find out more about work techniques in the field of info administration. Info resource: 7DREAMS Trainees Apartments Barcelona I wish you have actually delighted in the referrals of meals in Barcelona. The value-add for infotech in organizations is rapidly shifting from the technology per se to the stewardship, optimization, and application of the information properties themselves.
0 notes
clubofinfo · 7 years
Text
Expert: The US government-supported Public Broadcasting System (PBS) recently ran a five part series dubbed Inside Putin’s Russia.  With a different theme each night, it purports to give a realistic look at Russia today. The image conveyed is of a Russia that is undemocratic with widespread state repression, violence and propaganda. Following are significant distortions and falsehoods in the five part documentary. Episode 1: “How Putin Redefined what it means to be Russian” In this episode, the documentary: (a) Claims that Russian identity is based on “projection of power”. In reality, “projection of power” characterizes the US much more than Russia. For the past two centuries the United States has expanded across the continent and globe. The last century is documented in the book Overthrow: American’s Century of Regime Change from Hawaii to Iraq. The US currently has nearly 800 foreign military bases in over 70 countries. In contrast, Russia has military bases in only two countries beyond the former Soviet Union: Syria and Vietnam. (b) Ignores crucial information about events in Ukraine. Russian involvement in eastern Ukraine and Crimea are presented as examples of “projection of power”. However, basic facts are omitted from the documentary. There is no mention of the violent February 2014 coup in Kiev nor the involvement of neoconservatives such as Sen McCain and US Assistant Secretary of State Victoria Nuland. In a December 2013 speech, Nuland outlined her intense involvement in Ukraine including US “requirements” that Ukraine choose a “European future” since the US had “invested $5 billion to assist”. Days before the coup in February 2014 Nuland was captured on audio planning the composition of the coup leadership. (c) Ignores Crimea’s historic connections with Russia and Ukrainian violence. The documentary says: “In 2014 in Crimea, Russia helped install separatist leaders who rushed through a referendum that led to Crimea’s annexation.” This gives the misleading impression that the decision was Russian not Crimean.  Even the NY Times report on March 16, 2014 acknowledged that: “The outcome, in a region that shares a language and centuries of history with Russia, was a foregone conclusion even before exit polls showed more than 93 percent of voters favoring secession.” The documentary fails to mention the fear of violence after Crimean travelers to Kiev were beaten and killed by Ukrainian hyper-nationalists. One of the first decisions of the Kiev coup government was to declare that Russian would no longer be an official language. A good overview including video interviews with Crimeans is in this video, contrasting sharply with the implications of the PBS documentary. (d) Trivializes Russian opposition to NATO expansion. The documentary suggests Russians feel “humiliated” by NATO expanding to their borders. This distorts a serious military concern into a subjective, emotional issue. In 2002, the US unilaterally withdrew from the Anti-Ballistic Missile Treaty and started construction of missile defense systems which could be used in tandem with a nuclear first strike. In recent years, NATO troops and missiles have been installed at Russia’s borders. Imagine the response if Russian troops and missiles were placed at the US border in Canada and Mexico. (e) Falsely claims that coup violence in Odessa was “exaggerated”. The documentary says that Russians who went to help defend civilians in eastern Ukraine were convinced by Russian “propaganda” where “dozens of pro-Russian separatists died in Odessa, Ukraine” but “Russian media exaggerated the attack”. In reality, the Odessa attack killed at least 42 people and injured 100.  This video shows the sequence of events with the initial attack on peaceful protesters followed by fire-bomb attacks in the building. Fire trucks were prevented from reaching the building to put out the fire and rescue citizens inside. Episode 2: “Inside Russia’s Propaganda Machine”. In this episode, the documentary: (a) Suggests Russians are aggressive and threatening.  The documentary highlights a Russian TV broadcaster who is translated to say, “Russia is the only country in the world that is realistically capable of turning the United States into radioactive ash.” and later “If you can persuade a person, you don’t need to kill him … if you aren’t able to persuade, then you will have to kill.” We do not know the context or accuracy of these translated statements. However, on the basis of my own travels in Russia and the experience of many other Americans, these statements are strange and uncharacteristic. At the popular and government level, Russians are typically at pains to call the US a “partner” and to wish for peace and better relations. With 27 million killed in World War 2, most Russians are very conscious of the consequences of war and deeply want peace. Russians vividly recall the Russia – US alliance during WW2 and seek a return to friendly collaboration. The film producers must have heard this message and desire for peace expressed by many Russians many times. But the documentary only presents this uncharacteristic aggressive message.  (b) Inaccurately suggests that producers of a private TV network received angry public messages because they were exposing corruption. In reality, the angry public response was because the TV station ran a poll asking viewers if the Soviet Union should have surrendered to Nazi Germany to save lives during the siege of Leningrad. (c) Falsely suggests that RT (Russia Today TV) typically features Holocaust deniers and neo-Nazis. This is a grotesque distortion.  Anyone who watches RT will know that American personalities such as Chris Hedges, Larry King and Ed Schultz are regulars on RT. Interviewees on international affairs generally come from the left side of the political spectrum – the opposite of what is suggested. (d) Uncritically repeats the conspiracy theory that Russia hacked the Democratic National Committee (DNC) and Hillary Clinton emails. The findings have been disputed by the publisher of the emails, Julian Assange of Wikileaks , as well as Veteran Intelligence Professionals for Sanity. A recent forensic examination confirms that this was a leak not a hack (inside job done by local data transfer NOT a hack over the internet) and points to “Guccifer 2.0,” the presumptive ‘hacker’, being a hoax intentionally created to implicate Russia. (e) Falsely suggests that anti-Clinton social media messaging during 2016 was significantly caused by Russian government trolls. Hillary Clinton was strongly opposed by significant portions of both the left and right . There were probably hundreds of thousands of Americans who shared anti-Clinton social media messages. (f) Claims that research showing a Google search engine bias in favor of Hillary Clinton was “quickly debunked”. The documentary ignores the original article describing the potential effect of search engine bias which was published in the prestigious Proceedings of the National Academy of Sciences. The author is Dr. Robert Epstein, former editor-in-chief of Psychology Today magazine. Contradicting the claim that this research was “debunked”, this academic article estimates the effect of the Google bias and how the bias went away AFTER the election. The response from Google and very shallow Snopes “fact check” are effectively rebutted by the lead author here. In neo-McCarthyist style, the documentary smears the findings and claims they were “laundered” after being published by the Russian “Sputnik” media. (g) Suggests the “idea that President Kennedy was killed by the CIA” was “planted” by the Soviet intelligence agency KGB. Many impressive American books have been written supporting this contention, from New Orleans District Attorney Jim Garrison’s book to David Talbot’s 2015 book “Devil’s Chessboard: Allen Dulles, the CIA and Deep State”. Claiming that this accusation is based on KGB “disinformation” is another grotesque distortion. It is not revealing disinformation; this is an example of disinformation. Episode 3: “Why are so many from this Russian republic fighting for Isis?” In this episode, the documentary: (a) Rationalizes and almost justifies Russian Muslims traveling to join ISIS. The documentary suggests that religious repression and discrimination is a cause of ISIS recruitment and that “Dagestanis who fought for ISIS continue a decades-old legacy here of radicalism and militancy.” (b) Ignores the role of the U.S., Saudi Arabia and Pakistan in promoting Islamist fundamentalism in Dagestan.  As described by Robert Dreyfus in the book Devil’s Game: How the United States Helped Unleash Fundamentalist Islam: The Casey-ISI (CIA and Pakistan Secret Service) actions aided the growth of a significant network of right-wing, Islamist extremists who, to this day, plague the governments of the former Soviet republics … In particular, the Islamic Movement of Uzbekistan, the Islamic Liberation Party, the powerful Islamist groups in Chechnya and Dagestan. (c) Ignores the role of the US and allies in facilitating ISIS.  As journalist Patrick Cockburn has written: In the 20 years between 1996 and 2016, the CIA and British security and foreign policy agencies have consistently given priority to maintaining their partnership with powerful Sunni states over the elimination of terrorist organizations such as al-Qaeda and Isis. Journalist Nafeez Ahmed exposed the role of Turkey here: A former senior counter-terrorism official in Turkey has blown the whistle on President Recep Tayyip Erdogan’s deliberate sponsorship of the Islamic State (ISIS) as a geopolitical tool to expand Turkey’s regional influence and sideline his political opponents at home. Elements of the US military/intelligence suggested the establishment of ISIS to “isolate the Syrian regime”. This was revealed in the classified 2012 report of the Defense Intelligence Agency that: There is the possibility of establishing a declared or undeclared Salafast Principality in Eastern Syria (Hasaka and Der Zor), and this is exactly what the supporting powers to the opposition want in order to isolate the Syrian regime. In short, ISIS recruitment from Muslim communities in Russia and world wide has been spurred by the policies and actions of the US and allies such as Saudi Arabia and Turkey. This is what Dreyfus calls “The Devil’s Game” but is ignored in the documentary. Episode 4: “The Deadly Risk of Standing up to Putin” In this episode, the documentary: (a) Suggests that critics of Putin and the Russian government face “consequences” including death.  These accusations are widespread in the West but largely based on the claims of different US supported “activists”.  One of the most famous cases, and the one on which US Congressional sanctions against Russia are based, is that of Sergei Magnitsky. Magnitsky’s death was the subject of a documentary which has been effectively banned in the US. In the course of researching what happened, the film-maker learned that the truth was very different than has been told. Gilbert Doctorow outlines what happens in his review of the movie here: Magnitsky Act: Behind the Scenes is an amazing film which takes us through the thought processes, the evidence sorting of the well-known independent film maker Andrei Nekrasov as he approached an assignment that was at the outset meant to be one more public confirmation of the narrative Browder has sold to the US Congress and to the American and European political elites. That story was all about a 36 year old whistle-blower “attorney” (actually a bookkeeper) named Sergei Magnitsky who denounced on Browder’s behalf the theft of  Russian taxes to his boss’s companies amounting to $230 million and who was rewarded for his efforts by arrest, torture and murder in detainment by the officials who perpetrated the theft. This shocking tale drove legislation that was a major landmark in the descent of US-Russian relations under President Barack Obama to a level rivaling the worst days of the Cold War. At the end of the film we understand that this story was concocted by William Browder to cover up his own criminal theft of the money in question, that Magnitsky was not a whistleblower, but on the contrary was likely an assistant and abettor to the fraud and theft that Browder organized, that he was not murdered by corrupt Russian police but died in prison from banal neglect of his medical condition. The documentary quotes an opposition leader, Vladimir Kara-Murza, saying “We have no free and fair elections. We have censorship in the media. We have political prisoners, more than 100 political prisoners now in Russia, today.” Kara-Murza now lives in Washington “for his safety” but returns to Russia periodically. He claims to have been poisoned several times. Opponents of the Russian government are quick to accuse but the evidence is largely hearsay and speculation. Public polls of citizens in Russia repeatedly indicate that Putin and the government have widespread popularity, in contrast with the accusations in this documentary that they rule by intimidation and violence. Episode 5: “What Russians think about Trump and the U.S.”                                                  Based on the content, the final episode should be titled “What the US establishment and media thinks of Putin and Russia”. In this episode, the documentary: (a) Features accusations by CIA Director Mike Pompeo that Russian President Putin “is a man for whom veracity doesn’t translate into English.” An objective documentary would take CIA claims about “veracity” with a healthy dose of skepticism. Just a few years ago, former Director of National Intelligence James Clapper was confirmed to have lied under oath to Congress. Former CIA Director James Angleton said in his dying days, “Fundamentally, the founding fathers of U.S. intelligence were liars. The better you lied and the more you betrayed, the more likely you got promoted.” So it is curious to see the PBS documentary uncritically presenting the new CIA director as a judge of veracity. (b) Implies that President Trump is out of line to question “the US intelligence community’s unanimous assessment that Russia hacked the 2016 election.” It has been recently exposed that the “unanimous assessment” was by four agencies not seventeen and one of the four did NOT have “high confidence” in a key finding. The ‘assessment’ was by a hand picked set of analysts and based on the findings of the Crowdstrike company and dubious Christopher Steele dossier. In March 2017 Crowdstrike was found to have made false claims. Neither the CIA nor FBI examined the DNC computers. If the issue was important, as it obviously has become, the FBI should have issued a subpoena to do its own examination. Why the DNC rejected the FBI request, and why the FBI did not insist, raises serious questions given the enormous publicity and accusations that have followed. (c) Uncritically features two US politicians making loose accusations and effectively criminalizing “contacts” with Russians. Senator James Lankford says President Trump is “pushing out some messages that are consistent with the Kremlin policies … there’s no question that the Russians were trying to hack into our elections”. On the contrary, some very sharp and experienced people have recently presented evidence contradicting the accusations. Senator Mark Warner indicates the senate investigation has reached its conclusion before it begins. He says, “The goal of this investigation is not only to reconfirm Russian intervention and explain that to the American public, but to also see if there were any contacts between Trump and the Russians”.  In the current environment, to have “contacts” with Russians has been criminalized. Instead of questioning the validity or wisdom of this position, the documentary presents it with seeming approval. (d) Uncritically promotes false statements and reckless threats. Senator Lankford says: We believe strongly that what Russia continues to do to be able to threaten Ukraine, threaten its neighbors, threaten NATO, to continue to pry into not only our elections, but other elections, is destabilizing, and it demands a response. They have yet to have a consequence to what they did in the election time. And they should. Lankford’s assertions are presented as facts but are debatable or false. For example, security services in Germany, France and the UK all found that – despite the international accusations – there was NO evidence of Russian interference in their recent elections. (e) Justifies and promotes “punishment” of Russia. The belligerent approach of Lankford and Warner is continued by PBS host Judy Woodruff and narrator Nick Schifrin. The U.S. is portrayed as a vulnerable victim with a future that is “foreboding”. Russia is portrayed as threatening and needing some punishment soon: “The Russian government doesn’t feel like the United States government really penalized them for what happened last year…. a lot of officials here in Washington agree with that… Russia should have paid for what they did last year.” This threatening talk is then followed by this assessment from the narrator:…. “There are analysts in Moscow who think the only thing we can hope is that we avoid war.” Conclusion In 2002-3 American media failed to question or challenge the assertions of the CIA and politicians pushing for the invasion of Iraq. At that time, the false pretense was that Iraq had weapons of mass destruction and posed a threat to the US. Much of the media and many of the same politicians are now claiming Russia is an adversary that has “attacked us”. This claim is being widely made without serious question or challenge. “Liberal” media seems to be in alliance with hawkish neoconservatives on this issue. Virtually any accusation against Russia and its leader can be made with impunity and without serious evidence. The documentary Inside Putin’s Russia aims to expose Russian repression, aggression and disinformation. As shown in the many examples above, the five part documentary is highly biased and inaccurate. While it shows some features of Russia, it also demonstrates American propaganda in the current tumultuous times. http://clubof.info/
0 notes
gretavigil853-blog · 7 years
Text
Biotechnology, Advanced Technical Certificate.
By being a CSTEP trainee, I have been able to get so many possibilities such as teaching fellowship placement, discussion as well as meeting that I should have experience for my future profession. Grownups using vending machines in local authority as well as NHS locations can acquire healthy and balanced food and beverage choices. Security Scientific research articles address superior modern preclinical as well as human translational characterization of drug and also chemical security employing innovative science. An approximated nine million children in this country have health care requirements, according to the United States Division of Wellness and Human Services. While protein restriction may be suitable for dealing with someone with existing kidney illness, there is no proof to reveal that high protein intakes could bring about kidney damage in healthy people. Eligible prospects could participate in our 23-week program with JVS at no cost, and after that enlist in the Quincy College nine-month Biotechnology & Conformity Certification program. Neuroscience, for example, has actually shown that just really feeling the shape of an object could trigger a visual form representation in the aesthetic cortex. Biotechnology generally affects markets in human wellness, farming, and the forensic sciences. Think about these treats as additional chances to get in a couple of portions of the healthy and balanced foods you require daily. This laboratory training course accompanies the Genes lecture course which is planned to give the fundamental essentials of inheritance in addition to to integrate modern-day uses of genetics in biotechnology as well as genomics. Numerator - the variety of women in the denominator who approve a reference for suggestions on healthy and balanced consuming and exercise. Proof of neighborhood arrangements to consist of oral health in the care plans of individuals getting wellness or social care support as well as at high danger of inadequate dental health and wellness. Health and wellness as well as public health professionals ensure that they describe to parents as well as carers receiving Healthy and balanced Begin food coupons just how they could utilize them to increase the amount of vegetables and fruit in their family's diet plan. If you loved this post and you want to receive more details regarding mouse click the following web page assure visit our own web page. After that the group of trainees will teach middle school trainees concerning biotechnology during an after-school program. Maintain a solid quality factor average to be competitive for graduate school admission. Margaret L. Eaton is a Senior citizen Study Scholar at the Stanford Center for Biomedical Ethics as well as a Lecturer in the Stanford Grad Institution of Company. For instance, you might not be able to take specific tablets for ED if you have certain various other medical conditions or take particular other medicines. Follow-up care consists of regular wellness exams, examinations to earn sure they are getting the nutrients they require, support with their diet regimen, help to boost physical activity and also psychological support if required. The Consortium is an online forum for Area Public Health Directors, Replacement and also Assistant Directors, Wellness Officers, and welcomed associate participants to explore as well as exchange ideas and also information as well as to develop methods for resolving pushing public wellness issues encountered by the counties and also the area. Gallus was produced by Mark Bamforth, a Scottish-born chemical engineer whose job has taken him from oil exploration to brewing to biotechnology. Within 2-4 years of graduating with a BS or BA degree, the average income for drug stores is $42,000, with the most affordable and also highest 10% making $31,000 and $53,000 specifically. But Food & Water Watch assistant supervisor Patty Lovera claims the odds that companies will disclose this info are extremely low. This pathway covers how participants of general dental method groups could properly communicate the 'recommendations for individuals' set out in Providing better oral wellness: an evidence-based toolkit for prevention (Public Health England). If you have an interest in finding out more about the Bridges to University program tracks at JVS, or the biotechnology pathway please get in touch with Hayley Kahn at This e-mail address is being safeguarded from spambots. The road that I travelled to becoming a cancer cells biologist and Professor at Harvard Medical School was uncharted. The idea for the medical hub is to unite entrepreneurs and also potential financiers to grow new firms. Bob joined HealthFitness in 2003 as component of the Johnson & Johnson Health Care Solutions Inc BCLS faculty members likewise suggest pupils about study, internships, graduate institution, and specialist college. Along with this option, we included 6 even more write-ups after undergoing the referrals of these 11 picked articles. Short posts report on high influence studies of broad passion to readers of TAAP that would benefit from rapid magazine. It could likewise result in enhanced working practices and also, in turn, boosted work satisfaction, resulting in a more material and healthy labor force along with greater levels of dedication and performance. Typically, the ED establishes quite unexpectedly if it is a symptom of a mental health issue. With a Bachelor's degree or a Bachelor of Technical and Specialist Studies in biotechnology from College of Maryland College College, you could come to be a part of the solution.
0 notes