Jeffrey Kantor, who was fired by Appian Corporation, sued a host of government officials, including Attorney General Eric Holder, Director of National Intelligence James Clapper, CIA Director John Brennan, Defense Secretary Chuck Hagel and Secretary of State John Kerry in Federal Court, alleging civil rights violations, disclosure of private information and retaliation…
He also sued Secretary of Energy Ernest Moniz, Acting Secretary of Homeland Security Rand Beers, Treasury Secretary Jacob Lew, EPA Administrator Regina McCarthy and U.S. Office of Personnel Management Director Katherine Archuleta.
3More
7More
Lawsuit Claims Accidental Google Search Led To Years Of Government Investigation And Ha... - 0 views
www.techdirt.com/...nvestigation-harrassment.shtml
lawsuit google government investigation search yourrignts law legal litigation yourrights surveillance security spying stalking
shared by John Lemke on 14 Dec 13
- No Cached
-
"In October of 2009, Kantor used the search engine Google to try to find, 'How do I build a radio-controlled airplane,'" he states in his complaint. "He ran this search a couple weeks before the birthday of his son with the thought of building one together as a birthday present. After typing, 'how do I build a radio controlled', Google auto-completed his search to, 'how do I build a radio controlled bomb.'" From that point on, Kantor alleges coworkers, supervisors and government investigators all began "group stalking" him. Investigators used the good cop/bad cop approach, with the "bad cop" allegedly deploying anti-Semitic remarks frequently. In addition, his coworkers at Appian (a government contractor) would make remarks about regular people committing murder-suicides (whenever Kantor expressed anger) or how normal people just dropped dead of hypertension (whenever Kantor remained calm while being harassed)
-
Kantor also claims he was intensely surveilled by the government from that point forward.
- ...2 more annotations...
-
the law says that the timeline is based on when the citizen had a reasonable chance to discover the violation. Since the PRISM program was only declassified in July of 2013, these earlier violations should not be time-barred.
-
All in all, the filing doesn't build a very credible case and comes across more as a paranoiac narrative than a coherent detailing of possible government harassment and surveillance. Here are just a few of the highlights.
1More
Ыtudents develop thought-controlled, hands-free computer for the disabled - 0 views
www.physorg.com/...olled-hands-free-disabled.html
2011 writeabout technology BGU biotech medicine control handsfree Ben-BurionUniversity engineering tech writeatindienation
shared by John Lemke on 03 May 11
- No Cached
-
The student team, Ori Ossmy, Ofir Tam and Ariel Rozen, developed the prototype application for their bachelor's degree project under the supervision BGU Prof. Mark Last, Dr. Rami Puzis, Prof. Yuval Lovitz and Dr. Lior Rokah. As part of a recent demonstration, a student composed and sent a hands-free e-mail using only thought combined with the adaptive hardware. The students and BGU team plan to continue research working with the disabled.
2More
Scientists can now control flies' brains with lasers | The Verge - 0 views
-
A laser beam can alter a fly’s behavior and make it mate with just about anything — even a ball of wax, according to scientists at the Howard Hughes Medical Institute. The researchers have developed an experiment which involves shining an infrared laser directly at the head of a fly whose brain has been altered using heat-activated proteins. This alteration allows the laser, dubbed the "Fly Mind-Altering Device" (FlyMAD), to activate specific neurons involved in mating.
-
behavioral modification was so strong that it persisted for about 15 minutes after the laser was turned off.
34More
The White House Big Data Report: The Good, The Bad, and The Missing | Electronic Fronti... - 0 views
www.eff.org/...ta-report-good-bad-and-missing
2014 EFF mass data indienationnews law technology legal White House report review privacy yourrights notice and consent
shared by John Lemke on 05 May 14
- No Cached
-
one issue was left conspicuously unaddressed in the report. The Securities and Exchange Commission, the civil agency in charge of protecting investors and ensuring orderly markets, has been advocating for a special exception to the warrant requirement. No agency can or should have a get-out-of-jail-free card for bypassing the Fourth Amendment.
- ...22 more annotations...
-
an example of this in Boston, which had a pilot program to allow residents to report potholes through a mobile app but soon recognized that the program was inherently flawed because “wealthy people were far more likely to own smart phones and to use the Street Bump app. Where they drove, potholes were found; where they didn’t travel, potholes went unnoted.”
-
The authors of the report agree, recommending that the Privacy Act be extended to all people, not just US persons.
-
metadata (the details associated with your communications, content, or actions, like who you called, or what a file you uploaded file is named, or where you were when you visited a particular website) can expose just as much information about you as the “regular” data it is associated with, so it deserves the same sort of privacy protections as “regular” data.
-
The report merely recommended that the government look into the issue.
-
several other government reports have taken a much stronger stance and explicitly stated that metadata deserves the same level of privacy protections as “regular” data.
-
We think the report should have followed the lead of the PCAST report and acknowledged that the distinction between data and metadata is an artificial one, and recommended the appropriate reforms.
-
the White House suggested advancing the Consumer Privacy Bill of Rights, which includes the idea that “consumers have a right to exercise control over what personal data companies collect from them and how they use it,” as well as “a right to access and correct personal data.”
-
Consumers have a right to know when their data is exposed, whether through corporate misconduct, malicious hackers, or under other circumstances. Recognizing this important consumer safeguard, the report recommends that Congress “should pass legislation that provides a single national data breach standard along the lines of the Administration's May 2011 Cybersecurity legislative proposal.”
-
While at first blush this may seem like a powerful consumer protection, we don’t think that proposal is as strong as existing California law. The proposed federal data breach notification scheme would preempt state notification laws, removing the strong California standard and replacing it with a weaker standard.
-
the Fort Hood shooting by Major Nidal Hasan
-
First, whistleblowers are simply not comparable to an Army officer who massacres his fellow soldiers
-
Secondly, the real big-data issue at play here is overclassification of enormous quantities of data.
-
Over 1.4 million people hold top-secret security clearances. In 2012, the government classified 95 million documents. And by some estimates, the government controls more classified information than there is in the entire Library of Congress.
-
The report argues that in today’s connected world it’s impossible for consumers to keep up with all the data streams they generate (intentionally or not), so the existing “notice and consent” framework (in which companies must notify and get a user’s consent before collecting data) is obsolete. Instead, they suggest that more attention should be paid to how data is used, rather than how it is collected.
-
While we agree that putting more emphasis on responsible use of big data is important, doing so should not completely replace the notice and consent framework.
-
Despite being a fairly thorough analysis of the privacy implications of big data, there is one topic that it glaringly omits: the NSA’s use of big data to spy on innocent Americans.
-
Even though the review that led to this report was announced during President Obama’s speech on NSA reform, and even though respondents to the White House’s Big Data Survey “were most wary of how intelligence and law enforcement agencies are collecting and using data about them,” the report itself is surprisingly silent on the issue.2 This is especially confusing given how much the report talks about the need for more transparency in the private sector when it comes to big data. Given that this same logic could well be applied to intelligence big data programs, we don’t understand why the report did not address this vital issue.
1More
Robot hummingbird passes flight tests (w/ Video) - 0 views
www.physorg.com/...-hummingbird-flight-video.html
robot hummingbird passes flight 2011 technology writeabout
shared by John Lemke on 28 Feb 11
- No Cached
-
The Hummingbird's bird-shaped body is removable but it gives the bot an uncanny resemblance to a real hummingbird. The vehicle can hover and maneuver just like the bird. The ornithopter can fly into buildings under the control of an operator flying the spybot with the help of a feed from its tiny video camera. The prototype is capable of flying at speeds of up to 18 km/h (11 mph) and weighs 19 grams, which is about the same as an AA battery.
With hacking, music can take control of your car | ITworld - 0 views
www.itworld.com/...usic-can-take-control-your-car
wroteatindienation tech 2011 hacking music hack security exploit malware technology indienationnews
shared by John Lemke on 20 Mar 11
- No Cached
1More
BGU Students Develop Thought-Controlled, Hands-Free Computer For The Disabled - 0 views
in.bgu.ac.il/...thought_controlled.aspx
2011 writeabout technology tech indienationnews students handsfree control medicine BGU biotech
shared by John Lemke on 03 May 11
- No Cached
-
BGU software engineering students have developed innovative technology that could enable people to operate a computer without using a keyboard or mouse - only their brainwaves. While there have been previous attempts to develop devices to read brainwaves and operate specific programs, they were cumbersome and not feasible outside of a laboratory setting. The BGU technology features a helmet equipped with 14 EEG connect points that sense brain activity. According to Dr. Rami Puzis, "The technology is designed to assist those who are physically disabled who might otherwise be unable to manipulate a computer mouse or keyboard." The student team, Ori Ossmy, Ofir Tam and Ariel Rozen, developed the prototype application for their bachelor's degree project under supervision at BGU by Prof. Mark Last, Dr. Rami Puzis, Prof. Yuval Elovich and Dr. Lior Rokah. As part of a recent demonstration, a student composed and sent a hands-free e-mail using only thought combined with the adaptive hardware. The students and BGU team plan to continue research working with the disabled.
1More
Foxconn worker riot closes factory | Ars Technica - 0 views
arstechnica.com/...onn-worker-riot-closes-factory
2012 worker indienationnews riot China Foxconn factory civil
shared by John Lemke on 24 Sep 12
- No Cached
-
Early Monday morning, Foxconn released a statement indicating that the riot started as a personal disagreement between factory workers in a dormitory and was eventually brought under control by police, but this clashes with reports trickling in from users of China's version of Twitter, Sina Weibo. Much like with the situations in Egypt and other Arab Spring countries earlier this year, microbloggers are painting a different picture than the one presented by official sources; numerous Weibo posts indicate that the riots were started not by a fight between workers in off-campus housing, but instead by security guards beating one or more workers nearly to death. Regardless of the cause, pictures leaking out from the scene show some destruction, including broken windows and a toppled guard post building.
2More
The Internet Isn't Broken; So Why Is The ITU Trying To 'Fix' It? | Techdirt - 0 views
www.techdirt.com/...-is-itu-trying-to-fix-it.shtml
InternetAccess regulation government politics TNN IN law legal international indienationnews technology ITO Internet 2012
shared by John Lemke on 04 Dec 12
- No Cached
-
Of course, internet access has already been spreading to the far corners of the planet without any "help" from the ITU. Over two billion people are already online, representing about a third of the planet. And, yes, spreading that access further is a good goal, but the ITU is not the player to do it. The reason that the internet has been so successful and has already spread as far as it has, as fast as it has, is that it hasn't been controlled by a bureaucratic government body in which only other governments could vote. Instead, it was built as an open interoperable system that anyone could help build out. It was built in a bottom up manner, mainly by engineers, not bureaucrats. Changing that now makes very little sense.
-
And that's the thing. The internet works just fine. The only reason to "fix" it, is to "break" it in exactly the way the ITU wants, which is to favor a few players who have done nothing innovative to actually deserve it.
9More
FCC to buy out TV broadcasters to free up mobile spectrum | Ars Technica - 0 views
arstechnica.com/...ers-to-free-up-mobile-spectrum
indienationnews 2012 fcc broadband spectrum mobile bandwidth cellphone mobile mobile-web
shared by John Lemke on 30 Sep 12
- No Cached
-
-
I had my first issue at step one, "asks broadcasters to tell the FCC how much it wold take for the agency to buy them out". They claim that this is a way to keep cost down by hopefully grabbing the least popular via low bids. I see two issues immediately. Number one by asking them what they want they are going to immediately INCREASE the bids. Two, if you are asking me what I want for my business to change how it broadcasts why would I not include any expense to make the switch. By asking them what they think a fair bid would be, they are, more or less, giving them a blank check.
-
-
the commission will put the newly-freed blocks of spectrum up for auction. If, as expected, the spectrum is more valuable when used for mobile services than broadcast television, then the FCC should reap significantly more from these traditional auctions than it had to pay for the spectrum in the original reverse auctions, producing a tidy profit for taxpayers.
-
-
The objective at an auction is to purchase the object at the lowest possible cost. How much mobile providers are willing to pay will determine how high bids will climb. Based on how our current mobile providers already provide poor service when compared to the rest of the world, how much is that bandwidth actually worth to these companies that, more or less, have a lobbied stranglehold on the consumer?
-
- ...6 more annotations...
-
Bergmayer also praised an FCC proposal to update its "spectrum screen," a set of rules that prevent any single provider from gaining too large a share of the spectrum available in a particular market. The current scheme, he said, "treats all spectrum alike, even though some spectrum bands are better-suited to mobile broadband than others." As a result, he argued, it has become ineffective at preventing Verizon and AT&T from gaining enough spectrum to threaten competition. He urged the FCC to revise the rules to ensure the new auctions don't further entrench the dominance of the largest incumbents.
-
-
Over the last decade, it has become increasingly obvious that America's spectrum resources are mis-allocated. The proliferation of cell phones, and more recently smartphones and tablets, has given mobile providers a voracious appetite for new spectrum. But a big chunk of the available spectrum is currently occupied by broadcast television stations. With more and more households subscribed to cable, satellite, and Internet video services, traditional broadcast television is looking like an increasingly outmoded use of the scarce and valuable airwaves.
-
incumbent broadcasters have controlled their channels for so long that they've come to be regarded as de facto property rights. And needless to say, the politically powerful broadcasters have fiercely resisted any efforts to force them to relinquish their spectrum.
-
The plan has three phases. In the first phase, the FCC will conduct a reverse auction in which it asks broadcasters to tell the FCC how much it would take for the agency to buy them out. Presumably, the least popular (and, therefore, least profitable) channels will submit the lowest bids. By accepting these low bids, the FCC can free up the maximum possible spectrum at the minimum cost
1More
September 11, 2012: Opus audio codec is now RFC6716, Opus 1.0.1 reference source released - 0 views
-
Free and Open Another reason there are so many audio codecs: silly licensing restrictions. Would you base a business on technology a competitor controls? That's why the Opus specification and complete source are Free, Open, and available for any use whatsoever without IP restrictions, explicit licensing or royalties. Opus was developed and tested in a public, fully transparent process within the IETF, proof that open collaboration can produce a better audio codec than proprietary, secretive, patent-encumbered systems. Open standards benefit-- and benefit from-- open source organizations and traditional commercial software companies alike. Opus itself is the result of a collaboration including Broadcom, Google, the IETF, Microsoft (through Skype), Mozilla, Octasic and Xiph.Org.
3More
Kim Dotcom Teases Megabox, Reveals Exclusive Artists? | TorrentFreak - 0 views
torrentfreak.com/veals-exclusive-artists-120926
2012 Kim Dotcom Dotcom MegaUpload Megabox p2p fileshring newmedialorder newbusinessmodel business music_Business
shared by John Lemke on 26 Sep 12
- No Cached
-
Kim Dotcom is determined to put the major music labels out of business with Megabox. At the same time he promises to give artists full control over their own work and a healthy revenue stream. Today Dotcom released a video on the making of Megabox which unveils some of the service’s features. The video also shows “The Black Keys,” “Rusko,” “Two Fingers” and “Will.i.am” as exclusive artists.
-
So why would artists join Megabox in the first place? The goal of Megabox is to give the public access to free music and compensate artists through advertising revenue. Megaupload’s founder believes that this “free music” business model has the potential to decrease music piracy while giving artists proper compensation for their work. This revenue comes from the Megakey application that users have to install. Megakey works like an ad blocker, but instead of blocking ads it replaces a small percentage with Mega’s own ads. Those who prefer not to install the app have the option to buy the music instead.
-
“These new solutions will allow content creators to keep 90% of all earnings and generate significant income from the untapped market of free downloads,” Dotcom said.
4More
So What Can The Music Industry Do Now? | Techdirt - 0 views
www.techdirt.com/...an-music-industry-do-now.shtml
2012 industry music newmediaorder businessmodel business techdirt
shared by John Lemke on 28 Sep 12
- No Cached
-
The past was, and the future is going to be, much more about performance. In this new world, recordings often function as more as ads for concerts than as money-makers themselves. (And sometimes are bundled with concert tickets, as Madonna's latest album was.) As a result, copying looks a lot less fearsome. A copied ad is just as effective--and maybe much more so--than the original.
-
Just ask pop singer Colbie Caillat. Caillet's music career began in 2005 when a friend posted several of her home-recorded songs to MySpace. One song, Bubbly, began to get word of mouth among MySpace users, and within a couple of months went viral. Soon Colbie Caillat was the No. 1 unsigned artist on MySpace. Two years after posting Bubbly, Caillet had more than 200,000 MySpace friends, and her songs had been played more than 22 million times. Caillet had built a global fan base while never leaving her Malibu home. In 2007, Universal Records released her debut album, Coco, which peaked at No. 5 on the Billboard charts and reached platinum status.
-
The problem of piracy in music is, of course, very different from the problem in comedy. Stand-up comics worry most about a rival, not a fan, copying their jokes. Still, the reduction of consumer copying of music via norms may be possible, and will become more imaginable if the music industry experiences ever-greater fragmentation and communication. There is already an interesting example of norms playing a substantial role in controlling copying in music. In the culture of jambands, we see the fans themselves taking action to deter pirates. What are jambands? In a fascinating 2006 paper, legal scholar Mark Schultz studied the unique culture of a group of bands that belong to a musical genre, pioneered by the Grateful Dead, characterized by long-form improvisation, extensive touring, recreational drug use, and dedicated fans. Although acts like Phish, Blues Traveler, and the Dave Mathews Band vary in their styles, they are all recognizably inspired by the progenitors of jam music, the Dead. But the Dead's influence is not only musical. Most jambands adhere to a particular relationship with their fans that also was forged by the Dead.
- ...1 more annotation...
-
it turns out that by killing the single, the record labels made the Internet piracy problem, when it arrived, even worse. One of the major attractions of filesharing was that it brought back singles. Consumers wanted the one or two songs on the album that they liked, and not the ten they didn't.
2More
Java-based malware driving DDoS botnet infects Windows, Mac, Linux devices | Ars Technica - 0 views
arstechnica.com/...ects-windows-mac-linux-devices
2014 malware ddos windows mac linux technology tech security botnet
shared by John Lemke on 29 Jan 14
- No Cached
-
takes hold of computers by exploiting CVE-2013-2465, a critical Java vulnerability that Oracle patched in June. The security bug is present on Java 7 u21 and earlier. Once the bot has infected a computer, it copies itself to the autostart directory of its respective platform to ensure it runs whenever the machine is turned on. Compromised computers then report to an Internet relay chat channel that acts as a command and control server.
-
The botnet is designed to conduct distributed denial-of-service attacks on targets of the attackers' choice. Commands issued in the IRC channel allow the attackers to specify the IP address, port number, intensity, and duration of attacks.
16More
Snowden Keeps Outwitting U.S. Spies - The Daily Beast - 0 views
www.thedailybeast.com/...till-outwitting-u-s-spies.html
2014 indienationnews legal law security Snowden Spying
shared by John Lemke on 11 Feb 14
- No Cached
-
First, it assumes that Snowden’s master file includes data from every network he ever scanned. Second, it assumes that this file is already in or will end up in the hands of America’s adversaries. If these assumptions turn out to be true, then the alarm raised in the last week will be warranted. The key word here is “if.”
-
One U.S. intelligence official briefed on the report said the DIA concluded that Snowden visited classified facilities outside the NSA station where he worked in Hawaii while he was downloading the documents he would eventually leak to journalists Glenn Greenwald and Barton Gellman. On Tuesday, Clapper himself estimated that less than 10 percent of the documents Snowden took were from the NSA.
- ...10 more annotations...
-
DIA director Gen. Michael Flynn put it this way on Tuesday in testimony before the House Permanent Select Committee on Intelligence: “We
-
The U.S. intelligence official briefed on the report said the DIA was able to retrace the steps Snowden took inside the military’s classified systems to find every site where he rummaged around. “Snowden had a very limited amount of time before he would be detected when he did this, so we
-
Bruce Schneier, a cybersecurity expert and cryptographer who Greenwald has consulted on the Snowden archive, said it was prudent to
-
In June, Greenwald told the Daily Beast that he did not know whether or not Snowden had additional documents beyond the ones he gave him. “I believe he does. He was clear he did not want to give to journalists things he did not think should be published.”
-
Snowden, however, has implied that he does not have control over the files he took. “No intelligence service—not even our own—has the capacity to compromise the secrets I continue to protect,” he wrote in July in a letter to former New Hampshire Republican senator Gordon Humphrey. “While it has not been reported in the media, one of my specializations was to teach our people at DIA how to keep such information from being compromised even in the highest threat counter-intelligence environments (i.e. China). You may rest easy knowing I cannot be coerced into revealing that information, even under torture.”
2More
Leaked Snowden documents detail NSA's plans for 'millions' of malware attacks | The Verge - 0 views
www.theverge.com/...or-millions-of-malware-attacks
2014 leaked documents nsa malware attacks security privacy yourroights surveillance spying indienationnews law legal
shared by John Lemke on 12 Mar 14
- No Cached
-
A program known as TURBINE, first revealed last year, is meant to dramatically speed the process: one document says it will "allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually."
-
The scaling process, according to Greenwald, started in 2004, when the NSA operated only 100 to 150 software implants. The number of implants used in the years between 2010 to 2012, by contrast, is described as numbering in the tens of thousands.
4More
2 million Facebook, Gmail and Twitter passwords stolen in massive hack - Dec. 4, 2013 - 0 views
-
The massive data breach was a result of keylogging software maliciously installed on an untold number of computers around the world,
-
The virus was capturing log-in credentials for key websites over the past month and sending those usernames and passwords to a server controlled by the hackers.
-
Of all the compromised services, Miller said he is most concerned with ADP. Those log-ins are typically used by payroll personnel who manage workers' paychecks. Any information they see could be viewed by hackers until passwords are reset.
- ...1 more annotation...
-
But in a statement, ADP said that, "To [its] knowledge, none of ADP's clients has been adversely affected by the compromised credentials."
7More
Artificial spleen cleans up blood : Nature News & Comment - 0 views
www.nature.com/...spleen-cleans-up-blood-1.15917
blood 2014 indienationnews biotech spleen filter artificialOrgans
shared by John Lemke on 15 Sep 14
- No Cached
-
A device inspired by the spleen can quickly clean blood of everything from Escherichia coli to Ebola, researchers report on 14 September in Nature Medicine1.
-
Blood infections can be very difficult to treat, and can lead to sepsis, an often-fatal immune response. More than 50% of the time, physicians cannot diagnose the cause of an infection that has prompted sepsis, and so they resort to antibiotics that attack a broad range of bacteria2. This approach is not always effective, and can lead to antibiotic resistance in bacteria.
-
To test the device, Ingber and his team infected rats with either E. coli or Staphylococcus aureus and filtered blood from some of the animals through the biospleen. Five hours after infection, 89% of the rats whose blood had been filtered were still alive, compared with only 14% of those that were infected but not treated.
- ...3 more annotations...
-
The researchers then tested whether the biospleen could handle the volume of blood in an average adult human — about 5 litres. They ran human blood containing a mixture of bacteria and fungi through the biospleen at a rate of 1 litre per hour, and found that the device removed most of the pathogens within five hours.
-
That degree of efficacy is probably enough to control an infection, Ingber says. Once the biospleen has removed most pathogens from the blood, antibiotics and the immune system can fight off remaining traces of infection — such as pathogens lodged in the organs, he says.
6More
Mega Goes Legal, Issues Ultimatum Over Cyberlocker Report | TorrentFreak - 0 views
torrentfreak.com/over-cyberlocker-report-140925
2014.09.29-TNN indienationnews news report mega law legal P2P filesharing
shared by John Lemke on 25 Sep 14
- No Cached
-
Mega was founded by Kim Dotcom but the site bears little resemblance to his now defunct Megaupload. Perhaps most importantly, Mega was the most-scrutinized file-hosting startup ever, so every single detail simply had to be squeaky clean. As a result the site took extensive legal advice to ensure that it complies with every single facet of the law. Nevertheless, NetNames took the decision to put Mega in its report anyway, bundling the site in with what are described as some of the market’s most dubious players. This was not received well by Mega CEO Graham Gaylard. In a TorrentFreak article he demanded a full apology from NetNames and Digital Citizens Alliance and for his company to be withdrawn from the report. Failure to do so would result in “further action”, he said.
-
“Mega’s legal counsel has written to NetNames, Digital Citizens Alliance and The Internet Technology & Innovation Foundation (ITIF) stating that the report is clearly defamatory,” Mega CEO Graham Gaylard told TorrentFreak this morning.
-
Firstly, Mega’s legal team are now demanding the removal of the report, and all references to it, from all channels under the respondents’ control. They also demand that further circulation of the report must be discontinued and no additional references to it should be made in public.
- ...3 more annotations...
-
also demanding a list of everyone who has had a copy of the report made available to them along with details of all locations where the report has been published.
-
Finally, Mega is demanding a full public apology “to its satisfaction” to be published on the homepages of the respondents’ websites.