Robotic cockroaches, ice phones and redesigning PRISM



by Rob Walker | @YahooTechBetween E3 and Apple s Worldwide Developers Conference, it was a huge week for tech news. Can you remember any of it? Me neither. Let s stop trying and enjoy these diversions instead.

Timeless Fashion: This wonderful little video brings predictions from 1939 about what we d be wearing in 2000. An electric belt, a dress made of aluminum, a hilarious electric headlight, a chest-mounted telephone, and at least one totally inexplicable hat. Sadly that future is now our past, but remember when you all wore this stuff? Via New Media Rockstars.

Hard To Like: A cleverly maddening mini online game. Via Prosthetic Knowledge.

Speaking of Facebook: Don t forget about the exciting new privacy option.

Speaking of the NSA: Last week I complained about PRISM s awful graphic design elements. Naturally, unsolicited redesigns have emerged.

Good Call: Retro Thing reviews The Ice Phone, which converts your modern cell phone into a retro desk phone. It actually does look pretty cool.

What Could Possibly Go Wrong? A Kickstarter campaign for RoboRoach involves creating tiny electronic backpacks that transmit pulses to a cockroach s antennae (this involves a short surgery ), ultimately allowing you to control the bug s movements through your mobile device. Science! Needless to say, this macabre enterprise is already more than halfway to reaching its funding goal. Via PSFK.

Creative Reuse: What to do with your outdated laptop? Maybe this. (Thx, E.)

Tearing Google Glass To Pieces: If you ve had that urge, this may be of interest. Via Sparkfun.

Educational Programming: This is not a video of obscene gestures from around the world; it is an example of social construction.

Vladimir Putin and Wendy Deng: Just that. Via none other than @page88.

Sour On Apple: Oh, now I remember that Apple event I wrote about the company s withering take on its own current iOS design. Jony Ive to the rescue, right? Well, insta-Tumblr jonyiveredesignsthings suggests not everyone is impressed. Curiously, no one seems to have submitted an Ive-style PRISM logo. Now s your chance.

Have a Nice Weekend: And consider baking an egg in an avocado. I know I m going to.

Secret to Prism success: Even bigger data seizure



WASHINGTON (AP) -- In the months and early years after 9/11, FBI agents began showing up at Microsoft Corp. more frequently than before, armed with court orders demanding information on customers.

Around the world, government spies and eavesdroppers were tracking the email and Internet addresses used by suspected terrorists. Often, those trails led to the world's largest software company and, at the time, largest email provider.

The agents wanted email archives, account information, practically everything, and quickly. Engineers compiled the data, sometimes by hand, and delivered it to the government.

Often there was no easy way to tell if the information belonged to foreigners or Americans. So much data was changing hands that one former Microsoft employee recalls that the engineers were anxious about whether the company should cooperate.

Inside Microsoft, some called it "Hoovering" not after the vacuum cleaner, but after J. Edgar Hoover, the first FBI director, who gathered dirt on countless Americans.

This frenetic, manual process was the forerunner to Prism, the recently revealed highly classified National Security Agency program that seizes records from Internet companies. As laws changed and technology improved, the government and industry moved toward a streamlined, electronic process, which required less time from the companies and provided the government data in a more standard format.

The revelation of Prism this month by the Washington Post and Guardian newspapers has touched off the latest round in a decade-long debate over what limits to impose on government eavesdropping, which the Obama administration says is essential to keep the nation safe.

But interviews with more than a dozen current and former government and technology officials and outside experts show that, while Prism has attracted the recent attention, the program actually is a relatively small part of a much more expansive and intrusive eavesdropping effort.

Americans who disapprove of the government reading their emails have more to worry about from a different and larger NSA effort that snatches data as it passes through the fiber optic cables that make up the Internet's backbone. That program, which has been known for years, copies Internet traffic as it enters and leaves the United States, then routes it to the NSA for analysis.

Whether by clever choice or coincidence, Prism appears to do what its name suggests. Like a triangular piece of glass, Prism takes large beams of data and helps the government find discrete, manageable strands of information.

The fact that it is productive is not surprising; documents show it is one of the major sources for what ends up in the president's daily briefing. Prism makes sense of the cacophony of the Internet's raw feed. It provides the government with names, addresses, conversation histories and entire archives of email inboxes.

Many of the people interviewed for this report insisted on anonymity because they were not authorized to publicly discuss a classified, continuing effort. But those interviews, along with public statements and the few public documents available, show there are two vital components to Prism's success.

The first is how the government works closely with the companies that keep people perpetually connected to each other and the world. That story line has attracted the most attention so far.

The second and far murkier one is how Prism fits into a larger U.S. wiretapping program in place for years.

___

Deep in the oceans, hundreds of cables carry much of the world's phone and Internet traffic. Since at least the early 1970s, the NSA has been tapping foreign cables. It doesn't need permission. That's its job.

But Internet data doesn't care about borders. Send an email from Pakistan to Afghanistan and it might pass through a mail server in the United States, the same computer that handles messages to and from Americans. The NSA is prohibited from spying on Americans or anyone inside the United States. That's the FBI's job and it requires a warrant.

Despite that prohibition, shortly after the Sept. 11 attacks, President George W. Bush secretly authorized the NSA to plug into the fiber optic cables that enter and leave the United States, knowing it would give the government unprecedented, warrantless access to Americans' private conversations.

Tapping into those cables allows the NSA access to monitor emails, telephone calls, video chats, websites, bank transactions and more. It takes powerful computers to decrypt, store and analyze all this information, but the information is all there, zipping by at the speed of light.

"You have to assume everything is being collected," said Bruce Schneier, who has been studying and writing about cryptography and computer security for two decades.

The New York Times disclosed the existence of this effort in 2005. In 2006, former AT&T technician Mark Klein revealed that the company had allowed the NSA to install a computer at its San Francisco switching center, a spot where fiber optic cables enter the U.S.

What followed was the most significant debate over domestic surveillance since the 1975 Church Committee, a special Senate committee led by Sen. Frank Church, D-Idaho, reined in the CIA and FBI for spying on Americans.

Unlike the recent debate over Prism, however, there were no visual aids, no easy-to-follow charts explaining that the government was sweeping up millions of emails and listening to phone calls of people accused of no wrongdoing.

The Bush administration called it the "Terrorist Surveillance Program" and said it was keeping the United States safe.

"This program has produced intelligence for us that has been very valuable in the global war on terror, both in terms of saving lives and breaking up plots directed at the United States," Vice President Dick Cheney said at the time.

The government has said it minimizes all conversations and emails involving Americans. Exactly what that means remains classified. But former U.S. officials familiar with the process say it allows the government to keep the information as long as it is labeled as belonging to an American and stored in a special, restricted part of a computer.

That means Americans' personal emails can live in government computers, but analysts can't access, read or listen to them unless the emails become relevant to a national security investigation.

The government doesn't automatically delete the data, officials said, because an email or phone conversation that seems innocuous today might be significant a year from now.

What's unclear to the public is how long the government keeps the data. That is significant because the U.S. someday will have a new enemy. Two decades from now, the government could have a trove of American emails and phone records it can tap to investigative whatever Congress declares a threat to national security.

The Bush administration shut down its warrantless wiretapping program in 2007 but endorsed a new law, the Protect America Act, which allowed the wiretapping to continue with changes: The NSA generally would have to explain its techniques and targets to a secret court in Washington, but individual warrants would not be required.

Congress approved it, with Sen. Barack Obama, D-Ill., in the midst of a campaign for president, voting against it.

"This administration also puts forward a false choice between the liberties we cherish and the security we provide," Obama said in a speech two days before that vote. "I will provide our intelligence and law enforcement agencies with the tools they need to track and take out the terrorists without undermining our Constitution and our freedom."

___

When the Protect America Act made warrantless wiretapping legal, lawyers and executives at major technology companies knew what was about to happen.

One expert in national security law, who is directly familiar with how Internet companies dealt with the government during that period, recalls conversations in which technology officials worried aloud that the government would trample on Americans' constitutional right against unlawful searches, and that the companies would be called on to help.

The logistics were about to get daunting, too.

For years, the companies had been handling requests from the FBI. Now Congress had given the NSA the authority to take information without warrants. Though the companies didn't know it, the passage of the Protect America Act gave birth to a top-secret NSA program, officially called US-98XN.

It was known as Prism. Though many details are still unknown, it worked like this:

Every year, the attorney general and the director of national intelligence spell out in a classified document how the government plans to gather intelligence on foreigners overseas.

By law, the certification can be broad. The government isn't required to identify specific targets or places.

A federal judge, in a secret order, approves the plan.

With that, the government can issue "directives" to Internet companies to turn over information.

While the court provides the government with broad authority to seize records, the directives themselves typically are specific, said one former associate general counsel at a major Internet company. They identify a specific target or groups of targets. Other company officials recall similar experiences.

All adamantly denied turning over the kind of broad swaths of data that many people believed when the Prism documents were first released.

"We only ever comply with orders for requests about specific accounts or identifiers," Microsoft said in a statement.

Facebook said it received between 9,000 and 10,000 demands requests for data from all government agencies in the second half of last year. The social media company said fewer than 19,000 users were targeted.

How many of those were related to national security is unclear, and likely classified. The numbers suggest each request typically related to one or two people, not a vast range of users.

Tech company officials were unaware there was a program named Prism. Even former law enforcement and counterterrorism officials who were on the job when the program went live and were aware of its capabilities said this past week that they didn't know what it was called.

What the NSA called Prism, the companies knew as a streamlined system that automated and simplified the "Hoovering" from years earlier, the former assistant general counsel said. The companies, he said, wanted to reduce their workload. The government wanted the data in a structured, consistent format that was easy to search.

Any company in the communications business can expect a visit, said Mike Janke, CEO of Silent Circle, a company that advertises software for secure, encrypted conversations. The government is eager to find easy ways around security.

"They do this every two to three years," said Janke, who said government agents have approached his company but left empty-handed because his computer servers store little information. "They ask for the moon."

That often creates tension between the government and a technology industry with a reputation for having a civil libertarian bent. Companies occasionally argue to limit what the government takes. Yahoo even went to court and lost in a classified ruling in 2008, The New York Times reported Friday.

"The notion that Yahoo gives any federal agency vast or unfettered access to our users' records is categorically false," Ron Bell, the company's general counsel, said recently.

Under Prism, the delivery process varied by company.

Google, for instance, says it makes secure file transfers. Others use contractors or have set up stand-alone systems. Some have set up user interfaces making it easier for the government, according to a security expert familiar with the process.

Every company involved denied the most sensational assertion in the Prism documents: that the NSA pulled data "directly from the servers" of Microsoft, Yahoo, Google, Facebook, AOL and more.

Technology experts and a former government official say that phrasing, taken from a PowerPoint slide describing the program, was likely meant to differentiate Prism's neatly organized, company-provided data from the unstructured information snatched out of the Internet's major pipelines.

In slide made public by the newspapers, NSA analysts were encouraged to use data coming from both Prism and from the fiber-optic cables.

Prism, as its name suggests, helps narrow and focus the stream. If eavesdroppers spot a suspicious email among the torrent of data pouring into the United States, analysts can use information from Internet companies to pinpoint the user.

With Prism, the government gets a user's entire email inbox. Every email, including contacts with American citizens, becomes government property.

Once the NSA has an inbox, it can search its huge archives for information about everyone with whom the target communicated. All those people can be investigated, too.

That's one example of how emails belonging to Americans can become swept up in the hunt.

In that way, Prism helps justify specific, potentially personal searches. But it's the broader operation on the Internet fiber optics cables that actually captures the data, experts agree.

"I'm much more frightened and concerned about real-time monitoring on the Internet backbone," said Wolf Ruzicka, CEO of EastBanc Technologies, a Washington software company. "I cannot think of anything, outside of a face-to-face conversation, that they could not have access to."

One unanswered question, according to a former technology executive at one of the companies involved, is whether the government can use the data from Prism to work backward.

For example, not every company archives instant message conversations, chat room exchanges or videoconferences. But if Prism provided general details, known as metadata, about when a user began chatting, could the government "rewind" its copy of the global Internet stream, find the conversation and replay it in full?

That would take enormous computing, storage and code-breaking power. It's possible the NSA could use supercomputers to decrypt some transmissions, but it's unlikely it would have the ability to do that in volume. In other words, it would help to know what messages to zero in on.

Whether the government has that power and whether it uses Prism this way remains a closely guarded secret.

___

A few months after Obama took office in 2009, the surveillance debate reignited in Congress because the NSA had crossed the line. Eavesdroppers, it turned out, had been using their warrantless wiretap authority to intercept far more emails and phone calls of Americans than they were supposed to.

Obama, no longer opposed to the wiretapping, made unspecified changes to the process. The government said the problems were fixed.

"I came in with a healthy skepticism about these programs," Obama explained recently. "My team evaluated them. We scrubbed them thoroughly. We actually expanded some of the oversight, increased some of the safeguards."

Years after decrying Bush for it, Obama said Americans did have to make tough choices in the name of safety.

"You can't have 100 percent security and also then have 100 percent privacy and zero inconvenience," the president said.

Obama's administration, echoing his predecessor's, credited the surveillance with disrupting several terrorist attacks. Leading figures from the Bush administration who endured criticism during Obama's candidacy have applauded the president for keeping the surveillance intact.

Jason Weinstein, who recently left the Justice Department as head of its cybercrime and intellectual property section, said it's no surprise Obama continued the eavesdropping.

"You can't expect a president to not use a legal tool that Congress has given him to protect the country," he said. "So, Congress has given him the tool. The president's using it. And the courts are saying 'The way you're using it is OK.' That's checks and balances at work."

Schneier, the author and security expert, said it doesn't really matter how Prism works, technically. Just assume the government collects everything, he said.

He said it doesn't matter what the government and the companies say, either. It's spycraft, after all.

"Everyone is playing word games," he said. "No one is telling the truth."

___

Associated Press writers Eileen Sullivan, Peter Svensonn, Adam Goldman, Michael Liedtke and Monika Mathur contributed to this report.

___

Contact the AP's Washington investigative team at DCinvestigations@ap.org

Relatives urge Florida to issue permit for exhumations at school



By Saundra Amrhein

TAMPA, Florida (Reuters) - Relatives of boys who died at a Florida reform school urged the state on Friday to issue a permit allowing investigators to exhume human remains found on the grounds of the school, which has long been plagued with accusations of abuse and mysterious deaths.

Dozens of unmarked graves have been uncovered at the Dozier School in the Florida Panhandle city of Marianna. Investigators are trying to determine the circumstances surrounding the deaths, which experts say likely occurred between 1914 and 1952. The school was closed in 2011.

On Friday, relatives of three boys who died at the school submitted to DNA cheek swabs in the hopes that these and other families' samples can soon start being compared to the remains discovered at Dozier, once the state's major reform school.

A more than two-year-long investigation led by researchers at the University of South Florida (USF) has hit a snag while relatives, surviving former students and prominent politicians await a state decision for a permit to begin the exhumations from more than 50 unmarked graves.

Some are questioning the delay.

"Why are we in this conundrum?" a frustrated Glen Varnadoe asked after his elderly uncle, Richard, submitted to a DNA cheek swab. Glen Varnadoe's uncle, Thomas, who was Richard's brother, died at the school in 1934, one month after he was remanded there at age 13.

Last year, Varnadoe's lawsuit over the return of Thomas' remains forced a judge to halt the state's sale of the Dozier property.

Several years ago, former students told horror stories of sexual abuse and frequent beatings in a mausoleum-like building on the school's grounds dubbed the "White House."

Despite strong opposition among some residents near the school, the state legislature recently allocated almost $200,000 to help investigators exhume the bodies, identify the remains and determine the cause of death.

In March, Florida Attorney General Pam Bondi asked a state judge for permission to start the exhumation, a request that was denied last month in a ruling that said the state archaeologist has jurisdiction over remains interred for more than 75 years.

USF investigators received a reply from State Archaeologist Mary Glowacki regarding their permit request on Friday. The two-page letter consisted of a long list of additional questions.

A call to Glowacki's office for comment was forwarded to the Florida Department of State and not immediately returned.

Erin Kimmerle, lead investigator and associate professor of anthropology at USF, said her team needed time to review the questions.

U.S. Senator Bill Nelson, a Democrat, warned that if the permit process continued to drag on, he would ask the U.S. Department of Justice to conduct its own investigation.

"If it's an attempt to delay and obfuscate," Nelson said, "the people of Florida are not going to stand for it."

(Editing by Kevin Gray and Andre Grenon)

U.S. aid to Syria rebels likely to include mortars, RPGs: sources



By Mark Hosenball

WASHINGTON (Reuters) - The United States is likely to send weaponry like rocket-propelled grenades and mortars to Syria's rebels after President Barack Obama approved arming the insurgents, sources said on Friday.

A source in the Middle East who is familiar with U.S. dealings with the rebels told Reuters that weapon supplies would include automatic weapons, light mortars and rocket-propelled grenades, known as RPGs.

Accusing Syrian President Bashar al-Assad's forces of using chemical weapons, the White House said on Thursday the United States would supply direct military assistance to the rebels. A U.S. official said that meant sending them weapons supplies for the first time.

Two European security sources said the United States would increase the caliber of the arms and ammunition being supplied to the rebels by regional powers including Saudi Arabia and Qatar, as well as supply some heavier weapons, including RPGs.

More RPGs would give the rebels, who have lost ground to government forces and Lebanese Hezbollah militants in recent weeks, greater ability to fight government armored vehicles and even tanks.

But a U.S. official who has been briefed on the new policy said he did not expect the new U.S. aid to seriously affect the course of events in Syria.

All three sources said there were no plans to send shoulder-held anti-aircraft missiles, known as MANPADS, to the mostly Sunni rebels fighting Assad and his Lebanese Hezbollah Shi'ite allies.

The first military supplies - to be sent to groups under rebel commander Salim Idriss that are vetted by Washington and its allies - could take a minimum of two to three weeks to be delivered.

Deputy national security adviser Ben Rhodes refused to say on Friday how Washington would arm the rebels.

"I'm not going to get into kind of a detailed description of different types of assistance," he told a briefing in the White House.

Aid to the rebels will most likely go through Turkey, where the United States is involved in a secret base that Turkey set up with Saudi Arabia and Qatar to direct military and communications aid to Syria's armed opposition. U.S. aid could also go through Jordan where several thousand U.S. troops are on a joint exercise. A further 200 soldiers from the U.S. Army's First Division are also there.

(Editing by Alistair Bell and Peter Cooney)

CBS: Someone tampered with reporter's computer



NEW YORK (AP) Private investigators found that CBS News Washington reporter Sharyl Attkisson's computer was tampered with multiple times late last year, the network said Friday.

CBS said an intruder, working remotely using Attkisson's accounts, executed commands involving the search and filtering of data. The network said it is taking further steps to identify the intruder and how that person gained access to her computer.

CBS hired a cybersecurity firm to conduct the analysis. Attkisson, an investigative reporter who has worked at CBS since 1995, said three weeks ago that she thought someone had tampered with her computers.

In an interview with Philadelphia's WPHT radio on May 21, Attkisson said "there could be some relationship" between what has happened to her and to James Rosen, the chief Washington correspondent for Fox News Channel. In what appeared to be a leak investigation, law enforcement officials obtained a search warrant to obtain some of Rosen's private emails and tracked his comings and goings from the State Department.

Attkisson said she had been having problems with a computer in her house since at least February 2011. At that time, she said, she was investigating the Bureau of Alcohol, Tobacco, Firearms and Explosives' "Fast and Furious" gun-smuggling sting operation and stimulus spending on clean-energy projects. Attkisson won an Emmy award for her "Fast and Furious" investigation.

In another leak probe, prosecutors secretly subpoenaed phone records from The Associated Press.

In its analysis, the cybersecurity firm said that whoever tampered with Attkisson's computer "used sophisticated methods to remove all possible indications of unauthorized activity, and alter system times to cause further confusion."

Sting, Billy Joel, Elton John at Songwriters Hall



NEW YORK (AP) Sting performed in honor of Elton John, Billy Joel sang snippets of Foreigner's hits when introducing the band and Smokey Robinson debuted part of a new song he wrote about Berry Gordy.

The 44th annual Songwriters Hall of Fame ceremony was full of star power that included Alison Krauss, Aerosmith's Steven Tyler and Joe Perry, Nickelback, Petula Clark, Wiz Khalifa, Jordin Sparks and a video message from Bill Clinton.

Tyler, Perry, Mick Jones and Lou Gramm of Foreigner, Holly Knight, JD Souther and Tony Hatch were inducted Thursday into the Songwriters Hall 2013 class in New York City.

John and writing partner Bernie Taupin received the Johnny Mercer award, and Sting kicked off the night with a performance of "Saturday Night's Alright for Fighting." Sting also called John and Taupin "my two heroes."

John, who was inducted into the Songwriters Hall in 1992, said songwriting is often taken for granted.

"I don't mean this lightly, but when you get an Ivor Novello award or an American songwriter's award, it means so much more than a Grammy because this is where the whole process starts," he said.

John also used the stage to try to clear his differences with Joel.

"I didn't see you tonight Mr. Joel, but I want to see you," he said.

Joel responded later when he was onstage with light jokes.

"Is Elton still here by the way?" he asked. "Anyway, we're OK. Call me. It's the same phone number."

Joel introduced Jones and Gramm, who gave the night's most rousing performance when they sang the Foreigner hits "Juke Box Hero" and "I Want to Know What Love Is," which had the crowd singing along, standing and swaying side-to-side at the black tie event. Foreigner also got a boost thanks to The Anthony Morgan's Inspirational Choir of Harlem.

Petula Clark also stunned with her performance of "Downtown," which Hatch wrote and produced in 1964. Hatch, too, was entertaining on the piano as he sang a medley of tunes he wrote, including Clark's "My Love" and Bobby Rydell's "Forget Him."

Hatch also provided the laughs after thanking Universal Music, who owns his publishing.

"I hope that plug will get me more royalties in the future," he said. "I'm still under those 1966 contracts."

Nickelback was impressive with their rendition of Aerosmith's "Sweet Emotion," which was followed with the rock icons singing "Walk This Way."

Krauss was soft when she sang for Souther, and Patty Smyth was a firecracker when she performed "The Warrior" in honor of Knight, who has written hits for Tina Turner and Pat Benatar.

"I want to dedicate this to all of my exes," Knight said before singing "Love Is a Battlefield" on piano.

Robinson, who gave a lengthy, 15-minute introduction to Gordy, said he was recovering from inflamed vocal cords and hadn't performed in two months. Then he sang part of a new song he wrote about his relationship with Gordy, who he called his mentor, brother, sometimes dad and best friend.

"Did you know all the joy you'd be bringing," he sang. Some of the cast of "Motown: The Musical" followed with a medley of classics.

Benny Blanco, the 25-year-old who has co-written No. 1 hits for Katy Perry, Maroon 5 and Ke$ha, earned the Hal David Starlight award.

"They picked the wrong person," said Blanco, who has also worked with Khalifa, Nicki Minaj and Bruno Mars. "I'm in a room with people I should probably be serving food to."

The event also featured a video from Clinton, who spoke about the significance of Sam Cooke's "A Change Is Gonna Come" during the Civil Rights Movement. The song, performed by Jordin Sparks, was honored with the towering song award.

The night also paid tribute to Hal David, who died last year, and Phil Ramone, who died in March.

____

Online:

http://www.songwritershalloffame.org/

____

Follow Mesfin Fekadu on Twitter: twitter.com/MusicMesfin

Months later, Sarah Palin back as Fox News analyst



NEW YORK (AP) Sarah Palin is rejoining Fox News Channel as an analyst less than half a year after they decided to part ways.

The former Alaska governor and 2008 Republican vice presidential candidate has signed on as a contributor to Fox and the Fox Business Network, it was announced on Thursday. Her first appearance back will be Monday on the morning show "Fox & Friends."

Fox News Chairman Roger Ailes said he's had several conversations with Palin over the past few weeks about her returning.

"I have great confidence in her and am pleased that she will once again add her commentary to our programming," Ailes said. "I hope she continues to speak her mind."

Palin said that "the power of Fox News is unparalleled. The role of Fox News in the important debates in our world is indispensable."

Palin joined Fox with great fanfare in 2010, when she was being talked about as a 2012 presidential contender. She signed for a reported $1 million a year; terms of her new contract were not disclosed, but it is unlikely to be that lucrative.

There were signs of some tension in Fox's relationship with Palin and questions about how she prepared for many of her segments. Palin announced she would not be a candidate in 2012 on a conservative radio show, which didn't please the television network paying her to be a contributor. Palin was overshadowed at Fox during the 2012 campaign by analyst Karl Rove.

But Fox stayed publicly positive when her departure was announced in January, with network executive Bill Shine saying that "we have thoroughly enjoyed our association" with her.

For the second time in a year, Palin will be used as ammunition in a television morning show competition. Her return on Monday is an attention-getting event that will come during the time slot that CNN is debuting its new morning show.

Last year, Palin was a one-day guest host on NBC's "Today" show when it was locked in a fierce ratings struggle with ABC's "Good Morning America," and that appearance enabled NBC to win that week in the ratings.

New diet craze offers five days of feasting for two days of famine



By Constance Watson

LONDON (Reuters) - Forget abandoning carbohydrates or detoxing. The new dieting craze sweeping Britain and taking off in the United States lets people eat whatever they like - but only five days a week.

"The Fast Diet", also known as the 5:2 diet, is the brainchild of TV medical journalist Michael Mosley and journalist Mimi Spencer and allows people to eat what they want for five days but only eat 600 calories a day on the other two.

Their book, "The Fast Diet", has topped bestselling book lists in Britain and the United States this year and been reprinted more than a dozen times.

Mosley said the diet is based on work by British and U.S. scientists who found intermittent fasting helped people lose more fat, increase insulin sensitivity and cut cholesterol which should mean reduced risk of heart disease and diabetes.

He tried this eating regime for a BBC television science program called "Eat, Fast, Live Longer" last August after finding out his cholesterol level was too high and his blood sugar in the diabetic range. He was stunned by the results.

"I started doing intermittent fasting a year ago, lost 8 kgs (18 pounds) of fat over 3 months and my blood results went back to normal," Mosley told Reuters.

Mosley said he had been amazed at the way the diet had taken off with a list of websites set up by followers of the 5:2 diet or variations of the eating regime to share their experiences.

Following the success of "The Fast Diet", Spencer joined forces with dietitian Sarah Schenker to bring out "The Fast Diet Recipe Book" in April which has topped amazon.co.uk's food and drink list with 150 recipes containing under 300 calories.

Eating a 600 calorie daily diet - about a quarter of a normal healthy adult's intake - could consist of two eggs for breakfast, grilled chicken and lettuce for lunch, and fish with rice noodles for dinner with nothing to drink but water, black coffee or tea.

ONE DAY AT A TIME

Mosley put the diet's success down to the fact it is psychologically attractive and leads to steady drop in weight with an average weekly loss of 1 pound (0.46kg) for women and slightly more for men.

"The problem with standard diets is that you feel like you are constantly having to exercise restraint and that means you are thinking about food all the time, which becomes self-defeating," said Mosley.

"On this regime you are only really on a diet two days a week. It is also extremely flexible and simple."

Britain's National Health Service (NHS) initially expressed doubts about the diet and its longterm effects, saying side effects could include sleeping difficulties, bad breath, irritability, anxiety, and daytime sleepiness.

But as the popularity of the 5:2 diet has grown and become one of the most searched diets on the Internet, the NHS has started to look again at the diet and its effects.

On its website last month the NHS said the British Dietetic Association (BDA) reviewed a 2011 study by researchers at the UK's University Hospital of South Manchester that suggested intermittent fasting could help lower the risk of certain obesity-related cancers such as breast cancer.

"The increasing popularity of the 5:2 diet should lead to further research of this kind," the BDA said in a statement.

Schenker, a sports and media dietitian who works with football clubs and food companies, said it was a shame that the NHS had criticized the eating regime that had proved such a success with so many people.

"We are in the midst of an obesity crisis and you need to balance up which is worse - intermittent fasting of staying obese?" Schenker told Reuters.

Despite concerns raised by the NHS, the 5:2 diet has been widely praised by those who follow it.

Deb Thomas, 50, a management coach from London, said she has followed the diet for six months and dropped a couple of dress sizes. This has also inspired her husband to join her in fasting two days a week.

"It is such an easy diet to follow that fits into my way of life," Thomas said. "You have a tough day of not eating but you know the next day you can eat normally again, and that keeps you going."

(Editing by Belinda Goldsmith)

Mumford & Sons cancels Bonnaroo performance



MANCHESTER, Tenn. (AP) Mumford & Sons has canceled its headlining performance at Bonnaroo Music & Arts Festival in Tennessee.

The decision comes after bassist Ted Dwane received treatment this week for a blood clot on his brain.

The band made the announcement on its Facebook page.

The band postponed three shows earlier this week after the blood clot was discovered, but hoped to play Bonnaroo on Saturday night.

There is no word on what act will replace Mumford & Sons in the headlining slot in front of 80,000 fans.

Dwane is recovering from the procedure and was not ready to play Saturday.

Rather than perform with a replacement, the London-based Grammy-award-winning folk rock band decided to pull out.

___

Online: http://mumfordandsons.com/

Follow AP Music Writer Chris Talbott: http://twitter.com/Chris_Talbott

Edward Snowden Claims NSA Documents Show U.S. Hacks China: Report



Alleged NSA leaker Edward Snowden claimed today to have evidence that the U.S. government has been hacking into Chinese computer networks since at least 2009 an effort he said is part of the tens of thousands of hacking operations American cyber spies have launched around the world, according to a Hong Kong newspaper.

The newspaper, the South China Morning Post, reported it had conducted a lengthy interview with the 29-year-old former NSA contractor, who is hiding out in Hong Kong after revealing himself to be the source of a series of headline-grabbing stories about the National Security Agency's secret, vast surveillance programs. After their unveiling, those programs were acknowledged and defended by top Obama administration officials.

The Post said Snowden provided documents, which the paper described as "unverified," that he said showed U.S. cyber operations targeting a Hong Kong university, public officials and students in the Chinese city. The paper said the documents also indicate hacking attacks targeting mainland Chinese targets, but did not reveal information about Chinese military systems.

Snowden, a civilian contractor who worked at an NSA facility in Hawaii before his flight to Hong Kong, said he believed that overall the NSA had launched more than 61,000 hacking operations globally, including attempts to spy on hundreds of targets in Hong Kong and in mainland China.

"We hack network backbones -- like huge internet routers, basically -- that give us access to the communications of hundreds of thousands of computers without having to hack every single one," Snowden said, according to the paper. "Last week the American government happily operated in the shadows with no respect for the consent of the governed, but no longer."

Snowden told the paper he was releasing the new information to show the "hypocrisy of the U.S. government when it claims that it does not target civilian infrastructure, unlike its adversaries."

As U.S. officials said the Justice Department is preparing to bring charges against Snowden for the NSA leaks, Snowden said he has no plans to leave Hong Kong even though that country has an extradition treaty with the U.S.

"People who think I made a mistake in picking Hong Kong as a location misunderstand my intentions," he said. "I am not here to hide from justice; I am here to reveal criminality My intention is to ask the courts and people of Hong Kong to decide my fate."

As the South China Morning Post published its reports on Snowden, America's top cyber officials appeared before a Congressional committee to discuss American offensive and defensive cyber operations, including those recently revealed by The Guardian and The Washington Post apparently based on information from Snowden.

Previously, top U.S. officials have blamed the Chinese government for being behind "persistent" -- and somewhat successful -- attempts to hack into American government and private networks. In return, Chinese officials recently said their government has "mountains of data" pointing to the U.S. hacking them.

Last week, President Obama signed a directive calling for government cyber tools to be "integrated with the full array of national security tools we have at our disposal," according to The Associated Press. That statement was made after British newspaper The Guardian revealed the directive -- allegedly one of many tips that came from Snowden before he stepped from the shadows.

CLICK HERE to return to The Investigative Unit homepage.

Also Read