124 stories

Sen. McCain Says Republicans Will Block All Court Nominations If Clinton Wins

2 Comments and 3 Shares

Sen. John McCain (R-Ariz) said Monday that if Hillary Clinton is elected, Republicans will unite to block anyone she nominates to the Supreme Court.

Speaking on WPHT-AM radio's "Dom Giordano Program" in Philadelphia, McCain pledged to obstruct any Clinton Supreme Court nomination for the current or any future vacancy.

Sen. John McCain speaks to the media, March 16, shortly after President Barack Obama nominated Merrick B. Garland to the Supreme Court. McCain said that the confirmation of the next Justice should occur after the election. Now he vows to block Hillary Clinton's choice if she wins the election. Pete Marovich/Getty Images hide caption

toggle caption
Pete Marovich/Getty Images

Sen. John McCain speaks to the media, March 16, shortly after President Barack Obama nominated Merrick B. Garland to the Supreme Court. McCain said that the confirmation of the next Justice should occur after the election. Now he vows to block Hillary Clinton's choice if she wins the election.

Pete Marovich/Getty Images

"I promise you that we will be united against any Supreme Court nominee that Hillary Clinton, if she were president, would put up," he declared.

McCain said that's why it is so important that Republicans retain control of the Senate.

Given that two of the sitting justices are 80 or older, and another is 78, there is a strong possibility that the next president will have more than one high court opening to fill.

The current court has been operating with just eight members since last February when Justice Antonin Scalia died unexpectedly. Republicans have refused since then to confirm President Obama's nominee, Judge Merrick Garland, on grounds that filling the slot should be left to the next president.

In his comments on WPHT, McCain seems to have upped the ante, suggesting that if Hillary Clinton is elected, Republicans would block any Supreme Court nomination she would make.

The Supreme Court in a Feb. 17, 2016 file photo. J. Scott Applewhite/AP hide caption

toggle caption
J. Scott Applewhite/AP

The Supreme Court in a Feb. 17, 2016 file photo.

J. Scott Applewhite/AP

McCain spokesperson Rachael Dean later said that McCain "believes you can only judge people by their record, and Hillary Clinton has a clear record of supporting liberal judicial nominees."

She went on to add that McCain "will, of course, thoroughly examine the record of any Supreme Court nominee put before the Senate and vote for or against that individual based on their qualifications."

Read the whole story
2 days ago
It's a bold move, promising not to do a job you're in the process of applying for...
Share this story
1 public comment
2 days ago
Do your job, McCain. Do it now!

Chris Craig: An Unusual Litmus Test For Sympathy Or Terror

1 Share

September 21, 2016 (Fault Lines) — The article at Fox News about a bomb threat at a Utah elementary school had a pretty vanilla headline:

Man arrested after making bomb threat at Utah elementary school

It’s accurate, short, and to the point. And it sums up exactly what happened:

Students and faculty at a Utah school suffered a real scare Monday after a man entered the building with a mask and told an employee to “evacuate the kids and no one will get hurt.”

Christopher Craig, 35, was arrested after allegedly making the threat against Eagle Mountain elementary school, Utah County Sheriff’s Office said in a news release.

Craig claimed there were explosives in his car, made threats, and said he had some sort of message, which the article doesn’t describe. It does mention, however, that he was arrested for threat of terrorism, among other charges. It also explains he had mental health issues.

A different article chooses to give a little more background about Craig in the title:

Former college coach arrested after bomb threat forces evacuation of Eagle Valley Elementary

That too appears to be accurate:

Craig, who police say gave himself up after three hours of negotiations, is the former head basketball coach at then-College of Eastern Utah. He also was previously an assistant coach at Northern Colorado University, the head coach at Midland College in Texas, and a college basketball player at multiple schools.

Not only was Craig a coach and a college basketball player, but he was a decorated one. Yet another article goes a step further, touting his success in the headline:

Former Phoenix Horizon star Chris Craig arrested after bomb threat at Utah school

Again, it’s true. The article discusses his impressive career:

Craig was a point guard at Horizon in the late 1990s and widely regarded as one of the more-popular players and harder workers on the team. He went on to find success at Arizona Western and UTEP before becoming college basketball’s youngest head coach when he was hired by Utah State University Eastern in 2007.

That sort of reporting makes Craig seem like a bit of a tragic character. He’s immensely talented, obviously. He was quickly rising to the top of his career. It was all cut short by mental illness. Identified as schizophrenic by his family, he had previous contact with law enforcement that involved strange behavior.  Craig looked like he was living the dream, but his mind betrayed him.  Instead of becoming a coach at a major college basketball program, he was reduced to threatening to blow up an elementary school.

His reasons for doing it reveal the extent of his mental illness:

Shortly before the incident began, the El Paso Times and other media received an email from Craig stating that he “will call 911 with a threat of an explosive and drive onto my 9yr olds elementary school, Eagle Valley Elementary, with a True Explosive.”

Capitalizing “True Explosive” is a good hint the guy is nuts. It only gets worse, though:

In the email, Craig said he “was born into this world under the slave name of Christopher Craig. Currently, I am known as The Radical Islamic Jihadist Muhammad Allah Al-Khidr.”

“My reason for writing Today is because of my pending arrest and hunger strike which begins when I press send on this Discourse of Truth. In 2 hours, call Eagle Mountain PD in Eagle Mountain, UT if you think I am bluffing.  Ask them,” he added.

We may not know that much about the guy, but judging from what we do know, it’s hard to believe his real name was a slave name.  I’d also be quite curious to find out what exactly being known as “The Radical Islamic Jihadist Muhammad Allah Al-Khidr” entails. Perhaps that he called himself that just then and figured it would stick? Or maybe his buddies have a weird sense of humor and have been calling him that for a while? Again, the capitalized “Radical Islamic Jihadist” is a decent giveaway that he’s out of his mind.

It’s unlikely there’s any real point to his ramblings at all, something that keep becoming clearer the more he writes:

The email goes on to make a number of rambling statements that include racist comments, references to religious scripture and criticism of sports stars and political figures.

At one point he wrote, “Racism is the reason for my hunger strike, to take this conversation deeper, to The Truth, Core, and roots.”

The email is posted on Craig’s blog with the title “In Honor of Skylar Dore,” the white police chief of Jonesville, La., who was asked to resign as chief of a town with an African-American majority after a controversial, profane Facebook post against President Barack Obama regarding the killing of police officers.

So he makes racist comments but is hunger striking because of racism? He’s going to quit eating until everybody wakes up and becomes a super duper racist just like him? And then there he goes again with the capitalization, just not with “roots.” Your guess why is as good as mine.

Craig is delusional. He’s tormented. It’s tragic. Another story, however, takes the low route, the fear-mongering path to more clicks with a headline totally different from the others:

Self-Styled ‘Jihadist’ Arrested After Standoff At Utah Elementary School

It takes some scrolling to get to information about Craig’s background, but the content of that story isn’t totally different the other stories. The very beginning paints a different kind of portrait, however:

An elementary school in Eagle Valley, Utah, was the site of tense negotiations Monday after a man wearing a black mask who referred to himself as a jihadist threatened the school.

Before mentioning the mad bomber was an insane white former basketball player and coach named Chris Craig, it does its best to further the terrorism angle:

Kimberly Bird, assistant to the superintendent of the Alpine School District, said a man wearing a mask entered the school and told authorities, “Evacuate the kids and no one will get hurt.”

The man, wearing “turban-style” headwear, claimed to have a “large amount of explosives” in a car outside Eagle Valley Elementary School. It was unclear if the car contained explosives.

The story has everything; the mask, the threat against kids, the turban, and the explosives. It’s frightening. The only thing that makes us more scared than crimes against children is an Islamic terrorist committing crimes against our children. Craig makes as good a terrorist villain as he does a tragic victim of debilitating mental illness.

The problem is that Craig is both. He didn’t kill a bunch of kids, but he scared the crap out of a lot of people. He’s a terrorist. We may never know if he was so crazy he couldn’t actually follow through with hurting anyone or if he may have really posed a horrible threat to those kids. If he had done something awful, though, it wouldn’t have made him any less crazy. The most awful mental illness of all may be the type where you’re just competent enough to unleash the worst manifestations of your disease on others.

There are lots of interesting things about Craig’s situation. Everything from the fact that he wasn’t killed by authorities to the huge variation in his treatment by news outlets suggests he’s getting a different sort of press because of his race, his background, and his obvious mental illness. Unfortunately, white former basketball stars aren’t the only terrorists with back-stories.

Many other terrorists, even those who succeed with horrible acts of violence, might be just as nuts. They might have interesting back-stories too, but they’re rarely reported. Given his obvious demons, Craig isn’t lucky by any stretch of the imagination, but at least he isn’t a cartoon character. People may hate him, but at least there’s another side.

As you read about Craig and decide whether you’re scared of what he claimed he was going to do or sad about what became of his once-bright future, it might be worth asking why you’ve never done the same with others accused of terrorism.

The post Chris Craig: An Unusual Litmus Test For Sympathy Or Terror appeared first on Mimesis Law.

Read the whole story
24 days ago
Share this story

The Democratization of Censorship

2 Comments and 9 Shares

John Gilmore, an American entrepreneur and civil libertarian, once famously quipped that “the Internet interprets censorship as damage and routes around it.” This notion undoubtedly rings true for those who see national governments as the principal threats to free speech.

However, events of the past week have convinced me that one of the fastest-growing censorship threats on the Internet today comes not from nation-states, but from super-empowered individuals who have been quietly building extremely powerful cyber weapons with transnational reach.


More than 20 years after Gilmore first coined that turn of phrase, his most notable quotable has effectively been inverted — “Censorship can in fact route around the Internet.” The Internet can’t route around censorship when the censorship is all-pervasive and armed with, for all practical purposes, near-infinite reach and capacity. I call this rather unwelcome and hostile development the “The Democratization of Censorship.”

Allow me to explain how I arrived at this unsettling conclusion. As many of you know, my site was taken offline for the better part of this week. The outage came in the wake of a historically large distributed denial-of-service (DDoS) attack which hurled so much junk traffic at Krebsonsecurity.com that my DDoS protection provider Akamai chose to unmoor my site from its protective harbor.

Let me be clear: I do not fault Akamai for their decision. I was a pro bono customer from the start, and Akamai and its sister company Prolexic have stood by me through countless attacks over the past four years. It just so happened that this last siege was nearly twice the size of the next-largest attack they had ever seen before. Once it became evident that the assault was beginning to cause problems for the company’s paying customers, they explained that the choice to let my site go was a business decision, pure and simple.

Nevertheless, Akamai rather abruptly informed me I had until 6 p.m. that very same day — roughly two hours later — to make arrangements for migrating off their network. My main concern at the time was making sure my hosting provider wasn’t going to bear the brunt of the attack when the shields fell. To ensure that absolutely would not happen, I asked Akamai to redirect my site to — effectively relegating all traffic destined for KrebsOnSecurity.com into a giant black hole.

Today, I am happy to report that the site is back up — this time under Project Shield, a free program run by Google to help protect journalists from online censorship. And make no mistake, DDoS attacks — particularly those the size of the assault that hit my site this week — are uniquely effective weapons for stomping on free speech, for reasons I’ll explore in this post.

Google's Project Shield is now protecting KrebsOnSecurity.com

Google’s Project Shield is now protecting KrebsOnSecurity.com

Why do I speak of DDoS attacks as a form of censorship? Quite simply because the economics of mitigating large-scale DDoS attacks do not bode well for protecting the individual user, to say nothing of independent journalists.

In an interview with The Boston Globe, Akamai executives said the attack — if sustained — likely would have cost the company millions of dollars. In the hours and days following my site going offline, I spoke with multiple DDoS mitigation firms. One offered to host KrebsOnSecurity for two weeks at no charge, but after that they said the same kind of protection I had under Akamai would cost between $150,000 and $200,000 per year.

Ask yourself how many independent journalists could possibly afford that kind of protection money? A number of other providers offered to help, but it was clear that they did not have the muscle to be able to withstand such massive attacks.

I’ve been toying with the idea of forming a 501(c)3 non-profit organization — ‘The Center for the Defense of Internet Journalism’, if you will — to assist Internet journalists with obtaining the kind of protection they may need when they become the targets of attacks like the one that hit my site.  Maybe a Kickstarter campaign, along with donations from well-known charitable organizations, could get the ball rolling.  It’s food for thought.


Earlier this month, noted cryptologist and security blogger Bruce Schneier penned an unusually alarmist column titled, “Someone Is Learning How to Take Down the Internet.” Citing unnamed sources, Schneier warned that there was strong evidence indicating that nation-state actors were actively and aggressively probing the Internet for weak spots that could allow them to bring the entire Web to a virtual standstill.

“Someone is extensively testing the dcore defensive capabilities of the companies that provide critical Internet services,” Schneier wrote. “Who would do this? It doesn’t seem like something an activist, criminal, or researcher would do. Profiling core infrastructure is common practice in espionage and intelligence gathering. It’s not normal for companies to do that.”

Schneier continued:

“Furthermore, the size and scale of these probes — and especially their persistence — points to state actors. It feels like a nation’s military cyber command trying to calibrate its weaponry in the case of cyberwar. It reminds me of the US’s Cold War program of flying high-altitude planes over the Soviet Union to force their air-defense systems to turn on, to map their capabilities.”

Whether Schneier’s sources were accurate in their assessment of the actors referenced in his blog post is unknown. But as my friend and mentor Roland Dobbins at Arbor Networks eloquently put it, “When it comes to DDoS attacks, nation-states are just another player.”

“Today’s reality is that DDoS attacks have become the Great Equalizer between private actors & nation-states,” Dobbins quipped.


What exactly was it that generated the record-smashing DDoS of 620 Gbps against my site this week? Was it a space-based weapon of mass disruption built and tested by a rogue nation-state, or an arch villain like SPECTRE from the James Bond series of novels and films? If only the enemy here was that black-and-white.

No, as I reported in the last blog post before my site was unplugged, the enemy in this case was far less sexy. There is every indication that this attack was launched with the help of a botnet that has enslaved a large number of hacked so-called “Internet of Things,” (IoT) devices — mainly routers, IP cameras and digital video recorders (DVRs) that are exposed to the Internet and protected with weak or hard-coded passwords. Most of these devices are available for sale on retail store shelves for less than $100, or — in the case of routers — are shipped by ISPs to their customers.

Some readers on Twitter have asked why the attackers would have “burned” so many compromised systems with such an overwhelming force against my little site. After all, they reasoned, the attackers showed their hand in this assault, exposing the Internet addresses of a huge number of compromised devices that might otherwise be used for actual money-making cybercriminal activities, such as hosting malware or relaying spam. Surely, network providers would take that list of hacked devices and begin blocking them from launching attacks going forward, the thinking goes.

As KrebsOnSecurity reader Rob Wright commented on Twitter, “the DDoS attack on @briankrebs feels like testing the Death Star on the Millennium Falcon instead of Alderaan.” I replied that this maybe wasn’t the most apt analogy. The reality is that there are currently millions — if not tens of millions — of insecure or poorly secured IoT devices that are ripe for being enlisted in these attacks at any given time. And we’re adding millions more each year.

I suggested to Mr. Wright perhaps a better comparison was that ne’er-do-wells now have a virtually limitless supply of Stormtrooper clones that can be conscripted into an attack at a moment’s notice.

A scene from the 1978 movie Star Wars, which the Death Star tests its firepower by blowing up a planet.

A scene from the 1977 movie Star Wars, in which the Death Star tests its firepower by blowing up a planet.


The problem of DDoS conscripts goes well beyond the millions of IoT devices that are shipped insecure by default: Countless hosting providers and ISPs do nothing to prevent devices on their networks from being used by miscreants to “spoof” the source of DDoS attacks.

As I noted in a November 2015 story, The Lingering Mess from Default Insecurity, one basic step that many ISPs can but are not taking to blunt these attacks involves a network security standard that was developed and released more than a dozen years ago. Known as BCP38, its use prevents insecure resources on an ISPs network (hacked servers, computers, routers, DVRs, etc.) from being leveraged in such powerful denial-of-service attacks.

Using a technique called traffic amplification and reflection, the attacker can reflect his traffic from one or more third-party machines toward the intended target. In this type of assault, the attacker sends a message to a third party, while spoofing the Internet address of the victim. When the third party replies to the message, the reply is sent to the victim — and the reply is much larger than the original message, thereby amplifying the size of the attack.

BCP38 is designed to filter such spoofed traffic, so that it never even traverses the network of an ISP that’s adopted the anti-spoofing measures. However, there are non-trivial economic reasons that many ISPs fail to adopt this best practice. This blog post from the Internet Society does a good job of explaining why many ISPs ultimately decide not to implement BCP38.

Fortunately, there are efforts afoot to gather information about which networks and ISPs have neglected to filter out spoofed traffic leaving their networks. The idea is that by “naming and shaming” the providers who aren’t doing said filtering, the Internet community might pressure some of these actors into doing the right thing (or perhaps even offer preferential treatment to those providers who do conduct this basic network hygiene).

A research experiment by the Center for Applied Internet Data Analysis (CAIDA) called the “Spoofer Project” is slowly collecting this data, but it relies on users voluntarily running CAIDA’s software client to gather that intel. Unfortunately, a huge percentage of the networks that allow spoofing are hosting providers that offer extremely low-cost, virtual private servers (VPS). And these companies will never voluntarily run CAIDA’s spoof-testing tools.

CAIDA's Spoofer Project page.

CAIDA’s Spoofer Project page.

As a result, the biggest offenders will continue to fly under the radar of public attention unless and until more pressure is applied by hardware and software makers, as well as ISPs that are doing the right thing.

How might we gain a more complete picture of which network providers aren’t blocking spoofed traffic — without relying solely on voluntary reporting? That would likely require a concerted effort by a coalition of major hardware makers, operating system manufacturers and cloud providers, including Amazon, Apple, Google, Microsoft and entities which maintain the major Web server products (Apache, Nginx, e.g.), as well as the major Linux and Unix operating systems.

The coalition could decide that they will unilaterally build such instrumentation into their products. At that point, it would become difficult for hosting providers or their myriad resellers to hide the fact that they’re allowing systems on their networks to be leveraged in large-scale DDoS attacks.

To address the threat from the mass-proliferation of hardware devices such as Internet routers, DVRs and IP cameras that ship with default-insecure settings, we probably need an industry security association, with published standards that all members adhere to and are audited against periodically.

The wholesalers and retailers of these devices might then be encouraged to shift their focus toward buying and promoting connected devices which have this industry security association seal of approval. Consumers also would need to be educated to look for that seal of approval. Something like Underwriters Laboratories (UL), but for the Internet, perhaps.


As much as I believe such efforts could help dramatically limit the firepower available to today’s attackers, I’m not holding my breath that such a coalition will materialize anytime soon. But it’s probably worth mentioning that there are several precedents for this type of cross-industry collaboration to fight global cyber threats.

In 2008, the United States Computer Emergency Readiness Team (CERT) announced that researcher Dan Kaminsky had discovered a fundamental flaw in DNS that could allow anyone to intercept and manipulate most Internet-based communications, including email and e-commerce applications. A diverse community of software and hardware makers came together to fix the vulnerability and to coordinate the disclosure and patching of the design flaw.

deathtoddosIn 2009, Microsoft heralded the formation of an industry group to collaboratively counter Conficker, a malware threat that infected tens of millions of Windows PCs and held the threat of allowing cybercriminals to amass a stupendous army of botted systems virtually overnight. A group of software and security firms, dubbed the Conficker Cabal, hashed out and executed a plan for corralling infected systems and halting the spread of Conficker.

In 2011, a diverse group of industry players and law enforcement organizations came together to eradicate the threat from the DNS Changer Trojan, a malware strain that infected millions of Microsoft Windows systems and enslaved them in a botnet that was used for large-scale cyber fraud schemes.

These examples provide useful templates for a solution to the DDoS problem going forward. What appears to be missing is any sense of urgency to address the DDoS threat on a coordinated, global scale.

That’s probably because at least for now, the criminals at the helm of these huge DDoS crime machines are content to use them to launch petty yet costly attacks against targets that suit their interests or whims.

For example, the massive 620 Gbps attack that hit my site this week was an apparent retaliation for a story I wrote exposing two Israeli men who were arrested shortly after that story ran for allegedly operating vDOS — until recently the most popular DDoS-for-hire network. The traffic hurled at my site in that massive attack included the text string “freeapplej4ck,” a reference to the hacker nickname used by one of vDOS’s alleged co-founders.

Most of the time, ne’er-do-wells like Applej4ck and others are content to use their huge DDoS armies to attack gaming sites and services. But the crooks maintaining these large crime machines haven’t just been targeting gaming sites. OVH, a major Web hosting provider based in France, said in a post on Twitter this week that it was recently the victim of an even more massive attack than hit my site. According to a Tweet from OVH founder Octave Klaba, that attack was launched by a botnet consisting of more than 145,000 compromised IP cameras and DVRs.

I don’t know what it will take to wake the larger Internet community out of its slumber to address this growing threat to free speech and ecommerce. My guess is it will take an attack that endangers human lives, shuts down critical national infrastructure systems, or disrupts national elections.

But what we’re allowing by our inaction is for individual actors to build the instrumentality of tyranny. And to be clear, these weapons can be wielded by anyone — with any motivation — who’s willing to expend a modicum of time and effort to learn the most basic principles of its operation.

The sad truth these days is that it’s a lot easier to censor the digital media on the Internet than it is to censor printed books and newspapers in the physical world. On the Internet, anyone with an axe to grind and the willingness to learn a bit about the technology can become an instant, self-appointed global censor.

I sincerely hope we can address this problem before it’s too late. And I’m deeply grateful for the overwhelming outpouring of support and solidarity that I’ve seen and heard from so many readers over the past few days. Thank you.

Read the whole story
25 days ago
Share this story
2 public comments
24 days ago
Google stronger than Akamai or reasonabler than Akamai? In internet vs business.
24 days ago
Google has more money
25 days ago
Brian is back up after be forced down.
Toronto, Ontario,Canada

The DEA just added a promising anti-opioid addiction herb to Schedule 1, because reasons

1 Comment and 3 Shares


Kratom is a herb that has been in widespread use in Southeast Asia for centuries; it is chewed for to increase stamina, induce gentle euphoria and relaxation, and it has also been used with unheard-of success to help people kick their addictions to opioid painkillers. (more…)

Read the whole story
37 days ago
Stupid, stupid, stupid! Fuck the DEA.
Share this story

Abolish Bottled Water


Bottled water is a con. It makes about as much sense as designer bottled air, but after a few decades on the market, one’s instinct often says to reach for a bottle of Dasani when your mouth’s dry and brain’s half-pickled on a hot day. It’s not water, it’s Water, baby!

Bottled water in Canada comes from aquifers near the Great Lakes, where it’s pumped for $3.71 per million litres by companies that later sell it for a massive profit. This is in a country where dozens of First Nations communities are living under decades-long boil water advisories, and all of their drinkable water is trucked in by the bottle. Naturally, it comes from Nestle and other corporate producers.

Policymakers and activists have raised calls to hike the price that companies pay to pump water from municipal sources, but some experts say that doesn’t go far enough. Instead, according to critics, the practice of pumping water for a profit should be banned wholesale for social and scientific reasons and Nestle’s license to do so shouldn’t be renewed by the provincial government.

Read More: Why Bottled Water Is Insane

“Water being a common good wouldn’t mean that Nestle or Coca-Cola can’t pump water to produce soda—you should be able to license water to be used in a product, but not water as a product,” said Stephen Scharper, a professor in the University of Toronto’s sustainability management program.

“Eventually, this would mean phasing out bottled water completely,” he continued.

Groundwater testing company Harden Environmental Services concluded in a 2016 report that “the water taking by [Nestle] results in the depressurization” of the aquifer that the water is being pumped from, which could turn wells or septic tanks in the area into routes for contaminants in other areas and aquifers to fill the void.

Moreover, we could actually run out of water one day. NASA released data last year that showed “about one third of Earth's largest groundwater basins are being rapidly depleted by human consumption.” With climate change intensifying droughts around the world, we might need some of that agua in the near future.

Bottled water also isn’t any better than tap water anywhere with effective government-run water treatment facilities; historically, it’s been much worse. In 1999, the nonprofit Natural Resources Defence Council produced a report that found 25 percent of bottled water is no different in quality than tap water. In a 2006 test by the city of Cleveland, Fiji water was found to contain arsenic. In 2008, the Environmental Working Group found that some bottled water brands are no different than tap water, and in some cases exceeded legal levels of contaminants.

"You don’t need the corporate middleman"

Municipal governments are required by law to make annual water quality reports available to the public, but water bottlers are regulated by consumer watchdogs and not environmental agencies. While many manufacturers do release quality reports, some critics have said this means that corporations are held to a different standard than municipalities and the industry is self-policing.

One critique of phasing out bottled water completely might be that portable and disposable water sources are needed in case of an emergency. For example, in First Nations communities that rely on bottled water until the underlying issue with their water supply is remedied. There’s no reason the government couldn’t fill this role, Scharper said.

“Just because there’s a breakdown in municipal services, that doesn’t mean there should be an aperture for corporate profiteering,” Scharper said. “If human rights aren’t being provided, the government has a duty to provide that right. They can provide water from a source that is municipally operated. You don’t need the corporate middleman.”

We’ve made hard decisions before. Despite its popularity in manufacturing, for example, asbestos was eventually banned in many countries after decades of investigation into its harms. The city of Paris, France made the tough call this year to ban every car built before 1997 from the roads during daylight hours on weekdays to combat pollution.

Some cities have already begun phasing out bottled water. In 2009, the Australian town of Bundanoon banned bottled water entirely. In 2014, San Francisco voted to ban bottled water on city property. It can be done—all it takes is some political will and motivation.

So, yeah, abolish bottled water.

Read the whole story
37 days ago
Love the faux "look at the poor minorities" sentiment behind this article, which otherwise fails to justify its conclusion in any way. Its reasoning otherwise boils down to, "wouldn't it be better if every business was operated by the government?" No, Vice, it would not. It's been tried and it didn't work out so well.
Share this story
2 public comments
35 days ago
Abolish bottled water
38 days ago
Long as I can get a double gulp of mountain dew for the oversized cupholders in my Suburban
Bend, Oregon

NCAA Pulls 7 Championship Events From North Carolina, Citing Transgender Law


An official, photographers, cheerleaders and others wait for play to resume during an NCAA Men's Basketball Tournament second-round game between the Butler Bulldogs and the Virginia Cavaliers in March in Raleigh, N.C. This coming spring the Road to the Final Four won't go through North Carolina, as the NCAA has decided to move three games out of Greensboro. Grant Halverson/Getty Images hide caption

toggle caption Grant Halverson/Getty Images

An official, photographers, cheerleaders and others wait for play to resume during an NCAA Men's Basketball Tournament second-round game between the Butler Bulldogs and the Virginia Cavaliers in March in Raleigh, N.C. This coming spring the Road to the Final Four won't go through North Carolina, as the NCAA has decided to move three games out of Greensboro.

Grant Halverson/Getty Images

The NCAA announced Monday evening that it would relocate seven championship sporting events out of North Carolina during this school year, citing the state's HB2 law limiting civil rights protections for LGBT individuals, WUNC's Dave DeWitt reports.

The events moving out of state include first and second rounds of the Division I Men's Basketball Championship — part of the Road to the Final Four — originally slated to be in Greensboro, DeWitt reports.

In a press release, the Board emphasized that "NCAA championships and events must promote an inclusive atmosphere for all college athletes, coaches, administrators and fans. Current North Carolina state laws make it challenging to guarantee that host communities can help deliver on that commitment if NCAA events remained in the state."

The state Republican party countered late Monday with a scathing press release written by spokeswoman Kami Mueller.

"This is so absurd it's almost comical. I genuinely look forward to the NCAA merging all men's and women's teams together as singular unisex teams. Under the NCAA's logic, colleges should make cheerleaders and football players share bathrooms, showers and hotel rooms. This decision is an assault to female athletes across the nation."

HB2 earlier cost the state the 2017 NBA All-Star game, DeWitt notes. The law limits anti-discrimination protections for LGBT individuals and requires transgender people to use public bathrooms that match the sex listed on their birth certificates, rather than the gender with which they identify.

Equality NC executive director Chris Sgro writes in a press release that "it has become clear that the shadow HB2 has cast on North Carolina is hurting our economy, our reputation and our people every day."

Read the whole story
38 days ago
"This is so absurd it's almost comical." Yes, yes you are Kami Mueller.
Share this story
2 public comments
38 days ago
North Carolina, you just keep telling yourself you're in the vanguard of cutting-edge thought. It's lonely, but being right is a great consolation, I'm sure.
38 days ago
"I genuinely look forward to the NCAA merging all men's and women's teams together as singular unisex teams"
Uh oh the NC Republican party is onto the Gay Cabal's ultimate endgame.
Bend, Oregon
Next Page of Stories