— [insert pif tagline here] —

by William Fleurant

739,033 unique computers running BitCoin.

It’s 2012, and epic 2011 was totally being epic 2011.

I recorded 739,033 unique computer IP addresses using the BitCoin Currency over a 3 month period. Plus, According to MTGOX:

49.9883/BTC (BitCoins) is trading@ $6.45978/USD.

That’s $323 for 50 BitCoins. Happy-Happy Joy-Joy.  The Google Maps KML file is also quite rich. If you want to check that one out (and have the GPU/CPU power) contact me:

Snippet of a side project of mine, introducing my independent findings on the Worldwide usage of BitCoin. Data collected on a machine -not- running BitCoin. Read the WiKi to find out how. But, I would start by grepping the source code.

If you enjoyed this choppy post, send some btc to the QR above.

BitCoin is a currency. This currency is so different because anybody can use an Internet connected computer to generate BitCoins. It can be exchanged for other currency, commodities, and a variety of services. Similarly, it can be withdrawn or exchanged like all other currencies. But instead of a leather wallet or plastic credit card, BitCoin uses an encrypted digital wallet. This protected wallet can conduct transactions from a smartphone [3], an ATM machine [4] and of course a personal computer.

This process of using ones computer to generate a BitCoin is in fact called mining. Mining for BitCoins independently is very competitive. It absolutely requires expensive hardware for the ability to gain a substantial return on investment. An initial investment of almost three thousand dollars should generate about 3½/BTC per day. [5]

Snippet of Hipster Data Collection section.

I chose to use GeoIP’s open source release. An additional program was needed to look-up each IP address or Hostname. I found a program called created by a marketing company MaxMind. [14]. I edited the code in GeoIP*/test/test-14.c file to output in a comma-separated valued format, rather than a tabular format.

— test-14.c.orig      2011-10-30 23:28:55.396216967 -0400

+++ test-14.c   2011-10-30 23:29:05.186203262 -0400

@@ -60,7 +60,7 @@

if (gir != NULL) {

ret = GeoIP_range_by_ip(gi, (const char *) host);

time_zone = GeoIP_time_zone_by_country_and_region(gir->country_code, gir->region);

–      printf(“%s\t%s\t%s\t%s\t%s\t%s\t%f\t%f\t%d\t%d\t%s\t%s\t%s\n”, host,

+      printf(“%s,%s,%s,%s,%s,%s,%f,%f,%d,%d,%s,%s,%s\n”, host,



_mk_NA(GeoIP_region_name_by_code(gir->country_code, gir->region)),

In addition to using the free city lookup database, I was also able to utilize a CPAN Perl module to plot waypoints of GPS via their GeoIP API.  Note that before running the code GeoIP city lookup provides, recompiling the source with an output according to their API is required for their bash wrapper (output to ./.libs/ with all other compiled C)

Start a WireShark filter to match ‘dst.port == 53’ and if on a Unix (Apple) or Linux computer the command ‘tcpdump –nqi eth0 udp port 53’ will suffice. Then, all of the captured DNS requests answered will be observed. In this 3 month case, there was a substantial number of IP Addresses which are read by the GeoIP application which in return are sent out for further resolution of origin via the computers default Domain Name Server and finally passed back through GeoIP for a database match and are attributed with such matching variables which are written in CSV format and saved to file.  The reversing of IP address to location took over 24 hours. I created a bash script to monitor this step.


total=744893 ; scale=3 ; sleep=60


while true ; do


p=$(wc -l $file | awk ‘{print $1}’)

t=$((${total} – ${p}))

d=$(echo “scale=$scale; $total / $t” | bc)

f=$(tail -n2 $file | head -n1 | cut -d”,” -f 1,11)


echo “Remaining : $t”

echo “Previous  : $o”

if [ $s -eq 0 ] ; then s=”SERVFAIL” ; fi

echo “Speed     : $s”

echo “Completion: $d%”

echo “Locaton   : $f”


sleep $sleep



I recorded the data from the centralized server and logged all connecting, and disconnecting clients.  The data was recorded non-stop.  I used a variety of programming languages to capture, parse and manipulate the data. Ruby, Perl, Sed, Awk, PHP, GPSBabel, GEPLOT, Excel and Microsoft Word programs were utilized. I first used MySQL Database but that was not necessary with the programs and scripts I utilized and wrote afterwards.  It took 45 hours to produce this document with a total of 7,542,601 observations [20].

Thanks for your über focus. It’s Dangerous to go alone! Take this.

[Fig 3.] Plot of 739,033 unique BitCoin Instances. Map created with and Map software Image-WorldMap [18] (Author of software: Leon Brocard) Licensed as Free Software (GNU GPLv2)




See Supplementary Material at http://is.gd/onxXil for raw data obtained from this study. (Note: IP_ADDRESS field has been censored for privacy, but is available upon request)

Declaration of Testable Hypotheses

  • BitCoin popularity originating from countries where there are physical hardware limitations due to high import tax or other fiscal and or availability issues will be among least reported.
    • False – 195 countries were documented.


  • BitCoin will be popular at Universities.
    • True – 385 U.S. Colleges are participating in BitCoin. Based on an estimated 1,735 institutions of higher education [15], I conclude more than ¼ of the Universities in the U.S.A. are actively mining for BitCoin.


  • BitCoin participants in countries with high-censorship laws will be unable to participate.
    • True. Among the 56 countries that were unaccounted for were

Libya, Turkmenistan and North Korea.


[fig.4] List of countries not using BitCoin.


  • BitCoin usage in the USA will be more popular on east and west coast due to many new technologies emerging from these coastal areas such as Massachusetts, New York and California.
    • Inconclusive: The graphed data indicates various “Popular” states, which predicted to in fact be 4 of the 10 top in this list. Arguable hypothesis, immature reasoning for anticipated results.


  • BitCoin data once collected will show serious implications on publishing IP Addresses.
    • Releasing any information in regards to government networks is beyond this discourse.  There are additional implications due to recent targeted BitCoin attacks on computer networks which essentially steal wallet-Addresses. [28]
More BitCoin propaganda :)

by William Fleurant

Board favors smoke-free campus

I actually though of tagging this post with [war]. Yikes..

AMHERST – Smoking on campus at the University of Massachusetts could go the way of the discontinued Pontiacs if the Faculty Senate adopts a proposal next week to make the campus smoke free beginning July 1, 2013.

UMass spokesman Daniel J. Fitzgibbons said the Health Council supported a draft proposal March 11. The council will present the report to the Faculty Senate April 7.  http://www.masslive.com/springfield/republican/index.ssf?/base/news-33/130155601577850.xml&coll=1

by William Fleurant

Free Amazon Shipping

What the mind of man can conceive and believe, it can achieve.

I suppose this lengthy post is about what everyone does at Umass — Write! Did you ever stare at the screen, attempting to explain the psychology of Parisians who stormed the Bastille? (Joyeux Quatorze Juillet!) Could you find nothing else to write about Élisabeth-Louise Vigée-Le Brun? Who writes for the sake of writing? What motivates you to think? Could you write for Gather? Do you Reddit

What drives people to work for the sake of self purpose?


Thats all, like my fortune read:

"To go too far is as bad as to fall short." — Confucius


Below you can import the 2010 Fall semester calendar. 

      (Also, the Google Calendar ID: 164m784dp114klc0oda5nodm9g@group.calendar.google.com)

Dont forget about the Free year of Amazon "Prime" Free shipping available to anyone with an .edu email address. 


by William Fleurant
1 Comment

Microsoft Live Mesh @ UMB

Cloud storage is becoming quite a trending topic within the NFS community. There are quite a few companies that offer a wide variety of services. Generally, end-user services include basic file synchronization, back-up and shared-access of your files. Linux, Mac and Windows platforms are typically compatible. Encryption of your files is generally practiced server side and always during transmission, with the exception of Apple Mobile ME and Linux Ubuntu ONE.

Microsoft Live Mesh will encrypt your files during transmission, but not server side. Regardless, head on over to http://www.mesh.com and download the windows client if you are running windows. If you are running open Linux or BSD-like variant (OS X), you can also upload/download files via mesh.com active desktop. Anyways — without opening cloud desktop suite chatter, which in the near future HP+Palm, Blackberry and Google OS are absolutely pursuing, the active desktop appears to mimics other remote server-standalone virtualized web-desktops. 



Log in with UMass Boston credentials, and start synchronizing your documents. Also, by installing the live mesh application the end-user can allow remote desktop access over HTTP+SSL if there are multiple devices added to the ring. Mesh will even work if the mobile machine is roaming on a network with strict UDP/SSL+TLS access control lists. Neat eh? 


Sending and receiving your data without a secure socket connection is vulnerable to any peer snooping the air/wire. 


If you prefer an open source, and company to house your data, follow the refferal link below. SpiderOAK will give anyone with an .edu TLD email address 50% off at the billing page. Mac, Linux and Windows supported and trusted. 




Why SpiderOAK?

by William Fleurant

Scott Borg’s agenda

If you listen to NPR as much as the next, you may have realized the significant slant on this afternoons on-point: Cyber Warfare, with Tom Ashbrook on WBUR.

Most of the callers and comments on the air floored me to blog. I wanted to torch some of the comments left on Tom’s blog, I laughed. My outrage roots from “expert” Scott Borg’s (“director and chief economist at the U.S. Cyber Consequences Unit“) claim that all of the recent and theoretical cyber-security attacks on the pentagon, google, nuke plants are because of a flaw that fundamentally: sits between the monitor and the seat. (heh) Mr. Borg is obtuse to many facts. His sources are from CNET, HAK5 or from the Pentagon. With respect, the Pentagon has obviously shared less information about the lost laptops than the next.

Mr. Borg continued to instigate fear and global cyber warfare propaganda. Advocating a federal “identification” protocol for the internet is only interesting if you are reading 1984 or you are the CEO of USCCU.
The public should at least be informed of the defensive theorem. It hit me when Mr. Borg attempted to divulge security flaws in the United States IT infrastructure. His examples of actual vulnerabilities can simply be classified as: UNAMERICAN

What would a nuclear security engineer have to say…?

The segment on cyber-attacks, and the vulnerability of power plants to these attacks, was inaccurate, a fact which I tried to clarify when I called in. The gentleman who spoke to my point right afterwards skirted around the fact that a physical presence from an attacker, as well as intimate knowledge of the plant itself, is entirely necessary. The level of knowledge required would be next-to-impossible for someone to obtain, as it would consist of both physical, electrical, and software design documentation. The alarmist viewpoints presented by the gentleman are, as an engineer of the systems, offensive to me.

I will not, however, speak against an improvement of physical security at power generation facilities. However, that diverges from the topic of your show.

As a listener, I think it is necessary to clarify these points. It makes me question the dependability of the “experts” that editorialize on the topics of your show. For example, it is in Scott Borg’s best interests, as a security consultant, to produce public concern and fear of these nearly impossible, and highly improbable events. In other words, it’s his job to produce the “worst case scenarios” and present them not only as possible, but probable.
Posted by Nicholas, on December 8th, 2008 at 11:06 am UTC

by William Fleurant

Namaste & Winter Vacation

listening to The Sun Will Shine http://www.machine475.com/index.php

Hello World, a programmers first words… Enlightenment at that very split second, for me.

I am writing because the mind is a muscle, and like all muscles they become weak if not exercised. The effort by lifting weights and running hard build a strong body and heart. But How do you stretch and strengthen your mind and soul? What motivates you to think outside the 9 to 5?

When we work the same muscles and think the same paths, we stop building extra muscle and paths because they are not required. We can add ankle weights when we run, that would confuse the muscle to compensate and grow.

Yoga is the only total body workout, look at the links, enjoy the music. Namaste, Happy Holidays.

the sun will shine through,
on you on me on the snow,
winter vacation.



by William Fleurant
Comments Off on bummer summer

bummer summer

Not much beach weather going this summer vacation. Mr. Jackson unfortunately suffered a creepy death… War is still so bizarre to me… US “combat troops” withdrew from Iraq, after the Iran Tweet color Revolution, and were transplanted into Afghanistan making it the Largest Marine offensive since Vietnam

The RIAA has been sueing a Harvard university student for $1,000,000/USD for downloading…. a single MP3 file.

The police state of America is getting SO bad its been integrated with micro-blogging website Twitter… Its not the police that is concerning, perhaps its the people twitter-tattle-tailing on others fare hiking on the MBTA

twitter.com/wfleurant *PLUG*

Above is my Twitter. It’s more of a RSS News feed. Info Warrior style.. The script covers hundreds of websites and tweets according to the active tabloid of the month..

sorta looks like this…

%feh.twitter = $remove($remove($remove($strip($2-,burc),$chr(40)),$chr(41)),$chr(9))
%half.twitter = $remove($gettok(%feh.twitter,2,58),//)
%front.twitter = $remove(%feh.twitter,http:// $+ %half.twitter $+ )
var %i = 1
while http:// !isin $ [ $+ [ %i ] ] {
inc %i

%cap.twitter = $ [ $+ [ %i ] ]
%wicked.twitter = $strip($upper($1),burc) $remove(%feh.twitter,$ [ $+ [ %i ] ] $+ )

while $gettok(%tw33t,%t,44) != $null {

if $gettok(%tw33t,%t,44) isin $1- {
inc %tweet.level
;echo -a (Twit:wildcard::)
;/tinyurl %cap.twitter %wicked.twitter
goto end


%cap.twitter = $remove($remove($strip(%cap.twitter,burc),$chr(40)),$chr(41))
.timer 1 $calc(%tweet.timer * 10) /tinyurl %cap.twitter $remove($remove(%front.twitter,%cap.twitter),http://)

titlebar (Tweet level %tweet.level $+ ) (Avian= $+ %avian.h5n1 $+ )

Last but no means least, the Palm Pre was released in June.. A 600Mhz ARM CPU Architect running WebOS Linux…With Synergy! With Root#

More on the break….

by William Fleurant

Politics of Communication Essay

Its Friday!

Here, read my work. (time 2 x 8 hour)

During this half century in U.S. history many media companies have been gobbled up by rich conglomerate big businesses. Though the methods or perhaps the choices in which the public attains information have evolved, the core purpose of public opinion manipulation has unchanged. With the public opinion on focus point, Edward Bernays’ Manipulating Public Opinion disambiguates a theoretical bridge of communication between several dynamically established entities and the general public. Mr. Bernays’ assessment of President Coolidge’s late blooming personality identified the heart of the Whitehouse’s solution. The opinion of the masses transformed immediately when the president could relate with “the world’s greatest entertainer” (1) Al Jolson. Simply put, the opinion was that the president “was not frigid and unsympathetic.” (2)
Subsequently in the early 20th century the FCC was extolled in federal law by Commissioners who regulate all communication mediums. (3) This “New Deal” permitted the FCC in many ways the opportunity to side with large communication companies. Every opportunity to control and regulate communication airwaves in the 1930’s continues to persist in today’s new age digital broadcasting. It is within president FDR’s “New Deal” masks the social opinion agenda. For the objective of the Whitehouse was to use the FCC to deliberately promote social change. (4)
Speeding past the epically televised presidential debates and braking at 1600 Pennsylvania Avenue the home of President Richard Nixon, the media consortium behind those Whitehouse pillars were assiduously restricting free speech in the name of the “fairness doctrine” The Nixon administration was recycling the identical claim the JFK itinerary included in their fight to restrict the media through the FCC. Bill Ruder, a JFK official made the following statement “We had a massive strategy to use the fairness doctrine to challenge and harass the right-wing broadcasters, and hope the challenge would be so costly to them that they would be inhibited and decide it was too expensive to continue.” (5)
Confusion aside, the FCC’s agenda may not be as powerful as history may suggest. Bernay’s view of other said entities are absolute bedrock in the understanding of public opinion manipulation. Bernay was aware of the flow of information from one faction to the other. Bernay was reverse engineering the architecture of how public opinion, polling and knowledge is dynamically adapting. Like Bernay said, “This is an age of mass production” (2)
The 1980’s media outlets surged with a wide scale massive deployment of coaxial copper cabling wire enrolled millions of subscribers to a polarized entertainment and political portal. Markus Prior authors a revealing composition that exams all “new media” outlets. The upgrade of television networks has created a drop in viewership of all political awareness due to the unreasonably bloated entertainment sphere. The title headline reads “News vs. Entertainment: How Increasing Media Choice Widens Gaps in Political Knowledge and Turnout” bold and true in the American Journal of Political Science.
Eventually during this time presidentially appointed FCC Chairman Mark Fowler declared the termination of the “fairness act”. The public was now to able to rely on their media anchors judgment in journalism. (6)
After the “media deregulation” phase, newspaper companies began to crash due to the unmanageable amount of lawsuits attacks. This “liability law” continued to wreck the entire economics of newspaper companies and soon forced a mass-media “newspaper consolidation” Then came in the 1990’s more regulation issues during the first few years of the first internet companies. (8) The Telecommunications Act challenged free speech and the Internet officially sparked a blackout revolt against anyone not supporting the free-speech blue ribbon campaign. (9) Eventually online Internet service provider applications such as America Online and Prodigy Internet service begin to die out as the speeds in which media could be delivered multiplied with Tier Cable providers. Again, the courts deal with Internet Neutrality lawsuits. Fascist Internet monster Comcast actually fills courtroom benches with random people whom were paid and shuffled in at the last second. (10) The data mitigation and network manipulation was achieved through identical big brother watching, great firewall of china software. (11)
A remarkable cliché the Whitehouse used after a crushing article in Wired magazine on the Governments and Tiered communications giants data hoarding promiscuity. Citizens private information was reasoned with defensive clichés such as “…to protect the citizens from terrorism” President Barack H. Obama has pardoned these corporations in a venial fashion. (12)
It is critical that all is the ideological concepts of political persuasion and mass opinion manipulation through both Whitehouse or Journalist’s tone and choice of wording is proven to exist.

Fair and balanced, All the News That’s Fit to Print, and The daily diary of the American dream are all trustworthy slogans of popular U.S. media companies. The opposition to these catchphrase slogans is “don’t believe what you read”. People read newspapers. They read TV and radio in the same sense. We evaluate information as it is encoded in to our short-term memory. While we process the arguments a chemical flow of keywords are paired with our own array of memories that bank emotions, values and other impulses. These and other psychological mind games have been researched for the intent to add a slanting opinion of a factual report. The slant of a news column, wiki contribution, radio talk show and TV news broadcast has all been filtered with a subjective media tone. Hayakawa (13) established meaning of “slanting,” when quoted “the process of selecting details that are favorable or unfavorable to the subject being described.”
The American understanding of this monopolized media conglomerate slant reporting is grossly rated at fluctuating 70 percent. (7) Matthew Gentzkow and Jesse Shapiro author a prominent dissertation on the motivation behind media slant. They examine “Evidence from U.S. Daily Newspapers” (14) in this elite publication. The research resolves and identifies crisp examples of the psychology behind the slant, just as this topology has initialized.
Two key pieces of evidence suggest that our methodology produces a meaningful measure of slant. First, many of the phrases that our automated procedure identifies are known from other sources to be chosen strategically by politicians for their persuasive impact. Examples include death tax, tax relief, personal account, and war on terror (which we identify as strongly Republican), and estate tax, tax break, private account, and war in Iraq, (which we identify as strongly Democratic). (14)
Dwight D. Eisenhower is seen on the cover of Time magazine over 22 times. (15) Being endorsed by Henry Luce’s weekly magazine rallied Mr. Eisenhower into the oval office. By assigning inexperienced journalists and writers to difficult assignments, Time Inc. could use its editors to change and slant the stories before they were passed on to the publishing department. Because these types of endorsements were typical in mainstream media and opposite in local small readership news companies, the proven slanting effects it has on a reader are thoroughly examined. For instance, Steve Ansolabehere, Rebecca Lessem and Jim Snyder of M.I.T. in Boston collaborated together to produce an exceptionally critical dissertation on (19) The Political Orientation of Newspaper Endorsements in U.S. Elections. One quick example of how open and non-responsible newspapers were in the 1940’s is read from the Philadelphia Inquirer “To uphold President Eisenhower and assure the advancement of his progressive policies, be sure to vote for all the candidates for Congress running as Republicans.”
The epic farewell speech of President Eisenhower gravely warns the U.S. public of the unwarranted “Military-industrial complex” that influences political, corporate, and economic variables of future development.
We annually spend on military security more than the net income of all United States corporations.
This conjunction of an immense military establishment and a large arms industry is new in the American experience. The total influence – economic, political, even spiritual – is felt in every city, every Statehouse, every office of the Federal government. We recognize the imperative need for this development. Yet we must not fail to comprehend its grave implications. Our toil, resources and livelihood are all involved; so is the very structure of our society.

In the councils of government, we must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military-industrial complex. The potential for the disastrous rise of misplaced power exists and will persist.

We must never let the weight of this combination endanger our liberties or democratic processes. We should take nothing for granted. Only an alert and knowledgeable citizenry can compel the proper meshing of the huge industrial and military machinery of defense with our peaceful methods and goals, so that security and liberty may prosper together.
Press coverage accumulated vast amounts of deception from the Whitehouse prior to the Invasion of Iraq. Yellow cake WMD’s, “centralized” gallop polls and other “signals” is depicted in Lance Bennett’s analysis and “framing” of these press coverage reports are a critical lesson. The fragment below introduces Bennett’s passion to inform the public that a new world government is manipulating them.
Even foreign policy, once the private domain of pinstripe bureaucrats and business elites, that ray world of threats, promises, wars, espionage, and diplomacy, may have become transformed by a combination of new communications technologies and global media systems. Policy-makers have recognized the presence of television cameras at trade negotiations, peace conferences, and in war zones, with the result that foreign policy has taken on a public-relations, or media-diplomacy, dimension of substantial proportions (17)
Shapiro’s understands of the press coverage before the war in Iraq. It’s said that the Whitehouse did not corrupt it entirely; instead the media journalists themselves conflated it. Since %61 of the public still believed that Saddam was involved in 9/11 and al-Qaeda in 2005, after the fact the 9/11 commission report was released we can understand how powerful of an impact the mass media has on the masses due to their trust in them. In conjunction with that ABC poll Shapiro mentions that ABC poll results %47 of the people asked believed the 9/11 commission report was false for not finding the link between 9/11 attacks and Iraqi al-Qaeda partnership. Shapiro adds “Further, looking at the reporting by the three main national networks-ABC, CBS, and NBC-immediately after the terrorist attacks on 9/11, we find early reports, using non-Bush administration sources, which raised Saddam’s name in relation to 9/11.” After giving multiple examples of random middle east experts on tape insisting Saddam was to blame and should be killed and war hawk analysis’s opinions of the middle east’s aggression towards the USA the general public is still accepting personal opinions, stories, and incite despite what the Whitehouse or U.S. government declares as truth. (18)
In conclusion to the three main author’s exposition of political slant, the cubed evaluation never goes unsaid without criticism. Bennett’s book is publicized as “the most comprehensive study of the media and foreign policy, twenty distinguished scholars and analysts explain the role played by the mass media and public opinion in the development of United States foreign policy in the Gulf War.” (17) While the Gentzkow and Shapiro exist appear together as associated students growing with the rest of the elite in environment of political clarification. Shapiro is more aggressive and extroverted on the Internet as in his revelations. However, when it comes to Gentzkow’s view, it is more of an anti-television yet conscious and progressive vibe when he declares TV has the most significance on a voter. (Voter Turnout) Also, the dark reporting’s of a falling newspaper industry is highlighted with information such as the un-acclimated claim of blogging “I estimate that the online paper reduced print readership by 27,000 per day, at a cost of $5.5 million per year in lost print profits.” (20) This statement is nonsense since those profits can be made back with technologies such as Amazons Kindle 2 hand held, wireless, convenient blog reader. Nevertheless, the most important noteworthy examples of his dissertation in Voter Turnout are the factual information and ideological undertones in the ways media travels down the media pipe.

Works Cited
1. (Dix, Andrew and Taylor, Jonathan. Figures of Heresy, Sussex Academic Press (2006), pg. 176; quoted from Dylan’s book, Biography (1985))
2. Edward L. Betrays, “Manipulating Public Opinion — The Why and the How,” American Journal of Sociology, Vol. 33, No. 6 (1928), pp. 958-71; JSTOR
3. “About the Federal Communications Commission.” Federal Communications Commission (FCC) Home Page. 27 Mar. 2009 .
4. REEVES, ALEC. “Privateline.com Telephone History: Page 7: 1921 to 1948.” Daily Notes. Imperial College, London. 27 Mar. 2009 .
5. Snow, Tony, and Adam Thierer. “Why The Fairness Doctrine Is Anything But Fair.” The Heritage Foundation – Conservative Policy Research and Analysis. 29 Oct. 1993. 27 Mar. 2009 .
6. Limburg, Val E. “Fairness Doctrine – U.S. Broadcasting Policy.” The Museum of Broadcast Communications. 2004. CRC Press. 27 Mar. 2009 .
7. Rainie, Lee, John Horrigan, and Michael Cornfield. “The Internet and Campaign 2004.” Pew Internet & American Life Project. 6 Mar. 2005. Pew Internet and American Life Project. 27 Mar. 2009 .
8. Smolla, Rodney A. Suing the press. New York: Oxford UP, 1986.
9. “EFF: Blue Ribbon Campaign.” Electronic Frontier Foundation | Defending Freedom in the Digital World. 27 Mar. 2009 .
10. Jansen, Dean. “Comcast Secretly Pays People to Fill Seats at FCC Hearing « Miro – Internet TV Blog.” 26 Feb. 2008. 27 Mar. 2009 http://www.getmiro.com/blog/2008/02/comcast-secretly-pays-people-to-fill-seats-at-fcc-hearing/.
11. Mislove, Lan, Andreas Haeberlen, and Krishna Gummadi. “Detecting BitTorrent Blocking.” 22 Oct. 2008. Rice University. 27 Mar. 2009 .
12. Kravets, David. “Obama Sides With Bush in Spy Case | Threat Level from Wired.com.” Blogs Home – Wired Blogs. 29 Jan. 2009. Wired INC. 27 Mar. 2009 .
13. Hayakawa, Samuel. Language in Thought and Action. New York, NY: Harcourt, Brace & Company (1990, 5th ed.), 1940.
14. Gentzkow, Matthew, and Jesse Shapiro. “What Drives Media Slant?” Thesis. University of Chicago and NBER, 2007.
15. “TIME Magazine Archives – TIME Archives – TIME Magazine Back Issues.” Breaking News, Analysis, Politics, Blogs, News Photos, Video, Tech Reviews – TIME.com. 27 Mar. 2009 .
16. “Eisenhower’s Farewell Address to the Nation.” INFORMATION CLEARING HOUSE. NEWS, COMMENTARY & INSIGHT. 17 Jan. 1971. 27 Mar. 2009 .
17. Bennent, Lance, and David L. L. Paletz. Taken by Storm The Media, Public Opinion, and U.S. Foreign Policy in the Gulf War (American Politics and Political Economy Series). New York: University Of Chicago P, 1994.
18. Shapiro, Robert Y., and Yaeli Bloch-Elkon. “Deep Suspicion: Iraq, Misperception, and Partisanship” by Yaeli Bloch-Elkon and Robert Y. Shapiro. LFP Editorial Enterprises, LLC. 27 Mar. 2009 .
19. Ansolabehere, Stephen, Rebecca Lessem, and James M. Snyder, Jr. “THE POLITICAL ORIENTATION OF NEWSPAPER ENDORSEMENTS IN U.S. ELECTIONS, 1940-20021.” Thesis. Massachusetts Institute of Technology, 2004.
20. GENTZKOW, MATTHEW. TELEVISION AND VOTER TURNOUT*. Thesis. F Harvard College and the Massachusetts Institute of Technology, 2006. The Quarterly Journal of Economics, 2006.

Great Readings
• The Political Impact of Media Bias (Stefano Delavigne (UC Berkeley and NBER) and Ethan Kaplan (IIES, Stockholm University) June 26, 2007.
• Partisan Bias in Economic News: Evidence on the Agenda-Setting Behavior of U.S. Newspapers (by Valentino Larcinese & Riccardo Puglisi & James M. Snyder, Jr.)
• The Fox News E?ect: Media Bias and Voter Behavior (Stefano DellaVigna & Ethan Kaplan)
• Markus Prior News vs. Entertainment: How Increasing Media Choice Widens Gaps in Political Knowledge and Turnout

by William Fleurant

GOP predicts doomsday if Obama budget passed

…in the news, the Merrill Lynch 3.5 Billion in bonuses may be unscathed by UNCONSTITUTIONAL taxes unlike AIG. Whats Barny Franks problem? ok, next post should be when AIG appeals. Or when the Obama Deception reaches main stream media. rofl, alex jones is a funny guy, and great producer, heh.

WASHINGTON – Congressional Republicans on Sunday predicted a doomsday scenario of crushing debt and eventual federal bankruptcy if President Barack Obama’s massive spending blueprint wins passage.

Skip to toolbar