Richard A. Clarke — Against All Enemies: Inside America’s War on Terror — Videos

Posted on January 27, 2015. Filed under: American History, Ammunition, Babies, Bomb, Book, Books, Business, Central Intelligence Agency (CIA), College, Communications, Computers, Constitution, Corruption, Dirty Bomb, Documentary, Drones, Economics, Education, Federal Bureau of Investigation (FBI), Fiction, Foreign Policy, Freedom, Genocide, government, government spending, history, Islam, Language, Law, liberty, Life, Links, Literacy, media, Missiles, National Security Agency (NSA_, Non-Fiction, Nuclear, People, Philosophy, Photos, Pistols, Politics, Press, Rants, Raves, Rifles, Security, Talk Radio, Technology, Terrorism, Video, War, Wealth, Weapons, Weapons of Mass Destruction, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , |

Richard-Clarkerichard-a-clarke-against-all-enemies-inside-americas-war-on-terror

Richard-A-Clarke

Richard Clarke, Former Counterterrorism Chief, Apologizes for 9/11

Ex-Counterterrorism Czar Richard Clarke: Bush, Cheney and Rumsfeld Committed War Crimes

 

Against All Enemies: Inside America’s War on Terror 1/2

Against All Enemies: Inside America’s War on Terror 2/2

Richard Clarke on Foreign Oil, Saudi Arabia, and Iran – The Scorpion’s Gate (2005)

Richard A. Clarke

From Wikipedia, the free encyclopedia
Richard A. Clarke
Richard clarke.jpg

Clarke in October 2007
Born Richard Alan Clarke
October 27, 1950 (age 64)
Dorchester, Massachusetts, U.S.
Nationality American
Citizenship United States
Education Master’s Degree from theMassachusetts Institute of Technology
Alma mater University of Pennsylvania
Occupation Counter-terrorism expert/analyst
Author
Notable work(s) Against All EnemiesThe Scorpion’s Gate,Breakpoint
Political party
Democratic
Website
http://www.richardaclarke.net/

Richard Alan Clarke[1] (born October 27, 1950) is the former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States.

Clarke worked for the State Department during the presidency of Ronald Reagan.[2] In 1992, President George H.W. Bush appointed him to chair the Counter-terrorism Security Group and to a seat on the United States National Security Council. President Bill Clinton retained Clarke and in 1998 promoted him to be the National Coordinator for Security, Infrastructure Protection, and Counter-terrorism, the chief counter-terrorism adviser on the National Security Council. Under President George W. Bush, Clarke initially continued in the same position, but the position was no longer given cabinet-level access. He later became the Special Advisor to the President on cybersecurity. Clarke left the Bush administration in 2003.

Clarke came to widespread public attention for his role as counter-terrorism czar in the Clinton and Bush administrations in March 2004, when he appeared on the 60 Minutes television news magazine, released his memoir about his service in government, Against All Enemies, and testified before the 9/11 Commission. In all three instances, Clarke was sharply critical of the Bush administration’s attitude toward counter-terrorism before the 9/11 terrorist attacks, and of the decision to go to war with Iraq.

Background

Richard Clarke was born in 1950, the son of a Boston chocolate factory worker and a nurse.[3] He studied at the Boston Latin School (graduated in 1968), received a Bachelor’s degree from the University of Pennsylvania in 1972 where he was selected to serve in the Sphinx Senior Society.[4] After working for the Department of Defense as an analyst on European security issues, Clarke earned a master’s degree in management in 1978 from the Massachusetts Institute of Technology.[5]

Government career

In 1973, he began work in the federal government as a management intern[6] in the U.S. Department of Defense. Beginning in 1985, Clarke served in the Reagan administration as Deputy Assistant Secretary of State for Intelligence. During the Presidential administration of George H.W. Bush, as the Assistant Secretary of State for Political-Military Affairs, he coordinated diplomatic efforts to support the 1990-1991 Gulf War and the subsequent security arrangements. During the Clinton administration, Clarke became the counter-terrorism coordinator for the National Security Council. He remained counter-terrorism coordinator during the first year of the George W. Bush administration, and later was the Special Advisor to the President on cybersecurity and cyberterrorism. He resigned from the Bush administration in 2003.

Clarke’s positions inside the government have included:

Clinton administration

Clarke advised Madeleine Albright during the Genocide in Rwanda, to request the UN to withdraw all UN troops from Rwanda. She refused, but permitted Gen. Dallaire to keep a few hundred troops who managed to save thousands from the genocide. Later Clarke told Samantha Power “It wasn’t in American’s national interest. If we had to do the same thing today and I was advising the President, I would advise the same thing.” He directed the authoring of PDD-25[7] which outlined a reduced military and economic role for the United States in Rwanda as well as future peacekeeping operations.

Islamists took control in Sudan in a 1989 coup d’état and the United States adopted a policy of disengagement with the authoritarian regime throughout the 1990s. After the September 11, 2001, terrorist attacks, however, some critics charged that the U.S. should have moderated its policy toward Sudan earlier, since the influence of Islamists there waned in the second half of 1990s and Sudanese officials began to indicate an interest in accommodating U.S. concerns with respect to 9/11 mastermind Osama bin Laden, who had been living in Sudan until he was expelled in May 1996. Timothy M. Carney, U.S. ambassador to Sudan between September 1995 and November 1997, co-authored an op-ed in 2002 claiming that in 1997 Sudan offered to turn over its intelligence on bin Laden but that Susan Rice, as NSC Africa specialist, together with the then NSC terrorism specialist Richard A. Clarke, successfully lobbied for continuing to bar U.S. officials, including the CIA and FBI, from engaging with the Khartoum government.[8] Similar allegations (that Susan Rice joined others in missing an opportunity to cooperate with Sudan on counterterrorism) were made by Vanity Fair contributing editor David Rose[9] and Richard Miniter, author of Losing Bin Laden.[10]

Clarke was also involved in investigating Ramzi Yousef, one of the main perpetrators of the 1993 World Trade Center bombing who traveled to the United States on an Iraqi passport. Yousef is the nephew of Khalid Sheikh Mohammed, a senior al-Qaeda member. Many in the Clinton administration and the intelligence community believed this was evidence linking al-Qaeda’s activities and the government of Iraq.

In February 1999 Clarke wrote the Deputy National Security Advisor that one reliable source reported Iraqi officials had met with Bin Ladin and may have offered him asylum. Therefore, Clarke advised against surveillance flights to track bin Laden in Afghanistan: Anticipating an attack, “old wily Usama will likely boogie to Baghdad”, where he would be impossible to find.[11] Clarke also made statements that year to the press linking “Iraqi nerve gas experts” and al-Qaeda to an alleged joint-chemical-weapons-development effort at the Al Shifa pharmaceutical plant in Sudan.[12]

Michael Scheuer is the former chief of the bin Laden Unit at the Counterterrorist Center at the CIA. Matthew Continetti writes: “Scheuer believes that Clarke’s risk aversion and politicking negatively impacted the hunt for bin Laden prior to September 11, 2001. Scheuer stated that his unit, codename ‘Alec,’ had provided information that could have led to the capture and or killing of Osama bin Laden on ten different occasions during the Clinton administration, only to have his recommendations for action turned down by senior intelligence officials, including Clarke.”[13]

Bush administration

Clarke and his communications with the Bush administration regarding bin Laden and associated terrorist plots targeting the United States were mentioned frequently in Condoleezza Rice‘s public interview by the 9/11 investigatory commission on April 8, 2004. Of particular significance was a memo[14] from January 25, 2001, that Clarke had authored and sent to Condoleezza Rice. Along with making an urgent request for a meeting of the National Security Council’s Principals Committee to discuss the growing al-Qaeda threat in the greater Middle East, the memo also suggests strategies for combating al-Qaeda that might be adopted by the new Bush administration.[15]

In his memoir, “Against All Enemies”, Clarke wrote that Condoleezza Rice made a decision that the position of National Coordinator for Counterterrorism should be downgraded. By demoting the office, the Administration sent a signal through the national security bureaucracy about the salience they assigned to terrorism. No longer would Clarke’s memos go to the President; instead they had to pass through a chain of command of National Security Advisor Condoleezza Rice and her deputy Stephen Hadley, who bounced every one of them back.

Within a week of the inauguration, I wrote to Rice and Hadley asking ‘urgently’ for a Principals, or Cabinet-level, meeting to review the imminent Al-Qaeda threat. Rice told me that the Principals Committee, which had been the first venue for terrorism policy discussions in the Clinton administration, would not address the issue until it had been ‘framed’ by the Deputies.[16]

At the first Deputies Committee meeting on Terrorism held in April 2001, Clarke strongly suggested that the U.S. put pressure on both the Taliban and Al-Qaeda by arming the Northern Alliance and other groups in Afghanistan. Simultaneously, that they target bin Laden and his leadership by reinitiating flights of the MQ-1 Predators. To which Deputy Secretary of Defense Paul Wolfowitz responded, “Well, I just don’t understand why we are beginning by talking about this one man bin Laden.” Clarke replied that he was talking about bin Laden and his network because it posed “an immediate and serious threat to the United States.” According to Clarke, Wolfowitz turned to him and said, “You give bin Laden too much credit. He could not do all these things like the 1993 attack on New York, not without a state sponsor. Just because FBI and CIA have failed to find the linkages does not mean they don’t exist.”[16]

Clarke wrote in Against All Enemies that in the summer of 2001, the intelligence community was convinced of an imminent attack by al Qaeda, but could not get the attention of the highest levels of the Bush administration, most famously writing that Director of theCentral Intelligence Agency George Tenet was running around with his “hair on fire”.[16]

At a July 5, 2001, White House gathering of the FAA, the Coast Guard, the FBI, Secret Service and INS, Clarke stated that “something really spectacular is going to happen here, and it’s going to happen soon.”

9/11 Commission

On March 24, 2004, Clarke testified at the public 9/11 Commission hearings.[17] At the outset of his testimony Clarke offered an apology to the families of 9/11 victims and an acknowledgment that the government had failed: “I also welcome the hearings because it is finally a forum where I can apologize to the loved ones of the victims of 9/11…To the loved ones of the victims of 9/11, to them who are here in this room, to those who are watching on television, your government failed you. Those entrusted with protecting you failed you. And I failed you. We tried hard, but that doesn’t matter because we failed. And for that failure, I would ask, once all the facts are out, for your understanding and for your forgiveness.”[17]

Many of the events Clarke recounted during the hearings were also published in his memoir. Clarke charged that before and during the 9/11 crisis, many in the Administration were distracted from efforts against Osama bin Laden’s Al-Qaeda organization by a pre-occupation with Iraq and Saddam Hussein. Clarke had written that on September 12, 2001, President Bush pulled him and a couple of aides aside and “testily” asked him to try to find evidence that Saddam was connected to the terrorist attacks. In response he wrote a report stating there was no evidence of Iraqi involvement and got it signed by all relevant agencies, including the Federal Bureau of Investigation and the CIA. The paper was quickly returned by a deputy with a note saying “Please update and resubmit.”[18] After initially denying that such a meeting between the President and Clarke took place, the White House later reversed its denial when others present backed Clarke’s version of the events.[19][20]

Criticism

Before and after Clarke appeared before the 9/11 Commission, some critics tried to attack his credibility, launching a full-scale offensive against him: impugning his personal motives, claiming he was a disappointed job-hunter, that he sought publicity, and that he was a political partisan. They charged that he exaggerated perceived failures in the Bush administration’s counterterrorism policies while exculpating the former Clinton administration from its perceived shortcomings.[21]

According to some reports, the White House tried to discredit Clarke in a move described as “shooting the messenger.”[22] New York Times economics columnist Paul Krugman was more blunt, calling the attacks on Clarke “a campaign of character assassination.”[23]

Some Republicans inside and outside the Bush administration questioned both Clarke’s testimony and his tenure during the hearings. Senate Republican Majority Leader Bill Frist took to the Senate floor to make a speech alleging Clarke told “two entirely different stories under oath”, pointing to congressional hearing testimony Clarke gave in 2002 and his 9/11 Commission testimony. Frist later speculated to reporters Clarke was trading on his former service as a government insider with access to the nation’s most valuable intelligence to sell a book.[24]

During Clarke’s earlier testimony, he stated that Bill Clinton did not have a comprehensive plan on dealing with terrorism. During later testimony, he stated that President Clinton did have a comprehensive plan on dealing with terrorism. As summarized by the Toledo Blade, “In his August 2002 briefing, Mr. Clarke told reporters (1) that the Clinton administration had no overall plan on al-Qaeda to pass on to the Bush Administration; (2) that just days after his inauguration, Mr. Bush said he wanted a new, more comprehensive anti-terror strategy; (3) that Mr. Bush ordered implementation of anti-terror measures that had been kicking around since 1998, and (4) that before Sept. 11, Mr. Bush had increased fivefold the funding for CIA covert action programs against al-Qaeda. … It’s reasonable enough to argue that Mr. Bush could have done more to guard against terror, though it isn’t clear what. What is incredible is to argue – as Mr. Clarke did before the 9/11 Commission – that President Clinton was more concerned about al-Qaeda than Mr. Bush was.”[25]

Clarke was criticized for his suggestions in 1999 of intelligence indicating a link between Saddam Hussein and al-Qaeda, despite the fact Clarke and others concluded after investigations by 2001 that no link had been established. In Against All Enemies he writes, “It is certainly possible that Iraqi agents dangled the possibility of asylum in Iraq before bin Laden at some point when everyone knew that the U.S. was pressuring the Taliban to arrest him. If that dangle happened, bin Laden’s accepting asylum clearly did not,” (p. 270). In an interview on March 21, 2004, Clarke claimed that “there’s absolutely no evidence that Iraq was supporting al-Qaeda, ever.”[26] Clarke claimed in his book that this conclusion was understood by the intelligence community at the time of 9/11 and the ensuing months, but top Bush administration officials were pre-occupied with finding a link between Iraq and 9/11 in the months that followed the attack, and thus, Clarke argued, the Iraq war distracted attention and resources from the war in Afghanistan and hunt for Osama bin Laden.

Fox News, allegedly with the Administration’s consent, identified and released a background briefing that Clarke gave in August 2002, at the Administration’s request, to minimize the fallout from a Time magazine story about the President’s failure to take certain actions before 9/11.[27] In that briefing on behalf of the White House, Clarke stated “there was no plan on Al-Qaeda that was passed from the Clinton administration to the Bush administration,” and that after taking office President Bush decided to “add to the existing Clinton strategy and to increase CIA resources, for example, for covert action, fivefold, to go after Al-Qaeda.”[28] At the next day’s hearing, 9/11 Commission member James Thompson challenged Clarke with the 2002 account, and Clarke explained: “I was asked to make that case to the press. I was a special assistant to the President, and I made the case I was asked to make… I was asked to highlight the positive aspects of what the Administration had done and to minimize the negative aspects of what the Administration had done. And as a special assistant to the President, one is frequently asked to do that kind of thing. I’ve done it for several Presidents.”[17]

Another point of attack was Clarke’s role in allowing members of the bin Laden family to fly to Saudi Arabia on September 20, 2001. According to Clarke’s statements to the 9/11 Commission, a request was relayed to Clarke from the Saudi embassy to allow the members of the bin Laden family living in the U.S. to fly home. Clarke testified to the commission that he passed this decision in turn to the FBI via Dale Watson, and that the FBI at length sent its approval of the flight to the Interagency Crisis Management Group.[29]However, FBI spokesman John Iannarelli denied that the FBI had a role in approving the flight: “I can say unequivocally that the FBI had no role in facilitating these flights.”[30]

Clarke has also exchanged criticism with Michael Scheuer, former chief of the Bin Laden Issue Station at the CIA. When asked to respond to Clarke’s claim that Scheuer was “a hothead, a middle manager who really didn’t go to any of the cabinet meetings,” Scheuer returned the criticism as follows: “I certainly agree with the fact that I didn’t go to the cabinet meetings. But I’m certainly also aware that I’m much better informed than Mr. Clarke ever was about the nature of the intelligence that was available against Osama bin Laden and which was consistently denigrated by himself and Mr. Tenet.”[31]

On March 28, 2004, at the height of the controversy during the 9/11 Commission Hearings, Clarke went on NBC’s Sunday morning news show, Meet the Press and was interviewed by journalist Tim Russert. In responding to and rebutting the criticism, Clarke challenged the Bush administration to declassify the whole record, including closed testimony by Bush administration officials before the Commission.[32]

Cyberterrorism and cybersecurity

Clarke, as Special Advisor to the President on Cybersecurity, spent his last year in the Bush administration focusing on cybersecurity and the threat of terrorism against the critical infrastructure of the United States. At a security conference in 2002, after citing statistics that indicate that less than 0.0025 percent of corporate revenue on average is spent on information-technology security, Clarke was famously heard to say, “If you spend more on coffee than on IT security, then you will be hacked. What’s more, you deserve to be hacked.”[33]

In June 2012 Clarke discussed issues of cybersecurity in depth in an interview on The Colbert Report in which he was seemingly misled into thinking that they were discussing cyber-security threats from the Chinese through the use of mobile devices such as iPads. Instead, Stephen Colbert was doing a humorous piece on the threats of Orangutans learning to use iPads. Indeed, when confronted on the issue directly, Clarke himself clarified that he was not discussing non-human primate based cyberterrorism threats. “Orangutans? You mean like apes?” said Clarke, “Are you sh**tin’ me? I’m talking about the Chinese.”[34]

Post government career

Clarke is currently Chairman of Good Harbor Consulting and Good Harbour International, two strategic planning and corporate risk management firms; an on-air consultant for ABC News, and a contributor to the Good Harbor Report, an online community discussing homeland security, defense, and politics. He is an adjunct lecturer at the Harvard Kennedy School and a faculty affiliate of its Belfer Center for Science and International Affairs.[35] He has also become an author of fiction, publishing his first novel, The Scorpion’s Gate, in 2005, and a second, Breakpoint, in 2007.

Clarke wrote an op-ed for the Washington Post on May 31, 2009 harshly critical of other Bush administration officials, entitled “The Trauma of 9/11 Is No Excuse”.[36] Clarke wrote that he had little sympathy for his fellow officials who seemed to want to use the excuse of being traumatized, and caught unaware by Al-Qaeda‘s attacks on the USA, because their being caught unaware was due to their ignoring clear reports a major attack on U.S. soil was imminent. Clarke particularly singled out former Vice President Dick Cheney and former Secretary of State, Condoleezza Rice.

In April 2010 Clarke released his book on Cyber War. In April 2012, Clarke wrote a New York Times op-ed addressing cyber attacks. In stemming cyber attacks carried out by foreign governments and foreign hackers, particularly from China, Clarke opined that the U.S. government should be authorized to “create a major program to grab stolen data leaving the country” in a fashion similar to how the U.S. Department of Homeland Security currently searches for child pornography that crosses America’s “virtual borders.” Moreover, he suggested that the US president could authorize agencies to scan Internet traffic outside the US and seize sensitive files stolen from within the United States. Clarke then stated that such a policy would not endanger privacy rights through the institution of a privacy advocate, who could stop abuses or any activity that went beyond halting the theft of important files. The op-ed did not offer evidence that finding and blocking files while they are being transmitted is technically feasible.[37]

In September 2012, Clarke stated that Middle Eastern governments were likely behind hacking incidents against several banks.[38] During the same year, he also endorsed Barack Obama‘s reelection for President of the United States.

Following the 2013 high-speed fatal car crash of journalist Michael Hastings, a vocal critic of the surveillance state and restrictions on the press freedom under the Obama Administration tenure, Clarke was quoted as saying “There is reason to believe that intelligence agencies for major powers — including the United States — know how to remotely seize control of a car. So if there were a cyber attack on the car — and I’m not saying there was, I think whoever did it would probably get away with it.”[39]

In 2013, Clarke served on an advisory group for the Obama administration, as it sought to reform NSA spying programs following the revelations of documents released by Edward Snowden.[40] The report mentioned in ‘Recommendation 30’ on page 37, “…that the National Security Council staff should manage an interagency process to review on a regular basis the activities of the US Government regarding attacks, that exploit a previously unknown vulnerability in a computer application.” Clarke told Reuters on 11 April 2014 that the NSA had not known of Heartbleed.[41]

Written works

Main article: Against All Enemies

On March 22, 2004, Clarke’s book, Against All Enemies: Inside America’s War on Terror—What Really Happened (ISBN 0-7432-6024-4), was published. The book was critical of past and present Presidential administrations for the way they handled the war on terrorboth before and after September 11, 2001 but focused much of its criticism on Bush for failing to take sufficient action to protect the country in the elevated-threat period before the September 11, 2001 attacks and for the 2003 invasion of Iraq, which Clarke feels greatly hampered the war on terror, and was a distraction from the real terrorists.

Affiliation

  • Chairman, Good Harbor Consulting, LLC, a strategic planning and corporate risk management firm.
  • Contributor, Good Harbor Index, an online resource for homeland security, defense and political issues, operated by Good Harbor Consulting, LLC.
  • Faculty Affiliate, Belfer Center for Science and International Affairs, Harvard Kennedy School
  • Advisory Board Member, Civitas Group, LLC
  • Cyber Security Consultant, SRA International, Inc.
  • On-air consultant, ABC News.

See also

References

  1. Jump up^ Dobbs, Michael. “An Obscure Chief in U.S. War on Terror”. The Washington Post, April 2, 2000.
  2. Jump up^ “Profile: Richard Clarke”. BBC News. March 22, 2004. Retrieved January 9, 2009.
  3. Jump up^ “Richard Clarke Biography”. Encyclopedia of World Biography. Advameg, Inc. Retrieved April 3, 2012.
  4. Jump up^ Senior Society, Sphinx. “Class of 1972”. Sphinx Senior Society. Retrieved April 3, 2012.
  5. Jump up^ Bio.Richard Clarke, “NNDB.com”
  6. Jump up^ Lawrence Wright, The Looming Tower: Al-Qaeda and the Road to 9/11, New York: Alfred A. Knopf, 2006, p.206.
  7. Jump up^ “Text of Presidential Decision Directive 25”. Federation of American Scientists. May 6, 1994. Retrieved January 9, 2009.
  8. Jump up^ Carney, Timothy; Mansoor Ijaz (June 30, 2002). “Intelligence Failure? Let’s Go Back to Sudan”. The Washington Post. RetrievedDecember 1, 2008. Retrieved from http://www.mafhoum.com/ Jan. 2015.
  9. Jump up^ Rose, David (January 2002). “The Osama Files”. Vanity Fair. Retrieved December 1, 2008.
  10. Jump up^ Belz, Mindy (November 1, 2003). “Clinton did not have the will to respond”. World. Retrieved December 1, 2008.
  11. Jump up^ The 9/11 Commission Report, p. 134.
  12. Jump up^ Vernon Loeb (January 23, 1999). “Embassy Attacks Thwarted, U.S. Says; Official Cites Gains Against Bin Laden; Clinton Seeks $10 Billion To Fight Terrorism”. The Washington Post. Retrieved January 20, 2015.
  13. Jump up^ Continetti, Matthew (November 22, 2004). “Scheuer v. Clarke”. Weekly Standard. Retrieved January 9, 2009.
  14. Jump up^ http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB147/clarke%20memo.pdf
  15. Jump up^ “Bush Administration’s First Memo on al-Qaeda Declassified”. Gwu.edu. January 25, 2001. Retrieved January 9, 2009.
  16. ^ Jump up to:a b c Richard Clarke: “Against All Enemies, Inside America’s War on Terror” by Free Press, a subsidiary of Simon & Schuster
  17. ^ Jump up to:a b c “Transcript: Wednesday’s 9/11 Commission Hearings”. Washington Post. March 24, 2004. Retrieved January 9, 2009.
  18. Jump up^ Against All Enemies: Inside America’s War on Terror–What Really Happened (ISBN 0-7432-6024-4)
  19. Jump up^ Dean, John W (April 9, 2004). “Bush’s attack on Richard Clarke”. CNN. Retrieved January 9, 2009.
  20. Jump up^ Marshall, Josh (September 11, 2001). “Talking Points Memo” (Press release). Talking Points Memo. Retrieved January 9, 2009.
  21. Jump up^ Ratnesar, Romesh (March 25, 2004). “Richard Clarke, at War With Himself”. TIME. Retrieved January 9, 2009.
  22. Jump up^ “White House Tries to Discredit Counterterrorism Coordinator”. Common Dreams. March 22, 2004. Retrieved January 9, 2009.
  23. Jump up^ Krugman, Paul (March 30, 2004). “Smearing Richard Clarke”. History News Network. Retrieved January 9, 2009.
  24. Jump up^ “Talking Points Memo”. Retrieved from Internet Archive Wayback Machine, 20 January 2015.
  25. Jump up^ http://www.toledoblade.com/Opinion/2004/03/27/The-Blame-Bush-approach.html
  26. Jump up^ CBS: Clarke’s Take On Terror. March 19, 2004.
  27. Jump up^ Kaplan, Fred (March 24, 2004). “Richard Clarke KOs the Bushies”. Slate Magazine. Retrieved January 9, 2009.
  28. Jump up^ “Transcript: Clarke Praises Bush Team in ’02”. FoxNews.com. March 24, 2004. Retrieved January 9, 2009.
  29. Jump up^ “Richard Clarke Testifies Before 9/11 Commission”. CNN Transcripts. March 24, 2004. Retrieved January 9, 2009.
  30. Jump up^ Craig Unger: Letter To the Editor NYT March 30, 2005
  31. Jump up^ Leung, Rebecca (November 12, 2004). “Bin Laden Expert Steps Forward, Ex-CIA Agent Assesses Terror War In 60 Minutes Interview”.60 Minutes (CBS News). Retrieved January 9, 2009.
  32. Jump up^ “Clarke Would Welcome Open Testimony”. MSNBC.com. March 28, 2004. Retrieved February 16, 2010.
  33. Jump up^ Lemos, Robert (February 20, 2002). “Security Guru: Let’s Secure the Net”. ZDNet
  34. Jump up^ Colbert, Stephen (June 13, 2012). “The Enemy Within: Apes Armed with iPads”. Viacom. Retrieved June 14, 2012.
  35. Jump up^ “Richard Clarke’s bio at Harvard Kennedy School”. Belfer Center for Science and International Affairs. May 29, 2008. RetrievedJanuary 9, 2009.
  36. Jump up^ Richard A. Clarke (May 31, 2009). “The Trauma of 9/11 Is No Excuse”. Washington Post. Archived from the original on August 22, 2009.
  37. ^ Jump up to:a b Clarke, Richard A. (April 3, 2012). “How China Steals Our Secrets”. The New York Times. Retrieved April 3, 2012.
  38. Jump up^ “Rhode Islanders react to cyber attacks on banking websites”. ABC6 Rhode Island. October 1, 2012. Retrieved September 27, 2012.
  39. Jump up^ Hogan, Michael (June 24, 2013). “Was Hastings’ Car Hacked?”. Huffington Post.
  40. Jump up^ The President’s Review Group on Intelligence and Communications Technologies (12 December 2013). “Liberty and Security in a Changing World – Report and Recommendations of The President’s Review Group on Intelligence and Communications Technologies”. The White House.
  41. Jump up^ Mark Hosenball; Will Dunham (11 April 2014). “White House, spy agencies deny NSA exploited ‘Heartbleed’ bug”. Reuters. Retrieved16 April 2014.

http://en.wikipedia.org/wiki/Richard_A._Clarke

Read Full Post | Make a Comment ( None so far )

Ralph Peters — Lines of Fire: A Renegade Writes on Strategy, Intelligence, and Security — Videos

Posted on January 14, 2015. Filed under: American History, Blogroll, Bomb, British History, Communications, Computers, Culture, Demographics, Diasters, Documentary, Drones, Energy, Ethic Cleansing, European History, Federal Government, Foreign Policy, Freedom, Friends, Genocide, government, history, Illegal, Immigration, Islam, Islam, Law, Legal, liberty, Life, Links, Literacy, media, Missiles, Narcissism, Natural Gas, Natural Gas, Oil, Oil, People, Philosophy, Photos, Pistols, Politics, Press, Psychology, Radio, Radio, Rants, Raves, Religion, Resources, Rifles, Security, Shite, Strategy, Sunni, Talk Radio, Technology, Terrorism, Video, War, Wealth, Weapons, Weapons of Mass Destruction, Welfare, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , |

ralph-peters1lines of fire

Fox News Ralph Peters: Yesterday President Obama Chose The Side of Terrorists!

Kerry: Paris Attack Is “Vicious Act Of Violence” -Paris Terror Attack – Ralph Peters – Stuart Varney

Warning On ISIS Threat To Home Land – Lt Col Ralph Peters -The Kelly File

Lt. Col. Ralph Peters: “The President Lives in this bubble of ‘unreality’”; ISIS is drunk on blood!

Ralph Peters: The way you deal with IS is to kill them, kill the last one and then kill his pet goat

Lt Col Ralph Peters: Gen Dempsey Committed The Greatest Sin In Obama Admin He Told The Truth

Lt. Col. Ralph Peters Smoking Hot ➡ Nukes Obama Admin On Bergdahl Return To Regular Duty

Lt. Col Peters on Iraq: “The White House is lying. This president is a coward.”

Malzberg | Ralph Peters retired Army lieutenant colonel

 

rp_2

Read Full Post | Make a Comment ( None so far )

Snowden Used Automated Web Crawler To Scrap Data From Over 1.7 Million Restricted National Security Agency Files — Videos

Posted on February 10, 2014. Filed under: Blogroll, Books, Business, College, Communications, Computers, Computers, Constitution, Crime, Culture, Economics, Education, Employment, Foreign Policy, Fraud, government, government spending, Investments, Law, liberty, Life, Links, Literacy, Math, media, People, Philosophy, Photos, Politics, Radio, Rants, Raves, Regulations, Resources, Security, Strategy, Talk Radio, Technology, Unemployment, Video, War, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 207: February 10, 2014

Pronk Pops Show 206: February 7, 2014

Pronk Pops Show 205: February 5, 2014

Pronk Pops Show 204: February 4, 2014

Pronk Pops Show 203: February 3, 2014

Pronk Pops Show 202: January 31, 2014

Pronk Pops Show 201: January 30, 2014

Pronk Pops Show 200: January 29, 2014

Pronk Pops Show 199: January 28, 2014

Pronk Pops Show 198: January 27, 2014

Pronk Pops Show 197: January 24, 2014

Pronk Pops Show 196: January 22, 2014

Pronk Pops Show 195: January 21, 2014

Pronk Pops Show 194: January 17, 2014

Pronk Pops Show 193: January 16, 2014

Pronk Pops Show 192: January 14, 2014

Pronk Pops Show 191: January 13, 2014

Pronk Pops Show 190: January 10, 2014

Pronk Pops Show 189: January 9, 2014

Pronk Pops Show 188: January 8, 2014

Pronk Pops Show 187: January 7, 2014

Pronk Pops Show 186: January 6, 2014

Pronk Pops Show 185: January 3, 2014

Pronk Pops Show 184: December 19, 2013

Pronk Pops Show 183: December 17, 2013

Pronk Pops Show 182: December 16, 2013

Pronk Pops Show 181: December 13, 2013

Pronk Pops Show 180: December 12, 2013

Pronk Pops Show 179: December 11, 2013

Pronk Pops Show 178: December 5, 2013

Pronk Pops Show 177: December 2, 2013

Pronk Pops Show 176: November 27, 2013

Pronk Pops Show 175: November 26, 2013

Pronk Pops Show 174: November 25, 2013

Pronk Pops Show 173: November 22, 2013

Pronk Pops Show 172: November 21, 2013

Pronk Pops Show 171: November 20, 2013

Pronk Pops Show 170: November 19, 2013

Pronk Pops Show 169: November 18, 2013

Pronk Pops Show 168: November 15, 2013

Pronk Pops Show 167: November 14, 2013

Pronk Pops Show 166: November 13, 2013

Pronk Pops Show 165: November 12, 2013

Pronk Pops Show 164: November 11, 2013

Pronk Pops Show 163: November 8, 2013

Pronk Pops Show 162: November 7, 2013

Pronk Pops Show 161: November 4, 2013

Pronk Pops Show 160: November 1, 2013

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 202-207

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Story 2: The Pronk Pops Show 207, February 10, 2014, Story 1: Snowden Used Automated Web Crawler To Scrap Data From Over 1.7 Million Restricted National Security Agency Files — Videos

Snowden Used Common, Low-Cost Tool To Get NSA Files: Report

Edward Snowden, v 1.0: NSA Whistleblower William Binney Tells All

NSA whistleblower Edward Snowden: ‘I don’t want to live in a society that does these sort of things’

Dick Cheney ‘This Week’ Interview – Former Vice President on NSA Spying Revelations and GOP Politics

A Massive Surveillance State Glenn Greenwald Exposes Covert NSA Program Collecting Calls, Emails

Web Crawler – CS101 – Udacity

Web scraping the easy way

Python Web Scraping Tutorial 1 (Intro To Web Scraping)

Web Scraping Techniques

Web scraping: Reliably and efficiently pull data from pages that don’t expect it

2014 Best Scraper pro gold email and phone extractor harvestor review- website scraping lead

Lecture -38 Search Engine And Web Crawler – Part-I

Lecture -39 Search Engine And Web Crawlers: Part-II

Web Scraping Review 1

Web Scraping Review 2

Snowden Used Low-Cost Tool to Best N.S.A.

By DAVID E. SANGER and ERIC SCHMITT

Intelligence officials investigating how Edward J. Snowden gained access to a huge trove of the country’s most highly classified documents say they have determined that he used inexpensive and widely available software to “scrape” the National Security Agency’s networks, and kept at it even after he was briefly challenged by agency officials.

Using “web crawler” software designed to search, index and back up a website, Mr. Snowden “scraped data out of our systems” while he went about his day job, according to a senior intelligence official. “We do not believe this was an individual sitting at a machine and downloading this much material in sequence,” the official said. The process, he added, was “quite automated.”

The findings are striking because the N.S.A.’s mission includes protecting the nation’s most sensitive military and intelligence computer systems from cyberattacks, especially the sophisticated attacks that emanate from Russia and China. Mr. Snowden’s “insider attack,” by contrast, was hardly sophisticated and should have been easily detected, investigators found.

Launch media viewer
Officials say Mr. Snowden used “web crawler” software. Channel 4/Agence France-Presse — Getty Images

Moreover, Mr. Snowden succeeded nearly three years after the WikiLeaks disclosures, in which military and State Department files, of far less sensitivity, were taken using similar techniques.

Mr. Snowden had broad access to the N.S.A.’s complete files because he was working as a technology contractor for the agency in Hawaii, helping to manage the agency’s computer systems in an outpost that focuses on China and North Korea. A web crawler, also called a spider, automatically moves from website to website, following links embedded in each document, and can be programmed to copy everything in its path.

Mr. Snowden appears to have set the parameters for the searches, including which subjects to look for and how deeply to follow links to documents and other data on the N.S.A.’s internal networks. Intelligence officials told a House hearing last week that he accessed roughly 1.7 million files.

Among the materials prominent in the Snowden files are the agency’s shared “wikis,” databases to which intelligence analysts, operatives and others contributed their knowledge. Some of that material indicates that Mr. Snowden “accessed” the documents. But experts say they may well have been downloaded not by him but by the program acting on his behalf.

Agency officials insist that if Mr. Snowden had been working from N.S.A. headquarters at Fort Meade, Md., which was equipped with monitors designed to detect when a huge volume of data was being accessed and downloaded, he almost certainly would have been caught. But because he worked at an agency outpost that had not yet been upgraded with modern security measures, his copying of what the agency’s newly appointed No. 2 officer, Rick Ledgett, recently called “the keys to the kingdom” raised few alarms.

“Some place had to be last” in getting the security upgrade, said one official familiar with Mr. Snowden’s activities. But he added that Mr. Snowden’s actions had been “challenged a few times.”

In at least one instance when he was questioned, Mr. Snowden provided what were later described to investigators as legitimate-sounding explanations for his activities: As a systems administrator he was responsible for conducting routine network maintenance. That could include backing up the computer systems and moving information to local servers, investigators were told.

But from his first days working as a contractor inside the N.S.A.’s aging underground Oahu facility for Dell, the computer maker, and then at a modern office building on the island for Booz Allen Hamilton, the technology consulting firm that sells and operates computer security services used by the government, Mr. Snowden learned something critical about the N.S.A.’s culture: While the organization built enormously high electronic barriers to keep out foreign invaders, it had rudimentary protections against insiders.

“Once you are inside the assumption is that you are supposed to be there, like in most organizations,” said Richard Bejtlich, the chief security strategist for FireEye, a Silicon Valley computer security firm, and a senior fellow at the Brookings Institution. “But that doesn’t explain why they weren’t more vigilant about excessive activity in the system.”

Investigators have yet to answer the question of whether Mr. Snowden happened into an ill-defended outpost of the N.S.A. or sought a job there because he knew it had yet to install the security upgrades that might have stopped him.

“He was either very lucky or very strategic,” one intelligence official said. A new book, “The Snowden Files,” by Luke Harding, a correspondent for The Guardian in London, reports that Mr. Snowden sought his job at Booz Allen because “to get access to a final tranche of documents” he needed “greater security privileges than he enjoyed in his position at Dell.”

Through his lawyer at the American Civil Liberties Union, Mr. Snowden did not specifically address the government’s theory of how he obtained the files, saying in a statement: “It’s ironic that officials are giving classified information to journalists in an effort to discredit me for giving classified information to journalists. The difference is that I did so to inform the public about the government’s actions, and they’re doing so to misinform the public about mine.”

Launch media viewer
The headquarters of Booz Allen Hamilton, one of Edward J. Snowden’s former employers, in McLean, Va. He had broad access to National Security Agency files as a contractor in Hawaii. Michael Reynolds/European Pressphoto Agency

The N.S.A. declined to comment on its investigation or the security changes it has made since the Snowden disclosures. Other intelligence officials familiar with the findings of the investigations underway — there are at least four — were granted anonymity to discuss the investigations.

In interviews, officials declined to say which web crawler Mr. Snowden had used, or whether he had written some of the software himself. Officials said it functioned like Googlebot, a widely used web crawler that Google developed to find and index new pages on the web. What officials cannot explain is why the presence of such software in a highly classified system was not an obvious tip-off to unauthorized activity.

When inserted with Mr. Snowden’s passwords, the web crawler became especially powerful. Investigators determined he probably had also made use of the passwords of some colleagues or supervisors.

But he was also aided by a culture within the N.S.A., officials say, that “compartmented” relatively little information. As a result, a 29-year-old computer engineer, working from a World War II-era tunnel in Oahu and then from downtown Honolulu, had access to unencrypted files that dealt with information as varied as the bulk collection of domestic phone numbers and the intercepted communications of Chancellor Angela Merkel of Germany and dozens of other leaders.

http://www.nytimes.com/2014/02/09/us/snowden-used-low-cost-tool-to-best-nsa.html?_r=0

Officials say web crawlers are almost never used on the N.S.A.’s internal systems, making it all the more inexplicable that the one used by Mr. Snowden did not set off alarms as it copied intelligence and military documents stored in the N.S.A.’s systems and linked through the agency’s internal equivalent of Wikipedia.

The answer, officials and outside experts say, is that no one was looking inside the system in Hawaii for hard-to-explain activity. “The N.S.A. had the solution to this problem in hand, but they simply didn’t push it out fast enough,” said James Lewis, a computer expert at the Center for Strategic and International Studies who has talked extensively with intelligence officials about how the Snowden experience could have been avoided.

Nonetheless, the government had warning that it was vulnerable to such attacks. Similar techniques were used by Chelsea Manning, then known as Pfc. Bradley Manning, who was convicted of turning documents and videos over to WikiLeaks in 2010.

Evidence presented during Private Manning’s court-martial for his role as the source for large archives of military and diplomatic files given to WikiLeaks revealed that he had used a program called “wget” to download the batches of files. That program automates the retrieval of large numbers of files, but it is considered less powerful than the tool Mr. Snowden used.

The program’s use prompted changes in how secret information is handled at the State Department, the Pentagon and the intelligence agencies, but recent assessments suggest that those changes may not have gone far enough. For example, arguments have broken out about whether the N.S.A.’s data should all be encrypted “at rest” — when it is stored in servers — to make it harder to search and steal. But that would also make it harder to retrieve for legitimate purposes.

Investigators have found no evidence that Mr. Snowden’s searches were directed by a foreign power, despite suggestions to that effect by the chairman of the House Intelligence Committee, Representative Mike Rogers, Republican of Michigan, in recent television appearances and at a hearing last week.

But that leaves open the question of how Mr. Snowden chose the search terms to obtain his trove of documents, and why, according to James R. Clapper Jr., the director of national intelligence, they yielded a disproportionately large number of documents detailing American military movements, preparations and abilities around the world.

In his statement, Mr. Snowden denied any deliberate effort to gain access to any military information. “They rely on a baseless premise, which is that I was after military information,” Mr. Snowden said.

The head of the Defense Intelligence Agency, Lt. Gen. Michael T. Flynn, told lawmakers last week that Mr. Snowden’s disclosures could tip off adversaries to American military tactics and operations, and force the Pentagon to spend vast sums to safeguard against that. But he admitted a great deal of uncertainty about what Mr. Snowden possessed.

“Everything that he touched, we assume that he took,” said General Flynn, including details of how the military tracks terrorists, of enemies’ vulnerabilities and of American defenses against improvised explosive devices. He added, “We assume the worst case.”

ttp://www.nytimes.com/2014/02/09/us/snowden-used-low-cost-tool-to-best-nsa.html?_r=0

Web Crawler

A Web crawler is an Internet bot that systematically browses the World Wide Web, typically for the purpose of Web indexing.

A Web crawler may also be called a Web spider,[1] an ant, an automatic indexer,[2] or (in the FOAF software context) a Web scutter.[3]

Web search engines and some other sites use Web crawling or spidering software to update their web content or indexes of others sites’ web content. Web crawlers can copy all the pages they visit for later processing by a search engine that indexes the downloaded pages so that users can search them much more quickly.

Crawlers can validate hyperlinks and HTML code. They can also be used for web scraping (see also data-driven programming).

Overview

A Web crawler starts with a list of URLs to visit, called the seeds. As the crawler visits these URLs, it identifies all the hyperlinks in the page and adds them to the list of URLs to visit, called the crawl frontier. URLs from the frontier are recursively visited according to a set of policies.

The large volume implies that the crawler can only download a limited number of the Web pages within a given time, so it needs to prioritize its downloads. The high rate of change implies that the pages might have already been updated or even deleted.

The number of possible URLs crawled being generated by server-side software has also made it difficult for web crawlers to avoid retrieving duplicate content. Endless combinations of HTTP GET (URL-based) parameters exist, of which only a small selection will actually return unique content. For example, a simple online photo gallery may offer three options to users, as specified through HTTP GET parameters in the URL. If there exist four ways to sort images, three choices of thumbnail size, two file formats, and an option to disable user-provided content, then the same set of content can be accessed with 48 different URLs, all of which may be linked on the site. This mathematical combination creates a problem for crawlers, as they must sort through endless combinations of relatively minor scripted changes in order to retrieve unique content.

As Edwards et al. noted, “Given that the bandwidth for conducting crawls is neither infinite nor free, it is becoming essential to crawl the Web in not only a scalable, but efficient way, if some reasonable measure of quality or freshness is to be maintained.”[4] A crawler must carefully choose at each step which pages to visit next.

Crawling policy

The behavior of a Web crawler is the outcome of a combination of policies:[5]

  • a selection policy that states which pages to download,
  • a re-visit policy that states when to check for changes to the pages,
  • a politeness policy that states how to avoid overloading Web sites, and
  • a parallelization policy that states how to coordinate distributed web crawlers.

Selection policy

Given the current size of the Web, even large search engines cover only a portion of the publicly available part. A 2005 study showed that large-scale search engines index no more than 40-70% of the indexable Web;[6] a previous study by Steve Lawrence and Lee Giles showed that no search engine indexed more than 16% of the Web in 1999.[7] As a crawler always downloads just a fraction of the Web pages, it is highly desirable that the downloaded fraction contains the most relevant pages and not just a random sample of the Web.

This requires a metric of importance for prioritizing Web pages. The importance of a page is a function of its intrinsic quality, its popularity in terms of links or visits, and even of its URL (the latter is the case of vertical search engines restricted to a single top-level domain, or search engines restricted to a fixed Web site). Designing a good selection policy has an added difficulty: it must work with partial information, as the complete set of Web pages is not known during crawling.

Cho et al. made the first study on policies for crawling scheduling. Their data set was a 180,000-pages crawl from the stanford.edu domain, in which a crawling simulation was done with different strategies.[8] The ordering metrics tested were breadth-first, backlink count and partial Pagerank calculations. One of the conclusions was that if the crawler wants to download pages with high Pagerank early during the crawling process, then the partial Pagerank strategy is the better, followed by breadth-first and backlink-count. However, these results are for just a single domain. Cho also wrote his Ph.D. dissertation at Stanford on web crawling.[9]

Najork and Wiener performed an actual crawl on 328 million pages, using breadth-first ordering.[10] They found that a breadth-first crawl captures pages with high Pagerank early in the crawl (but they did not compare this strategy against other strategies). The explanation given by the authors for this result is that “the most important pages have many links to them from numerous hosts, and those links will be found early, regardless of on which host or page the crawl originates.”

Abiteboul designed a crawling strategy based on an algorithm called OPIC (On-line Page Importance Computation).[11] In OPIC, each page is given an initial sum of “cash” that is distributed equally among the pages it points to. It is similar to a Pagerank computation, but it is faster and is only done in one step. An OPIC-driven crawler downloads first the pages in the crawling frontier with higher amounts of “cash”. Experiments were carried in a 100,000-pages synthetic graph with a power-law distribution of in-links. However, there was no comparison with other strategies nor experiments in the real Web.

Boldi et al. used simulation on subsets of the Web of 40 million pages from the .it domain and 100 million pages from the WebBase crawl, testing breadth-first against depth-first, random ordering and an omniscient strategy. The comparison was based on how well PageRank computed on a partial crawl approximates the true PageRank value. Surprisingly, some visits that accumulate PageRank very quickly (most notably, breadth-first and the omniscient visit) provide very poor progressive approximations.[12][13]

Baeza-Yates et al. used simulation on two subsets of the Web of 3 million pages from the .gr and .cl domain, testing several crawling strategies.[14] They showed that both the OPIC strategy and a strategy that uses the length of the per-site queues are better than breadth-first crawling, and that it is also very effective to use a previous crawl, when it is available, to guide the current one.

Daneshpajouh et al. designed a community based algorithm for discovering good seeds.[15] Their method crawls web pages with high PageRank from different communities in less iteration in comparison with crawl starting from random seeds. One can extract good seed from a previously-crawled-Web graph using this new method. Using these seeds a new crawl can be very effective.

Restricting followed links

A crawler may only want to seek out HTML pages and avoid all other MIME types. In order to request only HTML resources, a crawler may make an HTTP HEAD request to determine a Web resource’s MIME type before requesting the entire resource with a GET request. To avoid making numerous HEAD requests, a crawler may examine the URL and only request a resource if the URL ends with certain characters such as .html, .htm, .asp, .aspx, .php, .jsp, .jspx or a slash. This strategy may cause numerous HTML Web resources to be unintentionally skipped.

Some crawlers may also avoid requesting any resources that have a “?” in them (are dynamically produced) in order to avoid spider traps that may cause the crawler to download an infinite number of URLs from a Web site. This strategy is unreliable if the site uses a rewrite engine to simplify its URLs.

URL normalization

Main article: URL normalization

Crawlers usually perform some type of URL normalization in order to avoid crawling the same resource more than once. The term URL normalization, also called URL canonicalization, refers to the process of modifying and standardizing a URL in a consistent manner. There are several types of normalization that may be performed including conversion of URLs to lowercase, removal of “.” and “..” segments, and adding trailing slashes to the non-empty path component.[16]

Path-ascending crawling

Some crawlers intend to download as many resources as possible from a particular web site. So path-ascending crawler was introduced that would ascend to every path in each URL that it intends to crawl.[17] For example, when given a seed URL of http://llama.org/hamster/monkey/page.html, it will attempt to crawl /hamster/monkey/, /hamster/, and /. Cothey found that a path-ascending crawler was very effective in finding isolated resources, or resources for which no inbound link would have been found in regular crawling.

Many path-ascending crawlers are also gallery — from a specific page or host.

Focused crawling

Main article: Focused crawler

The importance of a page for a crawler can also be expressed as a function of the similarity of a page to a given query. Web crawlers that attempt to download pages that are similar to each other are called focused crawler or topical crawlers. The concepts of topical and focused crawling were first introduced by Menczer[18][19] and by Chakrabarti et al.[20]

The main problem in focused crawling is that in the context of a Web crawler, we would like to be able to predict the similarity of the text of a given page to the query before actually downloading the page. A possible predictor is the anchor text of links; this was the approach taken by Pinkerton[21] in the first web crawler of the early days of the Web. Diligenti et al.[22] propose using the complete content of the pages already visited to infer the similarity between the driving query and the pages that have not been visited yet. The performance of a focused crawling depends mostly on the richness of links in the specific topic being searched, and a focused crawling usually relies on a general Web search engine for providing starting points.

Academic-focused crawler

An example of the focused crawlers are academic crawlers, which crawls free-access academic related documents, such as the citeseerxbot, which is the crawler of CiteSeerX search engine. Other academic search engines are Google Scholar and Microsoft Academic Search etc. Because most academic papers are published in PDF formats, such kind of crawler is particularly interested in crawling PDF, PostScript files, Microsoft Word including their zipped formats. Because of this, general open source crawlers, such as Heritrix, must be customized to filter out other MIME types, or a middleware is used to extract these documents out and import them to the focused crawl database and repository.[23] Identifying whether these documents are academic or not is challenging and can add a significant overhead to the crawling process, so this is performed as a post crawling process using machine learning or regular expression algorithms. These academic documents are usually obtained from home pages of faculties and students or from publication page of research institutes. Because academic documents takes only a small faction in the entire web pages, a good seed selection are important in boosting the efficiencies of these web crawlers.[24] Other academic crawlers may download plain text and HTML files, that contains metadata of academic papers, such as titles, papers, and abstracts. This increases the overall number of papers, but a significant fraction may not provide free PDF downloads.

Re-visit policy

The Web has a very dynamic nature, and crawling a fraction of the Web can take weeks or months. By the time a Web crawler has finished its crawl, many events could have happened, including creations, updates and deletions.

From the search engine’s point of view, there is a cost associated with not detecting an event, and thus having an outdated copy of a resource. The most-used cost functions are freshness and age.[25]

Freshness: This is a binary measure that indicates whether the local copy is accurate or not. The freshness of a page p in the repository at time t is defined as:

F_{p}(t)={\begin{cases}1&{{\rm {if}}}~p~{{\rm {~is~equal~to~the~local~copy~at~time}}}~t\&{{\rm {otherwise}}}\end{cases}}

Age: This is a measure that indicates how outdated the local copy is. The age of a page p in the repository, at time t is defined as:

A_{p}(t)={\begin{cases}0&{{\rm {if}}}~p~{{\rm {~is~not~modified~at~time}}}~t\\t-{{\rm {modification~time~of}}}~p&{{\rm {otherwise}}}\end{cases}}

Coffman et al. worked with a definition of the objective of a Web crawler that is equivalent to freshness, but use a different wording: they propose that a crawler must minimize the fraction of time pages remain outdated. They also noted that the problem of Web crawling can be modeled as a multiple-queue, single-server polling system, on which the Web crawler is the server and the Web sites are the queues. Page modifications are the arrival of the customers, and switch-over times are the interval between page accesses to a single Web site. Under this model, mean waiting time for a customer in the polling system is equivalent to the average age for the Web crawler.[26]

The objective of the crawler is to keep the average freshness of pages in its collection as high as possible, or to keep the average age of pages as low as possible. These objectives are not equivalent: in the first case, the crawler is just concerned with how many pages are out-dated, while in the second case, the crawler is concerned with how old the local copies of pages are.

Two simple re-visiting policies were studied by Cho and Garcia-Molina:[27]

Uniform policy: This involves re-visiting all pages in the collection with the same frequency, regardless of their rates of change.

Proportional policy: This involves re-visiting more often the pages that change more frequently. The visiting frequency is directly proportional to the (estimated) change frequency.

(In both cases, the repeated crawling order of pages can be done either in a random or a fixed order.)

Cho and Garcia-Molina proved the surprising result that, in terms of average freshness, the uniform policy outperforms the proportional policy in both a simulated Web and a real Web crawl. Intuitively, the reasoning is that, as web crawlers have a limit to how many pages they can crawl in a given time frame, (1) they will allocate too many new crawls to rapidly changing pages at the expense of less frequently updating pages, and (2) the freshness of rapidly changing pages lasts for shorter period than that of less frequently changing pages. In other words, a proportional policy allocates more resources to crawling frequently updating pages, but experiences less overall freshness time from them.

To improve freshness, the crawler should penalize the elements that change too often.[28] The optimal re-visiting policy is neither the uniform policy nor the proportional policy. The optimal method for keeping average freshness high includes ignoring the pages that change too often, and the optimal for keeping average age low is to use access frequencies that monotonically (and sub-linearly) increase with the rate of change of each page. In both cases, the optimal is closer to the uniform policy than to the proportional policy: as Coffman et al. note, “in order to minimize the expected obsolescence time, the accesses to any particular page should be kept as evenly spaced as possible”.[26] Explicit formulas for the re-visit policy are not attainable in general, but they are obtained numerically, as they depend on the distribution of page changes. Cho and Garcia-Molina show that the exponential distribution is a good fit for describing page changes,[28] while Ipeirotis et al. show how to use statistical tools to discover parameters that affect this distribution.[29] Note that the re-visiting policies considered here regard all pages as homogeneous in terms of quality (“all pages on the Web are worth the same”), something that is not a realistic scenario, so further information about the Web page quality should be included to achieve a better crawling policy.

Politeness policy

Crawlers can retrieve data much quicker and in greater depth than human searchers, so they can have a crippling impact on the performance of a site. Needless to say, if a single crawler is performing multiple requests per second and/or downloading large files, a server would have a hard time keeping up with requests from multiple crawlers.

As noted by Koster, the use of Web crawlers is useful for a number of tasks, but comes with a price for the general community.[30] The costs of using Web crawlers include:

  • network resources, as crawlers require considerable bandwidth and operate with a high degree of parallelism during a long period of time;
  • server overload, especially if the frequency of accesses to a given server is too high;
  • poorly written crawlers, which can crash servers or routers, or which download pages they cannot handle; and
  • personal crawlers that, if deployed by too many users, can disrupt networks and Web servers.

A partial solution to these problems is the robots exclusion protocol, also known as the robots.txt protocol that is a standard for administrators to indicate which parts of their Web servers should not be accessed by crawlers.[31] This standard does not include a suggestion for the interval of visits to the same server, even though this interval is the most effective way of avoiding server overload. Recently commercial search engines like Google, Ask Jeeves, MSN and Yahoo! Search are able to use an extra “Crawl-delay:” parameter in the robots.txt file to indicate the number of seconds to delay between requests.

The first proposed interval between successive pageloads was 60 seconds.[32] However, if pages were downloaded at this rate from a website with more than 100,000 pages over a perfect connection with zero latency and infinite bandwidth, it would take more than 2 months to download only that entire Web site; also, only a fraction of the resources from that Web server would be used. This does not seem acceptable.

Cho uses 10 seconds as an interval for accesses,[27] and the WIRE crawler uses 15 seconds as the default.[33] The MercatorWeb crawler follows an adaptive politeness policy: if it took t seconds to download a document from a given server, the crawler waits for 10t seconds before downloading the next page.[34] Dill et al. use 1 second.[35]

For those using Web crawlers for research purposes, a more detailed cost-benefit analysis is needed and ethical considerations should be taken into account when deciding where to crawl and how fast to crawl.[36]

Anecdotal evidence from access logs shows that access intervals from known crawlers vary between 20 seconds and 3–4 minutes. It is worth noticing that even when being very polite, and taking all the safeguards to avoid overloading Web servers, some complaints from Web server administrators are received. Brin and Page note that: “… running a crawler which connects to more than half a million servers (…) generates a fair amount of e-mail and phone calls. Because of the vast number of people coming on line, there are always those who do not know what a crawler is, because this is the first one they have seen.”[37]

Parallelisation policy

A parallel crawler is a crawler that runs multiple processes in parallel. The goal is to maximize the download rate while minimizing the overhead from parallelization and to avoid repeated downloads of the same page. To avoid downloading the same page more than once, the crawling system requires a policy for assigning the new URLs discovered during the crawling process, as the same URL can be found by two different crawling processes.

Architectures

High-level architecture of a standard Web crawler

A crawler must not only have a good crawling strategy, as noted in the previous sections, but it should also have a highly optimized architecture.

Shkapenyuk and Suel noted that:[38]

While it is fairly easy to build a slow crawler that downloads a few pages per second for a short period of time, building a high-performance system that can download hundreds of millions of pages over several weeks presents a number of challenges in system design, I/O and network efficiency, and robustness and manageability.

Web crawlers are a central part of search engines, and details on their algorithms and architecture are kept as business secrets. When crawler designs are published, there is often an important lack of detail that prevents others from reproducing the work. There are also emerging concerns about “search engine spamming“, which prevent major search engines from publishing their ranking algorithms.

Crawler identification

Web crawlers typically identify themselves to a Web server by using the User-agent field of an HTTP request. Web site administrators typically examine their Web servers‘ log and use the user agent field to determine which crawlers have visited the web server and how often. The user agent field may include a URL where the Web site administrator may find out more information about the crawler. Examining Web server log is tedious task therefore some administrators use tools such as CrawlTrack[39] or SEO Crawlytics[40] to identify, track and verify Web crawlers. Spambots and other malicious Web crawlers are unlikely to place identifying information in the user agent field, or they may mask their identity as a browser or other well-known crawler.

It is important for Web crawlers to identify themselves so that Web site administrators can contact the owner if needed. In some cases, crawlers may be accidentally trapped in a crawler trap or they may be overloading a Web server with requests, and the owner needs to stop the crawler. Identification is also useful for administrators that are interested in knowing when they may expect their Web pages to be indexed by a particular search engine.

Crawling the deep web

A vast amount of web pages lie in the deep or invisible web.[41] These pages are typically only accessible by submitting queries to a database, and regular crawlers are unable to find these pages if there are no links that point to them. Google’s Sitemaps protocol and mod oai[42] are intended to allow discovery of these deep-Web resources.

Deep web crawling also multiplies the number of web links to be crawled. Some crawlers only take some of the URLs in <a href="URL"> form. In some cases, such as the Googlebot, Web crawling is done on all text contained inside the hypertext content, tags, or text.

Strategic approaches may be taken to target deep Web content. With a technique called screen scraping, specialized software may be customized to automatically and repeatedly query a given Web form with the intention of aggregating the resulting data. Such software can be used to span multiple Web forms across multiple Websites. Data extracted from the results of one Web form submission can be taken and applied as input to another Web form thus establishing continuity across the Deep Web in a way not possible with traditional web crawlers.

Pages built on AJAX are among those causing problems to web crawlers. Google has proposed a format of AJAX calls that their bot can recognize and index[43]

Web crawler bias

A recent study based on a large scale analysis of robots.txt files showed that certain web crawlers were preferred over others, with Googlebot being the most preferred web crawler.[citation needed]

Examples

This article may contain excessive, poor, or irrelevant examples. Please improve the article by adding more descriptive text and removing less pertinent examples. See Wikipedia’s guide to writing better articles for further suggestions. (May 2012)

The following is a list of published crawler architectures for general-purpose crawlers (excluding focused web crawlers), with a brief description that includes the names given to the different components and outstanding features:

  • Yahoo! Slurp was the name of the Yahoo! Search crawler until Yahoo! contracted with Microsoft to use bingbot instead.
  • Bingbot is the name of Microsoft’s Bing webcrawler. It replaced Msnbot.
  • FAST Crawler[44] is a distributed crawler, used by Fast Search & Transfer, and a general description of its architecture is available.[citation needed]
  • Googlebot[37] is described in some detail, but the reference is only about an early version of its architecture, which was based in C++ and Python. The crawler was integrated with the indexing process, because text parsing was done for full-text indexing and also for URL extraction. There is a URL server that sends lists of URLs to be fetched by several crawling processes. During parsing, the URLs found were passed to a URL server that checked if the URL have been previously seen. If not, the URL was added to the queue of the URL server.
  • PolyBot[38] is a distributed crawler written in C++ and Python, which is composed of a “crawl manager”, one or more “downloaders” and one or more “DNS resolvers”. Collected URLs are added to a queue on disk, and processed later to search for seen URLs in batch mode. The politeness policy considers both third and second level domains (e.g.: http://www.example.com and www2.example.com are third level domains) because third level domains are usually hosted by the same Web server.
  • RBSE[45] was the first published web crawler. It was based on two programs: the first program, “spider” maintains a queue in a relational database, and the second program “mite“, is a modified www ASCII browser that downloads the pages from the Web.
  • WebCrawler[21] was used to build the first publicly available full-text index of a subset of the Web. It was based on lib-WWW to download pages, and another program to parse and order URLs for breadth-first exploration of the Web graph. It also included a real-time crawler that followed links based on the similarity of the anchor text with the provided query.
  • World Wide Web Worm[46] was a crawler used to build a simple index of document titles and URLs. The index could be searched by using the grep Unix command.
  • WebFountain[4] is a distributed, modular crawler similar to Mercator but written in C++. It features a “controller” machine that coordinates a series of “ant” machines. After repeatedly downloading pages, a change rate is inferred for each page and a non-linear programming method must be used to solve the equation system for maximizing freshness. The authors recommend to use this crawling order in the early stages of the crawl, and then switch to a uniform crawling order, in which all pages are being visited with the same frequency.
  • WebRACE[47] is a crawling and caching module implemented in Java, and used as a part of a more generic system called eRACE. The system receives requests from users for downloading web pages, so the crawler acts in part as a smart proxy server. The system also handles requests for “subscriptions” to Web pages that must be monitored: when the pages change, they must be downloaded by the crawler and the subscriber must be notified. The most outstanding feature of WebRACE is that, while most crawlers start with a set of “seed” URLs, WebRACE is continuously receiving new starting URLs to crawl from.

In addition to the specific crawler architectures listed above, there are general crawler architectures published by Cho[48] and Chakrabarti.[49]

Open-source crawlers

  • DataparkSearch is a crawler and search engine released under the GNU General Public License.
  • GNU Wget is a command-line-operated crawler written in C and released under the GPL. It is typically used to mirror Web and FTP sites.
  • GRUB is an open source distributed search crawler that Wikia Search used to crawl the web.
  • Heritrix is the Internet Archive‘s archival-quality crawler, designed for archiving periodic snapshots of a large portion of the Web. It was written in Java.
  • ht://Dig includes a Web crawler in its indexing engine.
  • HTTrack uses a Web crawler to create a mirror of a web site for off-line viewing. It is written in C and released under the GPL.
  • ICDL Crawler is a cross-platform web crawler written in C++ and intended to crawl Web sites based on Website Parse Templates using computer’s free CPU resources only.
  • mnoGoSearch is a crawler, indexer and a search engine written in C and licensed under the GPL (*NIX machines only)
  • Norconex HTTP Collector is a web spider, or crawler, written in Java, that aims to make Enterprise Search integrators and developers’s life easier (licensed under GPL).
  • Nutch is a crawler written in Java and released under an Apache License. It can be used in conjunction with the Lucene text-indexing package.
  • Open Search Server is a search engine and web crawler software release under the GPL.
  • PHP-Crawler is a simple PHP and MySQL based crawler released under the BSD License. Easy to install it became popular for small MySQL-driven websites on shared hosting.
  • tkWWW Robot, a crawler based on the tkWWW web browser (licensed under GPL).
  • Scrapy, an open source webcrawler framework, written in python (licensed under BSD).
  • Seeks, a free distributed search engine (licensed under Affero General Public License).
  • YaCy, a free distributed search engine, built on principles of peer-to-peer networks (licensed under GPL).

http://en.wikipedia.org/wiki/Web_crawler

Web scraping

Web scraping (web harvesting or web data extraction) is a computer software technique of extracting information from websites. Usually, such software programs simulate human exploration of the World Wide Web by either implementing low-level Hypertext Transfer Protocol (HTTP), or embedding a fully-fledged web browser, such as Internet Explorer or Mozilla Firefox.

Web scraping is closely related to web indexing, which indexes information on the web using a bot or web crawler and is a universal technique adopted by most search engines. In contrast, web scraping focuses more on the transformation of unstructured data on the web, typically in HTML format, into structured data that can be stored and analyzed in a central local database or spreadsheet. Web scraping is also related to web automation, which simulates human browsing using computer software. Uses of web scraping include online price comparison, contact scraping, weather data monitoring, website change detection, research, web mashup and web data integration.

Techniques

Web scraping is the process of automatically collecting information from the World Wide Web. It is a field with active developments sharing a common goal with the semantic web vision, an ambitious initiative that still requires breakthroughs in text processing, semantic understanding, artificial intelligence and human-computer interactions. Web scraping, instead, favors practical solutions based on existing technologies that are often entirely ad hoc. Therefore, there are different levels of automation that existing web-scraping technologies can provide:

  • Human copy-and-paste: Sometimes even the best web-scraping technology cannot replace a human’s manual examination and copy-and-paste, and sometimes this may be the only workable solution when the websites for scraping explicitly set up barriers to prevent machine automation.
  • Text grepping and regular expression matching: A simple yet powerful approach to extract information from web pages can be based on the UNIX grep command or regular expression-matching facilities of programming languages (for instance Perl or Python).
  • HTTP programming: Static and dynamic web pages can be retrieved by posting HTTP requests to the remote web server using socket programming.
  • HTML parsers. Many websites have large collections of pages generated dynamically from an underlying structured source like a database. Data of the same category are typically encoded into similar pages by a common script or template. In data mining, a program that detects such templates in a particular information source, extracts its content and translates it into a relational form called a wrapper. Wrapper generation algorithms assume that input pages of a wrapper induction system conform to a common template and that they can be easily identified in terms of a URL common scheme.[1]. Moreover, some semi-structured data query languages, such as XQuery and the HTQL, can be used to parse HTML pages and to retrieve and transform page content.
  • DOM parsing: By embedding a full-fledged web browser, such as the Internet Explorer or the Mozilla browser control, programs can retrieve the dynamic content generated by client-side scripts. These browser controls also parse web pages into a DOM tree, based on which programs can retrieve parts of the pages.
  • Web-scraping software: There are many software tools available that can be used to customize web-scraping solutions. This software may attempt to automatically recognize the data structure of a page or provide a recording interface that removes the necessity to manually write web-scraping code, or some scripting functions that can be used to extract and transform content, and database interfaces that can store the scraped data in local databases.
  • Vertical aggregation platforms: There are several companies that have developed vertical specific harvesting platforms. These platforms create and monitor a multitude of “bots” for specific verticals with no man-in-the-loop,[clarification needed] and no work related to a specific target site. The preparation involves establishing the knowledge base for the entire vertical and then the platform creates the bots automatically. The platform’s robustness is measured by the quality of the information it retrieves (usually number of fields) and its scalability (how quick it can scale up to hundreds or thousands of sites). This scalability is mostly used to target the Long Tail of sites that common aggregators find complicated or too labor-intensive to harvest content from.
  • Semantic annotation recognizing: The pages being scraped may embrace metadata or semantic markups and annotations, which can be used to locate specific data snippets. If the annotations are embedded in the pages, as Microformat does, this technique can be viewed as a special case of DOM parsing. In another case, the annotations, organized into a semantic layer,[2] are stored and managed separately from the web pages, so the scrapers can retrieve data schema and instructions from this layer before scraping the pages.
  • Computer vision web-page analyzers. There are efforts using machine learning and computer vision that attempt to identify and extract information from web pages by interpreting pages visually as a human being might.[3]

Legal issues

Web scraping may be against the terms of use of some websites. The enforceability of these terms is unclear.[4] While outright duplication of original expression will in many cases be illegal, in the United States the courts ruled in Feist Publications v. Rural Telephone Service that duplication of facts is allowable. U.S. courts have acknowledged that users of “scrapers” or “robots” may be held liable for committing trespass to chattels,[5][6] which involves a computer system itself being considered personal property upon which the user of a scraper is trespassing. The best known of these cases, eBay v. Bidder’s Edge, resulted in an injunction ordering Bidder’s Edge to stop accessing, collecting, and indexing auctions from the eBay web site. This case involved automatic placing of bids, known as auction sniping. However, in order to succeed on a claim of trespass to chattels, the plaintiff must demonstrate that the defendant intentionally and without authorization interfered with the plaintiff’s possessory interest in the computer system and that the defendant’s unauthorized use caused damage to the plaintiff. Not all cases of web spidering brought before the courts have been considered trespass to chattels.[7]

One of the first major tests of screen scraping involved American Airlines, and a firm called FareChase.[8] AA successfully obtained an injunction from a Texas trial court, stopping FareChase from selling software that enables users to compare online fares if it also searches AA’s website. The airline argued that FareChase’s websearch software trespassed on AA’s servers when it collected the publicly available data. FareChase filed an appeal in March 2003. By June, FareChase and AA agreed to settle and the appeal was dropped.[9]

Southwest Airlines has also challenged screen-scraping practices, and has involved both FareChase and another firm, Outtask, in a legal claim. Southwest Airlines charged that the screen-scraping is Illegal since it is an example of “Computer Fraud and Abuse” and has led to “Damage and Loss” and “Unauthorized Access” of Southwest’s site. It also constitutes “Interference with Business Relations”, “Trespass”, and “Harmful Access by Computer”. They also claimed that screen-scraping constitutes what is legally known as “Misappropriation and Unjust Enrichment”, as well as being a breach of the web site’s user agreement. Outtask denied all these claims, claiming that the prevailing law in this case should be US Copyright law, and that under copyright, the pieces of information being scraped would not be subject to copyright protection. Although the cases were never resolved in the Supreme Court of the United States, FareChase was eventually shuttered by parent company Yahoo!, and Outtask was purchased by travel expense company Concur.[10]

Although these are early scraping decisions, and the theories of liability are not uniform, it is difficult to ignore a pattern emerging that the courts are prepared to protect proprietary content on commercial sites from uses which are undesirable to the owners of such sites. However, the degree of protection for such content is not settled, and will depend on the type of access made by the scraper, the amount of information accessed and copied, the degree to which the access adversely affects the site owner’s system and the types and manner of prohibitions on such conduct.[11]

While the law in this area becomes more settled, entities contemplating using scraping programs to access a public web site should also consider whether such action is authorized by reviewing the terms of use and other terms or notices posted on or made available through the site. In the latest ruling in the Cvent, Inc. v. Eventbrite, Inc. In the United States district court for the eastern district of Virginia, the court ruled that the terms of use should be brought to the users’ attention In order for a browse wrap contract or license to be enforced.[12]

In the plaintiff’s web site during the period of this trial the terms of use link is displayed among all the links of the site, at the bottom of the page as most sites on the internet. This ruling contradicts the Irish ruling described below. The court also rejected the plaintiff’s argument that the browse wrap restrictions were enforceable in view of Virginia’s adoption of the Uniform Computer Information Transactions Act (UCITA)—a uniform law that many believed was in favor on common browse wrap contracting practices.[13]

Outside of the United States, in February 2006, the Danish Maritime and Commercial Court (Copenhagen) ruled that systematic crawling, indexing, and deep linking by portal site ofir.dk of real estate site Home.dk does not conflict with Danish law or the database directive of the European Union.[14]

In 2009 Facebook won one of the first copyright suits against a known web scraper. This laid the groundwork for numerous lawsuits that tie any web scraping with a direct copyright violation and very clear monetary damages. The most recent case being AP v Meltwater, where the courts stripped what is referred to as fair use on the internet.[15]

In a February 2010 case complicated by matters of jurisdiction, Ireland’s An Ard-Chúirt delivered a verdict that illustrates the inchoate state of developing case law. In the case of Ryanair Ltd v Billigfluege.de GmbH, Ireland’s High Court ruled Ryanair’s “click-wrap” agreement to be legally binding. In contrast to the findings of the United States District Court Eastern District of Virginia and those of the Danish Maritime and Commercial Court, Mr. Justice Michael Hanna ruled that the hyperlink to Ryanair’s terms and conditions was plainly visible, and that placing the onus on the user to agree to terms and conditions in order to gain access to online services is sufficient to comprise a contractual relationship. Where here may be another legal issue, of data non-valid or incorrect information, as most of data mixed with lot of “Junk” or “Spam”. Where with respect to data ware house there are: may be limitation of query interface, inconsistence output and rapid change in data by admin without any notice. [16] The decision is under appeal in Ireland’s Supreme Court, the Cúirt Uachtarach na hÉireann.[17]

In Australia, the Spam Act 2003 outlaws some forms of web harvesting, although this only applies to email addresses.[18][19]

Technical measures to stop bots

The administrator of a website can use various measures to stop or slow a bot. Some techniques include:

  • Blocking an IP address. This will also block all browsing from that address.
  • Disabling any web service API that the website’s system might expose.
  • Bots sometimes declare who they are (using user agent strings) and can be blocked on that basis (using robots.txt); ‘googlebot‘ is an example. Some bots make no distinction between themselves and a human browser.
  • Bots can be blocked by excess traffic monitoring.
  • Bots can sometimes be blocked with tools to verify that it is a real person accessing the site, like a CAPTCHA. Bots are sometimes coded to explicitly break specific Captcha patterns.
  • Commercial anti-bot services: Companies offer anti-bot and anti-scraping services for websites. A few web application firewalls have limited bot detection capabilities as well.
  • Locating bots with a honeypot or other method to identify the IP addresses of automated crawlers.
  • Using CSS sprites to display such data as phone numbers or email addresses, at the cost of accessibility to screen reader users.

http://en.wikipedia.org/wiki/Web_scraping

Related Posts On Pronk Pops

The Pronk Pops Show 207, February 10, 2014, Story 1: Democrats Lose 50 Year War On Poverty Start 100 Year War On Work: Millennial Moocher Mania — Grow The Government Shrink The Economy And Employment! — Progressive Permanent Poverty People — Videos

Read Full Post | Make a Comment ( None so far )

A Matter of Trust — Do You Believe The National Security Agency and The House Armed Services Committee That Snowden Is A Traitor? The Same People That Have Been Spying On The American People For Decades And Lying About It– Fat Chance

Posted on February 6, 2014. Filed under: American History, Blogroll, Business, College, Communications, Computers, Constitution, Crime, Culture, Diasters, Economics, Education, Employment, Federal Government, Foreign Policy, government, government spending, history, Investments, Language, Law, liberty, Life, Links, media, People, Philosophy, Politics, Rants, Raves, Resources, Systems, Technology, Terrorism, Video, War, Wealth, Wisdom, Writing | Tags: , , , , , , , , , , , , , , |

NSA uses computer cookies to track Americans

WikiLeaks: US trying to ‘criminalize journalism’ over Snowden leaks

Seeing The Secret State: Six Landscapes [30c3]

Through a PRISM, Darkly – Everything we know about NSA spying

The NSA’s Prism Data Collection System Exposed

Prism NSA National Security Program Revealed

HOW AGENCIES SPY IN DIGITAL AGE BBC NEWS

 

Glenn Greenwald Piers Morgan On XKEYSCORE. Greenwald

 

XKeyscore- A New Level of Invasive NSA Data Spying

 

Lawmakers ‘Disturbed and Angered’ After Classified Briefing Reveals Extent of Snowden Defense Leaks

Leading members of the House Armed Services Committee emerged from a classified briefing on the Edward Snowden leaks Wednesday afternoon “shocked” at the amount of information he reportedly leaked beyond the NSA surveillance programs.

Rep. Mac Thornberry (R-Texas), chairman of the Armed Service panel’s Intelligence, Emerging Threats and Capabilities Subcommittee and also a member of the House Intelligence Committee, said the briefing on the defense consequences of Snowden’s leaks was “very highly classified,” and therefore details couldn’t be discussed.

Thornberry did say that lawmakers “left the briefing disturbed and angered” after hearing that the leaks by the former Booz Allen Hamilton employee “went well beyond programs associated with the NSA and data collection.”

He characterized the leaks as so severe that they “compromise military capability and defense of the country” and “could cost lives” — while they “will certainly cost billions to repair.”

“His actions were espionage, plain and simple,” Thornberry said.

Armed Services Chairman Buck McKeon (R-Calif.) read his statement rather than making comments on the fly “because of the seriousness of this issue and the sensitivity” of the information they’d just heard.

“Ed Snowden isn’t a whistleblower; he’s a traitor,” McKeon said.

No matter what opinion people hold of the data collection programs, he added, people should be “shocked and outraged to find that a substantial amount of the information has nothing to do with the NSA.”

“He’s given our enemies an edge and put American lives at risk,” said the chairman.

McKeon said Americans should “demand” that Snowden be “brought to justice” and not be extended any sort of deal by the government.

http://pjmedia.com/tatler/2014/02/05/lawmakers-disturbed-and-angered-after-classified-briefing-reveals-extent-of-snowden-defense-leaks/

Read Full Post | Make a Comment ( None so far )

Conspiracy Theories and Secret Societies in History — World War III — New World Order — Videos

Posted on May 29, 2013. Filed under: American History, Ammunition, Blogroll, Bomb, Business, College, Communications, Constitution, Culture, Dirty Bomb, Drones, Economics, Federal Government, Federal Government Budget, Fiscal Policy, Foreign Policy, government, government spending, history, History of Economic Thought, Islam, Language, Law, liberty, Life, Links, media, Nuclear, People, Philosophy, Pistols, Politics, Private Sector, Public Sector, Rants, Raves, Resources, Rifles, Security, Strategy, Tax Policy, Technology, Terrorism, Unions, Video, War, Wealth, Weapons, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

g-edward_griffin

Alan_Watt

The_Truth_Is_Out_There_tagline

“One can resist the invasion of armies; one cannot resist the invasion of ideas.”

~Victor Hugo, “The History of a Crime”

Fall of America: G. Edward Griffin on Conspiracy Theories

G. Edward Griffin – The Collectivist Conspiracy

An Idea Whose Time Has Come – G. Edward Griffin – Freedom Force International – Full

Alan Watt

Alan Watt – “Masterplan of the Elite”

ILLUMINATING SECRET SOCIETIES (Final Cut)

THE ILLUMINATI 2013 Full Documentary including ties to Anonymous “By the YRV”

EndGame HQ full length version

Invisible Empire A New World Order Defined Full

Secret Societies the String Pullers? – Skulls, Bilderbergers and The CFR [Full Version]

A history of conspiracy theories in America: Lecture by Professor Robert Goldberg

ZEITGEIST: MOVING FORWARD | OFFICIAL RELEASE | 2011

New World Order’s Eugenics Obsession(Part 1 of 2) Aaron Dykes Reporting

New World Order’s Eugenics Obsession(Part 2 of 2) Aaron Dykes Reporting

“Agenda 21” The UN’s diabolical plan for the world is explained on the “Glenn Beck Show”

Agenda 21, Glenn Beck’s Latest Book Talks w/ UN A21 Expert Rose Koire a Democrat

United Nations Agenda 21

UN Agenda 21 PROVEN “Anti-Human” by “Expert Witness” Rosa Koire

Agenda 21 EXPLAINED, full version

Glenn Beck- Who will lead the New World Order?

Glenn Beck Predicts New World Order. Global Reset. U.S. Will Be A 3rd World State

Mind blowing speech by Robert Welch in 1958 predicting Insiders plans to destroy America

Read Full Post | Make a Comment ( None so far )

Public Safety Exception or Enemy Combatant Designation of Boston Bomber Terrorist Suspect Dzhokhar Tsarnaev — The History of FBI Fake Terrorist Plot Planning — The One That Got Away From FBI’s Terror Factory — The Saudi Deportation of Abdul Rahman Ali Alharbi By National Counterterrorism Center (NCTC) Event File Tagged Section 212 3B — “Security and related grounds” — “Terrorist activities” –Videos

Posted on April 21, 2013. Filed under: American History, Blogroll, Bomb, College, Communications, Constitution, Crime, Economics, Education, Employment, Federal Government, Foreign Policy, government, government spending, High School, history, Law, liberty, Life, Links, media, People, Philosophy, Pistols, Politics, Radio, Rants, Raves, Rifles, Security, Talk Radio, Taxes, Video, War, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , |

fbi_terror_plot

The_Terror_Factory

Glenn Beck Reveals More about Saudi National

“…Monday on radio, Glenn Beck revealed further details about the Saudi national who was the first suspect in the Boston marathon bombing. Despite denials from Janet Napolitano and officials from the U.S. Immigrations and Customs (ICE) that a Saudi national was taken into custody in connection to the Boston marathon bombing, several sources have confirmed that Abdul Rahman Ali Al-Harbi was set to be deported for proven terrorist activity.

According to two FBI sources, Abdul Rahman Ali Al-Harbi was taken “into custody” Monday April 15th at a Boston after he was injured in the blast.

A source within the National Counterterrorism Center (NCTC) told TheBlaze that on Monday night Al-Harbi’s Revere, Massachusetts apartment was searched and property was taken out.

At 4:00pm ET on Tuesday April 16th, The NCTC Field Watch Commander created an “event file” calling for Al-Harbi’s deportation using Section 212 3b, which is proven terrorist activity. According to TheBlaze’s sources, tagging someone as 3b requires solid evidence.

Fox News reporter Todd Starnes has also reported, “The Saudi national who was initially detained and then ruled out as a suspect in the Boston Marathon terrorist attack had been flagged on a terror watch list and was granted a student visa without being properly vetted, sources have told me.”

Starnes report no longer appears on the Fox News website, but can be found on Townhall.

Rep. Jeff Duncan (R-SC) has told TheBlaze that he has detailed information on the Saudi national and confirmed that Al-Harbi was to be deported under Section 212 3b of the Immigration and Nationality Act. Alongside three other Congressmen, Rep. Duncan has requested a classified briefing on the Saudi national and the deportation order. …”

http://www.glennbeck.com/2013/04/22/exposed-congressional-sources-confirm-saudi-national-was-to-be-deported-for-security-related-grounds-have-files-in-their-possession/

Obama’s “Catch & Release” of Saudi Boston Marathon Bombing Suspect

Jeff Duncan Questions Napolitano On Deportation Of Saudi National. Boston Bombing

Terror in Boston – Saudi Being Deported For National Security Reason? – What The Hell Is This?

Was The Boston Marathon Bombing Another False Flag Attack by FBI?

Still think the FBI is telling you the truth? CHECK THIS OUT

Abdul Rahman Ali Al-Harbi, Bombing ‘Person Of Interest’ Has 6 Saudi ‘Terrorists’ In Family,5 More Are In Gitmo –

Obama Buries Boston Massacre Saudi Connection

PROOF! Boston Bombing is Staged Terror Attack

Navy Seals Soldiers Bomb Boston Marathon 2013

Inside the FBI’s ‘Terror factory’

Conversations w/Great Minds – The Terror Factory – The FBI “Sting” isn’t what you think P1

Conversations w – Great Minds – FBI Informants focus on Muslims instead of Militias P2…

Reality Check  Is The FBI Making Us Safer Breaking Up Terror Plots    YouTube

Sen. Feinstein, Rep. King Clash Over Suspect’s Enemy Combatant Status: Battlefield Now in The U.S.

Lindsey Graham: ‘A Citizen Can Be An Enemy Combatant,’ And Tsarnaev Should Be Treated Like One

Megyn Kelly Guests Clash Over ‘Enemy Combatant’ Designation For Suspect: ‘Ultimate Act Of Terror’

Rachel Maddow No Miranda Rights For Boston Bombing Suspect

Judge Napolitano: Boston Bombing Reopens Privacy vs. Safety Debate

Reality Check: Did the FBI know about Boston bombing beforehand? – Ben Swann

Former FBI Chief ADMITS Government is Involved in Most ‘Terrorist’ Attacks! 

Boston Bombing Coverup? 

Saudi Arabian Students Searched and Detained By FBI about Boston Terrorist Attack!! 

BREAKING Glenn Beck Gives Government Until Monday to Come Clean About Boston Bombing Cover-Up

Saudi student connected to Boston Marathon bombing – TheBlaze EXCLUSIVE – Glenn Beck Wake Up America 

Hannity. Boston Bombing Saudi Being DEPORTED On National Security Grounds

Glenn Beck’s Big Story On Obama And The Bombing Released!

Glenn Beck Reveals More about Saudi National

FBI Insider: Obama Administration Likely Manufactured Dubious Iran Terror Plot 

Confirmed – No Iran terror plot in FBI system: Lt. Col. Anthony Shaffer Reports 1/2 

Confirmed – No Iran terror plot in FBI system: Lt. Col. Anthony Shaffer Reports 2/2

FBI Fake Terror Plot History: Judge Napolitano

FBI agents craft their own terror plots

FBI Foils Terror Plot They Created, Again

NY Times: Terrorist Plots, Hatched by The F.B.I.

BOSTON BOMBING Did you notice this?

FBI_TERRORPLOT

Background Articles and Videos

Abdulrahman Ali Al-Harbi deportation order records altered

Abdulrahman Ali Al-Harbi was originally named as a ‘person of interest’ after the Boston bombings. The Saudi National was cleared of any involvement in the bombing, but there have been a lot of strange things going on with Abdulrahman Ali Al-Harbi and the Obama regime. According to Breitbart,  the Saudi National Abdulrahman Ali Al-Harbi had his deportation order records altered. This rescinded his deportation order. Michelle Obama decided to pay Al-Harbi a visit while he was in the hospital recovering from wounds in the attack. Michelle Obama never paid a visit to any of the other injured people, including those who lost limbs in the attack. Also, Obama himself met with the Saudi foreign minister two days after the attack. This was not listed on Obama’s public schedule and as usual the media didn’t report on this. Something very fishy is going on here. I wonder if this was supposed to be Glenn Beck’s big ‘bombshell’ for tomorrow? If so, Breitbart scooped him.

Now that it’s been revelaed that Abdulrahman Ali Al-Harbi deportation order records altered, it probably explains why Janet Napolitano got so testy when asked about Al-Harbi last week. Why would Obama or his regime alter the deportation order? Are they hiding something? Of course they are. Without a media in this country, we’ll never know what they are hiding.

The alteration occurred the night before Secretary Napolitano vehemently denied the existence of any deportation order in testimony before the House of Representatives. Sources with knowledge of these matters says the change occurred subsequent to Secretary John Kerry’s closed door meeting on Tuesday with the Saudi Minister and around the time of the meeting between the Saudi Minister and Obama later on Wednesday evening. The Saudi National has been identified as Abdulrahman Ali Al-Harbi. There is no evidence that Al-Harbi is connected to the Boston Marathon Bombings. Steven Emerson announced on Wednesday night’s episode of Hannity that the Saudi National who was a person of interest and later cleared, was set to be deported.

http://www.fireandreamitchell.com/2013/04/21/abdulrahman-ali-al-harbi-deportation-order-records-altered/?utm_source=rss&utm_medium=rss&utm_campaign=abdulrahman-ali-al-harbi-deportation-order-records-altered

Boston MANHUNT is OVER: the Second BOMBER is CAUGHT (FBI FALSE FLAG says the mother)

A retired Lieutenant Colonel in the Army weighs in on Boston.

Related Posts On Pronk Palisades

Terrorists Bomb Boston Marathon Finish Line — 3 Dead, 180 Injured With Two Bombs — April 15, 2013 — Updated — Photos and Videos

Read Full Post | Make a Comment ( None so far )

Michael Scheuer–Osama Bin Laden–Al Qaeda–U.S. Government Interventionism Abroad–Libya and Iran–Videos

Posted on October 27, 2012. Filed under: American History, Blogroll, Books, Business, College, Communications, Culture, Demographics, Economics, Education, Federal Government, Foreign Policy, government, government spending, history, Language, Law, liberty, Life, Links, media, People, Philosophy, Politics, Programming, Rants, Raves, Religion, Video, War, Wisdom | Tags: , , , , , , , , |

FMR CIA Chief on ‘Benghazi-Gate’: “The Democrats Are Very Good At Watching People Die”

Michael Scheuer: Mrs Clinton Has Blood on her Hands Everywhere

President Obama Speaks on Libya Attacks that killed US Ambassador(Chris Stevens) 

CNN: Scheuer ‘Osama bin Laden died a success’

Ron Paul’s Secretary of State Michael Scheuer

Are We Arming Al-Qaeda? 

Are we arming/helping Al Qaeda in Libya?- Michael Scheuer 

Michael Scheuer: ‘US depended on tyrannies’

Michael Scheuer: The Decline of Al Qaeda?

Who Is Osama Bin Laden And Al-Qaeda? (Michael Scheuer, Former CIA)

World Affairs TODAY: Episode 10 

Michael Scheuer, former head of the CIA’s Osama bin Laden unit, discusses the U.S. pursuit of the al-Qaeda leader post 9/11 and prospects for catching him in the near future.

Former CIA Officer Michael Scheuer on the Economics of War with Iran

“Ultimately We Will Be Going To War With Iran If The Israelis Want Us To” Michael Scheuer 

Michael Scheuer: Israel & Saudi Arabia Are Much More Dangerous Enemies To The US Than The Iran

Background Articles and Videos

WikiLeaks Reveals US Wanted to Keep Russia out of Libyan Oil

Conversations With History – Michael Scheuer

Read Full Post | Make a Comment ( None so far )

Robert Steele–Gnomedex, 2007–Keynote Address–Videos

Posted on January 24, 2011. Filed under: Blogroll, Communications, Culture, Demographics, Economics, Employment, Federal Government, government, government spending, Investments, Language, Law, liberty, Life, Links, media, People, Philosophy, Politics, Raves, Regulations, Security, Taxes, Technology, Video, War, Wealth, Wisdom | Tags: , , , , , , , , , |

Gnomedex – Robert Steele

 

Background Articles and Videos

 

CIA Officer- Robert Steele tells it like it is. Part 1

 

CIA Officer- Robert Steele tells it like it is Part 2

 

CHANGE 2010: Robert Steele, former CIA officer, discusses real-time and and open source intelligence

 

Robert David Steele Vivas

“…Robert David Steele Vivas (b. July 16, 1952 New York City), is known for his promotion of open source intelligence (OSINT).[1] He is a former United States Marine Corps infantry and intelligence officer for twenty years and was the second-ranking civilian (GS-14) in U.S. Marine Corps Intelligence from 1988–1992.[citation needed] Steele is a former clandestine services case officer with the Central Intelligence Agency.[2] He is the founder and CEO of OSS.Net as well as the Golden Candle Society. Steele also was a member of the Adjunct Faculty of Marine Corps University in the mid-1990s. …”

“…Career

He spent his early years, two decades, in Latin America and Asia as the son of an oil company executive. Steele has an BA in Political Science; an MA in International Relations; and an MPA in Public Administration. He resigned from the military in 1993.

He is commonly associated[citation needed] with the open source intelligence movement and coined the terms “virtual intelligence” and “information peacekeeping”. He argues that U.S. intelligence reform is needed, and that the private sector can perform a high percentage of U.S. open source intelligence needs and reduce cost to the U.S. government. He advocates “collective intelligence” or “the wisdom of the crowd” (what Howard Rheingold calls “smart mobs”) and for hackers as a national resource.

Steele, an international proponent of OSINT, argues that both reports, while recent, still ignore his decades of advocacy for a proper national focus on OSINT from 1988 to date. He further argues that the CIA has refused to take open source information seriously for decades, and should not be charged with developing new capabilities that are totally outside its existing culture of secrecy.[citation needed]

Books self-published by Steele

  • On Intelligence: Spies and Secrecy in an Open World (AFCEA, 2000). ISBN 0-9715661-0-0.
  • The New Craft of Intelligence: Personal, Public, & Political (OSS, 2002). ISBN 0-9715661-1-9.
  • Peacekeeping Intelligence: Emerging Concepts for the Future (OSS, 2003). Contributing editor with Ben de Jong and Wies Platje. ISBN 0-9715661-2-7.
  • Information Operations: All Information, All Languages, All the Time (OSS, 2005). ISBN 0-9715661-3-5.
  • The Smart Nation Act: Public Intelligence in the Public Interest (OSS, 2006). ISBN 0-9715661-3-2. …”

http://en.wikipedia.org/wiki/Robert_David_Steele

Read Full Post | Make a Comment ( None so far )

Liked it here?
Why not try sites on the blogroll...