Lets Help Them Build Thier Classrooms. Want to help? Just Simply Click on the Highlighted Text. "the click you make, maybe the the future you gave" More clicks More Classrooms to be Made.

Thursday, January 13, 2011

Top 10 Latest Inventions of 2010

1. Lockheed Martin Improves its Robotic Exoskeleton Called HULC

The HULC Robotic Exoskeleton MK II developed by Lockheed Martin has been upgraded. The company carried out a number of evaluation tests of its new exoskeleton.
Now the hydraulic "power-suit" features improved protection and is much easier to adjust than the previous model. In addition, the exoskeleton boasts an increased run-time and new control software.
It is worth mentioning that HULC (Human Universal Load Carrier) is just one of several exoskeleton developed for both the military and civilians.
Soldiers equipped with HULC are stronger and faster, and can carry heavy loads of up to 200lbs through a rough terrain at a speed of 7mph with 10mph bursts. The machine can register a range of 12 miles at lower speeds.
In order to lift loads the exoskeleton uses power-assisted straps. According to Lockheed Martin, HULC has a better operational runtime, which was achieved with the help of military-standard rechargeable batteries, reports Gizmag.
The company believes that its improved exoskeleton could be used in various industrial applications and even in healthcare.

2. OrtusTech Unveils World's Smallest High-Res Display

The company called OrtusTech has developed what it claims to be the world's smallest full HD display.
The new device measures 4.8 inches and its panel has a resolution of 1,920 × 1,080.
The high-end resolution was create with the help of advanced HAST (Hyper Amorphous Silicon TFT) microfabrication technology, developed by OrtusTech.
In order to get high resolution in such a small size, the company squeezed in 458 pixels per inch.
Being able to support 16 million colors, the device also provides a viewing angle of 160 degrees, informs NewLaunches.
Some of the uses of the new device from OrtusTech include HDTV equipment, screens, monitors, smartphones and handheld video consoles.

3. Cargo Planes Used to Plant 900,000 Trees a Day

Lockheed Martin decided to use its fleet of decommissioned C-130 Hercules cargo aircrafts, which were previously used to drop land mines, as foresters.
Thus the military innovation company managed to turn the 25 year old idea, proposed by former UK RAF pilot Jack Walters, into reality.
Each cargo plane will be equipped with the necessary tools to be able to drop up to 900,000 trees in one day.
The aircrafts will fly at an altitude of 1,000 feet at a speed of 130 knots. Using the same technique as before (but with cones instead of land mines), they will be able to plant 3,000 cones each minute.
It is worth mentioning that the cones are created in a way to bury themselves after hitting the soil. The casing of the tree bombs will dissolve and the trees will take root, having all that is needed for a tree to grow, including moisture and a measure of fertilizer, informs TreeHugger.
Today there are about 2,500 unused C-130 planes in 70 countries around the world.

4. Cybertecture Interactive Mirror with Numerous Applications

Although the interactive display technology is not new, each time a new product comes up it almost instantly catches the attention of the public.
A new device that complements the series of interactive home furnishing equipments is Cybertecture Mirror display.
The device represents a mirror that can be controlled with the help of a remote. The operative system of the reflecting display allows the user to connect to their cloud stored information.
It also includes messaging, weather and a number of applications like the fitness-tracking utility that connects to a bathroom scale, informs Akihabara News.
It would be interesting to note that the mirror is made of 800 x 500 x 5mm fog resistant glass. It also boasts Wi-Fi connection and 10W stereo speakers. The price tag of this contraption is $7,700.

5. Implantable Flexible LEDs for Medical Monitoring

A team of scientists from the United States, China, Korea and Singapore decided to create flexible ultra-thin sheets of LEDs and photodetectors that can be implanted under human skin to help perform different biomedical applications such as activating photo-sensitive drugs.
In addition the light emitting diodes and photodetectors can be used for medical monitoring.
The lead researcher of the project, which was published in Nature Materials, is John Rogers of the University of Illinois at Urbana-Champaign in the US.
According to Mr. Rogers, the part of the research that required the largest amount of time was the development of the organic LEDs (OLEDs), which are very sensitive to water and oxygen.
Researchers say that their flexible LEDs could be used to create implantable patches for monitoring wound healing. In addition, the team's latest invention could be used for making diagnosis or spectroscopy, informs Physorg.
These LEDs could also be used in robotics. Currently Rogers is working on the possible commercialization of the invention.

6. TDK Presents 1 Terabyte Optical Disc

This year, the annual tradeshow and the largest IT and electronics exhibition in Japan, CEATEC, witnessed a number of very interesting devices. One of them is a sleek optical disk from TDK.
The disk unveiled at the 2010 Combined Exhibition of Advanced Technologies boasts a capacity of 1 terabyte.
According to Tetsuo Nozawa of Nikkei Electronics, the company was able to create the disk with such a capacity by forming 16 recording layers, each having a capacity of 32GB on both sides.
Nozawa mentioned that TDK created a disk using a material with a high light transmittance. One layer has a light transmittance of 95.1 percent, while the entire disk has a light transmittance of 72.6 percent.
"The material has already been used for part of a Blu-ray disc - and it does not have a problem of durability," said Nozawa.
The new disk from TDK could be used for various applications like home-use recordings, backups and broadcasting, informs TGDaily.

7. Surgical Robot that Offers Tactile Feedback to Surgeons

Although a surgery assisted by machines is steadier, more accurate and less invasive, one of its main disadvantages is that the controls of the robot don't provide a sense of touch, thus the surgeon is unable to feel any of the resistance put up by the tissues of the patient.
In order to solve the issue, Linda van den Bedem from Eindhoven University of Technology decided to create a surgical robot that offers tactile feedback. The researcher's latest invention is called Sofie, which stands for Surgeon's Operating Force-feedback Interface Eindhoven.
The machine can be controlled with the help of joysticks found on the control panel. It would be interesting to note that the joysticks are harder or easier to move depending on the level of pressure applied by the robot's surgical instruments against the tissues.
It is worth mentioning that such an invention could be used for several tasks such as making stitches, informs Gizmag.
In addition, Van den Bedem's latest invention is more compact if compared to other surgical machines used today. It can be mounted on the operating table, thus if the table is moved the robot moves with it.
In five years the researcher hopes to start commercializing her latest invention.


8. Device that Uses Waste Heat Energy to Power Electronic Gadgets

A team of researchers from the Louisiana Tech University, led by Dr. Long Que, managed to create a device that converts the waste heat energy from electronic gadgets into power which is then used to recharge these gadgets.
The team's latest invention is called the CNF-PZT Cantilever. It features a carbon nanotube on a cantilever base of piezoelectric material.
It would be interesting to note that the device is very small, which allows researchers to include thousands of small CNF-PZT Cantilever devices into different gadgets. It will allow gadgets to use their own energy to charge.
Researchers were able to show that a device is able to produce enough energy to operate a number of low-power microsensors and intergrated sensors, informs Treehugger.

9. New-Gen Exoskeleton from Berkeley Bionics

Berkeley Bionics, a company based in California, presented at a press conference its latest invention - eLEGS exoskeleton. The device was developed for paraplegics and is controlled via an onboard computer. It helps those afflicted with paraplegia to get out of their wheelchairs, stand and even walk.
One can wear the eLEGS over clothing. The device is built in a way to allow people get in and out of it in just one or two minutes.
Besides, eLEGS can be adjusted in order to fit people between 5'2'' and 6'4'' (157 and 193 cm), and weighing under 220 lbs (100 kg).
When the user got in the exoskeleton, the computer makes use of built-in sensors to monitor their gestures. Based on the gestures, it then analyzes user's intentions and reacts accordingly in real time.
The exoskeleton weights 45 lbs (20 kg). It includes a battery that can hold for about 6 hours, under normal use. The device registers a walking speed of about 2mph (3.22km/h).
Researchers will carry out the first clinical tests early next year. In the second half of 2011 a number of such exoskeletons are expected to be offered to some American rehabilitation clinics.
The company also wants the device to be available for home users. It is worth mentioning that Berkeley Bionics is the developer of the Human Universal Load Carrier (HULC), an exoskeleton that is available on the market and which makes it possible for the able-bodied soldiers to carry loads weighting up to 200 lbs (91 kg).


10. Lexus Unveils the Most Advanced Driving Simulator in Car-Making Industry

Engineers from the luxury vehicle division of the famous Japanese car manufacturer Toyota Motor Corporation, Lexus, are carry out safety tests of new vehicles using the world's most advanced driving simulator.
Lexus decided to present its driving simulator to the public as part of the company's new advertising campaign.
It is worth mentioning that the device can be found on the Toyota research campus in Japan. The driving simulator has a Lexus LS 460 installed on top of a turntable on a 15-foot-high domed structure that moves in all directions.
With the help of a track system, the car can tip forward, backwards, and side-to-side. In addition, according to the engineers, the device can simulate cornering, handling, and speeds the reach 186mph in a 360-degree road environment, informs Fast Company.
According to Dave Nordstrom, Lexus's vice president of marketing, a number of Lexus safety features were developed after the company's specialists carried out a number of tests on the new driving simulator.

Orang Minyak "The Curse of Oily Man"

In the 1960’s a large number of young women were raped in several Malaysian towns. The attacker was described as a naked man, covered from head to toe with oil. Some said that Orang Minyak could appear invisible to non-virgins. Mass panic ensued, and many young women of the region began wearing sweaty, stinky clothes so the Orang Minyak would mistake them for male and leave them be.
Some speculate that the Orang Minyak was in fact a regular human criminal, who covered himself with oil to camouflage himself against the night, and to make him especially slippery to catch.
Sightings of the “Oily Man” have continued through the decades, with the last sighting in 2005. 


The Orang Minyak is one of a number of Malay ghost myths. Orang Minyak literally means 'oily man' in Malay.
According to one legend, popularised in the 1956 film Sumpah Orang Minyak (The Curse of the Oily Man) directed by and starring P. Ramlee, the orang minyak was a man who was cursed in an attempt to win back his love with magic. In this version, the devil offered to help the creature and give him powers of the black arts, but only if the orang minyak worshipped him and raped 21 virgins within a week. In another version it is under control of an evil bomoh or witch doctor. Another movie based on Orang Minyak was produced in 2007.
According to legend, in the 1960s the orang minyak lived around several Malaysian towns, where he raped young women. The orang minyak of the 1960s was described as human, naked and covered with oil (supposedly to make it difficult to catch). However, there were also stories of the orang minyak where it was supposedly supernatural in origin, or invisible to non-virgins, or both. The mass panic has also led to unmarried women, typically in student dormitories, borrowing sweaty clothes to give the impression to the orang minyak that they are with a man. Other defences supposedly include biting its left thumb and covering it in batik.
In short, the orang minyak is a supernatural serial rapist that is hard to see and hard to catch. Some have speculated that the orang minyak is a regular criminal who uses black grease as a night-time camouflage. Due to the use of black grease, it makes the orang minyak hard to catch, as pursuers would not be able to hold on to him. However, in some encounters with the orang minyak, the situation is not explainable from a non-supernatural angle.
Reputed sightings of the orang minyak, or events later ascribed to it, have continued with reduced frequency into the 2000s.
In 2005, there have been cases of rapists covered in oil roaming around, armed with knives.

Orang Minyak

Sex Demons "PLEASE BE GUIDED UPON READING THIS PAGE MOST OF THE CONTENT ARE SATANIC, I POSTED THIS PAGE ONLY FOR EDUCATIONAL PURPOSES AND NO OTHER REASONS"

Throughout history and all across the world, people have reported sexual contact with all manner of supernatural beings. Many people believe “sex demons” were born out of a need to explain away subjects that were generally considered taboo. More often than not, things such as unexpected pregnancy, abortion and promiscuity were met with anger and persecution. As a result, society came up with a number of mythical creatures, ten of which are listen below.
 



  • Popobawa
Popobawa (meaning “bat-wing” in Swahili) is said to be a large, bat-like creature with one eye and a very large penis. It is said to stalk the men and women of Zanzibar, Africa, and surrounding islands. It is a shapeshifter, often taking the form of a human or animal. It usually visits households at night, and it doesn’t discriminate against men, women, or children, often sodomising an entire household before moving on. Victims are warned by Popobawa to tell others about the attack, or risk it returning.
Popobawa first appeared on the island of Pemba in 1965, and sightings have been reported as recently as 2007. There are several different theories about Popobawa’s origin. Some say it is an angry spirit created by a Sheikh to take vengeance on his neighbours. In 2007, Researcher Benjamin Radford investigated Popobawa and found that its roots are in Islam, the dominant religion of the area. According to Radford, “holding or reciting the Koran is said to keep the Popobawa at bay, much as the Bible is said to dispel Christian demons.”
Others argue (perhaps more realistically) that Popobawa is an articulated social memory of the horrors or slavery. The way in which Popobawa is said to sodomise its victims may also have something to do with the fact homosexuality is still illegal in Zanzibar. Popobawa is a creature not necessarily nailed down in terms of solid description. Some call him a ogre, some a ghost or a shape shifter. What is clear about the creature though, is that as recently as 2006 he’s been blamed for entering men’s homes and sodomizing them in their own beds. The madness went as far as men refusing to sleep at home for fear of being victimized by the winged monster.
Many believe the creature takes human form by day, and lives among the people. Others believe he’s just a lonely, horny gay monster accidentally unleashed on the public back in the seventies. Whatever he is, we have more on him right here.

Wikipedia has a horrifying opening paragraph for the legend of Popobawa:
“Popobawa is variously described as either a ghost or ogre with gigantic bat wings and a giant penis. At times he is simply known as “Imran”. He is sometimes thought to be a shapeshifter who looks like an ordinary human during the day. His presence is usually announced by the sound of scraping claws on their roof and a sharp, pungent smell. Different from other incubus legends, Popobawa primarily attacks men and only in their own beds, resulting in many men sleeping outside in streets or on porches after recent reported attacks.
“He attacks men as they sleep, overpowering them, holding their face to the floor and sodomizing them for up to an hour. People who claim to be victims of Popobawa are mostly poorer residents on the island of Pemba, though other reports have also come from other islands and coastal Tanzania. The victims are threatened with repeated, and longer, sodomizations if they do not let their friends and neighbors know of their experience.”
Usually experiences with the beast happen in one on one scenarios as listed above. In the seventies though, he publicly addressed a group of people at once, using a possessed girl as a mouthpiece. During the speech many of those present claimed to hear a car engine ‘revving and rustling’ from a nearby roof.
A strange piece of the Papobawa story is that his attacks, according to some, spike during times of public office election. The BBC elaborates:
“In recent years the residents on the semi-autonomous Tanzanian islands claimed that Popo Bawa only visited the islanders during voting, such as in the contentious general elections in 1995 and 2000.”
Some argue a political connection. One victim who has spoken to the media about his ordeal is Mjaka Hamad, a fifty-something year old farmer, who said he could feel:
“…something pressing on me. I couldn’t imagine what sort of thing was happening to me. You feel as if you are screaming with no voice. It was just like a dream but then I was thinking it was this Popobawa and he had come to do something terrible to me, something sexual. It is worse than what he does to women. I don’t believe in spirits so maybe that’s why it attacked me. Maybe it will attack anybody who doesn’t believe.”
Well if that’s the only reason the beasty needs to attack your southside, then let us publicly acknowledge his existence. He is very much alive, and may or may not have a stake in the upcoming US Presidential election.

  • Trauco and La Fiura
Chiloé, an island of the south to Chile, is said to be home to the Trauco, a sexually potent Dwarf with the power to paralyze women with a look before having sex with them. The Trauco is described as being ugly and goblin-like, often wearing a hat and suit. His feet are stumps and he communicates through a series of grunts. Some repots suggest the Trauco doesn’t even need to have intercourse with his victims, that he can in fact impregnate them with his gaze.
Often, when a single woman on Chiloé falls pregnant people assume the Trauco is the father. In these cases the women are considered blameless as the Trauco is said to be irresistible to women.
El Trauco’s wife, La Fiura, is said to be a grotesquely ugly dwarf with the ability to cast a “sickness spell” against anyone who rejects her sexual advances. Her breath is so foul it can physically scar a human and turn animals lame. Despite her appearance, she is generally irresistible to men and after having intercourse with them, she drives them insane.

Trauco has some very special powers. No young or middle-aged woman can resist him. That is why sometimes if a woman gets pregnant, and she does not want to raise suspicion about who the father is, she just said that the father is Trauco.
The woman chosen by Trauco can not forget him as he has sex with her, in a way no other man can. As a symbol of sexual power Trauco carries a small hatchet. It is a local belief that he appears disguised as a priest or a rich landowner.
Men of the island are afraid of Trauco too. His gaze can be deadly. In rare situations brave man can manage to force Trauco to serve him for a whole year. This is possible if the man fixes his eyes on Trauco before he notices him.

Fiura, the same as her husband Trauco, is very ugly creature. Being his wife she is by some also known as the Trauca. She has big nose and tiny eyes. She lives in a forest dressed in moss. She is very strong.
Fiura likes to bathe in local streams. After bathing she lays naked for hours. She brushes her long hair with a crystal comb.
She also spent lot of time wandering in the bushes in search of the „Chuaras“ fruit. She is not very brave. Whenever she hears something she changes her body in quite bizarre positions.
It is very dangerous for ordinary people to look at her. It is believed that looking at her will deform your hands or legs. In some cases it is possible to cure them. First a plant called "Pahueldún" has to be found. Person has to drink a juice extracted from it. To get the juice a person must be whipped! Immediately after the treatment, branch of the plant used has to be thrown in the sea.
One of Fiura's passion is to cast spell on young woodcutters. They get confused, disorientated. She then forces them to have sex with her.

  • Succubus and Incubus

The Incubus
The Description of Scotlande of Hector Boethius as translated in the first volume of Holinshed's Chronicles (1577), has three or four notable examples of these demons, which are corroborated by Jerome Cardan. One of these, concerning an incubus, is quoted in the quaint language Holinshed used: "In the year 1480 it chanced as a Scottish ship departed out of the Forth towards Flanders, there arose a wonderful great tempest of wind and weather, so outrageous, that the master of the ship, with other the mariners, wondered not a little what the matter meant, to see such weather at that time of the year, for it was about the middle of summer. At length, when the furious pirrie and rage of winds still increased, in such wise that all those within the ship looked for present death, there was a woman underneath the hatches called unto them above, and willed them to throw her into the sea, that all the residue, by God's grace, might yet be saved; and thereupon told them how she had been haunted a long time with a spirit dailie coming into hir in man's likenesse. In the ship there chanced also to be priest, who by the master's appointment going down to this woman, and finding her like a most wretched and desperate person, lamenting hir great misfortune and miserable estate, used such wholesome admonition and comfortable advertisements, willing her to repent and hope for mercy at the hands of God, that, at length, she seeming right penitent for her grievous offences committed, and fetching sundrie sighs even from the bottome of her heart, being witnesse, as should appeare, of the same, there issued forth of the pumpe of the ship, a foule and evil-favoured blacke cloud with a mighty terrible noise, flame, smoke, and stinke, which presently fell into the sea. And suddenlie thereupon the tempest ceased, and the ship passing in great quiet the residue of her journey, arrived in saftie at the place whither she was bound." (Chronicles, vol. 5, p. 146, 1808 ed)."
In another case related by the same author, the incubus did not depart so quietly. In the chamber of a young gentlewoman who was the daughter of a nobleman in the country of Mar there was found "a foule monstrous thing, verie horrible to behold." For the love of this "Deformed," nevertheless, the lady had refused sundry wealthy marriages. A priest who was in the company began to repeat St. John's Gospel, and "suddenlie the wicked spirit, making a verie sore and terrible roaring noise, flue his waies, taking the roofe of the chamber awaie with him, the hangings and coverings of the bed being also burnt therewith."
Jean Bodin, author of Démonomaie (1580) cites the case of Joan Hervilleria, who at age 12 was solemnly betrothed to Beelzebub by her mother, who was afterward burned alive for contriving this clandestine marriage. According to the story, the bridegroom was respectably attired and the marriage oath simple. The mother pronounced the following words to the bridegroom: "Ecce filiam meam quam spospondi tibi." Then, turning to the bride, she stated "Ecce amicum tuum qui beabit te." Joan was not satisfied with her spiritual husband alone, however. She became a bigamist by intermarrying with real flesh and blood.
In another story Margaret Bremont, in company with her mother and others, was in the habit of attending diabolic trysts. She and the others were burned alive by Adrian Ferreus, general vicar of the Inquisition.
Magdalena Crucia of Cordova, an abbess, was more fortunate. Suspected by her nuns of magic—an accusation convenient when a superior was at all troublesome—she anticipated their charge. Going before Pope Paul III, she confessed a 30-year intimacy with the devil and obtained pardon.

The Succubus
Old rabbinical writings relate the legend of how Adam was visited during a 130-year period by female demons and had intercourse with demons, spirits, specters, lemurs, and phantoms. Another legend relates how, under the reign of Roger, king of Sicily, a young man was bathing by moonlight. He thought he saw someone drowning and hastened to the rescue. Having drawn from the water a beautiful woman, he became enamored of her, married her, and had by her a child. Afterward she disappeared with her child, which made everyone believe that she was a succubus.
The historian Hector Boece (1465-1536), in his history of Scotland, relates that a handsome young man was pursued by a female demon who would pass through his closed door and offer to marry him. He complained to his bishop, who enjoined him to fast, pray, and confess his sins, and as a result the infernal visitor ceased to trouble him.
The witchcraft judge Pierre de Lancre (1553-1631) stated that in Egypt an honest blacksmith was occupied in forging during the night when a demon appeared to him in the shape of a beautiful woman. He threw a hot iron in the face of the demon, which at once took flight.

  • Encantado

In Brazil, and the rainforests of the Amazon Basin, the Boto river dolphin was believed to have shapeshifting powers. It could turn into a very charming and beautiful man called Encantado, or “the enchanted one.” Encantado would take women back to the river, retake dolphin form, and impregnate them. Young women of the region were wary of any man wearing a hat because, according to legend, Encantado always wore a hat to cover up his blowhole.
In many parts of Brazil it is considered bad luck to kill Boto river dolphins. If you kill one, or in some cases just look them in the eye, it is said you will suffer nightmares for the rest of your life. 

There are three elements that best characterize encantados: superior musical ability, their seductiveness and love of sex (often resulting in illegitimate children), and their attraction to parties. Despite the fact that the Encante where they come from is supposed to be a utopia full of wealth and without pain or death, the encantados crave the pleasures and hardships of the human world.
Transformation into human form seems to be rare, and usually occurs at night. The encantado will often be seen running from a festa, despite protests from the others for it to stay, and can be seen by pursuers as it hurries to the river and reverts back to dolphin form. When it is under human form, it wears a hat to hide its prominent forehead, that does not disappear with the shapeshift.
Besides the ability to shapeshift into human form, encantados frequently wield other magical abilities, such as the power to control storms, "enchant" or haunt humans into doing their will or becoming encantados themselves, and inflict illness, insanity, and even death. Shamans and holy men are often needed to intervene and ameliorate the situation, but sometimes the spell is so great that it can not be completely cured.

  • Lilu

Jewish folklore tells of Lilu, a demon who visits women while they sleep. His feminine counterpart is Lilin. These demons were a particular source of anxiety for mothers because they were known to kidnap children. Ardat Lili was another succubus who would visit men at night to ensure the continuation of her demonic race. The incubus was Irdu Lili, who would visit human women to ensure they would produce his offspring.

  • Liderc


In the Northern regions of Hungary there was said to lives a creature called the Liderc (or ludvérc, lucfir, or ördög depending on the region). It hatches from the first egg of a black hen, and is often said to hide in people’s pockets. It enters its victims homes through the keyhole. Once inside, the Liderc shapeshifts into a human, often taking the form of a dead relative of the intended victim. It rapes its victim, and then makes the house very dirty before departing. Some reports say that Liderc becomes attached to its victims and never leaves. The Liderc can be exorcized by either sealing it inside a tree hollow, or persuading it to perform a near impossible task, such as carrying water with a bucket full of holes. It is common even today for children in Hungary to stomp on eggs taken from a black hen, or leave the eggs on doorsteps to cause mischief.

The first, more traditional form of the Lidérc is as a miracle chicken, csodacsirke in Hungarian, which hatches from the first egg of a black hen kept warm under the arm of a human. Some versions of the legend say that an unusually tiny black hen's egg, or any egg at all, may become a Lidérc, or that the egg must be hatched by placing it in a heap of manure. The Lidérc attaches itself to people to become their lover. If the owner is a woman, the being shifts into a man, but instead of pleasuring the woman, it fondles her, sits on her body, and sometimes sucks her blood, making her weak and sick after a time. From this source comes a Hungarian word for nightmare -- lidércnyomás, which literally means "Lidérc pressure", from the pressure on the body while the being sits on it. Alternate names for the Lidérc are iglic, ihlic in Csallóköz, lüdérc, piritusz in the south, and mit-mitke in the east. The Lidérc hoards gold and thus makes its owner rich. To dispose of this form of the Lidérc, it must be persuaded to perform an impossible task, such as haul sand with rope, or water with a sieve. It can also be destroyed by locking it into a tree hollow.
The second variety of the Lidérc is as a tiny being, a temporal devil, földi ördög in Hungarian. It has many overlapping qualities with the miracle chicken form, and it may also be obtained from a black hen's egg, but more often it is found accidentally in rags, boxes, glass bottles, or in the pockets of old clothes. A person owning this form of the Lidérc suddenly becomes rich and is capable of extraordinary feats, because the person's soul has supposedly been given to the Lidérc, or even to the Devil.
The third variety is as a Satanic lover, ördögszerető in Hungarian, quite similar to an incubus or succubus. This form of the Lidérc flies at night, appearing as a fiery light, a will o' the wisp, or even as a bird of fire. In the northern regions of Hungary and beyond, it is also known as ludvérc, lucfir. In Transylvania and Moldavia it goes by the names of lidérc, lüdérc, and sometimes ördög, literally, the Devil. While in flight, the Lidérc sprinkles flames. On earth, it can assume a human shape, usually the shape of a much lamented dead relative or lover. Its footprints are that of a horse. The Lidérc enters houses through chimneys or keyholes, brings sickness and doom to its victims. It leaves the house with a splash of flames and dirties the walls. Burning incense and birch branches prevent the Lidérc from entering one's dwelling. In the eastern regions of Hungary and beyond, it is said the Lidérc is impossible to outrun, it haunts cemeteries, and it must disappear at the first crow of a rooster at dawn.

Wednesday, January 12, 2011

01. Child Pornography / Exploitation

The abuse and exploitation of children is an abhorrent act that physically and emotionally scars innocent lives. Children, even younger than two years of age, have been horrifically abused for the sick gratification of others. Unfortunately, if there is a demand for this type of material, some people will lower themselves to create the supply.

According to the US Department of Justice, the distribution of child pornography was almost “completely eradicated” in the mid 1980s. Obviously the creation and success of the internet has reversed this position. Today, child pornography is a multi-billion dollar industry and, according to the National Center for Missing and Exploited Children, is one of the fastest growing internet industries. In fact, the NCMEC claims that “20% of all pornography on the internet involves children.”

The relative ease of transferring images with digital cameras, the ability to anonymously communicate and exchange money, as well as distribute to mass numbers has caused child pornography to balloon to virtually unstoppable proportions.

Welcome to the Child Exploitation and Obscenity Section (CEOS) website. Created in 1987, the mission of the Child Exploitation and Obscenity Section (CEOS) is to protect the welfare of America’s children and communities by enforcing federal criminal statutes relating to the exploitation of children.

As the nation’s experts in child exploitation issues, CEOS leads the Department of Justice in its endeavor to continuously improve the enforcement of federal child exploitation laws and prevent the exploitation of children. CEOS attorneys prosecute defendants who have violated federal child exploitation laws and also assist the 94 United States Attorney Offices in investigations, trials, and appeals related to these offenses. In addition, CEOS attorneys perform other vital functions within the Criminal Division of the Department of Justice, including providing advice and training to federal prosecutors, law enforcement personnel, and Department of Justice officials, developing prosecution policies, legislation, government practices and agency regulations, and participating in national and international meetings on training and policy development. In all aspects of their work, CEOS attorneys seek to blend prosecutorial experience with policy expertise in order to create innovative solutions to the threat posed by those who violate child exploitation laws.

More...
gold line graphic




On August 2, 2010, Attorney General Eric Holder today announced that the Department of Justice released its first-ever National Strategy for Child Exploitation Prevention and Interdiction. The strategy also provides the first-ever comprehensive threat assessment of the dangers facing children from child pornography, online enticement, child sex tourism, commercial sexual exploitation and sexual exploitation in Indian Country, and outlines a blueprint to strengthen the fight against these crimes.
To learn more, click here.
gold line graphic
Child Exploitation and Obscenity Section Assistant Deputy Chief Alexandra Gelber responds to Mark Hansen’s article “A Reluctant Rebellion,” which appeared in the June 2009 issue of the ABA Journal.  Ms. Gelber notes that while Mr. Hansen’s article raises questions about the child pornography sentencing guidelines, his piece speaks to a much more fundamental question about the legitimacy of the crime at issue.  Ms. Gelber's article exposes the fundamental misunderstandings about the nature of the crime, the offenders, and the law, that permeate the ABA Journal article.  Ms. Gelber shows how, when properly understood, the substance and structure of the criminal provisions and sentences for these pernicious crimes show an appropriate response to an exploding crime problem.

02. Cyber-bullying and harassment

Chat rooms, message boards, and social networking websites created a new venue for bullies to abuse their victims. The bullies can simply hide behind the veil of their computer screens and even remain anonymous, while tormenting their victims.

Imagine personal secrets, gossip, or slanderous comments that degrade you, being distributed to all of your peers. Or, imagine being bombarded with hateful messages and threats on a daily basis. This is what victims of cyber-bullying and harassment endure.

Cyber-bullying was brought to the media’s international attention when 13 year old American Megan Meier hung herself in her parent’s closet after she was being bullied online. The investigation revealed that Lori Evans, the parent of one of Megan’s former friends, had created a fake MySpace account that had sent the harassing messages to Megan. Cyber-bullying is "the use of information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group, that is intended to harm others".[1] As it has become more common in society, particularly among young people, legislation and awareness campaigns have arisen to combat it.

Cyber-bullying defined

Cyber-bullying has been defined as "when the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person",[2] or as "when an electronic device is used to attack or defame the character of a real person. Often embarrassing or false information about the victim is posted in an online forum where the victim and those who know the victim can see it publicly."[3] Other researchers use similar language to describe the phenomenon.[4][5]
Cyber-bullying can be as simple as continuing to send e-mail to someone who has said they want no further contact with the sender, but it may also include threats, sexual remarks, pejorative labels (i.e., hate speech), ganging up on victims by making them the subject of ridicule in forums, and posting false statements as fact aimed at humiliation.
Cyber-bullies may disclose victims' personal data (e.g. real name, address, or workplace/schools) at websites or forums or may pose as the identity of a victim for the purpose of publishing material in their name that defames or ridicules them. Some cyber-bullies may also send threatening and harassing emails and instant messages to the victims, while other post rumors or gossip and instigate others to dislike and gang up on the target.
Kids report being mean to each other online beginning as young as 2nd grade. According to research, boys initiate mean online activity earlier than girls do. However, by middle school, girls are more likely to engage in cyber-bullying than boys do.[6] Whether the bully is male or female, their purpose is to intentionally embarrass others, harass, intimidate, or make threats online to one another. This bullying occurs via email, text messaging, posts to blogs, and Web sites.
Though the use of sexual remarks and threats are sometimes present in cyber-bullying, it is not the same as sexual harassment and does not necessarily involve sexual predators.

Cyber-bullying vs. cyber-stalking

The practice of cyber-bullying is not limited to children and, while the behavior is identified by the same definition in adults, the distinction in age groups is sometimes referred to as cyberstalking or cyberharassment when perpetrated by adults toward adults, sometimes directed on the basis of sex. Common tactics used by cyber-stalkers are to vandalize a search engine or encyclopedia, to threaten a victim's earnings, employment, reputation, or safety. A repeated pattern of such actions against a target by an adult constitutes cyber-stalking.

Research

In the summer of 2008, researchers Sameer Hinduja (Florida Atlantic University) and Justin Patchin (University of Wisconsin-Eau Claire) published a book on cyber-bullying that summarized the current state of cyber-bullying research. (Bullying Beyond the Schoolyard: Preventing and Responding to Cyberbullying).[7] Their research documents that cyber-bullying instances have been increasing over the last several years. They also report findings from the most recent study of cyber-bullying among middle-school students. Using a random sample of approximately 2000 middle-school students from a large school district in southern United States, about 10% of respondents had been cyber-bullied in the previous 30 days while over 17% reported being cyber-bullied at least once in their lifetime.[7] While these rates are a bit lower than some of the findings from their previous research, Hinduja and Patchin point out that the earlier studies were predominantly conducted among older adolescents and Internet samples. That is, older youth use the Internet more frequently and are more likely to experience cyber-bullying than younger children.[5][8][9]

Surveys and statistics

The National Crime Prevention Council reports cyber-bullying is a problem that affects almost half of all American teens.[10]
In 2007, Debbie Heimowitz, a Stanford University master's student, created Adina's Deck, a film based on Stanford accredited research. She worked in focus groups for ten weeks in three different schools to learn about the problem of cyber-bullying in Northern California. The findings determined that over 60% of students had been cyber-bullied and were victims of cyber-bullying. The film is now being used in classrooms nationwide as it was designed around learning goals pertaining to problems students had understanding the topic. The middle school of Megan Meier is reportedly using the film as a solution to the crisis in their town.
In September 2006, ABC News reported on a survey prepared by I-Safe.Org. This 2004 survey of 1,500 students between grades 4-8 reported:
  • 42% of kids have been bullied while online. One in four have had it happen more than once.
  • 35% of kids have been threatened online. Nearly one in five had had it happen more than once.
  • 21% of kids have received mean or threatening e-mails or other messages.
  • 58% of kids admit someone has said mean or hurtful things to them online. More than four out of ten say it has happened more than once.
  • 58% have not told their parents or an adult about something mean or hurtful that happened to them online.
A 2006 survey by Harris Interactive[11] reported:
  • 43% of U.S. teens having experienced some form of cyber-bullying in the past year.
Similarly, a Canadian study found:
  • 23% of middle-schoolers surveyed had been bullied by e-mail
  • 35% in chat rooms
  • 41% by text messages on their cell phones
  • Fully 41% did not know the identity of the perpetrators.
The Youth Internet Safety Survey-2, conducted by the Crimes Against Children Research Center at the University of New Hampshire in 2005, found that 9% of the young people in the survey had experienced some form of harassment.[12] The survey was a nationally representative telephone survey of 1,500 youth 10–17 years old. One third reported feeling distressed by the incident, with distress being more likely for younger respondants and those who were the victims of aggressive harassment (including being telephoned, sent gifts, or visited at home by the harasser).[13] Compared to youth not harassed online, victims are more likely to have social problems. On the other hand, youth who harass others are more likely to have problems with rule breaking and aggression.[14] Significant overlap is seen — youth who are harassed are significantly more likely to also harass others.
Hinduja and Patchin completed a study in the summer of 2005 of approximately 1,500 Internet-using adolescents and found that over one-third of youth reported being victimized online, and over 16% of respondents admitted to cyber-bullying others. While most of the instances of cyber-bullying involved relatively minor behavior (41% were disrespected, 19% were called names), over 12% were physically threatened and about 5% were scared for their safety. Notably, fewer than 15% of victims told an adult about the incident.[8]
Additional research by Hinduja and Patchin[9] found that youth who report being victims of cyber-bullying also experience stress or strain that is related to offline problem behaviors such as running away from home, cheating on a school test, skipping school, or using alcohol or marijuana. The authors acknowledge that both of these studies provide only preliminary information about the nature and consequences of online bullying, due to the methodological challenges associated with an online survey.
According to a 2005 survey by the National Children's Home charity and Tesco Mobile[15] of 770 youth between the ages of 11 and 19, 20% of respondents revealed that they had been bullied via electronic means. Almost three-quarters (73%) stated that they knew the bully, while 26% stated that the offender was a stranger. 10% of responders indicated that another person has taken a picture and/or video of them via a cellular phone camera, consequently making them feel uncomfortable, embarrassed, or threatened. Many youths are not comfortable telling an authority figure about their cyber-bullying victimization for fear their access to technology will be taken from them; while 24% and 14% told a parent or teacher respectively, 28% did not tell anyone while 41% told a friend.[15]
A survey by the Crimes Against Children Research Center at the University of New Hampshire in 2000 found that 6% of the young people in the survey had experienced some form of harassment including threats and negative rumours and 2% had suffered distressing harassment.[12]
Reporting on the results from a meta analysis from European Union countries, Hasebrink et al. (2009)[16] estimated (via median results) that approximately 18% of European young people had been "bullied/harassed/stalked" via the internet and mobile phones. Cyber-harassment rates for young people across the EU member states ranged from 10% to 52%.
The nation-wide Australian Covert Bullying Prevalence Survey (Cross et al., 2009)[17] assessed cyber-bullying experiences among 7,418 students. Rates of cyber-bullying increased with age, with 4.9% of students in Year 4 reporting cyberbullying compared to 7.9% in year nine. Cross et al., (2009) reported that rates of bullying and harassing others were lower, but also increased with age. Only 1.2% of Year 4 students reported cyber-bullying others compared to 5.6% of Year 9 students.

Comparison to traditional bullying

Certain characteristics inherent in online technologies increase the likelihood that they will be exploited for deviant purposes.[5] Unlike physical bullying, electronic bullies can remain virtually anonymous using temporary email accounts, pseudonyms in chat rooms, instant messaging programs, cell-phone text messaging, and other Internet venues to mask their identity; this perhaps frees them from normative and social constraints on their behavior.
Additionally, electronic forums often lack supervision. While chat hosts regularly observe the dialog in some chat rooms in an effort to police conversations and evict offensive individuals, personal messages sent between users (such as electronic mail or text messages) are viewable only by the sender and the recipient, thereby outside the regulatory reach of such authorities. In addition, when teenagers know more about computers and cellular phones than their parents or guardians, they are therefore able to operate the technologies without concern that a parent will discover their experience with bullying (whether as a victim or offender).
Another factor is the inseparability of a cellular phone from its owner, making that person a perpetual target for victimization. Users often need to keep their phone turned on for legitimate purposes, which provides the opportunity for those with malicious intentions to engage in persistent unwelcome behavior such as harassing telephone calls or threatening and insulting statements via the cellular phone’s text messaging capabilities. Cyber-bullying thus penetrates the walls of a home, traditionally a place where victims could seek refuge from other forms of bullying.
One possible advantage for victims of cyber-bullying over traditional bullying is that they may sometimes be able to avoid it simply by avoiding the site/chat room in question. Email addresses and phone numbers can be changed; in addition, most e-mail accounts now offer services that will automatically filter out messages from certain senders before they even reach the inbox, and phones offer similar caller ID functions.
Unfortunately, this obviously does not protect against all forms of cyber-bullying; publishing of defamatory material about a person on the internet is extremely difficult to prevent and once it is posted, millions of people can potentially download it before it is removed. Some perpetrators may post victims' photos, or victims' edited photos like defaming captions or pasting victims' faces on nude bodies. Examples of famous forums for disclosing personal data or photos to "punish" the "enemies" include the Hong Kong Golden Forum, Live Journal, and more recently JuicyCampus. Despite policies that describe cyber-bullying as a violation of the terms of service, many social networking Web sites have been used to that end.[18]

Legislation against cyber-bullying

United States

Legislation geared at penalizing cyber-bullying has been introduced in a number of U.S. states including New York, Missouri, Rhode Island and Maryland. At least seven states passed laws against digital harassment in 2007. Dardenne Prairie of Springfield, Missouri, passed a city ordinance making online harassment a misdemeanor. The city of St. Charles, Missouri has passed a similar ordinance. Missouri is among other states where lawmakers are pursuing state legislation, with a task forces expected to have “cyberbullying” laws drafted and implemented.[19] In June, 2008, Rep. Linda Sanchez (D-Calif.) and Rep. Kenny Hulshof (R-Mo.) proposed a federal law that would criminalize acts of cyberbullying.[20]
Lawmakers are seeking to address cyber-bullying with new legislation because there's currently no specific law on the books that deals with it. A fairly new federal cyber-stalking law might address such acts, according to Parry Aftab, but no one has been prosecuted under it yet. The proposed federal law would make it illegal to use electronic means to "coerce, intimidate, harass or cause other substantial emotional distress."
In August 2008, the California state legislature passed one of the first laws in the country to deal directly with cyber-bullying. The legislation, Assembly Bill 86 2008, gives school administrators the authority to discipline students for bullying others offline or online.[21] This law took effect, January 1, 2009.[22]
A recent ruling first seen in the UK determined that it is possible for an Internet Service Provider (ISP) to be liable for the content of sites which it hosts, setting a precedent that any ISP should treat a notice of complaint seriously and investigate it immediately.[23]
18 U.S.C. § 875(c) criminalizes the making of threats via Internet.

Harmful effects

Research had demonstrated a number of serious consequences of cyber-bullying victimization.[5][7][8][9] For example, victims have lower self-esteem, increased suicidal ideation, and a variety of emotional responses, cyber-bullying back, being scared, frustrated, angry, and depressed.[7]
One of the most damaging effects is that a victim begins to avoid friends and activities, often the very intention of the cyber-bully.
Cyber-bullying campaigns are sometimes so damaging that victims have committed suicide. There are at least four examples in the United States where cyber-bullying has been linked to the suicide of a teenager.[7] The suicide of Megan Meier is a recent example that led to the conviction of the adult perpetrator of the attacks.

Intimidation, emotional damage, suicide

The reluctance youth have in telling an authority figure about instances of cyber-bullying has led to fatal outcomes. At least three children between the ages of 12 and 13 have committed suicide due to depression brought on by cyber-bullying, according to reports by USA Today and the Baltimore Examiner. These would include the suicide of Ryan Halligan and the suicide of Megan Meier, the latter of which resulted in United States v. Lori Drew.

Lost revenue, threatened earnings, defamation

Studies are being conducted by large companies to gauge loss of revenue through malicious false postings. Cyberstalkers seek to damage their victim's earnings, employment, reputation, or safety. A 2008 High Court ruling determined that, generally speaking, slander is when a defamatory statement has been made orally without justification. Libelous statements are those that are recorded with some degree of permanence. This would include statements made by email or on online bulletin boards.[24]

Adults and the workplace

Cyber-bullying is not limited to personal attacks or children. Cyberharassment, referred to as cyberstalking when involving adults, takes place in the workplace or on company web sites, blogs or product reviews.
A survey of 1,072 workers by the Dignity and Work Partnership found that one in five had been bullied at work by e-mail and research has revealed 1 in 10 UK employees believes cyber-bullying is a problem in their workplace.[25]
Cyber-bullying can occur in product reviews along with other consumer-generated data are being more closely monitored and flagged for content that is deemed malicious and biased as these sites have become tools to cyberbully by way of malicious requests for deletion of articles, vandalism, abuse of administrative positions, and ganging up on products to post "false" reviews and vote products down.
Cyberstalkers use posts, forums, journals and other online means to present a victim in a false and unflattering light. The question of liability for harassment and character assassination is particularly salient to legislative protection since the original authors of the offending material are, more often than not, not only anonymous, but untraceable. Nevertheless, abuse should be consistently brought to company staffers' attention.

Recognition of adult and workplace cyber-bullying tactics

Common tactics used by cyberstalkers is to vandalize a search engine or encyclopedia, to threaten a victim's earnings, employment, reputation, or safety. Various companies provide cases of cyber-stalking (involving adults) follow the pattern of repeated actions against a target. While motives vary, whether romantic, a business conflict of interest, or personal dislike, the target is commonly someone whose life the stalker sees or senses elements lacking in his or her own life. Web-based products or services leveraged against cyberstalkers in the harassment or defamation of their victims.
The source of the defamation seems to come from four types of online information purveyors: Weblogs, industry forums or boards, and commercial Web sites. Studies reveal that while some motives are personal dislike, there is often direct economic motivation by the cyberstalker, including conflict of interest, and investigations reveal the responsible party is an affiliate or supplier of a competitor, or the competitor itself.

Cyber-bullying awareness campaigns

Spain

There are multiple non-profit organizations that fight cyberbullying and cyberstalking. They advise victims, provide awareness campaigns, and report offenses to the police. These NGOs include the Protégeles, PantallasAmigas, Foundation Alia2, the non-profit initiative Actúa Contra el Ciberacoso, the National Communications Technology Institute (INTECO), the Agency of Internet quality, the Agencia Española de Protección de Datos, the Oficina de Seguridad del Internauta, the Spanish Internet users' Association, the Internauts' Association, and the Spanish Association of Mothers and Parents Internauts. The Government of Castile and León has also created a Plan de Prevención del Ciberacoso y Promoción de la Navegación Segura en Centro Escolares, and the Government of the Canary Islands has created a portal on the phenomenon called Viveinternet.

United Kingdom

Cyber-bullying was the subject of a forum at the British House of Commons chaired by Tim Loughton and Louise Burfitt-Dons of Act Against Bullying.[26]

United States

In March 2007, the Advertising Council in the United States, in partnership with the National Crime Prevention Council, U.S. Department of Justice, and Crime Prevention Coalition of America, joined to announce the launch of a new public service advertising campaign designed to educate preteens and teens about how they can play a role in ending cyber-bullying.
A Pew Internet and American Life survey found that 33% of teens were subject to some sort of cyber-bullying.[27]
January 20, 2008 — the Boy Scouts of America's 2008 edition of The Boy Scout Handbook addresses how to deal with online bullying. A new First Class rank requirements adds: "Describe the three things you should avoid doing related to use of the Internet. Describe a cyberbully and how you should respond to one." [28] [29]
January 31, 2008 — KTTV Fox 11 News based in Los Angeles, California put out a report about organized cyber-bullying on sites like Stickam by people who call themselves "/b/rothas".[30] The site had put out report on July 26, 2007, about a subject that partly featured cyberbullying titled "hackers on steroids".[31]
June 2, 2008 — Parents, teens, teachers, and Internet executives came together at Wired Safety's International Stop Cyberbullying Conference, a two-day gathering in White Plains, New York and New York City. Executives from Facebook, Verizon, MySpace, Microsoft, and many others talked with hundreds about how to better protect themselves, personal reputations, kids and businesses online from harassment. Sponsors of the conference included McAfee, AOL, Disney, Procter & Gamble, Girl Scouts of the USA, WiredTrust, Children’s Safety Research and Innovation Centre, KidZui.com and others. This conference was being delivered in conjunction and with the support of Pace University. Topics addressed included cyberbullying and the law, with discussions about laws governing cyberbullying and how to distinguish between rudeness and criminal harassment. Additional forums addressed parents’ legal responsibilities, the need for more laws, how to handle violent postings of videos be handled, as well as the differentiation between free speech and hate speech. Cyberharassment vs. cyberbullying was a forefront topic, where age makes a difference and abusive internet behavior by adults with repeated clear intent to harm, ridicule or damage a person or business was classified as stalking harassment vs. bullying by teens and young adults.[32]

Community support

A number of businesses and organizations are in coalition to provide awareness, protection and recourse for the escalating problem. Some aim to inform and provide measures to avoid as well as effectively terminate cyber-bullying and cyber-harassment. Anti-bullying charity Act Against Bullying launched the CyberKind campaign in August 2009 to promote positive internet usage.
Firms have developed tools to help parents combat cyberbullying. In 2008, the company Vanden unveiled a tool that allows children to instantly notify selected adults when they are bullied or harassed online. CyberBully Alert also documents the threatening message by saving a screen shot of the child's computer when the child triggers an alert. CyberPatrol and LookBothWays are two firms that keep up with internet trends.[33]
In 2007, YouTube introduced the first Anti-Bullying Channel for youth, (BeatBullying) engaging the assistance of celebrities to tackle the problem.[34]
Mossley Hollins High School in Manchester has recently taken the national lead in developing resources and material in the UK for schools and services to use. Will Aitken, coordinator of ICT, recently organized the countries first cyber-bullying awareness day for students and parents.[35]
In March 2010, a 17 year old girl named Alexis Skye Pilkington was found dead in her room by her parents. Her parents claimed that after repeated cyber-bullying she was driven to suicide. Shortly after her death, attacks resumed. Members of an online website forum, referred to as "eBaums World", "Baums", and "EB", began trolling teens' memorial pages on the social networking site Facebook. Comments included expressions of pleasure over the death, with pictures of what seemed to be a banana as their profile pictures. Family and friends of the deceased teen responded by creating Facebook groups denouncing cyber-bullying and trolling, with logos of bananas behind a red circle with a diagonal line through it.[36]