How To Handle End-Of-Life Decisions For Chickens

Though poultry-keepers are often taught how to ward off predators and how to keep their chickens healthy, end-of-life issues (and options) are often left out of the chicken-care conversations. However, being able to recognize the signs when chickens are ill or close to an end-of-life scenario is of critical importance—especially if other members of the flock may be at risk. How keepers manage end-of-life events and how chickens are handled if they pass is also instrumental to flock biosecurity.

Healthy vs. Unhealthy 

Though the lifespan of chickens can vary widely by breed and care, a good estimate is that most hens will live between 4 and 8 years. However, it’s not unusual for backyard birds that have no genetic issues to live to between 10 and 12 years old. 

A healthy bird should be alert, with bright eyes, combs and wattles. Its nostrils should be clean and feathers should be smooth. The bird should stand upright and be interested in its surroundings, as well as eat, drink and produce waste regularly.

It follows, then, that an unhealthy bird would be the opposite of those listed previously. It may cough or sneeze, or you might be able to hear it breathing or gasping. The bird may shake its head and have discharge from its eyes or nose, and its wings may look dirty. Sick chickens tend to wipe their nostrils on their wings. Its face or wattles may be swollen, or it may have a bluish cast to its face.

Any of these can indicate that the bird has a respiratory infection. 

Though most of these signs are obvious, a sick chicken may offer only subtle—if any—clues that it isn’t feeling well. It may hide, not eat well, have lower egg production, stand oddly, have unusual droppings or be lethargic. Any of these symptoms warrant a closer look at your chicken. 

Subscribe nowSubscribe now

It can be a challenge for a backyard bird owner to recognize signs of disease as chickens are quite good at hiding when they’re ill, especially during an end-of-life issue. “Unless the chicken is outwardly sick, you may not know they are dying,” says Jacquie Jacob, poultry extension associate in the department of animal and food sciences at University of Kentucky.

“Chickens can take a lot of pain without showing signs. The outward symptoms [the chicken is showing] will depend on the cause of the heath problem. For example, if they have a reproductive blockage or some cause of abdominal fluid buildup, the chicken will walk like a penguin. In general, the first sign of [any chicken] illness is not eating.” 

Jacob notes that not eating could also be the result of having no available water. Chickens won’t eat if they can’t drink. Laura Сrazy/Adobe Stock

Isolate, Hydrate, Diagnose

So what should you do with an unhealthy hen?

Isolate

Removing an unwell chicken from the flock will prevent it from being…

FCC Implements Safe Connections Act to Support Survivors of Domestic Violence, Citing EPIC Coalition Concerns

On December 5, the Federal Communications Commission published its final rule for the Safe Connections Act, a law designed to support survivors of domestic violence (DV) and other forms of interpersonal violence by making it easier for survivors to separate their phone line from a group phone plan, to obtain discounted phone service through the Lifeline program, and to contact hotlines confidentially by removing records of calls from customer-facing logs like monthly bills.

In response to comments from EPIC and its advocacy partners, the Commission’s rule requires law enforcement to obtain a court order to access information about a line separation request. It also requires covered providers to provide line separation requests in the same languages that the provider advertises its services and requires providers to process all requests for line separation within two days. In a related Fact Sheet, the FCC also cited to EPIC et al.’s comments for issues related to the sensitivity of current address information and to a survivor benefiting from the program more than once.

EPIC and its coalition partners have been advocating on behalf of survivors going back to the FCC’s initial Notice of Inquiry in 2022; the Commission seemed to take these comments into account as it developed its Notice of Proposed Rulemaking earlier this year. In March 2023, EPIC published a blog post with the Safety Net Project of the National Network to End Domestic Violence that further emphasized these points. EPIC filed comments addressing ease of use by survivors, data minimization, and misuse of data by law enforcement in DV contexts, as well as reply comments addressing dual-use applications and services that act as stalkerware.

EPIC advocates for laws, regulations, and policies that safeguard user privacy and protect users from technology-facilitated abuse and harassment, including actions against stalkerware developers. EPIC also filed an amicus brief urging that dating platform companies be held liable when they ignore harassment and abuse.

Protecting Against Raccoons, A Poultry Super Predator

Raccoons are found throughout the United States and dwell in every setting, from rural farmland and woods to suburban areas, including New York City. Nicknamed the “super predator,” these masked creatures will do just about anything to get a meal, including scaling the tallest fences, unlatching and opening coop doors, and eating resting poultry through chicken wire.

Protecting our flocks from becoming victims of predator attacks should be one of the poultry owner’s biggest priorities. But how do you keep your flock from falling prey to your neighborhood raccoons?

Predator Proofing

The best way to prevent raccoons from attacking your flock is by predator-proofing your coop and run. Raccoons are extremely intelligent, take care to cover any opening larger than 1/2 inch.

When protecting your flock from raccoons, no measure is too extreme. So, let’s get started predator-proofing!

Climbing

Like children, raccoons love to climb, and they will use their human-like hands to scale any fence or tree. Raccoons aren’t scared of heights and will scale the highest fences for their meal. Covering the top of your run with 1/2-inch, 16-gauge PVC heavy wire will keep raccoons from gaining access to the run through the roof.

Another way to prevent raccoons from turning your run into their playground is by locking your birds in a coop or barn every day before dusk. If predators can’t see the poultry, they are less likely to try to gain access to the run. Even if poultry are locked in an enclosure at night, care should be taken to cover the top of the run with PVC-coated 1/2-inch, 16-gauge hardware cloth to protect the flock from daytime and nocturnal predators.

Subscribe nowSubscribe now

Hardware Cloth

Raccoons are excellent at chewing and biting through chicken wire, tearing a big enough hole to squeeze through, and gaining access to the coop and run. Another downside to chicken wire is that the 1-inch hole is big enough for a raccoon to reach their paw through, grab resting chickens and eat them through the fence.

Covering runs and any gaps larger than 1/2 an inch with PVC-coated 1/2-inch, 16-gauge hardware cloth is the best way to prevent raccoons from chewing and biting the wire or grabbing unsuspecting hens. Also, cover any window or screens with 1/2-inch hardware cloth to prevent raccoons from ripping screens to gain access to the coop or barn.

Cement Floors

While raccoons are less skilled at digging than they are with climbing and chewing, they can still gain access to the coop or run by digging underneath the perimeter. Building a structure with a cement floor or purchasing a cement slab to rest your coop on is one of the best ways to protect your flock.

With a sturdy cement floor, there is no need to worry about predators digging or chewing through the floor to gain access to your flock. Even though many poultry keepers prefer more cost-effective wood flooring, the peace of mind with a…

How To Deal With Fragile Bones

Osteoporosis is a condition affecting bone tissue characterized by the depletion of bone mass, deterioration in bone quality, and heightened susceptibility to fractures. A prevalent ailment in contemporary society, it afflicts a considerable global population.

The origins of primary osteoporosis, often termed as idiopathic, remain incompletely elucidated. Nonetheless, there is a discernible association with factors such as genetic predisposition, advancing age, and the onset of menopause. Intriguingly, bone density reduction is now observed in as much as fifteen percent of individuals aged 25 and above.

On the other hand, secondary osteoporosis is marked by an escalated loss of calcium resulting from detrimental lifestyle choices, particularly in diet, pharmaceutical usage (especially corticosteroids), and specific medical conditions.

Hormonal Imbalances

The primary contributors to impaired calcium and mineral metabolism are alterations in hormonal functions. The heightened susceptibility to osteoporosis often prompts gynecologists to recommend hormone replacement therapy or artificial replenishment of estrogen to women.

However, synthetic hormones are perceived by the human body as toxins, resulting not only in various health complications but also impacting the utilization of natural hormones—whether endogenously produced or obtained through diet.

In the contemporary era, constant exposure to hormonal influences is ubiquitous. This exposure stems from the use of hormones in detergents and cosmetics, a consequence of administering hormonal supplements to livestock in factory farms and in animal feed.

The extensive utilization of hormonal contraceptives and pharmaceutical hormone treatments also exerts a profound influence on the overall ecosystem, as unabsorbed active substances find their way into natural circulation through wastewater.

This systemic impact triggers inflammatory responses, forming the backdrop for various degenerative conditions, encompassing heart diseases, rheumatic disorders, diabetes, and cancer.

Osteoporosis Root Causes

The onset of osteoporosis and impaired nutrient absorption is predominantly attributed to the “western” lifestyle characterized by sedentary habits, the use of barbiturates or antidepressants, and significant surgical interventions. Additionally, disorders affecting the kidneys, liver, and digestion, often stemming from unhealthy practices and stress, contribute to these conditions.

Smoking and excessive alcohol consumption are recognized as the most severe culprits in precipitating osteoporosis. Nevertheless, this ailment, which can be traced back to environmental factors, is preventable and amenable to relatively straightforward treatment.

To ward off osteoporosis, a shift towards natural nutrient and mineral sources is recommended, replacing synthetic alternatives. Opting for natural treatments over pharmaceutical interventions is encouraged, along with a concerted effort to avoid known harmful substances. Notably, the excessive consumption of refined sugars, particularly white sugar, has been identified as having a detrimental impact on bone quality, inducing body acidification.

Striving for a more balanced body condition entails depleting calcium and magnesium stores, as the body seeks to counteract hyperacidity. It’s crucial to recognize that hyperacidity also interferes with the formation of vitamin D, a key factor in calcium absorption.

Optimal Nutrition Approach

Ensuring the proper function of hormonal glands necessitates an ample supply of saturated fat. The compromise in bone quality often associated with low-fat and “light” diets can…

Continue reading

EPIC, Brennan Center, CDT: New HPSCI Bill Reauthorizing Section 702 Is “Wolf in Sheep’s Clothing”

EPIC joined the Brennan Center for Justice an the Center for Democracy and Technology (CDT) in issuing a one-pager on the FISA Reform and Reauthorization Act of 2023, the newly-introduced bill to reauthorize FISA Section 702 by the House Permanent Select Committee on Intelligence.

The one-pager details how the FISA Reform and Reauthorization Act is an “anti-reform bill in disguise” that would in fact expand surveillance conducted pursuant to Section 702, including by:

  • dramatically expanding surveillance of immigrants by allowing entirely suspicionless searches of Section 702 data for the communications of all people seeking to travel to the United States, whether on student or work visas or as tourists and business travelers; and
  • vastly expanding the number and types of U.S. businesses who must assist the government in conducting Section 702 surveillance by expanding the definition of “electronic communication service provider” to include entities that do not even have access to communications.

The one-pager also notes that the HPSCI bill’s “reforms” to Section 702—in particular the persistent abuse of warrantless backdoor searches for Americans’ communications—are carefully designed to have no practical effect. The bill’s prohibition on “evidence-of-a-crime only” queries would do nothing to prevent the vast majority of abuses of Section 702, including searches for communications of Black Lives Matter protesters and tens of thousands of others involved in “civil unrest,” over 19,000 donors to a congressional campaign, members of Congress, and a local political party were all labeled “foreign intelligence” queries.

EPIC and a bipartisan coalition of privacy, civil liberties, and civil rights groups have launched a campaign to significantly reform Section 702 of the Foreign Intelligence Surveillance Act and related surveillance authorities. Members of this coalition recently urged Senate Majority Leader Chuck Schumer to refrain from including any short-term reauthorization of FISA Section 702 in the continuing resolution or any other “must-pass” legislation.

EU Lawmakers Clinch Deal on Landmark Artificial Intelligence Legislation

Late Friday night, EU policymakers reached a political agreement on the final terms of the Artificial Intelligence Act. The bill was proposed in 2021 as a part of the EU’s broad digital legislation strategy, tackling algorithmic based harms with a risk based approach. The European Parliament and the European Council, the two legislative bodies in the EU, along with the European Commission, the EU’s executive branch, have spent the last 6 months negotiating the final terms based on each body’s draft of the bill.

The past month of negotiations stalled on two major issues:

  • Law enforcement and national security exceptions, particularly in regard to the real time biometric surveillance prohibition
  • How to regulate foundational models like ChatGPT

While there is no final text published, the Parliament, Council, and Commission have come to a compromise on the terms. According to the reporting, the final terms include a striking reduction of transparency requirements for law enforcement, the official relegation of real time biometric surveillance to the high risk category, a ban on predictive policing software based on personality, obligations for general purpose AI developers, and penalties up to 7% of a company’s annual global turnover.

The final step for the AI Act before it is officially adopted into law is for each body to formally approve the final terms in the third reading of the bill.

EPIC has long advocated for comprehensive privacy protections, rigorous testing protocols, expanded resources for evaluation of AI systems, and a government-whole effort to fighting algorithmic discrimination. Most recently, EPIC submitted comments to the Office of Management and Budget on the United States government’s procurement and use of AI. EPIC has also petitioned the FTC to commence a rulemaking on commercial use of artificial intelligence, and keeps track of state AI laws.

Home-Built Portable Chainsaw Mill: A Comprehensive Guide

Introduction

This post outlines the journey of constructing a portable chainsaw sawmill. It delves into the author’s inspirations, the support received from local businesses in Fort Smith, and explores the various sawmill types, highlighting the project’s duration and the meticulous planning and construction phases.

The Motivation Behind the Project

Choosing the Sawmill Type

Sawmill owners often debate the merits of different sawmill types: chainsaw, bandsaw, swinger, and circular mills. The author emphasizes that the choice largely depends on personal preference and intended use, leading to the decision to construct a chainsaw sawmill tailored to his needs.

Construction Journey

Planning and Design

The mill’s journey began with an 18-month planning phase. This period involved thorough research, design iterations, and gathering necessary parts. The Sawmill is powered by a modified Stihl 066 chainsaw with a 32 inch bar.

Building Process

The construction, spanning 3 months, was a collaborative effort with Chuck. The extended timeline was attributed to continuous modifications and enhancements to ensure the mill met the author’s precise requirements.This is Chuck getting the chopsaw lined up to cut the steel for the carriage.This is Chuck getting the chopsaw lined up to cut the steel for the carriage.Making the first cut on the inch and a half tubing that will be used for the carriage frame.Making the first cut on the inch and a half tubing that will be used for the carriage frame.This is me cutting therest of the tubing to length.This is me cutting the rest of the tubing to length.One side of the frame welded.One side of the frame welded.Adding the top pieces.Adding the top pieces.Tacking it all together.Tacking it all together.Frame is almost finished, we thought.Frame is almost finished, we thought.adding the corner bracesadding the corner bracesAdding the 2X4 tubing that the wheels bolt to.Adding the 2X4 tubing that the wheels bolt to.Ready to weld them.Ready to weld them.Once again, I was thinking that the frame was almost finished.Once again, I was thinking that the frame was almost finished.Starting to bolt the hardware on that will raise and lower the saw.Starting to bolt the hardware on that will raise and lower the saw.Close up of the sliding bar clamp.Close up of the sliding bar clamp.Bolted the chainsaw on for the first time and decided the frame is not wide enough for what I want it to do.Bolted the chainsaw on for the first time and decided the frame is not wide enough for what I want it to do.Widened the carriage frame to38 inchs, moved the hardware that lifts the saw to the inside and added the sprockets and chains.Widened the carriage…

So, Is It Illegal To Collect Rainwater in Idaho?

Being prepared for tough times means not only having a stash of supplies and resources ready to go, but also a plan and the capability for continually acquiring those supplies over the long term.

flag of Idahoflag of Idaho

One of the single most important resources you have is water, and one of the best things you can own to ensure that your access to it is a rainwater collection system.

Humans have been catching rain for thousands of years, but I’m sad to say that not every state in the US has legalized the practice.

As far as those states are concerned, that rain belongs to them! Let’s look at Idaho. Is it illegal to collect rainwater in Idaho?

No, it is not illegal to collect rainwater in Idaho. However, citizens may only collect rainwater that falls on their property and hasn’t yet entered any existing waterway, and if the collection doesn’t interfere with the water rights of others.

So while you might say that Idaho does have regulations concerning the collection and use of rainwater, these restrictions are so minimal and so common sense they are barely worth mentioning.

And for the record, the State Attorney General already affirmed citizens’ rights to collect and use rainwater in a letter, so that is that. But there is more you’ll probably want to know, of course, so keep reading and I’ll tell you all about it.

Is Rainwater Harvesting Illegal at the State Level in Idaho?

No, the collection of rainwater is not illegal at the state level in Idaho. Just the opposite, the practice is entirely legal and generally encouraged. However, state law mandates that folks may only collect diffused surface rainwater that falls on their property.

Essentially, diffused surface waters are those that have not entered any other watercourse such as a stream, creek or river, but this does not cover rainwater that has merely struck the surface of the ground or any structure.

Said another way, as long as the rain has fallen on your property and you collected it before it enters a natural waterway, it is yours and you may store it as you see fit and only you have the rights to it.

However, the harvesting cannot interfere with the water rights of anyone else. This is unlikely to be a problem, but something to keep in mind, especially for those with very large-scale rain collection systems.

Is It Illegal at the County Level?

No. I was not able to find even a single county in Idaho that explicitly outlaws the practice of rainwater collection. That being said, it is entirely possible, perhaps even likely, that your local county and city laws might be more stringent than the state laws.

You’ll have to abide by these laws when it comes to the design and installation of your system, and potentially even how much water you are allowed to collect and store.

Even though the state of Idaho…

Continue reading

Pharmacies Warrantlessly Disclose Medical Records to Law Enforcement, Congress Finds

Most major U.S. pharmacy chains regularly disclose customers’ medical information to law enforcement agencies without a warrant, according to a Congressional investigation announced Tuesday and reported in the Washington Post.

In a letter to the Department of Health and Human Services (HHS), Sen. Ron Wyden and Reps. Pramila Jayapal and Sara Jacobs detailed the results of their inquiry into the issue. As part of the investigation, “officials with America’s eight biggest pharmacy giants — Walgreens Boots Alliance, CVS, Walmart, Rite Aid, Kroger, Cigna, Optum Rx and Amazon Pharmacy — told congressional investigators that they required only a subpoena, not a warrant, to share the records.” Pharmacies have unique flexibility under the Under the Health Insurance and Accountability Act (HIPAA) to interpret the legal standard required before disclosing customer medical records to law enforcement. Subpoenas require a less stringent showing than warrants and can be issued by a government agency without the oversight or approval of a judge.

“Although pharmacies are legally permitted to tell their customers about government demands for their data, most don’t,” the letter explains. “As a result, many Americans’ prescription records have few meaningful privacy protections, and those protections vary widely depending on which pharmacy they use.”

In recent comments to HHS, EPIC argued that the HIPAA Privacy Rule should establish a warrant requirement for law enforcement to access protected health information. In this context, law enforcement would have to get a warrant supported by probable cause before seeking a customer’s medical records from a pharmacy.

The ease with which law enforcement can currently obtain pharmacy data is especially concerning as many states continue to criminalize abortion and medication related to reproductive health. According to the Washington Post, nearly 1 in 3 women in the U.S. between the ages of 15 and 44 live in states where abortion is fully or mostly banned. Customers have an expectation of that their reproductive health information at their local pharmacy will remain private. As EPIC detailed in its comments to HHS, amending the HIPAA Privacy Rule to include a warrant requirement “would help normalize privacy protections nationwide and provide clarity to covered entities’ legal departments.”

EPIC regularly advocates for stronger privacy protections for personal health information, including reproductive health information, both under HIPAA and in contexts that fall outside of HIPAA. Recently, EPIC submitted comments to the U.S. Senate Committee on Health, Education, Labor, and Pensions urging the Committee to address the “unique and serious privacy and security risks” posed by the commercial processing of personal health data.

Homemade Food Dehydration: Rediscover This Gem for Large Quantities!

Looking to cook and preserve your favorite meals while enjoying a healthier lifestyle? Try vacuum sealing canned chicken. Homemade food dehydration is the answer! Say goodbye to expensive store-bought snacks and hello to a cost-effective way of preserving and savoring your favorite ingredients with vacuum sealing. Extend the shelf life of your canned chicken and cook it whenever you want. With a vertical flow dehydrator, you can easily create delicious dehydrated snacks and meals right in your own kitchen. Rehydrate and cook them whenever you want by vacuum sealing them.

By dehydrating your meals, you not only extend their shelf life but also retain essential nutrients without the need for additives or preservatives. Vacuum sealing is a popular method to preserve and rehydrate dehydrated food. Whether it’s crispy apple chips, savory beef jerky, or flavorful beans and rice, we’ve got you covered with easy-to-follow techniques that will have you enjoying delicious snacks in no time.

dehydrator

Essentials of Food Dehydration

Science Behind Food Dehydration

Food dehydration is a process that removes moisture from food, allowing it to dehydrate and be stored for longer periods without spoiling. This can significantly extend the shelf life of the food. A food dryer is typically used to dehydrate the food, and once it is ready to be consumed, it can be rehydrated. Understanding the science behind food dehydration is essential to dehydrate and ensure the preservation of nutrients, as well as extend the shelf life of meals. Rehydrating dehydrated food can restore its original texture and taste. When food is dehydrated, the water content decreases significantly, extending the shelf life of meals and inhibiting the growth of microorganisms that cause spoilage. Rehydrating vacuum-sealed meals can restore their original texture and taste. This process also helps rehydrate the dehydrated meals and extends their shelf life. It slows down enzymatic reactions and reduces oxidation, retaining vitamins and minerals in the dryer foods.

Methods of Food Dehydration

There are various methods available for food dehydration, including using a dehydrate or dryer. Each method has its own advantages and considerations, especially when it comes to dehydrating meals and fruit. Air drying is one common method where food, including fruit and meals, is left to dry naturally in open air. This process can be done using a dryer or by dehydrating the food. Using a food dryer is a great way to dehydrate fruit. It requires minimal equipment, such as a panel, and can be time-consuming. However, the process is dependent on weather conditions. Another popular method involves using a dehydrator, which uses controlled heat and airflow to efficiently dehydrate fruit by removing moisture. Dehydrators, also known as fruit dryers, offer precise temperature control and faster drying times compared to air drying. These machines are specifically designed to dehydrate fruits and other food items.

Wide Range of Foods That Can Be Dehydrated

Dehydration opens up a world of possibilities. Fruits like apples, bananas, and berries can be dehydrated using a dryer into delicious snacks with concentrated flavors. The process…