Next Page: 10000

          Un cours de Yoga à 8,90€ ?      Cache   Translate Page      

Si vous me suivez en story Instagram, peut-être avez-vous aperçu mes exploits et surtout ma souplesse légendaire ((#jePlaisante #jeSuisRaideCommeUnPiquet) lors d’un cours de Yoga testé en compagnie d’une adorable lectrice* la semaine dernière ?
<< Le yoga et moi … >>
De (...)

Cet article Un cours de Yoga à 8,90€ ? est apparu en premier sur MarieLuvPink.


          Expenses module      Cache   Translate Page      

maybe I’ll do something for italian comunity (to get more likely an easy ERP) and if exploitable by international comunity, I’ll publish it later (actually it’s only an idea :slight_smile:#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000)


          Microseismic Monitoring Technology Market Key Insights and Booming Factor Supporting Growth Till 2026      Cache   Translate Page      

Microseismic monitoring provides detailed information about the microseismicity of an area and how a rock is responding to mining or oil & gas production activities. It leads to increased efficiency and optimized operations. It is a valuable tool in understanding what a hydraulic fracture is doing in real time. Microseismic technology is significantly used in reservoir monitoring and domestic mining production monitoring abroad.

Albany, NY -- (SBWIRE) -- 03/12/2019 -- Looking at the current market trends as well as the promising demand status of the Microseismic Monitoring Technology Market, it can be projected that the future years will bring out positive outcomes. This research report added by MRRSE on its online portal delivers clear insight about the changing tendencies across the global Microseismic Monitoring Technology Market. Readers can gather prime facets connected to the target market which includes product, end-use and application; assisting them to draw conclusions out of this intelligent research report.

The report analyzes and forecasts the Microseismic monitoring technology market at the global and regional level. The report also comprises a detailed value chain analysis, which provides a comprehensive view of the global Microseismic monitoring technology market. Porter's Five Forces model has been included to help understand the competitive landscape in the market. The study encompasses market attractiveness analysis, wherein end-users are benchmarked based on their market size, growth rate, and general attractiveness.

Request Free Sample Report @ https://www.mrrse.com/sample/17720

The global microseismic monitoring technology market is driven by an increase in use of the technology in environmental and geotechnical engineering as it helps in the evaluation of the real-time location of underground rock fractures. Furthermore, microseismic monitoring technology can be applied to the precursor-monitoring of a volcano or earthquake disaster as well as in rock burst monitoring in the process of exploitation of mineral resources. Furthermore, rise in the adoption of microseismic monitoring technologies in the oil & gas exploration industry is anticipated to drive the global microseismic monitoring technology market over the forecast period. Furthermore, significant use of this technology in hydraulic fracture mapping and reservoir monitoring is likely to have propel the global microseismic monitoring technology market. However, the uncertain nature of oil prices is estimated to hamper the global microseismic monitoring technology market.  Additionally, a number of companies are entering into collaborations with other companies in order to enhance the development of their business. For instance, in April 2017, Schlumberger Limited signed an agreement with Pemex for a multi-client seismic survey in the southern Gulf of Mexico. The agreement additionally incorporates coordinated effort with WesternGeco in the seismic handling period of the task and for future innovation joint efforts.

This research study on the global Microseismic monitoring technology market provides a detailed cross segment and cross country analysis based on segmentation categories such as process, component, end-use, and region. Based on process, the market has been divided into data processing, data acquisition, and data interpretation. In terms of component, the market has been segmented into hardware, software, and services. Based on end-use, the market has been categorized into oil & gas, mining, and others. The others segment includes geotechnical applications such as underground storage facilities, which include LPG sites and nuclear waste repositories; vibration thresholds and blasting; and monitoring of structures such as dams, high-speed rail tracks, bridges, and tunnels.

Secondary research sources that are typically referred to include, but are not limited to, company websites, annual reports, financial reports, broker reports, investor presentations, SEC filings, internal and external proprietary databases, relevant patent and regulatory databases, national government documents, statistical databases, market reports, news articles, press releases, webcasts specific to companies operating in the market, national government documents, statistical databases, market reports, Factiva, etc..

Primary research involves e-mail interactions, telephonic interviews, and face-to-face interviews for each market, category, segment, and sub-segment across geographies. We conduct primary interviews on an ongoing basis with industry participants and commentators in order to validate the data and analysis. Primary interviews provide first-hand information on the market size, market trends, growth trends, competitive landscape, outlook, etc.. These help us validate and strengthen secondary research findings. They also help develop the analysis team's market expertise and understanding.

Browse Complete Report with TOC @ https://www.mrrse.com/microseismic-monitoring-technology-market

The report highlights well-established players operating in the market such as Microseismic, Inc., Geospace Technologies Corporation, ESG Solutions, Halliburton Company, ION Geophysical Corporation, Landtech Geophysics Ltd, Schlumberger Limited, Weir-Jones Group, Guralp Systems Limited, and Fairfield Geotechnologies among others. Leading players are focused on alliances with other players to launch new projects across the globe. For instance, in October 2018, Schlumberger Limited and TGS announced a multi-client seismic project in the Gulf of Mexico, U.S.. Both companies will apply their full handling ability and deliver the project in first quarter 2020. Seismic data will be acquired with the use of Fairfield Geotechnologies. This project will enhance the company's current data coverage in the Gulf of Mexico. 

The global Microseismic monitoring technology market has been segmented as follows:

Global Microseismic Monitoring Technology Market, by Process

Data Acquisition

Data Processing

Data Interpretation

Global Microseismic Monitoring Technology Market, by Component

Hardware

Software

Services

Global Microseismic Monitoring Technology Market, by End-use

Mining

Oil & Gas

Others

Global Microseismic Monitoring Technology Market, by Geography

North America

U.S.

Canada

Rest of North America

Europe

U.K.

Rest of Europe

Asia Pacific

China

Australia

Rest of Asia Pacific

Middle East & Africa

GCC Countries

Rest of Middle East & Africa

South America

Argentina

Rest of South America

Enquire about this Report @ https://www.mrrse.com/enquiry/17720

About Market Research Reports Search Engine (MRRSE)
Market Research Reports Search Engine (MRRSE) is an industry-leading database of Market Research Reports. MRRSE is driven by a stellar team of research experts and advisors trained to offer objective advice. Our sophisticated search algorithm returns results based on the report title, geographical region, publisher, or other keywords.

MRRSE partners exclusively with leading global publishers to provide clients single-point access to top-of-the-line market research. MRRSE's repository is updated every day to keep its clients ahead of the next new trend in market research, be it competitive intelligence, product or service trends or strategic consulting.

Contact Us
State Tower
90, State Street
Suite 700
Albany, NY - 12207
United States Telephone: +1-518-730-0559
Email: sales@mrrse.com

For more information on this press release visit: http://www.sbwire.com/press-releases/microseismic-monitoring-technology-market-key-insights-and-booming-factor-supporting-growth-till-2026-1168636.htm

Media Relations Contact

Himanshu
Manager
MRRSE
Telephone: 1-518-621-2074
Email: Click to Email Himanshu
Web: https://www.mrrse.com/

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000


          He wants to quit his job but hasn’t done any work to find a new one      Cache   Translate Page      

Instead, he asked his girlfriend to blast his résumé to her friends. Now she feels exploited.
          A World Built On Sand And Oil      Cache   Translate Page      
The inexorable proliferation of oil and sand on the global circuits of trade tells us about the shape-shifting ways of production, colonial forms of exploitation, our reckless wrecking of the global environmental commons and how the commodification of prosaic everyday things affects lives here, now, and half a world away.
           Comment on Why I Don’t Love Real Estate—But Just Acquired $20MM of Property in 6 Months by Ben Leybovich       Cache   Translate Page      
Aurora, in mathematical terms, Delta is something we call any type of variance. What I mean to say in the article is that Real Estate, being an inefficient market, allows an investor to exploit the Delta between market (read the behavior of the majority of investors) and a given opportunity. If there is no Delta, then RE is no different from S&P 500. But, with paper markets being structurally efficient, while RE is structurally inefficient, we are able to look for, find, and capitalize on the Delta.
          Juventus-Atletico : A la pause, les bianconeri à portée de l’exploit      Cache   Translate Page      

A la pause, la Juve mène 1-0 face à l’Atletico et se situe donc à […]

L’article Juventus-Atletico : A la pause, les bianconeri à portée de l’exploit est apparu en premier sur Calciomio.


          Barcelone-OL: «On ne va pas jouer avec la peur», assure Nabil Fekir, symbole d’un Lyon rêvant de «créer l'exploit»      Cache   Translate Page      
Après son 0-0 arraché à l’aller, l’OL croit en ses chances de renverser le grand Barça, mercredi (21 heures) en 8e de finale retour de Ligue des champions 
          VIDEO. Barcelone-OL: «On partait clairement pour souffrir»… Comment l’exploit de 2010 au Real Madrid peut inspirer Lyon      Cache   Translate Page      
L'OL, qui jouera sa qualification en Ligue des champions mercredi (21 heures) à Barcelone, a accompli un exploit comparable en 2010 contre le Real Madrid (1-0, 1-1)
          Man Facing Child Sex Charges      Cache   Translate Page      

A Caldwell county man is facing 15 sex offenses involving a minor. The Caldwell County Sheriff’s Office arrested 48-year-old Ernest Ray Messer of Lenoir on Monday. Messer is charged with ten counts of second degree felony sexual exploitation of a … Read More


          Cinéma : McQueen, un documentaire de Ian Bonhôte et Peter Ettedgui       Cache   Translate Page      


Précurseur subversif, génie créatif torturé, figure majeure de la mode de la fin du XXème siècle et du début du XXIème, Alexander McQueen s’est donné la mort en 2010 à l’âge de quarante ans. Fils d’un taxi londonien, cadet d’une fratrie de six enfants, rejeton d’une famille modeste typique de l’Est londonien, celui qui n’est encore que Lee quitte l’école à l’âge de seize ans. Il entre en apprentissage chez un prestigieux tailleur de Savile Row, Anderson & Sheppard, fournisseur notamment du prince Charles, poursuit son expérience à Milan. Mais il se sent à l’étroit dans les ateliers. Il est accepté à la Saint Martin’s school. En 1992, la première collection de la maison McQueen est financée par les allocations chômages. Il est alors repéré par Isabella Blow, rédactrice de mode excentrique qui le prend sous son aile et l’introduit dans le sérail. En 1996, il intègre la maison Givenchy à la tête de laquelle il prend la suite de John Galliano. Il a vingt-huit ans. Bridé par les impératifs commerciaux de cette vieille institution, il développe en parallèle sa propre griffe à travers des collections toujours plus impressionnantes, provocantes, spectaculaires. Itinéraire d’un talent brut.





Huit ans après son suicide, Alexander McQueen (1969-2010), personnage hors normes au destin romanesque, alimente toujours les plus folles rumeurs. Les réalisateurs Ian Bonhôte, Peter Ettedgui évoquent la vie, la carrière et le talent d’un être complexe aux multiples facettes. Avec empathie et sensibilité, ils dressent le portrait de celui qui était surnommé l’Enfant terrible de la mode, un homme paradoxal, égocentrique et généreux, hypersensible et tyrannique, perfectionniste dans le travail et chaotique dans sa vie privée. Sincère et personnel, le documentaire rend un hommage saisissant à cet électron libre de la mode, hanté par ses démons, les traumatismes d’enfance, les addictions, la maladie et la dépression.





Si le montage chronologique n’échappe pas à la linéarité, le récit de cette ascension fulgurante fascine. Du gamin de la classe ouvrière à la star des podiums, McQueen apparaît tout entier, insaisissable, exubérant, habité. Ponctué de nombreux témoignages des membres de sa famille, de ses proches, ses collaborateurs, le film dessine par touches légères la psychologie du personnage tandis que les archives inédites, les images superbes en coulisses entraîne le spectateur au cœur du métier. 

Profondément ancrées dans leur époque, en prise directe avec leur temps, les collections s’inspirent des Igrands thèmes sociétaux mais aussi la littérature, la mythologie, le cinéma, la science-fiction. L’univers de McQueen apparaît dans toute son extravagance, son originalité. A travers ses défilés, le créateur exprime son goût pour le scandale, la performance, va toujours plus loin dans l’expérimentation stylistique. Il n’a qu’un objectif émouvoir et choquer.




Chaque collection est un événement, spectaculaire, démesuré. Le styliste n’a pas peur de la polémique. Il prend position contre le consumérisme de la société, consacre une collection au thème du viol, exploite sa fascination pour la mort, la contemporanéité, les avant-gardes. Son univers créatif s’affirme, très sombre, voire macabre, fruit de ses introspections, véritable catharsis lorsqu’il déverse sur les podiums ses pires cauchemars. Figure de proue du mouvement Cool Britannia, ce visionnaire aussi tourmenté qu’inspiré ose toutes les audaces. Sa créativité est portée par un désir de liberté, une pertinence absolue.

Sur les rythmes syncopés d’une bande originale puissante signée Michael Nyman, le documentaire parvient à dissocier le mythe de l’homme. Plongée dans l’univers onirique, torturé, d’un créateur poétique et subversif.

McQueen, un documentaire de Ian Bonhôte, Peter Ettedgui
Sortie le 13 mars 2019





          How To Choose Best Bankruptcy Lawyer in Irvine      Cache   Translate Page      

bankruptcy lawyer irvineChapter 11 may appear like the finish of the street fiscally, however it doesn’t need to be. Rather, you can utilize this as a second start and an opportunity to change your funds. On the off chance that you exploit this and figure out how to control your spending and create self-restraint in your accounts (and maybe in different everyday issues), at that point chapter 11 can be a truly necessary gift.

Obviously, you ought to never mess with this progression, since it will have some genuine repercussions for your record as a consumer in the following quite a long … Read More


          WISCONSIN MAN CHARGED WITH SEXUAL EXPLOITATION IN CASE INVOLVING MADISONVILLE TEEN      Cache   Translate Page      
A Wisconsin man has now been charged in connection with the case of the Monroe County teen who was found safe last week. Federal court documents say 31-year-old Bryan Rogers persuaded the teen to take video footage of herself being raped by her adoptive father. He now faces federal charges of sexual exploitation of a...
Read More
          BULLOCK FOUND GUILTY ON NUMEROUS CHILD SEX CRIME CHARGES      Cache   Translate Page      
A Campbell County jury today found 54-year-old Marvin Bullock of Caryville, Tennessee, guilty of four counts of rape of a child, nine counts of incest, five counts of rape, three counts of sexual battery by an authority figure, one count of solicitation of sexual exploitation of a minor, two counts of sexual exploitation of a...
Read More
          Trigger Warning With Killer Mike S:1 Outside the Box; Kill Your Master E:5 & E:6 Review      Cache   Translate Page      

Today TK Trindad and Drew Jones discuss Outside The Box and Kill Your Master! Join us weekly as Killer Mike gives us his version of activism and we discuss it. on the TRIGGER WARNING AFTERBUZZ TV AFTER SHOW, we’re talking all about his exploits, the craziness, and the warm heartedness every week. Join us for […]

The post Trigger Warning With Killer Mike S:1 Outside the Box; Kill Your Master E:5 & E:6 Review appeared first on AfterBuzz TV Network.


          Marooned (Joseph Kelly)      Cache   Translate Page      
European exploration (and exploitation) of what is now America has a long and (at times) mysterious history to it. We all know about the Pilgrims, the Mayflower, the first Thanksgiving, and the other lore that arose to help shape the American story. We were also educated on Jamestown, Pocahontas, John Smith, and the gradual rise of Virginia to colonial prominence, but many of us know little of the struggles that the Jamestown colony endured in its first years.

Joseph Kelly’s Marooned is a well-researched book that tackles the beginnings of Jamestown (and Bermuda) through the trials and tribulations of its first years, how a shipwreck helped create the first seeds for Bermuda’s founding a few years later, and how early Jamestown was marked by general incompetence, hunger, and an ebb and flow of relations with the native population. Kelly spends a lot of time talking about how many early colonists simply “melted away” into the wilderness and assimilated into the native communities that resided nearby, and how John Smith’s leadership in Jamestown was marked by a hybrid between a native chief and local warlord. None of this was the stuff of Plymouth lore or Puritan aspiration but much of it came out of necessity and in Smith’s case, because of a dash of ego and bravado.

Marooned’s strongest argument is the one Kelly puts forth at the end, stating “the truly American story is the lives of the discontents. We need to discard that image of a city shining on a hill . . . our city does not shine. It is messy. It is the nature of a free society.” From Smith to Paine to a gentleman of the name of Stephen Hopkins, Kelly shares the stories of the messy, the ugly, and often crazy early colonists who gradually became a part of our American story.

MY RATING - 3.5

          PORT du HAVRE: la journaliste des Echos découvre que le JACOBINISME PORTUAIRE, ça ne marche pas!      Cache   Translate Page      

Il ne faudrait pas confondre le "laissez-faire" libéral avec le "laissez-nous faire" de la coopération locale.

Pis! Cessons de considérer que le seul "laissez-faire" possible soit celui de l'Etat central sous prétexte que ses crânes d'oeuf technocrates super-intelligents soient les seuls capables de faire quelque chose: le "laissez-nous faire" des haut-fonctionnaires est, hélas, pire que le "laissez-faire" anonyme du grand marché libéral de la mondialisation. La mise sous tutelle étroite de nos grands ports maritimes sous l'autorité d'un haut-fonctionnaire nommé tous les cinq ans en conseil des ministres n'est pas efficace. Ce "jacobinisme portuaire" (ne parlons même plus de "colbertisme" car ce fils d'un marchand drapier de Reims avait fait le réel effort de s'intéresser réellement aux réalités maritimes qui faisaient le succès commercial de ces "marchands de fromage" hollandais qui ennuyaient considérablement un Louis XIV amateur de chasse et de ballets...) NE FONCTIONNE PAS!

Portrait_de_Jean-Baptiste_Colbert

Preuve supplémentaire à la lecture de cet article des Echos:

https://www.lesechos.fr/industrie-services/tourisme-transport/0600847842624-les-operateurs-prives-vent-debout-contre-lautorite-portuaire-du-havre-sur-lextension-de-port-2000-2250395.php

2250395_les-operateurs-prives-vent-debout-contre-lautorite-portuaire-du-havre-sur-lextension-de-port-2000-web-tete-060847896270

Les opérateurs privés vent debout contre l'autorité portuaire du Havre sur l'extension de Port 2000

Claire GarnierLe 07/03 à 12:41Mis à jour à 15:56

L'autorité portuaire du Havre essuie la fronde des opérateurs privés à trois mois de l'attribution des derniers postes à quai de Port 2000. En cause, le changement de régime juridique d'exploitation des terminaux.

Quand l'actualité locale entre en résonance avec l'actualité nationale. A l'heure où la commission Développement durable du Sénat, qui a examiné ce mercredi  le projet de loi d'Orientation sur les Mobilités (LOM) , dit pour son article 35 avoir « sécurisé la possibilité pour les grands ports maritimes de conclure de simples conventions domaniales pour l'exploitation des terminaux », et ce afin de renforcer leur compétitivité, un vent de fronde se lève à ce sujet du côté du port du Havre. A trois mois de l'attribution du marché de l'exploitation des derniers postes à quai de Port 2000 au Havre, les opérateurs privés s'insurgent en effet contre le choix d'un nouveau régime de « concession de services », plus contraignant pour eux, en lieu et place des « conventions de terminal » qui régissaient jusque-là leurs activités sur les terminaux existants du premier port à conteneurs français.

De fait, l'article 35 du projet de loi laisse le choix ouvert entre ces deux instruments juridiques, la convention de terminal devant être l'outil de droit commun, la concession de services s'appliquant dans le cas de besoins exprimés par le port d'une « prestation de services ». Et c'est là où le bât blesse. Car les opérateurs privés affirment qu'ils ne fournissent pas une prestation de service pour l'autorité portuaire, mais assurent un service pour leurs clients armateurs, les Maersk, MSC, CMA CGM et consorts.

« Prise de contrôle »

La concession de services, expliquent-ils sous couvert de l'anonymat, serait, selon eux, synonyme d'une « prise de contrôle » de l'autorité portuaire sur les activités des concessionnaires en s'immisçant dans leur gestion. La convention de terminal prévoit, elle, seulement que l'exploitant a des obligations d'investir et d'effectuer une activité de manutention en échange d'une mise à disposition des quais sur le domaine public maritime.

Le directeur général adjoint du grand port maritime du Havre (GPMH), Baptiste Maurand, justifie ce choix car, dit-il, « la concession de services était le seul régime juridique possible au moment du lancement de l'appel d'offres début 2018 pour nos postes 11 et 12 de Port 2000 ». Et d'affirmer que ce régime leur « est imposé par l'arrêt Verdon du Conseil d'Etat du 14 février 2017 ». Cependant, de l'eau a coulé sous les ponts depuis. Des conventions de terminal ont ainsi été signées à La Rochelle ainsi qu'à Dunkerque. En outre, l'étude d'impact du projet de loi LOM a estimé que le recours obligatoire aux contrats de concession « conduirait à enfermer les ports français dans un schéma procédural décalé de ce qui prévaut dans d'autres ports européens. »

Exception sur la façade Manche-Mer du nord

Ce à quoi le GPMH répond, qu'ayant investi 150 millions d'euros dans  l'extension de Port 2000 , il est fondé à passer un contrat de concession avec un exploitant « pour exiger des engagements de trafic et une exploitation performante des terminaux à conteneurs ». Par ailleurs, Baptise Maurand s'inscrit en faux contre des rumeurs selon lesquelles obligation serait faite au concessionnaire de passer une partie des volumes débarqués via  le terminal multimodal propriété du Port du Havre. « Les opérateurs seront incités à faire du report modal, sans y être contraints », assure-t-il.

Lors d'une réunion du Conseil de développement du GPMH, le 21 février, l'UMEP, association des entreprises privées de la place portuaire du Havre, a présenté une « motion » demandant à la direction du port du Havre de maintenir le régime juridique de la convention de terminal, arguant du fait que ce régime de concession constituerait en outre une « exception sur la façade Manche Mer du Nord ». Mais, raconte un participant, « au moment où le sujet arrivait à l'ordre du jour, une délégation de 80 personnes de la CGT du GPMH a envahi la salle, empêchant le vote de la motion ».

Simple coïncidence ou alliance objective entre la direction du port et le syndicat ? De fait, la CGT du GPMH voit d'un bon oeil le régime de la concession de services, synonyme d'une présence syndicale plus forte sur les quais.

Claire Garnier

          Commentaires sur Le RDV Tech 287 – La 5G dans l’espace par Patrick      Cache   Translate Page      
> qui préfère filtrer a posteriori plutôt qu’avant la publication. C'est ironique, tu décris là exactement l'article 11 de la nouvelle loi sur le copyright, qui a créé un IMMENSE levée de boucliers (justifiée) des défenseurs des libertés... :) > C’est ce qui différencie l’éthique du simple respect de la loi. Non mais le problème n'est pas d'être plus éthique que la loi, le problème est de déterminer ce qui est éthique ou non, et comme chacun a sa réponse décide qu'on met sous forme de loi les règles sur lesquelles tout le monde est d'accord... C'est bien beau de dire "moi je fais plus", mais ça n'a pas de sens quand chacun voit le "plus" de façon différente ; c'est même le coeur du problème... > qui est par ailleurs téléchargeable et installable sur son système d’exploitation par n’importe quel utilisateur partout dans le monde. Dans le monde ?... Je crois que tu n'as pas compris le fonctionnement de cette app, ou le problème qu'elle pose. C'est une app administrative Saoudienne qui dématérialise le fonctionnement des autorisations de déplacement des femmes, qui est déjà une pratique courante et légale dans le pays (hélas). La télécharger ailleurs n'aurait aucune utilité, et je doute très fortement que les Saoudiens aient besoin de Google pour savoir que c'est possible...
          Commentaires sur Le RDV Tech 287 – La 5G dans l’espace par Jerome      Cache   Translate Page      
Comme tu le dis, elles se conforment "tant bien que mal" et on laisse passer quelques instants des contenus infâmes qui sont relayés par d'autres acteurs avant que ce ne soit retiré de Facebook, Twitter ou YouTube. Au final, c'est disponible sur Internet mais la porte d'entrée (gigantesque puisque ouverte sur le monde entier) aura été un service d'une grande société mondiale qui préfère filtrer a posteriori plutôt qu'avant la publication. Tu comprends bien que tout ce qui passe par ce genre de services, même si retiré rapidement, se voit offrir une caisse de résonance immense et une diffusion possible immédiate dans le monde entier. Quant à ta dernière phrase, je te répondrai que je me pose personnellement, et je suis sûr que tu en fais de même, bien plus de limites dans mon quotidien que les limites qui me sont contraintes par la loi. C'est ce qui différencie l'éthique du simple respect de la loi. Par ailleurs, lorsque Google autorise sur son store en Arabie Saoudite une application, il en fait de fait la publicité et porte à la connaissance de tous cette application qui est par ailleurs téléchargeable et installable sur son système d'exploitation par n'importe quel utilisateur partout dans le monde. Tu n'y vois pas un problème éthique au-delà du respect stricte de la loi ?
          SyFy vs. The Mynd: Dead in the Water (2018)      Cache   Translate Page      
The all-female crew (Nikohl Boosheri, Nicole Fortuin, Bianca Simone Mannie, Skye Russell, Tanya van Graan, Christia Visser and Amy Louise Wilson) of a rust bucket of a ship is attempting to stop the illegal fishing practices of some Chinese trawler. That’s going to be their smallest problem soon enough, for when they rescue a man drifting half-dead in the water, they invite rather more direct trouble in.

As it turns out, the man is carrying something nasty an evil oil company brought up while making illegal preparations for starting on the exploitation of the Mariana Trench. Soon, paranoia and outright violence set in – their main engineer’s particularly murderous disposition certainly doesn’t help there – but fighting against the thing (cough) that got onto their ship with the stranger will eventually turn out to be more important then fighting each other.

Dead in the Water’s writer/director Sheldon Wilson is still the guy responsible for my favourite SyFy Original, Carny. While the quite considerable number of films he made for SyFy in-between hasn’t always held up to this gold standard, he is still one of the better choices when it comes to making traditional TV genre fare that isn’t infected with the cancer of “irony”. Consequently, this concoction made out of slightly rejiggered bits and pieces of infection horror and The Thing is a neat little movie, unless you turn to SyFy Originals to be blown away by their originality instead of their hopefully deft handling of well-known bits and bobs.

This one’s main claim to originality is obviously its diverse, all female except for a couple of bit parts, cast, the sort of thing that’ll have a certain type of nerd demonstrating their particular brand of heterosexual manliness by running to the hills of movies without girl cooties, or go review-bomb something like real mencowards. The rest of us will happily realize how well Wilson handles this, mainly by not making a thing at all out of his characters’ gender, letting them fulfil the functions in this genre plot in pretty much the same way male characters would. So everyone here is as competent, incompetent, emotional, calm, or violent as in pretty much every other genre film of the same style. Why, it’s as if Wilson believes women are simply people who work like other people! The cast, though not exactly full of well-known faces, handle themselves very well, which is to say, they go through the genre standards they have to handle with competence, dignity, and the calm demeanour of professionals doing their jobs.

The script is just as calm and professional as these performances, hitting the right plot beats at the right moment, and making do with what clearly must have been a tiny budget even for a SyFy Original. Production wise, this is very much “Bottle Episode: The Movie”, with a handful of sets, special effects that barely get the job done, and a pretty impoverished air.


Still, Wilson’s by now so experienced in handling this sort of thing, the resulting film is actually thoroughly entertaining, and generally suspenseful. It’s certainly not an overlooked masterpiece or anything of that sort, but it’s a fine example of straightforward genre filmmaking that’s perfectly alright with being just that.
          737 MAX : Boeing rappelle la procédure en cas de bug      Cache   Translate Page      

Quelques jours après le crash du vol Ethiopian Airlines ET302, Boeing, dans un communiqué en date du 11 mars 2019, précise les mesures entreprises sur les 737 MAX après l’accident du vol Lion Air 610 le 28 octobre 2018. Pendant ce temps, de plus en plus de compagnies renoncent à exploiter leurs 737 MAX 8. […]

L’article 737 MAX : Boeing rappelle la procédure en cas de bug est apparu en premier sur Aerobuzz.


          .NET Core March 2019 Updates – 1.0.15, 1.1.12, 2.1.9 and 2.2.3      Cache   Translate Page      

Today, we are releasing the .NET Core March 2019 Update. These updates contain security and reliability fixes. See the individual release notes for details on included reliability fixes.

Security

Microsoft Security Advisory CVE-2019-0657: .NET Core NuGet Tampering Vulnerability

A tampering vulnerability exists in NuGet software when executed in a Linux or Mac environment. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Exploitation of the vulnerability requires that an attacker can login as any other user on that machine. At that point, the attacker will be able to replace or add to files that were created by a NuGet restore operation in the current users account.

The security update addresses the vulnerability by correcting how NuGet restore creates file permissions for all files extracted to the client machine.

Getting the Update

The latest .NET Core updates are available on the .NET Core download page. This update is also included in the Visual Studio 15.0.22 (.NET Core 1.0 and 1.1) and 15.9.9 (.NET Core 1.0, 1.1 and 2.1) updates, which is also releasing today. Choose Check for Updates in the Help menu.

See the .NET Core release notes ( 1.0.15 | 1.1.12 | 2.1.9 | 2.2.3 ) for details on the release including a issues fixed and affected packages.

Docker Images

.NET Docker images have been updated for today’s release. The following repos have been updated.

microsoft/dotnet
microsoft/dotnet-samples
microsoft/aspnetcore

Note: Look at the “Tags” view in each repository to see the updated Docker image tags.

Note: You must re-pull base images in order to get updates. The Docker client does not pull updates automatically.

Azure App Services deployment

Deployment of these updates Azure App Services has been scheduled and they estimate the deployment will be complete by March 26, 2019.

The post .NET Core March 2019 Updates – 1.0.15, 1.1.12, 2.1.9 and 2.2.3 appeared first on .NET Blog.


          Mengatasi DDoS XMLRPC Exploit WorPress      Cache   Translate Page      
Jadi, hari ini website ini dan beberapa website lain yang berada di server ini mati ti ti ti selama beberapa saat karena DDoS yang dilakukan dari dua IP address berbeda. Dulu semasa kuliah, saya sempat mengira bahwa mana mungkin saya mengalaminya, apalagi …
          13 New ID@Xbox Titles Announced Ahead of GDC 2019      Cache   Translate Page      

Microsoft has announced 13 new ID@Xbox titles ahead of GDC 2019. The list of new games include Beholder 2, Boomerang Fu, CrossCode, Dead Static Drive, Door Kickers: Action Squad, HyperDot, Mowin’ & Throwin’, StarCrossed, Stela, The Forgotten City, Totem Teller, UnderMine and Unrailed.


Here is the lineup of Xbox games that will be at GDC 2019:

Afterparty (Night School Studio) – Xbox Game Pass
In Afterparty, you are Milo and Lola, recently deceased best buds who suddenly find themselves staring down an eternity in Hell. But there’s a loophole: outdrink Satan and he’ll grant you re-entry to Earth.

Beholder 2 (E-Home Entertainment/Alawar Premium Limited) – Announced Today for Xbox One
You are a newly employed department officer within the Ministry of a totalitarian State. While you are poised to have an illustrious career and possibly become Prime Minister someday, the way up won’t be easy. So, how high up the career ladder will you climb? The choice is still yours to make!

Boomerang Fu (Cranky Watermelon Pty Ltd) – Announced Today for Xbox One & Windows 10
Boomerang Fu is a frantic physics-based boomerang brawler for 1-6 players. Choose from an adorable cast of cheery food characters to slice and dice with boomerangs. Discover a ridiculous range of power-ups like wildfire, disguises and telekinesis. Stack them together between rounds to form dangerous combinations.

Buildings Have Feelings Too (Merge Games Ltd/Black Staff Games)
Buildings Have Feelings Too is a light-hearted city builder where you take the role of a building. Help other buildings establish businesses, improve the neighborhood and eventually create a thriving city! Resource management and friendship, all wrapped in buildings with their own personalities and dreams.

Cake Bash (High Tea Frog) – Xbox One X Enhanced
Fight to be the tastiest cake! Cake Bash is a party game for up to four players with very unique hazards – bash your friends, dash away from danger and have a delicious time!

Cat Quest II (PQube/The Gentlebros)
Cat Quest II is an open world action-RPG set in a fantasy realm ruled by animals. Play as a cat and dog as you explore both their kingdoms solo, or with a friend! Quest in a world plagued by war, and go on a catventure like never before!

CrossCode (Deck13 Interactive/Radical Fish Games) – Announced Today for Xbox One, Xbox One X Enhanced
A retro-inspired 2D Action RPG set in the distant future. CrossCode combines 16-bit SNES-style graphics with butter-smooth physics, a fast-paced combat system, and engaging puzzle mechanics, served with a gripping sci-fi story.

Dead End Job (Headup GmbH/Ant Workshop) – Xbox One X Enhanced
Dead End Job sends you into a madcap, Ren & Stimpy-esque world to bust up ghosts. It’s a procedurally generated twin-stick shooter that straps a vacuum pack to your back and puts a plasma blaster in your hand. For you, it’s just another day in the office.

Dead Static Drive (Fanclub) – Announced Today for Xbox One, Xbox One X Enhanced
Grand Theft Cthulhu. An existential road trip adventure game through a nightmare, nostalgic Americana world. Drive through a fictional USA, stopping in small towns, gas stations, and rundown city limits. What starts as a road trip evolves into a game of survival against a progressively oppressive world.

Devil’s Hunt (1C Publishing EU/Layopi Games) – Xbox One X Enhanced
Based on original novel by Paweł Leśniak “Equilibrium,” this third-person action game resurrects the everlasting fight between light and darkness, good and evil, as full-fledged war between Angels and Demons seems imminent and our world is the proposed battleground.

Door Kickers: Action Squad (Killhouse Games/PixelShard) – Announced Today for Xbox One
Door Kickers: Action Squad is an old school side scroller with a touch of strategy and tactics on top of the ridiculous SWAT style action. Literally kick the doors down, blast the bad guys and rescue hostages in explosive Single Player and Coop Multiplayer – with Couch play included.

Family Man (No More Robots/Broken Bear Games)
When pushed to the limits of your own morality, how far would you go for your family?  You owe the mob money and have 30 days to repay. Will you flip burgers and scrape the money together… or get your hands dirty, for more cash, but push your family away?

Hunt: Showdown (Crytek) – Xbox One X Enhanced
Hunt: Showdown is a competitive first-person PvP bounty hunting game with heavy PvE elements, from the makers of Crysis. Set in the darkest corners of the world, it packs the thrill of survival games into a match-based format.

HyperDot (GLITCH/Tribe Games) – Announced Today for Xbox One & Windows 10, Xbox Play Anywhere
Dodge everything in minimal action arcade game, HyperDot.  Quickly evade enemies and test your skills in over 100 hand-crafted trials during campaign mode, outlast your friends in multiplayer battles, or build complex challenges with the custom level editor.

Lonely Mountains: Downhill (Thunderful/Megagon Industries) – Xbox One X Enhanced
Just you and your bike! Take it on a thrilling ride down an unspoiled landscape while descending multiple unique mountains – each offering several different trails to explore. Race, jump, slide and try not to crash while finding your own way down the mountain.

Minion Masters (BetaDwarf) – Xbox Play Anywhere, Xbox One X Enhanced
Dive into 1v1 – or bring a friend to 2v2 – battle in this dangerously addictive fast-paced hybrid of deckbuilder, MOBA, and tower-defense.

Mowin’ & Throwin’ (House Pixel Games) – Announced Today for Xbox One
Mowin’ & Throwin’ is a surprisingly fun pure party game experience where you control lawn gnomes in a chaotic contest to wreck each other’s yards. Go head to head or team up with a real-life friend to take down your other friends.

Operencia: The Stolen Sun (Zen Studios) – Xbox Game Pass, Xbox Play Anywhere, Xbox One X Enhanced
Operencia: The Stolen Sun embraces everything you love about classic first-person dungeon-crawlers, enhancing the old-school turn-based RPG experience with modern sensibilities set to a backdrop inspired by Central European mythology.

Raji: An Ancient Epic (SUPER.com/Nodding Head Games) – Xbox One X Enhanced
Raji: An Ancient Epic is an action adventure game set in Ancient India. Raji, a young girl is chosen by the gods, to stand against the demonic invasion of the human realm, her destiny to rescue her younger brother and face the demon lord Mahabalasura.

Silver Chains (Headup GmbH/Cracked Heads) – Xbox One X Enhanced
Silver Chains is a first-person horror game with a strong emphasis on story and exploration. Search for clues within an old abandoned manor to unravel the truth about the terrible events which have happened here.

Sparklite (Merge Games Ltd/RedBlue Games)
Sparklite is a roguelite brawler-adventure. Using an arsenal of gadgets, guns, and gear, they will battle foes in top-down action combat, solve puzzles, and explore dangerous corners of the world in search of missing gyrocopter parts in an effort to save the Sparklite.

StarCrossed (Whitethorn Digital/Contigo Games Inc.) – Announced Today for Xbox One
StarCrossed is an action arcade game with a magical girl aesthetic and a cooperative twist. Join our cast of 5 space-faring heroes as they travel from planet to planet, working together to strengthen their bond and defeat a looming evil that threatens the galaxy!

Stela (SkyBox Labs) – Announced Today for Xbox One & Windows 10, Xbox One X Enhanced
Stela is a cinematic, atmospheric platformer about a young woman witnessing the final days of a mysterious ancient world.

The Forgotten City (Modern Storyteller) – Announced Today for Xbox One, Xbox One X Enhanced
A re-imagining of the award-winning, critically acclaimed mod with over two million downloads on Xbox One and PC. Like Russian Doll or Groundhog Day in a mythological Roman city, where everyone will die again and again, unless you break the cycle. Cleverly exploit a time loop to solve an ancient mystery. Re-write history.

The Sojourn (Iceberg Interactive/Shifting Tides) – Xbox One X Enhanced
The Sojourn is a thought-provoking first-person puzzle game in which you traverse the parallel worlds of light and darkness in search of answers to the nature of reality. Venture into an enchanting world and face life’s obstacles by solving dozens of unique puzzles through four beautifully crafted chapters.

Totem Teller (Grinning Pickle) – Announced Today for Xbox One, Xbox One X Enhanced
Join a wandering muse in search of inspiration. Gather listeners and retell stories in beautiful, broken places. Recover lost folklore or discard it forever. These stories are yours. Truth is in the telling.

UnderMine (Thorium Entertainment) – Announced Today for Xbox One & Windows 10
Raise up your pickaxe and delve deep into the UnderMine, uncovering its secrets, one peasant at a time. In this action-adventure roguelike, mine gold and discover new combinations of items to take on traps and monsters awaiting below. Rescue friends to unlock permanent upgrades and be the peasant that makes it out alive.

Unrailed! (Daedalic Entertainment/Indoor Astronaut) – Announced Today for Xbox One & Windows 10
Unrailed! is a multiplayer co-op game where you work together with your friends to gather resources and build a train track across endless procedurally generated worlds. Master random encounters with its inhabitants, upgrade your train and keep it from derailing!

Void Bastards (Humble Bundle/Blue Manchu) – Xbox Game Pass
You make the decisions in Void Bastards, a new kind of strategy-shooter. Lead your ragtag prisoners through derelict spaceships and myriad other dangers. Make the right choices about what to do, where to go and when to fight. Master combat, manage ship controls, scavenge supplies, craft improvised tools and more!

Xenosis: Alien Infection (NerdRage Studios) – Xbox One X Enhanced
You are a deep space salvage hunter who discovers the remains of the Starship Carpathian. The ship’s AI will be worth a lifetime of credits. As you dock the port locks down, you are trapped inside. You receive a harrowing transmission from somewhere. A warning, you are not alone.

A life-long and avid gamer, William D'Angelo was first introduced to VGChartz in 2007. After years of supporting the site, he was brought on in 2010 as a junior analyst, working his way up to lead analyst in 2012. He has expanded his involvement in the gaming community by producing content on his own YouTube channel and Twitch channel dedicated to gaming Let's Plays and tutorials. You can contact the author at wdangelo@vgchartz.com or on Twitter @TrunksWD.

Full Article - http://www.vgchartz.com/article/436381/13-new-idxbox-titles-announced-ahead-of-gdc-2019/


          De la cyberviolence vécue au féminin       Cache   Translate Page      
Le cyberespace est un domaine pionnier qui, dans un monde hyperconnecté enfantera un système mafieux, s'il n'est pas régulé. Parce qu'un grand nombre de nos activités sont reliées à cet espace numérique d'une grande vulnérabilité face aux intrusions et piratages perpétrés dans une logique de sabotage, ou tout simplement dans l'intention de nuire. Les acteurs malveillants utilisent à présent tous les moyens disponibles pour parvenir à leurs fins : Exploitation du (...) - Société

          Video: Iowa OL Tristan Wirfs Set A Program Record With Four 450-Pound Cleans      Cache   Translate Page      

Iowa has a history of putting out impressive offensive linemen. Tristan Wirfs may be the next big-time player to come out of Kirk Ferentz’s program. Wirfs, a junior right tackle for Iowa, was an honorable mention All-Big Ten performer in 2018. After seeing his weight room exploits, I certainly wouldn’t be thrilled to go against […]

The post Video: Iowa OL Tristan Wirfs Set A Program Record With Four 450-Pound Cleans appeared first on The Spun.


          PRESENTATION de L'ANNEE 2017/2018 et sommaire au fil des mois      Cache   Translate Page      

Voici comment va se dérouler cette année 2017/2018.... 

J'ai tenté d'être la plus précise possible si vous avez des questions surtout ne pas hésiter!!

 

J'espere que cette présentation vous donnera envie de nous suivre encore cette année! Voici le lien de notre page FACEBOOK: https://www.facebook.com/activitezvous/ 

Nous rappelons que TOUTES les photos sur ce blog ne SONT PAS libre de droits, MERCI de demander l'autorisation avant de vous en servir!

 Nous adoptons cette année une toute nouvelle pédagogie! les OCTOFUN! L'article est ICI

ARNAUD

Cette année scolaire sera divisée en 36 semaines.

Nous ''travaillons" de facon scolaire 4 jours de la semaine, cependant, le but est que ce qui est initialement prévu en début de semaine soit fini pour le dimanche du coup je laisse Arnaud le plus libre possible, afin qu'il gagne en autonomie, il sait que ca doit etre fini pour dimanche à lui de s'organiser. Heureusement c'était deja le cas les années précédente donc aucun soucis la dessus il est habitué. 

Nous ne suivons pas le programme de l'éducation nationale.

En activité extra scolaire Arnaud fait de l'escrime 1h par semaine.

Arnaud va au centre de loisirs à chaques vacances ce qui lui permet de faire d'autres choses ;-)

Cette année nous mettons en place le BULLET JOURNAL, un cahier qui a fonction de cahier de bord, agenda, journal intime etc... Le but est de pousser Arnaud a l'autonomie en lui donnant des méthodes d'organisation et a ce qu'il apprenne à se faire confiance (faire des pages seul).

Ce bullet est donc un outils de travail mais aussi un outils personnel d'expressions, de créations et d'organisation.

Voici un article sur le sujet: ICI (comment j'ai construit celui de cette année 2017/2018 :) )

Il a eu 9 ans le 31 aout, il devrait donc être en CM1. Nous partons plus vers un niveau CM1/CM2 de la librairie des écoles (qui est de bon niveau déjà) avec des dictées trouvées sur le net en niveau CM2.

Ce programme a été totalement élaboré avec l'aide, l'avis et les envies d'Arnaud.

Nous souhaitons totalement l'investir dans ses choix d'apprentissage.

Il est adapté au mieux que l'on peut à sa dysgraphie (copie sur l'ordinateur afin de le familiariser au maximum à cette méthode sous les conseils de sa neuropsychologue) TDA, dyspraxie etc...

 

Nos manuels cette année :

  • Francais : librairie des écoles étude de la langue CM1 + manuel de grammaire CM1/CM2

  • Maths : singapour CM1 + cahier d'exercices A et B

  • Livre histoire de l'art (librairie des écoles)

  • Géographie : librairie des écoles CM1/CM2

  • sciences : cahier de la luciole CM1 et CM2

  • Anglais : Méthode d'anglais Bordas CM1

  • histoire : internet/la classe de Mallory

9782369400462-270x350

9782916788173

I-Grande-20878-manuel-de-mathematiques-cm1-cours-methode-de-singapourcours+ exercice A et B

9782916788333_small

th4LIZ1VT0

9782218945960

Les-cahiers-de-la-luciole-Sciences-CM2

thRXL50A98

 

Livres à lire :

- Otto (exploitation album)

- horizon bleue (histoire)

  • le journal d'adèle (histoire)

  • le vitrail (exploitation album) (texte sur le net)

  • le petit prince (exploitation album)

otto

l-horizon-bleu

9782070612963

petit-prince

 

 

exploitation album :

- 4semaines sur le poeme :(1 lecture du poeme +autres poéme, 1 sur les arts, 1 sur fiches, 1 ecrire un poéme)

- Otto (5 séances : 2 lecture, 2 fiches et 1 discussion seconde guerre mondiale)

- compréhension texte 4 séances.

  • le vitrail 3 séances ( 2 lecture et 1 question) et le petit prince pour la fin des séances.

 

redaction :

cahier écrivain 15 seance :

structurer fiction : 5 séances

structurer texte documentaire: 10 séances

6 autres : au choix
grille relecture mise en place.

 

L'emploi du temps :

Avant de commencer le francais, Arnaud marque la date et la météo en anglais dans la partie rituel ainsi que les 4 opérations de maths. Il a également une petite fiche le lundi et le jeudi (maths, grammaire, conjugaison, enquete, géometrie etc....) voici un exemple chez bout de gomme ICI

 Voici ici son emploi du temps en PDF plus en détail, affiché dans la salle de jeux: emploi_temps_arnaud

 

LUNDI :

matin : francais (copie sur l'ordinateur, lecon, dictée de mots en lien avec la dictée, préparation de verbes)

maths : ( lecon + exercices)

aprés midi : histoire

 

MARDI :

matin : francais (copie sur l'ordinateur, lecon, cahier d'écrivain, fiche de préparation dictée)

maths : ( lecon + exercices)

aprés midi : sciences

 

JEUDI :

matin : francais (copie sur l'ordinateur, lecon, dictée, verbes)

maths : (lecon + exercices)

aprés midi : géographie

 

VENDREDI :

matin : francais (copie sur l'ordinateur, lecon, exploitation d'album, histoire de l'art)

maths : (lecon + exercices)

aprés midi : anglais

 

Sommaire des activités de l'année : 

 

LES FILLES :

Léonore 5ans et Bérénice 3 ans ont décidé cette année de tester l'école le matin.

Elles font également de la GRS.

Nous continuons néanmoins les activités du mois :

 

Cette année le thème sera :

LES EMOTIONS avec l'album : La couleur des émotions ainsi que l'art 

106569148

Tous les 2 mois on découvrira une émotion associée à une couleur, ainsi qu'une œuvre/artiste (avec le loup au musée)accompagné par un bac de découverte à disposition en continue dans la salle de jeux comprenant : un visage mobile, carte nomenclature des émotions et domino.

 

apres chaque periode de 2 mois :

- on mettra une photos en couleur des filles avec l'émotion vue dans le porte revu de l'année

- on fera une bouteille de l'émotion

- un tableau de l'émotion (coloriage/photos œuvre représentant l'émotion)

 

Sommaire de l'année des filles :

Comme pour Arnaud les sommaires seront ajoutés au fil des mois

novembre /decembre :rouge /colere / picasso

janvier /février  : jaune / joie/ devinci

mars /avril : rose / amour/ seurat

mai /juin : peur /noir/ kandinsky

juillet :bleu / tristesse/ warhol

aout: vert / serenité/ matisse

 

 

TOUS LES ENFANTS :

A chaque changement de saison nous faisons la vitre des saisons : peinture sur baie vitrée avec les cartes de nomenclature des fruits et légumes de la saison en cours.

Notre grand theme de cette année est les escargots, notamment les géants d'afrique (trés gros) que nous allons avoir chez nous avec un terrarium etc... (Dora si tu passes par là.... MERCI) Nous en parlerons plus en détail rapidement ;) 

giant-west-african-land-snail

 

Notre matériel sur l'année :

  • 5 grands cahiers pour les lecons et exercices d'Arnaud en 24x32

  • 1 porte revu pour les activités des filles

  • 1 porte revu pour le récapitulatif des semaines faites...

  • 1 classeur avec les feuilles imprimé pour les lecons d'arnaud

  • un bullet rodia pour le bullet journal

  • + évidemment les manuels, trousse, stylos, colle, peinture, ardoise etc etc etc.... 

 

 

 


          Alexandre Dumas’s Magnum Opus Was a Massive Cookbook      Cache   Translate Page      
article-image

Born in 1802, Alexandre Dumas would write some of the most popular books of 19th-century literature. His works, such as The Three Musketeers and The Count of Monte Cristo, are still cultural touchstones today. The grandson of a French aristocrat and a slave of African descent, Dumas climbed the steep ladder of French society through the power of his pen. But in Dumas’s own estimation, his masterwork was to be a massive undertaking on culinary history, one he called Le Grand Dictionnaire de cuisine. Sadly, he never saw it published. The writer’s pet project, which he referred to as “the pillow of my old age,” was released posthumously in 1873, three years after his death.

That he was an accomplished cook and gastronome was evident during Dumas’s lifetime. As a journalist, Dumas published a conversational piece, “Causerie Culinaire,” in 1858. Roughly translated as “A Chat About Cooking,” it was a contemplation of Dumas’s gastronomic life, covering everything from his childhood to a recipe for Neapolitan macaroni. Dumas would follow with other columns on cooking, published in various French daily and weekly papers. The diaries of his contemporaries, such as George Sand, also record the suppers given by la famille Dumas, where Dumas père was occasionally to be found toiling in the kitchen.

In 1869, Dumas gathered his cookbooks and research and moved to the western coast of France to his seaside retreat in Roscoff on Cape Finisterre. There, he set upon the task of writing his gastronomic magnum opus. Early the next year, he sent the manuscript, an 1,150-page tour de force with hand-drawn illustrations, to his friend, the publisher Alphonse Lemerre. But the Franco-Prussian War broke out in July 1870. As a result, the book was set aside by Lemerre, who, mainly a publisher of poetry, was probably utterly confounded by the prospect of editing Le Grand Dictionnaire. Dumas died on December 5, 1870. While Lemerre did publish Le Grand Dictionnaire three years later, he never released a second edition. However, he published an abridged Petit Dictionnaire later.

article-image

Dumas dedicated Le Grand Dictionnaire to his dear friend Jules Janin, a novelist, journalist, and theater critic. In the form of a letter, Dumas takes his friend through the history of French cuisine, recounting the offerings at various royal tables and including tidbits of culinary trivia. For example, Dumas claims that bayonnaise—later called mayonnaise—was invented in the kitchens of the Duke of Richelieu (a legend that is as often repeated as it is disputed). He writes of holding suppers in the 1840s, where he served a particularly delicious salad. The salad was so well-regarded that one of his regular guests, unable to attend a dinner, had it brought to him under the protection of an umbrella.

The preface to the Dictionnaire also includes a “Letter to Readers.” Dumas recommends the “gluttony of delicate souls,” his jovial euphemism for a dinner party. The exemplary host, he advises, gathers together three to nine guests: “never less numerous than the Graces, never more than the Muses.” Along with advice, Dumas regales his readers with descriptions of epic Roman banquets, where guests brought their own golden napkins and feasted on hundreds of tiny birds, such as ortolans. He proceeds to draw elaborate epicurean fantasies of the culinary exploits of the Western world. The United States gets a fleeting mention. “After Paris, the city with the most restaurants is San Francisco,” Dumas writes. “It has restaurants from every country, even China.”

The entries in the Dictionnaire read like a culinary encyclopedia, beginning with “Absinthe” and ending with “Zest.” There’s a recipe to cook elephant, and the entry on celery contains the tenuous claim that people in classical times wore it in garlands during meals to minimize the effects of wine. The book contains a variety of recipes, from the mundane and doable apricot cream cheese to gourmand adventures such as a dish made with sixty rabbit tongues.

But Le Grand Dictionnaire de cuisine is more than a cookbook. Dumas meant it to be a formidable inquiry into both gustation and gastronomy, utilized by enthusiasts and culinary professionals alike. The entries cover ingredients, cooking tools, and cooking techniques. In an early instance of product placement, there are several pages dedicated to the history of mustard as a condiment. At the end, Dumas thoroughly endorses the mustard-maker Bornibus.

article-image

Alan and Jane Davidson, translators and editors of Dumas on Food, a 1978 English abridged edition of Le Grand Dictionnaire, wrote that the French received the Dictionnaire with kindness, but little critical interest. Dumas’s declining fame might have been to blame. The work also had factual errors and an inconsistent format. The Davidsons note that Dumas wrote only half a page on the subject of milk, while the South American wild bird hocco received two. Cheese has two pages, but ambergris, a whale secretion used as flavoring, has five: a curious imbalance for a culinary work aimed at the French public.

Dumas’s historical novels, featuring swashbuckling musketeers and aristocratic scandals, brought him lasting fame. But he had hoped Le Grand Dictionnaire de cuisine would be the crowning jewel in his literary oeuvre. In a twist worthy of a novel, the gastronomic swan song of this 19th century literary maverick is almost constantly overlooked today.


          New report shows IoT devices increasingly being exploited for DDoS attacks      Cache   Translate Page      
A10 Networks has published the findings of a new report into the state of Distributed Denial of Service (DDoS) attack weapons and targets, showcasing the growing use of IoT devices in synchronised attacks on targets globally.
          How to Track Online Malevolent Identities in the Act      Cache   Translate Page      

CircleID CircleID: Want to be a cybersleuth and track down hackers?

It may sound ambitious considering that malevolent entities are extremely clever, and tracing them requires certain skills that may not be easy to build for the typical computer user.

But then again, the best defense is offense. And learning the basics of sniffing out cybercriminals may not only be necessary nowadays, it has become essential for survival on the Web. So where can you begin?

Place Honeypots

Hackers take great care to cover their tracks. So, it's important to catch them with their hand in the cookie jar. You can do so by setting up a bait — called a honeypot — to lure them out. It can take the form of a spammable domain or an easily hackable virtual machine which can appear as legitimate targets.

Once attacked, honeypots help you observe what intruders do to the system, know the tricks that they employ to infect devices, and subsequently find ways to counter them. Such forensic evidence enables law enforcers to track unsolicited access and then locate and catch perpetrators.

Reverse-Engineering Malware

Let's say that despite all the precautions, malware still succeeded in infiltrating your company's system. Instead of losing sleep, you can use the infection to understand how the malicious program operates and what it's been engineered to do, such as what vulnerabilities it's been designed to exploit.

This process is called reverse engineering. It involves disassembling the program to be able to analyze and retrieve valuable information on how it is used or when it was created. It is extremely helpful in finding substantial evidence such as encryption keys or other digital footprints that can lead investigators to the cybercriminals.

Leverage WHOIS Information

When a complaint is received over a dangerous website, the first step in the investigation is to identify the operator of the suspect domain.

This can be done by querying the domain name registry where the site has been registered. A whois database download service, for example, enables users to retrieve the WHOIS data that contains the name, location, and contact details of domain registrants. With this information in hand, security teams can report the matter to law enforcement agents who can then track down malicious operators and apprehend them on the spot.

Inspect Files' Metadata

Once in possession of files and devices from a suspicious entity, you can analyze the evidence that is saved in them and discover crucial details that can be followed back to the source.

Word, Excel, or PowerPoint files, for example, contain relevant information, called metadata, that can blow a hacker's cover. They include the name of the person that created the file, the organization, the computer, and the local hard drive or network server where the document was saved.

It is also important to analyze the grammar used in comments that are embedded in the software code. Socio-cultural references, nicknames, language, and even the use of emojis — all can reveal clues on the nationalities of the criminals or their geographical location.

Go On with Tracerouting

One of the best ways to catch perpetrators is by identifying their IP addresses. However, they usually hide these IPs by spoofing or by bouncing communications from different locations. Luckily, no matter how shrewd and clever these individuals may be, malicious addresses can still be identified through an approach called tracerouting.

The technique works by showing the hostnames of all the devices within the range of your computer and a target machine. More often than not, the last machine's hostname address belongs to the hacker's Internet Service Provider. With the ISP known, investigators can then pinpoint the geographical location and the areas where the culprit is probably situated.

* * *

Every time you venture online, you're exposed to malevolent entities that can harm your system and disrupt business operations. Knowing how to trace the source of an attack can stop it in its tracks and prevent the intervention from happening again.
Written by Jonathan Zhang, Founder and CEO of Threat Intelligence PlatformFollow CircleID on TwitterMore under: Cybersecurity, Malware, Spam, Whois

The post How to Track Online Malevolent Identities in the Act appeared first on iGoldRush Domain News and Resources.


          Barça-Lyon: pour l'exploit, "il faudra marquer", dit Genesio      Cache   Translate Page      
Barcelone - "La qualification se jouera en marquant des buts", a déclaré mardi l'entraîneur de Lyon Bruno Genesio, avant d'affronter le grand Barça en 8e de finale retour de Ligue des champions mercredi (aller: 0-0). La recette ? Jouer "libéré" et "prendre des risques" mais pas trop.
          Help To Get Rid Of Gen:Heur.MSIL.Androm.1      Cache   Translate Page      

Remove Malware Virus

Gen:Heur.MSIL.Androm.1 is a Trojan Trojan Dropped by Gen:Heur.MSIL.Androm.1 are Win32/Kryptik.ARTR, Greetings Worm, Trojan.Downloader.Cutwail.BU, Trojan-Dropper.Win32.Clons.ldp, Swepdat, Slenfbot.AFB, Trojan.Exploit.ANSH, Trojan Horse Generic32.HRP, SoftwareBundler:Win32/MPAccess, Trojan.Downloader.Cutwail.BV, I-Worm.Horty, Trojan.Fakemsc.A Related spyware Spie, AntiSpySpider, Spyware.CnsMin, Stealth Web Page Recorder, StorageProtector, AntiSpyware 2009, Worm.Socks.aa, Worm.Zhelatin.GG, Spyware.Mywebtattoo, MicroBillSys,...
Read more

The post Help To Get Rid Of Gen:Heur.MSIL.Androm.1 appeared first on Remove Malware Virus.


          CNS Unemployment Coverage Distortion Watch      Cache   Translate Page      

When President Obama was in office, CNSNews.com's editorial mission was to spin employment numbers by focusing on irrelevant metrics like labor force participation rate while downplaying how millions of jobs were created, with the goal of making Obama look as bad as possible. Under President Trump, it's the opposite: CNS gushes over Trump no matter how dubious the employment news.

So it is with February's employment numbers. Only 20,000 jobs were created, which is a dismal number. Susan Jones' main story did acknowledge that in her opening paragraph, then spins it away:

The economy added a meager 20,000 jobs in February, well below the 180,000 that analysts were expecting, and among the lowest job-creation numbers of the Trump administration.

But the number of employed Americans grew by 255,000 in February to a record 156,949,000, the 18th record-breaker of the Trump era.

The unemployment rate dropped to 3.8 percent from last month's 4.0 percent, the Bureau of Labor Statistics reported on Friday.

And the labor force participation rate stayed at last month's 63.2 percent, also a Trump-era high.

Needless to say, CNS didn't put that bad job-creation number in the headline, though it would have unquestionably done so if the president was a Democrat. Instead, the headline blared: "156,949,000: Number of Employed Americans Sets 18th Record of Trump Era."

CNS also served up its full complement of sidebars: Terry Jeffrey touting higher manufacturing jobs (though only a mere 4,000 were created) and lower government jobs (though tere was no drop at the federal level), and Craig Bannister highlighting lower Hispanic unemployment (since Hispanics are more politically exploitable for conservatives than blacks).


          Light, Human, and Sexual. Just The Way I Like My Children.      Cache   Translate Page      
Little Children
2006, USA
Todd Fields
35mm


It's not every day you come across a child molestation comedy. Well, not a legal one, at least. The Internet is full of surprises, but a lot of them will get your IP address tracked by the FBI, so it's best to leave well enough alone. Sometimes, no matter how much you'd like to see a naked woman and a pack of wild dogs driven by equal parts lust and hunger, you should just stick to surfing for pictures of Britney Spears' shaved vagina like everybody else. I hear TMZ or whatever crap website Perez Hilton complains about not being famous on has some charming pictures of Lindsay Lohan looking like her coke buzz is wearing off. Maybe check that out instead of googling "funny pederast".





Surpringly, it took me about 20 minutes to find this photo. A 20 seconds to get off to it.



Or, alternately, watch Little Children, a strangely comic look at the dark underbelly of suburbia. A subject explored in only 2 to 3 hundred films in the past few years, Little Children is a refreshingly light take on adultery, pedophilia, and pornography. It's been noted that couples who laugh during sex have sex more often, so judging by the way I responded to this film, I should be quite busy with the next Girl Scout troop I meet. Starring Kate Winslet, Jennifer Connelly, and several people with disturbingly pock- marked faces, the film is certainly not farce or satire, but the tone isn't weighed down by the usual grimness and sobriety that burden films of this type. Instead, there's a humanity and a natural sense of humor. And coupled with narration that sounds like William Burroughs reading fairy tales through a heroin nod, there's a dreamy, upbeat feel to the film.

Speaking of heroin, Winslet is ours, with an added 'e'. She's a bad mother, as inattentive to her daughter as she is to her bushy eyebrows, who starts up a torrid affair with the guy from Angels In America after catching her husband sniffing mail order panties and masturbating to internet porn. Meanwhile, a convicted sex offender moves into the neighborhood, which stirs up a whole hornet's nest worth of trouble. Director Todd Field clearly has learned a great deal about evoking humanity and emotion without grinding things to a heavy- handed halt while voicing Ol' Drippy on Aqua Teen Hunger Force, and those lessons come into play here. By maintaining a non-judgmental moral stance, and letting the characters and situations speak for themselves, Little Children manages to balance the tightrope between humor and exploitation, humanity and drama, and creates a warm, realistic film. For more information, try googling 'realistic pedophile movie'. Just don't tell the FBI I told you to.

Underage? Read a PG-13 review at The Comic Book Bin. Then come over to my house and let me watch you touch yourself. Girls and effeminate boys only need apply.


          Sex Sells?      Cache   Translate Page      

SEX SELLS?


We’ve all seen it, an ad or commercial where the main focus is a ditzy girl with large breasts and ill fitting clothes trying to sell you a product. Time and time again, companies use advertisements objectifying women by associating sex with their products. This ultimately lowers females’ self value and promotes male dominance. This is not a new concept and in fact, has been going on for a long time but do these companies think, or even care, about what they are really saying?

Group 1-Cars

Nice Headlamps." A Tangled Web. N.p., n.d. Web. 10 Dec. 2014.

    <http://www.atangledweb.org/?p=11220>.





This advertisement was a billboard campaign for the used car website UlsterTrader.com. They stated that it was a "use of humour and fun" and that the ad used "light-hearted slang, to what people of both sexes would regard as attractive attributes". Whether that statement is true or not, this billboard is really saying that, like a car, a woman’s body is something that can be processed and men are able to pick and chose only the best and highest desired features. In addition, the subject is faceless which supports the idea that it doesn’t matter how intellectual you are or what your personality may be like, it only matters that you have a nice physique, which includes a pair of “nice headlamps”. This idea is placed upon women and girls and as a result they categorize themselves accordingly. And on top of that, it’s not just the females that are affected by this, males are as well. The billboard is condoling men who think that females are objects to which they are able to use for themselves. The ad also projects this idea to boys and tells them that male dominance is a acceptable way to live in society. Now, while this used car company claims that this ad was made to be light-hearted and funny, I think its quite clear that rather selling used cars, in this billboard, they’re selling self confidence issues and male dominance instead.   



Group 2- Peta


"Peta." She Is Not A Thing. N.p., n.d. Web. 7 Jan. 2015.
    <http://sheisnotathing.wordpress.com/tag/peta/>.


"Sheridyn Fisher PETA Ad." Huffington Post. N.p., n.d. Web. 7 Jan. 2015.
    <http://www.huffingtonpost.com/2012/04/16/
    sheridyn-fisher-peta-ad_n_1429706.html>. 

To start off, Peta stands for People for the Ethical Treatment of Animals. It’s an organization that raises awareness for animal use and cruelty through blogs, videos, and events. Their main slogan is “Animals are not ours to eat, wear, experiment on, use for entertainment, or abuse in any other way”. Sounds like a pretty good organization right? In the advertisements above the target audience are males. I found this interesting because Peta can use sad, emotional ads of helpless creatures being harmed to target women but because men are thought to be tough, sex-craving animals, peta has to show naked women in order to be supported by the male gender. In the first ad it says “turn over a new leaf, try vegetarian” which, without seeing the ad, sounds like a clever phrase. But after seeing the photo, it is clear that turning over a new leaf has subtext that states: remove the subjects marginal clothing, and have uncommitted sex with her because she is sexually ready, as all females should be. The subject in the second photo is playboy model, Sheridyn Fisher, and the ad is saying “Be a bunny’s honey, go vegetarian”. In addition to the skimpy lettuce clothing, the advertisement is putting forth the idea that playboy models will want to be with you as a reward for becoming a vegetarian. When both of these ads are published, it is telling young girls that sexual readiness, big boobs, and a small waistline are what guys look for in a girl and that is how they should determine their self value. As a result, they compare themselves to the photoshopped, airbrushed version of Sheridyn Fisher and put themselves down because that is what they think the standards of being desired or attractive are. The two ads are also telling males that they should become a vegetarian so, as a reward, they can get with some girl, and not because they should legitimately care about animal safety. This further goes on to say that having sex with these ladies should be higher prioritized than having regards for the fair treatment of animals. All in all, Peta may be working to promote awareness for animal cruelty but a slogan that they should take into consideration would be  “Women are not ours to compare, exploit, hit on, use for entertainment, or take advantage of in any other way”.

Group 3- Body Wash And Fragrance


Pinterest. N.p., n.d. Web. 7 Jan. 2015. <https://www.pinterest.com/pin/
    154811305914193785/>.

The image above is three separate ads that have been cropped into one big picture but they all have the same blunt message. Use axe, get laid. They use the images of a woman squirting whipped cream on her bare chest, another woman lacing up a corset, and the last one of a woman holding a whip in relation to a man taking a shower to communicate their slogan, “The cleaner you are, the dirtier you get”. This targets men and uses an oxymoron to imply, in additions to getting laid, the more you use their product the dirtier your sex will be. But truthfully, it is not as simple as “I took a shower today, with axe body wash, therefore I'm going have kinky sex”. This executes huge male dominance because nowhere yet has it even been considered if the girl will even want to have sex. Added on to this male dominance, is the message that women should be okay with this due to the fact that a man's physical appearance/scent is the most important feature in someone.

Group 4- Beer


Video removed by teacher.

"Beer Commercial." Youtube. N.p., n.d. Web. 7 Jan. 2015.
    

When I saw this Guinness commercial, I knew I had to use it because it’s awful. To start, the female subject is being used not just for the pleasure of the men but also as a table. That sends a substantial and direct message that women are objects that men can dominate over and do whatever they want with, as stated in their slogan “Share one with a friend, or two”. That phrase clearly has a deeper meaning than just share some beer with your buds, because the “one” that they are sharing is indeed the female subject. In addition to her being used for sex and being used as a table, Guinness doesn't think it’s necessary to give her a personal pronoun because in the commercial, she’s not a person, she’s a thing. This delivers a message to the male viewers that when you drink, it is tolerable to objectify women, use them to your own advantage, and hey, why not share her because, clearly, it was uncommitted sex so she’s not important to you.


"10 Most Ridiculous Lawsuits." Rant Lifestyle. N.p., n.d. Web. 7 Jan. 2015.
    <http://www.rantlifestyle.com/2014/06/27/10-most-ridiculous-lawsuits/>.

This Budweiser ad depicts three women wearing the label, laying on a blown up image of what the front of a Budweiser’s beer bottle. It is illustrating that women like this beer, so men should drink it if they want to get laid. But don’t worry, it won’t be hard, because these women are attached to the bottle. Therefore wherever there’s Budweiser, there will be attractive females waiting to have sex with you. Which I know, and most other people know, is a false statement. But when you have this ad printed on a billboard for everyone to see, you get young girls who think that that image is what being a woman means and being sexually ready is what you have to do to be considered important in our society. Then, when they do these things to fit into this certain category, they are ultimately objectified. Anybody who has received that treatment, in anyway, can tell you that it feels like crap and doesn't raise your self worth at all. It's even harder for females to see that they’re more than an object when males have grown up thinking that treating women that way is fine.

To sum up, companies objectify women in their ads and commercials in order to sell their products. This tactic does more than just sell their product, it engraves messages in females' minds that they should only be an object that is there to serve men. In relation, it tells males that it is appropriate to dominate over females by treating them like they are temporary and disposable. This leads me to ask myself a question, So what? Why do I care? The answer is simple. I know that there’s more to me than just some object that can be thrown around and I know countless women and men who have influenced me in a way that made me realize that it’s a good thing to have self worth and respect. I am always around young kids, in the dance studio or at camp, who are highly influential and I've gotten to know these kids very well. And unfortunately, not everyone has someone to look out for them and when they are influenced by these companies, they grow up having low self esteem and low self worth. So next time you drive past a billboard or flip through a magazine, I encourage you to take a second and think about the subtext and the effect it has on you and the people around you.


          Et si au menu du réveillon, vous optiez pour la pomme du Limousin      Cache   Translate Page      
La pomme du Limousin qui bénéficie d'une appellation d'origine protégée depuis 2007, est réputée pour ses qualités gustatives exceptionnelles. Elle marie sucre et acidité. Son aire de production concerne une centaine de communes réparties sur les trois départements du Limousin et une franche orientale de la Dordogne et 270 exploitations. Le tonnage annuel moyen oscille entre 80 000 et 90 000 tonnes. A l'occasion du réveillon de la Saint Sylvestre, l'AOP Pomme du Limousin propose une suggestion de recette pour quatre à six personnes : foie gras et chutney aux pommes du Limousin.
          La Juventus se qualifie pour les quarts face à l'Atlético grâce à un Ronaldo stratosphérique (3-0), City assome Schalke à domicile (7-0)      Cache   Translate Page      
Manchester City se balade contre Schalke (7-0) et valide sa place en quarts. La Juventus réalise l'exploit sur son terrain grâce à Ronaldo.
          #92 Jumbo Animals      Cache   Translate Page      
26th December 2013

Jumbo Animals by Cadbury.

Came in a packet, not in a box.

Eaten at 10:20am with a cup of Marks & Spencer Rich Roast Cafe Gold coffee.

2/10 -Where to start? Cadbury Chocolate Animals were a highly favoured staple of almost every party in my youth. Since then, Cadbury have exploited their good name and generally reduced their excellence over the years, (hopefully) reaching their nadir here. The chocolate may be the same, but it certainly doesn't taste as nice as it should - this could be the reflected inglory of the biscuit or maybe purely that gone is the rippled texture that previously popularised their chocolately coating. Moving on to the biscuit, the chocolate flavour manages to be both bland and poor tasting. They are also too dense, losing the slight crumbly edge that was a far better match for a half-chocolate coating. If you must try these, prepare to write to your MCP (Member of Cadbury Parliament) with your undoubted complaints.

8 varieties to go in 5 days

Current varietor = 0.256


          Soudeur(euse) (Saisonniers) - ArcelorMittal Exploitation minière Canada s.e.n.c. - Fermont, QC      Cache   Translate Page      
Installer, assembler et souder les pièces. Relevant du superviseur concerné, le soudeur accomplit tous les genres de travaux tels que soudure, brasure et... $38.44 an hour
From ArcelorMittal Exploitation minière Canada s.e.n.c. - Tue, 15 Jan 2019 20:46:40 GMT - View all Fermont, QC jobs
          Chef de section, Entretien - ArcelorMittal Exploitation minière Canada s.e.n.c. - Port-Cartier, QC      Cache   Translate Page      
Il travaille en collaboration avec l’ensemble des autres services (opérations, service technique, planification, agence maritime) afin d’assurer l’atteinte des...
From ArcelorMittal Exploitation minière Canada s.e.n.c. - Tue, 05 Mar 2019 14:45:52 GMT - View all Port-Cartier, QC jobs
          'Dead-end sweatshop': Oscars' shine doesn't extend to disabled workers      Cache   Translate Page      
A non-profit that's made gift bags for the Oscars and Grammys is facing a class action suit brought on by disabled employees who say they were exploited.
          Father Of The World Wide Web Warns "Perverse Incentives" Have Made The Internet "Dysfunctional"      Cache   Translate Page      

British computer scientist Tim Berners-Lee - known as the inventor of the World Wide Web, says that the internet has become a cesspool of "clickbait and the viral spread of misinformation," which needs to be "changed for the better," reports CNBC

Sir Tim Berners-Lee, Image via Wikimedia Commons

In a Monday letter marking 30 years since he created a blueprint for the WWW in March 1989, the 63-year-old Oxford/MIT professor outlined three "sources of dysfunction" affecting the internet today; malicious behavior such as state-sponsored hacking and online harassment, "perverse" incentives driving misinformation, and unintended negative consequences such as polarizing, unhealthy conversations. 

"Governments must translate laws and regulations for the digital age," said Berners-Lee. "They must ensure markets remain competitive, innovative and open."

Berners-Lee singled out Google and Facebook for rewarding clickbait and misinformation. He has previously knocked the tech giants for exploiting people's personal data. 

"Companies must do more to ensure their pursuit of short-term profit is not at the expense of human rights, democracy, scientific fact or public safety," reads the Monday letter. 

Last October, Berners-Lee's World Wide Web foundation released a new blueprint in order to help put the web back on its original course. Known as the "Contract for the Web," the plan calls for governments to ensure that everyone can connect to the internet - which is kept "available, all of the time," and respects people's "fundamental right to privacy." It also calls on businesses to make the internet affordable to everyone as well as respect data privacy rights. 

One pillar of the contract is treating the web as a basic right for everyone, an idea that is far from reality today. The World Bank estimates roughly half of the world's population still does not have access to the internet. In a report published Monday, the Organization for Economic Cooperation and Development (OECD) found more than four in 10 rural households in OECD countries don't have access to the fast fixed broadband needed to support the Internet of Things, whereas nearly nine in 10 households in urban areas have fast connections. -CNBC

Berners-Lee told Vanity Fair last year that he was "devastated" over what the web had become, and had launched a new online platform and company, Inrupt - described as a "personal online data store," or pod, where everything from messages, music, contacts or other personal data will be stored in one place overseen by the user instead of an array of platforms and apps run by corporations seeking to profit off personal information. The project seeks “personal empowerment through data” and aims to "take back" the web, according to company statements. 

At MIT Berners-Lee has for years led a team on designing and building a decentralized web platform called 'Solid' — which will underlie the Inrupt platform. The Inrupt venture will serve as users' first access to the new Solid decentralized web:

If all goes as planned, Inrupt will be to Solid what Netscape once was for many first-time users of the web: an easy way in. And like with Netscape, Berners-Lee hopes Inrupt will be just the first of many companies to emerge from Solid.

“I have been imagining this for a very long time,” says Berners-Lee.

As described on the Solid and Inrupt websites the new platform will allow users to have complete control over their information 'pods' (an acronym for "personal online data store") — it is only they who will decide whether outside apps and sites will be granted access to it, and to what extent. 

In short, unlike Facebook or Twitter where all user information ultimately resides in centralized data centers and servers under control of the companies, applications on Inrupt will compete for users based on the services they can offer, and only the users can grant these apps "views" into their data, making personal data instantly portable between similar applications.

"The main enhancement is that the web becomes a collaborative read-write space, passing control from owners of a server, to the users of that system. The Solid specification provides this functionality," reads the website. 

Asked whether his plans could impact billion-dollar business models that profit off of controlling user data, Berners-Lee shot back: 

"We are not talking to Facebook and Google about whether or not to introduce a complete change where all their business models are completely upended overnight. We are not asking their permission." 


          Working class: Achievements and the unfinished war for emancipation      Cache   Translate Page      
The Great October Revolution

Michael D. Yates has probed the questions in chapter 4 of his recently released book Can the Working Class Change the World?(Monthly Review Press, New York, October 2018). The chapter – “What hath the working class wrought?” – proclaims: 

“A signal achievement of the working class and peasantry in the global South, both in those countries that made socialist revolutions and those that did not, is the assault they made upon colonialism and imperialism. Before substantive changes could occur in the lives of the masses of people, the control wielded by colonial powers had to be broken and imperialism had to at least be weakened. Workers and peasants did this throughout the impoverished nations of the world.”

No other class has made this achievement, has delivered this duty to millions of millions. It’s unprecedented. It’s historic. It’s a service to humanity, to the peoples of the world. Because imperialism and colonialism are scourges on the face of the earth, threats to the survival of life on this planet. The two – imperialism and colonialism – assault peace, and distort the lives and aspirations of peoples to make life dignified and prosperous. The two unceasingly carry on war against dreams and initiatives to make life humane.

What has the assault on imperialism and colonialism achieved? Peoples, billions in number, in countries once colonised know the answer. First, they can plan their next journey – towards a society free from exploitation, towards a life with dignity. Now, they have a stand on the world stage, a voice once unheard and ignored. It’s broadly the same assertions, declarations, charters, and proclamations, including the United States Declaration of Independence and the English and United States Bills of Rights made: All women and men are equal, all men and women are endowed with certain unalienable rights that include life, liberty, and the pursuit of happiness. It’s an achievement that lays a foundation for building up humanity’s eternal yearning: freedom, freedom from all exploitation, all distortions, all trampling, all muzzling down, all chains, and this freedom is a prerequisite for building up a life happy, peaceful, and prosperous.

The proletariat in Soviet Russia made a far more advanced declaration almost immediately after the Great October Revolution as it declared: Abolish all exploitation, completely eliminate the division of society into classes, mercilessly crush the resistance of the exploiters, establish a socialist organisation of society. [[i]

The declaration, forgotten most of the time by the mainstream media, and even by a part of the pro-people political forces, is one of the most significant political achievements the exploited have so far made as it laid the legal foundation for rights of all the exploited, against all sorts of exploitation, and invalidated all claims of the exploiting classes. The revolutionary political document declared sovereign power of the working people. The historic document declared the abolishing of private ownership of all land, and parasitic sections of society; supremacy of the power of the working people over the exploiters; the complete conversion of all banks, factories, mines, railways, and other means of production and transport into the property of the workers’ and peasants’ state; complete break with the barbarous policy of bourgeois civilisation, which has built the prosperity of the exploiters; freedom of humanity from the clutches of finance capital and imperialism; and democratic peace between nations on the basis of free self-determination of nations. The Declaration is fundamentally different from all declarations of rights the bourgeois and feudal political systems, compromises between them issued until today. 

It directly and unequivocally stood for the rights of the exploited. The declaration made assault on exploitative property relations, and declared measures for empowering the working people to resist the exploiting classes. [[ii]]

“Struggles against [the] class enemy” [of the exploited], writes Professor Michael Yates, “have resulted in tremendous and posi­tive changes in the lives of the oppressed and expropriated.” He refers to the lives of nearly all workers during capitalism’s early days in Europe, to the condition of the peasantry in pre-1949 revolution in China. Improvements in these areas are monumental. 

However, the economist does not miss the fact of life: 

“And yet, work­ers and peasants are nowhere close to their full liberation”. This is the unfinished war of the working class.

It’s – the struggle of the exploited for emancipation – a long struggle. None can ignore this fact. A complete and permanent victory will follow long, innumerable struggles against capital and all its accomplices in lands across the globe, developments within struggles of the exploited and within the decaying force – the imperialist world order.   

The chapter focuses on accomplishments “the work­ing class has achieved in its struggle against exploitation, the first aspect of capitalist oppression.”

On “the second element of this subjugation, expropriation,” the chapter claims: 

“[L]abour unions and political orga­nisations have done some good. Most unions and political parties are committed to racial, ethnic, and gender equality. It is common for collective bargaining agreements to contain broad no-discrim­ination clauses. […] [T]he race, ethnic, and gender composition of union leadership mirrors the share of these groups in the larger population. [….] A few unions, notably those with majority women membership, have female presidents, and both women and minorities now have greater access to better-paying jobs than was once the case. The gap between the wages of women and men is lower in the rich European countries than in the United States, and this can be largely attributed to the demands coming from the labour movement and worker-centred political parties.”

However, as self-criticism, the chapter says boldly: “[T]he labour movement in the global North has done very little to oppose the theft of peasant lands in the global South.”

Absence of resistance to theft of the peasant lands in the global South is not the only area of failure of the labour in the global North. Along with the buying/leasing in of vast tracts of lands in Africa and the establishment of export processing/special economic zones by powerful capital in countries of the global South, powerful parts of world capital are exporting environmentally harmful technology, industrial waste and commodities, and medical products harmful to the health of the global South. The labour in the global North has also failed to organise effective resistance to this assault by capital. It’s part of labour’s unfinished war against the world capital.

These failures originate in (1) capital’s power to corrupt a section of labour leadership, and (2) labour’s lack of success in formulating a revolutionary theory on the related area. It’s an exhibit of the level of political awareness and struggle the labour is waging in the global North. 

However, Michael Yates writes, “[i]n their own countries, the Northern labour has championed policies and programmes, as well as collective bar­gaining provisions, that make workplaces healthier spaces and countries less polluted.”

He mentions the Great October Revolution in Russia:

“The Revolution was successful, in that the Bolsheviks man­aged to consolidate state power. However, this was only after years of civil war, aided and abetted in the most brutal manner by the imperial powers, mainly Great Britain and the United States.”

Although the revolution, the economist writes, was not successful in consolidating the Soviet power and building a working class society, great gains were “made for the work­ers and peasants of Russia, and after the Second World War for the countries in the Soviet bloc. Guaranteed employment, excellent education and healthcare, run by the state and free of charge, subsidised rent and food, exceptional art, literature, music, and science, and a considerable erosion of patriarchy are some of the Revolution’s major achievements, not to mention its primary responsibility for the defeat of the Nazis in the Second World War.”

Regarding the question of the absence of success in some areas by the revolution in Russia, Lenin’s observation should be mentioned: 

“[W]e have sustained the greatest number of reverses and have made most mistakes. How could anyone expect that a task so new to the world could be begun without reverses and without mistakes! [[iii]

Michael Yates cites socialist revolutions in China, Vietnam, and Cuba as achievements of the working class. In China and Vietnam, Professor Michael Yates writes, “great improvements were made in schooling, health, and overall social welfare for the masses of people. Cuba’s Revolution has made tre­mendous advances in the lives of the people. Education, healthcare, organic farming, urban agriculture, and medical research in Cuba are world class. Progress against racism, patriarchy, and homophobia in the country is also remarkable.”

Cuba is spectacular in terms of time. Cuba is unprecedented in terms of political atmosphere. Cuba is exemplary in terms of the existing world order. Why? Anyone can ask. Russia and China are vast landmasses, are rich with huge natural resources. China had Soviet Russia on its back. Cuba had nothing of those. Cuba is still braving an imperialist economic blockade. Cuba is encountering a hostile world market. Moreover, Cuba is at a stone’s throw distance from the most powerful imperialist power. In addition to these, Cuba was standing alone during the time – the time of Gorbachev. It was a time of betrayal. It was a time of setbacks. It was a time of fallen “heroes.” It was a time when survival was a success. Cuba stood bravely. Cuba stood with the Red Flag. Cuba not only strode the current, but also made achievements with its political process – a form of democracy with people’s participation. 

It’s striking performance by ordinary people with the Red Banner, the colour of the exploited. In the history of the world, no other class has survived and performed at this level within such a hostile world environment. And, Cuba is referenced not to belittle revolutions in Russia and China, but to highlight the sense of dignity, courage, tenacity and achievements of the working class.

The chapter of the book begins with a reference to a 2016-general strike by the workers in India: the largest such a strike in the world. About 180 million workers in every Indian state, in all sectors and in nearly every occupation, walked out. Tens of millions of women struck.

The chapter reminds with a modest tone: “Nothing remotely similar could take place in today’s United States, or in any rich capitalist country.” 

This is a fact of working class life, which in many terms depends on capital, making the struggle, and gains and setbacks uneven, almost unpredictable. “And yet, from capitalism’s birth centuries ago, those harmed most by its imperatives have resisted. Their defeats have been many, their victories too few”, says Michael Yates in the chapter that takes an account of gains and losses. Hence, the labour educator says: 

“[The working class through] their struggles have changed the world. Peasants have resisted with their own organised violence the expropriation of their farms and common lands. Wage workers, including those unemployed, have marched, picketed, boycotted, struck, sat-in, sabotaged, stole and destroyed their employers’ materials, and petitioned governments. They have contested capital’s power in every institution of their societies, from schools to media to religion. There have been times when both peasants and workers have engaged in armed battle with both capitalists and governments. In a few cases, alliances of workers and peasants made revolutions – in Russia, China, Cuba, Vietnam. Women were critical in all these alliances.”

No other class has struggled so much, has paid so much. And, all these struggles, all these payments – supreme sacrifices in innumerable numbers – were for the entire humanity, for freeing humanity from the clutches of capital, the most barbaric and brutal force human history has encountered. This is a major gain in this world, which demands a radical change.

Michael Yates writes: “Unions are a universal response of the working class to capital’s oppression. [….] Not only do they win higher wages [and] benefits […], unions also weaken the control employers have over hiring, promotion, layoffs, discipline, the introduction of machin­ery, the pace of work, and plant closings.” This is no less important gain for the working class. 

Citing data, he discusses unionisation/union density and its positive impact in countries across the Americas, Europe, and in many countries in the global South. He says: “Three critical functions of labour unions are that they give work­ers a voice on the job, guarantee due process, and educate their members about a wide variety of important subjects.”

The labour economist, one of his many duties, recollects, “I have had personal experience as a labour arbitrator, and on more than one occasion I reinstated a fired employee, with full back pay, after determining that the company had wrongfully dis­charged him.” Hence, one of the gains by the working class: “Every year, unions win thousands of arbitrations”. On the global scale, in struggles against the world capital, the total number of arbitrations won is huge, which is not a negligible achievement by a class in chains.

One of the achievements of the working class is told in mainstream literature as it refers to an argument: “[A]t a crucial moment in history– the period between WWI and WWII and then in the early post-war years – in some countries, […] the labour movement and its political allies were able […] to force capital into a historical compromise, whereby labour accepted the capitalist organisation of the economy, but in exchange obtained not only a recognition of its prerogatives as labour market intermediary […], but also protection against all sorts of social risks, and a growing expansion of social rights.”[[iv]] This tells of an achievement and of an unfinished war.

For union organisers, the chapter presents, in brief, a good lesson, as it says:

“The formation of a union is a collective effort, and engaging in it, confronting the boss, is bound to make workers think about what they have done and what they hope to achieve. That is, labour unions are bound to raise the consciousness of those who form them. At the same time, labour organisers always try to educate prospective members, and the union itself provides educational materials and may even have developed more formal educational programmes for the rank and file. The best unions insist that new members learn the history of the union, the provisions of the relevant labour laws, the political platform of the union, and the details of bargaining and filing grievances. They might have special meetings, short courses, and longer schooling opportunities for the rank and file. Good unions also work hard to involve members in every facet of union work. Active participation in grievances, strikes, picket­ing, boycotting, and political agitation helps to further strengthen working-class consciousness, making workers stronger in their convictions and willing to live the precept that an injury to one is an injury to all. A working-class way of looking at the world begins to take shape, and this prepares workers for whatever struggles ensue during their lives.”

This is absent in many unions, especially in many countries dominated by lumpenocracy in the global South. In these economies, dominating capital engages hoodlums to organise/control unions. At the same time, a group of non-governmental organisations, on behalf of capital, organises “unions” – a trick with workers, and a bitter reality made possible by a vacuum of revolutionary working class politics and unionisation. In some cases, organisations with medieval ideology organise “unions” in countries. In other cases, a group of big unions from the global North organises “unions” in the countries of the global South with the purpose of taming the working class. In all these mal-efforts, huge money is spent, employees with a fat salary are engaged, and ludicrous foreign trips for these employees, the so-called “union organisers”, are organised. All these efforts forget the slogan of class struggle, shy away from imparting lesson of class politics. It’s an area, where the working class faces one of its unfinished wars.

Burning examples of working class initiatives are, among many, in the landless peasantry’s fights in Brazil, and in Shankar Guha Niyogi’s heroic struggles in India. 

Niyogi, the martyr from the rank of the working class, initiated a struggle while adventurism was taking a high toll. Shankar Guha Niyogi was the founder of the Chhattisgarh Mukti Morcha, a labour union in Chhattisgarh. After the formation of the Communist Party of India (Marxist-Leninist) (CPI (M-L)) on 22 April 1969, he was associated with the CPI (M-L) for some time. However, CPI (M-L)’s failure to adapt Niyogi’s mass line-based activities to the party line of boycott of mass line and mass organisations led to his expulsion from the party. He went underground and began taking his ideas and method of work to the ordinary workers through a Hindi weekly, which he named Sphulinga (Spark), inspired by Lenin’s Iskra. He continued the work of organising the people through movements, e.g. movement for the construction of the Daihan dam, movement of the peasants of Balod for irrigation water, movement of the adivasis (indigenous people) against the construction of the Mongra dam. 

Unions organised by Niyogi include Chhattisgarh Mines Shramik Sangh, whose red-green flag carried the message: red for workers’ self-sacrifice and green for the peasantry. The first struggle of miners under Niyogi’s leadership was a struggle for dignity: do not obey the agreement signed by the leaders, lackeys of factory management. Many struggles by the workers, police atrocities, martyrs, and victories by the workers are marks of struggles led by Niyogi. Unique forms of struggles, organising cultural activities, and establishing athletic clubs, schools and hospital – Shaheed (Martyr) Hospital – for the workers are signatures of his struggle and organisation. On 28 September 1991, assassins hired by class enemies – capitalists – murdered Niyogi, a comrade to follow.       

One important section of the chapter is on labour politics. In this section, Michael Yates writes: 

“[U]nions […] sooner or later they must confront government. The state, at every level, is intertwined with capital, labour’s primary adversary. [….] The largest and most powerful states have virtually unlimited taxing and spending power. Governments make and enforce laws; they have the only legitimate (in the sense of being formally legal) police power. The courts ultimately determine the meaning of the laws. Important components of government regulate a wide array of activities and groups of workers that might concern business […] The state has the power to regulate and influence financial markets […] States wage wars. No matter what the government does, capital exerts its economic power to limit tax liabilities and receive as much public spending as pos­sible, to influence the selection of judges, or to counter anything that challenges its social power. Given all of this, unions have little choice but to be politically engaged.”

The chapter cites an example: “Unions have embraced a range of political programmes and phi­losophies.” It presents a brief history of the labour politics in the US. At the same time, it says: “Around the world, some working-class entities opposed active involvement in what we might call bourgeois politics.” 

Instead of being engaged with bourgeois politics, the working class is to get engaged with politics of its class that crosses all divisive lines of colour, caste, and creed, if the class has to complete its unfinished war, a commitment to the humanity.

Struggles, achievements, and the unfinished war of the working class declare its position, as Lenin said:

“We have made the start. When, at what date and time, and the proletarians of which nation will complete this process is not important. The important thing is that the ice has been broken; the road is open, the way has been shown. [….]

“[W]e have begun it. We shall continue it. […]

“We shall go through the whole ‘course’, although the present state of world economics and world politics has made that course much longer and much more difficult than we would have liked. No matter at what cost, no matter how severe the hardships of the transition period may be – despite disaster, famine, and ruin – we shall not flinch; we shall triumphantly carry our cause to its goal. (op. cit.)

 

* Farooque Chowdhury writes from Dhaka, Bangladesh. 

* Note: This is part five of a seven-part series review of Can the Working Class Change the World?.

Endnotes

[i]“Declaration of Rights of the Working and Exploited People”, V I Lenin, Collected Works, vol. 26, Progress Publishers, Moscow, erstwhile USSR, 1972

[ii]Farooque Chowdhury, “The Great October Revolution: Declaration of Rights of the Working and Exploited People”, Countercurrents.org

[iii]“Fourth anniversary of the October Revolution”, Collected Works, vol. 33, Progress Publishers, 1976

[iv]Lucio Baccaro, “Labor, Globalization and Inequality: Are Trade Unions Still Redistributive?”, International Institute for Labor Studies, ILO, discussion paper, DP/192/2008, Geneva, 2008

Issue Number: 

          Microsoft March 2019 Patch Tuesday, (Tue, Mar 12th)      Cache   Translate Page      
This month we got patches for 64 vulnerabilities. Two of them have been exploited and four have been made public before today.
          Zes jaar cel voor verkrachting van twee jonge meisjes in Park Spoor Noord: “Zien vrouwen alleen maar als seksuele objecten”      Cache   Translate Page      

De correctionele rechtbank van Antwerpen heeft Denis B. (19) veroordeeld tot zes jaar cel voor het verkrachten van twee jonge meisjes. Argjent M. (20) kreeg vier jaar cel voor schuldig verzuim, slagen aan zijn minderjarige vriendin en voor de exploitatie van twee meerderjarige vrouwen in de prostitutie. De rechtbank stelde beide jongemannen ook voor vijf jaar ter beschikking van de strafuitvoeringsrechtbank.


          New Office 0day (CVE-2017-11826) Exploited in the Wild      Cache   Translate Page      
On September 28, 2017, Qihoo 360 Core Security (@360CoreSec) detected an in-the-wild attack that leveraged CVE-2017-11826, an office 0day vulnerability. This vulnerability exists in all the supported office versions. The attack only targeted limited customers. The attacker embedded malicious .docx in the RTF files. Through reversing analysis of the sample C&C, we found that the attack was initiated in August and the launch date of the attack can be dated back to September. It was in this time window that the vulnerability has been exploited as a 0day.

Qihoo 360 Core Security has been the first security vendor to share the details of the vulnerability and coordinated with Microsoft to disclose the news, as well as a timely patch to resolve the Office 0day vulnerability in a week.

The latest version of 360 security products could detect and prevent exploitation of this vulnerability. In the meanwhile, we also highly suggest users to update Microsoft Patch in time.

The In-the-Wild Attack

This attack that Qihoo 360 detected in the wild is initiated with RTF (Rich Text Format) files. The RTF file contains highly targeted phishing subfiles to allure user to open. The attacker triggered a remote arbitrary code execution by using Microsoft Word tags and corresponding attributions. The payload delivery is showed in the below procedure. In this process,the execution code took advantage of a dll hijack vulnerability from a well-known security software. Aftwards, a remote Trojan aiming at stealing sensitive data was installed in the victims’ devices.


Summary & Security Advice

Upon the detection of this 0day vulnerability, 360 has released a hot patch which is available in the latest updates. It enables 360 users to avoid attacks exploiting this new Office vulnerability before Patch Tuesday. Attacks using office 0day vulnerabilities targeting common users have been increasing since the beginning of 2017.

We would like to send a kind reminder to all users that please do not to open any unknown office files. Organizations and enterprises should also be aware of this new 0day and be more cautious of related malicious behaviors. It is also highly recommended to update your 360 security software to protect your devices against any potential attacks.

Acknowledgement

Thanks to Yang Kang, Ding Maoyin, Song Shenlei, Qihoo 360 Core Security and Microsoft Active Protections Program (MAPP) for their contributions to this blog. We also thank everyone from the Microsoft Security Response Center (MSRC) who worked with us in resolving this issue.

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11826



          ’Children are going to die:’ Advocate’s report on Tina Fontaine urges changes      Cache   Translate Page      
Manitoba’s children’s advocate says there are many children in care who are in danger of being sexually exploited or dying almost five years after an Indigenous teenager’s body was found in a river.


          Savage Love      Cache   Translate Page      
Family sexual abuse and the lessons of Leaving Neverland. by Dan Savage

My grandfather was a pillar of the community and beloved by his family. He was also sexually abusive. He died when I was a child. I remember only one incident happening to me—during a cuddle session, he encouraged me to put my mouth on his penis, and then told me to let it be our little secret. I heard rumors as an adult that he molested other kids in the neighborhood. He also had a sexual relationship with my mother. She says nothing happened as a child. But as an adult, he started telling her he loved her in a romantic way. He told her he wanted to take nude Polaroids of her, and she let him. And she loved him—she and her sisters all pretty much idolized him. My one aunt knew (she said nothing happened to her), and I asked her how she reconciled that. She said she compartmentalized it—she thought he was a wonderful father and didn't really think about the other stuff. I did lots of therapy in the late 1980s and early '90s. I read books, I journaled, I talked to my mom and tried to understand what she experienced. And I moved on as much as anyone could. So now it's 2019 and I'm almost 50. My mom just moved into a nursing home, and while cleaning out her drawers, I found the Polaroids my grandfather took of her. I know it was him because he is in some of them, taken into a mirror as she goes down on him. They were taken over a period of years. She had led me to believe he never really did anything sexual with her besides taking photos. But he did. And here's the thing, Dan: In the photos, she looks happy. I know she was probably acting, because that's what he wanted from her. But it just makes me question my assumptions. Was it terrible abuse or forbidden love? Both? What am I looking at? What would I prefer—that she enjoyed it or that she didn't? She kept the photos. Were they fond memories? I know she loved him. She kind of fell apart when he died. Was he a fucking manipulator who had a gift for making his victims feel loved and special as he exploited them for his own selfish needs? I don't know if I'm going to bring this up with my mom. She's old and sick, and I dragged her through these types of conversations in my 20s. So I'm writing you. This is so far out of most people's experience, and I want someone who has heard more sexual secrets than probably anyone else in the world to tell me what he thinks.

Whirlwind Of Emotions

I think you should sit down and watch all four hours of Leaving Neverland, the new HBO documentary by British filmmaker Dan Reed. It focuses on the experiences of Wade Robson and James Safechuck, two now-adult men who were sexually abused by pop star Michael Jackson when they were boys. Allegedly. It's an important film to watch, WOE, but it's not an easy one to watch, as it includes graphic descriptions of the sexual abuse both men claim to have suffered as boys.

The second most disturbing part of the film after the graphic descriptions of child rape—or the third most disturbing part after the credulity/culpability of Robson's and Safechuck's parents—may be what the men have to say about Jackson. Both describe their abuser in romantic terms. They both say they loved Jackson. And they both remain deeply conflicted about their feelings for Jackson then and their feelings for him now. It was their affection for Jackson—their desire to protect him and to safeguard what Jackson convinced both of them was a secret and a bond they shared—that led both men to lie to law-enforcement officials when Jackson was accused of sexually abusing different boys.

You should also listen to Reed's interview on The Gist, Mike Pesca's terrific daily podcast. Reading your letter the morning after I watched Leaving Neverland reminded me of something Reed said to Pesca: "What the film is about is the reckoning. It's two families coming to terms with what happened to their sons. And a big part of understanding that, you know—so why the silence? Why did the sons keep silent for so long? Why did they keep the secret? And the key really is to be able to explain why Wade gave false witness and perjured himself on the witness stand. And the reason for that, of course, has to do with how survivors of sexual abuse experience that. And how they keep a secret and how they sometimes form deep attachments with the abuser and how that attachment persists into adult life."

Your mother, like Robson and Safechuck, lied to protect her abuser, a man who abused her and abused you and probably many others. She may have held on to those photos for the same reason Robson and Safechuck say they defended Jackson: She loved her father, and she was so damaged by what he did to her—she had been so expertly groomed by her abuser—that she felt "loved" and "special" in the same way that Jackson's alleged abuse once made Robson and Safechuck feel loved and special. So as horrifying as it is to contemplate, WOE, your mother may have held on to those photos because they do represent what are, for her, "fond memories." And while it would be a comfort to think she held on to those photos as proof for family members who doubted her story if she ever decided to tell the truth, her past defenses of her father work against that explanation.

Leaving Neverland demonstrates that sexual abuse plants a ticking time bomb inside a person—shit, sorry, no passive language. Leaving Neverland demonstrates that sexual predators like your grandfather and like Jackson—fucking manipulators with a gift for making their victims feel loved and special—plant ticking time bombs in their victims. Even if a victim doesn't initially experience their abuse as a violation and as violence, WOE, a reckoning almost inevitably comes. One day, the full horror of what was done to them snaps into focus. These reckonings can shatter lives, relationships, and souls.

It doesn't sound like your mother ever had her reckoning—that day never came for her—and so she never came to grips with what was done to her and, tragically, what was done to you. And your aunt wasn't the only member of your family who "didn't really think about the other stuff." Just as denial and compartmentalization enabled Jackson and facilitated his crimes (and allowed the world to enjoy Jackson's music despite what was staring us all in the face), denial and compartmentalization allowed your "pillar of the community" grandfather to rape his daughter, his granddaughter, and scores of other children. Like Robson and Safechuck, WOE, you have a right to be angry with the adults in your family who failed to protect you from a known predator. That some of them were also his victims provides context, but it does not exonerate them.

I'm glad your grandfather died when you were young. It's tempting to wish he'd never been born, WOE, but then you would never have been born, and I'm glad you're here. I'm particularly glad you're there, right now, embedded in your damaged and damaging family. By telling the truth, you're shattering the silence that allowed an abuser to groom and prey on children across multiple generations of your family. Your grandfather can't victimize anyone else, WOE, but by speaking up—by refusing to look the other way—you've made it harder for other predators to get away with what your grandfather did.

P.S. There's a moment in the credits for Leaving Neverland that I think you might want to replicate. It involves some things one of Jackson's alleged victims saved and a fire pit. You'll know what I mean when you see it.


On the Lovecast: Yikes! It's the trigger show. Listen at savagelovecast.com.

mail@savagelove.net

Follow Dan on Twitter @fakedansavage

ITMFA.org

[ Comment on this story ]

[ Subscribe to the comments on this story ]


          EternalBlue sigue siendo una grave amenaza para Internet: este nuevo ransomware imita a WannaCry e infecta ordenadores Windows sin actualizar      Cache   Translate Page      

Uno de los mayores problemas de seguridad de los últimos años ha sido EternalBlue. Han sido muchos los equipos que se han visto afectados por esta vulnerabilidad. Muchos exploits se han aprovechado de esta vulnerabilidad. Es el caso de WannaCry, uno de los más populares de los últimos tiempos. Pero no ha sido el único,

El artículo EternalBlue sigue siendo una grave amenaza para Internet: este nuevo ransomware imita a WannaCry e infecta ordenadores Windows sin actualizar se publicó en RedesZone.


          Así es como Google Chrome va a hacerse más seguro: bloqueando las descargas ocultas en Ad-Frames      Cache   Translate Page      

La técnica Drive-by-Download es muy utilizada por los piratas informáticos para enviar software malicioso a los usuarios a través de una web. Esta técnica consiste en ocultar el malware en una web de manera que, de forma automática, este se descargue al ordenador de la víctima simplemente con visitar una web, ya sea mediante exploits,

El artículo Así es como Google Chrome va a hacerse más seguro: bloqueando las descargas ocultas en Ad-Frames se publicó en RedesZone.


          Chef de section, Entretien - ArcelorMittal Exploitation minière Canada s.e.n.c. - Port-Cartier, QC      Cache   Translate Page      
Il travaille en collaboration avec l’ensemble des autres services (opérations, service technique, planification, agence maritime) afin d’assurer l’atteinte des...
From ArcelorMittal Exploitation minière Canada s.e.n.c. - Tue, 05 Mar 2019 14:45:52 GMT - View all Port-Cartier, QC jobs
          Captain Marvel et sa super-héroïne battent des records au box office      Cache   Translate Page      

« Captain Marvel », dernier né de la franchise éponyme de superhéros, réalise un départ tonitruant en affichant le meilleur départ au box office de l’histoire de la série et le 6e de tous les temps. Fort de ses 455 millions de dollars réalisés dès son premier weekend d’exploitation, le film interprété par Brie Larson et...

The post Captain Marvel et sa super-héroïne battent des records au box office appeared first on Archzine- e-zine d`architecture, design d ‘intérieur.


          Le photovoltaïque français : une filière compétitive      Cache   Translate Page      
La CRE publie le bilan des coûts des installations photovoltaïques de grandes et moyennes surfaces. L’analyse porte sur l’ensemble des coûts d’investissements et d’exploitation pour les projets déposés lors des appels d’offres de 2017 et 20 (...)
          Las 31 mejores películas de vampiros de la historia      Cache   Translate Page      

Las 31 mejores películas de vampiros de la historia#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000

Sus raíces se pierden en el origen de los tiempos, con leyendas de necrófagos y espectros devoradores de fuerza vital asolando Europa, y cuyos orígenes pueden rastrearse hasta las sirenas y lamias de la mitología clásica. La leyenda de los seres que dormían en ataúdes y se alimentaban de la energía de los vivos, con más o menos variantes, adquirió visos de auténtica histeria colectiva en algunas zonas de la Europa del este durante el siglo XVIII.

Pero no fue hasta finales de ese siglo, con la publicación de una serie de obras literarias con grandes rasgos en común, que no se dio forma a la figura del vampiro tal y como la conocemos hoy. El relato de 1819 'El vampiro' de John Polidori, 'Carmilla' de Joseph Sheridan Le Fanu en 1872, y la suma de ambos, 'Dracula' de Bram Stoker en 1897, configuraron al vampiro como una criatura maquiavélica y seductora, con elementos tanto de donjuán sobrenatural como de depredador de la noche.

Desde el 'Drácula' apócrifo del cine mudo 'Nosferatu' a las constantes reinvenciones del mito que continúan dejando secas nuestras pantallas, el vampiro nunca ha dejado de estar presente en el cine de terror. 'Drácula' es solo la punta del iceberg: vampiresas, chupasangres y príncipes de la oscuridad de todo tipo han poblado el cine durante más de un siglo. Para recordarlas hemos seleccionado las 31 películas de vampiros más notorias, para que mañana despiertes con dos pequeños orificios en el cuello.

Nosferatu (1922)

Dirección: F.W. Murnau

Reparto: Max Schreck, Alexander Granach, Gustav von Wangenheim, Greta Schröeder, GH Schnell, Ruth Landshoff

La primera película de vampiros vino también acompañada de polémica: era una adaptación no oficial de 'Drácula' de Bram Stoker. De hecho, para evitar problemas legales, palabras como "vampiro" habían desaparecido (sustituida por el magnífico término genérico "nosferatu"), y los nombres de los personajes cambiaron, pasando Drácula a llamarse Conde Orlock. Por supuesto, a la viuda de Stoker no le gustó un pelo, y emprendió una cruzada personal para eliminar todos los negativos de la faz de la Tierra, algo que no consiguió por los pelos gracias a los coleccionistas privados de celuloide.

En cualquier caso, la película es una obra maestra total del primer cine de terror, y una cima del expresionismo alemán junto a clásicos como 'El gabinete del Doctor Caligari' o 'El Golem'. Rebosante de lecturas esotéricas (Murnau y su productor eran estudiosos del ocultismo) y de imágenes tétricamente inmortales, es recordada sobre todo por la encarnación de Max Schreck como Orlock, un actor semidesconocido del que durante un tiempo se dudó de su existencia real, lo que inspiró el argumento de la magnífica 'La sombra del vampiro'.

Crítica en Espinof: Nosferatu

Drácula (1931)

Dirección: Tod Browning

Reparto: Bela Lugosi, Helen Chandler, David Manners, Dwight Frye, Edward Van Sloan, Herbert Bunston, Frances Dade, Joan Standing

Basada más en la popularísima obra de teatro inspirada en la novela de Stoker que en el propio libro, es una de las películas de vampiros más populares de la historia, pese a no ser una de las mejores, ni siquiera dentro del cine de de Tod Browning. Lo que sí resulta indiscutible es el extraño carisma de Bela Lugosi como vampiro seductor e hipnótico, dejando atrás el monstruoso aspecto del conde Orlock. La película le convirtió en una estrella casi por casualidad (el Drácula previsto inicialmente era Lon Chaney, que murió antes de comenzar el rodaje) y marcó irremisiblemente su carrera.

Sin embargo, 'Drácula' está muy afectada por sus orígenes teatrales y paradójicamente, discurre de forma más agarrotada que 'Nosferatu', con pocos escenarios y personajes esquemáticos que suman en uno solo varios de la fuente original. La versión con actores españoles dirigida por George Melford con Carlos Villarías haciendo de Drácula es muy superior, aunque la de Browning posee momentos maravillosamente icónicos, como la presencia de las tres novias o frases ya históricas como "Yo nunca bebo... vino".

Crítica en Espinof: Drácula

Drácula (Horror of Dracula, 1958)

Dirección: Terence Fisher

Reparto: Christopher Lee, Peter Cushing, Michael Gough, Melissa Stribling, Valerie Gaunt, Carol Marsh, Olga Dickie

Pese a que en su día llegó a considerarse una afrenta a la fuente literaria original por sus elevadísimas dosis de violencia y erotismo, nunca antes vistas en pantalla, lo cierto es que el primer Drácula de la Hammer, a diferencia de la también extraordinaria 'La maldición de Frankenstein' de 1957, que se distancia notoriamente de la novela de Mary Shelley, es la encarnación del vampiro de Stoker más fidedigna hasta ese momento. Sobre todo, gracias a la imponente presencia de Chritopher Lee, a la vez un monstruo seductor y un magnético gentleman.

Espléndidamente dirigida por Terence Fisher, con una puesta en escena que hacía que cada rincón del escenario, cada objeto y cada gesto rezumara extrañeza y horror puro, 'Drácula' reconvirtió de nuevo a los vampiros en monstruos, dejando atrás la galantería entre ataúdes. La Hammer rubricaría ocho secuelas directas de Drácula, algunas tan recomendabilísimas como esta primera entrega. Entre ellas cabe destacar 'Las novias de Drácula', 'Drácula, Príncipe de las Tinieblas', 'Los ritos satánicos de Drácula' o la sorprendentemente jugosa 'Drácula 73'

Crítica en Espinof: Drácula

Las novias de Drácula (The Brides of Dracula, 1960)

Dirección: Terence Fisher

Reparto: Peter Cushing, Yvonne Monlaur, David Peel, Martita Hunt, Freda Jackson, Miles Malleson, Andree Melly

Aunque todos recordemos a Christopher Lee como, posiblemente, el mejor Drácula de todos los tiempos, conviene tener claro que la Hammer le hincó el diente al terror vampírico con muchas otras películas del subgénero. Algunas de ellas tan interesantes como las protagonizadas por Lee, como ésta, dirigida también por Terence Fisher, de nuevo con Peter Cushing como Van Helsing, pero con un nuevo catador de sangre (generado, eso sí, por el propio Drácula en persona): el barón Meinster.

La película rebosa momentos impagables, desde la merecidamente mítica secuencia del molino formando una cruz con las aspas a todos los diálogos de la madre del barón, pasando por la fetida resurrección -impresionante para una película de 1960- de una de las novias. Los interesados en la mitología vampírica de la Hammer más allá del Drácula de Lee harán bien en sumergirse en todas las inspiradas por la 'Carmilla' de Le Fanu (menos sofisticadas visualmente que esta, pero muy jugosas, como 'La condesa Drácula' o 'Drácula y las mellizas') o la chifladura total de la Hammer tardía, como 'Capitán Kronos, cazador de vampiros' o 'Kung Fu contra los Siete vampiros de oro'

El último hombre sobre la Tierra (The Last Man on Earth, 1964)

Dirección: Sidney Salkow, Ubaldo Ragona

Reparto: Vincent Price, Franca Bettoia, Emma Danieli, Giacomo Rossi-Stuart, Christi Courtland

Aunque la novela original de Richard Matheson (aquí coadaptándola en el guión) es una de las grandes inspiraciones de 'La noche de los muertos vivientes' de George A. Romero, es sencillo identificar a las criaturas post-apocalípticas que han dejado el planeta hecho un solar con vampiros: descansan durante el día, horas que nuestro protagonista aprovecha para masacrarlos -una idea que después saquearía 'Vampiros de John Carpenter'-. El resto del tiempo, un Vincent Price de perfecta pose melancólica, se lamenta sobre su solitaria situación.

La película sería reformulada en una producción más ambiciosa y taquillera protagonizada por Will Smith en 2007, y que acentuaría el componente vampírico y monstruoso de los seres que deambulan por el planeta. Pero carece de la atmósfera oscura y minimalista que han acabado convirtiendo a esta película coproducida con Italia (ese enrarecido aire europeo le da buena parte de su encanto) en una extraña rareza del cine de vampiros.

El baile de los vampiros (The Fearless Vampire Killers, 1967)

Dirección: Roman Polanski

Reparto: Jack MacGowran, Roman Polanski, Sharon Tate, Alfie Bass, Ferdy Mayne, Jessie Robins, Iain Quarrier

Una singularísima comedia slapstick de ambiente vampírico, tan tontorrona como tronchante, que funciona y es recordada porque se toma muy en serio su parte terrorífica. Ésta, claramente inspirada en las entonces boyantes producciones de la Hammer, aún en su fase más clásica. Prácticamente muda, es también recordada por presentar uno de los escasos papeles coprotagonistas de Sharon Tate antes de ser asesinada por el clan Manson.

La película deja claro en todo momento que Polanski es un auténtico devoto del cine de terror y sus tropos, con su versión tronada de la primera y magistral mitad de la novela de 'Drácula' y la visita de Jonathan Harker al castillo del vampiro. Lo que también deja claro, y es una pena que Polanski no lo cultivara más a menudo, es que el humor blanco y visual (a años luz de la retorcida paranoia bufa de 'El quimérico inquilino') también se le daba francamente bien.

Crítica en Espinof: El baile de los vampiros

Las vampiras (Vampyros Lesbos, 1971)

Dirección: Jess Franco

Reparto: Soledad Miranda, Dennis Price, Victor Feldman, Ewa Stroemberg, Paul Muller, Jesús Franco, Heidrun Kussin

El inclasificable Jesús Franco volvió al mito vampírico una y otra vez a lo largo de su carrera: de la rara rigidez de 'El conde Drácula' a la chifladura de tebeo de 'Drácula contra Frankenstein', pasando por este exploit erótico que toma por asalto la cinefilia galopante de su responsable para subvertir los códigos del vampirismo lésbico que habían puesto de moda las producciones tardías de la Hammer, aunque apretando las tuercas de la explicitud visual.

Franco se salta los tópicos del cine vampírico que no le interesan (la siempre memorable Soledad Miranda es una vampira que toma el sol), hace suyos otros (solo bebe sangre de mujeres) y dinamita el resto, como todo lo que concierne al cazador de vampiros. Aquí el castillo es un chalet y la banda sonora no tiene órganos de iglesia tenebrosos, sino que está construida con un cálido e hipnótico jazz. Como todo Franco, único y particular, y aún así, una de las películas de eurohorror vampírico más notorias.

El rojo en los labios (Les lèvres rouges, 1971)

Dirección: Harry Kümel

Reparto: John Karlen, Delphine Seyrig, Danielle Ouimet, Andrea Rau, Paul Esser, Georges Janin, Joris Collet, Fons Rademakers

Una de las películas más singulares de toda la era del eurohorror de los setenta, en el momento álgido de la exitosa fórmula de la Hammer de saquear 'Carmilla' para adaptar el mito vampírico a los nuevos tiempos, así como en su replanteamiento por parte de productores españoles, franceses y alemanes a golpe de morbo, delirio onírico y erotismo desbocado. En este caso se recurre a la condesa Bathory y su sirvienta, alojadas en un hotel de Brujas a donde llega la pareja protagonista: él quiere presentar a su prometida a su madre.

Con los potenciómetros psicosexuales al once (o más), esta coproducción francobelga y alemana mezcla elementos de giallo y del cine de explotación de la época. Kümel (que pronto dirigiría su estupenda adaptación de 'Malpertius') configuró a su vampiresa (Delphine Seyrig) con elementos de actrices de cine clásico como Marlene Dietrich (y a la sirvienta como Louise Brooks). También le inyectó ciertos aires estéticos propios de los uniformes del nazismo, ya que con ese toque autoritario es como Kümel veía a los míticos chupadores de sangre.

Réquiem por un vampiro (Vierges et vampires, 1973)

Dirección: Jean Rollin

Reparto: Marie-Pierre Castel, Mireille Dargent, Philippe Gasté, Dominique, Louise Dhour, Michel Delesalle

Rollin, capaz de desatar odios furibundos y devoción sin límite, conforma una pieza imprescindible del sinuoso e hipererótico euro-horror de los setenta. Sus historias, cortadas en su mayoría por el mismo patrón de ninfas bebedoras de sangre, más inspiradas en 'Carmilla' que en 'Drácula', son variaciones levísimas a una misma idea que flota en un mundo en el que todo es estética, tules, niebla y castillos en descampados.

Podría haber traído a esta lista las también fabulosas 'La muerta viviente', 'El castillo de las vampiras', 'La violación de la vampira', 'La vampiresa desnuda' o 'El amanecer de los vampiros', pero me quedo con esta pieza extrañísima, prácticamente muda, que se adelanta al mismísimo Tarantino con su historia de dos atracadoras accidentadas que acaban dando tumbos por un castillo misterioso. Influída más que otras de sus películas por la nouvelle vague y por el cómic erótico europeo, 'Requiem por un vampiro' es Rollin puro, y como tal, tan discutible como fascinante.

Sangre para Drácula (Dracula cerca sangue di vergine... e morì di sete!!!, 1974)

Dirección: Paul Morrissey

Reparto: Joe Dallesandro, Udo Kier, Arno Juerging, Maxime McKendry, Milena Vukotic, Dominique Darel, Stefania Casini

Un rarísimo experimento producido por Andy Warhol rebosante de comedia bufa, drama folletinesco, erotismo mediterráneo y terror ultrasangriento cuyo argumento parece salido de una película de Jaimito: Drácula (Udo Kier) necesita vírgenes para alimentarse, y viaja hasta Italia ya que, siendo éste un país tradicionalmente católico, allí habrá más doncellas puras. Por supuesto, aunque divisa a unas cuantas víctimas, ninguna es tan virtuosa como aparenta.

El resultado de esta locura es inusualmente amargo, mucho más que la otra producción Warhol con la que conformó un programa doble delirante, la salvaje y mucho más exploit 'Carne para Frankenstein'. Kier le otorga al conde una melancolía única, atormentado porque los nuevos tiempos y la existencia de galanes como el interpretado por Joe Dallessandro (decidido a acabar con el vampirismo saltando de cama en cama) van a acabar con su vida eterna. Un tema muy propio de los Dráculas modernos (la decadencia del galán depredador clásico, completamente fuera de su tiempo), aquí en una versión más carnal y excesiva que nunca.

Las hijas de Drácula (Vampyres, 1974)

Dirección: José Ramón Larraz

Reparto: Marianne Morris, Anulka Dziubinska, Murray Brown, Brian Deacon, Sally Faulkner, Michael Byrne, Karl Lanchbury

Aunque su erotismo tramontano la ha convertido en una pieza algo caduca (al contrario que la monumental 'Los ritos sexuales del diablo', también de Larraz, aún más marrana pero tremendamente perversa), 'Las hijas de Drácula' sigue siendo una pieza clave del cine vampírico europeo de los setenta. Producida en Inglaterra, el buen pulso de Larraz (que rubricaba estas cosas igual que slashers como 'Descanse en piezas' o 'Al filo del hacha', por no hablar de cosas tan de su momento como 'Violación... ¿y?' o 'Polvos mágicos') y su valentía la hora de enhebrar una atmósfera casi de película de casas encantadas le dan un valor único.

En este caso, el argumento es más tradicional que el de otras películas de la época como 'El rojo en los labios': dos vampiresas provocan accidentes cerca de la mansión en donde viven y mantienen grogui a una de sus víctimas para alimentarse de él. Pero los excesos sanguinolentos, brutales incluso para la época, la puesta en escena histérica y los amasijos de gente en pelotas que corretea por delante de la cámara la hacen destacar sobre otras de la época. Objeto de un reciente, mucho más pulcro y decididamente inferior remake en 2015. Con Fele Martínez.

Martin (1978)

Dirección: George A. Romero

Reparto: John Amplas, Lincoln Maazel, Christine Forrest, Elyane Nadeau, Sara Venable, Francine Middleton, Roger Caine

Una singularísima exploración de la naturaleza de lo monstruoso a manos de un George A. Romero aún ajeno al bombazo internacional que supondría su 'Zombi' ese mismo año. Aquí cuenta la historia de un joven que cree ser un vampiro y se comporta como tal, aunque ni tiene colmillos afilados ni se desintegra con la luz del sol. Pero aún así quiere alimentarse de sangre y está dispuesto a efectuar todos los cortes en cuellos ajenos que sea necesario para conseguirlo.

Este argumento podría pertenecer perfectamente a una comedia negra paródica (como lo sería en parte la posterior 'Besos de vampiro'), pero Romero lo usa para sumergirse en un ambiente opresivo, tan perturbador como la mente de su protagonista. El director consigue inyectar una atmósfera de genuino cine vampírico en una historia que repite constantemente al espectador que no lo es, conduciendo al desconcierto y a una sensación de paranoia constante. Una obra maestra del primer Romero que solo recientemente ha empezando a ganarse una justa consideración de culto.

Nosferatu, vampiro de la noche (Nosferatu: Phantom der Nacht, 1979)

Dirección: Werner Herzog

Reparto: Klaus Kinski, Isabelle Adjani, Bruno Ganz, Jacques Dufilho, Roland Topor, Walter Ladengast, Dan van Husen

El remake de la mítica película muda de Murnau consigue no solo mantener bien el tipo como réplica, sino reformular su logro más complicado: esa indescriptible atmósfera alucinada, como de pesadilla. Herzog llega a ella gracias a las hipnóticas interpretaciones de su trío protagonista: Kinski, por supuesto, con su físico alucinante y su comportamiento enajenado; pero también una Isabelle Adjani que parece con un constante pie en el otro barrio y Bruno Ganz como uno de los Jonathan Harker más frágiles y aterradores de la historia.

Herzog sabe extraer de la novela de Stoker y la película de Murnau los elementos que convierten esta película en una observación sobre las terribles implicaciones de la muerte: el dolor, el olvido y la soledad. Por eso recupera una de las ideas más sugestivas y menos tratadas de adaptaciones previas (ni Universal ni Hammer le prestaron atención, por ejemplo): el vampiro como una plaga infecciosa milenaria que va dejando un reguero de cadáveres apestados allá por donde pasa.

El misterio de Salem's Lot (1979)

Dirección: Tobe Hooper

Reparto: David Soul, James Mason, Lance Kerwin, Bonnie Bedelia, Lew Ayres, Reggie Nalder, Ed Flanders, Elisha Cook Jr.

De acuerdo, es una miniserie para televisión pero la insertamos aquí por haber recibido edición en formato largometraje (en España, bajo el ridículo titulo de 'Phantasma II') y por su extraordinaria calidad pese a las limitaciones catódicas. Adapta una de las mejores novelas de Stephen King y marcó a incontables niños de los ochenta en su pase por Televisión Española, hasta tal punto que para una generación, la imagen del niño vampiro arañando la ventana de su hermano es de las que traumatizan una infancia.

Su mezcla de transformación de los vampiros clásicos (tirando, curiosamente, de la iconografía del más clásico de todos, Nosferatu) con el respeto a la mitología del género (se siguen todas las reglas: la invitación a casa, la estaca, los cazadores, los ataúdes...) da como fruto una película inquietante y de atmósfera espesa, que entiende las grandes virtudes de la novela de King y sabe traducirlas a imágenes. Un clásico menor, pero revisable una y otra vez. Mucho ojo con 'Salem's Lot II', la extrañísima y también muy opresiva secuela, dirigida por Larry Cohen y con Sam Fuller como implacable cazador de vampiros.

Drácula (1979)

Dirección: John Badham

Reparto: Frank Langella, Kate Nelligan, Laurence Olivier, Donald Pleasence, Trevor Eve, Jan Francis

Junto a la estupenda TV-movie dirigida por Dan Curtis, escrita por Richard Matheson y protagonizada por Jack Palance de 1973, esta es la película que configuró al Drácula moderno inyectándole grandes dosis de romanticismo fatalista. En ambas producciones, Drácula se encapricha de una humana (algo nunca del todo bien explicado en la novela) porque es una reencarnación de su amada de tiempos remotos. La versión de Palance (que, por cierto, inspiró físicamente al mítico vampiro de los cómics de Marvel 'La tumba de Dracula), además, incluyó el elemento de Vlad el Empalador por primera vez.

La versión de John Badham de 1979, en cualquier caso, es mucho más ostentosa, con un enfrentamiento que es pura intensidad y miradas que detienen el tráfico entre Frank Langella y Laurence Olivier. Quizás la película, la más romántica de todas las adaptaciones de Drácula, renquea algo porque a Langella le falta visceralidad, pero lo cierto es que adapta por primera vez pasajes de la novela que hasta el momento permanecían inéditos. Lo peor: su existencia frustró una proyectada adaptación de Ken Russell que, desde luego, habría sido para verla.

Crítica en Espinof: Drácula

El ansia (1983)

Dirección: Tony Scott

Reparto: Catherine Deneuve, David Bowie, Susan Sarandon, Cliff De Young, Willem Dafoe, Beth Ehlers, Dan Hedaya

La primera gran película de vampiros de los ochenta es un giro radical y punk de la aún reciente Drácula de Badham: a ritmo de Bauhaus y su significativa declaración de intenciones 'Bela Lugosi's dead', describe un hiperestético, sensorial y videoclipero triángulo amoroso entre (poca broma) Catherine Deneuve, David Bowie y Susan Sarandon, en el que fue el debut de Tony Scott -para muchos insuperado-.

Recuperando las connotaciones lésbicas del vampirismo a lo Hammer (que se asienta de la misma esencia del género: la 'Carmilla' de Le Fanu que inspiró el 'Drácula' de Stoker) y planteando a los vampiros no como seres tragicos y atormentados sino como adictos a una droga que ni les mata del todo ni les deja morir, 'El ansia' se revela como una de las películas de chupasangres más influyentes de las últimas décadas. Son incontables las películas que han bebido de ella en lo temático o estético.

Crítica en Espinof: 'El ansia'

Noche de miedo (1985)

Dirección: Tom Holland

Reparto: Chris Sarandon, William Ragsdale, Amanda Bearse, Roddy McDowall, Stephen Geoffreys, Jonathan Stark

Una de esas mezclas mágicas de comedia y terror que conseguían funcionar perfectamente en los ochenta en ambos campos sin necesidad de caer en la parodia o en el desequilibrio de tono. En este caso lo consigue gracias a un catálogo de personajes entrañables que protagonizan la historia de un chaval que descubre que su vecino es un vampiro que además quiere seducir a su madre. Todo ello gracias a la excelente capacidad de Tom Holland ('Muñeco diabólico', 'Maleficio') para tomarse en serio los planteamientos más desnortados.

Lo consigue además apoyado en un excelente reparto, donde destacan un seductor y grimoso Chris Sarandon como vecino vampiro y un entrañable Roddy McDowall como falso cazavampiros, que usa toda la sabiduría de la cultura pop para acabar con la amenaza. Disfrutó de un estupendo remake en 2011 a la altura de su modelo, con estupendos efectos y ambientación, y Colin Farrell y David Tennant dando perfectamente la réplica a sus precedentes de los ochenta.

Jóvenes ocultos (The Lost Boys, 1987)

Dirección: Joel Schumacher

Reparto: Kiefer Sutherland, Jason Patric, Corey Haim, Corey Feldman, Jami Gertz, Dianne Wiest

Programa doble perfecto con 'Noche de miedo', ya que tiene una buena cantidad de elementos en común: mezcla de horror vampírico y comedia teen, ambiente contemporáneo y algún detalle de guión muy peculiar, como el empleo de la cultura pop como fuente de sabiduría cazavampiros (aquí personificada en un par de devotos de los tebeos de miedo, Corey Feldman y Corey Haim). Pero además, 'Jóvenes ocultos', como no podía ser de otro modo estando dirigida por Joel Schumacher, lleva al límite el homoerotismo y el delirio estético.

De ahí la idea de convertir a los vampiros en moteros (grandioso Kiefer Sutherland como chupasangres que, además, no teme cargar las tintas en lo monstruoso), con toda la estética de cuero y pandillas correspondiente y que, de algún modo, entabla un curioso diálogo posmoderno con la idea del galán a lo Bertín Osborne de 'Noche de miedo'. Fabulosos momentos de impacto y un malvado subtexto anti-establishment adulto por la vía de las citas a 'Peter Pan', para uno de los clásicos impepinables del género en los ochenta.

Los viajeros de la noche (Near Dark, 1987)

Dirección: Kathryn Bigelow

Reparto: Adrian Pasdar, Jenny Wright, Lance Henriksen, Bill Paxton, Jenette Goldstein, Joshua Miller

Una de las mejores películas de vampiros de los ochenta, coincidente en el tiempo y en algunas de sus propuestas con 'Jóvenes ocultos', pero llevándola un paso más allá. La estética de motero salvaje, al margen de la ley, que proponía la película de Schumacher, encuentra en este trallazo de la gran Kathryn Bigelow (y el no menos grande Eric Red coescribiendo el guión) su auténtica naturaleza: como road movie desértica. Cómo compagina Bigelow la fobia al sol de los vampiros con la luz abrasadora de los áridos parajes del sur de Estados Unidos es una de las muchas soluciones ingeniosas de una película que reformula sin miedo la mitología vampírica.

Con interpretaciones espectaculares de Bill Paxton y Lance Henriksen, la película también sirve para desactivar la idea del vampiro como galán que navega en un océano de tiempo y que casi una década antes había propuesto el 'Drácula' de Badham. Aqui hay romance, pero en clave juvenil y pandillera, y cuya gasolina no es una idea romántica y anticuada del amor, sino el sexo, las drogas y el rock. Un western con colmillos que encontaría su réplica una década después con 'Vampiros de John Carpenter'.

Crítica en Espinof: Los viajeros de la noche

Besos de vampiro (Vampire's Kiss, 1989)

Dirección: Robert Bierman

Reparto: Nicolas Cage, Maria Conchita Alonso, Jennifer Beals, Elizabeth Ashley, Kasi Lemmons, Bob Lujan, Jessica Lundy

Una película que se ha ganado su fama de culto por acoger en su seno una de las interpretaciones más enloquecidas de Nicolas Cage. Que ya es decir, pero es que lo de 'Besos de vampiro' es especial: Cage da vida a un agente literario que, tras un encuentro íntimo con una atractiva joven, cree haber sido convertido en un vampiro. Comienza a experimentar fobia a la luz solar y las cruces, se alimenta de cucarachas y se tiene que comprar unos colmillos de plástico porque no hay forma de que le crezcan los auténticos.

Aunque menos opresiva, 'Besos de vampiro' tiene elementos en común con la comentada 'Martin' de George A. Romero: un joven cree que se ha convertido en vampiro y las percepciones del espectador quedan mediatizadas por este estado ilusorio (o no). También con elementos en común con '¿Jo, qué noche!' con la que comparte guionista y que también presenta un descenso dantesco a los infiernos urbanitas, ''Besos de vampiro' tiene mas malicia e inteligencia de lo que parece. Histeria cageniana aparte, es una interesante reflexión sobre la locura y la percepción, usando el mito vampírico como perchero.

Drácula de Bram Stoker (1992)

Dirección: Francis Ford Coppola

Reparto: Gary Oldman, Winona Ryder, Anthony Hopkins, Keanu Reeves, Richard E. Grant, Cary Elwes, Sadie Frost

No tan innovadora en lo temático como se dijo en su momento (casi todas sus propuestas de fidelidad a la obra original de Bram Stoker están ya en la adaptación de Badham), pero absolutamente cautivadora en lo visual. Un aspecto en el que no ha hecho sino crecer con el paso del tiempo, debido a que llegó en el momento en el que el género fantástico empezaba a ser devorado por el abuso de los efectos digitales (solo un año después llegaría 'Parque Jurásico').

Dejando de lado su romanticismo por momentos algo casposo, la obra de Coppola destaca por su imaginativo empleo de los trucajes físicos y tangibles para crear pesadillas (de juegos con perspectivas a sombras chinescas, pasando por fabulosos maquillajes o trampantojos delirantes). Y también por su variopinto reparto, que va de lo estupendísimo (Gary Oldman, Winona Ryder, Tom Waits) a lo algo menos brillante (Anthony Hopkins), pero que en cualquier caso hacen interesantes aportaciones al canon vampírico.

Crítica en Espinof: Drácula de Bram Stoker

Entrevista con el vampiro (1994)

Dirección: Neil Jordan

Reparto: Tom Cruise, Brad Pitt, Kirsten Dunst, Antonio Banderas, Christian Slater, Stephen Rea, Indra Ove

En plena fiebre por el vampirismo decimonónico por culpa de Coppola, esta adaptación de una de las novelas más exitosas del género de todos los tiempos -aunque hoy haya quedado un poco desfasada- superó las negras expectativas que tenía en su contra. No solo eso, sino que en muchos sentidos superó al éxito de 'Drácula de Bram Stoker' gracias a la exquisitez de su puesta en escena y a hallazgos como la casi debutante Kirsten Dunst como Claudia, uno de los personajes vampíricos más sugestivos de los noventa.

Hoy resulta difícil entender hasta qué punto la película fue atrevida: Neil Jordan acababa de ganarse un merecido prestigio global con 'Juego de lágrimas' y ahora se volcaba en una de vampiros, Tom Cruise aún estaba considerado un ídolo teen, y Brad Pitt y Antonio Banderas no habían alcanzado su actual estrellato. Por suerte, la extraordinaria calidad de la película, apasionada, retorcida, violentísima y mórbida, se sobrepuso a los negros designios que la amenazaban.

Crítica en Espinof: Entrevista con el vampiro

Nadja (1995)

Dirección: Michael Almereyda

Reparto: Elina Löwensohn, Martin Donovan, Galaxy Craze, Peter Fonda, Jared Harris, Suzy Amis, Karl Geary

Mientras el cine mainstream reformulaba el mito vampírico con películas tan opuestas entre sí como 'Entrevista con el vampiro' o 'Abierto hasta el amanecer', el cine indie le inyectaba mensajes turbios y retranca posmoderna en películas de bajísimo presupuesto y textura blanquinegra como 'The addiction' de Abel Ferrara o esta 'Nadja'. La primera es casi un tratado filosófico sobre la fe y la culpa muy propio de Ferrara, pero camuflado de película de vampiros. La de Almereyda es un divertidísimo pastiche con colmillos y el beneplácito de David Lynch (cameo incluido).

El enfrentamiento en territorio urbano entre Van Helsing (un Peter Fonda delicioso) y Nadja, la hija del conde Voivoide Arminius Chousescu Dracula, con sus buenas raciones de erotismo lésbico y reformulación de los tópicos del género, tiene mucho de parodia. Pero cuando mejor funciona la película es al adoptar una rarísima solemnidad subrayada por su estética tenebrosa y la música de My Bloody Valentine o Portishead y que delata que Almereyda es tan devoto de Hal Hartley como de Udo Kier. Una rareza que el tiempo no ha hecho sino revalorizar.

Abierto hasta el amanecer (1996)

Dirección: Robert Rodríguez

Reparto: George Clooney, Harvey Keitel, Juliette Lewis, Quentin Tarantino, Salma Hayek, Fred Williamson, Cheech Marin

La revelación internacional de Robert Rodríguez llegó en un momento irrepetible: Tarantino aún estaba cimentando su popularidad, George Clooney solo era conocido por 'Urgencias' y en tiempos pre-Internet se obró el milagro de que muchos espectadores llegaron al cine pensando que iban a ver una de gángsters. Y en cierto sentido, es una de gánsters que se tuerce: con dos mitades perfectamente separadas, esta bronca fiesta vampírica funciona como thriller -Tarantino y Clooney secuestran a una familia con miembros como un Harvey Keitel tronchante y una Juliette Lewis desatada- y también como película de vampiros y acción, anticipándose levemente a 'Blade'.

Un reparto entonadísimo (a todos los anteriores se unen Salma Hayek y una deliciosa ralea de secundarios como Cheech Marin, el mago de los efectos Tom Savini y el dios de la blaxploitation Fred Williamson), sumado a una violencia de tebeo como nunca antes se había visto en pantalla, dan pie a una de las producciones vampíricas más frenéticas de todos los tiempos, una que convierte los excesos de los ochenta en antiguallas artríticas. Frenética y bienhumorada, consigue hasta resultar innovadora a golpe de detalles latinos inyectados en la mitología vampírica.

Crítica en Espinof: Abierto hasta el amanecer

Brácula: Condemor II (1997)

Dirección: Álvaro Sáenz de Heredia

Reparto: Chiquito de la Calzada, Bigote Arrocet, Nadiuska, Javivi, Carla Hidalgo, Héctor Cantolla, Rubén Gálvez, Aramis Ney

Desde luego, no es la más sofisticada de las películas vampíricas de esta lista (ni siquiera la más original: casi todos sus hallazgos están en 'El baile de los vampiros'), pero indiscutiblemente sí una de las más personales. La arrolladora personalidad de Chiquito de la Calzada se apropia del mito de Drácula hasta tal punto que solo cambiando una letra de su nombre, la B de Barbate, transforma una parodia del cine de terror de raíz hispánica en una farsa chiquitistaní que tiene el consabido efecto vírico-verbal en el espectador.

Es curioso cómo Drácula se convirtió en objeto paródico para el cine español de éxito, no solo -lógicamente- en los setenta, cuando el cine de terror "serio" triunfaba en España, sino años después con películas como ésta, 'Buenas noches, señor monstruo' o 'Aquí huele a muerto'. Lo que deja bien claro que junto al western mediterráneo (al que Chiquito ya le dio la suyo en la algo menos divertida 'Aquí llega Condemor, el pecador de la pradera'), el terror vampírico es un género tan español como las tonadillas pachangueras que aquí son parodiadas con letras chupasangres.

Crítica en Espinof: Brácula: Condemor II

Vampiros de John Carpenter (1998)

Dirección: John Carpenter

Reparto: James Woods, Daniel Baldwin, Sheryl Lee, Thomas Ian Griffith, Maximilian Schell, Tim Guinee

Pese a algún problema puntual (caída de ritmo en su tramo final, un Baldwin inapropiadísimo como coprotagonista...), la virulencia y descaro de esta apropiación de John Carpenter de los códigos vampíricos (una de las escasísimas veces que ha partido de monstruos clásicos para sostener una de sus películas) la convierten en una auténtica rareza. Bola extra por hacerlo, además, en una época tan relamida como fue la década de los noventa.

Aquí, James Woods y Daniel Baldwin comandan a un grupo de cazadores de vampiros a sueldo del Vaticano que no se andan con tonterías: lejos de la sutileza de Van Helsing, entran en las guaridas de vampiros y los sacan a estacazos y con la ayuda de cables de tracción a la luz del sol, como vemos en una impresionante escena inicial que ha pasado con todo derecho a lo mejor del subgénero vampírico moderno. Por desgracia, el resto de la película no mantiene ese soberbio nivel, pero aún así, este western con colmillos es una pieza digna de revisión.

Crítica en Espinof: Vampiros de John Carpenter

Blade (1998)

Dirección: Stephen Norrington

Reparto: Wesley Snipes, Stephen Dorff, Kris Kristofferson, Sanaa Lathan, Donal Logue, Traci Lords, Udo Kier

Una de las mejores adaptaciones de un cómic Marvel en una época en la que eso no quería decir absolutamente nada, y que mezcló acción y terror con una sencillez y contundencia que hizo que muchos se preguntaran cómo no se había hecho antes (sí se había hecho, y muy bien, en 'Kung Fu contra los siete vampiros de oro'). Reformulando el mito vampírico con más sutileza de lo que parece (el héroe es un vampiro renegado, las duchas de sangre, el vampirismo como plaga desde las clases dominantes), revitalizando la estética blaxploitation e incluso adelantándose un año a 'Matrix', el impacto de Blade -pese a no ser precisamente una película de prestigio- es indiscutible.

Unos años después llegaría la muy estimable 'Blade II', irregular pero, con todo, quizás la mejor de las películas "comerciales" de Guillermo del Toro, con criaturas y conceptos interesantísimos (como siempre en Del Toro, acerca de la monstruosidad y su esencia) pero horrendos efectos CGI, y abandonando los aires de artes marciales clásicas que hacían especial a la primera entrega. 'Blade III' rubricaría la decadencia de la saga con una entrega horrible, pero para qué lo vamos a negar, también bastante disfrutona.

Crítica en Espinof: Blade

Déjame entrar (Låt den rätte komma in, 2008)

Dirección: Tomas Alfredson

Reparto: Kåre Hedebrant, Lina Leandersson, Per Ragnar, Henrik Dahl, Karin Bergquist, Peter Carlberg

Una de las películas de vampiros más singulares de los últimos tiempos, pese a manejar bazas que ya conocemos: el ambiente gélido, presente en la estimable pero inferior '30 días de oscuridad', el foco en un par de niños y los estallidos de violencia casi insoportable. Tomas Alfredson consigue darle un brío especial a todos estos elementos ya sabidos gracias a su escalofriante, casi inerte sentido del ritmo, para contar la historia de un chaval acosado en la escuela que se hace amigo de una chica de tendencias nocturnas peculiares.

Lo que la hace especial es difícil de describir con palabras, y de hecho, el inevitable remake norteamericano un par de años después, aunque interesante, fue incapaz de retener su magia. Quizás la idea del idilio entre dos niños monstruosos, quizás cómo reformula la figura del vampiro como una sombra trágica y condenada sin caer en tópicos románticos. Quizás el insólito equilibrio entre ternura y retrato de la monstruosidad sin medias tintas. Sea como fuere, una película única.

Crítica en Espinof: Déjame entrar

Sólo los amantes sobreviven (Only Lovers Left Alive, 2013)

Dirección: Jim Jarmusch

Reparto: Tilda Swinton, Tom Hiddleston, Mia Wasikowska, John Hurt, Anton Yelchin, Slimane Dazi, Jeffrey Wright

Una especie de heredera espiritual de 'El ansia' y 'The Addiction', con vampiros enfermizos, sufrientes debido a una vida eterna que implica sobre todo soledad y aburrimiento, y que recupera la estética decadente y postpunk de las criaturas de la noche de los ochenta. Tras un inicio de siglo lleno de brutalidad y contundencia debido al eco del éxito de 'Abierto hasta el amanecer' o 'Blade', Jim Jarmusch parece recordar que los vampiros son perfecto símbolo de la languidez romántica, y nos devuelve esa imagen del vampirismo con una película que parece aislada del tiempo en una burbuja.

Su reparto (Swinton, Hiddleston, Wasikowska, Hurt, Yelchin), increíblemente apropiado, es posiblemente el gran punto fuerte de esta película que difícilmente puede calificarse para todos los gustos, pero que sin duda cautivará a los post-post-post-góticos deseosos de ver a unos cuantos vampiros filosofar sin descanso sobre lo especiales que son y lo estupendamente mal que se encuentran. Entre mordisco y mordisco, claro.

Crítica en Espinof: Sólo los amantes sobreviven

Lo que hacemos en las sombras (What We Do in the Shadows, 2014)

Dirección: Taika Waititi, Jemaine Clement

Reparto: Jemaine Clement, Taika Waititi, Jonathan Brugh, Cori Gonzales-Macuer, Stu Rutherford, Ben Fransham

Aunque es abiertamente una comedia paródica, esta película de un Taika Waititi antes de su salto al mainstream vía Marvel demuestra más conocimiento de las tradiciones vampíricas que muchas películas más solemnes. Su idea de un grupo de vampiros que comparten piso ya es grandiosa, pero se ve reforzada porque cada uno de ellos obedece a un tópico de los bebedores de sangre: el nosferatu hierático, el caballero victoriano, el donjuán nocturno...

La película se ceba en su conflictiva relación con los hombres-lobo, que ya de partida fue ridiculizada en éxitos del humor involuntario como 'Underworld' o 'Crepúsculo'. Todo ello bañado en un tempo cómico personalísimo e infalible, más que puesto a prueba en el anterior proyecto de Waititi y Clement, 'Flight of the Conchords'. Quizás la mejor parodia del fenómeno vampírico, a la altura del baile de Polanski.

Crítica en Espinof: Lo que hacemos en las sombras

Una chica vuelve a casa sola de noche (What We Do in the Shadows, 2014)

Dirección: Ana Lily Amirpour

Reparto: Sheila Vand, Arash Marandi, Dominic Rains, Marshall Manesh, Mozhan Marnò, Milad Eghbali

Con una estética particularísima, pero que a la vez bebe de decenas de fuentes (del spaguetti western a Nadja, pasando por el Lynch de 'Cabeza borradora' o el cine indie de los noventa), esta singular, inclasificable mezcla de película de pandilleros, reflexión sobre el vampirismo y pesadilla rodada con scope estilo western es el sorprendente debut de Ana Lily Amirpour. Cuenta la historia de una vampiresa juvenil que ronda las hiperestéticas calles, casi de tebeo, de una ciudad ficticia iraní.

El gran hallazgo de 'Una chica vuelve a casa sola de noche' es la estética de su vampírica protagonista: el chador como si fuera una capa y la tabla de skate que le permite desplazarse como si flotara son ingeniosas reformulaciones juveniles de los tópicos de los vampiros. Pero Ana Lily Amirpour esconde más sorpresas en la película, y desde la entrañable relación amorosa entre sus dos protagonistas a sus dejes tarantinescos, pasando por el curioso diálogo que establece con la reciente 'Déjame entrar', la convierten en una rarísima pieza del cine de género.

Crítica en Espinof: Una chica vuelve a casa sola de noche

recommendation.header

Las 22 mejores películas biográficas de la historia del cine

Todas las películas de la saga 'Halloween', ordenadas de peor a mejor

Gasolina, diésel, híbrido… Cómo acertar con la propulsión

-
the.news Las 31 mejores películas de vampiros de la historia originally.published.in por John Tones .


          3/12/2019: CANADA: Foreign students ‘easy targets’      Cache   Translate Page      
Female foreign students from South Asia are experiencing sexual harassment by landlords, exploitation by bosses and ethno-cultural double-standards, all the while dealing with their own fears of being deported, say Metro Vancouver community...
          Neil 'The Grifty One' Bush Asked Chinese Dudes For Illegal Campaign Money? That Can't Be Right.      Cache   Translate Page      


We are shocked, shocked to learn that Neil Bush was involved in scammy campaign financing in the 2016 election, oh golly. The Federal Election Commission hit "Right to Rise," the super-PAC that fluffed his brother Jeb's campaign, with a record-setting fine after Neil solicited donations from Chinese nationals Neil was in business with. Mother Jones has the deets on the illegal campaign donation:


Neil Bush, who has extensive business dealings in China, solicited the $1.3 million contribution from American Pacific International Capital (APIC), an international investment holding company where Neil is a board member. Although the contribution to Jeb's super-PAC came from the American arm of APIC, the company's owners are Chinese, and Neil Bush initially solicited the money from two Chinese nationals -- Gordon Tang, the chair of APIC, and Huaidan Chen, a board member. The FEC has fined APIC $550,000 and Right to Rise $390,000.

The total fine, $940,000, is the biggest campaign fine in a single case since the Supremes opened the way to unlimited corporate spending on super-PACs in the Citizens United case. Haha, remember when Barack Obama said at the 2010 State of the Union that decision would "open the floodgates for special interests, including foreign corporations, to spend without limits in our elections," and Samuel Alito angrily shook his head and muttered "not true"? Clearly, Obama owes an apology to Alito: In this case, a foreign company did direct an assload of money at a US campaign, but it got caught this time, so there's no problem!

The donation was the subject of a complaint from those meddling good-government watchdogs at the Campaign Legal Center. The CLC's Brendan Fischer said APIC's

"illegal $1.3 million [donation] is a direct result of Citizens United," Fischer says, since before that 2010 Supreme Court decision, companies could not donate unlimited amounts of money to super-PACs.

It certainly comes as one great big surprise that Neil Bush somehow got caught up in a grifty illegal campaign donation scheme, since he's led such an otherwise blameless life. Wonkette's Ken Layne wrote one of the all-time best summaries of the shady exploits of the often-overlooked Fredo of the Bush boys in 2006, and we're still amazed that "Neil Bush" has somehow never been as notorious a name as "Billy Carter" or "Roger Clinton." Not only did Neil run a crooked savings and loan where he "shuffled millions of dollars to his own oil-exploration front company in Texas while approving hundreds of millions in 'loans' to the S&L;'s other executives," he also managed to walk away from it all without getting prosecuted. Certainly couldn't have anything to do with his daddy being VP at the time of the scandal. That would be an awfully cynical view.

Neil followed up with a whole string of big business deals that traded on the family name (and Poppy Bush's time as US ambassador in China), but just as often failed. And we'd somehow managed to forget the Asian sex tourism that came to light during his 2003 divorce. Well heck, you should NEVER forget the Asian sex tourism! Which apparently happened without Neil even knowing he was a sex tourist, of course:

He admitted in the deposition that he previously had sex with several other women while on trips to Thailand and Hong Kong at least five years ago.

The women, he said, simply knocked on the door of his hotel room, entered and had sex with him. He said he did not know if they were prostitutes because they never asked for money and he did not pay them.

"Mr. Bush, you have to admit it's a pretty remarkable thing for a man just to go to a hotel room door and open it and have a woman standing there and have sex with her," Brown said.

"It was very unusual," Bush said.

We suppose Bush might have tried to argue something similar happened with donations to his brother's US super-PAC, from his Chinese business partners, except that, as MoJo details, Bush actually made the ask in an email. He may have thought he was following the very careful steps that would make a donation from the US subsidiary of a Chinese company legal, but hey, it's Neil Bush, so his conversations with Tang -- in Singapore -- and emails to Huaidan Chen actually documented that the donations were in fact illegally solicited from foreigns. (An American in the US division of APIC was also included in the email solicitation, but that didn't make it legal.)

Which gets to the bigger picture here: Since Citizens United opened the door to unlimited corporate spending on elections, the FEC's punishment of this one instance of foreign money in the 2016 campaign -- helpfully documented by Neil Bush's emails -- may be a fluke:

"Corporations being able to spend unlimited amounts of money in our elections opens the door to foreign influence," Fischer says. "If the actors were a little more sophisticated, they could have avoided an FEC investigation. There's every indication that this is the tip of the iceberg, that foreign money is coming into our elections through nonprofits and corporations, but without any detection."

Got that, would-be campaign scammers? Don't be Neil Bush: Hide your tracks better. Just say the foreign money knocked on your door, walked right in, and had its way with you without you even knowing what was happening, leaving you pleasantly surprised.

The solution to all this is really quite obvious: Since it's really hard to document where exactly campaign money comes from, the Supremes will just have to allow EVERYTHING. It's the American way.

[Mother Jones / Reuters (via CNN)

Yr Wonkette is supported by You The Reader! Send us money so we can always remind you: This shit isn't new!

How often would you like to donate?

Select an amount (USD)


          Tennis - WTA - Indian Wells : Vondrousova crée l'exploit face à Simona Halep       Cache   Translate Page      
Indian Wells perd sa numéro 2 mondiale. Simona Halep a été éliminée ce mardi par la Russe Marketa Vondrousova en trois manches 6-2, 3-6, 6-2...
          'Dead-end sweatshop': Oscars' shine doesn't extend to disabled workers      Cache   Translate Page      
A non-profit that's made gift bags for the Oscars and Grammys is facing a class action suit brought on by disabled employees who say they were exploited.
          Dairy to pay more than $40,000 for worker exploitation      Cache   Translate Page      
Press Release – Ministry of Business Innovation and Employment The owner of a Christchurch dairy will spend the next three months paying back an exploited migrant worker more than $26,000 in unpaid employment entitlements.Media release 12 March 2019 Christchurch dairy and owner to pay more than $40,000 for worker exploitation The owner of a Christchurch […]
          SAT, ACT college test makers defend integrity amid scandal      Cache   Translate Page      
A college entrance exam policy aimed at helping students with disabilities was exploited to enable cheating in what is being described as the biggest school admissions scandal ever prosecuted by … Click to Continue »
          2019 Bernstein Awards Finalist Spotlight: American Prison      Cache   Translate Page      

 

 American Prison

Every year, The New York Public Library gives the Helen Bernstein Award for Excellence in Journalism to a journalist whose work brings clarity and public attention to important issues, events, or policies. In this blog series, we will be focusing on each of the five 2019 finalists. Today, we discuss American Prison: A Reporter's Undercover Journey into the Business of Punishment by Shane Bauer.

American Prison Book Jacket

Iranian Prisoner to American Corrections Officer

Commentary by: Aidan Flax-Clark, Associate Director, Public Programs, 2019 Library Review Committee Member

American Prison is a compulsively readable revelation about life on the inside of a private prison. Shane Bauer, a reporter for Mother Jones, spent four months working undercover as a $9-per-hour guard in the Winn Correctional Center in Louisiana.

Winn is a prison run by Correctional Corporation of America, which boasts that it houses nearly 70,000 of the 128,000 Americans living in private prisons. Bauer's peerless reporting, which relies primarily on secret recordings he made while on the job, reveal a parade of degradations and indignities done to inmates and employees alike, all driven by a company's dedication to its bottom line. He depicts a facility understaffed at nearly every level, where violence is quotidian, medical treatment is laughable, and preventable trauma is shrugged off by everyone.

Alongside the portrait of human suffering, Bauer sketches a history of private prisons in America, and traces the ways in which our country's racist and classist tendencies facilitated a systematic and enduring exploitation of human labor under the auspices of "corrections."

Read Mother Jones, and over 100 other current magazine titles through the Library's subscription to Flipster, a digital magazine platform. 

---

More about the Helen Bernstein Award for Excellence in Journalism

The Helen Bernstein Award for Excellence in Journalism was established by The New York Public Library in 1987 in honor of journalist Helen Bernstein Fealy.  Each year, finalists for are selected by an nine-member Library Review Committee. Winners are then chosen by a separate Bernstein Selection Committee. Eligible books are published in calendar year 2018 and the author must be currently working as a journalist, or someone who has worked in journalism for a significant portion of his or her career, whether as a reporter or commentator in newspapers, magazines, or broadcasting, i.e., print, broadcast, or online journalism. The book's subject matter must be journalistic in nature, with potential for influencing public opinion or policy, and draws public attention to important current issues or events of global/national significance.


          Van Buren man arrested for trading child pornography online      Cache   Translate Page      
The New York State Police Bureau of Criminal Investigation in North Syracuse, with the assistance of the FBI Child Exploitation Task Force, announce the arrest of David H. Mott, age 43, from 432 Delwood Drive in Van Buren, for one count of Promoting a Sexual Performance by a Child, a class “D” felony and three […]
          3/13/2019: INDUSTRIE &SERVICES: Maisons du Monde affiche sa croissance      Cache   Translate Page      

Nouvelle année de croissance pour Maisons du Monde. Les ventes ont progressé de 10 % en 2018 et de 3,1 % à périmètre comparable. Vingt-cinq nouveaux magasins ont ouvert. L’excédent brut d’exploitation gagne 6,6 %, à 148 millions. Les ventes en ligne...
          Proposed disability commission parameters      Cache   Translate Page      
DRAFT TERMS OF REFERENCE FOR A DISABILITY ROYAL COMMISSION:* Consider all forms of violence, abuse, neglect and exploitation of people with disability*...
          Citrix Discloses Data Breach By International Cyber Criminals      Cache   Translate Page      

An enormous data breach by "international cyber criminals" of the famous enterprise software company Citrix was unveiled a weekend ago, reporting the breach of its internal network.

The software company which is known to provide its services, especially to the U.S. military, the FBI, numerous U.S. organizations, and different U.S. government offices was cautioned by the FBI of foreign hackers compromising its IT systems and sneak "business documents," likewise including that the company did not know exactly which records and documents the hackers acquired nor how they even got in, in the first place.

In a blog post Citrix says that, “While not confirmed, the FBI has advised that the hackers likely used a tactic known as password spraying, a technique that exploits weak passwords. Once they gained a foothold with limited access, they worked to circumvent additional layers of security...”
"Password spraying” is an attack where the attackers surmise weak passwords to pick up an early toehold in the company's system in order to launch more extensive attacks.

The enormous data breach at Citrix has been distinguished as a part of "a sophisticated cyber espionage campaign supported by nation-state due to strong targeting on government, military-industrial complex, energy companies, financial institutions and large enterprises involved in critical areas of the economy," said Rescurity, an infosec firm in a blog post.

The researchers at Resecurity shed all the more light on the episode when Citrix refused to disclose the numerous insights regarding the breach, guaranteeing that it had prior cautioned the Feds and Citrix about the "targeted attack and data breach."

In spite of the fact that Resecurity says that the Iranian-backed IRIDIUM hacker group hit Citrix in December a year ago and yet again on Monday i.e. the 4th of March and purportedly stole approximately 6 terabytes of sensitive internal files including messages, emails, blueprints and various other documents as well.

While this Florida-based company focused on the fact that there was no sign that the hackers bargained any Citrix product or service, and that it propelled a "forensic investigation," procured the best cyber security company, and took "actions" to skilfully secure its internal network.


Since the consequences of the Citrix 'security incident' are grave and they could influence a more extensive scope of targets, as the company holds sensitive data on other companies as well, including critical infrastructure, government and enterprises, therefore,  strict measures will be thusly taken to secure it inside-out.


          FXBTG Financial chases its dream 'indomitably' from NZ's Financial Service Providers' Register as at least 3 overseas regulators issue warnings      Cache   Translate Page      
10 McGregor Street, Mt Roskill. Photo: Ray White.

By Gareth Vaughan

A company registered in New Zealand to provide financial adviser services, broking and custodial services and trade foreign exchange on behalf of others with a Cayman Islands parent company operating from a residential address in Auckland's Mt Roskill.

That may all sound a bit unusual. But in reality it's just another entity registered on New Zealand's problematic Financial Service Providers' Register (FSPR). 

This one's called FXBTG Financial Ltd, whose website says; "We chase our dream indomitably."

Registered as a New Zealand company as well as being registered on the FSPR, FXBTG Financial was brought to interest.co.nz's attention last week by a reader.

The reader had previously contacted the Financial Markets Authority (FMA) to draw the regulator's attention to FXBTG Financial, suggesting its website - plus clone websites in Hong Kong and China - in Chinese - are "full of false and misleading information." 

A response from the FMA to the reader said; "We have now assessed the information provided and advise that in this case we will not be taking any further action at this point. However, we will use the information you have provided as part of our on-going monitoring of the financial services sector."

The FMA has powers to direct the Registrar of the FSPR at the Companies Office to deregister and/or prevent businesses and individuals from registering on the FSPR. The FMA can do this if it believes a company is creating a false or misleading impression to investors that the business provides financial services in NZ and is regulated under NZ law. The law also provides for deregistration if registration has, will have, or is likely to have the effect of damaging the integrity or reputation of NZ’s financial markets or NZ’s law or regulatory arrangements.

At least 3 warnings from overseas regulators

Interest.co.nz has found three warnings from overseas regulators about FXBTG Financial. It has featured on the Hong Kong Securities and Futures Commission's (SFC) "alert" list since November 2017. The alert list features entities that have come to the attention of the SFC because they are unlicensed in Hong Kong and are believed to be, or to have been, targeting Hong Kong investors or claim to have an association with Hong Kong.

 In October last year the Central Bank of Ireland issued a press release about FXBTG Financial, describing it as an unauthorised investment firm that's "not authorised by the Central Bank as an investment firm, investment business firm, or to provide investment advice."

"It is a criminal offence for an unauthorised firm/person to provide financial services in Ireland that would require an authorisation under the relevant legislation which the Central Bank is the responsible body for enforcing. Consumers should be aware, that if they deal with a firm/person who is not authorised, they are not eligible for compensation from the Investor Compensation Scheme," the Central Bank of Ireland said.

Additionally Denmark's Financial Supervisory Authority has FXBTG Financial on a list of warnings issued by financial supervisory authorities in European Union countries.

Companies Office records list Garci Capital of the Cayman Islands as FXBTG Financial's shareholder. It's director is listed as Li Xiaomin, who property records also list as the owner of FXBTG Financial's registered office and address for service. This is 10 McGregor Street, Mt Roskill (pictured above, right), over which property records also show ASB holds a mortgage.

'A New Zealand government accredited financial services provider'

Interest.co.nz called FXBTG Financial's phone number three times on Friday. Each time the phone rang and rang until eventually going dead. The same thing happened when we called on Monday morning. However, a fifth call on Monday afternoon was answered. The man who answered, speaking limited English, said the manager, "Alice," was out and he did not work for FXBTG Financial. He took a message and said he'd have the manager call. She is yet to do so.

One FXBTG Financial Chinese language website here notes, in an English translation, that FXBTG Financial is "a New Zealand government accredited financial services provider." As trading products it lists foreign exchange, precious metals, crude oil, shares, and digital currency. It also carries a warning that contracts for difference, or CFDs, are high risk products.

A Google search for Garci Capital only brought up the confusing blurb below.

FMA 'engaging with' FXBTG Financial's director

FSPR records show FXBTG Financial first registered on November 11, 2013 and reregistered on November 21, 2018. So what happened?

A Companies Office spokeswoman told interest.co.nz that, after visits to FXBTG Financial's business address and subsequent correspondence, Registrar of Financial Service Providers Ross van der Schyff was satisfied FXBTG Financial was not in the business of providing financial services and thus should be deregistered.

"During the objection period, an objection to the deregistration was lodged, however, sufficient evidence was not provided during the objection period to show that FXBTG was in the business of providing financial services. The Registrar remained satisfied that deregistration was appropriate and the financial service provider was deregistered under section 18(1)(b) of the Financial Service Providers (Registration and Dispute Resolution) Act 2008 on 19 October 2018," the Companies Office spokeswoman said.

"FXBTG commenced proceedings to appeal the deregistration initiated by the Registrar. Information provided with the appeal documents were sufficient to show that the financial service provider was in the business of providing financial services at the time it was deregistered. The Registrar therefore reregistered FXBTG on the grounds that the Registrar was satisfied that FXBTG was still in the business of providing a financial service at the time of deregistration (Section 22 of the Act). FXBTG was reregistered on the FSPR on 21 November 2018. As a result of the reregistration, FXBTG ceased proceedings."

The Companies Office is under the Ministry of Business, Innovation & Employment (MBIE) umbrella.

An FMA spokesman said the FMA has received complaints about FXBTG Financial.

"At the time those complaints were received, MBIE were going through the process of de-registering FXBTG from the FSPR. With FXBTG being re-registered, the FMA is currently engaging with the director of FXBTG," the FMA spokesman said.

Problems with the FSPR

The FSPR is like a phone directory for the financial services sector. A company being registered on it doesn't mean it's actually regulated or licensed in NZ.

Anyone providing a financial service such as insurers, banks, fund managers and financial advisers, must be registered on the FSPR, which is operated by MBIE's Companies Office. The FSPR records the name, address and financial dispute resolution service membership of the provider, along with the services it's registered to provide and any licences it may have.

Trouble is the FSPR is open to exploitation by overseas based people with nefarious intentions. That’s because a company can register on the FSPR if it has a place of business in NZ, regardless of where in the world its financial services are targeted or provided. This means entities can, and have, set up superficial operations in NZ through virtual offices, or by leasing an office and perhaps employing a person to provide back-office services.

These firms typically register to provide financial services that don't require licensing in NZ, such as foreign exchange, or forex, services. There's no pre-vetting by a NZ regulator, and they usually don't tend to offer financial services within NZ. These entities can, however, use their NZ registration overseas to give a false impression that they are actually regulated in NZ and trade off this country's good name.

In 2017 the FMA told interest.co.nz it had received enquiries about NZ financial service providers from 83 countries, with 340 misconduct reports received from overseas about companies registered on the FSPR. The FMA now publishes online resources about the FSPR in Chinese, Malay and Arabic as these languages reflect the regions of the world representing the biggest number of complaints received from overseas by the FMA.

The Government is planning reforms to the FSPR through the Financial Services Legislation Amendment Bill currently working its way through Parliament. 

“Some mainly offshore-controlled entities have been 'free-riding' off New Zealand’s reputation for sound financial markets regulation by using their registration to imply that they are actively regulated in New Zealand when that is not the case," Commerce and Consumer Affairs Minister Kris Faafoi said when the Government issued a consultation paper in April last year. (My dissection of the Government's plan is here).

The image and text below are from FXBTG Financial's website.

*This article was first published in our email for paying subscribers early on Tuesday morning. See here for more details and how to subscribe.


          Cyber security threat to New Zealanders and their businesses is growing even if it is hard to quantify, with CERT citing a significant increase in email extortion scams      Cache   Translate Page      

National Computer Emergency Response Team (CERT) NZ director Rob Pope admits the findings of its latest report, that New Zealanders lost $14 million to cyber security attacks in 2018, is just the tip of the iceberg.  

CERT's latest quarterly report shows it received the highest number of incidents reported in a single quarter since it began issuing quarterly reports in August 2017. CERT received over 1,300 cyber security issues between October and December last year from businesses and individuals around the country.  

In the last quarter of 2018 New Zealanders reported losses of over $5.9 million, bringing the total financial loss reported to more than $14 million in 2018.  Reports increased by more than 60% from the third quarter across every region in New Zealand, except Auckland, which saw an increase of 47%.

But CERT director Rob Pope says the true scale of the problem is no doubt much larger.

“We know that the data we have is just the tip of the iceberg, and we encourage more people to report to us so they can get the help they need to recover and we can get more information about how the cyber threat landscape is affecting New Zealand,” Pope says.

He admits it isn’t easy quantifying the true size of the problem.

“The challenge of understanding the scale of unreported incidents is a global issue. But the reports we’ve received this quarter show that these incidents are not only causing financial impact, they’re also affecting people’s confidence online. For instance, scam reports have spiked in quarter four, with a significant increase in email extortion scams,” Pope says.

“This is where attackers email a seemingly legitimate threat and demand urgent payment to revoke it – examples we’ve seen include bomb threat emails sent to businesses through to threats of sharing embarrassing images.

“Whether you’re an employee in a large company or checking your personal emails at home, receiving an extortion email can be a frightening experience. Even though it’s highly unlikely these threats would be realised, they can discourage people from participating in the online environment.”

Netsafe CEO Martin Cocker says the figures in the CERT report aren’t surprising. The organisation is an independent, non-profit group which provides New Zealanders with information and support about online safety. 

“CERT NZ is only a couple of years old and as it becomes more well-known they will see their reported numbers go up and up,” Cocker says.

He says there’s always going to be a difference between the number of businesses and people who experience cyber security issues and the number who report it.

But Cocker says Netsafe, like CERT NZ, it is also seeing higher numbers of people reporting such problems.

“It’s not to say the internet is less safe,” Cocker says.

He says it just that people are now more aware of who to contact if they are the victim of a cyber security attack.

“When you see that CERT NZ has received five times the number of cases, a lot of that is just their growth,” Cocker says.

He agrees with Pope that quantifying the true cost of cyber security is difficult.  

“What CERT NZ can report, and Netsafe is the same, is directly reported cases. But the actual cost of cyber security in New Zealand will be a magnitude higher than that. And I don’t think there’s any doubt that the true cost would be in the hundreds of millions.”

Cocker says the CERT report does highlight the growth in scams. He refers to the sexploitation scam which was a widespread cyber security issue last year.

People received an email that claimed their computer had been hacked and that the scammer has recorded them using a porn website. The email would demand that they send a payment (often in bitcoin) to the scammer, or they will send the recording to the victim’s personal contacts which they claim to have access to. But Cocker says despite the number of victims that were targeted it often failed.

“I don’t think it was very successful because most of the people targeted didn’t know how to pay in bitcoin.”

Also see our series on the Commission for Financial Capability's Little Black Book of Scams here.


          TKC MUST READ!!! JOCO SOB TESTIMONY & THE FIGHT FOR A MAN'S RIGHTS!!!      Cache   Translate Page      
From one of the very best bloggers in all of the metro . . . Here's an up close & personal glimpse at one man's journey through the Johnson County Court system amid a messy divorce.

It's a must read for anybody thinking about tying the knot or dumping the ball & chain. The post might not be politically correct and certainly takes one side of an argument but there is no doubting the candid and raw power of the work. Checkit:

Lies, lies, lies and the truth
          SAT, ACT college test makers defend integrity amid scandal      Cache   Translate Page      

A college entrance exam policy aimed at helping students with disabilities was exploited to enable cheating in what is being described as the biggest school admissions scandal ever prosecuted by federal authorities, according to court papers made public Tuesday. At least 50 people were charged in the scheme, which included not only cheating on the […]
          US REGIME CHANGE BLUEPRINT PROPOSED VENEZUELAN ELECTRICITY BLACKOUTS AS ‘WATERSHED EVENT’ FOR ‘GALVANIZING PUBLIC UNREST’      Cache   Translate Page      

SOURCE: THE GRAYZONE
THE US-FUNDED CANVAS ORGANIZATION THAT TRAINED JUAN GUAIDO AND HIS ALLIES PRODUCED A 2010 MEMO ON EXPLOITING ELECTRICITY OUTAGES AND URGED THE OPPOSITION “TO TAKE ADVANTAGE OF THE SITUATION…TOWARDS THEIR NEEDS”
BY MAX BLUMENTHAL
A September 2010 memo by a US-funded soft power organization that helped train Venezuelan coup leader Juan Guaido and his allies identifies the potential collapse of the country’s electrical sector as “a watershed event” that “would likely have the impact of galvanizing public unrest in a way that no opposition group could ever hope to generate.”

The memo has special relevance today as Guaido moves to exploit nationwide blackouts caused by a major failure at the Simon Bolivar Hydroelectric Plant at Guri dam – a crisis that Venezuela’s government blames on US sabotage.

It was authored by Srdja Popovic of the Center for Applied Non-Violent Action and Strategies (CANVAS), a Belgrade-based “democracy promotion” organization funded by the US government that has trained thousands of US-aligned youth activists in countries where the West seeks regime change.

This group reportedly hosted Guaido and the key leaders of his Popular Will party for a series of training sessions, fashioning them into a “Generation 2007” determined to foment resistance to then-President Hugo Chavez and sabotage his plans to implement “21st century socialism” in Venezuela.


          04/02/19: Barry Lopez Horizon - Parkway Central Library      Cache   Translate Page      

Barry Lopez won the National Book Award for Arctic Dreams, a "rich, abundant, vigorously composed" (Boston Globe) meditation on his travels in the barren but beautiful far North. His other work includes Of Wolves and Men, Crow and Weasel, and Resistance. Texas Tech University's Visiting Distinguished Scholar, he has earned Guggenheim, Lannan, and National Science Foundation fellowships. In Horizon, Lopez immerses readers in six far-flung regions of the world as he ponders man's explorations and exploitations of nature amidst a very personal search for purpose in a fractured world.

Horace W. Goldsmith Foundation Endowed Lecture

04/02/19, 7:30 P.M. - Parkway Central Library
          Air Canada forcé d'annuler au moins quatre vols      Cache   Translate Page      
La décision du Royaume-Uni d’interdire l’exploitation des appareils Boeing 737 Max dans son espace...
          UK police launch internet safety campaign for 4-year-olds - [Sepe.gr]      Cache   Translate Page      
Image

Cartoons are designed to tackle 'disturbing' rise of online sexual exploitation Δείτε περισσότερα: FT.com


          Bayern Munich tells old club what they must NOT do to beat Liverpool      Cache   Translate Page      
The Bavarians welcome the Reds to the Allianz Arena for the second leg of their last-16 tie on Wednesday after their first meeting ended goalless at Anfield.Matthaus, who won seven Bundesliga titles and the UEFA Cup with Bayern during his playing career, as well as the World Cup with Germany, is wary of the threat posed by Jurgen Klopp’s side on the counter-attack."0-0 is a decent result on the face of it but of course Bayern don't have an away goal, and that's all the more dangerous when you're playing Liverpool, who carry a huge attacking threat," he told Sky in Germany."Bayern have to find the right balance - don't concede, and score one themselves, that's all they need."But the balance is very important - and also very dangerous: a bit too attacking, and Liverpool can exploit that; too defensive, then that'll maybe reduce Bayern's own attacking threat."They've got to score a goal somehow, because I don't believe that in a game like this you can aim for a 0-0.""You start with a solid defensive game, in the same way they played in Liverpool, but definitely not too defensive."Firstly they're playing at home, and secondly they've got to get a goal, but actually in recent weeks Bayern have been good at the back, compact, and that's how you keep in check a strong attack like Liverpool's."You can't throw everything at Liverpool from the start, no coach would be that crazy, because we know how strong Liverpool are, and that's why the approach in the first leg was a bit more cautious than in other Champions League games."
          Nancy Pelosi: "I'm Not for Impeachment."      Cache   Translate Page      
Speaker Nancy Pelosi gave a wide-ranging interview to Joe Heim at the Washington Post yesterday, and there was a lot of good stuff there, but this exchange is obviously very concerning for a whole lot of people, myself included:
There have been increasing calls, including from some of your members, for impeachment of the president.

I'm not for impeachment. This is news. I'm going to give you some news right now because I haven't said this to any press person before. But since you asked, and I've been thinking about this: Impeachment is so divisive to the country that unless there's something so compelling and overwhelming and bipartisan, I don't think we should go down that path, because it divides the country. And he's just not worth it.
So, let me start by saying I will give Pelosi a very little bit of wiggle room here, on the possibility that this is a strategic move.

If, for example, House Democrats have already uncovered something actionable in their investigations that they think is a more solid avenue to disempower Donald Trump than impeachment, or if they have something on Trump and need to save impeachment for Mike Pence, then it makes sense to take impeachment off the table for now — and an argument could be made that doing it publicly is part of that strategy.

But if something along those lines doesn't materialize quickly, then this is some bullshit.

And, to be frank, I frustratingly haven't seen any evidence that House Democrats, since reclaiming the majority, have any interest in investigating Pence. Which I find deeply troubling.

So there's a strong chance this is just a straightforward statement in which the Speaker rejects impeachment as a tool, because it's "divisive."

And, yes, it is. Except the country is already divided — into people who support a vile authoritarian bigot whose agenda is undiluted malice and who is subverting our democracy to turn the country into a wholly-owned subsidiary of the Kremlin, and people who are resisting this relentless nightmare with everything we've got.

Trust that I understand there is little hope of success without bipartisan support. I understand the risk of pursuing impeachment and losing, when you only get one bite at that apple. I understand that a big swing and a miss could leave Trump even more powerful and convinced of his own unrestrainable domination than he is now.

And if I still believed we had free and fair elections the outcomes of which Trump would respect, or unbiased courts through which we could seek legal remedies, then I would be advocating against impeachment for all of those reasons.

But I don't see whence will come relief anymore. The longer we wait, the longer Trump and the Republican Party has to consolidate their power. And they are exploiting every second for maximum gains.

Meanwhile, people are dying — in the United States, along the southern border, in Syria, in Somalia, in Yemen, and elsewhere around the world — because of the Trump Regime. Pelosi may be right that Trump really isn't worth the potential costs of using every tool in the drawer, but they are.

I have trusted Speaker Pelosi to know what she's doing, and she's come through time and again. I sure hope she knows what she's doing this time, because we can't afford for her to be wrong.
          Air Canada forcé d'annuler au moins quatre vols      Cache   Translate Page      
La décision du Royaume-Uni d’interdire l’exploitation des appareils Boeing 737 Max dans son espace...
          Girls were exploited mentally, physically      Cache   Translate Page      
GUWAHATI, March 12 - Young girls employed in the guise of the 'beauty and wellness' sector under Pradhan Mantri Kaushal Vikas Yojana (PMKVY) have been subjected to mental and physical exploitation, raising a question mark over the safety component of the Central government's flagship programme.
          SAT, ACT college test makers defend integrity amid scandal      Cache   Translate Page      

A college entrance exam policy aimed at helping students with disabilities was exploited to enable cheating in what is being described as the biggest school admissions scandal ever prosecuted by federal authorities, according to court papers made public Tuesday. At least 50 people were charged in the scheme, which included not only cheating on the […]
          Pope: World in need of 'ecological conversion' to advance sustainability      Cache   Translate Page      
Sustainable development cannot be achieved without the voices of those effected by the exploitation of the earth's resources, especially the poor, migrants, indigenous people and young men and women, Pope Francis told participants at a Vatican conference on sustainable development.
          Tina Fontaine avait demandé de l'aide      Cache   Translate Page      
La Protectrice des droits des enfants du Manitoba affirme que de nombreux enfants pris en charge risquent encore d'être exploités sexuellement ou de mourir presque cinq ans après la découverte du corps d'une adolescente autochtone dans une rivière.
          Faille ACE/Winrar : attaque de grande ampleur      Cache   Translate Page      

Il y a trois semaines nous vous alertions sur la faille de sécurité dans le logiciel Winrar liée au format ACE. Aujourd’hui nous constatons qu’elle est très activement exploitée. En effet, notre solution de filtrage antivirus et antispam EndiGuard.Mel, a détecté, analysé et bloqué cette nuit une attaque de grande ampleur (virus « Trojan.PathTransACE.A(Ico) ») L’expéditeur qui […]

L’article Faille ACE/Winrar : attaque de grande ampleur est apparu en premier sur News ICODIA - Les actualités d'ICODIA.


          03-27-2019 ECE Seminar: Exploiting Terrain Responses for Effective Locomotion in Complex Environments       Cache   Translate Page      
Speaker: Feifei Qian, Postdoctoral Researcher, GRASP Lab, University of Pennsylvania Talk Title: Exploiting Terrain Responses for Effective Locomotion in Complex Environments Abstract: Today, robots are expected to take on increasingly important roles in human society. However, state-of-the-art robots still struggle to move on natural terrain, due to the lack of understanding of the interactions between robots and non-flat, non-rigid surfaces. My research aims to generate simplified models and representations of locomotor-terrain interactions, and improve robot mobility in complex environments. In this talk, I will demonstrate how I integrate granular physics, bio-inspired robotics, and locomotion biomechanics to create interaction models that can guide design and control of bio-inspired robots to produce effective movement on challenging terrains. First, I will briefly review my previous work of animal and robot locomotion on granular terrain such as sand, debris, and gravel, and discuss how locomotors can manipulate granular responses and achieve effective locomotion on sand through adjustments in morphological parameters or contact strategy. Then I will present my recent work on creating simplified representations of robot interaction with perturbation-rich environments such as cluttered rubble or fallen tree trunks, and discuss how a multi-legged robot can adjust its gait patterns to exploit obstacle disturbances and generate different dynamics from the same physical environment. I will conclude with a vision of how these models and representations can lead to innovative strategies for obstacle-aided locomotion, better understanding of animal gait transition behaviors, and embodied sensing of environment properties. Biography: Feifei Qian is currently a postdoctoral researcher in the GRASP lab at University of Pennsylvania. She received her PhD degree in Electrical Engineering from Georgia Tech in 2015. She is interested in understanding interactions between legged robots and complex terrains, and creating solutions for robots to exploit obstacles and disturbances to improve mobility. Her work was awarded the best student paper at Robotics: Science and Systems, and has been covered by media press including BBC, R&D Magazine, Phys.org, and PennCurrent. Host: Professor Paul Bogdan, pbogdan@usc.edu
          Tupac hologram and Coachella      Cache   Translate Page      
I'm not real sure what to think about this. I first saw this on a TV with the sound turned down, while I was waiting on some medication at the pharmacy...There have to be less ghoulish, exploitative ways of keeping Tupac's memory alive. Maybe all this stuff is in the eye of the beholder. I've got to wonder what he'd think if he saw it. I was listening to my Jay-Z Pandora station while reading another article about the Tupac hologram and guess what came on? Ambitions az ridah. Sure it could've been coincidence, but I can't say at the same time it freaked me out it didn't have me thinking.
          RussiaGate As Organised Distraction      Cache   Translate Page      

Authored by Prof. Oliver Boyd-Barrett, via Organisation for Propaganda Studies,

For over two years RussiaGate has accounted for a substantial proportion of all mainstream US media political journalism and, because US media have significant agenda-setting propulsion, of global media coverage as well. The timing has been catastrophic.

The Trump Administration has shredded environmental protections, jettisoned nuclear agreements, exacerbated tensions with US rivals, and pandered to the rich.

In place of sustained media attention to the end of the human species from global warming, its even more imminent demise in nuclear warfare, or the further evisceration of democratic discourse in a society riven by historically unprecedented wealth inequalities and unbridled capitalistic greed, corporate media suffocate their publics with a puerile narrative of alleged collusion between the 2016 Trump campaign and Russia.

The RussiaGate discourse is profoundly mendacious and hypocritical. It presumes that the US is a State whose electoral system enjoys a high degree of public trust and security. Nothing could be further from the truth. The US democratic system is deeply entrenched in a dystopian two-party system dominated by the rich and largely answerable to corporate oligopolies; it is ideologically beholden to the values of extreme capitalism and imperialist domination. Problems with the US electoral system and media are extensive and well documented.

US electoral procedures are profoundly compromised by an electoral college that detaches votes counted from votes that count. The composition of electoral districts have been gerrymandered to minimize the possibility of electoral surprises. Voting is dependent on easily hackable corporate-manufactured electronic voting systems.

Right-wing administrations reach into a tool-box of voter-suppression tactics that run the gamut from minimizing available voting centers and voting machines through to excessive voter identification requirements and the elimination of swathes of the voting lists (e.g. groups such as people who have committed felonies or people whose names are similar to those of felons, or people who have not voted in previous elections).

Even the results of campaigns are corrupted when outgoing regimes abuse their remaining weeks in power to push through regulations or legislation that will scuttle the efforts of their successors.

Democratic theory presupposes the formal equivalence of voice in the battlefield of ideas. Nothing could be further from the reality of the US “democratic” system in which a small number of powerful interests enjoy ear-splitting megaphonic advantage on the basis of often anonymous “dark” money donations filtered through SuperPacs and their ilk, operating outside the confines of (the somewhat more transparently monitored) ten-week electoral campaigns.

Regarding media, democratic theory presupposes a public communications infrastructure that facilities the free and open exchange of ideas. No such infrastructure exists.  Mainstream media are owned and controlled by a small number of large, multi-media and multi-industrial conglomerates that lie at the very heart of US oligopoly capitalism and much of whose advertising revenue and content is furnished from other conglomerates.

The inability of mainstream media to sustain an information environment that can encompass histories, perspectives and vocabularies that are free of the shackles of US plutocratic self-regard is also well documented.

Current US media coverage of the US-gestated crisis in Venezuela is a case in point. The much celebrated revolutionary potential of social media is illusory. The principal suppliers of social media architecture are even more corporatized than their legacy predecessors. They depend not just on corporate advertising but on the sale of big data that they pilfer from users and sell to corporate and political propagandists often for non-transparent AI-assisted micro-targeting during ‘persuasion’ campaigns.

Like their legacy counterparts, social media are imbricated within, collaborate with, and are vulnerable to the machinations of the military-industry-surveillance establishment. So-called election meddling across the world has been an outstanding feature of the exploitation of social and legacy media by companies linked to political, defense and intelligence such as – but by no means limited to – the former Cambridge Analytica and its British parent SCL.

Against this backdrop of electoral and media failures, it makes little sense to elevate discussion of and attention to the alleged social media activities of, say, Russia’s Internet Research Agency. Attention is being directed away from substantial, and substantiated, problems and onto trivial, and unsubstantiated, problems.

Moreover, in a climate of manufactured McCarthyite hysteria, RussiaGate further presupposes that any communication between a presidential campaign and Russia is in itself a deplorable thing. Even if one were to confine this conversation only to communication between ruling oligarchs of both the US and Russia, however, the opposite would surely be the case. This is not simply because of the benefits that accrue from a broader understanding of the world, identification of shared interests and opportunities, and their promise for peaceful relations.

real politik analysis might advise the insertion of wedges between China and Russia so as to head off the perceived threat to the USA of a hybrid big-power control over a region of the world that has long been considered indispensable for truly global hegemony.

Even if we address RussiaGate as a problem worthy of our attention, the evidentiary basis for the major claims is weak. The ultimate unfolding of RussiaGate discourse now awaits the much-anticipated report of Special Counsel and former FBI director Robert Mueller. Mueller’s indictments and investigations have to date implicated several individuals for activities that in some cases have no connection whatsoever to the 2016 Presidential campaign.  In some other instances they appear to have been more about lies and obstructions to his investigation rather than material illegal acts, or amount to charges that are unlikely ever to be contested in a court of law.

The investigation itself is traceable back to two significant but extremely problematic reports made public in January 2017. One was the “Steele dossier” by former MI6 officer Christopher Steele. This is principally of interest for its largely unsupported allegations that in some sense or another Trump was in cahoots with Russia. Steele’s company, Orbis, was commissioned to write the report by Fusion GPS which in turn was contracted by attorneys working for the Democratic National Campaign.

Passage of earlier drafts of the Steele report through sources close to British intelligence, and accounts by Trump adviser George Papadopoulos concerning conversations he had concerning possible Russian possession of Clinton emails with a character who may as likely have been a British as a Russian spy, were instrumental in stimulating FBI interest in and spying on the Trump campaign.

There are indirect links between Christopher Steele, another former MI6 agent, Pablo Miller (who also worked for Orbis) and Sergei Skripal, a Russian agent who had been recruited as informer to MI6 by Miller and who was the target of an attempted assassination in 2018. This event has occasioned controversial, not to say highly implausible and mischievous British government claims and accusations against Russia.

The  most significant matter raised by a second report, issued by the Intelligence Community Assessment and representing the conclusions of a small team picked from the Director of Intelligence office, CIA, FBI and NSA, was its claim that Russian intelligence was responsible for the hacking of the computer systems of the DNC and its chairman John Podesta in summer 2016 and that the hacked documents had been passed to Julian Assange and WikiLeaks. No evidence for this was supplied.

Although the hacking allegations have become largely uncontested articles of faith in the RussiaGate discourse they are significantly reliant on the problematic findings of a small private company hired by the DNC. There is also robust evidence that the documents may have been leaked rather than hacked, and by US-based sources.

The fact that the documents revealed that the DNC, a supposedly neutral agent in the primary campaign, had in fact been biased in favor of the candidature of Hillary Clinton, and that Clinton’s private statements to industry were not in keeping with her public positions, has long been obscured in media memory in favor a preferred narrative of Russian villainy.

Why then does the RussiaGate discourse have so much traction? Who benefits?

First, RussiaGate serves the interest of a (1)corrupted Democratic Party, whose biased and arguably incompetent campaign management lost it the 2016 election, in alliance with with (2)powerful factions of the US industrial-military-surveillance establishment that for the past 19 years, through NATO and other malleable international agencies, has sought to undermine Putin’s leadership, dismember Russia and the Russian Federation (undoubtedly for the benefit of western capital) and, more latterly, further contain China in a perpetual and titanic struggle for the heart of EurAsia.

In so far as Trump had indicated (for whatever reasons) in the course of his campaign that he disagreed with at least some aspects of this long-term strategy, he came to be viewed as unreliable by the US security state. While serving the immediate purpose of containing Trump, US accusations of Russian meddling in US elections were farcical in the context of a well-chronicled history of US “meddling” in the elections and politics of nations for over 100 years. This meddling across  all hemispheres has included the staging of coups, invasions and occupations on false pretext in addition to numerous instances of “color revolution” strategies involving the financing of opposition parties and provoking uprisings, frequently coupled with economic warfare (sanctions).

A further beneficiary (3)is the sum of all those interests that favor a narrowing of public expression to a framework supportive of neoliberal imperialism. Paradoxically exploiting the moral panic associated with both Trump’s plaintive wailing about “fake news” whenever mainstream media coverage is critical of him, and social media embarrassment over exposure of their big data sales to powerful corporate customers, these interests have called for more regulation of, as well as self-censorship by, social media.

Social media responses increasingly involve more restrictive algorithms and what are often partisan “fact-checkers” (illustrated by Facebook financial support for and dependence on the pro-NATO “think tank,” the Atlantic Council). The net impact has been devastating for many information organizations in the arena of social media whose only “sin” is analysis and opinion that runs counter to elite neoliberal propaganda. The standard justification of such attacks on free expression is to insinuate ties to Russia and/or to terrorism.

Given these heavy handed and censorious responses by powerful actors, it would appear perhaps that the RussiaGate narrative is increasingly implausible to many and the only hope now for its proponents is to stifle questioning. These are dark days indeed for democracy.


          Speciale Baltica – Le elezioni politiche in Lettonia      Cache   Translate Page      
da balticanews.wordpress.com

Sabato 4 ottobre i lettoni vanno alle urne per rinnovare il parlamento. Tutto quello che c’è da sapere: legge elettorale, i partiti, gli schieramenti, i possibili scenari dopo il voto.

Il parlamento lettone
Il parlamento lettone
Sabato 4 ottobre la Lettonia va al voto per eleggere la 12. Saeima, il parlamento giunto alla dodicesima legislatura. Proviamo a fare il punto sulla situazione, capire come e cosa votano i lettoni e quali potrebbero essere gli scenari alla chiusura delle urne.

Cos’è successo nella passata legislatura.

L’11.Saeima è durata tre anni, anziché quattro secondo il tradizionale mandato, perché è nata a seguito dello scioglimento del parlamento precedente, chiuso nel 2011 dopo solo un anno di attività dal presidente allora in carica Valdis Zatlers, per non aver consentito indagini nei confronti del deputato Ainārs Šlesers, accusato di corruzione.
Nella legislatura appena conclusa il partito di maggioranza relativa era quello dei russofoni di Saskaņa centrs, che vinse le passate elezioni con il 28% dei voti conquistando 31 seggi. Ma SC è rimasto all’opposizione per tutta la legislatura. La maggioranza di governo infatti  è stata formata da tre partiti lettoni dell’area di centro destra, Vienotība (18% dei voti e 20 deputati), che ha anche espresso i due premier che si sono succeduti nella legislatura Valdis Dombrovskis e Laimdota Straujuma, Reformu Partija, il partito dell’ex presidente Zatlers, che conquistò il 20% dei voti e 22 deputati diventati poi 16 per la fuoriuscita di sei deputati indipendenti, e il partito nazionalista Visu Latvijai! che conquistò 14 seggi grazie al 13% dei voti.
Oltre a SC nella prima parte della legislatura è rimasto all’opposizione anche il partito dei verdi e agricoltori ZZS, entrato poi nella maggioranza di governo all’inizio del 2014 quando, dopo le dimissioni di Dombrovskis, Laimdota Straujuma ha formato il nuovo governo.
Nel frattempo Reformu Partija crollato nei sondaggi e nelle elezioni amminitrative del 2012, si è sciolto e buona parte dei suoi deputati è confluito oggi in Vienotība.

Come si vota

Alle elezioni per il nuovo parlamento si presenteranno 13 liste, ma solo cinque, o massimo sei, di queste hanno possibilità reali di superare la soglia di sbarramento che prevede la legge. Si entra in parlamento infatti se si conquista almeno il 5% dei voti. Il sistema è proporzionale.
Ci sono cinque grandi circoscrizioni: Rīga e le quattro regioni, Vidzeme, Zemgale, Kurzeme e Latgale. Il sistema elettorale prevede la scelta degli eletti attraverso le preferenze, ma a differenza dell’Italia all’interno della singola lista elettorale prescelta, l’elettore può assegnare un + in caso di preferenza o cancellare il nome del candidato che non si vuole rivedere in parlamento, determinando così il conteggio delle preferenze totali.
Al parlamento lettone vengono eletti 100 deputati.
Si vota nella giornata di sabato 4 ottobre dalle 7 alle 20, senza obbligo di votare al proprio seggio di residenza. I seggi sono però aperti già da mercoledì a venerdì in alcune ore della giornata. Ambasciate e consolati lettoni all’estero sono aperti per permettere il voto ai tanti lettoni residenti all’estero o che semplicemente si trovino all’estero in questi giorni.
In genere l’affluenza alle urne per le elezioni politiche in Lettonia si aggira intorno al 60%.
Il numero totale dei candidati è di 1156. L’età media è di 45 anni, il 67% sono candidati uomini, il 33% donne.
Per quanto riguarda la nazionalità, il 67% sono lettoni, il 6,9% russi, ed in percentuali minime altre nazionalità come ucraini, bielorussi, lituani.. Il 24,7% dei candidati non ha dichiarato la propria nazionalità di origine: si tratta in realtà quasi sempre di candidati di nazionalità russa. Quindi in pratica il 67% dei candidati è di nazionalità di origine lettone, il 30% russa.

I principali partiti

Saskaņa (Armonia)
Il partito russofono a queste elezioni si presenta con una leggera modifica nel nome, non più Saskaņa centrs (Centro del’armonia), ma Saskaņa sociāldemokrātiskā partija, per affermare maggiormente l’area socialdemocratica in cui intende muoversi. Ha un programma di aumenti della spesa sociale e maggiore attenzione al welfare, in linea con quanto il suo leader e sindaco di Rīga Nils Ušakovs porta avanti già da anni nella capitale lettone, e ha sempre fortemente criticato la disciplina fiscale e il contenimento della spesa pubblica degli ultimi governi di centro destra.
Alle ultime elezioni politiche ha avuto la maggioranza relativa, 28%, ma non è mai entrato nella coalizione di governo. In Lettonia infatti finora il sistema delle alleanze politiche all’interno della Saeima ha visto sempre escluso il principale partito russofono del paese. Il suo legame ufficiale con il partito di Putin Russia Unita, le sue posizioni spesso filorusse o quanto meno ambigue sulle scelte geopolitiche del Cremlino, il sostegno al referndum sul russo seconda lingua ufficiale in Lettonia, sono fattori che hanno sempre impedito agli altri partiti lettoni di poter stringere accordi politici con Saskaņa.
Proprio le posizioni ambigue sulla crisi in Ucraina e l’assenza di critiche riguardo alle scelte del Cremlino sulla questione, hanno determinato una grave sconfitta per Saskaņa alle Europee di maggio, dove i russofoni hanno ottenuto il 13%. Ma nei sondaggi dei mesi successivi fino ad oggi, il partito russofono resta accreditato di un risultato fra il 17 e il 20% sempre come primo partito del paese. I suoi bacini elettorali sono Rīga e il Latgale, le zone dove la popolazione russofona ha maggiore influenza, ma per avere percentuali sufficienti per cercare di conquistare il governo del paese, ha necessità di intercettare almeno un parte del voto lettone.
Vienotība (Unità)
E’ il principale partito lettone di centro moderato. Guida la coalizione di maggioranza e il governo dal 2009, quando Valdis Dombrovskis fu chiamato a provare a salvare la Lettonia da una gravissima crisi economica. In questi anni ha condotto politiche di austerità e grandi sacrifici, riducendo la spesa pubblica, ma riportando il paese ad una crescita economica fra le più alte in Europa e all’ingresso nell’eurozona lo scorso gennaio.
Nel maggio scorso ha ottenuto una grande affermazione nelle elezioni europee, cogliendo un clamoroso 46%, che però si spiega con la bassa affluenza per le europee, lo scoppio della crisi in Ucraina, e la forte natura europeista del partito stesso. Dombrovskis, candidato alle europee ha ottenuto un grande successo personale, ma il partito ha espresso in quelle elezioni diverse altre candidature eccellenti (Kalniete, Pabriks) che hanno attirato il voto di molti elettori.
Nei sondaggi dei mesi successivi la situazione è tornata alla “normalità”, con Vienotība che viene accreditata di un range fra il 12% e il 15%, secondo partito nel paese.
A queste elezioni i suoi candidati di maggior rilievo sono l’attuale premier Laimdota Straujuma, la speaker del parlamento e vero leader del partito, Solvita Āboltiņa, e l’attuale ministro degli esteri, Edgars Rinkēvičs, uno dei diversi membri di Reformu Partija confluiti in Vienotība. Nel suo programma si punta ad una linea di continuità rispetto agli ultimi governi.
Ha cercato di stringere alleanze con alcuni partiti regionali, per estendere la propria capacità di intercettare voti sul territorio. I suoi bacini elettorali sono soprattutto nelle regioni, in particolare il Vidzeme, mentre tradizionalmente soffre a Rīga, dove solo nelle scorse europee (ma si tratta di un caso eccezionale) ha saputo battere la concorrenza di Saskaņa.
ZZS
Il partito dei verdi e agricoltori nel panorama spesso molto variabile del mondo politico lettone, è uno dei soggetti più stabili. Può contare, specie nelle regioni come il Kurzeme e lo Zemgale, di un bacino elettorale piuttosto costante, e difficilmente si scosta da percentuali intorno al 10% (nelle politiche del 2011 prese il 12%, nelle europee di maggio l’8%).
Nella passata legislatura è stato prima all’opposizione, poi è entrato nella coalizione di governo guidata dall’attuale premier Straujuma. Nel suo programma elettorale ci sono misure di sostegno per le imprese, specie nel settore agricolo, e un’attenzione particolare verso il welfare e i pensionati. E’ un partito di centro moderato, con una sua componente ambientalista.
Dovrebbe mantenere la sua posizione all’interno dell’alleanza di centro destra, ma Aivars Lembergs… Eh già, perché anche quest’anno l’alleanza con il sindaco oligarca di Ventspils, che è anche il candidato premier del partito, può portare sempre a delle sorprese. ZZS, ed in particolare gli interessi specifici di Lembergs, fanno fatica a rimanere all’opposizione e per mantenere un ruolo nel prossimo governo potrebbe anche adeguarsi ad altre alleanze possibili.
Nacionāla Apvienība
E’ l’alleanza nazionale lettone, che comprende Visu Latvijai! (giovane e movimentista) e i vecchi nazionalisti più moderati di Tevzemei un Brivībai.
Nella scorsa legislatura è entrata nella coalizione di centrodestra, pur mantenendo una forte identità e specificità, che a volte ha reso difficile la vita della maggioranza.
Attenti in particolare alle questioni di identità nazionale (lingua, valori, indipendenza) e demografia (sostegni alle famiglia, politica delle nascite, rientro dell’emigrazione).
Dopo essere stati a lungo considerati una forza troppo estremista e nazionalista per entrare nelle coalizione di governo, sono stati sdoganati da Dombrovskis nel 2011 che aveva bisogno di loro per ricostituire una propria maggioranza ed ora rappresentano una gamba fondamentale per qualsiasi ipotesi di coalizione anti russofona.
Negli ultimi sondaggi non vanno benissimo, sono accreditati di una forbice dal 7% al 10%. Il Vidzeme, la regione a nord est della Lettonia, è il loro bacino elettorale maggiore.
No sirds Latvijai (Dal cuore per la Lettonia)
Ogni elezione in Lettonia porta alla ribalta qualche nuovo soggetto politico. Questa volta tocca al partito della ex revisore dei conti Inguna Sudraba, che durante il suo vecchio incarico di controllore dei conti pubblici negli anni della crisi economica si conquistò un forte successo popolare, per le sue incessanti critiche nei confronti dei politici spendaccioni e corrotti.
In realtà il suo nuovo partito è nato sotto una luce molto ambigua. Ha goduto in questi pochi mesi dalla nascita di finanziamenti molto consistenti, la cui origine  è tuttora poco chiara. Poco chiara anche la vicenda delle relazioni personali della Sudraba con gli ambienti degli attivisti russofoni e le frequentazioni con personalità pubbliche russe.
Il suo programma è tutto puntato sulla riduzione delle diseguaglianze nel paese, ma da attuare attraverso un forte aumento della spesa pubblica: sostegni alle famiglie, alle imprese, aumento delle pensioni, il 2% del pil alla difesa, diminuzione dell’Iva.
Una campagna pubblicitaria molto estesa e ricca ha permesso a NSL di passare nell’ultimo mese dal 2,5% fino quasi al 10% nei sondaggi degli ultimi giorni in costante aumento. In Lettonia un partito nuovo al suo debutto elettorale ha spesso un impatto molto forte.
Difficile prevedere il posizionamento di NSL nella prossima legislatura, ma è certamente il partito che più di altri potrebbe fare da sponda ad un allenaza coi russofoni di Saskaņa, se i seggi complessivi permettessero ai due partiti insieme di ottenere la maggioranza.

Gli scenari possibili

Il sistema politico lettone è da anni bloccato in una contrapposizione fra lettoni e russofoni, che è in definitiva più importante e trasversale rispetto alla tradizionale contrapposizione destra-sinistra.
Per questo negli ultimi anni nonostante la maggioranza relativa conquistata dal principale partito russofono Saskaņa, al governo i russofoni non sono mai riusciti ad arrivare, perché i partiti lettoni hanno sempre costruito alleanze che li escludessero.
Maggioranza russofoni e loro alleati
Saskaņa, nonostante il pessimo risultato delle Europee, rimane in testa ai sondaggi e probabilmente sarà ancora il partito di maggioranza relativa nella prossima Saeima. Riusciranno ad andare al governo se otterrano almeno una trentina di seggi e se potranno contare almeno su uno dei partiti “lettoni”, disposto ad allearsi con loro. L’unico che sembra poter corrispondere a questo identikit è No sirds Latvijai.
Una maggioranza di questo tipo potrebbe formarsi se Saskaņa arriverà vicino al 30% dei voti, e NSL otterrà un grande risultato, intorno al 20%.
Maggioranza dei partiti lettoni di centro destra
In tutti gli altri casi difficilmente gli altri partiti lettoni che entreranno in parlamento potrebbero sostenere una coalizione coi russofoni.
La coalizione di centro destra Vienotība, ZZS e Nacionāla Apvienība si presenta a queste elezioni con l’intenzione di confermare l’alleanza anche nella prossima legislatura.
Ma non sarà semplice. I sondaggi che danno Vienotība al massimo al 15%, ZZS e Nacionāla Apvienība non oltre il 9-10% sono troppo bassi per avere i 51 seggi necessari per la maggioranza. Servirebbe a Vienotība un exploit che replicasse almeno in parte quello delle europee di maggio.
Altre possibilità: No sirds Latviaji e ZZS aghi della bilancia
Se questi primi due scenari non saranno attuabili, potrebbe nascere una situazione di stasi fra i  due blocchi, russofoni e loro alleati e partiti lettoni di centrodestra.
Un empasse che potrebbe portare ZZS a rompere l’alleanza attuale di centrodestra e appoggiare un governo formato con Saskaņa e No sirds Latvijai.
Oppure, ipotesi opposta, No sirds Latvijai alla fine potrebbe portare in dote all’attuale coalizione lettone di centrodestra i voti necessari per formare il nuovo governo.
Decisiva la quota di astensionismo
Ma proprio a maggio per le europee le urne lettoni dettero un risultato sorprendente, in contraddizione con tutti i sondaggi pre elettorali. Dunque è tutto ancora possibile. Dipenderà molto dai tanti elettori ancora indecisi e che probabilmente solo nelle urne decideranno le sorti del prossimo parlamento lettone. Un’alta astensione rischia di rendere complicate le cose per i partiti lettoni, perché in genere (tranne l’eccezione delle europee), l’astensionismo è un fenomeno soprattutto legato all’elettorato di lingua lettone.
Se gli appelli ad andare al voto di questi ultimi giorni, come quello della poetessa  Māra Zālīte, avranno effetto, un’alta affluenza alle urne potrebbe sovvertire i sondaggi degli ultimi mesi.
Baltica ©
          Mining Engineer II, Long-Term Mine Planning - ArcelorMittal Exploitation minière Canada s.e.n.c. - Longueuil, QC      Cache   Translate Page      
Statut: Permanent resident Reporting to the Director, Mine Planning and Performance, the Mining Engineer helps produce the optimal sequence for the long-term...
From ArcelorMittal Exploitation minière Canada s.e.n.c. - Thu, 24 Jan 2019 14:47:05 GMT - View all Longueuil, QC jobs
          Resource-based Constrained Delegation Allows Obtaining of System Privileges of Any Domain Hosts Threat Alert      Cache   Translate Page      

1 Vulnerability Overview Recently, the NSFOCUS M01N team released the Analysis of Privilege Escalation Attacks by Exploiting Resource-based Constrained Delegation, in which they describe the principle of attacks launched by exploiting the resource-based constrained delegation, so as to escalate privileges of domain hosts. For details, click the following link: http://blog.nsfocus.net/analysis-attacks-entitlement-resource-constrained-delegation/ Several days ago, a security […]

The post Resource-based Constrained Delegation Allows Obtaining of System Privileges of Any Domain Hosts Threat Alert appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..


          Chrome PDF File Parsing 0-Day Vulnerability Threat Alert      Cache   Translate Page      

1 Vulnerability Overview On February 28, 2019, a security vendor outside of China spotted a 0-day vulnerability in Google’s Chrome browser, which could lead to information disclosure upon a user’s opening of a malicious PDF file using Chrome. Up to now, a number of malicious samples have been found to exploit this vulnerability in the […]

The post Chrome PDF File Parsing 0-Day Vulnerability Threat Alert appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..


          Associé aux ventes, Peller/Bacardi | Sales Associate, Peller/Bacardi - Aerrianta International North America - Montréal, QC      Cache   Translate Page      
Associé aux ventes, Peller/Bacardi Aer Rianta est l’un des principaux exploitants de boutiques hors taxes dans les aéroports internationaux. Nous avons...
From Indeed - Tue, 12 Mar 2019 21:04:21 GMT - View all Montréal, QC jobs
          Chargé de projet, Construction |Project Manager, Construction - Aerrianta International North America - Montréal, QC      Cache   Translate Page      
Chargé de projet, Construction – Commerce de détail (Remplacement de congé de maternité) Aer Rianta est l’un des principaux exploitants de boutiques hors...
From Indeed - Wed, 06 Mar 2019 16:32:22 GMT - View all Montréal, QC jobs
          (USA-CO-Boulder) Chief Engineer      Cache   Translate Page      
LRS Consulting Services has been delivering the highest quality consultants to our clients since 1979. We've built a solid reputation for dealing with our clients and our consultants with honesty, integrity, and respect. We work hard every day to maintain that reputation, and we're very interested in candidates who can help us. If you're that candidate, this opportunity is made for you! Our client is in need of an experienced Chief Engineer. This is a long-term contract opportunity in Boulder, CO. If you’re that person, submit your resume now! **Responsibilities:** + Daily program management throughout the program life cycle + Oversee all system engineering efforts in support of the client deliverables and projects + Lead an IT Working Group focused on conducting engineering trade studies + Recommend engineering courses of action based on the outcomes of studies + Recommend technology refresh actions to keep technology environments at the forefront of technological advancements + Conduct studies to control total costs of ownership of technology environments + Conduct engineering trade studies + Recommend engineering courses of action based on the studies + Act as the single source for all system engineering decisions **Act as the Primary Contractor Source for following:** + Configuration Management + Training + Capability Identification and Analysis + Architecture and Design + Hardware Engineering + Software Engineering + Integration Services + Developmental Unit Functional Testing + Acceptance Testing + Operational Testing Support + Quality Assurance + TAP Lab Data Management + Create and maintain a systems engineering master plan + Create and maintain a continuous integration/continuous deployment pipeline of capabilities + Develop and update engineering, networking, and processing components + Recommend and support implementation and testing of commercial cloud computing solutions + Act as the single source of program knowledge and single accountable point-of-contact for all assigned work + Travel as needed to meet with stakeholders to identify requirements, share information, and conduct coordination and planning **Requirements:** + Bachelor’s degree in a computer science, information technology, or a business-related discipline preferred + Candidates must be a US Citizen with an active Top-Secret Level Clearance + Candidate must be able to effectively communicate in English (written & verbal) + Experience in Air Force Space Command (AFSPC) experience and knowledge of the Air Force’s Tools and Applications and Processing (TAP) Lab and Overhead Persistent Infrared (OPIR) Battlespace Awareness Center (OBAC) + Must be SCI eligible + Must have Ten (10) years of industry-related experience + Must have Five (5) years of experience with Agile software development management and methodologies + Must have experience in the following: + Capability integration into operational DoD locations + Agile Software Development and Methodologies + Lifecycle Project Management + Schedule Management + Knowledge in data exploitation, dissemination, research, development, test, and evaluation + DoD financial management and accounting systems, regulations, and publications + Experience supporting Federal IT and Engineering initiatives and operations in a classified government environment + Experience routinely communicating and working with Executive level government and non-government leadership and personnel + Must be fully fluent in MS Office applications, including Outlook, Word and Excel + Experience in the following: + Managing the onsite efforts of all subcontractors aligned to the contract + Leading the team’s Agile development and delivery schedule + Organizing, directing, and managing contract operation support functions, involving multiple, complex and inter-related project tasks + Maintaining and managing the client interface at the senior levels of the client organization + Meeting with customer and contractor personnel to formulate and review task plans and deliverable items + Ensuring conformance with program task schedules and costs + Managing risks and issues while taking corrective measurements + Coordinating the projects and their interdependencies + Managing and utilizing resources across projects + Managing stakeholders' communication + Managing quality control of the contract deliverables LRS is an equal opportunity employer. Applicants for employment will receive consideration without unlawful discrimination based on race, color, religion, creed, national origin, sex, age, disability, marital status, gender identity, domestic partner status, sexual orientation, genetic information, citizenship status or protected veteran status.
          (USA-CO-Boulder) Lead Operations SME      Cache   Translate Page      
LRS Consulting Services has been delivering the highest quality consultants to our clients since 1979. We've built a solid reputation for dealing with our clients and our consultants with honesty, integrity, and respect. We work hard every day to maintain that reputation, and we're very interested in candidates who can help us. If you're that candidate, this opportunity is made for you! Our client is in need of an experienced Lead Operations SME. This is a long-term contract opportunity in Boulder, CO. If you’re that person, submit your resume now! **Responsibilities:** + Act as the primary OBAC SME for the team + Create standard operating procedures to ensure all SMEs provide a coordinated and consistent level of support + Coordinate and support mission tasking with OBAC operations + Provide technical leadership and develop strategies satisfying operational, development, and testing requirements for the Sensor Exploitation Ground Architecture (SEGA) + Participate in and lead as needed feedback sessions between OBAC operators and TAP Lab development teams + Travel as needed to meet with stakeholders to gather and share information **Requirements:** + Bachelor’s degree in a computer science, information technology, or a business-related discipline is preferred. + Candidates must be a US Citizen with an active Top-Secret Level Clearance + Candidate must be able to effectively communicate in English (written & verbal) + Must be SCI eligible + Must have Ten (10) years of experience in the Space Based Infrared System (SBIRS) or Overhead Persistent Infrared (OPIR) domains + Must have Five (5) years of experience in OPIR data exploitation or battle space awareness mission areas + Experience supporting Federal Financial Management business operations at a government site + Experience communicating and working with Executive level government and non-government leadership and personnel + Air Force Space Command (AFSPC) experience and knowledge of the Air Force’s Tools and Applications and Processing (TAP) Lab and Overhead Persistent Infrared (OPIR) Battlespace Awareness Center (OBAC) LRS is an equal opportunity employer. Applicants for employment will receive consideration without unlawful discrimination based on race, color, religion, creed, national origin, sex, age, disability, marital status, gender identity, domestic partner status, sexual orientation, genetic information, citizenship status or protected veteran status.
          (USA-CO-Boulder) Lead System Administrator      Cache   Translate Page      
LRS Consulting Services has been delivering the highest quality consultants to our clients since 1979. We've built a solid reputation for dealing with our clients and our consultants with honesty, integrity, and respect. We work hard every day to maintain that reputation, and we're very interested in candidates who can help us. If you're that candidate, this opportunity is made for you! Our client is in need of an experienced Lead System Administrator. This is a long-term contract opportunity in Boulder, CO. If you’re that person, submit your resume now! **Responsibilities:** + Act as the primary contractor for TAP Lab and OBAC leadership feedback + Create standard operating procedures that ensure all system administrators provide consistent and coordinated system support + Coordinate and schedule downtime to incorporate new TAP Lab and Sensor Exploitation Ground Architecture (SEGA) capabilities with limited user impacts + Develop, revise, and maintain TAP Lab operations and processes for technical support and maintenance actions for SEGA in order to meet new requirements or technology advancements + Oversee and provide system maintenance and assistance functions to researchers and other users of the TAP Lab + Oversee and lead the development, implementation, and testing of a backup and recovery strategy for both TAP Lab and OBAC facilities + Provide a secure environment for applications to reside + Ensure that computing environments for vendors utilizing the TAP Lab are available for use + Support installation, maintenance, repair, and upgrades of all hardware, firmware, software, and associated equipment on the network + Provide identify management for network access + Oversee and maintain storage systems to enable both a static archive of relevant data and events as well as a 30-day rolling archive of raw data + Recommend system administration courses of action that will help systems achieve efficiently achieve their objectives and goals + Recommend technology refresh actions to keep technology environments at the forefront of technological advancements + Create and maintain a systems administration objectives and goals + Act as the single source of system administration knowledge and single accountable point-of-contact for all assigned work + Travel as needed to meet with stakeholders to identify requirements, share information, and conduct coordination and planning **Requirements:** + Bachelor’s degree in a computer science, information technology, or a business-related discipline is preferred + Candidate must be a US Citizen with an active Top-Secret Level Clearance + Candidate must be able to effectively communicate in English (written & verbal) + Must be SCI eligible + Must have Five (5) years of system administrator experience + Must have Three (3) or more years of experience with agile software development methodologies + Must have an in-depth knowledge of VMware, Red Hat Enterprise Linux, software defined networking, software defined storage, and public and private cloud infrastructure + Experience supporting Federal IT and Engineering initiatives and operations in a classified government environment + Experience routinely communicating and working with Executive level government and non-government leadership and personnel + Must be fully fluent in MS Office applications, including Outlook, Word and Excel + Experience in the following: + Managing the onsite efforts of all subcontractors aligned to the contract + Leading the team’s completion of system administration objectives and goals + Organizing, directing, and managing contract operation support functions, involving multiple, complex and inter-related project tasks + Maintaining and managing the client interface at the senior levels of the client organization + Meeting with customer and contractor personnel to formulate and review plans and deliverable items + Ensuring conformance with program task schedules and costs + Managing risks and issues while taking corrective measurements + Coordinating the projects and their interdependencies + Managing and utilizing resources across projects + Managing stakeholders' communication + Managing quality control of the contract deliverables + Air Force Space Command (AFSPC) experience and knowledge of the Air Force’s Tools and Applications and Processing (TAP) Lab and Overhead Persistent Infrared (OPIR) Battlespace Awareness Center (OBAC) LRS is an equal opportunity employer. Applicants for employment will receive consideration without unlawful discrimination based on race, color, religion, creed, national origin, sex, age, disability, marital status, gender identity, domestic partner status, sexual orientation, genetic information, citizenship status or protected veteran status.
          UK police launch internet safety campaign for 4-year-olds      Cache   Translate Page      
Cartoons are designed to tackle ‘disturbing’ rise of online sexual exploitation
          (CAN-Toronto) Conseiller -Résolution d'incidents et services, IBM X-Force IRIS      Cache   Translate Page      
**Job Description** L'équipe de résolution d'incidents et de services d'intelligence (IRIS) IBM X-Force est à la recherche de conseillers pour offrir des services professionnels de premier plan en sécurité de l'information, résolution d'incidents et services proactifs à IBM et aux clients d'IBM. Le titulaire du poste offrira des services-conseils au sein d'un groupe de sécurité en croissance touchant divers domaine de sécurité, analysera et résoudra les incidents liés à la sécurité, gérera les menaces actives, exploitera le renseignement de sécurité et travaillera en collaboration avec les clients pour améliorer la cybersécurité. Le candidat recherché aura des compétences avérées en résolution d'incidents, en analyse des intrusions ainsi qu'une base solide en politiques de cybersécurité, en exploitation et en pratiques exemplaires, idéalement au sein d'une grande entreprise. Le candidat aura une bonne connaissance des principaux outils EDR tels que MIR/HX, Falcon Host, ou Carbon Black. Il devra aussi connaître les outils d'analyse d'expert tels que Encase Forensic ou X-Ways et l'analyse des réponses en direct. Le candidat doit avoir d'excellentes aptitudes en communication à l'oral et à l'écrit. Le conseiller gérera tous les aspects d'un mandat de sécurité, du début à la fin. La personne retenue devra essentiellement mettre en application des méthodologies formelles et structurées pour fournir au client un niveau de qualité uniforme reflétant les connaissances et l'expérience d'IBM. Le candidat doit être en mesure de créer et de fournir aux clients des livrables précis en respectant les échéances et de présenter les solutions techniques appropriées, les prochaines étapes et des conclusions précises. Enfin, le candidat doit avoir de solides aptitudes à évaluer et à améliorer l'efficacité des programmes de résolution d'incidents et les politiques de sécurité utilisées. Les conseillers doivent occasionnellement travailler selon un horaire 24x7, et se déplacer au pays et à l'étranger jusqu'à 60 % du temps. Compétences en analyse d'expert et en résolution d'incident : + Capacité d'analyser les systèmes Windows et Unix pour relever toute évidence de compromission. + Bonne connaissance des outils d'expert communs tels que EnCase, FTK, X-Ways et Sleuthkit. + Connaissance des artéfacts d'analyse d'expert Windows et Unix + Capacité de communiquer les constatations et les concepts techniques aux principales parties prenantes. + Expérience relative à l'analyse locale des fichiers journaux en utilisant l'outil d'agrégation SIEM. + Expérience dans la recherche d'auteurs de menaces dans les réseaux de grandes entreprises. + Expérience dans l'utilisation des principaux outils de détection et de réponse aux points d'extrémité (EDR). Aptitudes en analyse de maliciel et en ingénierie inverse : + Analyse et/ou ingénierie inverse du comportement du maliciel à l'aide d'outils et de techniques statiques et dynamiques. + Expérience validée à titre d'expert de domaine dans la détection, l'analyse, les fonctions et la réduction des risques du maliciel, ainsi que dans les tendances en matière de développement de maliciel. + Bonne connaissance de Windows, Linux, OSX OS Internals et des interfaces de programmation d'application. + Parfaite connaissance des langages de programmation de haut, moyen et bas niveau (Perl/Python, C/C++, Assembly). + Bonne connaissance des outils de désassemblage/mise ou point tels que IDA Pro, OllyDbg, WinDbg, etc. + Capacité de créer et d'effectuer une analyse binaire avec les outils standards d'ingénierie inverse (REMnux, PE Explorer, Malcode, etc.). + Aptitudes en matière d'identification de compresseurs et d'analyse d'entropie + Aptitude à écrire un commentaire cohésif pour l'assemblage du code et les fonctions de maliciel pour un auditoire technique et non technique. Compétence en analyse de réseau expert : + Analyse et/ou déchiffrage de saisies de paquets à partir des analyseurs de protocole de réseau (Wireshark, TCPdump, etc.). + Compréhension éprouvée du comportement, des risques et des contrôles des protocoles de réseau communs. + Compréhension des techniques et des pratiques utilisées pour coder et chiffrer le trafic de réseau et les attaques communes de ces contrôles. + Capacité d'utiliser les données de NetFlow pour identifier les sources d'attaque de réseau + Bonne connaissance des outils et des techniques requises pour analyser et convertir à rebours les protocoles et les données qui sont acheminés dans un environnement de réseau. + Compréhension avérée de l'architecture, du déploiement, des avantages et des faiblesses des mandataires de sécurité de réseau, des formats communs de fichiers journaux et de l'acheminement des données dans un environnement de réseau avec ou sans fil. + Aptitude à écrire un commentaire cohésif pour l'assemblage de paquets et les fonctions de maliciel pour un auditoire technique et non technique. Compétence en renseignement relatif aux menaces : + Compréhension de l'ensemble des menaces et du renseignement de sécurité dans les domaines gouvernemental et commercial. + Bonne connaissance de la recherche et de la modélisation des menaces, ainsi que des évaluations des menaces de sécurité. **Required Technical and Professional Expertise** + Maîtrise de l'anglais (oral et écrit) + Maîtrise du français et de l'anglais (oral et écrit) pour le poste de Montréal + Ayant la Citoyenneté Canadienne ou une carte de résident/e permanent Canadienne + Au moins 3 années d'expérience technique et en services-conseils et expérience à titre d'expert de domaine dans un ou plusieurs des domaines suivants : résolution des incidents, analyse d'expert en informatique et sécurité de réseau. + Au moins 3 années d'expérience pratique de haut niveau liée aux outils matériels/logiciels utilisés dans les domaines de la résolution d'incidents, de l'analyse d'expert, de l'évaluation de sécurité de réseau et/ou de la sécurité des applications. **Preferred Tech and Prof Experience** + Certification in CISSP, ENCE, CCE, GCFA, GCIA, GCIH, CHFI, QSA ou l'équivalent + Attestation de sécurité du Canada Niveau 2 **EO Statement**
          (CAN-Markham) Conseiller -Résolution d'incidents et services, IBM X-Force IRIS      Cache   Translate Page      
**Job Description** L'équipe de résolution d'incidents et de services d'intelligence (IRIS) IBM X-Force est à la recherche de conseillers pour offrir des services professionnels de premier plan en sécurité de l'information, résolution d'incidents et services proactifs à IBM et aux clients d'IBM. Le titulaire du poste offrira des services-conseils au sein d'un groupe de sécurité en croissance touchant divers domaine de sécurité, analysera et résoudra les incidents liés à la sécurité, gérera les menaces actives, exploitera le renseignement de sécurité et travaillera en collaboration avec les clients pour améliorer la cybersécurité. Le candidat recherché aura des compétences avérées en résolution d'incidents, en analyse des intrusions ainsi qu'une base solide en politiques de cybersécurité, en exploitation et en pratiques exemplaires, idéalement au sein d'une grande entreprise. Le candidat aura une bonne connaissance des principaux outils EDR tels que MIR/HX, Falcon Host, ou Carbon Black. Il devra aussi connaître les outils d'analyse d'expert tels que Encase Forensic ou X-Ways et l'analyse des réponses en direct. Le candidat doit avoir d'excellentes aptitudes en communication à l'oral et à l'écrit. Le conseiller gérera tous les aspects d'un mandat de sécurité, du début à la fin. La personne retenue devra essentiellement mettre en application des méthodologies formelles et structurées pour fournir au client un niveau de qualité uniforme reflétant les connaissances et l'expérience d'IBM. Le candidat doit être en mesure de créer et de fournir aux clients des livrables précis en respectant les échéances et de présenter les solutions techniques appropriées, les prochaines étapes et des conclusions précises. Enfin, le candidat doit avoir de solides aptitudes à évaluer et à améliorer l'efficacité des programmes de résolution d'incidents et les politiques de sécurité utilisées. Les conseillers doivent occasionnellement travailler selon un horaire 24x7, et se déplacer au pays et à l'étranger jusqu'à 60 % du temps. Compétences en analyse d'expert et en résolution d'incident : + Capacité d'analyser les systèmes Windows et Unix pour relever toute évidence de compromission. + Bonne connaissance des outils d'expert communs tels que EnCase, FTK, X-Ways et Sleuthkit. + Connaissance des artéfacts d'analyse d'expert Windows et Unix + Capacité de communiquer les constatations et les concepts techniques aux principales parties prenantes. + Expérience relative à l'analyse locale des fichiers journaux en utilisant l'outil d'agrégation SIEM. + Expérience dans la recherche d'auteurs de menaces dans les réseaux de grandes entreprises. + Expérience dans l'utilisation des principaux outils de détection et de réponse aux points d'extrémité (EDR). Aptitudes en analyse de maliciel et en ingénierie inverse : + Analyse et/ou ingénierie inverse du comportement du maliciel à l'aide d'outils et de techniques statiques et dynamiques. + Expérience validée à titre d'expert de domaine dans la détection, l'analyse, les fonctions et la réduction des risques du maliciel, ainsi que dans les tendances en matière de développement de maliciel. + Bonne connaissance de Windows, Linux, OSX OS Internals et des interfaces de programmation d'application. + Parfaite connaissance des langages de programmation de haut, moyen et bas niveau (Perl/Python, C/C++, Assembly). + Bonne connaissance des outils de désassemblage/mise ou point tels que IDA Pro, OllyDbg, WinDbg, etc. + Capacité de créer et d'effectuer une analyse binaire avec les outils standards d'ingénierie inverse (REMnux, PE Explorer, Malcode, etc.). + Aptitudes en matière d'identification de compresseurs et d'analyse d'entropie + Aptitude à écrire un commentaire cohésif pour l'assemblage du code et les fonctions de maliciel pour un auditoire technique et non technique. Compétence en analyse de réseau expert : + Analyse et/ou déchiffrage de saisies de paquets à partir des analyseurs de protocole de réseau (Wireshark, TCPdump, etc.). + Compréhension éprouvée du comportement, des risques et des contrôles des protocoles de réseau communs. + Compréhension des techniques et des pratiques utilisées pour coder et chiffrer le trafic de réseau et les attaques communes de ces contrôles. + Capacité d'utiliser les données de NetFlow pour identifier les sources d'attaque de réseau + Bonne connaissance des outils et des techniques requises pour analyser et convertir à rebours les protocoles et les données qui sont acheminés dans un environnement de réseau. + Compréhension avérée de l'architecture, du déploiement, des avantages et des faiblesses des mandataires de sécurité de réseau, des formats communs de fichiers journaux et de l'acheminement des données dans un environnement de réseau avec ou sans fil. + Aptitude à écrire un commentaire cohésif pour l'assemblage de paquets et les fonctions de maliciel pour un auditoire technique et non technique. Compétence en renseignement relatif aux menaces : + Compréhension de l'ensemble des menaces et du renseignement de sécurité dans les domaines gouvernemental et commercial. + Bonne connaissance de la recherche et de la modélisation des menaces, ainsi que des évaluations des menaces de sécurité. **Required Technical and Professional Expertise** + Maîtrise de l'anglais (oral et écrit) + Maîtrise du français et de l'anglais (oral et écrit) pour le poste de Montréal + Ayant la Citoyenneté Canadienne ou une carte de résident/e permanent Canadienne + Au moins 3 années d'expérience technique et en services-conseils et expérience à titre d'expert de domaine dans un ou plusieurs des domaines suivants : résolution des incidents, analyse d'expert en informatique et sécurité de réseau. + Au moins 3 années d'expérience pratique de haut niveau liée aux outils matériels/logiciels utilisés dans les domaines de la résolution d'incidents, de l'analyse d'expert, de l'évaluation de sécurité de réseau et/ou de la sécurité des applications. **Preferred Tech and Prof Experience** + Certification in CISSP, ENCE, CCE, GCFA, GCIA, GCIH, CHFI, QSA ou l'équivalent + Attestation de sécurité du Canada Niveau 2 **EO Statement**
          (CAN-Markham) Conseiller -Résolution d'incidents et services, IBM X-Force IRIS      Cache   Translate Page      
**Job Description** L'équipe de résolution d'incidents et de services d'intelligence (IRIS) IBM X-Force est à la recherche de conseillers pour offrir des services professionnels de premier plan en sécurité de l'information, résolution d'incidents et services proactifs à IBM et aux clients d'IBM. Le titulaire du poste offrira des services-conseils au sein d'un groupe de sécurité en croissance touchant divers domaine de sécurité, analysera et résoudra les incidents liés à la sécurité, gérera les menaces actives, exploitera le renseignement de sécurité et travaillera en collaboration avec les clients pour améliorer la cybersécurité. Le candidat recherché aura des compétences avérées en résolution d'incidents, en analyse des intrusions ainsi qu'une base solide en politiques de cybersécurité, en exploitation et en pratiques exemplaires, idéalement au sein d'une grande entreprise. Le candidat aura une bonne connaissance des principaux outils EDR tels que MIR/HX, Falcon Host, ou Carbon Black. Il devra aussi connaître les outils d'analyse d'expert tels que Encase Forensic ou X-Ways et l'analyse des réponses en direct. Le candidat doit avoir d'excellentes aptitudes en communication à l'oral et à l'écrit. Le conseiller gérera tous les aspects d'un mandat de sécurité, du début à la fin. La personne retenue devra essentiellement mettre en application des méthodologies formelles et structurées pour fournir au client un niveau de qualité uniforme reflétant les connaissances et l'expérience d'IBM. Le candidat doit être en mesure de créer et de fournir aux clients des livrables précis en respectant les échéances et de présenter les solutions techniques appropriées, les prochaines étapes et des conclusions précises. Enfin, le candidat doit avoir de solides aptitudes à évaluer et à améliorer l'efficacité des programmes de résolution d'incidents et les politiques de sécurité utilisées. Les conseillers doivent occasionnellement travailler selon un horaire 24x7, et se déplacer au pays et à l'étranger jusqu'à 60 % du temps. Compétences en analyse d'expert et en résolution d'incident : + Capacité d'analyser les systèmes Windows et Unix pour relever toute évidence de compromission. + Bonne connaissance des outils d'expert communs tels que EnCase, FTK, X-Ways et Sleuthkit. + Connaissance des artéfacts d'analyse d'expert Windows et Unix + Capacité de communiquer les constatations et les concepts techniques aux principales parties prenantes. + Expérience relative à l'analyse locale des fichiers journaux en utilisant l'outil d'agrégation SIEM. + Expérience dans la recherche d'auteurs de menaces dans les réseaux de grandes entreprises. + Expérience dans l'utilisation des principaux outils de détection et de réponse aux points d'extrémité (EDR). Aptitudes en analyse de maliciel et en ingénierie inverse : + Analyse et/ou ingénierie inverse du comportement du maliciel à l'aide d'outils et de techniques statiques et dynamiques. + Expérience validée à titre d'expert de domaine dans la détection, l'analyse, les fonctions et la réduction des risques du maliciel, ainsi que dans les tendances en matière de développement de maliciel. + Bonne connaissance de Windows, Linux, OSX OS Internals et des interfaces de programmation d'application. + Parfaite connaissance des langages de programmation de haut, moyen et bas niveau (Perl/Python, C/C++, Assembly). + Bonne connaissance des outils de désassemblage/mise ou point tels que IDA Pro, OllyDbg, WinDbg, etc. + Capacité de créer et d'effectuer une analyse binaire avec les outils standards d'ingénierie inverse (REMnux, PE Explorer, Malcode, etc.). + Aptitudes en matière d'identification de compresseurs et d'analyse d'entropie + Aptitude à écrire un commentaire cohésif pour l'assemblage du code et les fonctions de maliciel pour un auditoire technique et non technique. Compétence en analyse de réseau expert : + Analyse et/ou déchiffrage de saisies de paquets à partir des analyseurs de protocole de réseau (Wireshark, TCPdump, etc.). + Compréhension éprouvée du comportement, des risques et des contrôles des protocoles de réseau communs. + Compréhension des techniques et des pratiques utilisées pour coder et chiffrer le trafic de réseau et les attaques communes de ces contrôles. + Capacité d'utiliser les données de NetFlow pour identifier les sources d'attaque de réseau + Bonne connaissance des outils et des techniques requises pour analyser et convertir à rebours les protocoles et les données qui sont acheminés dans un environnement de réseau. + Compréhension avérée de l'architecture, du déploiement, des avantages et des faiblesses des mandataires de sécurité de réseau, des formats communs de fichiers journaux et de l'acheminement des données dans un environnement de réseau avec ou sans fil. + Aptitude à écrire un commentaire cohésif pour l'assemblage de paquets et les fonctions de maliciel pour un auditoire technique et non technique. Compétence en renseignement relatif aux menaces : + Compréhension de l'ensemble des menaces et du renseignement de sécurité dans les domaines gouvernemental et commercial. + Bonne connaissance de la recherche et de la modélisation des menaces, ainsi que des évaluations des menaces de sécurité. **Required Technical and Professional Expertise** + Maîtrise de l'anglais (oral et écrit) + Maîtrise du français et de l'anglais (oral et écrit) pour le poste de Montréal + Ayant la Citoyenneté Canadienne ou une carte de résident/e permanent Canadienne + Au moins 3 années d'expérience technique et en services-conseils et expérience à titre d'expert de domaine dans un ou plusieurs des domaines suivants : résolution des incidents, analyse d'expert en informatique et sécurité de réseau. + Au moins 3 années d'expérience pratique de haut niveau liée aux outils matériels/logiciels utilisés dans les domaines de la résolution d'incidents, de l'analyse d'expert, de l'évaluation de sécurité de réseau et/ou de la sécurité des applications. **Preferred Tech and Prof Experience** + Certification in CISSP, ENCE, CCE, GCFA, GCIA, GCIH, CHFI, QSA ou l'équivalent + Attestation de sécurité du Canada Niveau 2 **EO Statement**
          (CAN-Montreal) Conseiller -Résolution d'incidents et services, IBM X-Force IRIS      Cache   Translate Page      
**Job Description** L'équipe de résolution d'incidents et de services d'intelligence (IRIS) IBM X-Force est à la recherche de conseillers pour offrir des services professionnels de premier plan en sécurité de l'information, résolution d'incidents et services proactifs à IBM et aux clients d'IBM. Le titulaire du poste offrira des services-conseils au sein d'un groupe de sécurité en croissance touchant divers domaine de sécurité, analysera et résoudra les incidents liés à la sécurité, gérera les menaces actives, exploitera le renseignement de sécurité et travaillera en collaboration avec les clients pour améliorer la cybersécurité. Le candidat recherché aura des compétences avérées en résolution d'incidents, en analyse des intrusions ainsi qu'une base solide en politiques de cybersécurité, en exploitation et en pratiques exemplaires, idéalement au sein d'une grande entreprise. Le candidat aura une bonne connaissance des principaux outils EDR tels que MIR/HX, Falcon Host, ou Carbon Black. Il devra aussi connaître les outils d'analyse d'expert tels que Encase Forensic ou X-Ways et l'analyse des réponses en direct. Le candidat doit avoir d'excellentes aptitudes en communication à l'oral et à l'écrit. Le conseiller gérera tous les aspects d'un mandat de sécurité, du début à la fin. La personne retenue devra essentiellement mettre en application des méthodologies formelles et structurées pour fournir au client un niveau de qualité uniforme reflétant les connaissances et l'expérience d'IBM. Le candidat doit être en mesure de créer et de fournir aux clients des livrables précis en respectant les échéances et de présenter les solutions techniques appropriées, les prochaines étapes et des conclusions précises. Enfin, le candidat doit avoir de solides aptitudes à évaluer et à améliorer l'efficacité des programmes de résolution d'incidents et les politiques de sécurité utilisées. Les conseillers doivent occasionnellement travailler selon un horaire 24x7, et se déplacer au pays et à l'étranger jusqu'à 60 % du temps. Compétences en analyse d'expert et en résolution d'incident : + Capacité d'analyser les systèmes Windows et Unix pour relever toute évidence de compromission. + Bonne connaissance des outils d'expert communs tels que EnCase, FTK, X-Ways et Sleuthkit. + Connaissance des artéfacts d'analyse d'expert Windows et Unix + Capacité de communiquer les constatations et les concepts techniques aux principales parties prenantes. + Expérience relative à l'analyse locale des fichiers journaux en utilisant l'outil d'agrégation SIEM. + Expérience dans la recherche d'auteurs de menaces dans les réseaux de grandes entreprises. + Expérience dans l'utilisation des principaux outils de détection et de réponse aux points d'extrémité (EDR). Aptitudes en analyse de maliciel et en ingénierie inverse : + Analyse et/ou ingénierie inverse du comportement du maliciel à l'aide d'outils et de techniques statiques et dynamiques. + Expérience validée à titre d'expert de domaine dans la détection, l'analyse, les fonctions et la réduction des risques du maliciel, ainsi que dans les tendances en matière de développement de maliciel. + Bonne connaissance de Windows, Linux, OSX OS Internals et des interfaces de programmation d'application. + Parfaite connaissance des langages de programmation de haut, moyen et bas niveau (Perl/Python, C/C++, Assembly). + Bonne connaissance des outils de désassemblage/mise ou point tels que IDA Pro, OllyDbg, WinDbg, etc. + Capacité de créer et d'effectuer une analyse binaire avec les outils standards d'ingénierie inverse (REMnux, PE Explorer, Malcode, etc.). + Aptitudes en matière d'identification de compresseurs et d'analyse d'entropie + Aptitude à écrire un commentaire cohésif pour l'assemblage du code et les fonctions de maliciel pour un auditoire technique et non technique. Compétence en analyse de réseau expert : + Analyse et/ou déchiffrage de saisies de paquets à partir des analyseurs de protocole de réseau (Wireshark, TCPdump, etc.). + Compréhension éprouvée du comportement, des risques et des contrôles des protocoles de réseau communs. + Compréhension des techniques et des pratiques utilisées pour coder et chiffrer le trafic de réseau et les attaques communes de ces contrôles. + Capacité d'utiliser les données de NetFlow pour identifier les sources d'attaque de réseau + Bonne connaissance des outils et des techniques requises pour analyser et convertir à rebours les protocoles et les données qui sont acheminés dans un environnement de réseau. + Compréhension avérée de l'architecture, du déploiement, des avantages et des faiblesses des mandataires de sécurité de réseau, des formats communs de fichiers journaux et de l'acheminement des données dans un environnement de réseau avec ou sans fil. + Aptitude à écrire un commentaire cohésif pour l'assemblage de paquets et les fonctions de maliciel pour un auditoire technique et non technique. Compétence en renseignement relatif aux menaces : + Compréhension de l'ensemble des menaces et du renseignement de sécurité dans les domaines gouvernemental et commercial. + Bonne connaissance de la recherche et de la modélisation des menaces, ainsi que des évaluations des menaces de sécurité. **Required Technical and Professional Expertise** + Maîtrise de l'anglais (oral et écrit) + Maîtrise du français et de l'anglais (oral et écrit) pour le poste de Montréal + Ayant la Citoyenneté Canadienne ou une carte de résident/e permanent Canadienne + Au moins 3 années d'expérience technique et en services-conseils et expérience à titre d'expert de domaine dans un ou plusieurs des domaines suivants : résolution des incidents, analyse d'expert en informatique et sécurité de réseau. + Au moins 3 années d'expérience pratique de haut niveau liée aux outils matériels/logiciels utilisés dans les domaines de la résolution d'incidents, de l'analyse d'expert, de l'évaluation de sécurité de réseau et/ou de la sécurité des applications. **Preferred Tech and Prof Experience** + Certification in CISSP, ENCE, CCE, GCFA, GCIA, GCIH, CHFI, QSA ou l'équivalent + Attestation de sécurité du Canada Niveau 2 **EO Statement**
          (CAN-Montreal) Conseiller -Résolution d'incidents et services, IBM X-Force IRIS      Cache   Translate Page      
**Job Description** L'équipe de résolution d'incidents et de services d'intelligence (IRIS) IBM X-Force est à la recherche de conseillers pour offrir des services professionnels de premier plan en sécurité de l'information, résolution d'incidents et services proactifs à IBM et aux clients d'IBM. Le titulaire du poste offrira des services-conseils au sein d'un groupe de sécurité en croissance touchant divers domaine de sécurité, analysera et résoudra les incidents liés à la sécurité, gérera les menaces actives, exploitera le renseignement de sécurité et travaillera en collaboration avec les clients pour améliorer la cybersécurité. Le candidat recherché aura des compétences avérées en résolution d'incidents, en analyse des intrusions ainsi qu'une base solide en politiques de cybersécurité, en exploitation et en pratiques exemplaires, idéalement au sein d'une grande entreprise. Le candidat aura une bonne connaissance des principaux outils EDR tels que MIR/HX, Falcon Host, ou Carbon Black. Il devra aussi connaître les outils d'analyse d'expert tels que Encase Forensic ou X-Ways et l'analyse des réponses en direct. Le candidat doit avoir d'excellentes aptitudes en communication à l'oral et à l'écrit. Le conseiller gérera tous les aspects d'un mandat de sécurité, du début à la fin. La personne retenue devra essentiellement mettre en application des méthodologies formelles et structurées pour fournir au client un niveau de qualité uniforme reflétant les connaissances et l'expérience d'IBM. Le candidat doit être en mesure de créer et de fournir aux clients des livrables précis en respectant les échéances et de présenter les solutions techniques appropriées, les prochaines étapes et des conclusions précises. Enfin, le candidat doit avoir de solides aptitudes à évaluer et à améliorer l'efficacité des programmes de résolution d'incidents et les politiques de sécurité utilisées. Les conseillers doivent occasionnellement travailler selon un horaire 24x7, et se déplacer au pays et à l'étranger jusqu'à 60 % du temps. Compétences en analyse d'expert et en résolution d'incident : + Capacité d'analyser les systèmes Windows et Unix pour relever toute évidence de compromission. + Bonne connaissance des outils d'expert communs tels que EnCase, FTK, X-Ways et Sleuthkit. + Connaissance des artéfacts d'analyse d'expert Windows et Unix + Capacité de communiquer les constatations et les concepts techniques aux principales parties prenantes. + Expérience relative à l'analyse locale des fichiers journaux en utilisant l'outil d'agrégation SIEM. + Expérience dans la recherche d'auteurs de menaces dans les réseaux de grandes entreprises. + Expérience dans l'utilisation des principaux outils de détection et de réponse aux points d'extrémité (EDR). Aptitudes en analyse de maliciel et en ingénierie inverse : + Analyse et/ou ingénierie inverse du comportement du maliciel à l'aide d'outils et de techniques statiques et dynamiques. + Expérience validée à titre d'expert de domaine dans la détection, l'analyse, les fonctions et la réduction des risques du maliciel, ainsi que dans les tendances en matière de développement de maliciel. + Bonne connaissance de Windows, Linux, OSX OS Internals et des interfaces de programmation d'application. + Parfaite connaissance des langages de programmation de haut, moyen et bas niveau (Perl/Python, C/C++, Assembly). + Bonne connaissance des outils de désassemblage/mise ou point tels que IDA Pro, OllyDbg, WinDbg, etc. + Capacité de créer et d'effectuer une analyse binaire avec les outils standards d'ingénierie inverse (REMnux, PE Explorer, Malcode, etc.). + Aptitudes en matière d'identification de compresseurs et d'analyse d'entropie + Aptitude à écrire un commentaire cohésif pour l'assemblage du code et les fonctions de maliciel pour un auditoire technique et non technique. Compétence en analyse de réseau expert : + Analyse et/ou déchiffrage de saisies de paquets à partir des analyseurs de protocole de réseau (Wireshark, TCPdump, etc.). + Compréhension éprouvée du comportement, des risques et des contrôles des protocoles de réseau communs. + Compréhension des techniques et des pratiques utilisées pour coder et chiffrer le trafic de réseau et les attaques communes de ces contrôles. + Capacité d'utiliser les données de NetFlow pour identifier les sources d'attaque de réseau + Bonne connaissance des outils et des techniques requises pour analyser et convertir à rebours les protocoles et les données qui sont acheminés dans un environnement de réseau. + Compréhension avérée de l'architecture, du déploiement, des avantages et des faiblesses des mandataires de sécurité de réseau, des formats communs de fichiers journaux et de l'acheminement des données dans un environnement de réseau avec ou sans fil. + Aptitude à écrire un commentaire cohésif pour l'assemblage de paquets et les fonctions de maliciel pour un auditoire technique et non technique. Compétence en renseignement relatif aux menaces : + Compréhension de l'ensemble des menaces et du renseignement de sécurité dans les domaines gouvernemental et commercial. + Bonne connaissance de la recherche et de la modélisation des menaces, ainsi que des évaluations des menaces de sécurité. **Required Technical and Professional Expertise** + Maîtrise de l'anglais (oral et écrit) + Maîtrise du français et de l'anglais (oral et écrit) pour le poste de Montréal + Ayant la Citoyenneté Canadienne ou une carte de résident/e permanent Canadienne + Au moins 3 années d'expérience technique et en services-conseils et expérience à titre d'expert de domaine dans un ou plusieurs des domaines suivants : résolution des incidents, analyse d'expert en informatique et sécurité de réseau. + Au moins 3 années d'expérience pratique de haut niveau liée aux outils matériels/logiciels utilisés dans les domaines de la résolution d'incidents, de l'analyse d'expert, de l'évaluation de sécurité de réseau et/ou de la sécurité des applications. **Preferred Tech and Prof Experience** + Certification in CISSP, ENCE, CCE, GCFA, GCIA, GCIH, CHFI, QSA ou l'équivalent + Attestation de sécurité du Canada Niveau 2 **EO Statement**
          (CAN-Toronto) Conseiller -Résolution d'incidents et services, IBM X-Force IRIS      Cache   Translate Page      
**Job Description** L'équipe de résolution d'incidents et de services d'intelligence (IRIS) IBM X-Force est à la recherche de conseillers pour offrir des services professionnels de premier plan en sécurité de l'information, résolution d'incidents et services proactifs à IBM et aux clients d'IBM. Le titulaire du poste offrira des services-conseils au sein d'un groupe de sécurité en croissance touchant divers domaine de sécurité, analysera et résoudra les incidents liés à la sécurité, gérera les menaces actives, exploitera le renseignement de sécurité et travaillera en collaboration avec les clients pour améliorer la cybersécurité. Le candidat recherché aura des compétences avérées en résolution d'incidents, en analyse des intrusions ainsi qu'une base solide en politiques de cybersécurité, en exploitation et en pratiques exemplaires, idéalement au sein d'une grande entreprise. Le candidat aura une bonne connaissance des principaux outils EDR tels que MIR/HX, Falcon Host, ou Carbon Black. Il devra aussi connaître les outils d'analyse d'expert tels que Encase Forensic ou X-Ways et l'analyse des réponses en direct. Le candidat doit avoir d'excellentes aptitudes en communication à l'oral et à l'écrit. Le conseiller gérera tous les aspects d'un mandat de sécurité, du début à la fin. La personne retenue devra essentiellement mettre en application des méthodologies formelles et structurées pour fournir au client un niveau de qualité uniforme reflétant les connaissances et l'expérience d'IBM. Le candidat doit être en mesure de créer et de fournir aux clients des livrables précis en respectant les échéances et de présenter les solutions techniques appropriées, les prochaines étapes et des conclusions précises. Enfin, le candidat doit avoir de solides aptitudes à évaluer et à améliorer l'efficacité des programmes de résolution d'incidents et les politiques de sécurité utilisées. Les conseillers doivent occasionnellement travailler selon un horaire 24x7, et se déplacer au pays et à l'étranger jusqu'à 60 % du temps. Compétences en analyse d'expert et en résolution d'incident : + Capacité d'analyser les systèmes Windows et Unix pour relever toute évidence de compromission. + Bonne connaissance des outils d'expert communs tels que EnCase, FTK, X-Ways et Sleuthkit. + Connaissance des artéfacts d'analyse d'expert Windows et Unix + Capacité de communiquer les constatations et les concepts techniques aux principales parties prenantes. + Expérience relative à l'analyse locale des fichiers journaux en utilisant l'outil d'agrégation SIEM. + Expérience dans la recherche d'auteurs de menaces dans les réseaux de grandes entreprises. + Expérience dans l'utilisation des principaux outils de détection et de réponse aux points d'extrémité (EDR). Aptitudes en analyse de maliciel et en ingénierie inverse : + Analyse et/ou ingénierie inverse du comportement du maliciel à l'aide d'outils et de techniques statiques et dynamiques. + Expérience validée à titre d'expert de domaine dans la détection, l'analyse, les fonctions et la réduction des risques du maliciel, ainsi que dans les tendances en matière de développement de maliciel. + Bonne connaissance de Windows, Linux, OSX OS Internals et des interfaces de programmation d'application. + Parfaite connaissance des langages de programmation de haut, moyen et bas niveau (Perl/Python, C/C++, Assembly). + Bonne connaissance des outils de désassemblage/mise ou point tels que IDA Pro, OllyDbg, WinDbg, etc. + Capacité de créer et d'effectuer une analyse binaire avec les outils standards d'ingénierie inverse (REMnux, PE Explorer, Malcode, etc.). + Aptitudes en matière d'identification de compresseurs et d'analyse d'entropie + Aptitude à écrire un commentaire cohésif pour l'assemblage du code et les fonctions de maliciel pour un auditoire technique et non technique. Compétence en analyse de réseau expert : + Analyse et/ou déchiffrage de saisies de paquets à partir des analyseurs de protocole de réseau (Wireshark, TCPdump, etc.). + Compréhension éprouvée du comportement, des risques et des contrôles des protocoles de réseau communs. + Compréhension des techniques et des pratiques utilisées pour coder et chiffrer le trafic de réseau et les attaques communes de ces contrôles. + Capacité d'utiliser les données de NetFlow pour identifier les sources d'attaque de réseau + Bonne connaissance des outils et des techniques requises pour analyser et convertir à rebours les protocoles et les données qui sont acheminés dans un environnement de réseau. + Compréhension avérée de l'architecture, du déploiement, des avantages et des faiblesses des mandataires de sécurité de réseau, des formats communs de fichiers journaux et de l'acheminement des données dans un environnement de réseau avec ou sans fil. + Aptitude à écrire un commentaire cohésif pour l'assemblage de paquets et les fonctions de maliciel pour un auditoire technique et non technique. Compétence en renseignement relatif aux menaces : + Compréhension de l'ensemble des menaces et du renseignement de sécurité dans les domaines gouvernemental et commercial. + Bonne connaissance de la recherche et de la modélisation des menaces, ainsi que des évaluations des menaces de sécurité. **Required Technical and Professional Expertise** + Maîtrise de l'anglais (oral et écrit) + Maîtrise du français et de l'anglais (oral et écrit) pour le poste de Montréal + Ayant la Citoyenneté Canadienne ou une carte de résident/e permanent Canadienne + Au moins 3 années d'expérience technique et en services-conseils et expérience à titre d'expert de domaine dans un ou plusieurs des domaines suivants : résolution des incidents, analyse d'expert en informatique et sécurité de réseau. + Au moins 3 années d'expérience pratique de haut niveau liée aux outils matériels/logiciels utilisés dans les domaines de la résolution d'incidents, de l'analyse d'expert, de l'évaluation de sécurité de réseau et/ou de la sécurité des applications. **Preferred Tech and Prof Experience** + Certification in CISSP, ENCE, CCE, GCFA, GCIA, GCIH, CHFI, QSA ou l'équivalent + Attestation de sécurité du Canada Niveau 2 **EO Statement**
          (CAN-ON-TORONTO) Concepteur d'architecture Workday délégué      Cache   Translate Page      
**Job Description** L'équipe des Services d'affaires mondiaux IBM est composée de conseillers en affaires, en stratégie et en technologie qui aident les entreprises à prendre des décisions plus intelligentes et offrent des expériences clients et consommateurs inégalées en matière d'informatique cognitive, d'analytique des données, de technologie infonuagique et de développement d'applications mobiles. Grâce à sa portée mondiale, à des méthodologies axées sur les résultats et à sa vaste expertise sectorielle, les Services d'affaires mondiaux IBM donnent aux clients dans plus de 170 pays les moyens de réinventer numériquement leur entreprise et d'avoir un avantage concurrentiel dans l'ère cognitive. Nous sommes actuellement à la recherche d'un concepteur d'architecture délégué pour nos services postproduction (PPS) qui s'intégrera à notre groupe de services-conseils Workday en plein essor. Notre groupe PPS aide les clients à maximiser la valeur de leur investissement Workday en leur faisant profiter de sa solide expérience du domaine afin de stabiliser, d'améliorer et de développer leur empreinte Workday. Jouant un rôle critique dans le succès du client et d'IBM, le concepteur d'architecture délégué doit fournir son expertise liée à la mise en œuvre, au processus commercial et à Workday pour mener à bien leur mandat. Les principales responsabilités sont : **Mandats de vente** + Participer au processus de vente pour recueillir de l'information sur les projets, incluant l'arrière-plan et le contexte plus large des projets, afin de mettre en œuvre la solution Workday pour la gestion du capital humain, la rémunération, la paie, les avantages, le suivi du temps, les absences, les talents, les données financières, l'intégration et la conversion des données + Anticiper les besoins du client et identifier les solutions appropriées pour exploiter pleinement l'expérience liée aux meilleures pratiques + Traduire les exigences commerciales du client en solutions et participer à la création du parcours de prestation, aux estimations et aux lignes de temps du projet + S'associer aux équipes de vente et de prestation pour établir une réponse aux appels d'offres, créer des propositions budgétaires et élaborer des présentations pour identifier des opportunités de revenu additionnelles + Identifier de façon proactive les nouvelles opportunités de service par les biais d'interactions avec le client + Aider à définir le champ d'application du projet par des conversations plus vastes sur la solution/vision **Déploiements – Postproduction** + Gérer la mise en œuvre et le soutien général de la solution Workday pour le client + S'assurer que les équipes de projet et de soutien ont fait l'objet d'une planification appropriée, qu'elles sont bien dotées en personnel et que le projet est exécuté selon le plan + Acquérir de l'expérience liée à la méthodologie de mise en œuvre de l'entreprise et l'utiliser pour tous les mandats + Gérer le processus d'ordre de modification lorsque le client demande des ressources pour réaliser des tâches qui ne sont pas comprises dans la description du travail + Identifier les opportunités de positionnement d'autres offres de service + Entretenir la relation avec le client et s'assurer de sa satisfaction en le positionnant comme client de valeur. + Faire preuve d'habilité à acquérir rapidement de l'expérience liée aux améliorations de la gamme de produits Workday et des nouveaux produits + Fournir des conseils et assurer le mentorat des conseillers qui participent à la postproduction et à la mise en œuvre **Activités** + Établir des relations d'affaires fondées sur la confiance et la collaboration avec les clients de tous les niveaux + Assurer la réussite du projet en aidant les directeurs de mandat à supprimer les obstacles et à avoir une attention soutenue + Rechercher des opportunités de fournir une expérience client exceptionnelle + Identifier les projets d'amélioration continue de la qualité par le biais de processus, de modèles et de meilleures pratiques **Compétences requises** + Excellente compréhension de la gamme de produits Workday et des caractéristiques interfonctionnelles, comme la sécurité et le cadriciel de processus d'affaires + Avoir complété et livré toutes les étapes de mise en œuvre (de la planification au déploiement) de Workday en tant que responsable d’un ou plusieurs produits + Avoir établi des relations et s'être imposé comme conseiller de confiance de votre équipe et des clients + Pouvoir identifier et analyser les risques et établir des plans pour les réduire + Pouvoir travailler de façons créative et analytique dans un environnement axé sur la résolution de problèmes + Penser de façon stratégique à propos des défis commerciaux et techniques + Communiquer efficacement avec diverses parties prenantes fonctionnelles (techniques et non techniques) à tous les niveaux de l'entreprise. Pouvoir bien se présenter auprès des chefs opérationnels + Pouvoir diriger et faciliter des discussions sur les concordances-écarts et les solutions avec les dirigeants principaux + Pouvoir gérer de multiples tâches simultanément et respecter les échéances, sans perdre de vue les priorités malgré des exigences contradictoires + Avoir des aptitudes en relations interpersonnelles, ainsi que créer, gérer et favoriser des environnements orientés sur les équipes + Avoir la capacité confirmée de créer, de gérer et de favoriser des environnements orientés sur les équipes + Avoir un grand désir de travailler dans un environnement de systèmes d'information + Avoir des aptitudes démontrées en matière de leadership et de gestion\#adaytorefer IWDGBS18 IWD18&A **Required Technical and Professional Expertise** + Au moins 5 années d'expérience en systèmes de planification des ressources humaines (ERP), ainsi qu'une connaissance et une expérience approfondies en gestion du capital humain (HCM)/systèmes de ressources humaines/processus commerciaux + Au moins 2 années d'expérience en conception, configuration et mise en œuvre du produit de gestion du capital humain (HCM) Workday + Au moins 1 année d'expérience dans la direction d'une équipe de services-conseils et de client dans un projet de mise en œuvre de Workday dans le domaine fonctionnel HCM + Certification HCM **Preferred Tech and Prof Experience** + Au moins 3 années d'expérience de travail en services-conseils, de préférence avec un important intégrateur de systèmes + Au moins 3 années d'expérience en gestion de programme/projet + Certification relative à un ou plusieurs des produits Workday suivants : Payroll, Compensation, Benefits, Talent, Financials, Time, et/ou Absence **EO Statement** IBM is committed to creating a diverse environment and is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or veteran status. IBM is also committed to compliance with all fair employment practices regarding citizenship and immigration status.
          (USA-TX-COPPELL) App Programmer - Technical Solution Specialist (Graduate Co-op)      Cache   Translate Page      
**Job Description** This is a supplemental co-op position for an application programmer within the IBM Global Solution Center in Coppell, Texas. The Global Solution Center is a world-class client center where teams of Industry Solution Architects and Specialists bring IBM together to accelerate solutions to help clients innovate and address their most challenging business problems. This person will work with team members and clients to create high quality proofs-of-concept and generate technical sales assets for the progression or close of solution sales opportunities. Key Responsibilities: + Actualize complex systems of engagement with in-depth product-, technology-, or industry-related specialized skills + Leverage IBM Cloud Platform as a Service developer platform services for composition and aggregation + Develop mobile applications on iOS and Android platforms + Leverage and exploit IBM’s extensive data analytics capabilities, including data science and data management aspects Key Skills: + Demonstrated application design skills + Demonstrated application programming skills + Demonstrated knowledge of data analytics discipline, including data science and data management aspects + Knowledge of contemporary programming environment / skills [e.g., REST APIs, Node-JS, GitHub, Slack, Mongo, Express, Angular, Node (MEAN stack), HTML/HTML5, Java/Javascript, Python] + Knowledge of IBM Cloud platform or other cloud environment + IDE familiarity and usage + Knowledge of IBM Cloud platform or other cloud environment + Code repository usage, build system (i.e. webpack), deployment (IBM Cloud/heroku, docker) + Client application frameworks, such as IBM MobileFirst + Knowledge of current industry trends + Familiar with Agile techniques + Strong communication skills, works well in teams, and quickly adapts to new technologies Other Requirements: + This co-op role will work in the Coppell, TX IBM office. You should reside in the Dallas-Fort Worth metro area. + You must be actively pursuing a graduate degree, preferably in Computer Science or related area. + This is a full-time role from mid-May until late-August 2019. There is potential to continue employment afterward, part-time (min. 20hr/wk) during school and full-time during school breaks. + IBM will not be providing visa sponsorship for these positions, now or in the future. Therefore, in order to be considered, you must have the ability to work without a need for current or future employment-based visa sponsorship. **Required Technical and Professional Expertise** + At least 6 months' experience in designing / creating IT solutions + At least 6 months' experience in analyzing client needs, requirements and expectations + At least 1 year's experience in written, verbal and visual communications skills **Preferred Tech and Prof Experience** + At least 6 months' experience with contemporary programming skills [e.g., REST APIs, Node-JS, GitHub, Slack, Mongo, Express, Angular, Node (MEAN stack), HTML/HTML5, Java/Javascript, Python] + At least 6 months' experience with IBM Bluemix or other cloud platform **EO Statement** IBM is committed to creating a diverse environment and is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or veteran status. IBM is also committed to compliance with all fair employment practices regarding citizenship and immigration status.
          Care home residents enjoy a series of early year excursions      Cache   Translate Page      
ENERGETIC walking enthusiasts at a retirement village have taken advantage of the early year sunshine to kick off a series of excursions overseen by an intrepid couple whose previous exploits have taken them all over the world.
          Primary school pupils as young as four to learn about paedophiles and exploitation      Cache   Translate Page      
NURSERY kids aged FOUR are being taught about child sexual abuse and exploitation. National Crime Agency chiefs launched a series of cartoons teaching children what are “unhealthy behaviours”. The Peppa Pig-style animations do not show any adult sexual offenders but spell out how youngsters can be manipulated online. Three of the Jessie & Friends films […]
          Exploiting Genuitec Secure Delivery Center (SDC) < Version 5.4.7 (Local File Inclusion)      Cache   Translate Page      
A local file inclusion vulnerability exists in Genuitec Secure Delivery Center (SDC) in versions lower than 5.4.7.  This vulnerability can be exploited to gain admin access to the application. To Exploit the LFI, an attacker can insert a series of “..\”‘s into the URL to move up the directory structure. The attacker will need to...
          Assistant technique en pharmacie - temps plein - Pharmacie Ann Labrecque affiliée Pharmaprix - Montréal, QC      Cache   Translate Page      
*Lieu: * 6411 Sherbrooke Ouest, Montreal, Québec, H4B 1N3 Joignez-vous à un magasin qui appartient à des intérêts locaux et est exploité par eux afin d...
From Indeed - Wed, 06 Mar 2019 20:07:05 GMT - View all Montréal, QC jobs
          Owner Operator Truck Driver / Propriétaires exploitants pour le transport - Western Alliance Logistics Fleet Inc. - Kirkland, QC      Cache   Translate Page      
*\*\*Version française disponible ci-dessous\*\** Western Alliance Logistics Fleet is expanding rapidly! We are looking for qualified Class 1 Single and/or...
From Indeed - Tue, 04 Dec 2018 16:47:17 GMT - View all Kirkland, QC jobs
          Concepteur Mécanique (F/H)      Cache   Translate Page      
Devenez Concepteur mécanique (F/H) chez Fives Syleps à Lorient ! Quelles missions proposons-nous ? Au sein du bureau d'études mécaniques, vous concevez les architectures matérielles, les ensembles mécaniques capables de répondre aux spécifications techniques dans le cadre d'avant projets ou de projets en développement. En tant que concepteur mécanique, vous définissez et validez la conception mécanique de systèmes embarqués/autonomes, motorisés (asservis) pour des fabrications unitaires ou des petites séries. Vous conduisez les études mécaniques sur les bases des exigences négociées. Vous rédigez les analyses fonctionnelles nécessaires et réalisez la définition détaillée des sous-ensembles mécaniques. Vous spécifiez les composants mécaniques et les interfaces des équipements. Vous lancez et exploitez les simulations et essais mécaniques de validation. Vous organisez et synthétisez les travaux d'études réalisés. Vous organisez et animez des revues de conception et gérez le budget associé Vous conduisez les tests de validation des prototypes. Des déplacements de courte durée sont à prévoir sur les sites clients.
          Responsable Exploitation Transport 62 H/F      Cache   Translate Page      
Nous recherchons le / la Responsable Exploitation Transport basé(e) à Calais (62). Rattaché(e) au Dirigeant de l'entreprise, véritable bras droit des opérations de l'entreprise, vous avez pour mission de gérer l'exploitation et garantir la performance économique du service. Vous avez également la responsabilité de : - Manager une équipe d'Exploitants et de Chauffeurs (recrutement, formation, intégration, évaluation), - Optimiser le planning et le plan des charges, - Traiter les offres tarifaires et appels d'offres selon le cadre défini par la Direction, - Veiller à la qualité de service, au respect des délais et des engagements pris par le commerce auprès des clients, - Entretenir les relations avec les clients et les sous-traitants (liste fournisseurs, prix, communication), - Assurer et organiser les astreintes, - Gérer les objectifs individuels et collectifs du service et mettre en oeuvre les actions pour atteindre les KPI fixés, - Contrôler les résultats et l'efficacité des mesures mises en place.
          Ownership, Scarcity, and Economic Decision Making      Cache   Translate Page      

[Originally  published in Volume 5, No. 1 (Spring 2002) of the Quarterly Journal of Austrian Economics.]

A central theme of all schools of economics is the notion that goods are scarce. The extent of human wants and needs is sufficiently great that the means man would apply to those ends are limited, requiring that he choose among alternative actions. The purpose of this article is to call attention to a facet of scarcity that stems from this fundamental notion and that is of relevance to economic decision making, the determination of what goals to pursue, and how to attain them. This facet is the ownership of these scarce goods. The fact of ownership means that there is an additional problem faced by those who would use such goods, beyond the fact that such goods are physically unable to satisfy all conceivable uses to which they could be put. This problem is how to convince the owner, who by the very meaning of ownership is entitled to complete control over those goods, to part with those goods (so that they may be applied to other uses).

Since some owners may be more willing to part with those goods than others, the notion of how scarce some good is for a particular use cannot be answered outside the context of ownership and the valuations of property owners, making scarcity in this sense subjective as well. The existence of and need for property is a consequence of scarcity, which is further affected by the very institution to which it gives rise. However, this “problem” in a sense supplies its own solution, as ownership implies the ability to exchange, and consequently, the emergence of exchange ratios in a common unit (that is, money prices) that permit economic calculation and thus the ability to coherently compare prospective courses of action.

This article will attempt to elaborate on this idea, and applications of this notion will be made to the problems of socialism, monopoly capitalism, and business cycle theory.

Scarcity in the General Sense

We live in a world characterized by scarcity. That is, the physical amount of the things man would use to satisfy his wants and needs are limited in relation to those wants and needs.1 It is for this reason that conflicts can arise over things: if goods were so plentiful that another’s use of them would not preclude my use of them, then no disagreements could arise over their use. It is because of the possibility of such conflicts that some means of conflict resolution is needed, and this is precisely why any theory of conflict resolution—ethics—is ultimately a theory of property rights (Rothbard 1998; Hoppe 1989, 1993). When scarce goods become owned, then conflict over their use is resolved (at least in principle). These goods then become property, and as the owner of property, I am entitled to exclude others from the use of the goods manifesting themselves as property. Of course, questions as to how property may be justifiably acquired must be resolved,2 but once such questions are addressed, economic interactions between men become exchanges of property under a system delineating how such exchanges may legitimately take place.

Thus the concept of property stems from that of scarcity. This connection has long been recognized. Menger (1976, quoted in Salerno 1999) argues that

[A person’s] property is not ... an arbitrarily combined quantity of goods, but a direct reflection of his needs, an integrated whole, no essential part of which can be diminished or increased without affecting realization of the end it serves. (p. 84)

Salerno further notes that property is “a praxeological category that refers to a purposively created structure of goods that is adjusted through the operations of economizing to serve the structure of ends aimed at by an individual actor” (p. 84), the need for which (economizing) is entirely due to the fact of scarcity. Scarcity is a fundamental concept of economics and, more generally, of human action, as we confront scarcity with every action.

Unowned goods become property precisely because their use by one person means that others will be unable to use them. When a good is unowned (for example, in a state of nature), the question of acquiring it and making it one’s property is a question, as with all actions, of choosing one course of action over another. However, given a system of property rights that determines how goods may be justly acquired, interactions with others do not necessarily arise. That is, as an unowned good, no one else has any justifiable claim over it. Others may desire it or hope the prospective owner puts it to a certain use, but in attempting to obtain it, one needs, in principle, no more than one’s own labor. Cooperation with others is not necessary (though of course it may be preferable to acting alone).

Scarcity as Derived from Ownership

The case is different regarding goods that are owned. Here, interactions with others necessarily arise when nonowners seek to put the good to an alternative uses. The owner, presumably, has a just claim over the use of that good, and he alone may decide how that good is put to use. Different property rights regimes may place greater or lesser constraints over the extent of his use, but ultimately the owner determines what will happen to this good. Of course, with a system of property rights there must not only be constraints on how property is acquired, but also on how it is exchanged. Still, what determines the terms on which exchanges of property take place are the desires of property owners on both sides of an exchange.

Because of the fundamental fact of scarcity, a good can be applied to multiple ends, any one of which precludes the others from being realized. In deciding whether to homestead an unowned good (that is, apply one’s labor to acquiring the good and so become the just owner), a person must judge whether that choice will best meet his ends. He must then make a further choice as to how the good should be obtained and used. Of course, he must understand the property rules for his society, so that his actions are justifiable, but in this case the only barriers due to scarcity that he faces are the facts that by homesteading the good, he cannot do something else, and that by using the good in one way he cannot use it in some other way.

He of course faces these same difficulties when deciding whether to acquire an owned good. However, now he faces an additional problem: namely, how to obtain access to property from which he is forbidden, absent the owner’s consent. The scarcity he now faces is distinct from the fundamental or general scarcity that characterizes our world. For under a private property regime, the owner alone decides how available an owned good will be for various purposes. This scarcity stemming from ownership holds across all property. For to obtain someone else’s property, I must engage in some kind of exchange with that owner, and this presumably will involve an exchange of property. If, say, owners of beer are demanding $20 a bottle for their product, then if I so desire beer that I will pay this price in money property, my money property likewise becomes scarce to me and I must be quite careful in how I apply it elsewhere. On the other hand, with money prices, I am at least able to coherently apprehend scarcity in this sense, as there exists numerical ratios that allow me to compare prospective actions to anticipated outcomes.

Thus we can see that goods can be considered scarce not only on the basis of the limits of their physical supply relative to wants, but also on the basis of the desires of the owners of those goods. The need for and existence of property stems from a fundamental fact of reality regarding objects as goods—namely, scarcity. However, once a good becomes property, there is a further aspect of scarcity that must be considered, and this aspect stems from ownership. Because of scarcity in the fundamental sense, one is forced to make choices. An action made in one endeavor is an action that cannot be made in another. A ton of steel used to make cars cannot be used to make railroad tracks.

Because of scarcity due to ownership, one is forced to take something else into consideration: how to persuade the owner of the good in question to part with it, and this is distinct from the notion of scarcity as reflecting a limited physical supply relative to wants (although, of course, it is ultimately dependent on this fact). Now, the question is not only whether to use steel to make cars versus railroad tracks, but how to obtain the necessary steel from the person who owns it. Depending on the relative ease with which this can be done (that is, how much other property must be given in exchange for this steel), one application might be chosen over the other, and it is possible that neither will be feasible. The owner may be so insistent on keeping his property that the only price (in terms of money property) that will change his mind is sufficiently high for an entrepreneur to judge that these goods cannot be profitably applied anywhere. Or, the owner might be sufficiently generous that an entrepreneur will judge a wide range of projects to be feasible. In either case, the good in question is scarce to the extent that the owner wants it scarce.

Property is a means for solving one problem: the fact that prospective means in the physical world are of insufficient supply to meet all our ends, so conflicts with others may arise as a result. Property rights in these means establish boundaries which exclude others from using these means, and so serve as a way of resolving conflicts over them. (Of course, any property rights system, including systems based on the violation of such rights, for example, the State, is only effective to the extent that people are willing to abide by it.) In solving one problem—namely, disagreement over (scarce) goods in a state of nature—property creates another problem: the fact that an owner must now be persuaded to part with his property if one desires to apply that good to some end. However, as a property rights system must provide some way of exchanging validly owned goods, the system permits a solution to this problem: specifically, economic calculation. The amount of property one must surrender to acquire some other property, deemed more important to satisfying one’s needs, can be determined in terms of money prices. One can calculate whether the anticipated proceeds from some course of action will exceed the costs required to presumably bring that action about.

So under a system of property rights, economic decision making must take scarcity into account, not only in the usual sense of choosing which wants are to be satisfied with a finite physical supply, but also in the sense that how available a good is depends also on the circumstances arising from that particular good being owned. When a good is owned (and on the free market, ownership implies not just control but the ability to exchange), the notion of a quantifiable amount of property needed to acquire that good comes into existence. This in turn leads to numerical exchange ratios (prices), which are the basis of economic calculation for comparing prospective gains and costs. Whether a particular good will be scarce or plentiful relative to a potential use then depends on how much property that good’s owner demands for it; the question of how to “best” produce something cannot be answered outside the framework of a property rights system for determining what factors are available (attainable) for its production. Indeed, the availability of factors in an economic sense plays a role in determining what should be produced in the first place.

Implications for Economic Decision Making

Under a private property regime, there is a duality: On the one hand, consumers, as property owners, determine what is produced to the extent that producers whose products are unwanted by consumers will soon find themselves out of business. On the other hand, producers, as property owners, determine what is consumed to the extent that they decide to allocate their property to certain production processes. If the owner of some factor of production will not commit that factor to some line of production, those products will not be produced and, hence, not consumed. He may come to regret his decision, but that can only be revealed in the future, not now. The wishes of consumers and the “knowledge” of other entrepreneurs are irrelevant. As Rothbard (1993, p. 561–66) argues, the concept of “consumer sovereignty,” if used in any but the above sense, is false.

Attention here must be drawn to the aspect of scarcity that derives from the specific fact of ownership, as opposed to the more general condition that the physical supply of a good is insufficient to meet all wants regarding that good. To be sure, we live in a world where goods exist only in finite physical amounts, so that not all wants can be satisfied. However, a subset of this more general form of scarcity is the scarcity that depends on the subjective valuations and desires of property owners. Whether a good is scarce or plentiful from this standpoint depends on the wishes of the owner(s) of that good.3 A few pounds of wheat, for example, may be more plentiful than a ton of wheat, if the owners in the former case are extremely generous with their property while the owners in the latter case are extremely covetous of theirs. It is this component of scarcity, and not only the general fact of physical scarcity relative to wants, which is relevant for economic decision making. Even to acquire an unowned good from a state of nature requires the concept of self-ownership, such that one can compare the amount of property one would receive by acquiring the good oneself or working in a different line of production. (This leaves aside issues of alienability in ones body compared with physical objects; see Kinsella 1999.)

Under a capitalist system, it is largely irrelevant who owns what.4 More precisely, the functioning of a market does not depend on particular ownership, only on the fact of ownership. As a consumer of beer, it may matter quite a bit to me that the owners of factors that could produce beer are unwilling to devote their resources to such production, thus yielding less beer than (technically) possible. However, with unfettered private property rights (such that valid exchanges are unhindered), there will be no situations of surplus or shortage, where actors cannot adjust prices and where there are willing sellers and buyers, but no willing buyers and sellers, respectively. (Markets “clear,” in other words.5) It is only important that someone owns a factor of production. In that case, one may compare the anticipated revenues (in terms of money property) from an action with the costs (also in terms of money property) of bringing that action about. Once one has formed a judgment as to how much property consumers will give for some product, one can calculate how much property (in the same units) one can afford to give to acquire the means judged appropriate to produce that good. Regardless of whether a particular factor is owned by a miser or a freewheeling sort, exchange ratios result that permit the meaningful comparison of various actions on the market.

Factors of production are valuable because the output they produce is valuable. But because the outputs of production are subjectively valued, it is not possible to compare outputs with potential inputs on the basis of value. However, under a system of private property in the means of production, numerical exchange ratios (prices) exist which permit precisely this comparison (that is, economic calculation). Whether a factor owner is stingy or generous (so that the price of his factor is “high” or “low”) is irrelevant to the fact that economic calculation is the tool of entrepreneurs who must always first form a judgment about the future. Whatever “knowledge” may be “embedded” in the prices in those two different cases in no way changes the fact that, in either case, the factor in question can only be applied to production if an entrepreneur judges that it will be profitable, and if he can obtain property sufficient enough to acquire it (Hülsmann 1997). Indeed, the question of whether he can afford this factor determines the profitability of that factor in any given venture. The scarcity induced by ownership is always addressable by economic calculation.

The question of what goods to produce cannot be answered separately from the question of how scarce the factors needed to produce that good are. However, this scarcity is dependent on the ownership of those goods, and not simply on the fact that such resources exist in physically finite amounts. Thus one can never speak of value scales as such for the purposes of economic planning. One must always speak in terms of how much (anticipated) property consumers are willing to give in exchange for those goods, which, when combined with the amount of property (referred to a common unit) needed to obtain the means for producing those goods, enables one to decide what is to be produced for consumption.6 Value scales of consumers are only part of the problem. If a particular factor owner will not surrender his property for less than what other entrepreneurs think it can yield in some line of production, then that factor will not be used in such a way, regardless of consumer wishes (or competing entrepreneurs’ knowledge thereof).7

Predecessors

The notion that the scarcity of a good depends on the ownership of that good is not entirely new. Indeed, an early economist of Austrian bent, Bastiat (1966b, chap. 1), spoke of the subjectivity of scarcity (and its flip side, abundance) when he noted that people have different attitudes toward scarcity depending on what side of a transaction they are on. In fact, property played a key role in his thought. Consider the following passage from Bastiat (1966a, p. 228):

What I now say, what I declare with conviction as an absolute certainty in my own mind, is this: Yes, there is constant interaction between private property and the communal domain. ... But the second assertion, amplified and exploited by the socialists, is even more dangerously erroneous; for this interaction does not cause any part of the communal domain to be appropriated into the domain of private property, but, on the contrary, constantly extends the former at the expense of the latter. Private property, inherently just and legitimate, because it always is proportional to services, tends to convert onerous utility into gratuitous utility. It is the spur that impels the human intellect to realize the latent potential of the forces of Nature. It attacks, to its own profit admittedly, the obstacles that stand in the way of gratuitous utility. And when the obstacle is surmounted to any degree, we find that it results in corresponding benefit to all. Then, tirelessly, property attacks new obstacles, and this process continues with never an interruption, steadily raising the standard of living, bringing the great family of man nearer and nearer the goals of community and equality.

There are probably a number of ways to interpret this passage, but its emphasis on the centrality of property in human society is clear. Bastiat clearly recognizes the role property plays as a means toward our ends. However, one can discern (at least, with a broad reading) elements of the role of economic calculation here. For by permitting exchange ratios (Bastiat elsewhere speaks of the necessity of exchange for determining value), individual ownership of property allows all others in society to appraise such property as means for meeting their ends, whereas such an appraisal would be impossible without property. The means available to man without economic calculation are of extremely limited scope; private property enabling such calculation broadens this scope enormously.

Among modern Austrians, it is Rothbard who comes closest to calling explicit attention to this concept in his discussion of monopoly prices (Rothbard 1993, chap. 10). Here, Rothbard notes that the notion of “restrictionist” production (a charge frequently leveled against entrepreneurs in support of antitrust policies) makes no sense on a free market, as the fact of scarcity means that one always restricts some production by the simple fact of pursuing one course of action over another. According to Rothbard,

In the real world of scarce resources in relation to possible ends, all production involves choice and the allocation of factors to serve the most highly valued ends. In short, the production of any product is necessarily always “restricted.” Such “restriction” follows simply from the universal scarcity of factors and the diminishing marginal utility of any one product. But then it is absurd to speak of “restriction” at all.

And in his discussion of the concept of “consumer sovereignty” (pp. 561–66), Rothbard notes the dual role all men play as both consumers and producers, and that the proper conception is one of self-sovereignty. The notion that producers serve consumers is true in the sense that producers must make things that consumers want, otherwise they will go out of business. However, it is false in a literal sense, and certainly unjustifiable in an ethical sense.

In the context of a different controversy of relevance, namely the socialist calculation debate, Rothbard (1991) quotes Professor Georg Halm:

It is true that the central authority would know quite well how many capital goods of a given kind it possessed or could procure....; it would know the capacity of the existing plant in the various branches of production; but it would not know how scarce capital was. For the scarcity of the means of production must always be related to the demand for them, whose fluctuations give rise to variations in the value of the good in question.

It can only be added to this insightful statement that “demand” must be understood to include reservation demand, the amount that sellers will withhold from the market (see Rothbard 1993, p. 118). But of course, something can only be withheld on an unhampered market if it is validly owned, so we see again the key role ownership plays in the decision making of all market participants, both of existing owners and prospective owners (that is, nonowners). The scarcity of a factor of production will depend not only on the demand for the products it can produce, but also on the judgments and valuations of the factor owner regarding its use.

The key point, the explication of which has been the objective of this here, is that restriction and sovereignty on the market stems from ownership, both in the sense of producers as owners of themselves, and as owners of the factors of production which they alone may decide how to best dispense with. In this case, scarcity of both consumer and producer goods is derived from the judgment of property owners. While scarcity is a fundamental fact of our existence, scarcity on that subset of existence, the market, is entirely dependent on ownership. If one wishes to attack a producer on the grounds that he makes his goods scarce, then one must do so on ethical grounds, for by granting him control over these goods, one grants the notion of their availability for production to be a question for him to decide. One cannot speak of consumer goods being scarce without reference to the scarcity of the goods needed to produce them, and this scarcity on the market must ultimately be considered in terms of the ownership of those factors.

We will use the term catallactic scarcity to refer to this notion of scarcity that derives from a good being owned, in distinction from the more general fact of scarcity, which we will term physical scarcity. Of course, physical scarcity is understood to have an economic component of its own, specifically the limitation of means relative to ends. However, we make the distinction to call attention to the ownership-dependent aspects of scarcity. By understanding catallactic scarcity as inseparable from ownership, we can turn attention to applying this concept to several current debates in Austrian economics.

Application I: Economic Calculation and Socialism

The comparison of prospective gains with potential costs as a criterion of economic decision making has been referred to as economic calculation (Mises 1998, chap. 12). It was Mises who put forward the argument over seventy years ago that economic calculation is impossible under socialism, and that such an economic system is therefore not rational (Mises 1990; 1998, chap. 26). There has recently been a debate within the Austrian School over what, precisely, this argument means, with some researchers taking the position that the argument refers to the absence of private property, such that exchange ratios permitting computation of profit and loss are impossible (for example, Herbener 1991; Salerno 1993; Hoppe 1996); others interpret it as meaning that information conveyed by prices does not exist under socialism, such that opportunities for profit go unrevealed (for example, Kirzner 1996 and Horwitz 1998). These two camps may be called, respectively, “Misesian” and “Hayekian.”8

It is not the purpose here to enter into this debate. However, some support will be given for the Misesian framing of the argument by highlighting the centrality of privately owned property to economic decision making, and we will now turn to this topic.

Under socialism, of course, there is no private ownership of the means of production. Thus, the notion of scarcity in an economic sense has no meaning in such a system. A socialist planner may have complete knowledge of the physical amounts available to him, and all the ways to use them, but this is irrelevant for the purposes of economic planning. For this, he must have some knowledge of a factor’s catallactic scarcity, but this is entirely dependent on that factor being owned (so that exchange ratios may be formed). This “knowledge,” however, does not refer to some physico-chemical property of the good that could be “conveyed” to him through a price system. Rather, this knowledge refers to no more than being able to determine how much property he must give to acquire the good, which will then constrain what kind of consumer goods he can create with it. Under different patterns of ownership, this kind of catallactic scarcity will change, so there is in fact nothing objective the planner can know about. But when the factor is owned, prices for economic calculation can always be formed. Without any notion of catallactic scarcity of the means of production (which depends on ownership, not knowledge9), there can be no notion of what consumer goods are economically feasible.

What does not exist without private property (however incompletely attenuated) is a means for objectively comparing different courses of action, given a judgment about the future. At most, prices inform about how much property must be given now to acquire a particular factor of production. They tell nothing about how to use that factor or whether the future will prove some such use fruitful or not. Entrepreneurial judgment is required for this, and if some factor owner will not surrender his property for less than an entrepreneur thinks its products can be sold for, that factor will not be so used. It is ownership, not knowledge, that determines the status of the factor (Hülsmann 1997).

Thus, in a socialist economy, it is not enough to know (however completely) available physical amounts of resources and technologies for combining them along with consumer value scales. To speak of an action being economically “efficient” or rational requires being able to meaningfully compare inputs and outputs. One must be able to quantify what consumers will be willing to give in return for the outputs of production, and similarly relate the inputs of production to the same “standard.” However, it is clear that no such thing can be done in a socialist state, where there can be no ownership in the means of production, and so notions like catallactic scarcity (and resulting exchange ratios in terms of other property) are meaningless. It makes no sense to speak of how much property can be given in exchange for socialized factors of production, so it likewise makes no sense to speak of what products should be produced for consumption, as the ability to consume depends on the ability to produce. Knowing consumer preferences is of no use in solving this problem.

Socialism thus severs the duality between consumption and production, and this is its fatal flaw, not an absence of knowledge that could be conveyed by prices. (The equations of neoclassical economics explicitly make this dichotomy and consider only the physical scarcity of resources for production, and so are of no use for economic planning, even apart from knowledge problems and their static nature.10) To be sure, it has never been demonstrated how this transmission of knowledge through prices supposedly occurs, or exactly what information, “tacit” or otherwise, is contained in prices, but the point is that under a private property system, it is irrelevant whether someone “knows” of great, unmet demand toward which some factor of production can be applied. On the free market, such a factor is presumably owned, and unless that owner is willing to part with his property (which requires an exchange of other property), that factor cannot be applied to that production process, regardless of how much knowledge one possesses of alternative uses for it.

Also, one wonders where the importance of “decentralized” knowledge lies (see Hoppe 1996). For ownership is both centralized and decentralized: centralized in the fact that one and only one person controls access to some good (even when the good is jointly owned, different people own different shares), and decentralized in the fact that under a private property regime (either free or partly free), anyone can attempt to acquire the good by offering sufficient property in exchange. Indeed, at what stage does “economic knowledge” become decentralized? When, say, ownership of some physical supply is more or less evenly distributed? Why not when a single person owns 99 percent of a good? In either case, prospective actions can be coherently evaluated (“appraised”) via economic calculation. It is the existence of markets that permits economic calculation, not the decentralization of knowledge, economic or otherwise.

One may concede, however unlikely, that a socialist planning board may have complete knowledge of resources, technologies, and tastes, and may be able to assemble factors to produce some list of desired goods. However, this output has no economic meaning because there is no notion of exchanging one state of affairs for another, of sacrificing consumption to production and vice versa. One may contend that the central planning board could not “know” whether a particular allocation of resources is economically efficient, or whether they are meeting some needs at the expense of other, more urgent needs. However, these objections only make sense within the context of ownership of the goods and resources in question. However, it is pointless to exchange property for production purposes based on subjective valuations, and economic calculation with market prices (exchange ratios) permits the subjective valuations of consumer goods to be indirectly imputed to producer goods. But again, it is ownership and not knowledge that is central to this process, for only ownership enables the exchange ratios necessary for this comparison process to come into being.

What are economically wasteful inputs under one realization of private property rights may be profitable under another realization, depending on the desires of property owners, both from the point of view of producers as well as consumers. Correspondingly, a different set of outputs (consumer goods) will be economically rational or irrational, depending on these circumstances. Under such a system, it only makes sense to speak of less urgent needs being met if an entrepreneur obtains a loss on his venture. With different patterns of ownership, that venture may well prove profitable, in which case one would say he has met urgent needs. One cannot say, for example, that it is always economically wasteful to build a car with gold. It is only under current conditions (of ownership, valuations, etc.) that such an activity is wasteful. Under different conditions, it may well be profitable.

So, the problem with socialism is not that the central planning board will not know how to best meet given ends. It is that without the notion of privately owned means of production (and hence catallactic scarcity of those means), the notion of what ends are appropriate at all makes no sense. One may postulate a “market” for consumer goods in a socialist state, with “prices” for these goods. However, these prices have no relation whatsoever to their counterparts in a capitalist state, even if numerically they should happen to be the same. For the prices in a capitalist system imply an amount of property that can be given in exchange for that good. In a capitalist system, this (money) property encompasses consumer as well as producer goods. Obviously, whatever property can be obtained in a socialist economy must exclude producer goods, so the notion of “prices” as exchange ratios, even among consumer goods, is severely restricted if not meaningless. 

Application II: Monopoly Capitalism

Of course, it may be objected that, even under socialism, catallactic scarcity also exists, as the central planning board does in fact own the means of production in the society under its control. However, this is better characterized as controlling these factors, as ownership suggests that one can divest oneself of property, and of course this cannot happen under socialism (if the system is to remain socialistic). A contrast may be made with the situation of monopolies under capitalism. Under capitalism, a person may be the sole owner of some particular factor or class of factors. In principle, however, one can always offer such a person property in exchange for these factors, so there is a notion of scarcity in the sense of what uses these factors can be profitably put to, relative to what must be used to first acquire them. Such a situation cannot, even in principle, occur under socialism. Indeed, we again see the duality of exchange that exists under a private property system. To own something means that someone else must surrender a certain amount of property in order to become the owner. How much property depends on the valuations of the prospective exchangers. Even a “monopolist” can in principle be persuaded to part with his goods, and an entrepreneur can at least attempt to calculate how much this will take. Such an endeavor may prove fruitless, but it is at least possible. (Likewise, if no one has any interest in or anticipates any profitable use of the monopolist’s goods, then the fact that he is sole possessor poses no problem for entrepreneurs.)

So even an extremely restrictive monopolist faces a categorically different situation than the director of the central planning board. The monopolist can in principle transfer ownership (for a price), while the director cannot. The extent to which the monopolist is willing to do so determines the scarcity (economic) of his factors, and thus what is feasible to produce for consumption. Whether the director would be generous or covetous is irrelevant; neither characteristic changes the fact that he cannot dispose of these goods, so attaching economic significance to them is impossible (or, better, meaningless), unlike under a private property system. Furthermore, from an economic perspective, the monopolist, as an owner, behaves no differently if he restricts use of his factors or applies them. In either case, his subjective valuations and judgment of how best to satisfy himself drives his actions. This aspect of economic behavior, either committing or withholding resources, is the dual part of every economic action under private property. For the director, it makes absolutely no sense to speak of him withholding resources. For what end? For the director, he must apply these resources, so the notion of catallactic scarcity which implies the need to conserve resources is absent. Again, the duality between production and consumption is severed under socialism.

Even if an entrepreneur should happen to come into ownership of all the means of production in some society, his position is quite different from that of the director of the central planning board under socialism. The monopolist can always assign economic significance to his property by entertaining bids from others, and of course he can accept those offers. In a capitalist society, money prices encompass both consumer and producer goods. For the central planner, it is absurd to think he can receive bids for the property under his control. He cannot exchange his property, so any attempts by him to “play” market are just that: meaningless games.11

Should the monopolist actually refuse all offers, he can still in principle accept them at any time. And in fact it is his stance that determines the notion of catallactic scarcity in his society. For assuming he came about his goods justly (that is, mixed his labor with unowned land or acquired, through voluntary exchange with others, property likewise created (Hoppe 1989, 1993; Rothbard 1998), then there can be nothing wrong in an ethical sense with him hoarding all of his goods. (Of course, socialism violates the “natural” property rights of others, and this alone would disqualify socialism as a justifiable system, but this is a separate issue.) Whether his hoarding, which would presumably lead to great suffering for others, is wrong in a moral sense is an entirely different matter.  In this case, the scarcity in society is quite extreme—one might say far “greater” than the mere fact of limited physical amounts.

The director of the central planning board is in no such position. The notion of him accepting or refusing an offer for his property (so that numerical exchange ratios for economic calculation could be formed) is absent under socialism. Any bid he could receive would be meaningless, for he cannot surrender any factor of production. Under capitalism, the bids made to factor owners, be they monopolists or not, permit the evaluation of prospective actions. That is, prospective gains can be meaningfully compared with costs because a common unit of comparison exists. No such common unit exists under socialism. Even a monopolist can coherently compare the gains from applying a factor to production himself or selling it to someone else. The socialist director cannot sell a factor. Single ownership of a good does not abolish markets for that good, so prices can still be formed. Coercive socialism, however, does abolish markets.

Application III: Business Cycle Theory

As a further, albeit brief, application of the concept of catallactic scarcity as determined by ownership, consider Austrian business cycle theory. The details of this theory need not be expanded upon here, and some familiarity will be assumed (for example, Rothbard 1983; Mises 1998, chap. 20). The main thrust of the theory is that economic downturns (“recessions”) are attributable to the fact that credit inflation distorts the structure of production, which depends on the time preferences of consumers (their willingness to forego current consumption in favor of future consumption). Thus, “artificially” low interest rates give rise to a (lengthened) structure of production inconsistent with the (unchanged) time preferences of consumers, necessitating at some point a restoration of the original structure (a boom-to-bust process).

Certain aspects of this theory have been criticized by Hülsmann (1998), in particular the notion that downturns are the consequence of credit inflation. (Hülsmann accepts the descriptive details of the nature, but not the cause, of the cycle as laid out by Austrian business cycle theory.) Among other points, he argues that inflation, like any other unanticipated change, can be correctly forecast by entrepreneurs, so there is no reason to presume that they will be so misled. (This is actually, in one form or another, a common critique of the theory.) Austrian business cycle theory in its usual form is at best, then, a contingent theory of economic downturns. Instead, he argues for an essentialist rendition of Austrian business cycle theory, wherein error is not a consequence of past conditions (no such consistent theory is possible), but rather is inherent in the system of banking that exists today throughout the Western world (that is, fractional reserve banking, the lending out of demand deposits in excess of reserves).

Some support will be given here for Hülsmann’s argument. First, it should be noted that, on a free market, it is consumer time preferences that determine the length of the structure of production. The more consumers are willing to save (that is, forego current consumption in favor of future consumption), the more far-removed or “roundabout” production processes can be relative to the finished product.12 That is, the scarcity of capital goods in an economic sense is determined by ownership, namely the willingness of consumers to exchange their current property for future claims to property. This property can then become owned by entrepreneurs, who can assemble a structure of production as described above (that is, via judgments and economic calculation). Whether the consumers directly give their property to entrepreneurs or (more likely) use banks as an intermediary is irrelevant. The key point is that the availability of capital goods again depends on private property (ownership).

The situation is quite different under a system of fractional reserve banking. Here it is not property and the subjective valuations of its owners that determine scarcity (in the economic sense) and drive production processes. Rather, it is the ability of banks to create titles to property not backed up by actual property.13 That is, catallactic scarcity, which depends on the ownership of property, is not the determinant of production (and thus, ultimately, consumption). Instead, the catallactic scarcity of capital goods is inherently misrepresented under this system, as the bankers do not surrender their own property in exchange but rather create “false” property, claims to property divorced from existing property. It thus appears that more property is available for production than actually exists, and here is the nature of the crisis as laid out by Austrian business cycle theory—the mismatch between consumer time preferences and entrepreneurial judgments thereof.14

Indeed, one may refer to this situation as a “political discovery process,” as distinct from a fallacious “price” discovery (Hülsmann 2000), since the availability of capital is not determined by the value judgments with property of individual owners, but by the ability of bankers to discover how much they can jointly issue titles to property in excess of actual, existing property. That is, the scarcity of capital is not determined by the subjective valuations of the owners of capital, whether they are generous or greedy with their property. Rather, the amount of capital is determined by the actions of others—in this case, other bankers. The more other bankers expand their lending beyond reserves, the greater latitude any other banker has for doing the same. This situation does not result when considering individual property owners, where the decision to make property available is entirely up to the individual owner. In fact, the entire concept of property at all is distorted under fractional reserve banking, for in this case what constitutes “property” is dependent on the will of the bankers to create something out of nothing. Under a true property regime, one cannot create something out of nothing, regardless of the intensity of one’s desires. This is not true under fractional reserve banking, where the only constraint on any individual bankers desires is the extent to which other banker’s are likewise willing to inflate.

Thus the notion of scarcity of capital goods (and the resultant production structure based thereon) is completely blurred under fractional reserve banking, and it is the nature of the system that is the ultimate source of the error (malinvestments) and that Austrian business cycle theory attempts to explain. To be sure, the concept of catallactic scarcity is not completely obliterated, as it is under full-blown socialism. It remains the case, though, that the scarcity of capital is falsely represented under fractional reserve banking.

Conclusion

To conclude and summarize, the notion of scarcity of a particular good for economic purposes must include reference to the ownership of that good, and not just the limited physical amount of that good relative to wants. It is scarcity in this economic sense (that is, the willingness of the owner of some good to exchange it for something else) that is of central importance to economic decision making (calculation, comparing anticipated revenues with prospective costs in a common denominator), both in deciding how to produce something, as well as what to produce. One cannot hope to reproduce the results of an unhampered market with systems that destroy the central characteristic of that market. Various forms of violent intervention in the market abolish this crucial notion of scarcity, either completely, as under socialism, or partially, as under fractional reserve banking, with results that are, at best, arbitrary from the point of view of consumers. In actuality, of course, the realized results have been utterly disastrous.

It is not a question of “knowing” how valuable ones actions can be, and learning of this through the price system. The point is that action within society is always action within a system of property rights, restricted or unrestricted to some degree. Given constraints on our actions as imposed by such a system, the question becomes, what must one do to attain one’s goals? In a system of property rights, one must exchange property for property, based on judgments of the future. Only under a system of property rights can one quantify and compare in a common unit gains relative to losses (comparison of procedures for producing subjectively valued goods being otherwise impossible), and only under a system of unfettered property rights is the duality between consumption and production preserved. That is, only then are there objective constraints on both what is produced and consumed. Social democracy and state capitalism as currently exist in the Western world blur this duality, while complete socialism demolishes it. 

  • 1. Air, for example, is physically of finite supply, but no wants are currently left unmet on account of this. Thus, air cannot qualify as an economic good and in this sense is of “unlimited” supply. 
  • 2. See the preceding references. Kinsella (1996) provides an overview of other such recent work. 
  • 3. Of course, if nobody else wants the good in question, then from the point of view of these others, the good is quite plentiful. However, to acquire an owned good requires the consent of the owner, and his desires will determine how scarce the good is for use by others.
  • 4. Provided, of course, that unowned goods may be homesteaded (that is, unowned goods can become property), and that one can expect such rights to be respected over time.
  • 5. A “common-sense” equilibrium, as opposed to the general disequilibrium case of unmet desires at any given time, see Gordon (1995).
  • 6. In fact, the price of any good depends both on the demand and supply of it, so one can never speak of prices for consumer goods without reference to prices for producer goods. For a discussion of price formation on the market, see Rothbard (1993, chaps. 2 and 3).
  • 7. Likewise, if factor owners are unable to ask for as much property as they would like to for their products (as is the case under, say, price controls), then they will not do so, and furthermore, prospective buyers of those factors will deem them more plentiful than they actually are. This is another example of the illusions fostered by the property rights violations of the State; see Hülsmann (1998).
  • 8. The neoclassicist position seems to be sympathetic to the Hayekian interpretation, see Yeager (1994). See also, among others, Hülsmann (1997) for a detailed analysis of these issues.
  • 9. Property and knowledge are not the same thing, and unlike property, knowledge itself can never be scarce in any sense. That I have an idea in no way precludes someone else from having that idea, while ownership arising from scarcity does imply such exclusion (Kinsella 2001).
  • 10. All of these equations in their various guises essentially try to “maximize” utility subject to physical and technological constraints on available resources. Even granting that, with complete knowledge and perfect foresight, a planner could allocate resources for a given period based on these equations, the question of how much of his available resources he should hold in reserve for future consumption cannot be so addressed. At some point a planner must stop cannibalizing an existing capital structure and at the very least maintain that structure, so capital goods must be included in his value scale. However, it is nonsense to include indirectly valued means among his directly valued ends. Even means must be economized, but unlike ends, recourse to their utility is futile for doing so. They only have utility because of the (direct) utility of the ends they produce, but it is only the utility of ends that one may appraise, in terms of the wants they remove. Only monetary prices permit the appraisal of both means and ends. The choice of how to “model” available means in these equations is arbitrary at best, if not absurd (for example, modeling capital “growth” like some sort of natural phenomenon). Thus, as Salerno (1990, p. 56) noted, “[s]ocialism will have particularly devastating effects on the economy’s capital structure.”
  • 11. More generally, as states may be considered territorial monopolists of judicial and protective services, one can make a distinction between privately owned governments, such as monarchies, which can engage in economic calculation, and publicly owned (“caretaker”) governments, such as democracies, which cannot. For more on this distinction, see Hoppe (1999).
  • 12. See Rothbard (1993, chap. 8) for a more detailed discussion of this process.
  • 13. See Hoppe et al. (1998) for more on this point, as well as the purely juridical nature of fractional reserve banking.
  • 14. To use Hülsmann’s (1998) term, the illusion of more property is created by fractional reserve banking. More generally, as an inherently aggressive institution, the State relies on many other illusions to continue its existence, for example, the illusion that people can remain owners of themselves and their property while granting the State the ability to unilaterally tax, jail, etc.

          Comment on The Religion Of The Anti-Christ Is Here And Now You Are Being Forced To Eat Satanic Food? by Julian O'Neill      Cache   Translate Page      
' The Religion Of The Anti-Christ Is Here And Now You Are Being Forced To Eat Satanic Food?' The situation is far deeper than the mythic 'anti Christ' which really hides/obscures the real enemy of another branch of the problem. IE is it not the Christian believers who see their enemy as the 'anti Christ', especially the ones talking about an 'Illuminati' or Synagogue of Satan' etc. But it is more to be understood as anti NATURE. Or anti natural. Anti Mother Earth! THAT is these peoples real enemy. BOTH sides of the dualism, Christian and Satanist. They both fear, and hate, and wanna either escape or 'put right' by some destructive Armageddon what they see as a corrupt Earth, a prison of the 'spirit'. The term 'matrix' actually refers to women, not a male Christ, or male per se. but rather to a womb. THIS is why we see these people as war mongering patriarchal people sharing at root a same worldview. For the Christian their 'God' is superior and aloof to 'his' creation. His 'will' is more important and MUST be obeyed. This strict father's rebels, the Satanists/Luciferians/Illuminati want rather to have their OWN will-those that consider themselves gods and superior to others and nature..'Do what thou WILT shall be the whole of the law' so sayeth their Prophet Crowley. And then we have the materialists who also look down on nature as being a passive, insentient 'thing'-a commodity they can cut up, and sell for profit, and poison. We all become 'matter' to be objectified and exploited. So yeah, it is not anti Christ. Christ is their myth who also escaped and went to 'his' father's right hand. Above and beyond nature. That typical patriarchal motif. No, organized religion, and the occult, and the materialists have all tried to suppress the Goddess, and nature, and our natural connection with nature, because we ARE nature. They are anti all of that. Anti life.
           SAT, ACT college test makers defend integrity amid scandal      Cache   Translate Page      
Federal court papers detail how college admissions test provisions aimed at helping students with disabilities were exploited to enable cheating in what is being described as the biggest college admission scandal ever prosecuted by federal authorities
          It's Apparently Easy To Pretend To Be A Cop, Grab Location Data From Cellular Carriers      Cache   Translate Page      

While Facebook tends to get the lion's share of (deserved) criticism, the telecom sector continues to make its case for being the absolute worst when it comes to protecting your private data. Scandal after scandal have highlighted how wireless carriers routinely collect and store your daily location data, then sell that data to a universe of shady middlemen with little to no oversight as to how the data is used. Users sign one overlong privacy policy with their wireless carrier, and that policy is being read to mean consumers sign off on the practice, which they certainly haven't.

This week journalist Joseph Cox again highlighted the problems on the location data front, reporting how many stalkers and debt collectors are able to get access to this data without paying for it. How? By pretending to be law enforcement officers:

"...bounty hunters and people with histories of domestic violence have managed to trick telecommunications companies into providing real-time location data by simply impersonating US officials over the phone and email, according to court records and multiple sources familiar with the technique. In some cases, these people abuse telecom company policies created to give law enforcement real-time location data without a court order in “exigent circumstances,” such as when there is the imminent threat of physical harm to a victim.

In addition to cellular tower location data, carriers were also recently busted selling A-GPS data, which is supposed to be protected by FCC data rules. Despite significant reporting on this subject and carrier promises to stop collecting and selling this data, this practice is still ongoing. Like Facebook, these are companies that are staring down the barrel of looming regulation -- and still somehow can't seem to find the motivation to behave. Regulators at the Ajit Pai FCC have also sat on their hands and have yet to issue so much as a warning to cellular carriers.

At least one skiptracer told Motherboard that wireless carriers remain several steps behind in trying to crack down on the practice:

"So many people are doing that and the telcos have been very stupid about it. They have not done due diligence and called the police [departments] directly to verify the case or vet the identity of the person calling,” Valerie McGilvrey, a skiptracer who said she has bought phone location data from those who obtained access to it, told Motherboard. A skiptracer is someone tasked with finding out where people, typically fugitives on the run or those who owe a debt, are located."

In many instances the third parties are exploiting telecom company procedures for "exigent circumstances," allowing them to request and receive real-time location data by fabricating law enforcement data request documents telecom operators aren't properly verifying. Of course as the New York Times noted more than a year ago, law enforcement officers have also been busted abusing this system to spy on judges and other law enforcement officers.

Like so many sectors, wireless carriers were so excited by the billions to be made selling your daily habits, they forgot to actually protect that data. As reporters like Cox continue to dig deeper, you have to think that many cellular carriers are scrambling hard to clean up their mess as inevitable class action lawsuits and regulatory investigations wait in the wings. This scandal is getting so ugly, even the carrier-cozy Trump FCC may, at some point, be forced to actually do something about it.



Permalink | Comments | Email This Story

           Commentaires sur Éditeur en difficulté, quels droits pour l’auteur? par Jeremy       Cache   Translate Page      
Concrètement, la cession des droits numériques reste une option pour les parties. Il sera toujours possible pour l'éditeur de ne procéder qu'à une exploitation "papier", mais dans ce cas, il devra éviter toute mention relative au numérique dans la cession des droits d'exploitation, sauf à risquer la nullité de la cession des droits pour le livre numérique. 
          'Contingency fund' tapped to cover Trump's border wall      Cache   Translate Page      

President Trump's bid to finance the military mission along the U.S. southern border rests in a special off-the-books Pentagon account set aside to finance for ongoing combat operations, but one that critics compare to an unregulated slush fund the administration is exploiting to circumvent federal spending caps.

The record $165 ...

          Microsoft Patch Tuesday: 64 Vulnerabilities Patched, 2 Under Attack      Cache   Translate Page      
Seventeen vulnerabilities patches today are rated critical, four are publicly known, and two have been exploited in the wild.
          Contremaître(sse), Mécanique - ArcelorMittal Exploitation minière Canada s.e.n.c. - Fire Lake, YT      Cache   Translate Page      
Le genre masculin est utilisé comme générique, dans le seul but de ne pas alourdir le texte. Le diagnostic des anomalies constitue une....
From ArcelorMittal Exploitation minière Canada s.e.n.c. - Wed, 06 Feb 2019 20:45:56 GMT - View all Fire Lake, YT jobs
          Planificateur(trice) mécanique - ArcelorMittal Exploitation minière Canada s.e.n.c. - Fire Lake, YT      Cache   Translate Page      
Le genre masculin est utilisé comme générique, dans le seul but de ne pas alourdir le texte. Le Planificateur mécanique a également comme responsabilités :....
From ArcelorMittal Exploitation minière Canada s.e.n.c. - Mon, 04 Feb 2019 20:46:19 GMT - View all Fire Lake, YT jobs
          RSA 2019: Cybercriminals’ Overlooked Tactics and Favorite Industries to Target       Cache   Translate Page      
RSA 2019: Cybercriminals’ Overlooked Tactics and Favorite Industries to Target Bob.Keaveney_u64t Fri, 03/08/2019 - 14:32

These are difficult times for organizations trying to protect themselves and their customers from cybercriminals. Global cybercrime costs will hit $6 trillion a year by 2021 — up from $3 trillion in 2015, according to the “2019 Official Annual Cybercrime Report” by Cybersecurity Ventures. Verizon’s “2018 Data Breach Investigations Report” says that 30 percent of phishing emails in the U.S. are opened by recipients. And 780,000 records were lost in 2017 as a result of cybercrime, according to the McAfee “Economic Impact of Cybercrime” report, released in February 2018.

With the multiplying number of tools available to hackers on the dark web, it’s little wonder that more of their attacks are succeeding, said Angel Grant, director of identity, fraud and risk intelligence with IT security technology firm RSA. But Grant, speaking at the RSA Conference 2019 in San Francisco on March 8, said the dark web is “not the thing people should be concerned about,” at least not compared with what she called the “gray web,” where cybercriminals are “acting in plain sight.”

While cybercriminals are often imagined as tech geniuses working feverishly in dark rooms on sophisticated hacks, the truth is that many use simple scams and social engineering to gain entry to corporate networks and personal information. Take reverse phishing, for example. This is where cybercriminals search for companies that haven’t tagged their company phone number yet on Google. When consumers Google the company’s name, they then see the phone number the cybercriminal supplied and call it. Then the fraudster can ask personal questions that allow them to steal personal information.

MORE FROM BIZTECH: For more content from RSA check out our event landing page.

Cybercriminals' Favorite Industries to Target

“We’re seeing the value of credentials for sale vary based on industry or on the type of stolen information — a card with a signature is worth more than a card without,” said Grant.

Grant cited some of the top industries cybercriminals are targeting:

Retail: “Cybercriminals target e-commerce more these days because the new chip cards put down a barrier and make it harder to steal in traditional retail,” said Grant.

Entertainment and social media: Video streaming companies, social media and gaming platforms, and even dating sites are popular targets for hackers because people volunteer an extraordinary amount of personal information about themselves on such platforms, Grant explained.

Finance: It’s obvious why hackers target the financial industry, Grant said: “It’s where the money is.”

Travel/Leisure: Loyalty programs for airlines and hotels are most often tied to credit cards and passport information that cybercriminals can exploit.

MORE FROM BIZTECH: Learn how to quantify the impact of a data breach.

What is ‘Credential Stuffing’ and How Do Hackers Use It?

One favorite tactic of hackers is “credential stuffing,” in which criminals use user names and passwords they obtained from previous breaches to run automated programs to log in with those same credentials on other sites. It’s effective because people typically use the same login information from site to site. “We see a 5 percent success rate on credential-stuffing tools,” said Grant.

One of RSA’s customers, for example, started to see a spike in traffic on its login page. The site had been logged into by the same IP address more than 200,000 times, and a criminal was able to access 18,000 valid credentials using this tactic.

“When you hear in the news about another organization getting hacked, your company is not off scot-free,” warned Grant. “Chances are, those credentials are being sold on Facebook and could be used to target your organization.”

Cybersecurity-report_EasyTarget.jpg

What Companies Can Do to Foil Hackers

“We need to take a moment to think of what we can do to better protect ourselves from these types of attacks,” said Grant. “We need to think about the fact that as we are embracing digital transformation, and it has provided a lot of opportunities, it has also brought a lot more risk.”

Grant recommended some steps to better secure your organization. First, monitor social media to see if your company is being targeted. Next, investigate potential points of vulnerabilities within your organization and determine who is watching those and communicating any issues. Also, create a plan to mitigate an account takeover and roll out identity analytics.

“Finally, unite your security village and collaborate not only within your company, but also with third-party vendors you engage with,” advised Grant. Make sure to roll out threat detection and fraud prevention tools and have a governance, risk and compliance strategy.


          So Inspiring! WATCH this Interview with Naomi Campbell at the 2019 Forbes Woman Africa Leading Women Summit      Cache   Translate Page      

Supermodel Naomi Campbell was the keynote speaker for this year’s Forbes Woman Africa Leading Women Summit. The event was held at the Durban ICC in South Africa. Tagged “Being Naomi”, the supermodel talked about her exploits in entrepreneurship, philanthropy and many more. The event was held in partnership with the KwaZulu-Natal government in South Africa. Watch the […]

The post So Inspiring! WATCH this Interview with Naomi Campbell at the 2019 Forbes Woman Africa Leading Women Summit appeared first on BellaNaija - Showcasing Africa to the world. Read today!.


          Child exploitation workers shortlisted for award      Cache   Translate Page      
Two Doncaster workers have been shortlisted for the fourth time in a national award for their work in helping to tackle child sexual exploitation in Doncaster. Jayne Pezzulo, who works for Rotherham Doncaster and South Humber NHS Foundation Trust (RDaSH),
          Is there such a thing as an anarchist capitalist?      Cache   Translate Page      


  • Even though anarchy and capitalism seem like they're diametrically opposed, there are some out there who call themselves anarcho-capitalists.
  • A more extreme version of libertarianism, anarcho-capitalism argues that there ought to be no state whatsoever; the free market can sort everything out, and if left alone, will ensure everybody's liberty.
  • The philosophy attracts considerable criticism, both from anarchists, who argue that capitalism is inherently exploitative, and from people with more traditional politics, who argue that the lack of regulation would send an anarcho-capitalist society right down the toilet.

None


Though they come in many different forms, anarchists generally agree on a few broad principles. Typically, anarchists reject the idea of hierarchical authority and the state. Though religious anarchism exists, it's not a typical expression of anarchism. And nearly all anarchists have an unabiding loathing for capitalism. This is so dyed in the anarchist wool that the 20th-century anarchist Emma Goldman once wrote:

"The only demand that property recognizes is its own gluttonous appetite for greater wealth, because wealth means power; the power to subdue, to crush, to exploit, the power to enslave, to outrage, to degrade. America is particularly boastful of her great power, her enormous national wealth. Poor America, of what avail is all her wealth, if the individuals comprising the nation are wretchedly poor? If they live in squalor, in filth, in crime, with hope and joy gone, a homeless, soilless army of human prey."

As confident and purple as Goldman's prose may be, however, there are indeed anarchists who do not reject capitalism outright; they call themselves anarcho-capitalists.

Most, especially Americans, are probably more familiar with the term 'libertarianism', if not through politics then at least through Ron Swanson. The main difference between the two philosophies is that libertarians advocate for minimal government interference. Most libertarians believe there should be no government regulation, no state-owned property, no welfare, and so on, but they generally agree that there should be police, laws, and court systems. Anarcho-capitalists, on the other hand, argue that no state is necessary whatsoever (hence the "anarcho-" portion of their name); everything can be handled by the free market, and any issue with capitalism today is because of interference by the state in the free market.

Anarcho-capitalism and the non-aggression principle


The central idea that unites the two theories is known as "the non-aggression principle." Murray Rothbard, one of anarcho-capitalism's and libertarianism's core thinkers, explains what a society that follows the non-aggression principle would look like in his essay, Society without a State:

I define anarchist society as one where there is no legal possibility for coercive aggression against the person or property of any individual. Anarchists oppose the State because it has its very being in such aggression, namely, the expropriation of private property through taxation, the coercive exclusion of other providers of defense service from its territory, and all of the other depredations and coercions that are built upon these twin foci of invasions of individual rights.

Anarcho-capitalists consider state interference, including regulation, prohibition, and so on, to be a kind of violence. Being threatened with imprisonment or fines for doing what one wants with one's property is unacceptable to the anarcho-capitalist, whether they wish to sell food, their services, drugs, firearms, or whatever it is that they choose to do. The only limit is that it can't be coercively aggressive, so slavery, for instance, is off the table.

This central principle is what anarcho-capitalists believe society should be oriented around. With no state, how would this principle be enforced? Well, it depends on who you ask. Some anarcho-capitalists believe there should be some central code that courts would pledge to follow when distributing justice. The economist David Friedman offers a very anarcho-capitalist solution to justice and the law: "[T]he systems of law will be produced for profit on the open market, just as books and bras are produced today. There could be competition among different brands of law, just as there is competition among different brands of cars." Friedman himself admits this system could lead to some very peculiar legal structures, including some that would violate anarcho-capitalist and libertarian principles. Critics of this approach argue that any court verdict could easily be bought, while anarcho-capitalists argue that this would ruin the private court's reputation, and therefore its ability to attract "customers."

Criticism


Although Rothbard asserted that "capitalism is the fullest expression of anarchism, and anarchism is the fullest expression of capitalism," plenty of anarchists disagree with him. Noam Chomsky, for example, might be as far away from an anarcho-capitalist as an anarchist could be. Chomsky follows anarcho-syndicalism, which can be thought of in a basic sense as a blend of socialism and anarchism. He wrote:

Anarcho-capitalism, in my opinion, is a doctrinal system which, if ever implemented, would lead to forms of tyranny and oppression that have few counterparts in human history. There isn't the slightest possibility that its (in my view, horrendous) ideas would be implemented, because they would quickly destroy any society that made this colossal error. The idea of "free contract" between the potentate and his starving subject is a sick joke, perhaps worth some moments in an academic seminar exploring the consequences of (in my view, absurd) ideas, but nowhere else.

The concept of anarchism requires, above all else, freedom from authority. To many other anarchists, the idea that individuals could freely sell their labor to another is oxymoronic; rather, they consider it to be a kind of wage slavery. Anarchists like Chomsky would argue that compelling people to do society's degrading and unsatisfying work in order to avoid starvation isn't freedom, its just slavery with extra steps.

In the video below, Steven Pinker notes that no developed country currently has an anarcho-capitalist-/libertarian-style government simply because such systems can't guarantee that society's vulnerable—such as the very young, the very old, or the handicapped—will be taken care of.

None


The primary premise of anarcho-capitalism is that one's labor should be entirely one's own. Rothbard writes "The basic axiom of libertarian political theory holds that every man is a self owner, having absolute jurisdiction over his own body. In effect, this means that no one else may justly invade, or aggress against, another's person. It follows then that each person justly owns whatever previously unowned resources he appropriates or 'mixes his labor with'."

But this presupposes that everybody will be able to engage in labor in the first place. Anarcho-capitalists would argue that if you don't want to let the old starve to death or if you want to take care of your children while you're working, you could always give them your surplus resources—and if you can't or don't want to perhaps a private charity could take care of the vulnerable instead. Maybe private charities could take care of orphans or elderly folks who have nobody else taking care of them. Of course, whether such a socially minded, private venture would exist or function as effectively (or ineffectively) as current government social systems is entirely unknowable. This is perhaps one of the biggest flaws in anarcho-capitalism; it doesn't provide enough evidence to refute its biggest criticism: that it will abandon the vulnerable. Then again, some anarcho-capitalists would probably shrug and say, "It's too bad the elderly can't afford retirement homes, they should have worked harder."


          Amid College Admissions Scandal, SAT and ACT Test Makers Defend Their Integrity      Cache   Translate Page      
A college entrance exam policy aimed at helping students with disabilities was exploited to enable cheating in what is being described as the biggest school admissions scandal ever prosecuted by federal authorities, according to court papers made public Tuesday. At least 50 people were charged in the scheme, which included not only cheating on the admissions tests but also bribing coaches to gain admission for students into elite schools. Among the defendants were actresses Felicity Huffman and Lori Loughlin. A […]
          Microsoft Patch Tuesday — March 2019: Vulnerability disclosures and Snort coverage      Cache   Translate Page      

Microsoft released its monthly security update today, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday covers 64 vulnerabilities, 17 of which are rated “critical,” 45 that are considered “important” and one “moderate” and “low” vulnerability each. This release also includes two critical advisories — one covering security updates to Adobe Flash Player and another concerning SHA-2.

This month’s security update covers security issues in a variety of Microsoft’s products, including the VBScript scripting engine, Dynamic Host Configuration Protocol and the Chakra scripting engine. For coverage of these vulnerabilities, read the SNORTⓇ blog post here.

Critical vulnerabilities

Microsoft disclosed 17 critical vulnerabilities this month, all of which we will highlight below.

CVE-2019-0592 is a memory corruption vulnerability in the Chakra scripting engine that could allow an attacker to elevate their privileges. The bug lies in the way that the scripting engine handles objects in memory. In order to exploit this vulnerability, an attacker would need to trick a user into visiting a specially crafted, malicious web page in the Microsoft Edge web browser.

CVE-2019-0763 is a remote code execution vulnerability that exists when the Internet Explorer web browser improperly handles objects in memory. An attacker could exploit this vulnerability by tricking a user into visiting a malicious web page while using Internet Explorer.

CVE-2019-0756 is a remote code execution vulnerability in the Microsoft XML Core Services MSXML parser. An attacker can exploit this bug by tricking the user into opening a specially crafted website designed to invoke MSXML through a web browser. Eventually, the attacker would gain the ability to execute malicious code and take control of the user’s system.

CVE-2019-0609, CVE-2019-0639, CVE-2019-0680, CVE-2019-0769, CVE-2019-0770, CVE-2019-0771 and CVE-2019-0773 are all memory corruption vulnerabilities in Microsoft’s scripting engine that exist due to the way Microsoft Edge handles objects in memory. An attacker could exploit these bugs to corrupt memory in a way that would allow them to execute arbitrary code in the context of the current user. A user would trigger this vulnerability if they visited a specially crafted, malicious web page in Edge.

CVE-2019-0784 is a remote code execution vulnerability that exists due to the way ActiveX Data Objects (ADO) handle objects in memory. An attacker could exploit this bug by tricking a user into visiting a specially crafted, malicious web page in Internet Explorer. Alternatively, they could embed an ActiveX control marked “safe for initialization” in an application or Microsoft Office document that hosts the Internet Explorer rendering engine.

CVE-2019-0603 is a remote code execution vulnerability in Windows Deployment Services TFTP Server. The bug lies in the way the server handles objects in memory. If an attacker were to exploit this vulnerability, they’d gain the ability to execute arbitrary code with elevated permissions on a target system.

CVE-2019-0697, CVE-2019-0698 and CVE-2019-0726 are remote code execution vulnerabilities in the Windows DHCP client. The vulnerability triggers when the client receives specially crafted DHCP responses to a client, potentially allowing an attacker to execute arbitrary code on the target machine.

CVE-2019-0666 and CVE-2019-0667 are vulnerabilities in the VBScript engine that exist due to the way the engine handles objects in memory. An attacker could use these bugs to corrupt memory in a way that would allow them to execute arbitrary code in the context of the current user. A user could trigger these vulnerabilities by visiting an attacker-created website through Internet Explorer. An attacker could also provide them with an embedded ActiveX control marked “safe for initialization” in an application or Microsoft Office document that hosts the Internet Explorer rendering engine.

Important vulnerabilities

This release also contains 45 important vulnerabilities:

Moderate

There was one moderate vulnerability in this release: CVE-2019-0816, a security feature bypass vulnerability in Azure SSH Keypairs.

Low

The only low vulnerability in this release is CVE-2019-0777, a cross-site scripting vulnerability in Team Foundation.

Coverage 

In response to these vulnerability disclosures, Talos is releasing the following SNORTⓇ rules that detect attempts to exploit them. Please note that additional rules may be released at a future date and current rules are subject to change pending additional information. Firepower customers should use the latest update to their ruleset by updating their SRU. Open Source Snort Subscriber Rule Set customers can stay up-to-date by downloading the latest rule pack available for purchase on Snort.org.

Snort rules: 45142, 45143, 46554, 46555, 48051, 48052, 49172, 49173, 49364 - 49369, 49371, 49372, 49378 - 49395, 49400 - 49403


          SAT, ACT college test makers defend integrity amid scandal      Cache   Translate Page      
Federal court papers detail how college entrance exam policies aimed at helping students with disabilities were exploited to enable cheating in a massive college admissions bribery scandal.
          How to Track Online Malevolent Identities in the Act      Cache   Translate Page      

CircleID CircleID: Want to be a cybersleuth and track down hackers?

It may sound ambitious considering that malevolent entities are extremely clever, and tracing them requires certain skills that may not be easy to build for the typical computer user.

But then again, the best defense is offense. And learning the basics of sniffing out cybercriminals may not only be necessary nowadays, it has become essential for survival on the Web. So where can you begin?

Place Honeypots

Hackers take great care to cover their tracks. So, it's important to catch them with their hand in the cookie jar. You can do so by setting up a bait — called a honeypot — to lure them out. It can take the form of a spammable domain or an easily hackable virtual machine which can appear as legitimate targets.

Once attacked, honeypots help you observe what intruders do to the system, know the tricks that they employ to infect devices, and subsequently find ways to counter them. Such forensic evidence enables law enforcers to track unsolicited access and then locate and catch perpetrators.

Reverse-Engineering Malware

Let's say that despite all the precautions, malware still succeeded in infiltrating your company's system. Instead of losing sleep, you can use the infection to understand how the malicious program operates and what it's been engineered to do, such as what vulnerabilities it's been designed to exploit.

This process is called reverse engineering. It involves disassembling the program to be able to analyze and retrieve valuable information on how it is used or when it was created. It is extremely helpful in finding substantial evidence such as encryption keys or other digital footprints that can lead investigators to the cybercriminals.

Leverage WHOIS Information

When a complaint is received over a dangerous website, the first step in the investigation is to identify the operator of the suspect domain.

This can be done by querying the domain name registry where the site has been registered. A whois database download service, for example, enables users to retrieve the WHOIS data that contains the name, location, and contact details of domain registrants. With this information in hand, security teams can report the matter to law enforcement agents who can then track down malicious operators and apprehend them on the spot.

Inspect Files' Metadata

Once in possession of files and devices from a suspicious entity, you can analyze the evidence that is saved in them and discover crucial details that can be followed back to the source.

Word, Excel, or PowerPoint files, for example, contain relevant information, called metadata, that can blow a hacker's cover. They include the name of the person that created the file, the organization, the computer, and the local hard drive or network server where the document was saved.

It is also important to analyze the grammar used in comments that are embedded in the software code. Socio-cultural references, nicknames, language, and even the use of emojis — all can reveal clues on the nationalities of the criminals or their geographical location.

Go On with Tracerouting

One of the best ways to catch perpetrators is by identifying their IP addresses. However, they usually hide these IPs by spoofing or by bouncing communications from different locations. Luckily, no matter how shrewd and clever these individuals may be, malicious addresses can still be identified through an approach called tracerouting.

The technique works by showing the hostnames of all the devices within the range of your computer and a target machine. More often than not, the last machine's hostname address belongs to the hacker's Internet Service Provider. With the ISP known, investigators can then pinpoint the geographical location and the areas where the culprit is probably situated.

* * *

Every time you venture online, you're exposed to malevolent entities that can harm your system and disrupt business operations. Knowing how to trace the source of an attack can stop it in its tracks and prevent the intervention from happening again.
Written by Jonathan Zhang, Founder and CEO of Threat Intelligence PlatformFollow CircleID on TwitterMore under: Cybersecurity, Malware, Spam, Whois

The post How to Track Online Malevolent Identities in the Act appeared first on iGoldRush Domain News and Resources.


          March Patch Tuesday shuts down two zero-day exploits      Cache   Translate Page      
none
          Il a dans les exploitations cueillir des oranges pour aimer le basket à 21 ans était de devenir mill-k9084      Cache   Translate Page      
Il a dans les exploitations cueillir des oranges pour aimer le basket à 21 ans mais M. brutal de boucle 伊巴卡 milliards de yuan de division!Jericho saison lettres 16 gardes le ballon de sport selon Yahoo célèbre journaliste Adrian – Rapport Werner rawski, 21 ans de lettres "frère" Ioannis – un support Kumbo et les […]
          SN 705: SPOILER      Cache   Translate Page      

Security Now (Audio)

  • 0-day exploit bidding war
  • NSA releases Ghidra v9
  • Firefox's adds Tor privacy
  • A pair of nasty 0-days
  • A worrisome breach at Citrix
  • The risk of claiming to be an unhackable aftermarket car alarm
  • A new and interesting "Windows developers chatting with users" idea at Microsoft
  • A semi-solution to Windows updates crashing systems
  • Detailed news of the Marriott/Starwood breach, a bit of miscellany from
  • SPOILER: Another new and different consequence of speculation on Intel machines.

We invite you to read our show notes at https://www.grc.com/sn/SN-705-Notes.pdf

Hosts: Steve Gibson and Leo Laporte

Download or subscribe to this show at https://twit.tv/shows/security-now.

You can submit a question to Security Now! at the GRC Feedback Page.

For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.

Sponsors:


          Commis-vendeur - J. R. ROY - Lac-Etchemin, QC      Cache   Translate Page      
Descriptif du poste Notre filiale située à St-Léon-de-Standon, J. R. Roy inc. vous offre une opportunité de commis-vendeur/commis-vendeuse, exploitant ainsi...
From Indeed - Thu, 07 Feb 2019 20:57:07 GMT - View all Lac-Etchemin, QC jobs
          Re: Sondage : Êtes vous satisfait de Windows 10 ?      Cache   Translate Page      
Citation :Popeye23 a écrit:Citation :Wullfk a écrit:Mais qu'est ce que tu appelle un "PC bien protégé", si le système en lui même comporte des failles exploitables et non corrigés ?Bien protégé par un antivirus à jour (Avira) et en ce qui me concerne la suite Comodo (sans l'antivirus) : HIPS, confinement automatique de tout programme non approuvé et des maj non validées d'un programme initialement approuvé, et bien sur le pare-feu qui, bien paramétré, est redoutablement efficace.En espérant que la personne entre la chaise et la clavier ne fasse pas de bêtise.C'est déjà une très bonne base, mais malheureusement pas totalement efficace si le système lui même n'est pas à jour.Mais bon la sécurité à 100% n'existe pas.La chose que j’apprécie sur Linux, c'est que je n'ai pas besoins de m'occuper d'un antivirus ou d'un pare-feu, même si ceux de base sont présent, il suffit juste mettre à jour le système quand il le demande.
          Re: Sondage : Êtes vous satisfait de Windows 10 ?      Cache   Translate Page      
Citation :Wullfk a écrit:Mais qu'est ce que tu appelle un "PC bien protégé", si le système en lui même comporte des failles exploitables et non corrigés ?Bien protégé par un antivirus à jour (Avira) et en ce qui me concerne la suite Comodo (sans l'antivirus) : HIPS, confinement automatique de tout programme non approuvé et des maj non validées d'un programme initialement approuvé, et bien sur le pare-feu qui, bien paramétré, est redoutablement efficace.En espérant que la personne entre la chaise et la clavier ne fasse pas de bêtise.
          Re: Sondage : Êtes vous satisfait de Windows 10 ?      Cache   Translate Page      
Citation :Popeye23 a écrit:Pour ma part je resterai sous Seven même après janvier 2020. Un pc bien protégé et utilisé en réfléchissant avant de cliquer ça devrait le faire.Ma fois pourquoi pas, d'autant plus que moyennant finances tu pourras bénéficier des mises à jour jusqu'en 2023 mais avec un tarif qui augmenteras tous les ans.Prolongation de Windows 7Mais qu'est ce que tu appelle un "PC bien protégé", si le système en lui même comporte des failles exploitables et non corrigés ?Si le seul fait de cliquer intelligemment suffisait à être en sécurité ça se saurait depuis longtemps, ceci dit c'est déjà un bon raisonnement.
          A Dangerous Collaboration      Cache   Translate Page      

I’m a day late but still delighted to tell you about author Deanna Raybourn’s latest Veronica Speedwell mystery, A DANGEROUS COLLABORATION, that was released yesterday, Tuesday, March 12th.

Described as “a ruthlessly intelligent heroine” by NPR, Veronica Speedwell is one of those characters that you enjoy getting to know better and better. The previous book in the series, A TREACHEROUS CURSE, has been nominated for the Edgar Award for Best Novel.

A lepidopterist by trade, Veronica has been up to much more than chasing after rare specimens of butterflies. Continuing on after the exhilarating adventures of A Curious Beginning, A Perilous Undertaking, and A Treacherous Curse (which was named by Suspense Magazine as one it’s best historical mysteries of 2018!), it’s difficult to imagine how the spunky and spirited Victorian-era sleuth could find herself caught up in even more thrilling and dangerous exploits.

Brimming with Raybourn’s trademark clever plot construction that readers have come to love, in addition to provocative storytelling and the smoldering chemistry between Veronica and Stoker, A DANGEROUS COLLABORATION is another great example of why readers keep picking up and continue to come back to this phenomenal series.

Here’s a brief synopsis to entice you even more.

After chasing down clues leading to her mysterious past, having quite literally run off to join a traveling circus, solving a murder mystery at a ladies-only social club, and an unraveling an ancient Egyptian curse, Veronica always goes back to her true love:  the butterflies. But as colorful and unfettered as the butterflies she collects, Veronica can't resist the allure of an exotic mystery—particularly one involving her enigmatic, frequently uncouth, yet ruggedly handsome colleague Stoker.
          Veronica is whisked off to a remote island off the tip of Cornwall when Stoker’s brother, Tiberius, calls in a favor. On the pretext of wanting a companion to accompany him to Lord Malcolm Romilly’s house party, Tiberius persuades Veronica to pose as his fiancée—much to Stoker's chagrin. But upon arriving, it becomes clear that the party is not as innocent as it had seemed. Every invited guest has a connection to Romilly’s wife, Rosamund, who disappeared on her wedding day three years ago, and a dramatic dinner proves she is very much on her husband’s mind.
          As spectral figures, ghostly music, and mysterious threats begin to plague the partygoers, Veronica enlists Stoker's help to discover the host's true motivations. And as they investigate, it becomes clear that there are numerous mysteries surrounding the Romilly estate, and every person present has a motive to kill Rosamund.

Now for those of you who aren’t familiar with the author, here’s a bit of background on her.

Author Deanna Raybourn
Deanna Raybourn is the author of the award-winning, New York Timesbestselling Lady Julia Grey series, currently in development for television, as well as the Veronica Speedwell Mysteries and several standalone novels.

Visit her online at www.deannaraybourn.com, on Facebook at DeannaRaybournAuthor, and on Twitter @deannaraybourn.

Thanks for stopping by today. Have you read any of the Veronica Speedwell Mysteries? Have you ever thought about becoming a lepidopterist (a person who studies or collects butterflies and moths)?

           Comment on Jung Joon Young Returns to Korea for Investigation, Admits to All Crimes and Retires from K-ent by Violette       Cache   Translate Page      
What these celebrity criminals believed was a 'game and chatting' is actually a crime. Plus if you have been following the case, in many instances - they drugged the women, sexually exploited them and then video taped without consent. It is all illegal. Please don't use the line that these celebs are being used as scapegoats, they are were very much involved as criminals. As to the other bigger players, it's too soon to say - isn't it? The case is on-going and if the Prime Minister and the anti-corruption agency is also involved, it's a given that they will investigate these other big players too.
          Lyon rêve d'un exploit sur la pelouse de Barcelone - Est Républicain      Cache   Translate Page      
Lyon rêve d'un exploit sur la pelouse de Barcelone  Est Républicain

L'Olympique Lyonnais veut croire en son étoile, ce mercredi soir (21 h) au Camp Nou, où il va tenter d'éliminer le Barça de la Ligue des Champions dès ...


          MediaBerkman: Privacy’s Blueprint - The Battle to Control the Design of New Technologies      Cache   Translate Page      
In this talk, Professor Woodrow Hartzog argues that the law should require software and hardware makers to respect privacy in the design of their products. Against the often self-serving optimism of Silicon Valley and the inertia of tech evangelism, privacy gains will come from better rules for products, not users. The current model of regulating use fosters exploitation. Hartzog speaks on the need to develop the theoretical underpinnings of a new kind of privacy law that is responsive to the way people actually perceive and use digital technologies. The law can demand encryption. It can prohibit malicious interfaces that deceive users and leave them vulnerable. It can require safeguards against abuses of biometric surveillance. It can, in short, make the technology itself worthy of our trust. For more info about this event visit: https://cyber.harvard.edu/events/2019-03-05/privacys-blueprin

          Prosecutors: College Scam Takes Bribery to Whole New Level      Cache   Translate Page      
Rich and famous parents who are accused of buying their children entrance to some of the best universities in the U.S. were part of a multilevel, years-long scam that exploited a desire expressed worldwide: to be educated at the best American institutions. William Rick Singer of Newport Beach, California, who has pleaded guilty to orchestrating the scam and is named as a cooperating witness, earned more than $25 million by connecting parents and their children with test administrators and college coaches who took their cut for endorsing bogus applicants, says the U.S. Department of Justice. "They flaunted their wealth, sparing no expense, so they could cheat the system so set their children up for success with the best education money could buy. Literally," described Joseph Bonavolonta of the FBI's Boston field office. Exclusive, moneyed and well-connected, parents on the list of those indicted in "Operation Varsity Blues" for conspiracy to commit mail and wire fraud include the owner of a California wine vineyard and the former owner of a California media company that sold for $325 million a year ago. Some own corporations and firms, and deal in private equity and real-estate development. There are several executives, entrepreneurs, investors and CEOs among the 50 who were charged. Parents charged in the scandal list addresses on New York City’s Fifth Avenue and at Rockefeller Center, California’s Beverly Hills, Greenwich, Connecticut, and Hyannis Port, Massachusetts, where the Kennedy political dynasty owns an oceanfront summer compound.  That echelon of American wealth traditionally seeks prestigious institutions of higher education for their children: Yale, Stanford and Georgetown, among other Ivy League, or older universities known for their excellence and well-heeled connections. Other schools caught in the scam are campuses in the University of California system, the University of Texas and Wake Forest University. Wealthy families have been donating large sums to colleges and universities for a millennia to get their offspring into prestigious schools – and get their family name inscribed in stone on university buildings or connected to a prestigious post, called a “chair.” And testing overseas for international students has been cancelled numerous times -- as recently as this month -- because the test answers have been widely distributed to test takers before the exam. But prosecutors say this scam took bribery to a new level.  "We're not talking about donating a building so a school is more likely to take your daughter or son," explained U.S. Attorney Andrew Lelling. “We’re talking about deception and fraud. Fake test scores, fake athletic credentials, fake photographs, bribed college officials.” Lelling said the case is one of “the widening corruption of elite college admissions. … There can be no separate admission system for the wealthy. Every year, talented students work hard ... in a system that grows more and more competitive every year." ​"For every student admitted through fraud, an honest and genuinely talented student was rejected," he said. Even high-achieving high-school students labor for four years to impress highly selective colleges that have low acceptance rates: Among the schools mentioned in the indictments, only 5 percent of applicants get into Stanford, 7 percent into Yale, 16 percent into University of California-Los Angeles, 17 percent into Georgetown, 18 percent into the University of Southern California, and 29 percent into Wake Forest University, according to the National Center for Education Statistics. In addition to high grade-point averages, students applying to schools need high scores on standardized tests like the SAT and ACT. Many families pay tutors to help students improve their test scores, which can be taken several times.  But unlike most high-school juniors and seniors who take the SAT or ACT under the watchful eye of proctors in large group locations like school cafeterias, parent and Hollywood actor Felicity Huffman paid Singer $15,000 to get her daughter time and privacy to take the test, according to prosecutors. One defendant, Mark Riddell of Palmetto, Florida, answered or corrected hers and other’s responses before submitting the results to the testing companies.  And parents – some of whom paid up to $75,000 for testing assistance -- got a bonus: They made their payments through a charitable organization Singer created named Key Worldwide Foundation. Not only is Key tax-exempt as a charity, parents were able to deduct those charitable contributions from their income taxes, prosecutors said.  Athletics are a unique path into higher echelon colleges and universities, and college coaches were a link between parents and Singer. A student who excels at lacrosse, soccer or basketball can boost an institution’s revenue through ticket sales, endorsements and brand marketing. College basketball is widely seen as a televised, brightly lit pathway for athletes to professional, well-paid careers.  The indictment snagged college sports coaches who acted as middlemen, knowing the applicants real abilities but taking big payoffs to endorse them for admission. College and university coaches are often the highest paid on college campuses, sometimes receiving tens or hundreds of thousands, and sometimes millions more, than the college presidents they serve.  Parents staged photos of their children engaged in popular sports, Lelling described, including photoshopping the face of their child onto the face of an actual athlete, and then submitting it to support of the child's application. “We believe everyone charged here today had a role in cultivating a culture of corruption and greed,” Bonavolonta said at a press conference. “Their actions were without a doubt insidious, selfish and shameful.” Olivia Giannulli, daughter of televison actor Lori Loughlin and a YouTube star who goes by the name Olivia Jade, has seen increased heat around comments she made after her acceptance at USC. "I don't know how much of school I'm gonna attend," she shared with her nearly 2 million subscribers, after explaining her extensive work schedule. “I don't really care about school, as you guys all know." Prosecutors said they did not believe the schools were directly involved or knew of the pay-for-admission scam. Yale and USC issued statements early.  “We do not believe that any member of the Yale administration or staff other than the charged coach knew about the conspiracy. The university has cooperated fully in the investigation and will continue to cooperate as the case moves forward,” wrote the university's President Peter Salovey. “The federal government has alleged that USC is a victim in a scheme perpetrated against the university by a long-time Athletics Department employee, one current coach and three former coaching staff, who were allegedly involved in a college admissions scheme and have been charged by the government on multiple charges,” wrote USC President Wanda M. Austin to the university community.  “At this time, we have no reason to believe that admissions employees or senior administrators were aware of the scheme or took part in any wrongdoing—and we believe the government concurs in that assessment.” Mark LaMet and Lynn Davis contributed to this report. 
          The Changing & Evolving Fashions of Late 1860s Victorian Dresses (Poison or Protect Special Extras)      Cache   Translate Page      

Poison or Protect follows the exploits of one lady assassin with a penchant for poison, one gentle soldier with a white knight complex, a house party, a ghost, and… The changing fashions of 1867. No really, the diminishing nature of full skirts is a plot point. I roll like that. Even so, I can’t go […]

The post The Changing & Evolving Fashions of Late 1860s Victorian Dresses (Poison or Protect Special Extras) appeared first on Gail Carriger.


          Venezuelan Child Migrants, Women Fall Prey to Human Traffickers in Peru      Cache   Translate Page      
Migrant children fleeing alone from Venezuela's economic and political crises, along with destitute Venezuelan migrants arriving without documents both make easy prey for human traffickers in Peru, anti-slavery experts said Tuesday. About one in 10 Venezuelans — 3.4 million people — have fled their homeland in recent years. After Colombia, Peru is home to the second-largest number of Venezuelan migrants, with more than a half a million having settled there, searching for food and a better life. From 2017 to 2018, authorities in Peru recorded more than 1,700 victims of human trafficking, of which about 10 percent were Venezuelan, said Jose Ivan Davalos, head of mission for the U.N.'s International Organization for Migration (IOM) in Peru. "This figure could increase because of the vulnerable condition in which this population [of migrants] arrives in the country," Davalos said in the capital Lima during an anti-trafficking event. "Many people who arrive, they arrive without documentation, without being able to identify themselves, and above all, boys and girls who are not accompanied arrive, and they can be easily recruited [by traffickers]," said Davalos at the event that brought regional governors and officials together. He added that, on average, about two victims of trafficking are reported every day in Peru. Poor and hungry teenage girls and women are most likely to become victims of sex trafficking, experts said. Lured by false offers of free travel and well-paid work as waitresses, dancers or cooks in mining areas, migrants can end up forced into prostitution and made to work to pay off their debts, according to prosecutors. In Peru's Amazon jungle area of Madre de Dios, the heart of illegal gold mining, there are dozens of bars and brothels used by miners. In the past year, raids by police in Madre de Dios — also known as a hot spot of sex trafficking — have led to the rescue of Venezuelan women and girls being sexually exploited. Alejandro Delgado, an official at Peru's interior ministry, said combating "the scourge" of human trafficking requires local and national authorities and countries in the region working together. "It's a phenomena that we can't tolerate, we can't allow that people, above all women and girls, to be treated as objects. It's inhumane," said Delgado, who heads a commission against human trafficking and illegal migrant smuggling. Peru's "porous borders," including those with Ecuador and Bolivia, allow traffickers and their victims to move around with ease, Marisol Perez, a former justice minister said. "We don't have the capacity to control our borders," she said.
          Optimizing the depth and the direction of prospective planning using information values      Cache   Translate Page      
by Can Eren Sezener, Amir Dezfouli, Mehdi Keramati Evaluating the future consequences of actions is achievable by simulating a mental search tree into the future. Expanding deep trees, however, is computationally taxing. Therefore, machines and humans use a plan-until-habit scheme that simulates the environment up to a limited depth and then exploits habitual values as … Continua la lettura di Optimizing the depth and the direction of prospective planning using information values
          Capital 'improvements' are nightmare for tenants      Cache   Translate Page      

As the conversation on rent regulation gains momentum in Albany, once again the landlord lobby is falsely claiming that the major capital improvements program, which has led to billions of dollars in rent hikes, is necessary for maintaining habitable buildings and providing good jobs to local residents.

These tired arguments have been repeated to the tenant movement for decades in an attempt to threaten us and scare us. MCIs were enacted in 1969 at the request of landlords who argued that, thanks to rent stabilization, they were unable to maintain their buildings and needed incentives to make repairs. The MCI law didn’t lead to an improved housing stock. The Bronx burned along with the rest of the city.

Today, landlords make the same claim—that without any incentives or additional rent hikes it will be the 1970s all over again.

Let me paint a starkly different reality. I have lived on the Grand Concourse in the Bronx since 1992. For 23 years, we only received patchwork repairs. My corporate landlord, a company with 75 buildings in its growing portfolio, already received annual rent increases from the Rent Guidelines Board during this period to pay for maintenance. In 2015, our landlord began gut-renovating all of our bathroom and kitchens.

At first, I was ecstatic and welcomed these changes after decades of neglect. But the work dragged on for weeks. Sixty families had to share a single bathroom and could not cook. After the work was completed, I was astounded to receive a letter from the state's Division of Homes and Community Renewal informing us our landlord had applied for a permanent rent increase.

Was the work necessary? No. Our bathrooms and kitchens worked perfectly fine. It was purely cosmetic and in fact, raised the value of the building for our corporate landlord. Several of my neighbors have already moved out because of the first hike. We expect the state housing agency to rubber-stamp another four MCIs for windows, pointing, elevators and re-piping, which would mean rent hikes of hundreds of dollars.

I had never heard of an MCI. Now I know it’s another tool of displacement that landlords have weaponized against us. And it’s all starting to make sense to me. With the recent rezoning of Jerome Avenue, displacement has intensified. My landlord was not fixing the building for us, the long-term tenants, but for the people earning higher incomes who are moving into the Bronx and replacing us. Across the city, landlords are using MCIs to push rent-regulated apartments rapidly out of rent stabilization or closer to this year's deregulation rent threshold of $2,775.

It angers me. We always paid rent and deserved to live in good conditions. The MCI program is notoriously rife with fraud (even the president's family reportedly

Anita Long is a member of the No More MCIs Coalition and a leader at Community Action for Safe Apartments, a tenant-organizing project of New Settlement Apartments that primarily works in the southwest Bronx.


          Coordonnateur, Paie - ArcelorMittal Exploitation minière Canada s.e.n.c. - Longueuil, QC      Cache   Translate Page      
Statut: Travailler en étroite collaboration avec la Chef de service, Paie: • Coordonner les diverses étapes relatives à la préparation et au traitement de...
From ArcelorMittal Exploitation minière Canada s.e.n.c. - Thu, 24 Jan 2019 14:47:08 GMT - View all Longueuil, QC jobs
          In the Footsteps of Sir Edward-Burne Jones, 13 Mar 2019      Cache   Translate Page      

13 Mar 2019 - Spoken Word at Birmingham Museum & Art Gallery

(suitable for under 18s)

In-the-footsteps-of-sir-edward-burne-jones-1550393847

Positively Birmingham Tour No. 2

In the footsteps of Sir Edward Burne-Jones, Chamberlain Sq. to St Martins and Back.

Adult ticket: £12.50

Child ticket (6-16): £5.00

This tour normally uses an audio system and in particular people with hearing impairment find this very helpful.

Itinerary: Museum and Art Gallery, St Philip’s Square, the Bullring & St Martins, Grand Central and plenty of surprises.Our walk takes us to some of the city’s most historic buildings. We appreciate English Baroque, Victorian Gothic, Brutalist 1960s and present-day architectural styles. We gain an understanding of the city’s origins, and hear what is around the corner in this city of continuous change.

We look at the exploits of Sir Edward Burne-Jones, Birmingham’s most famous painter who, during his colourful life, saw Birmingham put huge efforts into improving itself. Born in the centre of Birmingham in 1833, Burne-Jones became a huge force in Victorian art.

Earphones: Please bring your own earphones with 3.5 mm jack. Alternatively you can purchase a pair, (£1 economy; £2 higher quality) at the start of the tour which you keep at the end.

Tours start/finish: Starts on the Museum and Art Gallery steps in Chamberlain Square and ends at the Museum's Edwardian Tea Rooms.

An eTicket is sent to you after booking.

Children: 6-16 years are charged at £5 - pay at tour start.

We support Sifa Fireside who work on acute and longer term homeless issues in Birmingham with at least 10% of all sales going to their work. A live audio system is used on many of our tours - ensuring you hear every word. Especially useful for those with heaing impairment. Please bring personal earphones with a 3.5 mm jack - or we supply a pair for a small donation to our chosen charity.


          Une plate-forme multi-clients à Cholet avec Brangeon      Cache   Translate Page      

Une plateforme multi-clients de 20 000 mètres carrés a été inaugurée par Brangeon Transports et Logistique.
20 000 mètres carrés de plus pour Brangeon Transports et Logistique.
L'entreprise vient d'ouvrir son nouveau service logistique au coeur de la ZI du Cormier à Cholet, au carrefour entre la Vendée (85), la Loire-Atlantique (44), les Deux-Sèvres (79) et le Maine-et-Loire (49).
Le bâtiment est modulable pour une configuration multi-clients. Divisible en 3 cellules, il s'exploite aussi en (...)

- Immobilier

           Comment on Facebook Yields to Watch Tower Subpoena; Jehovah’s Witnesses Issue 6 More to YouTube by outandabout       Cache   Translate Page      
I was referring to Ist century people, gruntled. But, just look at which populations are easily converted today. It would be people living in the poorer countries who are highly superstitious and living in third world conditions for the most part. They are pre-primed to grab onto hope and so are ripe for exploitation and this can be seen by observing which countries are seeing JW growth or any other brand for that matter. And speaking of JW growth, how much of that growth can be attributed to young children being baptized now. Playing with numbers. Lying to defend a truth.
          Africa: 'No Tomorrow' for Many Unless Consumption Falls - UN      Cache   Translate Page      
[Thomson Reuters Foundation] Nairobi -Global exploitation of natural resources - from water, sand and timber to oil, coal and gemstones - has more than tripled in 50 years, the United Nations said on Tuesday, warning of devastating environmental impacts unless demand is reduced.
          Trade Shocks and the Shifting Landscape of U.S. Manufacturing -- by Katherine Eriksson, Katheryn Russ, Jay C. Shambaugh, Minfei Xu      Cache   Translate Page      
Using data over more than a century, we show that shifts in the location of manufacturing industries are a domestic reflection of what the international trade literature refers to as the product cycle in a cross-country context, with industries spawning in high-wage areas with larger pools of educated workers and moving to lower-wage areas with less education as they age or become “standardized.” We exploit the China shock industries as a set of industries that were in the late-stage product cycle by 1990 and show how the activity in those industries shifted from high-innovation areas to low-education areas over the 20th century. The analysis also suggests that the resilience of local labor markets to manufacturing shocks depends on local industries’ phase in the product cycle, on local education levels, and on local manufacturing wages. The risk of unemployment and detachment from the labor force rises most when a shock hits in areas where an industry already has begun phasing out, wages are high, or education levels are low. The results are consistent with the belief that there are long-term, secular trends in U.S. industrial structure driving the movement of industries, which shocks may mitigate or accelerate.
          Senator Grills Google Exec: ‘Americans Did Not Sign Up for’ Location Tracking      Cache   Translate Page      

Senator Grills Google Exec: ‘Americans Did Not Sign Up for’ Location TrackingSenator Josh Hawley (R., Mo.) chastised Google's senior policy counsel during a Tuesday Judiciary Committee hearing over the company's reliance on what they perceive to be overly invasive location-tracking technology.“Do you think the average consumer would be surprised to learn that her location is recorded and sent to Google hundreds of times every day, even when she is not using her phone?” Hawley asked Senior Policy Counsel Will Devries, referring to consumers who use Google's Android products.In response, Devries argued that the near-constant location tracking performed by Google devices and software is necessary to provide the services, such as mapping services, that consumers have come to rely on.Hawley, citing a New York Times article from last year that detailed how Google monetizes users' location data, argued that there should be a way for Americans to use Google technology while opting out of location tracking.“Here’s my basic concern: Americans did not sign up for this,” Hawley shot back. “They think that the products that you offer are free — they’re not free. They think that they can opt out of the tracking that you’re performing — they can’t meaningfully opt out.”Hawley sparred with Devries on the same day he introduced a bill along with Senator Ed Markey (D., Mass.) that would prohibit technology companies from extracting the personal data of consumers under the age of 13 without parental consent. The legislation would also mandate that tech firms provide a mechanism by which a parent can erase all of their child's data, and prohibits targeting ads to children based on their online behavior.While Hawley has prioritized the aggressive regulation of big tech firms since taking office in January, fellow Republicans, such as Senator Thom Tillis (R., N.C.), continue to warn that government intervention may have the unintended consequence of harming American innovation.“This ecosystem is more complicated than just jumping on a populist notion that you are somehow exploiting consumer data and that you should be stopped,” Tillis said during the Tuesday hearing. “Because if you get stopped then all of a sudden you have to have a credit card that you need to offer Google if you want a Gmail account. These platforms have to derive revenue somehow. We need to be careful with respect to global competition and other challenges that we have that we [do not] overreact.”



          For US religious freedom ambassador, concerns remain on Vatican-China deal      Cache   Translate Page      

Hong Kong, China, Mar 12, 2019 / 03:39 am (CNA).- The Vatican’s deal with China on the appointment of bishops has not changed the government’s abuse of Catholics and sets a bad precedent for government interference with other religions, including Tibetan Buddhism, said the U.S. ambassador-at-large for International Religious Freedom.

“Since this provisional deal was announced last year, the Chinese government’s abuse of members of Catholic communities has continued. We see no signs that will change in the near future,” Ambassador Sam Brownback said in March 8 remarks to the Foreign Correspondents Club in Hong Kong, China.

His speech was part of a two-day forum on religious freedom, jointly sponsored by Taiwan and the U.S., Agence France Presse reports.

Authorities in Henan province have banned anyone under 18 from going into church to attend Mass, he said. Throughout China in the last year, government officials have forcibly closed hundreds of unregistered churches, both Protestant house churches and “underground” Catholic communities, Brownback said. He added that officials in Zhejiang province are destroying crosses and churches and pressuring Christians to renounce their faith.

Dozens of Catholic bishop positions are unfilled at present.

In September the Catholic Church reached a provisional agreement with the Chinese government regarding bishop appointments that reportedly allows the Chinese Catholic Patriotic Association to choose a slate of nominees for bishop.

“Therefore, the power to select the leaders of the Catholic Church in China rests partially with the Chinese Communist Party, which likely results in only individuals whom the Party deems loyal to its interests being put forth to the Vatican,” Brownback said.

“Members of the Catholic community, such as Hong Kong’s Cardinal Joseph Zen, who members of the audience here know, courageously and vehemently opposed this deal,” said the ambassador.

Cardinal Fernando Filoni, prefect of the Congregation for the Evangelization of Peoples, has rejected any depiction of the deal as a “unilateral sacrifice” that demands nothing of leaders long associated with China’s official Catholic organization.

“It is not about establishing who wins or who loses, who is right or wrong,” he told the Vatican newspaper L’Osservatore Romano, voicing hope that he would not hear of local situations where Chinese officials exploit the agreement to go beyond its terms.

Brownback said the Chinese government “continues to violate the sacred right to religious freedom that is in its Constitution and also enshrined in the UN Declaration of Human rights.” He cited the United States’ designation of China as a “Country of Particular Concern” since 1999 due to its engagement in or tolerance of “particularly severe violations of religious freedom.”

His speech drew a response from the Chinese Foreign Ministry, which called it a “malicious attack and slander on China’s religious policies,” Agence France Presse reports. The ministry added: “we ask the U.S. to respect the facts, stop the arrogance and prejudice and cease using religious issues to interfere in China’s internal affairs.”

“We remain concerned about the precedent this deal sets for the Chinese Communist Party’s perceived authority in interfering in the selection of other religious leaders, such as preeminent Tibetan Buddhist lamas like His Holiness the Dalai Lama,” said Brownback.

The Chinese government’s interference in the succession of Tibetan spiritual leaders includes its 1995 abduction of the 11th Panchen Lama, then six years old, and his parents. It is unknown whether he is still alive.

“We call upon the Chinese government to release immediately the Tibetan-recognized Panchen Lama or share the truth about his fate with the world,” said Brownback. “We do not accept the Chinese government’s often repeated explanation that he is studying and does not want to be disturbed.”

“The international community must make clear now that we believe that members of the Tibetan communities, like members of all faith communities, should be able to select, educate, and venerate their religious leaders without government interference,” he said.

Brownback cited aggressive interference in Tibetan Buddhist practices and Tibetan culture. Government restrictions on monks and lay people hinder pilgrimages. Authorities appoint communists to head monasteries and ban children from religious activities. Thousands of Buddhist monks and nuns have been evicted, and their monasteries demolished. Monks and nuns are forced to take political reeducation in state ideology and to denounce the Dalai Lama.

The government bans the picture of the Dalai Lama and his teachings, and it arrests those who openly revere him, said the ambassador, who added that this record indicates China’s government will likely interfere with the selection of the next Dalai Lama.

China’s government has also increased the repression of other Christians, including the detention of hundreds of members of the largest Protestant home church, Early Rain Covenant Church in Chengdu in Sichuan Province. Twelve people are still detained and their whereabouts are unknown.

On Good Friday 2018, officials began to enforce a ban on online sales of the Bible.

Brownback criticized efforts to control “countless” religious groups, often along ethnic lines, through “religious affairs regulations.” These, in addition to “the destruction of houses of worship, the unlawful imprisonment of religious leaders, and actions to ruthlessly silence any forms of constructive dissent,” show the Chinese government’s disregard for human dignity, the ambassador charged.

China’s treatment of Uighur Muslims in the far western Xinjiang Uighur Autonomous Region also drew criticism from Brownback, who said Chinese authorities have arbitrarily detained Muslim minorities in internment camps for practices like having a beard, wearing a veil, attending religious services, observing Ramadan, or praying. Travel is restricted, and parents are not allowed to give their children common Muslim names.

More than one million ethnic Muslims have been detained, according to U.N. figures.

The ambassador rejected Chinese government claims that the camps are vocational training centers, charging that they are “internment camps created to wipe out the cultural and religious identity of minority communities.” Internment is often based on cultural or religious identity. Detention is indefinite, and internees are subjected to “physical and psychological torture, intense political indoctrination, and forced labor,” he charged.

He also mentioned Falun Gong, saying its practitioners are detained in the thousands, with some tortured. At least 69 practitioners died in custody or due to injuries sustained in custody in 2018, the group estimated. The group has faced government action for over 20 years. Some practitioners appear to be missing.

Brownback cited allegations that the Chinese government forcibly harvests organs from people imprisoned due to their faith or religious practice, including in the case of Falun Gong practitioners and Uighur Muslims.

The U.S. backs “religious freedom for all,” Brownback told his audience, and is pursuing “a simple but important dream: that one day all peoples around the world will be able to worship freely and believe what they want, just like you can in Hong Kong.”

The Vatican-China agreement, signed Sept. 22, 2018, is still confidential in nature. But as one effect of the agreement, the Holy See recognized seven illicitly consecrated Chinese bishops and entrusted them with the leadership of Chinese dioceses.

At the moment all of China’s bishops have recognition of both the government and the Holy See. Since the deal, no new bishops have yet been appointed to China.

 


          A concept analysis of trauma coercive bonding in the commercial sexual exploitation of children - Sanchez RV, Speck PM, Patrician PA.       Cache   Translate Page      
BACKGROUND: The sex trafficking of adolescents is known as commercial sexual exploitation of children (CSEC). CSEC is a complex phenomenon where identification requires understanding of developmental disruptions from toxic bonding experiences that increase...
           Carpentras - Orange : Jacques Bompard jugé jeudi       Cache   Translate Page      

Le maire d'Orange depuis 1995 comparaîtra le jeudi 14 mars à 13h30 devant le tribunal correctionnel de Carpentras pour des faits de prise illégale d'intérêt. Tout est parti d'une plainte déposée en 2007 par un exploitant viticole, et...

          A budget for a collapsing America      Cache   Translate Page      


Trump’s budget more than doubles the war-fighting slush fund and proposes cutting social safety net by 9% at a time when White House rhetoric against Iran is heating up and Netanyahu, Mohammed bin Salman, and Trump all face corruption charges and challenges at home.

Col. Lawrence Wilkerson interviewed by Paul Jay.

The ugly numbers: 

  • Trump's budget calls for $750 billion in military spending for FY2020, a nearly 5% increase, which exceeds even what the Pentagon requested
  • Trump’s budget calls for cutting $845 billion from Medicare (health care for the elderly)
  • Trump’s budget calls for cutting $1.5 trillion from Medicaid (health care for the poor)
  • Trump’s budget calls for cutting $25 billion from the Social Security retirement program
  • Trump’s budget calls for cutting $1.7 billion from child nutrition and eliminate food assistance for millions
  • Trump's budget calls for cutting $1 billion from the National Science Foundation (The NSF provides about one-quarter of all federal research grants and covers fields such as engineering, mathematics, computer science and social sciences. It also funds the purchase of large-scale scientific equipment.)
  •  And many more social & environmental programs would be cut and destroyed by the Trump budget
It's not just Trump's budget,
it was Obama's budget,
it was Bush's budget,
it was Clinton's budget,
it was Bush's budget,
it was Reagan's budget,
it was Carter's budget.

It is the budget of corporations and politicians who continue to exploit the working class.


    Now is the time for the American people to rattle their chains and demand that Congress CUT THE BLOATED AND WASTEFUL PENTAGON BUDGET!

    FORGET THE ATTACKS ON SOCIAL PROGRAMS!  
              Sondaggio Swg. Lega cresce ancora, Pd effetto Zingaretti: rimonta sopra il 20%      Cache   Translate Page      

    ROMA – Continua a crescere la Lega di Matteo Salvini, ma il vero exploit è quello del Pd che, per [...]

    L'articolo Sondaggio Swg. Lega cresce ancora, Pd effetto Zingaretti: rimonta sopra il 20% sembra essere il primo su Blitz quotidiano.


              Patch Tuesday, March 2019 Edition      Cache   Translate Page      
    Microsoft on Tuesday pushed out software updates to fix more than five dozen security vulnerabilities in its Windows operating systems, Internet Explorer, Edge, Office and Sharepoint. If you (ab)use Microsoft products, it's time once again to start thinking about getting your patches on. Malware or bad guys can remotely exploit roughly one-quarter of the flaws fixed in today's patch batch without any help from users.
              Adjoint(e) à l'exploitation - gestion immobilière - Société de développement Angus - Montréal, QC      Cache   Translate Page      
    La Société de développement Angus (SDA) est une entreprise d’économie sociale réalisant des projets immobiliers favorisant la revitalisation urbaine en s... $45,000 a year
    From Indeed - Wed, 06 Mar 2019 18:42:16 GMT - View all Montréal, QC jobs
              Winter is coming... Surviving my first year as a photographer      Cache   Translate Page      

    I guess it's ironic that i finally get around to writing this. The topic has been haunting me for the last five months and it is only now that it lies safely behind us that I seem to be able to pen this down.

    The winter of 2013 was a long one – meteorologically speaking as well as financially.

    I remember being relieved to see the (wedding) season finally winding down by December. 2012 was a fruitful year - better than I had dared imagining a first year in business would be. Sure we had to skim down some of our expenses and a vacation was not on the calendar, but we earned enough to eat and pay the bills and we were doing what we loved doing every day. Being self-employed was turning out to be a blast! Our plans for world domination within the next three years were going smoothly. We thought ourselves unstoppable!

    So we went quietly - perhaps a tad overconfident - into the good night of the holidays. We wore our Christmas sweaters, ate our turkeys and drank our wine. Then came January. It started snowing, and snowing.

    And the snow slowly turned black.

    By the end of January, I was getting nervous. Somehow, the bills kept finding ways to our door clients weren't. Now, I had not been too haughty to put something on the side for a rainy day. But some unexpected costs (credit card debt, car trouble) popped up, rapidly depleting our emergency fund. Suddenly, we found ourselves with less than a month's worth of food on our account. And we were hungry.
    We were in dire straits and had money for nothing.

    One of the first things I discovered during this time is that my romantic ideas of winter-time rejuvenation and rekindled creativity were severely misguided. First of all, like most people, I perform horribly in a vacuum. I always was and have become even more convinced that 'absolute freedom' does hardly any one any good – I gladly leave that to artists.
    Secondly, one of my most enduring memories from sociology class is that of the Maslow Pyramid. Mr. M states that basic needs need to be satisfied before you can think about self-fulfillment, artistic endeavors and the like. How right he was! I was not able to make the most of my 'leisure' time because we were too busy surviving. The joyful news that we had a small bundle of joy on the way (slated for October 22nd) did little to alleviate this stress.

    And so we waited for good things to come our way.
    A typical day for me consisted of checking my email over 50 times, doing incessant calculating about how best to spend the little we had, and turning off lights and household appliances in a futile attempt to cut down on our daily cost of living. Our lives felt like they were on pause while we learned how to get by with very little. (Funny fact: our accountant actually advised us in a very subtle way not to keep any income back from taxes. I laughingly ensured him that if we were keeping something back, by now, we surely had forgotten where we were hiding it.)

    By the end of February, I'd had enough. If I would go down, I would do so fighting. I knew better times were ahead (by April the wedding season was picking up again) and I was determined to make it there in one piece. And so I started doing everything I could think of to make myself seen:
    • I mailed everyone I faintly knew might be interested in photography: owners of the venues our couples married in, everyone who ever gave me their business cards, friends, family ... it didn't matter; all the while trying to retain the pride I no longer had while communicating my willingness to provide them with pictures of all sorts. Little ever mailed back. So I started calling. Through sheer perseverance (one might say downright bullying), I worked myself into a few small contracts that would keep us going.
    • When the first money was earned and financial doom and gloom were averted, I picked up my personal projects again. Creativity is a muscle and by February, mine had severely atrophied. Apart from forcing myself to make pictures every day again, I did some soul-searching to find out which themes really interested me and how I could translate them to photography. I visited a children's daycare center to see what it would be for our little boy; I did a series of portraits with antique cameras at a school; I started collecting cameras and selling them via Etsy; I helped the people of Kavka with photography of their interiors and a friend of mine with pictures of the play she wrote; I started studying videography and found it to be a niche to be exploited in the Belgian market... (some examples are strewn across this page)




    In short, I did everything I could ever think of to get out of our downward spiral. My return on investment was minimal but by then, my dogged tenacity was feeding my enthusiasm in a frantic feedback loop. We were going to survive. Not a question.
    And then finally, like a plane piercing through an overcast sky, it was April and we were in the clear. A small but steady flow of cash was coming our way. Elise was invited to open a pop-up shop and flourished. Requests for all kinds of appointments were coming in. We could afford to buy the non-generic breakfast cereal again. We were living the high-life!

    Now, by July, things are really looking up. While I can still find some time to relax (sometimes...), I have finally realized one of my goals for 2012: a more or less steady flow of income. We will be able to fund our wedding and still have some money left to refurbish the baby room in time for Oskar to come into our world. We can sigh relieved.

    We've learned a lesson the (almost very) hard way. I am only now relaxing from high stress and the accompanying low stamina, energy and health; I've never been so tepid, tired and often sick as I was this winter. Moreover, while the season has only begun, I feel exhausted already. You have to be very thick-skinned not to let such things affect you. While I was glad to find we had the energy reserves to cope and pull ourselves out of the bog of bankruptcy, it will take some tome for me to be able to do so again.

    I guess everyone (and especially every starting business) passes through this cycle of pride, megalomania, fall and lasting doubt. If you're lucky, you can stand up, shake it off – and do it all over again. I've learned some valuable lessons about solvency, clientele gathering, visibility and savings. My goals for 2013 will be far different than those I had for 2012.
    Most importantly, I am determined never to let my son experience nor even see in his parents' eyes the distress we experienced this winter.

    A thriving business will be a fortunate by-product of my striving.
    ------
    Do you have a similar experience or something to share? Comments are always greatly appreciated!





              Chrome 0day in the Wild – Security Byte      Cache   Translate Page      

    Last week, the Chrome team warned that attackers were exploiting a zero day vulnerability in the popular browser in the wild. At a high level, Chrome’s FileReader suffers from a memory corruption vulnerability that attackers could exploit to escape Chrome’s sandbox and execute code. The criminals exploiting the flaw are also leveraging a Windows vulnerability […]

    Read More - Chrome 0day in the Wild – Security Byte


              3/13/2019: Sport: Ioane’s exploits as a backline nomad surely over      Cache   Translate Page      

    As Rieko Ioane ran in for his fourth try against the Sunwolves — and the Blues needed all of them to secure their first win of the season — the folly of him being shoehorned into the midfield last year became all the more apparent. England and Ireland...
              Call the Cleaners review: More than the typical reality TV exploitation      Cache   Translate Page      
    'Cleaner' is an inadequate word for what they have to do. To approach a toilet pan that has been disabled through a buildup of caked-on limestone is something that takes real physical courage
              UK: Yet Another Muslim Rape Gang Is Charged      Cache   Translate Page      

    The BBC reported Monday that “eleven men have been charged with child sex offences in Sheffield.” The names of those charged make it clear that this was yet another Muslim rape gang – one of a seemingly endless stream. No one in Britain will dare to acknowledge it as such, but this dispiritingly recurring featuring of modern life in the United Kingdom is yet another product of the cultural hegemony of the Left.

    Of course, the immediate culprit is Islamic teaching. One survivor of a Muslim rape gang in the UK said that her rapists would quote Quran to her, and believed their actions justified by Islam. The Qur’an teaches that Infidel women can be lawfully taken for sexual use (cf. its allowance for a man to take “captives of the right hand,” 4:3, 4:24, 23:1-6, 33:50, 70:30). The Qur’an says: “O Prophet, tell your wives and your daughters and the women of the believers to bring down over themselves of their outer garments. That is more suitable that they will be known and not be abused. And ever is Allah Forgiving and Merciful.” (33:59) The implication there is that if women do not cover themselves adequately with their outer garments, they may be abused, and that such abuse would be justified.

    But there is another reason why it keeps happening as well. 1,400 British non-Muslim children were gang-raped and brutalized by Muslims in one city alone, and “several staff described their nervousness about identifying the ethnic origins of perpetrators for fear of being thought as racist; others remembered clear direction from their managers not to do so.”

    Why did they fear being thought of as racist? The Muslim rape gangs went unreported, unprosecuted, and in general unstopped because of far-Left organizations including Hope Not Hate, Faith Matters, and Tell Mama, which waged relentless war against anyone and everyone who spoke out about the issue. These are the British equivalents of the Southern Poverty Law Center. They demonized as “Islamophobic,” “hateful” and “bigoted” anyone who said that there were Muslim rape gangs at all, and that they had to be stopped. They led the campaign to ban Pamela Geller and me from entering the country, when one of the events we had discussed going to was a rally against the Muslim rape gangs.

    Hope Not Hate has scrubbed the evidence, but it used to be possible to search for “grooming” (as these gangs are usually called “grooming gangs” in the British media) at Hope Not Hate’s site. You would have seen that the vast majority of the articles mentioning this practice were attacking those who were calling attention to it and protesting against it.

    Who is responsible for the mass gang-rape of British girls by Muslims? The British Left — in particular the fascist “anti-hate” crusaders Nick Lowles and Matthew Collins of Hope Not Hate, Fiyaz Mughal of Faith Matters and Tell Mama, and their friends, supporters, and allies.

    The lives of at least 1,400 girls are ruined today because of Lowles, Collins, Mughal, and their cohorts. If Britain were even close to being a sane society today, these people would be being subjected to scorching criticism, and there would be a thorough public reevaluation of how much the Left’s alliance with Islamic supremacism and smear campaign against foes of jihad terror has harmed the nation and its people.

    But Britain is not a sane society today, and these sinister, cynical, authoritarian Leftists — Lowles, Mughal, and the rest of them — continue to wield their considerable power and influence in British society, working assiduously to crush all dissent. If Britain is ever to recover itself and stave off chaos, civil war and Sharia, Lowles, Collins, Mughal and others like them must be decisively repudiated and removed from all positions of influence, and their organizations exposed for what they are.


              Open Borders Are Dangerous To Our (Public) Health      Cache   Translate Page      

    In recent years there have been outbreaks of dangerous communicable diseases that had either been eradicated in the United States or were uncommon in the United States altogether such as diseases commonly found in the tropics or in other parts of the world.

    Within the past few months the mainstream media has reported on how a number of dangerous communicable diseases. such as the measles, have infected many people, particularly children in the United States.  The focus of the reports has been on children who because of religious beliefs or fears about the perceived nexus between vaccinations and autism have not been vaccinated to protect them against measles and other such communicable diseases.

    For example, on March 7, 2019 the New York Times reported, “Measles Outbreak: 1 Student Got 21 Others Sick.”

    These reports blithely ignore the nexus between illegal immigration and outbreaks of these debilitating and deadly diseases.

    In the Orwellian world all too many journalists and politicians inhabit today, aliens who evade the vital inspections process at ports of entry and enter the United States without inspections are simply referred to as “Undocumented Immigrants.”  I have addressed this linguistic “sleight of tongue” in many of my articles so I won’t delve into the dishonesty this represents.  It suffices to say that aliens who enter the United States without inspection evade a serious vetting process to make certain that criminals and terrorists not gain access to the United States to protect national security and public safety.

    The vetting process is also supposed to make certain that aliens with dangerous communicable diseases are prevented from entering the United States to protect public health.

    This is yet another vetting process that aliens who enter without inspection are not subjected to.

    The United States Public Health Service (USPH) explains its mission at U.S. Ports of Entry on its website under the heading, Protecting America’s Health At U.S. Ports of Entry

    Here is how USPH explains its mission:

    Detect, respond, and protect 24/7 Strategically placed at 20 U.S. ports of entry, CDC protects America from public health threats, both foreign and domestic. Highly skilled CDC staff work 24/7 to detect, respond to, and prevent the spread of contagious diseases.

    With our partners, CDC responds to sick travelers who arrive in the United States at major airports, seaports, or land border crossings. We alert travelers about disease outbreaks and steps they can take to protect themselves.

    We restrict the importation of animals and products that may carry disease. We are always on call—during the workday, on weekends, and in the middle of the night. We’re on the frontlines, protecting you and your community.

    Disease is just a flight away

    When sick passengers are on a flight, the airline lets CDC know. We evaluate whether they might be contagious to others on the plane. Some diseases can spread quickly through a community, so CDC works with state and local health departments to evaluate and respond. When necessary, CDC can prevent a sick person from traveling and exposing others to disease. It’s all about making sure 1 sick traveler doesn’t become 100 sick people in your community.

    At the beginning of my career with the former INS I served as an Immigration Inspector at John F. Kennedy International Airport and worked closely with USPH.

    This calls to mind an article I wrote in July of last year, The Left’s Immigration Con Game in which I debunked the lies about Ellis Island which when it was completed more than one hundred years ago included the largest hospital complex in the United States at that time.

    Here is an excerpt from the my earlier article:

    An extraordinary film, Forgotten Ellis Island, is a must-see documentary that tells the true story about Ellis Island, and the story is not particularly pretty or romantic.

    To begin with, Ellis Island was not a natural island but was constructed on rocks and debris removed during the construction of the massive New York City subway system.

    By situating this federal facility on this artificial island, no aliens could come ashore and abscond the way that today aliens exploit the lunacy known as “catch & release” -- a policy that incidentally does not only occur along the borders of the United States but, similarly plagues the integrity of the immigration system from within the interior of the United States.

    The only way for aliens to get from Ellis Island to New York City, and hence the U.S. mainland, was by a government-operated ferry.

    According to the documentary, Ellis Island included a massive hospital complex that consisted of 22 buildings.

    One hundred years ago, Public Health officials worked with immigration inspectors to process the arriving immigrants.  Back then, the most significant concerns with admission decisions centered on health-related issues.

    In my piece I noted that there were two concerns about the health of arriving immigrants.  Obviously the greatest concern was that relatively minor infections could lead to the deadly epidemics because there were no antibiotics back then.

    The second concern was to make certain that arriving immigration were of sound mind and body so that they would be able to be gainfully employed and support themselves.

    Those concerns can be found in a section of the current Immigration and Nationality Act (INA).

    8 U.S. Code § 1182 (Inadmissible Aliens).

    This extremely important section of law that was enacted to protect America and Americans begins with the following:

    (a) Classes of aliens ineligible for visas or admissionExcept as otherwise provided in this chapter, aliens who are inadmissible under the following paragraphs are ineligible to receive visas and ineligible to be admitted to the United States:

    (1) Health-related grounds

    (A) In general Any alien

    (i) who is determined (in accordance with regulations prescribed by the Secretary of Health and Human Services) to have a communicable disease of public health significance; [1]

    (ii) except as provided in subparagraph (C), who seeks admission as an immigrant, or who seeks adjustment of status to the status of an alien lawfully admitted for permanent residence, and who has failed to present documentation of having received vaccination against vaccine-preventable diseases, which shall include at least the following diseases: mumps, measles, rubella, polio, tetanus and diphtheria toxoids, pertussis, influenza type B and hepatitis B, and any other vaccinations against vaccine-preventable diseases recommended by the Advisory Committee for Immunization Practices,

    (iii) who is determined (in accordance with regulations prescribed by the Secretary of Health and Human Services in consultation with the Attorney General)—

    (I) to have a physical or mental disorder and behavior associated with the disorder that may pose, or has posed, a threat to the property, safety, or welfare of the alien or others, or

    (II) to have had a physical or mental disorder and a history of behavior associated with the disorder, which behavior has posed a threat to the property, safety, or welfare of the alien or others and which behavior is likely to recur or to lead to other harmful behavior, or

    (iv) who is determined (in accordance with regulations prescribed by the Secretary of Health and Human Services) to be a drug abuser or addict,

    is inadmissible.

    Nevertheless, for the members of Congress who refuse to fund the construction of an effective barrier on the U.S./Mexican border and now seek to block President Trump’s declaration of an emergency, none of this matters.

    For them, dead bodies are mere speed bumps along the road to their political objectives.


              The Today Show Celebrates Communist Holiday      Cache   Translate Page      

    Reprinted From The American Spectator.

    On Friday morning I was sitting alone gumming a bowl of oatmeal in the breakfast area of a Hampton Inn in Pontiac, Illinois, when I was assaulted by an absurdity on the widescreen TV. There I was, calmly minding my own business, keeping my big mouth shut for a change, opening it only for the next scoop of tastelessness. Just then, a group of maniacs from the Today show ruined my tranquility by babbling obliviously and ecstatically about International Women’s Day.

    International Women’s Day? Seriously? Had I slipped back in time a hundred years ago to, er, Leningrad, March 8, 1919? Judging from the giggling guy and gals on the screen, I had not. I checked my phone. It was March 8, 2019. And I was in America.

    Some Today show dingbat gushed feigned excitement about the great holiday. Sitting to his left were two or three fashionable ladies likewise sharing his jubilation. The male host turned over the segment to a lady reporter outside the building, who was flanked by two young women prattling on about the liberation of the “music industry” from some sinister male dominance that obviously has deprived the likes of Madonna and Barbra Streisand of millions of dollars in riches. Behind them all was a gaggle of girls cheering about something else that had something to do with International Women’s Day.

    It was confusing. All of these women and yet — and yet — no Comrade Clara.

     

    That’s right. No Comrade Clara. Where was Clara Zetkin?

    It was then that I realized that, no, I hadn’t slipped into a time-warp overnight somewhere along Rt. 55 on my way from Eureka College to the Union League Club in Chicago later that day — both places where, ironically, I would deliver lectures celebrating America’s defeat of international communism in the last century.

    I guess the celebration is premature.

    Recall, dear leaders, that we Americans won the Cold War and defeated the likes of Lenin, Trotsky, Stalin, and Clara Zetkin.

    Because of the laws of nature, Clara wasn’t at Today’s studios on Friday. Never hopping an elliptical a day in her life, never doing a Pilates workout, and surely never prancing around in yoga pants, Clara died 86 years ago. She died in Moscow, of course. She was there in the rollicking 1930s, the cusp of Stalin’s wondrous five-year plans, and just missed his Great Purge and mass famine imposed upon the Ukraine.

    But Clara was there in New York on Friday in spirit. And it seems unfair that the folks at Today offered no acknowledgment of this matron of International Women’s Day. Not even a photo!

    Of course, let’s be honest, and sadly serious for a moment. Most of these modern products of our universities have no idea who Comrade Clara was, or would give a rip, and would surely hurl cries of “McCarthyism” at me for raising the specter of the old German socialist-Marxist. Clara will not be condemned. Communism will not be condemned. I will be condemned. As usual, anti-communism will be condemned.

    Swimming along with the cultural tide, infused by the Zeitgeist, choked by what R. Emmett Tyrrell Jr. calls the Kultursmog, they only know what they’ve been taught. More so, they are victims of their progressive professors’ many sins of omission — chief among them the utter failure to teach the lessons, the damage, and the outright horrors of communism.

    They’ve been duped.

    Hence, as a public service, I’d like to here pause to enlighten them on the origins of the communist holiday they commemorated last week.

    Clara Zetkin was a big-time German pinko. A Marxist theorist and proud feminist-socialist, she also claimed the banner hoisted today by the likes of Alexandria Ocasio-Cortez and her charming congressional colleague from Dearborn, Michigan, Ms. Tlaib — that is to say, Clara was a “democratic socialist.”

    And International Women’s Day was Clara’s thing. If you doubt me, take a glance at the piece (including the accompanying photo of the women carrying the banner, “WOMEN OF THE WORLD UNITE”) on “The Origins of International Women’s Day” in People’s World, longtime flagship publication of American communism and successor to the Daily Worker. Right from the horse’s mouth:

    Within the last twenty years, many thousands of women worldwide have begun to celebrate International Women’s Day (IWD). However, the way in which the day is marked often bears little resemblance to the original IWD purpose and origins. This is a great misfortune.

    How so? What was the motivation for “IWD?” The People’s World writer provides an accurate answer:

    IWD was founded at the beginning of the last century to both highlight and celebrate the struggle of working women against their oppression and double exploitation.

    Today, this fight has not been won — their struggle is still our struggle. Thus, it is timely to remind women and men in the labor movement and elsewhere of the inspirational socialist origins of IWD in the hope that it will ignite again a progressive socialist feminist women’s movement rooted in an understanding of the class basis of women’s inequality. We can learn from our history, but first we must rediscover it.

    Assisting in that rediscovery,People’s World notes (correctly) that the first historic demonstration launching IWD took place on March 8, 1908 by “women workers” on Manhattan’s Lower East Side. From there, Clara and the European worker-masses rose up:

    Meanwhile, news of the heroic fight of U.S. women workers reached Europe — in particular, it inspired European socialist women who had established, on the initiative of the German socialist feminist Clara Zetkin (1857-1933), the International Socialist Women’s Conference.

    This latter body met for the first time in 1907 in Stuttgart alongside one of the periodic conferences of the Second [Communist] International (1889-1914).

    Three years later in 1910, Zetkin proposed the following motion at the Copenhagen Conference of the Second International: “The Socialist women of all countries will hold each year a Women’s Day, whose foremost purpose it must be to aid the attainment of women’s suffrage. This demand must be handled in conjunction with the entire women’s question according to Socialist precepts.”

    The motion was carried. March 8 was favored.

    From there, notes People’s World, the Bolsheviks got into the full swing and adopted International Women’s Day as a national holiday that would last throughout the entirety of the USSR:

    In 1917 in Russia, International Women’s Day acquired great significance — it was the flashpoint for the Russian Revolution. On March 8, (Western calendar) female workers in Petrograd held a mass strike and demonstration demanding peace and bread. The strike movement spread from factory to factory and effectively became an insurrection.

    The Bolshevik paper Pravda reported that the action of women led to revolution, resulting in the downfall of the tsar, a precursor to the Bolshevik revolution. “The first day of the revolution was Women’s Day… the women… decided the destiny of the troops; they went to the barracks, spoke to the soldiers, and the latter joined the revolution… Women, we salute you.”

    In 1922, in honor of the women’s role on IWD in 1917, Lenin declared that March 8 should be designated officially as Women’s Day. Much later, it was a national holiday in the Soviet Union and most of the former socialist countries.

    There you go. That says it all, doesn’t it? It was a national holiday in Lenin’s and Stalin’s USSR.

    Well, it looks like our intrepid “progressives” in the United States have picked up the torch. They are poised to make IWD a national holiday in the United States, too.

    International Women’s Day marchers, unite! Today show producers and hosts and reporters, unite! To borrow from Trotsky’s and Stalin’s Pravda, “We salute you!”

    Where is Clara today, as the women of Today honor her legacy? Clara Zetkin is buried in the wall of the Kremlin, where she was placed nearest the rotting bosom of Vladimir Lenin. There for the red funeral with tears in their eyes were Lenin’s widow and Stalin himself.

    That was the genesis of International Women’s Day.

    Ladies, if you bite from the fruit of International Women’s Day, you are eating the fruit of a poisoned tree. You are a sucker.


              Re: Spouse wants to buy individual stocks      Cache   Translate Page      
    calmaniac wrote:
    Mon Mar 11, 2019 7:50 pm

    I had an uncle whose business made around 10-20 million in the 1980's. He invested those millions using Elliott Wave Theory and Fibonacci timing and playing the Wall Street 'game'. Ended up with a few hundred thousand dollar estate. If he had simply bought and held anything during the 80's and 90's my guess he would have easily left his kids 10-20 times that. Not the happiest ending.


    Oh boy this is hitting really close to home, though not anywhere near the scale of calmaniac's uncle. I spent the last two nights tracking all the trades along with a comparison to "what if" we had simply bought and held VTSAX in the same amounts/timing - similar to the idea posted upthread about having half the play account be the benchmark, but it occurred to me that I actually had some data right here. Suffice it to say VTSAX was up 40% in that timeframe while our personal basket is at -17% (yup we lost money while the market ran up 40%).



    (Sorry my OP may have implied that he had never traded before - he has, I thought we agreed he wouldn't anymore, and a few years later it kind of popped back up again, so I came to BH to get some perspective and try to have a more productive discussion than we apparently had last time.)


    livesoft wrote:
    Tue Mar 12, 2019 9:16 am

    There is quite a big difference between losing money and simply performing worse than a benchmark index fund. I think this is why some casual day traders and some market timers can carry on and talk at work about all their exploits. They could actually make money just like folks who use a salesrep that charges them 1% AUM annually.



    They believe they are doing great because their account balance keeps growing. They never realize how much more their account balance would grow if they did things more optimally.



    And even investors who use passively-managed index funds can lose money over the long-term if that's what the markets give them (see 2007-2009).


    Thank you for pointing this out, I hadn't been thinking of it this way. In fact when I was tallying all the trades, in the first account I thought "Oh this doesn't look too bad - 9.5% gain over 2 years, at least we didn't lose money." But when I put it up against the "what if we bought and held VTSAX" comparison, VTSAX was at 13.7% gain so there actually was an opportunity cost. I hope he comes to see this for what it is, but in the meantime it has been at least very educational for me ~ as I said, I am new to investing (he is too, though he is not new to "trading") and looking at the numbers like this has been much more visceral than glancing at our balances every once in a while.
              Contremaître(sse), Mécanique - ArcelorMittal Exploitation minière Canada s.e.n.c. - Fire Lake, YT      Cache   Translate Page      
    Assurance collective incluant assurance invalidité, soins médicaux, dentaires, assurance vie, dont les primes sont assumées à 100% par la compagnie....
    From ArcelorMittal Exploitation minière Canada s.e.n.c. - Wed, 06 Feb 2019 20:45:56 GMT - View all Fire Lake, YT jobs
              Football - Ligue des champions - Ronaldo qualifie la Juve, City corrige Schalke      Cache   Translate Page      
    La Juventus Turin a créé l'exploit en se qualifiant sur son terrain face à l'Atletico Madrid (3-0). Manchester City a pour sa part déroulé contre Schalke (7-0).
              3/13/2019: COMMENTARY: OUTSMARTED AND WITH NO HOPE OF COAL COMFORT      Cache   Translate Page      

    The Liberal Party and the Nationals are moving into political deadlock over coal and climate change as Barnaby Joyce, posing as leader-in-waiting of the Nationals, exploits his backbench freedom to repudiate Scott Morrison’s climate change...
              The Monthly “CIO Master” Book Tuning: The Multifaceted Digital CIO Mar. 2019      Cache   Translate Page      
    Compare to the other executive positions, the CIO role continues to be shaken up, refined, reinvented and reenergized. The magic “I” of the CIO title sparks many imaginations and modern CIOs need to wear different hats and play multiple roles. Here are a set of blogs to brainstorm the multifaceted CIO leadership role.
         


     The Multifaceted Digital CIO


    The Multifaceted Digital CIOs Many organizations are at the strategic inflection point of the digital transformation, it is the broader and longer journey with many leaps and jumps, bumps and curves. IT plays a crucial role in knitting all important business elements into differentiated organizational competency. The pace of changes in IT would force more CIOs to shift into transformation-oriented and multifaceted digital leadership roles. Digital CIOs, are born to change, how they overcome the digital transformation challenges depends on their ability to think, adapt, proactively plan and execute, as well as their multifaceted leadership capacities.

    Three Digital Insight to Be a “Total CIO” Nowadays, digital organizations are so technology-driven and information-intensive, IT is one of the most significant elements of any differentiated business competencies and the defining factor of business success. While IT success has something to do with the definitions of the role that CIOs are playing and scopes of responsibilities they are taking. IT leadership totality (from whole, full, or the holistic perspective) is important for shaping digital CIO as the strategic business leader and reinventing IT to reach the next level of enterprise maturity.

    The Toughness and Softness of Digital CIOs
    With the exponential growth of information and continuously technology-driven disruptions, Information and Technology become the key differentiator of the business long-term success. IT has become “softer” because it shifts from monolithic hardware oriented to mosaic information-driven. Digital is the era for the rise of the CIO role. However, IT leadership is a tough journey. The digital CIOs need to demonstrate mental toughness and hardcore competencies to run one of the most sophisticated organizations, as well as present the soft touch to capture the minds and hearts of people, with the goal to achieve the high-performance business result, build the people-centric organization, and maximize the collective digital potential.

    The Digital CIO’s Profiles, Personas, and Personalities Compared to other CxO positions, the CIO role is considerably new with about three decades of history. But contemporary CIO is one of the most sophisticated leadership roles in modern businesses. Due to the disruptive nature of technologies and exponential growth of information, IT leadership role also has to be continually reimagined, refined, refreshed and reenergized. The CIO is no longer just a glorified geek, but a business savvy strategist and a transformational digital leader. Great CIOs have multiple personas, varying personalities, and impressive leadership profiles.

    The CIO as both Creative Theorist and Innovative Digital Practitioner? Digitalization is the evolutionary business transformation which evolves production, adoption, assimilation, exploitation, and exploration of value-added novelty in the business. The purpose of digital businesses today is to advocate better ways to do things, amplify collective human capability and business capacity in order to compete confidently and keep the business growth momentum.

    The blog is a dynamic book flowing with your thought; growing through your dedication; sharing your knowledge; conveying your wisdom, and making influence through touching the hearts and connecting the minds across the globe. The “Future of CIO” Blog has reached 2.8 million page views with about #5300 blog posting. Among 59+ different categories of leadership, management, strategy, digitalization, change/talent, etc. Blogging is not about writing, but about thinking and innovating the new ideas; it’s not just about WHAT to say, but about WHY to say, and HOW to say it. It reflects the color and shade of your thought patterns, and it indicates the peaks and curves of your thinking waves. Unlike pure entertainment, quality and professional content takes time for digesting, contemplation and engaging, and therefore, it takes the time to attract the "hungry minds" and the "deep souls." It’s the journey to amplify diverse voices and deepen digital footprints, and it's the way to harness your innovative spirit.

    CIO Master Order Link on Amazon
    CIO Master Ordre Link on Barner & Noble
    CIO Master Order LinkOn IBooks
    “CIO Master” Book Preview Running IT as Digital Transformer
    “CIO Master” Book Preview: Chapter 9 IT Agility
    “CIO Master” Book Preview: Chapter 8 Three "P"s in Running Digital IT
    “CIO Master” Book Preview: Chapter 7 IT Innovation Management
    “CIO Master” Book Preview: Chapter 6 Digital Strategy-Execution Continuum
    "CIO Master” Book Preview: Chapter 5 Thirteen Digital Flavored IT
    “CIO Master” Book Preview: Chapter 4 CIO as Talent Master Introduction
    “CIO Master” Book Preview: Chapter 3 “CIOs as Change Agent” Introduction
    “CIO Master” Book Preview: Chapter 2 “CIOs as Digital Visionary” Introduction
    “CIO Master” Book Preview: Chapter 1 “Twelve Digital CIO Personas” Introduction
    "CIO Master - Unleash the Digital Potential of IT" Introduction

    "CIO Master - Unleash the Digital Potential of IT" Book Preview


              End Child Labor in Bangladesh’s Brick Kilns      Cache   Translate Page      
    Children are being killed at the site of dangerous brick kilns. Demand that their exploitation come to an end.
              SIA 2019 : La Nouvelle Aquitaine mise sur l'agroécologie      Cache   Translate Page      
    Porte de Versailles, la tradition a été une fois de plus respectée. Le mercredi 27 février, la Région Nouvelle-Aquitaine a célébré ses terres, son territoire, ses produits de qualité, ses agriculteurs et agricultrices. Alain Rousset, président du Conseil régional a profité de l'occasion pour aborder les nouveaux enjeux de l'alimentation et de l'agriculture. Son objectif est de "faire de la Nouvelle-Aquitaine la première région européenne qui bascule dans l’agroécologie", avec un modèle agricole qui doit totalement repensé. Celui ci doit permettre à chaque exploitant de vivre dignement.
              Préposé(e), services aux visiteurs - Gouvernement du Canada - Haines Junction, YT      Cache   Translate Page      
    Exploitation d'affichages interactifs numériques pour attirer les visiteurs dans le nouveau centre d'accueil à Haines Junction.... $22.91 - $24.90 an hour
    From Government of Canada - Tue, 20 Nov 2018 05:06:58 GMT - View all Haines Junction, YT jobs
              Animateur(trice)guide, Patrimoine I - Gouvernement du Canada - Haines Junction, YT      Cache   Translate Page      
    Exploitation d'affichages interactifs numériques pour attirer les visiteurs dans le nouveau centre d'accueil à Haines Junction.... $43,420 - $48,879 a year
    From Government of Canada - Tue, 20 Nov 2018 05:05:20 GMT - View all Haines Junction, YT jobs
              Restored Republic via a GCR: Update as of March 13, 2019      Cache   Translate Page      
    Restored Republic via a GCR as of March 13 2019

    Compiled 13 March 12:01 am EST by Judy Byington, MSW, LCSW, ret. CEO, Child Abuse Recovery, Author, “Twenty Two Faces: the biography of Jenny Hill.”As a young child Jenny was tortured by a CIA Operative and forced to witness a child sacrifice: http://www.youtube.com/watch?v=F626Lsrdwg4 Articles on a CIA/Vatican Ninth Circle Child Sacrifice Cult: http://beforeitsnews.com/contributor/pages/243/590/stories.html

    Below is a summary of information from the Internet. It would be up to the individual reader to do their own research and decide whether or not it is valid. A Special Thank You to Martha for her untiring research efforts in discerning the Truth, Dale who keeps me in line and Ken who uncovers almost unlimited intel on pedophilia to help us Save the Children.

    Patience is a Virtue. Having Virtue is a sign of a good moral being. Good moral beings have the power to overcome evil and change the world. In all your giving, please don’t forget exploited children.


    Judy Note - in my opinion nothing has changed since yesterday:

    1. Reno received notice of the payment codes on Sun. March 10.

    2. The payment codes were released to payers on Mon. March 11.

    3. That same Mon. March 11 XI Ping was at Maralago signing papers with President Trump.

    4. President Trump then released the codes for the “doors to open” on Tues. March 12.

    5. Geopolitical issues have been handled behind the scenes and were not released to news outlets.

    6. Some have said that we would receive information to set our appointments by Fri. March 15.

    A. Apparent Global Currency Reset/GESARA Schedule:

    Fri. March 1: The new USTNs were made live Fri. March 1 at 3pm EST.

    Sat. midnight March 2: The debt ceiling was hit, the AIIB ended their fiat credit to the Federal Reserve and US Taxpayer monies were sent to the new US Treasury in Reno.

    Mon. March 4: Zimbabwe demonetized their Zim Bond Notes, released them on Tues. March 5, at 1 pm EST - the same time that the green light was issued for payments to buyers and payers at the new US Treasury in Reno (Zim Bonds were backing the entire Global Currency Reset and they had just been demonetized for the RV).

    Wed. March 6 at 8:15 pm EST some fines, penalties and a group known as the Big Boys were paid out. It was rumored that by Thurs. March 7 the Cherokee Nation had been paid and that by Sat. March 9 five Indian Nations had been paid out. Farm Claims and F&Ps were to be paid out the evening of Sat. March 9.

    Friday March 8 intel behind the now over 82,324 sealed indictments began to be revealed when Hannity on Fox News broke the story on the Deep State FISA Conspiracy to Commit Fraud on a Court by the DNC, Clinton Campaign and FBI. Although other mainstream news outlets have yet to pick up the story, according to Pentagon sources, "The Ides of March should bring 85,000 sealed indictments and many arrests in the U.S.”

    This Week: The European exit (Brexit) from the Euro would take away the Cabal’s last bastion of rule over the global financial system by closing the Queen’s Bank of London, though Brexit wouldn’t be made official until March 29.

    Mon. March 11: Rumor was that on March 11 XI Ping was at Maralago with President Trump and that the codes had been released.

    March 13: Zimbabwe to make gold announcement.

    Fri. March 15: We should be able to obtain our appointments by Fri. March 15.

    Fri. March 15: Back on Oct. 1 2018 the NY Stock Market lost all gains for the year and for the last six months has been on the brink of collapse, with no revival in sight. The Stock Market plummet would be a distraction to hide the RV, along with the Mueller report due out by the Ides of March 15.

    March 19: Q tweeted that big things were happening on March 19.

    March 20: Military Tribunals began in various secret locations on Jan. 2 and the 9/11 Tribunal began at GITMO on Jan. 28. The FISA Warrant Tribunal was set to begin on March 20. FISA Warrant declassification was expected to expose that the FBI, Justice Department, Obama, Clinton campaign and Democrats were in cahoots to take down duly elected US President Trump – an act of Treason.

    March 20: According to a March 6 2019 Institute of Physics of the Earth Report sent to Prime Minister Putin, around March 20 the western coasts of the US, Mexico, Central and South America was set to experience a catastrophic 9 mega-earthquake that would unleash a deadly tsunami with 30 metric-high waves. Scientists were warning leaders to prepare the general population.

    http://www.rumormillnews.com/cgi-bin/forum.cgi?read=118719&fbclid=IwAR1v_WKmlxdyCkSxFUPyGfo3a6sOAp3J8_ob8JJf4luv9u9BE9xA1HPJNzc

    March 29: Some say that the Bank of International Settlements planned to announce the gold/asset- backed currency standard on March 29. Others say the new global asset-backed currency system would be announced on Aug. 1 and put in force Jan. 1 2020.

    April 1: The transition into the new Quantum Financial System.

    August 1: All countries were expected to be GESARA compliant by Aug. 1 2019.

    Oct. 2019: The Federal Reserve and IRS would close their books in Oct. 2019. US Taxpayer monies were being sent from the Federal Reserve/IRS to the new US Treasury in Reno as of Sat. midnight March 2.

    B. March 12 2019 The Big Call, Bruce: Thebigcall.net: 712-770-4016 pin123456#

    1. Iraqi Dinar was supposed to be pre-traded by Sun. March 10 at a $6.73 start.

    2. Dong started pre-trading Mon. morning March 11. Supposed to be within 5% of the Dinar.

    3. Iranian Rial should come in close to the Dinar.

    4. Dinar would be available at the new rate Thurs. morning March 14.

    5. Native American claims have been settled. Farm claims have been notified. CMX settle out tonight. The core groups may go overnight tonight March 12.

    6. The 800#s may go right after the core groups go.

    7. Prosperity Packages have been paid out to those trustees so they can pay them to the recipients.

    8. Paymasters were liquid, have release codes.

    9. We should be there by the end of the week.

    C. March 12 2019 8:48 am EST Intel Alert: Operation Disclosure: GCR/RV Intel Alert for March 12, 2019 Operation Disclosure (Disclaimer: The following is an overview of the current situation based on intelligence leaks received from several sources which may or may not be accurate. Other confirmed sources may also be included in this overview.)

    1. The entire world was waiting on Brexit to be passed as it would mark the end of the remaining Cabal structure.

    2. Trump was expected to start making moves on removing the Fed after Brexit was passed.

    3. The Fed was connected to the City of London and Brexit would relinquish the City of London from Cabal control.

    4. This explained why the EU was doing everything in their power to prevent Brexit from being voted on. The EU continued to make profits from the City of London as they delayed Brexit. These profits were being used to fund the last Cabal/Deep State remnants.

    5. If Brexit was not passed, the Alliance was prepared to temporarily crash European markets to force the EU to collapse.

    6. Brexit was inevitable and it would happen either way, whether through a democratic process or a total collapse of the EU.

    7. The fall of the City of London meant no more funding for the Cabal (in the EU) and the Deep State (in the US). This was the Cabal's last stand.

    8. Sources expected everything to be settled (total GESARA compliance) by August.

    9. The RV was expected to occur this month of March (after Brexit was voted on).

    D. March 12 2019 Bluwolf:

    1. We are about to receive a GO message in a short while (minutes, hours, days) for there is nothing out there obstructing or delaying this or anything.

    2. The rates will be satisfying to all involved and things pertaining to the exchange will be as it was accorded with both banks elected or chosen for this important RV event.

    3. All things expected of Iraq has been 100 % covered, written off in there Gazette and accepted by all governments involved.

    4. The voice in charge of awarding the banks the GO permission to open up there envelopes which contains the 800 # they are all in agreement that we are finally heading to the desire end.

    5. The PLAN has had a lot of obstacles by the money rich and the corrupted government individuals but according to those in charge that has been dealt with.

    6. The system for this exchange has been tested and APPROVED 100% secure and safe with no flaws whatsoever.

    E. March 12 2019 1:36 pm EST Update March 12: Restored Republic via a GCR as of the Morning of March 12, 2019

    F. One Unknown Family Rules the World; Two Dueling Branches; w/ Dr. Dave Janda Pt 1 - YouTube https://www.youtube.com/watch?v=MFFBDNraxS0

    G. Q Decode NXIVM - What MSM isn't Reporting https://www.youtube.com/watch?v=Q48-ZHhAX-g The Cult out of Clifton Park NY has a million connections that the mainstream media are ignoring. In this vid I first introduce the cult & a few of its practices, then I go over how the Clintons have a cozy relationship with a lot of NXIVM's members. Q mentioned NXIVM by name a week ago, but human trafficking has been a theme throughout the Q.

    H. International Child Trafficking:

    BOMBSHELL BEAUMONT TESTIMONY SET TO SHOCK THE WORLD! https://www.youtube.com/watch?v=9W0aLPw1ZBk

    Rachel Vaughan's testimony highlights the 1966 "Disappearance of the Beaumont Children" case in South Australia, unresolved after half a century. It also raises serious concerns regarding the Mullighan Report, (a 600-page Royal Commission report of sex abuse against Australia's children in state care over four decades).

    The Child Abuse Cover Up: A Police Whistleblower Speaks... https://www.youtube.com/watch?v=K-yHHMhFWns

    In a courageous and explosive audio interview with UK Column "Despatches from the Front", a Metropolitan Police Detective Constable child protection specialist takes the lid off the scale of child abuse, trafficking and prostitution in London and UK. This criminal conspiracy seeks to deceive the public.

    Hollywood's Satanic Roots - The Movie - Reloaded // Jason Cooley https://www.youtube.com/watch?v=N1IAilcq3P0

    A Sound the Battle Cry Production: Hollywood's Satanic Roots - The Movie, Reloaded

    Ireland's forgotten mixed-race child abuse victims https://www.youtube.com/watch?v=OC_CpnwZPYM

    Rosemary Adaser was one of many mixed-race children considered illegitimate who was brought up in institutions run by the Catholic Church in Ireland between the 1950s and 1970s. She tells of the abuse and racist treatment she suffered, and returns to her school in Kilkenny.

    How the Catholic Church Hid Away Hundreds of Irish Children | Times Documentaries
    : https://www.youtube.com/watch?v=XoulaehrD_I


    Ireland wanted to forget, but the dead don't always stay buried. One woman made it her mission to unearth the truth.

    We Saw Nuns Kill Children: The Ghosts of St. Joseph's Catholic Orphanage
    https://www.youtube.com/watch?v=o13yTTAeM30 Read the full investigation: https://www.buzzfeednews.com/article/


    This is the haunting story of children who survived horrors in American orphanages, and their fight to make the world believe them.

    Documentary Nuns Abuse & Crimes against Thousands of Women Revealed https://www.youtube.com/watch?v=EfDOrLnhNh8

    Documentary Nuns Abuse & Crimes against Thousands of Women Revealed

    Human Trafficking Survivor Story: Dellena, California
    https://www.youtube.com/watch?v=OntjTAsfhpo


    In California, many vulnerable women and young girls are held against their will and forced to sell their bodies. The victims are often girls as young as 12 who are sexually exploited for the financial gain of human traffickers.

    POLITICIANS ASKED ABOUT BOHEMIAN GROVE COMPILATION https://www.youtube.com/watch?v=013tHIfnvi4

    Answers from Bill Clinton, Newt Gingrich, David Gergen, Rush Limbuagh, Bill Richardson, Richard Nixon, and Larwrence O'donnel on the Bohemian club.

    The Devil Of Little St. James: The True Jeffrey Epstein Story (Full Documentary 2017) https://www.youtube.com/watch?v=0WH406_rMIY

    Jeffrey Edward Epstein is a billionaire American financier and registered Level 3 sex offender. The Palm Beach Police Department investigated the cases of over 30 underage females who had been sexually abused and/or commercially exploited by Epstein for the purposes of sex trafficking. To this day Epstein has been convicted of a single count.

    TTB w/ @LizCrokin * The Hollywood Cesspool https://www.youtube.com/watch?v=fFWwKrJmoL0

    EXCLUSIVE Interview With Former Employee of Bohemian Grove https://www.youtube.com/watch?v=zsoNwUC-gLQ

    Bohemian Grove, the place where the richest and most powerful MEN in the world go to dress up as women and poo and pee all over each other. Those that go fervently deny its existence but today we have an EXCLUSIVE interview with someone who was there in 2007 to witness all the hi-jinks and lo-jinks.

    Updates for the week prior:

    Restored Republic via a GCR: Update as of March 12, 2019

    Restored Republic via a GCR: Update as of March 11, 2019

    Restored Republic via a GCR: Update as of March 10, 2019

    Restored Republic via a GCR: Update as of March 9, 2019

    Restored Republic via a GCR: Update as of March 8, 2019

    Restored Republic via a GCR: Update as of March 7, 2019

    Restored Republic via a GCR: Update as of March 6, 2019
    ______________________________________________________

    All articles, videos, and images posted on Dinar Chronicles were submitted by readers and/or handpicked by the site itself for informational and/or entertainment purposes.

    Dinar Chronicles is not a registered investment adviser, broker dealer, banker or currency dealer and as such, no information on the website should be construed as investment advice. We do not intend to and are not providing financial, legal, tax, political or any other advice to readers of this website.

    Copyright © 2019 Dinar Chronicles
              Why one group of young workers is particularly exploited      Cache   Translate Page      

    A report claims that at least half of Australia’s cohort of temporary migrant workers are being underpaid, with exploitation of international students and backpackers deemed "widespread" and "endemic".
              Otro mail que anexa fichero malware, esta vez con exploit.cve-2017-11882.      Cache   Translate Page      
    Se está recibiendo el siguiente mail malicioso:



    ________________



    Asunto: Facturación ALX.0269

    De: adminiistracon <adminiistracon@alxlogistica.com>

    Fecha: 12/03/2019 12:40

    Para: adminiistracion <administracon@alxlogistica.com>



    Buenas tardes,







    Estamos solicitando con la máxima urgencia el valor y el plazo de entrega de los siguientes materiales incluidos en el anexo



    Gracias



    Cristina Ramón Márquez - Dpto. Admon.







    Movil: +34 615.342.698







    adminstracion@alxlogistica.com





    ALX Logistica Integral del Transporte, s.l.





    Calle del Doctor J.J. Domine nº 6 2º pta. 12







    46011 Valencia - Spain-







    Descripción: Descripción: ALX_logo_01



    Fichero anexado Facturación ALX.0269.xlsx ---> FICHERO MALICIOSO CON EXPLOIT CVE-2017-11882







    ____________________





    El preanalisis de virustotal del fichero anexado ofrece el siguiente informe:

    https://www.virustotal.com/es/file/aa2d1184c673092746dc28a6b2fc8e43000cb8080e8d6674bdce3adf8d2697e1/analysis/1552391506/





    Es importante recalcar que los ficheros anexados a mails no solicitados no deben abrirse, y si como este es un .xlsx como páximo se puede abrir con word pad, por si solo fuera un fichero de texto, pero no con MICROSOFT OFFICE, para no activar el exploit que contendría si fuera realmente un fichero de Excel como en este caso.



    Esperando que lo indicado sea de su interés, reciban saludos





    ms, 12-3-2019
              Pinturault a bien exploité son dossard 1 pour se placer pour la gagne      Cache   Translate Page      
    "Parti en ouvreur, Alexis Pinturault a tiré profit de son dossard 1 pour signer une performance solide en 1re manche. Auteur du 2e temps, il n\u0027a que 27 centièmes de retard sur Henrik Kristoffersen avant le run final prévu à 14h30. Il possède 14 centièmes de marge sur Marcel Hirscher, qui doit essayer de battre le Français aujourd\u0027hui pour valider mathématiquement son gros globe."
              UAE ‘to tap Mideast shale,’ says energy minister      Cache   Translate Page      
    article author: 
    Author: 
    Frank Kane
    ID: 
    1552424972479007300
    Wed, 2019-03-13 00:10

    HOUSTON: The Middle East has great potential as a shale oil-producing area, according to the UAE Energy Minister Suhail Al-Mazrouei, who said the Emirates would inevitably produce shale at some stage.
    Speaking at the CERAWeek by IHS Markit energy forum in Houston, Texas, Al-Mazrouei said that the economics of the energy industry had changed following the boom in US shale production, and the UAE was looking at how it might exploit its resources.

    Main category: 
    Special
              Gestionnaire d'exploitation, services extérieurs - Bell Solutions Techniques - Québec City, QC      Cache   Translate Page      
    Expérience avec Internet haute vitesse, l’audiovisuel HD / 4K, la fibre optique et les réseaux à domicile considérée comme un atout (formation fournie à l... $60,000 - $65,000 a year
    From Indeed - Tue, 05 Feb 2019 12:52:54 GMT - View all Québec City, QC jobs
              Gestionnaire d'exploitation, services extérieurs - Bell Solutions Techniques - Laval, QC      Cache   Translate Page      
    Expérience avec Internet haute vitesse, l’audiovisuel HD / 4K, la fibre optique et les réseaux à domicile considérée comme un atout (formation fournie à l... $60,000 - $65,000 a year
    From Indeed - Tue, 05 Feb 2019 00:16:24 GMT - View all Laval, QC jobs
              https://supplementforhelp.com/keto-x-factor-diet/      Cache   Translate Page      
    https://supplementforhelp.com/keto-x-factor-diet/ Keto X factor exploit finished it, this problem is zilch less than a disease. It also leads to new issues in the body. One of these problems is build-up of monument in the embody. Monument is the salmagundi of fats and sterol. When it amassed in the vasculature, it starts to make problems equivalent limitation of execution motion and more somatesthesia on the ticker. When the organs is low push, it has to impact rigorous and that becomes the cause of hypertension. So, if you are wretchedness from fatness, you staleness be informed that it can promote to worsened problem that can seriously refer your eudaemonia. Both grouping are actually real eudaimonia intended but there jobs do not figure them much somatogenetic activity as a result of which, the become fat over second. To gear problems equal this, there are many supplements that know been prefab by antithetical wellness companies in the activity. These supplements are open easily online and in stores. To aid you knock out one saintly generic open7 and the health Read More about this:https://supplementforhelp.com/keto-x-factor-diet/ Beauty & Health, Ghaziabad
              Superviseur à l'exploitation, Bell Média - Bell - Winnipeg, MB      Cache   Translate Page      
    L’équipe Bell Média produit et diffuse le meilleur contenu canadien et étranger sur ses plateformes de médias numériques, de télévision, de radio et de...
    From Bell Canada - Tue, 12 Mar 2019 19:34:32 GMT - View all Winnipeg, MB jobs
              Chargé·e de mission - Business analyst - UCL - Université catholique de Louvain - Louvain-la-Neuve      Cache   Translate Page      
    Référence du poste : SF 23029 Publication interne et externe jusqu'au 17/03/2019 Pour le Service d'Exploitation des produits et services du système d...
    Van UCL - Université catholique de Louvain - Fri, 11 Jan 2019 13:29:46 GMT - Toon alle vacatures in Louvain-la-Neuve
              Gestionnaire d'exploitation - UCL - Université catholique de Louvain - Brussel      Cache   Translate Page      
    Référence du poste : SF 23201 Publication interne et externe jusqu'au 17/03/2019 Pour le Service de gestion technique du patrimoine de Woluwe (GTPW), de l...
    Van UCL - Université catholique de Louvain - Fri, 22 Feb 2019 18:16:43 GMT - Toon alle vacatures in Brussel
              Ligue des champions : Lyon en quête d'exploit, Liverpool à l'assaut du Bayern      Cache   Translate Page      
    L'OL mise sur son leader Nabil Fekir pour surprendre le Barça de Lionel Messi au Camp Nou, ce mercredi en 8e de finale retour de la Ligue des champions.
              Ligue des champions: Barcelone, plus qu'un défi pour Lyon      Cache   Translate Page      
    A Barcelone, c'est plus qu'un exploit que Lyon doit realiser pour se qualifier pour les quarts de la Ligue des champions, mercredi (21h00). Mais avec...
              Cosmetician PT - Pharmaprix - Saskatoon, SK      Cache   Translate Page      
    Lieu: 3014 Mcclocklin Road, Saskatoon, Saskatchewan, S7R 0J1 Joignez-vous à un magasin qui appartient à des intérêts locaux et est exploité par eux afin d...
    From Shoppers Drug Mart / Pharmaprix - Tue, 12 Mar 2019 15:35:13 GMT - View all Saskatoon, SK jobs
              Citrix Hack Exposes Customer Data      Cache   Translate Page      

    Citrix, a major network software company, had its internal network compromised by what appears to be an international hacking campaign. The company was alerted to the cyberattack by the FBI earlier this month. “While not confirmed, the FBI has advised that the hackers likely used a tactic known as password spraying, a technique that exploits […]

    The post Citrix Hack Exposes Customer Data appeared first on Adam Levin.


              Soudeur(euse) (Saisonniers) - ArcelorMittal Exploitation minière Canada s.e.n.c. - Fermont, QC      Cache   Translate Page      
    Installer, assembler et souder les pièces. Relevant du superviseur concerné, le soudeur accomplit tous les genres de travaux tels que soudure, brasure et... $38.44 an hour
    From ArcelorMittal Exploitation minière Canada s.e.n.c. - Tue, 15 Jan 2019 20:46:40 GMT - View all Fermont, QC jobs
              Phase Noise Cancelation Based on Polarization Modulation for Massive MIMO-OFDM Systems      Cache   Translate Page      
    In massive multiple-input multiple-output (MIMO) systems, phase noise introduced by oscillators can cause severe performance loss. It leads to common phase error and intercarrier interference in massive MIMO-OFDM uplink. To solve the issue, a novel phase noise cancelation scheme based on polarization modulation for the massive MIMO-OFDM system is proposed. We first introduce the polarization modulation (PM) exploited in massive MIMO-OFDM uplink. Then, by exploiting the zero-forcing detection, we analyze the asymptotically ICI and the distribution of the transformed noise under different XPD values. Furthermore, we demonstrate that phase noise can be asymptotically canceled and only the transformed additive white Gaussian noise exists as the number of antennas at the base station is very large. Moreover, we derive the instantaneous signal-to-noise ratio (SNR) on each subcarrier and analyze the ergodic capacity. To increase the ergodic capacity performance further, a joint modulation scheme combining the PM and 2PSK is proposed and the ergodic capacity performance of the joint modulation is discussed. The simulation results show that the proposed scheme can effectively mitigate phase noise and achieve a higher ergodic capacity.
              A Saudi Cybersecurity Company Tried to Buy Zero Day Exploits from Me      Cache   Translate Page      
    We recently got a rare look at how a company tried to source these exploits through private one-on-one deals—because the company came to us.
              Advanced Sales Skills and Techniques - Al Manal Training Center , United Arab Emirates, Abu Dhabi,Abu Dhabi       Cache   Translate Page      
    Powerful  social, market, economic and  technological factors are changing the world of business every day. Companies which use outdated approaches to customer relations and sales are bound to lose their competitive edge. Our course aims to equip you with skills which are relevant to today’s business environment and are proven to make managers and their teams successful. If you are a Corporate Sales professional, an Account Sales Representative, a Marketing and Sales Manager, a BDM or a member of  a Marketing and Sales support team this course will be especially beneficial for you.

    Course Curriculum:
    Overview of Sales
    The procedure of sales
    The Fear Factor in Sales
    Qualities of an excellent Sales Person
    The Correct Approach to Sales
    Sales Interrogative Skills
    Building Interest in your Consumer
    Building a Good Impression in Meetings
    Exploiting Efficiency in a Sales Role
    Essential Selling Skills
    Creating Gainful Relationships
    Advanced Enquiring Skills
    Listening Skills
    Creating Action Plans
    Writing Real Proposals
    Maintaining Consumer Expectations
    Creating Your Key Account Plan
    Interpretation the Flairs of Negotiators
    Inspiring Consumers to Purchase
    Personal Action Plan

    Course Objectives:
    Our Advanced Sales Skills training institute in Abu Dhabi will provide the following course objectives:
    Designate operational strategies for developing latest business prospects
    Integrate social media marketing top tactics to improve sales
    Use body language to create loyalty and relationship
    Plan a multimedia sales presentation
    Stun consumer sales doubts and close the deal

    Outcomes of Advanced Sales Skills training in Abu Dhabi:
    After finishing our course candidates will learn to:
    Understand client requirements by guiding a needs analysis
    Candidates will be capable of managing sales procedure by comprehending the sale source and continuing the momentum
    Contradict competitor prices, while staying professional
    You will be able to provide demonstrations that sell easily
    You can easily grip the goals professionally & successfully
    Candidates will lead highly operative closing methods
    You will be able to follow-up to create long-standing associations & forthcoming business
    Set objectives that encourage
    Also, our Advanced Sales Skills courses in Abu Dhabi will help you cope up with your sales database successfully

    Cost: 1500 AED

    Duration: 12 Hours


              20 Recommendations on how to protect yourself from mobile phone SIM Card swap fraud      Cache   Translate Page      

    What exactly is a “SIM-Swap” scam?

    Here is one definition: “SIM Swap fraud (also known as Port-Out scam or SIM splitting) is a type of account takeover fraud that generally targets a weakness in two-factor authentication & two-step verification, where the second factor or step is an SMS or a call placed to a mobile telephone. The fraud exploits a mobile phone operator’s ability to seamlessly port a telephone number to a new SIM destination. This feature is normally used where a customer has lost or had their phone stolen.”

    This type of fraud is not new. It has been with us for three years, but volume levels have been low. It appears that the specifics of this con game have been shared with the global community of organized crime, judging from the recent preponderance of articles in various jurisdictions about this type of crime. Victims, if they have the courage to report the crime, and 85% elect not to, based on present estimates, have witnessed their financial accounts, whether banking, trading, or crypto, suddenly drop to zero. Law enforcement officials now report a 60% increase from prior complaint levels.



    How does this type of fraud work?

    This process goes in several steps. The worst part of this fraud is that you may be targeted long before the actual crime takes place.

    ·         A fraudster obtains your bank account details and registers your mobile phone number through phishing or malware.
    ·         He approaches your mobile service provider with your fake identity proof and, claiming loss of handset or SIM damage, seeks a duplicate SIM card.
    ·          A SIM swap typically happens using the following methods: Using identity theft to convince a MNO shop assistant that they are dealing with the account holder; or by stealing passwords from employees at the mobile operators or mobile dealers. Bill pay cellular users’ SIM cards can be cloned through a helpdesk by answering personal verification questions such as a home address or work number. The situation is more complex for pre-paid customers where the personal verification questions focus on the latest recharges or last numbers called. By using a fake ID document and other fake documents a person can also do a SIM swap at a mobile dealer. If a fraudster gains access (through a stolen password) to a support agent’s account, or that of a mobile dealer assistant, the SIM swap process becomes easy.
    ·         The SIM swap is typically performed late at night to avoid detection by the victim. Some fraudsters are also encouraging the victim to switch off their cell phone by harassing them with multiple calls.
    ·         After the phone is switched off, they do the SIM swap without fear of detection. Some mobile operators send an SMS notification that a SIM swap has been requested. To avoid the SIM swap being stopped, the fraudsters either use the above method or call the victim masquerading as a mobile operator employee to tell them the SMS was sent by mistake and should be ignored.
    ·         Following verification, the original SIM is deactivated and a new one is issued to the fraudster.
    ·         He then initiates financial transactions from your bank account, details of which he had earlier stolen, and receives payment confirmation requests on the duplicate SIM. Since the original SIM has been deactivated, the real customer remains unaware of the fraudulent transactions being made on their account.



    As one security professional noted: “A high proportion of banking customers now have mobile phone numbers linked with their accounts, and so this attack is becoming common in some regions where this attack was not previously so common. Unlike mobile malware, SIM fraud attacks are usually aimed at profitable victims that have been specifically targeted through successful social engineering.”

    Andrew Blaich, a security researcher at Lookout, recently explained in an interview that, “Unlike mobile malware, SIM fraud attacks are usually aimed at profitable victims that have been specifically targeted through social engineering. It’s a way attackers are attempting to gain access to their target’s cell phone communications. There are many public cases of attackers social engineering their way through a cellular company’s representative to get a SIM card issued for an account the attacker doesn’t own or have access to. It appears to be easy to do as all you need is a willing and susceptible representative at any cellular phone store.”

    Mr. Blaich then added: “Once they’ve gained unfettered access to a victim’s phone number, criminals target bank accounts. Many banks will send you a code to log into an account or reset a password to a mobile phone via SMS, which means an attacker committing SIM fraud can request and receive the code and access your bank. Next, SIM fraudsters mask money withdrawals using a parallel system. They create a second bank account under the victim’s name (banks where the victim is already a customer have fewer security checks).”

    There have also been a rash of articles detailing how employees of local phone stores have facilitated the scams taking place. Organized crime has used this tactic in many instances around the globe to coerce staff at the low end of the payscale to pass along critical information. All manners of threats of physical harm are used to force compliance with the criminal endeavor.

    Can you protect from SIM-Swap scams?

    Due to the nature of this scam, it would be extremely difficult to detect it before it happened. What does happen, once the SIM is swapped, is that your phone literally dies — No messages or calls in or out. If your financial account holders have the capability, request alerts in the form of emails, if and when transfers or major withdrawals take place. Alerts to your phone will not work.

    Some banks and phone companies are already attacking the issue from a number of other perspectives, too: “There are multiple organizational and technical ways to combat SIM fraud — from introducing user alerting and additional checks for SIM reissuing to sharing knowledge of SIM swap activity between banks and phone companies. Banks can also consider looking for behavioral changes through behavioral analysis technology that can indicate a compromised device. It is possible to check whether your SIM card number and your international mobile subscriber identity (IMSI) are the same. If there is a discrepancy, your bank could contact you by email or landline to check.”



    What to do in the event you become a victim of a SIM swap scam?

    If you suspect you are the victim of a SIM swap scam, immediately call your mobile network operator for assistance. Be sure to call the right department. They may also have a form on their website for dealing with cases of fraud, which you can fill in, and they will assist you in an investigation of the matter.

    Also make sure to call the appropriate department at your bank, and suspend all activity on your bank account, essentially locking it, so that nobody is even able to log in to your online banking profile.

    If you are able to, you may consider accessing your online banking account, and changing your password, as well as changing your associated email address and mobile phone number, so the notifications and confirmation SMSes would arrive at a new number and email address. So even if the criminals succeed with the SIM swap operation, the number they have is no longer linked to your bank account. But I would more readily recommend that you just suspend activity on your account, especially in a panic situation or if you are unsure on how to go about doing all of that.

    If money ends up getting taken out of your account, then you need to open a case with the police for theft, preferably within 48 hours of the fraudulent transfer or withdrawal of funds having taken place. During this process you may receive documentation from your bank’s claims department, which will aid in the investigation.

    You might get your money back, and you might not. The banks claim that recourse depends on the circumstances of each case. In fact, some flat out refuse to reimburse a client, often claiming that it was the client’s fault – that they did something in order to help facilitate the theft. If you are fighting an uphill battle, it may be a good idea to get legal advice on the matter.



    Some recommendations

    1.       Make sure to become familiar with existing scams by reading appropriate blogs, forums, or articles in the newspaper, so when you see that email or SMS arrive in your inbox, you know it’s bogus.
    2.       The first warning signal can be your mobile network. If your phone is out of network continuously for a few hours, it’s an alert, and you should complain to the mobile network operator immediately.
    3.       Always make sure you have suitable anti-virus software installed and that your firewall is switched on.
    4.       Don’t ever reply to suspicious emails. Your bank would never ask you to enter any confidential information in to an email.
    5.       Don’t ever click through on links that may lead you to phishing websites – websites engineered to appear and operate like the official website. They may download a virus on to your PC, just by visiting them, which could serve as another means of obtaining your banking account password(s).
    6.       Use your common sense. If you receive an email claiming to be from your bank, ask yourself if this is the same email address associated with your online banking account.
    7.       Don’t use publicly visible email addresses for banking. Use a secure, private email address that nobody but you and your bank knows.
    8.       Always visit the official website of you bank by typing in the address. Bookmarking the website isn't safe because there are forms of malware that could tamper with bookmarks so that they redirect you to phishing websites.
    9.       Only ever try to log in to your online banking profile via the official website. There are ways to make sure that it’s the official website – not only by looking at the URL, but by checking the security certificate, which usually appears in the form of a padlock in your browser. You could even look up the website on a database, which would confirm whether the website is safe or not.
    10.   Never disclose your Internet banking password or personal identification number (PIN) to anyone. Even your bank will never ask for this.
    11.   Check your banking statements regularly for strange or unusual activity.
    12.   Change your online banking passwords frequently. I would suggest at least once every 3 months. And make sure it’s a strong password too.
    13.   Don’t answer calls or reply to SMSes from numbers you are not familiar with.
    14.   The 20 digits SIM number on the back of your SIM card is top secret, and never share it with anyone.
    15.   Even though it may be tempting to put your phone on silent or switch it off when multiple calls come through, it may not be the best idea, as this is exactly what the criminal may want you to do so that you don’t notice anything strange going on with your phone.
    16.   Take note of the number the call or SMS came from. You can then look up this number on Google, or even contact your mobile network operator and check with them for more information if you receive a suspicious call or SMS.
    17.   Consider joining a bank that gives you better security when it comes to banking, especially with online and cellphone banking. Some banks are known for not being secure with the features they provide. The same could be said for some cellular networks.
    18.   If the bank only offers 2-step verification security that relies on using a mobile phone to access your account, then check whether or not you can set a backup number, or an email address where you can at least receive notifications at.
    19.   Major carriers in the U.S. offer security that can help protect against SIM card swapping. Use it to secure your account:
    a.       AT&T has “extra security,” a feature that requires you provide a passcode for any online or phone interactions with an AT&T customer representative. You can turn it on by logging into AT&T’s web dashboard or the myAT&T app.
    b.       Sprint asks customers to set a PIN and security questions when they establish service.
    c.       T-Mobile lets subscribers create a “care password,” which it’ll require when they contact T-Mobile customer service by phone. You can set one up by visiting a T-Mobile store or by calling customer care.
    d.       Verizon allows customers to set an account PIN, which they can do by editing their profile in their online account, calling customer service, or visiting a Verizon store.



    Sources and Additional Information:



              What to do if you got threatened by Sextortion?      Cache   Translate Page      

    Today, I have learnt a new English Word – Sextortion. Not that the issue was not seem before in the Internet Universe (the term has been introduced about 70 years ago), but just today coincidentally, several of my real and virtual friends reported their exposure to the new kind of scam.



    What is Sextortion?

    Based on Wikipedia, Sextortion is a form of sexual exploitation that employs non-physical forms of coercion to extort sexual favors from the victim. Sextortion refers to the broad category of sexual exploitation in which abuse of power is the means of coercion, as well as to the category of sexual exploitation in which threatened release of sexual images or information is the means of coercion.

    Sextortion also refers to a form of blackmail in which sexual information or images are used to extort sexual favors from the victim. Social media and text messages are often the source of the sexual material and the threatened means of sharing it with others. An example of this type of sextortion is where people are extorted with a nude image of themselves they shared on the Internet through sexting. They are later coerced into performing sexual acts with the person doing the extorting or are coerced into posing or performing sexually on camera, thus producing hardcore pornography.

    Difference…

    … yes, there is a difference between the classical scheme, and the one used to all as a scam. The scammers do not need any sexual favors. They need money, plain and simple.

    And online scammers have been even more innovating of late. In the last month, one group of ne’er-do-wells has sent out spam emails telling recipients they’ve been caught watching porn through their webcam, and if they don’t pay, all their dirty laundry will be aired in public. That’s not new. But putting a novel twist on that scam, the crooks are sending through passwords they claim to have stolen as proof they have been spying on the victim. So far, more than 150 people have coughed up $250,000 in Bitcoin for fear of their private Web browsing habits being exposed.



    Examples

    Example 1

    I am aware one of your passphrase: password. Lets get directly to point. Not a single person has compensated me to investigate about you. You do not know me and you are probably wondering why you're getting this e mail?actually, I actually installed a software on the adult vids (sex sites) site and you know what, you visited this web site to have fun (you know what I mean). When you were viewing videos, your internet browser initiated working as a Remote control Desktop that has a key logger which provided me access to your display screen and also web cam. Right after that, my software program collected your complete contacts from your Messenger, FB, and email . After that I created a double-screen video. 1st part shows the video you were viewing (you've got a good taste haha . . .), and 2nd part shows the view of your webcam, and its u.
    You do have only 2 alternatives. We are going to understand these types of choices in aspects:
    1st solution is to disregard this message. In this case, I am going to send your actual video clip to just about all of your contacts and thus you can easily imagine about the disgrace you feel. Not to mention should you be in a relationship, just how it will eventually affect?
    Number two choice will be to pay me $3000. We will think of it as a donation. As a consequence, I most certainly will without delay eliminate your videotape. You will keep going on your daily life like this never happened and you will not hear back again from me.
    You'll make the payment through Bitcoin (if you do not know this, search for "how to buy bitcoin" in Google).

    Example 2

    Hi, victim. I write yo