Thursday, June 26, 2014

Photos of Lady Gaga encourages Brazil bold way!

Save on your hotel -

Published international star Lady Gaga pictures have encouraged the team favorite Brazil in the 2014 World Cup where a large bolder. It has emerged Lady Gaga on her balcony where hung a banner saying 'I love that Rio de Janeiro' and I wore only shirt Brazil. Lady Gaga stood in front of reporters who had gathered under the porch and accepted the slogan Brazil, referring to encourage full.

Syrian actress Susie Salman dissociation Life published a post after a few minutes

Save on your hotel -

In the incident surprised the artistic and social Syrian, died young Syrian actress Susie Salman life after less than 5 minutes from the last written a post on the front page on Facebook. The late Susie Salman moved to the higher ranks as a result of a mortar shell landed on her house in the city of Damascus. The last blog post, which died after life where Salman said Susie: 'Lord, you remember God Struck few minutes ago I do not know why .. shell landed in front of my house, Lord Stark'. She had started a little earlier: '* In the name of God the Merciful * Did you explain to your chest and put you and Zrk which destroy your back and you mentioned you raised the ease with hardship that the ease with hardship if Farragut Vansb and Fargb to the Lord Almighty God'. God bless the young actress Susie Salman and inspired her family and her fans patience and fortitude.

Image of Tom Cruise and David Beckham meet in London in order to match

Save on your hotel -

In one of the bars on the outskirts of the city of London, the British director was surprised shop called The Cow Lisa Fred a couple of football fans came to attend a match. Source amazed they were not two people, but I was surprised by the presence of ordinary star Tom Cruise, David Beckham, accompanied by two sitting Ihtsaan they continue to drink and a soccer match of the World Cup. Lisa did not restrain itself from capturing a picture of David Beckham with Tom Cruise without Antbha and published on the front page of the application of images Anstjeram.

Monday, June 23, 2014

BNP Paribas near record $9bn settlement for violating US sanctions

Save on your hotel -

France’s biggest bank has reportedly agreed an $8-9 billion settlement with US prosecutors over hiding $30 billion in money transfers to countries on the US sanctions blacklist. The fine against BNP Paribas could be a record for this type of violation. In the proposed settlement, BNP Paribas will plead guilty to criminal charges in early July, The Wall Street Journal reports, citing a source close to the matter. After admitting violating the International Economic Powers Act, the bank will temporarily be banned from doing deals in US dollars. France has warned this could have a negative effect on the stability of the euro zone. The US Department of Justice is negotiating with BNP Paribas over the infractions, and the penalty could be the biggest of its kind. French President Francois Hollande said the fines are ‘unfair’ and ‘disproportionate’. In 2012, the US fined HSBC $1.9 billion over similar US sanctions violations, and Credit Suisse pled guilty to concealing sanctions data and paid $2.6 billion in fines. After examining over $100 billion of transactions, US authorities found that $30 billion were illegally conducted with Iran, Cuba, and Sudan as they are countries sanctioned by the US. The infraction will force the company to reshuffle its US-based management, according to several sources. The Wall Street Journal reports 30 bank employees have already left, or will soon exit, the company. First set at $3 billion, the penalty later was rumored to have reached $16 billion before the latest $8-9 billion figure. The largest fine on record for a bank is the $13 billion JPMorgan Chase & Co paid out for pre-crisis mortgage frauds. BNP Paribas has only set aside over $1 billion to pay out any potential fines, and a fine between $8-9 billion could nearly wipe out the company’s entire pre-tax earnings of $11.2 billion.

​2 tonnes of heroin recovered in Europe’s ‘largest ever’ seizure

Save on your hotel -

More than two tonnes of heroin has been recovered from Greek warehouses over the past fortnight in an operation considered by authorities to be Europe’s largest ever seizure of the drug. Exactly 986.6 kg of the drug was recovered from storage units near Athens on Friday, reported AFP. The size of the stash added to a recently-set record of 1.113 tonnes of heroin which was also seized near Athens on the night of June 12. On June 13th, Merchant Marine Minister Miltiadis Varvitsiotis proclaimed it to be Europe’s largest ever seizure. The combined discoveries comprised “the largest amount of heroin ever seized in Europe,” said Varvitsioti on Sunday. Friday’s heroin had been shipped to Greece by a tanker – ‘Noorl’ – from Togo, West Africa. It allegedly belongs to a Greek company, the name of which has not been publicly stated. Fourteen people were arrested in the incident, among them 10 crew members, in Koropi, some 40 km from the capital. Five Turkish people and the Greek company head were among those detained. The drug was intended to be taken by truck from Greece to markets around Europe.

Magnetizing: ESA sats grab Earth’s ever-changing magnetic field (VIDEO)

Save on your hotel -
Screenshot from
The European Space Agency’s (ESA) Swarm space mission has begun mapping one of the most mysterious aspects of our planet: Earth’s magnetic field.
Screenshot from

This animation shows changes in Earth’s magnetic field from January to June 2014 as measured by the ESA’s Swarm trio of satellites. The satellites, launched in November, are equipped with several instruments, including cutting edge magnetometers that measure field strength and direction.
The data collected by the Swarm satellites will help scientists better grasp how our magnetic field works, how it is affected by solar activity, and why large tracts of it is weakening.
The ESA says field can be thought of as a huge bubble, protecting us from cosmic radiation and charged particles that bombard Earth in ‘solar winds’.
Without it, those particles would hammer away at the atmosphere, leaving Earth much like Mars.
The North Pole is also moving, a fact which has been known for over a century, though with swarm, direction and fluctuations can be accurately measured.
Currently, the north end is slowly creeping across the Arctic Ocean toward Siberia. The first high-definition measurements from Swarm have also shown what appear to be weakening regions within the core-generated magnetic field over the western hemisphere, while parts of the southern Indian Ocean show strengthening fields.
The agency says the field is particularly weak over the South Atlantic Ocean – known as the South Atlantic Anomaly. Many glitches or ‘hiccups’ are caused by this anomaly, as satellites are exposed to strong radiation over this area.
Many experts believe this weakening heralds the earth’s magnetic fields reversal, where the north becomes south and south becomes north. This process usually takes several hundred thousand years to complete.
All of the observed changes are based on the magnetic signals which originate in the Earth’s core. Over the coming months, scientists will analyze the data to better understand the magnetic contributions from other sources, namely the mantle, crust, oceans, ionosphere and magnetosphere.
“These initial results demonstrate the excellent performance of Swarm,” said Rune Floberghagen, ESA’s Swarm Mission Manager.
“With unprecedented resolution, the data also exhibit Swarm’s capability to map fine-scale features of the magnetic field.”
Apart from understanding out world better, scientists believe measurements obtained by Swarm will have a number of real world applications, including improving the accuracy of navigation systems, advanced earthquake prediction and better efficiency in drilling for natural resources.

‘Double standards’: Apple implements MAC anti-tracking technique used by Aaron Swartz

Save on your hotel -

Apple is going to implement random MAC addresses technology in its iOS8 devices, an anonymity-granting technique which late computer prodigy Aaron Swartz was accused of using to carry out his infamous MIT hack. Swartz, who faced criminal prosecution on charges of mass downloading academic documents and articles, was also accused of using MAC (Media Access Control) spoofing address technology to gain access to MIT’s subscription database. At the time of his suicide at the age 26, Swartz was facing up to 35 years in prison, the confiscation of assets and a $1 million fine on various charges. Aaron Swartz (Reuters / Noah Berger)Aaron Swartz (Reuters / Noah Berger) Now computer giant Apple is installing a MAC address randomizing system into its products. The company announced that in its new iOS 8, Wi-Fi scanning behavior will be “changed to use random, locally administered MAC addresses.” MAC-address is a unique identifier used by network adapters to identify themselves on a network, and changing it could be regarded as an anti-tracking measure. David Seaman, journalist and podcast host of “The DL Show,” told RT that a single technology cannot protect users from being spied upon and advised users to trust no one, particularly the companies that have been caught cooperating with agencies such as the NSA, or those who used to turn a blind eye toward governments’ illegal activities. RT: Why is Apple suddenly becoming interested in boosting the privacy protection of its devices by spoofing MAC-addresses? David Seaman: That’s one of the techniques that Apple has adopted to spoof these MAC-addresses and it’s just another step to make smart phones and other devices, other mobile devices a bit more secure. Of course you have to keep in mind that a smart phone is to begin with not all that secure, because there are so many different application developers, as well as the fact that you have to rely on whatever cell phone company is providing you with a signal. So this definitely doesn’t make phones completely secure, but I think it’s a step in the right direction. RT: Some argue that Apple’s attempt to protect the privacy of its users is pretty much useless because there are many ways to see where the device is. Do you agree that what they are trying to give us is perhaps not really the full picture? DS: There are a number of other hardware identifiers, aside from the MAC-address that your cell phone is still emitting, and which, using cell towers, they can still find your exact location. So this definitely doesn’t restore total privacy to the user, it’s just one band aid. And I think if you’re injured, you should use as many band aids as possible. But there’s also a larger thing here which is that governments are spying on us and these cell phones are not designed to be all that secure from day one. And there are a number of private companies that, I wouldn’t say spying, but eavesdropping on what you’re doing to make money out of you. And this is a growing problem as we spend more and more of our lives online and on our phones and we expect these things to be secure. Reuters / Lucas JacksonReuters / Lucas Jackson RT: Why is Apple doing this? Are they really concerned about the privacy issue? DS: I think any time a tech company implements things that make us safer, even if it’s not a complete solution, that’s again a step in the right direction. I’d like to see a lot more done. I’d like to see end-to-end encryption of pretty much everything that people do online and I think we’re headed in that direction anyway. But knowing what we know now, that’s like the bare minimum. RT: Aaron Swartz was accused of spoofing Mac-addresses as the US court said it was a criminal act. Why this change? Why can Apple do this legally and Swartz was not allowed to do that? DS: It’s interesting you’ve brought that up. Clearly, there is a double standard out there. If you are a large tech company, the government will turn the other way. Which by the way this is not anything illegal, spoofing MAC-addresses. It is something that has been done by a number of people. But Apple does it, of course they are not going to prison. But Aaron Swartz, one of the things they used against him was spoofing MAC-addresses apparently. And this just goes to show you that there are people within this government who use some of these outdated laws and use an incomplete understanding of Internet technology to pretty much go after whoever they don’t like and make that person’s life a lot more difficult with hard-to-fight charges. I mean these are people who, in some cases, some of the prosecutors, even some of the members of the Supreme Court, as it came recently, don’t understand basic internet technology. I believe it was the IFF (Identification Friend or Foe technology) that pointed out some of the Supreme Court’s blindness when it comes to things that the rest of us have known for the last decade or more; they are still grappling with the basics of the internet. So I think definitely there is a double standard but I would not expect Apple to face any kind of scrutiny for doing this. Reuters / Pawel KopczynskiReuters / Pawel Kopczynski RT: Are the other makers of cell phones likely to follow in Apple’s footsteps to protect people’s privacy? DS: Sure, I believe that privacy is becoming more and more of a selling point post-Edward Snowden. Now everybody in the US and certainly people in other countries are concerned about their data being slurped up either by the NSA, or the GCHQ, or a number of other agencies, and then sitting on a server somewhere. So I think security and privacy are coming back into fashion and you are going to see a number of offerings, many of them a lot more advanced than this MAC-address thing. This is just the beginning. RT: In terms of consumers, what do we do? What should we be looking out for in order to protect us better? DS: A great question. The first thing you can do is to make sure that your e-mail is secure. There are a number of secure e-mail services you can look into using. You can look into encrypting your email using something like PGP. These things sound complicated, but they are really extremely easy to use. If you just google “secure email account” or “encrypted email,” you can start to read about it and get yourself on the road to at least communicating online in a safer way and just make things a little bit more difficult for those who are trying to spy on us. RT: Do you think that technology is sort of taking away human relations that rely on it, with all the privacy issues we have to deal with? Is it helping us or hurting us even more? DS: I think, on the whole, that technology has done a tremendous amount of good and the great thing about technology is once something new is out there – it cannot be un-invented, we cannot go back in time. Is the internet or a smart phone good? I tend to believe that the answer is yes.
David Seaman (Screenshot from RT video)David Seaman (Screenshot from RT video) It’s giving us access to news and information at all times. Now everybody has what is basically an HD camera in their pocket. So if they see police brutality or anything else that’s crazy, they can record it and send to a news network or post it on YouTube. And before you know, the whole world knows about it. So it has been a lot harder for the governments, criminals and all kinds of people to keep their secrets. The downside of that is that it exposes all of us to data theft and things like that. Again, I think that technology is getting better in this area. It’s something most of us were not even focused on until the NSA revelations. So now that we know it is a problem, companies are going to try to make money off of providing a solution for us. And you also see a growth of social media, which really was responsible for the Arab Spring. You see the growth of digital currencies, which might be able to push out some of the governments’ influence over our economies. So definitely, I think that technology on the whole is providing us with a lot more freedom and information. RT: Can we trust these tech companies that are trying to sell us privacy protection? Or will the information continue to slip out to end up in places like the NSA? DS: At this point we cannot trust anyone, especially not these companies who for years were essentially cooperating with the NSA or were at least oblivious to what they were doing. I would say don’t trust anybody, especially within the security field. If you look into an open source technology – that’s maybe your best bet, because it’s being reviewed by a number of experts around the world, whereas a company that just releases some product, you cannot necessarily review its code and see exactly how it is working under the hood.

Sunday, June 22, 2014

HRW: IDF threatened Palestinian whose camera captured teen killings, confiscated footage

Save on your hotel -
Palestinians attend the funeral procession of Palestinian youths Nadeem Nuwarah, and and Mohammed Udeh a day after they were shot dead by Israeli forces during clashes outside the Israeli-run Ofer prison following a protest to mark "Nakba" or "catastrophe" of the Jewish state's creation, in Bir Zeit near the West Bank city of Ramallah on May 16, 2014 (AFP Photo / Thomas Coex)
Palestinians attend the funeral procession of Palestinian youths Nadeem Nuwarah, and and Mohammed Udeh a day after they were shot dead by Israeli forces during clashes outside the Israeli-run Ofer prison following a protest to mark "Nakba" or "catastrophe" of the Jewish state's creation, in Bir Zeit near the West Bank city of Ramallah on May 16, 2014 (AFP Photo / Thomas Coex)
“We will squish you like a bug,” the IDF told a Palestinian whose video showed Israeli soldiers shooting two teenagers. The man was stripped of his ID, interrogated, threatened and ordered to remove his security cameras in 24 hours, HRW reported.
“Israeli military officers berated Fakher Zayed, 47, for sharing the security videos with human rights groups, claimed he had lied and fabricated evidence, and threatened to bring unspecified legal actions against him if he did not remove the security cameras,” the human rights organization stated in a press release.
Zayed claimed that on June 17, four Israeli military vehicles with two dozen soldiers came to his carpentry shop in Beitunia, a town near the West Bank’s de facto capital of Ramallah.
Then, an eyewitness, who was in the shop while Zayed delivered goods, stated that an Israeli officer told him, “If (Zayed) is not here in five minutes, we are going to burn this carpentry shop down.”
When Zayed arrived, his ID was confiscated and he was taken for questioning to Ofer, an Israeli military prison, according to Human Rights Watch.
“They told me that the video I gave to the press was fabricated, that everything I said and all my testimonies are a lie, that this is a serious violation of the law, and that I made the [Israeli army] look bad and caused a lot of problems,” Zayed said.
“They told me the cameras need to be brought down within 24 hours,” Zayed added.
“There were so many threats… One of them said, “We will squish you like a bug, you are nothing.”
Israel's military have so far declined to comment on the claims.
On May 15, Israeli security forces shot and killed 17-year-old Nadeem Nuwarah and 16-year-old Mahammad Salameh during a protest. Security footage does not indicate that any of the boys presented a threat to the police.
A May 15, 2014 combo shows Palestinian youths Mohammed Udeh, 16, (top), and Nadeem Nuwarah, 17, lying on the ground after they were shot by Israeli forces during clashes following a protest outside the Israeli-run Ofer prison in the Palestinian village of Betunia in the occupied West Bank marking "Nakba" or "catastrophe" of the Jewish state's creation (AFP Photo / Abbas Momani)
A May 15, 2014 combo shows Palestinian youths Mohammed Udeh, 16, (top), and Nadeem Nuwarah, 17, lying on the ground after they were shot by Israeli forces during clashes following a protest outside the Israeli-run Ofer prison in the Palestinian village of Betunia in the occupied West Bank marking "Nakba" or "catastrophe" of the Jewish state's creation (AFP Photo / Abbas Momani)

Following international media coverage of the incident, a Palestinian autopsy confirmed that live ammunition was used at the protest. However, the Israeli authorities refused to take any responsibility for the killings.
Several investigations demonstrated that the deadly wounds were caused by live fire.
According to Haaretz sources, Nuwarah’s body was in good condition and both entry and exit wounds were easily identifiable.
The attack was termed a “war crime” by Human Rights Watch.

Saturday, June 21, 2014

NSA Playset: Hackers invited to become digital James Bonds

Save on your hotel -

The grandeur of the NSA’s global surveillance has enlightened ambitious hackers to create data mining gadgets just as good as the original brand. Their NSA Playset website contains valuable ideas to help a Handyhands Vulgaris become a Spyus Supremus.
The NSA’s unprecedented eavesdropping capabilities have been reached through a combination of monstrous internet data interception centers and installation of specially designed gadget and bugs in the right places. But are they really that special? After last year Germany’s Der Spiegel published a 48-page catalog of gadgets used by the NSA back in 2008, a group of hackers led by security researcher Dean Pierce decided to make an attempt to reconstruct these NSA spying gadgets using open-source hardware. A group of electronic enthusiasts dubbed the project “NSA Playset”. What they try to do is not just construction of devices for 007’s arsenal, but rather to protect the public from constant eavesdropping. Welcome to the home of the NSA Playset. In the coming months and beyond, we will release a series of dead simple, easy to use tools to enable the next generation of security researchers. We, the security community have learned a lot in the past couple decades, yet the general public is still ill equipped to deal with real threats that face them every day, and ill informed as to what is possible. Inspired by the NSA ANT catalog, we hope the NSA Playset will make cutting edge security tools more accessible, easier to understand, and harder to forget. Now you can play along with the NSA! “To someone who is not an expert in the field, the capabilities in the catalog might seem far-fetched or ultra-high tech,” a participant of the NSA Playset project, Michael Ossmann, told Mashable. “What we want to show is that these capabilities are very much achievable and practical. And by pointing out how easy they are to achieve, we hope that we can raise awareness of security threats in our computer system.” Very soon the hackers found out that the devil is not as black as he is painted and NSA tools are quite ordinary, though sophisticated, electronics and therefore could be reproduced. “There's nothing really unique in what the NSA is doing, they just have the dollars to make more sophisticated equipment,” another NSA Playset project member, Josh Datko, also known as the founder of Cryptotronix, an open source hardware company, told Mashable. “It's kind of surprisingly easy to recreate them,” he said. The group is trying to make their own versions of bugs that should be physically implanted into a desired computer to intercept signal and send it by air to spy’s receiver or give him a possibility to directly connect to computer’s memory using mobile platforms. In August, the NSA Playset enthusiasts are planning to showcase and discuss their creations with other security researchers at the Def Con hacking conference in Las Vegas. Any researchers interested in collaboration with the NSA Playset are welcomed.

‘Take it to the Moon’: NASA plans to grab asteroid that just whizzed past Earth

Save on your hotel -

NASA is set to capture an asteroid, haul it near the moon and have astronauts visit. The prime candidate is now in sight: a small asteroid “the size of a delivery truck” that whizzed about 7,600 miles above Earth in 2011.
WATCH: Stunning Hubble time-lapse of stellar explosion “We might be able to put this asteroid in a garage,” Northern Arizona University astronomer Michael Mommert, who studied the rock, told AP. The asteroid is called 2011 MD. The plan is to capture it with a giant claw or a giant inflatable bag, and the “truck” asteroid would be “parked” above the moon, ready for the astronauts to explore. The second option being considered by NASA is sending a spacecraft to a much bigger asteroid, taking a boulder and bringing it to the moon for exploration. The decision between the two options is set to be made by the end of the year, Michele Gates, program director for the asteroid mission, told AP. There are currently three candidates for each option, and NASA isn’t obliged to choose the final target until a year before the launch, with the latter planned for 2019. Thursday’s press conference focused on 2011 MD due to the fact that it was examined by telescopes on Earth and the Spitzer Space Telescope three years ago. The observations demonstrated that it weighed around 100 tons, but is quite porous, with about two-thirds of empty space inside. The robotic cost of the mission would be about $1.2 billion, Gates said. However, there is no exact estimate of the astronaut part, which is set to include a giant rocket. Eventually, it is scheduled that 10 asteroids would be captured by the early 2020s, not all of them tiny.

N. Zealand 'reintegrated' into Five Eyes global spy network after 2-decade absence

Save on your hotel -

New Zealand was welcomed back to the Five Eyes network after a two-decade absence in 2009, it has been revealed. The spy organization has been criticized for intercepting massive amounts of data about ordinary people and keeping tabs on governments. READ MORE: New Zealand has direct access to US surveillance The office of the US Director of National Intelligence (DNI) confirmed that New Zealand had been absent from the spy alliance for two decades, although it refrained from explaining the reason for its break from the Five Eyes. During New Zealander Prime Minister John Key’s visit to New York, DNI spokesman Brian Hale told Fairfax news agency that the “reintegration” happened in 2009 as it was believed it was "in the best interest of their nation and their group. The Five Eyes network was formed during WWII and includes the UK, US, Australia, Canada and New Zealand. As part of the alliance, the Five Eyes shared intelligence gathered by their spy agencies to monitor the Soviet Union and Eastern bloc. However, leaked documents by spy-turned-whistleblower Edward Snowden revealed the alliance’s mass indiscriminate monitoring of civilian communications across the globe. Snowden described the Five Eyes as an artifact of the post-WW2 era that has turned into “a supranational intelligence organization that doesn't answer to the laws of its own countries.”
When asked by press about New Zealand’s reintegration into the Five Eyes in 2009, Key said he was unaware of any such changes. "I don't think that's right, but I remember there were some vague things,” he told Fairfax. "My understanding of it is that even through the challenging times of the relationship post the anti-nuclear legislation, New Zealand continued to be an active member of Five Eyes." Snowden’s spy revelations triggered widespread skepticism of the New Zealand government’s collaboration with the US. A recent poll carried out by showed that over 70 percent of New Zealanders believes the US was gathering information on them. In addition, over 60 percent of people asked do not believe the US should have the right to do so. READ MORE: Kim Dotcom’s new IP address…Internet Party, that is Key has dismissed the survey’s findings, arguing that "if a New Zealander was training with a terrorist group in a foreign environment” then most New Zealanders would support surveillance. Last year parliament expanded the powers of New Zealander spy agency the Government Communications Security Bureau (GCSB), allowing it to support the New Zealand police, Defense Force and the Security Intelligence Service. The move proved very unpopular among New Zealanders, with elements of the opposition calling it a “death knell” for privacy rights. Key attributed the public alarm to “conspiracy” and “misinformation” orchestrated by the opposition and insisted the amendment was necessary to protect the country from multiple cyber-threats.


We're Here for You

Save on your hotel -