Author: Admin

<div class=Author Amy Scobee recounts abuse as Scientology executive
" />

Author Amy Scobee recounts abuse as Scientology executive

Monday, October 11, 2010

Wikinews interviewed author Amy Scobee about her book Scientology – Abuse at the Top, and asked her about her experiences working as an executive within the organization. Scobee joined the organization at age 14, and worked at Scientology’s international management headquarters for several years before leaving in 2005. She served as a Scientology executive in multiple high-ranking positions, working out of the international headquarters of Scientology known as “Gold Base”, located in Gilman Hot Springs near Hemet, California.

Retrieved from “https://en.wikinews.org/w/index.php?title=Author_Amy_Scobee_recounts_abuse_as_Scientology_executive&oldid=4579695”
Posted in Uncategorized
<div class=Ransomware attack hits over 200 US companies, forces Swedish grocery chain to close
" />

Ransomware attack hits over 200 US companies, forces Swedish grocery chain to close

Monday, July 5, 2021

On Friday, a ransomware attack which initially targeted software company Kaseya spread to over 200 companies in the US through Kaseya’s network management software. Huntress Labs, a cybersecurity company, alleged the attack was carried out by REvil, a Russia-based ransomware group. Kaseya told its customers to stop using its services when it learned of the attack.

According to NBC News, the ransomware first spread to about 40 of Kaseya’s customers, which are mainly companies that manage Internet services for their customers, some of which manage them for thousands of companies. John Hammond, a security researcher at Huntress Labs, said that “It’s reasonable to think this could potentially be impacting thousands of small businesses”. Kaseya notified its customers of the attack on Friday afternoon and warned them to stop using its services immediately.

Business Insider reported REvil is a Russian-based organization which provides ransomware-as-a-service. BleepingComputer reported receiving a sample of the ransomware used in REvil’s attacks and says that they demand USD five million for the ransomed files to be decrypted, though it is unknown if every victim received a demand for that same amount. Fabian Wosar, Chief Technical Offier (CTO) at the Emsisoft security firm, said affected customers had received demands for USD 44,999.

Swedish grocery chain Coop was also affected by the attack, and had to close all 800 of its stores because its checkout tills could not process payments due to the ransomware. Speaking to Swedish Television, Therese Knapp, a Coop spokesperson, said “We have been troubleshooting and restoring all night, but have communicated that we will need to keep the stores closed today”. Swedish company Visma Esscom, which manages servers for businesses, was using Kaseya software, according to Reuters. Railway services in Sweden were also disrupted.

On Saturday, US President Joe Biden directed intelligence agencies to investigate who was behind the attack. He said that “we’re not certain” who is behind the attack, adding “[t]he initial thinking was it was not the Russian government but we’re not sure yet”. The US Cybersecurity and Infrastructure Security Agency stated that it is “taking action to understand and address the recent supply-chain ransomware attack”.

Retrieved from “https://en.wikinews.org/w/index.php?title=Ransomware_attack_hits_over_200_US_companies,_forces_Swedish_grocery_chain_to_close&oldid=4629137”
Posted in Uncategorized
Types Of Online Bets

Types Of Online Bets

Betting Online may be the word today, butnot everyone is acquainted with all the keywords and the type of bets one canplace online. Online Betting is done through Sportsbooks (US) or Bookmakers(UK) sites that accept bets. You can bet on the outcome of several sportingevents, such as; Baseball, Basketball, Football, Tennis, Hockey, Snooker andSoccer games. To start with you need to state what you are betting on by makinga selection, the type of bet and the amount you are wagering. Differentbookmakers offer different betting varieties and combinations. Some commontypes of bets which any avid player must be aware of are: Straight bet or SingleThis is the simplest and most common bet. You bet on a winner at given odds.Point SpreadThe Point Spread is the number of pointsallocated and is shown with a + sign for the favorite and a – sign for theunderdog. The favorite has to win by more than the Point Spread for you to win,otherwise you lose your bet even if the team wins.

The Money LineThe money line establishes the odds for each team and is indicated by a + forthe underdog and a – sign for the favorite.

TotalA bet for the number of points scored in the game by both teams combined,including points scored in overtime.Over/UnderA bet that the combined number of points scored by the two teams in the gamewill be Over or Under the total set by the oddsmaker.Parlay or AccumulatorThis is an example of a multiple bet. It lets you make simultaneous selectionson two or more games with the intent of pressing the winnings of the first winon the bet of the following game selected, and so on. All the selections mademust win for you to win the parlay. A parlay bet can yield huge dividends ifwon.TeaserIt is like a parlay, but with the option to add or subtract points (called’moving the line’) from one or more Spread bets. When betting a teaseradditional points are either added to the underdog or subtracted from thefavorite. However, teasers odds are usually worse than the parlays.If-wager and Open-wagerIf-wager allows the bettor to make a second wager, up to an equal amount, pendinga win on the first selection, where as open wagers allow the bettor to playteasers or parlays making a selection at different times and even differentdays.FutureThis is a bet on a future event. At the start of each season, the sportsbooksgive out odds for teams to win a certain championship. The odds change as thegame date approaches and in most cases get shorter, but if you win you get paidat the original odds that you took. This is possibly one of the most profitablebets if you are the one confident about your knowledge of the sports and theplayers you are betting on.Exotic BetsSometimes, betting is allowed on a wide variety of other sports related eventsand activities or just about anything you can think of.

<div class=Canada’s Beaches—East York (Ward 32) city council candidates speak
" />

Canada’s Beaches—East York (Ward 32) city council candidates speak

This exclusive interview features first-hand journalism by a Wikinews reporter. See the collaboration page for more details.

Friday, November 3, 2006

On November 13, Torontonians will be heading to the polls to vote for their ward’s councillor and for mayor. Among Toronto’s ridings is Beaches—East York (Ward 32). Four candidates responded to Wikinews’ requests for an interview. This ward’s candidates include Donna Braniff, Alan Burke, Sandra Bussin (incumbent), William Gallos, John Greer, John Lewis, Erica Maier, Luca Mele, and Matt Williams.

For more information on the election, read Toronto municipal election, 2006.

Retrieved from “https://en.wikinews.org/w/index.php?title=Canada%27s_Beaches—East_York_(Ward_32)_city_council_candidates_speak&oldid=2584822”
Posted in Uncategorized
<div class=Listening to you at last: EU plans to tap cell phones
" />

Listening to you at last: EU plans to tap cell phones

Monday, October 19, 2009

A report accidentally published on the Internet provides insight into a secretive European Union surveillance project designed to monitor its citizens, as reported by Wikileaks earlier this month. Project INDECT aims to mine data from television, internet traffic, cellphone conversations, p2p file sharing and a range of other sources for crime prevention and threat prediction. The €14.68 million project began in January, 2009, and is scheduled to continue for five years under its current mandate.

INDECT produced the accidentally published report as part of their “Extraction of Information for Crime Prevention by Combining Web Derived Knowledge and Unstructured Data” project, but do not enumerate all potential applications of the search and surveillance technology. Police are discussed as a prime example of users, with Polish and British forces detailed as active project participants. INDECT is funded under the European Commission’s Seventh Framework Programme (FP7), and includes participation from Austria, Bulgaria, Czech Republic, France, Germany, Hungary, Poland, Slovakia, Spain, and the United Kingdom.

Indicated in the initial trial’s report, the scope of data collected is particularly broad; days of television news, radio, newspapers, and recorded telephone conversations are included. Several weeks of content from online sources were agglomerated, including mining Wikipedia for users’ and article subjects’ relations with others, organisations, and in-project movements.

Watermarking of published digital works such as film, audio, or other documents is discussed in the Project INDECT remit; its purpose is to integrate and track this information, its movement within the system and across the Internet. An unreleased promotional video for INDECT located on YouTube is shown to the right. The simplified example of the system in operation shows a file of documents with a visible INDECT-titled cover taken from an office and exchanged in a car park. How the police are alerted to the document theft is unclear in the video; as a “threat”, it would be the INDECT system’s job to predict it.

Throughout the video use of CCTV equipment, facial recognition, number plate reading, and aerial surveillance give friend-or-foe information with an overlaid map to authorities. The police proactively use this information to coordinate locating, pursuing, and capturing the document recipient. The file of documents is retrieved, and the recipient roughly detained.

Technology research performed as part of Project INDECT has clear use in countering industrial and international espionage, although the potential use in maintaining any security and predicting leaks is much broader. Quoted in the UK’s Daily Telegraph, Liberty’s director, Shami Chakrabarti, described a possible future implementation of INDECT as a “sinister step” with “positively chilling” repercussions Europe-wide.

“It is inevitable that the project has a sensitive dimension due to the security focussed goals of the project,” Suresh Manandhar, leader of the University of York researchers involved in the “Work Package 4” INDECT component, responded to Wikinews. “However, it is important to bear in mind that the scientific methods are much more general and has wider applications. The project will most likely have lot of commercial potential. The project has an Ethics board to oversee the project activities. As a responsible scientists [sic] it is of utmost importance to us that we conform to ethical guidelines.”

HAVE YOUR SAY
Should the EU carry out this research without a wider public debate?
Add or view comments

Although Wikinews attempted to contact Professor Helen Petrie of York University, the local member of Project INDECT’s Ethics board, no response was forthcoming. The professor’s area of expertise is universal access, and she has authored a variety of papers on web-accessibility for blind and disabled users. A full list of the Ethics board members is unavailable, making their suitability unassessable and distancing them from public accountability.

One potential application of Project INDECT would be implementation and enforcement of the U.K.’s “MoD Manual of Security“. The 2,389-page 2001 version passed to Wikileaks this month — commonly known as JSP-440, and marked “RESTRICTED” — goes into considerable detail on how, as a serious threat, investigative journalists should be monitored, and effectively thwarted; just the scenario the Project INDECT video could be portraying.

When approached by Wikinews about the implications of using INDECT, a representative of the U.K.’s Attorney General declined to comment on legal checks and balances such a system might require. Further U.K. enquiries were eventually referred to the Police Service of Northern Ireland, who have not yet responded.

Wikinews’ Brian McNeil contacted Eddan Katz, the International Affairs Director for the Electronic Frontier Foundation (E.F.F.). Katz last spoke to Wikinews in early 2008 on copyright, not long after taking his current position with the E.F.F. He was back in Brussels to speak to EU officials, Project INDECT was on his agenda too — having learned of it only two weeks earlier. Katz linked Project INDECT with a September report, NeoConopticon — The EU Security-Industrial Complex, authored by Ben Hayes for the Transnational Institute. The report raises serious questions about the heavy involvement of defence and IT companies in “security research”.

On the record, Katz answered a few questions for Wikinews.

((WN)) Is this illegal? Is this an invasion of privacy? Spying on citizens?

Eddan Katz When the European Parliament issued the September 5, 2001 report on the American ECHELON system they knew such an infrastructure is in violation of data protection law, undermines the values of privacy and is the first step towards a totalitarian surveillance information society.

((WN)) Who is making the decisions based on this information, about what?

E.K. What’s concerning to such a large extent is the fact that the projects seem to be agnostic to that question. These are the searching systems and those people that are working on it in these research labs do search technology anyway. […] but its inclusion in a database and its availability to law enforcement and its simultaneity of application that’s so concerning, […] because the people who built it aren’t thinking about those questions, and the social questions, and the political questions, and all this kind of stuff. [… It] seems like it’s intransparent, unaccountable.

The E.U. report Katz refers to was ratified just six days before the September 11 attacks that brought down the twin towers of the World Trade Center. In their analysis of the never-officially-recognised U.S. Echelon spy system it states, “[i]n principle, activities and measures undertaken for the purposes of state security or law enforcement do not fall within the scope of the EC Treaty.” On privacy and data-protection legislation enacted at E.U. level it comments, “[such does] not apply to ‘the processing of data/activities concerning public security, defence, state security (including the economic well-being of the state when the activities relate to state security matters) and the activities of the state in areas of criminal law'”.

Part of the remit in their analysis of Echelon was rumours of ‘commercial abuse’ of intelligence; “[i]f a Member State were to promote the use of an interception system, which was also used for industrial espionage, by allowing its own intelligence service to operate such a system or by giving foreign intelligence services access to its territory for this purpose, it would undoubtedly constitute a breach of EC law […] activities of this kind would be fundamentally at odds with the concept of a common market underpinning the EC Treaty, as it would amount to a distortion of competition”.

Ben Hayes’ NeoConoptiocon report, in a concluding section, “Following the money“, states, “[w]hat is happening in practice is that multinational corporations are using the ESRP [European Seventh Research Programme] to promote their own profit-driven agendas, while the EU is using the programme to further its own security and defence policy objectives. As suggested from the outset of this report, the kind of security described above represents a marriage of unchecked police powers and unbridled capitalism, at the expense of the democratic system.”

Retrieved from “https://en.wikinews.org/w/index.php?title=Listening_to_you_at_last:_EU_plans_to_tap_cell_phones&oldid=2611950”
Posted in Uncategorized
Dancing Water Fountains:  From The Bellagio To The Back Yard

Dancing Water Fountains: From The Bellagio To The Back Yard

By David Faulkner

Dancing water fountains, like the world famous Dancing Waters of the Bellagio Hotel in Las Vegas, have been a real crowd-pleaser in many of the world’s resorts for decades. With computer-controlled timing, lighting, and music, the performances of dancing water fountains are choreographed as carefully as any Broadway musical, and are often scheduled as an accompaniment to holiday fireworks. While dancing water fountains must be professionally installed, they can be customized for individual use..

While large dancing water fountains are inappropriate for home gardens, they can add a unique touch to an office courtyard for a business or restaurant which wants to impress potential clients. Their expense, however, can make dancing water fountains more of an investment than an entertainment, so they should be installed only when there is a financial incentive for doing so. But when programmed to put on their displays to lights and music at scheduled intervals, they can be a drawing card, especially for restaurants.

The Bellagio And The Fountain Of Angels

[youtube]http://www.youtube.com/watch?v=bgkvMzASXYk[/youtube]

The dancing water fountains of the Bellagio set the standard for dancing water fountains the world over. Measuring a quarter of a mile in length, the Bellagio fountains contain twelve hundred separate nozzles capable of shooting sprays of water to heights of tow hundred and forty feet. They also have more than four thousand lights, and are programmed to ‘dance’ to different musical selections on a fifteen to thirty minute schedule.

While they are not the dancing water fountains of the Bellagio, the Fountain of Angels in Carthage, Missouri is a twenty-minute water light, and music extravaganza from dancing water fountains which contain more than two hundred bronze sculptures , a candelabra fountain with sixty water jets, and an eighty foot high screen of water. Because the dancing waters of the Fountain of Angels perform to Gospel music, they are especially popular with area church goers.

Fountains For Your Home

If you really love dancing water fountains, and have the room and cash to spare, eight hundred dollars will get you a fifteen-inch diameter floating fountain which in all likelihood cannot be programmed to dance on command. They will never approach the performance of the gigantic dancing water fountains, but they can still dance, and add a unique feature to your home.

Regardless of whether you install your own dancing water fountain or plan you vacations to visit the cities around the world which have their own, you are just one among millions for whom dancing water fountains are the definition of drama and beauty.

When the wall has been installed, you can turn your attention to the various types of wall mount garden fountains from which you will have to choose. Some wall mount garden fountains simply hook to the wall, and these are the least expensive models. There are also wall mount garden fountains designed to be incorporated into the wall itself, and they should really be installed as the wall is being built. They are a considerably more expensive option.

About the Author: You can also find more info on

rock fountains

and

tabletop fountains

.Topfountains.com/ is a comprehensive resource to know more about fountains.

Source:

isnare.com

Permanent Link:

isnare.com/?aid=210672&ca=Home+Management

<div class=Cyberattack, not HBO comedian, caused website wipeout, says FCC
" />

Cyberattack, not HBO comedian, caused website wipeout, says FCC

Wednesday, May 10, 2017

Late Sunday night and Monday morning, the website of the United States Federal Communications Commission (FCC) became unresponsive, which interfered with attempts by the public to express their views on the proposals currently up for comment, including one about Net Neutrality. Although comedian John Oliver on his show Last Week Tonight had asked his viewers to inundate the website with comments supporting Net Neutrality, the FCC says a DDoS (distributed denial-of-service) cyberattack, not angry HBO fans, are responsible for their website’s issues.

FCC Chief Information Officer David Bray explained in a formal statement that FCC.gov’s problems did not come from a large volume of complaints and comments, which is what Oliver had asked his fans to make, but from sabotage. “These actors were not attempting to file comments themselves; rather they made it difficult for legitimate commenters to access and file with the FCC,” said Bray.

Net Neutrality is the idea that Internet providers should not be allowed to speed up or slow down access to certain websites, which would presumably be done for payment. In 2014, the U.S. government ruled Internet providers must be held to standards similar to those of telephone companies and changed their legal classification to fall under Title II of the 1934 Telecommunications Act, which gave the FCC the legal authority to order them not to give preferential treatment to high-paying customers.

In response to a previous Net Neutrality proposal in 2014, John Oliver did a segment on the fifth episode of Last Week Tonight explaining the difference between Title I and Title II status and asking his viewers to flood the FCC’s websites with comments supporting regulation. Approximately 4 million did so, and the website crashed. Sunday night, Oliver asked the public to repeat the performance, recommending comments to make and providing a single link to take them to the exact part of FCC.gov required: “America needs you to rise — or more accurately, remain seated in front of your computer screen — to this occasion,” said Oliver on the air. “So please, fly my pretties, fly once more!” Again, the FCC website soon suffered problems.

Despite Sunday night’s issues, the FCC still received tens of thousands of comments on the proposed relaxing of the 2014 regulations, which is up for a vote on May 18.

Retrieved from “https://en.wikinews.org/w/index.php?title=Cyberattack,_not_HBO_comedian,_caused_website_wipeout,_says_FCC&oldid=4315917”
Posted in Uncategorized
<div class=Leaked online: UK Home Office non-disclosure agreement with ID card companies
" />

Leaked online: UK Home Office non-disclosure agreement with ID card companies

Saturday, December 6, 2008

The Non-Disclosure agreement for companies working with the UK Government on the National identity card has been leaked on WikiLeaks. The document states, among other things, what rights the Government has to search the properties of companies involved and the obligations on the companies to keep information secret.

Section five of the document states that if a company fails to comply with the agreement, or in other cases at the “sole discretion” of the Home Office, the government may search the property, records and computers of the company. The anonymous individual who leaked the documents has stated that “no search warrant or judicial oversight would be required,” to carry out the search.

The leaker also states that individuals working for the company may have their computers searched “without any suspicion of a crime having been committed,” although the document does require that these searches may only take place “for the purposes of ensuring that all National Identity Scheme information and associated copies are secure in accordance with this agreement or have been destroyed permanently or removed from their possession.

Section two of the document requires that the document is secured in accordance with policy set out by the government, and requires that the information is only disclosed to those who need to have access as part of the identity card programme.

Section four of the document states that it shall be liable to the government for any breach of the agreement, and that, except for obligations required by the Official Secrets Act, the requirements shall no longer apply 25 years after the signing of the agreement, which took place in 2007.

The individual leaking the document has stated that he did so “to bring attention to the manner of construction of the ID scheme and the highly secretive approach being adopted by the UK government.”

Despite the criticism of the scheme, the Home Office has stated that the cards are required to “help protect people from identity fraud and theft,” and “disrupt the use of false and multiple identities by criminals and those involved in terrorist activity.”

Retrieved from “https://en.wikinews.org/w/index.php?title=Leaked_online:_UK_Home_Office_non-disclosure_agreement_with_ID_card_companies&oldid=2571295”
Posted in Uncategorized
<div class=College ice hockey could follow NHL and add second referee
" />

College ice hockey could follow NHL and add second referee

Wednesday, May 17, 2006

University of Maine men’s ice hockey head coach Tim Whitehead has proposed that the National Collegiate Athletic Association adopt the four-official system.

The system, which has two referees and two linesmen, was adopted by the National Hockey League for the 1998/99 season on a trial basis before being fully implemented for 2000/01.

“My rationale for the proposal is to get more calls right,” Whitehead told the HockeyRefs.com website. “It’s about getting the best system we can for the game.”

Maine competes in Hockey East, one of six Division I conferences. Currently, Division I employs a three-official system of one referee and two assistant referees.

Adding a second referee could result in logistical and financial difficulties for both conferences and schools.

“This would open a lot of opportunities,” said Whitehead, who isn’t opposed to young, college-age officials doing his games if “they’re the best out there.”

The NCAA Men’s Ice Hockey Rules Committee will vote on the proposal in June

Retrieved from “https://en.wikinews.org/w/index.php?title=College_ice_hockey_could_follow_NHL_and_add_second_referee&oldid=4576125”
Posted in Uncategorized
Data Loss Prevention = Disaster Prevention

Data Loss Prevention = Disaster Prevention

Data Loss Prevention = Disaster Prevention

by

Joe Hammerstien

Data loss prevention is essential whether for personal or business purposes. There are so many factors that could cause the loss of data at any unexpected time. Some of the most common ones are virus infection, calamities, and hard drive crash. Moreover, statistics in losing laptops due to thievery has also increased threatening data privacy and security. There are various techniques to prevent data loss.

[youtube]http://www.youtube.com/watch?v=8b6OA8FxjPs[/youtube]

One option is to have a manual backup. External drives and CDs or DVDs are often used to make a copy of the files to be safeguarded. These storage devices are then placed somewhere else that is safe. Yet again, this process has a tendency to result to redundant copies, not to mention it may take up significant amount of time. Moreover, physical storage devices are prone to loss or destruction. Then again, this still serves better than having no backup at all. Using software is another type of data loss prevention. Software allows convenient and timely backup. Not all software are the same; they may have differences when it comes to features and functions. The best option would have features such as encryption, compression, and virus protection. Disadvantages of having this non-remote technique arise when calamities strike the area and when dealing with numerous PCs that are not connected in a network. Also, being not connected to a network makes the process very time consuming. Why would you spend so much time for a backup when you can have one that isn’t that time demanding? There are now server and remote backups that answer the most common issues of data loss. PCs connect to a network so that backups are accessible even if one client encounters a problem. To save both on storage and bandwidth usage, data deduplication has been widely used to remove identical files and maintain just a single copy. The backup process does not even require end-users to stop with their PC activity while backing up. In other words, end users are free from doing the redundant procedure saving more time, more money. Data Loss Prevention For the server backup, data is saved offsite. This is a critical feature particularly during disasters. This is because backups are automated and centralized. Another plus factor that comes with having online backup is experts’ assistance that comes with the service. Internet access is the only requirement in order to restore files. When data security is threatened due to a robbed laptop, SafePoint is the perfect solution. Data can be completely deleted from a laptop through this feature. While natural disasters are uncontrollable, data loss is totally preventable. Aim for a backup technology that will fit your budget and answer your needs. Prepare now for we never know when the next calamity strikes.

Discover which

Data Loss Prevention

Technology has the ‘Must Have’ features. Visit

druva.com

and find out what features are needed before you purchase any backup program.

Article Source:

Data Loss Prevention = Disaster Prevention